Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4421
Research on IoT device identification based on blockchain
Published 2018-06-01“…Combined blockchain technology with IoT applications,a blockchain-based IoT architecture was proposed,and a blockchain-based IoT identification method was designed.The equipment registration service process and the query service process based on the proposed IoT architecture were illustrated,and the security of the system was analyzed.Finally,based on the proposed network architecture and the identification method,the application in the smart home scenario was given.It can be seen from the two typical cases that the proposed solution can guarantee the security of various applications in the Internet of things.…”
Get full text
Article -
4422
Design and Research of S-Box Based on Dynamic Strategy
Published 2015-11-01“…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
Get full text
Article -
4423
An LSH Based Time Subsequence Matching Algorithm
Published 2015-08-01Subjects: Get full text
Article -
4424
Asynchronous perception algorithm based on energy detection
Published 2017-03-01“…In the future heterogeneous wireless networks,since primary user (PU) and cognitive secondary user (SU) are not coordinated to be synchronous,it will result in sense timing difference between PU’s transmitter and SU’s receiver.For this asynchronous sense case,a new asynchronous sensing algorithm based on Bayesian estimation theory was proposed.A unified dynamic state space model was first proposed to describe the observable energy relationship with dynamic PU state and unknown timing difference.Then,an iterative estimation scheme was designed using stochastic finite set and the rules of maximum posterior probability.Finally,approximated estimation results were obtained by using a particle filter.The simulation results show that the proposed asynchronous scheme significantly eliminates the uncertainty of the received signal information and thus improves the spectrum sensing performance by obtaining the time difference accurately.…”
Get full text
Article -
4425
-
4426
Electrochemical Performance of Ti-Based Commercial Biomaterials
Published 2019-01-01Get full text
Article -
4427
Wear Resistance of Ni-Based Alloy Coatings
Published 2019-01-01“…In this paper, nickel-based alloy coatings were deposited on the surface of pure copper by jet electrodeposition. …”
Get full text
Article -
4428
Population-Based Placental Weight Ratio Distributions
Published 2014-01-01“…We aimed to establish PWR distributions by gestational age and to investigate whether the PWR distributions vary by fetal growth adequacy, small, average, and large for gestational age (SGA, AGA, and LGA). The data came from a hospital based retrospective cohort, using all births at two London, Ontario hospitals in the past 10 years. …”
Get full text
Article -
4429
Structural basis of a microbial trimethylamine transporter
Published 2025-01-01“…TmaT forms a homotrimer structure in solution. Each TmaT monomer has 12 transmembrane helices, and the TMA transport channel is formed by a four-helix bundle. …”
Get full text
Article -
4430
Project Quality Assessment Based on Fuzzy Nodeling
Published 2019-08-01Subjects: Get full text
Article -
4431
Manipulator Trajectory Planning based on ADPSO Algorithm
Published 2022-05-01“…Simulation analysis is carried out in Matlab environment, compared with other intelligent algorithms,ADPSO algorithm has better optimization effect and faster optimization timeliness.…”
Get full text
Article -
4432
Label iteration-based clustering ensemble algorithm
Published 2024-12-01“…The existing training strategies for clustering ensemble algorithm are generally conducted based on the same data and different base clustering algorithms and commonly have the limitations of low performance for large-scale data and weak adaptability of consensus function. …”
Get full text
Article -
4433
Ear Recognition Based on Gabor Features and KFDA
Published 2014-01-01“…We propose an ear recognition system based on 2D ear images which includes three stages: ear enrollment, feature extraction, and ear recognition. …”
Get full text
Article -
4434
Trust chain management model based on recommendation
Published 2011-01-01“…Aiming at the present problem that the trust information was not sufficient when processing the trust com-putation in trust link management,a recommendation based trust chain management model(RTCM) was presented.With the building of the trusted network,considering the factors such as the transition fading,time decay,and weight of the path and so on,the model decreased the time complexity in the search of the trusted paths.Used weighted closeness to combine the recommendation paths,fully considered the trust-related information,and the policy to in-hibit the malicious recommendation was given.Finally,the experiment has shown that this model has improved the trustworthiness of network.…”
Get full text
Article -
4435
Design of Underactuated Manipulator based on Metamorphic Theory
Published 2020-01-01Get full text
Article -
4436
-
4437
Competency-and-activity-based Model of Academic Writing
Published 2018-12-01Subjects: “…competency-and-activity-based model…”
Get full text
Article -
4438
Malware detection approach based on improved SOINN
Published 2019-12-01“…To deal with the problems of dynamic update of detection model and high computation costs in malware detection model based on batch learning,a novel malware detection approach is proposed by combing SOINN and supervised classifiers,to reduce computation costs and enable the detection model to update dynamically with the assistance of SOINN′s incremental learning characteristic.Firstly,the improved SOINN was given.According to the whole alignment algorithm,search the adjusted weights of neurons under all input sequences in the learning cycle and then calculate the average value of all adjusted weights as the final result,to avoid SOINN′s stability under different input sequences and representativeness of original data,therefore improve malware detection accuracy.Then a data preprocessing algorithm was proposed based on nonnegative matrix factor and Z-score normalization to transfer the malware behavior feature vector from high dimension and high order to low dimension and low order,to speed up and avoid overfitting and further improve detection accuracy.The results of experiments show that proposed approach supports dynamic updating of detection model and has a significantly higher accuracy of detecting unknown new samples and lower computation costs than tradition methods.…”
Get full text
Article -
4439
Tax potential of municipalities as the basis of regional budgets
Published 2024-08-01“…The research has found that over the past years, with the introduction of the Tax Code of the RF, problems of insufficient tax and non-tax revenues remain for most municipalities, low level of the tax potential and predominance of interbudgetary transfers in their budgets are current. …”
Get full text
Article -
4440