Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5821
DNA algorithm of primeness test based on finite automaton
Published 2006-01-01“…Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.…”
Get full text
Article -
5822
Modeling Temperature and Pricing Weather Derivatives Based on Temperature
Published 2017-01-01“…Second, this study develops a pricing process over calculated index values, which returns a customized price for temperature-based derivatives considering that temperature has unique effects on every economic entity. …”
Get full text
Article -
5823
CSI-based underground personnel behavior identification method
Published 2020-12-01“…To solve the problem of personnel behavior identification under the condition of dust environment and shielding and to promote the coal mine safety production,a personnel identification method based on the Wi-Fi channel state information (CSI) was proposed.The system used Hampel filter and median filter to process the raw CSI data,and utilized the phase information through a linear correction method.The recognition process was divided into the offline stage and online stage.In the offline stage,different activities data was collected to establish the recognition model.While in the online stage,current actions were recognized according to the recognition model.8 different human activities were set in the experiments and the result indicated that the recognition accuracy of this system could reach 95%.…”
Get full text
Article -
5824
Exploring Children's Requirements for Game-Based Learning Environments
Published 2008-01-01“…In this paper, we explore experiences obtained from collaboration with elementary school children in the design of learning environments, based on three projects and three requirements gathering techniques. …”
Get full text
Article -
5825
Trusted network connect control based on terminal behavior
Published 2009-01-01“…Under the framework of TNC,a new method was proposed to calculate the "healthy status" of a terminal based on analyzing the real-time characteristics of its behavior and process activity.Compared with the existing method,which based on static characteristics,the strategy could get a better performance,especially,on identifying and isolating the terminals with potential risk.The experimental result also shows that the proposed algorithm has the capability of finding and isolating terminals which are infected by malicious codes.…”
Get full text
Article -
5826
VR-based body tracking to stimulate musculoskeletal training
Published 2024-09-01“…Our results show a high correlation between HoloLens 2 movement data and the external tracking of the upper body movement and joint angles of the lower limbs.…”
Get full text
Article -
5827
Electronically Tunable Transimpedance Instrumentation Amplifier Based on OTRA
Published 2013-01-01“…In this paper, OTRA-based transimpedance instrumentation amplifier (TIA) is presented. …”
Get full text
Article -
5828
Comparison of MEMS-based photoacoustic microscopy in biomedical imaging
Published 2025-12-01Subjects: Get full text
Article -
5829
A Novel Tornado Detection Algorithm Based on XGBoost
Published 2025-01-01“…This article proposes an innovative tornado detection algorithm based on XGBoost which is suitable for dual-polarization radar data, was upgraded and has been used in China since 2019, and has been applied in the Tornado Key Open Laboratory of the China Meteorological Administration. …”
Get full text
Article -
5830
-
5831
Small face detection based on improved YOLOv5s
Published 2024-12-01“…At present, in the complex real-world application scenairos, the task of small face detection encounters numerous challenges, which include small face scale, abrupt lighting changes and low accuracy. …”
Get full text
Article -
5832
Immunomagnetic Separation of Salmonella Typhimurium Based on Microfluidic Chip
Published 2025-01-01Get full text
Article -
5833
Network Topology Reconstruction Based on Power Line Communication
Published 2015-12-01Get full text
Article -
5834
Population-Based Studies on the Epidemiology of Insulin Resistance in Children
Published 2015-01-01“…Therefore, the aim of this systematic review was to give an overview of all population-based studies reporting on the prevalence and incidence rates of IR in childhood. …”
Get full text
Article -
5835
Research on Hysteresis of Piezoceramic Actuator Based on the Duhem Model
Published 2013-01-01“…The result showed that the gradient correction algorithm could meet the modeling accuracy better, and the structure of the algorithm is simple, adaptable, and easy to implement.…”
Get full text
Article -
5836
Study on Differentiated Security Service Based on Cloud Computing
Published 2013-03-01“…Dep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced than that of the traditiona1 way.Security has become one of the most important obstac1es for the deve1opment of c1oud computing.Differentiated security architecture was proposed, according to the diversity of security requirements from different users.The consumption of computing resource from security service cou1d be reduced and thus the deve1opment of c1oud computing is benefited.…”
Get full text
Article -
5837
Image zero-watermarking algorithm based on region of interest
Published 2009-01-01“…Based on ROI, a new watermarking algorithm was proposed.First, ROI was selected.Then, the wavelet transform was executed and ROI mask was constructed.Finally, the zero-watermarking was designed for the wavelet coefficients in ROI mask.The experimental results show that the zero-watermarking is more robust in the new algorithm than others that are not designed for ROI when the ROI of image is decoded at higher quality than the background.Additionally, the new algorithm can ensure ROI not to be disturbed by the watermarking information because of the zero-watermarking.…”
Get full text
Article -
5838
THE ELECTRONIC EQUIPMENT MODAL ANALYSIS BASED ON THE SUB-STRUCTURE
Published 2015-01-01“…Using the ANSYS finite element analysis software to analyze the modal of the case and its modules by the substructure method,the natural frequency and mode shape of the equipment are obtained. …”
Get full text
Article -
5839
Personalized Clothing Recommendation Based on User Emotional Analysis
Published 2020-01-01“…In this paper, we propose a novel method to automatically personalize clothing recommendation based on user emotional analysis. Firstly, the facial expression is classified by multiclass SVM. …”
Get full text
Article -
5840
Robust Preamble-Based Timing Synchronization for OFDM Systems
Published 2017-01-01“…This study presents a novel preamble-based timing offset estimation method for orthogonal frequency division multiplexing (OFDM) systems. …”
Get full text
Article