Suggested Topics within your search.
Suggested Topics within your search.
- Business 14
- Management 11
- Entrepreneurship 10
- Business communication 8
- Business enterprises 8
- Business writing 6
- Computer programs 6
- New business enterprises 6
- Moral and ethical aspects 5
- Business ethics 4
- Business mathematics 4
- English language 4
- Industrial management 4
- Law and legislation 4
- Leadership 4
- Marketing 4
- kiswahili 4
- Business English 3
- Business Management 3
- Business logistics 3
- Information technology 3
- Public administration 3
- Public relations 3
- Purchasing 3
- Study and teaching 3
- Anatomy 2
- BUSINESS & ECONOMICS / General 2
- Business and Management 2
- Business management 2
- Commerce 2
-
581
Influence of shortest path algorithms on energy consumption of multi-core processors
Published 2023-10-01Subjects: “…multi-core processor…”
Get full text
Article -
582
Multi-slotted airfoil design for enhanced aerodynamic performance and economic efficiency
Published 2025-02-01Subjects: Get full text
Article -
583
Research on multi-address time-based blockchain covert communication method
Published 2023-02-01“…Aiming at the problem of low amount of information carried by the existing block timestamp interval hiding method, a multi-address time-based blockchain covert communication method was proposed.Firstly, the ciphertext was split and transmitted by different addresses.The content of the ciphertext fragment was represented by the block timestamp interval of the address.Then the interval of the blocks was read and counted by the receiver where these addresses were located.Finally, the ciphertext was restored by combination.In addition, in view of the lack of concealment measures in the time-based blockchain covert communication system, a method of adjusting the time interval of transaction initiation was proposed to reduce the probability of address specificity caused by covert communication behavior.The experimental results verify that the transmission rate of the proposed method is about n times higher than that of the time-based blockchain covert communication method when n addresses are involved.…”
Get full text
Article -
584
Storm-based distributed sampling system for multi-source stream environment
Published 2018-11-01“…In this article, we address the performance improvement of binary Bernoulli sampling in the multi-source stream environment. Binary Bernoulli sampling has the n :1 structure where n sites transmit data to 1 coordinator. …”
Get full text
Article -
585
Study on Fengtang River Mouth Wetland Degradation and Ecological Restoration Measures
Published 2011-01-01Get full text
Article -
586
Hemodynamics in chronic pain: A pathway to multi-modal health risks.
Published 2024-01-01Get full text
Article -
587
Multi-core helper thread prefetching for irregular data intensive applications
Published 2014-08-01“…For improving performance of memory access in sparse graph traversal algorithm, helper thread prefetching could convert discontinuous locality into continuous-instant spatial-temporal locality effectively by using the shared last level cache of chip multi-processor platforms. Betweenness centrality algorithm was used as a case study, the multi-parameter prefetching model of helper thread and optimized instances were presented and evaluated on commercial CMP platforms Q6600 and I7, the average speedup of betweenness centrality algorithm at different input scale is 1.20 and 1.11 respectively. …”
Get full text
Article -
588
Drainage Pumping Station Multi - Unit PLC Automatic Control System
Published 2007-01-01Get full text
Article -
589
Study on capacity analytical model for multi-channel wireless sensor networks
Published 2008-01-01Subjects: Get full text
Article -
590
Design and Simulation Analysis of Multi-purpose Lower Limb Exoskeleton Robot
Published 2021-01-01“…Aiming at the needs of rehabilitation training and movement substitution for the elderly and patients with lower limb movement disorders, a multi-purpose lower limb exoskeleton robot is designed, which utilizes auxiliary standing mechanism and exoskeleton to realize the rehabilitation training of lower limbs for users. …”
Get full text
Article -
591
RESEARCH ON THE WELD FATIGUE STRENGTH OF FRAME BASED ON MULTI-AXIS THEORY
Published 2022-01-01Subjects: Get full text
Article -
592
Improved least mean square algorithm based in satellite multi-beamforming
Published 2017-10-01Subjects: Get full text
Article -
593
Experiment Research of the Velocity Loss of Multi-wedge Belt Drive System
Published 2015-01-01“…Aiming at the problems of velocity loss of multi-wedge belt drive system in the process of operation,the multi-wedge belt drive speed loss test bench of two same size pulleys is established,the influences of the load torque,input speed,belt pre-tension,pulley diameter and belt length on belt velocity loss are obtained by using the multi-wedge belt drive test bench.The results show that increase the system load torque,reduce the input speed,belt pre-tension,pulley diameter and belt length,the multi-wedge belt drive velocity loss will be increased.The experimental study is conducted based on the multi-wedge belt drive system of key parameters,the influence of relevant parameters on system velocity loss is got,it can provide a certain reference for optimization design of the follow-up multi-wedge belt drive system.…”
Get full text
Article -
594
Band Selection Algorithm Based on Multi-Feature and Affinity Propagation Clustering
Published 2025-01-01“…A similarity matrix is then constructed by integrating multi-feature information. The AP algorithm clusters the bands of the hyperspectral images to achieve effective band dimensionality reduction. …”
Get full text
Article -
595
Research on active defense based on multi-stage cyber deception game
Published 2020-08-01“…In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber attack and defense was considered deeply by constructing a multi-stage cyber deception game model,and the dynamic analysis and deduction of the multi-stage cyber attack and defense was realized by considering the attenuation of cyber deception signals.A solution for multi-stage cyber deception game equilibrium was improved based on analysis of cyber attack and defense,and an optimal algorithm for selecting cyber deception defense strategies was designed.The effectiveness of the model is verified by simulations.The rules of multi-stage cyber deception games are summarized based on the results,which can provide effective guidance for the research on cyber active defense.…”
Get full text
Article -
596
Volume-hiding encrypted multi-map scheme based on hierarchical structure
Published 2024-01-01“…The volume-hiding encrypted multi-map (EMM) scheme is able to prevent attackers from inferring plaintext through the volume leakage, but existing solutions have problems with large storage and search computational costs.Based on the characteristic that the volume of the searched data often follows Zipf’s law, a hierarchical volume-hiding EMM scheme was proposed.Compared to the plain scheme that filled all keys’ volumes equally, converting the filling of the overall data into the filling of multiple sub-data blocks could reduce storage costs, and also achieved constant level complexity query overhead.Security analysis shows that the proposed scheme can achieve hidden matching volume without loss of query results.Simulation results show that compared with the most efficient scheme XorMM, the proposed scheme can increase the storage overhead by 10%, reduce the search computing overhead by 90%, and significantly improve the search efficiency.…”
Get full text
Article -
597
Evaluation of multi-source precipitation products for monitoring drought across China
Published 2025-01-01Subjects: “…multi-source precipitation…”
Get full text
Article -
598
Research and design of multi-tenant scheme for Kubernetes container cloud platform
Published 2020-09-01Subjects: “…multi-tenant…”
Get full text
Article -
599
An Inquiry into Inferior and Superior Role Portrayals in Multi-racial Television Advertisements
Published 2022-11-01Subjects: Get full text
Article -
600
Research on multi-user identity recognition based on Wi-Fi sensing
Published 2024-03-01Subjects: Get full text
Article