Showing 5,581 - 5,600 results of 67,915 for search 'DASB~', query time: 2.67s Refine Results
  1. 5581
  2. 5582
  3. 5583

    Network slicing deployment method based on isolation level by Qirun PAN, Kaizhi HUANG, Wei YOU

    Published 2020-04-01
    “…In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.…”
    Get full text
    Article
  4. 5584

    On the Simplex-based methods for Neutrosophic linear programming problems by Sulima Ahmed Mohammed Zubair, Najla ELzein AbuKaswi Osman, Wiem Abedelmonem Salah Ben Khalifa, Amal Hassan Mohammed Yassin

    Published 2024-12-01
    “…To solve this gap, we consider NLP and propose an effective, simple model that can significantly reduce computational tasks and address these deficits in the mentioned models. …”
    Get full text
    Article
  5. 5585

    Gesture recognition approach based on learning sparse representation by Ling XIAO, Ren-fa LI, Fan-zai ZENG, Wei-lan QU

    Published 2013-06-01
    “…An approach of robust accelerometer-based hand gesture recognition based on self-learning sparse representa-tion was proposed. …”
    Get full text
    Article
  6. 5586

    Self-Dual Normal Basis of a Galois Ring by Irwansyah, Intan Muchtadi-Alamsyah, Aleams Barra, Ahmad Muchlis

    Published 2014-01-01
    “…In this paper, we show how to construct normal basis in the extension of Galois rings, and we also define weakly self-dual normal basis and self-dual normal basis for R′ over R, where R′ is considered as a free module over R. …”
    Get full text
    Article
  7. 5587

    Attention-based approach of detecting spam in social networks by Qiang QU, Hongtao YU, Ruiyang HUANG

    Published 2020-02-01
    “…In social networks,a large amount of spam has seriously threaten users' information security and the credit system of social websites.Aiming at the noise and sparsity problems,an attention-based CNN method was proposed to detect spam.On the basis of classical CNN,this method added a filter layer in which an attention mechanism based on Naive Bayesian weighting technology was designed to solve the noise issue.What’s more,instead of the original pooling strategy,it adapted an attention-based pooling policy to alleviate the sparsity problem.Compared with other methods,the results show that the accuracy has increased by 1.32%,2.15%,0.07%,1.63% on four different data sets.…”
    Get full text
    Article
  8. 5588

    Community-based Language Development of Northern Catanduanes, Philippines by Renelyn Bautista

    Published 2025-02-01
    “…The data were collected through online focus group discussions (FGD) and survey questionnaire. …”
    Get full text
    Article
  9. 5589

    Memory contents patch based virtual machine synchronization by Jian-wei LIAO, Shan-xiong CHEN, Li LI

    Published 2012-09-01
    Subjects: “…checkpoint-based fault tolerance…”
    Get full text
    Article
  10. 5590
  11. 5591
  12. 5592

    Public key cryptosystem based on algebraic geometric codes by ZHANG Ying, YUE Dian-wu

    Published 2008-01-01
    “…A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was analyzed.It is shown that the security,information rate,error correcting,and prob-ability of correct decipher were improved.…”
    Get full text
    Article
  13. 5593

    Research on Performance Test of Reducer based on JUCE Library by Liangliang Yang, Liangzhu Qian, Xiufeng Wang

    Published 2020-12-01
    “…In order to solve this problem,the solving method is put forward. The software system based on JUCE libraries is designed,combined with the movement control cards of data transmission,the performance test of speed reducer is finished. …”
    Get full text
    Article
  14. 5594
  15. 5595
  16. 5596

    ADAPTIVE GROWTH TECHNIQUE OF TRUSS STRUCTURE BASED ON MMA by HUA Min, DING XiaoHong, WU ChunPing

    Published 2019-01-01
    “…The design of typical truss structures with single constraint and multiple constraints is discussed, and the multi load cases are studied. The results of numerical examples show that the proposed method can obtain clear information of rod distribution and dimension, and has high design efficiency and good applicability. …”
    Get full text
    Article
  17. 5597

    On Computation of Degree-Based Entropy of Planar Octahedron Networks by Tian-Le Sun, Haidar Ali, Bilal Ali, Usman Ali, Jia-Bao Liu, Parvez Ali

    Published 2022-01-01
    “…In this article, we present some degree-based entropies of planar octahedron network.…”
    Get full text
    Article
  18. 5598
  19. 5599

    Chaotic Image Encryption Algorithm Based on Circulant Operation by Xiaoling Huang, Guodong Ye, Kwok-Wo Wong

    Published 2013-01-01
    “…A novel chaotic image encryption scheme based on the time-delay Lorenz system is presented in this paper with the description of Circulant matrix. …”
    Get full text
    Article
  20. 5600

    Fuzzy-Based Trust Prediction Model for Routing in WSNs by X. Anita, M. A. Bhagyaveni, J. Martin Leo Manickam

    Published 2014-01-01
    “…The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nodes in the network. …”
    Get full text
    Article