Showing 4,521 - 4,540 results of 67,915 for search 'DASB~', query time: 2.78s Refine Results
  1. 4521

    Copula-based trading of cointegrated cryptocurrency Pairs by Masood Tadi, Jiří Witzany

    Published 2025-01-01
    “…Abstract This study introduces a novel pairs trading strategy based on copulas for cointegrated pairs of cryptocurrencies. …”
    Get full text
    Article
  2. 4522

    Influence maximization algorithm based on social network by Xuan WANG, Yu ZHANG, Junfeng ZHOU, Ziyang CHEN

    Published 2022-08-01
    “…The influence maximization (IM) problem asks for a group of seed users in a social network under a given propagation model, so that the information spread is maximized through these users.Existing algorithms have two main problems.Firstly, these algorithms were difficult to be applied in large-scale social networks due to limited expected influence and high time complexity.Secondly, these algorithms were limited to specific propagation models and could only solve the IM problem under a single type of social network.When they were used in different types of networks, the effect was poor.In this regard, an efficient algorithm (MTIM) based on two classic propagation models and reverse influence sampling (RIS) was proposed.To verify the effectiveness of MTIM, experiments were conducted to compare MTIM with greedy algorithms such as IMM, TIM and PMC, and heuristic algorithms such as OneHop and Degree Discount on four real social networks.The results show that MTIM can return a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>(</mo> <mrow> <mn>1</mn><mo>−</mo><mfrac> <mn>1</mn> <mtext>e</mtext> </mfrac> <mo>−</mo><mi>ε</mi></mrow> <mo>)</mo></mrow></math></inline-formula> approximate solution, effectively expand the expected influence and significantly improve the efficiency.…”
    Get full text
    Article
  3. 4523
  4. 4524

    Event-Based User Classification in Weibo Media by Liang Guo, Wendong Wang, Shiduan Cheng, Xirong Que

    Published 2014-01-01
    “…Therefore, classifying the large amount of uncategorized social circles generated in Weibo media automatically from the perspective of events has been a promising task. Under this circumstance, in order to effectively organize and manage the huge amounts of users, thereby further managing their contents, we address the task of user classification in a more granular, event-based approach in this paper. …”
    Get full text
    Article
  5. 4525

    Openstack authentication protocol based on digital certificate by Zhiqiang ZHU, Renhao LIN, Cuiyun HU

    Published 2019-02-01
    “…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
    Get full text
    Article
  6. 4526

    The Savvy Survey #11: Mail-Based Surveys by Glenn D. Israel, Jessica L. Gouldthorpe

    Published 2014-02-01
    “…AEC401/PD075: The Savvy Survey #11: Mail-Based Surveys (ufl.edu) …”
    Get full text
    Article
  7. 4527
  8. 4528

    Impact of Incretin-Based Therapies on Adipokines and Adiponectin by Habib Yaribeygi, Mina Maleki, Stephen L. Atkin, Tannaz Jamialahmadi, Amirhossein Sahebkar

    Published 2021-01-01
    “…In this review, we propose that incretin-based therapy may function through adipokine modulation that may result in pharmacologic properties beyond their direct antidiabetic effects, resulting in better management of diabetes and diabetes-related complications.…”
    Get full text
    Article
  9. 4529

    High resistance botnet based on smart contract by Hao ZHAO, Hui SHU, Fei KANG, Ying XING

    Published 2021-08-01
    “…The development and application of blockchain technology makes it possible to build a more robust and flexible botnet command and control channel.In order to better study this type of potential new botnet threats, a highly confrontational botnet model based on blockchain smart contracts-SCBot was proposed.The SCBot model adopts a hierarchical hybrid topology structure, builds a command transmission channel based on smart contracts at the zombie subnet layer, and establishes a credibility evaluation mechanism to determine the authenticity of nodes, and enhances the confrontation of the network from the two major levels of traffic and terminals.The construction of small botnet clusters were simulated, comparative experiments on SCBot's command transmission efficiency and robustness were conducted, and its feasibility in the real environment from the perspective of economic costs was analyzed.Finally, a brief analysis and discussion of the defense strategy of this type of botnet were given.…”
    Get full text
    Article
  10. 4530

    Location privacy protection technology based on KHINN by Lijin ZHUANG, Yuyi OU, Jie LING

    Published 2016-09-01
    “…Aiming at the problem that the user’s location privacy may be leaked while users obtain location-based services,mobile terminal and LBS server the ends use k-anonymity mechanisms using the collaborative distributed model.Balanced incremental nearest neighbor (KHINN)query method based on k-anonymity was proposed.When the method structuring anonymous user group in mobile terminal,secure multiparty summation was used to calculate the anchor point to ensure user privacy;when processing the query results,SpaceTwist method based on k-anonymity was used to improve the query privacy and accuracy.Performance analysis and experimental results show that undering the condition of semi trusted or untrusted users between nodes,the proposed method can solve defects of uneven distribution of discovering points around the anchor point in SpaceTwist method and improve the accuracy of the query.…”
    Get full text
    Article
  11. 4531

    Cache of cryptographic key based on query popularity by Wei JIN, Fenghua LI, Ziyan ZHOU, Xiyang SUN, Yunchuan GUO

    Published 2023-02-01
    “…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.…”
    Get full text
    Article
  12. 4532

    Riesz bases and positive operators on Hilbert space by James R. Holub

    Published 2003-01-01
    “…It is shown that a normalized Riesz basis for a Hilbert space H (i.e., the isomorphic image of an orthonormal basis in H) induces in a natural way a new, but equivalent, inner product on H in which it is an orthonormal basis, thereby extending the sense in which Riesz bases and orthonormal bases are thought of as being the same. …”
    Get full text
    Article
  13. 4533
  14. 4534

    On Properties of Pseudointegrals Based on Pseudoaddition Decomposable Measures by Dong Qiu, Chongxia Lu

    Published 2014-01-01
    “…We mainly discussed pseudointegrals based on a pseudoaddition decomposable measure. Particularly, we give the definition of the pseudointegral for a measurable function based on a strict pseudoaddition decomposable measure by generalizing the definition of the pseudointegral of a bounded measurable function. …”
    Get full text
    Article
  15. 4535

    Research on Spam Filters Based on NB Algorithm by Su Shengyue

    Published 2025-01-01
    “…As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
    Get full text
    Article
  16. 4536

    IoT sensing technology based on acoustic phase by Yang LIU, Wuxiong ZHANG, Weidong FANG

    Published 2018-06-01
    “…The perception and interaction technology between IoT devices is one of the necessary foundations for the development of the Internet of things.With the growing popularity of multimedia devices,such as smart phones,tablet,and home audio,the speakers and microphones are ubiquitous on these devices which make it possible to the low cost interaction between devices using acoustic signal.The low speed and low frequency physical properties of sound waves make the acoustic-based sensing technology have higher accuracy and lower computation.A phase based measurement method using acoustic signals was proposed,which could be used to measure high precision distance between different mobile devices and sound sources.In a certain range,firstly,the mobile device receives the single frequency acoustic signal transmitted by a sound source.The mobile device uses the sound signal to synchronize the phase between the mobile devices the sound source,and then calculates the distance between the mobile device and the sound source by calculating the phase difference during movement.…”
    Get full text
    Article
  17. 4537

    Service-Aware Algorithm Based on DT-KSVM by Hao Dong, Hua Qu, Jihong Zhao, Liangjun Chen, Huijun Dai

    Published 2015-11-01
    “…A novel service-aware method based on decision tree kernel support vector machine(DT-KSVM) algorithm was proposed.A service-aware model was developed by using ReliefF algorithm to extract service characteristics,and proposing the separable degree between samples to simply the service-aware process.Through experiment comparison between this proposed model and traditional one-versus-one SVM method,it is shown that the proposed method has a better service-aware accuracy and time performance.…”
    Get full text
    Article
  18. 4538

    Research on SDN-based cloud security application by Jiang-yong SHI, Yue-xiang YANG, Wen-hua LI, Sen WANG

    Published 2017-05-01
    “…SDN decoupled the control plane and data plane of traditional network,making the network programmable and simplifying the development of network applications.A comprehensive survey was made to current studies on SDN-based cloud security applications.Based on classification of the applications,the advantages and disadvantages of each application were studied and each category was summarized.What’s more,a service model of cloud security based on SDN was proposed,to overcome the inefficient of current works and integrate security with network service.Lastly,some suggestions about the future development of SDN-based cloud security applications were made.…”
    Get full text
    Article
  19. 4539

    Independent Component Analysis Based on Information Bottleneck by Qiao Ke, Jiangshe Zhang, H. M. Srivastava, Wei Wei, Guang-Sheng Chen

    Published 2015-01-01
    “…Furthermore, via the numerical experiments with the synthetic data, sonic data, and image, ICA is proved to be an edificatory way to solve BSS successfully relying on the information theory. …”
    Get full text
    Article
  20. 4540

    Interactive Visualization Platform Based on MapReduce by Jialiang Wang, Bo Qin, Jianjian Liu, Ni Liu

    Published 2012-09-01
    “…For dealing with the problem of ocean data's interactive visualization, this paper proposes an interactive visualization platform architecture based on cloud computing. …”
    Get full text
    Article