Showing 12,381 - 12,400 results of 46,768 for search '"designer"', query time: 0.16s Refine Results
  1. 12381

    Regional consensus of switched positive multi-agent systems with multiple equilibria by Junfeng Zhang, Pei Zhang, Tarek Raïssi, Bhatti Uzair Aslam

    Published 2025-01-01
    “…Subsequently, a Luenberger observer with multiple equilibria is constructed to facilitate the design of an observer-based distributed proportional-integral-derivative control protocol. …”
    Get full text
    Article
  2. 12382

    Contributions of Matrix Metalloproteinases to Neural Plasticity, Habituation, Associative Learning and Drug Addiction by John W. Wright, Joseph W. Harding

    Published 2009-01-01
    “…., neural plasticity) by degrading cell adhesion molecules (CAMs) designed to provide stability to those extracellular matrix (ECM) proteins that form scaffolding supporting neurons and glia. …”
    Get full text
    Article
  3. 12383

    Évolution du jardin latin moderne », dans Du paradis au jardin latin by Nicolás Marías Rubió y Tudurí

    Published 2010-07-01
    “…Little known in France, the work of Nicolás María Rubio y Tudurí is divided between architecture, parks design and writing. He published Del paraiso al jarding latino, vast synthesis of the history of gardens. …”
    Get full text
    Article
  4. 12384

    Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism by Yuancheng LI, Hao LUO, Xinyu WANG, Jiexuan YUAN

    Published 2024-03-01
    “…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
    Get full text
    Article
  5. 12385

    Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks by Amir Mohammed, Craig Ramlal, Lincoln Marine, Fasil Muddeen

    Published 2024-01-01
    “…Thus, there is a growing need to design resilient control strategies to address the issue of cyberattacks. …”
    Get full text
    Article
  6. 12386

    Multi-pulse Fourier codes for bit transmission at the quantum limit by Matteo Rosati

    Published 2025-01-01
    “…We show that multi-pulse codes can approach the rate of OOK closely, providing a simplified design for quantum-enhanced communication in the photon-starved regime; furthermore, multi-level codes can approach generalized-OOK strategies with multiple pulse types, thus they can be employed in the larger photon-number regime.…”
    Get full text
    Article
  7. 12387

    Double adversarial attack against license plate recognition system by Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU

    Published 2023-06-01
    “…Recent studies have revealed that deep neural networks (DNN) used in artificial intelligence systems are highly vulnerable to adversarial sample-based attacks.To address this issue, a dual adversarial attack method was proposed for license plate recognition (LPR) systems in a DNN-based scenario.It was demonstrated that an adversarial patch added to the pattern location of the license plate can render the target detection subsystem of the LPR system unable to detect the license plate class.Additionally, the natural rust and stains were simulated by adding irregular single-connected area random points to the license plate image, which results in the misrecognition of the license plate number.or the license plate research, different shapes of adversarial patches and different colors of adversarial patches are designed as a way to generate adversarial license plates and migrate them to the physical world.Experimental results show that the designed adversarial samples are undetectable by the human eye and can deceive the license plate recognition system, such as EasyPR.The success rate of the attack in the physical world can reach 99%.The study sheds light on the vulnerability of deep learning and the adversarial attack of LPR, and offers a positive contribution toward improving the robustness of license plate recognition models.…”
    Get full text
    Article
  8. 12388

    An Empirical Analysis of the Role of Piano Performance in Alleviating Psychological Trauma in People with Psychological Isolation Disorder by Xia Cao

    Published 2022-01-01
    “…This paper presents an in-depth analysis and study of the role of piano performance in alleviating psychological trauma in people with psychological isolation disorder. In this paper, we designed a music modulation system based on EEG signals of people with isolation disorder and designed an interface with real-time emotion recognition. …”
    Get full text
    Article
  9. 12389

    First ways to find out breast cancer by Breast Self-Examination (BSE) by Susi Muryani, Nurhakim Yudhi Wibowo, Prayogi Ning Tyastuti

    Published 2024-12-01
    “…This type of research uses a quasi-experimental design with a one-group pre-post test design without control. …”
    Get full text
    Article
  10. 12390

    Development of Serious Games as A Programming Learning Platform for Informatics Students by Noven Indra Prasetya, Shofiya Syidada, Lestari Retnawati

    Published 2025-01-01
    “…This study aims to develop DolananCoding, a programming learning platform based on serious games designed for informatics students. The research employed the waterfall software development methodology, encompassing requirements analysis, system design, implementation, testing, and dissemination. …”
    Get full text
    Article
  11. 12391

    Exploring Online Synthesis for CGRAs with Specialized Operator Sets by Stefan Döbrich, Christian Hochberger

    Published 2011-01-01
    “…The design of energy-efficient systems has become a major challenge for engineers over the last decade. …”
    Get full text
    Article
  12. 12392
  13. 12393

    Research and DSP Implementation of Speech Enhancement Technology Based on Dynamic Mixed Features and Adaptive Mask by Jie Yang, Yachun Tang

    Published 2022-01-01
    “…Finally, the hardware and algorithm software design of the DSP-based speech enhancement system is given. …”
    Get full text
    Article
  14. 12394

    Research of Flow Field of Alkaline/Surfactant/Polymer Solution in the Annular Depressurization Slot by PIV Experiment by Cheng Fu, Tingting Zhu, Di Wu, Ying Wang, Bin Huang

    Published 2018-01-01
    “…In order to study the flow field changes of ASP (alkaline/surfactant/polymer) solutions with different molecular weights and flow rates when flowing through the annular depressurization slot in the laboratory, the annulus pipeline model was designed based on the principle of similarity. The particle image velocimetry (PIV) system was used to continuously capture the transient images when the ASP solution flows in the model under different experimental conditions. …”
    Get full text
    Article
  15. 12395

    Research and optimization on the sensing algorithm for 6G integrated sensing and communication network by Xiaoyun WANG, Xiaozhou ZHANG, Liang MA, Yajuan WANG, Mengting LOU, Tao JIANG, Jing JIN, Qixing WANG, Guangyi LIU

    Published 2023-02-01
    “…High-precision sensing is one of the basic capabilities of 6G mobile communication system to fulfill the demands of many application scenarios in the future, and the integrated design of sensing and communication (ISAC) is an important direction of 6G research.The works on ISAC mainly focus on improving the sensing performance.However, besides high sensing accuracy, 6G ISAC network still has a high communication rate requirement.Therefore, joint analysis and design of communication and sensing is necessary.First, three classic sensing algorithms were introduced that could achieve multi-target ranging and speed measurement, and the algorithms were analyzed from three aspects: sensing accuracy, communication performance and computational complexity.It is shown that the optimal sensing accuracy, sensing capacity and communication rate could not be achieved at the same time by using either one algorithm.Second, combined with the characteristics of different sensing algorithms, an adaptive sensing algorithm was proposed that the receiver selected the appropriate sensing algorithm according to the measured receive signal-to-interference-plus-noise ratio to realize the joint optimization of sensing and communication performance.Finally, the link-level simulation was carried out to verify that the proposed algorithm can obtain better sensing accuracy and communication capacity than any single algorithm.…”
    Get full text
    Article
  16. 12396

    Blockchain based trusted traceability system scheme for raw milk supply chain by Ying LIU, Hongbo FAN, Shouqun MA, Zhiwei GAO, Jinjiang LIU

    Published 2021-05-01
    “…Abtract: The development of raw milk is an important direction for the development of China’s dairy industry, and a traceability system for the raw milk industry was proposed for the development of the entire industry crucially.The characteristics of the raw milk industry were analyzed and four major problems were proposed as the timeliness, the problems found after the fact, the difficulty in tracing the victims, the quality control system, such as difficulties in gaining trust, which were the main characteristics that distinguish the raw milk industry from other agricultural industries, and leaded to traceability in traditional agriculture.The mechanism or even the popular blockchain-based traceability mechanism for agricultural products could not meet the traceability requirements of the raw milk industry.Based on this finding, RMChain, a traceability system for raw milk supply chain system scheme, was designed to meet the requirements of the existing blockchain-based traceability mechanisms in the raw milk industry.In addition to the various advantages of the chain traceability mechanism, it was also optimized specifically for the characteristics of raw milk, which made it easy for users to trace the product and facilitate the traceability of the milk.The tracking and location of problem milk and consumer compensation effectively improved the traceability status of the fresh milk industry.For the problem of large files seriously affecting the performance of the blockchain, a multi-party storage model based on the importance of data was also designed.The feasibility of RMChain was verified.…”
    Get full text
    Article
  17. 12397

    Toxicity of mercury (Hg) on survival and growth rate, hemato- and histopathological parameters ofOreochromis niloticus by Kukuh Nirmala, Yuni Puji Hastuti, Vika Yuniar

    Published 2013-11-01
    “…This study was conducted from Mei to June 2009. The experimental design was arranged in completely randomized design with four treatments and three replications. …”
    Get full text
    Article
  18. 12398

    “I know this is good, but I am confused”: English teachers’ self-efficacy in implementing the Independent Curriculum by Zuliati Rohmah, Hamamah Hamamah, Esti Junining

    Published 2024-05-01
    “…They do not have sufficient understanding or ability to conduct a needs analysis and syllabus design as a prerequisite for implementing the curriculum. …”
    Get full text
    Article
  19. 12399

    Cooperative Intercept Guidance of Multiple Aircraft with a Lure Role Included by Shuai Zhang, Yang Guo, Shicheng Wang

    Published 2018-01-01
    “…The simulation results indicate that the proposed method of controller design has the ability to guarantee that the two defenders intercept the pursuer at the preassigned intercept angles. …”
    Get full text
    Article
  20. 12400

    Efficient routing strategy of blockchain-based payment channel network by Ru HUO, Dong NI, Hua LU, Yunfeng XIA, Shuo WANG, Tao HUANG, Yunjie LIU

    Published 2021-06-01
    “…In order to solve the problems of the low transaction success rate and network imbalance of the payment channel network, an efficient routing strategy of blockchain-based payment channel network was proposed.This strategy established a dedicated payment channel for the high-priority services according to the service type and service priority, and divided the conventional business into multiple transaction unit.Furthermore, a channel balanced routing algorithm was designed to route each transaction unit, which could reduce the number of transactions on the blockchain and maintain long-term stable operation of the off-chain payment channel, as well as improve the transaction success rate.In addition, in order to avoid the temporary shortage of funds and unavailability of channels due to a certain link occupied by multiple transactions simultaneously, a transaction queuing mechanism in the payment channel network was designed.This mechanism established the forwarding rules for transactions by calculating the escrow amount between the node that transactions arrived and the next hop node, where the channel balanced routing algorithm was used to calculate the new forwarding path for the nodes that could not carry out capital injection within the queuing threshold.The simulation results show that the proposed strategy could improve the transaction success rate and realize the equilibrium of the payment channel network.…”
    Get full text
    Article