Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6641
Template attack of Crypto chip based on clustering
Published 2018-08-01“…The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is only applied to the device that the key input can be controlled.In order to resolve the restrictive preconditions,a novel method of template attack based on clustering was proposed.The clustering EM algorithm was modified according to the characteristics of information leakage model in the method.The modified clustering methods accurately fitted the leaked information probability model in the case of unknown key,the location of information leakage could be determined.Then the attack established the templates in the location,and implemented template matching.The proposed method eliminates the dependence of traditional template attacks on per-conditions and expand the application scenario of template attack.…”
Get full text
Article -
6642
Feedforward Control of Gear Mesh Vibration Using Piezoelectric Actuators
Published 1994-01-01“…This article presents a novel means for suppressing gear mesh related vibrations. …”
Get full text
Article -
6643
Spectrum of Superhypergraphs via Flows
Published 2022-01-01“…In this paper, we present the novel concepts supervertices, superedges, and superhypergraph via the concept of flow. …”
Get full text
Article -
6644
Image Encryption Performance Evaluation Based on Poker Test
Published 2016-01-01“…These metrics cannot estimate encryption based on image pixel coordinate permutation. A novel effectiveness evaluation metric is proposed in this paper to address the issue. …”
Get full text
Article -
6645
Meeting Report: High-Throughput Technologies for In Vivo Imaging Agents
Published 2005-04-01“…Now, those same technologies are starting to be applied to the problem of discovering novel in vivo imaging agents. Important differences in the biological and pharmacological properties needed for imaging agents, compared to those for a therapeutic agent, require new screening methods that emphasize those characteristics, such as optimized residence time and tissue specificity, that make for a good imaging agent candidate.…”
Get full text
Article -
6646
Research on fractional repetition codes based on group divisible designs
Published 2015-02-01“…A novel design of FR (fractional repetition) codes was proposed which aims at providing efficient repair at the minimum bandwidth regenerating point.The design consisted of an outer MDS (maximum distance separable) code and an inner repetition code,called GDDBFR (group divisible design based FR) codes.The proposed codes can achieve the system storage capacity under the random access model and are available for a wide range of parameters.Despite of the table-based repair,theoretical analysis identifies that GDDBFR codes generally have large node repair alternatives.Furthermore,experimental results show that GDDBFR codes can significantly reduce the failure repair time when compared with legacy RS (Reed-Solomon) codes and regenerating codes in the domain.…”
Get full text
Article -
6647
Image Classification and Annotation Based on Hadoop Cloud Computing Platform
Published 2014-02-01“…In order to effectively deal with the massive image and video data in internet,a solution for image classification and annotation based on Hadoop cloud platform was proposed.Firstly,a system based on cloud computing was given to crawl the raw data image from WWW.Secondly,a training image extractor based on pLSA (probabilistic latent semantic analysis)was presented to help users to get training set images effectively.Thirdly,the SVM model for the system was integrated,which could be used to classify or annotate novel images.According to the experiment,the system can both meet the functional requirement and achieve optimized performance for image data classification and annotation.…”
Get full text
Article -
6648
High efficiency differential chaos shift keying modulation scheme without intra-signal interference
Published 2015-06-01“…To eliminate the adverse effect brought by the intra-signal interference components in decision variables in high efficiency differential chaos shift keying system,a novel high efficiency differential chaos shift keying modulation scheme without intra-signal interference was proposed.By changing signal format of the chaotic carriers,the proposed scheme makes the two modulated chaotic signals transmitted in same time slot strictly orthogonal,which removes all possible intra-signal interference components from all decision variables clearly.It is shown by the analysis and simulation results that the proposed system has much better performance than HE-DCSK.…”
Get full text
Article -
6649
M-estimate like correlation based algorithm for direction of arrival estimation under alpha-stable environments
Published 2013-05-01“…A novel class of bounded statistics,namely,the M-estimate like correlation (MELC) for independently identi-cal distributed symmetric alpha-stable (SαS) random variables was defined.Based on the MELC matrix for the array sensor outputs,a new algorithm for direction of arrival (DOA) estimation in the presence of complex SαS noise was proposed.The comprehensive Monte-Carlo simulation results show that the MELC-MUSIC algorithm not only outper-forms the fractional lower order statistics (FLOS) based MUSIC algorithms under low SNR conditions and multi-source signals environment,but also is robust with circular and noncircular signals.…”
Get full text
Article -
6650
Forming digital kinships with earthen materials. The T-Stool
Published 2021-12-01“…The methodology chronicles the fabrication of the T-Stool, as part of interdisciplinary collaboration, to develop a novel press-molding technique for stoneware that uses a two-part, silicone rubber and epoxy mold. …”
Get full text
Article -
6651
Florida Consumer Preferences for Indoor Foliage Plant Attributes
Published 2016-09-01“…This paper also investigates the potential of using novel plant attributes that are not readily apparent in retail outlets to generate consumer interest in indoor foliage plants. …”
Get full text
Article -
6652
X-Ray imaging method for in-situ study of particle-laden flows
Published 2025-02-01“…Specifically, the flow inside a nozzle of a Fused Filament Fabrication (FFF) printer was examined. A novel contribution of this work is the first-time analysis of heated flow using XPTV, achieved by introducing tungsten powder as a contrast agent in the polymer flow. …”
Get full text
Article -
6653
Endoscopic Transcolonic Catheter-Free Pelvic Abscess Drainage
Published 2008-01-01“…Natural orifice transluminal endoscopic surgery is a novel therapeutic method in development that uses different routes of surgical approach. …”
Get full text
Article -
6654
PM2.5 concentration prediction model based on random forest regression analysis
Published 2017-07-01“…The random foreat regression algorithm was introduced to solve the shortcomings of neural network in predicting the PM2.5 concentration,such as over-fitting,complex network structure,low learning efficiency.A novel PM2.5 concentration prediction model named RFRP was designed by analyzing the 22 characteristic factors including the meteorological conditions,the concentration of air pollutants and the season.The historical meteorological data of Xi’an in 2013—2016 were collected to verify the effectiveness of the model.The experimental results show that the proposed model can not only predict the PM2.5 concentration effectively,but also improve the operating efficiency of the model without affecting the prediction accuracy.The average run time of the proposed model is 0.281 s,which is about 5.58% of the neural network prediction model.…”
Get full text
Article -
6655
Analysis for e-commerce protocols based on ProVerif
Published 2009-01-01“…It was very important to analyze e-commerce protocols by formal methods.A technique for modeling the fair-change e-commerce protocol(FEEP) with automated dispute resolution and for verifying its property was proposed.First, FEEP was modeled in applied picalculus and a novel formalization of the fairness was provided in term of a correspondence property.Then, ProVerif, proposed by Juels, Catalano and Jakobsson, was adopted to analyze FEEP automatically.The results show that:it is feasible to formalize the fairness based on a correspondence property;ProVerif can be used to verify the property that before event A happened, event B had happened, but it is not applicable to analyze the property that after event A happened, event B would happen.…”
Get full text
Article -
6656
Declarative Programming with Temporal Constraints, in the Language CG
Published 2015-01-01“…We discuss previous implementation attempts of CG and introduce a novel prototype which relies on logic programming. …”
Get full text
Article -
6657
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01“…The security of radio frequency identification (RFID) has become an increasingly severe issue.In order to protect the security of information interaction in wireless channel of RFID system,a mutual RFID authentication secure protocol was proposed.It was like the Niederreiter type public cryptography which based on the quasi-cyclic medium density parity check code(QC-MDPC).The security proof for this novel protocol was given by using a reduction method ,and the hardness of attacking was reduced to the decoding problem of the linear codes.Besides the performance results also exhibit that compared with other RFID authentication protocols,this protocol is more suitable for RFID system in areas of interaction,computation and storage,which owns limited resource and needs high efficiency.…”
Get full text
Article -
6658
XOR-FREE Implementation of Convolutional Encoder for Reconfigurable Hardware
Published 2016-01-01“…This paper presents a novel XOR-FREE algorithm to implement the convolutional encoder using reconfigurable hardware. …”
Get full text
Article -
6659
Nonlinear Extension of Multiproduct Expansion Schemes and Applications to Rigid Bodies
Published 2013-01-01“…Moreover, nonlinearity is a challenge to splitting schemes, while one has to extend the exp-functions in terms of a nonlinear Magnus expansion. Here we discuss a novel extension of the so-called multiproduct expansion methods, which is used to improve the standard Strang splitting schemes as to their nonlinearity. …”
Get full text
Article -
6660
Modeling of Transistor's Tracking Behavior in Compact Models
Published 2011-01-01“…We present a novel method to model the tracking behavior of semiconductor transistors undergoing across-chip variations in a compact Monte Carlo model for SPICE simulations and show an enablement of simultaneous 𝑁(𝑁−1)/2 tracking relations among 𝑁 transistors on a chip at any poly density, any gate pitch, and any physical location for the first time. …”
Get full text
Article