Showing 4,381 - 4,400 results of 67,915 for search 'DASB~', query time: 2.44s Refine Results
  1. 4381
  2. 4382

    New Rough Approximations Based on E-Neighborhoods by Tareq M. Al-shami, Wen Qing Fu, E. A. Abo-Tabl

    Published 2021-01-01
    “…For convenience of use, we also give some useful and easy-to-understand examples and make a comparison between our approximations and those in the published literature.…”
    Get full text
    Article
  3. 4383

    Service substitution method based on composition context by Hai-yan WANG, Si-rui LI

    Published 2014-09-01
    “…With the variety of requirements from service requesters and the increasing complexity of network environ-ments,service composition has become more and more complicated.In order to decrease redundant information of the substituted service and improve the accuracy of service substitution,the composition context was regarded as the match-ing criteria and tried to substitute failed service with the following two steps.First,a composition context information collecting algorithm (CCICA) was proposed based on the color petri net model of the service workflow,and regarded the composition context as the collecting source of service information.Second,a levenshtein distance-based service substi-tution method (LDBSSM) was given,which was integrated with dependencies between service interfaces.Simulation re-sults show that the proposed LDBSSM method is practical because it can not only reduce redundancy of substituted ser-vice information but also effectively improve the accuracy of service substitution.…”
    Get full text
    Article
  4. 4384

    Neural network-based link prediction algorithm by Yonghao PAN, Hongtao YU, Shuxin LIU

    Published 2018-07-01
    “…To improve the difference existed in the link prediction accuracy and adaptability of different topology structure similarity based methods,a neural network-based link prediction algorithm,which fused similarity indices by neural network was proposed.The algorithm uses neural network to study the numerical characteristics of different similarity indices,and uses particle swarm optimization to optimize the neural network,and calculates the fusion index by the optimized neural network model.The experiment on the real network data set shows that the prediction accuracy of the algorithm is obviously higher than that before the fusion,and the accuracy is better than the existing methods.…”
    Get full text
    Article
  5. 4385

    Bearing Fault Diagnosis based on ACSBP Algorithm by Cheng Jiatang, Xiong Yan

    Published 2017-01-01
    “…The diagnostic results show that the ACSBP algorithm has stronger fault tolerance compared with CSBP and PSOBP models,and can effectively improve the accuracy of bearing fault diagnosis.…”
    Get full text
    Article
  6. 4386

    Time-and-ID-Based Proxy Reencryption Scheme by Kambombo Mtonga, Anand Paul, Seungmin Rho

    Published 2014-01-01
    “…Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. …”
    Get full text
    Article
  7. 4387

    User-habit based early warning of worm by WANG Ping, FANG Bin-xing, YUN Xiao-chun, PENG Da-wei

    Published 2006-01-01
    “…On the burst-out of massive worm,the overwhelming flow caused by random scanning would temporarily alter the behavior representation of users.Therefore,it was consequently reasonable to conclude that statistics and classify the user habit would certainly help in the detection of worm efficiently.The behavior of user was analyzed deeply,a new approach for early warning of worms was proposed,and a user-based early warning system was realized.Because of the diversity of user habit,several application models can be derived from the model,it has strong direction signification.…”
    Get full text
    Article
  8. 4388

    Market-based pricing for road freight transportation by A. A. Aksentev

    Published 2022-01-01
    “…A differentiated approach has been justified, requiring enterprises to be divided into revenue growth groups in order to identify differences in profitability and its sustainability. …”
    Get full text
    Article
  9. 4389

    Graphene-based Electronically Tuneable Microstrip Attenuator by L. Pierantoni, D. Mencarelli, M. Bozzi, R. Moro, S. Bellucci

    Published 2014-06-01
    “…This paper presents the design of a graphene- based electronically tuneable microstrip attenuator operating at a frequency of 5 GHz. …”
    Get full text
    Article
  10. 4390

    Design and Implementation of Multifunction Relay Based on Microcontroller by Ali Abdulsattar Hameed, Ahmed Jasim Sultan, Mehdi F. Booneya

    Published 2021-09-01
    “…The multi-function relay which is designed can work as (OCR, OVR/UVR, DFR) in the case of a single-phase source. The experiential results show that the proposed multi-function relay is accurate, fast response, reliable, selective, good performance, low cost, and sensitivity when used to protect the power system equipment under different operating conditions. …”
    Get full text
    Article
  11. 4391

    Legal and Institutional Bases of Functioning of the Eurasian Union by V. M. Malinovskaya

    Published 2012-08-01
    “…In these purposes the analysis legal and institutional bases of functioning of the Eurasian union which participants at the present moment are the Republic Belarus, the Republic of Kazakhstan and the Russian Federation will be carried out. …”
    Get full text
    Article
  12. 4392
  13. 4393
  14. 4394
  15. 4395

    A Function Private Attribute-Based Encryption by Fei Han, Jing Qin

    Published 2014-01-01
    “…They constructed a function private identity-based encryption that contains equality functionality. …”
    Get full text
    Article
  16. 4396

    Approximate algorithm for median query based on WSN by LIU Cai-ping1, MAO Jian-xu2, LI Ren-fa1, FU Bin1

    Published 2011-01-01
    “…An approximate algorithm for median query(AAMQ) based on WSN was proposed.In AAMQ,each node could estimate the value of the distinct number,and created a subsequence samples which get K percent of the most com-monly used values in its own observed values,and then broadcasted its subsequence to the parents.Finally,these samples were combined to a single sample in the root node which its data structure was far smaller than the size of the whole data set.The approximate value for median query could be introduced from the sample quickly.Experimental results show that the proposed algorithm can greatly reduce the communication,has the advantages of low error range,and is able to significantly prolong system life.…”
    Get full text
    Article
  17. 4397
  18. 4398

    User interests-based microblog tracing algorithm by Xiao YANG, Xiuzhen CHEN, Jin MA, Haozhe LIANG, Shenghong LI

    Published 2020-12-01
    “…Microblog information tracing refers to finding the source set of microblog topics according to the analysis of crawled microblog texts and it’s of great significance in the aspect of public opinion control and information security.A user interests-based tracing method (ITM) was proposed.The proposed method calculates the influence of the blogger based on the interest of the microblog blogger,and also calculates the influence of the commentators based on the interest of the commentators.The ranking algorithm was used to score the blogs according to publication time,notability and influence,and the source of the blogs was traced according to the blog score rank.Experimental results show that the accuracy of the proposed algorithm improved about 21% compared with the traditional tracing algorithms.…”
    Get full text
    Article
  19. 4399
  20. 4400