Suggested Topics within your search.
Suggested Topics within your search.
- Climate Change 1
- Coding and Information Theory 1
- Coding theory 1
- Economic conditions 1
- Economics 1
- Environmental Health 1
- Film adaptations 1
- History and criticism 1
- Information theory 1
- Moral and ethical aspects 1
- Motion pictures and literature 1
- Nursing 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Public Health 1
- Public Policy 1
- Public health 1
- Sex role 1
- Social conditions 1
- Technique 1
- Teenage girls 1
- Watercolor painting 1
- research 1
- research methods 1
-
561
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01“…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
Get full text
Article -
562
User similarity-based collaborative filtering recommendation algorithm
Published 2014-02-01“…The focus of similarity and evaluation have been changed when applied to social networks, however, they cause low efficiency and accuracy of the recommen-dation algorithms. User similarity was introduced for redefining the attribute similarity and similarity composition as well as the method of similarity calculating, then a new collaborative filtering recommendation algorithm based on user attrib-utes was designed and some methods for user satisfaction and quality of recommendations were presented. …”
Get full text
Article -
563
EFH:an online unsupervised hash learning algorithm
Published 2020-03-01“…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
Get full text
Article -
564
L’espace, le corps et les aliens dans la science-fiction féminine japonaise
Published 2017-06-01“…This paper will focus on three themes in particular in a number of works in order to examine the history of Japanese women's sf: A) The Utopia of Women: Suzuki Izumi (The World of Women and Women), Hikawa Reiko (Women Warriors Efera and Jiriora), Matsuo Yumi (The Murders of Balloontown), and Arai Motoko (Tigris and Euphrates); B) The Transformation of Women into Monsters: Hagio Moto (Star Red), Yamao Yuko (The City Where Dreams Live), Ohara Mariko (« Hybrid Child »), Shinoda Setsuko (Gosainthan), and Shono Yoriko (The Development of my Mother); C) The Alteration of Maculinity: Kurimoto Kaoru (The Guin Saga), Sato Aki (The Travels of Balthazar), and Takano Fumio (Vaslaf).…”
Get full text
Article -
565
Deletable blockchain based on threshold ring signature
Published 2019-04-01“…With the development of blockchain,huge storage space is needed to store all of blockchain data.In addition,data can’t be changed once it is packaged into the chain,and it may be possible for overdue data to take up large storage space.Firstly,a threshold ring signature scheme was improved,and then a deletable blockchain scheme based on the mechanism of proof of space (PoSpace) consensus was constructed.Most of nodes could sign and delete a block together when block data was overdue,and the overall structure of the blockchain was unchanged.Several experiments in a simulated environment were executed,and the results show that the proposed blockchain scheme has high efficiency in generating and delegating a block.Meanwhile,the deletion of a block doesn’t influence the storage and use of other blocks.…”
Get full text
Article -
566
Security-enhanced live migration based on SGX for virtual machine
Published 2017-09-01“…The virtual machine may face the problem of information leakage in live migration.Therefore,a dynamic memory protection technique SGX was introduced and a security enhancement live migration method based on KVM environment was proposed.Firstly,on both sides of migration,a hardware-isolated secure execution environment centered SGX was built.It guaranteed the security of operations like encryption and integrity measurement and also ensured the security of private data.An encrypted channel to transfer migration data based on the remote attestation between the secure execution environments of both migration sides was constructed.And the mutual authentication of both sides’ platform integrity was realized.Finally,the security enhancement effect and did the experiment was analyzed.The results shows that the introduction of SGX won’t cause much negative effect to the migration performance.…”
Get full text
Article -
567
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
Published 2018-11-01“…Network intrusion detection system plays an important role in protecting network security.With the continuous development of science and technology,the current intrusion technology cannot cope with the modern complex and volatile network abnormal traffic,without taking into account the scalability,sustainability and training time of the detection technology.Aiming at these problems,a new deep learning method was proposed,which used unsupervised non-symmetric convolutional auto-encoder to learn the characteristics of the data.In addition,a new method based on the combination of non-symmetric convolutional auto-encoder and multi-class support vector machine was proposed.Experiments on the data set of KDD99 show that the method achieves good results,significantly reduces training time compared with other methods,and further improves the network intrusion detection technology.…”
Get full text
Article -
568
Underdetermined mixing matrix estimation algorithm based on tensor analysis
Published 2022-11-01“…Aiming at the problems of difficult to extract effective feature information and the slow convergence speed of the underdetermined matrix estimation, an underdetermined matrix estimation algorithm of instantaneous mixtures based on tensor analysis was proposed to overcome the constraint of signal sparsity.In the proposed algorithm, the symmetric third-order tensor was constructed via the autocovariance matrix of segmentation sub-block, which was compressed into a kernel tensor to reduce the size of the data.An enhanced line search technology was applied to speed up the convergence of alternating least squares method, and the factor matrix was used as the measure of the mixing matrix estimation, but the selection of the number of segmentation sub-blocks was an open problem.Experimental results demonstrate that the proposed algorithm outperforms the sparse transformation method and the traditional high-order statistical method in handling the underdetermined mixing matrix estimation.…”
Get full text
Article -
569
A Concepção de Tempo Geográfico do Mediterrâneo de Vidal de la Blache
Published 2014-11-01“…His certification in history from the École Normale Supérieure and École francaise d’Athènes, and his subsequent relationships with historians (even after been recognized as a geographer), marked his background and career and has been analysed in the first paper. …”
Get full text
Article -
570
Ignorer les mots/ ignorer les maux. Discours et pratiques de silenciations épistémiques dans les consultations médicales du réseau municipal de santé à Franca (Brésil)
Published 2024-03-01“…Three forms of 'epistemic silencing' (Dotson, 2011) have been identified: 'not believing', 'not saying' and 'silencing'.…”
Get full text
Article -
571
İnternette Yıkıcı Gemeinschaft: Okuyucu Tartışmalarında Albay Çiçek Olayı
Published 2013-11-01“…Sennet'in kavramını açıklarken çözümlediği Yüzbaşı Dreyfus davası hakkındaki karşıt irrasyonel kamusal tartışmaların bir benzeri, Türkiye'nin gündemini etkileyen Albay Dursun Çiçek olayında yaşanmıştır. Bu çalışmada, yeni bir kamusal alan oluşturma potansiyeline vurgu yapılan internetteki bazı haber siteleri ile ulusal gazetelerin internet sürümlerinde Albay Çiçek olayıyla ilgili okuyucu tartışmaları incelenerek 'yıkıcı cemaat' kavramı üzerinden değerlendirilmeye çalışılmıştır.…”
Get full text
Article -
572
Data sharing scheme for 5G IoT based on blockchain
Published 2020-08-01“…The massive amount of IoT data has great value,but the existing cloud-based data sharing mechanism faces problems such as single points of failure and internal leakage,which can not ensure the secure sharing of user data.In order to achieve efficient and reliable data sharing,the blockchain technology was used to propose a 5G IoT data sharing scheme based on blockchain.Firstly,the proposed scheme designed data sharing framework and data sharing process,based on the lightning network solution,an off-chain transaction mechanism for data sharing of the internet of things was proposed.Experimental analysis shows that the 5G IoT data sharing framework based on blockchain has strong anti-attack ability and the off-chain transaction mechanism based on lightning network can greatly increase transaction throughput and reduce transaction delay.…”
Get full text
Article -
573
Genetic bases of compact forms among cucurbit crops
Published 2024-01-01“…., Citrullus lanatus (Thunb.) Matsum. & Nakai, and Cucumis melo L. The review provides up-to-date information on the genetic and molecular bases of compact phenotype formation, as well as molecular markers for detecting known genes associated with reduced plant size.…”
Get full text
Article -
574
SAT-based differential automatic search algorithm using divide-and-conquer strategy and its applications
Published 2023-04-01“…To improve the efficiency of automatic search, an algorithm for searching the optimal differential characteristics based on SAT model was proposed by combining the divide-and-conquer strategy.The search space was divided into disjoint subsets by using the information from Matsui boundary conditions of arbitrary continuous rounds.By analyzing the relationships between satisfiability of differential models based on SAT, a descending branch search chain model was proposed.Furthermore, at the model optimization level, the number of subsets that need to be searched and partitioned was decreased.At the level of algorithm implementation, the search space was reduced by utilizing the parallel technology.Finally, the accelerated algorithm was applied to SPECK family of ARX cryptographic algorithms.The 20, 14, 11-round optimal differential characteristics of SPECK-48, SPECK-96, SPECK-128 are obtained, which increase the previous best results by 1, 4, 2 rounds respectively.…”
Get full text
Article -
575
Marine survey unmanned surface vessel:platform design and application
Published 2021-07-01“…Marine survey unmanned surface vessel (USV) has a wide range of applications.However, the attitude of USV is easily affected by wind, waves, currents and floating debris, which may cause structural damage or low precision observation.Double hull and wide deck platform of unmanned surface vessed was designed, and the transducer of multi-beam echo sounder was installed on the lifting mechanism.These designs improved the sailing attitude of the platform, the safety of the transducer and the accuracy of the observed data.In 2020, this USV was participated in the dike-inspection mission of Jiangxi’s emergency flood relief.It successfully inspected the sediment environment of 14 km dike, affected by the unfavorable working conditions like rapid water flow, turbid water and floating garbage.Four risks were located, which provided important data support for the anti-flood campaign.…”
Get full text
Article -
576
Modes of embodiment for an immersed experience in museums: The Royal Tank Museum.
Published 2025-01-01“…Al-Karameh Hall offers embodied experiences using sensory and physical tools, while Jerusalem Hall and the Battle of Al-Latrun fall short due to fractured narratives and inadequate sensory engagement. …”
Get full text
Article -
577
Intelligent forecasting and monitoring of air index based on big data and internet of things
Published 2017-11-01“…Air quality forecast has become an urgent need.However,numerical forecast of air quality is a complex systems engineering.The intelligent forecasting of air index was studied from the perspective of big data and intelligent decision making.For the index prediction of air quality,the popular classification algorithm was introduced to realize the intelligent analysis of historical data.To obtain air quality information in real time,a monitoring system based on Internet of Things was established,and intelligent processing of real-time data collected by the classification algorithm was achieved.Due to the large amount of historical air index data and real-time data collected,the technology of cloud computing and big data was introduced to speed up the data processing and improve the storage of data.In addition,the client based on Android was developed to allow users to query the air quality anytime,anywhere.…”
Get full text
Article -
578
NB-IoT network and service collaborative optimization
Published 2018-11-01“…The preliminary construction of the NB-IoT network has been completed at this stage.The overall coverage is good,but there are more partial coverage holes,insufficient coverage of indoor difficult scenes,prominent interference problems and overlapping coverage.At present,the industry application of NB-IoT is low in maturity,and the application of the industry is in its infancy.Different terminal manufacturers have different specifications,which leads to major problems in the deployment process of network deployment.The NB-IoT network related indicators according to different business characteristics were analyzed,according to the main types of business of the internet of things.The coverage performance of such services was researched according to test data and statistical data.In-depth coverage analysis on the covers of manholes and poles was conducted.Overlapping coverage analysis gives an optimized solution to the business model with relatively concentrated service access.…”
Get full text
Article -
579
La reforma electoral a Catalunya: fracassos i expectatives
Published 2024-12-01“…Avui, la reforma segueix essent encara molt difícil, malgrat la presència d’alguns indicis més favorables.…”
Get full text
Article -
580
Anomaly detection model based on multi-grained cascade isolation forest algorithm
Published 2019-08-01“…The isolation-based anomaly detector,isolation forest has two weaknesses,its inability to detect anomalies that were masked by axis-parallel clusters,and anomalies in high-dimensional data.An isolation mechanism based on random hyperplane and a multi-grained scanning was proposed to overcome these weaknesses.The random hyperplane generated by a linear combination of multiple dimensions was used to simplify the isolation boundary of the data model which was a random linear classifier that can detect more complex data patterns,so that the isolation mechanism was more consistent with data distribution characteristics.The multi-grained scanning was used to perform dimensional sub-sampling which trained multiple forests to generate a hierarchical ensemble anomaly detection model.Experiments show that the improved isolation forest has better robustness to different data patterns and improves the efficiency of anomaly points in high-dimensional data.…”
Get full text
Article