Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4121
Historical Blurry Video-Based Face Recognition
Published 2024-09-01“…The models for most current applications are based on high-definition digital cameras. In this paper, we focus on digital images derived from historical motion picture films. …”
Get full text
Article -
4122
Distributed trust model based on parameter modeling
Published 2013-04-01“…A distributed trust model based on parameter modeling was posed.Nine functional parameters were extracted after investigating the trust mechanism and current trust models.These parameters included flexibility,subjectivity,fuzziness,time decay property,transitivity,anti-attacks property,rewards & punishment property,sensitivity and scalability.Each parameter was modeled and integrated to form a comprehensive trust model.Analytical results indicate that the proposed trust model satisfies all the nine functional parameters and thus has fair universality Experimental results show that the proposed trust model is reasonable and effective.Comparisons with previous algorithms indicate that the performance of the proposed trust model has been improved.…”
Get full text
Article -
4123
App-Based Volleyball Scoreboard Performance Evaluation
Published 2024-09-01Subjects: Get full text
Article -
4124
Knowledge Graph Completion With Pattern-Based Methods
Published 2025-01-01“…In this paper, we propose a Pattern-based Knowledge Graph Completion (PKGC) method that consists of three phases. …”
Get full text
Article -
4125
-
4126
Projection-based estimation of multivariate distribution density
Published 2002-12-01Get full text
Article -
4127
Intrusion detection method based on machine learning
Published 2006-01-01“…A new intrusion detection method was presented based on machine learning for intrusion detection systems using shell commands as audit data.In the method,multiple dictionaries of shell command sequences of different lengths were constructed to represent the normal behavior profile of a network user.During the detection stage,the similarities between the command sequences generated by the monitored user and the sequence dictionaries were calculated.These similarities were then smoothed with sliding windows,and the smoothed similarities were used to determine whether the monitored user’s behaviors were normal or anomalous.The results of the experience show the method can achieve higher detection accuracy and shorter detection time than the instance-based method presented by Lane T.…”
Get full text
Article -
4128
Cooperative routing algorithm based on game theory
Published 2013-08-01“…In order to improve the routing performance of selfish wireless network, a VMIMO coop-erative routing algorithm based on game theory was proposed. The network was divided into groups, and data was trans-mitted through VMIMO between groups. …”
Get full text
Article -
4129
Efficient revocable attribute-based encryption scheme
Published 2019-06-01“…In the existing solutions,the time-based scheme is difficult to achieve immediate revocation,and the third-party-based scheme often requires re-encryption,which needs large amount of calculation and doesn’t apply to mas-sive data.To solve the problem,an efficient and immediate CP-ABE scheme was proposed to support user and attribute lev-els revocation.The scheme was based on the classic LSSS access structure,introducing RSA key management mechanism and attribute authentication.By means of a semi-trusted third party,the user could be authenticated before decryption.Com-pared with the existing revocation schemes,The proposed scheme didn’t need the user to update the key or re-encrypt the ciphertext.The semi-trusted third party wasn’t required to update the RSA attribute authentication key.The scheme greatly reduced the amount of computation and traffic caused by revocation,while ensuring anti-collusion attacks and forward and backward security.Finally,the security analysis and experimental simulation show that the scheme has higher revocation ef-ficiency.…”
Get full text
Article -
4130
DIC-Based Operational Modal Analysis of Bridges
Published 2021-01-01“…A key issue in vibration-based damage detection for a bridge is to determine its modal parameters. …”
Get full text
Article -
4131
Continuous Skyline Queries Based on MapReduce
Published 2014-05-01“…With the development of Web and wireless sensor networks, the appearance of big data has brought a great challenge to data query and process. …”
Get full text
Article -
4132
Selection Based on Colony Fitness for Differential Evolution
Published 2018-01-01“…Differential evolution (DE) is a competitive and reliable computing technique for continuous optimization. A diversity-based selection has been proved to be valid to improve the performance of DE. …”
Get full text
Article -
4133
-
4134
Self-healing algorithm based on feedback mechanism
Published 2012-01-01“…A network self-healing algorithm was presented.The proposed algorithm reduced the probability of selecting the failure or congestion paths and achieved self-healing by selecting recovery path adaptively when the nodes failure or link congestion in the network,which was based on Q-learning feedback mechanism,multi-QoS constrained of the evaluation function and path selection strategy using Boltzmann-Gibbs distribution.Simulation results show that the proposed algorithm outperforms in the recovery rate,the diffserv-aware capability and network resource optimization.…”
Get full text
Article -
4135
Recreational resources – the basis of human active recreation
Published 2022-06-01“…Therefore, the curators have two main tasks: medical care for patients (secondary prevention) and recreation. …”
Get full text
Article -
4136
Bioenergy agroecosystems as a basis for food sustainability
Published 2025-01-01Subjects: Get full text
Article -
4137
An iterative method based on the average quadrature formula
Published 2025-03-01“…In our research, a new third-order iterative method has been introduced. This method involves the creation of a new quadrature formula by averaging Simpson's 1/3 rd and Trapezoidal rules. …”
Get full text
Article -
4138
Evidence-based management of dermatophytosis in India today
Published 2023-01-01Subjects: Get full text
Article -
4139
Immunotherapy of osteosarcoma based on immune microenvironment modulation
Published 2025-01-01“…As an emerging oncological treatment, immunotherapy has shown potential in the clinical management of many tumors but has a poor response rate in osteosarcoma. …”
Get full text
Article -
4140
DEVELOPMENT OF THE NETWORK OF SOCIAL SHOPS BASED ON FRANCHISE
Published 2018-02-01Get full text
Article