Showing 5,401 - 5,420 results of 67,915 for search 'DASB~', query time: 2.29s Refine Results
  1. 5401

    An Overview of Human Pose Estimation Based on Wireless Signals by Yan CHEN, Rui ZHANG, Yadong LI, Ruiyuan SONG, Ruixu GENG, Hanqin GONG, Binquan WANG, Dongheng ZHANG, Yang HU

    Published 2025-02-01
    “…However, optical image-based pose estimation methods are often limited by lighting conditions and privacy concerns. …”
    Get full text
    Article
  2. 5402

    Content forwarding strategy based on ICN architecture in VANET by Lan-lan RUI, Hui GUO, Rui-chang SHI, Hao-qiu HUANG

    Published 2017-05-01
    “…Combining VANET with ICN,a routing building and selecting strategy-SRBS based on vehicular dynamic parameters was proposed.After locating the content nodes through content discovery process,several unicast forwarding paths would be built,which reduces useless traffic compared with a flooding way.By introducing dynamic metrics and LET to routing building and selecting process,SRBS improved the link stability and reliability,which ensured the Data’s successful return.Simulation results show the scheme also improves the time tolerance of routings and makes full use of network cache and reduces delay and routing hops.…”
    Get full text
    Article
  3. 5403

    Denoising recovery for compressive sensing based on selective measure by Li-ye PEI, Hua JIANG, Yue-liang MA

    Published 2017-02-01
    “…In order to reduce the effect of noise folding (NF) phenomenon on the performance of sparse signal recon-struction,a new denoising recovery algorithm based on selective measure was proposed.Firstly,the NF phenomenon in compressive sensing (CS) was explained in theory.Secondly,a new statistic based on compressive measurement data was proposed,and its probability density function (PDF) was deduced and analyzed.Then a noise filter matrix was constructed based on the PDF to guide the optimization of measurement matrix.The optimized measurement matrix can selectively sense the sparse signal and suppress the noise to improve the SNR of the measurement data,resulting in the improvement of sparse reconstruction performance.Finally,it was pointed out that increasing the measurement times can further enhance the performance of denoising reconstruction.Simulation results show that the proposed denoising recon-struction algorithm has a better improvement in the performance of reconstruction of noisy signal,especially under low SNR.…”
    Get full text
    Article
  4. 5404

    Performance Analysis for Priority-Based Broadcast in Vehicular Networks by Rinara Woo, Jung-Hoon Song, Dong Seog Han

    Published 2013-11-01
    “…Transportation safety is one of the most important applications of vehicular ad hoc networks which is based on IEEE 802.11p. When a vehicle is in an emergency situation, a safety-related message is transmitted to the neighboring vehicles and infrastructures. …”
    Get full text
    Article
  5. 5405
  6. 5406
  7. 5407

    Terahertz Characteristics of Magnetic Fluid Based on Microfluidic Technology by Xinyuan Zhao, Guoyang Wang, Siyu Shao, Qinghao Meng, Jiahui Wang, Sijia Zhang, Bo Su, Cunlin Zhang

    Published 2021-01-01
    “…Magnetic fluid is a new functional material with both liquid fluidity and solid magnetism, which has important application value in medicine, biology, and so on. …”
    Get full text
    Article
  8. 5408

    Weighted evidence combination based on degree of credibility and certainty by Lu WANG, Qing-hua XING, Yi-fan MAO

    Published 2017-01-01
    “…To overcome the invalidation problem of Dempster rule with high conflict,a weighted combination method based on degree of credibility and certainty was proposed.Firstly,the cosine similarity was modified to hold the ability to measure the evidence conflict when multi-subset focal elements were included,followed by the building of evidence credibility model.Secondly,the evidence certainty model based on precision and entropy was presented,which can both reflect the evidence’s degree of multi-subset focal elements and the dispersion degree of probability assignment.Then the weighted coefficient was determined by credibility and certainty.Finally,the normalized weighted coefficient was used to average the basic probability assignment,and the final combination result can be obtained according to Dempster rule.Numerical examples show that,compared with other traditional weighted combination methods,the proposed approach has made better performance in reducing conflict and accelerating convergence.…”
    Get full text
    Article
  9. 5409
  10. 5410

    Nucleic Acid-Based Therapy Approaches for Huntington's Disease by Tatyana Vagner, Deborah Young, Alexandre Mouravlev

    Published 2012-01-01
    “…The aim of this paper is to outline the nucleic acid-based therapeutic strategies that have been tested to date.…”
    Get full text
    Article
  11. 5411

    Optimization Design of Drivetrain of FSAE Racing based on ANSYS by Wang Yanshu

    Published 2017-01-01
    “…By using the ANSYS optimization module,the position and the size of the lightening holes are optimized to try to arrange rationally and lose weight on the basis of meeting intensity of use.…”
    Get full text
    Article
  12. 5412

    Train Repathing in Emergencies Based on Fuzzy Linear Programming by Xuelei Meng, Bingmou Cui

    Published 2014-01-01
    “…An emergency is supposed based on the real data of the Beijing-Shanghai Railway. …”
    Get full text
    Article
  13. 5413
  14. 5414

    Research progress of steel slag-based carbon sequestration by Qing Zhao, Chengjun Liu, Xiaohui Mei, Henrik Saxén, Ron Zevenhoven

    Published 2025-01-01
    “…Large amounts of steel slag (SS) and CO2 are produced globally each year during steel production. An SS-based carbon capture and utilization (SS-CCU) process for CO2 mineralization is suitable specifically for steel-making industries for simultaneous mitigation of CO2 emissions and valorization of wastes. …”
    Get full text
    Article
  15. 5415

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article
  16. 5416

    IoT-Based Solar Energy Measurement and Monitoring Model by L. Chitra, N. Vasantha Gowri, M. Maheswari, Dipesh Uike, N. R. Medikondu, Essam A. Al-Ammar, Ahmed Sayed Mohammed Metwally, Ataul Islam, Abdi Diriba

    Published 2022-01-01
    “…In this context, with the help of cloud computing-based Internet of things (IOT), the industrial power stations, high-voltage substations, low-voltage networks, power stations that comply with legal regulations on safety from electricity, electrical installations for machinery, alarm systems, fire alarm systems, cathodic corrosion protection mechanisms in oil tanks and pipelines, emergency power supply installations, electrical installations in buildings, and gas alarm systems are inspected and documented.…”
    Get full text
    Article
  17. 5417

    Image retrieval based on the feature of VLAD and sparse representation by Wen YAN, Wei JIN, Randi FU

    Published 2016-12-01
    “…In order to achieve the goal of fast and accurate image retrieval,an image retrieval method combining VLAD (vector of locally aggregated descriptor)feature and sparse representation was proposed. …”
    Get full text
    Article
  18. 5418

    APPLICATION ANALYTICAL INFORMATION SYSTEMS BASED ON OLAP TECHNOLOGY by L. Dumanskaya, S. Dumansky

    Published 2016-11-01
    “…Тhis article describes a prototype of Information Analytical system (IAS) based on OLAP model for the diagnosis of diseases. …”
    Get full text
    Article
  19. 5419

    Cooperation-based location authentication scheme for crowdsensing applications by Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG

    Published 2022-09-01
    “…Utilizing mobile devices to collect location-related data in crowdsensing has the security problem of a location cheating attack.How to guarantee the quality of these sensitive data has become a challenge.In response to this, a location authentication scheme was proposed based on cooperation to detect malicious users who submit false locations.Firstly, users with mobile devices were used to generate location proofs for each other, and a location verification scheme was designed based on distance bounding protocols for obtaining new information by multiple collisions of the same random number, which ensured the user’s location should be unforgeable and achieved the purpose of improving the quality of collected data.In addition, a location proof cooperator select method based on region division and reputation model was proposed which effectively prevented collusion attack and solved the problem of concentration of equity.Meanwhile, the incentive mechanism based on reputation value and task completion time was designed to effectively improve the location proof cooperator efficiency of task completion.Finally, security analysis and performance evaluation indicate that the scheme has proved to be correctness and secure, and the advantages in computational cost and communication overhead.…”
    Get full text
    Article
  20. 5420

    Multi-model based behaviour analysis for inclusive mobility by Vanderhaegen Frédéric, Richard Philippe

    Published 2024-01-01
    “…The paper proposes an original approach based on holistic and specific models of human or technical behaviors. …”
    Get full text
    Article