Showing 101 - 120 results of 740 for search '"second base"', query time: 0.07s Refine Results
  1. 101

    Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks by Haiping Huang, Tianhe Gong, Ping Chen, Guoxia Qiu, Ruchuan Wang

    Published 2015-07-01
    “…The goal of the present work is to provide two novel and secure two-party distance computation protocols based on a semihonest model, the first with aid of a third party and the second based on randomization technique. Both of these protocols can extend the calculated value into a real number field. …”
    Get full text
    Article
  2. 102

    Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station by Mario Stipčević

    Published 2023-11-01
    “…First, I show that the detector-blinding attack was in fact an attack on the receiver’s local entropy source. Second, based on this insight, I propose a modified receiver station and a statistical criterion which together enable the robust detection of any bright-light attack and thus restore security.…”
    Get full text
    Article
  3. 103

    Compound Control of Trajectory Errors in a Non-Resonant Piezo-Actuated Elliptical Vibration Cutting Device by Chen Zhang, Zeliang Shu, Yanjie Yuan, Xiaoming Gan, Fuhang Yu

    Published 2023-10-01
    “…Then, the parameters of the dynamic PI model were identified by using the particle swarm optimization (PSO) algorithm. Secondly, based on the dynamic PI model, a compound control method has been proposed in which the inverse dynamic PI model is used as the feedforward controller for the dynamic hysteresis compensation, while PID (proportion integration differentiation) feedback is used to improve the control accuracy. …”
    Get full text
    Article
  4. 104

    A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-Based Identification by Salem AlJanah, Ning Zhang, Siok Wah Tay

    Published 2021-01-01
    “…First, it presents a generic model derived from an SHome use-case scenario. Secondly, based on the model, it performs a threat analysis to identify possible means of attacks. …”
    Get full text
    Article
  5. 105

    Task Allocation and Utility Distribution Algorithms Based on Nash Bargaining Solution by Ming L. Fu, Lv Q. Chen, Yu J. Wan, De B. Chen

    Published 2021-01-01
    “…To address this issue, the following works are done in this paper: first, based on a task allocation model for self-interested agents and by studying the Nash bargaining solution and the bargaining characteristics of the agents, an efficiency utility distribution algorithm satisfying individual rationality and budget effectiveness is proposed. Second, based on the best response strategy of the self-interested agent, a complex task allocation algorithm for multiple self-interested agents is proposed. …”
    Get full text
    Article
  6. 106

    The Current Development of Structural Health Monitoring for Bridges: A Review by Zhihang Deng, Minshui Huang, Neng Wan, Jianwei Zhang

    Published 2023-05-01
    “…Firstly, the literature on monitoring technology is divided into two categories, sensor technology and computer vision technology, for review. Secondly, based on the obtained monitoring data, the data processing methods including preprocessing, noise reduction, and reconstruction are summarized. …”
    Get full text
    Article
  7. 107

    Mathematical modeling and experimental research on grounding current calculation of converter transformer core by Xiu Zhou, Tian Tian, Peng Wu, Yan Luo, Jin Bai, Ninghui He, Xiuguang Li

    Published 2024-01-01
    “…Firstly, according to the structure characteristics of converter transformer, the analytical modeling of ground current is carried out. Secondly, based on the structure characteristics of oil paper insulation, the equivalent capacitance of converter transformer is calculated. …”
    Get full text
    Article
  8. 108

    Chinese in Minangkabau: A Typological Study of Chinese Ethnicity in Padang City by Aulia Zahra Aulia Aulia Zahra

    Published 2023-12-01
    “…First, based on religion, Chinese Muslims in the ethnic Chinese Muslim community in Padang city are members of the Indonesian Chinese Islamic Association (PITI). Second, based on ethnic similarities.…”
    Get full text
    Article
  9. 109

    Estimating odometry scale and UWB anchor location based on semidefinite programming optimization by Nguyen, Thien Hoang, Xie, Lihua

    Published 2022
    “…Firstly, we present a theoretical analysis of the problem which includes the derivation of Fisher Information Matrix (FIM) and its determinant. Secondly, based on the FIM we provide an evaluation and geometric interpretation of singular configurations. …”
    Get full text
    Journal Article
  10. 110

    Identifikasi Kromosom Dalam Penentuan Jenis Kelamin Tanaman Salak (Salacca zalacca 9Gaetner) Voss) = Chromosomes Identification for Sex Determination on Salacca zalacca (Gaertner)... by Perpustakaan UGM, i-lib

    Published 2002
    “…Odd seed to be male and even seed to be female. Second, based on the seed germination. The seed which showed the "belf" to be female and "non belt" seed to be male. …”
    Article
  11. 111

    Chardh Narrative by mehdi dashti

    Published 2009-11-01
    “…The present paper is an attempt to indicate first, the preference of the two terms of «دﻮـﺧ ﺮـﮔ» and «دﻮـﺧ را», which share the same meaning and have been used in the former six versions (before 850 AH), to the term «دﻮﺧ رو» which has been erratically used in just one version of that era (before 850 AH). Second, based upon the first part, the verse must be dealt with as a conditional case and therefore interpreted. …”
    Get full text
    Article
  12. 112

    A novel speech emotion recognition method based on feature construction and ensemble learning by Yi Guo, Xuejun Xiong, Yangcheng Liu, Liang Xu, Qiong Li

    Published 2022-01-01
    “…Firstly, the acoustic features are extracted from the speech signal and combined to form different original feature sets. Secondly, based on Light Gradient Boosting Machine (LightGBM) and Sequential Forward Selection (SFS) method, a novel feature selection method named L-SFS is proposed. …”
    Get full text
    Article
  13. 113

    Research on the high-accuracy mileage statistics method based on the civil satellite data by Zunmin Liu, Chuijie Yi, Zhihong Liu, Xilong Zhang

    Published 2019-05-01
    “…First, the original trajectory data are preprocessed to eliminate data errors. Second, based on the principle of shape approximation, it is preferred to implement the quadratic B-spline curve to accurately fit the mileage trajectory curve, comparing various curve fitting methods. …”
    Get full text
    Article
  14. 114

    Automatic Analysis Algorithm of Position and Orientation Characteristic Set of Parallel Mechanism based on Neural Network by Wang Gang, Mao Zhiwei, Luo Yufeng, Shi Zhixin

    Published 2018-01-01
    “…First of all,by analyzing the topological structure of parallel mechanism,the essence is summed up. Secondly,based on the neural network theory,the topological structure of parallel mechanism is described and digitized. …”
    Get full text
    Article
  15. 115

    No Planet B: comparative reflections on hydraulic engineering and zoonotic epidemics in the Jordan Valley in Early Neolithic time and Twenty First Century by Shaozeng Zhang, Zhuo Chen

    Published 2023-12-01
    “…The first case is based on existing archaeological studies of the Neolithic town of Jericho about 10,000 years ago and the second based on our ethnographic fieldwork on a Pumped-Storage Hydropower project in construction since 2017. …”
    Get full text
    Article
  16. 116

    The Enlightenment of Indian Institute of Technology: Autonomy, Selection and Practical Education by Jiang Yueying

    Published 2022-01-01
    “…Firstly, a high degree of autonomy and academic freedom ensure a good academic reputation. Secondly, based on rigorous selection and assessment, the IIT students work their way to the top of their profession. …”
    Get full text
    Article
  17. 117

    The Obsession with Measurement and Construction of Possible Futures in Education by Massimiliano Tarozzi

    Published 2023-05-01
    “…The main aim of this paper is to critique the post-positivist epistemological assumptions of so-called Evidence Based Education as well as the neoliberal organisational models whose indiscriminate application to professionals in education robs these roles of professionalism. Secondly, based on the recent UNESCO report on the “Futures of Education”, it intends to discuss the dimension of the future as a key direction of meaning for educational policies and practices, held up as an alternative to anticipatory governance models (Robertson, 2022).…”
    Get full text
    Article
  18. 118

    The Ethical Turn of Emerging Design Practices by Li Zhang

    Published 2023-01-01
    “…First, it introduces technoscience as the catalyst behind this transition, framing the contextual backdrop. Second, based on Jürgen Habermas’s knowledge-interest theory and its tripartite structure, this article focuses on those emerging design practices which deal with ethical and social design, a category that has become especially significant since 2000. …”
    Get full text
    Article
  19. 119

    Opinion formation in multilayer social systems by Chen, Bo

    Published 2017
    “…Firstly, basing on topology structure on Internet, opinion formations are simulated on ER network, WS network and BA network. Secondly, basing on the idea of Weisbuch-Deffuant model particle interaction, the evolution rules of network public opinion are established based on the particularity of network public opinion and the heterogeneity of individual opinion acceptance in single layer social system. …”
    Get full text
    Final Year Project (FYP)
  20. 120

    Two Types of Single Valued Neutrosophic Covering Rough Sets and an Application to Decision Making by Jingqian Wang, Xiaohong Zhang

    Published 2018-12-01
    “…Firstly, the notion of SVN <inline-formula> <math display="inline"> <semantics> <mi>&#946;</mi> </semantics> </math> </inline-formula>-covering approximation space is proposed, and some concepts and properties in it are investigated. Secondly, based on SVN <inline-formula> <math display="inline"> <semantics> <mi>&#946;</mi> </semantics> </math> </inline-formula>-covering approximation spaces, two types of SVN covering rough set models are proposed. …”
    Get full text
    Article