Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
6241
Regarding further prospects in innovation of the rule-making legislative basis
Published 2022-03-01“…At the same time, to date, attempts in Ukraine to pass a law on rule-making have not been finalized. …”
Get full text
Article -
6242
Adversarial examples detection method based on boundary values invariants
Published 2020-02-01“…Nowadays,deep learning has become one of the most widely studied and applied technologies in the computer field.Deep neural networks(DNNs) have achieved greatly noticeable success in many applications such as image recognition,speech,self-driving and text translation.However,deep neural networks are vulnerable to adversarial examples that are generated by perturbing correctly classified inputs to cause DNN modes to misbehave.A boundary check method based on traditional programs by fitting the distribution to find the invariants in the deep neural network was proposed and it use the invariants to detect adversarial examples.The selection of training sets was irrelevant to adversarial examples.The experiment results show that proposed method can effectively detect the current adversarial example attacks on LeNet,vgg19 model,Mnist,Cifar10 dataset,and has a low false positive rate.…”
Get full text
Article -
6243
Research on backup and remapping of network slice based on security classification
Published 2018-11-01“…In the future virtual environment of 5G core network,the general X86 servers make the attackers exploit vulnerabilities more easily,the substrate network is infected with and spreads the virus more easily,and the problem of single physical node failed will affect the service performance of the network slice seriously.Based on the existing node backup and remapping solutions,considering the impact of security constraints among nodes on network security performance,a security parameter evaluation model of virtual nodes and physical nodes were proposed in the network slicing,and the security constraint relationship was established between the virtual nodes and the physical nodes.Then backup virtual nodes were selected based on the security parameters evaluation model,and backup mapping methods were designed.Finally,the node remapping mechanism was designed with satisfying the requirement of network delay.Experiments show that the proposed method can significantly improve network intrusion tolerance with satisfying the requirements of network slicing service performance.…”
Get full text
Article -
6244
Oral English Auxiliary Teaching System Based on Deep Learning
Published 2022-01-01“…Through the integrated use of information technology, it aimed at building out a deeply mixed teaching mode based on “Cloud Class and Offline Class.” A combination of quantitative and qualitative data collection methods was adopted to evaluate the practical effect. …”
Get full text
Article -
6245
Implementation of a big data anonymization system based on Spark
Published 2018-04-01Subjects: “…data anonymization…”
Get full text
Article -
6246
Demonstration of an On-Chip TE-Pass Polarizer Based on Radiation Coupling
Published 2024-01-01“…An on-chip, high-extinction-ratio transverse electric (TE) pass polarizer utilizing a silicon oxynitride (SiON) slab has been proposed and experimentally verified. …”
Get full text
Article -
6247
Research of Exoskeleton Trajectory Algorithm based on Homogeneous Differential Equation
Published 2017-01-01“…The kinematical equation of man-machine exoskeletons is established based on differential geometry homogeneous coordinates equation,according to the lower limb motion parameters,the boundary conditions are got,and then the motion trajectory of ankle is drawn by using the Matlab. …”
Get full text
Article -
6248
Attribute-based authenticated key agreement protocol supporting revocation
Published 2014-05-01Subjects: Get full text
Article -
6249
MO-CCCCTA-Based Floating Positive and Negative Inductors and Their Applications
Published 2011-01-01“…The simulated inductor retains minimum requirement of passive elements as only one-grounded capacitance is used for one inductor. PSPICE simulation has been done and included to ensure the validity of the approach. …”
Get full text
Article -
6250
Numerical Model for Open Channel Flows Based on Boltzmann Theory
Published 2001-01-01Get full text
Article -
6251
ViT-Based Face Diagnosis Images Analysis for Schizophrenia Detection
Published 2024-12-01“…This study proposes a novel method using face diagnosis images based on traditional Chinese medicine principles, providing a non-invasive, efficient, and interpretable alternative for SZ detection. …”
Get full text
Article -
6252
Study on Chinese spam filtering system based on Bayes algorithm
Published 2018-12-01“…Further, a three-layer structure model based on GWO_GA structure learning algorithm was proposed to expand the limit of text features and improve the diversity of text features. …”
Get full text
Article -
6253
Measurement based modeling and validation of wireless MIMO channel models
Published 2018-04-01“…This paper addresses measurement based wireless MIMO channel modeling and validation based MIMO channel on sounding data. …”
Get full text
Article -
6254
A TEI-based Approach to Standardising Spoken Language Transcription
Published 2011-06-01“…In the second step, character data in this representation is parsed according to the regularities of a transcription convention resulting in a more fine-grained TEI markup which is also based on P5. …”
Get full text
Article -
6255
Molecular Basis of GABA Hypofunction in Adolescent Schizophrenia-Like Animals
Published 2021-01-01“…However, few studies have systematically investigated the molecular basis of GABA deficits, especially during adolescence. …”
Get full text
Article -
6256
Research of power line communication based on independent component analysis
Published 2007-01-01Subjects: Get full text
Article -
6257
Recognition and Simulation of Exercise Mode Based on Energy Consumption Model
Published 2021-01-01“…The relationship between the integral value of acceleration and energy consumption is analyzed, and a linear integral model based on different motion modes is proposed. Based on the kinetic energy theorem, the student movement energy expenditure is estimated. …”
Get full text
Article -
6258
A NB-IoT access scheme based on Beta distribution
Published 2021-09-01“…As one of the emerging technologies of low-power wide-area Internet of things, narrow band Internet of things (NB-IoT) faces the pressure and challenge of massive connections of terminals.Aiming at practical application scenarios, a preamble allocation scheme based on Beta distribution was proposed.In this scheme, the energy consumption of each time slot device was firstly calculated.The equipment was divided into high energy consumption according to two grouping methods: average energy consumption and cumulative energy consumption.The preamble was assigned to the high-energy-consuming device group first, and the remaining preamble and the conflicting preamble of the high-energy-consuming device group were assigned to the low-energy-consuming device group.The simulation results show that compared with the traditional random allocation scheme, the proposed scheme can effectively improve the average access success rate and average throughput of the NB-IoT system, and can effectively reduce the back off time.…”
Get full text
Article -
6259
Enhancement of underwater acoustic signal based on denoising automatic-encoder
Published 2019-10-01“…Aiming at the difficulty of feature extraction of echo signal in active sonar,a self-encoder algorithm based on the combination of denoising self-encoder and convolution denoising self-encoder was proposed.Firstly,the preprocessing of noisy signal was carried out by using the advantage of denoising self-encoder in signal as a whole,and then the local feature of signal was optimized by combining convolutional denoising self-encoder to denoise the signal locally,so as to enhance the signal.The time domain waveform of the received signal is used as the feature input by the algorithm,and retains the signal’s amplitude and phase characteristics.The experimental results show that the algorithm not only effectively reduces the noise component in the signal,but also achieves better recovery effect in both time and frequency domains.…”
Get full text
Article -
6260
Uncertain data analysis algorithm based on fast Gaussian transform
Published 2017-03-01Subjects: Get full text
Article