Showing 1,361 - 1,380 results of 124,197 for search '"Research"', query time: 0.18s Refine Results
  1. 1361
  2. 1362

    RESEARCH ON EXCAVATION RESISTANCE FUNCTION OF AUTOMATIC EXCAVATOR (MT) by CAI GanWei, WANG Fen, TIAN JunWei, QI Gang

    Published 2023-01-01
    “…The research on the excavation resistance function of excavator is the key step to realize automatic excavation. …”
    Get full text
    Article
  3. 1363
  4. 1364

    Creando Pensamus: scientific research is future’s driving force by Maurizio Carta

    Published 2018-06-01
    “…Living in a knowledge and innovation society, require the re-imagining of University, its research and its link to the territory, to train scholars and professionals capable of tangible actions in the new and increasingly dynamic scenario, in which traditional methods and instruments might be obsolete.…”
    Get full text
    Article
  5. 1365
  6. 1366

    Research on multi-granularity password analysis based on LLM by Meng HONG, Weidong QIU, Yangde WANG

    Published 2024-02-01
    “…Password-based authentication has been widely used as the primary authentication mechanism.However, occasional large-scale password leaks have highlighted the vulnerability of passwords to risks such as guessing or theft.In recent years, research on password analysis using natural language processing techniques has progressed, treating passwords as a special form of natural language.Nevertheless, limited studies have investigated the impact of password text segmentation granularity on the effectiveness of password analysis with large language models.A multi-granularity password-analyzing framework was proposed based on a large language model, which follows the pre-training paradigm and autonomously learns prior knowledge of password distribution from large unlabelled datasets.The framework comprised three modules: the synchronization network, backbone network, and tail network.The synchronization network module implemented char-level, template-level, and chunk-level password segmentation, extracting knowledge on character distribution, structure, word chunk composition, and other password features.The backbone network module constructed a generic password model to learn the rules governing password composition.The tail network module generated candidate passwords for guessing and analyzing target databases.Experimental evaluations were conducted on eight password databases including Tianya and Twitter, analyzing and summarizing the effectiveness of the proposed framework under different language environments and word segmentation granularities.The results indicate that in Chinese user scenarios, the performance of the password-analyzing framework based on char-level and chunk-level segmentation is comparable, and significantly superior to the framework based on template-level segmentation.In English user scenarios, the framework based on chunk-level segmentation demonstrates the best password-analyzing performance.…”
    Get full text
    Article
  7. 1367

    Research of location privacy protection in wireless sensor network by Ren-ji HUANG, Qing YE, Qian WU

    Published 2017-11-01
    “…For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.…”
    Get full text
    Article
  8. 1368

    RESEARCH ON UNDERWATER COMMUNICATION AND SIMULATED ASSESSMENT OF MAIN PARAMETERS by Phan Thanh Minh, Nguyễn Ngọc Bình

    Published 2018-07-01
    “…Underwater communication and its applications is a research field that has been developing rapidly, extending in many fields such as remote control in the offshore oil industry, calculating environmental pollution, transmitting voices between frogmen, drawing the ocean floor to find new resources, communication between underground devices, etc. …”
    Get full text
    Article
  9. 1369

    African Indigenous Research to Decolonisation of African Universities’ Curricula by Mogomme Masoga

    Published 2024-02-01
    Subjects: “…African indigenous research…”
    Get full text
    Article
  10. 1370
  11. 1371
  12. 1372
  13. 1373

    Research on Submarine Magnetic Field Simulation with Energized Coil by Feng GUAN, Zhaohua SHENG

    Published 2024-12-01
    “…It is necessary to conduct in-depth research on the distribution characteristics of the submarine magnetic field simulator with energized coil, so as to better guide its design. …”
    Get full text
    Article
  14. 1374
  15. 1375
  16. 1376
  17. 1377
  18. 1378

    Physical, digital, virtual, intangible. Research experiences in Museums by Massimiliano Lo Turco, Elisabetta Caterina Giovannini, Andrea Tomalini

    Published 2021-12-01
    “…Using consolidated taxonomies and redefining the digital tools to be innovatively applied to Cultural Assets, the essay describes some research experiences carried out over the last years. …”
    Get full text
    Article
  19. 1379
  20. 1380

    Research on Database Deployment Technology in Cloud Computing Environment by Yongshun Cai, Mingchuan Yang, Wei Si, Shaoyang Rao

    Published 2015-07-01
    “…Cloud computing virtualization technology has the characteristics of elastic scalability,automatic migration (high availability),automatic recovery (high stability).Because of the natural complexity of database systems,it makes a big challenge to deploy database systems in cloud computing virtualization environment.On the basis of research and analyzing models of deploying database systems in private cloud environment,the TPC-C benchmark test with database instances running in cloud computing virtual machines was applied.Compared with performance results of same test with database instances running in physical machines,the feasibility of deploying database systems in cloud computing virtualization environment was verified.…”
    Get full text
    Article