Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5441
Digital Health: The Cybersecurity for AI-Based Healthcare Communication
Published 2025-01-01Subjects: “…AI-based healthcare…”
Get full text
Article -
5442
English-based feminative neologisms in post-1989 Polish
Published 2024-12-01“…For more than three decades now an increase in the productivity of the feminative category has been observed in Polish-language communication practices and, consequently, an increase in the number of female personal names in Polish. …”
Get full text
Article -
5443
-
5444
Properties of Natural Rubber-Based Composites Containing Fullerene
Published 2012-01-01“…In this study the influence of fullerenes in concentrations from 0.5 to 1.5 phr on both the vulcanization characteristics of the compounds and physicomechanical, dynamic, and dielectric properties and thermal aging resistance of nanocomposites on the basis of natural rubber has been investigated. The effect of the filler dispersion in the elastomeric matrix has been also investigated. …”
Get full text
Article -
5445
Characteristics of Tight Oil Reservoir Based on Nano-CT
Published 2022-01-01“…In order to promote the study of tight oil characteristics and avoid various problems, this article studies the characteristics of tight oil reservoirs based on nano-CT. The results show that the introduction of nano-CT technology into the study of tight oil reservoir characteristics can meet the market demand of tight oil and increase by 3.54%. …”
Get full text
Article -
5446
Data-based regression models for predicting remifentanil pharmacokinetics
Published 2024-12-01“…This work investigates various supervised machine learning (ML) methods to analyse the pharmacokinetic characteristics of remifentanil, imitating the measured data. From the Kaggle database, features such as age, gender, infusion rate, body surface area, and lean body mass are extracted to determine the drug concentration at a specific instant of time. …”
Get full text
Article -
5447
Research and implementation of fuzzing testing based on HTTP proxy
Published 2016-02-01“…Most of the security testing tools lack of optimization of testing,configured strategy and intelligent analysis of testing results.These problems lead to the status that these tools can’t be used in Web application testing well.A fuzzing testing method towards Web application security based on HTTP proxy was proposed.The high-performance communication between HTTP proxy server and browser through the mechanism of asynchronous monitoring was realized.Configured strategy of testing cases based on pseudo code could help to do flexible and automatic tests.By using multi-dimensional ways to parse the packet,intelligent analysis of testing results was achieved.Experiments show that the tool supports mainstream Web application vulnerabilities detection and configured strategy of testing.It can detect the vulnerabilities such as directory traversal,SQL injection,cross-site scripting.…”
Get full text
Article -
5448
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01“…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
Get full text
Article -
5449
Using Stacks for Image Segmentation Based on Region Growing
Published 2020-07-01“…The aim of the work is to comparatively evaluate the sizes of FIFO and LIFO stacks required for image segmentation based on growing regions. The coordinates (y, x) of the pixels that need to be attached to the cultivated area are placed in stacks during the segmentation process. …”
Get full text
Article -
5450
Key security detection based on dynamic binary instrumentation
Published 2017-11-01“…For the key security problem in the cryptographic software,the method of key security detection based on dynamic binary instrumentation was proposed.Aimed at CryptoAPI cryptographic software,the method firstly pointed out the potential key security vulnerabilities by analyzing the key applying patterns of CryptoAPI.Then it recorded cryptographic data information during the execution of the program dynamically using Pin platform.On this basis,a relevance vulnerability detection algorithm was designed to detect the key security.Test result indicated that it can effectively detect the two kinds of key security vulnerabilities.…”
Get full text
Article -
5451
Computation of Channel Capacity Based on Self-Concordant Functions
Published 2012-01-01“…We prove that algorithms based on self-concordant functions can be used to deal with such issues, especially when constrains are included. …”
Get full text
Article -
5452
-
5453
Autonomic grid architecture based on information pool protocol
Published 2008-01-01“…An information pool based grid architecture (IPBGA) was presented. Requests from resources for tasks and appeals from tasks for resources were upgraded as information services by using information pool protocol (IPP). …”
Get full text
Article -
5454
Spatial error concealment method based on tensor voting
Published 2011-01-01“…As the existing spatial error concealment algorithms is lack of the recovery accuracy in complex texture areas,a spatial error concealment method based on tensor voting was proposed,which extracted structural information by using tensor voting.On this basis,an improved spatial error concealment algorithm which combined with the traditional algo-rithms was further proposed.Firstly the lost marc blocks were classified into three categories,and then the appropriate concealment method was chose to recover the lost macro blocks according to the type of lost macro blocks.Experimental results show that the proposed method improves the recovery accuracy effectively and avoids the edge disorder phe-nomenon,especially in the region with more complex texture,the subjective and objective quality of concealed image is improved greatly.…”
Get full text
Article -
5455
THE MANAGEMENT OF CORPORATE CULTURE IN RUSSIA BASED ON THE DYNAMIC CONCEPT
Published 2016-02-01Get full text
Article -
5456
Traffic and Driving Simulator Based on Architecture of Interactive Motion
Published 2015-01-01“…This study proposes an architecture for an interactive motion-based traffic simulation environment. In order to enhance modeling realism involving actual human beings, the proposed architecture integrates multiple types of simulation, including: (i) motion-based driving simulation, (ii) pedestrian simulation, (iii) motorcycling and bicycling simulation, and (iv) traffic flow simulation. …”
Get full text
Article -
5457
Botnet detecting method based on group-signature filter
Published 2010-01-01“…A botnet detecting method was presented based on group-signature filter,suitable for the traditional signatures matching algorithm.Using multiple member signatures to filter the packets of hosts from Intranet,the proposed method is able to handle the shortened and scattered signatures at a space expense of O(tmn).The simulated experiment proves the correctness and validity of the detecting method.…”
Get full text
Article -
5458
-
5459
Cloud Security Certification Technology Based on Fingerprint Recognition
Published 2015-08-01“…As the guarantee of cloud security,user identity authentication is crucial to cloud computing.In this work,the requirements of security authentication in the current cloud service systems were analyzed.Considering the principle and the advantages of fingerprint recognition,a novel system based on fingerprint recognition was proposed for cloud security authentication.The architecture and workflow of the proposed system were investigated in depth to prevent the unauthorized access,achieving the secure access of user data for cloud services.…”
Get full text
Article -
5460
Key nodes discovery in network graph based on Graphlab
Published 2016-03-01“…A distributed key nodes discovery algorithm was proposed(DABC) which was implemented on Graphlab.Due to the good scalability,the scale of graph supported by algorithm was enlarged significantly.The parallel processing also enhances the speed of calculation.Experiment results show that proposed algorithm can achieve up to 4 times per-formance improvement compared with the traditional centralized key node discovery algorithm.…”
Get full text
Article