Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4881
Algorithm of route discovery based on distance prediction in MANET
Published 2010-01-01“…A scheme of route discovery was provided based on the distance prediction to destination.Hops table was established to store historical records.The long-range information and instantaneous information were extracted from historical records.The distance to the destination was calculated by weight sum of both long-range information and instantaneous information.By aid of the distance predicted,the optimized parameters of ERS including the initial TTL value,broadcast threshold and step size of ERS were calculated.Simulation results showed that the new scheme significantly improved performance of the protocol under many kinds of simulation scenarios.The routing overhead was saved and the end-to-end delay of the packet was reduced.At the same time,the new scheme was also easy to implement.…”
Get full text
Article -
4882
Robust Schnorr-based subgroup multi-signature scheme
Published 2024-08-01“…The consensus mechanism has been considered as the core technology of blockchain systems. …”
Get full text
Article -
4883
Image recoloring detection based on inter-channel correlation
Published 2022-10-01“…Image recoloring is an emerging editing technique that can change the color style of an image by modifying pixel values.With the rapid proliferation of social networks and image editing techniques, recolored images have seriously hampered the authenticity of the communicated information.However, there are few works specifically designed for image recoloring.Existing recoloring detection methods still have much improvement space in conventional recoloring scenarios and are ineffective in dealing with hand-crafted recolored images.For this purpose, a recolored image detection method based on inter-channel correlation was proposed for conventional recoloring and hand-crafted recoloring scenarios.Based on the phenomenon that there were significant disparities between camera imaging and recolored image generation methods, the hypothesis that recoloring operations might destroy the inter-channel correlation of natural images was proposed.The numerical analysis demonstrated that the inter-channel correlation disparities can be used as an important discriminative metric to distinguish between recolored images and natural images.Based on such new prior knowledge, the proposed method obtained the inter-channel correlation feature set of the image.The feature set was extracted from the channel co-occurrence matrix of the first-order differential residuals of the differential image.In addition, three detection scenarios were assumed based on practical situations, including scenarios with matching and mismatching between training-testing data, and scenario with hand-crafted recoloring.Experimental results show that the proposed method can accurately identify recolored images and outperforms existing methods in all three hypothetical scenarios, achieving state-of-the-art detection accuracy.In addition, the proposed method is less dependent on the amount of training data and can achieve fairly accurate prediction results with limited training data.…”
Get full text
Article -
4884
An RBFNN-Based Direct Inverse Controller for PMSM with Disturbances
Published 2018-01-01“…The simulation example for the position tracking control of PMSM is studied to illustrate the effectiveness and the applicability of the proposed RBFNN-based direct inverse control method.…”
Get full text
Article -
4885
Label-based protection scheme of vTPM secret
Published 2018-11-01“…The virtual trusted platform module (vTPM) played an important role in virtualization of trusted computing.According to security problems of existed vTPM,a protection scheme based on vTPM label was proposed.Firstly,a vTPM label was created for each virtual machine.This label had four main components,signature information,encryption information,measurement information and status information.Then,the security-enhanced vTPM dynamic migration protocol based on vTPM label status information was designed,to ensure the security of vTPM during live migration based on status information of vTPM label.Experiments show that the proposed scheme can protect vTPM secrets effectively and the increased performance cost during live migration is only 19.36%.…”
Get full text
Article -
4886
Study on spectral representation and eigenexpansion based on eigen-operators
Published 2020-05-01“…The spectral representation and expansion based on eigen-operators were deeply studied.The relations between Green’s function of characteristic differential equation and Hermitian differential and integral operators were given.The inverse relations between Hermitian differential operator and Hermitian integral operator were also studied.The spectral representation of Hermitian differential operators was given.It was also shown that the S-L eigen-equation cannot be used to realize the spectral representations of infinite dimensions in a finite interval.The method is much simpler and clearer than that of Neumann,and has advantages.The eigen-expansion (eigen-decomposition) of the Hermitian integral operator was given,which has the advantages of theoretical generality and comprehensiveness.The incorrect discussion in Wang et al<sup>[2]</sup>was correct that it is used to study the representation of characteristic spectrum.The physical and geometric meanings of naming for the long spherical wave function in optimal eigen-expansion were given.…”
Get full text
Article -
4887
Future network experiment platform based on SDN/NFV
Published 2017-04-01“…According to the characteristics of SDN/NFV,the future network experiment platform based on SDN/NFV was proposed.The open source architecture of OpenStack and OpenDaylight was used,and the SDN cross-domain communication system,virtual network element management and network service orchestration were researched.Real-time dynamic management and effective sharing of the underlying heterogeneous resources were achieved.At the same time,according to the needs of the experimental users of the network resources,various network resources and SFC service was flexibly orchestrated and end-to-end network experimental verification services were provided to users.…”
Get full text
Article -
4888
Condition Identification of Gears based on CEEMDAN Energy Entropy
Published 2018-01-01“…The Ensemble Empirical Mode Decomposition(EEMD) often encounters two difficulies in removing the added white noise residing in extracted components and easy production of spurious modes. Aiming at the deficiencies in the EEMD,the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise(CEEMDAN) is introduced to examine gearbox fault data and a method for condition identification of gearboxes based on CEEMDAN energy entropy is proposed. …”
Get full text
Article -
4889
Research on Palmprint Identification Method Based on Quantum Algorithms
Published 2014-01-01Get full text
Article -
4890
SDN self-protection system based on Renyi entropy
Published 2021-06-01“…Aiming at the abnormal behaviors in SDN architecture, a self-protection system based on Renyi entropy that implemented a set of detection, diagnosis and defense method of SDN abnormal behaviors was proposed.The system did not need to introduce the third-party measurement equipment, and directly used the flow table information of OpenFlow switches.Firstly, the abnormal network behavior was detected by calculating the characteristic entropy.Then, the information of the OpenFlow flow table was further analyzed to realize the diagnosis of abnormal behavior.Finally, a blacklist mechanism was established.And the system added the hosts with abnormal behavior to the blacklist and blocked the corresponding abnormal traffic.In order to verify the effectiveness of the system, a prototype was developed on the Floodlight controller.The simulation results on Mininet show that the system can effectively detect, diagnose and defend the abnormal behaviors.The system has low deployment cost, which enhances the security of SDN.…”
Get full text
Article -
4891
Visualizing Spatially Based Data for Various Stakeholder Audiences
Published 2014-08-01“…AEC499/WC163: Visualizing Spatially Based Data for Various Stakeholder Audiences (ufl.edu) …”
Get full text
Article -
4892
Research and application of media streams based on entropy and FAHP
Published 2020-04-01“…Aiming at the problem of end-to-end user perception evaluation method for mobile internet media streams was still vacant,a method based on entropy and fuzzy hierarchy was proposed to evaluate media streams.Firstly,XDR data indicators were processed by box-line graph method.Then,entropy method and fuzzy hierarchy method were used to revise the evaluation.The whole network process of the whole video service was modified from multi-dimension to realize the perception evaluation of the use of mobile internet video users.At the same time,the end-to-end health evaluation of the network was also realized.The results of a series of simulation experiments show that the proposed method can improve the accuracy of media stream evaluation while avoiding one-sided evaluation of a single index.It provids a method and solution for the optimization of the overall internet quality and multi-dimensional network fault location.…”
Get full text
Article -
4893
An improved indoor location algorithm based on linear interpolation
Published 2017-01-01“…Aiming at the shortcomings of heavy workload in the off-line phase,limited positioning accuracy and poor robustness of indoor location fingerprint positioning technology,an improved fingerprint matching algorithm based on linear interpolation was proposed.Compared with the traditional location fingerprint positioning technology,it reduced the overall workload as well as the bad effects caused by muti-path effect.At last,a lab scene was set up to test the positioning performance of this algorithm.It is shown by the test that the average positioning accuracy of this algorithm has been improved by 34.25% compared with that of WKNN method,and the positioning accuracy error ratio of most points to be test is within 0.4 m,the positioning accuracy,robustness and adaptability in environment change were demonstrated.…”
Get full text
Article -
4894
An Efficient Frequency Domain Based Attribution and Detection Network
Published 2025-01-01“…In this paper, we observe that while GMs leave unique artifacts in the frequency domain, they are coupled with the image content. Based on this observation, we propose a novel deep learning-based solution that learns input-adaptive masks to highlight GMs’ artifacts and achieve high accuracy on the synthesized image attribution task. …”
Get full text
Article -
4895
Merger-Based Subscription Query Transport Protocolin DTN
Published 2013-03-01“…DTN is a network mode1 derived from se1f-organizing wire1ess networks.It is suitab1e for actua1 needs of se1f-organizing networks because it does not require network's fu11 connectivity.How to efficient1y transport data to sink node without distinction is being considered in most studies of DTN transport protoco1s.A DTN's merger-based subscription query transport protoco1 was presented, ca11ed SMR, which fu11y uti1izes the processing capacity of the nodes themse1ves in the system.Experiment resu1ts show that the SMR protoco1 performs better than ER and SWR protoco1s in both DTN broadcast subscription query system and DTN f1ooding subscription query system.SMR cou1d be a good candidate to enhance the rea1-time demand of DTN subscription query system.…”
Get full text
Article -
4896
Kernel distribution density estimation based on cross-validation
Published 2000-12-01“…Parameter selection method based on cross-validation technique is analyzed. …”
Get full text
Article -
4897
Magnetic and Transport Properties Based on Transition-Metal Compounds
Published 2014-01-01Get full text
Article -
4898
Research and Implementation of SVDU Simulator Based on Emulation Technology
Published 2021-01-01“…With the development of multiple engineering application requirements, such as configuration verification and operator training, this stimulator has been applied in several virtual security level DCS projects.…”
Get full text
Article -
4899
Experimental of Micropitting Corrosion of Gear based on Profile Modification
Published 2021-10-01Get full text
Article -
4900
Access control policy management based on extended-XACML
Published 2007-01-01“…Based on XACML core specification and XACML administrative policy draft,a decision of XACML policy management permission was reduced to a decision of delegation decision request.The delegation decision request schema was defined.It was described that the process of reducing a policy administration request to a delegation decision request and the decision process of delegation decision request.This method can be used to check if a policy administra-tion request is valid and thereby to implement access control policy management based on extended-XACML.…”
Get full text
Article