Showing 5,741 - 5,760 results of 67,915 for search 'DASB~', query time: 2.34s Refine Results
  1. 5741
  2. 5742

    Online trace anonymization based on anonymous flow table by Chun-jing HAN, Jing-guo GE, Gao-gang XIE, Liang-xiong LI, Tong LI, Yun-jie LIU

    Published 2016-11-01
    “…A real-time network packet anonymous method named Fad-Pan (online trace anonymization based on the anonymous flow table) was proposed. …”
    Get full text
    Article
  3. 5743

    Research on image generation technology based on deep learning by Li Jinchen

    Published 2025-01-01
    “…In recent years, deep learning-based image generation technology has made significant progress. …”
    Get full text
    Article
  4. 5744

    A Convection Nowcasting Method Based on Machine Learning by Aifang Su, Han Li, Liman Cui, Yungang Chen

    Published 2020-01-01
    “…In this study, a convection nowcasting method based on machine learning was proposed. First, the historical data were back-calculated using the pyramid optical flow method. …”
    Get full text
    Article
  5. 5745

    Wearable Measurement of ECG Signals Based on Smart Clothing by Ming Li, Wei Xiong, Yongjian Li

    Published 2020-01-01
    “…To get more significant ECG signals, the ECG differential signal between two electrodes is calculated based on a spherical volume conductor model, and the best positions on the surface of a human body for two textile electrodes to measure ECG signals are simulated by using the body-surface potential mapping (BSPM) data. …”
    Get full text
    Article
  6. 5746

    Forecast-based resource reconfiguration algorithm for network virtualization by ZHANG Shun-li, QIU Xue-song, PAN Ya-lian, MENG Luo-ming

    Published 2011-01-01
    “…In order to solve imbalance issues of used resources of substrate network,which are brought by virtual net-work joining and leaving dynamically,forecast-based resource reconfiguration algorithm(FRRA) for network virtualiza-tion environment was proposed.Algorithm FRRA took full advantage of known information to calculate interval of re-configuration and used this interval to replace the periodic time span in previous algorithms.In order to make reconfigu-ration time global optimal,it took two measures:resources were divided into critcal resources and general resources,and different algorithms were used to key resources and common resources respectively;according to the probability that re-source migration was failure,the limit number of reconfiguration requests was deduced.FRRA algorithm with VNA-II algorithm and PMPA algorithm in the experiments was compared.The results show that algorithm FRRA reduces recon-figuration cost 69% than that of VNA-II and 42% than that of PMPA.Algorithm FRRA improves VN request reception rate 29% than that of VNA-II and 52% than that of PMPA.…”
    Get full text
    Article
  7. 5747
  8. 5748

    Future Directions and Molecular Basis of Ventilator Associated Pneumonia by Kubra Aykac, Yasemin Ozsurekci, Sevgen Tanir Basaranoglu

    Published 2017-01-01
    “…Mechanical ventilation is a lifesaving treatment and has complications such as ventilator associated pneumonia (VAP) that lead to high morbidity and mortality. …”
    Get full text
    Article
  9. 5749

    Human personality privacy analysis based on visual features by Jie NIE, Lei HUANG, Zhen LI, Jian ZHANG, Yan YAN, Zhi-qiang WEI

    Published 2016-11-01
    “…Personalized recommendation in social media attempts to analyze the habits and personality based on the loca-tion information and pictures from the users' comments on the public platform. …”
    Get full text
    Article
  10. 5750
  11. 5751

    Prediction and Evaluation of Rockburst Based on Depth Neural Network by Jin Zhang, Mengxue Wang, Chuanhao Xi

    Published 2021-01-01
    “…Based on the field measured data and test data, combined with the existing rockburst situation, numerical simulation and neural network method are used to predict the rock burst classification, which is of great significance for the early and late construction safety of the tunnel.…”
    Get full text
    Article
  12. 5752

    A Novel Kernel for RBF Based Neural Networks by Wasim Aftab, Muhammad Moinuddin, Muhammad Shafique Shaikh

    Published 2014-01-01
    “…In this work, we introduce a novel RBF artificial neural network (ANN) where the basis function utilizes a linear combination of ED based Gaussian kernel and a cosine kernel where the cosine kernel computes the angle between feature and center vectors. …”
    Get full text
    Article
  13. 5753

    An Example-Based Super-Resolution Algorithm for Selfie Images by Jino Hans William, N. Venkateswaran, Srinath Narayanan, Sandeep Ramachandran

    Published 2016-01-01
    “…This paper aims to improve the resolution of selfies by exploiting the fine details in HR images captured by rear camera using an example-based super-resolution (SR) algorithm. HR images captured by rear camera carry significant fine details and are used as an exemplar to train an optimal matrix-value regression (MVR) operator. …”
    Get full text
    Article
  14. 5754

    Rational secret sharing scheme based on Markov decision by You-liang TIAN, Xue-mei WANG, Lin-fang LIU

    Published 2015-09-01
    “…The reconstruction methods of a rational secret sharing based on the Markov decision was studied.Firstly,a rational secret sharing system model was proposed using the Markov decision process,which included the players set,the states set,the risk preference function,the state transfer function,the return function,etc.The risk preference function was introduced in order to depict the state set and the state transfer function in this model.Secondly,a rational secret sharing scheme was constructed based on the proposed system model,which was able to solve the secret reconstruction problems according to the Markov strategy.Finally,the functional relations of among the discount factor,the return func-tion and the risk preference function was proposed in this scheme.The analysis results show that the proposed model and scheme are rationality and validity.…”
    Get full text
    Article
  15. 5755
  16. 5756
  17. 5757

    Coverless Steganography for Face Recognition Based on Diffusion Model by Yuan Guo, Ziqi Liu

    Published 2024-01-01
    “…In order to enhance the protection of personal privacy and ensure the safe transmission and sharing of sensitive information without affecting the user experience, this paper proposes an innovative coverless steganography framework for face recognition images based on diffusion model. The framework firstly extracts face features and generates masks containing these features. …”
    Get full text
    Article
  18. 5758

    Sketch-based caching method for significant DNS queries by HAO Yihang, LIU Ziqian, CHANG Liyuan, TONG Xinzhe, YANG Cheng, SUN Qi, GUO Junyan

    Published 2024-10-01
    “…The experimental results, which were based on a substantial amount of real-world network traffic data, demonstrated that the proposed method offered protection for significant domain names, hastening their resolution by an average of 18% relative to conventional DNS paradigms. …”
    Get full text
    Article
  19. 5759

    Strategic Planning of Rural Development Based on Foresight Methodologies by Rasul Gusmanov, Almir Askarov, Milyausha Lukyanova, Vitaliy Kovshov, Eugene Stovba

    Published 2020-01-01
    “…The scientific novelty of the study is determined by the development of an algorithm for strategic planning of rural development based on the foresight methodology and by the formation of a set of practical recommendations for the use of foresight tools at the municipal level of management in rural areas. …”
    Get full text
    Article
  20. 5760

    An Innovative Eigenvector-Based Method for Traffic Light Scheduling by Mohammad Amin Soltani-Sarvestani, Zohreh Azimifar, Alexander Wong, Ali Akbar Safavi

    Published 2020-01-01
    “…The proposed traffic light scheduling system is designed based on eigenvector centrality of intersection relation matrix. …”
    Get full text
    Article