Showing 821 - 840 results of 54,221 for search 'Methil~', query time: 4.73s Refine Results
  1. 821
  2. 822

    Privacy-preserving trajectory similarity computation method by Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE

    Published 2022-11-01
    “…To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.…”
    Get full text
    Article
  3. 823
  4. 824

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  5. 825

    Advances in Quantitative Analytical Methods for Solid Drugs by Yue Tao, Yuhan Gao, Baoxi Zhang, Kun Hu, Yifei Xie, Li Zhang, Shiying Yang, Yang Lu

    Published 2024-12-01
    “…In this paper, the quantitative analysis methods of polymorphs and pharmaceutical cocrystals are reviewed, the advantages and disadvantages of various methods are analyzed mainly from three types of techniques, namely, X-ray diffraction, spectroscopy, and thermal analysis, and the specific applications of various methods are commented on through examples. …”
    Get full text
    Article
  6. 826

    Sampling method for IDS in high bandwidth network by NING Zhuo1, GONG Jian1, GU Wen-jie1

    Published 2009-01-01
    “…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
    Get full text
    Article
  7. 827

    Research and Application of the Solving Method for Robotic Workspace by He Jiawei, Ping Xueliang, Li Zhaoyang, Jiang Yi

    Published 2015-01-01
    “…For the solution of the robotic workspace,on the basis of existing research methods,a new solution method which combines the advantage of Monte- Carlo method with Matlab simulation modeling capability is proposed. …”
    Get full text
    Article
  8. 828

    DEVELOPMENT OF THE INVOLVEMENT OF PERSONNEL BY METHODS OF HORIZONTAL MANAGEMENT by A. Dolgaya

    Published 2017-09-01
    “…Developing the concept of a horizontal control system, the author offers the model of formation of the involvement, which is based on two groups of methods: structuring business on processes and formation of organizational culture, as result of participation style of leadership. …”
    Get full text
    Article
  9. 829

    Nanoformulation of Spirooxindole and Methods for Treating Hepatocellular Carcinoma by Assem Barakat, Fardous F. El-Senduny, Mohammad Shahidul Islam, Abdullah Mohammed Al-Majid, Yaseen A. M. M. Elshaier, Eman A. Mazyed, Farid A. Badria

    Published 2025-01-01
    “…<b>Objectives:</b> This in vivo study introduces a newly developed spirooxindole derivative that is deemed safe and effective as a potential targeted therapy for various cancers. <b>Methods:</b> Extensive in vivo investigations, including histopathology, immunohistochemistry, and molecular biology, validated its potential for further preclinical and clinical exploration, necessitating comprehensive examinations of its bioavailability, pharmacodynamics, and pharmacokinetics. …”
    Get full text
    Article
  10. 830

    The Efficacy of Predictive Methods in Financial Statement Fraud by Mahdi Omidi, Qingfei Min, Vahab Moradinaftchali, Muhammad Piri

    Published 2019-01-01
    “…A number of detective and predictive methods have been used to prevent, detect, and correct FSF, but their practicability has always been a big challenge for researchers and auditors, as they do not address real-world problems. …”
    Get full text
    Article
  11. 831
  12. 832

    Status of the Reactive Extraction as a Method of Separation by Dipaloy Datta, Sushil Kumar, Hasan Uslu

    Published 2015-01-01
    “…This paper principally focuses on reactive extraction that is found to be a capable option to the proper recovery methods.…”
    Get full text
    Article
  13. 833
  14. 834

    Image cluster algorithm of hybrid encoding method by Chun-hui ZHAO, Xue-yuan LI, Ying CUI

    Published 2017-02-01
    “…In the clustering analysis based on swarm intelligence optimization algorithm,the most of encoding method only used single form,and this method might be limit range of search space,the algorithm was easy to fall into local op-timum.In order to solve this problem,image clustering algorithm of hybrid encoding (HEICA) was proposed.Firstly,a hybrid encoding model based on image clustering was established,this method could expand the scope of the search space.Meanwhile,it was combined with two optimization algorithms which improved rain forest algorithm (IRFA) and quantum particle swarm optimization (QPSO),this method could improve the global search capability.In the simulation experiment,it was carried out to illustrate the performance of the proposed method based on four datasets.Compared with results form four measured cluster algorithm.The experimental results show that the algorithm has strong global search capability,high stability and clustering effect.…”
    Get full text
    Article
  15. 835

    Novel method of constructing the zero-sum distinguishers by Le DONG, Wen-ling WU, Shuang WU, Jian ZHOU

    Published 2012-11-01
    “…A novel method of constructing the zero-sum distinguishers for AES-like permutations was proposed by considering the diffusion properties of these permutations,which have the similar construction.The method combined the higher-order integral attack and the higher-order differential attack.Utilizing the selected intermediate-state-structure whose active mode was determined,a higher-order integral path was constructed.Then,a higher-order differential trace was built from the two ends of the integral path.Applying the method,the full-round zero-sum attack on two permutations adopted by the PHOTON family was improved.Besides,a 31.5-round zero-sum distinguisher of the core function of JH hash function was constructed,which entered into the final round of the SHA-3 competition.…”
    Get full text
    Article
  16. 836
  17. 837
  18. 838

    Percutaneous Method of Management of Simple Bone Cyst by O. P. Lakhwani

    Published 2013-01-01
    “…Minimally invasive percutaneous method using elastic intramedullary nail gives benefit of curettage cyst decompression and stabilization of fracture. …”
    Get full text
    Article
  19. 839

    DC‐offset elimination method for grid synchronisation by Yunlu Li, Dazhi Wang, Yi Ning, Nanmu Hui

    Published 2017-03-01
    Subjects: “…DC‐offset elimination method…”
    Get full text
    Article
  20. 840

    PRACTICAL TRAINING METHODS IN economic HIGHER schools by T. Godina, A. Terekhova

    Published 2016-01-01
    “…The article describes the essence of one of the practical teaching methods - the personal-active approach. Providing detailed description of the personal-active approach authors bring forward the need for increasing attention to the practical side of educational process in economic universities and other higher schools- getting skills required in future professional areas.…”
    Get full text
    Article