Showing 5,241 - 5,260 results of 67,915 for search 'DASB~', query time: 2.39s Refine Results
  1. 5241

    Credit Risk Contagion Based on Asymmetric Information Association by Shanshan Jiang, Hong Fan, Min Xia

    Published 2018-01-01
    “…In this paper, a credit risk contagion model based on asymmetric information association is proposed. …”
    Get full text
    Article
  2. 5242

    Selection of Construction Methods: A Knowledge-Based Approach by Ximena Ferrada, Alfredo Serpell, Miroslaw Skibniewski

    Published 2013-01-01
    “…This paper proposes a knowledge management approach that will enable the intelligent use of corporate experience and information and help to improve the selection of construction methods for a project. Then a knowledge-based system to support this decision-making process is proposed and described. …”
    Get full text
    Article
  3. 5243

    Blockchain-based key management scheme for distributed networks by Qianyi DAI, Kaiyong XU, Song GUO, Guoming CAI, Zhicheng ZHOU

    Published 2018-09-01
    “…Regarding the difficult key management and excessive communication overhead in the distributed group networks,KMSBoB-Key management schemes based on blockchain was proposed,featuring key management and transmitting procedure based on blockchain in distributed group networks.Meanwhile,the all-member mining process of blockchain and the MTI/CO protocol process were combined to establish a protocol of dynamically generated session key,so as to streamline key management strategies in cross-heterogeneous autonomous domains.According to simulation testing and result analysis,KMSBoB is safe and effective,with less communication overhead and higher expansibility than traditional key management schemes.…”
    Get full text
    Article
  4. 5244
  5. 5245

    Simulation and application of power transmission network based on SDH by Yunfei GUO, Xiande BU, Shidong LIU, Yao WANG, Wenjie YU

    Published 2015-12-01
    “…The architecture of power optical transmission network simulation was proposed from the equipment layer,network layer and business layer for the target of communication support system for power grid control business,and the principle of SDH prototype simulation based on SSFNET was presented,and the design idea and implementation method of SDH device,network protection and recovery and associated alarm function was described in detail.Finally an example about the SDH communication topology of stable system in Northern Jiangsu Province was given,it realized the basic function of service bearer,fault alarm,channel recovery,route reconstruction,delay monitoring of power optical transmission network,which would provide quantitative analysis method for the communication network risk assessment,fault simulation,and the interaction effect of the power grid control system.…”
    Get full text
    Article
  6. 5246

    Potential of Black Phosphorus in Immune-Based Therapeutic Strategies by Wenjuan Dong, Hu Wang, Hailin Liu, Chunqiao Zhou, Xuelin Zhang, Song Wang, Lin He

    Published 2022-01-01
    “…Compared with PTT and PDT, the novel techniques of sonodynamic therapy (SDT) and photoacoustic therapy (PAT) exhibit amplified ROS generation and precise photoacoustic-shockwaves to enhance anticancer effect when BP receives ultrasound or NIR irradiation. Based on the prospective phototherapy, BP with irradiation can cause a “double-kill” to tumor cells, involving tumor-structure damage induced by heat, ROS, and shockwaves and a subsequent anticancer immune response induced by in situ vaccines construction in tumor site, which is referred to as photoimmunotherapy (PIT). …”
    Get full text
    Article
  7. 5247

    The Genetic Basis of Congenital Cataracts: Advances in Diagnostics and Therapeutics by Agnieszka Starzyk, Piotr Charzewski

    Published 2025-02-01
    “…Genetic mutations in structural proteins such as crystallins and connexins account for over half of cases, emphasizing the critical role of early surgical intervention, particularly intraocular lens (IOL) implantation in children over two years old. …”
    Get full text
    Article
  8. 5248

    Symmetry Breaking as a Basis for Characterization of Dielectric Materials by Dubravko Tomić, Zvonimir Šipuš

    Published 2025-01-01
    “…To explore the influence of symmetry breaking on propagation properties, an analytical dispersion equation, for both symmetries, is formulated using the Rigorous Coupled Wave Analysis (RCWA) combined with the matrix transverse resonance condition. Based on the analytical equation, an optimization procedure and linearized model for a sensing structure is obtained, specifically for X-band characterization of FR4 substrates. …”
    Get full text
    Article
  9. 5249

    Algorithm to design UWB pulse based on the peak frequency by ZOU Wei-xia1, ZHANG Chun-qing2, ZHOU Zheng1

    Published 2005-01-01
    “…A new pulse design algorithm was proposed to generate UWB pulse based on the relation among the peak frequency of Rayleigh monopulse, the pulse shape parameter α and the order of differentiation n. …”
    Get full text
    Article
  10. 5250

    Resource allocation in NOMA heterogeneous network based on MEC by Haijun ZHANG, Zizheng ZHANG, Keping LONG

    Published 2020-04-01
    “…Aiming at maximizing the cache revenue,a joint user association and power allocation algorithm was proposed for the matching of base stations with users and power allocation in a NOMA heterogeneous network with caches,a NOMA joint optimization algorithm which was achieved by combing with message passing and DC programming was proposed.First,the constraints were incorporated into the objective function,and the user association result was obtained by calculating the marginal of the message passing between the function node and the variable node in the new optimization problem.Then,the original optimization problem was transformed into the form of the difference between two convex functions,and allocate power resources through DC programming.Finally,the final user association and power allocation results are obtained through iterative calculations.Simulation results prove that the proposed algorithm effectively improves network performance.…”
    Get full text
    Article
  11. 5251

    Virtual service migration based on fuzzy logic approach by Zihou WANG, Yuemei XU, Luchen ZHANG

    Published 2016-12-01
    “…For a green, energy-saving, efficient-using virtual resource migration and scheduling, the service migration method based on fuzzy logic inference was proposed. The method could infer the changes of user demand, migrate the virtual service according to the changes. …”
    Get full text
    Article
  12. 5252

    HIPSCS:secure IP communication system based on HIP by Min ZHOU, Ming CHEN, Chang-you XING, Pei-cheng JIANG

    Published 2012-11-01
    “…To make the host identity protocol(HIP)into practical use,a secure communication system basd on HIP named HIPSCS was designed and implemented.HIPSCS achieved the real-name identification of communications hosts by binding the HI with user's certificates,thus made the source of packets trustworthy from network.IPsec was used to encrypt communication data,so that the goal of secure IP communication was accomplished.The HIPSCS prototype was implemented in the laboratory environment,and experimental results show that HIPSCS has good usability and can support mobile communication well.…”
    Get full text
    Article
  13. 5253
  14. 5254

    Architecture of SDN Applications Based on Software Defined Price by Bin Zhuge, Baoxia Wang, Yining Wang, Chunming Wu, Minhui Yao

    Published 2015-08-01
    “…Firstly,the concept of SDN applications was proposed from the perspective of users payment for allocating network resources.Secondly,with the comparison between traditional desktop application programming and network programming,the advantage of SDN programming was described.Thirdly,the concept of software defined price (SDP)was introduced.Based on the characteristics of SDN applications,the framework of SDP-based SDN application so as to apply to the OpenDaylight open source project was designed.Finally,an implementation of creating a virtual tenant network based on SDP was showed.The results of experiment present that the users can choose their desired virtual tenant according to the mechanism of SDP.…”
    Get full text
    Article
  15. 5255

    Arogyasree: An Enhanced Grid-Based Approach to Mobile Telemedicine by Sriram Kailasam, Santosh Kumar, Janakiram Dharanipragada

    Published 2010-01-01
    “…Other features like zone-based overlay structure and persistent object space abstraction make the system efficient and easy to use. …”
    Get full text
    Article
  16. 5256

    SDN control and forwarding method based on identity attribute by Xianwei ZHU, Chaowen CHANG, Zhiqiang ZHU, Xi QIN

    Published 2019-11-01
    “…Due to the lack of effective data source authentication mechanism and the limited matching fields in software defined networking (SDN),an SDN security control and forwarding method based on identity attribute was proposed.Attribute identification and attribute signature were generated by device attributes and encapsulated in the group header.When the data flow left the network,the data was verified by the forwarding device to ensure the validity of the data flow.At the same time,attribute identification was defined as a match field of flow by the framework,and the network forwarding behavior was defined based on attributeidentification.A fine-grained access control was implemented by the proposed mechanism and attribute-based signature.The proposed mechanism and attribute-based signature implemented a fine-grained access control.Experimental results demonstrate that the method can effectively implement fine-grained forwarding and flow authentication,and the forwarding granularity is higher than that of similar schemes.…”
    Get full text
    Article
  17. 5257

    Video steganalysis scheme based on inter-frame collusion by LIU Bin, LIU Fen-lin, YANG Chun-fang

    Published 2009-01-01
    “…An inter-frame collusion based video steganalysis scheme(ICS) was proposed by utilizing the temporal corre-lation among video frames to find out whether secret data was hidden in the frames or not.Motions existing in video se-quence decreased the detection accuracy of steganalysis algorithms,which were taken into account in ICS steganalysis scheme by modeling motions and messages in video frame as a bimodal noise.Suspicious video frames were recognized by decision module employing GRNN classifier with features extracted by the inter-frame correlation strategy.Experi-mental results show the satisfying performance of the proposed scheme.…”
    Get full text
    Article
  18. 5258

    Fractal Tilings Based on Successive Adjacent Substitution Rule by Peichang Ouyang, Xiaosong Tang, Kwokwai Chung, Tao Yu

    Published 2018-01-01
    “…However, so far, the discovered f-tilings are very limited since constructing such f-tilings needs special talent. Based on the idea of hierarchically subdividing adjacent tiles, this paper presents a general method to generate f-tilings. …”
    Get full text
    Article
  19. 5259
  20. 5260

    Genetic Determinants of Osteoporosis: Common Bases to Cardiovascular Diseases? by Francesca Marini, Maria Luisa Brandi

    Published 2010-01-01
    “…The individuation of genetic factors responsible for osteoporosis predisposition and development is fundamental for the disease prevention and for the setting of novel therapies, before fracture occurrence. In the last decades the interest of the Scientific Community has been concentrated in the understanding the genetic bases of this disease but with controversial and/or inconclusive results. …”
    Get full text
    Article