Showing 16,841 - 16,860 results of 29,723 for search 'Winaq~', query time: 2.36s Refine Results
  1. 16841

    Security analysis of security protocol Swift implementations based on computational model by Bo MENG, Xudong HE, Jinli ZHANG, Lili YAO, Jintian LU

    Published 2018-09-01
    “…Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.…”
    Get full text
    Article
  2. 16842

    Strategic Planning of Urban Neighborhoods in Tehran (Case Study: Ferdowsi neighborhood of Region 12) by Amin Shahsavar, mousa kamanroodi, Taher Parizadi, Mahlagha Abolghasempor

    Published 2020-06-01
    “…The transformation of the relationship between mass and space and the changing in population and construction densities due to changes in lifestyle, population growth and ... has caused a major transformation in the spatial structure of the neighborhoods and, finally, amount of social communication and interaction at the local level. …”
    Get full text
    Article
  3. 16843

    Collision analysis of the GMR-2 cipher used in the satellite phone by Ruilin LI, Jiao HU, Chaojing TANG

    Published 2018-02-01
    “…A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2<sup>−8.248</sup>,which is far higher than the ideal collision probability 2<sup>−120</sup>.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.…”
    Get full text
    Article
  4. 16844

    Revocable and traceable key-policy attribute-based encryption scheme by Fang QI, Yanmei LI, Zhe TANG

    Published 2018-11-01
    “…The existing key-policy attribute-based encryption (KP-ABE) scheme can not balance the problem of attribute revocation and user identity tracking.Hence,a KP-ABE scheme which supported revocable and traceable was proposed.The scheme could revoke the user attributes without updating the system public key and user private key with a less update cost.Meanwhile,it could trace the user identity based on decryption key which could effectively prevent anonymous user key leakage problem.The proposed scheme was based on linear secret sharing scheme (LSSS),which was more efficient than tree-based access structure.Based on the deterministic q-BDHE hypothesis,the proposed scheme gave security proof until standard mode.Finally,compared with the existing KP-ABE scheme,the scheme has a shorter public key length,lower computational overhead and realizes the traceability function of user identity based on the revocable attribute,which has obvious advantages.…”
    Get full text
    Article
  5. 16845

    Free Vibration of Rectangular Plates with Porosity Distributions under Complex Boundary Constraints by Yuan Du, Siyu Wang, Liping Sun, Yanhe Shan

    Published 2019-01-01
    “…The kinetic energy and potential energy of plates are also expressed on the basis of first-order shear deformation theory (FSDT) and displacement admissible functions. Finally, the coefficients in the Fourier series which determine natural frequencies and modal shape are derived by means of the Rayleigh–Ritz method. …”
    Get full text
    Article
  6. 16846

    A New Approach to Black Hole Quasinormal Modes: A Review of the Asymptotic Iteration Method by H. T. Cho, A. S. Cornell, Jason Doukas, T.-R. Huang, Wade Naylor

    Published 2012-01-01
    “…We also present some new results comparing the AIM to the WKB method. Finally we emphasize that the AIM is well suited to higher-dimensional generalizations and we give an example of doubly rotating black holes.…”
    Get full text
    Article
  7. 16847

    FORMALIZED EVALUATION OF SCENARIO DEVELOPMENT OF THE NATIONAL ECONOMY IN TERMS OF PENETRATION OF BLOCKCHAIN TECHNOLOGIES IN THE FINANCIAL SECTOR by M. R. Safiullin, A. A. Abdukaeva, L. A. Elshin, M. V. Savushkin

    Published 2020-09-01
    “…Having a very significant potential for transforming the established algorithms for the interaction of financial market participants, it is important to understand what are the boundaries of these changes, what new opportunities are presented by blockchain technologies and, finally, what are the expected consequences for the development of the financial sector itself and the other sectors of the national economic system associated with it. …”
    Get full text
    Article
  8. 16848

    Effect of molding processes on multiaxial fatigue strength in short fibre reinforced polymer by Takahiko Sawada, Hiroshi Aoyama

    Published 2016-10-01
    “…*- Nf curves according to Baskin’s law were almost identical to the injection (n = 26.3) and compression (n = 26.2). We finally confirmed that the multiaxial fatigue life of SFRP could be predicted by using ?…”
    Get full text
    Article
  9. 16849

    Retrait, refus, phobie scolaire : du mal-être au « désarrimage scolaire » by Nadine Demogeot

    Published 2025-01-01
    “…The second axis invites us to return to the central place of the pedagogical relationship and the quality of the teacher-pupil bond as a means of re-anchoring. Finally, in the third part, we mention other ways of supporting these disaffected young people and the research prospects to be explored with a view to prevention.…”
    Get full text
    Article
  10. 16850

    An Asymmetrical Mixed Higher-Order Discontinuous Galerkin Time Domain Method for Electromagnetic Scattering from the Plasma Sheath around a Hypersonic Vehicle by Jirong Guo, Yiping Han

    Published 2023-01-01
    “…In order to calculate the numerical flux between the two types of grids in the discontinuous Galerkin time domain (DGTD) algorithm, an asymmetric high-order element is constructed as a transition unit. Finally, the simulation results in the plasma sphere show that the above method improves the computational accuracy and decreases calculation. …”
    Get full text
    Article
  11. 16851

    A Personalized Travel Route Recommendation Model Using Deep Learning in Scenic Spots Intelligent Service Robots by Qili Tang

    Published 2022-01-01
    “…On this basis, the user’s score on tourism service items is predicted through the model until a personalized recommendation list is generated. Finally, through simulation experiments, the recommendation accuracy and average reciprocal ranking of the proposed algorithm model and the other two algorithms in three different databases are compared and analyzed. …”
    Get full text
    Article
  12. 16852

    The Health and Health Insurance Implications of Climate Change in Sub-Saharan Africa: A Narrative Review by Ousmane Traoré, Jean Brice Tetka

    Published 2025-01-01
    “…Indirectly, climate change affects health through its disruption of food availability and agriculture and through demographic shifts.ConclusionFinally, this narrative review suggests appropriate strategies to combat the health consequences of climate change and to improve universal health insurance systems.…”
    Get full text
    Article
  13. 16853

    Blockchain-based noisy data sharing control protocol by Qingqing XIE, Nianmin YANG, Xia FENG

    Published 2023-10-01
    “…Blockchain provides a trusted channel for information sharing in an untrusted network.However, blockchain ledgers are public and transparent.Hence, the sensitive data stored in plaintext on the blockchain will compromise user privacy.Considering privacy preservation, users are more inclined to provide noisy data.And in different application scenarios, the level of data noise that users need to provide also varies.To this end, a secure, efficient, and searchable noisy data sharing control protocol was proposed based on the blockchain and smart contract technology with the ciphertext policy attribute-based encryption (CP-ABE) algorithm.First, an outsourced CP-ABE algorithm was introduced to reduce the computing burden on the user side.Secondly, smart contract was implemented to perform data search on ciphertext, which could prevent malicious operations by malicious servers.Third, the proposed protocol reduced the data update complexity to O(1), which is friendly to the scenarios with real-time data update.Finally, security analysis and simulation experiments demonstrate the security and feasibility of the proposed protocol.…”
    Get full text
    Article
  14. 16854

    “Fata Morgana”: ancora su strabismi e asincronie by Berardino Palumbo

    Published 2021-06-01
    “…Having very quickly presented those international scenarios, I point out how in them (and partly in the national scene itself) many of the theoretical issues that emerged in those years then led to a radical reconfiguration of current and basic notions, research practices and styles of ethnographic representation; and therefore it is proposed that the discussion, even polemical, should be able to be declined on the level of concrete outcomes of research. Finally, I speculate, just as quickly, on the asynchronisms and arrhythmias between trends operating in the North American and domestic academic-scientific fields, and their possible political implications…”
    Get full text
    Article
  15. 16855

    Chinese medical named entity recognition model based on local enhancement by CHEN Jing, XING Kexuan, MENG Weilun, GUO Jingfeng, FENG Jianzhou

    Published 2024-07-01
    “…Secondly, relative position encoding was combined to perform local attention calculations on sequence segments divided by sliding windows, and local information was fused with global information obtained from BiLSTM through nonlinear computation. Finally, the recognized entity heads and tails were combined by LENER to extract the entities. …”
    Get full text
    Article
  16. 16856

    Finite Element Analysis of Electromagnetic Characteristics of a Single-Phase Permanent Magnet Linear Oscillation Actuator by Hongbin Zhang, Zhaoxin Wang, Minshuo Chen, Zhan Shen, Haitao Yu, Zhike Xu

    Published 2025-01-01
    “…The electromagnetic field of the motor is simulated by two-dimensional and three-dimensional finite element methods, and the accuracy of the calculation results of the electromagnetic characteristics of the cylindrical linear oscillation motor by the two methods is compared and analyzed. Finally, an experimental prototype was developed and the no-load characteristics of the motor were tested using the existing linear motor towing method. …”
    Get full text
    Article
  17. 16857

    Condition Recognition of High-Speed Train Bogie Based on Multi-View Kernel FCM by Qi Rao, Yan Yang, Yongquan Jiang

    Published 2019-03-01
    “…Then, the fuzzy classification coefficient of every channel is calculated after clustering to select the appropriate channels. Finally, the selected channels are used to cluster by MvKFCM and the conditions of HST are determined. …”
    Get full text
    Article
  18. 16858

    Online Bayesian Data Fusion in Environment Monitoring Sensor Networks by Yang Dingcheng, Wang Zhenghai, Xiao Lin, Zhang Tiankui

    Published 2014-04-01
    “…Then, discrete time series models are used to estimate the mean value of the physical phenomenon, and the estimation error is modeled as a Gaussian process. Finally, based on the transition probability of the proposed data transfer channel and the probability of the estimated value transited to specific quantification levels, the level with the maximum posterior probability is decided to be the current value of the physical phenomenon. …”
    Get full text
    Article
  19. 16859

    A Full Stage Data Augmentation Method in Deep Convolutional Neural Network for Natural Image Classification by Qinghe Zheng, Mingqiang Yang, Xinyu Tian, Nan Jiang, Deqiang Wang

    Published 2020-01-01
    “…Furthermore, this framework is universal for any network architecture and data augmentation strategy and therefore can be applied to a variety of deep learning based tasks. Finally, experimental results about image classification on the coarse-grained dataset CIFAR-10 (93.41%) and fine-grained dataset CIFAR-100 (70.22%) demonstrate the effectiveness of the framework by comparing with state-of-the-art results.…”
    Get full text
    Article
  20. 16860

    Power Grid Fault Diagnosis Method Using Intuitionistic Fuzzy Petri Nets Based on Time Series Matching by Mingyue Tan, Jiming Li, Xiangqian Chen, Xuezhen Cheng

    Published 2019-01-01
    “…Then, an intuitionistic fuzzy Petri Nets fault diagnosis model, with an excellent ability to process uncertain information from intuitionistic fuzzy sets, is constructed, and the initial place value of the model is corrected by the timing confidence. Finally, an application of the fault diagnosis model for the actual grid is established to analyze and verify the diagnostic results of the new method. …”
    Get full text
    Article