Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4381
Ethics and Bioethics. Bases for Informed Consent in Orthodontics
Published 2009-12-01Get full text
Article -
4382
New Rough Approximations Based on E-Neighborhoods
Published 2021-01-01“…For convenience of use, we also give some useful and easy-to-understand examples and make a comparison between our approximations and those in the published literature.…”
Get full text
Article -
4383
Service substitution method based on composition context
Published 2014-09-01“…With the variety of requirements from service requesters and the increasing complexity of network environ-ments,service composition has become more and more complicated.In order to decrease redundant information of the substituted service and improve the accuracy of service substitution,the composition context was regarded as the match-ing criteria and tried to substitute failed service with the following two steps.First,a composition context information collecting algorithm (CCICA) was proposed based on the color petri net model of the service workflow,and regarded the composition context as the collecting source of service information.Second,a levenshtein distance-based service substi-tution method (LDBSSM) was given,which was integrated with dependencies between service interfaces.Simulation re-sults show that the proposed LDBSSM method is practical because it can not only reduce redundancy of substituted ser-vice information but also effectively improve the accuracy of service substitution.…”
Get full text
Article -
4384
Neural network-based link prediction algorithm
Published 2018-07-01“…To improve the difference existed in the link prediction accuracy and adaptability of different topology structure similarity based methods,a neural network-based link prediction algorithm,which fused similarity indices by neural network was proposed.The algorithm uses neural network to study the numerical characteristics of different similarity indices,and uses particle swarm optimization to optimize the neural network,and calculates the fusion index by the optimized neural network model.The experiment on the real network data set shows that the prediction accuracy of the algorithm is obviously higher than that before the fusion,and the accuracy is better than the existing methods.…”
Get full text
Article -
4385
Bearing Fault Diagnosis based on ACSBP Algorithm
Published 2017-01-01“…The diagnostic results show that the ACSBP algorithm has stronger fault tolerance compared with CSBP and PSOBP models,and can effectively improve the accuracy of bearing fault diagnosis.…”
Get full text
Article -
4386
Time-and-ID-Based Proxy Reencryption Scheme
Published 2014-01-01“…Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. …”
Get full text
Article -
4387
User-habit based early warning of worm
Published 2006-01-01“…On the burst-out of massive worm,the overwhelming flow caused by random scanning would temporarily alter the behavior representation of users.Therefore,it was consequently reasonable to conclude that statistics and classify the user habit would certainly help in the detection of worm efficiently.The behavior of user was analyzed deeply,a new approach for early warning of worms was proposed,and a user-based early warning system was realized.Because of the diversity of user habit,several application models can be derived from the model,it has strong direction signification.…”
Get full text
Article -
4388
Market-based pricing for road freight transportation
Published 2022-01-01“…A differentiated approach has been justified, requiring enterprises to be divided into revenue growth groups in order to identify differences in profitability and its sustainability. …”
Get full text
Article -
4389
Graphene-based Electronically Tuneable Microstrip Attenuator
Published 2014-06-01“…This paper presents the design of a graphene- based electronically tuneable microstrip attenuator operating at a frequency of 5 GHz. …”
Get full text
Article -
4390
Design and Implementation of Multifunction Relay Based on Microcontroller
Published 2021-09-01“…The multi-function relay which is designed can work as (OCR, OVR/UVR, DFR) in the case of a single-phase source. The experiential results show that the proposed multi-function relay is accurate, fast response, reliable, selective, good performance, low cost, and sensitivity when used to protect the power system equipment under different operating conditions. …”
Get full text
Article -
4391
Legal and Institutional Bases of Functioning of the Eurasian Union
Published 2012-08-01“…In these purposes the analysis legal and institutional bases of functioning of the Eurasian union which participants at the present moment are the Republic Belarus, the Republic of Kazakhstan and the Russian Federation will be carried out. …”
Get full text
Article -
4392
Knowledge-defined intent-based network autonomy
Published 2021-09-01Subjects: “…intent-based network…”
Get full text
Article -
4393
Authentication Scheme Based on Agents for Heterogeneous Cloud
Published 2013-03-01Get full text
Article -
4394
-
4395
A Function Private Attribute-Based Encryption
Published 2014-01-01“…They constructed a function private identity-based encryption that contains equality functionality. …”
Get full text
Article -
4396
Approximate algorithm for median query based on WSN
Published 2011-01-01“…An approximate algorithm for median query(AAMQ) based on WSN was proposed.In AAMQ,each node could estimate the value of the distinct number,and created a subsequence samples which get K percent of the most com-monly used values in its own observed values,and then broadcasted its subsequence to the parents.Finally,these samples were combined to a single sample in the root node which its data structure was far smaller than the size of the whole data set.The approximate value for median query could be introduced from the sample quickly.Experimental results show that the proposed algorithm can greatly reduce the communication,has the advantages of low error range,and is able to significantly prolong system life.…”
Get full text
Article -
4397
EVOLUTION OF THEORETICAL BASES OF THE STATE FISCAL POLICY
Published 2017-02-01Get full text
Article -
4398
User interests-based microblog tracing algorithm
Published 2020-12-01“…Microblog information tracing refers to finding the source set of microblog topics according to the analysis of crawled microblog texts and it’s of great significance in the aspect of public opinion control and information security.A user interests-based tracing method (ITM) was proposed.The proposed method calculates the influence of the blogger based on the interest of the microblog blogger,and also calculates the influence of the commentators based on the interest of the commentators.The ranking algorithm was used to score the blogs according to publication time,notability and influence,and the source of the blogs was traced according to the blog score rank.Experimental results show that the accuracy of the proposed algorithm improved about 21% compared with the traditional tracing algorithms.…”
Get full text
Article -
4399
-
4400
Research progress of access control based on blockchain
Published 2021-12-01Subjects: Get full text
Article