Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5541
OSU based M-OTN technology innovation and verification
Published 2021-04-01“…As many carriers are stopping SDH/MSTP investment, OTN networks will replace SDH networks gradually and extend to the edge of the metro network, thus introducing new requirements for OTN technologies.In view of the challenges and new services requirements of the development of the metro optical transport network, the M-OTN technology with the optical service unit (OSU) as the core and optimized for the metro application was proposed.The progress of standardization and main contents of OSU technical standards were introduced, including OSU frame structure and overheads, OSU management frames, OSU hitless bandwidth adjustment mechanism.The consideration on M-OTN equipment types and existing network evolution strategy was given.The M-OTN prototype systems from mainstream manufacturers were tested.Test results show that OSU technology has significant advantages in latency, hitless bandwidth adjustment and transport efficiency.…”
Get full text
Article -
5542
Video-based collaboration to develop language production skills
Published 2024-08-01“…This paper explores the integration of digital technology, particularly the video-based tool Flipgrid, to enhance language learning, focusing on communication competences. …”
Get full text
Article -
5543
An Interference Links Selection Method Based on Genetic Algorithm
Published 2015-09-01“…Then this problem was solved based on genetic algorithm to achieve the optimal system throughput. …”
Get full text
Article -
5544
Blockchain-based result-traceable searchable encryption scheme
Published 2019-09-01Subjects: Get full text
Article -
5545
Analysis of Intelligent Pipeline Perception Technology Based on Terminal
Published 2015-03-01“…The background of the intelligent pipeline was briefly introduced,the multidimensional perception technology of intelligent pipeline was analyzed,the perception technology based on terminal was focused on,the corresponding solutions were put forward,that these solutions would be beneficial to realize the intelligent pipeline and finally the difficulties and challenges of these solutions were analyzed.It has carried on the beneficial exploration for the further technology research and practical deployment of the intelligent pipeline.…”
Get full text
Article -
5546
Universally composable oblivious transfer protocol based on VSPH
Published 2007-01-01“…A new oblivious transfer protocol was proposed within the framework of universally composable security(UC-DT).The protocol based on the verifiably smooth projective hashing(VSPH) is against adaptive adversaries in a common reference string(CRS) model.The UC-OT protocol improves computational efficiency with non-committing encryptions(NCE)which is based on decisional compounding residuosity,achieves UC-OT,and it saves O(n)-1 rounds in communication efficiency than bit-OT protocols.Compared with Canetti’s scheme in non-erase model,the message reduced once.Compared with Fischlin’s scheme,the message transfers were reduced twice,and the scheme does not rely on the auxiliary party,therefore it is more practical.…”
Get full text
Article -
5547
Survey on community detection method based on random walk
Published 2023-06-01“…Random walk techniques achieve high accuracy and efficiency in community detection.To summarize and analyze community detection methods based on random walk, the random walk technique was classified into personalized PageRank, heat kernel diffusion and other random walk methods, and community detection was classified into tasks of local community detection and global community structure identification.A detailed overview of different techniques based on random walk and their application to the tasks of community detection was provided, problems in existing methods were analyzed, and future research directions were pointed out.Finally, evaluation metrics of community detection accuracy for different community detection tasks were summarized in terms of similarity and structure respectively to facilitate research in community detection.…”
Get full text
Article -
5548
Complexity control method of random forest based HEVC
Published 2019-02-01“…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
Get full text
Article -
5549
Development of scientific-based interactive multimedia with polyhedron material
Published 2024-12-01“…Dengan skor rata-rata 92,2% dari ahli materi dan 87,1% dari ahli media, hasil tersebut menunjukkan produk yang dirancang valid. …”
Get full text
Article -
5550
Determination of the Sediment Carrying Capacity Based on Perturbed Theory
Published 2014-01-01“…After that, the new formula was verified through measuring data of natural rivers and flume tests and comparing the verified results calculated by Cao Formula, Zhang Formula, Li Formula, Engelung-Hansen Formula, Ackers-White Formula, and Yang Formula. …”
Get full text
Article -
5551
Visualization Analysis of Construction Robots Based on Knowledge Graph
Published 2024-12-01“…To further explore the current research landscape in this domain, the CNKI Chinese database and the Web of Science core database were employed as data sources. CiteSpace software (version 6.2R4) was utilized to visualize and the analyze relevant literature on construction robots from 2007 to 2024, generating pertinent maps. …”
Get full text
Article -
5552
Privacy matching-based service proxy discovery scheme
Published 2016-08-01“…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
Get full text
Article -
5553
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
5554
Copper halide-based semiconductor materials. Adsorption properties
Published 2019-06-01Subjects: Get full text
Article -
5555
A New Model of Ultracapacitors Based on Fractal Fundamentals
Published 2014-01-01“…An intuitive model is proposed in this paper to describe the electrical behavior of certain ultracapacitors. The model is based on a simple expression that can be fully characterized by five real numbers. …”
Get full text
Article -
5556
Stereo robust watermark algorithm based on parameter optimization
Published 2023-07-01“…Aiming at issues such as illegal dissemination of network audio data and privacy leakage, a stereo robust watermark algorithm based on parameter optimization was proposed.Firstly, the watermark was embedded by modifying the singular value ratio of odd segment based on the insensitivity of stereo channels to attack, and aiming at minimizing the relative distortion of the two channels.The embedding process was optimized and the perceived quality of the audio was improved.Then, a parameter optimization method was proposed to find optimal parameters on each audio file, and the imperceptibility and robustness were well balanced.The simulation results show that the proposed algorithm has good imperceptibility and robustness against conventional signal processing.…”
Get full text
Article -
5557
Integrated positioning method of roadheader based on inertial technology
Published 2024-12-01“…Taking the inertial navigation system as the main system, a combined positioning and orientation method based on inertial navigation system and laser sensing system is proposed. …”
Get full text
Article -
5558
An Adaptive Spectral Kurtosis Method Based on Optimal Filter
Published 2017-01-01“…As a useful tool to detect protrusion buried in signals, kurtosis has a wide application in engineering, for example, in bearing fault diagnosis. …”
Get full text
Article -
5559
Genetic bases of compact forms among cucurbit crops
Published 2024-01-01“…The genetic base of compactness has been an area of active research in recent years, with several genes and mutations identified to be associated with the appearance of dwarf phenotypes. …”
Get full text
Article -
5560
DMA-based key generation method for IoT scenario
Published 2022-12-01“…Aiming at the problems of slow update frequency of channel key, low generation rate and limited node resources in the IoT scenario, a DMA-based physical layer key generation method was proposed, by using the agility and reconfigurability of DMA to improve the time variability and randomness of received signal.Firstly, DMA was used by the transmitter to randomly weight the signal and send it to the receiver, which could enhance the randomness of signals on the premise of ensuring the transparent reception of the signal.Then, the key from the received signal was extracted by the sender and receiver.By combining the rapid changeability and randomness of DMA, the randomness of signal source and the randomness of natural channel, a composite channel was constructed to improve the randomness of the key source.In addition, the channel estimation was transfered overhead from the terminal to the base station, which effectively reduced the overhead and delay of the communication system, and was suitable for IoT scenarios with asymmetric resources and lightweight equipment.Simulation results show that the proposed method can effectively improve the key generation rate in quasi-static scenarios, and the generated physical layer key has passed the NIST test.…”
Get full text
Article