Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
20401
DroidBet:event-driven automatic detection of network behaviors for Android applications
Published 2017-05-01“…The most Android applications connect to Internet to communicate with the outside world.Applications’ network-related activities were reflected and described with network traffic.By analyzing and modeling network traffic of Android applications,network behaviors of Android applications could be subsequently characterized.Therefore,DroidBet:an event-driven network behavior automatic detection system was presented,to test and evaluate Android applications automatically.Firstly,a scenario simulation event library was built to simulate the events that applications may be executed in the process,so as to trigger the network behavior of the application as much as possible.Then,the test sequence based on the state transition analysis method was automatically generated,and the network behavior was dynamically collected during the application testing process.Finally,the machine learning method was used to learn and train the collected network behavior,and the network behavior model based on BP neural network was generated to detect the behavior of the unknown Android application.The experimental results show that DroidBet can effectively trigger and extract the network behavior of the application,which has the advantages of high accuracy and low resource cost.…”
Get full text
Article -
20402
W-Band GaAs pHEMT Power Amplifier MMIC Stabilized Using Network Determinant Function
Published 2025-01-01Get full text
Article -
20403
Big Data Oriented Novel Background Subtraction Algorithm for Urban Surveillance Systems
Published 2018-06-01Get full text
Article -
20404
Survey on data heterogeneity problems and personalization based solutions of federated learning in Internet of vehicles
Published 2024-10-01“…Finally, the challenges encountered by PFL in IoV were outlined, along with the future research prospection related to advanced technologies on wireless communications.…”
Get full text
Article -
20405
High Sensitivity Refractive Index Sensor by D-Shaped Fibers and Titanium Dioxide Nanofilm
Published 2018-01-01Get full text
Article -
20406
A High Selectivity, Miniaturized, Low Profile Dual-Band Bandpass FSS with a Controllable Transmission Zero
Published 2017-01-01Get full text
Article -
20407
A Review of House Detection from High Resolution Satellite Images
Published 2024-12-01Get full text
Article -
20408
A Novel Approach for Risk Assessment of Building Damage via Metro Tunnel Construction
Published 2022-01-01Get full text
Article -
20409
Quantum and thermal noise in coupled non-Hermitian waveguide systems with different models of gain and loss
Published 2025-01-01Get full text
Article -
20410
-
20411
Action Recognition for Support of Adaptive Gameplay: A Case Study of a First Person Shooter
Published 2010-01-01Get full text
Article -
20412
Bus cache-based location privacy protection scheme in the Internet of vehicles
Published 2021-07-01“…To solve the problem of real location leakage when vehicles use location-based service (LBS) on the Internet of vehicles, a location privacy protection scheme based on bus cache was proposed.Firstly, a point of interest (POI) pool was obtained from the LBS provider based on its route information.Then the data in the POI pool was selected form a POI list while driving.Finally, the POI list was broadcast to surrounding private vehicles.After the private vehicle received the broadcast data, it verified the identity of the bus and then stored the POI list in the vehicle’s local cache.When a private vehicle needed to query POI information, it would first retrieve it in the local cache, and if the cache was missed, it would send a query request to the LBS provider using the k-anonymity method.The simulation experiment results show that the proposed scheme can reduce the possibility of leakage of the real location of the private vehicle by reducing the number of communications between the private vehicle and the LBSP, thereby effectively improving the privacy protection level of the private vehicle.…”
Get full text
Article -
20413
-
20414
-
20415
Unified brand strategy and operation quality of business group: evidence from stock price crash risk
Published 2025-02-01Get full text
Article -
20416
-
20417
<i>WebTrackingScore:</i> A Combined Web Tracking Risk Score System for Websites
Published 2024-12-01Get full text
Article -
20418
Research on end hopping and spreading for active cyber defense
Published 2019-05-01“…Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.…”
Get full text
Article -
20419
Highway Travel Time Prediction of Segments Based on ANPR Data considering Traffic Diversion
Published 2021-01-01Get full text
Article -
20420