Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5241
Credit Risk Contagion Based on Asymmetric Information Association
Published 2018-01-01“…In this paper, a credit risk contagion model based on asymmetric information association is proposed. …”
Get full text
Article -
5242
Selection of Construction Methods: A Knowledge-Based Approach
Published 2013-01-01“…This paper proposes a knowledge management approach that will enable the intelligent use of corporate experience and information and help to improve the selection of construction methods for a project. Then a knowledge-based system to support this decision-making process is proposed and described. …”
Get full text
Article -
5243
Blockchain-based key management scheme for distributed networks
Published 2018-09-01“…Regarding the difficult key management and excessive communication overhead in the distributed group networks,KMSBoB-Key management schemes based on blockchain was proposed,featuring key management and transmitting procedure based on blockchain in distributed group networks.Meanwhile,the all-member mining process of blockchain and the MTI/CO protocol process were combined to establish a protocol of dynamically generated session key,so as to streamline key management strategies in cross-heterogeneous autonomous domains.According to simulation testing and result analysis,KMSBoB is safe and effective,with less communication overhead and higher expansibility than traditional key management schemes.…”
Get full text
Article -
5244
Hadoop bottleneck detection algorithm based on information gain
Published 2016-07-01Subjects: “…big data…”
Get full text
Article -
5245
Simulation and application of power transmission network based on SDH
Published 2015-12-01“…The architecture of power optical transmission network simulation was proposed from the equipment layer,network layer and business layer for the target of communication support system for power grid control business,and the principle of SDH prototype simulation based on SSFNET was presented,and the design idea and implementation method of SDH device,network protection and recovery and associated alarm function was described in detail.Finally an example about the SDH communication topology of stable system in Northern Jiangsu Province was given,it realized the basic function of service bearer,fault alarm,channel recovery,route reconstruction,delay monitoring of power optical transmission network,which would provide quantitative analysis method for the communication network risk assessment,fault simulation,and the interaction effect of the power grid control system.…”
Get full text
Article -
5246
Potential of Black Phosphorus in Immune-Based Therapeutic Strategies
Published 2022-01-01“…Compared with PTT and PDT, the novel techniques of sonodynamic therapy (SDT) and photoacoustic therapy (PAT) exhibit amplified ROS generation and precise photoacoustic-shockwaves to enhance anticancer effect when BP receives ultrasound or NIR irradiation. Based on the prospective phototherapy, BP with irradiation can cause a “double-kill” to tumor cells, involving tumor-structure damage induced by heat, ROS, and shockwaves and a subsequent anticancer immune response induced by in situ vaccines construction in tumor site, which is referred to as photoimmunotherapy (PIT). …”
Get full text
Article -
5247
The Genetic Basis of Congenital Cataracts: Advances in Diagnostics and Therapeutics
Published 2025-02-01“…Genetic mutations in structural proteins such as crystallins and connexins account for over half of cases, emphasizing the critical role of early surgical intervention, particularly intraocular lens (IOL) implantation in children over two years old. …”
Get full text
Article -
5248
Symmetry Breaking as a Basis for Characterization of Dielectric Materials
Published 2025-01-01“…To explore the influence of symmetry breaking on propagation properties, an analytical dispersion equation, for both symmetries, is formulated using the Rigorous Coupled Wave Analysis (RCWA) combined with the matrix transverse resonance condition. Based on the analytical equation, an optimization procedure and linearized model for a sensing structure is obtained, specifically for X-band characterization of FR4 substrates. …”
Get full text
Article -
5249
Algorithm to design UWB pulse based on the peak frequency
Published 2005-01-01“…A new pulse design algorithm was proposed to generate UWB pulse based on the relation among the peak frequency of Rayleigh monopulse, the pulse shape parameter α and the order of differentiation n. …”
Get full text
Article -
5250
Resource allocation in NOMA heterogeneous network based on MEC
Published 2020-04-01“…Aiming at maximizing the cache revenue,a joint user association and power allocation algorithm was proposed for the matching of base stations with users and power allocation in a NOMA heterogeneous network with caches,a NOMA joint optimization algorithm which was achieved by combing with message passing and DC programming was proposed.First,the constraints were incorporated into the objective function,and the user association result was obtained by calculating the marginal of the message passing between the function node and the variable node in the new optimization problem.Then,the original optimization problem was transformed into the form of the difference between two convex functions,and allocate power resources through DC programming.Finally,the final user association and power allocation results are obtained through iterative calculations.Simulation results prove that the proposed algorithm effectively improves network performance.…”
Get full text
Article -
5251
Virtual service migration based on fuzzy logic approach
Published 2016-12-01“…For a green, energy-saving, efficient-using virtual resource migration and scheduling, the service migration method based on fuzzy logic inference was proposed. The method could infer the changes of user demand, migrate the virtual service according to the changes. …”
Get full text
Article -
5252
HIPSCS:secure IP communication system based on HIP
Published 2012-11-01“…To make the host identity protocol(HIP)into practical use,a secure communication system basd on HIP named HIPSCS was designed and implemented.HIPSCS achieved the real-name identification of communications hosts by binding the HI with user's certificates,thus made the source of packets trustworthy from network.IPsec was used to encrypt communication data,so that the goal of secure IP communication was accomplished.The HIPSCS prototype was implemented in the laboratory environment,and experimental results show that HIPSCS has good usability and can support mobile communication well.…”
Get full text
Article -
5253
Tone mapping based on variational model in gradient domain
Published 2015-01-01Get full text
Article -
5254
Architecture of SDN Applications Based on Software Defined Price
Published 2015-08-01“…Firstly,the concept of SDN applications was proposed from the perspective of users payment for allocating network resources.Secondly,with the comparison between traditional desktop application programming and network programming,the advantage of SDN programming was described.Thirdly,the concept of software defined price (SDP)was introduced.Based on the characteristics of SDN applications,the framework of SDP-based SDN application so as to apply to the OpenDaylight open source project was designed.Finally,an implementation of creating a virtual tenant network based on SDP was showed.The results of experiment present that the users can choose their desired virtual tenant according to the mechanism of SDP.…”
Get full text
Article -
5255
Arogyasree: An Enhanced Grid-Based Approach to Mobile Telemedicine
Published 2010-01-01“…Other features like zone-based overlay structure and persistent object space abstraction make the system efficient and easy to use. …”
Get full text
Article -
5256
SDN control and forwarding method based on identity attribute
Published 2019-11-01“…Due to the lack of effective data source authentication mechanism and the limited matching fields in software defined networking (SDN),an SDN security control and forwarding method based on identity attribute was proposed.Attribute identification and attribute signature were generated by device attributes and encapsulated in the group header.When the data flow left the network,the data was verified by the forwarding device to ensure the validity of the data flow.At the same time,attribute identification was defined as a match field of flow by the framework,and the network forwarding behavior was defined based on attributeidentification.A fine-grained access control was implemented by the proposed mechanism and attribute-based signature.The proposed mechanism and attribute-based signature implemented a fine-grained access control.Experimental results demonstrate that the method can effectively implement fine-grained forwarding and flow authentication,and the forwarding granularity is higher than that of similar schemes.…”
Get full text
Article -
5257
Video steganalysis scheme based on inter-frame collusion
Published 2009-01-01“…An inter-frame collusion based video steganalysis scheme(ICS) was proposed by utilizing the temporal corre-lation among video frames to find out whether secret data was hidden in the frames or not.Motions existing in video se-quence decreased the detection accuracy of steganalysis algorithms,which were taken into account in ICS steganalysis scheme by modeling motions and messages in video frame as a bimodal noise.Suspicious video frames were recognized by decision module employing GRNN classifier with features extracted by the inter-frame correlation strategy.Experi-mental results show the satisfying performance of the proposed scheme.…”
Get full text
Article -
5258
Fractal Tilings Based on Successive Adjacent Substitution Rule
Published 2018-01-01“…However, so far, the discovered f-tilings are very limited since constructing such f-tilings needs special talent. Based on the idea of hierarchically subdividing adjacent tiles, this paper presents a general method to generate f-tilings. …”
Get full text
Article -
5259
Representation for uncertainty trust of WSN based on lightweight-cloud
Published 2014-02-01Get full text
Article -
5260
Genetic Determinants of Osteoporosis: Common Bases to Cardiovascular Diseases?
Published 2010-01-01“…The individuation of genetic factors responsible for osteoporosis predisposition and development is fundamental for the disease prevention and for the setting of novel therapies, before fracture occurrence. In the last decades the interest of the Scientific Community has been concentrated in the understanding the genetic bases of this disease but with controversial and/or inconclusive results. …”
Get full text
Article