Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5221
Dynamics Analysis of Locomotive Transmission System based on Romax
Published 2017-01-01“…Using the Monte Carlo method for tooth shape optimization to reduce the transmission error,the best plan is obtained,achieving the transmission error reduced by 73% and the partial load phenomenon has improved greatly.…”
Get full text
Article -
5222
THE STRATEGY DEVELOPMENT OF THE REGIONAL AIRPORT ON THE BASIS OF ETALON STRATEGY
Published 2017-04-01Get full text
Article -
5223
Efficient traffic information dissemination algorithm based on ranking
Published 2009-01-01Get full text
Article -
5224
Fabric-based patchwork on shoes through ultrasonic welding
Published 2025-02-01“…There has been a surge in textile and shoe product design innovation, introducing new products that merge design and technology in various domains. …”
Get full text
Article -
5225
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: Get full text
Article -
5226
Cloud computing based smartphone social authentication system
Published 2012-09-01“…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
Get full text
Article -
5227
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01“…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
Get full text
Article -
5228
Large-Scale Evolutionary Strategy Based on Gradient Approximation
Published 2021-01-01“…The parameters of the next generation of individuals are generated based on the approximate gradients. The experimental results were tested using CEC 2010 and CEC2013 LSGO benchmark test suite, and the experimental results verified the effectiveness of the algorithm on a number of different tasks.…”
Get full text
Article -
5229
AgroClimate Indicators Web-Based Monitoring Tool
Published 2024-03-01“… This guide introduces users to a recently developed web-based tool on AgroClimate.org that was designed to systematically monitor climate indicators and detect anomalies with the potential to affect the agricultural industry in Florida and elsewhere in the continental United States. …”
Get full text
Article -
5230
Table of North America Kermes, Based on External Characters
Published 1900-01-01Get full text
Article -
5231
VMI-based virtual machine remote attestation scheme
Published 2018-12-01“…The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.…”
Get full text
Article -
5232
Nonintrusive Load Disaggregation Based on Attention Neural Networks
Published 2025-01-01“…The proposed model, compared to existing load disaggregation models, has a larger receptive field and can capture crucial information within the data. …”
Get full text
Article -
5233
Editorial: Microbial safety of animal-based food products
Published 2025-02-01Get full text
Article -
5234
Machine Learning-Based Network Detection Research for SDNs
Published 2025-01-01“…This research endeavors to fortify the security posture of Software-Defined Networks (SDN) through the strategic utilization of intelligent machine learning techniques, with a primary focus on mitigating detrimental Denial of Service (DoS) attacks. To accomplish this, this study constructed a rigorously designed simulated SDN environment, which served as the cornerstone for meticulously assembling a comprehensive dataset encompassing a diverse array of attack vectors, with particular emphasis on DoS. …”
Get full text
Article -
5235
Blockchain-based high transparent PKI authentication protocol
Published 2022-08-01“…The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.…”
Get full text
Article -
5236
Spectrum Access Algoritbm Based on POMDP Model in CVANET
Published 2014-09-01“…For the dynamic features of cognitive vehicular Ad Hoc network(CVANET)channel state, a study on spectrum sensing and access of cognitive vehicle users was presented, which was based on framework of partially observable Markov decision process(POMDP). …”
Get full text
Article -
5237
Coefficient-Based Regression with Non-Identical Unbounded Sampling
Published 2013-01-01“…We investigate a coefficient-based least squares regression problem with indefinite kernels from non-identical unbounded sampling processes. …”
Get full text
Article -
5238
Semantic Tokenization-Based Mamba for Hyperspectral Image Classification
Published 2025-01-01“…Recently, the transformer-based model has shown superior performance in hyperspectral image classification (HSIC) due to its excellent ability to model long-term dependencies on sequence data. …”
Get full text
Article -
5239
In silico design of an epitope-based vaccine ensemble for fasliolopsiasis
Published 2025-01-01“…Considering the extensive genetic data available for intestinal flukes that has expanded with technological advancements, we may need to reassess our methods and suggest a more sophisticated technique in the future for identifying vaccine molecules.…”
Get full text
Article -
5240
Human Motion Gesture Recognition Based on Computer Vision
Published 2021-01-01“…In the image, the key nodes of the human body model and the general body posture can be identified more accurately. The method has been tested on different data sets. In most cases, the results obtained by the proposed method are better than those of other comparison methods.…”
Get full text
Article