Showing 5,641 - 5,660 results of 67,915 for search 'DASB~', query time: 2.26s Refine Results
  1. 5641

    About the competence-based technology for educational environment survey by Dmitriy N. Bezgodov

    Published 2022-05-01
    “…The article describes the competence-based technology used at Ukhta State Technical University for the estimation of the efficiency of extracurricular activities. …”
    Get full text
    Article
  2. 5642

    Adaptive JPEG steganography based on distortion cost updating by Guang-ming TANG, Yi SUN, Xiao-yu XU, Yu WANG

    Published 2017-09-01
    “…Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding,so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding,an adaptive JPEG steganography algorithm based on distortion cost updating was proposed.Firstly,three factors that affect embedding fluctuations were analyzed,including quantization step,the absolute value of the quantized DCT coefficient to be modified and perturbation error.Then the embedding update strategy (EUS) was proposed,which enabled to dynamically update the distortion costs.After that,an adaptive JPEG steganography algorithm was implemented combining the strategy.The experimental result illustrates that the algorithm can significantly improve the secure performance of JPEG steganography algorithm.…”
    Get full text
    Article
  3. 5643
  4. 5644

    Aviation Information Network Architecture Based on SDN/NFV by Xinkang SONG, Xiang WANG, Haotong FU, Shanghong ZHAO

    Published 2022-03-01
    “…As the key support for the emergence of cluster combat eff ectiveness, the design architecture of aviation information network will infl uence the combat mode in the aviation fi eld.Based on the future operational requirements of aviation cluster, the defi ciency of traditional aviation information network was introduced and the technical characteristics of SDN/NFV was analyzed.On this basis, combined SDN/NFV technology and aviation information network, an aviation information network architecture based on SDN/NFV was proposed, and its components were briefl y described.The future research directions and challenges of aviation information network architecture based on SDN/NFV were summarized.It also explored the ability of establishing effi cient information exchange and fi ne-grained aggregation of resources in aviation information network, which provided reference for the development of aviation information network in the future.…”
    Get full text
    Article
  5. 5645
  6. 5646

    Bearing Fault Diagnosis Method based on RLMD and Kmeans++ by Shaoting Yan, Yuguo Zhou, Yanbo Ren, Shiliang Liu, Shidang Yan

    Published 2021-02-01
    “…To improve the performance of bearing fault diagnosis, a bearing fault diagnosis method based on Robust Local Mean Decomposition (RLMD) and Kmeans++ is proposed. …”
    Get full text
    Article
  7. 5647

    Foreign Studies of the Neuropsychological and Biological Bases of Aggressive Behavior by K.M. Shipkova, S.V. Shport, V.G. Bulygina

    Published 2024-12-01
    “… <p style="text-align: justify;">The paper analyzes the data of empirical studies on the relationship between the evolution and involution of aggressive behaviour and the level of neurocognitive functioning. …”
    Get full text
    Article
  8. 5648

    A Class of Laguerre-Based Generalized Humbert Polynomials by Saniya Batra, Prakriti Rai

    Published 2021-01-01
    “…Our paper aims to introduce another such polynomial, namely, Laguerre-based generalized Humbert polynomial, and investigate its properties. …”
    Get full text
    Article
  9. 5649

    Deviation in Bidel Dehlavi`s lyrics based on Leech`s pattern by Mahdai Sharifieyan, Mostafa Mortezaei

    Published 2017-06-01
    “…Deviation is a remarkable provision to defamiliarity and prominence in the poetry which the ports have used. Bidel has used this provision and theme in his poetry. …”
    Get full text
    Article
  10. 5650
  11. 5651
  12. 5652

    Chaining & counter-based block cipher mode for authentication by HUANG Yu-hua1, HU Ai-qun2, WANG Jian-dong1

    Published 2009-01-01
    “…For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for example,CBC-MAC).The dependence test results accord with the demands.The CCTR mode is complete;its degree of avalanche effect is about 0.999 3;its degree of strict avalanche criterion is 0.992 or so.The frequency test results indicate that the output generated by the CCTR mode had uniformity.The binary matrix rank,Run,spectral,non-overlapping template matching,overlapping template matching,Maurer’s universal statistical test,Lempel-Ziv compression,linear complexity,serial,approximate entropy,cumulative sums,random excursions and random excursions variant tests results fulfilled the requirements all.Therefore,the CCTR mode has good pseudo-randomness,which the security of CCTR mode is verified by way of statistical evaluation.…”
    Get full text
    Article
  13. 5653

    Distance-Based Fractional Dimension of Certain Wheel Networks by Hassan Zafar, Muhammad Javaid, Mamo Abebe Ashebo

    Published 2024-01-01
    “…Metric dimension is one of the distance-based parameters which are used to find the position of the robot in a network space by utilizing lesser number of notes and minimum consumption of time. …”
    Get full text
    Article
  14. 5654

    Improving analogues-based detection & attribution approaches for hurricanes by Stella Bourdin, Suzana J Camargo, Chia-Ying Lee, Jonathan Lin, Mathieu Vrac, Pradeebane Vaittinada Ayar, Davide Faranda

    Published 2025-01-01
    “…This framework provides a reliable alternative to traditional analogue-based methods in the case of hurricanes, complementing and potentially enhancing efforts in addressing extreme weather event attribution.…”
    Get full text
    Article
  15. 5655
  16. 5656
  17. 5657

    Study on Starch-Based Thickeners in Chyme for Dysphagia Use by Youdong Li, Lingying Li, Guoyan Liu, Li Liang, Xiaofang Liu, Jixian Zhang, Chaoting Wen, Xin Xu

    Published 2024-12-01
    “…This study may provide a theoretical basis for the creation and design of novel nutritional foods for dysphagia.…”
    Get full text
    Article
  18. 5658
  19. 5659
  20. 5660

    Digital multi-signature scheme based on bilinear pairing by Cai-juan ZHANG, Lin YOU

    Published 2016-06-01
    “…Based on bilinear pairing and three complicated problems,a new digital multi-signature scheme was pro-posed.In the new scheme,the advantage of fast signature in broadcasting digital multi-signature was applied to se-quential digital multi-signature.By changing the general mechanism of signature,signing could be done simultane-ously by the signers.Then,the signature was sent to verifier after it was verified by trusted third party.The trans-formation from concurrent signature to sequential signature was finally realized by the verifier.The security capa-bilities in three complicated problems,anti-fake attack and anti-conspiracy attack from some members of the new scheme were analyzed.Proposed scheme has many advantages over the old ones,such as fewer calculation,simpler algorithm,faster signing,higher security.…”
    Get full text
    Article