Showing 5,461 - 5,480 results of 67,915 for search 'DASB~', query time: 2.17s Refine Results
  1. 5461

    Containerizing solution based on Kubernetes of database and its cluster by Liyun YAN, Zhenwei HE, Xinzhang YANG, Ling ZHANG, Shaoxin HOU

    Published 2018-12-01
    “…With the maturity of container technology,more and more internet companies and IT companies have begun to migrate their core business platforms to the container environment.After more than three years of rapid development,Kubernetes has become the industry's preferred container cluster management platform.The containerization scheme of MySQL database and its cluster was given from the perspective of database containerization,based on the analysis of the key technology of database containerization on Kubernetes.Through the evaluation and comparison of performance and reliability of various database models,problems that database containerization technology may encounter and suggestion of database container hosting scheme under different scenarios were proposed.…”
    Get full text
    Article
  2. 5462

    Structural health detection sensor based on RFID technology by Bo Wang, Yifeng Yuan, Ke Wang, Shengli Cao, Yalun Song, Male Feng

    Published 2025-01-01
    “…In order to achieve structural health monitoring, a frequency-domain-based chipless radio-frequency identification sensor has been studied. …”
    Get full text
    Article
  3. 5463

    Multiuser secret key generation based on received signal by Aolin CAI, Liang JIN, Zhou ZHONG, Yangming LOU

    Published 2018-10-01
    “…The secret key generation method based on channel characteristic provides a new way for communication security.But under the conditions of multiuser and slow fading,because of the slow channel parameter changing rate,using the secret key generation method above can result in a low secret key rate.To solve this problem,a multiuser secret key generation method based on the received signal was proposed.By distributing the random signals to different users using block diagonalization precoding,base station and user can extract the secret key from the received signal.The novel method could significantly increase the secret key rate of multiuser under the quasi-static channel and slow-fading channel,which is verified by simulations.…”
    Get full text
    Article
  4. 5464

    Design for database access control mechanism based on blockchain by Yonggui FU, Jianming ZHU

    Published 2020-05-01
    “…Aiming at the current problems of database access control,the thought of blockchain technology applied to database access control was proposed.The implementation mechanism of database access control based on blockchain was designed from several aspects as blockchain hierarchical structure,logical hierarchical structure of access control process,implementation principle of access control,consensus authentication principle of access control,and construction mechanism of access control blockchain system.The performance of database access control system based on blockchain was assessed.A complete framework was provided for blockchain applied in database access control.Through strengthening the authentication and supervision of visitor identity,access permission and access behavior,the database access control ability is improved effectively.…”
    Get full text
    Article
  5. 5465
  6. 5466

    Estimating Vehicle Stability Region Based on Energy Function by Yu-guang Yan, Hong-guo Xu, Hong-fei Liu

    Published 2015-01-01
    “…Detailed detecting system and data processing were introduced. In addition, stability of the vehicle system was discussed using Hurwitz criterion. …”
    Get full text
    Article
  7. 5467

    An exergy-based analysis for the synthesis of aromatics from biomass by Mohammed Usman, Joseph Akintola, Gabriel Umoh, Joseph Akpan, Ekpotu Wilson, Queen Moses, Philemon Udom, Edose Osagie

    Published 2025-01-01
    “…The chemical process industry has been facing rising energy costs, increasing competition due to rapid globalization, and more stringent government regulations amid growing public concern for the environment, health, and safety. …”
    Get full text
    Article
  8. 5468
  9. 5469
  10. 5470
  11. 5471

    PSO based task scheduling for medical big data by Chao HU, Jun PENG, Wen-tao YU

    Published 2014-10-01
    Subjects: “…medical big data…”
    Get full text
    Article
  12. 5472

    Secure communication mechanism for VSN based on certificateless signcryption by Wenbo ZHANG, Wenhua HUANG, Jingyu FENG

    Published 2021-07-01
    “…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
    Get full text
    Article
  13. 5473

    Power analysis-resistant based on NCL path balance by Fang LUO, Qing-yu OU, Xiao-ping WU

    Published 2013-08-01
    “…To solve this problem, the formal specification and the sufficient conditions of the implementation for the path balance structure were researched, and the proof was given. Based on the improvement of the binary decision diagram, a path balance extension technique of the null convention logic (NCL) asynchronous circuit was put forward, which could be applied in kinds of automatization synthesis techniques. …”
    Get full text
    Article
  14. 5474
  15. 5475

    Reliability routing protocol based on vehicle density in VANET by Rong CAI, Guoan ZHANG, Li JIN

    Published 2016-09-01
    “…A reliability routing protocol based on vehicle density in vehicular Ad Hoc network was proposed to reduce the complexity of finding an optimal or sub-optimal node of the forwarding node in forwarding range,reducing the average number of hops and enhancing the reliability of the link.Firstly,the size of the unite block was set by the forwarding node according to the vehicle density in the road.And the forwarding range was cut into several equal blocks.Then the farthest block away from the forwarding node was selected.In the selected block,the neighbor node which had the longest link time was chosen as a relay node to forward according to the principle of reliability finally.Compared with EG-RAODV,the simulated results of the proposed routing protocol show that the average number of hops is less and the average distance of one-hop progress is lager,which means the proposed routing protocol can transmit the data packet to destination node more quickly.…”
    Get full text
    Article
  16. 5476

    A New Sensors-Based Covert Channel on Android by Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin

    Published 2014-01-01
    “…However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. …”
    Get full text
    Article
  17. 5477

    Multicast routing with delay constrain based on improved CSA by ZHANG Jing, WANG Lian-hong

    Published 2009-01-01
    “…With the application of the good gene information in the immaturity subpopulation,the improved clonal selection algorithm which was proposed,combined the principle of minimum cost and delay constrains to modify each individual gene so as to improve population.Meanwhile,an additional memory cell of the best individual accumulated in the process was set up to avoid population devolution.The optimized solution could be promptly searched and reached without prepared routing set.Simulation tests of multicast routing with delay constrain demonstrate that the improved clonal selection algorithm has better search efficiency,higher convergence speed,lower complexity of calculation,and better robust performance than the usual clonal selection algorithm and the genetic algorithm.…”
    Get full text
    Article
  18. 5478
  19. 5479

    Exploring the Impact of Gender-Based Violence in South Africa by Corné Davis

    Published 2023-06-01
    “… In 2021, Prof. Corné Davis, f rom the Department of Strategic Communication at the University of Johannesburg (UJ), approached KPMG South Africa regarding the publication of an updated research report on the cost of gender-based violence (GBV) to the South African economy, following a frequently quoted report titled ‘Too Costly to Ignore – The Economic Impact of Gender-Based Violence in South Africa’. …”
    Get full text
    Article
  20. 5480

    The Effect of PISA-Based Educational Program on Mathematical Achievement by Mohammad Tashtoush, Aida Qasimi, Nawal Sheerawi, Mamoon AL-Shannaq

    Published 2024-12-01
    “…The study adopted a quasi-experimental approach, with two distinct groups: an experimental group exposed to the PISA-based educational program and a control group receiving conventional instruction. …”
    Get full text
    Article