Showing 4,481 - 4,500 results of 67,915 for search 'DASB~', query time: 2.84s Refine Results
  1. 4481

    Digital sociology: theoretical and methodological origins and bases by V. Nitsevich

    Published 2019-02-01
    “…The emphasis is made on the presentation of “social information theories” as the basis of digital sociology, while applying an evolutionary approach.…”
    Get full text
    Article
  2. 4482

    Lightweight attention-based SAR ship detector by YU Nanjing, FENG Daquan, ZHU Ying, ZHANG Hengjia, LU Ping

    Published 2024-12-01
    “…Therefore, a lightweight attention-based ship detector (LASD) was proposed. A novel linear hybrid attention module was designed which extracted potential ship features from deep-level space by using global channel attention and local spatial attention. …”
    Get full text
    Article
  3. 4483

    Evidence-based economic policy at the regional level by Elena G. Kropinova, Andrey E. Shastitko

    Published 2024-01-01
    “…This article revisits approaches to regional development by exploring both previously proposed and new policy opportunities for regions facing the greatest challenges in adapting to emerging geo-economic conditions. This revision is based on the methodology of comparative analysis of discrete structural (institutional) alternatives – an essential component for ensuring the necessary evidential level in selecting economic policy instruments, complementing other applied research tools. …”
    Get full text
    Article
  4. 4484

    Modal Analysis of Gearbox based on the Method of ERA by Zhang Lin, Ma Weijin, Huang Bincheng, Ge Yumin, Wen Fang

    Published 2015-01-01
    “…Based on the method of ERA,a system of modal analysis is built,the model of HW25505 TCL gearbox is set up under the Coinv DASP MAS modal analysis module.The relating modal datum are obtained by hammering test of single-input multi- output analysis method,then the state-space equation is established after the analysis of modal datum.The various modal parameters of the gearbox are obtained by order selection and fitting of the datum which extracted through the method of ERA modal parameter identification,and by using modal correlation matrix,the modal test and verification are carried out.Through the comparison with calculating modal,the validity and reliability are proved.The theoretical basis for the improvement of the gear box structure characteristics and the fault diagnosis of gearbox is provided.…”
    Get full text
    Article
  5. 4485

    The Implementation of Contrastive Analysis-Based Arabic Learning by Raswan Raswan

    Published 2018-12-01
    “…Method of this study covers finding data and sources related to the contrastive analysis in Arabic learning; analyzing the data as well as the sources; and drawing conclusion. …”
    Get full text
    Article
  6. 4486

    Network traffic monitoring based on CNN-SVM by Wu Qian

    Published 2025-01-01
    “…This paper uses CNN to extract features from network traffic data. CNN has the ability to recognize intricate patterns in the data and automatically extract valuable characteristics from the raw data. …”
    Get full text
    Article
  7. 4487
  8. 4488
  9. 4489

    Blind signature scheme based on entangled quantum by Jian-wu LIANG, Xiao-hui WANG, Ying GUO, Zi CHENG

    Published 2016-02-01
    “…Based on the principle of quantum entanglement swapping, a blind signature scheme based on quantum entanglement was proposed.Through being entangled and exchanged, particles prepared before could transform into entangled state. …”
    Get full text
    Article
  10. 4490

    Structure of campus network based on reconfigurable architecture by Hu-sheng YUAN, Hua FENG, Hui LI, Zhi-bin ZHONG, Kai PAN

    Published 2013-09-01
    “…Because of the petrifaction of the existing network,it is difficult to achieve the controllability,adaptability and expansibility in current structure.Simultaneously,in order to have better campus network services in teaching,researching and studying,a new structure based on reconfigurable architecture for campus network was designed based on service set handling capacity of various kinds of business in reconfigurable network as the central idea.After the evolution from tradition to flat structure,a more condensed structure was proposed by adopting virtualization technology on switches and routers.It has the advantages of high performance,high reliability,manageability and augmentability.…”
    Get full text
    Article
  11. 4491

    Recent Progress in Polymer-Based Building Materials by Jingjing Shen, Jianwei Liang, Xinfeng Lin, Hongjian Lin, Jing Yu, Zhaogang Yang

    Published 2020-01-01
    “…In this paper, polymer-based building materials are introduced with three classes according to the applications, that is, substrates, coatings, and binders, and their recent signs of progress in the preparations and applications are carefully demonstrated.…”
    Get full text
    Article
  12. 4492

    On geometric bases for quantum A-polynomials of knots by Dmitry Galakhov, Alexei Morozov

    Published 2025-01-01
    “…To avoid overloading of the presentation, only the case of the colored Jones polynomial for the trefoil knot is considered, though various generalizations are straightforward. …”
    Get full text
    Article
  13. 4493

    Botnet detection based on generative adversarial network by Futai ZOU, Yue TAN, Lin WANG, Yongkang JIANG

    Published 2021-07-01
    “…In order to solve the problems of botnets’ strong concealment and difficulty in identification, and improve the detection accuracy of botnets, a botnet detection method based on generative adversarial networks was proposed.By reorganizing the data packets in the botnet traffic into streams, the traffic statistics characteristics in the time dimension and the traffic image characteristics in the space dimension were extracted respectively.Then with the botnet traffic feature generation algorithm based on generative adversarial network, botnet feature samples were produced in the two dimensions.Finally combined with the application of deep learning in botnet detection scenarios, a botnet detection model based on DCGAN and a botnet detection model based on BiLSTM-GAN were proposed.Experiments show that the proposed model improves the botnet detection ability and generalization ability.…”
    Get full text
    Article
  14. 4494

    Convert communication. A relevance-based approach. by Mª Carmen Merino Ferrada

    Published 2011-04-01
    “… El objetivo fundamental de este trabajo es ofrecer un análisis de la noción de comunicación encubierta desde el marco teórico de la Teoría de la Pertinencia. …”
    Get full text
    Article
  15. 4495

    A senses-based model for experiential tourism by Luca Meacci, Giovanni Liberatore

    Published 2018-10-01
    “…This paper discusses the case of a multisensory criteria model applied to the tourism destination of Fiesole, Italy. …”
    Get full text
    Article
  16. 4496

    Rule and perception based MAC protocol for UAN by Chong LI, Xiujuan DU, Lijuan WANG, Xiaojing TIAN

    Published 2022-02-01
    “…Aiming at the problem of low channel utilization and network throughput resulted by RTS/CTS handshakes in the conventional media access control (MAC) protocol for underwater acoustic network (UAN), a rule and perception based (RP-MAC) MAC protocol was proposed to avoid packet collision in underwater acoustic networks.Only when the designated receiving node was neither in sending nor receiving state, and other neighboring nodes were not in receiving state, a sending node could send one or more packets to the receiving node, which avoided the interaction of handshake control packets while reducing collision and retransmission.The status of the neighbor nodes was sensed according to the channel rules and the fields from the packets overheard.Theoretical analysis and simulation experiments show that the performance of RP-MAC protocol outperforms the Slotted FAMA and R-MAC protocol in terms of throughput and energy-consumption.…”
    Get full text
    Article
  17. 4497

    Network slicing architecture based on SDN and NFV by Qi AN, Yanping LIU, Qian SUN, Lin TIAN

    Published 2016-11-01
    “…The traditional network architecture has some problems such as closed rigid structure,highly restricted data forwarding performance,and low utilization rate of resources,which can't meet the diverse services' requirements.In order to solve these problems,the concept of network slice was introduced.A novel network architecture for future mobile communication was proposed,which is based on network function virtualization(NFV)and software defined networking(SDN).This new network architecture can provide personalized network services to users based on third-party needs,share and isolate of network resources,the cost of a large number of operators was saved in terms of infrastructure.…”
    Get full text
    Article
  18. 4498

    Multichannel Saliency Detection Based on Visual Bionics by Lidan Cheng, Tianyi Li, Shijia Zha, Wei Wei, Jihua Gu

    Published 2020-01-01
    “…The proposed method works within a complexity of O(N), and the experimental results show that our algorithm based on visual bionics effectively suppress the interference of similar or complex background and has high accuracy and stability.…”
    Get full text
    Article
  19. 4499
  20. 4500

    Malware prediction technique based on program gene by Da XIAO, Bohan LIU, Baojiang CUI, Xiaochen WANG, Suoxing ZHANG

    Published 2018-08-01
    “…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
    Get full text
    Article