Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4341
Advanced Metasurface-Based Antennas: A Review
Published 2025-01-01“…Moreover, it can be used as radiators and excited by traveling wave to achieve beam steering or combined with phase change materials to realize frequency reconfiguration. The last part is about the further applications of metasurface, including multi-folding reflectarray/transmitarray, wide-angle scanning phased array antenna, and filtering antenna. …”
Get full text
Article -
4342
Checkpoint trust evaluation method based on Markov
Published 2015-01-01“…According to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by some checkpoints worked in the software behavior trace,then divided some trust levels to reflect the checkpoint trusted situation by the Markov model and the weight of checkpoint,and finally synthesized the checkpoint trusted situation to determine the software trust value.Experimental results showed that the model could effectively reflect the trusted situation of the various parts of the software,and verify the rationality and availability of the model.…”
Get full text
Article -
4343
Numerical Characterization of DNA Sequence Based on Dinucleotides
Published 2012-01-01“…In order to make quantitative comparisons, one devises mathematical descriptors that capture the essence of the base composition and distribution of the sequence. …”
Get full text
Article -
4344
-
4345
Trajectory clustering algorithm based on structural similarity
Published 2011-01-01“…For current trajectory clustering algorithms,most of them group full trajectories as basic units,and lead the low efficient results.Aiming at this problem,a trajectory clustering algorithm based on structural similarity was proposed.By introducing a new concept of trajectory structure and presenting structural similarity function,the internal and external features of trajectories were analyzed.The algorithm first partitioned trajectories into trajectory segments according to corner;then computed the matching degree between every trajectory segment pairs by comparing their structure features;finally grouped trajectories into clusters.Experiment results on real data set demonstrate not only the efficiency and effectiveness of the algorithm,but also the flexibility that feature sensitivity can be adjusted by different parameters.…”
Get full text
Article -
4346
-
4347
-
4348
Development of Cotton Irrigation Based on Computer Technology
Published 2025-01-01“…By implementing these evidence-based irrigation regimes, we aim to not only improve cotton yields but also contribute to sustainable water management practices in the context of a rapidly changing climate. …”
Get full text
Article -
4349
Point-Based Grading System: Advantages and Disadvantages
Published 2021-05-01Subjects: “…point-based grading system…”
Get full text
Article -
4350
Modeling of the mimic defense based on heterogeneous redundancy
Published 2020-05-01“…The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.…”
Get full text
Article -
4351
The Impact of Incretin-Based Medications on Lipid Metabolism
Published 2021-01-01“…Therefore, normalizing lipid metabolism is an attractive goal for therapy in patients with diabetes. Incretin-based medications are a novel group of antidiabetic agents with potent hypoglycemic effects. …”
Get full text
Article -
4352
Consensus Mechanism of IoT Based on Blockchain Technology
Published 2020-01-01“…Sensors and blockchain nodes can use the shared key to generate HMAC (Hash-based Message Authentication Code) signatures for sensor-aware transactions and use the Verifiable Random Function to implement block nodes. …”
Get full text
Article -
4353
Summability methods based on the Riemann Zeta function
Published 1988-01-01“…This paper is a study of summability methods that are based on the Riemann Zeta function. A limitation theorem is proved which gives a necessary condition for a sequence x to be zeta summable. …”
Get full text
Article -
4354
Proof of work algorithm based on credit model
Published 2018-08-01“…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
Get full text
Article -
4355
A STUDY ON SECURITY FOR WEB-BASED APPLICATIONS
Published 2017-06-01“…Tạp chí Khoa học Đại học Đà Lạt…”
Get full text
Article -
4356
-
4357
Study of transmitter individual identification based on bispectra
Published 2007-01-01“…Based on the bispectra and RBF,a new method for identifying different transmitters of the same model was presented.The selected spectra and parameters significant for classification of the received signal form the identification feature vector,and RBF was used to realize the individual identification.Experiment results show that the method is able to classify the same model transmitter with an accuracy rate of no less than 90% under the environment of lower SNR.…”
Get full text
Article -
4358
An Approach to Model Based Testing of Multiagent Systems
Published 2015-01-01“…Testing of multiagent systems is a challenging task due to the autonomous and proactive behavior of agents. …”
Get full text
Article -
4359
Value-based adoption of MDS:an empirical investigation
Published 2008-01-01“…The influence factors of customers’ behavioral intention,and constructs the regression model for the influence factors of customers behavioral intention of mobile data services(VAMDS) was analyzed.China mobile users of ease-own,GoTone and M-zone are chosen as our random surveys in Beijing,Nanjing and Chongqing.That the top three most important factors of customers behavioral intention of MDS are price,usefulness and social influence,and the security for customers’ behavioral intention validated by overseas scholars isn’t supported in the main MDS in China now.…”
Get full text
Article -
4360
Network traffic classification method basing on CNN
Published 2018-01-01“…Since the feature selection process will directly affect the accuracy of the traffic classification based on the traditional machine learning method,a traffic classification algorithm based on convolution neural network was tailored.First,the min-max normalization method was utilized to process the traffic data and map them into gray images,which would be used as the input data of convolution neural network to realize the independent feature learning.Then,an improved structure of the classical convolution neural network was proposed,and the parameters of the feature map and the full connection layer were designed to select the optimal classification model to realize the traffic classification.The tailored method can improve the classification accuracy without the complex operation of the network traffic.A series of simulation test results with the public data sets and real data sets show that compared with the traditional classification methods,the tailored convolution neural network traffic classification method can improve the accuracy and reduce the time of classification.…”
Get full text
Article