Showing 17,221 - 17,240 results of 29,723 for search 'Winaq~', query time: 1.95s Refine Results
  1. 17221

    基于层次分析—模糊评价的云计算安全评估与对策 by Ai-min YANG, Fang GAO, Min-hua BIAN, Shu-lei YANG

    Published 2016-10-01
    “…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
    Get full text
    Article
  2. 17222

    Design and Construction of Sewage Structures Under High-Level Underground Water Conditions Using theTop-Down Method: A Case Study of Sewage Pumping Station PS2 in Dorood City by Bahador Mirzaei, Abbas Pirayandeh, Hojjat Emami

    Published 2024-08-01
    “…Architectural and structural details for the construction of such structures applying the Top-Down method were then presented in the research. Finally, the efficiency and robustness of the proposed approach in the design and construction of concrete sewage structures exposed to high-level underground water, are demonstrated from the technical and economic perspectives, construction time, costs and safety level.…”
    Get full text
    Article
  3. 17223

    MIMO-Based Forward-Looking SAR Imaging Algorithm and Simulation by Ziqiang Meng, Yachao Li, Shengqi Zhu, Yinghui Quan, Mengdao Xing, Zheng Bao

    Published 2014-01-01
    “…This imaging method can implement range compression, secondary range compression (SRC), and range cell migration correction (RCMC) effectively. Finally, some simulations of point targets and comparison results confirm the efficiency of our proposed algorithm.…”
    Get full text
    Article
  4. 17224

    PREDICTION OF AIRCRAFT NORMAL OVERLOAD EXTREME VALUE BASED ON PEARSON-Ⅲ DISTRIBUTION by LEI XiaoBo, WEN Min, LEI DiYuan, ZHANG XiaMei

    Published 2018-01-01
    “…In consideration that there was not uniform quantitative judge standard on optional curving fitting when fitting real data by P-Ⅲ distribution on the curve-fitting method,Using the maximum membership principle judged curving fitting level according to fuzziness of flight data,and membership function was deduced in detail. Finally through calculation and analysis the conclusions were obtained: it’s scientific and rational that Nzextreme value was conformed with P-Ⅲ distribution from the aspects of mean relative error,maximum error and degree of membership between fitted values and real values,and that membership function seen as optimized objective function was more advantageous than curve-fitting method.…”
    Get full text
    Article
  5. 17225

    Study on Internal Gear Honing Stone Dressing and Gear Honing Technology based on Variable Axis Cross Angle by Xia Lian, Wang Dongling, Yuan Bin, Han Jiang

    Published 2018-01-01
    “…It can be described that the axis cross angle is a function of center distance when honing stone dressing and gear honing. Finally,the simulation shows that the technology can obtain constant contact and cutting parameters between workpiece and honing stone during its life,and the surface structure of the gear will not change. …”
    Get full text
    Article
  6. 17226

    Approximately optimum power allocation based on ergodic capacity for cooperative communication systems by LIN Fei1, LUO Tao1, LU An-qiong1, YUE Guang-xin1

    Published 2009-01-01
    “…Conventional half-duplex amplify-and-forward(AF) method always adopted cooperative communications model regardless the fading state of the channel,which made insufficient use of the degrees of freedom of the system in a way.So,the problem about "when to cooperate" and the optimum allocation of transmitted power were discussed.An exact ergodic capacity formulation and corresponding upper bound were first derived for a two-user AF cooperative communications system.And then an approximately optimum power allocation scheme(AOPA) was proposed by making use of the upper bound as cost function.Whether the AOPA scheme adopting the cooperative model or not based on the comparison about the channel gains of source-to-destination with that of relay-to-destination.Finally,the system per-formances were analyzed with AOPA scheme when the relay moved in terms of the random direction model.Theoretical analysis and simulation results show that the AOPA outperforms the EPA scheme both in ergodic capacity and symbol-error-rate(SER) performance.…”
    Get full text
    Article
  7. 17227

    Research on Forecasting of the Compressor Geometric Variable System Based on the MAE Model by Cunjiang Xia, Yuyou Zhan, Yan Tan, Wenqing Wu

    Published 2023-01-01
    “…We also test the generalizability of our method across different types of aeroengines. Finally, to make our theories more reasonable and convincing, experiments on different aeroengine states, including the transition state and the steady state, are carried out.…”
    Get full text
    Article
  8. 17228

    A Geometry-Inclusive Analysis for Single-Relay Systems by Meng Yu, Jing (Tiffany) Li, Hamid Sadjadpour

    Published 2009-01-01
    “…A capacity contour for DF, the more popular mode of the two, is provided to facilitate the derivation of engineering rules. Finally, a selective single-relay system, which selects the best relay node among a host of candidates according to their locations, is analyzed. …”
    Get full text
    Article
  9. 17229

    Diverse Effects of Phytoestrogens on the Reproductive Performance: Cow as a Model by Izabela Wocławek-Potocka, Chiara Mannelli, Dorota Boruszewska, Ilona Kowalczyk-Zieba, Tomasz Waśniewski, Dariusz J. Skarżyński

    Published 2013-01-01
    “…Phytoestrogens have recently come into considerable interest due to the increasing information on their adverse effects in human and animal reproduction, increasing the number of people substituting animal proteins with plant-derived proteins. Finally, the soybean becomes the main source of protein in animal fodder because of an absolute prohibition of bone meal use for animal feeding in 1995 in Europe. …”
    Get full text
    Article
  10. 17230

    Evaluation and Estimation of Outputs and Inputs in Inverse Data Envelopment Analysis with Interval Data by Hossein Jafari

    Published 2020-11-01
    “…The study aims to describe the methodology and findings of a survey to assess the effectiveness of DEA models in estimating input/output levels, incorporating managerial preferences, and improving efficiency over time.Methodology: This paper reviews DEA models for estimating input/output levels, applying manager or decision-maker preferences, and improving inefficient units over a while. Finally, we have implemented the models obtained in 24 supervisory branches with four input indicators and four indicators in one of the banks, and the results have been presented and interpreted. …”
    Get full text
    Article
  11. 17231
  12. 17232

    Sex hormones and immune regulation in ovarian cancer by Rui Zhao, Wenqin Lian, Qiong Xu

    Published 2024-12-01
    “…Personalized medicine approaches, leveraging biomarkers for predicting treatment response, are considered essential for optimizing patient outcomes. Finally, we address current research gaps and future directions, emphasizing the need for advanced research technologies and novel therapeutic strategies to improve the treatment of ovarian cancer through a better understanding of hormone-immune interactions.…”
    Get full text
    Article
  13. 17233

    Key technologies of symbiotic transmission for 6G Internet of things by Mingjiang WU, Xianfu LEI, Li LI, Xiaohu TANG

    Published 2020-03-01
    “…mMTC (massive machine-type communication) is one of the three major application scenarios of 5G network,but it is highly likely that the truly mature Internet of everything may not be realized until the future 6G network.In order to realize the deep immersive ubiquitous connection network,6G IoT will simultaneously provide all-round services such as high data rate,low latency,high reliability and massive connections.Firstly,the 6G was prospected and the technical challenges of 6G IoT were summarized.Then the existing physical layer transmission technologies of IoT were reviewed.Next,the promising symbiotic transmission technologies for 6G IoT were introduced and discussed,which enable the possibility that active transmission and passive transmission facilitates each other and provide a new solution for 6G IoT transmission.Finally,some possible future research directions were presented for symbiotic transmission in 6G IoT.…”
    Get full text
    Article
  14. 17234

    Geology of Tolstoj quadrangle (H08), Mercury by L. Giacomini, L. Guzzetta, V. Galluzzi, L. Ferranti, P. Palumbo

    Published 2024-12-01
    “…Lineaments include crater and pit rims, and structures. Finally, surface features are subdivided into crater chains or clusters, hollows, faculae, bright and dark material. …”
    Get full text
    Article
  15. 17235

    A Novel Vibration Suppression Method for Welding Robots Based on Welding Pool Instability Evaluation and Trajectory Optimization by Mingtian Ma, Hong Lu, Yongquan Zhang, Zidong Wu, He Huang, Xujie Yuan, Xu Feng, Zhi Liu, Zhangjie Li

    Published 2024-12-01
    “…To enhance the performance of the method, the Particle Swarm Optimization (PSO) algorithm is applied to optimize the joint angular velocity and angular acceleration. Finally, robot welding experiments are designed and conducted. …”
    Get full text
    Article
  16. 17236

    Studies on the RC Beam Strengthened by Using the Exterior-Wrapping U-Shaped Steel Plate and Its Application by Chunli Zhou, Jinkun Sun, Zhaorong Zeng, Jie Liu

    Published 2019-01-01
    “…At the same time, through comparing and analysing the U-shaped steel plate strengthening method and the “angle steel + batten plate” strengthening method, the result that the RC beam strengthened by using the exterior-wrapping U-shaped steel plate has better mechanical performance is drawn. Finally, the application of the exterior-wrapping U-shaped steel plate strengthening method is rationally suggested.…”
    Get full text
    Article
  17. 17237

    The Damage Constitutive Model of Sandstone under Water-Rock Coupling by J. Jiang, Z. M. Hou, K. P. Hou, Y. F. Lu, H. F. Sun, X. D. Niu

    Published 2022-01-01
    “…Based on the energy theory method, the strength criterion of sandstone under the interaction of water and rock is obtained, which is introduced into the statistical damage constitutive model of sandstone considering the interaction of water and rock; thus, a relatively perfect damage constitutive model of sandstone considering the interaction of water and rock is established. Finally, the influence of the number of cycles on the model parameters was further analyzed by analyzing the model parameters and the water-rock coupling test. …”
    Get full text
    Article
  18. 17238

    Efficient and safe auditable mixed-coin service scheme based on blind signature by Kang QIAO, Hongbo TANG, Wei YOU, Haitao LI

    Published 2020-08-01
    “…The mixed-coin service can provide solutions for the privacy problem of blockchain,but it still faces efficiency bottlenecks and security risks.To further improve the efficiency and security protection of the mixed-coin service,an efficient and safe auditable mixed-coin service scheme based on blind signature was proposed.Firstly,this scheme added audit measures.It added an audit blockchain to the traditional mix-coin model to record the behavior of users and mixers,achieving traceability and accountability.Then,this method used elliptic curves algorithm to construct blind signatures instead of blind signature schemes based on bilinear pairs or RSA.Finally,this scheme proposed an auditable blind mix-coin service agreement based on the auditable mix-coin model and the blind signature algorithm based on elliptic curve.Simulation analysis shows that the proposed scheme has six security features,such as auditability and anti-theft attack,while providing privacy protection.Under the same security intensity,the proposed scheme can effectively reduce the computational overhead and storage overhead.…”
    Get full text
    Article
  19. 17239

    Electromagnetic Analysis and Experimental Validation of the LOFAR Radiation Patterns by Paola Di Ninni, Pietro Bolli, Fabio Paonessa, Giuseppe Pupillo, Giuseppe Virone, Stefan J. Wijnholds

    Published 2019-01-01
    “…A simplistic array factor approach has been implemented as well to determine the accuracy in the antenna pattern evaluation with respect to the full-wave approach. Finally, results from an experimental campaign conducted by means of a micro hexacopter system show the reliability of the developed array numerical model.…”
    Get full text
    Article
  20. 17240

    Novel video anomaly detection method based on global-local self-attention network by Jing YANG, Chengmao WU, Liuping ZHOU

    Published 2023-08-01
    “…In order to improve the accuracy of video anomaly detection, a novel video anomaly detection method based on global-local self-attention network was proposed.Firstly, the video sequence and the corresponding RGB sequence were fused to highlight the motion change of the object.Secondly, the temporal correlation of the video sequence in the local area was captured by the expansion convolution layer, along with the self-attention network was utilized to compute the global temporal dependencies of the video sequence.Meanwhile, by deepening the basic network U-Net and combining the relevant motion and representation constraints, the network model was trained end-to-end to improve the detection accuracy and robustness of the model.Finally, experiments were carried out on the public data sets UCSD Ped2, CUHK Avenue and ShanghaiTech, as well as the test results were visually analyzed.The experimental results show that the detection accuracy AUC of the proposed method reaches 97.4%, 86.8% and 73.2% respectively, which is obviously better than that of the compared methods.…”
    Get full text
    Article