Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4441
Continuous speech speaker recognition based on CNN
Published 2017-03-01“…In the last few years, with the constant improvement of the social life level, the requirement for speech recognition is getting higher and higher. …”
Get full text
Article -
4442
Synthesis of Vibration Waves Based on Wavelet Technology
Published 2012-01-01“…Theoretically, for non-stationary (such as seismic) process synthesis, it has a better non-stationarity in time-frequency domain than the traditional trigonometric series. …”
Get full text
Article -
4443
Dens Evaginatus: A Problem-Based Approach
Published 2015-01-01“…Case Reports in Dentistry…”
Get full text
Article -
4444
Permission clustering-based attribute value optimization
Published 2021-08-01“…In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be applied in access control system straightly.To solve the optimization problem of nominal attributes, a novel algorithm of attribute value optimization based on permission clustering was designed, in which entities were presented by the privilege set related to them.So that the entities were tagged by density-based clustering method with distances of their privilege set presentations.Then the attribute values were reduced and corrected based on rough set theory.Finally, the algorithm was verified on UCI data sets, which proved that after applying it, ABAC policy mining was improved in the evaluation criteria, such as the true positive rate and F1-score.…”
Get full text
Article -
4445
Efficient ID-based certificateless signature scheme
Published 2008-01-01Subjects: “…ID-based signature…”
Get full text
Article -
4446
Social-based routing in pocket switched networks
Published 2015-05-01“…In pocket switched network,how to make effective balance between the message delivery ratio and transmis-sion delay is a problem to be solved.A community-based PSN routing algorithm,named BridgingCom,is proposed.It uses local community detection method with aging mechanism and introduces the bridging centrality as the basis of for-warding decisions.The algorithm combines the analysis of node centrality with the structure of social mobile network,makes full use of the community relationship and activeness of nodes in PSN.Simulation results show that BridgingCom routing algorithm has better performance in the message delivery ratio and message average delay compared to a number of previously proposed algorithms.…”
Get full text
Article -
4447
Hybrid Cryptography Based on Planets: Phobos & Deimos
Published 2025-01-01“…The approach involves dividing the alphabet into groups and applying shifting techniques based on Deimos’ positions, enhancing data security through increased complexity. …”
Get full text
Article -
4448
Interpretability of Composite Indicators Based on Principal Components
Published 2022-01-01Get full text
Article -
4449
Efficient fuzzy attribute-based signcryption scheme
Published 2013-08-01“…By using secret sharing model and bi-linear pairs, an efficient fuzzy attribute-based signcryption scheme was presented, and based on DMBDH and CDH prob-lem, the confidentiality and unforgeability of the scheme were proved. …”
Get full text
Article -
4450
Initialization Methods for FPGA-Based EMT Simulations
Published 2024-01-01“…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. Case study shows Method 2–4 can both initialize successfully on FPGA platform, while Method 4 achieves the best timing and routing performance. …”
Get full text
Article -
4451
Attribute-based encryption schema with group signatures
Published 2019-02-01Subjects: “…attribute-based encryption…”
Get full text
Article -
4452
Networking as the basis of flexible dynamic development of universities
Published 2022-05-01Get full text
Article -
4453
Relay-based resource allocation in cognitive networks
Published 2011-11-01“…Based on the optimal pairing the subcarriers of uplink and downlink,a spectrum resource allocation algorithm was proposed according to the subcarrier characteristics of the uplink and downlink in cognitive relay networks.The algorithm allocated the subcarriers in downlink according to the difference of subchannel gains.It assigned the subcarriere in uplink to minimize the power of every source nodes and relay nodes,and distributed the bits and powers of all subcarriers to satisfy the immediate request.It could decrease the power transmitted and increase the throughput of the system.The simulation results show that the algorithm proposed reduces the per bit power by 1.5~3 dBμW and improve the performance by one order of magnitude in bit error rate compared with the heuristic centralized scheme and distributed feedback-assisted-transmit power allocation algorithm.…”
Get full text
Article -
4454
Natural Human Freedoms as the Basis of Legal Regulation
Published 2023-06-01“…Instead, it is proposed to build a concept based on the biological characteristics of the human body. …”
Get full text
Article -
4455
Review of Roundabout Capacity Based on Gap Acceptance
Published 2019-01-01“…The calculation values show a very small difference between these kinds of models. The capacity value based on the critical gap of stochastic function is more realistic and more complex in function style. …”
Get full text
Article -
4456
Privacy protection system based on Hook for Android
Published 2018-04-01“…A privacy protection system based on Hook technology was designed and implemented to address the problem of user privacy leakage caused by malicious applications in Android.The system consists of three modules:application classification module,privacy information management module and collusion attack management module.The application classification module constructs classification model by using permission feature vectors and then classifies mobile applications into malicious applications and normal applications.The privacy information management module hooks all privacy-related application programming interfaces (API) based on Hook technology and then intercepts malicious applications by returning false data or empty data.The collusion attack management module hooks all inter-application communication channels and then intercepts corresponding communication contents by using the permission rules of collusion attack.Finally,the proposed privacy protection scheme on Android virtual machine was implemented to prove and its feasibility and effectiveness were proved.In addition,the system can intercept application behaviors of breaching privacy in real time with less memory,which does not need to modify Android system and applications.…”
Get full text
Article -
4457
Mobile Robot Localization Based on Vision and Multisensor
Published 2020-01-01“…First, the preprocessing part of the observation data includes tracking of the image data and the odometer data, and preintegration of IMU data. …”
Get full text
Article -
4458
Polyol-based Synthesis of Praseodymium Oxide Nanoparticles
Published 2014-03-01Get full text
Article -
4459
Piecewise histogram equalization based image enhancement
Published 2011-01-01“…Piecewise histogram equalization(Piecewise HE) was proposed,which combines the benefits of contrast stretching and existing histogram equalization.The swallow of saturation and brightness is avoided in the enhanced image by a piecewise linear mapping function,which combines with the mean and standard deviation of the histogram,and the parameters selection of Piecewise HE is explored when over-enhancement existed.The experimental results have demonstrated that the proposed method can enhance the images effectively,which avoids the swallow and over-enhancement problems of the existing histogram equalization methods.The proposed method not only preserves the original details,but also has a more natural visual effect in the enhanced image.…”
Get full text
Article -
4460
On the ethics of multilevel marketing based on dietary supplements
Published 2024-11-01“…Recommendations include increased company transparency, stricter regulations, and ethical alternatives such as eliminating recruitment-based structures. …”
Get full text
Article