Showing 7,801 - 7,820 results of 10,771 for search 'Big3~', query time: 2.61s Refine Results
  1. 7801

    Quantum-based wireless sensor networks: A review and open questions by Mario E Rivero-Angeles

    Published 2021-10-01
    “…This is in part due to the complexity of using big, costly, and highly energy-consuming machines that are quantum computers to this date, compared to the nodes used in wireless sensor networks which are small, inexpensive, and operate with very low energy consumption requirements. …”
    Get full text
    Article
  2. 7802
  3. 7803

    Influence of Regulating Pool on Bend Flow by LUO Fengjie, WU Yufeng, WEN Yunping, WANG Xumin, LI Xin

    Published 2021-01-01
    “…The results show that the regulating pool plays a role in dispersing the water surface super-elevation and improving the flow pattern, and the length of the regulating pool is an important parameter affecting the flow pattern improvement effect, with remarkable improvement effect in a certain range, but without effect beyond this range. There is a big error in the calculation result of the formula of water surface super-elevation with regulating pool, which needs to be corrected in practical engineering application.…”
    Get full text
    Article
  4. 7804

    Analysis of Numerical Method for Diffusion Equation with Time-Fractional Caputo–Fabrizio Derivative by Hanxiao Wang, Xindong Zhang, Ziyang Luo, Juan Liu

    Published 2023-01-01
    “…In this paper, we propose a high-precision discrete scheme for the time-fractional diffusion equation (TFDE) with Caputo-Fabrizio type. …”
    Get full text
    Article
  5. 7805

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    “…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
    Get full text
    Article
  6. 7806

    Steganalysis for stegotext based on text redundancy by LUO Gang, SUN Xing-ming

    Published 2009-01-01
    “…Targeted at the text steganography with mimic model,a steganalysis method based on source redundancy for stegotexts was proposed.This method processed the text and the words in it as the m-order Markov source and the source symbols respectively,then computed the redundancy of the source.Through analyzing the relationship between the re-dundancy and the size of the text,the existence of hidden information could be determined.With testing of 8 000 ste-gotexts produced by the four main softwares NiceText,Texto,Stego and Sams Big Play Maker,and 2 400 normal texts randomly sampled from innocuous texts downloaded from the Internet,the results show that the false positive rate of our steganalysis method is 0.5% and the false negative rate is 3.9%.Experiments and analyzing results indicate that the steganalysis method can effectively detect stegotexts based on natural language processing with mimic model.…”
    Get full text
    Article
  7. 7807

    Squareflower, Paronychia erecta by Debbie Miller, Mack Thetford, Chris Verlinde, Gabriel Campbell, Ashlynn Smith

    Published 2018-10-01
    “…This plant is an endemic restricted to the coastal Panhandle of Florida, counties west of the Big Bend region, and west to Louisiana. The square outline of the inflorescence is unique and makes squareflower a desirable plant for coastal landscapes. https://edis.ifas.ufl.edu/sg179 This publication is derived from information in SGEB-75/SG156, Dune Restoration and Enhancement for the Florida Panhandle, by Debbie Miller, Mack Thetford, Christina Verlinde, Gabriel Campbell, and Ashlynn Smith. https://edis.ifas.ufl.edu/sg156. …”
    Get full text
    Article
  8. 7808

    Conflicts between People and the Florida Black Bear by Elizabeth F. Pienaar

    Published 2014-10-01
    “… An adult black bear may eat up to the equivalent calorie content of 38 Big Mac sandwiches a day, and can smell food from one to two miles away. …”
    Get full text
    Article
  9. 7809

    Conflicts between People and the Florida Black Bear by Elizabeth F. Pienaar

    Published 2014-10-01
    “… An adult black bear may eat up to the equivalent calorie content of 38 Big Mac sandwiches a day, and can smell food from one to two miles away. …”
    Get full text
    Article
  10. 7810

    The paths to carbon neutrality in the Russian electric power industry by N. G. Lyubimova

    Published 2022-03-01
    “…The introduction of a “carbon” tax can cause big losses for Russian manufacturers. To reduce the carbon intensity of electricity production and maintain “carbon neutrality” in the future Russia has to increase generation at nuclear, hydroelectric and other renewable energy sources, take measures to improve the fuel combustion efficiency at coal-fired power plants and introduce more economical gas turbine and combined cycle equipment installations at gas power plants.…”
    Get full text
    Article
  11. 7811

    Design and application of grid cloud testing service platform by Xiaorong CHANG, Chunguang ZHANG, Sining WANG, Junwei ZHANG, Jiamei WU

    Published 2017-07-01
    “…With the rapid development of big data and cloud computing technology,and successful practice in domestic and foreign enterprises,how to introduce the cloud computing technology,to innovate the traditional test mode,to achieve the conversion of the traditional software testing to the cloud model test mode,become the key to software quality assurance for the enterprise.For cloud platform has strong processing ability,large storage capacity,safety and reliability,moderate distribution capacity,grid cloud testing service platform will meet the advanced,practical,safety and other characteristics,to provide internal and external cloud testing services for enterprises.The application of mobile testing in the cloud platform was enumerated,the availability of the grid cloud testing service platform was verified,the advantages of the platform were analyzed.…”
    Get full text
    Article
  12. 7812

    Review of group recommendation analysis and research by Yunchang WU, Baisong LIU, Yangyang WANG, Chenjie FEI

    Published 2018-12-01
    “…With the advent of age of big data,the application fields of recommendation systems have become increasingly widespread.The recommendation service object of the group recommendation systems are expanded from a single user to a group of members,and becoming one of the research hotspots in the recommendation system fields.The group recommendation system needs to consider the preferences of all group members,and to fuse the preferences of the members,and to alleviate the conflicts of preferences among them,so that the recommendation results satisfy all group members as much as possible.The recent research progress of the group recommendation was mainly reviewed.The frontiers of group classification,group detection and group prediction recommendation were summarized.And main factors of the group recommendations were generalized.Finally,the research points of group recommendation and its prospects were separately elaborated.…”
    Get full text
    Article
  13. 7813

    La création d’une nouvelle filière dans le cadre de la requalification de friches industrielles à grande échelle : les paysages productifs by Julien Lahaie

    Published 2022-12-01
    “…Deeply marked by human intervention (in the Petrolocene era), the different parts of this landscape have been reinvented in the course of the past industrial activities of the big petrochemical firms and of regulatory changes. …”
    Get full text
    Article
  14. 7814

    Two-Dimensional Modelling and Validation of the Mass Flow in a Mixing Stirred Reactor by Daniela Kladeková, Renáta Oriňáková, Hans-Dieter Wiemhöfer, Annamária Krajníková, Andrej Oriňák

    Published 2013-08-01
    “…It is concluded that the “high cell” with the “big stirrer” can be used for the electroplating of iron micro‐ and nanoparticles in the presence of the cylindrical electrode.…”
    Get full text
    Article
  15. 7815

    La nuit américaine dans Noir de Robert Coover by Marc Amfreville

    Published 2009-12-01
    “…Under the highly erotic and conventionally threatening figure of a Black widow, who owes much to Baudelaire’s death ringing passer-by, and by resorting extensively to the poetics of erasure, veiling and claustration, this highly metatextual novel captures in its spider’s web the simulacrum of all detective fiction by pitting it against the anticipated shadow presence of the most ambitious critique (Benjamin, Derrida, Baudrillard).…”
    Get full text
    Article
  16. 7816

    Appropriation scripturale et subversive de l'espace urbain à São Paulo by Timothée Engasser

    Published 2016-05-01
    “…This article explores, from a sociological point of view, a tag movement from São Paulo, the pixação, almost restricted to the only Big São Paulo. Written form's originality and the habits of pixadores are very unique, and this will be very interesting to understand what this movement put at stake in this town, and identify which paradigms are involved within this controversial practice. …”
    Get full text
    Article
  17. 7817

    Japanese Application of Bioassays for Environmental Management by Takashi Kusui

    Published 2002-01-01
    “…Although human health has been the major concern in Japanese environmental management, ecosystem health is becoming the big issue as the need for preserving the diversity of ecosystems has been recognized. …”
    Get full text
    Article
  18. 7818

    6G endogenous security:architecture and key technologies by Yang LIU, Mugen PENG

    Published 2020-01-01
    “…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
    Get full text
    Article
  19. 7819

    Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space by Jian-hua LI

    Published 2016-02-01
    “…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.…”
    Get full text
    Article
  20. 7820

    Measuring and analyzing node families in the Tor anonymous communication network by Xiao WANG, Bin-xing FANG, Pei-peng LIU, Li2 GUO, Jin-qiao SHI

    Published 2015-02-01
    “…Tor family was focused on design and given a family-level measurement of it.Based on Tor node families (over 3000) discovered from live Tor network data (from Jan.2011 to Dec.2012),a few characteristics of Tor node families were revealed,such as family size,bandwidth,geographical distribution as well as operators providing a few big families.The analysis validated the irreplaceable role played by family design in enhancing Tor’s anonymity.Based on the measurement,security analysis showed the serious availability threat a compromised node family can cause to the Tor network.Besides,It also discussed Tor hidden families and the potential anonymity risk caused by them.…”
    Get full text
    Article