Showing 37,841 - 37,860 results of 72,708 for search '"system"', query time: 0.23s Refine Results
  1. 37841

    Evaluation of the Application Effect of Virtual Simulation Technology in Rural Garden Landscape Design by Yuping Tang, Yang Xuan, Xiaoyue Zhu

    Published 2022-01-01
    “…Moreover, this paper proposes an optical modulation system for the application of virtual simulation in rural garden landscape design. …”
    Get full text
    Article
  2. 37842

    Pseudo 4D projective coordinate-based multi-base scalar multiplication by Ming XU, Liang SHI

    Published 2018-05-01
    “…In order to address the problem of elliptic curve cryptosystem (ECC) for the expensive cost in scalar multiplication and the vulnerability to the power analysis attacks,a pseudo 4D projective coordinate-based multi-base scalar multiplication was proposed to optimize group operation layer and scalar multiplication operation layer,which aimed at increasing the performance of ECC and resisting common power analysis attacks.Experimental results show that compared with the state-of-the-art algorithms,the proposed algorithm decreases 5.71% of point doubling cost,3.17% of point tripling cost,and 8.74% of point quintupling cost under discrete group operations.When the key length is 160 bit,the proposed algorithm decreases 36.32% of point tripling cost,17.42% of point quintupling cost,and 8.70% of the system cost under continuous group operations.The analyzing of power consumption wave shows that the proposed algorithm can resist SPA and DPA attack.…”
    Get full text
    Article
  3. 37843

    Building Vibration Prediction Induced by Moving Train with Random Forest by Jinbao Yao, Lei Fang

    Published 2021-01-01
    “…First, a three-dimensional finite element model based on train-track-site soil-building system is established, and the track dynamic reaction force calculated by the train-track model is applied as an excitation to the site. …”
    Get full text
    Article
  4. 37844

    Kaposi´s sarcoma, epidemic type. Case presentation by Gilberto Serrano Ocaña, Juan Carlos Ortiz Sablon, Ilen Ochoa Tamayo

    Published 2009-05-01
    “…In people with AIDS, Kaposi's sarcoma is caused by an interaction between HIV, a weakened immune system and human herpes virus 8. It affects approximately 20% of people with HIV that don’t take antiretroviral drugs. …”
    Get full text
    Article
  5. 37845

    Optimization Calculation Method and Mathematical Modeling of Big Data Chaotic Model Based on Improved Genetic Algorithm by Zhicheng Zhang, Yan Zhang

    Published 2022-01-01
    “…When the uncertain parameters change greatly, the control system still has good control quality and strong robustness.…”
    Get full text
    Article
  6. 37846

    Coding-aware secure routing for multi-hop wireless networks by Xian GUO, Tao FENG, Zhan-ting YUAN

    Published 2012-06-01
    “…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
    Get full text
    Article
  7. 37847

    Immune Homeostasis in Epithelial Cells: Evidence and Role of Inflammasome Signaling Reviewed by Paul M. Peeters, Emiel F. Wouters, Niki L. Reynaert

    Published 2015-01-01
    “…The epithelium regulates the interaction between the noxious xenogenous, as well as the microbial environment and the immune system, not only by providing a barrier but also by expressing a number of immunoregulatory membrane receptors, and intracellular danger sensors and their downstream effectors. …”
    Get full text
    Article
  8. 37848

    Put'-doroga ('Along the road') by V.V. Kolesov

    Published 2017-10-01
    “…The paper deals with the systemic correlation of four lexical constituents of the concept “road”: doroga (дорога 'road'), put' (путь 'way'), tropa (тропа 'track'), and stezya (стезя 'path'). …”
    Get full text
    Article
  9. 37849

    Variational Analysis of a Dynamic Contact Problem with Wear and Damage Involving Viscoelastic Materials with Long-Term Memory by Ahmed Hamidat, Hakim Bagua, Adel Aissaoui

    Published 2024-10-01
    “…The problem is expressed as a coupled system, with a hyperbolic quasi-variational inequality for displacement and a parabolic variational inequality for damage. …”
    Get full text
    Article
  10. 37850

    Acoustic Signal Aided Detection Method of Spiral Bevel Gears Based on PSO-MCKD by Li Xianshan, Tian Yu, Wei Lilin, Zhao Xiaofeng, Yan Changfeng

    Published 2024-01-01
    “…Combining the gear rolling inspection machine with the developed acoustic signal acquisition system, a real-time acoustic signal acquisition experiment is designed for detecting the quality of the contact marks on the tooth surface of the spiral bevel gear. …”
    Get full text
    Article
  11. 37851

    Two-Dimensional Nonlinear Propagation of Ion Acoustic Waves through KPB and KP Equations in Weakly Relativistic Plasmas by M. G. Hafez, M. R. Talukder, M. Hossain Ali

    Published 2016-01-01
    “…Two-dimensional three-component plasma system consisting of nonextensive electrons, positrons, and relativistic thermal ions is considered. …”
    Get full text
    Article
  12. 37852

    Lithuania in the Centrai and Eastem Europe of the 16th-18th Centuries: "Feudal Reaction" or Peripheral Capitalism? by Darius Žiemelis

    Published 2006-12-01
    “… The subject of the article is the historiography analyzing the development of the socio-economic order of Central and Eastern Europe in the 16th-18th centuries and specifically two competing theoretical approaches: the Marxist concept emphasizing the role of inner causes and of the capitalist world system (CWS) stressing external causes. The problem that the article is concerned with is the nature of the second serfdom in Central and Eastern Europe in the 16th-18th centuries: was this refeudalization in the Marxist sense, or peripheral capitalism in the CWS context? …”
    Get full text
    Article
  13. 37853
  14. 37854
  15. 37855

    Categorical and concept apparatus for the transformation of catering enterprises’ marketing strategies by V. M. Sedelnikov

    Published 2022-11-01
    “…From the standpoint of a value-oriented approach, the marketing strategy concept has been clarified as a system of strategic actions for the development of a company, which aims to form long-term relationships with consumers and increase their level of involvement, satisfaction and loyalty throughout the entire period of interaction with the consumer (customer life-time cycle). …”
    Get full text
    Article
  16. 37856

    5G core network cloud-network integration operation & maintenance by Xue ZHANG

    Published 2021-08-01
    “…Most operators in the world have turned to 5G independent networking architecture and have begun commercial deployment of 5G independent networking architecture.The 5G core network adopts NFV technology, which forms a variety of virtual resources for general computing, storage, and network hardware to achieve dynamic and flexible deployment of network functions and resources based on needs.With large-scale commercial deployment of 5G core network with network function virtualization technology, the operation & maintenance of 5G core network is also facing new challenges.The difficulties of operation & maintenance brought was analyzed by the virtualization deployment scheme of 5G core network, the architecture and scheme of 5G core network operation & maintenance system construction were proposed, and suggestions on the organizational structure of 5G core network cloud-network integration operation & maintenance were put forward, so as to provide reference for 5G core network cloud-network integration operation & maintenance.…”
    Get full text
    Article
  17. 37857

    CURRENT TRENDS OF LOCAL SELF-GOVERNMENT IN THE RUSSIAN FEDERATION by B. V. Karzev, N. N. Musinova

    Published 2020-08-01
    “…The necessity of optimization of the system of municipal powers has been substantiated and it is proposed, primarily on the level of Federal legislation, to give legal status issues of joint competence of the Russian Federation subjects and local self-government and to determine the principles of bodies of state authority of the Russian Federation of powers in subjects of joint conducting subjects of the Russian Federation and bodies of local self-government.…”
    Get full text
    Article
  18. 37858

    Trajectory Tracking of a Flexible Robot Manipulator by a New Optimized Fuzzy Adaptive Sliding Mode-Based Feedback Linearization Controller by M. J. Mahmoodabadi, N. Nejadkourki

    Published 2020-01-01
    “…Moreover, the Takagi–Sugeno–Kang fuzzy system is applied to regulate the controller gains. …”
    Get full text
    Article
  19. 37859

    T Cell Costimulatory Molecules in Anti-Viral Immunity: Potential Role in Immunotherapeutic Vaccines by Tania H Watts, Edward M Bertram, Jacob Bukczynski, Tao Wen

    Published 2003-01-01
    “…In this review the authors discuss the function of T cell costimulatory molecules in immune system activation and their potential for enhancing the efficacy of therapeutic vaccines.…”
    Get full text
    Article
  20. 37860

    Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps by LIU Jian-dong, FU Xiu-li

    Published 2007-01-01
    “…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
    Get full text
    Article