Showing 5,501 - 5,520 results of 67,915 for search 'DASB~', query time: 2.22s Refine Results
  1. 5501

    OPEN PLATFORM AS A TECHNOLOGICAL BASIS FOR THE DEVELOPMENT OF SBERBANK by A. Berdyshev

    Published 2018-11-01
    “…The features of the current strategy for transforming the business model of Sberbank, based on the creation of a financial and technological open platform, that ensures interaction with the financial market and other market sectors have identified. …”
    Get full text
    Article
  2. 5502

    Software-defined protocol independent parser based on FPGA by Lixin MIAO, Qinrang LIU, Xin WANG

    Published 2020-02-01
    “…With the boom of information technology,heterogeneous networks with various functions emerge in endlessly,heterogeneous fusion network has become the inevitable trend of the development of the next generation network.To realize communication between heterogeneous networks,network forwarding equipment is essential.Traditional forwarding devices only support fixed protocol configuration and lack scalability,so they cannot support new network protocols.In view of this situation,a software defined protocol independent parser based on FPGA was proposed.The software defined the parsing process,giving the parser flexible and programmable features.It can analyze multiple protocol packets and extract key information needed for protocol conversion without changing hardware devices.The parser through a high-performance FPGA platform were implemented and hardware resource overhead and performance were evaluated.Experimental results show that it can complete the fast parsing of various heterogeneous network protocols and obtain complete analytical data.…”
    Get full text
    Article
  3. 5503
  4. 5504

    Vehicle Detection and Tracking Based on Improved YOLOv8 by Yunxiang Liu, Shujun Shen

    Published 2025-01-01
    “…Therefore, we propose a novel method based on YOLOv8n. Firstly we introduced SCC_Detect based on SCConv on the detection head to reduce the computation of redundant features. …”
    Get full text
    Article
  5. 5505

    Decentralized credit system based on blockchain and its application by Mingsheng WANG, Heyang CAO, Peiyao LI

    Published 2019-08-01
    “…A decentralized credit system was proposed and its construction application was given.Decentralized credit system could be constructed by expanding the transaction structure of “digital currency commodity” based on block chain,expanding the function of consensus protocol and adding specific accounts.Also,the decentralized credit system was applied to the PKI enhancement and supervision system IKP so that IKP system did not need global fund in operation.Moreover,by introducing the hierarchical “virtual currency commodity” supply adjustment mechanism in the decentralized credit system to alleviate the difficulty of regulating the “virtual currency commodity” supply of “digital currency commodity” based on block chain,the precise “virtual currency commodity” supply regulation can be achieved.…”
    Get full text
    Article
  6. 5506

    Research on multi-granularity password analysis based on LLM by Meng HONG, Weidong QIU, Yangde WANG

    Published 2024-02-01
    “…Password-based authentication has been widely used as the primary authentication mechanism.However, occasional large-scale password leaks have highlighted the vulnerability of passwords to risks such as guessing or theft.In recent years, research on password analysis using natural language processing techniques has progressed, treating passwords as a special form of natural language.Nevertheless, limited studies have investigated the impact of password text segmentation granularity on the effectiveness of password analysis with large language models.A multi-granularity password-analyzing framework was proposed based on a large language model, which follows the pre-training paradigm and autonomously learns prior knowledge of password distribution from large unlabelled datasets.The framework comprised three modules: the synchronization network, backbone network, and tail network.The synchronization network module implemented char-level, template-level, and chunk-level password segmentation, extracting knowledge on character distribution, structure, word chunk composition, and other password features.The backbone network module constructed a generic password model to learn the rules governing password composition.The tail network module generated candidate passwords for guessing and analyzing target databases.Experimental evaluations were conducted on eight password databases including Tianya and Twitter, analyzing and summarizing the effectiveness of the proposed framework under different language environments and word segmentation granularities.The results indicate that in Chinese user scenarios, the performance of the password-analyzing framework based on char-level and chunk-level segmentation is comparable, and significantly superior to the framework based on template-level segmentation.In English user scenarios, the framework based on chunk-level segmentation demonstrates the best password-analyzing performance.…”
    Get full text
    Article
  7. 5507

    Short signature based on factoring problem in the standard model by WANG Zhi-wei1, ZHANG Wei1

    Published 2011-01-01
    “…A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in this scheme was compromised of one element in,and the public key was short,requir-ing only the modulus N,one element of,one integer and one pseudorandom function seed.Compared with Hohen-berger’s RSA scheme(Crypto 09),the computaional cost of the sign algorithm and verification algorithm in this scheme is also much lower.…”
    Get full text
    Article
  8. 5508

    Resource management model based on cloud computing environment by Ahyoung Kim, Junwoo Lee, Mucheol Kim

    Published 2016-11-01
    “…The proposed model regularly stores the usage data for computing resources based on Hadoop and HBase. …”
    Get full text
    Article
  9. 5509
  10. 5510

    Image Recognition and Simulation Based on Distributed Artificial Intelligence by Tao Fan

    Published 2021-01-01
    “…This paper studies the traditional target classification and recognition algorithm based on Histogram of Oriented Gradients (HOG) feature extraction and Support Vector Machine (SVM) classification and applies this algorithm to distributed artificial intelligence image recognition. …”
    Get full text
    Article
  11. 5511

    Waveguide-Based Antenna Arrays for 5G Networks by Arismar Cerqueira Sodré, Igor Feliciano da Costa, Renan Alves dos Santos, Hugo Rodrigues Dias Filgueiras, Danilo Henrique Spadoti

    Published 2018-01-01
    “…This work reports the development of two high-performance waveguide-based antenna arrays for 5G cellular networks, operating in the underutilized millimetre wave (mm-wave) frequency spectrum. …”
    Get full text
    Article
  12. 5512
  13. 5513

    Modified link prediction algorithm based on AdaBoost by Zu-feng WU, Qi LIANG, Qiao LIU, Zhi-guang QIN

    Published 2014-03-01
    “…The mainstream of current link prediction algorithm based on network topology structure generally have the problem of low efficiency of recalls.Study found that the correct results from some of the link prediction algorithms are complementary,accordingly,the Boosting method was considered to improve it.According to whether there is a link relationship between the nodes,the problem was divided into two categories,thus the link prediction algorithm as a two classification problem was defined.Furthermore,the algorithm complementary principle to select a number of representative link prediction algorithms as weak classifiers was followed,and a novel link prediction algorithm based on the AdaBoost algorithm was come up.The experimental results on the data from real dataset like the arXiv paper cooperation network and E-mail network show that,the novel algorithm has a better accuracy than the current mainstream algorithms.…”
    Get full text
    Article
  14. 5514

    Curcumin-Based Nanoparticles: Advancements and Challenges in Tumor Therapy by Hicham Wahnou, Riad El Kebbaj, Bertrand Liagre, Vincent Sol, Youness Limami, Raphaël Emmanuel Duval

    Published 2025-01-01
    “…Curcumin, a bioactive compound derived from the rhizome of <i>Curcuma longa</i> L., has garnered significant attention for its potent anticancer properties. …”
    Get full text
    Article
  15. 5515

    Quantifying Uncertainty of Insurance Claims Based on Expert Judgments by Budhi Handoko, Yeny Krista Franty, Fajar Indrayatna

    Published 2025-01-01
    “…In Bayesian statistics, prior specification has an important role in determining the quality of posterior estimates. …”
    Get full text
    Article
  16. 5516

    Output-Based Control of Robots with Variable Stiffness Actuation by Gianluca Palli, Claudio Melchiorri

    Published 2011-01-01
    “…The output-based control of a redundant robotic manipulator with relevant and adjustable joint stiffness is addressed. …”
    Get full text
    Article
  17. 5517

    Blockchain based micropayment for e-health IOT sensors by Mahdi Shahraki, Amir Jalali Bighdeli

    Published 2023-09-01
    “…Increasing the use of this technology in smart cities requires improving the IT infrastructure for the security and privacy of users. This has led to the use of blockchain technology alongside the Internet of Things. …”
    Get full text
    Article
  18. 5518
  19. 5519
  20. 5520

    Patch-based domain adversarial training for speech enhancement by WANG Hongtao, LU Zhihua, YE Qingwei, ZHANG Lianjun

    Published 2024-10-01
    “…In deep learning-based speech enhancement methods, mismatched distributions between training data and test data are often encountered. …”
    Get full text
    Article