-
501
Traffic characteristic based privacy leakage assessment scheme for Android device
Published 2020-02-01“…Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering method,which was applied in mobile device.The TF-IDF model calculated the business relevance between Apps and hosts via the behavior characteristics of the hosts in these Apps.For the business related hosts that fail to express the business relevance characteristics,those hosts were adjusted and optimized via the average connected hierarchical agglomerative clustering method.Finally,the harmful degree of privacy leakage was evaluated based on the ranking of all hosts in the App.The experimental results verify the effectiveness and efficiency of the scheme.…”
Get full text
Article -
502
RETROSPECTIVE ET ANALYSE DEMOGRAPHIQUE DE LA DYNAMIQUE URBAINE DU SYSTEME WILAYAL TEBESSI (1966–2008)
Published 2012-12-01“…The Tebessa strongly hierarchical system does not conform to Zipf’s law.…”
Get full text
Article -
503
Apply PSO into cloud storage task scheduling with QoS preference awareness
Published 2014-03-01“…The task scheduling algorithm in cloud storage area with QoS preference awareness was studied.Firstly,the differences between cloud storage and cloud computing were pointed,and exist matrix was used to avoid the creation of useless solutions.Secondly,QoS factors were summarized into three classes:time,cost and quality classes.Based on the three classes,the fitness function of the PSO was improved by using weighted factors to adjust the QoS preference.The simulation results release that PSO is not fit for the overall scheduling when the task distributions of different degrees are unevenness because the QoS demand of wide distribution tasks may cover the QoS demand of other tasks.So a hierarchical scheduling based on degree is necessary.The simulation results show that the improved hierarchical PSO scheduling algorithm can aware the QoS preference relevantly.…”
Get full text
Article -
504
Hierarchy analysis and modeling on the Internet AS-level topology
Published 2011-01-01“…Based on the in-depth analysis of he massive real AS-level topology data,the multi characteristics describing Internet AS-level topology’s hierarchy were abstracted,and a material way about network’s hierarchical partition were introduced,and the number of connected edged of adding new nodes and nonlinear probability were gived.Finally,a novel hierarchical dynamic evolution model named IAT-HDEM based on corenness and the k-core decomposition was proposed.The numerical simulations and analysis results showed that most of macroscopic statistics closed to real networks’,including power-law degree distribution and negative correlation clustering-degree distribution etc.…”
Get full text
Article -
505
Organizational culture and turnover intention among primary care providers: a multilevel study in four large cities in China
Published 2024-12-01“…Primary care providers working in a hierarchical culture reported higher turnover intention (43.18%) compared with those in other cultures (p < 0.05). …”
Get full text
Article -
506
Lifecycle Risk Assessment for Steel Cargo Vessel Sinkings: An Interpretive Structural Modeling and Fuzzy Bayesian Network Approach
Published 2025-01-01“…FBN assesses lifecycle risks using fuzzy scoring, modular nodes, and a hierarchical structure, with muti-source data drawn from accident reports, expert opinions, and research studies. …”
Get full text
Article -
507
Inter-domain routing security mechanism for crossing autonomous system alliance
Published 2014-10-01“…Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance hierarchical structure CAHS (cross-alliance hierarchical structure) was designed.Based on CAHS,using the idea of passport visa and the features of AdHASH (additive hash),a cross-alliance BGP security mechanism SCA-BGP (secure crossing alliance for BGP) was proposed.The mechanism has higher security,which is able to effectively validate the identities and behavior authorization of the cross-alliance AS as well as the message carried by them.The experiment results show that SCA-BGP can effectively reduce the certificate scale and extra time overhead to get better scalability and convergence performance.…”
Get full text
Article -
508
Identifying method for opinion leaders in social network based on competency model
Published 2014-11-01“…A competency model of opinion leaders in social networks is presented,which includes three capacity factors,some explicit and implicit behavioral indicators.These characteristics of information production,information dissemination and information influence which opinion leaders should have.Based on the proposed competency model,social network users into four categories which divided:the general public,the activists,the topic opinion leaders and network opinion leaders.Then a hierarchical filtering process is designed and a system framework of filtering experimental for identifying opinion leaders is introduced.It takes the data extracted from the Sina microblog as input,then integrates some social network analysis tools such as MALLET,and develops the programs for specific functions with Python.Eventually,the opinion leaders of microblog can be identified.The experiment results prove the effectiveness of present competency model for opinion leaders and the feasibility of hierarchical filtering process.…”
Get full text
Article -
509
L’évolution des rapports hiérarchiques entre directeurs et adjoints dans le champ de l’enseignement primaire de la Seine sous la IIIe République : aux origines d’une autonomie prof...
Published 2022-11-01“…In France, school directors are not the hierarchical superiors of their colleagues, all of whom have the status of school teacher. …”
Get full text
Article -
510
-
511
Student Mobility as a Form of Education Internationalization: A Systems Approach to Management
Published 2021-09-01“…This estimation is carried out by means of the analysis of the formed multi-level hierarchical structure. The convolution of hierarchical elements on each level of the hierarchical structure is done using a generalised f-mean, proposed by Kolmogorov – Nagumo. …”
Get full text
Article -
512
Investigating the intrinsic top-down dynamics of deep generative models
Published 2025-01-01“…Abstract Hierarchical generative models can produce data samples based on the statistical structure of their training distribution. …”
Get full text
Article -
513
Pilot decontamination based on spectrum separation in massive MIMO system
Published 2020-04-01“…In order to overcome uplink pilot contamination,the technical bottleneck of massive MIMO,and different from the existing parallel parameter design strategy for blind pilot decontamination,a hierarchical parameter design method was proposed,which points out that different system parameters have different effects on the exact spectrum separation of the sample covariance matrix of the received signal.In other words,different parameters have different priority.Next,it was found that to achieve spectral separation,the power of the desired signal didn’t have to be higher than the interference,and the difference between the two was more important.Furthermore,in a more practical scenario where the pilot sequence length was less than the number of base station receiving antennas,a numerical algorithm was given for the first time to achieve the above-mentioned exact spectral separation.Since the hierarchical parament design ensures the exact separation of the asymptotic spectrum,the results show that the proposed scheme is more suitable for practical applications than the existing blind pilot decontamination.…”
Get full text
Article -
514
Displacement and Force Control of a Quarter Car Using a Mixed Mode MR Mount
Published 2013-01-01“…At last, a fuzzy logic controller was devised to closely reproduce the effect of the hierarchical controller. The experiments were set up to facilitate the hardware-in-the-loop evaluation of the mount. …”
Get full text
Article -
515
Forms of global governence
Published 2014-12-01“…Three such forms of global governance are identified: hierarchical, market and network. In a hierarchy the governance is due to the asymmetry of power between the parties. …”
Get full text
Article -
516
Negotiated coexistence and environmental governance in protected nature areas of Peru
Published 2022-01-01“…A central element in multi-scalar and hierarchical environmental governance is the provisional legitimacy of institutional arrangements. …”
Get full text
Article -
517
Optimizing University Program Selection: A Comparative Study of Multi-Criteria Methods
Published 2025-01-01“…The results of implementing five MCDM methods are compared by evaluating each method using a hierarchical model, which is decomposed into a set of criteria. …”
Get full text
Article -
518
Application of Multilevel Models to Morphometric Data. Part 1. Linear Models and Hypothesis Testing
Published 2003-01-01“…Morphometric data usually have a hierarchical structure (i.e., cells are nested within patients), which should be taken into consideration in the analysis. …”
Get full text
Article -
519
Corporate Culture as a Tool for Improving University’s Competitiveness
Published 2018-12-01“…They revealed the framework of competing values and showed that over the past decade the share of bureaucratic/hierarchical type decreased due to an increase in the share of market and adhocracy types of culture that are typical for the leaders of world university rankings.…”
Get full text
Article -
520
The predictive effect of cultural orientations on Chinese gifted students’ growth mindsets
Published 2025-01-01“…Data analysis mainly leveraged Pearson correlation analysis and hierarchical multiple regression analysis to test the hypothesize role of gifted students’ cultural orientations in predicting their growth mindsets. …”
Get full text
Article