Showing 4,861 - 4,880 results of 67,915 for search 'DASB~', query time: 2.30s Refine Results
  1. 4861
  2. 4862

    Grouping based calculus for propositional linear temporal logic by Kostas Ragauskas, Adomas Birštunas

    Published 2024-12-01
    “… In this paper, the authors research the problem of loops in linear temporal logic PLTL. The task involves defining the standard rule application process for the derivation procedure (as used in [4] and [5]), determining and proving properties for the absence of a loop beneath some sequent, and creating a new calculus G*TL, which uses the proposed sequent grouping method, along with the method of marks (similar marking concepts were proposed in  [5] and [6]). …”
    Get full text
    Article
  3. 4863

    Multiple topics evolution model based on similarity of interference by Yefei CHEN, Xuejun ZHANG, Weidong HUANG

    Published 2017-09-01
    “…The current researches of evolution model mainly focus on the spread of the individual topics,rarely considering the influential factors between multiple topics.A new topic evolution model was proposed by considering the interference among topics based on SIR model,which characterized by the influence of the similarity of the topic on the probability of propagation.The experimental results show that within the critical value,the similarity degree of positive and negative trends enhance or hinder the process of topic evolution,and the degree of action varies with the degree of interference nodes,which is expressed as evolutionary consistency under positive similarity and the evolutionary separability under negative similarity.When the critical value is exceeded,the effect of strengthening or hindering tends to saturation.…”
    Get full text
    Article
  4. 4864

    Power analysis attack of HMAC based on SM3 by Zhi-bo DU, Zhen WU, Min WANG, Jin-tao RAO

    Published 2016-05-01
    “…The current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the limitations of the current attack methods,a novel method of the power analysis attack of HMAC based on SM3 was proposed.The different attack object and their related va-riables were selected in each power analysis attack.The attacks were implemented according to the Hamming distance mod-el or Hamming weight model of the intermediate variables.After several power analysis attacked on the first four rounds of SM3,the equations that consists of the results proposed of all the power analysis attacks were obtained.The ultimate attack object is derived by getting the solution of the equations.The experimental results show that the oposed attack method was effective.The method can be used universally because its being available for both the situation of co-exist of hamming weight with Hamming distance,and that of either the Hamming weight or choosing the Hamming distance model existence.…”
    Get full text
    Article
  5. 4865

    Quantifying the Robustness of Countries’ Competitiveness by Network-Based Methods by Ming-Yang Zhou, Xiao-Yu Li, Wen-Man Xiong, Hao Liao

    Published 2018-01-01
    “…The simulation results show that China suffers much in the trade conflict, while USA loses very little and has strong robustness in this conflict.…”
    Get full text
    Article
  6. 4866

    Resilience Based on Community-Oriented Capacities in Crisis Conditions by Mohammad Jalali, Mahdi Mahmoodzadeh Vashan, Nour Mohammad Yaghoubi, Mohammad Mohammadi

    Published 2024-12-01
    “…Therefore, the current research seeks to identify the factors affecting resilience based on community-oriented capacities in crisis situations using the meta-synthesis method and finally presenting a model in this field.Case studyThe statistical population of this research includes all articles published in domestic and foreign scientific databases between 2000 and 2023, and finally 56 studies that were closely related to the subject under study were selected as a sample.Materials and Methods The research is of an applied type with an exploratory nature, in order to collect data, a meta-synthesis method was used. …”
    Get full text
    Article
  7. 4867

    In-loop filter algorithm based on content pre-analysis by LU Wen, GAO Xin-bo, HE Li-huo, ZHANG Hua

    Published 2009-01-01
    “…Traditional block-based video coders suffered from annoying blocking artifacts in low bit-rate coding.Aiming to high complexity for determining the block edge strength of deblocking filter,a fast in-loop deblocking filter based on content pre-analysis was proposed,which utilized STGS-image to partition character of different regions and measured the block effect intension in blockwise based on optical flow equation and relativity of interframe.Experimental results show that the proposed greatly reduces the complexity of filter algorithm,and then the subjective image quality of the proposed is approximate to that of the H.264 in-loop filter.…”
    Get full text
    Article
  8. 4868

    Charge-Based Compact Modeling of OECTs for Neuromorphic Applications by Ghader Darbandy, Malte Koch, Lukas M. Bongartz, Karl Leo, Hans Kleemann, Alexander Kloes

    Published 2025-01-01
    “…We fabricated, characterized, and analyzed OECTs based on PEDOT:PSS, and the proposed compact model shows good agreement with our experimental data.…”
    Get full text
    Article
  9. 4869
  10. 4870

    Ustor: cloud storage system based on regenerating codes by Qing LIU, Dan FENG, Bai LI

    Published 2014-04-01
    “…To ensure reliability of user's data, multiple clouds are responsible for storing the data. …”
    Get full text
    Article
  11. 4871

    Range matching method based on TCAM:C-TCAM by Guo-sheng ZHU, Shao-hua YU

    Published 2012-01-01
    “…A new TCAM range matching method called C-TCAM(compressed TCAM) was proposed.Firstly C-TCAM could compress two expanded TCAM entries into one and the expansion factor of w-1 and w-2 respectively in the worst case.Secondly,a new TCAM matching algorithm to lower down the power dissipation was designed by avoiding matching of unnessary TCAM entries.Analysis and simul ion showed that C-TCAM gets advantages over other schemes in TCAM space efficiency and power dissipation.…”
    Get full text
    Article
  12. 4872

    BANDITRY AND GENDER-BASED VOLIENCE IN NORTH-WEST NIGERIA by Simon Nankap KUMS, Cornelius Ishaya KWEDE

    Published 2023-08-01
    “…This emerging security challenge has threatened the very fabric of the fragile peace the Nigerian State was enjoying; especially, in the Northwest states of Zamfara, Kaduna, Katsina, etc. …”
    Get full text
    Article
  13. 4873
  14. 4874

    Blind recognition of STBC based on higher-order cumulants by Li-min ZHANG, Qing LING, Wen-jun YAN

    Published 2016-05-01
    “…Aiming at the problems for blind recognition of space-time block code(STBC)in MIMO communication sys-tems,a method was exploited based on higher-order cumulants of received signals.Firstly,the model of received signals was given and the fourth-order cumulants of the received signals in multiple input single output(MISO)systems was ob-tained.Secondly,using the characteristics of coding matrix,it was proved that the fourth-order cumulants in different de-lay vectors presented non-null value that depended on the STBC sat the transmitter side.Finally,a classifier for the STBC was presented based on the Euclid distance between the experimental values of fourth-order cumulants and the theoretical ones.Simulations show that the method performs well even for low signal to noise ratio.…”
    Get full text
    Article
  15. 4875

    Tourism Growth Prediction Based on Deep Learning Approach by Xiaoling Ren, Yanyan Li, JuanJuan Zhao, Yan Qiang

    Published 2021-01-01
    “…In this work, the framework for deep learning-based monthly prediction of the volumes of Macau tourist arrivals was presented. …”
    Get full text
    Article
  16. 4876
  17. 4877

    Evaluation of China’s fertility policy based on PMC modeling by Jie Chen, Yan Gao, Xi Wang, Xi Wang

    Published 2025-02-01
    “…BackgroundThe fertility level has declined to below replacement level in many countries. …”
    Get full text
    Article
  18. 4878

    Performance of Water-Based Liquid Scintillator: An Independent Analysis by D. Beznosko, A. Batyrkhanov, A. Duspayev, A. Iakovlev, M. Yessenov

    Published 2014-01-01
    “…The water-based liquid scintillator (WbLS) is a new material currently under development. …”
    Get full text
    Article
  19. 4879

    Sensing-Based Interaction for Information Navigation on Handheld Displays by Michael Rohs, Georg Essl

    Published 2008-01-01
    “…We compare user performance in an abstract map navigation task and discuss the tradeoffs of the different sensor and visualization techniques.…”
    Get full text
    Article
  20. 4880

    Research on Fault Diagnosis Method Based on Improved CNN by Hu Hao, Feng Fuzhou, Zhu Junzhen, Zhou Xun, Jiang Pengcheng, Jiang Feng, Xue Jun, Li Yazhi, Sun Guanghui

    Published 2022-01-01
    “…To solve these problems, a fault diagnosis method based on an improved convolutional neural network (CNN) is proposed. …”
    Get full text
    Article