Showing 6,241 - 6,260 results of 67,915 for search 'DASB~', query time: 2.31s Refine Results
  1. 6241

    Regarding further prospects in innovation of the rule-making legislative basis by I. L. Nevzorov

    Published 2022-03-01
    “…At the same time, to date, attempts in Ukraine to pass a law on rule-making have not been finalized. …”
    Get full text
    Article
  2. 6242

    Adversarial examples detection method based on boundary values invariants by Fei YAN, Minglun ZHANG, Liqiang ZHANG

    Published 2020-02-01
    “…Nowadays,deep learning has become one of the most widely studied and applied technologies in the computer field.Deep neural networks(DNNs) have achieved greatly noticeable success in many applications such as image recognition,speech,self-driving and text translation.However,deep neural networks are vulnerable to adversarial examples that are generated by perturbing correctly classified inputs to cause DNN modes to misbehave.A boundary check method based on traditional programs by fitting the distribution to find the invariants in the deep neural network was proposed and it use the invariants to detect adversarial examples.The selection of training sets was irrelevant to adversarial examples.The experiment results show that proposed method can effectively detect the current adversarial example attacks on LeNet,vgg19 model,Mnist,Cifar10 dataset,and has a low false positive rate.…”
    Get full text
    Article
  3. 6243

    Research on backup and remapping of network slice based on security classification by Zhiyong SUN, Xinsheng JI, Wei YOU, Quan YUAN

    Published 2018-11-01
    “…In the future virtual environment of 5G core network,the general X86 servers make the attackers exploit vulnerabilities more easily,the substrate network is infected with and spreads the virus more easily,and the problem of single physical node failed will affect the service performance of the network slice seriously.Based on the existing node backup and remapping solutions,considering the impact of security constraints among nodes on network security performance,a security parameter evaluation model of virtual nodes and physical nodes were proposed in the network slicing,and the security constraint relationship was established between the virtual nodes and the physical nodes.Then backup virtual nodes were selected based on the security parameters evaluation model,and backup mapping methods were designed.Finally,the node remapping mechanism was designed with satisfying the requirement of network delay.Experiments show that the proposed method can significantly improve network intrusion tolerance with satisfying the requirements of network slicing service performance.…”
    Get full text
    Article
  4. 6244

    Oral English Auxiliary Teaching System Based on Deep Learning by Chenhui Qu, Yuanbo Li

    Published 2022-01-01
    “…Through the integrated use of information technology, it aimed at building out a deeply mixed teaching mode based on “Cloud Class and Offline Class.” A combination of quantitative and qualitative data collection methods was adopted to evaluate the practical effect. …”
    Get full text
    Article
  5. 6245

    Implementation of a big data anonymization system based on Spark by Chaoyi BIAN, Shaomin ZHU, Tao ZHOU

    Published 2018-04-01
    Subjects: “…data anonymization…”
    Get full text
    Article
  6. 6246

    Demonstration of an On-Chip TE-Pass Polarizer Based on Radiation Coupling by Li Zhang, Shengjie Tang, Cheng Chen, Haibin Lv, Xiaoping Liu

    Published 2024-01-01
    “…An on-chip, high-extinction-ratio transverse electric (TE) pass polarizer utilizing a silicon oxynitride (SiON) slab has been proposed and experimentally verified. …”
    Get full text
    Article
  7. 6247

    Research of Exoskeleton Trajectory Algorithm based on Homogeneous Differential Equation by Liang Yuhang, Liang Guoxing, Li Zhili, Song Jinpeng, Ren Qichao

    Published 2017-01-01
    “…The kinematical equation of man-machine exoskeletons is established based on differential geometry homogeneous coordinates equation,according to the lower limb motion parameters,the boundary conditions are got,and then the motion trajectory of ankle is drawn by using the Matlab. …”
    Get full text
    Article
  8. 6248
  9. 6249

    MO-CCCCTA-Based Floating Positive and Negative Inductors and Their Applications by Neeta Pandey, Rishik Bazaz, Rahul Manocha

    Published 2011-01-01
    “…The simulated inductor retains minimum requirement of passive elements as only one-grounded capacitance is used for one inductor. PSPICE simulation has been done and included to ensure the validity of the approach. …”
    Get full text
    Article
  10. 6250
  11. 6251

    ViT-Based Face Diagnosis Images Analysis for Schizophrenia Detection by Huilin Liu, Runmin Cao, Songze Li, Yifan Wang, Xiaohan Zhang, Hua Xu, Xirong Sun, Lijuan Wang, Peng Qian, Zhumei Sun, Kai Gao, Fufeng Li

    Published 2024-12-01
    “…This study proposes a novel method using face diagnosis images based on traditional Chinese medicine principles, providing a non-invasive, efficient, and interpretable alternative for SZ detection. …”
    Get full text
    Article
  12. 6252

    Study on Chinese spam filtering system based on Bayes algorithm by Haoran LIU, Pan DING, Changjiang GUO, Jinfeng CHANG, Jingchuang CUI

    Published 2018-12-01
    “…Further, a three-layer structure model based on GWO_GA structure learning algorithm was proposed to expand the limit of text features and improve the diversity of text features. …”
    Get full text
    Article
  13. 6253

    Measurement based modeling and validation of wireless MIMO channel models by A. A. Kalachikov, N. S. Shelkunov

    Published 2018-04-01
    “…This paper addresses measurement based wireless MIMO channel modeling and validation based MIMO channel on sounding data. …”
    Get full text
    Article
  14. 6254

    A TEI-based Approach to Standardising Spoken Language Transcription by Thomas Schmidt

    Published 2011-06-01
    “…In the second step, character data in this representation is parsed according to the regularities of a transcription convention resulting in a more fine-grained TEI markup which is also based on P5. …”
    Get full text
    Article
  15. 6255

    Molecular Basis of GABA Hypofunction in Adolescent Schizophrenia-Like Animals by Xiaodan Wang, Ying Hu, Wenxin Liu, Yuanyuan Ma, Xi Chen, Ting Xue, Donghong Cui

    Published 2021-01-01
    “…However, few studies have systematically investigated the molecular basis of GABA deficits, especially during adolescence. …”
    Get full text
    Article
  16. 6256
  17. 6257

    Recognition and Simulation of Exercise Mode Based on Energy Consumption Model by Yulei Li

    Published 2021-01-01
    “…The relationship between the integral value of acceleration and energy consumption is analyzed, and a linear integral model based on different motion modes is proposed. Based on the kinetic energy theorem, the student movement energy expenditure is estimated. …”
    Get full text
    Article
  18. 6258

    A NB-IoT access scheme based on Beta distribution by Mengya LI, Zhengquan LI

    Published 2021-09-01
    “…As one of the emerging technologies of low-power wide-area Internet of things, narrow band Internet of things (NB-IoT) faces the pressure and challenge of massive connections of terminals.Aiming at practical application scenarios, a preamble allocation scheme based on Beta distribution was proposed.In this scheme, the energy consumption of each time slot device was firstly calculated.The equipment was divided into high energy consumption according to two grouping methods: average energy consumption and cumulative energy consumption.The preamble was assigned to the high-energy-consuming device group first, and the remaining preamble and the conflicting preamble of the high-energy-consuming device group were assigned to the low-energy-consuming device group.The simulation results show that compared with the traditional random allocation scheme, the proposed scheme can effectively improve the average access success rate and average throughput of the NB-IoT system, and can effectively reduce the back off time.…”
    Get full text
    Article
  19. 6259

    Enhancement of underwater acoustic signal based on denoising automatic-encoder by Jingwei YIN, Wuxiong LUO, Li LI, Xiao HAN, Longxiang GUO, Jianfeng WANG

    Published 2019-10-01
    “…Aiming at the difficulty of feature extraction of echo signal in active sonar,a self-encoder algorithm based on the combination of denoising self-encoder and convolution denoising self-encoder was proposed.Firstly,the preprocessing of noisy signal was carried out by using the advantage of denoising self-encoder in signal as a whole,and then the local feature of signal was optimized by combining convolutional denoising self-encoder to denoise the signal locally,so as to enhance the signal.The time domain waveform of the received signal is used as the feature input by the algorithm,and retains the signal’s amplitude and phase characteristics.The experimental results show that the algorithm not only effectively reduces the noise component in the signal,but also achieves better recovery effect in both time and frequency domains.…”
    Get full text
    Article
  20. 6260