Showing 1,761 - 1,780 results of 7,349 for search '"platformer"', query time: 0.05s Refine Results
  1. 1761

    Engineering Safety Management System Based on Robot Intelligent Monitoring by Yanli Wang

    Published 2022-01-01
    “…At the same time, this paper detects the sample material on the detection test platform, obtains the digital pulse signal, and selects different filtering algorithms and filtering parameters. …”
    Get full text
    Article
  2. 1762

    Cartographie régionale de la susceptibilité aux laves torrentielles dans les Alpes du Sud by Mélanie Bertrand, Frédéric Liébault, Hervé Piégay

    Published 2017-01-01
    “…The map of susceptibility to the occurrence of debris flow has been integrated into the RhyTMME project’s Web platform. This platform also offers a visualisation of the rainfall’s spatial distribution (from meteorological radar data), enabling automatic real-time detection of the triggering of debris flow at the regional scale.…”
    Get full text
    Article
  3. 1763

    Regional Scale Mapping of Debris-Flow Susceptibility in the Southern French Alps by Mélanie Bertrand, Frédéric Liébault, Hervé Piégay

    Published 2017-01-01
    “…The map of susceptibility to the occurrence of debris flow has been integrated into the RhyTMME project’s Web platform. This platform also offers a visualisation of the rainfall’s spatial distribution (from meteorological radar data), enabling automatic real-time detection of the triggering of debris flow at the regional scale.…”
    Get full text
    Article
  4. 1764

    Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA by WU Zhen, CHEN Yun, CHEN Jun, WANG Min

    Published 2010-01-01
    “…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
    Get full text
    Article
  5. 1765

    How are brands associated by users in short videos-A study on the mechanism of user associations with brand placements in short videos based on signal theory. by Zhang Yang, Sun Dongqi

    Published 2025-01-01
    “…The emergence of short video platforms has opened new avenues and opportunities for brand marketing. …”
    Get full text
    Article
  6. 1766

    Ce que le livestream fait au live by Romain Bigay

    Published 2022-12-01
    “…With livestream, whose development has accelerated sharply with the Covid19 pandemic, live music is created and broadcast online, via ad hoc technical solutions, but above all via social content sharing platforms. Put into perspective by an analysis of the practices observed during the year 2020, the positioning of the Twitch livestream platform leads to an interest in the methods of content creation, the interactions that take place around it, as well as the economic models that emerge.…”
    Get full text
    Article
  7. 1767

    Potential and methods of wireless communications for Internet of things based on UAV by Qingheng SONG, Fuchun ZHENG

    Published 2019-03-01
    “…In the absence of terrestrial infrastructure for Internet of things (IoT),an effective low-cost wireless connection can be provided by an unmanned aerial vehicle (UAV) based wireless communication platform.Compared with the terrestrial IoT communication platform,the low-altitude UAV wireless communication system enjoys the advantage of rapid deployment,low cost,on-demand deployment,flexible configuration and better communication channel quality due to short-range line-of-sight links.On the other hand,several new challenges must be overcome due to the high mobility and energy consumption limitations of UAV.An overview of UAV enabled IoT wireless communication was provided,including the air-to-ground channel model,the power consumption model,as well as the applications in UAV based data dissemination/collection and relay,with particular reference to the new opportunities and solutions in these application areas.…”
    Get full text
    Article
  8. 1768

    Kinematic Analysis and Trajectory Planning of Redundant Mobile Manipulators by Xia Guangjian, Zeng Qingsheng, Feng Dongyan, Li Shenlin

    Published 2024-09-01
    “…The kinematic analysis was carried out by considering the manipulator and the mobile platform as an integrated system, a generalized form of the geometric Jacobi matrix and its pseudo-inverse were derived. …”
    Get full text
    Article
  9. 1769

    Ideas of enterprise informationization based on user experience by Feng CHEN, Tongfei XIA, Dongshu YANG

    Published 2016-03-01
    “…On the purpose of solving the problems of the traditional modes,such as difficult to realize the user personalized design,tough to fuse data,and unable to respond to the user demand,some ideas of construction mode for experience informationization based on user experience were presented.Extending from the traditional enterprise informatization,the new mode based on the massive amounts of data.The new mode uses the data asset-like management for guarantee,and uses the service-oriented data processing method for support,to achieve the user experience application,which is form an end user perspective.In the end,a typical application scenario including data trading platform,data asset-like management,high-speed computing service,and public platform,was put forward.…”
    Get full text
    Article
  10. 1770

    Mode Analysis of Degree of Freedom of a New Bifurcation Parallel Mechanism by Song Wei, Xu Yong, Liu Yong, Lü Yeping, Liang Zheng

    Published 2020-04-01
    “…A new bifurcated single-loop closed-chain configuration URRC is proposed.This single-loop closed-chain has two degrees of freedom modes.A bifurcated parallel mechanism is obtained by combining series branch PRRP with bifurcated single-loop closed chain to form a hybrid branch chain and connecting the moving platform and fixed platform with three parallel branches.Through the combination of different modes of single-loop closed-chain,the parallel mechanisms of 3T3R,3T,2R1TⅠ,2R1TⅡ and 1R2T with five DOF modes are obtained.The correctness of the five DOF modes of the bifurcated parallel mechanism and the rationality of driving selection are proved by screw theory analysis.…”
    Get full text
    Article
  11. 1771

    CSRouter:router architecture for service extensibility by Gao-feng LV, Zhi-gang SUN, Yu-xian LIN, Yi-jiao CHEN, Tao LI

    Published 2012-07-01
    “…The development of network applications ,network end-end“channel”for data transmission impeded applications,network“platform”integrating computing and storing resource with routers is a considerable efficient means to enhance the efficiency of the network transport.System area network of routers based on high performance unified switching technology is introduced to connect forwarding elements,computing elements and storing elements.The prototype were designed and implemented based on the NetMagic platform of network innovation and the IEF switch system.The testing of packets caching proves that system area network provides high performance and high reliability network bandwidths between forwarding elements and computing elements,and the novel router architecture based on system area network could utilize additional computing and storing resources to process IP packet in depth to accelerate network applications.…”
    Get full text
    Article
  12. 1772

    Getting the Most out of Social Media: What Is Social Media? by Jessica C. Fernandez, Joy N. Rumble

    Published 2015-10-01
    “…The series also discusses the various social media platforms and how to use social media strategically and wisely. …”
    Get full text
    Article
  13. 1773

    Comparative analysis of the availability of popular social networking sites by Maciej Ciukaj, Maria Skublewska-Paszkowska

    Published 2024-09-01
    “… In the era of growing number of Internet users and the importance of social media, ensuring the accessibility of these platforms for all audiences has become a crucial aspect of digital inclusion. …”
    Get full text
    Article
  14. 1774

    Optimal Allocation of Shared Manufacturing Resources Based on Bilevel Programming by Peng Liu, Caiyun Liu, Xiaoling Wei

    Published 2021-01-01
    “…In the shared manufacturing environment, on the basis of in-depth analysis of the shared manufacturing process and the allocation process of manufacturing resources, a bilevel programming model for the optimal allocation of manufacturing resources considering the benefits of the shared manufacturing platform and the rights of consumers is established. …”
    Get full text
    Article
  15. 1775

    Design and application of wireless network optimal data sharing architecture by Rupeng XU, Jingye CUI, Zeluo GUAN, Jing NING, Gang RU, Lei NIE, Zhiliang CHEN

    Published 2016-04-01
    “…Moreover,the sharing platform is able to support interoperability between software of computer and applications of telephone,which provides convenience for network optimization,consequently increase efficiency and quality of network optimization.…”
    Get full text
    Article
  16. 1776

    La création d’une nouvelle filière dans le cadre de la requalification de friches industrielles à grande échelle : les paysages productifs by Julien Lahaie

    Published 2022-12-01
    “…An industrial platform located in the south of the Lyons metropolis, La vallée chimique (Chemical Valley) is a singular landscape at the entrance to the city. …”
    Get full text
    Article
  17. 1777

    Openstack authentication protocol based on digital certificate by Zhiqiang ZHU, Renhao LIN, Cuiyun HU

    Published 2019-02-01
    “…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
    Get full text
    Article
  18. 1778

    A visual walkthrough of robotic partial mesorectal excision using the Versius surgical system by Amro Mureb

    Published 2024-01-01
    “…Study objective: To demonstrate a step-by-step surgical technique for partial mesorectal excision using the Versius robotic platform. Design: Stepwise demonstration with narrated video footage. …”
    Get full text
    Article
  19. 1779

    STRUCTURE AND DISPLACEMENT ANALYSIS FOR COMPLIANT PARALLEL ROBERTS MECHANISM AND MICRO-POSITIONING STAGE by HE Lei, JI XiaoMin, YANG XianHai, WANG HongMei

    Published 2015-01-01
    “…The symmetrical compliant Roberts mechanism was applied on micro-motion platform,a new structure of 3- PRR micro-motion platform is proposed. …”
    Get full text
    Article
  20. 1780

    3D Interactions between Virtual Worlds and Real Life in an E-Learning Community by Ulrike Lucke, Raphael Zender

    Published 2011-01-01
    “…In particular, the number of educational providers that see a potential for E-Learning in such new platforms increases. Unfortunately, most of the environments and processes implemented up to now do not exceed a virtual modelling of real-world scenarios. …”
    Get full text
    Article