Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4521
Copula-based trading of cointegrated cryptocurrency Pairs
Published 2025-01-01“…Abstract This study introduces a novel pairs trading strategy based on copulas for cointegrated pairs of cryptocurrencies. …”
Get full text
Article -
4522
Influence maximization algorithm based on social network
Published 2022-08-01“…The influence maximization (IM) problem asks for a group of seed users in a social network under a given propagation model, so that the information spread is maximized through these users.Existing algorithms have two main problems.Firstly, these algorithms were difficult to be applied in large-scale social networks due to limited expected influence and high time complexity.Secondly, these algorithms were limited to specific propagation models and could only solve the IM problem under a single type of social network.When they were used in different types of networks, the effect was poor.In this regard, an efficient algorithm (MTIM) based on two classic propagation models and reverse influence sampling (RIS) was proposed.To verify the effectiveness of MTIM, experiments were conducted to compare MTIM with greedy algorithms such as IMM, TIM and PMC, and heuristic algorithms such as OneHop and Degree Discount on four real social networks.The results show that MTIM can return a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>(</mo> <mrow> <mn>1</mn><mo>−</mo><mfrac> <mn>1</mn> <mtext>e</mtext> </mfrac> <mo>−</mo><mi>ε</mi></mrow> <mo>)</mo></mrow></math></inline-formula> approximate solution, effectively expand the expected influence and significantly improve the efficiency.…”
Get full text
Article -
4523
PROJECT-BASED TRAINING IN HIGHER MEDICAL EDUCATION
Published 2022-05-01Subjects: Get full text
Article -
4524
Event-Based User Classification in Weibo Media
Published 2014-01-01“…Therefore, classifying the large amount of uncategorized social circles generated in Weibo media automatically from the perspective of events has been a promising task. Under this circumstance, in order to effectively organize and manage the huge amounts of users, thereby further managing their contents, we address the task of user classification in a more granular, event-based approach in this paper. …”
Get full text
Article -
4525
Openstack authentication protocol based on digital certificate
Published 2019-02-01“…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
Get full text
Article -
4526
The Savvy Survey #11: Mail-Based Surveys
Published 2014-02-01“…AEC401/PD075: The Savvy Survey #11: Mail-Based Surveys (ufl.edu) …”
Get full text
Article -
4527
Retina-imitation sampling based binary descriptor
Published 2019-01-01Subjects: Get full text
Article -
4528
Impact of Incretin-Based Therapies on Adipokines and Adiponectin
Published 2021-01-01“…In this review, we propose that incretin-based therapy may function through adipokine modulation that may result in pharmacologic properties beyond their direct antidiabetic effects, resulting in better management of diabetes and diabetes-related complications.…”
Get full text
Article -
4529
High resistance botnet based on smart contract
Published 2021-08-01“…The development and application of blockchain technology makes it possible to build a more robust and flexible botnet command and control channel.In order to better study this type of potential new botnet threats, a highly confrontational botnet model based on blockchain smart contracts-SCBot was proposed.The SCBot model adopts a hierarchical hybrid topology structure, builds a command transmission channel based on smart contracts at the zombie subnet layer, and establishes a credibility evaluation mechanism to determine the authenticity of nodes, and enhances the confrontation of the network from the two major levels of traffic and terminals.The construction of small botnet clusters were simulated, comparative experiments on SCBot's command transmission efficiency and robustness were conducted, and its feasibility in the real environment from the perspective of economic costs was analyzed.Finally, a brief analysis and discussion of the defense strategy of this type of botnet were given.…”
Get full text
Article -
4530
Location privacy protection technology based on KHINN
Published 2016-09-01“…Aiming at the problem that the user’s location privacy may be leaked while users obtain location-based services,mobile terminal and LBS server the ends use k-anonymity mechanisms using the collaborative distributed model.Balanced incremental nearest neighbor (KHINN)query method based on k-anonymity was proposed.When the method structuring anonymous user group in mobile terminal,secure multiparty summation was used to calculate the anchor point to ensure user privacy;when processing the query results,SpaceTwist method based on k-anonymity was used to improve the query privacy and accuracy.Performance analysis and experimental results show that undering the condition of semi trusted or untrusted users between nodes,the proposed method can solve defects of uneven distribution of discovering points around the anchor point in SpaceTwist method and improve the accuracy of the query.…”
Get full text
Article -
4531
Cache of cryptographic key based on query popularity
Published 2023-02-01“…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.…”
Get full text
Article -
4532
Riesz bases and positive operators on Hilbert space
Published 2003-01-01“…It is shown that a normalized Riesz basis for a Hilbert space H (i.e., the isomorphic image of an orthonormal basis in H) induces in a natural way a new, but equivalent, inner product on H in which it is an orthonormal basis, thereby extending the sense in which Riesz bases and orthonormal bases are thought of as being the same. …”
Get full text
Article -
4533
-
4534
On Properties of Pseudointegrals Based on Pseudoaddition Decomposable Measures
Published 2014-01-01“…We mainly discussed pseudointegrals based on a pseudoaddition decomposable measure. Particularly, we give the definition of the pseudointegral for a measurable function based on a strict pseudoaddition decomposable measure by generalizing the definition of the pseudointegral of a bounded measurable function. …”
Get full text
Article -
4535
Research on Spam Filters Based on NB Algorithm
Published 2025-01-01“…As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
Get full text
Article -
4536
IoT sensing technology based on acoustic phase
Published 2018-06-01“…The perception and interaction technology between IoT devices is one of the necessary foundations for the development of the Internet of things.With the growing popularity of multimedia devices,such as smart phones,tablet,and home audio,the speakers and microphones are ubiquitous on these devices which make it possible to the low cost interaction between devices using acoustic signal.The low speed and low frequency physical properties of sound waves make the acoustic-based sensing technology have higher accuracy and lower computation.A phase based measurement method using acoustic signals was proposed,which could be used to measure high precision distance between different mobile devices and sound sources.In a certain range,firstly,the mobile device receives the single frequency acoustic signal transmitted by a sound source.The mobile device uses the sound signal to synchronize the phase between the mobile devices the sound source,and then calculates the distance between the mobile device and the sound source by calculating the phase difference during movement.…”
Get full text
Article -
4537
Service-Aware Algorithm Based on DT-KSVM
Published 2015-11-01“…A novel service-aware method based on decision tree kernel support vector machine(DT-KSVM) algorithm was proposed.A service-aware model was developed by using ReliefF algorithm to extract service characteristics,and proposing the separable degree between samples to simply the service-aware process.Through experiment comparison between this proposed model and traditional one-versus-one SVM method,it is shown that the proposed method has a better service-aware accuracy and time performance.…”
Get full text
Article -
4538
Research on SDN-based cloud security application
Published 2017-05-01“…SDN decoupled the control plane and data plane of traditional network,making the network programmable and simplifying the development of network applications.A comprehensive survey was made to current studies on SDN-based cloud security applications.Based on classification of the applications,the advantages and disadvantages of each application were studied and each category was summarized.What’s more,a service model of cloud security based on SDN was proposed,to overcome the inefficient of current works and integrate security with network service.Lastly,some suggestions about the future development of SDN-based cloud security applications were made.…”
Get full text
Article -
4539
Independent Component Analysis Based on Information Bottleneck
Published 2015-01-01“…Furthermore, via the numerical experiments with the synthetic data, sonic data, and image, ICA is proved to be an edificatory way to solve BSS successfully relying on the information theory. …”
Get full text
Article -
4540
Interactive Visualization Platform Based on MapReduce
Published 2012-09-01“…For dealing with the problem of ocean data's interactive visualization, this paper proposes an interactive visualization platform architecture based on cloud computing. …”
Get full text
Article