Showing 1,501 - 1,520 results of 72,708 for search '"system"', query time: 0.16s Refine Results
  1. 1501
  2. 1502

    On quasi-integrable deformation scheme of the KdV system by Kumar Abhinav, Partha Guha

    Published 2025-01-01
    “…Judicious choice of the deformed Hamiltonian yields an integrable system with scaled parameters as well as a hierarchy of deformed systems, some of which possibly are quasi-integrable. …”
    Get full text
    Article
  3. 1503
  4. 1504
  5. 1505
  6. 1506
  7. 1507

    PAPR reduction method for SFBC MIMO-OFDM systems by SHA Yi, CHEN Jun-xin, WANG Guang-xing

    Published 2009-01-01
    “…The high PAPR is the major drawback of SFBC MIMO-OFDM systems to its practicability. To deal with this problem, a novel method was proposed to reduce the PAPR of SFBC MIMO-OFDM systems. …”
    Get full text
    Article
  8. 1508

    Maximum Doppler frequency estimation algorithm for OFDM systems by CAI Wei, ZHU Guang-xi, ZHANG Qing-chun, LI Li

    Published 2005-01-01
    “…It is suitable for OFDM communication systems.…”
    Get full text
    Article
  9. 1509

    Model-Based Dependability Analysis of Physical Systems with Modelica by Andrea Tundis, Lena Buffoni, Peter Fritzson, Alfredo Garro

    Published 2017-01-01
    “…Unfortunately, the increasing complexity and accuracy of such physical systems require new, more powerful, and flexible tools and techniques for evaluating important system properties and, in particular, the dependability ones such as reliability, safety, and maintainability. …”
    Get full text
    Article
  10. 1510

    Data access control policy of encrypted deduplication system by Chunfu JIA, Guanxiong HA, Ruiqi LI

    Published 2020-05-01
    “…To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.…”
    Get full text
    Article
  11. 1511
  12. 1512

    Research on data encryption system and technology for cloud storage by Peiyi HAN, Chuanyi LIU, Jiahui WANG, Shaoming DUAN, Hezhong PAN, Binxing FANG

    Published 2020-08-01
    “…To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic program analysis technique was adopted based on JavaScript API function hooking for automatically extending to various cloud applications.And a novel proxy executed searchable encryption solution was presented so that it could achieve data encryption while maintaining the original functions of cloud applications.Experimental results show that the system can support a variety of typical cloud services,effectively protect sensitive data,and bring a relatively low overhead.…”
    Get full text
    Article
  13. 1513
  14. 1514
  15. 1515

    Research on Quality Monitoring System of Power Supply Service by Xin Huang, Yong Mo

    Published 2014-02-01
    “…Based on all-round marketing management philosophy,quality monitoring system of power supply service was proposed,an index system of quality evaluation for power supply service was constructed and the processes of abnormal work orders were presented in detail.From the technical viewpoint,the implementing process of system was expounded.Finally,the comparative analysis through system application was carried out,and it shows that the system can indeed timely trace marketing operating results online and propose early warning information,correct timely,make the evaluation to service quality.…”
    Get full text
    Article
  16. 1516
  17. 1517
  18. 1518

    QUALITY MANAGEMENT SYSTEM OF EDUCATIONAL PROGRAMS IN BUSINESS SCHOOL by A. Kanke, O. Kozlova

    Published 2018-04-01
    Subjects: “…quality management system…”
    Get full text
    Article
  19. 1519
  20. 1520