Showing 4,341 - 4,360 results of 67,915 for search 'DASB~', query time: 2.71s Refine Results
  1. 4341

    Advanced Metasurface-Based Antennas: A Review by Wanchen Yang, Jinghao Li, Dongxu Chen, Yue Cao, Quan Xue, Wenquan Che

    Published 2025-01-01
    “…Moreover, it can be used as radiators and excited by traveling wave to achieve beam steering or combined with phase change materials to realize frequency reconfiguration. The last part is about the further applications of metasurface, including multi-folding reflectarray/transmitarray, wide-angle scanning phased array antenna, and filtering antenna. …”
    Get full text
    Article
  2. 4342

    Checkpoint trust evaluation method based on Markov by Jun-feng TIAN, Ya-jiao ZHANG

    Published 2015-01-01
    “…According to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by some checkpoints worked in the software behavior trace,then divided some trust levels to reflect the checkpoint trusted situation by the Markov model and the weight of checkpoint,and finally synthesized the checkpoint trusted situation to determine the software trust value.Experimental results showed that the model could effectively reflect the trusted situation of the various parts of the software,and verify the rationality and availability of the model.…”
    Get full text
    Article
  3. 4343

    Numerical Characterization of DNA Sequence Based on Dinucleotides by Xingqin Qi, Edgar Fuller, Qin Wu, Cun-Quan Zhang

    Published 2012-01-01
    “…In order to make quantitative comparisons, one devises mathematical descriptors that capture the essence of the base composition and distribution of the sequence. …”
    Get full text
    Article
  4. 4344
  5. 4345

    Trajectory clustering algorithm based on structural similarity by YUAN Guan, XIA Shi-xiong, ZHANG Lei, ZHOU Yong

    Published 2011-01-01
    “…For current trajectory clustering algorithms,most of them group full trajectories as basic units,and lead the low efficient results.Aiming at this problem,a trajectory clustering algorithm based on structural similarity was proposed.By introducing a new concept of trajectory structure and presenting structural similarity function,the internal and external features of trajectories were analyzed.The algorithm first partitioned trajectories into trajectory segments according to corner;then computed the matching degree between every trajectory segment pairs by comparing their structure features;finally grouped trajectories into clusters.Experiment results on real data set demonstrate not only the efficiency and effectiveness of the algorithm,but also the flexibility that feature sensitivity can be adjusted by different parameters.…”
    Get full text
    Article
  6. 4346
  7. 4347
  8. 4348

    Development of Cotton Irrigation Based on Computer Technology by Matyakubov B. Sh., Karabayev A., Zakirova S. Kh., Urinov A. A., Diyorova M. X., Davronov Q. A.

    Published 2025-01-01
    “…By implementing these evidence-based irrigation regimes, we aim to not only improve cotton yields but also contribute to sustainable water management practices in the context of a rapidly changing climate. …”
    Get full text
    Article
  9. 4349

    Point-Based Grading System: Advantages and Disadvantages by N. N. Мaltseva, V. Е. Рenkov

    Published 2021-05-01
    Subjects: “…point-based grading system…”
    Get full text
    Article
  10. 4350

    Modeling of the mimic defense based on heterogeneous redundancy by Junning QIN, Jiajia HAN, Sheng ZHOU, Chunming WU, Shuangxi CHEN, Ruoyan ZHAO, Jiangyu ZHANG

    Published 2020-05-01
    “…The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.…”
    Get full text
    Article
  11. 4351

    The Impact of Incretin-Based Medications on Lipid Metabolism by Habib Yaribeygi, Mina Maleki, Alexandra E. Butler, Tannaz Jamialahmadi, Amirhossein Sahebkar

    Published 2021-01-01
    “…Therefore, normalizing lipid metabolism is an attractive goal for therapy in patients with diabetes. Incretin-based medications are a novel group of antidiabetic agents with potent hypoglycemic effects. …”
    Get full text
    Article
  12. 4352

    Consensus Mechanism of IoT Based on Blockchain Technology by Yue Wu, Liangtu Song, Lei Liu, Jincheng Li, Xuefei Li, Linli Zhou

    Published 2020-01-01
    “…Sensors and blockchain nodes can use the shared key to generate HMAC (Hash-based Message Authentication Code) signatures for sensor-aware transactions and use the Verifiable Random Function to implement block nodes. …”
    Get full text
    Article
  13. 4353

    Summability methods based on the Riemann Zeta function by Larry K. Chu

    Published 1988-01-01
    “…This paper is a study of summability methods that are based on the Riemann Zeta function. A limitation theorem is proved which gives a necessary condition for a sequence x to be zeta summable. …”
    Get full text
    Article
  14. 4354

    Proof of work algorithm based on credit model by Zuan WANG, Youliang TIAN, Qiuxian LI, Xinhuan YANG

    Published 2018-08-01
    “…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
    Get full text
    Article
  15. 4355

    A STUDY ON SECURITY FOR WEB-BASED APPLICATIONS by Nguyễn Sĩ Hòa, Lại Thị Nhung, Đặng Thanh Hải

    Published 2017-06-01
    “…Tạp chí Khoa học Đại học Đà Lạt…”
    Get full text
    Article
  16. 4356
  17. 4357

    Study of transmitter individual identification based on bispectra by CAI Zhong-wei, LI Jian-dong

    Published 2007-01-01
    “…Based on the bispectra and RBF,a new method for identifying different transmitters of the same model was presented.The selected spectra and parameters significant for classification of the received signal form the identification feature vector,and RBF was used to realize the individual identification.Experiment results show that the method is able to classify the same model transmitter with an accuracy rate of no less than 90% under the environment of lower SNR.…”
    Get full text
    Article
  18. 4358

    An Approach to Model Based Testing of Multiagent Systems by Shafiq Ur Rehman, Aamer Nadeem

    Published 2015-01-01
    “…Testing of multiagent systems is a challenging task due to the autonomous and proactive behavior of agents. …”
    Get full text
    Article
  19. 4359

    Value-based adoption of MDS:an empirical investigation by ZHOU Yi1, MENG Wei-dong1, DU Hui-ying2, WU Ping-yao2

    Published 2008-01-01
    “…The influence factors of customers’ behavioral intention,and constructs the regression model for the influence factors of customers behavioral intention of mobile data services(VAMDS) was analyzed.China mobile users of ease-own,GoTone and M-zone are chosen as our random surveys in Beijing,Nanjing and Chongqing.That the top three most important factors of customers behavioral intention of MDS are price,usefulness and social influence,and the security for customers’ behavioral intention validated by overseas scholars isn’t supported in the main MDS in China now.…”
    Get full text
    Article
  20. 4360

    Network traffic classification method basing on CNN by Yong WANG, Huiyi ZHOU, Hao FENG, Miao YE, Wenlong KE

    Published 2018-01-01
    “…Since the feature selection process will directly affect the accuracy of the traffic classification based on the traditional machine learning method,a traffic classification algorithm based on convolution neural network was tailored.First,the min-max normalization method was utilized to process the traffic data and map them into gray images,which would be used as the input data of convolution neural network to realize the independent feature learning.Then,an improved structure of the classical convolution neural network was proposed,and the parameters of the feature map and the full connection layer were designed to select the optimal classification model to realize the traffic classification.The tailored method can improve the classification accuracy without the complex operation of the network traffic.A series of simulation test results with the public data sets and real data sets show that compared with the traditional classification methods,the tailored convolution neural network traffic classification method can improve the accuracy and reduce the time of classification.…”
    Get full text
    Article