-
301
Electromagnetic Forces in Continuous Casting of Steel Slabs
Published 2019-04-01“…Optimal electromagnetic effects to control flow depends greatly on the caster geometry and other operating conditions. …”
Get full text
Article -
302
Study on the fundamental flow characteristics of synthetic jets(Behavior of free synthetic jets)
Published 2014-05-01“…Jet flows have been applied in numerous fields to control flow separation. Over the last decade, several studies on the production of synthetic jets have been performed. …”
Get full text
Article -
303
The Refinement of Petri Net with Inhibitor Arcs Based Representation for Embedded Systems
Published 2022-04-01“…However, it cannot characterize the priority of events, and cannot fully express the complex data flow and control flow. To solve this problem, inhibitor arcs are added to PRES+ and PIRES+ (PRES+ with Inhibitor arcs) is obtained. …”
Get full text
Article -
304
Study of Drug Force and the Flow Field on Road Vehicles
Published 2015-03-01“… Improving road vehicles performance needs to deep understanding the science of aerodynamics, in order to control flow field by means of active and passive control techniques. …”
Get full text
Article -
305
Dataset on tip vortex formation noise produced by wall-mounted finite airfoils with sinusoidal and porous tip geometries
Published 2020-06-01“…The use of serrated and porous materials is inspired by silent owl-wings and is a promising approach to control flow-induced noise. Noise measurements have been taken using a 47-channel planar microphone array in the anechoic wind tunnel at the Brandenburg University of Technology. …”
Get full text
Article -
306
A Deep Learning Approach for Repairing Missing Activity Labels in Event Logs for Process Mining
Published 2022-05-01“…In this paper, we assume that the control-flow information in event logs could be useful in repairing missing activity labels. …”
Get full text
Article -
307
The study on calculating flow pressure for tight oil well
Published 2018-09-01“…The fracture length mainly affects the early linear flow, and permeability anisotropy mainly affects the mid-radial flow, and the degree of penetration in the reservoir and fracture orientation mainly affect the late spherical flow, and the boundary conditions and reservoir border width mainly affect the control flow. The method can be used to determine the optimal degree of opening shot, vertical permeability and other useful parameters.…”
Get full text
Article -
308
Using an Integrated Script Control Unit (ISCU) to Assist the Power Electronics Education
Published 2017-11-01“…The computer software enables college students to write specific scripts, which can be compiled and saved on the control board, to design the control flow and algorithms. The processor on the board will realize the algorithms that are designed by the user. …”
Get full text
Article -
309
Visibly Pushdown Modular Games
Published 2014-08-01“…Games on recursive game graphs can be used to reason about the control flow of sequential programs with recursion. In games over recursive game graphs, the most natural notion of strategy is the modular strategy, i.e., a strategy that is local to a module and is oblivious to previous module invocations, and thus does not depend on the context of invocation. …”
Get full text
Article -
310
Semantic Metadata Information (SMI) Visualisation Technique Using the Integration of Ontology and UML Graph-Based Approach to Support Program Comprehension
Published 2019-11-01“…The purpose of program visualisation is to translate a program into a graphical view to show either the program code, data or control flow. Visualisation technique uses the capability of human visual system to enhance program comprehensibility. …”
Get full text
Article -
311
Operation System Vulnerabilities Analysis Based on Code Clone Detection
Published 2021-09-01“…Secondly, the basic information of the function, the label sequence and the control flow path are selected to extract the code features, and the similarity between the fragile code and the code under test is compared step by step. …”
Get full text
Article -
312
Measuring nesting
Published 2022-12-01“…The term ‘nodes’ instead of ‘statements’ is used because this work is done on control flow graphs of programme modules. Although there has been much work done on metrics related to nesting, there has not been significant work done on metrics that focus entirely on nesting. …”
Get full text
Article -
313
A Cooperative Control Method for Fully Mechanized Mining Machines Based on Fuzzy Logic Theory and Neural Networks
Published 2015-01-01“…Furthermore, the probabilistic neural network (PNN) was applied to evaluate the running status of scraper conveyor, and the cooperative control flow was designed and analyzed. Finally, a simulation example was provided and the comparison results illustrated that the proposed method was feasible and superior to the manual control.…”
Get full text
Article -
314
Dilatation of the bridging cerebral cortical veins in childhood hydrocephalus suggests a malfunction of venous impedance pumping
Published 2022-07-01“…There were a total of 18 children with hydrocephalus, compared to 72 age and sex matched control MRV’s and 22 control flow quantification studies. In hydrocephalus, the sagittal sinus venous return was reduced by 12.9%, but the straight sinus flow was not significantly different. …”
Get full text
Article -
315
Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection
Published 2020-11-01“…We consider two different automata representing Android applications, based respectively on Control Flow Graphs and Call Graphs. The adopted graph data structure allows to detect potentially malicious behaviour and also localize the code where the malicious action happens. …”
Get full text
Article -
316
Parallel Privacy-Preserving Shortest Path Algorithms
Published 2021-10-01“…As the computational platforms offered by SMC protocol sets have performance profiles that differ from typical processors, we had to perform extensive changes to the structure (including their control flow and memory accesses) and the details of these algorithms in order to obtain good performance. …”
Get full text
Article -
317
Conflicts Analysis for Inter-Enterprise Business Process Model
Published 2003-06-01“…One key element of such business process is its control flow. We show how a flow specification may contain certain structural conflicts that could compromise its correct execution. …”
Get full text
Article -
318
Design and Implementation of Intelligent Automated Production-Line Control System
Published 2021-10-01“…Users can plan the control flow of the system to control the machine operation. …”
Get full text
Article -
319
Flowchart Programs, Regular Expressions, and Decidability of Polynomial Growth-Rate
Published 2016-07-01“…The analysis relied on the compositionality of programs, hence the challenge in obtaining similar results for flowchart programs with arbitrary control-flow graphs. Our answer to the challenge is twofold: first, we propose a class of loop-annotated flowcharts, which is more general than the class of flowcharts that directly represent structured programs; secondly, we present a technique to reuse the ideas from the work on tructured programs and apply them to such flowcharts. …”
Get full text
Article -
320
Memory Offloading for Remote Attestation of Multi-Service IoT Devices
Published 2022-06-01“…The recent research works are proposing advanced Control-Flow Attestation (CFA) protocols that are able to trace the Prover’s execution flow to detect runtime attacks. …”
Get full text
Article