Showing 5,321 - 5,340 results of 67,915 for search 'DASB~', query time: 2.43s Refine Results
  1. 5321

    Spectrofluorimetric method for atenolol determination based on gold nanoparticles by Bakir Esam, Gouda Mohamed, Alnajjar Ahmed, Boraie Waleed E.

    Published 2018-06-01
    “…A simple and sensitive spectrofluorimetric method for determination of atenolol (ATE) using gold nanoparticles (AuNPs) was developed. The method is based on the quenching effect of atenolol on photoluminescence of AuNPs at λem = 705 nm. …”
    Get full text
    Article
  2. 5322

    Video steganalysis scheme based on weighted undirected graph by Ting DA, Zhi-tang LI

    Published 2014-10-01
    “…A new steganalysis scheme based on taking the inter-frame correlation as the undirected graph weights was proposed utilizing the temporal correlation among video frames.First,getting the eigenvector of every video frame brightness by calculating its gray-level co-occurrence matrix,the eigenvector is an eight-dimensional vector.Then,computing the weights of each video frame by using the euclide distance algorithm.The weighted undirected graph which representing the correlations between each frame is constructed.Finally,according to the change of correlations between the frames after embedding information determine whether the video is embedded confidential information.Experimental results show that the method using weighted undirected graph can quickly discriminate stego video and the original video,and have a high accuracy rate.…”
    Get full text
    Article
  3. 5323

    Continuous noise covert transmission scheme based on QCSK by Ying HUANG, Zehan WAN, Jing LEI, Ke LAI

    Published 2022-04-01
    “…The existing embedded scheme requires far lower transmission power of the covert system than that of the host system, and thus decreasing the reliability of covert transmission.To figure out the above limitations, a continuous noise covert communication scheme based on quadrature chaos shift keying (QCSK) was proposed.The QCSK signal containing covert information and artificial noise were transmitted alternately, and the illegal energy detection was effectively resisted by the continuity of noise which has strong concealment in both time and frequency domains.Furthermore, extremely low power was not required to meet the demand of convert communication in QCSK, whereas allowing the increase of transmit power under the condition that the performance of the host system to improve the performance of covert transmission.Theoretical analysis and simulation results show that the bit error rate (BER) of covert transmission brings two orders of magnitude improvement compared with the existing scheme at BER=1×10<sup>-7</sup> for host system.…”
    Get full text
    Article
  4. 5324

    Secure key-sharing algorithm based on smart grid by Wei GU, Jian SHEN, Yongjun REN

    Published 2021-08-01
    “…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
    Get full text
    Article
  5. 5325

    Hydrological prediction in ungauged basins based on spatiotemporal characteristics. by Qun Zhao, Yuelong Zhu, Yanfeng Shi, Rui Li, Xiangtian Zheng, Xudong Zhou

    Published 2025-01-01
    “…Subsequently, we establish an initial regression model using the TrAdaBoost algorithm based on the hydrologic data from the selected watershed stations. …”
    Get full text
    Article
  6. 5326

    The Application and Analysis of Emotion Recognition Based on Modern Technology by Bi Lanxin

    Published 2025-01-01
    “…The study involves collecting and analysing experimental data, exploring their respective strengths and limitations, and proposing potential solutions to enhance their effectiveness. …”
    Get full text
    Article
  7. 5327

    GRU-based multi-scenario gait authentication for smartphones by Qi JIANG, Ru FENG, Ruijie ZHANG, Jinhua WANG, Ting CHEN, Fushan WEI

    Published 2022-10-01
    “…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
    Get full text
    Article
  8. 5328

    Carrier-Based Drug Delivery System for Treatment of Acne by Amber Vyas, Avinesh Kumar Sonker, Bina Gidwani

    Published 2014-01-01
    “…The advantages, disadvantages, and outcome of using various carrier-based delivery systems like liposomes, niosomes, solid lipid nanoparticles, and so forth, are explained. …”
    Get full text
    Article
  9. 5329

    Estimation of Precipitation in Tianshan Mountains Based on Topographic Factors by TANG Jian

    Published 2020-01-01
    “…In view of the scarcity of meteorological stations in Tianshan Mountains, it isdifficult to deeply understand the spatial distribution pattern and mechanism of precipitation inmountainous areas. Based on the precipitation data of meteorological stations and considered seventopographic factors such as longitude, latitude, elevation, slope, aspect, relief and topographicopenness as principal component analysis indicators, this paper establishes the precipitationestimation model in Tianshan Mountains by the principal-component stepwise regression method. …”
    Get full text
    Article
  10. 5330

    A fragmentation-based study of heavy quark production by Giovanni Ridolfi, Maria Ubiali, Marco Zaro

    Published 2020-01-01
    “…In this work, we critically reconsider the validity of the widely-adopted approximation in which heavy quarks are generated at the matrix-element level, with special emphasis on the impact of the collinear logarithms associated with final-state heavy quark and gluon splittings. Our study, based on a perturbative fragmentation-function approach, explicitly shows that neglecting the resummation of collinear logarithms may yield inaccurate predictions, in particular when observables exclusive in the heavy quark degrees of freedom are considered. …”
    Get full text
    Article
  11. 5331

    Fault Diagnosis of Planetary Gearbox based on 1-DCNN by Xuanyi Xue, Xinyu Pang

    Published 2020-11-01
    “…In order to improve the diagnosis efficiency of planetary gearboxes, a fault diagnosis method based on one-dimensional deep convolutional neural network (1-DCNN) is proposed, and the original signals are directly input to the network for diagnosis. …”
    Get full text
    Article
  12. 5332

    Crack detection based on attention mechanism with YOLOv5 by Min‐Li Lan, Dan Yang, Shuang‐Xi Zhou, Yang Ding

    Published 2025-01-01
    “…Aiming at the problems of poor real‐time performance and low precision of traditional pavement crack detection, a crack detection method based on improved YOLOv5 one‐step target detection algorithm of convolutional neural network is proposed by using the advantages of depth learning network in target detection. …”
    Get full text
    Article
  13. 5333
  14. 5334

    Indoor sensing technology based on channel state information by Zhefu WU, Han WANG, Cheng CHEN, Zhongyou WANG, Wei HUANG

    Published 2019-10-01
    “…The wide spread wireless network has brought about tremendous development of mobile internet business services and has become one of the infrastructures of modern society.The basic principles and implementation methods of wireless sensing technology were expounded from the perspective of wireless channel state analysis.The technological innovation in the field of wireless sensing in recent years was discussed,especially channel state information based human body posture detecting and environmental monitoring.Finally,the future development trend of sensing technology based on wireless communication network was analyzed in order to provide reference for related research.…”
    Get full text
    Article
  15. 5335

    SPI-Based Spatiotemporal Drought over Sri Lanka by N. S. Abeysingha, U. R. L. N. Rajapaksha

    Published 2020-01-01
    “…The result based on SPI identified hydrological years 1975-76, 1982-83, 1986-87, 1988-89, 2000-01, 2001-02, 2013-14, and 2016-17 as drought years for 52, 32, 35, 33, 33, 31, 31, and 31% of tested stations (54), respectively, at annual time scale. …”
    Get full text
    Article
  16. 5336

    Construction of Smart City Based on Open Government Data by Lei Gu, Yi Wang

    Published 2014-11-01
    Subjects: “…open government data…”
    Get full text
    Article
  17. 5337

    Forage-Based Heifer Development Program for North Florida by Jose C.B. Dubeux, Nicolas DiLorenzo, Kalyn Waters, Jane C. Griffin

    Published 2018-11-01
    “… Florida has 915,000 beef cows and 125,000 replacement heifers (USDA, 2016). …”
    Get full text
    Article
  18. 5338

    Generator polynomial estimation of LFSR sequence based on GFFT by Lihua SHEN

    Published 2018-02-01
    “…The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence and zero points in generator polynomial of LFSR sequence was illustrated firstly.Then the generator polynomial of LFSR sequence was fast estimated based on that property,and the improved method in noisy environment was proposed at last.Validity of the algorithm is verified by the simulation results,and the computational load is illustrated.The computational efficiency of the proposed algorithm is higher than that of the existing algorithms.…”
    Get full text
    Article
  19. 5339
  20. 5340

    CUSTOMER-BASED BRAND EQUITY OF RETAIL BANKS IN VIETNAM by Vũ Minh Tú

    Published 2019-03-01
    “…Tạp chí Khoa học Đại học Đà Lạt…”
    Get full text
    Article