Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
16841
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01“…Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.…”
Get full text
Article -
16842
Strategic Planning of Urban Neighborhoods in Tehran (Case Study: Ferdowsi neighborhood of Region 12)
Published 2020-06-01“…The transformation of the relationship between mass and space and the changing in population and construction densities due to changes in lifestyle, population growth and ... has caused a major transformation in the spatial structure of the neighborhoods and, finally, amount of social communication and interaction at the local level. …”
Get full text
Article -
16843
Collision analysis of the GMR-2 cipher used in the satellite phone
Published 2018-02-01“…A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2<sup>−8.248</sup>,which is far higher than the ideal collision probability 2<sup>−120</sup>.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.…”
Get full text
Article -
16844
Revocable and traceable key-policy attribute-based encryption scheme
Published 2018-11-01“…The existing key-policy attribute-based encryption (KP-ABE) scheme can not balance the problem of attribute revocation and user identity tracking.Hence,a KP-ABE scheme which supported revocable and traceable was proposed.The scheme could revoke the user attributes without updating the system public key and user private key with a less update cost.Meanwhile,it could trace the user identity based on decryption key which could effectively prevent anonymous user key leakage problem.The proposed scheme was based on linear secret sharing scheme (LSSS),which was more efficient than tree-based access structure.Based on the deterministic q-BDHE hypothesis,the proposed scheme gave security proof until standard mode.Finally,compared with the existing KP-ABE scheme,the scheme has a shorter public key length,lower computational overhead and realizes the traceability function of user identity based on the revocable attribute,which has obvious advantages.…”
Get full text
Article -
16845
Free Vibration of Rectangular Plates with Porosity Distributions under Complex Boundary Constraints
Published 2019-01-01“…The kinetic energy and potential energy of plates are also expressed on the basis of first-order shear deformation theory (FSDT) and displacement admissible functions. Finally, the coefficients in the Fourier series which determine natural frequencies and modal shape are derived by means of the Rayleigh–Ritz method. …”
Get full text
Article -
16846
A New Approach to Black Hole Quasinormal Modes: A Review of the Asymptotic Iteration Method
Published 2012-01-01“…We also present some new results comparing the AIM to the WKB method. Finally we emphasize that the AIM is well suited to higher-dimensional generalizations and we give an example of doubly rotating black holes.…”
Get full text
Article -
16847
FORMALIZED EVALUATION OF SCENARIO DEVELOPMENT OF THE NATIONAL ECONOMY IN TERMS OF PENETRATION OF BLOCKCHAIN TECHNOLOGIES IN THE FINANCIAL SECTOR
Published 2020-09-01“…Having a very significant potential for transforming the established algorithms for the interaction of financial market participants, it is important to understand what are the boundaries of these changes, what new opportunities are presented by blockchain technologies and, finally, what are the expected consequences for the development of the financial sector itself and the other sectors of the national economic system associated with it. …”
Get full text
Article -
16848
Effect of molding processes on multiaxial fatigue strength in short fibre reinforced polymer
Published 2016-10-01“…*- Nf curves according to Baskin’s law were almost identical to the injection (n = 26.3) and compression (n = 26.2). We finally confirmed that the multiaxial fatigue life of SFRP could be predicted by using ?…”
Get full text
Article -
16849
Retrait, refus, phobie scolaire : du mal-être au « désarrimage scolaire »
Published 2025-01-01“…The second axis invites us to return to the central place of the pedagogical relationship and the quality of the teacher-pupil bond as a means of re-anchoring. Finally, in the third part, we mention other ways of supporting these disaffected young people and the research prospects to be explored with a view to prevention.…”
Get full text
Article -
16850
An Asymmetrical Mixed Higher-Order Discontinuous Galerkin Time Domain Method for Electromagnetic Scattering from the Plasma Sheath around a Hypersonic Vehicle
Published 2023-01-01“…In order to calculate the numerical flux between the two types of grids in the discontinuous Galerkin time domain (DGTD) algorithm, an asymmetric high-order element is constructed as a transition unit. Finally, the simulation results in the plasma sphere show that the above method improves the computational accuracy and decreases calculation. …”
Get full text
Article -
16851
A Personalized Travel Route Recommendation Model Using Deep Learning in Scenic Spots Intelligent Service Robots
Published 2022-01-01“…On this basis, the user’s score on tourism service items is predicted through the model until a personalized recommendation list is generated. Finally, through simulation experiments, the recommendation accuracy and average reciprocal ranking of the proposed algorithm model and the other two algorithms in three different databases are compared and analyzed. …”
Get full text
Article -
16852
The Health and Health Insurance Implications of Climate Change in Sub-Saharan Africa: A Narrative Review
Published 2025-01-01“…Indirectly, climate change affects health through its disruption of food availability and agriculture and through demographic shifts.ConclusionFinally, this narrative review suggests appropriate strategies to combat the health consequences of climate change and to improve universal health insurance systems.…”
Get full text
Article -
16853
Blockchain-based noisy data sharing control protocol
Published 2023-10-01“…Blockchain provides a trusted channel for information sharing in an untrusted network.However, blockchain ledgers are public and transparent.Hence, the sensitive data stored in plaintext on the blockchain will compromise user privacy.Considering privacy preservation, users are more inclined to provide noisy data.And in different application scenarios, the level of data noise that users need to provide also varies.To this end, a secure, efficient, and searchable noisy data sharing control protocol was proposed based on the blockchain and smart contract technology with the ciphertext policy attribute-based encryption (CP-ABE) algorithm.First, an outsourced CP-ABE algorithm was introduced to reduce the computing burden on the user side.Secondly, smart contract was implemented to perform data search on ciphertext, which could prevent malicious operations by malicious servers.Third, the proposed protocol reduced the data update complexity to O(1), which is friendly to the scenarios with real-time data update.Finally, security analysis and simulation experiments demonstrate the security and feasibility of the proposed protocol.…”
Get full text
Article -
16854
“Fata Morgana”: ancora su strabismi e asincronie
Published 2021-06-01“…Having very quickly presented those international scenarios, I point out how in them (and partly in the national scene itself) many of the theoretical issues that emerged in those years then led to a radical reconfiguration of current and basic notions, research practices and styles of ethnographic representation; and therefore it is proposed that the discussion, even polemical, should be able to be declined on the level of concrete outcomes of research. Finally, I speculate, just as quickly, on the asynchronisms and arrhythmias between trends operating in the North American and domestic academic-scientific fields, and their possible political implications…”
Get full text
Article -
16855
Chinese medical named entity recognition model based on local enhancement
Published 2024-07-01“…Secondly, relative position encoding was combined to perform local attention calculations on sequence segments divided by sliding windows, and local information was fused with global information obtained from BiLSTM through nonlinear computation. Finally, the recognized entity heads and tails were combined by LENER to extract the entities. …”
Get full text
Article -
16856
Finite Element Analysis of Electromagnetic Characteristics of a Single-Phase Permanent Magnet Linear Oscillation Actuator
Published 2025-01-01“…The electromagnetic field of the motor is simulated by two-dimensional and three-dimensional finite element methods, and the accuracy of the calculation results of the electromagnetic characteristics of the cylindrical linear oscillation motor by the two methods is compared and analyzed. Finally, an experimental prototype was developed and the no-load characteristics of the motor were tested using the existing linear motor towing method. …”
Get full text
Article -
16857
Condition Recognition of High-Speed Train Bogie Based on Multi-View Kernel FCM
Published 2019-03-01“…Then, the fuzzy classification coefficient of every channel is calculated after clustering to select the appropriate channels. Finally, the selected channels are used to cluster by MvKFCM and the conditions of HST are determined. …”
Get full text
Article -
16858
Online Bayesian Data Fusion in Environment Monitoring Sensor Networks
Published 2014-04-01“…Then, discrete time series models are used to estimate the mean value of the physical phenomenon, and the estimation error is modeled as a Gaussian process. Finally, based on the transition probability of the proposed data transfer channel and the probability of the estimated value transited to specific quantification levels, the level with the maximum posterior probability is decided to be the current value of the physical phenomenon. …”
Get full text
Article -
16859
A Full Stage Data Augmentation Method in Deep Convolutional Neural Network for Natural Image Classification
Published 2020-01-01“…Furthermore, this framework is universal for any network architecture and data augmentation strategy and therefore can be applied to a variety of deep learning based tasks. Finally, experimental results about image classification on the coarse-grained dataset CIFAR-10 (93.41%) and fine-grained dataset CIFAR-100 (70.22%) demonstrate the effectiveness of the framework by comparing with state-of-the-art results.…”
Get full text
Article -
16860
Power Grid Fault Diagnosis Method Using Intuitionistic Fuzzy Petri Nets Based on Time Series Matching
Published 2019-01-01“…Then, an intuitionistic fuzzy Petri Nets fault diagnosis model, with an excellent ability to process uncertain information from intuitionistic fuzzy sets, is constructed, and the initial place value of the model is corrected by the timing confidence. Finally, an application of the fault diagnosis model for the actual grid is established to analyze and verify the diagnostic results of the new method. …”
Get full text
Article