Showing 4,421 - 4,440 results of 67,915 for search 'DASB~', query time: 2.78s Refine Results
  1. 4421

    Research on IoT device identification based on blockchain by Meijuan CHEN, Xiaorong ZHU

    Published 2018-06-01
    “…Combined blockchain technology with IoT applications,a blockchain-based IoT architecture was proposed,and a blockchain-based IoT identification method was designed.The equipment registration service process and the query service process based on the proposed IoT architecture were illustrated,and the security of the system was analyzed.Finally,based on the proposed network architecture and the identification method,the application in the smart home scenario was given.It can be seen from the two typical cases that the proposed solution can guarantee the security of various applications in the Internet of things.…”
    Get full text
    Article
  2. 4422

    Design and Research of S-Box Based on Dynamic Strategy by Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong, Zhulin An

    Published 2015-11-01
    “…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
    Get full text
    Article
  3. 4423
  4. 4424

    Asynchronous perception algorithm based on energy detection by Pan YU, Bin LI, Cheng-lin ZHAO

    Published 2017-03-01
    “…In the future heterogeneous wireless networks,since primary user (PU) and cognitive secondary user (SU) are not coordinated to be synchronous,it will result in sense timing difference between PU’s transmitter and SU’s receiver.For this asynchronous sense case,a new asynchronous sensing algorithm based on Bayesian estimation theory was proposed.A unified dynamic state space model was first proposed to describe the observable energy relationship with dynamic PU state and unknown timing difference.Then,an iterative estimation scheme was designed using stochastic finite set and the rules of maximum posterior probability.Finally,approximated estimation results were obtained by using a particle filter.The simulation results show that the proposed asynchronous scheme significantly eliminates the uncertainty of the received signal information and thus improves the spectrum sensing performance by obtaining the time difference accurately.…”
    Get full text
    Article
  5. 4425
  6. 4426
  7. 4427

    Wear Resistance of Ni-Based Alloy Coatings by Jinku Yu, Yuehua Wang, XiCan Zhao, Qinyang Li, Qi Qiao, Jia Zhao, Sen Zhai

    Published 2019-01-01
    “…In this paper, nickel-based alloy coatings were deposited on the surface of pure copper by jet electrodeposition. …”
    Get full text
    Article
  8. 4428

    Population-Based Placental Weight Ratio Distributions by Erin M. Macdonald, John J. Koval, Renato Natale, Timothy Regnault, M. Karen Campbell

    Published 2014-01-01
    “…We aimed to establish PWR distributions by gestational age and to investigate whether the PWR distributions vary by fetal growth adequacy, small, average, and large for gestational age (SGA, AGA, and LGA). The data came from a hospital based retrospective cohort, using all births at two London, Ontario hospitals in the past 10 years. …”
    Get full text
    Article
  9. 4429

    Structural basis of a microbial trimethylamine transporter by Chao Gao, Hai-Tao Ding, Kang Li, Hai-Yan Cao, Ning Wang, Zeng-Tian Gu, Qing Wang, Mei-Ling Sun, Xiu-Lan Chen, Yin Chen, Yu-Zhong Zhang, Hui-Hui Fu, Chun-Yang Li

    Published 2025-01-01
    “…TmaT forms a homotrimer structure in solution. Each TmaT monomer has 12 transmembrane helices, and the TMA transport channel is formed by a four-helix bundle. …”
    Get full text
    Article
  10. 4430
  11. 4431

    Manipulator Trajectory Planning based on ADPSO Algorithm by Xiaohong Tang, Yongjian Gong, Nianjiao Wang, Hong Zhang, Leilei Ren

    Published 2022-05-01
    “…Simulation analysis is carried out in Matlab environment, compared with other intelligent algorithms,ADPSO algorithm has better optimization effect and faster optimization timeliness.…”
    Get full text
    Article
  12. 4432

    Label iteration-based clustering ensemble algorithm by HE Yulin, YANG Jin, HUANG Zhexue, YIN Jianfei

    Published 2024-12-01
    “…The existing training strategies for clustering ensemble algorithm are generally conducted based on the same data and different base clustering algorithms and commonly have the limitations of low performance for large-scale data and weak adaptability of consensus function. …”
    Get full text
    Article
  13. 4433

    Ear Recognition Based on Gabor Features and KFDA by Li Yuan, Zhichun Mu

    Published 2014-01-01
    “…We propose an ear recognition system based on 2D ear images which includes three stages: ear enrollment, feature extraction, and ear recognition. …”
    Get full text
    Article
  14. 4434

    Trust chain management model based on recommendation by TIAN Jun-feng, LU Yu-zhen, LI Ning

    Published 2011-01-01
    “…Aiming at the present problem that the trust information was not sufficient when processing the trust com-putation in trust link management,a recommendation based trust chain management model(RTCM) was presented.With the building of the trusted network,considering the factors such as the transition fading,time decay,and weight of the path and so on,the model decreased the time complexity in the search of the trusted paths.Used weighted closeness to combine the recommendation paths,fully considered the trust-related information,and the policy to in-hibit the malicious recommendation was given.Finally,the experiment has shown that this model has improved the trustworthiness of network.…”
    Get full text
    Article
  15. 4435
  16. 4436
  17. 4437

    Competency-and-activity-based Model of Academic Writing by T. S. Putilovskaya

    Published 2018-12-01
    Subjects: “…competency-and-activity-based model…”
    Get full text
    Article
  18. 4438

    Malware detection approach based on improved SOINN by Bin ZHANG, Lixun LI, Shuqin DONG

    Published 2019-12-01
    “…To deal with the problems of dynamic update of detection model and high computation costs in malware detection model based on batch learning,a novel malware detection approach is proposed by combing SOINN and supervised classifiers,to reduce computation costs and enable the detection model to update dynamically with the assistance of SOINN′s incremental learning characteristic.Firstly,the improved SOINN was given.According to the whole alignment algorithm,search the adjusted weights of neurons under all input sequences in the learning cycle and then calculate the average value of all adjusted weights as the final result,to avoid SOINN′s stability under different input sequences and representativeness of original data,therefore improve malware detection accuracy.Then a data preprocessing algorithm was proposed based on nonnegative matrix factor and Z-score normalization to transfer the malware behavior feature vector from high dimension and high order to low dimension and low order,to speed up and avoid overfitting and further improve detection accuracy.The results of experiments show that proposed approach supports dynamic updating of detection model and has a significantly higher accuracy of detecting unknown new samples and lower computation costs than tradition methods.…”
    Get full text
    Article
  19. 4439

    Tax potential of municipalities as the basis of regional budgets by N. Z. Zotikov

    Published 2024-08-01
    “…The research has found that over the past years, with the introduction of  the Tax Code of   the RF, problems of   insufficient tax and non-tax revenues remain for most municipalities, low level of   the tax potential and predominance of   interbudgetary transfers in  their budgets are current. …”
    Get full text
    Article
  20. 4440