Showing 4,941 - 4,960 results of 67,915 for search 'DASB~', query time: 2.40s Refine Results
  1. 4941

    An Overview of Agent-Based Models for Transport Simulation and Analysis by Jiangyan Huang, Youkai Cui, Lele Zhang, Weiping Tong, Yunyang Shi, Zhiyuan Liu

    Published 2022-01-01
    “…This article presents an overview of the agent-based modeling and simulation approach and its recent developments in transport fields, with the purpose of discovering the advantages and gaps and encouraging more valuable investigations and applications of agent-based models. …”
    Get full text
    Article
  2. 4942

    Modeling the mobile communication service based on PI-calculus by KANG Hui1, ZENG Ying-ying1, LIU Zhi-yong1

    Published 2009-01-01
    “…In order to solve the problem of not interworking the increment service provided by difference services providers in current mobile communication service,mobile communication process were defined as multiple independent Web services.The connection initialization,base station switching and mobile communication process were modeled by using PI-calculus.The PI-calculus expressions were encapsulated and combined.Modeling for PI-calculus can optimize the mobile communication service,and discover problems as soon as possible in the design stage to eliminate repeating business between difference service providers and to ensure their reusability and interoperability.…”
    Get full text
    Article
  3. 4943

    Optimization Design of Diaphragm Profile based on Kriging Model by Geng Hu, Zhigang Chen, Ding Zhang

    Published 2022-07-01
    “…After analyzing the structure of the diaphragm profile and the feature of the high-cycle fatigue stress for the diaphragm under various loads,the sample data of the high-cycle fatigue safety factors for groups of diaphragm profile parameters (including outside/inside radius ratio,profile index and minimum thickness) are obtained,and an initial Kriging model is then constructed on the basis of these sample data. …”
    Get full text
    Article
  4. 4944

    Adaptive Setting Policy for Microcomputer Based Protection Systems by Jenwang He, Vanjing Xiu, A. G. Shpuntova

    Published 2004-08-01
    “…The paper analyses a problem pertaining to improvement of selectivity of microcomputer based protection systems for power transmission lines. …”
    Get full text
    Article
  5. 4945

    Towards checking consistency and completeness of legal knowledge bases by Sigita Sinkevičiūtė

    Published 1998-12-01
    “… The paper considers consistency and completeness requirements for rule-based knowledge bases (KB) and their verification and validation (V&V) methods, discusses specific features of legal KB. …”
    Get full text
    Article
  6. 4946
  7. 4947

    Conflict evidence combination method based on clustering weighting by Yu DONG, Youpeng ZHANG

    Published 2023-03-01
    “…Aiming at the failure of the combination of highly conflicting evidence, the combination of the relationship between evidences and the characteristics of evidence itself was considered, and a method of conflicting evidence combination based on clustering weighting was proposed.Firstly, the similarity coefficient was constructed to cluster the evidence, and the inter-class weight was determined by class capacity to reflect the differences among classes.Then the information entropy was used to obtain the intra-class weight of each evidence.The modified weight of the evidence was obtained by combining the inter-class weight and intra-class weight.Finally, the conflict evidence was modified according to the weight, and the combination rule of evidence theory was used to achieve the final synthesis of the modified evidence.The results of the example show that the proposed method can reasonably carry out evidence correction, and the combined results have better focusing effect than other methods.…”
    Get full text
    Article
  8. 4948

    Dependable identity recognition and authorization based on visual information by Chunlei PENG, Xinbo GAO, Nannan WANG, Jie LI

    Published 2020-11-01
    “…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
    Get full text
    Article
  9. 4949
  10. 4950

    Verifiable outsourced attribute-based encryption with access update by Suqing LIN

    Published 2019-02-01
    Subjects: “…attribute-based encryption…”
    Get full text
    Article
  11. 4951

    Software Project Risk Identification Based on Scrum Artifacts by Lina Bisikirskienė, Lina Čeponienė, Gytis Vilutis, Adelė Nečionytė

    Published 2025-01-01
    “…The framework encompasses automated data collection from project management environments, such as Jira, thus minimizing the effort required from the project team for risk-related data gathering. …”
    Get full text
    Article
  12. 4952
  13. 4953
  14. 4954

    Classification of diabetic retinopathy stages based on neural networks by M. M. Lukashevich, Y. I. Golub

    Published 2022-12-01
    “…The development of methods and algorithms for the detection and classification of this disease, the automation of this process are the actual and costeffective goals.The article focuses on the classification of the stages of diabetic retinopathy using neural networks based on human retinal images. Classification problem of diabetic retinopathy stages is described.The architecture of deep neural networks based on VGG16 and VGG19 with the addition of custom layers is proposed. …”
    Get full text
    Article
  15. 4955
  16. 4956

    Reservation-based traffic management for autonomous intersection crossing by Myungwhan Choi, Areeya Rubenecia, Hyo Hyun Choi

    Published 2019-12-01
    “…Our scheme is made more practical by allowing the vehicles to move at any speed within a speed range, and it is shown that it is fast enough to be used in real time. Through simulation, it is also shown that our scheduling scheme significantly outperforms the first-come, first-served approach, which is the approach used by other reservation-based scheduling schemes.…”
    Get full text
    Article
  17. 4957

    Discrete propagation model of CDC-based benign worms by LIU Yong1, ZHOU Han-sun3, LIU Tie3, SUN Dong-hong4

    Published 2007-01-01
    “…According to the idea of constructing CDC(center for disease control),the characteristics of CDC-based benign worms was analyzed.Furthermore,the process of CDC-based benign worms countering against worms was mod-eled.Finally,the model was simulated.From the simulation,two important factors which affect CDC-based benign worms countering against worms was summarized.…”
    Get full text
    Article
  18. 4958
  19. 4959

    Oblivious transfer based on physical unclonable function system by Yuan-bo GUO, Zi-nan ZHANG, Kui-wu YANG

    Published 2013-08-01
    “…According to the analysis of physical un-clonable function, a physical unclonable function system framework was defined, and a novel oblivious transfer (POT, PUFS based OT) protocol was proposed based on this framework. …”
    Get full text
    Article
  20. 4960

    AONT-and-NTRU-based rekeying scheme for encrypted deduplication by Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI

    Published 2021-10-01
    “…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
    Get full text
    Article