Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5461
Containerizing solution based on Kubernetes of database and its cluster
Published 2018-12-01“…With the maturity of container technology,more and more internet companies and IT companies have begun to migrate their core business platforms to the container environment.After more than three years of rapid development,Kubernetes has become the industry's preferred container cluster management platform.The containerization scheme of MySQL database and its cluster was given from the perspective of database containerization,based on the analysis of the key technology of database containerization on Kubernetes.Through the evaluation and comparison of performance and reliability of various database models,problems that database containerization technology may encounter and suggestion of database container hosting scheme under different scenarios were proposed.…”
Get full text
Article -
5462
Structural health detection sensor based on RFID technology
Published 2025-01-01“…In order to achieve structural health monitoring, a frequency-domain-based chipless radio-frequency identification sensor has been studied. …”
Get full text
Article -
5463
Multiuser secret key generation based on received signal
Published 2018-10-01“…The secret key generation method based on channel characteristic provides a new way for communication security.But under the conditions of multiuser and slow fading,because of the slow channel parameter changing rate,using the secret key generation method above can result in a low secret key rate.To solve this problem,a multiuser secret key generation method based on the received signal was proposed.By distributing the random signals to different users using block diagonalization precoding,base station and user can extract the secret key from the received signal.The novel method could significantly increase the secret key rate of multiuser under the quasi-static channel and slow-fading channel,which is verified by simulations.…”
Get full text
Article -
5464
Design for database access control mechanism based on blockchain
Published 2020-05-01“…Aiming at the current problems of database access control,the thought of blockchain technology applied to database access control was proposed.The implementation mechanism of database access control based on blockchain was designed from several aspects as blockchain hierarchical structure,logical hierarchical structure of access control process,implementation principle of access control,consensus authentication principle of access control,and construction mechanism of access control blockchain system.The performance of database access control system based on blockchain was assessed.A complete framework was provided for blockchain applied in database access control.Through strengthening the authentication and supervision of visitor identity,access permission and access behavior,the database access control ability is improved effectively.…”
Get full text
Article -
5465
Address overloading-based packet forwarding verification in SDN
Published 2022-03-01Subjects: Get full text
Article -
5466
Estimating Vehicle Stability Region Based on Energy Function
Published 2015-01-01“…Detailed detecting system and data processing were introduced. In addition, stability of the vehicle system was discussed using Hurwitz criterion. …”
Get full text
Article -
5467
An exergy-based analysis for the synthesis of aromatics from biomass
Published 2025-01-01“…The chemical process industry has been facing rising energy costs, increasing competition due to rapid globalization, and more stringent government regulations amid growing public concern for the environment, health, and safety. …”
Get full text
Article -
5468
-
5469
Research on ionospheric parameters prediction based on deep learning
Published 2021-04-01Get full text
Article -
5470
-
5471
PSO based task scheduling for medical big data
Published 2014-10-01Subjects: “…medical big data…”
Get full text
Article -
5472
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01“…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
Get full text
Article -
5473
Power analysis-resistant based on NCL path balance
Published 2013-08-01“…To solve this problem, the formal specification and the sufficient conditions of the implementation for the path balance structure were researched, and the proof was given. Based on the improvement of the binary decision diagram, a path balance extension technique of the null convention logic (NCL) asynchronous circuit was put forward, which could be applied in kinds of automatization synthesis techniques. …”
Get full text
Article -
5474
Machine Learning Based Modeling of Thermospheric Mass Density
Published 2024-05-01Subjects: “…thermosphere mass density…”
Get full text
Article -
5475
Reliability routing protocol based on vehicle density in VANET
Published 2016-09-01“…A reliability routing protocol based on vehicle density in vehicular Ad Hoc network was proposed to reduce the complexity of finding an optimal or sub-optimal node of the forwarding node in forwarding range,reducing the average number of hops and enhancing the reliability of the link.Firstly,the size of the unite block was set by the forwarding node according to the vehicle density in the road.And the forwarding range was cut into several equal blocks.Then the farthest block away from the forwarding node was selected.In the selected block,the neighbor node which had the longest link time was chosen as a relay node to forward according to the principle of reliability finally.Compared with EG-RAODV,the simulated results of the proposed routing protocol show that the average number of hops is less and the average distance of one-hop progress is lager,which means the proposed routing protocol can transmit the data packet to destination node more quickly.…”
Get full text
Article -
5476
A New Sensors-Based Covert Channel on Android
Published 2014-01-01“…However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. …”
Get full text
Article -
5477
Multicast routing with delay constrain based on improved CSA
Published 2009-01-01“…With the application of the good gene information in the immaturity subpopulation,the improved clonal selection algorithm which was proposed,combined the principle of minimum cost and delay constrains to modify each individual gene so as to improve population.Meanwhile,an additional memory cell of the best individual accumulated in the process was set up to avoid population devolution.The optimized solution could be promptly searched and reached without prepared routing set.Simulation tests of multicast routing with delay constrain demonstrate that the improved clonal selection algorithm has better search efficiency,higher convergence speed,lower complexity of calculation,and better robust performance than the usual clonal selection algorithm and the genetic algorithm.…”
Get full text
Article -
5478
Research on Intelligent Security Access Platform Based on SDN
Published 2023-09-01Get full text
Article -
5479
Exploring the Impact of Gender-Based Violence in South Africa
Published 2023-06-01“… In 2021, Prof. Corné Davis, f rom the Department of Strategic Communication at the University of Johannesburg (UJ), approached KPMG South Africa regarding the publication of an updated research report on the cost of gender-based violence (GBV) to the South African economy, following a frequently quoted report titled ‘Too Costly to Ignore – The Economic Impact of Gender-Based Violence in South Africa’. …”
Get full text
Article -
5480
The Effect of PISA-Based Educational Program on Mathematical Achievement
Published 2024-12-01“…The study adopted a quasi-experimental approach, with two distinct groups: an experimental group exposed to the PISA-based educational program and a control group receiving conventional instruction. …”
Get full text
Article