Showing 5,521 - 5,540 results of 67,915 for search 'DASB~', query time: 2.66s Refine Results
  1. 5521
  2. 5522

    Study of secret sharing schemes based on quantum theory by ZHU Zhen-chao 1, ZHANG Yu-qing2

    Published 2009-01-01
    “…Quantum secret sharing(QSS) which is based on the laws of quantum mechanics,instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quantum secret sharing can be divided into QSS of classical messages and QSS of quantum information,QSS of classical messages can be divided into QSS of classical messages based on entanglement and QSS of classical messages without entanglement, the representative protocols in three main branches of the quantum secret sharing schemes and its latest development were introduced, also prospect analysis of the schemes’ future development was given.…”
    Get full text
    Article
  3. 5523

    Bases del nacionalismo musical en la Argentina by Andrea Gabriela Fusco Morales

    Published 2023-12-01
    “…Los artistas formados en Europa regresaban a su tierra trayendo no solo herramientas para la composición de música académica, sino también las novedades de la época. La primera parte de este trabajo traza las bases sobre las cuales se construyó el movimiento nacionalista en la Argentina, dejando para una segunda entrega el análisis de las partituras.…”
    Get full text
    Article
  4. 5524

    Recognition of UAVs in Infrared Images Based on YOLOv8 by Gang Zhou, Xiuqi Liu, Hongliang Bi

    Published 2025-01-01
    “…With the advancement of Unmanned Aerial Vehicle (UAV) technology, there has been a notable increase in the utilization of UAVs by criminals for engaging in illegal activities, which poses significant threats to critical infrastructure and national security. …”
    Get full text
    Article
  5. 5525

    5G network slicing algorithm based on prediction by Jiageng ZHANG, Min ZHU, Feng DU, Qi WANG, Jun LIU, Zhihai SUO, Li WANG

    Published 2021-09-01
    “…5G on line scenario needs short build time of network slice, it can use prediction algorithm to isolate network resource in advance to reduce the construction time of network slice.A 5G network slicing algorithm based on prediction was proposed, which used fourth square as cost function to predict the network resource requests with accepted accurate and lower complexity of algorithm.And then based on the prediction result, virtual nodes and links resource were allocated, and container was pulled up when network slice request arrives to network, the dynamic creation of network slices was completed.The simulation results show that the proposed algorithm can get 90% accurate of prediction, and reduce 50% construction time of network slice, and improve the network utilization ration,when new network slice reusing the original network slice.…”
    Get full text
    Article
  6. 5526

    Internet worm propagation model based on Markov chain by HOUHan-xun Z, UOWei G, IUJian L, IADa-yu J

    Published 2015-05-01
    “…A stochastic model of Internet worms is presented.Firstly,the propagation of worms is modeled based on Markov chain.The limit distribution and invariant distribution of the model is discussed.Then,necessary and sufficient conditions of the worm propagation in the initial stage and sufficient conditions of the worm propagation in the late stage are discussed.Finally,the scale of the worm propagation is discussed.The simulation validates the model.And the effect of propagation,time and vulnerable host parameter on the spread of worms is discussed.Furthermore,it is compared to the G-W model,and the advantage of it is illustrated.…”
    Get full text
    Article
  7. 5527

    Research on IQ imbalance estimation algorithm based on GSOP by Xian ZHOU, Tianyu GAO, Jiahao HUO, Xiaojie SHEN, Dongxu LU, Wei HUANGFU, Jiajing TU, Keping LONG

    Published 2018-09-01
    “…In order to satisfy the demand of the efficiency and low cost measurement for high rate optical communication system,the IQ-ImEstimation algorithm was proposed for IQ imbalance estimation in the PDM-MQAM cohernt optical communication system based on GSOP.Two estimation schemes include amplitude impairment and phase impairment were designed by utilizing the power and correlation.Finally,a 34 GBaud PDM-MQAM system was simulated and experimentalized.The results indicate that the IQ-ImEstimation algorithm is accuracy and effective.…”
    Get full text
    Article
  8. 5528

    Gearbox Condition Monitoring based on Variational Mode Decomposition by Wu Yingjie, Liu Changliang, Zhen Chenggang, Zhao Yaliang

    Published 2016-01-01
    “…As to the fault diagnosis difficulty caused by the fact that fault feature is possible not obvious in mechanical transmission system,a method based on variational mode decomposition and FCM is proposed for gearbox condition monitoring. …”
    Get full text
    Article
  9. 5529

    Internet bad information detection based on Bert model by Xin CAI

    Published 2020-11-01
    “…In view of the business scenario of bad information detection on the internet,the method of detection based on the text content of the website was discussed .Classical text analysis techniques were reviewed.The key technical features and two different usages of Bert model were introduced.The specific implementation scheme of using the feature extraction method to detect website bad information was described in detail,and was compared with the traditional TF-IDF model and word2vec+LSTM model.The validity of this method is verified.…”
    Get full text
    Article
  10. 5530

    Research on spectrum sensing technologies based on goodness of fit by Guangyue LU, Cai XU, Yinghui YE, Yin MI

    Published 2016-05-01
    “…Cognitive radio technology has achieved the dynamic allocation of spectrum resources,and improves the utilization rate of spectrum resources.Accurate and efficient spectrum sensing is the key step in cognitive radio.Developing a fast and high-performance spectrum sensing method has become an urgent problem to be solved.In recent years,goodness of fit(GOF)theory has been applied widely in the field of spectrum sensing and the effective spectrum sensing technology under small sample point has been implemented.Therefore,the research on spectrum sensing technology based on GOF has very significant value.The development process of GOF in areas of cognitive radio spectrum sensing was summarized,its basic principle common fitting criterion and fitting object were introduced.The simulation comparison of the algorithm was carried under the Gaussian channel and its prospects of further research was forecasted finally.…”
    Get full text
    Article
  11. 5531

    Investigation of properties of chemical anchor on the basis of epoxy resin by V. A. Shvetsova, M. G. Kovalev

    Published 2024-10-01
    “…The properties of the first fully locally produced bonded anchor UTECH HITRE500 based on epoxy resin are studied.Materials and methods. …”
    Get full text
    Article
  12. 5532
  13. 5533

    Efficient signcryption scheme based on Cocks’ identity cryptosystem by Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG

    Published 2020-12-01
    “…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
    Get full text
    Article
  14. 5534

    Research and application of V2X based on MEC by Jiahui QIU, Zhichao ZHOU, Xiaobo LIN, Yu XIAO, Chao CAI, Liu LIU

    Published 2020-06-01
    “…The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.…”
    Get full text
    Article
  15. 5535

    A Research-Based Summary on Trace Minerals for Cattle by João H. Jabur Bittar, Roberto A. Palomares

    Published 2021-12-01
    “… Producers can utilize mineral supplementation to improve cattle production and herd health, which has the potential to reduce antibiotic usage. This publication presents a summary on trace minerals for cattle. …”
    Get full text
    Article
  16. 5536

    Parking Space Detection and Path Planning Based on VIDAR by Yi Xu, Shanshang Gao, Guoxin Jiang, Xiaotong Gong, Hongxue Li, Xiaoqing Sang, Liming Wang, Ruoyu Zhu, Yuqiong Wang

    Published 2021-01-01
    “…Compared with the parking detection method based on YOLO v5, the experimental results demonstrate that the proposed method has higher accuracy in complex parking environments with unknown obstacles. …”
    Get full text
    Article
  17. 5537

    Path Planning of Continuum Robot Based on Path Fitting by Guochen Niu, Yunxiao Zhang, Wenshuai Li

    Published 2020-01-01
    “…The Continuum Robot has a multiredundant dof structure, which is extremely advantageous in the unstructured environment, and can complete such tasks as aircraft fuel tank inspection. …”
    Get full text
    Article
  18. 5538

    Inversion for Geofluid Discrimination Based on Poroelasticity and AVO Inversion by Lingqian Wang, Hui Zhou, Bo Yu, Yanxin Zhou, Wenling Liu, Yukun Tian

    Published 2019-01-01
    “…The synthetic and field data tests illustrate the accuracy and feasibility of the proposed fluid modulus inversion approach for geofluid discrimination.…”
    Get full text
    Article
  19. 5539

    Low-carbon ammonia-based fuel for maritime transport by A.A. Levikhin, A.A. Boryaev

    Published 2025-03-01
    “…When ammonia burns, it does not produce carbon dioxide and its energy density is 23 MJ/kg. Liquid ammonia has a volumetric energy density of 15,600 MJ/m3. …”
    Get full text
    Article
  20. 5540

    Exploring Contingency Skill Scores Based on Event Sizes by S. W. Kahler, H. Darsey

    Published 2021-05-01
    “…The scheme is applied to three different input options of a recently published evaluation of the Proton Prediction System (PPS) for SEP events to show differences between numbers‐based and intensity‐based skill scores of the PPS. …”
    Get full text
    Article