Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4921
Effect of time delay on a detritus-based ecosystem
Published 2006-01-01“…Models of detritus-based ecosystems with delay have received a great deal of attention for the last few decades. …”
Get full text
Article -
4922
School-Based Interventions and Programs to Address Weight Issues
Published 2018-01-01Get full text
Article -
4923
Novel reversible data hiding based on difference expansion
Published 2016-02-01Subjects: “…reversible data hiding…”
Get full text
Article -
4924
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01Subjects: Get full text
Article -
4925
Research on Big Data System of Telecom Based on the Hadoop
Published 2013-03-01Subjects: “…big data…”
Get full text
Article -
4926
Image denoising algorithm based on multi-channel GAN
Published 2021-03-01“…Aiming at the issue that the noise generated during image acquisition and transmission would degrade the ability of subsequent image processing, a generative adversarial network (GAN) based multi-channel image denoising algorithm was developed.The noisy color image could be separated into red-green-blue (RGB) three channels via the proposed approach, and then the denoising could be implemented in each channel on the basis of an end-to-end trainable GAN with the same architecture.The generator module of GAN was constructed based on the U-net derivative network and residual blocks such that the high-level feature information could be extracted effectively via referring to the low-level feature information to avoid the loss of the detail information.In the meantime, the discriminator module could be demonstrated on the basis of fully convolutional neural network such that the pixel-level classification could be achieved to improve the discrimination accuracy.Besides, in order to improve the denoising ability and retain the image detail as much as possible, the composite loss function could be depicted by the illustrated denoising network based on the following three loss measures, adversarial loss, visual perception loss, and mean square error (MSE).Finally, the resultant three-channel output information could be fused by exploiting the arithmetic mean method to obtain the final denoised image.Compared with the state-of-the-art algorithms, experimental results show that the proposed algorithm can remove the image noise effectively and restore the original image details considerably.…”
Get full text
Article -
4927
Dynamic scheduling algorithm for streaming media based on CDN
Published 2009-01-01“…The scheme that the patch bytes were segmented and cached was employed.The cache window size was up-dated periodically according to the popularity of streaming media object.The principle was obeyed that the data cached for each streaming media object were in proportion to their popularity at the proxy server.Simulation results show that the strategy is more adaptive than MBP(multicast batched patching) algorithm and OBP(optimized batch patch-ing)+prefix & patch caching algorithm.It can significantly reduce patching data through patching channel under the cir-cumstance of the same maximum cache space.It can effectively reduce the server load and network bandwidth usage on backbone link.It can also save the transmission cost.…”
Get full text
Article -
4928
Neuroplasticity of Acupuncture for Stroke: An Evidence-Based Review of MRI
Published 2021-01-01“…Magnetic resonance imaging (MRI), as a noninvasive, high anatomical resolution technique, has been employed to investigate neuroplasticity on acupuncture in stroke patients from a system level. …”
Get full text
Article -
4929
Application audit technology based on the combination of cloud and terminal
Published 2018-02-01“…The flourish and popularity of Android terminals have greatly changed the peoples’ daily life and also brought new conditions to the internet Dark Industry Chain.The features of advanced malicious programs on intelligent terminals,and the reasons why an audit method of network activities was needed were discussed.At last,a solution was proposed,including the data collecting,the process of auditing and the management of audit policies.…”
Get full text
Article -
4930
Activatable Porphyrin-Based Sensors, Photosensitizers and Combination Therapeutics
Published 2025-01-01Get full text
Article -
4931
Retracted: Iris Localization Algorithm based on Effective Area
Published 2024-01-01Get full text
Article -
4932
Gamma norm minimization based image denoising algorithm
Published 2020-10-01“…Focusing on the issue of rather poor denoising performance of the traditional kernel norm minimization based method caused by the biased approximation of kernel norm to rank function,based on the low-rank theory,a gamma norm minimization based image denoising algorithm was developed.The noisy image was firstly divided into some overlapping patches via the proposed algorithm,and then several non-local image patches most similar to the current image patch were sought adaptively based on the structural similarity index to form the similar image patch matrix.Subsequently,the non-convex gamma norm could be exploited to obtain unbiased approximation of the matrix rank function such that the low-rank denoising model could be constructed.Finally,the obtained low-rank denoising optimization issue could be tackled on the basis of singular value decomposition,and therefore the denoised image patches could be re-constructed as a denoised image.Simulation results demonstrate that,compared to the existing state-of-the-art PID,NLM,BM3D,NNM,WNNM,DnCNN and FFDNet algorithms,the developed method can eliminate Gaussian noise more considerably and retrieve the original image details rather precisely.…”
Get full text
Article -
4933
Wireless sensor node localization based on IPSO-MC
Published 2020-03-01“…To solve the problem of insufficient node positioning accuracy in wireless sensor networks,an algorithm based on improved particle swarm optimization by membrane computing (IPSO-MC) was proposed.Kent mapping was used to initialize the population and domain particles were introduced to improve the global optimization of the particle swarm.The weight factor and nonlinear extreme value perturbation were used to improve the local optimization ability of the particle swarm,and the Levy flight mechanism was used to optimize the individual position.Finally,the optimal solution of the particle swarm algorithm was obtained by the evolutionary rules of the membrane computing.Simulation experiments show that compared with the chicken flock algorithm,the improved particle swarm algorithm and the membrane computing,the proposed algorithm improves 3.24%,5.12% and 8.15% in the comparison of reference node ratio indicators,and the increase in the number of nodes indicators by 2.26%,7.82% and 9.81%,and the comparison of communication radius indicators increased by 2.15%,5.5% and 7.5%,respectively.This indicates that the algorithm has a good effect in node localization.…”
Get full text
Article -
4934
-
4935
ROBUST OPTIMIZATION DESIGN OF SUSPENSION BASED ON 6σ
Published 2020-01-01“…The results show that the 6σ-based robustness optimization design not only optimizes the performance of the suspension but also has an advantage in terms of reliability.…”
Get full text
Article -
4936
Research on Constraint Violation Elimination based on Projection Method
Published 2022-02-01Get full text
Article -
4937
Intelligent interactive system architecture based on artificial intelligence
Published 2018-12-01“…Networking and intelligentization are the future development directions of interactive service systems.Internet popularization and rich social channels have realistic needs for intelligent interactive services.High-quality and low-cost intelligent interactive solutions have become the main issues that need to be addressed in various industries.Relying on artificial intelligence technology,intelligent means such as intent recognition,semantic understanding,dialogue and judgment were introduced,the integration of scene design and knowledge fragmentation processing technology has brought new means and opportunities for the realization of interactive service intelligence.The problems faced by the existing interactive system were analyzed.On this basis,the key functional elements and system architecture of the intelligent interactive system were designed.…”
Get full text
Article -
4938
Fair and anonymous ID-based multi-receiver signcryption
Published 2013-08-01“…In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.…”
Get full text
Article -
4939
Research status of community detection based on local expansion
Published 2019-01-01“…Community detection can effectively mine the characteristics of the network as well as the hidden information.Local expansion is a commonly used method of community detection,and it can be divided into two steps:the selection of seeds and the local expansion.Therefore,in order to analyze the advantages and disadvantages of the existing methods and their application,these methods about the selection of seeds,local expansion and evaluation were summarized,compared and analyzed.Then,the application and the research difficulties of community detection based on local extension were summarized.Finally,the research directions of community detection based on local expansion were given.…”
Get full text
Article -
4940
Public key searchable encryption scheme based on blockchain
Published 2020-04-01“…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
Get full text
Article