Suggested Topics within your search.
Suggested Topics within your search.
- History 61
- English language 32
- Management 23
- Research 23
- methods 22
- Politics and government 20
- Rhetoric 19
- Study and teaching 19
- Methodology 17
- Report writing 17
- Social aspects 17
- Moral and ethical aspects 15
- Social conditions 15
- Economic conditions 14
- Economic development 14
- Economic policy 14
- Law 14
- Philosophy 14
- Grammar 13
- History and criticism 12
- Anesthesia 11
- Mass media 11
- Constitutional court 10
- Biochemistry 9
- Court of Appeal 9
- Handbooks, manuals, etc 9
- Law reports, digests, etc 9
- Psychological aspects 9
- Education 8
- Medicine 8
-
419861
Movement-assisted data delivery for delay tolerant mobile sensor networks
Published 2014-10-01“…A novel data delivery method named movement-assisted adaptive data delivery (MAD) was proposed.The data cache nodes were deployed in the buffer and the base station moves in the buffer regularly.The data was forwarded to the nodes which likely moved to the buffer and had the higher remaining energy,and the base station collects data in the moving process.MAD contains two parts,data forwarding and queue management.The former makes the decision by the movement trend and the residual energy.The latter was based on the size of the survival time and the replication.Simulation results show that MAD had relatively higher delivery ratio and longer network lifetime.…”
Get full text
Article -
419862
Static-analysis-based event input generation approach for Android application
Published 2017-06-01“…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
Get full text
Article -
419863
Blind recognition of real orthogonal STBC based on independent component analysis
Published 2012-11-01“…A method for blind recognition of orthogonal space-time block coding (OSTBC) based on independent component analysis (ICA) was proposed.Firstly,the model of received signal was given.And then independent component analysis technology was used to separate the virtual channel matrix which contains coding matrix information.Using the characteristics of coding matrix,it was proved that the correlation matrix of the virtual channel matrix in OSTBC communication systems was diagonal matrix.Finally,two characteristic parameters were proposed: sparsity and variance,which could recognize OSTBC.Simulation results demonstrated that the proposed method is able to identify OSTBC while achieves good performance.…”
Get full text
Article -
419864
Light-weight self-learning approach for URL classification
Published 2014-09-01“…A self-learning light-wight (SLW) is proposed.SLW is the first to introduce access relations and have the char-acteristics of feedback and self-learning.SLW approach starts from the seed set which includes known malicious pages.Then,it automatically figures out users with low credibility based on the seed set and the visit relation database.Finally,the access records of these users are used to identify other malicious pages.Experimental results indicate that SLW ap-proach can significantly improve the efficiency of malicious pages detection and reduce the average detection time com-pared with other conventional methods.…”
Get full text
Article -
419865
Blind signal separation algorithm based on temporal predictability and differential search algorithm
Published 2014-06-01“…A novel blind signal separation algorithm based on differential search was proposed for solving the high cal-culated amount problem in blind signal separation algorithm based on bio-inspired optimization. …”
Get full text
Article -
419866
Automated intrusion response system model based on danger theory
Published 2012-01-01“…A novel automated response system model based on the danger theory (AIRSDT) was given.With the descriptions of self,non-self,immunocyte,memory detector,mature detector and immature detector of the network transactions,network danger evaluation equations for host and network were built up.Then,the automated response actions were taken or adjusted according to the danger of each network attack,including holistic risk degrees of the host and network.Both the theory analysis and experimental results prove that AIRSDT not only helps to solve the problem that the current automated response models could not detect the ‘true’ intrusion or attack action,but also greatly reduces the response times and response cost.…”
Get full text
Article -
419867
Method of overall resource efficiency measure of MIMO wireless communications
Published 2014-12-01“…A general mode of overall resource efficiency measure of communication systems is proposed.Based on it,the specific method of overall resource efficiency measure of multiple input multiple output (MIMO) wireless communica-tion systems is presented.The theory analysis and practice measure results show that although the requirements of the normalized bandwidth and the normalized signal noise ratio (SNR) of MIMO systems are relatively small due to the utilization of the space resource,but the overall resource efficiencies of the existing MIMO systems are low,and the gaps between their performances and their potential capacities are large,when compared to that of the existing communication systems under the basic additive white Gaussian noise (AWGN) channel.…”
Get full text
Article -
419868
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01“…A dynamic migration method of critical virtual machines for multi-tenancy was proposed.Firstly,the tenants can set ratio of critical virtual machines according to tenant's security requirements,then the dynamic migration frequency of virtual machines were maximized by the coexistence time constraints between virtual machines,finally the migration cost was minimized as an object function for the virtual machines migrated to further reduce the migration cost.Simulation experiments demonstrate that the proposed approach can reduce the impact on the performance of network services and the cost of virtual machines migration,and is more suitable for large-scale network scenarios under the premise of effective defense side-channel attacks.…”
Get full text
Article -
419869
Web docente: estructura y procedimientos básicos de gestión eficaz
Published 2007-01-01“…A partir de la experiencia en organización de actividades de formación para el profesorado universitario así como en la coordinación de proyectos de innovación pedagógica, se aborda el concepto de web docente como un instrumento especialmente eficaz para la integración de metodologías activas y colaborativas en el proceso de enseñanza/ aprendizaje en el ámbito universitario. …”
Get full text
Article -
419870
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01“…A secure OFDM transmission scheme based on two-stage chaos mapping was introduced, which were cha-oticphase rotation and sub-carrier chaos mapping. …”
Get full text
Article -
419871
Provably secure social network privacy-preserving scheme
Published 2016-08-01“…A provable secure social network privacy-preserving scheme was proposed to solve the problem of social network privacy-preserving scheme's security proof.Firstly,through analyzing the security requirements about the node's privacy (indistinguishable node structure and indistinguishable sending messages),the security model were established separately.Secondly,the bilinear mapping was used to construct the social network privacy-preserving scheme.Finally,it was proved that the scheme was provable secure,the security of the schemes were analyzed and compared.The analysis results show that the scheme not only has provable security,but also can resist re-identify attack,inference attack and information aggregation attack.…”
Get full text
Article -
419872
Local outlier factor algorithm based on correction of bidirectional neighbor
Published 2020-08-01“…A local outlier factor algorithm based on bidirectional neighbor correction was proposed to solve the problems of existing outlier detection algorithms such as difficulty in parameter selection,poor efficiency and low accuracy.The bidirectional neighbor searching algorithm was used to reduce the neighbor search time.Then the bidirectional neighbor pruning algorithm was used to reduce the number of parameters and unnecessary calculations.And the correction factor based on bidirectional neighbors was used to improve the calculation accuracy.Experimental results show that the proposed algorithm has better performance in parameter selection and time efficiency than other outlier detection methods.The correction factor improves the accuracy of the algorithm,in the synthetic data set and UCI data set.…”
Get full text
Article -
419873
Research on the privacy-preserving point-in-polygon protocol
Published 2016-04-01“…A privacy-preserving point-in-polygon protocol was proposed under semi-honest model, to deal with the prob-lem of high complexity and limitation of the existing protocols. …”
Get full text
Article -
419874
GÉNERO Y CONSUMO CULTURAL EN MUSEOS: ANÁLISIS Y PERSPECTIVAS
Published 2008-01-01“…A partir de los avances de mi investigación sobre género, aprendizajes, memoria social y museos en México, analizo algunos procesos de producción y consumo culturales en museos, identificando cómo por medio de una serie de conocimientos, significados y prácticas socioculturales, se ponen en juego elementos que influyen en la conformación de identidades, ideas, normas y roles de género que son apropiados y actualizados en mayor o menor medida por los públicos de los dos museos analizados.…”
Get full text
Article -
419875
Technique of analyzing device drivers of embedded linux system using UML
Published 2012-11-01“…A method to model and analyze the device drivers in embedded Linux system using UML was proposed.By using UML modeling method,the dependencies among the device driver components and the focus of the device driver development are clarified.On this basis,the SDWiFi device driver model was studied,the SDIO communication interface between the host and Wi-Fi chips was designed and the SDWiFi device driver was transplanted.At last,the SDWiFi wireless LAN equipment was configured and tested using wireless tools.The test results show that the SDWiFi wireless LAN equipment works properly.The efficiency of the device driver development is improved by modeling and analyzing the device drivers using UML.…”
Get full text
Article -
419876
Power analysis attack of dynamic password token based on SM3
Published 2017-03-01“…A novel method of the power analysis attack of dynamic password token based on SM3 was first proposed to choose the permutation function output as the power analysis attack target,and the simultaneous equations about the key were composed of the attack results.According to the given inverse permutation function,the key was derived by solving the simultaneous equations based on the inverse permutation function.Measured results are presented to validate the proposed method was effective.The proposed method solved the problems of permutation function keys for direct selection of target as an energy analysis attack target.And the proposed method can also be applied to the power analysis attack of the other cryptographic algorithms.…”
Get full text
Article -
419877
BP neural network based Doppler frequency offset estimation method for 5G high-speed mobile system
Published 2020-04-01“…A BP neural network based Doppler frequency offset estimation method was proposed.The proposed method was mainly divided into two stages:offline training and online estimation.Firstly,the training samples were constructed by using random Doppler frequency offset and received pilot signals,and then the training samples were used to train the BP neural network offline,which could complete the mapping relationship between input and output data.Then,based on the trained network,the received pilot signal was used to estimate the Doppler frequency offset online.Simulation results show that the performance of the proposed method is far superior to the existing method,and it has low computational complexity.…”
Get full text
Article -
419878
Energy efficient cooperative spectrum sensing algorithm in cognitive wireless sensor networks
Published 2015-03-01“…A novel energy-efficient scheme of cooperative spectrum sensing in cognitive wireless sensor networks is proposed.Firstly,in order to reduce energy consumption of distributed sensor nodes,and assumed that instantaneous SNR and average SNR for each node is available.The mathematical model of spectrum sensing nodes energy consumption and optimum detection threshold are analyzed. …”
Get full text
Article -
419879
Improved PSO algorithm based on swarm prematurely degree and nonlinear periodic oscillating strategy
Published 2014-02-01“…A novel particle swarm optimization algorithm was proposed, which was adaptive chaos particle swarm opti-mization algorithm based on swarm premature convergence degree and nonlinear periodic oscillating strategy. …”
Get full text
Article -
419880
Tag's ownership transfer protocol based on quadratic residue
Published 2018-03-01“…A proprietary transfer protocol with higher security and lower cost was proposed.In order to ensure the communication entity authentication premise,two remainder theorems for information transmission encryption were used in the proposed protocol; in the process of mutual recognition of communication entities,the addition of random numbers could make the protocol effectively resist such attacks as replay and desynchronization.After the transfer of ownership occurs,new communication entities would be located.The authentication key needed to be dynamical,so as to reduce the storage space of communication entities.The performance comparison between the proposed protocol and other protocols for safety show that the proposed protocol has the security required for the transfer of ownership and low cost.…”
Get full text
Article