Showing 1,081 - 1,100 results of 1,211 for search 'Sakath~', query time: 1.88s Refine Results
  1. 1081
  2. 1082

    Excavation Deformation Analysis of Foundation Pits and Its Influence on Surrounding Buildings by CHENG Xinyu, FU Chenghua, LIU Jian, JIANG Linjie

    Published 2022-01-01
    “…With the efficient use of urban space,the construction of new foundation pit projects is becoming more and more difficult,and the research on the excavation deformation of foundation pits and its impact on surrounding buildings is becoming more important.Taking a deep foundation pit project as an example,this study uses a three-dimensional finite element model to numerically simulate the actual excavation process.Moreover,the deformation characteristic of foundation pits and its influence on the surrounding buildings are comprehensively analyzed with the measured deformation data.The results reveal that during the excavation of a new foundation pit,the overall lateral displacement of the retaining structure toward the inside of the foundation pit occurs,and the maximum displacement occurs in the middle of the foundation pit retaining piles adjacent to the side of the buildings.The settlement of soil around and at the bottom of the foundation pit is “groove-shaped”,namely that when the excavation goes deeper,the settlement is greater.The excavation of the new foundation pit leads to the different uniform settlement of surrounding buildings,but with the construction of the retaining structure,the deformation of buildings decreases gradually and tends to be stable.The research results can provide some theoretical reference for the design and construction of similar deep foundation pit projects.…”
    Get full text
    Article
  3. 1083
  4. 1084

    Analysis of communication data of mobile terminal based on protocol reversal by Mingyuan ZHANG, Xinyu QI, Yubo SONG, Rongrong GU, Aiqun HU, Zhenchao ZHU

    Published 2018-12-01
    “…The most problem in analysis of communication protocols and communication data for mobile terminals is that many mobile applications do not have the relevant public technical documents,and it is difficult to know the type of communication protocol it adopts.The instruction execution sequence analysis technique takes the instruction sequence executed by the program as a research object,and inversely infers the message format and the state machine to obtain the communication protocol.However,due to the incomplete collection of sequence information,the state machine infers that the inference is incomplete and cannot be effective.A novel protocol reverse scheme based on state machine comparison is proposed,which can be used for the forensics of mobile terminal communication data.The scheme first uses PIN for dynamical identification of the taint,and track it and analyzes the trajectory to obtain the message format.Secondly,the message clustering is performed on the basis of the message format to infer the protocol state machine.Finally,the LCS algorithm is used to compare the state machines to get a complete protocol state machine.This article tests and evaluates the scheme based on two types of application design experiments on the Android platform.The experimental results show that the results are both complete and real-time,and have practical value.…”
    Get full text
    Article
  5. 1085

    Verifiable attribute-based searchable encryption scheme based on blockchain by Xixi YAN, Xiaohan YUAN, Yongli TANG, Yanli CHEN

    Published 2020-02-01
    “…For the problem that the shared decryption key lacks of fine-grained access control and the search results lacks of correctness verification under one-to-many search model,a verifiable attribute-based searchable encryption scheme based on blockchain was proposed.The ciphertext policy attribute-based encryption mechanism was used on the shared key to achieve fine-grained access control.Ethereum blockchain technology was combined to solve the problem of incorrect search results returned by the semi-honest and curious cloud server model,so it could prompt both the cloud server and the user to follow the rules of the contract honestly and achieved service-payment fairness between the user and the cloud server in the pay-per-use cloud environment.In addition,based on the irreversible modification of the blockchain,the cloud server was guaranteed to receive the service fee,and the user was assured to obtain the correct retrieval results without additional verification which reduced the computational overhead of the user.The security analysis shows that the scheme satisfies the semantic security against adaptive chosen keyword attack and can protect the privacy of users and the security of data.The performance comparison and experimental results show that the scheme has certain optimizations in security index generation,search token generation,retrieval efficiency and transaction quantity,so it is more suitable for one-to-many search scenarios such as smart medical.…”
    Get full text
    Article
  6. 1086

    An adaptive unscented Kalman filter algorithm for electronic archives information data denoising by Ting ZHOU

    Published 2023-08-01
    “…The adaptive unscented Kalman filter noise reduction algorithm for electronic archives information data was studied to address the issue of data loss during the noise reduction process, as well as the noise covariance and initial value deviation of the data after gross errors.The architecture of electronic archives informatization consisted of the data, business, and user layers.In the data layer, the electronic archives informatization data underwent pretreatment, decision-making, monitoring, and analysis based on user data requests from the user layer.Assumptions were made on the electronic archives informatization data using the Laida criterion to determine the standard deviation probability and establish intervals.Gross errors were eliminated and the noise covariance of the data after gross error removal was estimated using the Sage-Husa filter.This helped to suppress the deviation of the initial value and preserve the original data as much as possible.The traceless Kalman algorithm was utilized to estimate the unknown noise characteristics of electronic archives informatization data in real-time, enabling the noise reduction of electronic archives informatization data.The virtual induction service connected the data, users, and business layer, facilitating the presentation of the required electronic archives information to users in the business layer.Experimental results demonstrate that the algorithm effectively removes various noises from electronic archives information data while retaining the valid data.…”
    Get full text
    Article
  7. 1087
  8. 1088

    Mission Planning for LEO Satellite IoT Constellation Based on Genetic Algorithm by Yanhong LI, Qiang LYU, Junmin LIANG, Shigang FENG, Junhou MIAO

    Published 2024-06-01
    “…A mission planning algorithm based on genetic algorithm was designed for LEO satellite IoT constellation with no inter-satellite links, aimed to achieve real-time data communication through multiple ground stations while maximized the resource allocation of satellites and ground stations.Firstly, the objective function to maximized the service duration of satellites in orbit and the constraints on clashed tasks were designed, constructed the mission planning model for LEO satellite IoT constellation.Then, based on genetic algorithm, clashed tasks and early stopping mechanism were introduced, and the mission planning algorithm for the LEO satellite IoT constellation was designed.On this basis, experiments were conducted use a constellation of 18 LEO communication satellites without inter-satellite links and 4 ground stations.In addition, in order to verified the performance of the algorithm, first come first service (FCFS) algorithm was also used for mission planning of the experimental data.The experiments compared with FCFS showed that the designed mission planning algorithm for LEO satellite IoT constellation could significantly improve the scheduling capacity of ground stations for receiving data of communication satellites, addressed the contradiction of insufficient ground stations with a large number of satellites.…”
    Get full text
    Article
  9. 1089

    Multi-scale outlier mining algorithm for stateless communication data under IPv6 remote monitoring network by Kun LIU, Xiaohan ZHANG, Rukun CAO, Shuai LI

    Published 2023-08-01
    “…In order to accurately mine outliers and reduce the impact of outliers on communication data, a multi-scale outlier mining algorithm for stateless communication data in IPv6 remote monitoring network was investigated.The stateless communication data were obtained through an IPv6 remote monitoring network, and based on the seasonality, trend, and self-similarity characteristics of the extracted stateless communication data, the Fourier transform was used to divide the stateless communication data into two classes.Then, the K-mean method was used to cluster the two classes to determine the neighborhood of the stateless communication data, which was used as the basis for outlier mining using a convolutional neural network on the stateless communication data.The convolutional neural network was initialized, and according to the output value of the convolutional neural network, it was determined whether the network met the stopping condition.The operation steps of the convolutional neural network were repeated, all the outlier points were mined, and the multi-scale outlier mining of stateless communication data was achieved.The experimental results showed that the fewer the number of stateless communication data categories, the higher the mining efficiency; the proposed method can accurately mine the number of multiscale outliers of stateless communication data in IPv6 remote monitoring network and accurately analyze the reasons for the outliers.…”
    Get full text
    Article
  10. 1090
  11. 1091
  12. 1092

    FREQUENCY PREDICTION OF STAGED COMBUSTION ROCKET ENGINE BASED ON RBF NEURAL NETWORK by DU FeiPing, TAN YongHua, CHEN JianHua

    Published 2015-01-01
    “…Then the finite element model of staged combustion rocket engine was established using the method of distributed parameter and the finite element model was modified by modal experimental data.The difference structural parameters which were chosen according to the structural sensitivity analysis were considered as training samples. …”
    Get full text
    Article
  13. 1093
  14. 1094

    Towards Kyrgyz stop words by Ruslan Isaev, Gulzada Esenalieva, Ermek Doszhanov

    Published 2023-12-01
    “…Stop words are used to reduce noisy text data, remove uninformative words, speed up text processing, and minimize the amount of memory required to store data.The Kyrgyz language is an agglutinative Turkic language for which no scientific study of stop words has been previously published in English. …”
    Get full text
    Article
  15. 1095

    A chromosome-level genome assembly of wild silkmoth, Bombyx mandarina by Jung Lee, Takashi Kiuchi, Katsushi Yamaguchi, Shuji Shigenobu, Atsushi Toyoda, Toru Shimada

    Published 2025-01-01
    “…National BioResource Project of Japan (NBRP) maintains a B. mandarina strain derived from individuals captured at Sakado (Saitama, Japan) in 1982. Now, NBRP has developed chromosome replacement strains of B. mori. …”
    Get full text
    Article
  16. 1096

    Postharvest Practices and Farmers’ Knowledge in Managing Maize Pests in the Eastern Cape Province, South Africa by Bongumusa Charles Gumede, Simon Kamande Kuria

    Published 2025-01-01
    “…Semi-structured questionnaires were administered to 77 smallholder farmers from 16 villages at King Sabata Dalindyebo local municipality in the Eastern Cape Province of South Africa. …”
    Get full text
    Article
  17. 1097

    Esztétika törésvonalakban – Francis Hutcheson esztétikai elméletének belső feszültségei by Botond Csuka

    Published 2014-10-01
    “…Hutcheson (pre-)esztétikai vizsgálódása egyszerre pozícionálja magát a locke-iánus percepció-elmélet keretei közé, valamint töri meg azt a shaftesburyánus „morális szépérzék” sajátos applikációjával. A dolgozat elsősorban ennek a szintéziskeresésnek, valamint a hutchesoni esztétika különböző tradíciók és intenciók törésvonalaiban való elhelyezkedésének a következményeit kívánja homlokterében tartani, az Inquiry konstitutív elemeinek (a szép bevett, racionális alapformulájának és a szép ideáinak, a szép iránti érzéknek és az ízlésnek, az abszolút és a komparatív szépségnek stb.) vizsgálatával. …”
    Get full text
    Article
  18. 1098

    Sosyal Medya Ve Popüler Kültür İlişkisi Üzerinden Twitter Gündemi Özelinde Bir Analiz by Meltem Güreller

    Published 2021-05-01
    “…Günümüzde bireylerce ekonomiden siyasete, günlük yaşamdan sanata kadar birçok konunun tartışılıp görüş bildirildiği sosyal medya platformları, aynı zamanda kültürün oluşumu ve dolaşımında da rol oynamaktadır. …”
    Get full text
    Article
  19. 1099

    Ronnie James Dio: the man on the silver mountain by Joe Weber

    Published 2024-12-01
    “…Under this name he became an iconic hard rock vocalist, performing with numerous bands including Rainbow (1974–1979), Black Sabbath (1979–1982, 1992, and 2006–2010), and his own band Dio (1982–2004). …”
    Get full text
    Article
  20. 1100

    A historical overview of the Wärğəḥ Muslim community in the Christian highland of Šäwa by Deresse Ayenachew

    Published 2016-11-01
    “…In north Šäwa, the community of Wärğəḥ has established scattered pockets of villages between Däbrä Berhan and Säbäta towns. Linguistically, they speak Oromo and also Amharic. …”
    Get full text
    Article