Showing 4,121 - 4,140 results of 67,915 for search 'DASB~', query time: 2.66s Refine Results
  1. 4121

    Historical Blurry Video-Based Face Recognition by Lujun Zhai, Suxia Cui, Yonghui Wang, Song Wang, Jun Zhou, Greg Wilsbacher

    Published 2024-09-01
    “…The models for most current applications are based on high-definition digital cameras. In this paper, we focus on digital images derived from historical motion picture films. …”
    Get full text
    Article
  2. 4122

    Distributed trust model based on parameter modeling by Jing-pei WANG, Bin SUN, Xin-xin NIU, Yi-xian YANG

    Published 2013-04-01
    “…A distributed trust model based on parameter modeling was posed.Nine functional parameters were extracted after investigating the trust mechanism and current trust models.These parameters included flexibility,subjectivity,fuzziness,time decay property,transitivity,anti-attacks property,rewards & punishment property,sensitivity and scalability.Each parameter was modeled and integrated to form a comprehensive trust model.Analytical results indicate that the proposed trust model satisfies all the nine functional parameters and thus has fair universality Experimental results show that the proposed trust model is reasonable and effective.Comparisons with previous algorithms indicate that the performance of the proposed trust model has been improved.…”
    Get full text
    Article
  3. 4123
  4. 4124

    Knowledge Graph Completion With Pattern-Based Methods by Maryam Sabet, Mohammadreza Pajoohan, Mohammad Reza Moosavi

    Published 2025-01-01
    “…In this paper, we propose a Pattern-based Knowledge Graph Completion (PKGC) method that consists of three phases. …”
    Get full text
    Article
  5. 4125
  6. 4126
  7. 4127

    Intrusion detection method based on machine learning by TIAN Xin-guang1, GAO Li-zhi2, ZHANG Er-yang1

    Published 2006-01-01
    “…A new intrusion detection method was presented based on machine learning for intrusion detection systems using shell commands as audit data.In the method,multiple dictionaries of shell command sequences of different lengths were constructed to represent the normal behavior profile of a network user.During the detection stage,the similarities between the command sequences generated by the monitored user and the sequence dictionaries were calculated.These similarities were then smoothed with sliding windows,and the smoothed similarities were used to determine whether the monitored user’s behaviors were normal or anomalous.The results of the experience show the method can achieve higher detection accuracy and shorter detection time than the instance-based method presented by Lane T.…”
    Get full text
    Article
  8. 4128

    Cooperative routing algorithm based on game theory by Kun XIE, Shen-lin DUAN, Ji-gang WEN, Shi-ming HE

    Published 2013-08-01
    “…In order to improve the routing performance of selfish wireless network, a VMIMO coop-erative routing algorithm based on game theory was proposed. The network was divided into groups, and data was trans-mitted through VMIMO between groups. …”
    Get full text
    Article
  9. 4129

    Efficient revocable attribute-based encryption scheme by Xuejun LI, Dan ZHANG, Hui LI

    Published 2019-06-01
    “…In the existing solutions,the time-based scheme is difficult to achieve immediate revocation,and the third-party-based scheme often requires re-encryption,which needs large amount of calculation and doesn’t apply to mas-sive data.To solve the problem,an efficient and immediate CP-ABE scheme was proposed to support user and attribute lev-els revocation.The scheme was based on the classic LSSS access structure,introducing RSA key management mechanism and attribute authentication.By means of a semi-trusted third party,the user could be authenticated before decryption.Com-pared with the existing revocation schemes,The proposed scheme didn’t need the user to update the key or re-encrypt the ciphertext.The semi-trusted third party wasn’t required to update the RSA attribute authentication key.The scheme greatly reduced the amount of computation and traffic caused by revocation,while ensuring anti-collusion attacks and forward and backward security.Finally,the security analysis and experimental simulation show that the scheme has higher revocation ef-ficiency.…”
    Get full text
    Article
  10. 4130

    DIC-Based Operational Modal Analysis of Bridges by Gongfa Chen, Zhihua Wu, Chunjian Gong, Jiqiao Zhang, Xiaoli Sun

    Published 2021-01-01
    “…A key issue in vibration-based damage detection for a bridge is to determine its modal parameters. …”
    Get full text
    Article
  11. 4131

    Continuous Skyline Queries Based on MapReduce by Guanmin Shan, Yihong Dong, Xianmang He

    Published 2014-05-01
    “…With the development of Web and wireless sensor networks, the appearance of big data has brought a great challenge to data query and process. …”
    Get full text
    Article
  12. 4132

    Selection Based on Colony Fitness for Differential Evolution by Zi Ming, Yang Li, Shijie Peng, Xuechao Wu, Jinyi Guo

    Published 2018-01-01
    “…Differential evolution (DE) is a competitive and reliable computing technique for continuous optimization. A diversity-based selection has been proved to be valid to improve the performance of DE. …”
    Get full text
    Article
  13. 4133
  14. 4134

    Self-healing algorithm based on feedback mechanism by Ji-hong ZHAO, Hua QU, Wen-dong CHEN

    Published 2012-01-01
    “…A network self-healing algorithm was presented.The proposed algorithm reduced the probability of selecting the failure or congestion paths and achieved self-healing by selecting recovery path adaptively when the nodes failure or link congestion in the network,which was based on Q-learning feedback mechanism,multi-QoS constrained of the evaluation function and path selection strategy using Boltzmann-Gibbs distribution.Simulation results show that the proposed algorithm outperforms in the recovery rate,the diffserv-aware capability and network resource optimization.…”
    Get full text
    Article
  15. 4135

    Recreational resources – the basis of human active recreation by Viacheslav Zaytzev, Sergii Iermakov, Svitlana Manucharyan

    Published 2022-06-01
    “…Therefore, the curators have two main tasks: medical care for patients (secondary prevention) and recreation. …”
    Get full text
    Article
  16. 4136
  17. 4137

    An iterative method based on the average quadrature formula by Tusar Singh, Dwiti Behera, Shno Othman Ahmed, Rostam Saeed

    Published 2025-03-01
    “…In our research, a new third-order iterative method has been introduced. This method involves the creation of a new quadrature formula by averaging Simpson's 1/3 rd and Trapezoidal rules. …”
    Get full text
    Article
  18. 4138
  19. 4139

    Immunotherapy of osteosarcoma based on immune microenvironment modulation by Heping Lian, Heping Lian, Jiakui Zhang, Shuna Hou, Shuang Ma, Jiachen Yu, Wei Zhao, Duoyi Zhao, Zhiyu Zhang

    Published 2025-01-01
    “…As an emerging oncological treatment, immunotherapy has shown potential in the clinical management of many tumors but has a poor response rate in osteosarcoma. …”
    Get full text
    Article
  20. 4140