Showing 5,221 - 5,240 results of 67,915 for search 'DASB~', query time: 2.12s Refine Results
  1. 5221

    Dynamics Analysis of Locomotive Transmission System based on Romax by Zhang Fulai, Zhang Yinghui, He Weidong, Shi Xiaochun

    Published 2017-01-01
    “…Using the Monte Carlo method for tooth shape optimization to reduce the transmission error,the best plan is obtained,achieving the transmission error reduced by 73% and the partial load phenomenon has improved greatly.…”
    Get full text
    Article
  2. 5222
  3. 5223
  4. 5224

    Fabric-based patchwork on shoes through ultrasonic welding by Rahima Hussain, Muhammad Anwaar Nazeer

    Published 2025-02-01
    “…There has been a surge in textile and shoe product design innovation, introducing new products that merge design and technology in various domains. …”
    Get full text
    Article
  5. 5225
  6. 5226

    Cloud computing based smartphone social authentication system by Yan-bing LIU, Fei-fei LIU

    Published 2012-09-01
    “…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
    Get full text
    Article
  7. 5227

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  8. 5228

    Large-Scale Evolutionary Strategy Based on Gradient Approximation by Jin Jin

    Published 2021-01-01
    “…The parameters of the next generation of individuals are generated based on the approximate gradients. The experimental results were tested using CEC 2010 and CEC2013 LSGO benchmark test suite, and the experimental results verified the effectiveness of the algorithm on a number of different tasks.…”
    Get full text
    Article
  9. 5229

    AgroClimate Indicators Web-Based Monitoring Tool by Clyde Fraisse, Mauricio A. Z. Karrei, Margaret Walsh

    Published 2024-03-01
    “… This guide introduces users to a recently developed web-based tool on AgroClimate.org that was designed to systematically monitor climate indicators and detect anomalies with the potential to affect the agricultural industry in Florida and elsewhere in the continental United States. …”
    Get full text
    Article
  10. 5230
  11. 5231

    VMI-based virtual machine remote attestation scheme by Wei WANG, Xingshu CHEN, Xiao LAN, Xin JIN

    Published 2018-12-01
    “…The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.…”
    Get full text
    Article
  12. 5232

    Nonintrusive Load Disaggregation Based on Attention Neural Networks by Shunfu Lin, Jiayu Yang, Yi Li, Yunwei Shen, Fangxing Li, Xiaoyan Bian, Dongdong Li

    Published 2025-01-01
    “…The proposed model, compared to existing load disaggregation models, has a larger receptive field and can capture crucial information within the data. …”
    Get full text
    Article
  13. 5233
  14. 5234

    Machine Learning-Based Network Detection Research for SDNs by Lai Jiayue

    Published 2025-01-01
    “…This research endeavors to fortify the security posture of Software-Defined Networks (SDN) through the strategic utilization of intelligent machine learning techniques, with a primary focus on mitigating detrimental Denial of Service (DoS) attacks. To accomplish this, this study constructed a rigorously designed simulated SDN environment, which served as the cornerstone for meticulously assembling a comprehensive dataset encompassing a diverse array of attack vectors, with particular emphasis on DoS. …”
    Get full text
    Article
  15. 5235

    Blockchain-based high transparent PKI authentication protocol by Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN

    Published 2022-08-01
    “…The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.…”
    Get full text
    Article
  16. 5236

    Spectrum Access Algoritbm Based on POMDP Model in CVANET by Xuefei Zhang, Guoan Zhang, Yancheng Ji

    Published 2014-09-01
    “…For the dynamic features of cognitive vehicular Ad Hoc network(CVANET)channel state, a study on spectrum sensing and access of cognitive vehicle users was presented, which was based on framework of partially observable Markov decision process(POMDP). …”
    Get full text
    Article
  17. 5237

    Coefficient-Based Regression with Non-Identical Unbounded Sampling by Jia Cai

    Published 2013-01-01
    “…We investigate a coefficient-based least squares regression problem with indefinite kernels from non-identical unbounded sampling processes. …”
    Get full text
    Article
  18. 5238

    Semantic Tokenization-Based Mamba for Hyperspectral Image Classification by Ri Ming, Na Chen, Jiangtao Peng, Weiwei Sun, Zhijing Ye

    Published 2025-01-01
    “…Recently, the transformer-based model has shown superior performance in hyperspectral image classification (HSIC) due to its excellent ability to model long-term dependencies on sequence data. …”
    Get full text
    Article
  19. 5239

    In silico design of an epitope-based vaccine ensemble for fasliolopsiasis by Ruchishree Konhar, Ruchishree Konhar, Kanhu Charan Das, Kanhu Charan Das, Aiboklang Nongrum, Rohan Raj Samal, Shailesh Kumar Sarangi, Devendra Kumar Biswal, Devendra Kumar Biswal

    Published 2025-01-01
    “…Considering the extensive genetic data available for intestinal flukes that has expanded with technological advancements, we may need to reassess our methods and suggest a more sophisticated technique in the future for identifying vaccine molecules.…”
    Get full text
    Article
  20. 5240

    Human Motion Gesture Recognition Based on Computer Vision by Rui Ma, Zhendong Zhang, Enqing Chen

    Published 2021-01-01
    “…In the image, the key nodes of the human body model and the general body posture can be identified more accurately. The method has been tested on different data sets. In most cases, the results obtained by the proposed method are better than those of other comparison methods.…”
    Get full text
    Article