Showing 5,801 - 5,820 results of 67,915 for search 'DASB~', query time: 2.94s Refine Results
  1. 5801

    Path assessment based network admission control algorithm by QIU Gong-an1, XU Chen1, ZHANG Guo-an1, BAO Zhi-hua1

    Published 2010-01-01
    “…The local link state metrics were measured by scheduler.At the same time,the stale path state metrics could be got from the router.The basic probability assignment functions of above metrics were described by the fuzzy state variableness.The path situation and the corresponding probability could be computed through data fusion based on Dempster rule.Then the path situation with the maximum probability would be regarded as the quasi-real-time path state.Network admission decision was made based on the estimated path state.Simulations show that the link utility of proposed policy has twice as the budget based network admission control under the similar blocking rate.And the complexity of network mechanism can be decreased by adding pre-computed at the edge to achieve coreless status in multi-hop networks.…”
    Get full text
    Article
  2. 5802
  3. 5803

    Model of grid resource selection based on the trust moment by Yu-ling LIU, Rui-zhong DU, Jun-feng TIAN, Peng YUAN

    Published 2012-04-01
    “…The trust torque was defined as the product of trust gravitation and trust radius and the grid resource selection model based on trust torque was proposed.The grid resources are divided into many trusted resource domains according to different types and the grid resources of each domain are managed by its domain agent.A resource selection algorithm is realized by trust evaluation of resource nodes and comprehensive judgment of historical transaction experiences,current resource attributes and personal preferences.The algorithm not only pays attention to the service quality of resource selection for users,but also meets the requirements of different users.Simulation results verify the feasibility and effectiveness of our model.…”
    Get full text
    Article
  4. 5804

    Multilingual Speech Emotion Research Based on Data Mining by Yanting Yu

    Published 2022-01-01
    “…Through the speech emotion simulation experiment, it can be seen that the multilingual speech emotion analysis model based on data mining proposed in this paper has a good effect in speech emotion analysis.…”
    Get full text
    Article
  5. 5805

    Risk based analysis of RHPP penstock structural integrity by Sneana Kirin, Lazar Jeremic, Aleksandar Sedmak, Igor Martic, Simon Sedmak, Ivana Vucetic, Tamara Golubovic

    Published 2020-07-01
    “…Risk based analysis of reverse hydro power plant penstock structural integrity is performed using fracture mechanics parameters. …”
    Get full text
    Article
  6. 5806

    Extracting entity-based information in cyber-physical systems by Yuchen Yang, Lijie Li, Guisheng Yin

    Published 2017-04-01
    “…Directed by the initial entities, utilizing the relaxation and verification techniques, P 3 E provides a path expression–based solution for entity extraction problem, which has following characteristics. …”
    Get full text
    Article
  7. 5807
  8. 5808

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…It uses hash algorithm to process these files in order to get the feature information of the files so that the eigenvalue could got which could identify Trojan uniquely. …”
    Get full text
    Article
  9. 5809
  10. 5810

    Resource Scheduling Algorithm Based on DQN in Satellite CDN by Jiaran ZHANG, Yating YANG, Tian SONG

    Published 2022-12-01
    “…With the rapid development of space and information fi eld, hot content distribution intensive scenes will become one of the key directions of satellite network application, and satellite content delivery network (CDN) network is an important means to improve the effi ciency of air and space content distribution.In the architecture of satellite CDN network, due to the uneven time and space of business requirements, the scarcity of satellite resources and the insuffi cient adaptability of existing scheduling algorithms, scheduling algorithms for satellite resources are faced with problems such as high resource dimension, many computing states and large amount of computation, which will reduce the accuracy, response speed and computing performance of scheduling decisions.To solve this problem, a resource scheduling algorithm based on Deep Q-Learning (DQN) algorithm was proposed to improved the effi ciency and accuracy of satellite resource scheduling, and intelligently and quickly perceived the resource situation to make scheduling decisions.Firstly, the user requests were classifi ed, and the shortest path set that the satellite could communicated with was calculated according to the time-varying trajectory of the satellite and the resources of the satellite and the ground.After that, the related information of satellites and users was quantifi ed by Markov model modeling, and the optimal CDN storage node of satellites was calculated by DQN algorithm, which achieved the eff ects of reduced user request delay, reduced satellite-ground resource occupancy rate and improved cache hit rate.…”
    Get full text
    Article
  11. 5811
  12. 5812

    Traffic Accident Prediction Based on LSTM-GBRT Model by Zhihao Zhang, Wenzhong Yang, Silamu Wushour

    Published 2020-01-01
    “…The current traffic accident prediction has a problem of low accuracy. In order to provide traffic management departments with more accurate forecast data, it can be applied in the traffic management system to help make scientific decisions. …”
    Get full text
    Article
  13. 5813

    Dual verifiable cloud storage scheme based on blockchain by Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher

    Published 2021-12-01
    “…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
    Get full text
    Article
  14. 5814

    The clinical method and the evidence-based medicine: some considerations by Arelys Falcón Hernández, Víctor René Navarro Machado

    Published 2010-12-01
    “…The evidence-based medicine is a technical tool to quantify and qualify which data or study is the most accurate, and therefore valid in each case. …”
    Get full text
    Article
  15. 5815

    Kinematics Modeling and Analysis of Manipulator based on Dual Quaternion by 葛为民, 宇旭东, 王肖锋, 邢恩宏

    Published 2018-01-01
    “…Finally,taking a 6 R series manipulator as an example,the forward kinematics and inverse kinematics modeling and simulation analysis based on the dual quaternion are carried out. The results show that this method is effective,comparing with the spinor method,its calculation time of forward kinematics is reduced by about 30%,the geometric meaning of inverse kinematics is more clear. …”
    Get full text
    Article
  16. 5816

    Exploration and application of autonomous network based on network events by Weihong LI, Ying YANG, Kun HUANG, Chenglong ZHU, Tantao PAN, Xianzong HE

    Published 2024-01-01
    “…In order to achieve the goal of autonomous networks and improve the automation of network operation, an autonomous network model was explored.The model introduced algorithms such as multidimensional data automatic clustering, adaptive sliding time window mechanism, user traffic loss assessment model based on spatiotemporal sequence correlation, fault propagation graph based on graph theory and spatiotemporal clustering, and builded automation capabilities through network event management, fault self-identification, self-positioning, self-scheduling, and intelligent quality inspection.The goal is achieving L4 advanced intelligent network by 2025.…”
    Get full text
    Article
  17. 5817

    BASIS ETIKA LINGKUNGAN HIDUP MASYARAKAT TRADISIONAL MADURA by Hasani Utsman

    Published 2018-06-01
    “…Al-A'raf: Jurnal Pemikiran Islam dan Filsafat…”
    Get full text
    Article
  18. 5818

    Systems Biology Profiling of AMD on the Basis of Gene Expression by Mones S. Abu-Asab, Jose Salazar, Jingsheng Tuo, Chi-Chao Chan

    Published 2013-01-01
    “…We are tackling both problems with systems biology phylogenetic parsimony analysis. Gene expression data (GSE29801: NCBI, Geo) of macular and extramacular specimens of the retinas and retinal pigment epithelium (RPE) choroid complexes representing dry AMD without geographic atrophy (GA), choroidal neovascularization (CNV), GA, as well as pre-AMD and subclinical pre-AMD were polarized against their respective normal specimens and then processed through the parsimony program MIX to produce phylogenetic cladograms. …”
    Get full text
    Article
  19. 5819

    Tag's ownership transfer protocol based on quadratic residue by Rui XIE, Zhifeng HAO

    Published 2018-03-01
    “…A proprietary transfer protocol with higher security and lower cost was proposed.In order to ensure the communication entity authentication premise,two remainder theorems for information transmission encryption were used in the proposed protocol; in the process of mutual recognition of communication entities,the addition of random numbers could make the protocol effectively resist such attacks as replay and desynchronization.After the transfer of ownership occurs,new communication entities would be located.The authentication key needed to be dynamical,so as to reduce the storage space of communication entities.The performance comparison between the proposed protocol and other protocols for safety show that the proposed protocol has the security required for the transfer of ownership and low cost.…”
    Get full text
    Article
  20. 5820