Showing 5,181 - 5,200 results of 67,915 for search 'DASB~', query time: 2.51s Refine Results
  1. 5181
  2. 5182

    Analysis for e-commerce protocols based on ProVerif by GUO Yun-chuan1, DING Li3, ZHOU Yuan3, GUO Li1

    Published 2009-01-01
    “…It was very important to analyze e-commerce protocols by formal methods.A technique for modeling the fair-change e-commerce protocol(FEEP) with automated dispute resolution and for verifying its property was proposed.First, FEEP was modeled in applied picalculus and a novel formalization of the fairness was provided in term of a correspondence property.Then, ProVerif, proposed by Juels, Catalano and Jakobsson, was adopted to analyze FEEP automatically.The results show that:it is feasible to formalize the fairness based on a correspondence property;ProVerif can be used to verify the property that before event A happened, event B had happened, but it is not applicable to analyze the property that after event A happened, event B would happen.…”
    Get full text
    Article
  3. 5183

    Simulation Research of Engaging Process of Clutch based on ADAMS by Liu Xiaochu, Chen Youcheng, Jiang Yin, Cao Jie, Chen Ningbo

    Published 2017-01-01
    “…Some reference basis for clutch virtual prototype design,simulation and testing is provided.…”
    Get full text
    Article
  4. 5184
  5. 5185
  6. 5186

    Virtual Simulation-Based Training and Person-Centered Care by Christen Page, Morgan Blaydes, Leah Simpkins, Casey Humphrey, Kellie Ellis

    Published 2024-12-01
    “…Despite this finding, research on the efficacy of training future healthcare providers to implement person-centered care for individuals with dementia is limited.  Simulation-based education serves as one training method, but its effects of preparing students to treat persons with dementia using person-centered care is unknown. …”
    Get full text
    Article
  7. 5187

    Revocable identity‐based matchmaking encryption in the standard model by Zhe Jiang, Xiwen Wang, Kai Zhang, Junqing Gong, Jie Chen, Haifeng Qian

    Published 2023-07-01
    “…In IB‐ME, data encryption is performed by not only a receiver identity but also a sender's encryption key. …”
    Get full text
    Article
  8. 5188
  9. 5189

    Revisiting community-based traditional irrigation systems in India by Kumar Gaurav, Prabhakar Sharma, Aviram Sharma

    Published 2025-01-01
    “…The paper revisits the idea of a community-based irrigation system as a just and sustainable alternative. …”
    Get full text
    Article
  10. 5190

    Multipath traffic splitting algorithm based on adaptive granularity by Peng WANG, Ju-long LAN, Shu-qiao CHEN

    Published 2015-01-01
    “…Aiming at the dilemma between load balancing and packet reordering in multipath routing,an adaptive dynamic multipath traffic splitting(ADTS) algorithm was proposed.The algorithm classified Internet flows into two categories:the aggressive and the normal through analyzing the characters of the traffic,and applies different splitting granularities to the two classes of flows based on the idea of differentiated service.The theoretical analysis and simulation results show that ADTS algorithm reduces the number of reordering packets while has better performance of load balancing.…”
    Get full text
    Article
  11. 5191

    Flight Delay Classification Prediction Based on Stacking Algorithm by Jia Yi, Honghai Zhang, Hao Liu, Gang Zhong, Guiyi Li

    Published 2021-01-01
    “…With the development of civil aviation, the number of flights keeps increasing and the flight delay has become a serious issue and even tends to normality. …”
    Get full text
    Article
  12. 5192
  13. 5193

    An Agent-Based Model of Opinion Polarization Driven by Emotions by Frank Schweitzer, Tamas Krivachy, David Garcia

    Published 2020-01-01
    “…We provide an agent-based model to explain the emergence of collective opinions not based on feedback between different opinions, but based on emotional interactions between agents. …”
    Get full text
    Article
  14. 5194

    Reduction of Multidimensional Image Characteristics Based on Improved KICA by Jia Dongyao, Ai Yanke, Zou Shengxiong

    Published 2014-01-01
    “…Dimensionality reduction and optimization of characteristic parameter model based on improved kernel independent component analysis are proposed in this paper; the independent primitives are obtained by KICA (kernel independent component analysis) algorithm to construct an independent group subspace, while using 2DPCA (2D principal component analysis) algorithm to complete the second order related to data and further reduce the dimension in the above method. …”
    Get full text
    Article
  15. 5195
  16. 5196

    CoAP conformance testing based on TTCN-3 by Hong-qing DU, Xiao-hong HUANG, Jia-jie He

    Published 2013-09-01
    “…Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic Web application specified for constrained nodes and constrained network which is currently an Internet draft.A CoAP conformance test suite based on TTCN-3,a standardized testing language,was designed,implemented and used after analyzing the protocol.…”
    Get full text
    Article
  17. 5197

    Functional and Practical Insights Into the Genetic Basis of Takayasu Arteritis by Desiré Casares‐Marfil, Amr H. Sawalha

    Published 2025-01-01
    “…To date, five genome‐wide association studies (GWAS) have been performed in TAK, identifying multiple genetic susceptibility loci across the genome. …”
    Get full text
    Article
  18. 5198

    Cloud native based edge computing: vision and challenges by Deze ZENG, Lvhao CHEN, Lin GU, Yuepeng LI

    Published 2021-06-01
    “…Cloud native computing, featured by low-cost container technology, well fits edge computing.It was proposed to apply cloud native computing to make edge computing resource management and control transparent to application development and operation.Compared with cloud computing, edge computing resources are widely distributed, highly heterogeneous, and fragmented, which called for collaborative resource management and control.According to the development status of cloud native related technologies, through the integration of future networking technologies such as soft were defined network and network function virtualization, a full-stack cloud native based edge computing architecture was proposed.Then, considering the hierarchical characteristics of containers, a low-overhead container deployment optimization problem for resource-limited edge computing was studied.Finally, the development challenges faced by cloud native based edge computing were discussed.…”
    Get full text
    Article
  19. 5199

    Application of Sports Clustering Deconstruction Based on Neural Network by Xiaobing Ma

    Published 2022-01-01
    “…A teaching system model based on motion recognition was established to improve motion cluster analysis and promote the implementation of data-based education. …”
    Get full text
    Article
  20. 5200

    Leasing business organization based on a digital platform by Orlova Ekaterina

    Published 2024-12-01
    “…The asset leasing model in the B2B segment has its own distinctive features compared to other equipment rental models – direct lease and sharing, which should be taken into account in designing a business digitalization project in the leasing sector. …”
    Get full text
    Article