Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5801
Path assessment based network admission control algorithm
Published 2010-01-01“…The local link state metrics were measured by scheduler.At the same time,the stale path state metrics could be got from the router.The basic probability assignment functions of above metrics were described by the fuzzy state variableness.The path situation and the corresponding probability could be computed through data fusion based on Dempster rule.Then the path situation with the maximum probability would be regarded as the quasi-real-time path state.Network admission decision was made based on the estimated path state.Simulations show that the link utility of proposed policy has twice as the budget based network admission control under the similar blocking rate.And the complexity of network mechanism can be decreased by adding pre-computed at the edge to achieve coreless status in multi-hop networks.…”
Get full text
Article -
5802
Operation Management Mode Based on New Media Technology
Published 2015-07-01Subjects: Get full text
Article -
5803
Model of grid resource selection based on the trust moment
Published 2012-04-01“…The trust torque was defined as the product of trust gravitation and trust radius and the grid resource selection model based on trust torque was proposed.The grid resources are divided into many trusted resource domains according to different types and the grid resources of each domain are managed by its domain agent.A resource selection algorithm is realized by trust evaluation of resource nodes and comprehensive judgment of historical transaction experiences,current resource attributes and personal preferences.The algorithm not only pays attention to the service quality of resource selection for users,but also meets the requirements of different users.Simulation results verify the feasibility and effectiveness of our model.…”
Get full text
Article -
5804
Multilingual Speech Emotion Research Based on Data Mining
Published 2022-01-01“…Through the speech emotion simulation experiment, it can be seen that the multilingual speech emotion analysis model based on data mining proposed in this paper has a good effect in speech emotion analysis.…”
Get full text
Article -
5805
Risk based analysis of RHPP penstock structural integrity
Published 2020-07-01“…Risk based analysis of reverse hydro power plant penstock structural integrity is performed using fracture mechanics parameters. …”
Get full text
Article -
5806
Extracting entity-based information in cyber-physical systems
Published 2017-04-01“…Directed by the initial entities, utilizing the relaxation and verification techniques, P 3 E provides a path expression–based solution for entity extraction problem, which has following characteristics. …”
Get full text
Article -
5807
OPTIMIZATION DESIGN OF TOWER DOOR STRUCTURE BASED ON ISIGHT
Published 2015-01-01Subjects: Get full text
Article -
5808
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…It uses hash algorithm to process these files in order to get the feature information of the files so that the eigenvalue could got which could identify Trojan uniquely. …”
Get full text
Article -
5809
A TEI-based Application for Editing Manuscript Descriptions
Published 2012-02-01Get full text
Article -
5810
Resource Scheduling Algorithm Based on DQN in Satellite CDN
Published 2022-12-01“…With the rapid development of space and information fi eld, hot content distribution intensive scenes will become one of the key directions of satellite network application, and satellite content delivery network (CDN) network is an important means to improve the effi ciency of air and space content distribution.In the architecture of satellite CDN network, due to the uneven time and space of business requirements, the scarcity of satellite resources and the insuffi cient adaptability of existing scheduling algorithms, scheduling algorithms for satellite resources are faced with problems such as high resource dimension, many computing states and large amount of computation, which will reduce the accuracy, response speed and computing performance of scheduling decisions.To solve this problem, a resource scheduling algorithm based on Deep Q-Learning (DQN) algorithm was proposed to improved the effi ciency and accuracy of satellite resource scheduling, and intelligently and quickly perceived the resource situation to make scheduling decisions.Firstly, the user requests were classifi ed, and the shortest path set that the satellite could communicated with was calculated according to the time-varying trajectory of the satellite and the resources of the satellite and the ground.After that, the related information of satellites and users was quantifi ed by Markov model modeling, and the optimal CDN storage node of satellites was calculated by DQN algorithm, which achieved the eff ects of reduced user request delay, reduced satellite-ground resource occupancy rate and improved cache hit rate.…”
Get full text
Article -
5811
Graph clustering method based on structure entropy constraints
Published 2021-12-01Subjects: “…data mining…”
Get full text
Article -
5812
Traffic Accident Prediction Based on LSTM-GBRT Model
Published 2020-01-01“…The current traffic accident prediction has a problem of low accuracy. In order to provide traffic management departments with more accurate forecast data, it can be applied in the traffic management system to help make scientific decisions. …”
Get full text
Article -
5813
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01“…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
Get full text
Article -
5814
The clinical method and the evidence-based medicine: some considerations
Published 2010-12-01“…The evidence-based medicine is a technical tool to quantify and qualify which data or study is the most accurate, and therefore valid in each case. …”
Get full text
Article -
5815
Kinematics Modeling and Analysis of Manipulator based on Dual Quaternion
Published 2018-01-01“…Finally,taking a 6 R series manipulator as an example,the forward kinematics and inverse kinematics modeling and simulation analysis based on the dual quaternion are carried out. The results show that this method is effective,comparing with the spinor method,its calculation time of forward kinematics is reduced by about 30%,the geometric meaning of inverse kinematics is more clear. …”
Get full text
Article -
5816
Exploration and application of autonomous network based on network events
Published 2024-01-01“…In order to achieve the goal of autonomous networks and improve the automation of network operation, an autonomous network model was explored.The model introduced algorithms such as multidimensional data automatic clustering, adaptive sliding time window mechanism, user traffic loss assessment model based on spatiotemporal sequence correlation, fault propagation graph based on graph theory and spatiotemporal clustering, and builded automation capabilities through network event management, fault self-identification, self-positioning, self-scheduling, and intelligent quality inspection.The goal is achieving L4 advanced intelligent network by 2025.…”
Get full text
Article -
5817
BASIS ETIKA LINGKUNGAN HIDUP MASYARAKAT TRADISIONAL MADURA
Published 2018-06-01“…Al-A'raf: Jurnal Pemikiran Islam dan Filsafat…”
Get full text
Article -
5818
Systems Biology Profiling of AMD on the Basis of Gene Expression
Published 2013-01-01“…We are tackling both problems with systems biology phylogenetic parsimony analysis. Gene expression data (GSE29801: NCBI, Geo) of macular and extramacular specimens of the retinas and retinal pigment epithelium (RPE) choroid complexes representing dry AMD without geographic atrophy (GA), choroidal neovascularization (CNV), GA, as well as pre-AMD and subclinical pre-AMD were polarized against their respective normal specimens and then processed through the parsimony program MIX to produce phylogenetic cladograms. …”
Get full text
Article -
5819
Tag's ownership transfer protocol based on quadratic residue
Published 2018-03-01“…A proprietary transfer protocol with higher security and lower cost was proposed.In order to ensure the communication entity authentication premise,two remainder theorems for information transmission encryption were used in the proposed protocol; in the process of mutual recognition of communication entities,the addition of random numbers could make the protocol effectively resist such attacks as replay and desynchronization.After the transfer of ownership occurs,new communication entities would be located.The authentication key needed to be dynamical,so as to reduce the storage space of communication entities.The performance comparison between the proposed protocol and other protocols for safety show that the proposed protocol has the security required for the transfer of ownership and low cost.…”
Get full text
Article -
5820
Visualization of Online-Game Players Based on Their Action Behaviors
Published 2008-01-01Get full text
Article