Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5061
Chaotic Dynamics Analysis Based on Financial Time Series
Published 2021-01-01“…Firstly, the nonlinear characteristics of the data are discussed through the empirical analysis of agriculture index data; the daily agriculture index returns can be decomposed into the different scales based on wavelet analysis. …”
Get full text
Article -
5062
Heterogeneous Network-Based Chronic Disease Progression Mining
Published 2019-03-01“…Big Data Mining and Analytics…”
Get full text
Article -
5063
Blockchain-based renewable energy certificate system in Indonesia
Published 2025-02-01“…The current study aims to address such limitation by proposing a blockchain-based solution for Indonesia's electricity grid which can enhance end-to-end traceability, real-time data access, and tamper-proof records. …”
Get full text
Article -
5064
Gender-Based Analysis of User Reactions to Facebook Posts
Published 2024-03-01Subjects: Get full text
Article -
5065
A Spatial Transformation Based Next Frame Predictor
Published 2025-01-01“…In recent years, the automobile industry has achieved astonishing success in making autonomous cars safer, more affordable, and more reliable. …”
Get full text
Article -
5066
Relative Humidity Sensor Based on Microfiber Loop Resonator
Published 2013-01-01“…A novel relative humidity (RH) sensor based on a microfiber loop resonator (MLR) is proposed and experimentally demonstrated. …”
Get full text
Article -
5067
GLOBAL DIVERSITY AS A BASIS OF ADAPTIVE OAT BREEDING
Published 2018-06-01“…It is shown that expanding the spectrum of recombinations requires development of mixedhybrids on the basis of covered and naked genotypes. Thus, using covered and naked source materials in crossings, the naked oat cultivar Persheron has been released and included in the State Register of Breeding Achievements of the Russian Federation since 2013; and the covered oat cultivar Medved with high grain quality has been submitted to the State Crop Variety Trials.…”
Get full text
Article -
5068
Secure vehicular digital forensics system based on blockchain
Published 2020-06-01“…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
Get full text
Article -
5069
RETRACTED: Emotional intelligence as the production basis of management personnel
Published 2024-01-01Get full text
Article -
5070
UNIT FOR RESTORATION OF GRAIN BASIS OF HIGH-SILICA SANDS
Published 2011-11-01“…The complex of equipment for processing of the waste formed as a result of rejection of cores is considered.…”
Get full text
Article -
5071
Mechanical behavior of bio-aggregates based buildings materials
Published 2025-01-01“…The paper also outlines the perspectives of a new technical committee aimed at harmonising test procedures and developing scientific data analysis methods for BBM. This comprehensive review provides valuable insights for researchers and practitioners working with bio-based building materials, paving the way for improved understanding and standardisation of the mechanical characterisation of BBM. …”
Get full text
Article -
5072
Pose Determination for Malfunctioned Satellites Based on Depth Information
Published 2019-01-01“…The solution of multisolution problem is also presented. (3) An extended Kalman filter is designed to estimate the translational states, the rotational states, the location of mass center, and the moment-of-inertia ratios. Because the method only utilizes the local features without observing the whole satellite, it is suitable for the final phase of rendezvous and docking. …”
Get full text
Article -
5073
User similarity-based collaborative filtering recommendation algorithm
Published 2014-02-01“…Collaborative filtering recommendation algorithms widely used in e-commerce, recommend interesting content for users from massive data resources by studying their preferences and interests. …”
Get full text
Article -
5074
Research on the trusted environment of container cloud based on the TPCM
Published 2021-08-01“…Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much attention.A method for constructing a trusted environment of container cloud using active immune trusted computing was proposed, and its security meet the requirements of network security level protection standards.First, container cloud servers were measured through the TPCM and a trust chain from the TPCM to the container's operating environment was established.Then, by adding the trusted measurement agent of the container to the TSB, the trusted measurement and trusted remote attestation of the running process of the container were realized.Finally, an experimental prototype based on Docker and Kubernetes and conduct experiments were built.The experimental results show that the proposed method can ensure the credibility of the boot process of the cloud server and the running process of the container and meet the requirements of the network security level protection standard evaluation.…”
Get full text
Article -
5075
Specific emitter identification based on ITD and texture analysis
Published 2017-12-01“…To solve the defects of time-frequency analysis and poor separability of extracted features in specific emitter identification (SEI) based on Hilbert-Huang transform (HHT),a novel SEI method based on intrinsic time-scale decomposition(ITD)was proposed.ITD was utilized to decompose the emitter signals and get the time-frequency energy distribution(TFED)firstly,later the TFED spectrum was transformed into gray image and several image texture features through histogram statistic and gray-level co-occurrence matrix was extracted for identification.Measured ship communication signals and simulated emitter signals were used to test the performance of proposed method.Compared with another two SEI methods based on HHT,the proposed method is proved more effective in identification accuracy.…”
Get full text
Article -
5076
Challenges of MS‐based small extracellular vesicles proteomics
Published 2024-12-01Subjects: Get full text
Article -
5077
Learning-Based Dark and Blurred Underwater Image Restoration
Published 2020-01-01“…Due to the high-quality training data, the proposed restoration algorithm based on deep learning achieves inspiring results for underwater images taken in a low-light environment. …”
Get full text
Article -
5078
Phishing detection algorithm based on attention and feature fusion
Published 2024-08-01“…Phishing has been the primary means utilized by attackers to conduct cyber fraud. …”
Get full text
Article -
5079
APPLICATION OF GAME-BASED SIMULATION IN “SYSTEM ANALYSIS” COURSES
Published 2018-05-01Subjects: Get full text
Article -
5080
Communication-radar coexistence design based on block diagonalization
Published 2021-12-01“…Aiming at the problem of coexistence of communication and radar at the same frequency, a block diagonalization design scheme was proposed.Firstly, an optimization problem was established to maximum the communication system’s sum rate subject to no interference at the radar side and the power budget.To solve this problem, the constraint that the interference between communication users is zero was introduced, so that the non-convex original problem could have a closed-form solution.Then, based on the restriction on the number of base station’s transmit antennas caused by introducing the constraint, two other algorithms were proposed to further consider the block diagonalization design when the constraint was not met.The simulation results show that the proposed algorithms can introduce the constraint to solve the original problem in various scenarios with relative-low computation complexity, which can be implemented in practice.…”
Get full text
Article