Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5301
Systematic Framework for Reflectarray Synthesis Based on Phase Optimization
Published 2012-01-01“…A Local Multipoint Distribution System (LMDS) base station working in the 24.5–26.5 GHz frequency band has been proposed to evaluate the method. …”
Get full text
Article -
5302
Fault Feature Extraction of Gearbox based on Adaptive VMD
Published 2019-04-01Get full text
Article -
5303
A survey of deep learning based modulation recognition
Published 2021-05-01Subjects: Get full text
Article -
5304
Microcontroller-Based Intravenous Fluid Monitoring System Design
Published 2024-06-01“…Load Cell has a mass reading accuracy value of 99.88%, the accuracy of testing the conversion of intravenous fluid measurements into milliliters of 99.49%, and the number of infusion fluid droplets per minute under normal conditions is 20, with an estimated time out for 8 hours. …”
Get full text
Article -
5305
Distance-Based Topological Descriptors on Ternary Hypertree Networks
Published 2022-01-01Get full text
Article -
5306
Scalability Optimization of Virtualization Based Botnet Emulation Platform
Published 2013-10-01“…Botnet emulation,a new technology to investigate Botnet characteristics,gains increasing focus.The practical virtualization based Botnet emulation platform is few and lacks support of rapid deployment,multiple virtualization,specific features of the Botnet like Botnets' circadian random shutdown and starting,and high scalability which will greatly influence the Botnet propagation emulation effect.A Botnet emulation system and its scalability improvement technologies were introduced.Experiments show that the memory performance optimization and CPU performance optimization reduce more than 77% of host memory per virtual machine,the maximum virtual machines one physical machine can starts up increase from 15 to 43; the host CPU utility is deduced from 100% to 20% when the vCPU's performance is restricted to 100 000.…”
Get full text
Article -
5307
SyncPoint based scoring method in IDS evaluation
Published 2008-01-01“…Scoring the true positive rate and the false positive rate is a key component in IDS evaluation.The accuracy of the scoring method affects the effectiveness of the evaluation results.There are two kinds of scoring methods existed,one considering the false positive and the other not.But both of them aren’t accurate enough and don’t scale to the traffic volume increase.The characteristics required by the evaluating window was analyzed,and a SyncPoint based scoring method utilizing the features that the IDS processes the packet in a FIFO queue way was proposed.The theoretical analy-sis and the experiment show that the SyncPoint based scoring method is better than the current methods in accuracy and the scalability.…”
Get full text
Article -
5308
Community Based Tourism: A Global South Perspective
Published 2024-07-01Subjects: “…community based tourism…”
Get full text
Article -
5309
Risk assessment model based on fuzzy Petri nets
Published 2013-08-01“…The concept of credibility was introduced, and the security risk assessment model and fuzzy reasoning algorithm based on fuzzy Petri net were also proposed, making use of fuzzy Petri nets method joined together with the AHP to analyze the question, and combining qualitative analysis and quantitative analysis together. …”
Get full text
Article -
5310
Handling Stability of Tractor Semitrailer Based on Handling Diagram
Published 2012-01-01“…While the stability in the former case is slightly influenced by driving speed and loaded mass, the latter is strongly influenced by both. …”
Get full text
Article -
5311
Android malware detection method based on SimHash
Published 2017-11-01Subjects: Get full text
Article -
5312
Improvement of the blockchain protocol based on memory-hard function
Published 2020-10-01Get full text
Article -
5313
MOFs and MOF‐Based Composites for the Adsorptive Removal of Ciprofloxacin
Published 2025-01-01“…This study aims to compare the MOF‐based adsorbents and provide a guide to developing such materials for the successful removal of CIP. …”
Get full text
Article -
5314
Adaptive routing and wavelength assignment method based on SDN
Published 2019-09-01“…Routing and wavelength assignment is an important resource allocation method of all-optical network.Aiming at the problem of traditional method combined with the new architecture,an adaptive multi-objective routing and wavelength assignment method based on SDN was proposed,which could realize the allocation of link resources of all-optical network through self-regulation.Based on the SDN service function chain model,service scheduling time and link service quality were taken as the scheduling objective,routing and wavelength assignment problem was constructed as the 0-1 integer programming problem,meanwhile,binary hybrid topology particle swarm optimization algorithm was used to optimize the network resources for optimal scheduling.The simulation results show that the proposed method is superior to the traditional classical algorithms in the test of recovery time,blocking rate and resource utilization.…”
Get full text
Article -
5315
Framework for a Cloud-Based Multimedia Surveillance System
Published 2014-05-01“…Cloud computing can provide a powerful and scalable infrastructure for large-scale storage, processing, and dissemination of sensor data. Furthermore, the integration of sensor technology and cloud computing offers new possibilities for efficient development and deployment of sensor-based systems. …”
Get full text
Article -
5316
An Improved Feature Selection Based on Effective Range for Classification
Published 2014-01-01“…In order to overcome this limitation, a novel efficient statistical feature selection approach called improved feature selection based on effective range (IFSER) is proposed in this paper. …”
Get full text
Article -
5317
Simulation of the Electro-Superconducting System Based on the H Equation
Published 2022-01-01“…Simulation results show that, at 1 s, we start to use 0.2 s, 0.4 s, 0.6 s, and 0.8 s time, respectively, to pass current into the floating coil until it reaches 4.4 A. …”
Get full text
Article -
5318
Efficient and Secure Traffic Scheduling Based on Private Sketch
Published 2025-01-01“…In today’s data–driven world, the explosive growth of network traffic often leads to network congestion, which seriously affects service performance and user experience. …”
Get full text
Article -
5319
Machine learning-based myocardial infarction bibliometric analysis
Published 2025-02-01“…CiteSpace was used for temporal trend analysis, Bibliometrix for quantitative country and institutional analysis, and VOSviewer for visualization of collaboration networks.ResultsSince the emergence of research literature on medical imaging and machine learning (ML) in 2008, interest in this field has grown rapidly, particularly since the pivotal moment in 2016. …”
Get full text
Article -
5320
Domain component interface identifier matching based on semantic
Published 2007-01-01“…A domain component interface identifier matching method based on semantic was provided.The original interfaces in component library were parsed based on naming rule base,DRM(dimension record model),root base,operation classification and environment classification.Then the parsed component library was generated.The proposed method searched in parsed component library based on environment,object and operation information provided by user.First,the method filtered interface by environment and object,then the name similarity and construction similarity are calculated by defined threshold,matching degree is got.The tool based on the way was applied in practical work and have achieved good results.…”
Get full text
Article