Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5321
Spectrofluorimetric method for atenolol determination based on gold nanoparticles
Published 2018-06-01“…A simple and sensitive spectrofluorimetric method for determination of atenolol (ATE) using gold nanoparticles (AuNPs) was developed. The method is based on the quenching effect of atenolol on photoluminescence of AuNPs at λem = 705 nm. …”
Get full text
Article -
5322
Video steganalysis scheme based on weighted undirected graph
Published 2014-10-01“…A new steganalysis scheme based on taking the inter-frame correlation as the undirected graph weights was proposed utilizing the temporal correlation among video frames.First,getting the eigenvector of every video frame brightness by calculating its gray-level co-occurrence matrix,the eigenvector is an eight-dimensional vector.Then,computing the weights of each video frame by using the euclide distance algorithm.The weighted undirected graph which representing the correlations between each frame is constructed.Finally,according to the change of correlations between the frames after embedding information determine whether the video is embedded confidential information.Experimental results show that the method using weighted undirected graph can quickly discriminate stego video and the original video,and have a high accuracy rate.…”
Get full text
Article -
5323
Continuous noise covert transmission scheme based on QCSK
Published 2022-04-01“…The existing embedded scheme requires far lower transmission power of the covert system than that of the host system, and thus decreasing the reliability of covert transmission.To figure out the above limitations, a continuous noise covert communication scheme based on quadrature chaos shift keying (QCSK) was proposed.The QCSK signal containing covert information and artificial noise were transmitted alternately, and the illegal energy detection was effectively resisted by the continuity of noise which has strong concealment in both time and frequency domains.Furthermore, extremely low power was not required to meet the demand of convert communication in QCSK, whereas allowing the increase of transmit power under the condition that the performance of the host system to improve the performance of covert transmission.Theoretical analysis and simulation results show that the bit error rate (BER) of covert transmission brings two orders of magnitude improvement compared with the existing scheme at BER=1×10<sup>-7</sup> for host system.…”
Get full text
Article -
5324
Secure key-sharing algorithm based on smart grid
Published 2021-08-01“…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
Get full text
Article -
5325
Hydrological prediction in ungauged basins based on spatiotemporal characteristics.
Published 2025-01-01“…Subsequently, we establish an initial regression model using the TrAdaBoost algorithm based on the hydrologic data from the selected watershed stations. …”
Get full text
Article -
5326
The Application and Analysis of Emotion Recognition Based on Modern Technology
Published 2025-01-01“…The study involves collecting and analysing experimental data, exploring their respective strengths and limitations, and proposing potential solutions to enhance their effectiveness. …”
Get full text
Article -
5327
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01“…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
Get full text
Article -
5328
Carrier-Based Drug Delivery System for Treatment of Acne
Published 2014-01-01“…The advantages, disadvantages, and outcome of using various carrier-based delivery systems like liposomes, niosomes, solid lipid nanoparticles, and so forth, are explained. …”
Get full text
Article -
5329
Estimation of Precipitation in Tianshan Mountains Based on Topographic Factors
Published 2020-01-01“…In view of the scarcity of meteorological stations in Tianshan Mountains, it isdifficult to deeply understand the spatial distribution pattern and mechanism of precipitation inmountainous areas. Based on the precipitation data of meteorological stations and considered seventopographic factors such as longitude, latitude, elevation, slope, aspect, relief and topographicopenness as principal component analysis indicators, this paper establishes the precipitationestimation model in Tianshan Mountains by the principal-component stepwise regression method. …”
Get full text
Article -
5330
A fragmentation-based study of heavy quark production
Published 2020-01-01“…In this work, we critically reconsider the validity of the widely-adopted approximation in which heavy quarks are generated at the matrix-element level, with special emphasis on the impact of the collinear logarithms associated with final-state heavy quark and gluon splittings. Our study, based on a perturbative fragmentation-function approach, explicitly shows that neglecting the resummation of collinear logarithms may yield inaccurate predictions, in particular when observables exclusive in the heavy quark degrees of freedom are considered. …”
Get full text
Article -
5331
Fault Diagnosis of Planetary Gearbox based on 1-DCNN
Published 2020-11-01“…In order to improve the diagnosis efficiency of planetary gearboxes, a fault diagnosis method based on one-dimensional deep convolutional neural network (1-DCNN) is proposed, and the original signals are directly input to the network for diagnosis. …”
Get full text
Article -
5332
Crack detection based on attention mechanism with YOLOv5
Published 2025-01-01“…Aiming at the problems of poor real‐time performance and low precision of traditional pavement crack detection, a crack detection method based on improved YOLOv5 one‐step target detection algorithm of convolutional neural network is proposed by using the advantages of depth learning network in target detection. …”
Get full text
Article -
5333
AADL architecture model construction based on FACE mode
Published 2024-12-01“…Xibei Gongye Daxue Xuebao…”
Get full text
Article -
5334
Indoor sensing technology based on channel state information
Published 2019-10-01“…The wide spread wireless network has brought about tremendous development of mobile internet business services and has become one of the infrastructures of modern society.The basic principles and implementation methods of wireless sensing technology were expounded from the perspective of wireless channel state analysis.The technological innovation in the field of wireless sensing in recent years was discussed,especially channel state information based human body posture detecting and environmental monitoring.Finally,the future development trend of sensing technology based on wireless communication network was analyzed in order to provide reference for related research.…”
Get full text
Article -
5335
SPI-Based Spatiotemporal Drought over Sri Lanka
Published 2020-01-01“…The result based on SPI identified hydrological years 1975-76, 1982-83, 1986-87, 1988-89, 2000-01, 2001-02, 2013-14, and 2016-17 as drought years for 52, 32, 35, 33, 33, 31, 31, and 31% of tested stations (54), respectively, at annual time scale. …”
Get full text
Article -
5336
Construction of Smart City Based on Open Government Data
Published 2014-11-01Subjects: “…open government data…”
Get full text
Article -
5337
Forage-Based Heifer Development Program for North Florida
Published 2018-11-01“… Florida has 915,000 beef cows and 125,000 replacement heifers (USDA, 2016). …”
Get full text
Article -
5338
Generator polynomial estimation of LFSR sequence based on GFFT
Published 2018-02-01“…The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence and zero points in generator polynomial of LFSR sequence was illustrated firstly.Then the generator polynomial of LFSR sequence was fast estimated based on that property,and the improved method in noisy environment was proposed at last.Validity of the algorithm is verified by the simulation results,and the computational load is illustrated.The computational efficiency of the proposed algorithm is higher than that of the existing algorithms.…”
Get full text
Article -
5339
Modification of Differential Gear based on Multi-objective Optimization
Published 2020-09-01Get full text
Article -
5340
CUSTOMER-BASED BRAND EQUITY OF RETAIL BANKS IN VIETNAM
Published 2019-03-01“…Tạp chí Khoa học Đại học Đà Lạt…”
Get full text
Article