Showing 9,361 - 9,380 results of 10,747 for search 'construction problems', query time: 0.15s Refine Results
  1. 9361

    Privacy risk adaptive access control model via evolutionary game by Hongfa DING, Changgen PENG, Youliang TIAN, Shuwen XIANG

    Published 2019-12-01
    “…Aiming at the problem that in the private sensitive date centralized and opening information systems,a fine-grained and self-adaptive access control model for privacy preserving is desperately needed,thus the balance between privacy preserving and data access utility should be achieved,a rational multi-player risk-adaptive based access control model for privacy preserving was proposed.Firstly,the privacy risk values of access request and requester were formulized by the private information quantity of the requested dataset,and by using Shannon information.Secondly,a risk-adaptive based access control evolutionary game model was constructed by using evolutionary game under the supposing of bounded rational players.Furthermore,dynamic strategies of participants were analyzed by using replicator dynamics equation,and the method of choosing evolutionary stable strategy was proposed.Simulation and comparison results show that,the proposed model is effective to dynamically and adaptively preserve privacy and more risk adaptive,and dynamic evolutionary access strategies of the bounded rational participants are more suitable for practical scenarios.…”
    Get full text
    Article
  2. 9362

    Framing Religious Pluralism as Deviation by Rodina Billah, Mukhammad Zamzami, Wael Hegazy, Muhammad Lutfi

    Published 2025-06-01
    “…The findings show that this account constructs pluralism as a theological and ideological threat, associated with Western liberalism and categorized as a form of kufr. …”
    Get full text
    Article
  3. 9363

    RESEARCH OF DIGITAL CAMERA DYNAMIC RANGE ON THE IMAGING PROCESSING BASIS by M Sutkowski, Ya. N. Saukova

    Published 2017-09-01
    “…The authors propose a method to extend the dynamic range of a digital camera for red, green and blue color channel of intensities by pairing the calibration dependencies, and determine the true brightness and color of a point on the object by calculation.Calibration dependencies (triads) of digital camera for red, green and blue color channels intensities were constructed. These dependences allow determining lower and upper bounds of the dynamic range. …”
    Get full text
    Article
  4. 9364

    A graph algorithm for the time constrained shortest path by Pan Liu, Wulan Huang

    Published 2022-12-01
    “…Highly efficient algorithms for solving the time constrained shortest path problem have been highlighted over the past decades to reduce the cost of vehicle travel in the road network. …”
    Get full text
    Article
  5. 9365

    A matching method for elderly care service personnel with multiple types of service expectations. by Chao Yu, Tianxiang Gao

    Published 2025-01-01
    “…With the rapid growth of the global aging population, the problem of providing for the elderly has become increasingly prominent. …”
    Get full text
    Article
  6. 9366

    Simulation and Analysis of Dynamic Process Distribution Effect of High Voltage IGBT by Wanru SUN, Yaohua WANG, Jiang LIU, Mingchao GAO, Li LI, Cui LI, Ruifen NIE, Rui JIN

    Published 2021-09-01
    “…Therefore, there is a current concentration phenomenon in the dynamic process of the IGBT chip, especially when the chip area is large, the current concentration phenomenon is particularly obvious, which leads to the problem of the dynamic process distribution effect. …”
    Get full text
    Article
  7. 9367

    Path planning algorithm for WCE with joint energy replenishment and data collection based on multi-objective optimization by Zhenchun WEI, Renhao SUN, Zengwei LYU, Jianghong HAN, Lei SHI, Junyi XU

    Published 2018-10-01
    “…Considering limited energy of the wireless charging equipment (WCE) in wireless rechargeable sensor network,an energy replenishment strategy and a data collection strategy are designed.On the basis of these,a path planning model for WCE with functions of joint energy replenishment and data collection based on multi-objective optimization is constructed with two optimization objectives,maximizing the total energy utility of WCE and minimizing the average delay of data transmission of all the sensor nodes in the network.To deal with it,a multi-objective ant colony optimization algorithm based on elitist strategy was proposed,where the state transition strategy and the pheromone updating strategy were improved.Then,the Pareto set was obtained in terms of this multi-objective optimization problem.The parameter setting of ant colony algorithm’s effects on the proposed algorithm were analyzed under 20 sensor nodes.50 groups of contrastive experiments show that the average number of energy utilization obtained by ES-MOAC algorithm is 4.53% higher than that of NSGA-II algorithm.The average number of average delay of all node data transmission obtained by ES-MOAC algorithm is 5.12% lower than that of NSGA-II algorithm.…”
    Get full text
    Article
  8. 9368

    Interactive recommendation of social network communication between cities based on GNN and user preferences by Gao Yanbo, Zhang Lin

    Published 2025-04-01
    “…The method effectively solves the problem of cross-city users’ interest point preference change and constructs a recommendation framework based on interest point heat. …”
    Get full text
    Article
  9. 9369

    Detection method for underwater acoustic communication signals based on adaptive morphological filtering and Hough transform by WANG Yang, SHEN Tongsheng, WANG Tao, QIAO Gang, ZHOU Feng

    Published 2025-07-01
    “…Based on the local density of pixel neighborhoods in time-frequency maps, AMF was constructed, which could dynamically adjust the scale factor of structural element to highlight signal detailed SC. …”
    Get full text
    Article
  10. 9370

    Data poisoning attack detection approach for quality of service aware cloud API recommender system by Zhen CHEN, Wenchao QI, Taiyu BAO, Limin SHEN

    Published 2023-08-01
    “…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
    Get full text
    Article
  11. 9371

    Simulation Analysis of Rainstorm Waterlogging in Shenzhen Dakonggang Area Based on MIKE FLOOD by FANG Yuming, MA Xumin, LIN Kairong, OUYANG Jiana, GUO Weijian, GUO Jing

    Published 2024-05-01
    “…Based on the MIKE FLOOD platform,this paper constructs a rainstorm waterlogging model by coupling the three models of MIKE 11,MIKE URBAN,and MIKE 21 to analyze the waterlogging problem in the Shenzhen Dakonggang area. …”
    Get full text
    Article
  12. 9372

    Stable Cycles and Tori of a System of Three and Four Diffusive Coupled Oscillators by E. A. Marushkina

    Published 2016-12-01
    “…For this case on a stable integral manifold of the system a normal form is constructed for which, in case of three oscillators interact, we can study the simplest stationary states and their phase transformations. …”
    Get full text
    Article
  13. 9373

    Suppression of polarization random noise in a two-dimensional force sensorbased on random forest by J. Liu

    Published 2025-01-01
    “…The polarization random noise signal model is constructed, the polarization random noise signal is enhanced and the polarization random noise power spectrum of a two-dimensional force sensor is calculated. …”
    Get full text
    Article
  14. 9374

    Thermal Characteristics Testing and Analysis of Dry Gear Hobbing Machine on Multivariate Information Fusion by Peng Shengdi, Yang Xiao, Li Benjie, He Lang, Zhang Zhili

    Published 2024-01-01
    “…Aiming at the problem of thermal characteristics of dry-cutting hobbing machine, research on multi-source information fusion test and analysis is carried out. …”
    Get full text
    Article
  15. 9375

    Abnormal Diagnosis Method of Self-Powered Power Supply System Based on Improved GWO-SVM by Ya jie Li, Shao bing Li, Wei Li

    Published 2023-01-01
    “…In order to solve the problem of low abnormal diagnosis rate of self-powered power supply system, an improved grey wolf optimization-support vector machine (GWO-SVM) algorithm combined with maximal information coefficient (MIC) are proposed. …”
    Get full text
    Article
  16. 9376

    On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code by Yury V. Kosolapov

    Published 2020-06-01
    “…In the latter case, this problem is usually solved by forming a profile of a normal behavior and deviation from normal behavior over a predetermined threshold is regarded as an anomaly or an attack. …”
    Get full text
    Article
  17. 9377

    A computational model for bacteriophage ϕX174 gene expression. by Alexis M Hill, Tanvi A Ingle, Claus O Wilke

    Published 2024-01-01
    “…However, several aspects of ϕX174 gene regulation are not fully resolved. Here we construct a computational model for ϕX174 and use the model to study gene regulation during the phage infection cycle. …”
    Get full text
    Article
  18. 9378

    THE CORRELATION OF THE MEDIEVAL EUROPEAN STATE AND LAW IN THE DOCTRINE OF P.A. KROPOTKIN by TIMONIN Anatoly Nikolaevich

    Published 2025-03-01
    “…The actual task of Russian state studies and jurisprudence remains the opposition to the ideological and theoretical constructions of Russian classical anarchism. Purpose: to establish the most significant features and disadvantages of P.A. …”
    Get full text
    Article
  19. 9379

    Système de parenté et acteur : quelles médiations ? by Claire Chatelain

    Published 2018-06-01
    “…Its characteristics are discussed by asking the problem of contextualization and periodization. Two ways of research have been already taken in account. …”
    Get full text
    Article
  20. 9380

    The Role of Value Judgment in Congruent Personalities, Trait Authenticity, and Authentic Leadership by Malcolm North, Julie Nelson, Clifford Hurst

    Published 2019-06-01
    “…Value judgment was measured by two profiles of the Hartman Value Profile (HVP), a judgment profiling instrument delineating the thinking, evaluation, problem-solving patterns, and orientation in 52 indices in personal (HVPII) and social domains (HVPI). …”
    Get full text
    Article