Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5121
Midpoint Derivative-Based Closed Newton-Cotes Quadrature
Published 2013-01-01“…The computational cost for these methods is analyzed from the numerical point of view, and it has shown that the proposed formulas are superior computationally to the same order closed Newton-Cotes formula when they reduce the error below the same level. …”
Get full text
Article -
5122
Delay and energy minimization for MEC-based secure communication
Published 2020-11-01“…Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.…”
Get full text
Article -
5123
Framework for mobility model detection based on local information
Published 2010-01-01“…In order to get the real-time mobility model information which could be exploited to assist routing decision,a framework for mobility model detection based on local information(FMDL) was proposed.In FMDL,each node collected the local information on connectivity through neighbor discovery mechanism and generated the connectivity matrix.The changing rule of relative position could be extracted from the connectivity matrix,and then the real-time mobility model was detected.The simulation results show that FMDL achieves high detection rate without any auxiliary equipment.…”
Get full text
Article -
5124
Behavior authentication of Web users based on machine learning
Published 2018-01-01“…According to the security problem of Web user information,the user behavior was analyzed and authenticated by the method of machine learning.First of all,through the principal component analysis to reduce the dimension of the original data set,then use the SVM algorithm to allow the computer to learn the history of user behavior evidence,to get a model to identify the user's identity.The practical application and theoretical analysis show that the model in user behavior identification authentication,can be more accurate and efficient classification of dangerous users and trusted users,analysis lay a solid theoretical and practical basis for the high performance user behavior such as electronic commerce,network finance and other key of Internet applications.…”
Get full text
Article -
5125
Qualitative and quantitative knowledge of metasynthesis based on fuzzy system
Published 2024-12-01“…The metasynthesis has been widely used to solve complex system problems, and its core is the combination of human and machine, from qualitative to quantitative iterative solving. …”
Get full text
Article -
5126
Ontology-based prompt tuning for news article summarization
Published 2025-02-01“…Ontology-based prompt tuning and abstractive text summarization techniques represent an advanced approach to enhancing the quality and contextual relevance of news article summaries. …”
Get full text
Article -
5127
Bayesian Estimation of Ammunition Demand Based on Multinomial Distribution
Published 2021-01-01“…In view of the small sample size of combat ammunition trial data and the difficulty of forecasting the demand for combat ammunition, a Bayesian inference method based on multinomial distribution is proposed. …”
Get full text
Article -
5128
School-Based 4-H Programming: Getting Started
Published 2018-04-01“…If you want to expand your 4-H program in diversity, subject matter, and/or number of youth reached, school-based programming may be the solution for you. This 6-page document discusses school-based programs, differences between school-based programming and traditional club programming, reasons to start school-based programs, ways to work with school sites, and enrollment for school-based program youth. …”
Get full text
Article -
5129
-
5130
Graph-based service recommendation in Social Internet of Things
Published 2021-04-01“…In this study, we focus on the problem of service recommendation in Social Internet of Things, which is very important for many applications such as urban computing, smart cities, and health care. We propose a graph-based service recommendation framework by jointly considering social relationships of heterogeneous objects in Social Internet of Things and user’s preferences. …”
Get full text
Article -
5131
SVM Intrusion Detection Model Based on Compressed Sampling
Published 2016-01-01“…Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. …”
Get full text
Article -
5132
Observer-Based Fuzzy Control for Memristive Circuit Systems
Published 2018-01-01“…This paper proposes an observer-based fuzzy control scheme for a class of memristive chaotic circuit systems. …”
Get full text
Article -
5133
Pathways to learning in data-based policy innovation labs
Published 2024-09-01Subjects: Get full text
Article -
5134
Functionalized Waterborne Polyurethane-Based Graphite-Reinforced Composites
Published 2019-01-01“…The synthesis and characterization of waterborne polyurethane-based oxidized graphite- (WPUG-) reinforced composites is disclosed. …”
Get full text
Article -
5135
An Innovative Thinking-Based Intelligent Information Fusion Algorithm
Published 2013-01-01“…This algorithm treats knowledge as core and information fusion as a knowledge-based innovative thinking process. Furthermore, the five key parts of this algorithm including information sense and perception, memory storage, divergent thinking, convergent thinking, and evaluation system are simulated and modeled. …”
Get full text
Article -
5136
Workflow Modelling and Analysis Based on the Construction of Task Models
Published 2015-01-01“…We still identify the structure of workflows and describe their dynamism through the construction of new task models. This construction is very simple and intuitive since it is based on the analysis of all tasks present on the workflow that allows us to describe the dynamism of the workflow very easily. …”
Get full text
Article -
5137
Machine Learning Classifiers Based Classification For IRIS Recognition
Published 2021-05-01Subjects: “…Data Mining…”
Get full text
Article -
5138
System and application of video surrveillance based on edge computing
Published 2020-06-01“…With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes video data nearby,and performs well in terms of bandwidth,storage,and latency,but edge-cloud collaboration is still required to improve overall performance.The architecture of edge-cloud collaborative video surveillance system was proposed,then an open edge node design scheme and algorithm training and inferencing ideas were proposed.Finally,taking forest fire prevention and smart poles & towers as examples,the application realization and value of edge computing in video surveillance services were illustrated.…”
Get full text
Article -
5139
Achieving efficient location privacy protection based on cache
Published 2017-06-01Subjects: “…location-based service…”
Get full text
Article -
5140
Accelerated traffic replay method based on time compression
Published 2021-10-01“…With the proliferation of network traffic, replaying traffic in a virtual environment faces many problems.In order to meet the requirements of traffic integrity and accuracy in the replay process, an accelerated traffic replay method based on time-compressed was proposed to achieve accelerated replay of real network traffic in a virtual environment.The method prioritized the compression of the largest time interval in the set of time intervals, and reduced the compression of the smaller intervals, thus reducing the traffic spike per unit time caused by time compression, and reducing the packet loss rate of traffic.The effect was measured in terms of packet loss rate, time interval error and similarity.The experiments show that this method has a lower packet loss rate and lower time interval error compared with the isometric compression method, although it performs worse in similarity.…”
Get full text
Article