Showing 941 - 960 results of 1,895 for search '"hierarchical"', query time: 0.05s Refine Results
  1. 941

    ALIGNING PRAXIS OF FAITH AND THEOLOGICAL THEORY IN THEOLOGICAL EDUCATION THROUGH AN EVALUATION OF CHRISTIANITY IN SOUTH AFRICA by E. Oliver

    Published 2021-06-01
    “…Christianity is also in need of a revolution back to its origin of an un-institutionalised, non-hierarchical, living faith that is changing the lives of people both in the present and eternally. …”
    Get full text
    Article
  2. 942

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  3. 943

    A Novel Image Encryption Scheme Based on PWLCM and Standard Map by Yucheng Chen, Chunming Tang, Zongxiang Yi

    Published 2020-01-01
    “…Unlike the traditional scrambling way, a hierarchical diffusion strategy, which not only changes the pixel position but also modifies the value, is employed in the permutation phase. …”
    Get full text
    Article
  4. 944

    Study on Thermally Induced Crack Propagation Behavior of Functionally Graded Materials Using a Modified Peridynamic Model by Fei Wang, Yu’e Ma, Yanning Guo, Wei Huang

    Published 2020-01-01
    “…It can be found that the thermal cracks in FGMs are still in periodical and hierarchical forms. The metal materials in FGMs can prevent crack initiation and arrest the long cracks. …”
    Get full text
    Article
  5. 945

    Buridan’s Sophisms, Alethic Predicates and Anaphoric Prosententialism by A. V. Nekhaev

    Published 2022-09-01
    “…Unlike Russell-Tarski hierarchical approach, it pays tribute to the intuitive claim of the semantic universality of natural languages (their ability to express own semantics).…”
    Get full text
    Article
  6. 946

    Psychophysiological Markers of Executive Functions during Copying Sentences by D.A. Momotenko, J.A. Gorbunov

    Published 2024-12-01
    “… <p>Typing is a multi-level process involving executive and motor functions. Due to its hierarchical organization, it becomes possible to study the psychophysiological features of higher mental functions in the natural environment by analyzing automated motor activity. …”
    Get full text
    Article
  7. 947

    Beyond clay: tracing Mekelle’s pottery tradition through ethnoarchaeological and sociocultural lenses by Kibrom Gebremariam

    Published 2024-12-01
    “…In this paper, social dynamics within Mekelle’s pottery making community, including hierarchical rankings and gender-based division of labor, are explored, showing that women exclusively handle the making, transportation, and marketing of pottery, while men engage in smithing and weaving. …”
    Get full text
    Article
  8. 948

    Pose Estimation of Uncooperative Unknown Space Objects from a Single Image by Xiaoyuan Ren, Libing Jiang, Zhuang Wang

    Published 2020-01-01
    “…Our method estimates not only the pose but also the shape of the unknown object from a single image. In this paper, a hierarchical shape model is proposed to represent the prior structure information of typical space objects. …”
    Get full text
    Article
  9. 949

    A Scalable Blockchain Framework for ELA Assessment by Chunxia Tian

    Published 2022-01-01
    “…We propose a proficiency evaluation model based on a Discrete Hopfield Neural Network (DHNN). Firstly, the hierarchical analysis method is used to construct the evaluation index system of students’ English ability, and then the ability classification indexes are divided into 5 levels.The network achieves the classification of students’ English proficiency through the associative memory of the classification criteria, and the classification results are compared with those of the BPNN model. …”
    Get full text
    Article
  10. 950

    Tricalcium phosphate-based capillary suspensions as inks for 3D printing of porous scaffolds by Souhaila Nider, Femke De Ceulaer, Berfu Göksel, Annabel Braem, Erin Koos

    Published 2025-03-01
    “…Direct Ink Writing (DIW) has been extensively studied for creating hierarchical porous structures over recent decades. It finds applications in various fields, including aeronautics, industry, energy, and healthcare. …”
    Get full text
    Article
  11. 951

    Non-Markovian quantum exceptional points by Jhen-Dong Lin, Po-Chen Kuo, Neill Lambert, Adam Miranowicz, Franco Nori, Yueh-Nan Chen

    Published 2025-02-01
    “…This work addresses this gap by proposing a general framework based on two numerically exact descriptions of non-Markovian dynamics: the pseudomode equation of motion (PMEOM) and the hierarchical equations of motion (HEOM). The PMEOM is particularly useful due to its Lindblad-type structure, aligning with previous studies in the Markovian regime while offering deeper insights into EP identification. …”
    Get full text
    Article
  12. 952

    Copyright protection algorithm based on differential privacy deep fake fingerprint detection model by Chengsheng YUAN, Qiang GUO, Zhangjie FU

    Published 2022-09-01
    “…A copyright protection algorithm based on differential privacy for deep fake fingerprint detection model (DFFDM) was proposed, realizing active copyright protection and passive copyright verification of DFFDM without weakening the performance of the original task.In the original task training, noise was added to introduce randomness, and the expected stability of the differential privacy algorithm was used to make classification decisions to reduce the sensitivity to noise.In passive verification, FGSM was used to generate adversarial samples, the decision boundary was fine-adjusted to establish a backdoor, and the mapping was used as an implanted watermark to realize passive verification.To solve the copyright confusion caused by multiple backdoors, a watermark verification framework was designed, which stamped the trigger backdoors and identified the copyright with the help of time order.In active protection, to provide users with hierarchical services, the key neurons in the task were frozen by probabilistic selection strategy, and the access rights were designed to realize the thawing of neurons, so as to obtain the right to use the original task.Experimental results show that the backdoor verification is still effective under different model performance, and the embedded backdoor shows a certain robustness to the model modification.Also, the proposed algorithm can resist not only the collusion attack by the attacker to recruit legitimate users, but also the fine-tuning and compression attacks caused by the model modification.…”
    Get full text
    Article
  13. 953

    Les contestations sociales du développement touristique dans les Hautes-Pyrénées : le rendez-vous manqué de l’innovation territoriale ? by Sylvie Clarimont, Vincent Vlès

    Published 2016-04-01
    “…Unlike the protest movements of the 1970s, these citizens’ associations remain pragmatic, non-hierarchical and local, led by ‘mountain folk’. Some local campaigns are ambiguous in nature and bring together a highly diverse array of stakeholders with interests in the local economy. …”
    Get full text
    Article
  14. 954

    The Impact of Resource Optimization on the Economic Development of the Marine Industry by Tingting Wang, Xiulian Yang

    Published 2022-01-01
    “…Therefore, a new method is designed to solve the above problems; by analyzing the scale, hierarchical system, and optimizing the spatial resource framework of the marine industry, the influence of different marine industries is comprehensively measured, and the final demand dependency of the marine industry economy is obtained. …”
    Get full text
    Article
  15. 955

    Comparison of the Chemical Properties of Forest Soil from the Silesian Beskid, Poland by Maria Zołotajkin, Adam Smoliński, Jerzy Ciba, Joanna Kluczka, Monika Skwira

    Published 2014-01-01
    “…Implementation of hierarchical clustering to experimental data analysis allowed drawing a conclusion that the two forest areas vary significantly in terms of content of aluminium extracted with solutions of barium chloride (Alexch), sodium diphosphate (Alpyr), and pHKCl and in the amount of humus in soil.…”
    Get full text
    Article
  16. 956

    A Moving Object Detection Method Using Deep Learning-Based Wireless Sensor Networks by Linghua Zhao, Zhihua Huang

    Published 2021-01-01
    “…This method uses the deep learning model to extract visual potential representation features through offline similarity function ranking learning and online model incremental update and uses the hierarchical clustering algorithm to achieve target detection and positioning; the low-precision histogram and high-precision histogram cascade the method which determines the correct position of the target and achieves the purpose of detecting the moving target. …”
    Get full text
    Article
  17. 957

    Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure by Woong Go, Jin Kawk

    Published 2014-01-01
    “…Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. …”
    Get full text
    Article
  18. 958

    Improving source code suggestion with code embedding and enhanced convolutional long short‐term memory by Yasir Hussain, Zhiqiu Huang, Yu Zhou

    Published 2021-06-01
    “…First, DeepSN uses an enhanced hierarchical convolutional neural network combined with code‐embedding to automatically extract the top‐notch features of the source code and to learn useful semantic information. …”
    Get full text
    Article
  19. 959

    Two-Stage Solution for Meal Delivery Routing Optimization on Time-Sensitive Customer Satisfaction by Wenjie Wang, Li Jiang

    Published 2022-01-01
    “…In the first stage, a large number of meal orders are hierarchically classified and merged into delivery bundles based on the nearest pickup location rule by applying the hierarchical agglomerative clustering (HAC) algorithm, to increase fast meal delivery efficiency. …”
    Get full text
    Article
  20. 960

    A Flexile and High Precision Calibration Method for Binocular Structured Light Scanning System by Jianying Yuan, Qiong Wang, Bailin Li

    Published 2014-01-01
    “…The principle of the proposed method is based on hierarchical self-calibration and bundle adjustment. …”
    Get full text
    Article