Showing 5,441 - 5,460 results of 67,915 for search 'DASB~', query time: 1.90s Refine Results
  1. 5441
  2. 5442

    English-based feminative neologisms in post-1989 Polish by Agnieszka Małocha

    Published 2024-12-01
    “…For more than three decades now an increase in the productivity of the feminative category has been observed in Polish-language communication practices and, consequently, an increase in the number of female personal names in Polish. …”
    Get full text
    Article
  3. 5443
  4. 5444

    Properties of Natural Rubber-Based Composites Containing Fullerene by Omar A. Al-Hartomy, Ahmed A. Al-Ghamdi, Falleh Al-Salamy, Nikolay Dishovsky, Desislava Slavcheva, Farid El-Tantawy

    Published 2012-01-01
    “…In this study the influence of fullerenes in concentrations from 0.5 to 1.5 phr on both the vulcanization characteristics of the compounds and physicomechanical, dynamic, and dielectric properties and thermal aging resistance of nanocomposites on the basis of natural rubber has been investigated. The effect of the filler dispersion in the elastomeric matrix has been also investigated. …”
    Get full text
    Article
  5. 5445

    Characteristics of Tight Oil Reservoir Based on Nano-CT by Zhe Liu, Wenke Li, Jiajing Li, Wei Wang, Guang Fu

    Published 2022-01-01
    “…In order to promote the study of tight oil characteristics and avoid various problems, this article studies the characteristics of tight oil reservoirs based on nano-CT. The results show that the introduction of nano-CT technology into the study of tight oil reservoir characteristics can meet the market demand of tight oil and increase by 3.54%. …”
    Get full text
    Article
  6. 5446

    Data-based regression models for predicting remifentanil pharmacokinetics by Prathvi Shenoy, Mahadev Rao, Shreesha Chokkadi, Sushma Bhatnagar, Naveen Salins

    Published 2024-12-01
    “…This work investigates various supervised machine learning (ML) methods to analyse the pharmacokinetic characteristics of remifentanil, imitating the measured data. From the Kaggle database, features such as age, gender, infusion rate, body surface area, and lean body mass are extracted to determine the drug concentration at a specific instant of time. …”
    Get full text
    Article
  7. 5447

    Research and implementation of fuzzing testing based on HTTP proxy by Xin SUN, Yi-yang YAO, Xin-dai LU, Xue-jiao LIU, Yong-han WU

    Published 2016-02-01
    “…Most of the security testing tools lack of optimization of testing,configured strategy and intelligent analysis of testing results.These problems lead to the status that these tools can’t be used in Web application testing well.A fuzzing testing method towards Web application security based on HTTP proxy was proposed.The high-performance communication between HTTP proxy server and browser through the mechanism of asynchronous monitoring was realized.Configured strategy of testing cases based on pseudo code could help to do flexible and automatic tests.By using multi-dimensional ways to parse the packet,intelligent analysis of testing results was achieved.Experiments show that the tool supports mainstream Web application vulnerabilities detection and configured strategy of testing.It can detect the vulnerabilities such as directory traversal,SQL injection,cross-site scripting.…”
    Get full text
    Article
  8. 5448

    Trajectory privacy protection method based on location obfuscation by Shaobo ZHANG, Qin LIU, Guojun WANG

    Published 2018-07-01
    “…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
    Get full text
    Article
  9. 5449

    Using Stacks for Image Segmentation Based on Region Growing by V. Yu. Tsviatkou

    Published 2020-07-01
    “…The aim of the work is to comparatively evaluate the sizes of FIFO and LIFO stacks required for image segmentation based on growing regions. The coordinates (y, x) of the pixels that need to be attached to the cultivated area are placed in stacks during the segmentation process. …”
    Get full text
    Article
  10. 5450

    Key security detection based on dynamic binary instrumentation by Hao LIN, Fei KANG, Yan GUANG

    Published 2017-11-01
    “…For the key security problem in the cryptographic software,the method of key security detection based on dynamic binary instrumentation was proposed.Aimed at CryptoAPI cryptographic software,the method firstly pointed out the potential key security vulnerabilities by analyzing the key applying patterns of CryptoAPI.Then it recorded cryptographic data information during the execution of the program dynamically using Pin platform.On this basis,a relevance vulnerability detection algorithm was designed to detect the key security.Test result indicated that it can effectively detect the two kinds of key security vulnerabilities.…”
    Get full text
    Article
  11. 5451

    Computation of Channel Capacity Based on Self-Concordant Functions by Da-gang Tian, Yi-qun Huang

    Published 2012-01-01
    “…We prove that algorithms based on self-concordant functions can be used to deal with such issues, especially when constrains are included. …”
    Get full text
    Article
  12. 5452
  13. 5453

    Autonomic grid architecture based on information pool protocol by CHEN Zhi-gang, LI Deng, ZENG Zhi-wen, LIU Jia-qi

    Published 2008-01-01
    “…An information pool based grid architecture (IPBGA) was presented. Requests from resources for tasks and appeals from tasks for resources were upgraded as information services by using information pool protocol (IPP). …”
    Get full text
    Article
  14. 5454

    Spatial error concealment method based on tensor voting by GAN Nan, GONG Sheng-rong, WANG Zhao-hui, LIU Chun-ping, LIU Quan

    Published 2011-01-01
    “…As the existing spatial error concealment algorithms is lack of the recovery accuracy in complex texture areas,a spatial error concealment method based on tensor voting was proposed,which extracted structural information by using tensor voting.On this basis,an improved spatial error concealment algorithm which combined with the traditional algo-rithms was further proposed.Firstly the lost marc blocks were classified into three categories,and then the appropriate concealment method was chose to recover the lost macro blocks according to the type of lost macro blocks.Experimental results show that the proposed method improves the recovery accuracy effectively and avoids the edge disorder phe-nomenon,especially in the region with more complex texture,the subjective and objective quality of concealed image is improved greatly.…”
    Get full text
    Article
  15. 5455
  16. 5456

    Traffic and Driving Simulator Based on Architecture of Interactive Motion by Alexander Paz, Naveen Veeramisti, Romesh Khaddar, Hanns de la Fuente-Mella, Luiza Modorcea

    Published 2015-01-01
    “…This study proposes an architecture for an interactive motion-based traffic simulation environment. In order to enhance modeling realism involving actual human beings, the proposed architecture integrates multiple types of simulation, including: (i) motion-based driving simulation, (ii) pedestrian simulation, (iii) motorcycling and bicycling simulation, and (iv) traffic flow simulation. …”
    Get full text
    Article
  17. 5457

    Botnet detecting method based on group-signature filter by WANG Jin-song1, LIU Fan1, ZHANG Jian3

    Published 2010-01-01
    “…A botnet detecting method was presented based on group-signature filter,suitable for the traditional signatures matching algorithm.Using multiple member signatures to filter the packets of hosts from Intranet,the proposed method is able to handle the shortened and scattered signatures at a space expense of O(tmn).The simulated experiment proves the correctness and validity of the detecting method.…”
    Get full text
    Article
  18. 5458
  19. 5459

    Cloud Security Certification Technology Based on Fingerprint Recognition by Yafei Tang, Yunyong Zhang, Ni Zhang

    Published 2015-08-01
    “…As the guarantee of cloud security,user identity authentication is crucial to cloud computing.In this work,the requirements of security authentication in the current cloud service systems were analyzed.Considering the principle and the advantages of fingerprint recognition,a novel system based on fingerprint recognition was proposed for cloud security authentication.The architecture and workflow of the proposed system were investigated in depth to prevent the unauthorized access,achieving the secure access of user data for cloud services.…”
    Get full text
    Article
  20. 5460

    Key nodes discovery in network graph based on Graphlab by Zhuang-liang GAO, Yan-fei LYU, Hong ZHANG

    Published 2016-03-01
    “…A distributed key nodes discovery algorithm was proposed(DABC) which was implemented on Graphlab.Due to the good scalability,the scale of graph supported by algorithm was enlarged significantly.The parallel processing also enhances the speed of calculation.Experiment results show that proposed algorithm can achieve up to 4 times per-formance improvement compared with the traditional centralized key node discovery algorithm.…”
    Get full text
    Article