Showing 5,061 - 5,080 results of 67,915 for search 'DASB~', query time: 2.15s Refine Results
  1. 5061

    Chaotic Dynamics Analysis Based on Financial Time Series by Zheng Gu, Yuhua Xu

    Published 2021-01-01
    “…Firstly, the nonlinear characteristics of the data are discussed through the empirical analysis of agriculture index data; the daily agriculture index returns can be decomposed into the different scales based on wavelet analysis. …”
    Get full text
    Article
  2. 5062
  3. 5063

    Blockchain-based renewable energy certificate system in Indonesia by Indri Haryani, Indra Ardhanayudha Aditya, Almareta Harasti Nuraini, Sri Widiyanesti, Andry Alamsyah, Eva Nurhazizah, Muhammad Naufal Hakim, Tanti Ruwani, Mochamad Zaky Dwi Arli, Nadhif Ditertian Girawan

    Published 2025-02-01
    “…The current study aims to address such limitation by proposing a blockchain-based solution for Indonesia's electricity grid which can enhance end-to-end traceability, real-time data access, and tamper-proof records. …”
    Get full text
    Article
  4. 5064
  5. 5065

    A Spatial Transformation Based Next Frame Predictor by Saad Mokssit, Daniel Bonilla Licea, Bassma Guermah, Mounir Ghogho

    Published 2025-01-01
    “…In recent years, the automobile industry has achieved astonishing success in making autonomous cars safer, more affordable, and more reliable. …”
    Get full text
    Article
  6. 5066

    Relative Humidity Sensor Based on Microfiber Loop Resonator by Yangzi Zheng, Xinyong Dong, Chunliu Zhao, Yi Li, Liyang Shao, Shangzhong Jin

    Published 2013-01-01
    “…A novel relative humidity (RH) sensor based on a microfiber loop resonator (MLR) is proposed and experimentally demonstrated. …”
    Get full text
    Article
  7. 5067

    GLOBAL DIVERSITY AS A BASIS OF ADAPTIVE OAT BREEDING by G. A. Batalova

    Published 2018-06-01
    “…It is shown that expanding the spectrum of recombinations requires development of mixedhybrids on the basis of covered and naked genotypes. Thus, using covered and naked source materials in crossings, the naked oat cultivar Persheron has been released and included in the State Register of Breeding Achievements of the Russian Federation since 2013; and the covered oat cultivar Medved with high grain quality has been submitted to the State Crop Variety Trials.…”
    Get full text
    Article
  8. 5068

    Secure vehicular digital forensics system based on blockchain by Meng LI, Chengxiang SI, Liehuang ZHU

    Published 2020-06-01
    “…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
    Get full text
    Article
  9. 5069
  10. 5070

    UNIT FOR RESTORATION OF GRAIN BASIS OF HIGH-SILICA SANDS by A. P. Melnikov, Ju. A. Shpuj, B. V. Kurakevich, A. S. Chervjak, Ju. E. Kazuchits

    Published 2011-11-01
    “…The complex of equipment for processing of the waste formed as a result of rejection of cores is considered.…”
    Get full text
    Article
  11. 5071

    Mechanical behavior of bio-aggregates based buildings materials by Sofiane Amziane, M'hamed Yassin Rajiv da Gloria

    Published 2025-01-01
    “…The paper also outlines the perspectives of a new technical committee aimed at harmonising test procedures and developing scientific data analysis methods for BBM. This comprehensive review provides valuable insights for researchers and practitioners working with bio-based building materials, paving the way for improved understanding and standardisation of the mechanical characterisation of BBM. …”
    Get full text
    Article
  12. 5072

    Pose Determination for Malfunctioned Satellites Based on Depth Information by Feng Yu, Yi Zhao, Yanhua Zhang

    Published 2019-01-01
    “…The solution of multisolution problem is also presented. (3) An extended Kalman filter is designed to estimate the translational states, the rotational states, the location of mass center, and the moment-of-inertia ratios. Because the method only utilizes the local features without observing the whole satellite, it is suitable for the final phase of rendezvous and docking. …”
    Get full text
    Article
  13. 5073

    User similarity-based collaborative filtering recommendation algorithm by Hui-gui RONG, Sheng-xu HUO, Chun-hua HU, Jin-xia MO

    Published 2014-02-01
    “…Collaborative filtering recommendation algorithms widely used in e-commerce, recommend interesting content for users from massive data resources by studying their preferences and interests. …”
    Get full text
    Article
  14. 5074

    Research on the trusted environment of container cloud based on the TPCM by Guojie LIU, Jianbiao ZHANG, Ping YANG, Zheng LI

    Published 2021-08-01
    “…Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much attention.A method for constructing a trusted environment of container cloud using active immune trusted computing was proposed, and its security meet the requirements of network security level protection standards.First, container cloud servers were measured through the TPCM and a trust chain from the TPCM to the container's operating environment was established.Then, by adding the trusted measurement agent of the container to the TSB, the trusted measurement and trusted remote attestation of the running process of the container were realized.Finally, an experimental prototype based on Docker and Kubernetes and conduct experiments were built.The experimental results show that the proposed method can ensure the credibility of the boot process of the cloud server and the running process of the container and meet the requirements of the network security level protection standard evaluation.…”
    Get full text
    Article
  15. 5075

    Specific emitter identification based on ITD and texture analysis by Dong-fang REN, Tao ZHANG, Jie HAN, Huan-huan WANG

    Published 2017-12-01
    “…To solve the defects of time-frequency analysis and poor separability of extracted features in specific emitter identification (SEI) based on Hilbert-Huang transform (HHT),a novel SEI method based on intrinsic time-scale decomposition(ITD)was proposed.ITD was utilized to decompose the emitter signals and get the time-frequency energy distribution(TFED)firstly,later the TFED spectrum was transformed into gray image and several image texture features through histogram statistic and gray-level co-occurrence matrix was extracted for identification.Measured ship communication signals and simulated emitter signals were used to test the performance of proposed method.Compared with another two SEI methods based on HHT,the proposed method is proved more effective in identification accuracy.…”
    Get full text
    Article
  16. 5076
  17. 5077

    Learning-Based Dark and Blurred Underwater Image Restoration by Yifeng Xu, Huigang Wang, Garth Douglas Cooper, Shaowei Rong, Weitao Sun

    Published 2020-01-01
    “…Due to the high-quality training data, the proposed restoration algorithm based on deep learning achieves inspiring results for underwater images taken in a low-light environment. …”
    Get full text
    Article
  18. 5078

    Phishing detection algorithm based on attention and feature fusion by ZHANG Sirui, YAN Zhiwei, DONG Kejun, YUCHI Xuebiao

    Published 2024-08-01
    “…Phishing has been the primary means utilized by attackers to conduct cyber fraud. …”
    Get full text
    Article
  19. 5079
  20. 5080

    Communication-radar coexistence design based on block diagonalization by Kaifeng HAN, Litao HUANG, Li CHEN, Zhiqin WANG

    Published 2021-12-01
    “…Aiming at the problem of coexistence of communication and radar at the same frequency, a block diagonalization design scheme was proposed.Firstly, an optimization problem was established to maximum the communication system’s sum rate subject to no interference at the radar side and the power budget.To solve this problem, the constraint that the interference between communication users is zero was introduced, so that the non-convex original problem could have a closed-form solution.Then, based on the restriction on the number of base station’s transmit antennas caused by introducing the constraint, two other algorithms were proposed to further consider the block diagonalization design when the constraint was not met.The simulation results show that the proposed algorithms can introduce the constraint to solve the original problem in various scenarios with relative-low computation complexity, which can be implemented in practice.…”
    Get full text
    Article