Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36241
TRANSFORMATION OF PUBLIC PROCUREMENT OF INDUSTRIAL PRODUCTS TAKING INTO ACCOUNT THE ENVIRONMENTAL FACTOR
Published 2020-09-01“…Actual problems of industry and environmental aspects of their manifestation have been designated. To reduce the negative impact of industry on the environment, the authors suggest using public procurement tools. …”
Get full text
Article -
36242
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01“…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
Get full text
Article -
36243
Research of Comprehensive Parameter Measure Method of RV Reducer
Published 2018-01-01“…By analyzing the principle of RV reducer measurement,the measurement method of comprehensive parameters of RV reducer is studied,and the measurement and data processing method of each parameters are designed,which can accomplish automated measurement of comprehensive parameters in different RV reducer model. …”
Get full text
Article -
36244
PM2.5 concentration prediction model based on random forest regression analysis
Published 2017-07-01“…The random foreat regression algorithm was introduced to solve the shortcomings of neural network in predicting the PM2.5 concentration,such as over-fitting,complex network structure,low learning efficiency.A novel PM2.5 concentration prediction model named RFRP was designed by analyzing the 22 characteristic factors including the meteorological conditions,the concentration of air pollutants and the season.The historical meteorological data of Xi’an in 2013—2016 were collected to verify the effectiveness of the model.The experimental results show that the proposed model can not only predict the PM2.5 concentration effectively,but also improve the operating efficiency of the model without affecting the prediction accuracy.The average run time of the proposed model is 0.281 s,which is about 5.58% of the neural network prediction model.…”
Get full text
Article -
36245
Architecture and practice of BGP internet routing visibility and security detection
Published 2021-12-01“…Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol of today’s global internet for exchanging routing information.However, it was supposed that all participants were reliable without generating routing security issues by mistakes or on purpose when BGP was designed 50 years ago.As Internet is getting involved in all aspects of our society, internet routing security is becoming the problems that couldn’t be ignored anymore.A general architecture was proposed which coved inference of BGP routing knowledge database and provided visibility of global internet routing.Detection of route security events such as routing hijacks and routing leaks were realized.The deployment shows that the system can provide good visibility of internet routing and precise detection of routing security events.…”
Get full text
Article -
36246
Analysis of the throughput in full-duplex WLAN
Published 2016-06-01“…WLAN is one of the important ways of accessing mobile internet.However,the performance of WLAN declines rapidly as the number of users increases.Improving the performance of WLAN with high density deployment is an important research direction of WLAN technology.Distributed coordination function(DCF)which was the basic media access method of IEEE 802.11 in infrastructure-based networks was modeled and the bottleneck of downlink throughput was pointed out.Taking advantage of full-duplex technology where there was a breakthrough in recent years,a new MAC protocol was designed and analyzed.By providing the AP full-duplex transmitting ability and simple modifications to traditional DCF protocol,the new protocol made the downlink throughput breaking through the bottleneck in infrastructure-based WLAN and increased the total throughput by more than 60%.…”
Get full text
Article -
36247
Handbook of Florida Water Regulation: Consumptive Use
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36248
Apprendere (con) l’intelligenza artificiale. Un approccio media-archeologico
Published 2025-01-01“…Particular attention is given to the relationship between simulation and intelligence, highlighting how designing meaningful learning experiences requires a deep understanding of the underlying cultural frameworks. …”
Get full text
Article -
36249
Restorative Justice and Anti-LGBT Hate Crimes: Experiences and Disparities from the Ground
Published 2024-06-01“…We argue that restorative justice processes can be productively designed and adapted, but the existing practices and expectations of our research participants do not always conform to restorative paradigms that achieve these goals, which points to the need for a shift in justice culture and training to implement restorative practices.…”
Get full text
Article -
36250
About the ‘Cape’. Considerations on Geometries of the Maurizio Sacripanti’s Osaka Pavilion Roof
Published 2018-06-01“…The object of the experimentation is the covering of the pavilion designed by Maurizio Sacripanti for the Universal Exposition of Osaka in 1970. …”
Get full text
Article -
36251
Research on secret key generation based on wireless channel characteristics in body area network
Published 2021-12-01“…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
Get full text
Article -
36252
4-H Horse and Pony Lease
Published 2018-04-01“…This lease form was designed to cover the basic agreement between a 4-H member and a horse owner. …”
Get full text
Article -
36253
Autour d’un « tapis du Guergour » présenté à l’exposition universelle de Paris de 1889
Published 2021-09-01“…This article uses some bibliographical elements, a family memory, and the analysis of some carpet designs to complete the history of Guergour carpets. …”
Get full text
Article -
36254
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01“…To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID-MPDP were given.Then, the specific ID-MPDP scheme was designed by using RSA.Finally, the performance analysis and security analysis of ID-MPDP were given.Through performance analysis and security analysis, ID-MPDP was provably secure, efficient and convertible.It has the following advantages, such as it can be used for the integrity checking for multi-source IoT terminal data, it has lower block expansion rate, it eliminates the certification management cost by using the identity-based public key cryptography and it is convertible.…”
Get full text
Article -
36255
Estimation scheme for parameters of wireless channel model in OFDM communication systems
Published 2007-01-01“…The conventional channel estimator in OFDM system was designed to cope with the worst-case channel condi-tion,thus performance degradation can be induced due to the imperfect channel estimation.Though wiener filter based on the minimum mean-squared error(MMSE) is the optimal linear estimator,it requires the prior information of transmis-sion channel.In order to select the near optimal prestored channel interpolation filter coefficients,three channel parame-ters detecting methods including maximum multipath delay,Doppler frequency and SNR based on the time and fre-quency correlation functions of the channel,the Euclidean distance of hard-decision in pilots position respectively,were proposed.The method proposed with low complexity allows an efficient implementation for adaptive channel estimation algorithm as well as multi-user OFDM systems.…”
Get full text
Article -
36256
Tenant-Oriented Customized VM Networking Technology
Published 2015-10-01“…A tenant-oriented customized virtual machine networking system was designed and implemented based on OpenStack.By utilizing metadata definition and template based collaboration,the system implemented automated deployment and control of cloud infrastructures.Features such as unified graphical and draggable tenant interfaces,customized virtual machine networking orchestration,dynamic and batch resource configuration,quality of service control on network interfaces,and a connectivity based optimized mapping algorithm were included.The system provided users ability to configure networks,so that users can manage to conduct virtual machine networking swiftly and without knowledge of underlying technical details.It contributed to reduction of overall virtual networking latency,high efficiency matching of resources and increase in resource utilization.…”
Get full text
Article -
36257
Efficient and privacy-preserving profile matching protocols in opportunistic networks
Published 2015-12-01“…In opportunistic networks,users can take the advantage of parallel opportunistic contacts with other mobile users and find the appropriate helpers to forward the messages or share the contents.Most of the existing profile-matching protocols were designed on the basis of homomorphic cryptosystem and were not quite efficient in encryption and decryption.Three efficient and privacy-preserving profile matching protocols were proposed to deal with different privacy requirements in opportunistic networks,which do not use any homomorphic encryption.The proposed protocols were proved to be privacy-preserving and correct.The performances of the protocols are thoroughly analyzed and evaluated via real smartphone experiments,and the results show that the proposed protocols can decrease encryption and decryption time by at least an order of magnitude than the Paillier cryptosystem based protocol.…”
Get full text
Article -
36258
Research of Sliding Mode Variable Structure Control for a New Robot Wrist Structure
Published 2017-01-01“…Aiming at the controlled model of a designed new type of multi- joint robot wrist structure which can be built in ADAMS and used in the MATLAB,the co- simulation with ADAMS and MATLAB is carried out. …”
Get full text
Article -
36259
Security mechanism in access control based on non-cooperative game
Published 2014-11-01“…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
Get full text
Article -
36260
Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA
Published 2010-01-01“…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
Get full text
Article