Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5261
TempoGRAPHer: Aggregation-Based Temporal Graph Exploration
Published 2025-01-01“…Temporal exploration is supported by two complementary strategies, namely <i>skyline-</i> and <i>interaction</i>-based exploration. Skyline-based exploration provides insights into the overall trends in the evolution, while interaction-based exploration offers a closer look at specific parts of the graph evolution history where significant changes occurred. …”
Get full text
Article -
5262
Flow scheduling technology based on BGP extended protocol
Published 2016-03-01“…A novel centralized flow scheduling scheme based on software defined networking(SDN)was proposed.The existing problems of current flow scheduling method based on BGP were analyzed,and a new scheme was proposed.In the scheme,the BGP Flowspec was enhanced to avoid reconfiguring the related routers one by one,and hence the network management was simplified and a more flexible flow scheduling method was provided.The proposed scheduling scheme is compatible with the traditional BGP,which matches the trend of current industry and solves some of the problems in traditional BGP scheme.…”
Get full text
Article -
5263
Response Surface Optimization of Flexspline based on Parameter Sensitivity
Published 2022-05-01“…The stress concentration effect can be reduced and the fatigue life of flexspline can be improved by reasonably selecting the structural parameters of flexspline. Based on the sensitivity analysis of parameters,the key parameters affecting the stress of the flexspline are screened out. …”
Get full text
Article -
5264
Decoupling Suspension Controller Based on Magnetic Flux Feedback
Published 2013-01-01“…The suspension module control system model has been established based on MIMO (multiple input and multiple output) state feedback linearization. …”
Get full text
Article -
5265
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures
Published 2025-01-01“…We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. …”
Get full text
Article -
5266
Privacy cloud storage scheme based on fog computing
Published 2019-03-01“…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
Get full text
Article -
5267
Escape method of malicious traffic based on backdoor attack
Published 2024-04-01“…Launching backdoor attacks against deep learning (DL)-based network traffic classifiers, and a method of malicious traffic escape was proposed based on the backdoor attack. …”
Get full text
Article -
5268
Fermat point based connectivity restoration strategy in networks
Published 2019-10-01Get full text
Article -
5269
Small cell discovery based on TOA fingerprint database
Published 2017-09-01“…In the scenario that a large number of small cells are deployed in the mobile communication network,the number of carriers to be detected by the user equipment (UE) in inter-frequency scanning is considerably larger than that in the conventional network deployment scenarios.This procedure may consume tremendous amounts of UEs’ energy.In order to solve this problem,a small cell discovery (SCD) scheme based on TOA fingerprint database to alleviate intensive energy consumption was proposed when the UEs try to find their potential serving small cells.The proposed scheme reduces the energy consumption of the UE by decreasing the number of unnecessary inter-frequency detection.The simulation results verifiy that the proposed scheme,compared with the existing SCD strategy using received signal strength (RSSI) based radio maps,has better anti-noise performance and higher accuracy.In addition,it can effectively help the high-speed UE avoid performing inter-frequency detection,and hence increase the rate of the UE being successfully connected to the appropriate small cell.…”
Get full text
Article -
5270
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Subjects: Get full text
Article -
5271
Load forecasting based on knowledge flow and transfer learning
Published 2022-05-01“…In all things connected, comprehensive perception, intelligent decision-making information era of big data, in the information acquisition of big data and a large amount of signal processing, there are still large amount of data redundancy, calculation and the shortcoming of high cost, not in time, and no marked.The transfer learning was applied, and the knowledge flow system based on the weight impact factor for information fusion was integrated to assist the analysis and simplify the calculation for the IoT sensing system.The knowledge flow mode of transfer learning and data fusion was adopted in the IoT sensing system, and the simulation calculation of short-term load prediction was made based on the partial data of regional power consumption.The influencing factors of users’ electricity consumption behavior were analyzed, and the optimal weight distribution of influencing factors was obtained through training, so as to predict the power consumption rate.The results show that in this way, it can clearly identify the characteristics of electricity consumption behavior, and predict the energy consumption according to the characteristics of electricity consumption.…”
Get full text
Article -
5272
Power services scheduling algorithm based on quantum communication
Published 2019-11-01“…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
Get full text
Article -
5273
ENERGY SAVING TECHNOLOGY OF LIGATURES PRODUCTION ON THE BASIS OF MOLYBDENUM
Published 2014-03-01“…Data on development of technology of the molybdenum-containing addition alloy production by method of aluminothermic restoration is provided in the article. …”
Get full text
Article -
5274
Non-coding parts of genomes as the basis of epigenetic heredity
Published 2017-11-01“…We hypothesized that the basis of epigenetic regulation of genomes in ontogenesis is the specificity of the distribution, number and composition of transposons. …”
Get full text
Article -
5275
Fault Prediction of Centrifugal Pump Based on Improved KNN
Published 2021-01-01“…The results show that this method can effectively distinguish the specific fault types of centrifugal pumps based on vibration signals, and the fault prediction accuracy of the off-balance condition is up to 82%. …”
Get full text
Article -
5276
GMM-based localization algorithm under NLOS conditions
Published 2014-01-01“…Aiming at indoor node localizations of WSN,a node localization algorithm,where priori-knowledge is not necessary,was proposed.on basis of analyzing the error model,combined with Gaussian mixture model (GMM).By training the distance measurements containing NLOS errors,the more accurate range estimations can be obtained.For higher localization accuracy,the particle swarm optimization (PSO) was introduced to optimize the expectation-maximization (EM)algorithm.Finally,by using the residual weighting algorithm to estimate the distance,the estimation coordinates of target nodes can be determined.The proposed algorithm was proved to be effective through simulation experiments.…”
Get full text
Article -
5277
Analysis of Driving Characteristic of Bistable Mechanism based on Dynamics
Published 2017-01-01“…A new method for the steady state analysis of four bar mechanism based on dynamics is presented to analyze the driving characteristic of four bar mechanism with only a compliant joint.And according to the drive characteristic curve,the steady state characteristics of the flexible mechanism are judged. …”
Get full text
Article -
5278
ANTI-FREEZING ADHESIVE EXPERIMENTAL STUDY BASED ON BIONICS
Published 2017-01-01“…In order to solve the freezing adhesive problem on roller and belt during coal transportation process in winter,on the basis of referring to relevant freezing adhesive theory,inspired by bionics,we did the theoretical analysis and experimental research about the application of bionic convex hull geometry structure on the roller and belt. …”
Get full text
Article -
5279
Rumor detection in social media based on eahanced Transformer
Published 2022-08-01“…With the rapid development of the Internet, social media is increasingly integrated into all aspects of people’s daily life.Social media has gradually become a tool and even a platform for people to share opinions, insights, experiences and viewpoints.It is the main method for people to obtain and share information as well as express and exchange opinions.Currently, social media mainly includes social networking sites, Weibo, Twitter, blogs, forums, podcasts and so on.Due to the openness of social media, the user scale is large and the sources are complex and numerous, then all kinds of rumors and false information may be generated easily.Rumors on social media influence netizens’ understanding of events and shake the stability of society.Therefore, how to accurately and efficiently detect rumors has become an urgent problem to be solved.Existing Transformer based social media rumor detection models ignored the text location information.To effectively extract text location information and make full use of text potential information, a rumor detection model in social media was proposed and it was based on the enhanced Transformer.This model enhanced the traditional Transformer from two aspects of relative position and absolute position.It captured the direction information and distance information of the text using learnable relative position coding and mapped words from different positions to different feature spaces using absolute position coding.Experimental results show that, compared with the best benchmark model, the accuracy of the proposed model on Twitter15, Twitter16 and Weibo datasets is enhanced by 0.9%, 0.6% and 1.4%, respectively.Experimental results verify the effectiveness of the proposed location coding.And the enhanced Transformer based on location coding can significantly improve the effects of social media rumor detection.…”
Get full text
Article -
5280
How self-disclosure of student based on demographic perspective?
Published 2024-11-01“…Jurnal Konseling dan Pendidikan…”
Get full text
Article