Showing 321 - 340 results of 3,329 for search '"RESOLVE"', query time: 0.05s Refine Results
  1. 321

    Research on Situation Awareness Model of Information Content Security Incidents in Telecommunication Network by Lin Ge, Xinsheng Ji, Tao Jiang

    Published 2014-02-01
    “…Aiming at the main features of the information content security incidents and telecommunication network themselves,a design of situation awareness model was presented.The model using distributed character data collection and hierarchical progressive integration,the status of security situation of the whole telecommunication network was analyzed.According to the structure of model,hierarchical information fusion proximate calculation based on evidence theory was used to resolve the problem of how to use the initial information to determine the probability in high level information fusion.The simulation results show that the model can compute fast in real time in high accuracy,and it can perceive and determine the incidents effectively.…”
    Get full text
    Article
  2. 322

    Pleural empyema by Crisanto Abad Celuria, José Antonio Santana Santana, Abel Santana González-Chávez, Narciso Hernández Rodríguez, Leonardo Rodríguez Tapanes, Daniel Gutiérrez Hidalgo-Gato

    Published 2005-12-01
    “…Majority of parapneumonics discharges resolve without complications and with little clinical meaning, but some of they becomes empiema. …”
    Get full text
    Article
  3. 323

    Managing Conflict in the Workplace by Derek Farnsworth, Jennifer Clark, Julie Gatlin, Allen F. Wysocki, Karl W. Kepner

    Published 2019-07-01
    “…The goal is to help managers and associates resolve conflicts efficiently by understanding and applying appropriate conflict resolution styles and strategies. …”
    Get full text
    Article
  4. 324

    Aerobic Exercise and Human Visual Cortex Neuroplasticity: A Narrative Review by Dania Abuleil, Benjamin Thompson, Kristine Dalton

    Published 2022-01-01
    “…Because the prospect of exercise increasing human visual cortex neuroplasticity has important implications for vision rehabilitation, additional research is required to resolve this discrepancy in the literature.…”
    Get full text
    Article
  5. 325

    An ownership transfer protocol for wearable devices by Shun HU, Jian WENG, Jia-nan LIU

    Published 2015-12-01
    “…Recently,wearable devices acted as a kind of smart devices are changing people’s life style.When these devices are used in multi-user setting,ownership transfer should usually be considered.To resolve the security and privacy problems introduced in the ownership transfer process of wearable devices,a secure ownership transfer pro-tocol including initialization,mutual authentication and key change for wearable devices was introduced.The secu-rity analysis indicates that the proposed protocol can resist either normal channel attacks or special attacks appeared in the ownership transfer scenarios.The experiment results indicate that the proposed scheme is fairy efficient and is quite suitable for wearable devices.…”
    Get full text
    Article
  6. 326

    Delayed manifestation of Isolated Intramural Hematoma of the duodenum resulting from Blunt abdominal Trauma by Tae Sun Ha, Jun Chul Chung

    Published 2020-03-01
    “…According to recent reports, intramural hematomas typically resolve spontaneously with conservative treatment. …”
    Get full text
    Article
  7. 327

    Multi-keyword partial matching algorithm based on text fragments by LIAO Wei-qi, ZOU Wei

    Published 2010-01-01
    “…Network content detection based on Key words in security gateway often need to reassemble the TCP packets and even the whole file, which will cause a long delay. In order to resolve the problem, a new concept of pattern par-tial-matching based on text fragments was presented. …”
    Get full text
    Article
  8. 328

    Prospects for Cooperation of Russian and French Multinational Energy Companies on the Basis of National Energy Strategies by M. S. Ovakimyan

    Published 2012-08-01
    “…The article analyses possible areas of mutually advantageous cooperation of Russian and French multinational energy companies enabling Russia to upgrade its fuel-energy complex and attract adequate investments for large-scale projects realization and France can benefit by participating in new gas mains construction for diversifying its energy supplies and by acquiring shares of Russian multinational energy companies in order to resolve national energy security problem and strengthen its position in the international energy market.…”
    Get full text
    Article
  9. 329

    Research on Collaborative Recommendation Method Based on Multiple Data Sources of Social Network by Ruiqin Wang, Jun Pan, Yixiao Li

    Published 2015-06-01
    “…First of a11,both the rating similarity and the social trust between users were considered to resolve the data sparsity problem. Then a simple and effective trust reasoning method was proposed to identify the implicit trust relationship between users. …”
    Get full text
    Article
  10. 330

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article
  11. 331

    Provable security EPC information service communication scheme for EPC network by Jing-feng LI, Heng PAN, Wei-feng GUO

    Published 2013-08-01
    “…To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. …”
    Get full text
    Article
  12. 332

    Research on ordered Boolean expression matching with window by CAO Jing1, LIU Yan-bing1, LIU Ping1, TAN Jian-long1, GUO Li1

    Published 2007-01-01
    “…In view of the difficulty of the complex rule matching problem,Boolean expression matching and a algorithm framework were proposed to solve it.Two popular methods above this framework were given.In addition,two parame-ters-ORDER and WINDOW-were added into Boolean expression matching in order to enhance the power of the expres-sion rule.Then BitCount<sub>O</sub>WBE algorithm was proposed under these two parameters.Test results indicated that Bit-Count-OWBE could resolve the complex rules matching problem on the scale of 10 000 with no performance decline in most cases.…”
    Get full text
    Article
  13. 333

    Reconfigurable buffer mechanism in switch fabric design by Hui-qun HUANG, Qin-rang LIU, You-jun BU, Feng-yu ZHANG

    Published 2012-10-01
    “…Current research focused on the theoretic buffer size of routers.The reconfigurable buffer tried to improve the buffer utilization rate to optimize the system performance based on the on-demand design of the reconfigurable system.In fact,for current switching fabrics with fixed buffers,cell loss under burst traffics still could not be resolved at some ports despite abundant buffers were free.The reconfiguration mechanism was introduced into buffers,which broke the private occupancy of buffers by single ports and reconfigured buffers due to the real-time requirements of per port.Analysis and simulation results show that the reconfiguration mechanism could resolve the problem of resource consumption effectively,and improve the ultilization of buffers as well as save buffers with the same anti-burst performance.…”
    Get full text
    Article
  14. 334

    Malware prediction technique based on program gene by Da XIAO, Bohan LIU, Baojiang CUI, Xiaochen WANG, Suoxing ZHANG

    Published 2018-08-01
    “…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
    Get full text
    Article
  15. 335
  16. 336

    A Collision-Free Path-Planning Method for an Articulated Mobile Robot by P. Quintero-Alvarez, G. Ramirez, S. Zeghloul

    Published 2007-01-01
    “…Each module uses a different approach to resolve the blocking situation. In order to show the capabilities of our method to lead the articulated robot to the final position in a stable way, a numerical result is presented.…”
    Get full text
    Article
  17. 337

    SYN flood attack defense strategy for asymmetric routing by Jian-xi TAO, Li ZHOU, Zhou ZHOU, Wei YANG, Qing-yun LIU, Rong YANG

    Published 2013-08-01
    “…In order to resolve the problem that existing network security facilities can't defend against large-scale SYN flood attack under asymmetric routing environment, attack detection technology and connection management strategy were researched, and a defense architecture combining a light-weight detection method with a hierarchical connection management strategy was presented. …”
    Get full text
    Article
  18. 338

    Aggregation algorithm for MPLS multicast flows based on bidirectional shared tree by LI Ling-zhi1, ZHU Yan-qin1, YANG Zhe1

    Published 2010-01-01
    “…An aggregation algorithm for multicast flow based on bidirectional shared tree was proposed in order to resolve the problem. The aggregated degrees of multicast flows were computed according to the relation among nodes. …”
    Get full text
    Article
  19. 339

    Source-controlled OpenFlow data plane by Zhe WANG, Man-gui LIANG, Xiao-meng JI, MateusAbisai Fillipus

    Published 2015-03-01
    “…Therefore it brought problems with scale, high cost and energy consumption. To resolve these issues, a novel model called the source-controlled Open-Flow(SCOF)was proposed. …”
    Get full text
    Article
  20. 340

    BEAUTIFUL JUSTICE AND JUST BEAUTY? EXPLORING JUSTICE AND BEAUTY FROM THE PERSPECTIVE OF THE WRONGED by M. Louw

    Published 2020-11-01
    “…It is hoped that this article will finally, and by way of conclusion, resolve some of this tension between justice and beauty, by examining three specific ways in which Wolterstorff has attempted to link these two themes. …”
    Get full text
    Article