Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5641
About the competence-based technology for educational environment survey
Published 2022-05-01“…The article describes the competence-based technology used at Ukhta State Technical University for the estimation of the efficiency of extracurricular activities. …”
Get full text
Article -
5642
Adaptive JPEG steganography based on distortion cost updating
Published 2017-09-01“…Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding,so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding,an adaptive JPEG steganography algorithm based on distortion cost updating was proposed.Firstly,three factors that affect embedding fluctuations were analyzed,including quantization step,the absolute value of the quantized DCT coefficient to be modified and perturbation error.Then the embedding update strategy (EUS) was proposed,which enabled to dynamically update the distortion costs.After that,an adaptive JPEG steganography algorithm was implemented combining the strategy.The experimental result illustrates that the algorithm can significantly improve the secure performance of JPEG steganography algorithm.…”
Get full text
Article -
5643
An indoor positioning system based on distributed LTE network
Published 2018-06-01Subjects: Get full text
Article -
5644
Aviation Information Network Architecture Based on SDN/NFV
Published 2022-03-01“…As the key support for the emergence of cluster combat eff ectiveness, the design architecture of aviation information network will infl uence the combat mode in the aviation fi eld.Based on the future operational requirements of aviation cluster, the defi ciency of traditional aviation information network was introduced and the technical characteristics of SDN/NFV was analyzed.On this basis, combined SDN/NFV technology and aviation information network, an aviation information network architecture based on SDN/NFV was proposed, and its components were briefl y described.The future research directions and challenges of aviation information network architecture based on SDN/NFV were summarized.It also explored the ability of establishing effi cient information exchange and fi ne-grained aggregation of resources in aviation information network, which provided reference for the development of aviation information network in the future.…”
Get full text
Article -
5645
Rational exchange protocol model based on mixed strategy
Published 2016-03-01Subjects: Get full text
Article -
5646
Bearing Fault Diagnosis Method based on RLMD and Kmeans++
Published 2021-02-01“…To improve the performance of bearing fault diagnosis, a bearing fault diagnosis method based on Robust Local Mean Decomposition (RLMD) and Kmeans++ is proposed. …”
Get full text
Article -
5647
Foreign Studies of the Neuropsychological and Biological Bases of Aggressive Behavior
Published 2024-12-01“… <p style="text-align: justify;">The paper analyzes the data of empirical studies on the relationship between the evolution and involution of aggressive behaviour and the level of neurocognitive functioning. …”
Get full text
Article -
5648
A Class of Laguerre-Based Generalized Humbert Polynomials
Published 2021-01-01“…Our paper aims to introduce another such polynomial, namely, Laguerre-based generalized Humbert polynomial, and investigate its properties. …”
Get full text
Article -
5649
Deviation in Bidel Dehlavi`s lyrics based on Leech`s pattern
Published 2017-06-01“…Deviation is a remarkable provision to defamiliarity and prominence in the poetry which the ports have used. Bidel has used this provision and theme in his poetry. …”
Get full text
Article -
5650
BCP-based joint delegation learning model and protocol
Published 2021-05-01Subjects: Get full text
Article -
5651
Code Parameter Summarization Based on Transformer and Fusion Strategy
Published 2024-01-01Get full text
Article -
5652
Chaining & counter-based block cipher mode for authentication
Published 2009-01-01“…For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for example,CBC-MAC).The dependence test results accord with the demands.The CCTR mode is complete;its degree of avalanche effect is about 0.999 3;its degree of strict avalanche criterion is 0.992 or so.The frequency test results indicate that the output generated by the CCTR mode had uniformity.The binary matrix rank,Run,spectral,non-overlapping template matching,overlapping template matching,Maurer’s universal statistical test,Lempel-Ziv compression,linear complexity,serial,approximate entropy,cumulative sums,random excursions and random excursions variant tests results fulfilled the requirements all.Therefore,the CCTR mode has good pseudo-randomness,which the security of CCTR mode is verified by way of statistical evaluation.…”
Get full text
Article -
5653
Distance-Based Fractional Dimension of Certain Wheel Networks
Published 2024-01-01“…Metric dimension is one of the distance-based parameters which are used to find the position of the robot in a network space by utilizing lesser number of notes and minimum consumption of time. …”
Get full text
Article -
5654
Improving analogues-based detection & attribution approaches for hurricanes
Published 2025-01-01“…This framework provides a reliable alternative to traditional analogue-based methods in the case of hurricanes, complementing and potentially enhancing efforts in addressing extreme weather event attribution.…”
Get full text
Article -
5655
Health & Gait: a dataset for gait-based analysis
Published 2025-01-01“…Scientific Data…”
Get full text
Article -
5656
Trends of improving governance on the basis of electronic administration technologies
Published 2016-04-01Get full text
Article -
5657
Study on Starch-Based Thickeners in Chyme for Dysphagia Use
Published 2024-12-01“…This study may provide a theoretical basis for the creation and design of novel nutritional foods for dysphagia.…”
Get full text
Article -
5658
-
5659
Sarcoidosis Associated with Oxaliplatin-Based Chemotherapy for Colorectal Cancer
Published 2014-01-01“…Case Reports in Oncological Medicine…”
Get full text
Article -
5660
Digital multi-signature scheme based on bilinear pairing
Published 2016-06-01“…Based on bilinear pairing and three complicated problems,a new digital multi-signature scheme was pro-posed.In the new scheme,the advantage of fast signature in broadcasting digital multi-signature was applied to se-quential digital multi-signature.By changing the general mechanism of signature,signing could be done simultane-ously by the signers.Then,the signature was sent to verifier after it was verified by trusted third party.The trans-formation from concurrent signature to sequential signature was finally realized by the verifier.The security capa-bilities in three complicated problems,anti-fake attack and anti-conspiracy attack from some members of the new scheme were analyzed.Proposed scheme has many advantages over the old ones,such as fewer calculation,simpler algorithm,faster signing,higher security.…”
Get full text
Article