Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4981
Analysis of Numerical Measure and Numerical Integration Based on Measure
Published 2013-01-01Get full text
Article -
4982
LDPC convolutional codes coded cooperation based on puncturing
Published 2017-08-01“…To design a scheme that can approaching the capacity 1imitation transfer,and genera11y app1ied to s1ow and fast fading,the coded cooperation based on LDPC convo1utiona1 codes was studied.First1y,based on LDPC convo1utiona1 codes,the coded words were divided into two parts by puncturing a1gorithm to achieve coded cooperation.The space-time transmission was introduced into the second frame of coded cooperation to further improve the performance of the system.Simu1ation resu1ts show the effectiveness of proposed scheme.…”
Get full text
Article -
4983
Power Load Prediction Algorithm Based on Wavelet Transform
Published 2024-01-01“…The combination of these three elements has brought new technological breakthroughs to the field of power load prediction.…”
Get full text
Article -
4984
An efficient solution to Web server based automatic packaging
Published 2004-01-01Get full text
Article -
4985
Decentralized identifiers based IoT data trusted collection
Published 2025-02-01“…To overcome these limitations, this article introduces a trust model for IoT data collection based on Decentralized Identifiers (DIDs) and proposes a novel IoT data security collection scheme, called TrID. …”
Get full text
Article -
4986
sEMG Based Human Motion Intention Recognition
Published 2019-01-01“…Thus, a better human-machine interaction can be achieved by using sEMG based motion intention recognition. In this paper, we review and discuss the state of the art of the sEMG based motion intention recognition that is mainly used in detail. …”
Get full text
Article -
4987
Patentometric Analysis of AI Based Structural Health Monitoring
Published 2024-12-01“…Evaluating previous studies and current developments in AI-based structural health monitoring is essential to achieving this. …”
Get full text
Article -
4988
Security monitoring system of intelligent substation based on IoT
Published 2018-09-01Get full text
Article -
4989
Considerations for Building Climate-based Species Distribution Models
Published 2016-10-01“…WEC375/UW420: Considerations for Building Climate-based Species Distribution Models (ufl.edu) …”
Get full text
Article -
4990
Research on trustworthiness measurement approaches of component based BPRAS
Published 2014-03-01“…Aiming at the absence of measurement methods about formalization on trustworthiness attributes of business process reengineering oriented application server (BPRAS),a cooperation framework of business process modeling and trustworthiness measurement based on BPRAS was proposed.Extracting the features of characteristics and behaviors of components consisting of the application server,an abstraction view of computing between those components based on the framework was presented through process algebraic approaches.Furthermore,relative concepts about its components computing operators were defined in order to construct algebraic model of its software trustworthiness (ST) to support the measurement of trustworthy BPRAS.Finally,an application case was also given.…”
Get full text
Article -
4991
OpenStack-Based Heterogeneous Hybrid Cloud Solution
Published 2015-07-01“…The status of hybrid cloud industry,mainstream products and solutions of hybrid cloud were studied.The applicable scenaries and deployment options were analyzed.Based on the characteristics of cloud resource and the hybrid cloud business needs of telecom operators,heterogeneous hybrid cloud system and technical solutions were proposed.The system framework and key technologies of hybrid cloud unified management,heterogeneous resource pools unified management,hybrid cloud network connectivity,and hybrid cloud security were described.…”
Get full text
Article -
4992
Method of diversity software protection based on fusion compilation
Published 2020-12-01“…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
Get full text
Article -
4993
Channel estimation for OFDM system based on deep learning
Published 2023-12-01“…An efficient channel estimation model based on deep learning was proposed for the problems of inter-carrier interference and inter-symbol interference in 5G system signal reception.The estimated channels were obtained through a preliminary estimation at the pilots.And they were treated as low resolution images containing noise, which were input into the channel estimation model.By learning the mapping relationship between the low resolution images and the high resolution images, the noise in input channels was removed, and the high-resolution channel images were restored to obtain the entire channel state information eventually.The simulation results show that the model not only continues the advantages of traditional attention mechanisms in suppressing redundant information, reduces computational overhead, but also achieves good accuracy and robustness, and has good estimation performance for various channels.…”
Get full text
Article -
4994
Cloud resource allocation method based on time collaboration
Published 2014-11-01Subjects: Get full text
Article -
4995
On the Convergence Rate of Kernel-Based Sequential Greedy Regression
Published 2012-01-01“…A kernel-based greedy algorithm is presented to realize efficient sparse learning with data-dependent basis functions. …”
Get full text
Article -
4996
Dynamic spectrum sharing access technology based on blockchain
Published 2020-06-01“…The blockchain technology written in the smart contract has advantages of the enabling intelligent settlement,value transfer and resource sharing,which provides a new secure and trusted platform for the dynamic spectrum sharing system.Firstly,the application of blockchain technology in dynamic spectrum sharing was summarized,considering the requirements of spectrum sharing.The key problems that need to be solved when applying blockchain to the large-scale spectrum sharing system were discussed.After that,the key challenges were analyzed in depth,and corresponding key technologies and possible solutions were provided to the above problems.…”
Get full text
Article -
4997
Intention embedding method based social bot detection
Published 2024-11-01“…Artificial intelligence generated content technology has significantly enhanced the disguise capabilities of social bots, presenting new challenges to existing bot detection methods. …”
Get full text
Article -
4998
School-Based 4-H Programming: Getting Started
Published 2018-04-01“…If you want to expand your 4-H program in diversity, subject matter, and/or number of youth reached, school-based programming may be the solution for you. This 6-page document discusses school-based programs, differences between school-based programming and traditional club programming, reasons to start school-based programs, ways to work with school sites, and enrollment for school-based program youth. …”
Get full text
Article -
4999
Fundamental Bases of Success and Prestige of National Engineering Education
Published 2025-02-01“…In the article, the authors tried to answer the question: “What has underpinned the success and prestige and constitutes the fundamental bases of the national engineering education system?”. …”
Get full text
Article -
5000
Optimistic Mix-net protocol based on bilinear pairings
Published 2013-11-01“…A novel pairing-based optimistic Mix-net scheme was proposed. The key management is made easier by em-ploying bilinear paring primitives and there is no need for the participating mix servers to re-generate keys jointly be-tween mix-sessions to avoid providing decryption oracle service to other mix-sessions. …”
Get full text
Article