摘要 :
Currently, various cryptocurrencies are being traded throughout the day for the whole 24 h via crypto-currency markets in this borderless virtual world. Many people invest in cryptocurrencies which can be utilized and replace exis...
展开
Currently, various cryptocurrencies are being traded throughout the day for the whole 24 h via crypto-currency markets in this borderless virtual world. Many people invest in cryptocurrencies which can be utilized and replace existing currencies. Despite this, not many studies on actual demand for cryptocurrencies have been conducted yet. This research extensively applied UTAUT to study elements influencing intention of usage for cryptocurrencies. It also added economic feasibility, payment convenience, government regulation, and risk as independent variables and established an UTAUT model applying said independent variables. Particularly, this research seeks to figure how characteristics among countries respond to the intention of usage for cryptocurrencies by comparing Korea, China, and Vietnam.
收起
摘要 :
Currently, various cryptocurrencies are being traded throughout the day for the whole 24 h via crypto-currency markets in this borderless virtual world. Many people invest in cryptocurrencies which can be utilized and replace exis...
展开
Currently, various cryptocurrencies are being traded throughout the day for the whole 24 h via crypto-currency markets in this borderless virtual world. Many people invest in cryptocurrencies which can be utilized and replace existing currencies. Despite this, not many studies on actual demand for cryptocurrencies have been conducted yet. This research extensively applied UTAUT to study elements influencing intention of usage for cryptocurrencies. It also added economic feasibility, payment convenience, government regulation, and risk as independent variables and established an UTAUT model applying said independent variables. Particularly, this research seeks to figure how characteristics among countries respond to the intention of usage for cryptocurrencies by comparing Korea, China, and Vietnam.
收起
摘要 :
The existence and development of an automobile company was dependent on the period of development and the quality of preparation. In this article, the procedure of press die with resinous surface was described and it based on the ...
展开
The existence and development of an automobile company was dependent on the period of development and the quality of preparation. In this article, the procedure of press die with resinous surface was described and it based on the application in the facelift of New Red Flag car. That means this method is vital to car development.
收起
摘要 :
The existence and development of an automobile company was dependent on the period of development and the quality of preparation. In this article, the procedure of press die with resinous surface was described and it based on the ...
展开
The existence and development of an automobile company was dependent on the period of development and the quality of preparation. In this article, the procedure of press die with resinous surface was described and it based on the application in the facelift of New Red Flag car. That means this method is vital to car development.
收起
摘要 :
After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary ...
展开
After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary to build a system that can detect the presence of worm as quickly as possible. This paper first analyzes the worm's framework and its propagation model. Then, we describe a new algorithm for detecting worms. Our algorithm first monitors the computers on network and gets the number of abnormal computers. Then based on the monitoring result, we detect an unknown worm by using recursive least squares estimation. The experiments result proves that our approach is effective to detect unknown worm.
收起
摘要 :
After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary ...
展开
After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary to build a system that can detect the presence of worm as quickly as possible. This paper first analyzes the worm’s framework and its propagation model. Then, we describe a new algorithm for detecting worms. Our algorithm first monitors the computers on network and gets the number of abnormal computers. Then based on the monitoring result, we detect an unknown worm by using recursive least squares estimation. The experiments result proves that our approach is effective to detect unknown worm.
收起
摘要 :
The observed object images are seriously blurred because of the influence of atmospheric turbulence. The deconvolution is required for object reconstruction from turbulence degraded images. The wavelet transform provides a multi-r...
展开
The observed object images are seriously blurred because of the influence of atmospheric turbulence. The deconvolution is required for object reconstruction from turbulence degraded images. The wavelet transform provides a multi-resolution approach to image analysis and processing. We consider a wavelet-based adaptive edge-preserving regularization deconvolution (WbARD) scheme for image restoration problems. This is accomplished by first casting the classical image restoration problem into the wavelet domain. We consider the behavior of the blur operator in the atrous wavelet domain. Then, we are able to adapt quite easily to scale-varying and orientation-varying features in the image while simultaneously retaining the edge preservation properties of the regularization. Experimental results show that the WbARD algorithm produces good performance in comparison to standard direct restoration approaches for turbulence-degraded images.
收起
摘要 :
The observed object images are seriously blurred because of the influence of atmospheric turbulence. The deconvolutionis required for object reconstruction from turbulence degraded images. The wavelet transform provides a multi-re...
展开
The observed object images are seriously blurred because of the influence of atmospheric turbulence. The deconvolutionis required for object reconstruction from turbulence degraded images. The wavelet transform provides a multi-resolution approach to image analysis and processing. We consider a wavelet-based adaptive edge-preservingregularization deconvolution (WbARD) scheme for image restoration problems. This is accomplished by first casting theclassical image restoration problem into the wavelet domain. We consider the behavior of the blur operator in the Atrouswavelet domain. Then, we are able to adapt quite easily to scale-varying and orientation-varying features in the imagewhile simultaneously retaining the edge preservation properties of the regularization. Experimental results show that theWbARD algorithm produces good performance in comparison to standard direct restoration approaches for turbulence-degraded images.
收起
摘要 :
In this paper, against the background of simulation for synthesis of MTBE by catalytic distillation using the Rate Based Nonequilibrium Stage (MERQ) model, effects of different choices of property parameters and correlations on ac...
展开
In this paper, against the background of simulation for synthesis of MTBE by catalytic distillation using the Rate Based Nonequilibrium Stage (MERQ) model, effects of different choices of property parameters and correlations on accuracy of simulation were investigated profoundly and carefully. On this basis, the catalytic distillation for manufacture of TAME and ETBE was simulated and analyzed.
收起
摘要 :
Aim to the problem of code-division multiple-access (CDMA) with both multiple-access interference (MAI) and intersymbol interference (ISI) in dispersive channels of cellular mobile communication under urban architecture's influenc...
展开
Aim to the problem of code-division multiple-access (CDMA) with both multiple-access interference (MAI) and intersymbol interference (ISI) in dispersive channels of cellular mobile communication under urban architecture's influence, low-complexity multiuser detection is proposed to suppress MAI and ISI jointly. This technique is considered to base on a blind linear filter detector with the subspace-based and auxiliary vector incorporated the desired user's signature waveform. It is showed that the performance of newly proposed detector outperforms the conventional detectors.
收起