Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5501
OPEN PLATFORM AS A TECHNOLOGICAL BASIS FOR THE DEVELOPMENT OF SBERBANK
Published 2018-11-01“…The features of the current strategy for transforming the business model of Sberbank, based on the creation of a financial and technological open platform, that ensures interaction with the financial market and other market sectors have identified. …”
Get full text
Article -
5502
Software-defined protocol independent parser based on FPGA
Published 2020-02-01“…With the boom of information technology,heterogeneous networks with various functions emerge in endlessly,heterogeneous fusion network has become the inevitable trend of the development of the next generation network.To realize communication between heterogeneous networks,network forwarding equipment is essential.Traditional forwarding devices only support fixed protocol configuration and lack scalability,so they cannot support new network protocols.In view of this situation,a software defined protocol independent parser based on FPGA was proposed.The software defined the parsing process,giving the parser flexible and programmable features.It can analyze multiple protocol packets and extract key information needed for protocol conversion without changing hardware devices.The parser through a high-performance FPGA platform were implemented and hardware resource overhead and performance were evaluated.Experimental results show that it can complete the fast parsing of various heterogeneous network protocols and obtain complete analytical data.…”
Get full text
Article -
5503
Machine Learning Based Engagement Prediction for Online Courses
Published 2025-01-01Get full text
Article -
5504
Vehicle Detection and Tracking Based on Improved YOLOv8
Published 2025-01-01“…Therefore, we propose a novel method based on YOLOv8n. Firstly we introduced SCC_Detect based on SCConv on the detection head to reduce the computation of redundant features. …”
Get full text
Article -
5505
Decentralized credit system based on blockchain and its application
Published 2019-08-01“…A decentralized credit system was proposed and its construction application was given.Decentralized credit system could be constructed by expanding the transaction structure of “digital currency commodity” based on block chain,expanding the function of consensus protocol and adding specific accounts.Also,the decentralized credit system was applied to the PKI enhancement and supervision system IKP so that IKP system did not need global fund in operation.Moreover,by introducing the hierarchical “virtual currency commodity” supply adjustment mechanism in the decentralized credit system to alleviate the difficulty of regulating the “virtual currency commodity” supply of “digital currency commodity” based on block chain,the precise “virtual currency commodity” supply regulation can be achieved.…”
Get full text
Article -
5506
Research on multi-granularity password analysis based on LLM
Published 2024-02-01“…Password-based authentication has been widely used as the primary authentication mechanism.However, occasional large-scale password leaks have highlighted the vulnerability of passwords to risks such as guessing or theft.In recent years, research on password analysis using natural language processing techniques has progressed, treating passwords as a special form of natural language.Nevertheless, limited studies have investigated the impact of password text segmentation granularity on the effectiveness of password analysis with large language models.A multi-granularity password-analyzing framework was proposed based on a large language model, which follows the pre-training paradigm and autonomously learns prior knowledge of password distribution from large unlabelled datasets.The framework comprised three modules: the synchronization network, backbone network, and tail network.The synchronization network module implemented char-level, template-level, and chunk-level password segmentation, extracting knowledge on character distribution, structure, word chunk composition, and other password features.The backbone network module constructed a generic password model to learn the rules governing password composition.The tail network module generated candidate passwords for guessing and analyzing target databases.Experimental evaluations were conducted on eight password databases including Tianya and Twitter, analyzing and summarizing the effectiveness of the proposed framework under different language environments and word segmentation granularities.The results indicate that in Chinese user scenarios, the performance of the password-analyzing framework based on char-level and chunk-level segmentation is comparable, and significantly superior to the framework based on template-level segmentation.In English user scenarios, the framework based on chunk-level segmentation demonstrates the best password-analyzing performance.…”
Get full text
Article -
5507
Short signature based on factoring problem in the standard model
Published 2011-01-01“…A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in this scheme was compromised of one element in,and the public key was short,requir-ing only the modulus N,one element of,one integer and one pseudorandom function seed.Compared with Hohen-berger’s RSA scheme(Crypto 09),the computaional cost of the sign algorithm and verification algorithm in this scheme is also much lower.…”
Get full text
Article -
5508
Resource management model based on cloud computing environment
Published 2016-11-01“…The proposed model regularly stores the usage data for computing resources based on Hadoop and HBase. …”
Get full text
Article -
5509
Progress and prospect of flexible MXene‐based energy storage
Published 2025-01-01Subjects: Get full text
Article -
5510
Image Recognition and Simulation Based on Distributed Artificial Intelligence
Published 2021-01-01“…This paper studies the traditional target classification and recognition algorithm based on Histogram of Oriented Gradients (HOG) feature extraction and Support Vector Machine (SVM) classification and applies this algorithm to distributed artificial intelligence image recognition. …”
Get full text
Article -
5511
Waveguide-Based Antenna Arrays for 5G Networks
Published 2018-01-01“…This work reports the development of two high-performance waveguide-based antenna arrays for 5G cellular networks, operating in the underutilized millimetre wave (mm-wave) frequency spectrum. …”
Get full text
Article -
5512
Tissue engineering and biosensing applications of carbon-based nanomaterials
Published 2025-06-01Get full text
Article -
5513
Modified link prediction algorithm based on AdaBoost
Published 2014-03-01“…The mainstream of current link prediction algorithm based on network topology structure generally have the problem of low efficiency of recalls.Study found that the correct results from some of the link prediction algorithms are complementary,accordingly,the Boosting method was considered to improve it.According to whether there is a link relationship between the nodes,the problem was divided into two categories,thus the link prediction algorithm as a two classification problem was defined.Furthermore,the algorithm complementary principle to select a number of representative link prediction algorithms as weak classifiers was followed,and a novel link prediction algorithm based on the AdaBoost algorithm was come up.The experimental results on the data from real dataset like the arXiv paper cooperation network and E-mail network show that,the novel algorithm has a better accuracy than the current mainstream algorithms.…”
Get full text
Article -
5514
Curcumin-Based Nanoparticles: Advancements and Challenges in Tumor Therapy
Published 2025-01-01“…Curcumin, a bioactive compound derived from the rhizome of <i>Curcuma longa</i> L., has garnered significant attention for its potent anticancer properties. …”
Get full text
Article -
5515
Quantifying Uncertainty of Insurance Claims Based on Expert Judgments
Published 2025-01-01“…In Bayesian statistics, prior specification has an important role in determining the quality of posterior estimates. …”
Get full text
Article -
5516
Output-Based Control of Robots with Variable Stiffness Actuation
Published 2011-01-01“…The output-based control of a redundant robotic manipulator with relevant and adjustable joint stiffness is addressed. …”
Get full text
Article -
5517
Blockchain based micropayment for e-health IOT sensors
Published 2023-09-01“…Increasing the use of this technology in smart cities requires improving the IT infrastructure for the security and privacy of users. This has led to the use of blockchain technology alongside the Internet of Things. …”
Get full text
Article -
5518
Using machine learning-based models for personality recognition
Published 2021-09-01“…Big Data and Computing Visions…”
Get full text
Article -
5519
Magnesium-based nanocomposites for orthopedic applications: A review
Published 2024-11-01Subjects: “…Magnesium-based nanocomposite…”
Get full text
Article -
5520
Patch-based domain adversarial training for speech enhancement
Published 2024-10-01“…In deep learning-based speech enhancement methods, mismatched distributions between training data and test data are often encountered. …”
Get full text
Article