Showing 181 - 200 results of 349 for search '"Emulate"', query time: 0.03s Refine Results
  1. 181

    Research on CFR algorithm for Internet by ZHANG Xin1, ZHAO Hai1, ZHANG Wen-bo2, LI Chao1

    Published 2006-01-01
    “…Finally by implementing Internet topology creator and conducting emulation experiments, the method was verified to be highly efficient, less time consumption and less network load.…”
    Get full text
    Article
  2. 182

    L’influence des espaces de sociabilité sur la création en bande dessinée  by Benjamin Caraco

    Published 2017-12-01
    “…We primarily focus on workshops, which play a determinant part on these collaborative and emulative processes.…”
    Get full text
    Article
  3. 183

    Percursos da cidade em João Antônio by Júlio Cezar Bastoni da Silva

    Published 2013-01-01
    “…The city in João Antônio’s writings seems to be composed by the particular language and focus of the narrator, who wants himself identified to the lower classes, emulating the talk of the excluded people by a linguistic treatment, with its syntactic, rhythmic and vocabulary implications, building a point of view apart from the representations of the upper classes. …”
    Get full text
    Article
  4. 184

    End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT by Matthew Boeding, Michael Hempel, Hamid Sharif

    Published 2025-01-01
    “…In this paper, the authors define a framework for identifying vulnerabilities within these protocols and their on-device implementations, utilizing formal modeling, hardware in the loop-driven network emulation, and fully virtual network scenario simulation. …”
    Get full text
    Article
  5. 185

    A tactile sensor for recognition of softness using interlocking structure of carbon nanoparticle- polydimethylsiloxane composite by Sangmin Lee, Jaewon Jang, Wanjun Park

    Published 2025-06-01
    “…This study introduces a novel tactile sensor designed with an interlocking structure of polydimethylsiloxane (PDMS) embedded with carbon nanoparticles (CNP), aimed at enhancing the detection and differentiation of material softness. This sensor emulates the human tactile sense by detecting softness through measuring not only the pressure applied but also the transient state during material deformation to reach the indentation depth, thus providing a comprehensive softness profile. …”
    Get full text
    Article
  6. 186

    A escrita comovida de João Anzanello Carrascoza by Miguel Conde

    Published 2009-01-01
    “…The impassible narration, which, in its indifference, emulates the brutality of the episodesit describes, is an essential feature of the most noted Brazilian fictions of the 1990s. …”
    Get full text
    Article
  7. 187

    Position and Orientation Error Analysis of a New 3-PRS Parallel Mechanism by Zhao Junwei, Dang Shanshan, Chen Guoqiang, Huang Junjie

    Published 2016-01-01
    “…Aiming at the analysis of the position and orientation error on the new 3- PRS parallel mechanism with three adjustable pedestals and variable working space,a geometric analytic method for the forward kinematics analysis of the 3- PRS parallel mechanism is proposed,then the analysis of the working platform end- effector error is derived,and what’s more,the position and orientation of the working platform end- effector is obtained by using software emulation when the three pedestals at different positions. …”
    Get full text
    Article
  8. 188

    High-Speed Tactile Sensing for Array-Type Tactile Sensor and Object Manipulation Based on Tactile Information by Wataru Fukui, Futoshi Kobayashi, Fumio Kojima, Hiroyuki Nakamoto, Nobuaki Imamura, Tadashi Maeda, Hidenori Shirasawa

    Published 2011-01-01
    “…In this paper, the problem of slow response time is resolved by using software for an array-type tactile sensor with high resolution that emulates the human sensor system. The validity of the proposed method is demonstrated through experiments.…”
    Get full text
    Article
  9. 189

    Novel cyberspace-oriented access control model by Feng-hua LI, Yan-chao WANG, Li-hua YIN, Rong-na XIE, Jin-bo XIONG

    Published 2016-05-01
    “…A novel cyberspace-oriented access control model was proposed,termed as CoAC,which avoided the threats by comprehensively considering vital factors,such as access requesting entity,general tense,access point,device,networks,resource,internet-based interactive graph and chain of resource transmission.By appropriately adjusting these factors,CoAC emulated most of typical access control models and fulfilled the requirements of new information service patterns and dissemination modes.The administrative model of CoAC was also presented and the functions and methods for administrating CoAC were described by utilizing Z-notation.CoAC is flexible and scalable,it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques.…”
    Get full text
    Article
  10. 190

    Comparison of performance of Xamarin and Flutter cross-platform frameworks by Piotr Kowalczyk, Mariusz Dzieńkowski

    Published 2024-09-01
    “…Tests were performed on an emulator and on a physical device. The sorted arrays had different sizes, and database operations were performed for different sizes of data sets. …”
    Get full text
    Article
  11. 191

    New kind of CD-DCSK chaos shift keying secure communication system by Yong ZHU, Jia-nan WANG, Qun DING

    Published 2012-05-01
    “…As existing chaos keying communication systems had the issues of low data transmission rate and weak system confidentiality,a new kind of chaos shift keying communication system:CD-DCSK(correlation delay-differential chaos shift keying) was presented.At the same time lucubrated and simulated the communication performances of this new system.The theoretical deduction and emulational experimentation analysis verified that CD-DCSK has both merits of high confidentiality of CDSK and low BER of DCSK,and its transmission rate is twice as much as original shift keying schemes.Meanwhile,this new communication scheme perfectly achieved the secrecy transmission of age signal.Therefore,it can be clearly seen that this new system is realizable and has high security.…”
    Get full text
    Article
  12. 192

    Research on intrusion detection system based on two-level algorithm by 覃伯平, 周贤伟, 宋存义

    Published 2005-01-01
    “…This model system is proved to be effective from the comparison of emulating experiments on Snort and NIDES detection system.…”
    Get full text
    Article
  13. 193

    Stability of O/W Emulsion with Synthetic Perfumes Oxidized by Singlet Oxygen by Naoki Watabe, Yoshikazu Tokuoka, Norimichi Kawashima

    Published 2013-01-01
    “…The stability of the O/W emulation including eugenol and linalool significantly decreased with increasing light irradiation time. …”
    Get full text
    Article
  14. 194

    AIDS, Caregiving and Kinship: The Queer “Family” in Bill Sherwood’s Parting Glances by Nikola Stepić

    Published 2017-03-01
    “…In this sense, it is argued that to look at the evolution of queer familial life means to look at a long process of transference of one social modality to another, and the AIDS film specifically as a place where familial relationality is emulated and transformed through relations based in love, friendship and parrhesia.…”
    Get full text
    Article
  15. 195

    Study on the Meshing Mechanism of Hy-Vo Silent Chain System by Cheng Yabing, Wang Xiaopeng, Liu Huan

    Published 2016-01-01
    “…According to the six different plate connection orders,the dynamics simulation models of Hy-Vo silent chain system are built and simplified,and load and driving function are added to the models. The models are emulated and the center distance fluctuations of them are analyzed. …”
    Get full text
    Article
  16. 196

    Quantum-Cognitive Neural Networks: Assessing Confidence and Uncertainty with Human Decision-Making Simulations by Milan Maksimovic, Ivan S. Maksymov

    Published 2025-01-01
    “…In this paper, we employ the recently proposed quantum tunnelling neural networks (QT-NNs) inspired by human brain processes alongside quantum cognition theory to classify image datasets while emulating human perception and judgment. Our findings suggest that the QT-NN model provides compelling evidence of its potential to replicate human-like decision-making. …”
    Get full text
    Article
  17. 197

    APPLYING SOME MATCHING ALGORITHMS FOR SEQUENCE IGNATURE TO ANALYZE AND DETECT ENTRIES INTO SYSTEM NETWORKS by Pham Nguyen Huy Phuong, Dang Le Nam

    Published 2013-06-01
    “…In this paper, the pattern matching algorithms is deployed by emulating forms of network attacks on intrusion detection system together with firewall IOS/I PS. …”
    Get full text
    Article
  18. 198

    Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition by Ting WU, Chengnan HU, Qingnan CHEN, Anbang CHEN, Qiuhua ZHENG

    Published 2021-03-01
    “…Aiming at the security problem when servants are faced with common vulnerabilities, an improved DHR architecture called IDHR was proposed.On the basis of DHR, an executor-partition module that divided the executor-set to several executor pools by the heterogeneity among the executors was introduced to improve the heterogeneity among the executor pools.Moreover, the scheduling algorithm was improved by choosing executor pools randomly at first, and then choosing the executors from these pools randomly.Finally, through two experimental schemes of random simulation and Web server emulation, the security evaluation of the proposed IDHR architecture was carried out from two aspects of attack success rate and control rate.Experimental results show that the security of the IDHR architecture, especially when the common vulnerability is unknown, is significantly better than the traditional DHR architecture.…”
    Get full text
    Article
  19. 199

    ¿Birds of passage? La integración social de la población refugiada en España by IGLESIAS-MARTÍNEZ, Juan, ESTRADA, Cecilia

    Published 2018-05-01
    “…During their first five years of incorporation, refugees in Spain are emulating the same vulnerable conditions of integration as in other European countries, mainly marked by job insecurity, housing poverty and economic uncertainty. …”
    Get full text
    Article
  20. 200

    La revendication bretonne dans la littérature du IIIe Emsav : une inversion des valeurs by Tristan Loarer

    Published 2024-06-01
    “…The decade following the end of World War II failed to rebuild, in Brittany, the popular emulation that certain “nationalist” militants could have wished for around the question of the specific Breton identity. …”
    Get full text
    Article