Showing 11,701 - 11,720 results of 23,860 for search 'Palyul~', query time: 2.45s Refine Results
  1. 11701

    The Optimal Bandwidth Parameter Selection in GPH Estimation by Weijie Zhou, Huihui Tao, Feifei Wang, Weiqiang Pan

    Published 2021-01-01
    “…Furthermore, we give the calculation accuracy of the GPH algorithm on existence, persistence or antipersistence of long memory, and long memory parameter d when a = 0.6.…”
    Get full text
    Article
  2. 11702

    Abnormal network traffic detection approach based on alive entropy by Xiang-kun MU, Jin-song WANG, Yu-feng XUE, Wei HUANG

    Published 2013-09-01
    “…A novel alive entropy-based detection approach was proposed,which detects the abnormal network traffic based on the values of alive entropies.The alive entropies calculated based on the NetFlow data coming from the network traffic of input and output of a whole system,which is essentially a monitored network.In order to decrease false positive rate of abnormal network traffic,different scales are selected to compute the values of alive entropies in different sizes of network traffic.With the low false positive rate of abnormal network traffic,the abnormal network traffic can be effectively detected.Experiments carried out on a real campus network were used to evaluate the effectiveness of the proposed approach.A comparative study illustrates that the proposed approach may easily detect the abnormal network traffic with random characteristics in comparison with some “conventional” approaches reported in the literatures.…”
    Get full text
    Article
  3. 11703

    Evidence of $\phi_0$-Josephson junction from skewed diffraction patterns in Sn-InSb nanowires by B. Zhang, Z. Li, V. Aguilar, P. Zhang, M. Pendharkar, C. Dempsey, J. S. Lee, S. D. Harrington, S. Tan, J. S. Meyer, M. Houzet, C. J. Palmstrom, S. M. Frolov

    Published 2025-01-01
    “…We develop a phenomenological model and perform tight-binding calculations, both methods reproducing the essential features of the experiment. …”
    Get full text
    Article
  4. 11704

    Experimental investigation of the mechanical properties of Alfas stone by Kostas N. Kaklis, Stelios P. Mavrigiannakis, Zach G. Agioutantis, Emmanouil K. Steiakakis, Foteini K. Stathogianni

    Published 2017-04-01
    “…Also, the size effect was investigated with respect to the calculated intact rock modulus and Poisson’s ratio. …”
    Get full text
    Article
  5. 11705

    Thermodynamic modeling of the Fe-Mg-Si system by Du Y., Zhao J.R., Zhang C., Chen H.L., Zhang L.J.

    Published 2007-01-01
    “…Comparisons between the calculated and measured phase diagrams show that the measured isothermal six-lions at 1600°, 1454°, 727° and 710°C, the observed regions of primary phases are satisfactorily accounted for by the thermodynamic description. …”
    Get full text
    Article
  6. 11706

    Effects of the Wine Cooperative System on Socio-economic Factors and Landscapes in Mountain Areas by Etienne Delay, Marius Chevallier, Eric Rouvellac, Fabio Zottele

    Published 2015-05-01
    “…The wine cooperative system in vineyards in mountain regions, such as in Banyuls-sur-Mer, France and the Val di Cembra, Italy, offers a privileged context for studying the opportunities for individual action that affect precarious socio-economic balances. …”
    Get full text
    Article
  7. 11707

    Economic Feasibility of Anaerobic Digestion To Produce Electricity on Florida Dairy Farms by Russ Giesy, Ann C. Wilkie, Albert De Vries, Roger A. Nordstedt

    Published 2019-05-01
    “…The consultants visited three dairy farms located in Florida in the winter of 2005, calculated wastewater flows (including flushed manure, milking parlor wastewater, and recycled flush water), and determined the size and other necessary aspects of the potential systems specific to each dairy farm. …”
    Get full text
    Article
  8. 11708

    Design and Analysis of a New Type of Metal Belt Continuously Variable Transmission by Zhang Wu, Guo Wei, Lu Zhengxiong, Cao Jianbo

    Published 2015-01-01
    “…Through the comparative analysis the constraint condition of two kinds of CVT metal belt ring and wire rope in six degrees freedom,the result shows that the WR- CVT has a stable working state of MB- CVT. The formula of calculating lateral pressure of WR- CVT wire rope and metal block arc groove contact is obtained,the analysis of WR- CVT wire rope and metal block arc groove longitudinal contact and non- contact the relationship of force are carried out,the foundation for the further study of WR- CVT is provided.…”
    Get full text
    Article
  9. 11709

    An investigation of the psychometric properties of the strong brand questionnaire in sport by Habib Honarı, Mehrzad Hamıdı, Fatemeh Kıanı, Mona Rezaeı

    Published 2016-08-01
    “…Reliability (859/0) was satisfactory. According to calculated psychometric indices, this questionnaire could be appropriate to assess the most strong sports brands.…”
    Get full text
    Article
  10. 11710

    Internal Gripping Device of the Manipulator based on Worm and Worm Gear and Crank Connecting Rod Drive by Xia Chunfeng, Wang Mingdi, Zhong Kangmin

    Published 2016-01-01
    “…Its mechanical properties and calculation formula are also given out. After the device being driven by gear motor,output torque rotates the worm first and transmits the driving force to the worm. …”
    Get full text
    Article
  11. 11711

    SDN security prediction method based on bayesian attack graph by Yanshang YIN, Tongpeng SUO, Ligang DONG, Xian JIANG

    Published 2021-11-01
    “…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
    Get full text
    Article
  12. 11712

    NONLINEAR OVERVOLTAGE LIMITER APPLICATION FOR INTERNAL OVER-VOLTAGE PROTECTION IN AVERAGE VOLTAGE NETWORKS by A. N. Bokhan, V. V. Krotenok

    Published 2005-12-01
    “…The main peculiar feature of the model is an account of m-lag time constant.A mathematical modeling of transitional processes in distribution networks with NOL has been made.Over-voltages in the calculative experiment at arcing ground for load diagram have accounted for 3.2 Uf, that corresponds to the results of field tests.…”
    Get full text
    Article
  13. 11713

    ASPECTS REGARDING THE STUDY OF HYDRAULIC AND MECHANICAL PARAMETERS OF A ”SPIDER CRANE” SYSTEM by NICUŞOR BAROIU, VIOREL PĂUNOIU, VIRGIL GABRIEL TEODOR, GEORGIANA-ALEXANDRA MOROŞANU, RĂZVAN SEBASTIAN CRĂCIUN

    Published 2024-01-01
    “…Thus, an analysis of the hydraulic lifting system was carried out, based on the calculation of hydraulic fluid flows for the drive pumps. …”
    Get full text
    Article
  14. 11714

    A study on the Useful of Zoom Technology in Iraqi EFL Classroom by Nadhim Obaid Hussein

    Published 2024-09-01
    “…The learners' questionnaire was analyzed, and the learners' response was calculated as a percentage. The research results provided insight into English learners’ approach to using technological means such as Zoom. …”
    Get full text
    Article
  15. 11715

    Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head by Wei-wei ZHOU, Bin YU

    Published 2017-11-01
    “…To overcome the problem that partial cluster heads were drastically exhausted by the energy sink-hole attack in wireless sensor network,a novel suppression model based on the optimal path of mobile cluster heads was proposed,which was shown to balance the energy consumption in each cluster head.With the adoption of unequal cluster radius and data traffic monitoring explicitly,the inhibition mechanism was modeled as multivariate linear equations.Furthermore,toroidal projection was adopted to calculate the Euclidean distance,based on which the initial energy of mobile cluster head was configured correspondingly.On this basis,an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack.The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN.…”
    Get full text
    Article
  16. 11716

    Research on the Digital Design of Gear Transmission Scheme by Wei Shan, Lianji Wang, Yali Ma, Guangjian Wang

    Published 2021-11-01
    “…From the state space theory of mechanical motion scheme design,the motion and dynamic attributes of the knowledge units are transformed into feature vectors,so that the solution of gear transmission scheme is converted into a matrix calculation. The relationship between dynamic attributes of knowledge units and 3D parametric model is established to realize the visualization of transmission scheme. …”
    Get full text
    Article
  17. 11717

    Kinetics of Phenol Removal from Aqueous Solution by Adsorption onto Peanut Shell Acid-Activated Carbon by Elio E. Gonzo, Luis F. Gonzo

    Published 2005-05-01
    “…The rate constant and the equilibrium adsorption capacity were calculated. From these parameters, empirical correlations for predicting the equilibrium adsorption capacity as a function of the C 0 /D ratio, and for estimating the rate constant as a function of the relation D/(C 0 d p ) 0.5 , were derived. …”
    Get full text
    Article
  18. 11718

    Functional composition in software-defined network based on atomic capacity by UANTong D, ANJu-long L, HENGGuo-zhen C, UYu-xiang H

    Published 2015-05-01
    “…Software-defined network (SDN) enables frequent network functional innovation and evolution,making the control function modularity one of the most hot research fields on SDN.Aiming at network-wide functional composition based on unified module definition and function division,firstly,atomic capacity (AC) is introduced as atomic elements of module function division and an AC-based resource description method is proposed; secondly,functional composition module based on two-level mapping is put forward and a heuristic algorithm to calculate the composition is proposed; fi-nally,an AC-orchestrating layer as extended structure of SDN application layer is devised and then a NetFPGA-10G pro-totype implementation is given.Experimental results show that the method can combine functional instances more effec-tively with better resource utilization.…”
    Get full text
    Article
  19. 11719

    Research of 3D Comprehensive Modification of Transmission Gear by Zhou Xinjian, Mao Le, Li Guangxing

    Published 2018-01-01
    “…Then,the optimal three-dimensional modification parameters are obtained with the help of the neural network and genetic algorithm. The simulating calculation results indicated that the three-dimensional modification of the gear can greatly reduce the gear contact stress,optimize the gear contact spots and reduce the meshing transmission error.The comparison of the results before and after optimization also proved the effectiveness of this method and it can be used as a reference for optimum design of transmission gears.…”
    Get full text
    Article
  20. 11720

    Modeling and Simulation of Alternating Multiphase Walking with Two Legs on Human-machine Carrying Exoskeleton by Qi Chen, Fang Liu, Zhizheng Wang

    Published 2022-07-01
    “…In order to study the variation law of kinematic parameters in the process of multi intersection and replacement in the process of human-machine carrying exoskeleton walking,a kinematic model of exoskeleton is established based on D-H coordinate system,and the kinematic expression in the process of walking is calculated by Newton Euler recursive formula. In order to realize the carrying movement between exoskeleton and human body,the parameters of joints in the process of human walking are measured and analyzed by displacement attitude sensor. …”
    Get full text
    Article