Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Management 6
- Purchasing 5
- Social conditions 5
- Philosophy 4
- Politics and government 4
- Business logistics 3
- Civilization 3
- History and criticism 3
- Information technology 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Marketing 3
- Methodology 3
- Nutrition 3
- Social life and customs 3
- Sociolinguistics 3
- Tourism 3
- Colonial influence 2
- Common law 2
- Diet Therapy 2
- Diet therapy 2
- Economic conditions 2
- Health 2
- Industrial procurement 2
- Internet in public administration 2
- Interpretation and construction 2
- Juvenile literature 2
-
11601
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01“…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
Get full text
Article -
11602
ESTABLISHMENT OF INTENSITY MODEL FOR LASER WELDING LINE AND PREDICTION OF FAILURE
Published 2019-01-01“…The comparison results indicate that the simulation with micro failure model not only gives the uniform strength evaluation, but also can predict the time and area for initial ductile. Micro failure model could reflect the mechanical behaviors of laser welding line under impact load.…”
Get full text
Article -
11603
The Management of Hysteroscopy Complications
Published 2015-08-01“…Gynaecological endoscopic procedures such as hysteroscopy and laparoscopy have a good safety profile, with advantages such as decreased hospital stay, reduced complications, reduced operative procedure time and improved recovery time. However like any surgical procedure hysteroscopy is not completely risk-free. …”
Get full text
Article -
11604
Thermodynamics of a Schwarzschild black hole surrounded by quintessence in the generalized uncertainty principle framework
Published 2025-01-01“…Finally, calculating the energy output as a function of time, we obtain the evaporation time of the black hole. …”
Get full text
Article -
11605
Intelligent Buses in a Loop Service: Emergence of No-Boarding and Holding Strategies
Published 2020-01-01“…A reward that encourages the buses to strive towards a staggered phase difference amongst them whilst picking up passengers allows the reinforcement learning process to converge to an optimal Q-table within a reasonable amount of simulation time. It is remarkable that this emergent behaviour of intelligent buses turns out to minimise the average waiting time of commuters, in various setups where buses move with the same speed or different speeds, during busy as well as lull periods. …”
Get full text
Article -
11606
Stationarity assessment of resting state condition via permutation entropy on EEG recordings
Published 2025-01-01“…In addition, provided that suitable hardware and software processing units are used, the implementation of the method can be translated into a real time one.…”
Get full text
Article -
11607
Study on Advanced Treatment of Coking Wastewater by Fenton Process Improved With Coagulation-Response Surface Method
Published 2021-01-01“…After biochemical treatment of coking wastewater,the organic matter is difficult to reduce further.In order to meet the emission requirements,the effluent shall be subjected to an advanced treatment to reduce its organic matter.This paper treats the coking wastewater by the combined coagulation-Fenton method.The results show that:When the influent COD is 250~400 mg/L,the optimal coagulation conditions are as follows:coagulant PFS dosage:800 mg/L;pH:8;CPAM dosage:0 mg/L;and stirring time:15 min.The optimal conditions of Fenton are as below:Fe<sup>2+</sup> dosage:302.38 mg/l;n(Fe<sup>2+</sup>)∶n(H<sub>2</sub>O<sub>2</sub>):1.00∶6.84;initial pH:3.84;reaction time:125.84 min.After the advanced treatment by coagulation-Fenton oxidation,the organic matter concentration decreases from 250~400 mg/L to 60 mg/L or below,and the effluent meets the Emission Standard of Pollutants for Coking Chemical Industry (GB 16171—2012).…”
Get full text
Article -
11608
Ultrasound-Assisted Extraction of Total Phenolic Compounds from Inula helenium
Published 2013-01-01“…Effects of ethanol concentration, ultrasonic time, solid-liquid ratio, and number of extractions were investigated. …”
Get full text
Article -
11609
Adaptive Active Noise Suppression Using Multiple Model Switching Strategy
Published 2017-01-01“…Active noise suppression for applications where the system response varies with time is a difficult problem. The computation burden for the existing control algorithms with online identification is heavy and easy to cause control system instability. …”
Get full text
Article -
11610
Low-latency neighbor discovery algorithm based on multi-beacon message in mobile low-duty-cycle sensor network
Published 2019-08-01“…Neighbor discovery enables nodes in the networks to discover each other through simple information interaction,which was suitable for the new mobile low duty cycle sensor network (MLDC-WSN).However,because the nodes in MLDC-WSN can move randomly and sleep,the network topology was changed frequently,which results in that some nodes need a lot of energy and time to find their neighbors.How to realize fast neighbor discovery for all nodes in the network was a difficult problem in current research.To solve this problem,a new low-latency neighbor discovery algorithm based on multi-beacon messages was proposed.In this algorithm,the nodes were discovered by sending a short beacon message through their neighbor nodes,and by adjusting the time and frequency of beacon message sent,a lower neighbor discovery delay was obtained.Eventually,through quantitative analysis and simulation experiments,it is found that compared with existing algorithms,this algorithm can find all neighbor nodes in MLDC-WSN with less energy consumption,lower latency and greater probability.…”
Get full text
Article -
11611
Identification of Fuzzy Information in English Interpretation Based on the Digital Elevation Model
Published 2021-01-01“…The improved cumulant algorithm is compared with the commonly used recursive cumulant algorithm and the nonrecursive cumulant algorithm, and the improved algorithm improves by about 17% compared with the nonrecursive algorithm at 106 cell level, and the computation time of the recursive algorithm is about 3 times of the improved algorithm. …”
Get full text
Article -
11612
Higher Education in Arab Countries: from Past to Present
Published 2014-04-01“…The article describes the problems of higher education in the Arab countries from the time of caliphate in the 7th century to present time. …”
Get full text
Article -
11613
Improve crop production through wsn: an approach of smart agriculture
Published 2021-06-01“…The goal is to build and create an agricultural monitoring system that uses a wireless sensor network to boost farming production and quality without having to manually monitor it all of the time. In agriculture, temperature, humidity, and carbon dioxide levels are the most critical elements affecting plant productivity, growth, and quality. …”
Get full text
Article -
11614
Microblog burst topic diffusion prediction algorithm based on the users and node scale
Published 2013-08-01“…Experiments show that the former can predict diffusion more accurately but with bad time complexity, and the latter node is more suitable for proc-essing large data sets.…”
Get full text
Article -
11615
MODEL PREDICTIVE CONTROL FOR PHOTOVOLTAIC STATION MAXIMUM POWER POINT TRACKING SYSTEM
Published 2016-01-01“…The system under consideration consists of a solar array with nonlinear time-varying characteristics, a step-up converter with appropriate filter.The proposed algorithm has the advantages of maximizing the efficiency of the power utilization, can be integrated to other MPPT algorithms without affecting the PVM performance, is excellent for Real-Time applications and is a robust analytical method, different from the traditional MPPT algorithms which are more based on trial and error, or comparisons between present and past states. …”
Get full text
Article -
11616
RESEARCH ON TECHNIQUES TO ENHANCE DDoS ATTACK PREVENTION USING CUMULATIVE SUM AND BACKPROPAGATION ALGORITHMS
Published 2024-12-01“…The CUSUM algorithm is used to monitor and analyze network traffic over time, identifying unusual fluctuations in traffic without requiring prior knowledge of attack types. …”
Get full text
Article -
11617
50 lat badań Instytutu Ekologii PAN nad populacjami gryzoni
Published 2004-12-01“…The aim of the studies varied in time, and was always preceded by detailed, and often new, considerations on methods to be applied. …”
Get full text
Article -
11618
Multi-access edge computing offloading in maritime monitoring sensor networks
Published 2021-03-01“…Multi-access edge computing can effectively guarantee the low-latency, high-reliability data transmission of ocean monitoring sensor networks and various related maritime applications.In the offshore scenario, two offloading models of multi-user single-hop unicast and multi-user multi-hop unicast were established in combination with the distribution of edge computing resources.The mixed integer nonlinear programming was used to separate optimization targets and effectively allocate transmission power.The unloading decisions were made by improving the traditional artificial fish swarms algorithm.The results show that the proposed optimization algorithm can reduce the network delay by nearly 19% compared with the traditional scheme.In the far-sea scenario, a multi-user single-hop unicast offloading model was established, and a reasonable channel allocation algorithm was proposed based on the network connection probability.The results show that when the network connection time is sufficient, the number of allowable sub-channels can be increased to reduce the network delay.When the network connection time is limited, the number of unloaded marine user equipment can be controlled to ensure the network transmission delay.…”
Get full text
Article -
11619
Algorithms for the Shortest Path Improvement Problems under Unit Hamming Distance
Published 2013-01-01“…Some strongly polynomial time algorithms are designed for the problems on some special arborescent networks. …”
Get full text
Article -
11620
Pemungutan Suara Ulang pada Pemihan Umum Tahun 2019 di Indonesia
Published 2020-01-01“…It seems that Indonesia has not yet found the right method in implementing procedural democracy to elect legislative and executive members directly. Every election from time to time still always leaves problems. The problem to be discussed and analyzed in this study is how the application of Law Number 7 of 2017 Article 372 concerning Voting (PSU) and analyze the social problems that arise in its implementation. …”
Get full text
Article