Showing 2,221 - 2,240 results of 3,272 for search '"grains"', query time: 0.06s Refine Results
  1. 2221

    Fast inter prediction algorithm applied in quality SVC by WANG Da-yong1, SHU Jian2

    Published 2011-01-01
    “…Based on the characteristics of quality scalable video coding,a fast inter encoding algorithm was proposed on the enhancement layer for the medium-grain quality scalability(MGS).Firstly,based on the base layer macroblock mode and rate-distortion,the order of the coding mode for the current macro block was proposed.Then based on the encode structure,the correlation between layers,and the spatial correlation,desicions for the Direct coding mode,layer mode,and adjacent mode were proposed,respectively.Finally,the macroblocks were encoded in the order predicted,with the proposed three decisions to improve on the coding speed by early termination.The experimental results show that the computational complexity of the algorithm is reduced by 68% on the average compared to that of the standard method,with only negligible coding loss and bit-rate increase.…”
    Get full text
    Article
  2. 2222

    Cleaning Dusty Air Flow with a Rotary Cyclone from Dispersed Particles by Oleksandr Kravchenko, Oleksiy Bazhynov, Ján Dižo, Yevhen Haiek, Miroslav Blatnický

    Published 2025-01-01
    “…The research presented in this article is aimed to show the prospective direction of increasing the efficiency of cleaning dusty air flows from light impurities and dust on mobile grain separators by using a rotary cyclone with a multi-disc after cleaner. …”
    Get full text
    Article
  3. 2223

    Identity-based puncturable signature scheme by Dongmei YANG, Yue CHEN, Jianghong WEI, Xuexian HU

    Published 2021-12-01
    “…To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the idea of puncturable public-key encryption scheme.Specifically, the syntax and security notion of IBPS were given, and then a concrete IBPS scheme was constructed based on Bloom filter.Under the computational Diffie-Hellman assumption, the proposed scheme achieved the existential unforgeability in the random oracle model.The performance analysis and implementation results demonstrate that, compared with traditional forward-secure IBS schemes, the proposed scheme provides more practical fine-grained forward secrecy, and has higher efficiency of secret key update.…”
    Get full text
    Article
  4. 2224

    Specification and enforcement of personalized privacy policy for social network by Yuan WANG, Yu-qing SUN, Le-le MA

    Published 2012-09-01
    “…An authorization model was proposed to support personalized privacy preferences in the first-logic privacy preference language.The language allowed users to express personalized privacy preferences.Visitor-role authorization rules based on the attributes of visitors and role-permission assignment rules based on the tags of objects were introduced,which resolve dynamic authorization and fine-grained rights assignment problems.Analyzed privacy policy conflict cases and realized policy consistency verification by Prolog logic programming.Designed a personalized privacy policy management and implementation middleware for social network.In the middleware,it integrated the management of personalized policy into access control system on the existing resources.The experiments show that the policy conflict analysis has good efficiency in the implementation.…”
    Get full text
    Article
  5. 2225

    Attribute-based fully homomorphic encryption scheme over rings by Yong-hui ZHENG, Yuan-ji KANG, Chun-xiang GU, Hui DONG

    Published 2017-04-01
    “…The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted its practical.To improve these drawbacks,a recoding scheme and a attribute-based encryption scheme based on learning with errors problem over rings were provided,then a attribute-based fully homomorphic encryption was constructed.The new scheme overcame the above mentioned drawbacks,because it did't need public key certificate,meanwhile,it can achieve the fine-grained access control to the ciphertext.Compared with similar results,proposed method decreases the size of keys and ciphertext greatly.…”
    Get full text
    Article
  6. 2226

    Research and implementation of reconfigurable SM4 cryptographic algorithm based on HRCA by Xiao ZHANG, Qinglei ZHOU, Bin LI

    Published 2020-10-01
    “…For the application scenarios that require high throughput and high security at the same time,based on HRCA,a high-performance scalable SM4 implementation scheme was proposed.Firstly,SM4 was formed to different calculation units of different granularity,and a general coarse-grained reconfigurable calculation unit was designed.Then,various mapping strategies were given for the purpose of satisfying different encryption modes,and the algorithm was mapped to the reconstructed computing unit according to different strategies.Finally,the SM4 overall architecture was optimized by dividing the control plane and the data plane.The experimental results show that using the proposed method,the SM4 algorithm has a significant improvement in throughput under lower resource consumption.…”
    Get full text
    Article
  7. 2227

    Privacy protection key distribution protocol for edge computing by Jian SHEN, Tianqi ZHOU, Chen WANG, Huijie YANG

    Published 2021-02-01
    “…Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifically, based on the GGM pseudo-random number generator, the key distribution protocol with a prefix-predicate is constructed, which can effectively support lightweight and efficient key distribution.Moreover, based on the multilinear pairing, the key distribution protocol with a bit fixing predicate is constructed.This protocol can support flexible and fine-grained strategy selection and is suitable for dynamic and flexible multi-device scenarios in heterogeneous networks.Finally, the security proof of the proposed protocols is presented.…”
    Get full text
    Article
  8. 2228

    Occupational Exposures and Chronic Airflow Limitation by Helen Dimich-Ward, Susan M Kennedy, Moira Chan-Yeung

    Published 1996-01-01
    “…Findings from studies of organic dusts, such as exposures to wood, cotton, grain or other agricultural dusts, or to mixed dust exposures, were less consistent but tended to show positive dose-response associations. …”
    Get full text
    Article
  9. 2229

    Des archives pour l’anthropologie : futurs possibles et passés contingents by David Zeitlyn

    Published 2019-03-01
    “…By reading along and across the archival grain, researchers can follow the development of ideas and processes across historical periods. …”
    Get full text
    Article
  10. 2230

    Grass Tetany in Cattle by Y.C. Newman, M.J. Hersom, W.E. Kunkle

    Published 2020-03-01
    “… This document is about grass tetany, sometimes called grass staggers or hypomagnesemia, that can be a serious problem in Florida with cattle grazing small grain or ryegrass pastures. The problem is usually confined to lactating cows. …”
    Get full text
    Article
  11. 2231

    Extended access control mechanism for cross-domain data exchange by Rongna XIE, Yunchuan GUO, Fenghua LI, Guozhen SHI, Yaqiong WANG, Kui GENG

    Published 2019-07-01
    “…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
    Get full text
    Article
  12. 2232

    Accelerated algorithm in attribute-based encryption over cloud environment by Guowei WU, Ning FAN, Laifu WANG, Shuai WANG, Jun SHEN, Huamin JIN

    Published 2019-11-01
    “…Cloud computing provides storage,computing and network services to tenants.Data security and data sharing and access control between tenants are indispensable functions.Attribute-based encryption (ABE) system is a one to many encryption system,which allows users to fine -grained access control on encrypted data according to users’ attributes.This encryption system is very suitable for multi-tenant data sharing overcloud computing environment.However,the existing attribute-based encryption schemes is inefficient,which cannot be applied to practical applications.Two types of ABE and their application scenarios were analyzed,and an acceleration algorithms scheme in attribute encryption cryptosystem was proposed.The experiment can illustrate that the proposed scheme can improve the efficiency of key generation algorithm,encryption algorithm and decryption algorithm.…”
    Get full text
    Article
  13. 2233

    Design and research of service customized networking architecture by Tao HUANG, Chen ZHANG, Yuming XIAO, Shui YU, Yunjie LIU

    Published 2024-02-01
    “…A new network architecture of SCN (service customized networking) was systematically expounded, which provided a novel network underlying capability and usage method for Internet applications.TCP/IP network architecture served the application with “best effort” quality of service, while SCN converted the subject-object relationship between the application and network that allowed the application to “on-demand customize” the QoS of networks.From the perspective of applications, three major connotations “declarable”, “fine-grained” and “end-to-end” were excavated to deduce the overall design of SCN, where a concrete SCN architecture and a feasible SCN system realization were present.In future, SCN can be applied in scenarios of man-machine-things, such as remote industrial control, and augment reality, to provide a novel and ideal means for NaaS (network as a service).…”
    Get full text
    Article
  14. 2234

    Privacy-perserving scheme for social networks by Zhi-quan LV, Cheng HONG, Min1 ZHANG, Deng-guo FENG, Kai-qu CHEN

    Published 2014-08-01
    “…PPSNS utilizes attribute-based encryption, allowing the SNS user to set up an enforcement of fine-grained access control upon the data he owns, thus the potential threats from unauthorized parties or even the SNS provider itself could be avoided. …”
    Get full text
    Article
  15. 2235

    Application of between- stand cooling in the production hot – rolled strips by U. Muhin, S. Belskij, E. Makarov, T. Koynov

    Published 2016-06-01
    “…Medium grain size has been uneven over the length of hot-rolled strips of austenite of low-carbon steel during rolling on continuous mill. …”
    Get full text
    Article
  16. 2236

    Klonet: a network emulation platform for the technology innovation by Jingzhao XIE, Wei SHAN, Chang XIAO, Tie MA, Li CHEN, Hongfang YU, Gang SUN

    Published 2021-10-01
    “…The innovations of key technologies enable and promote the future development of networks and the network industry.Therefore, there is an urgent need for a network experimental platform that can easily and quickly verify innovative network technologies, so asto effectively lower the innovation barriers and promote innovations.By analyzing the advantages of network emulation technology in network experiments and combining the demand of network technology innovation for network experiment platform, a network emulation experiment platform Klonet for network technology innovation was proposed.The platform can flexibly expand the scale of the network, emulate the network in all perspectives, manage the emulated network in a fine-grained manner, and thus ease the workflow of network experimentation.The experimental method on Klonet was described and the ability of Klonet to support network technology innovation was verified based on two specific use cases.…”
    Get full text
    Article
  17. 2237

    Law, institutions, and interpretation in Jacques Derrida by Juliana Neuenschwander Magalhães, José Antonio Rego Magalhães

    “…Abstract In this paper, we would like to advocate for a certain reading of Jacques Derrida’s thinking about law, against the grain of most of his reception in legal studies. …”
    Get full text
    Article
  18. 2238

    On a kinked crack model to describe the influence of material microstructure on fatigue crack growth by Andrea Spagnoli, Andrea Carpinteri, Sabrina Vantadori

    Published 2013-04-01
    “…By correlating the parameter d with a characteristic material length (e.g. average grain size in metals, maximum aggregate dimension in concrete), the possibility of using the present model to describe some experimental findings related to crack size effects in fatigue of materials is explored. …”
    Get full text
    Article
  19. 2239

    Est-il préférable d’apprendre les langues minoritaires à l’âge adulte ?L’exemple du breton by Grimault Gildas

    Published 2023-12-01
    “…Adult training is often put in the background, whether in terms of demands by organized civil society or in terms of educational policies. Going against the grain, the Welsh linguist Jon es asserted that “in the restoration of the language, the determining factor is and must be the adult-learning movement” (1993). …”
    Get full text
    Article
  20. 2240

    Grass Tetany in Cattle by Y.C. Newman, M.J. Hersom, W.E. Kunkle

    Published 2020-03-01
    “… This document is about grass tetany, sometimes called grass staggers or hypomagnesemia, that can be a serious problem in Florida with cattle grazing small grain or ryegrass pastures. The problem is usually confined to lactating cows. …”
    Get full text
    Article