-
81
SDN security control and forwarding method based on cipher identification
Published 2018-02-01“…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
Get full text
Article -
82
APPLICATION OF WAVELET-TRANSFORM AND PRONY METHOD FOR THE BIOGENIC SIGNALS IDENTIFICATION
Published 2010-08-01Get full text
Article -
83
Reservoir Fluid Identification Method Based on Multi-Feature Fusion
Published 2024-12-01“…Field applications have shown that compared with the optimized logging interpretation method and the time-frequency analysis method alone, the reservoir fluid identification method based on fused multiple features improves the accuracy of fluid identification in tight sandstone reservoirs, with an average identification accuracy of 90.4%, verifying the feasibility of using this method to identify fluids. …”
Get full text
Article -
84
Identification of zones of increased vibroacoustic emission by means of the inverse method
Published 2004-01-01Get full text
Article -
85
Analysis of selected methods of person identification based on biometric data
Published 2025-06-01“… The article explores the challenge of identifying individuals using biometric data through advanced deep learning methods. The research employs three ground-breaking convolutional neural network architectures: ResNet50, EfficientNetB0, and VGG16. …”
Get full text
Article -
86
On-line Identification Method of Pantograph Anomaly Based on Feature Analysis
Published 2022-06-01“…Finally, the characteristic rules of pantograph anomaly determination are designed to realize the identification of abnormal state of pantograph. Test results show that the method and system proposed in this paper can detect abnormal states of the pantograph, such as missing horns, front carbon sliding blocks and bow head tilting, in both day and night environments. …”
Get full text
Article -
87
Identification of ferroptosis-related key genes in tuberculosis by bioinformatics methods
Published 2025-02-01Get full text
Article -
88
OPTIMIZATION METHOD OF DYNAMIC LOAD IDENTIFICATION BASED ON GENETIC ALGORITHM
Published 2015-01-01“…The numerical simulation result shows the proposed method is feasible.…”
Get full text
Article -
89
Pavement crack identification method based on IOtsu-Dd algorithm.
Published 2025-01-01“…Firstly, certain processing techniques are applied to the images captured by the unmanned aerial vehicle, such as grayscale and equalization, to reduce computational complexity and facilitate subsequent identification of image cracks. Subsequently, to improve recognition accuracy, the image is segmented and the Otsu method is introduced and improved. …”
Get full text
Article -
90
Microsatellite Instability in Urine: Breakthrough Method for Bladder Cancer Identification
Published 2024-11-01“…Cystoscopy is the traditional method for its detection and surveillance; however, this is an invasive technique, while non-invasive methods, such as cytology, have a limited sensitivity. …”
Get full text
Article -
91
SUBHORIZONTAL GEODYNAMIC ACTIVE ZONES AT THE PLATFORMS - METHODS OF IDENTIFICATION AND EVALUATION
Published 2016-08-01Get full text
Article -
92
Dam Risk Identification Method Based on EAHP-EWM-TOPSIS
Published 2024-01-01Subjects: Get full text
Article -
93
Damping Identification with Acceleration Measurements Based on Sensitivity Enhancement Method
Published 2018-01-01“…The proposed damping identification method was numerically validated with a planar truss structure at first, and then the experimental study was conducted with a steel planar frame structure. …”
Get full text
Article -
94
Uncertainty-Based Fusion Method for Structural Modal Parameter Identification
Published 2025-07-01“…The structural modal parameter identification method can be classified into time-domain and frequency-domain methods. …”
Get full text
Article -
95
IDENTIFICATION OF MESHING STIFFNESS FUNCTION BY MEANS OF FINITE ELEMENT METHOD
Published 2014-03-01“…Undoubtedly simulation methods of investigation of dynamic models behavior have some surpluses. …”
Get full text
Article -
96
System Identification Methods for Dynamic Testing of Fluid-Film Bearings
Published 1996-01-01“…This paper describes system identification and data reduction methods used for extracting rotordynamic coefficients of fluid-film journal bearings. …”
Get full text
Article -
97
Algorithms and Methods for Individual Source Camera Identification: A Survey
Published 2025-05-01“…Moreover, we also discuss the issue of camera identification using videos and provide a brief description of popular image datasets that might be used for source camera identification method benchmarking.…”
Get full text
Article -
98
Recent advances in sex identification of human skeletal remains in South Africa
Published 2010-11-01“…A literature review was carried out wherein the available methods of sex identification (morphological, metrical, geometric morphometrics and molecular) from South African skeletal material were critically examined. …”
Get full text
Article -
99
The Tunnel Structural Mode Frequency Characteristics Identification and Analysis Based on a Modified Stochastic Subspace Identification Method
Published 2018-01-01“…In this paper, a new identification method that combines the natural excitation technique (NExT) and stochastic subspace identification (SSI) method is developed. …”
Get full text
Article -
100