Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5001
Robust Bayesian Regularized Estimation Based on t Regression Model
Published 2015-01-01“…Both simulation studies and real data example show that our method performs well compared with other existing methods when the error distribution has heavy tails and/or outliers.…”
Get full text
Article -
5002
Optimal Tag-Based Cooperation Control for the “Prisoner’s Dilemma”
Published 2020-01-01“…Differing from previous approaches, we not only propose a tag-based control (TBC) mechanism but also look at how the evolution of cooperation by TBC can be successfully promoted. …”
Get full text
Article -
5003
An Empirical Framework for Intersection Optimization Based on Uniform Design
Published 2017-01-01“…Operational performance optimization of signalized intersections is one of the most important tasks for traffic engineers and researchers. To compensate for the limitations of practical implementation, simulation software packages have been widely used to evaluate different optimization strategies and thus to improve the efficiency of the intersections as well as the entire network. …”
Get full text
Article -
5004
Parlay and OGSA based framework for service creation in NGN
Published 2007-01-01“…A parlay and open grid services architecture(OGSA) based framework for service creation in NGN was pro-posed,which not only provided uniform access to heterogeneous network capabilities,but also built effective distributed convergence mechanisms beyond them.Then a service-oriented method for communication between Parlay and OGSA was further proposed.It was a new and significant attempt to apply grid technologies to telecommunication service crea-tion.The validity of the proposed framework for flexible service creation spanning heterogeneous networks is verified by simulations.Moreover,the proposed framework can support legacy communication terminals without upgrading on cli-ent.…”
Get full text
Article -
5005
Ionospheric TEC Prediction Based on Ensemble Learning Models
Published 2024-03-01“…The model inputs in our study included Solar radio flux (F107), Solar Wind plasma speed, By, Bz, Dst, Ap, AE, day of year, universal time, 30‐day and 90‐day TEC averages. …”
Get full text
Article -
5006
Detection of Wideband Signal Number Based on Bootstrap Resampling
Published 2016-01-01“…Therefore, a new method based on Bootstrap resampling is proposed in this paper. …”
Get full text
Article -
5007
A Weighted Voting Classifier Based on Differential Evolution
Published 2014-01-01“…Considering that different base classifier gives different contribution to the final classification result, this paper assigns greater weights to the classifiers with better performance and proposes a weighted voting approach based on differential evolution. …”
Get full text
Article -
5008
Quality of service based hierarchical resource allocation algorithm
Published 2022-01-01“…Wireless sensor network (WSN) is widely used in the internet of things (IoT) scene because of its small size, low cost and strong sensing ability.How to improve the quality of service (QoS) under the premise of load balancing in WSN has become the focus of many scholars.Based on the study of heuristic resource allocation method and hierarchical structure resource allocation method in WSN, a quality of service based hierarchical resource allocation algorithm (QoSHRA) was proposed.Firstly, the resource allocation method based on low energy adaptive clustering hierarchy (LEACH) made the whole network form a hierarchical structure.Then, QoSHRA was used for resource allocation.The simulation results show that QoSHRA can further save the energy consumption of network transmission, ensure the effectiveness of service allocation, and improve the satisfaction rate of network resource QoS requirements on the premise of ensuring network load balancing.…”
Get full text
Article -
5009
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
5010
Analysis of the Dynamic Characteristic of Forklift Gearbox based on ADAMS
Published 2017-01-01Get full text
Article -
5011
Research on gear reliability based on improved fourth moment
Published 2024-06-01“…Then, the correlation between multiple failure modes and the overall failure probability considering failure correlation were calculated based on the conditional probability dimension reduction method. …”
Get full text
Article -
5012
An improved RFID authentication protocol based on quadratic residue
Published 2018-04-01“…In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies,an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue,which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced,which reduces the cost of system computing; in database,the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally,the GNY logical proof of the protocol was given,which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.…”
Get full text
Article -
5013
Theoretical-methodological basis of formation social policy of state
Published 2020-05-01Subjects: “…theoreticalmethodological basis…”
Get full text
Article -
5014
Wastewater-based epidemiology for novel Coronavirus detection in wastewater
Published 2021-10-01Subjects: Get full text
Article -
5015
A Theoretical Investigation Based on the Rough Approximations of Hypergraphs
Published 2022-01-01“…In this research paper, the notion of a rough set is applied to hypergraphs to introduce the novel concept of rough hypergraphs based on rough relations. The notions of isomorphism, conformality, linearity, duality, associativity, commutativity, distributivity, Helly property, and intersecting families are illustrated in rough hypergraphs. …”
Get full text
Article -
5016
Earthquake prediction method based on seismogenic process tracking
Published 2025-01-01“…Thus, the seismogenic process can be depicted. In this paper, based on a case study of the seismigenic process for some natural strong earthquakes, we propose an idea and method for earthquake prediction based on the tracking of the seismogenic process, and provide a basis for the identification of short- to mid-term seismic risk regions. …”
Get full text
Article -
5017
Application of MEC-based positioning technology in the Internet of vehicles
Published 2022-05-01“…Positioning is not only the cornerstone of ensuring the safe driving of vehicles, but also the foundation of many location-related services.The development and application of the positioning technology have greatly affected the development prospects of the Internet of vehicles.Mobile edge computing can migrate intensive computing tasks to the edge of the network adjacent to the car or roadside.By sinking the computing power to the edge of the network, mobile edge computing can offload the load of network transmission, save the transmission bandwidth, and support Internet of vehicles applications powerfully.It was aimed to study the integration of MEC and IoV positioning technology, and form the overall architecture of MEC-based positioning technology by analyzing the application scenarios and integration requirements of MEC integrated positioning technology in IoV.At the same time, the opportunities and challenges of the architecture were further analyzed to provide an important reference for the subsequent standardization of MEC-based positioning technology and the application in the Internet of vehicles.…”
Get full text
Article -
5018
-
5019
User Model for Virtual Learning Based on Adaptive Gamification
Published 2025-01-01“…The user model integrates both stereotypical and dynamic modeling approaches, allowing for initial categorization and continuous adaptation based on learner interactions. A cognitive walkthrough evaluation conducted with experts and end-users demonstrated high task completion rates, indicating the model’s potential effectiveness. …”
Get full text
Article -
5020
Bridge monitoring system based on Internet of things technology
Published 2018-09-01Subjects: Get full text
Article