Showing 1,961 - 1,980 results of 46,768 for search '"designer"', query time: 0.10s Refine Results
  1. 1961

    VIBRATION ANALYSIS AND OPTIMAL DESIGN OF LIGHT TRUCKS FUEL FILTER BRACKET by WU Hao, ZHONG ZiFeng

    Published 2019-01-01
    “…The analysis method wad integrated with road test,finite element technology,frequency response method and vehicle reliability road test,the advanced reference and practical engineering application for the similar brackets vibration analysis and optimization design were provided.…”
    Get full text
    Article
  2. 1962
  3. 1963

    New Strategies and Simulation Tools to Optically Design a Field of Heliostats by Paola Sansoni, Franco Francini, Daniela Fontani, Elisa Sani, Luca Mercatelli, David Jafrancesco

    Published 2013-01-01
    “…Our research experience in the optical design of heliostats fields for Concentrating Solar Power plants suggested using apposite simulation procedures, which were especially developed to simplify the reproduction of heliostats fields and to support in the analysis of the tower plant performances. …”
    Get full text
    Article
  4. 1964

    Design and Performance Research of Detection Platform based on Spherical Parallel Mechanism by Zhu Xiaorong Zhou Yudong Hu Yang Song Yueyue Deng Jiaming Shen Huiping

    Published 2019-01-01
    “…Further,the prototype of spherical parallel detection platform is designed and manufactured. Finally,the distribution of posture space, dexterity and force transfer performance of the prototype in posture space is analyzed and drawn. …”
    Get full text
    Article
  5. 1965

    Research and design of authenticated encryption algorithm based on AES round function by Guoqiang GAO, Zichen LI

    Published 2020-04-01
    “…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.…”
    Get full text
    Article
  6. 1966

    A Novel 5G LTE Antenna Design for Portable Devices by Wei-Chiang Jhang, Jwo-Shiun Sun

    Published 2020-01-01
    “…This paper presents the low profile, planar, and small-size antenna design for WWAN, LTE, and 5G (5th generation wireless systems) for use in portable communication equipment. …”
    Get full text
    Article
  7. 1967

    Design and implementation of hardware-based dynamic instruction set randomization framework by San DU, Hui SHU, Fei KANG

    Published 2017-11-01
    “…All the existing ISR methods have some defects including stripping data from code segment is hard to accomplish,static ISR has fixed key and pseudo-random key is not secure.To introduce ISR technology into the se-curity protection of kernel layer and application layer,hardware-based dynamic instruction set randomization framework (HDISR) was designed and implemented,in which program code was encrypted at loading time.Kernel encryption uses kernel key and applications encryption uses a different user key per process.The experimental re-sults show that HDISR can degrade code injection attack to Denial of Service attack with less than 2.57% additional hardware and 0.31s startup delay of each megabyte code encryption.…”
    Get full text
    Article
  8. 1968
  9. 1969

    A network intrusion detection method designed for few-shot scenarios by Weichen HU, Congyuan XU, Yong ZHAN, Guanghui CHEN, Siqing LIU, Zhiqiang WANG, Xiaolin WANG

    Published 2023-10-01
    “…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
    Get full text
    Article
  10. 1970

    An Approach to Evaluate the Clothing Creative Design with Dual Hesitant Fuzzy Information by Ya-Mei Li

    Published 2014-01-01
    “…The problem of evaluating the clothing creative design with dual hesitant fuzzy information is the multiple attribute decision making problem. …”
    Get full text
    Article
  11. 1971

    Thermal Insulating Concrete Wall Panel Design for Sustainable Built Environment by Ao Zhou, Kwun-Wah Wong, Denvid Lau

    Published 2014-01-01
    “…For further understanding the thermal effect of such sandwich wall panel design from building scale, two three-story building models adopting different wall panel designs are constructed for evaluating the temperature distribution of entire buildings using finite element method. …”
    Get full text
    Article
  12. 1972
  13. 1973
  14. 1974

    Topology Optimization Design of Transmission Case Housing Used in Electric Vehicle by Zhang Qing, Li Hongbiao, Zhou Qia, Yan Huidong, Guo Wentian, Yang Xianxue

    Published 2017-01-01
    “…The analysis results show that the structural strength and modal frequency of the optimized transmission are higher than the design index,the optimization design of the complicated transmission case housing structure is realized.…”
    Get full text
    Article
  15. 1975
  16. 1976
  17. 1977
  18. 1978
  19. 1979
  20. 1980

    Improved Design of Bit Synchronization Clock Extraction in Digital Communication System by Huimin Duan, Hui Huang, Cuihua Li

    Published 2018-01-01
    “…An improved method is proposed in this design to reduce the phase jitter after the synchronization or the random noise induced phase jitter in a bit synchronization clock extraction circuit. …”
    Get full text
    Article