Showing 16,261 - 16,280 results of 29,723 for search 'Winaq~', query time: 1.80s Refine Results
  1. 16261

    High resistance botnet based on smart contract by Hao ZHAO, Hui SHU, Fei KANG, Ying XING

    Published 2021-08-01
    “…The development and application of blockchain technology makes it possible to build a more robust and flexible botnet command and control channel.In order to better study this type of potential new botnet threats, a highly confrontational botnet model based on blockchain smart contracts-SCBot was proposed.The SCBot model adopts a hierarchical hybrid topology structure, builds a command transmission channel based on smart contracts at the zombie subnet layer, and establishes a credibility evaluation mechanism to determine the authenticity of nodes, and enhances the confrontation of the network from the two major levels of traffic and terminals.The construction of small botnet clusters were simulated, comparative experiments on SCBot's command transmission efficiency and robustness were conducted, and its feasibility in the real environment from the perspective of economic costs was analyzed.Finally, a brief analysis and discussion of the defense strategy of this type of botnet were given.…”
    Get full text
    Article
  2. 16262

    Entre censure politique et domination masculine : représentations des sportives olympiques dans les biopics chinois (1981-2022) by Siyao Lin

    Published 2024-04-01
    “…Secondly, a figurative analysis will highlight the narrative strategies that limit characters to the role of “good daughters of the nation” in international competitions. Finally, a study of athletes from ethnic minorities will provide insight into the multiple power dynamics and the metaphor of the Olympic Games in political propaganda.…”
    Get full text
    Article
  3. 16263

    A method of vulnerability assessment for power communication network based on mechanical model by Yaosheng WANG, Yingmin ZHANG, Chang WANG

    Published 2019-01-01
    “…The logical distance of the links between nodes was obtained by the gravitational formula, and the vulnerability of the communication network was measured by the interval of logical distance. Finally, MATLAB was used to establish a model for simulation calculation, it is verified that the method can analyze and evaluate the vulnerability of the service link of the power communication network in real time and accurately.…”
    Get full text
    Article
  4. 16264

    Modeling of mechanical behavior of cork in compression by Youns Saadallah

    Published 2020-07-01
    “…Cork shows stress-strain curves, typical of cellular materials, characterized by an elastic slope followed by an important plateau corresponding to buckling of cells; and finally hardening due to the densification of the material. …”
    Get full text
    Article
  5. 16265

    Ethnographie d’un film commémoratif by Isabelle Becuywe

    Published 2014-09-01
    “…Two ethnologists were thus made responsible for producing an exhibition in less than six months. This finally resulted in a 20-minute film. Looking at the technical and ethical issues that have emerged throughout the making of the film, this paper presents the different steps and problems we faced. …”
    Get full text
    Article
  6. 16266

    Ciudades y anti-ciudades en el fin de siglo brasileño: contagio y locura colectiva en Os sertões by Javier Uriarte

    Published 2015-06-01
    “…Here I discuss some of the European sources that molded Euclides’ perspective, and I rethink the concepts of contagion and collective madness. Finally, I focus my analysis on the representation of Canudos as the reign of disorder and of the masses, as an aberrant and unthinkable city.…”
    Get full text
    Article
  7. 16267

    Cooperative game based bandwidth allocation mechanism live migration of multiple virtual machines by Yong CUI, Yu-song LIN, Run-zhi LI, Zong-min WANG

    Published 2016-04-01
    “…Under many scenarios, multiple virtual machines in the same server need to be moved online concurrently.Since live migration algorithm utilizes bandwidth as more as possible to send data, there is a bandwidth competition among the concurrent migration processes, which cannot guarantee the optimal allocation for the bandwidth and finally degrades the overall performance of the parallel live migration. …”
    Get full text
    Article
  8. 16268

    L’industrie lithique magdalénienne du gisement de plein-air de la Corne-de-Rollay (Couleuvre, Allier) : entre respect des normes et variabilité des chaînes opératoires by Raphaël Angevin

    Published 2011-01-01
    “…This consideration invites us to reconsider the phenomenon of the "production lines ramification" (Bourguignon et al. 2004), with different operative schemes able to meet similar production objectives, but established at distinct time scales. Finally, the chrono-cultural attribution of this industry is discussed.…”
    Get full text
    Article
  9. 16269

    Robustness Analysis of Control Laws in Complex Dynamical Networks Evoked by Deviating Argument by Biwen Lia, Jingjing Huang, Donglun Wang

    Published 2022-01-01
    “…In comparison with previous research findings, robustness, deviating argument, and control laws are all considered in this study, which enhances the previous findings. Finally, two emulation examples verify the validity of the analysis.…”
    Get full text
    Article
  10. 16270

    Method of short text strategy mining based on sub-semantic space by Yang SUN, Li SU, Xing ZHANG, Fengsheng WANG, Haitao DU

    Published 2020-03-01
    “…To solve the problem of identifying short text data accurately,a method of short text strategy mining based on sub-semantic space was proposed.Firstly,semantic space technology was used to solve the problem of “vocabularygap” and “data sparseness” in short text analysis.Then,based on clustering algorithm,the semantic space was divided into several sub-semantic spaces,and association rules were mined in the sub-semantic space,which improved the efficiency and quality of strategy generation.Finally,binary tree was used to merge strategies and generate the simplest strategy set.Experiments show that compared with the traditional classification model,the accuracy rate of the strategy set generated by the proposed scheme can achieve 85% when the false positive rate is 6.5%.In the processing of illegal short messages,using this technology to mine potential policy sets has strong coverage ability,high accuracy and strong practicability.…”
    Get full text
    Article
  11. 16271

    Impedance Reshaping Strategy for Battery Energy Storage Systems Based on Partial Power Conversion by Ming Li, Yucheng Wu, Xiangxin Xi, Haibo Liu, Baizheng Xu, Long Jing

    Published 2025-01-01
    “…This targeted approach significantly improves the stability of the system while ensuring ease of implementation and maintaining high reliability. Finally, the experimental results validate the theoretical analysis.…”
    Get full text
    Article
  12. 16272

    Review of the Development of Low Earth Orbit Satellite Communication for Smart High-Speed Railway by Zhaoyang SU, Liu LIU, Jiachi ZHANG, Tao ZHOU, Wei LIN, Yiqun LIANG

    Published 2023-09-01
    “…Low-earth orbit satellites have the advantages of wide bandwidth, low latency, and large coverage, making them very suitable as a supplement to ground cellular networks.Low-earth orbit satellites can meet the requirements of smart high-speed railway full line coverage and seamless connection, which helps to build an integrated communication network between ground and space.Considered the shortcomings of the current railway mobile communication network, the application and key technologies of low earth orbit satellites in smart high-speed railway were studied.Firstly, the communication requirements of smart high-speed railway were analyzed, and then the development status of railway satellite communication at home and abroad were introduced.Finally, the key technologies and challenges of low earth orbit satellite application in the field of smart high-speed rail were discussed from the aspects of propagation characteristics, physical layer parameters, beam handover, and resource management.…”
    Get full text
    Article
  13. 16273

    Fault Diagnosis of Rolling Bearing based on MEEMD-DHENN by Wang Jinrui, Xie Lirong, Wang Zhongqiang, Niu Yongchao

    Published 2018-01-01
    “…The DHENN network model is constructed to recognize the fault type,getting the best combine of the double hidden neural network. Finally,compare EMD-DHENN and MEEMD-ENN,the result show that the proposed MEEMD-DHENN method has a high accuracy rate of 100% and only need 26 steps.…”
    Get full text
    Article
  14. 16274

    Purification of Anthocyanins with o-Dihydroxy Arrangement by Sorption in Cationic Resins Charged with Fe(III) by Araceli Castañeda-Ovando, Carlos Andrés Galán-Vidal, Elizabeth Contreras-López, Ma. Elena Páez-Hernández

    Published 2014-01-01
    “…The purification procedure begins with the formation of a metal-anthocyanin complex (Cy-3-glc-Fe) which was optimal at pH 5, followed by a NaOH 0.1 M elution process in order to eliminate anthocyanins without o-dihydroxy arrangement, sugars, and organic acids. Finally, the pure anthocyanin is obtained by adding HCl 0.1 M which breaks the metal-anthocyanin complex.…”
    Get full text
    Article
  15. 16275

    Martin Codax: a história que a música conta by Manuel Pedro Ferreira

    Published 2019-03-01
    “…An excursus explores differences between cantigas II and III and the remaining, and the metrics of the latter, with reference to a recent work by Stephen Parkinson and Rip Cohen; a new musical edition is proposed for these two (and also, in passing, for cantiga V). Finally, those stylistic aspects that in the Vindel MS may betray an earlier tradition, in contrast to those that can be attributed to the artistic initiative of Galician jongleurs, are tentatively identified.…”
    Get full text
    Article
  16. 16276

    Kinematics, Singularity and Workspace Analysis of a Novel 3T Parallel Mechanism Based on SKC by Zhao Yi'nan, Shen Huiping, Lu Chenfang, Huang Xiaoping

    Published 2023-07-01
    “…Then, according to the singularity analysis method based on SKC theory, the first and second kind of singular configurations in each SKC are analyzed. Finally, the task workspace with the optimal internal velocity transmission factors index of the mechanism is analyzed and selected. …”
    Get full text
    Article
  17. 16277

    Application-oriented resource matching model based on trust for internet-based virtual computing environment by Chun-ge ZHU, Xin-ran LIU, Yi-xian YANG, Hong ZHANG

    Published 2013-09-01
    “…In order to solve the problem of reasonable resource s ing in the virtual computing environment (iVCE),a resource matching model,based on trust “resource sliding window” model,was proposed.Firstly,the resources were classified in advance by their static properties.Then the resource nodes were evaluated by a trust model based on the time window and Bayesian algorithm,and the evaluated results as well as the resource load were fused to determine the levels of the dynamic real-time performance.Finally,the scheduling resources were allocated according to the comprehensive assessment of the static and dynamic properties of the resource nodes.The proposed model provides a basis of scheduling strategy for different resources with different tasks and attributes,thus achieving the goal of “proper resources’ serving proper tasks”.Simulation results show that,compared the previous scheduling algorithm,the proposed model has better performance in the success rate of task execution and the rate of resource utilization.…”
    Get full text
    Article
  18. 16278

    Lo nuevo del movimiento social internacional por otra globalización by José M. Aranda Sánchez

    Published 2005-01-01
    “…A partir de las grandesmovilizaciones de Seattle a finales de 1999, lasreuniones en oposición a la OrganizaciónMundial de Comercio y la institución del díade Acción Global de los Pueblos en 1998 enSuiza, la constitución del movimiento de laAsociación por una Tasa a las TransaccionesFinancieras Especulativas para la Ayuda a losCiudadanos (Attac) y, desde 1999, la instalaciónde El otro Davos, así como laconformación de la Caravana Intercontinentalde Solidaridad y Resistencia, ha idoconstruyéndose un movimiento socialinternacional que lucha por otro mundoposible, lo que ha acumulado una importantefuerza social crítica del neoliberalismo. …”
    Get full text
    Article
  19. 16279

    Evaluation Index System Construction of High-Quality Development of Chinese Real Enterprises Based on Factor Analysis and AHP by Jiawei Wang, Xiaoxuan Gao, Ruhai Jia, Lisan Zhao

    Published 2022-01-01
    “…Meanwhile, there are obvious contrasts in the high-quality development index of real enterprises in industries and regions. Finally, we put forward some related policy recommendations, such as enhancing policy relevance, insisting on innovative development, and increasing financial sustainability.…”
    Get full text
    Article
  20. 16280

    Research on the Design and Construction Technology of Double Strand Chain Transmission of Escalator by Yao Zhenqun, Xie Chaoyang, Li Xueyong

    Published 2020-03-01
    “…Taking the reconstruction of 8 escalators in Jinan Guihe Shopping Center as an example,the design method and reconstruction technology of double strand chain transmission of escalator is elaborated. …”
    Get full text
    Article