Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- methods 3
- Economics 2
- Health and hygiene 2
- History 2
- Law 2
- Medicine 2
- Moral and ethical aspects 2
- Religious life 2
- Women 2
- Academic writing 1
- Administration 1
- Advertising 1
- Anesthesia 1
- Anesthesiology 1
- Application software 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- Attitudes 1
- Big data 1
- Biochemical Phenomena 1
- Biochemistry 1
- Cave ecology 1
- Christian men 1
- Christian sociology 1
- Christian women 1
- Christianity 1
- Climate Change 1
- Clinical biochemistry 1
- Consumers 1
-
7801
Quantum-based wireless sensor networks: A review and open questions
Published 2021-10-01“…This is in part due to the complexity of using big, costly, and highly energy-consuming machines that are quantum computers to this date, compared to the nodes used in wireless sensor networks which are small, inexpensive, and operate with very low energy consumption requirements. …”
Get full text
Article -
7802
-
7803
Influence of Regulating Pool on Bend Flow
Published 2021-01-01“…The results show that the regulating pool plays a role in dispersing the water surface super-elevation and improving the flow pattern, and the length of the regulating pool is an important parameter affecting the flow pattern improvement effect, with remarkable improvement effect in a certain range, but without effect beyond this range. There is a big error in the calculation result of the formula of water surface super-elevation with regulating pool, which needs to be corrected in practical engineering application.…”
Get full text
Article -
7804
Analysis of Numerical Method for Diffusion Equation with Time-Fractional Caputo–Fabrizio Derivative
Published 2023-01-01“…In this paper, we propose a high-precision discrete scheme for the time-fractional diffusion equation (TFDE) with Caputo-Fabrizio type. …”
Get full text
Article -
7805
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01“…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
Get full text
Article -
7806
Steganalysis for stegotext based on text redundancy
Published 2009-01-01“…Targeted at the text steganography with mimic model,a steganalysis method based on source redundancy for stegotexts was proposed.This method processed the text and the words in it as the m-order Markov source and the source symbols respectively,then computed the redundancy of the source.Through analyzing the relationship between the re-dundancy and the size of the text,the existence of hidden information could be determined.With testing of 8 000 ste-gotexts produced by the four main softwares NiceText,Texto,Stego and Sams Big Play Maker,and 2 400 normal texts randomly sampled from innocuous texts downloaded from the Internet,the results show that the false positive rate of our steganalysis method is 0.5% and the false negative rate is 3.9%.Experiments and analyzing results indicate that the steganalysis method can effectively detect stegotexts based on natural language processing with mimic model.…”
Get full text
Article -
7807
Squareflower, Paronychia erecta
Published 2018-10-01“…This plant is an endemic restricted to the coastal Panhandle of Florida, counties west of the Big Bend region, and west to Louisiana. The square outline of the inflorescence is unique and makes squareflower a desirable plant for coastal landscapes. https://edis.ifas.ufl.edu/sg179 This publication is derived from information in SGEB-75/SG156, Dune Restoration and Enhancement for the Florida Panhandle, by Debbie Miller, Mack Thetford, Christina Verlinde, Gabriel Campbell, and Ashlynn Smith. https://edis.ifas.ufl.edu/sg156. …”
Get full text
Article -
7808
Conflicts between People and the Florida Black Bear
Published 2014-10-01“… An adult black bear may eat up to the equivalent calorie content of 38 Big Mac sandwiches a day, and can smell food from one to two miles away. …”
Get full text
Article -
7809
Conflicts between People and the Florida Black Bear
Published 2014-10-01“… An adult black bear may eat up to the equivalent calorie content of 38 Big Mac sandwiches a day, and can smell food from one to two miles away. …”
Get full text
Article -
7810
The paths to carbon neutrality in the Russian electric power industry
Published 2022-03-01“…The introduction of a “carbon” tax can cause big losses for Russian manufacturers. To reduce the carbon intensity of electricity production and maintain “carbon neutrality” in the future Russia has to increase generation at nuclear, hydroelectric and other renewable energy sources, take measures to improve the fuel combustion efficiency at coal-fired power plants and introduce more economical gas turbine and combined cycle equipment installations at gas power plants.…”
Get full text
Article -
7811
Design and application of grid cloud testing service platform
Published 2017-07-01“…With the rapid development of big data and cloud computing technology,and successful practice in domestic and foreign enterprises,how to introduce the cloud computing technology,to innovate the traditional test mode,to achieve the conversion of the traditional software testing to the cloud model test mode,become the key to software quality assurance for the enterprise.For cloud platform has strong processing ability,large storage capacity,safety and reliability,moderate distribution capacity,grid cloud testing service platform will meet the advanced,practical,safety and other characteristics,to provide internal and external cloud testing services for enterprises.The application of mobile testing in the cloud platform was enumerated,the availability of the grid cloud testing service platform was verified,the advantages of the platform were analyzed.…”
Get full text
Article -
7812
Review of group recommendation analysis and research
Published 2018-12-01“…With the advent of age of big data,the application fields of recommendation systems have become increasingly widespread.The recommendation service object of the group recommendation systems are expanded from a single user to a group of members,and becoming one of the research hotspots in the recommendation system fields.The group recommendation system needs to consider the preferences of all group members,and to fuse the preferences of the members,and to alleviate the conflicts of preferences among them,so that the recommendation results satisfy all group members as much as possible.The recent research progress of the group recommendation was mainly reviewed.The frontiers of group classification,group detection and group prediction recommendation were summarized.And main factors of the group recommendations were generalized.Finally,the research points of group recommendation and its prospects were separately elaborated.…”
Get full text
Article -
7813
La création d’une nouvelle filière dans le cadre de la requalification de friches industrielles à grande échelle : les paysages productifs
Published 2022-12-01“…Deeply marked by human intervention (in the Petrolocene era), the different parts of this landscape have been reinvented in the course of the past industrial activities of the big petrochemical firms and of regulatory changes. …”
Get full text
Article -
7814
Two-Dimensional Modelling and Validation of the Mass Flow in a Mixing Stirred Reactor
Published 2013-08-01“…It is concluded that the “high cell” with the “big stirrer” can be used for the electroplating of iron micro‐ and nanoparticles in the presence of the cylindrical electrode.…”
Get full text
Article -
7815
La nuit américaine dans Noir de Robert Coover
Published 2009-12-01“…Under the highly erotic and conventionally threatening figure of a Black widow, who owes much to Baudelaire’s death ringing passer-by, and by resorting extensively to the poetics of erasure, veiling and claustration, this highly metatextual novel captures in its spider’s web the simulacrum of all detective fiction by pitting it against the anticipated shadow presence of the most ambitious critique (Benjamin, Derrida, Baudrillard).…”
Get full text
Article -
7816
Appropriation scripturale et subversive de l'espace urbain à São Paulo
Published 2016-05-01“…This article explores, from a sociological point of view, a tag movement from São Paulo, the pixação, almost restricted to the only Big São Paulo. Written form's originality and the habits of pixadores are very unique, and this will be very interesting to understand what this movement put at stake in this town, and identify which paradigms are involved within this controversial practice. …”
Get full text
Article -
7817
Japanese Application of Bioassays for Environmental Management
Published 2002-01-01“…Although human health has been the major concern in Japanese environmental management, ecosystem health is becoming the big issue as the need for preserving the diversity of ecosystems has been recognized. …”
Get full text
Article -
7818
6G endogenous security:architecture and key technologies
Published 2020-01-01“…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
Get full text
Article -
7819
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.…”
Get full text
Article -
7820
Measuring and analyzing node families in the Tor anonymous communication network
Published 2015-02-01“…Tor family was focused on design and given a family-level measurement of it.Based on Tor node families (over 3000) discovered from live Tor network data (from Jan.2011 to Dec.2012),a few characteristics of Tor node families were revealed,such as family size,bandwidth,geographical distribution as well as operators providing a few big families.The analysis validated the irreplaceable role played by family design in enhancing Tor’s anonymity.Based on the measurement,security analysis showed the serious availability threat a compromised node family can cause to the Tor network.Besides,It also discussed Tor hidden families and the potential anonymity risk caused by them.…”
Get full text
Article