Showing 4,961 - 4,980 results of 67,915 for search 'DASB~', query time: 2.41s Refine Results
  1. 4961

    Improvement and Optimization of the Structure of the Driving Drum based on ANSYS by Yu Yuzhen, Wang Fei, Dong Xiaolei, Li Li, Liu Liwei

    Published 2016-01-01
    “…According to the result,the structure redesign and lightweight research of the driving drum are carried out,and the lightweight results are verified.Finally,the multi-objective optimization design of the driving drum is carried out by using optimization module of ANSYS Workbench,which provides a theoretical basis for the optimization and improvement of the driving drum structure.…”
    Get full text
    Article
  2. 4962

    Android malware detection method based on combined algorithm by Hao CHEN, Sihan QING

    Published 2016-10-01
    “…A classifier evaluation was presented based on minimum risk Bayes. Using the new one as the core, the optimal classifier results was got by assignment. …”
    Get full text
    Article
  3. 4963

    Scheme of Attribute-Based Disclosure Mobile Trust Negotiation by Qiuyun Wang, Wenbao Jiang, Hong Wang

    Published 2013-10-01
    “…For it is difficult to use traditional trust negotiation on the mobile environment,which has large communication overhead,storage overhead and computational overhead,an attribute-based disclosure mobile trust negotiation scheme was proposed.In the negotiation process,two sides in trust negotiation exchange certificate which contains encrypted credential attributes firstly,then,one side in trust negotiation can selectively dispose the sensitive attributes to the other side in trust negotiation procedure based on the trust evaluation result of the other,next,two sides in trust negotiation exchange attribute encryption key based on personal security policy until the trust negotiation was completed.The implementation procedure was given in concrete application instances and the scheme was analyzed.…”
    Get full text
    Article
  4. 4964

    Blockchain-based access control mechanism for data traceability by Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO, Ming ZHANG, Xiuze DONG

    Published 2020-12-01
    “…To improve the transparency and traceability of access control, a blockchain-based access control mechanism for data traceability and provenance was proposed.The proposed access control policy was transferred to the smart contract and deployed on the blockchain, and the access authorization evaluation was realized by executing the smart contract deployed on the blockchain to ensure the decentralization, transparency and traceability of the access control process.The manner of combining off-chain and on-chain was adopted, the object was stored in off-chain data server, and the object index was generated by the object storage address and hash value, and deployed on the object blockchain.The log of object access authorization and access were recorded in the log blockchain, any misbehavior was immutably recorded.The security analysis show that, the proposed mechanism achieve the properties of decentralization, transparency and traceability while ensuring the privacy of data.…”
    Get full text
    Article
  5. 4965

    Runoff Prediction Based on VMD-LSTM-ARMA Model by LUO Cankun, LIU Hao, HUANG Xin, SHAO Zhuang

    Published 2023-01-01
    “…To increase the accuracy of runoff prediction,a combined prediction model is proposed to solve the problems of runoff prediction.This model consists of the variational mode decomposition (VMD),long and short-term memory (LSTM) network,and autoregressive moving average (ARMA).To reduce the complexity of the incoming traffic,the runoff data is decomposed into three modal components with different frequencies by VMD.The low-frequency modal component inherits the temporal properties of the data and can be processed by constructing the LSTM prediction model,while the two high-frequency sequences are stationary time series and can be processed by constructing the ARMA prediction model.The prediction results of the three subsequences are superimposed to predict the runoff.Finally,the hourly flow data of Dongjiang Hydrometric Station of Xiangjiang river tributary in 2020 are used to forecast the inflow flow,and the results of comparative experiments with other algorithms show that the constructed model can effectively improve the accuracy of the hydrological forecast.…”
    Get full text
    Article
  6. 4966

    Greenhouse climate control system based on fuzzy logic by L. A. Payuk, N. A. Voronina, A. D. Umurzakova, E. E. Lazutkina, K. V. Khatsevskiy

    Published 2024-06-01
    “…Paper is devoted to development and research of the fifth generation greenhouse climate automatic control system. This system is based on fuzzy logic toolbox and it allows to automate control processes using the latest developments in this field. …”
    Get full text
    Article
  7. 4967

    Comparison and Correction of Runoff Simulation Based on XGBoost and SWAT by LIANG Lisha, JIANG Xiaolei, HU Leyi, SHEN Jing, ZHANG Liping, FU Xiaolei

    Published 2025-01-01
    “…Based on the extreme gradient boosting (XGBoost) algorithm and soil and water assessment tool (SWAT) model, a runoff simulation model was constructed by using the observed hydrological data of Waizhou hydrological station in Ganjiang River Basin, and the simulation effects of the two models were compared. …”
    Get full text
    Article
  8. 4968

    Perubahan Pola Pikir Basis Implementasi Kompetensi Konselor by Kusnarto Kurniawan

    Published 2013-02-01
    “…Jurnal Konseling dan Pendidikan…”
    Get full text
    Article
  9. 4969
  10. 4970

    Interactive Multiview Video Delivery Based on IP Multicast by Jian-Guang Lou, Hua Cai, Jiang Li

    Published 2007-01-01
    “…However, due to the huge data amounts transferred, multiview video's delivery remains a daunting challenge. …”
    Get full text
    Article
  11. 4971
  12. 4972

    Selfish mining detection scheme based on the characters of transactions by Heli WANG, Qiao YAN

    Published 2023-04-01
    “…Selfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studies from researchers in recent years, there is no effective detection scheme as the vulnerability of blockchain in propagation delay makes it challenging to distinguish the attackers from honest miners.A scheme for selfish mining detection was introduced.In this scheme, a state value was assigned to the new block based on transaction amount and the transaction fee of the block.By analyzing the relationship between state value and transaction characteristics, we can determine if the block was mined by a selfish miner.The scheme is verified by an experiment with an accuracy of 86.02%.…”
    Get full text
    Article
  13. 4973

    Model-Based Dependability Analysis of Physical Systems with Modelica by Andrea Tundis, Lena Buffoni, Peter Fritzson, Alfredo Garro

    Published 2017-01-01
    “…Modelica is an innovative, equation-based, and acausal language that allows modeling complex physical systems, which are made of mechanical, electrical, and electrotechnical components, and evaluates their design through simulation techniques. …”
    Get full text
    Article
  14. 4974

    New collaborative DDoS defense technology based on NFV by Chuanfeng XU, Hui LIN, Xuancheng GUO, Xiaoding WANG

    Published 2019-04-01
    “…To solve the problem of selfish behavior for self-security due to limited resources in the process of resisting distributed denial of service (DDoS) attacks by a collaborative network built with network function virtualization (NFV) technology,a new collaborative DDoS defense network model was proposed.a repeat prisoner's dilemma game model was built in the collaborative network,a reward and punishment incentive mechanism was introduced to strengthen the cooperation of the collaborative network,and a dynamic resource allocation mechanism based on social reputation value assessment was adopted.Simulation results show that the new collaborative DDoS attack defense technology outperforms existing solutions in terms of packet loss rate,cooperation,and resource allocation rate,improving the effectiveness of DDoS attack defense.…”
    Get full text
    Article
  15. 4975

    Episodic Reasoning for Vision-Based Human Action Recognition by Maria J. Santofimia, Jesus Martinez-del-Rincon, Jean-Christophe Nebel

    Published 2014-01-01
    “…On the contrary, this task should be supported by profound knowledge of human agency nature and its tight connection to the reasons and motivations that explain it. …”
    Get full text
    Article
  16. 4976

    Steganography based on parameters’ disturbance of spatial image transform by Xi SUN, Wei-ming ZHANG, Neng-hai YU, Yao WEI

    Published 2017-10-01
    “…In the research of state-of-the-art steganography algorithms,most of image sources were natural images in laboratory environment.However,with the rapid development of image process tools and applications,images after image processing were widely used in real world.How to use image process to improve steganography has not been systematically studied.Taking spatial image transform for consideration,a parameters’ disturbance model was presented,which could hide the noise taken by steganography in the pixel fluctuation due to the disturbance.Meanwhile,it would introduce cover source mismatch for a steganalyzer.The experimental results show that,compared with using traditional image database,it can significantly enhance the security of steganography algorithms and accommodative to the real world situation.…”
    Get full text
    Article
  17. 4977

    A Geometric Fuzzy-Based Approach for Airport Clustering by Maria Nadia Postorino, Mario Versaci

    Published 2014-01-01
    “…In this paper a fuzzy-based procedure has been proposed to cluster airports by using a fuzzy geometric point of view according to the concept of unit-hypercube. …”
    Get full text
    Article
  18. 4978

    Bytecode-based approach for Ethereum smart contract classification by Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG

    Published 2022-10-01
    “…In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment, various security issues occur frequently.On the one hand, the code security problems of contract developers when writing contracts, on the other hand, there are many high-risk smart contracts in Ethereum, and ordinary users are easily attracted by the high returns provided by high-risk contracts, but they have no way to know the risks of the contracts.However, the research on smart contract security mainly focuses on code security, and there is relatively little research on the identification of contract functions.If the smart contract function can be accurately classified, it will help people better understand the behavior of smart contracts, while ensuring the ecological security of smart contracts and reducing or recovering user losses.Existing smart contract classification methods often rely on the analysis of the source code of smart contracts, but contracts released on Ethereum only mandate the deployment of bytecode, and only a very small number of contracts publish their source code.Therefore, an Ethereum smart contract classification method based on bytecode was proposed.Collect the Ethereum smart contract bytecode and the corresponding category label, and then extract the opcode frequency characteristics and control flow graph characteristics.The characteristic importance is analyzed experimentally to obtain the appropriate graph vector dimension and optimal classification model, and finally the multi-classification task of smart contract in five categories of exchange, finance, gambling, game and high risk is experimentally verified, and the F1 score of the XGBoost classifier reaches 0.913 8.Experimental results show that the algorithm can better complete the classification task of Ethereum smart contracts, and can be applied to the prediction of smart contract categories in reality.…”
    Get full text
    Article
  19. 4979

    Web service discovery method based on semantic expansion by ZHANG Zheng, ZUO Chun, WANG Yu-guo

    Published 2007-01-01
    “…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
    Get full text
    Article
  20. 4980

    Study on network performance evaluation method based on measurement by ZHANG Dong-yan, HU Ming-zeng, ZHANG Hong-li

    Published 2006-01-01
    “…In order to evaluate the condition of network,a new synthetically multi-metric performance evaluation method was put forward based on multiple measurement metrics and applied to the performance evaluation of links and nets.The value of calculation reflected the performance condition of links and nets.The performance change of links and nets could be analyzed according to the different strategies using the method.The results of experiment indicate that the method can evaluate the performance of links and nets effectively.…”
    Get full text
    Article