Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5521
University International Cooperation: Project Based Translation Training
Published 2019-07-01Subjects: Get full text
Article -
5522
Study of secret sharing schemes based on quantum theory
Published 2009-01-01“…Quantum secret sharing(QSS) which is based on the laws of quantum mechanics,instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quantum secret sharing can be divided into QSS of classical messages and QSS of quantum information,QSS of classical messages can be divided into QSS of classical messages based on entanglement and QSS of classical messages without entanglement, the representative protocols in three main branches of the quantum secret sharing schemes and its latest development were introduced, also prospect analysis of the schemes’ future development was given.…”
Get full text
Article -
5523
Bases del nacionalismo musical en la Argentina
Published 2023-12-01“…Los artistas formados en Europa regresaban a su tierra trayendo no solo herramientas para la composición de música académica, sino también las novedades de la época. La primera parte de este trabajo traza las bases sobre las cuales se construyó el movimiento nacionalista en la Argentina, dejando para una segunda entrega el análisis de las partituras.…”
Get full text
Article -
5524
Recognition of UAVs in Infrared Images Based on YOLOv8
Published 2025-01-01“…With the advancement of Unmanned Aerial Vehicle (UAV) technology, there has been a notable increase in the utilization of UAVs by criminals for engaging in illegal activities, which poses significant threats to critical infrastructure and national security. …”
Get full text
Article -
5525
5G network slicing algorithm based on prediction
Published 2021-09-01“…5G on line scenario needs short build time of network slice, it can use prediction algorithm to isolate network resource in advance to reduce the construction time of network slice.A 5G network slicing algorithm based on prediction was proposed, which used fourth square as cost function to predict the network resource requests with accepted accurate and lower complexity of algorithm.And then based on the prediction result, virtual nodes and links resource were allocated, and container was pulled up when network slice request arrives to network, the dynamic creation of network slices was completed.The simulation results show that the proposed algorithm can get 90% accurate of prediction, and reduce 50% construction time of network slice, and improve the network utilization ration,when new network slice reusing the original network slice.…”
Get full text
Article -
5526
Internet worm propagation model based on Markov chain
Published 2015-05-01“…A stochastic model of Internet worms is presented.Firstly,the propagation of worms is modeled based on Markov chain.The limit distribution and invariant distribution of the model is discussed.Then,necessary and sufficient conditions of the worm propagation in the initial stage and sufficient conditions of the worm propagation in the late stage are discussed.Finally,the scale of the worm propagation is discussed.The simulation validates the model.And the effect of propagation,time and vulnerable host parameter on the spread of worms is discussed.Furthermore,it is compared to the G-W model,and the advantage of it is illustrated.…”
Get full text
Article -
5527
Research on IQ imbalance estimation algorithm based on GSOP
Published 2018-09-01“…In order to satisfy the demand of the efficiency and low cost measurement for high rate optical communication system,the IQ-ImEstimation algorithm was proposed for IQ imbalance estimation in the PDM-MQAM cohernt optical communication system based on GSOP.Two estimation schemes include amplitude impairment and phase impairment were designed by utilizing the power and correlation.Finally,a 34 GBaud PDM-MQAM system was simulated and experimentalized.The results indicate that the IQ-ImEstimation algorithm is accuracy and effective.…”
Get full text
Article -
5528
Gearbox Condition Monitoring based on Variational Mode Decomposition
Published 2016-01-01“…As to the fault diagnosis difficulty caused by the fact that fault feature is possible not obvious in mechanical transmission system,a method based on variational mode decomposition and FCM is proposed for gearbox condition monitoring. …”
Get full text
Article -
5529
Internet bad information detection based on Bert model
Published 2020-11-01“…In view of the business scenario of bad information detection on the internet,the method of detection based on the text content of the website was discussed .Classical text analysis techniques were reviewed.The key technical features and two different usages of Bert model were introduced.The specific implementation scheme of using the feature extraction method to detect website bad information was described in detail,and was compared with the traditional TF-IDF model and word2vec+LSTM model.The validity of this method is verified.…”
Get full text
Article -
5530
Research on spectrum sensing technologies based on goodness of fit
Published 2016-05-01“…Cognitive radio technology has achieved the dynamic allocation of spectrum resources,and improves the utilization rate of spectrum resources.Accurate and efficient spectrum sensing is the key step in cognitive radio.Developing a fast and high-performance spectrum sensing method has become an urgent problem to be solved.In recent years,goodness of fit(GOF)theory has been applied widely in the field of spectrum sensing and the effective spectrum sensing technology under small sample point has been implemented.Therefore,the research on spectrum sensing technology based on GOF has very significant value.The development process of GOF in areas of cognitive radio spectrum sensing was summarized,its basic principle common fitting criterion and fitting object were introduced.The simulation comparison of the algorithm was carried under the Gaussian channel and its prospects of further research was forecasted finally.…”
Get full text
Article -
5531
Investigation of properties of chemical anchor on the basis of epoxy resin
Published 2024-10-01“…The properties of the first fully locally produced bonded anchor UTECH HITRE500 based on epoxy resin are studied.Materials and methods. …”
Get full text
Article -
5532
Fuzzy Xbar and S Control Charts Based on Confidence Intervals
Published 2021-03-01Get full text
Article -
5533
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01“…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
Get full text
Article -
5534
Research and application of V2X based on MEC
Published 2020-06-01“…The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.…”
Get full text
Article -
5535
A Research-Based Summary on Trace Minerals for Cattle
Published 2021-12-01“… Producers can utilize mineral supplementation to improve cattle production and herd health, which has the potential to reduce antibiotic usage. This publication presents a summary on trace minerals for cattle. …”
Get full text
Article -
5536
Parking Space Detection and Path Planning Based on VIDAR
Published 2021-01-01“…Compared with the parking detection method based on YOLO v5, the experimental results demonstrate that the proposed method has higher accuracy in complex parking environments with unknown obstacles. …”
Get full text
Article -
5537
Path Planning of Continuum Robot Based on Path Fitting
Published 2020-01-01“…The Continuum Robot has a multiredundant dof structure, which is extremely advantageous in the unstructured environment, and can complete such tasks as aircraft fuel tank inspection. …”
Get full text
Article -
5538
Inversion for Geofluid Discrimination Based on Poroelasticity and AVO Inversion
Published 2019-01-01“…The synthetic and field data tests illustrate the accuracy and feasibility of the proposed fluid modulus inversion approach for geofluid discrimination.…”
Get full text
Article -
5539
Low-carbon ammonia-based fuel for maritime transport
Published 2025-03-01“…When ammonia burns, it does not produce carbon dioxide and its energy density is 23 MJ/kg. Liquid ammonia has a volumetric energy density of 15,600 MJ/m3. …”
Get full text
Article -
5540
Exploring Contingency Skill Scores Based on Event Sizes
Published 2021-05-01“…The scheme is applied to three different input options of a recently published evaluation of the Proton Prediction System (PPS) for SEP events to show differences between numbers‐based and intensity‐based skill scores of the PPS. …”
Get full text
Article