Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5581
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
5582
RETRACTED: Prospects for the development of university-based scientific tourism
Published 2024-01-01Get full text
Article -
5583
Network slicing deployment method based on isolation level
Published 2020-04-01“…In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.…”
Get full text
Article -
5584
On the Simplex-based methods for Neutrosophic linear programming problems
Published 2024-12-01“…To solve this gap, we consider NLP and propose an effective, simple model that can significantly reduce computational tasks and address these deficits in the mentioned models. …”
Get full text
Article -
5585
Gesture recognition approach based on learning sparse representation
Published 2013-06-01“…An approach of robust accelerometer-based hand gesture recognition based on self-learning sparse representa-tion was proposed. …”
Get full text
Article -
5586
Self-Dual Normal Basis of a Galois Ring
Published 2014-01-01“…In this paper, we show how to construct normal basis in the extension of Galois rings, and we also define weakly self-dual normal basis and self-dual normal basis for R′ over R, where R′ is considered as a free module over R. …”
Get full text
Article -
5587
Attention-based approach of detecting spam in social networks
Published 2020-02-01“…In social networks,a large amount of spam has seriously threaten users' information security and the credit system of social websites.Aiming at the noise and sparsity problems,an attention-based CNN method was proposed to detect spam.On the basis of classical CNN,this method added a filter layer in which an attention mechanism based on Naive Bayesian weighting technology was designed to solve the noise issue.What’s more,instead of the original pooling strategy,it adapted an attention-based pooling policy to alleviate the sparsity problem.Compared with other methods,the results show that the accuracy has increased by 1.32%,2.15%,0.07%,1.63% on four different data sets.…”
Get full text
Article -
5588
Community-based Language Development of Northern Catanduanes, Philippines
Published 2025-02-01“…The data were collected through online focus group discussions (FGD) and survey questionnaire. …”
Get full text
Article -
5589
Memory contents patch based virtual machine synchronization
Published 2012-09-01Subjects: “…checkpoint-based fault tolerance…”
Get full text
Article -
5590
Properties of Edible Films Based on Oxidized Starch and Zein
Published 2014-01-01“…However, films from FOSA and FOSB showed higher permeability than that of the native starch. …”
Get full text
Article -
5591
Prototypes and R&D for undulator-based positron sources
Published 2024-01-01“…The undulator-based positron source is baseline design for the ILC. …”
Get full text
Article -
5592
Public key cryptosystem based on algebraic geometric codes
Published 2008-01-01“…A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was analyzed.It is shown that the security,information rate,error correcting,and prob-ability of correct decipher were improved.…”
Get full text
Article -
5593
Research on Performance Test of Reducer based on JUCE Library
Published 2020-12-01“…In order to solve this problem,the solving method is put forward. The software system based on JUCE libraries is designed,combined with the movement control cards of data transmission,the performance test of speed reducer is finished. …”
Get full text
Article -
5594
Pedestrian trajectory prediction method based on group perception
Published 2024-12-01Get full text
Article -
5595
Plant-based products: potential, production technology and challenges
Published 2022-10-01Subjects: Get full text
Article -
5596
ADAPTIVE GROWTH TECHNIQUE OF TRUSS STRUCTURE BASED ON MMA
Published 2019-01-01“…The design of typical truss structures with single constraint and multiple constraints is discussed, and the multi load cases are studied. The results of numerical examples show that the proposed method can obtain clear information of rod distribution and dimension, and has high design efficiency and good applicability. …”
Get full text
Article -
5597
On Computation of Degree-Based Entropy of Planar Octahedron Networks
Published 2022-01-01“…In this article, we present some degree-based entropies of planar octahedron network.…”
Get full text
Article -
5598
-
5599
Chaotic Image Encryption Algorithm Based on Circulant Operation
Published 2013-01-01“…A novel chaotic image encryption scheme based on the time-delay Lorenz system is presented in this paper with the description of Circulant matrix. …”
Get full text
Article -
5600
Fuzzy-Based Trust Prediction Model for Routing in WSNs
Published 2014-01-01“…The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nodes in the network. …”
Get full text
Article