Showing 12,721 - 12,740 results of 23,860 for search 'Palyul~', query time: 2.24s Refine Results
  1. 12721

    Robust Signature-Based Copyright Protection Scheme Using the Most Significant Gray-Scale Bits of the Image by Mohammad Awrangjeb

    Published 2012-01-01
    “…Different ways of processing the MSB-plane before calculating the robust signature have been developed. …”
    Get full text
    Article
  2. 12722

    Eco-innovative Activity of Ukrainian SMEs by Nataliya Horin

    Published 2017-12-01
    “…Also, the size of the Eco-innovation Index for Ukraine was calculated. Based on the obtained results, Ukraine is an economy with a low level of eco-innovativeness, so, the study is extremely important.…”
    Get full text
    Article
  3. 12723

    Multi-camera video collaborative analysis method based on edge computing by Zhibo QI, Lei DU, Ru HUO, Fan YANG, Tao HUANG

    Published 2023-08-01
    “…In order to reduce the processing volume of multi-camera real-time video data in smart city scenarios, a video collaborative analysis method based on machine learning algorithms at the edge was proposed.Firstly, for the important objects detected by each camera, different key windows were designed to filter the region of interest (RoI) in the video, reduce the video data volume and extract its features.Then, based on the extracted data features, the same objects in the videos from different cameras were annotated, and a strategy for calculating the association degree value between cameras was designed for further reducing the video data volume.Finally, the GC-ReID algorithm based on graph convolutional network (GCN) and re-identification (ReID) was proposed, aiming at achieving the collaborative analysis of multi-camera videos.The experimental results show that proposed method can effectively reduce the system latency and improve the video compression rate while ensuring the high accuracy, compared with the existing video analysis methods.…”
    Get full text
    Article
  4. 12724

    Sensor-Based Turmeric Finger Growth Characteristics Monitoring Using Embedded System under Soil by Maheswaran Shanmugam, Asokan Ramasamy

    Published 2014-06-01
    “…The experimental work has been tested with five different nodes and the average flex sensor resistance changes in five nodes are calculated. Among the five nodes, nodes II and V were diseased. …”
    Get full text
    Article
  5. 12725

    Game theory based forwarding control method for social network by Fangfang SHAN, Hui LI, Hui ZHU

    Published 2018-03-01
    “…With the rapid development of mobile communication and internet technology,the social network has become one of the mainstream social means used in people’s daily social life.To maintain and strengthen relationships with friends,users may share personal behavior and feelings through social networks.Forwarding these contents may result in privacy leakage.To help publishers make proper data forwarding decision,the benefits of both sides of the forwarding operation were analyzed,and a game theory based forwarding control method for social network was proposed which could effectively prevent dishonest data forwarding operation.By analyzing the benefits of both sides of forwarding operation and considering historical information,the probability of dishonest data forwarding operation was calculated and it was compared with the threshold set by publisher to make the forwarding decision.The procedure and framework of the game theory based forwarding control method was introduced.The benefits of both sides were defined and analyzed.The game play scenario was presented.Some results of experiments are shown to support that the method is effective and it can protect the security of content in social network.…”
    Get full text
    Article
  6. 12726

    Tooth Surface Design and Solid Modeling of Offset Orthogonal Arc Tooth Face Gear by Zhanrong Feng, Lingfeng Gao, Ping Fang, Guangjin Xiong, Chao Luo

    Published 2021-09-01
    “…Based on the differential geometry calculation and gear meshing principle, the equations of the offset orthogonal arc tooth face-gear surfaces are deduced, and the mathematical models of working tooth surface and transition surface are established in Matlab. …”
    Get full text
    Article
  7. 12727

    Analysis of the impact of sports sponsorship by Banco Panamericano: an event study by Márcio Mellaci, Leandro Augusto Petrokas, Rubens Famá

    Published 2012-01-01
    “…We investigated the abnormal returns of the bank’s preferred shares based on the model of Campbel, Lo & Mackinlay (1997). After calculating the normal and abnormal returns, we tested the homogeneity of the variances and normality of the data before applying parametric t-tests. …”
    Get full text
    Article
  8. 12728

    Failure recovery algorithm for LRT and transaction property analysis by Xiao-yong MEI, Chang-qin HUANG, Xiao-lin ZHENG, De-ren CHEN, Shi-xian LI

    Published 2012-04-01
    “…Researchers have worked on recovery strategies of composition transactions,most efforts focus on transaction consistency by backward recovery,compensation is commonly used for backward recovery,which have limitations since the cost of compensation tasks are rather expensive,and the compensation mechanism can not satisfy various requirements of applications.A transaction recovery algorithm was proposed including forward recovery,backward recovery and alternative recovery,which was a formal modeling method based on extended Petri nets,state token,data token and QoS token were introduced to implement relaxed ACID properties of LRT.When failure occurs,terminate dependency point (TDP) and compensation set were calculated dynamically,recovery strategies were added or deleted automatically according to the data flow dependency,control flow dependency and state dependency among tasks.Failure types are generated by log file mining,therefore,failure coordination and recovery are implemented and an executable model which support add/delete failure recovery behavior is constructed seamlessly.…”
    Get full text
    Article
  9. 12729

    Early Fault Diagnosis of Gear Box based on Variational Mode Decomposition and Fast Spectral Kurtosis by Zhao Wei

    Published 2018-01-01
    “…Then,according to the correlation coefficient criterion,the spectral kurtosis is calculated for the components with large correlation coefficient,and the best center frequency and bandwidth are determined by spectral kurtosis graph. …”
    Get full text
    Article
  10. 12730

    THE DETERMINNATION OF RESIDUAL STRESS OF GEAR TOOTH ROOT BASED ON X-RAY TECHNOLOGY by WANG Zhen, HU TianTong, FENG XianZhang, MENG XiangZhi

    Published 2017-01-01
    “…Transverse residual stress of tooth root has significant influence on bending fatigue strength of gears.But given the geometry of gears,using the method of exposing teeth root to complete determination of transverse residual stress at present,it not only destroys the original stress state of material surface,but conflicts with the concept of residual stress measurement by Xray nondestructive.so in order to do not cut gears,which can also more accurately measure transverse residual stress of the gear tooth root,in this paper,through combining with the theoretical analysis and experimental verification method,the relationship of transverse and longitudinal residual stress of the gear tooth root is derived.With the known of Bragg Angle of free stress— θ<sub>0</sub>,the transverse residual stress of Gear tooth root can be calculated by the size of the longitudinal residual stress through the X-ray method measured,so it is convenient to measure the transverse residual stress of gear tooth root.…”
    Get full text
    Article
  11. 12731

    Multi-walled carbon nanotubes modified by polyaniline for the removal of alizarin yellow R from aqueous solutions by Kaiyue Wu, Jingang Yu, Xinyu Jiang

    Published 2018-02-01
    “…Scanning electron microscopy (SEM), Fourier transform infrared (FT-IR) spectroscopy and thermal gravimetric analysis (TGA) were used to characterize the synthesized composites (O-MWCNTs/PANI), and the surface area was calculated by the Brunauer–Emmett–Teller (BET) method. …”
    Get full text
    Article
  12. 12732

    RESEARCH ON FATIGUE CRACK PROPAGATION OF LEAF SPRING UNDER VARIABLE AMPLITUDE LOAD by XIANG YuXia, WU ZhiFei

    Published 2021-01-01
    “…The test results are in good agreement with the model prediction results, which provides a theoretical basis for the calculation of fatigue crack growth rate under variable amplitude load.…”
    Get full text
    Article
  13. 12733

    National Digital Resource Market: Theoretical and Methodological Foundations by I. A. Zubritskaya

    Published 2023-03-01
    “…The systematization of empirical data was carried out and the results of calculating the author's indicators of the supply and demand of digital resources on the national market were analyzed, which made it possible to assess the dynamics of the circulation of digital resources in the scope of goods and services, the share of digital resources in the composition of material costs, the contribution of the domestic information and communication technologies sector to the digital transformation of the branches of the national economy, imported products.…”
    Get full text
    Article
  14. 12734

    Research on Financial Accounting of GDP Index Based on Numerical Simulation by Bo Li

    Published 2022-01-01
    “…Secondly, it expounded the concept of green GDP and its accounting scope and theoretical model and pointed out the key problems to be solved in green GDP accounting, such as ecological resource consumption and environmental pollution cost calculation. Finally, by analyzing the relationship between green GDP and main supporting indicators, the accounting method of GDP indicators based on numerical simulation was proposed, and the accounting result detection model based on the econometric model was given. …”
    Get full text
    Article
  15. 12735

    Analysis model of binary code security flaws based on structure characteristics by Tuan XU, Lei-lei QU, Wen-chang SHI

    Published 2017-09-01
    “…Aiming at the shortcomings of the existing methods to detect the security flaws that have complex structures,a new analysis model and its application method was proposed.First,analysis models based on key information of code structures extracted from path subsets of characteristic element sets that are generated by source code element sets of code security flaws were constructed.Then the analysis model according to the statistical probability of each kind of IR statement was calculated,and the IR code group which matched the feature model was found.Finally,through the translating relation between binary codes and IR codes,various code security flaws of binary program were found out.The analysis models can be applied to both common single-process binary programs and binary parallel programs.Experimental results show that compared with the existing methods,the application of the analysis model can be more comprehensive and in-depth in detecting various types of complex binary code security flaws with higher accuracy.…”
    Get full text
    Article
  16. 12736

    On-Bond Incident Degree Indices of Square-Hexagonal Chains by Tariq A. Alraqad, Hicham Saber, Akbar Ali, Jaya Percival Mazorodze

    Published 2022-01-01
    “…In the present paper, a general expression for calculating any BID index of square-hexagonal chains is derived. …”
    Get full text
    Article
  17. 12737

    For California perennial crops facing climate change, water use stays stable while planting density increases by Molly Sears, Karen M. Jetter, Etaferahu Takele

    Published 2024-11-01
    “…A notable exception is pistachios in the South San Joaquin Valley, which experienced an increase in water applied, with stable yields and planting densities. Our methods of calculating significant trends in water use, including yields and density of orchards, give further insight into the use of water in California agriculture.…”
    Get full text
    Article
  18. 12738

    Reasoning method for predicting crime partner by using intimacy network of bank accounts by Fang LYU, Haibo LU, Wei WANG, Junheng HUANG, Bailing WANG

    Published 2019-12-01
    “…In recent years,research on the law of capital transactions in the case of stakeholder-type illegal financial activities has attracted the attention of researchers.In order to solve the problem of using the bank transaction data to actively discover the abnormal account criminal crime partners,a crime partner prediction method based on the asymmetric intimacy network of the bank accounts was proposed.Firstly,a general network model for bank account transactions was established to embed time-series transaction data into the network structure.Then,using the direct and indirect transaction relationship information of the node,an account asymmetric intimacy calculation method was proposed.Finally,using the asymmetric interaction information of the nodes on the intimate network,the abnormal tendency index of the nodes is obtained.The experimental results on the actual data of the multi-level marketing group show that the crime partner prediction method based on the intimacy network can effectively find potential pyramid shelling members.…”
    Get full text
    Article
  19. 12739

    Performance Analysis of a Five-axis Linkage Hybrid Machine Tool by Caiyou Qin, Juan Huang, Xiaoru Li

    Published 2019-02-01
    “…Finally, the theoretical analysis results are calculated by Matlab. The required machine driving displacement, speed and force is being solved in the case of known machine tool cutting amount. …”
    Get full text
    Article
  20. 12740

    Towards edge-collaborative, lightweight and privacy-preserving classification framework by Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN

    Published 2022-01-01
    “…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
    Get full text
    Article