Showing 5,041 - 5,060 results of 67,915 for search 'DASB~', query time: 2.46s Refine Results
  1. 5041

    Researches on role-based middleware in wireless sensor networks by LUO Juan, GU Chuan-li, LI Ren-fa

    Published 2011-01-01
    “…According to the diversity and difference of the role played by nodes in WSN,the role mapping framework model in WSN was proposed.A role-based middleware for wireless sensor networks(RobMSN) was designed based on that model.From the view of the formal semantics and specifications of the middleware,the role mapping specifications solve the problem of semantic conflicts in role mapping abstract,making the role mapping context fully reflected in the role specifications of middleware.Applications will be mapped as the specific roles of node which played in the wireless sensor networks using RobMSN,it can be cross-platform and implement dynamic application services.Finally,an appli-cation development example was used to illustrate the design and development process of RobMSN middleware.…”
    Get full text
    Article
  2. 5042

    Sparse-Coding-Based Computed Tomography Image Reconstruction by Sang Min Yoon, Gang-Joon Yoon

    Published 2013-01-01
    “…Computed tomography (CT) is a popular type of medical imaging that generates images of the internal structure of an object based on projection scans of the object from several angles. …”
    Get full text
    Article
  3. 5043
  4. 5044
  5. 5045

    ‘On board’ deep-sea mining. An ocean-based perspective by Marta Gentilucci

    Published 2022-12-01
    “…In this article I go virtually ‘on board’ DSM, as a first theoretical step towards designing innovative research on this emergent sector.…”
    Get full text
    Article
  6. 5046

    Bases neurobiológicas de la adicción al alcohol by Milagros Lisset León Regal, Lázaro Hermes González Otero, Alain León Valdés, José Omar de Armas García, Alexis Urquiza Hurtado, Gerardo Rodríguez Caña

    Published 2014-02-01
    “…Se consultaron un total de 52 fuentes de información, entre ellas 43 artículos de revistas científicas, 4 libros, así como informes estadísticos, se tuvo acceso a los principales gestores de información. …”
    Get full text
    Article
  7. 5047

    Scheme of industrial wireless connections based on public network by Jie CHANG

    Published 2018-10-01
    “…Industrial wireless connections are developing in the direction of networking,digitization and intelligence,which could not be considered as just a single communication network but as important sub-systems of the automatic control systems.Based on service scenarios of the existing public wireless network,related requirements were systematically studied and the related construction direction was proposed.Then,merits and drawbacks of the existing technology systems in industrial wireless connections,also maturity of the existing technology were analyzed in detail.Lastly,the future development strategies of communication operators were put forward.…”
    Get full text
    Article
  8. 5048

    Analysis and improvement of the BACnet/IP based on identity authentication by Pengshou XIE, Jiafeng ZHU, Yongping KANG, Tao FENG, Wei LI, Yuxiang RAN

    Published 2024-03-01
    “…To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the protocol and modeling it using colored Petri net theory and CPN Tools, vulnerabilities in the security of BACnet/IP were identified.An improvement scheme was proposed based on the Dolev-Yao attacker model and formal analysis method.The BACnet/IP-SA protocol utilized the device’s pseudo-identity to safeguard the actual identity information.It emploied the PUF response for authentication and verified the authenticity of the counterparty’s identity.The session key was generated through the authentication value of the multi-information set.The protocol’s security was demonstrated by combining BAN logic and non-formal methods.The experimental results indicate that the proposed scheme can effectively resist security threats from multi-class attacks and key leakage, enhancing the security of the protocol authentication while reducing computational overhead.…”
    Get full text
    Article
  9. 5049

    Composite Fault Feature Extraction of Gearbox based on CPFs by Ye Meitao, Chai Huili

    Published 2018-01-01
    “…In view of this,a hybrid fault diagnosis method of the gearbox based on CPFs-MOMEDA is proposed. First,the original signal is denoised by LMD,and a series of PFs are obtained. …”
    Get full text
    Article
  10. 5050

    Communication-Based Book Recommendation in Computational Social Systems by Long Zuo, Shuo Xiong, Xin Qi, Zheng Wen, Yiwen Tang

    Published 2021-01-01
    “…This paper considers current personalized recommendation approaches based on computational social systems and then discusses their advantages and application environments. …”
    Get full text
    Article
  11. 5051
  12. 5052

    Modified security model based on dynamic trusted degree by NIE Xiao-wei1, FENG Deng-guo1

    Published 2008-01-01
    “…A modified security model based on dynamic trusted degree security model MSMBDTD(modified security model based on dynamic trusted degree) was proposed.Based on the trusted authentication and measurement of trusted computing,MSMBDTD first gave definition of trusted degree rule.Then it analyzed dynamic transformation of trusted degree in the course of system running.And also it modified access privilege of subject,which made access range be in conformance with trusted degree.Finally,after formal description and safety analysis with proof are given,MSMBDTD can support access control based on trusted degree.…”
    Get full text
    Article
  13. 5053

    Sharing Platform of Water Conservancy Data Based on CKAN by SONG Lili, WU Wei, WANG Gaoxu, ZHANG Xuan, XU Yi, WU Yongxiang

    Published 2024-01-01
    Subjects: “…water conservancy data…”
    Get full text
    Article
  14. 5054

    Routing planning and handoff based on LSTM traffic prediction by Bin ZHUGE, Linchao WANG, Yang SONG, Yu SHAO, Ligang DONG, Xian JIANG

    Published 2022-08-01
    “…With the continuous development and evolution of network technology in recent years, the user’s demand for network resources is becoming larger and larger, and the content is becoming more and more complex.The traditional network architecture is difficult to meet the current flexible network needs.The revolutionary technology of SDN endows the network with programm ability and evolvability, and realizes more flexible management of network resources.In order to improve the utilization of network resources, a traffic prediction agent based on LSTM model was proposed, which provides a theoretical basis for routing planning.By predicting the network traffic in advance, we can take defensive measures before the traffic surge to ensure the security and stability of the network.The function of route planning and lossless path switching based on traffic prediction was realized.…”
    Get full text
    Article
  15. 5055
  16. 5056

    Cloud storage scheme based on closed-box encryption by Rui-zhong DU, Shao-xuan WANG, Jun-feng TIAN

    Published 2017-07-01
    “…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
    Get full text
    Article
  17. 5057
  18. 5058

    Spectrum sensing method based on residual dense network by Jianxin GAI, Xianfeng XUE, Ruixiang NAN, Jingyi WU

    Published 2021-12-01
    “…Aiming at the problem that the traditional spectrum sensing method based on convolutional neural network(CNN) did not make full use of image feature and the ability of extracting the image feature was limited by the shallow network structure, a spectrum sensing method based on the residual dense network (ResDenNet) was proposed.By adding dense connections in the traditional neural network, the information reuse of the image feature was achieved.Meanwhile, shortcut connections were employed at both ends of the dense unit to implement deeper network training.The spectrum sensing problem was transformed into the image binary classification problem.Firstly, the received signals were integrated into a matrix, which was normalized and transformed by gray level.The obtained gray level images were used as the input of the network.Then, the network was trained through dense learning and residual learning.Finally, the online data was input into the ResDenNet and spectrum sensing was implemented based on image classification.The numerical experiments show that the proposed method is superior to the traditional ones in terms of performance.When the SNR is as low as -19 dB, the detection probability of the proposed method is still high up to 0.96 with a low false alarm probability of 0.1, while a better generalization ability is displayed.…”
    Get full text
    Article
  19. 5059

    Vehicle platooning scheme based on two-way auction by LIU Hai, WU Jinyu, WANG Tianxi, PENG Hongye

    Published 2024-12-01
    “…To solve this problem, a vehicle platooning scheme based on two-way auction was proposed. Specifically, the positions in the vehicle platooning were considered as a special commodity to be auctioned. …”
    Get full text
    Article
  20. 5060

    Scrambler blind recognition method based on soft information by Ze-liang CHEN, Hua PENG, Ke-xian GONG, Pei-dong YU

    Published 2017-03-01
    “…Two scrambler blind recognition methods based on soft information were proposed for received signal in non-cooperative ways.The first method established a cost function of the scrambler coefficients by using the soft information,and adopted the optimization theory of real number field for positive solution.So it didn’t need to traverse the closed set of test polynomial any more.The second method built conformity degree concept with the soft information,and used the size of conformity of each test scrambler polynomial as the discriminant criteria.So it made more full use of the received information compared to the hard sentence recognition algorithm.Simulation results show that the first method can shorten the recognition time of a synchronous scrambler polynomial from 5 min 18 s to 8 s compared with the traversal method put forward by Cluzeau,and the second method has 2 dB SNR gain when to achieve the relatively high accuracy compared with the hard sentence recognition algorithm.…”
    Get full text
    Article