Showing 4,441 - 4,460 results of 67,915 for search 'DASB~', query time: 2.74s Refine Results
  1. 4441

    Continuous speech speaker recognition based on CNN by Zhendong WU, Shucheng PAN, Jianwu ZHANG

    Published 2017-03-01
    “…In the last few years, with the constant improvement of the social life level, the requirement for speech recognition is getting higher and higher. …”
    Get full text
    Article
  2. 4442

    Synthesis of Vibration Waves Based on Wavelet Technology by L.H. Zou, A.P. Liu, X. Ma, C. Zhang, K. Huang

    Published 2012-01-01
    “…Theoretically, for non-stationary (such as seismic) process synthesis, it has a better non-stationarity in time-frequency domain than the traditional trigonometric series. …”
    Get full text
    Article
  3. 4443

    Dens Evaginatus: A Problem-Based Approach by A. Ayer, M. Vikram, P. Suwal

    Published 2015-01-01
    “…Case Reports in Dentistry…”
    Get full text
    Article
  4. 4444

    Permission clustering-based attribute value optimization by Wenchao WU, Zhiyu REN, Xuehui DU

    Published 2021-08-01
    “…In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be applied in access control system straightly.To solve the optimization problem of nominal attributes, a novel algorithm of attribute value optimization based on permission clustering was designed, in which entities were presented by the privilege set related to them.So that the entities were tagged by density-based clustering method with distances of their privilege set presentations.Then the attribute values were reduced and corrected based on rough set theory.Finally, the algorithm was verified on UCI data sets, which proved that after applying it, ABAC policy mining was improved in the evaluation criteria, such as the true positive rate and F1-score.…”
    Get full text
    Article
  5. 4445

    Efficient ID-based certificateless signature scheme by LIU Jing-wei, SUN Rong, MA Wen-ping

    Published 2008-01-01
    Subjects: “…ID-based signature…”
    Get full text
    Article
  6. 4446

    Social-based routing in pocket switched networks by AOJiu-xin C, HENGao-jun C, ANGJing Y, HUZi-qing Z, IUBo L

    Published 2015-05-01
    “…In pocket switched network,how to make effective balance between the message delivery ratio and transmis-sion delay is a problem to be solved.A community-based PSN routing algorithm,named BridgingCom,is proposed.It uses local community detection method with aging mechanism and introduces the bridging centrality as the basis of for-warding decisions.The algorithm combines the analysis of node centrality with the structure of social mobile network,makes full use of the community relationship and activeness of nodes in PSN.Simulation results show that BridgingCom routing algorithm has better performance in the message delivery ratio and message average delay compared to a number of previously proposed algorithms.…”
    Get full text
    Article
  7. 4447

    Hybrid Cryptography Based on Planets: Phobos & Deimos by Kraicha Ayoub, Touil Hamza, El Akkad Nabil

    Published 2025-01-01
    “…The approach involves dividing the alphabet into groups and applying shifting techniques based on Deimos’ positions, enhancing data security through increased complexity. …”
    Get full text
    Article
  8. 4448
  9. 4449

    Efficient fuzzy attribute-based signcryption scheme by Xiao-yuan YANG, Zhi-qiang LIN, Yi-liang HAN

    Published 2013-08-01
    “…By using secret sharing model and bi-linear pairs, an efficient fuzzy attribute-based signcryption scheme was presented, and based on DMBDH and CDH prob-lem, the confidentiality and unforgeability of the scheme were proved. …”
    Get full text
    Article
  10. 4450

    Initialization Methods for FPGA-Based EMT Simulations by Xin Ma, Xiao-Ping Zhang

    Published 2024-01-01
    “…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. Case study shows Method 2–4 can both initialize successfully on FPGA platform, while Method 4 achieves the best timing and routing performance. …”
    Get full text
    Article
  11. 4451

    Attribute-based encryption schema with group signatures by Xinglan ZHANG, Yao CUI

    Published 2019-02-01
    Subjects: “…attribute-based encryption…”
    Get full text
    Article
  12. 4452
  13. 4453

    Relay-based resource allocation in cognitive networks by Shi-bing ZHANG, Hao-ye ZHANG, Xue LI, Zhi-hua BAO

    Published 2011-11-01
    “…Based on the optimal pairing the subcarriers of uplink and downlink,a spectrum resource allocation algorithm was proposed according to the subcarrier characteristics of the uplink and downlink in cognitive relay networks.The algorithm allocated the subcarriers in downlink according to the difference of subchannel gains.It assigned the subcarriere in uplink to minimize the power of every source nodes and relay nodes,and distributed the bits and powers of all subcarriers to satisfy the immediate request.It could decrease the power transmitted and increase the throughput of the system.The simulation results show that the algorithm proposed reduces the per bit power by 1.5~3 dBμW and improve the performance by one order of magnitude in bit error rate compared with the heuristic centralized scheme and distributed feedback-assisted-transmit power allocation algorithm.…”
    Get full text
    Article
  14. 4454

    Natural Human Freedoms as the Basis of Legal Regulation by Yu. G. Izotov

    Published 2023-06-01
    “…Instead, it is proposed to build a concept based on the biological characteristics of the human body. …”
    Get full text
    Article
  15. 4455

    Review of Roundabout Capacity Based on Gap Acceptance by Ruijun Guo, Leilei Liu, Wanxiang Wang

    Published 2019-01-01
    “…The calculation values show a very small difference between these kinds of models. The capacity value based on the critical gap of stochastic function is more realistic and more complex in function style. …”
    Get full text
    Article
  16. 4456

    Privacy protection system based on Hook for Android by Xiaoyan ZHU, Hui ZHANG, Jianfeng MA

    Published 2018-04-01
    “…A privacy protection system based on Hook technology was designed and implemented to address the problem of user privacy leakage caused by malicious applications in Android.The system consists of three modules:application classification module,privacy information management module and collusion attack management module.The application classification module constructs classification model by using permission feature vectors and then classifies mobile applications into malicious applications and normal applications.The privacy information management module hooks all privacy-related application programming interfaces (API) based on Hook technology and then intercepts malicious applications by returning false data or empty data.The collusion attack management module hooks all inter-application communication channels and then intercepts corresponding communication contents by using the permission rules of collusion attack.Finally,the proposed privacy protection scheme on Android virtual machine was implemented to prove and its feasibility and effectiveness were proved.In addition,the system can intercept application behaviors of breaching privacy in real time with less memory,which does not need to modify Android system and applications.…”
    Get full text
    Article
  17. 4457

    Mobile Robot Localization Based on Vision and Multisensor by Lina Yao, Fengzhe Li

    Published 2020-01-01
    “…First, the preprocessing part of the observation data includes tracking of the image data and the odometer data, and preintegration of IMU data. …”
    Get full text
    Article
  18. 4458
  19. 4459

    Piecewise histogram equalization based image enhancement by CHEN Wen-fei1, LIAO Bin2, XU Xue-feng3, HUANG Zhi-yong1, DONG Wen-yong1

    Published 2011-01-01
    “…Piecewise histogram equalization(Piecewise HE) was proposed,which combines the benefits of contrast stretching and existing histogram equalization.The swallow of saturation and brightness is avoided in the enhanced image by a piecewise linear mapping function,which combines with the mean and standard deviation of the histogram,and the parameters selection of Piecewise HE is explored when over-enhancement existed.The experimental results have demonstrated that the proposed method can enhance the images effectively,which avoids the swallow and over-enhancement problems of the existing histogram equalization methods.The proposed method not only preserves the original details,but also has a more natural visual effect in the enhanced image.…”
    Get full text
    Article
  20. 4460

    On the ethics of multilevel marketing based on dietary supplements by Edgar Manuel Cambaza, Filipe Francisco Gerente Gustavo, Sebastião Job Cuata, Rajabo Victorino Jamal

    Published 2024-11-01
    “…Recommendations include increased company transparency, stricter regulations, and ethical alternatives such as eliminating recruitment-based structures. …”
    Get full text
    Article