-
2301
Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means
Published 2021-02-01“…To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means was proposed.Firstly, according to the topological relationship of geographic space, relative entropy was used to calculate the sensitivity of real location to privacy budget, a real-time calculation method of location sensitive privacy level was designed, and a new privacy model was built in combination with differential privacy budget.Secondly, K-means algorithm was used to cluster the release position to obtain the release position set that was most similar to the real position direction, and Fréchet distance was introduced to measure the similarity between the release track and the real track, so as to improve the availability of the release track.Experiments on real data sets show that the proposed trajectory protection mechanism has obvious advantages in trajectory availability compared with others.…”
Get full text
Article -
2302
Scaling Law for Intrinsic Fracture Energy of Diverse Stretchable Networks
Published 2025-01-01“…Simulations and experiments demonstrate its remarkable applicability to a breadth of strand constitutive behaviors, topologies, dimensionalities, and length scales. We show that local strand rupture and nonlocal energy release contribute synergistically to the measured intrinsic fracture energy in networks. …”
Get full text
Article -
2303
“I Know How that Sounds and I Do Not Mean that as an, but I Mean Christ”: The Disturbance in the Symbolic Order in Dennis Kelly’s Theatre
Published 2014-12-01“…Using Lacanian concepts and topological tools to read Dennis Kelly’s works will allow us to question how and why the Imaginary takes over and proliferates, as if to approach the Real as closely as possible, without naming. …”
Get full text
Article -
2304
SensoTrust: Trustworthy Domains in Wireless Sensor Networks
Published 2015-07-01“…The objective of deploying a trustworthy domain is achieving a nonspecific security mechanism that can be used in a plethora of network topologies and with heterogeneous application requirements. …”
Get full text
Article -
2305
Research of Conceptual Design and Kinematic Characteristic of a 3-PRS Parallel Kinematic Machine
Published 2019-01-01“…A conceptual design of a parallel kinematic machine( PKM) whose topological arrangement is a 3-PRS parallel mechanism is proposed. …”
Get full text
Article -
2306
Bifurcation Analysis of a Discrete-Time Two-Species Model
Published 2020-01-01“…We study the local dynamics along their topological types by imposing method of Linearization. …”
Get full text
Article -
2307
Compact and extremally disconnected spaces
Published 2004-01-01“…Viglino defined a Hausdorff topological space to be C-compact if each closed subset of the space is an H-set in the sense of Veličko. …”
Get full text
Article -
2308
Multiscale network alignment model based on convolution of homogeneous multilayer graphs
Published 2024-12-01“…In addition, relying solely on network topologies can be challenged by insufficient data. In order to solve the above problems, a cross-network user alignment model based on the node neighborhood characteristics and network homogeneity was proposed. …”
Get full text
Article -
2309
VDB Entropy Measures and Irregularity-Based Indices for the Rectangular Kekulene System
Published 2021-01-01“…The study of PAHs has been steadily increasing because of their wide-ranging applications in several fields, like steel manufacturing, shale oil extraction, coal gasification, production of coke, tar distillation, and nanosciences. Topological indices (TIs) are numerical quantities that give a mathematical expression for the chemical structures. …”
Get full text
Article -
2310
Early Warning Model of Sports Injury Based on RBF Neural Network Algorithm
Published 2021-01-01“…This paper analyzes the source of sports risk and the main injury factors, designs the sports injury estimation model based on big data analysis, establishes a new assessment model based on RBF neural network, and builds the big data network environment required for the model operation by improving the topological structure, combining big data and deep neural network. …”
Get full text
Article -
2311
Recurrences Reveal Shared Causal Drivers of Complex Time Series
Published 2025-01-01“…Combining the theory of skew-product dynamical systems with topological data analysis, we show that simultaneous recurrence events across multiple time series reveal the structure of their shared unobserved driving signal. …”
Get full text
Article -
2312
On Curvilinear Regression Analysis via Newly Proposed Entropies for Some Benzene Models
Published 2022-01-01“…To avoid exorbitant and extensive laboratory experiments, QSPR analysis, based on topological descriptors, is a very constructive statistical approach for analyzing the numerous physical and chemical properties of compounds. …”
Get full text
Article -
2313
OPTIMIZATION OF CONFIGURATION OF INDUSTRIAL ETHERNET NETWORKS DURING DESIGN OF THE AUTOMATED PRODUCTION MANAGEMENT SYSTEM
Published 2018-04-01“…The results of using the method are: reduction of the number of errors at the working project creation stage; design process structuring; clear requirements formalization; saving man hours of qualified employees in drawing up topologies, specifications and other project documents; reduction of the system cost.…”
Get full text
Article -
2314
Measurement configuration for integrated electric–gas systems via observability analysis considering gas flow dynamics
Published 2024-12-01“…This method incorporates the complex topological structure of the gas network and the dynamic process of gas flow into the IEGS observability analysis. …”
Get full text
Article -
2315
Recurrent Patterns of User Behavior in Different Electoral Campaigns: A Twitter Analysis of the Spanish General Elections of 2015 and 2016
Published 2018-01-01“…Furthermore, we have verified that the topologies of the networks of mentions and retweets do not change from one election to the other, indicating that their underlying dynamics are robust in the face of a change in social context. …”
Get full text
Article -
2316
Design and Implementation of Single-Layer 4 × 4 and 8 × 8 Butler Matrices for Multibeam Antenna Arrays
Published 2019-01-01“…Easy-to-fabricate microstrip layout topologies are designed and constructed; the final arrangement of the BMs allows realization without any crossovers. …”
Get full text
Article -
2317
Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
Published 2024-06-01“…Firstly, the graph structure of the traffic data was modeled to capture the topological relationship and interaction mode in communication behavior. …”
Get full text
Article -
2318
Prospects for constraining light-quark electroweak couplings at Higgs factories
Published 2024-01-01“…Future e+e− colliders running at the Z-pole and around the ZH threshold would be an excellent tool to perform such a measurement, unlike the LHC where hadronic Z decays are only available in boosted topologies. The measurement is based on comparison of radiative and non-radiative hadronic decays. …”
Get full text
Article -
2319
A Quantitative Structure-Activity Relationship and Molecular Modeling Study on a Series of Heteroaryl- and Heterocyclyl-Substituted Imidazo[1,2-a]Pyridine Derivatives Acting as Aci...
Published 2013-01-01“…The QSAR study shows a significant correlation of activity with Global Topological Charge Indices (GTCI) of the compounds and the hydrophobic constant of some substituents, indicating that the charge transfer within the molecule and the hydrophobic property of some substituents will be the controlling factor of the activity of these compounds and that there can be dispersion interaction between the molecules and the receptor, where some substituents may have hydrophobic interaction, too. …”
Get full text
Article -
2320
A collaborative routing protocol for video streaming with fog computing in vehicular ad hoc networks
Published 2019-03-01“…Recent improvements in the routing protocols and topologies used in vehicular networks have contributed to improvements in scalability, reliability, and the quality of the information-sharing experience. …”
Get full text
Article