Showing 3,281 - 3,300 results of 10,931 for search '"software"', query time: 0.07s Refine Results
  1. 3281

    Effect Mechanism of the North Wind on Saltwater Intrusion in the Modaomen Channel by GAO Chenchen, CAI Duo

    Published 2020-01-01
    “…This paper establishes a three-dimensional mathematical salinity model for tide in the Modaomen Channel based on MIKE3 software, validates and calibrates the model by the measured data, conducts the numerical calculation of saltwater intrusion in the Modaomen Channel under north wind. and analyzes the effect of north wind on saltwater intrusion in the Modaomen Channel according to the simulation results and the theory of salt flux decomposition. …”
    Get full text
    Article
  2. 3282

    Impact of experimentation in thermodynamic studies of some metallic and oxidic systems by Aune R.E., Fredriksson P., Seetharaman S.

    Published 2002-01-01
    “…New data with regard to the thermodynamic activities of FeO-containing slag systems and sulphide capacities of multicomponent slags, obtained by gas equilibration method, are also presented. A thermodynamic software, THERMOSLAG© based on the experimental data has been found to be extremely useful by the steel industries is also discussed.…”
    Get full text
    Article
  3. 3283

    Structural Response of Submerged Air-Backed Plates by Experimental and Numerical Analyses by Lloyd Hammond, Raphael Grzebieta

    Published 2000-01-01
    “…It is expected that the predictive capability of the finite element model will be significantly improved once hydrostatic initialisation can be fully utilised with the LS-DYNA/USA software.…”
    Get full text
    Article
  4. 3284

    Optimization Design of Low Drag Torque Parameters of High-speed Wet Clutches by Wang Yuxi, Zhao Junsheng, Li Xueming, Gao Weidong, Gong Ke

    Published 2024-03-01
    “…The dynamic response model of the objective function is established by Simulink software, and the optimization results are verified. …”
    Get full text
    Article
  5. 3285

    Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm by Xiaonian WU, Yingxin LI, Yongzhuang WEI, Yaping SUN

    Published 2020-01-01
    “…The lightweight block cipher algorithms called GRANULE and MANTRA have a simple structure,fast encryption speed,and they can be easy implemented in software and hardware.Two algorithms are especially suitable for resource-constrained environments.To analyze the security of two algorithms,an automatic search method of impossible differential distinguishers was proposed.Based on the structural characteristics of the GRANALE and MANTRA,the S-box differential characteristics were obtained by analyzing the S-box differential distribution table,and then the idea of intermediate encounter was used to traverse from the difference path obtained from the encryption/decryption direction seperately to select the optimal differential path with probability 0.The analysis results show that there are 144 different 7-round impossible differential distinguishers in the GRANULE,and 52 different 9-round impossible differential distinguishers in the MANTRA.Compared with the existing results,the rounds of the proposed distinguisher is currently the highest.…”
    Get full text
    Article
  6. 3286

    Study and Design of Adaptively Sealing Machine by Fan Huaxian, Dong Penghao, Dong Wenqi, Hu Shengbang, Jiang Yichao

    Published 2017-01-01
    “…Through the closed vector method,the analysis of the kinematics is finished,the simulation of the motion process is fulfilled by using software MATLAB. The 3 D modeling of the mechanism is carried out by using Solid Works,and the assembly interference is checked. …”
    Get full text
    Article
  7. 3287

    Strategic planning trips within the city emphasize goals over travel using traffic assignment model topsis and GIS (Case study: Kerman) by Hossein Ghazanfarpuor, moslem qasemi

    Published 2020-09-01
    “…Research, analytical - descriptive using traffic assignment models, production, distribution and absorption and to help GIS software and topsis. The results show: Areas 6, 7, 8, 16, 17, 18, 19, 20 and 42 within the central Kerman, attracting more travel than their neighboring areas.…”
    Get full text
    Article
  8. 3288

    Analysis of the Dynamic Characteristic of Forklift Gearbox based on ADAMS by Wei Liangbao, Han Bin, Xu Liming, Zhao Shijia

    Published 2017-01-01
    “…Taking a CPC30 type forklift gearbox as the research object,first of all,the model is established by using the three dimensional modeling software SolidWorks. The dynamics simulation analysis under the condition of forward gearbox first gear is carried out in the ADAMS,the time domain and frequency domain diagrams of gear meshing force under the largest working condition of the engine are obtained. …”
    Get full text
    Article
  9. 3289

    Virtualization security:the good,the bad and the ugly by Yu-tao LIU, Hai-bo CHEN

    Published 2016-10-01
    “…The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized.…”
    Get full text
    Article
  10. 3290

    Informational Aspects of Telepathology in Routine Surgical Pathology by Peter Gombas

    Published 2000-01-01
    “…Creation of complex telematic systems in pathology requires efficient methods of software engineering and implementation. Information technology of object‐oriented modeling, usage of client server architecture and relational database management systems enables more compatible systems in field of telepathology. …”
    Get full text
    Article
  11. 3291

    Image recognition technology for bituminous concrete reservoir panel cracks based on deep learning. by Kai Hu, Yang Ling, Jie Liu

    Published 2025-01-01
    “…A large dataset of panel images was collected and processed using denoising, standardization, and data augmentation techniques, with crack areas labeled via LabelImg software. The core model is an improved Xception network, enhanced with an adaptive activation function, dynamic attention mechanism, and multi-level residual connections. …”
    Get full text
    Article
  12. 3292

    Extension Partnerships for Innovative Programming: A Community-based Training on Artificial Intelligence for Workforce Development by Paul A. Hill, Lendel K. Narine, Jordan L. Rushton, Clint J. Reid

    Published 2024-12-01
    “…Utah State University Extension partnered with Dixie Technical College and Zonos, a software company, to evaluate the effectiveness of the learning experience based on anticipated outcomes. …”
    Get full text
    Article
  13. 3293

    SDN based e-mail repudiation source restraining method by Zhi-geng HAN, Xia FENG, Geng CHEN

    Published 2016-09-01
    “…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
    Get full text
    Article
  14. 3294

    DESIGN AND RESEARCH ARM OF THE CONVERTER SLIDE by ZHAO LiJuan, ZHOU WenChao, TIAN Zhen, MENG Yang

    Published 2017-01-01
    “…By ADAMS kinematics and dynamics simulation analysis,mounting arm motion displacement curve and the mounting process load lifting arm high dynamic stress areas. Based on ANSYS software provides mounting arm modal constraints analysis,identify the natural frequency and vibration mode of mounting arm,optimize its structural strength and resistance to impact and improve the ability of vibration reference.…”
    Get full text
    Article
  15. 3295

    Research on Key Technologies of Heterogeneous Wireless Network Resource Management Based on Centralized Radio Access Network Architecture by Lin Tian, Guowei Zhai, Liang Huang, Yiqing Zhou, Jinglin Shi

    Published 2013-06-01
    “…In such heterogeneous network, the key issues are how to share resources such as frequency, software, hardware and so on among different types of networks to reduce cost as well as to provide better services to users. …”
    Get full text
    Article
  16. 3296

    Calculation and Analysis of Mesh Stiffness of Spur Gear based on LTCA by Zhengjiu Feng, Guanghu Jin, Rupeng Zhu

    Published 2019-08-01
    “…Using Matlab software and three-dimensional finite element method, the flexibility matrix of spur gear tooth surface is obtained, and three calculation methods of matrix are compared and analyzed. …”
    Get full text
    Article
  17. 3297

    P(2-RPS)&U Reconfigurable Rehabilitation Mechanism Used for Human Joint and Its Kinematics Analysis by Wangwang Guo, Ruiqin Li, Fengping Ning

    Published 2019-03-01
    “…The kinematics simulation of the P(2-RPS)&U reconfigurable rehabilitation mechanism is carried out by using Adams software. The simulation results show that the mechanism could reach the range of rehabilitation movements of human elbow, knee and ankle joints, and satisfy the rehabilitation requirements of damaged joints.…”
    Get full text
    Article
  18. 3298

    A dictionary of legal English collocations as an aid for mastering the legal English genre by Katarzyna Mroczyńska

    Published 2020-12-01
    “…Our dictionary project is aimed at analysing the corpus we created, using Sketch Engine software, a cutting-edge lexicographic tool which enables the uploading and exploration of users’ own corpora. …”
    Get full text
    Article
  19. 3299

    Calculation and Analysis of Critical Speed of High-speed Gear Rotor based on Romax by Jizhe Mao, Yongchao Yuan, Yanjun Cao, Kun Zhang, Li Yu, Haiming Gang

    Published 2019-05-01
    “…The dynamic analysis of two kinds of high-speed gear rotor with abnormal vibration are proceeded by Romax software, the each nature frequency of two rotors and the influence of the bearing supporting parameter on each nature frequency are obtained. …”
    Get full text
    Article
  20. 3300

    Nonlinear Dynamical Analysis for the Cable Excited with Parametric and Forced Excitation by C. Z. Qian, C. P. Chen, G. W. Zhou

    Published 2014-01-01
    “…At last, by means of numerical method and software MATHMATIC, the effect rules of system parameters to the dynamical behavior of the system are studied, and some useful conclusions are obtained.…”
    Get full text
    Article