-
181
Research on CFR algorithm for Internet
Published 2006-01-01“…Finally by implementing Internet topology creator and conducting emulation experiments, the method was verified to be highly efficient, less time consumption and less network load.…”
Get full text
Article -
182
L’influence des espaces de sociabilité sur la création en bande dessinée
Published 2017-12-01“…We primarily focus on workshops, which play a determinant part on these collaborative and emulative processes.…”
Get full text
Article -
183
Percursos da cidade em João Antônio
Published 2013-01-01“…The city in João Antônio’s writings seems to be composed by the particular language and focus of the narrator, who wants himself identified to the lower classes, emulating the talk of the excluded people by a linguistic treatment, with its syntactic, rhythmic and vocabulary implications, building a point of view apart from the representations of the upper classes. …”
Get full text
Article -
184
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
Published 2025-01-01“…In this paper, the authors define a framework for identifying vulnerabilities within these protocols and their on-device implementations, utilizing formal modeling, hardware in the loop-driven network emulation, and fully virtual network scenario simulation. …”
Get full text
Article -
185
A tactile sensor for recognition of softness using interlocking structure of carbon nanoparticle- polydimethylsiloxane composite
Published 2025-06-01“…This study introduces a novel tactile sensor designed with an interlocking structure of polydimethylsiloxane (PDMS) embedded with carbon nanoparticles (CNP), aimed at enhancing the detection and differentiation of material softness. This sensor emulates the human tactile sense by detecting softness through measuring not only the pressure applied but also the transient state during material deformation to reach the indentation depth, thus providing a comprehensive softness profile. …”
Get full text
Article -
186
A escrita comovida de João Anzanello Carrascoza
Published 2009-01-01“…The impassible narration, which, in its indifference, emulates the brutality of the episodesit describes, is an essential feature of the most noted Brazilian fictions of the 1990s. …”
Get full text
Article -
187
Position and Orientation Error Analysis of a New 3-PRS Parallel Mechanism
Published 2016-01-01“…Aiming at the analysis of the position and orientation error on the new 3- PRS parallel mechanism with three adjustable pedestals and variable working space,a geometric analytic method for the forward kinematics analysis of the 3- PRS parallel mechanism is proposed,then the analysis of the working platform end- effector error is derived,and what’s more,the position and orientation of the working platform end- effector is obtained by using software emulation when the three pedestals at different positions. …”
Get full text
Article -
188
High-Speed Tactile Sensing for Array-Type Tactile Sensor and Object Manipulation Based on Tactile Information
Published 2011-01-01“…In this paper, the problem of slow response time is resolved by using software for an array-type tactile sensor with high resolution that emulates the human sensor system. The validity of the proposed method is demonstrated through experiments.…”
Get full text
Article -
189
Novel cyberspace-oriented access control model
Published 2016-05-01“…A novel cyberspace-oriented access control model was proposed,termed as CoAC,which avoided the threats by comprehensively considering vital factors,such as access requesting entity,general tense,access point,device,networks,resource,internet-based interactive graph and chain of resource transmission.By appropriately adjusting these factors,CoAC emulated most of typical access control models and fulfilled the requirements of new information service patterns and dissemination modes.The administrative model of CoAC was also presented and the functions and methods for administrating CoAC were described by utilizing Z-notation.CoAC is flexible and scalable,it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques.…”
Get full text
Article -
190
Comparison of performance of Xamarin and Flutter cross-platform frameworks
Published 2024-09-01“…Tests were performed on an emulator and on a physical device. The sorted arrays had different sizes, and database operations were performed for different sizes of data sets. …”
Get full text
Article -
191
New kind of CD-DCSK chaos shift keying secure communication system
Published 2012-05-01“…As existing chaos keying communication systems had the issues of low data transmission rate and weak system confidentiality,a new kind of chaos shift keying communication system:CD-DCSK(correlation delay-differential chaos shift keying) was presented.At the same time lucubrated and simulated the communication performances of this new system.The theoretical deduction and emulational experimentation analysis verified that CD-DCSK has both merits of high confidentiality of CDSK and low BER of DCSK,and its transmission rate is twice as much as original shift keying schemes.Meanwhile,this new communication scheme perfectly achieved the secrecy transmission of age signal.Therefore,it can be clearly seen that this new system is realizable and has high security.…”
Get full text
Article -
192
Research on intrusion detection system based on two-level algorithm
Published 2005-01-01“…This model system is proved to be effective from the comparison of emulating experiments on Snort and NIDES detection system.…”
Get full text
Article -
193
Stability of O/W Emulsion with Synthetic Perfumes Oxidized by Singlet Oxygen
Published 2013-01-01“…The stability of the O/W emulation including eugenol and linalool significantly decreased with increasing light irradiation time. …”
Get full text
Article -
194
AIDS, Caregiving and Kinship: The Queer “Family” in Bill Sherwood’s Parting Glances
Published 2017-03-01“…In this sense, it is argued that to look at the evolution of queer familial life means to look at a long process of transference of one social modality to another, and the AIDS film specifically as a place where familial relationality is emulated and transformed through relations based in love, friendship and parrhesia.…”
Get full text
Article -
195
Study on the Meshing Mechanism of Hy-Vo Silent Chain System
Published 2016-01-01“…According to the six different plate connection orders,the dynamics simulation models of Hy-Vo silent chain system are built and simplified,and load and driving function are added to the models. The models are emulated and the center distance fluctuations of them are analyzed. …”
Get full text
Article -
196
Quantum-Cognitive Neural Networks: Assessing Confidence and Uncertainty with Human Decision-Making Simulations
Published 2025-01-01“…In this paper, we employ the recently proposed quantum tunnelling neural networks (QT-NNs) inspired by human brain processes alongside quantum cognition theory to classify image datasets while emulating human perception and judgment. Our findings suggest that the QT-NN model provides compelling evidence of its potential to replicate human-like decision-making. …”
Get full text
Article -
197
APPLYING SOME MATCHING ALGORITHMS FOR SEQUENCE IGNATURE TO ANALYZE AND DETECT ENTRIES INTO SYSTEM NETWORKS
Published 2013-06-01“…In this paper, the pattern matching algorithms is deployed by emulating forms of network attacks on intrusion detection system together with firewall IOS/I PS. …”
Get full text
Article -
198
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Published 2021-03-01“…Aiming at the security problem when servants are faced with common vulnerabilities, an improved DHR architecture called IDHR was proposed.On the basis of DHR, an executor-partition module that divided the executor-set to several executor pools by the heterogeneity among the executors was introduced to improve the heterogeneity among the executor pools.Moreover, the scheduling algorithm was improved by choosing executor pools randomly at first, and then choosing the executors from these pools randomly.Finally, through two experimental schemes of random simulation and Web server emulation, the security evaluation of the proposed IDHR architecture was carried out from two aspects of attack success rate and control rate.Experimental results show that the security of the IDHR architecture, especially when the common vulnerability is unknown, is significantly better than the traditional DHR architecture.…”
Get full text
Article -
199
¿Birds of passage? La integración social de la población refugiada en España
Published 2018-05-01“…During their first five years of incorporation, refugees in Spain are emulating the same vulnerable conditions of integration as in other European countries, mainly marked by job insecurity, housing poverty and economic uncertainty. …”
Get full text
Article -
200
La revendication bretonne dans la littérature du IIIe Emsav : une inversion des valeurs
Published 2024-06-01“…The decade following the end of World War II failed to rebuild, in Brittany, the popular emulation that certain “nationalist” militants could have wished for around the question of the specific Breton identity. …”
Get full text
Article