Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
6121
Reliability analysis of wireless communication equipment based on model selection
Published 2025-02-01“…By introducing the information criterion and the special goodness of fit test to analyze the fitting effect of the reliability model, the reliability analysis method of wireless communication equipment based on model selection is proposed, and the test and analysis are combined with actual cases to improve the accuracy and effectiveness of model selection.…”
Get full text
Article -
6122
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: “…data security…”
Get full text
Article -
6123
Classification of environments based on correlations of yield in spring bread wheat
Published 2020-12-01“…Consequently, the classification of years based on the reactions of marker cultivars can be justifiably extended onto other breeding material.Conclusion. …”
Get full text
Article -
6124
Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance
Published 2013-11-01“…At the same time, we adopt several related mechanisms to protect the communication among the sensor nodes and the confidentiality of the data transmission. Also, we use the mixed multipath mechanism among the clusters to improve the security of the network and strengthen the intrusion tolerance.…”
Get full text
Article -
6125
Multifeature Fusion Vehicle Detection Algorithm Based on Choquet Integral
Published 2014-01-01“…Vision-based multivehicle detection plays an important role in Forward Collision Warning Systems (FCWS) and Blind Spot Detection Systems (BSDS). …”
Get full text
Article -
6126
Generate medical synthetic data based on generative adversarial network
Published 2022-03-01“…Modeling the probability distribution of rows in structured electronic health records and generating realistic synthetic data is a non-trivial task.Tabular data usually contains discrete columns, and traditional encoding approaches may suffer from the curse of feature dimensionality.Poincaré Ball model was utilized to model the hierarchical structure of nominal variables and Gaussian copula-based generative adversarial network was employed to provide synthetic structured electronic health records.The generated training data are experimentally tested to achieve only 2% difference in utility from the original data yet ensure privacy.…”
Get full text
Article -
6127
Chloride Ingress in Chemically Activated Calcined Clay-Based Cement
Published 2018-01-01“…The resultant calcined clay was blended with Ordinary Portland Cement (OPC) at replacement level of 35% by mass of OPC to make test cement labeled PCC35. Mortar prisms measuring 40 mm × 40 mm × 160 mm were cast using PCC35 with 0.5 M Na2SO4 solution as a chemical activator instead of water. …”
Get full text
Article -
6128
Proactive migration model of SWIM service based on situation awareness
Published 2019-08-01“…To solve the problem that in the system wide information management (SWIM) network,the SWIM service provider suffers from SWIM service interruption,service delay increase or service quality degradation due to malicious attack or self-failure.Therefore,a proactive migration model of SWIM service was proposed on the basis of situation awareness,which used the random forest algorithm to timely judge the SWIM service provider security situation.SWIM service authority was actively migrated according to security situation,and the emergencies impact on SWIM services were reduces.Experimental results show that the proposed model can guarantee services continuity in an emergency event,which has higher reliability and stability than SWIM network in which the service migration model is not deployed.…”
Get full text
Article -
6129
Smart tags based on the batteryless backscatter technology:applications and challenges
Published 2020-09-01“…Since the radio frequency identification (RFID) technology was put forward,it has been widely used in the transportation,logistics,industry and business due to its convenience and high efficiency.As a carrier for storing recognizable data,the RFID tags play a crucial role in the Internet of things (IoT).More and more functions and modules are embedded in the RFID tags and developed into smart tags in different application fields.Recently,wireless batteryless smart tags have arisen and grown rapidly with the development of the IoT and various emerging backscatter technologies.Wireless batteryless smart tags use the passive backscatter technology to harvest the energy and transmit information through radio frequency signals.Starting from the RFID technology,the history of the RFID and smart tags was introduced briefly,the differences between traditional smart tags and emerging wireless smart tags were compared,the advantages of wireless batteryless smart tags were concluded,several specific applications of it in different fields were listed,and the open challenges were analyzed.…”
Get full text
Article -
6130
Privacy policy compliance detection and analysis based on knowledge graph
Published 2024-12-01“…Next, a semi-automated method was built for collecting privacy policies and collected the privacy policies of 400 Chinese Apps. 100 policies were cross-annotated based on the knowledge graph, resulting in the creation of the first Chinese privacy policy corpus tailored to the PIPL called APPCP-100 (APP-privacy-policy-corpus-for-PIPL-100). …”
Get full text
Article -
6131
Smart Approach for Botnet Detection Based on Network Traffic Analysis
Published 2022-01-01“…By categorizing behavior based on time slots, we investigate the viability of detecting botnet behavior without seeing a whole network data flow. …”
Get full text
Article -
6132
Aircraft Actuator Performance Analysis Based on Dynamic Neural Network
Published 2023-01-01Get full text
Article -
6133
Exploration on Formation Mechanism of Core Discing Based on Energy Analysis
Published 2022-01-01“…Therefore, the effects of in situ stress combination condition, core diameter, and drilling depth on the maximum tensile stress after core stub unloading are discussed by PFC2D discrete element numerical simulation method, and the formation mechanism of core discing is preliminarily explored based on strain energy and dissipated energy. …”
Get full text
Article -
6134
Watermark embedding and detection based on generative causal language model
Published 2023-08-01“…Artificial intelligence generated content (AIGC) generated text itself carried moral and legal compliance risks, and the circulation of generated text content need to be regulated.Therefore, there was an urgent need for copyright protection of AIGC generated text.Watermarking technology was currently the most widely used method for digital copyright protection.A watermark embedding technology was proposed for generating text using generative causal language models.An in-process watermark embedding method was adopted, which implicitly embeded text watermark during the text generation process.Compared to traditional post-process watermark embedding technology, it had less impact on the quality of generated text and had advantages such as low perception, transparency, and robustness.The proposed method has low coupling with existing models and can eliminate the need to adjust the original model structure, training strategies, deployment methods, and increase the computational cost of the original generation process.Through experimental results, the proposed watermark embedding strategy has good robustness and can effectively detect text embedded watermarks even after a certain degree of editing by users.…”
Get full text
Article -
6135
Retracted: Deep Learning-Based Music Quality Analysis Model
Published 2023-01-01Get full text
Article -
6136
BPH Procedural Treatment: The Case for Value-Based Pay for Performance
Published 2008-01-01“…This paper reviews current paradigms and, using BPH procedural therapy outcomes, cost, and reimbursement data, makes the case for a fundamental change in perspective to value-based pay for performance as a reimbursement system with the potential to align the interests of patients, physicians, and payers and to improve global clinical outcomes while preserving free choice of clinically efficacious treatments.…”
Get full text
Article -
6137
Study on the Adsorption Effect of Renewable Biochar Based on Energy Gain
Published 2021-01-01“…Since the crop-residual-derived charcoal could effectively restore the nutritional structure of the soil, which contributes to preventing the decrease in grain yield, and it is also a kind of renewable environment-friendly resource by itself, which could be used in control the pollution of heavy metal ions, it is expected that the crop-residual-derived charcoal will be a new adsorption material that could be used to control the heavy metal pollution in the future; the adsorption effect of biochar as new adsorption material on heavy metal ions has a distinct advantage over traditional adsorbent materials, and biochar is a renewable energy source, which is cheap and better for recycling resources.…”
Get full text
Article -
6138
Indoor RFID localization algorithm based on adaptive bat algorithm
Published 2022-08-01“…Aiming at the problem that long time-consuming and poor positioning accuracy using geometric method in the traditional UHF RFID indoor localization algorithm, an RFID indoor positioning algorithm based on adaptive bat algorithm (ABA) was proposed.Firstly, the phase of multiple frequency points was obtained by frequency hopping technology, and the location evaluation function of bat algorithm was established based on the angle information of multiple signal classification (MUSIC) algorithm and the distance information of clustering.Secondly, the bat location was initialized by tent reverse learning to increase the diversity of the population, and the adaptive weight factor was introduced to update the bat location.Finally, the target position was searched iteratively based on the position evaluation function to achieve fast centimeter level positioning.Experimental results show that the median localization error of the proposed algorithm is 7.74 cm, and the real-time performance is improved by 12 times compared with the traditional positioning algorithm based on the Chinese remainder theorem (CRT).…”
Get full text
Article -
6139
Approach of sensor network backup based on smart and cooperative network
Published 2017-03-01“…In order to solve the problem of routing reliability in sensor nodes,a kind of sensor network backup mechanism based on smart and cooperative network was studied.The Leach algorithm was used to carry out the backup of the cluster sensor,and the method of the sensor backup and starting the backup sensor was presented.The tests on Mini-Net show that sensor backup mechanism can effectively solve the sensor failure network outages,with the advantage of fast handoff and low delay.…”
Get full text
Article -
6140
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01Subjects: “…data integrity verification…”
Get full text
Article