Showing 6,121 - 6,140 results of 67,915 for search 'DASB~', query time: 2.33s Refine Results
  1. 6121

    Reliability analysis of wireless communication equipment based on model selection by SUN Jin, HU Jicheng, JIAO Yaqi, WANG Kun

    Published 2025-02-01
    “…By introducing the information criterion and the special goodness of fit test to analyze the fitting effect of the reliability model, the reliability analysis method of wireless communication equipment based on model selection is proposed, and the test and analysis are combined with actual cases to improve the accuracy and effectiveness of model selection.…”
    Get full text
    Article
  2. 6122
  3. 6123

    Classification of environments based on correlations of yield in spring bread wheat by S. B. Lepekhov

    Published 2020-12-01
    “…Consequently, the classification of years based on the reactions of marker cultivars can be justifiably extended onto other breeding material.Conclusion. …”
    Get full text
    Article
  4. 6124

    Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance by Shukui Zhang, Hongyan Zuo, Jianxi Fan, Juncheng Jia

    Published 2013-11-01
    “…At the same time, we adopt several related mechanisms to protect the communication among the sensor nodes and the confidentiality of the data transmission. Also, we use the mixed multipath mechanism among the clusters to improve the security of the network and strengthen the intrusion tolerance.…”
    Get full text
    Article
  5. 6125

    Multifeature Fusion Vehicle Detection Algorithm Based on Choquet Integral by Wenhui Li, Peixun Liu, Ying Wang, Hongyin Ni

    Published 2014-01-01
    “…Vision-based multivehicle detection plays an important role in Forward Collision Warning Systems (FCWS) and Blind Spot Detection Systems (BSDS). …”
    Get full text
    Article
  6. 6126

    Generate medical synthetic data based on generative adversarial network by Xiayu XIANG, Jiahui WANG, Zirui WANG, Shaoming DUAN, Hezhong PAN, Rongfei ZHUANG, Peiyi HAN, Chuanyi LIU

    Published 2022-03-01
    “…Modeling the probability distribution of rows in structured electronic health records and generating realistic synthetic data is a non-trivial task.Tabular data usually contains discrete columns, and traditional encoding approaches may suffer from the curse of feature dimensionality.Poincaré Ball model was utilized to model the hierarchical structure of nominal variables and Gaussian copula-based generative adversarial network was employed to provide synthetic structured electronic health records.The generated training data are experimentally tested to achieve only 2% difference in utility from the original data yet ensure privacy.…”
    Get full text
    Article
  7. 6127

    Chloride Ingress in Chemically Activated Calcined Clay-Based Cement by Joseph Mwiti Marangu, Joseph Karanja Thiong’o, Jackson Muthengia Wachira

    Published 2018-01-01
    “…The resultant calcined clay was blended with Ordinary Portland Cement (OPC) at replacement level of 35% by mass of OPC to make test cement labeled PCC35. Mortar prisms measuring 40 mm × 40 mm × 160 mm were cast using PCC35 with 0.5 M Na2SO4 solution as a chemical activator instead of water. …”
    Get full text
    Article
  8. 6128

    Proactive migration model of SWIM service based on situation awareness by Zhijun WU, Shengyan ZHOU, Jin LEI

    Published 2019-08-01
    “…To solve the problem that in the system wide information management (SWIM) network,the SWIM service provider suffers from SWIM service interruption,service delay increase or service quality degradation due to malicious attack or self-failure.Therefore,a proactive migration model of SWIM service was proposed on the basis of situation awareness,which used the random forest algorithm to timely judge the SWIM service provider security situation.SWIM service authority was actively migrated according to security situation,and the emergencies impact on SWIM services were reduces.Experimental results show that the proposed model can guarantee services continuity in an emergency event,which has higher reliability and stability than SWIM network in which the service migration model is not deployed.…”
    Get full text
    Article
  9. 6129

    Smart tags based on the batteryless backscatter technology:applications and challenges by Ying GUO, Gongpu WANG, Zonghui LI, Ruisi HE, Zhangdui ZHONG

    Published 2020-09-01
    “…Since the radio frequency identification (RFID) technology was put forward,it has been widely used in the transportation,logistics,industry and business due to its convenience and high efficiency.As a carrier for storing recognizable data,the RFID tags play a crucial role in the Internet of things (IoT).More and more functions and modules are embedded in the RFID tags and developed into smart tags in different application fields.Recently,wireless batteryless smart tags have arisen and grown rapidly with the development of the IoT and various emerging backscatter technologies.Wireless batteryless smart tags use the passive backscatter technology to harvest the energy and transmit information through radio frequency signals.Starting from the RFID technology,the history of the RFID and smart tags was introduced briefly,the differences between traditional smart tags and emerging wireless smart tags were compared,the advantages of wireless batteryless smart tags were concluded,several specific applications of it in different fields were listed,and the open challenges were analyzed.…”
    Get full text
    Article
  10. 6130

    Privacy policy compliance detection and analysis based on knowledge graph by ZHANG Xiheng, LI Xin, TANG Peng, HUANG Ruiqi, HE Yuan, QIU Weidong

    Published 2024-12-01
    “…Next, a semi-automated method was built for collecting privacy policies and collected the privacy policies of 400 Chinese Apps. 100 policies were cross-annotated based on the knowledge graph, resulting in the creation of the first Chinese privacy policy corpus tailored to the PIPL called APPCP-100 (APP-privacy-policy-corpus-for-PIPL-100). …”
    Get full text
    Article
  11. 6131

    Smart Approach for Botnet Detection Based on Network Traffic Analysis by Alaa Obeidat, Rola Yaqbeh

    Published 2022-01-01
    “…By categorizing behavior based on time slots, we investigate the viability of detecting botnet behavior without seeing a whole network data flow. …”
    Get full text
    Article
  12. 6132
  13. 6133

    Exploration on Formation Mechanism of Core Discing Based on Energy Analysis by Siqi Ye, Jianan Li, Jing Xie, Bengao Yang, Haichun Hao, Fei Li

    Published 2022-01-01
    “…Therefore, the effects of in situ stress combination condition, core diameter, and drilling depth on the maximum tensile stress after core stub unloading are discussed by PFC2D discrete element numerical simulation method, and the formation mechanism of core discing is preliminarily explored based on strain energy and dissipated energy. …”
    Get full text
    Article
  14. 6134

    Watermark embedding and detection based on generative causal language model by Minglu LIU, Yan ZHENG, Xue HAN, Xiangyang YUAN, Chao DENG

    Published 2023-08-01
    “…Artificial intelligence generated content (AIGC) generated text itself carried moral and legal compliance risks, and the circulation of generated text content need to be regulated.Therefore, there was an urgent need for copyright protection of AIGC generated text.Watermarking technology was currently the most widely used method for digital copyright protection.A watermark embedding technology was proposed for generating text using generative causal language models.An in-process watermark embedding method was adopted, which implicitly embeded text watermark during the text generation process.Compared to traditional post-process watermark embedding technology, it had less impact on the quality of generated text and had advantages such as low perception, transparency, and robustness.The proposed method has low coupling with existing models and can eliminate the need to adjust the original model structure, training strategies, deployment methods, and increase the computational cost of the original generation process.Through experimental results, the proposed watermark embedding strategy has good robustness and can effectively detect text embedded watermarks even after a certain degree of editing by users.…”
    Get full text
    Article
  15. 6135
  16. 6136

    BPH Procedural Treatment: The Case for Value-Based Pay for Performance by Mark Stovsky, Irina Jaeger

    Published 2008-01-01
    “…This paper reviews current paradigms and, using BPH procedural therapy outcomes, cost, and reimbursement data, makes the case for a fundamental change in perspective to value-based pay for performance as a reimbursement system with the potential to align the interests of patients, physicians, and payers and to improve global clinical outcomes while preserving free choice of clinically efficacious treatments.…”
    Get full text
    Article
  17. 6137

    Study on the Adsorption Effect of Renewable Biochar Based on Energy Gain by Zhanghang Yang, Qixiang Xu, Ruiqin Zhang, Qianming Huang, Mingxin Liu

    Published 2021-01-01
    “…Since the crop-residual-derived charcoal could effectively restore the nutritional structure of the soil, which contributes to preventing the decrease in grain yield, and it is also a kind of renewable environment-friendly resource by itself, which could be used in control the pollution of heavy metal ions, it is expected that the crop-residual-derived charcoal will be a new adsorption material that could be used to control the heavy metal pollution in the future; the adsorption effect of biochar as new adsorption material on heavy metal ions has a distinct advantage over traditional adsorbent materials, and biochar is a renewable energy source, which is cheap and better for recycling resources.…”
    Get full text
    Article
  18. 6138

    Indoor RFID localization algorithm based on adaptive bat algorithm by Liangbo XIE, Yuyang LI, Yong WANG, Mu ZHOU, Wei NIE

    Published 2022-08-01
    “…Aiming at the problem that long time-consuming and poor positioning accuracy using geometric method in the traditional UHF RFID indoor localization algorithm, an RFID indoor positioning algorithm based on adaptive bat algorithm (ABA) was proposed.Firstly, the phase of multiple frequency points was obtained by frequency hopping technology, and the location evaluation function of bat algorithm was established based on the angle information of multiple signal classification (MUSIC) algorithm and the distance information of clustering.Secondly, the bat location was initialized by tent reverse learning to increase the diversity of the population, and the adaptive weight factor was introduced to update the bat location.Finally, the target position was searched iteratively based on the position evaluation function to achieve fast centimeter level positioning.Experimental results show that the median localization error of the proposed algorithm is 7.74 cm, and the real-time performance is improved by 12 times compared with the traditional positioning algorithm based on the Chinese remainder theorem (CRT).…”
    Get full text
    Article
  19. 6139

    Approach of sensor network backup based on smart and cooperative network by Di MIAO, Bin HUANG, Jie LI

    Published 2017-03-01
    “…In order to solve the problem of routing reliability in sensor nodes,a kind of sensor network backup mechanism based on smart and cooperative network was studied.The Leach algorithm was used to carry out the backup of the cluster sensor,and the method of the sensor backup and starting the backup sensor was presented.The tests on Mini-Net show that sensor backup mechanism can effectively solve the sensor failure network outages,with the advantage of fast handoff and low delay.…”
    Get full text
    Article
  20. 6140

    Data integrity verification based on model cloud federation of TPA by Junfeng TIAN, Tianle LI

    Published 2018-08-01
    Subjects: “…data integrity verification…”
    Get full text
    Article