Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5341
Block-Based Mode Decomposition in Few-Mode Fibers
Published 2025-01-01“…The amplitude error of BMD can outperform SPMD by 15 dB. The experimental results show that BMD has a better performance than SPMD.…”
Get full text
Article -
5342
Research of Powertrain Control based on Power Shift Strategy
Published 2017-01-01“…In order to solve the vehicle power discontinued transmission which influenced by the shift of the automated mechanical transmission and improve the shift quality,a new powertrain control strategy based on power shift is put forward. The traditional and hybrid powertrain interface based on this new strategy is designed. …”
Get full text
Article -
5343
SERS-Based Local Field Enhancement in Biosensing Applications
Published 2024-12-01“…Surface-enhanced Raman scattering (SERS) stands out as a highly effective molecular identification technique, renowned for its exceptional sensitivity, specificity, and non-destructive nature. It has become a main technology in various sectors, including biological detection and imaging, environmental monitoring, and food safety. …”
Get full text
Article -
5344
Geometrically synchronous watermarking algorithm based on the corner feature
Published 2011-01-01“…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
Get full text
Article -
5345
Medical imaging-based companion diagnostics for solid tumors
Published 2024-06-01“…This review provides an overview of the recent advances in medical imaging-based CDx for solid tumors and summarizes the various tumor microenvironment biomarkers utilized in imaging-based CDx. …”
Get full text
Article -
5346
Drivers and challenges for wood-based construction in urban areas
Published 2025-01-01“…Wood-based construction (WBC) has gained prominence as a sustainable alternative to traditional construction, offering significant environmental benefits such as carbon storage and reduced greenhouse gas emissions. …”
Get full text
Article -
5347
Some aspects of the comparative analysis of legal knowledge bases
Published 1999-12-01“…The algorithm is based on derivation by model generation and it is grounded in the case when the knowledge bases are general logic programs. …”
Get full text
Article -
5348
Smart home with neural network based object detection
Published 2022-03-01“…Big Data and Computing Visions…”
Get full text
Article -
5349
Food-Based Dietary Guidelines for the Arab Gulf Countries
Published 2012-01-01“…The concept of food-based dietary guidelines (FBDG) has been promoted by several international organizations. …”
Get full text
Article -
5350
A Community-Based Walk-In Screening of Depression in Taiwan
Published 2014-01-01“…However, the available data and study on the prevalence of depression in Taiwan were mostly completed within the previous 1 to 2 decades, and these studies were limited to certain areas or populations. …”
Get full text
Article -
5351
TDMA-based user scheduling policies for federated learning
Published 2021-06-01“…To improve the communication efficiency in FL (federated learning), for the scenario with heterogeneous edge user's computing capacity and channel state, a class of time division multiple access (TDMA) based user scheduling policies were proposed for FL.The proposed policies aim to minimize the system delay in each round of model training subject to a given sample size constraint required for computing in each round.In addition, the convergence rate of the proposed scheduling algorithms was analyzed from a theoretical perspective to study the tradeoff between the convergence performance and the total system delay.The selection of the optimal batch size was further analyzed.Simulation results show that the convergence rate of the proposed algorithm is at least 30% higher than all the considered benchmarks.…”
Get full text
Article -
5352
-
5353
Certificate integration management platform based on identity key
Published 2016-10-01“…Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system communication and storage cost.A management platform and its unique merits were introduced after analyzing the current security schemes and comparing their various advantages and defects.According to the analysis of technical principles and functions,this product has a promising future.…”
Get full text
Article -
5354
Design of Hand Rehabilitation Training Device based on SMA
Published 2020-02-01“…A new type of hand rehabilitation training device based on shape memory alloy spring is proposed for the existing hand rehabilitation training device with complex structure and poor portability. …”
Get full text
Article -
5355
Federated learning optimization algorithm based on incentive mechanism
Published 2023-05-01“…Federated learning optimization algorithm based on incentive mechanism was proposed to address the issues of multiple iterations, long training time and low efficiency in the training process of federated learning.Firstly, the reputation value related to time and model loss was designed.Based on the reputation value, an incentive mechanism was designed to encourage clients with high-quality data to join the training.Secondly, the auction mechanism was designed based on the auction theory.By auctioning local training tasks to the fog node, the client entrusted the high-performance fog node to train local data, so as to improve the efficiency of local training and solve the problem of performance imbalance between clients.Finally, the global gradient aggregation strategy was designed to increase the weight of high-precision local gradient in the global gradient and eliminate malicious clients, so as to reduce the number of model training.…”
Get full text
Article -
5356
Secure distributed signcryption scheme based on vector space
Published 2009-01-01“…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
Get full text
Article -
5357
Blockchain sharding storage scheme based on concatenated coding
Published 2024-07-01“…Traditional blockchain faces the challenge of storage scalability. Existing research has reduced the storage overhead of blockchain based on erasure coding theory, but it brings high computational and communication spending during the decoding and recovery of blocks. …”
Get full text
Article -
5358
On the role of knowledge graphs in AI-based scientific discovery
Published 2025-01-01“…These methodologies are based on the creation of large and opaque neural models. …”
Get full text
Article -
5359
RESEARCH OF THE COLD-BEATING GEAR HARDNESS ON THE BASIS OF MICROSTRUCTURE
Published 2018-01-01“…The gear processed by traditional technology has a lower tooth surface hardness because of the cut metal fibre. …”
Get full text
Article -
5360
DEVELOPMENT OF ISLAMIC BANKINGIN RUSSIA ON THE BASIS OF THE BRITISH EXPERIENCE
Published 2016-06-01“…Therefore, drawing on foreign experience Russia has every opportunity for a competent implementation of this activity on its territory.…”
Get full text
Article