Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
24301
Research on Financial Accounting of GDP Index Based on Numerical Simulation
Published 2022-01-01“…Secondly, it expounded the concept of green GDP and its accounting scope and theoretical model and pointed out the key problems to be solved in green GDP accounting, such as ecological resource consumption and environmental pollution cost calculation. …”
Get full text
Article -
24302
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01“…This has significant implications for the healthy development of IoT, judicial fairness and personal privacy protection. Experimental and theoretical analysis shows that the proposed scheme not only effectively resists various known attacks, but also performs excellently in terms of communication and computation costs, making it well-suited for IoT.…”
Get full text
Article -
24303
Reliable selfish node detection algorithm for opportunistic networks
Published 2016-03-01“…To address the problem of detection accuracy affected by situations like the omission of node receiving wrong frame and failure of monitoring beyond nodes'communication range during the consideration of the ex ing selfish node detection algorithms in opportunistic networks,a novel and reliable selfish node detection algorithm——RSND algorithm for opportunistic networks was proposed.It employs wrong frame analysis based on cross-layer monitoring mechanism,information excavation based on node encounter and node distance estimation based on RSSI three new mechanisms to eliminate the influence of node's selfishness detection due to wrong frame and failure of monitoring beyond nodes' communication range,improving the reliability of detection.Theoretical analysis verifies the effectiveness of RSND,and simulation results show that RSND can improve selfish node detection accuracy ratio and network throughput at least 6% and 4%,as compared to the existing selfish node detection algorithm based on 2-ACK and watchdog detection algorithm.…”
Get full text
Article -
24304
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01“…As a generalization of the discrete logarithm problem, semigroup action problem has important applications in the design of public-key cryptography.Public-key cryptosystems based on action problem of integer matrix semigroups on the direct product of commutative groups were analyzed.The matrix was regarded as the exponent of direct product elements, and this class of matrix action had the exponential rules similar to group.It was proved that if the matrix action was injective or the number of generators of the hidden subgroup was less than or equal to the square of the order of the matrix, the matrix action problem could be reduced in polynomial time to the hidden subgroup problem of the direct sum of the additive group of the matrices.And it was proved that commutative matrix action problem could also be reduced to hidden subgroup problem of the direct sum of the additive group of the matrices in polynomial time.The cryptosystems based on this class of matrix action problem cannot against quantum attacks.This conclusion has theoretical significance in the design of public-key cryptography against quantum attacks.…”
Get full text
Article -
24305
Research Progress of Treatment of Black and Odorous Water Bodies with Aeration Technology
Published 2022-01-01“…When treating black and odorous water bodies,the current aeration technology is faced with problems such as unscientific aeration design,unreasonable design of parameters such as aeration volume,aeration time,and influence radius,and unclear mechanism of coupling with other technologies.To solve these problems,this paper conducts a literature study of the effect of aeration in reducing common pollutants in water bodies and clarifies the effectiveness of aeration in the treatment of black and odorous water bodies.Then,factors affecting the aeration effect are comprehensively analyzed,and the following conclusions are drawn from the results.Bottom microbubble aeration has significant advantages in effect and energy consumption;clear correlations among aeration intensity,aeration time,and pollutant removal rate are observed;when energy consumption and effect are comprehensively considered,the room for optimization of aeration/non-aeration ratio remains large.Finally,an overview and prospects of the coupling study of aeration and other technologies are presented.This research is expected to provide a theoretical reference for the treatment of black and odorous water bodies with aeration technology.…”
Get full text
Article -
24306
Numerical Simulations of Single-Step Holographic Interferometry for Split-Ring Metamaterial Fabrication
Published 2025-01-01“…Starting from the principle of multi-beam interference, we have theoretically devised a beam configuration consisting of six symmetrically distributed coherent beams to generate two-dimensional microstructures with diverse shapes of unitcells under different polarization combinations. …”
Get full text
Article -
24307
On one type of pedagogical situations: classification and practical aspects
Published 2023-04-01“…On the basis of the previous theoretical research conducted by the author, in this paper the concept of pedagogical situation in described in connection with the concept of pedagogical event. …”
Get full text
Article -
24308
-
24309
Towards edge-collaborative, lightweight and privacy-preserving classification framework
Published 2022-01-01“…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
Get full text
Article -
24310
Detection and Analysis of Tooth Profile Deviation of Cycloidal Gear based on Projection Method
Published 2018-01-01“…Based on the tooth profile equation of cycloid gear and the method of partition approximation,the theoretical coordinate value of the normal direction along the measuring point are obtained,and the tooth profile deviation solving model is established,and the measurement of the tooth profile deviation of the cycloid gear is realized,the factors causing the tooth profile deviation of the cycloid gears are analyzed,the basis for the design and manufacture of the cycloid gears is provided.…”
Get full text
Article -
24311
Tripartite Evolutionary Game Model for Public Health Emergencies
Published 2021-01-01“…Our work enriches an understanding of the governance for the public health emergency and provides theoretical support for the local government and related participants to make proper decisions in public health emergencies.…”
Get full text
Article -
24312
Crystal structure of 3-(4-bromophenyl)-5-methyl-1H-pyrazole, C10H9BrN2
Published 2023-10-01Get full text
Article -
24313
Overview of research progress on blind separation methods for single channel communication signal
Published 2023-08-01“…Significant progress has been made in the research of single channel blind signal separation (SCBSS) methods, as the theoretical and practical applications of SCBSS technology have been continuously improved.A new classification framework for blind signal separation (BSS) of communication signal problems was proposed based on an analysis of a large number of academic research results from both domestic and international sources.The division of SCBSS problems into four levels: multi-signal waveform separation, single-signal waveform separation, multi-signal symbol sequence separation, and single-signal symbol sequence separation was determined by taking into consideration the demand for output results of BSS systems in different application scenarios.Subsequently, the research status of SCBSS methods was systematically reviewed.Furthermore, the current research status of data-driven SCBSS was summarized, and the problems and solutions that needed to be addressed in data-driven SCBSS technology were explored.Finally, several potential research directions for SCBSS were analyzed and forecasted.The aim is to provide a reference for the research and application of SCBSS.…”
Get full text
Article -
24314
La difficile construction de l’identité professionnelle des professeurs-documentalistes de l’enseignement agricole public
Published 2011-03-01“…The double component of the librarian’s work in agricultural education invites us to question the elaboration processes of professional identity. From a theoretical point of view, our analysis leans on two processes contributing to producing professional identities through a common mechanism, the “identity bargaining”. …”
Get full text
Article -
24315
Stability Analysis of a System of Exponential Difference Equations
Published 2014-01-01“…Some numerical examples are given to verify our theoretical results.…”
Get full text
Article -
24316
Integrative metabolomics and transcriptomics profiling reveals differential expression of flavonoid synthesis in Ophiopogon japonicus (L. f.) Ker-Gawl. in adaptation to drought.
Published 2025-01-01“…These findings provide ideas for in-depth analysis of the mechanism of CMD against drought stress, and provide a theoretical basis for breeding high-quality drought-tolerant varieties.…”
Get full text
Article -
24317
Design and Motion Analysis of an Automatic Retractable Manipulator for a Vehicle-mounted Wheelchair
Published 2023-08-01“…The simulation results show that the design of the manipulator is reasonable, the movement is flexible, and it meets the application requirements, which will provide a theoretical basis for the development and application of the prototype.…”
Get full text
Article -
24318
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
Published 2007-01-01“…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
Get full text
Article -
24319
Trajectory design and bandwidth allocation strategy in UAV-assisted MEC network
Published 2023-12-01“…The unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) network, where the UAV can be used as a mobile base station to collect data from the multiple user devices was studied.Since it should satisfy the UAV velocity constraint, the system computation latency constraint, and the system communication latency constraint, a joint scheme of bandwidth allocation and UAV 3D trajectory was proposed to minimize the total energy consumption of the network.The corresponding non-convex optimization problem that is difficult to solve was converted into two sub-optimization problems, which are the UAV 3D trajectory optimization subproblem by fixing bandwidth allocation, and the user equipment bandwidth allocation subproblem by fixing UAV 3D trajectory.Experiments demonstrate that the energy consumption of the proposed algorithm is less than that of the other two typical algorithms.Furthermore, the theoretical basis for solving the limited resource and energy problem in UAV-assisted MEC network was provided.…”
Get full text
Article -
24320
Mujeres en la murga porteña: Arte, territorialidad y empoderamiento
Published 2018-07-01“…The objective of this article was to analyze the murga porteña phenomenon from a double perspective that questions both gender relations and the Right to the City, understood as a macro-legal theoretical construction that puts access and enjoyment of rights in crisis in the capitalist urban context. …”
Get full text
Article