Showing 16,661 - 16,680 results of 29,723 for search 'Winaq~', query time: 1.92s Refine Results
  1. 16661

    Survey on Data Analysis in Social Media: A Practical Application Aspect by Qixuan Hou, Meng Han, Zhipeng Cai

    Published 2020-12-01
    “…After that, we present the impacts of such applications in three different areas, including disaster management, healthcare, and business. Finally, we list existing challenges and suggest promising future research directions in terms of data privacy, 5G wireless network, and multilingual support.…”
    Get full text
    Article
  2. 16662

    Mobile malware traffic detection approach based on value-derivative GRU by Hanxun ZHOU, Chen CHEN, Runze FENG, Junkun XIONG, Hong PAN, Wei GUO

    Published 2020-01-01
    “…For the dramatic increase in the number and variety of mobile malware had created enormous challenge for information security of mobile network users,a value-derivative GRU-based mobile malware traffic detection approach was proposed in order to solve the problem that it was difficult for a RNN-based mobile malware traffic detection approach to capture the dynamic changes and critical information of abnormal network traffic.The low-order and high-order dynamic change information of the malicious network traffic could be described by the value-derivative GRU approach at the same time by introducing the concept of “accumulated state change”.In addition,a pooling layer could ensure that the algorithm can capture key information of malicious traffic.Finally,simulation were performed to verify the effect of accumulated state changes,hidden layers,and pooling layers on the performance of the value-derivative GRU algorithm.Experiments show that the mobile malware traffic detection approach based on value-derivative GRU has high detection accuracy.…”
    Get full text
    Article
  3. 16663

    Multiple Criteria Decision Making Based on Probabilistic Interval-Valued Hesitant Fuzzy Sets by Using LP Methodology by M. Sarwar Sindhu, Tabasam Rashid, Agha Kashif, Juan Luis García Guirao

    Published 2019-01-01
    “…Furthermore these weights are employed in the aggregation operators of PIVHFSs recently developed. Finally, the LP methodology and the actions are then applied on a certain multiple criteria decision making (MCDM) problem and a comparative analysis is given at the end.…”
    Get full text
    Article
  4. 16664

    Fault Detection Filter Design of Polytopic Uncertain Continuous-Time Singular Markovian Jump Systems with Time-Varying Delays by Yunling Shi, Xiuyan Peng

    Published 2020-01-01
    “…The reduced-order fault detection filter (FDF) can not only meet the fault detection accuracy requirements of complex systems but also improve the fault detection efficiency. Finally, a DC motor and an illustrative simulation example are given to verify the feasibility and effectiveness of the proposed algorithms.…”
    Get full text
    Article
  5. 16665

    Implementation of HACCP Management System in a Cake Manufacturing Company in Dhaka, Bangladesh: A Case Study by Md. Fahad Jubayer, Md. Sajjad Hossain, Md. Al-Emran, Md. Nasir Uddin

    Published 2022-01-01
    “…The critical control points were determined by answering the questions in the decision trees. Finally, the HACCP control chart was created to include critical limits, monitoring, and corrective actions as the components of several HACCP principles. …”
    Get full text
    Article
  6. 16666

    Side-Alternating Vibration Training Improves Muscle Performance in a Patient with Late-Onset Pompe Disease by Aneal Khan, Barbara Ramage, Ion Robu, Laura Benard

    Published 2009-01-01
    “…There were no elevations in serum creatine kinase or lactate. This is the first report, to our knowledge, of a performance improvement in a patient with Pompe disease using SAVT.…”
    Get full text
    Article
  7. 16667

    Numerical Analysis of the Transient Thermal Stress Intensity Factors in Cylinders Containing an External Circumferential Semi-Elliptical Crack by Majid Jamal-Omidi, Seyed Mehdi Nabavi, Mehrdad Aghanavehsi

    Published 2023-02-01
    “…Also, the thermal stress results in steady-state are compared to the existing analytical data and, excellent agreement is achieved. Finally, transient thermal stress intensity factors are presented for different values of cylinder radius ratio and various relative depths and aspect ratios of the crack.…”
    Get full text
    Article
  8. 16668

    Gear Fault Diagnosis Method Based on Deep Transfer Learning by Liu Shihao, Wang Xiyang, Gong Tingkai

    Published 2023-05-01
    “…Secondly, pre-trained VGG16 is used to extract Hilbert-Huang spectrum image features of gears under varying loads and under various health conditions. Finally, the global average pooling layer is used to replace partial full connection layer of VGG16 model for classification output. …”
    Get full text
    Article
  9. 16669

    RESEARCH ON THE CALCULATION MODEL OF DENT WITHOUT CONCAVE ANGLE ON OIL AND GAS PIPELINE by LI ChengBing, DANG SiHong

    Published 2017-01-01
    “…Then calculation model of dents without concave angle—hoop stick model is presented,which is verified by Finite Element simulating the actual dimension.Finally,influence of the stick parameters to result of the dent simulation is studied. …”
    Get full text
    Article
  10. 16670

    Experimental Investigation of Impact Response of RC Slabs with a Sandy Soil Cushion Layer by Jianli Wu, Guotao Ma, Zhenhua Zhou, Xuefeng Mei, Xiewen Hu

    Published 2021-01-01
    “…In addition, the attenuation rate of the impact force acting on the cushion layer increased exponentially with the increase in the cushion layer thickness, and the peak impact force could be attenuated by approximately 70% at a thickness of 0.6 m. Finally, the failure process and failure modes of the RC slabs were investigated.…”
    Get full text
    Article
  11. 16671

    Real-Time Resource Allocation Algorithm for the Quasi-Two-Dimensional Mobile Delay/Disrupt Tolerant Networking by Ying Wang, Yonghui Zhang

    Published 2013-06-01
    “…Therefore the information matrix of access routers and quasi-two-dimensional access bandwidth constraints were designed based on predictable environment of train mobile network, and then an approximation algorithm with O(n) algorithm complexity, based on utility differential, was proposed to meet the real-time applications. Finally simulation showed that call-drop-rate in handover and new call-block-rate only increase by about 1/4, compared with that of the optimized-algorithm, but calculation time decrease down to its 36.99%. …”
    Get full text
    Article
  12. 16672

    Research on AMT Without Synchronizer Active Synchronization Control Strategy of Hybrid Electric Vehicles by Ye Wei, Du Changqing, Gongye Xiangyu, Zhao Yifan

    Published 2024-09-01
    “…The simulation results show that the synchronization time is reduced by 21.42% during the shift process, the maximum impact is reduced by 24.88%, and the entire shift time is reduced by 18%. Finally, the control strategy proposed in this research was validated in real-time using the dSPACE semi physical simulation platform.…”
    Get full text
    Article
  13. 16673

    Flexible micromachined ultrasound transducers (MUTs) for biomedical applications by Sanjog Vilas Joshi, Sina Sadeghpour, Nadezda Kuznetsova, Chen Wang, Michael Kraft

    Published 2025-01-01
    “…Specifically, the review covers fabrication approaches and compares the performance specifications of flexible PMUTs and CMUTs, including resonance frequency, sensitivity, flexibility, and other relevant factors. Finally, the review concludes with an outlook on the challenges and opportunities associated with the realization of efficient MUTs with high performance and flexibility.…”
    Get full text
    Article
  14. 16674

    MHSDN: A Hierarchical Software Defined Network Reliability Framework design by Zhengbin Zhu, Qinrang Liu, Dongpei Liu, ChenYang Ge, Chong Wang

    Published 2023-01-01
    “…Simultaneously, the attack surface measurement of MD is innovatively proposed, further improving the security and usability measurement standards of the MD system. Finally, to speed up detection and reduce defence cost of DDoS, this research proposes the Random Forest Feature Extract (RFFE) and tolerable switch migration. …”
    Get full text
    Article
  15. 16675

    A differentially-private mechanism for multi-level data publishing by Wen-jing ZHANG, Hui LI

    Published 2015-12-01
    “…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
    Get full text
    Article
  16. 16676

    VIRTUAL MANUFACTURING AND SIMULATION ANALYSIS OF SPIRAL BEVEL GEAR BASED ON CURVATURE ADJUSTMENT by WANG XueJun, WANG ZhongHou, LI Yan, DIAO XinWei, LIU XiaoFeng

    Published 2022-01-01
    “…Then, according to the analysis results of the cutting model, the curvature and node offset of the tooth surface are calculated for contact area adjustment. Finally, the grinding wheel section is designed according to the cutter section and the offset of the tooth surface, which is called in the virtual grinding. …”
    Get full text
    Article
  17. 16677

    Optimization of Bus Bridging Service under Unexpected Metro Disruptions with Dynamic Passenger Flows by Jiadong Wang, Zhenzhou Yuan, Yonghao Yin

    Published 2019-01-01
    “…The NSGA-II algorithm is used for the solution. Finally, we apply the proposed model to Shanghai Metro to access the effectiveness of our approaches in comparison with the current bridging strategy. …”
    Get full text
    Article
  18. 16678

    Research progress of ion exchange selective electrodialysis by HUANG Hanwen, FENG Ling, TIAN Binghui

    Published 2024-12-01
    “…On this basis, the development status of IXED and ISED process structures and technologies was summarized, and the research progress of ISED technology in the direction of ion separation and recovery in groundwater and industrial wastewater was discussed and analyzed. Finally, the future development direction of selective salt separation by ISED technology was prospected from three aspects of resin,membrane material and operation mode.…”
    Get full text
    Article
  19. 16679

    Raphaëlle Décloître, Le récit allégorique de la fin du Moyen Âge : poétique d’un effacement inévité by Raphaëlle Décloître

    Published 2023-02-01
    “…If the study of the last manifestations of a genre requires, in addition to focusing on poetic considerations, placing late works in literary history (to understand their state of posterity and finality), it seems that, in the case of the last allegorical narratives, the poetics of the texts is revealing of their positioning: beyond the cultural upheavals of the turn of the 16th century, the peaceful relationship of these works to their filiation seems to have encouraged little renewal of the practice.…”
    Get full text
    Article
  20. 16680

    Intelligent planning method for cyber defense strategies based on bounded rationality by Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN

    Published 2023-05-01
    “…Considering that network defense subjects were usually resource-constrained, an intelligent planning and au-tonomous implementation of network defense strategies under bounded rationality was studied considering the concept of intelligent confrontation.First, attack graph, general knowledge and domain-specific knowledge were fused to construct a network defense security ontology.On that basis, knowledge reasoning was utilized to recommend security defense strategies to better adapt to the security needs of protected network information assets and current attack threats.Finally, an autonomous planning and implementation of defense strategies was achieved under the constraints of limited network security defense resources and dynamic changes of network information assets with the help of bounded rationality.The example shows that the proposed method is robust under dynamic attacks.The experiments show that the defense effec-tiveness is improved by 5.6%~26.12% compared with existing game theory and attack graph-based methods against a typical APT attack.…”
    Get full text
    Article