Showing 1,141 - 1,160 results of 1,211 for search 'Sakath~', query time: 1.99s Refine Results
  1. 1141

    Application of One-Dimensional Hydrodynamic Model in Water Storage at the End of Flood Seasons for Changzhou Reservoir by LIAO Xiaolong, ZHONG Yixuan, HOU Guibing, JIN Gaoyang

    Published 2022-01-01
    “…Scientific selection of the timing and time for pre-discharge is one of the key techniques and decision bases necessary for conducting reservoir pre-storage at the end of flood seasons.For channel reservoirs,the water level decline in the reservoir area usually lags behind that at the dam sites,which must be fully considered to avoid the submerging loss of the reservoir area and the increase in flood risks for downstream areas due to untimely pre-discharge.In this research,with the mainstream of Xijiang River,Changzhou hydro-junction,as the research object,a one-dimensional hydrodynamic model is built on the basis of the measured data of river sections in the Changzhou reservoir area to study the effects of water storage at the end of flood seasons.The model parameters are calibrated and validated using observed flood data.The results reveal that pre-discharge should be executed for the Changzhou reservoir to the water level of 18.6 m when the inflow forecast within 3 d exceeds 11 800 m<sup>3</sup>/s,and a rising water regime is expected.It takes 2.6 d,3.2 d,and 3.7 d for the pool level to be lowered to 18.6 m from 19.6 m,20.1 m,and 20.6 m,respectively,which is about 1.3~2.3 d earlier than the time needed for the reservoir water level to lower to the corresponding water levels.The study provides a useful technical reference for the optimization of water storage at the end of flood seasons in the Changzhou hydro-junction and also lays a scientific foundation for determining the pre-discharge timing and time of channel reservoirs.…”
    Get full text
    Article
  2. 1142

    Data recommendation algorithm of network security event based on knowledge graph by Xianwei ZHU, Wei LIU, Zihao LIU, Zeyu GU

    Published 2023-12-01
    “…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&amp;CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
    Get full text
    Article
  3. 1143
  4. 1144
  5. 1145

    Effects of NDVI/Meteorological Elements on Actual Evapotranspiration in Loess Plateau over Last 20 Years by HAN Yuping, XU Dan, HUANG Huiping, JIA Dongdong, PEI Duo, ZHANG Junfeng

    Published 2022-01-01
    “…Given that the Grain for Green Program significantly enhances the vegetation coverage in the Loess Plateau and that global warming keeps worsening,studying the spatio-temporal distribution law of the evapotranspiration (ET) in the Loess Plateau and the combined influences of the normalized difference vegetation index (NDVI) and meteorological elements on the ET can guide the comprehensive management of the water resources in the plateau.Spatial regression analysis,Morlet wavelet analysis,and principal component analysis are performed to examine the spatio-temporal evolution characteristics of the ET in the Loess Plateau during the three periods of the whole year,the growing season,and the non-growing season over 2001—2020 and the combined influences of NDVI and meteorological elements with MOD16A2 ET,MOD13Q1 NDVI,and meteorological data.The results support the following conclusions:① ET increases significantly in all the three periods,with the growth rate for the whole year higher than that for the growing season and much higher than that for the non-growing season.The three periods all have a first main cycle of 14 a.ET decreases from southeast to northwest both in the whole year and the growing season,and the ET in the non-growing season is lower than that in the whole year and that in the growing season.The higher value is in the west and the south,and the spatial distribution of the interannual variation of ET is consistent with that of ET.② NDVI also increases significantly in all the three periods,and the spatial distribution of its value is consistent with that of ET.Precipitation increases remarkably in the whole year and in the growing season,with no marked growth in the non-growing season.No obvious increase trends in temperature and wind speed are observed in the three statistics periods.The spatial distribution laws of precipitation and temperature are largely consistent with that of ET.③ The contribution of each influencing factor to the change in ET varies with the period.Specifically,the first principal factors in the growing season,the non-growing season,and the whole year are respectively wind speed,temperature,and NDVI,NDVI,precipitation,and temperature,and NDVI and precipitation.…”
    Get full text
    Article
  6. 1146

    The influence of the use of information technology and professionalism on employee performance mediated by work productivity by Dori Mittra Candana, Hapzi Ali, Zefriyeni Zefriyeni

    Published 2024-08-01
    “…Semen padang.co.id and the Badan Pusat Statistik (BPS) Sumatera Barat are the sources of the second-hand data.The number of samples that met the research criteria was 296 employees of PT Semen Padang (Persero) Tbk. …”
    Get full text
    Article
  7. 1147
  8. 1148

    About a concept of creating a social network users information aggregation and data processing system by L. V. Rudikova, O. R. Myslivec

    Published 2019-02-01
    “…The developed universal system is based on the information technology of data warehousing, and it has the following aspects: an expandable complex subject area, the integration of stored data that come from various sources, the invariance of stored data in time with mandatory labels, relatively high data stability, the search for necessary trade-off in data redundancy, modularity of individual system units, fl and extensibility of the architecture, high security requirements vulnerable data.The proposed system organizes the process of collecting data and filling the database from external sources. …”
    Get full text
    Article
  9. 1149
  10. 1150
  11. 1151

    Novel fingerprint key generation method based on the trimmed mean of feature distance by Zhongtian JIA, Qinglong QIN, Li MA, Lizhi PENG

    Published 2023-10-01
    “…In recent years, biometrics has become widely adopted in access control systems, effectively resolving the challenges associated with password management in identity authentication.However, traditional biometric-based authentication methods often lead to the loss or leakage of users’ biometric data, compromising the reliability of biometric authentication.In the literature, two primary technical approaches have been proposed to address these issues.The first approach involves processing the extracted biometric data in a way that the authentication information used in the final stage or stored in the database does not contain the original biometric data.The second approach entails writing the biometric data onto a smart card and utilizing the smart card to generate the private key for public key cryptography.To address the challenge of constructing the private key of a public key cryptosystem based on fingerprint data without relying on a smart card, a detailed study was conducted on the stable feature points and stable feature distances of fingerprints.This study involved the extraction and analysis of fingerprint minutiae.Calculation methods were presented for sets of stable feature points, sets of equidistant stable feature points, sets of key feature points, and sets of truncated means.Based on the feature distance truncated mean, an original fingerprint key generation algorithm and key update strategy were proposed.This scheme enables the reconstruction of the fingerprint key through re-collecting fingerprints, without the need for direct storage of the key.The revocation and update of the fingerprint key were achieved through a salted hash function, which solved the problem of converting ambiguous fingerprint data into precise key data.Experiments prove that the probability of successfully reconstructing the fingerprint key by re-collecting fingerprints ten times is 0.7354, and the probability of reconstructing the fingerprint key by re-collecting fingerprints sixty times is 98.06%.…”
    Get full text
    Article
  12. 1152

    Precipitation Concentration in Highly Urbanized Regions — Case Study of Yangtze River Delta Urban Agglomeration by LIN Zequn, WANG Dayang, ZHANG Zhi, WANG Dagang

    Published 2024-01-01
    “…Amid global warming and enhanced human activities,precipitation has undergone significant changes in its intra-annual distribution,exerting a considerable impact on people's livelihoods and productivity,particularly in highly urbanized regions.This study focuses on the Yangtze River Delta urban agglomeration in China and utilizes multiple sources of precipitation data (including precipitation product data and meteorological station data) along with nighttime light data.The Gini Index (GI) is employed as an indicator of precipitation concentration. …”
    Get full text
    Article
  13. 1153
  14. 1154

    High-performance reconfigurable encryption scheme for distributed storage by Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG

    Published 2023-10-01
    “…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
    Get full text
    Article
  15. 1155

    Adversarial patch defense algorithm based on PatchTracker by Zhenjie XIAO, Shiyu HUANG, Feng YE, Liqing HUANG, Tianqiang HUANG

    Published 2024-02-01
    “…The application of deep neural networks in target detection has been widely adopted in various fields.However, the introduction of adversarial patch attacks, which add local perturbations to images to mislead deep neural networks, poses a significant threat to target detection systems based on vision techniques.To tackle this issue, an adversarial patch defense algorithm based on PatchTracker was proposed, leveraging the semantic differences between adversarial patches and image backgrounds.This algorithm comprised an upstream patch detector and a downstream data enhancement module.The upstream patch detector employed a YOLOV5 (you only look once-v5) model with attention mechanism to determine the locations of adversarial patches, thereby improving the detection accuracy of small-scale adversarial patches.Subsequently, the detected regions were covered with appropriate pixel values to remove the adversarial patches.This module effectively reduced the impact of adversarial examples without relying on extensive training data.The downstream data enhancement module enhanced the robustness of the target detector by modifying the model training paradigm.Finally, the image with removed patches was input into the downstream YOLOV5 target detection model, which had been enhanced through data augmentation.Cross-validation was performed on the public TT100K traffic sign dataset.Experimental results demonstrated that the proposed algorithm effectively defended against various types of generic adversarial patch attacks when compared to situations without defense measures.The algorithm improves the mean average precision (mAP) by approximately 65% when detecting adversarial patch images, effectively reducing the false negative rate of small-scale adversarial patches.Moreover, compared to existing algorithms, this approach significantly enhances the accuracy of neural networks in detecting adversarial samples.Additionally, the method exhibited excellent compatibility as it does not require modification of the downstream model structure.…”
    Get full text
    Article
  16. 1156

    Variation Characteristics and Driving Factors of Water Level in Fuxian Lake from 1953 to 2021 by YANG Wenchun, ZHU Wenxiang, GU Guihua

    Published 2023-01-01
    “…In recent years,the continuous decline of water level in Fuxian Lake has attracted the attention of all walks of life.In order to explore the water level change characteristics and driving mechanism of Fuxian Lake,based on the daily observation data of Fuxian lake water level station from 1953 to 2021,combined with the precipitation and evaporation data of the basin over the years,the water storage data of the lake and relevant investigations,the Kendall rank test method,water balance method and relative evaluation method are adopted for analysis.The result is:① From 1953 to 2021,the average annual water level of Fuxian Lake was 1 722.02 m;From 1950s to 2010s,the interdecadal variation characteristics of water level in Fuxian Lake are roughly as follows:Rise→Fall→Fall→Rise→Big rise→Big fall;The water level of Fuxian Lake shows an insignificant downward trend.② The low water level of Fuxian Lake occurs in May,and the high water level basically occurs in October (occasionally in September).③ The period from 2010 to 2021 is the lowest water level period in the history of Fuxian Lake.The average water level and the average water level process within the year are below the legal minimum operating water level.The assurance rate of annual,monthly and daily average water level meeting the statutory minimum operating water level is 33.3%,34.7% and 35.9% respectively.④ Since 2000,human activities have been the main factor causing the water level of Fuxian Lake to rise and fall significantly.…”
    Get full text
    Article
  17. 1157

    „A filozófus csak Jánossal tud közösséget vállalni.” Fichte a páli és a jánosi kereszténység különbségéről by Tamás Hankovszky

    Published 2017-10-01
    “…Tanulmányomban először e filozófia azon alapgondolatait körvonalazom, amelyeket Fichte a János evangéliumban is megtalálni vélt. Ezután Fichte sajátos Pál- és János-értelmezését mutatom be, végül pedig azt, hogyan következik nála a két apostol szembeállításából végső soron magának a teológiának az elvetése is. …”
    Get full text
    Article
  18. 1158

    Twitter ve Kamusal Alan Kavramı Üzerine Bir İçerik Analizi: Spinal Musküler Atrofi (SMA) Hastası Çocukların Kampanyalarıyla İlgili Örnek Olay Çalışması by Dinçer Adiller, Meltem Güreller

    Published 2021-12-01
    “…Twitter, günümüzde bireylerce ekonomiden siyasete, günlük yaşamdan sanata kadar birçok konununtartışılıp görüş bildirildiği sosyal medya platformlarından biri haline gelmiştir. …”
    Get full text
    Article
  19. 1159

    Trend of Climate and Hydrology Change in Bosten Lake Basin and Its Influence on the Lake Level by YAO Junqiang, CHEN Jing, Dilinuer Tuoliewubieke, HU Wenfeng

    Published 2021-01-01
    “…Bosten Lakehas experienced drastic change on water level due to the climate environment changes and intensified human activities.Based on the recent climate and hydrological data,this paper analyzes the hydrological and climatic elements and the change characteristics of the Bosten Lake Basin from 1961 to 2019,and discusses the possible influencing factors for the hydrological change of the lake.The results show that:There is obvious changes by stages on the water level (area) of the lake as follows:decrease during 1961—1987,rapid increase during 1988—2002,drastic decrease during 2003—2012,and drastic increase after 2013.The changes by stages are caused by a climate-driven regime shift coupled with human disturbance.The increase in the water level after 1987 is driven by regional climate warming and wetting.However,since 2003,due to the increase in agricultural irrigation water,the runoff of Bosten Lake is reduced;after the implementation of the ecological water conveyance project (EWCP),the lake's outflow is significantly increased;and a decreased precipitation leads to an increased drought frequency.Therefore,the lake level drops significantly under the combined action of these factors.The increase in lake level since 2013 is mainly related to the increase in the supply of melted ice and snow caused by the great increase in precipitation and temperature in mountainous areas.Furthermore,wastewater emissions give rise to water degradation,resulting in complete change on the natural water cycle system in the Bosten Lake.Indeed,under the background of climate change,the future water security of Bosten Lake is largely dependent on the human activities.…”
    Get full text
    Article
  20. 1160

    Diplomasi ve Dış Politika: Fatin Rüştü Zorlu ve Kıbrıs Politikasında Liderlik by Sibel AKGÜN

    Published 2023-12-01
    “…Barışçıl içeriği ile dış politikanın yürütülme sanatı olan diplomaside diplomatların etki ve rolü azımsanmayacak kadar önemlidir. …”
    Get full text
    Article