Showing 37,981 - 38,000 results of 46,768 for search '"Design"', query time: 0.19s Refine Results
  1. 37981

    Voronoi tessellation and hierarchical model based texture image segmentation by Quan-hua ZHAO, Yu LI, Xiao-jun HE, Wei-dong SONG

    Published 2014-06-01
    “…A metropolis-hastings algorithm was designed for simulating the posterior distribution. …”
    Get full text
    Article
  2. 37982

    A new method for reducing 5G overlapping coverage of urban grid roads by Yejiang ZHANG, Jie CHEN, Yi LIU, Xingzheng LI, Fuyang LI, Jian HU

    Published 2024-01-01
    “…The 5G network for urban grid road scenes has entered a new stage of refined operation and maintenance.The main contradiction has also shifted from insufficient coverage to severe overlapping coverage of some road sections.5G overlapping coverage will have a significant impact on users’ basic services such as internet access and voice.The optimization of traditional road overlapping coverage has many problems, such as inconsistent standards, recurring problems, and low work efficiency.The concept of overlapping coverage contribution was proposed, and an algorithm for root cause analysis of overlapping coverage was designed based on expert experience.An IT platform for optimizing overlapping coverage problems was also developed.The practice has proven that this method can effectively reduce the 5G overlapping coverage rate of urban grid roads, help enterprises save network optimization costs, and truly achieve the goal of cost reduction and efficiency increase.…”
    Get full text
    Article
  3. 37983

    The Golfer’s Fore, Fore +, and Advanced Fore + Exercise Program: An Exercise Series and Injury Prevention Program for the Golfer by Zachary M Thomas, Kevin E Wilk

    Published 2023-06-01
    “…The purpose of this clinical commentary is to describe three individualized and unsupervised golf exercise programs (The Golfer's Fore, Fore+, and Advanced Fore+), of varying difficultly, designed to reduce the risk of injury, improve strength/mobility, and optimize performance…”
    Get full text
    Article
  4. 37984

    Au cœur de la mort : faire science avec les défunts by Marc-Antoine Berthod

    Published 2022-02-01
    “…Ever since the founding of anthropology as a discipline, the theme of death has nourished an abundant literature that puts into perspective the ways in which communities construct boundaries between the living and the dead: how they define intervals between the two categories while designating places reserved for the deceased. In this text, we first discuss how these boundaries and their transgressions have been considered by cultural and social anthropologists. …”
    Get full text
    Article
  5. 37985

    COMPOSITE MODEL ERROR SOURCES IN DISCRETE CHANNELS OF DATA CONVERSION by Yu. D. Ivanov, B. V. Lozka, Е. O. Kozljuk

    Published 2016-11-01
    “…Designed component model of the source of errors in real discrete channels of data conversion, based on the joint use of the channel within dependent generalized errors and channel with correlated errors pack image on the background of independent errors. …”
    Get full text
    Article
  6. 37986

    Static Stiffness Analysis of a New Scissor-type Telescoping and Lifting Mechanism by Hao Gang, Chang Boyan, Li Wenqi

    Published 2018-01-01
    “…Corresponding modular system named scissor-type telescoping and lifting mechanism( STLM) is designed for achieving straight-line motion in one dimension. …”
    Get full text
    Article
  7. 37987

    Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ by Ben Roelens

    Published 2021-04-01
    “…., 1st Workshop on Blockchain and Enterprise Systems), which has the ambition to change the way one thinks, designs and implements ISs. The second one is ManComp 2020 (i.e., 5th Workshop on Managed Complexity), which is focused on approaches and methods for managing the complexity of ISs and IS interaction within ecosystems.…”
    Get full text
    Article
  8. 37988

    Neural Network Assisted Inverse Dynamic Guidance for Terminally Constrained Entry Flight by Hao Zhou, Tawfiqur Rahman, Wanchun Chen

    Published 2014-01-01
    “…This paper presents a neural network assisted entry guidance law that is designed by applying Bézier approximation. It is shown that a fully constrained approximation of a reference trajectory can be made by using the Bézier curve. …”
    Get full text
    Article
  9. 37989

    Current Ripple Reduction Employing the Reactor of DC–DC Converter to Have Variable Inductance through Magnetic Saturation by Chang-Ho Lee, Tuan-Vu Le, Feel-soon Kang, Sung-Jun Park

    Published 2023-01-01
    “…In this paper, we proposed a method to reduce the current ripple at light load by designing a bidirectional DC–DC converter reactor to have an inductance variable according to the load power capacity. …”
    Get full text
    Article
  10. 37990

    Research and implementation of reputation-based inter-domain routing selection mechanism by Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG

    Published 2023-06-01
    “…To solve the problem of lack of validation for exchanging messages in BGP, a inter-domain routing mechanism, which consisted of a reputation evaluation mechanism and a reputation-based BGP optimal routing algorithm, was proposed.The reputation evaluation mechanism used a distributed autonomous system (AS) alliance architecture, which divided node routing behavior in detail.The service domain and observation weight were used as indicators to quantify the impact of node behavior.By designing a feedback mechanism, the reputation value not only reflected the good and bad of nodes, but also reflected the node’s resistance to malicious attacks.The reputation-based BGP routing selection algorithm adds a “security” policy to the existing routing selection algorithm by filtering routes containing low-reputation nodes and selecting the best route among high reputation routes.The experimental results show that the proposed mechanism outperform most existing reputation mechanisms by avoiding routes with vulnerable nodes and restraining the propagation of illegal routes, thereby providing a more secure inter-domain routing environment.…”
    Get full text
    Article
  11. 37991

    Hysteretic Behavior of Specimens of Circular Concrete-Filled CFRP-Steel Tubular Beam-Column by Wang Qing-li, Yu LingFeng, Peng Kuan

    Published 2021-01-01
    “…To study the difference in hysteretic behavior of specimens of circular concrete-filled CFRP-steel tube under different influencing factors, 12 specimens were designed, and their failure modes and P-Δ curves were studied. …”
    Get full text
    Article
  12. 37992

    Chinese semantic and phonological information-based text proofreading model for speech recognition by Meiyu ZHONG, Peiliang WU, Yan DOU, Yi LIU, Lingfu KONG

    Published 2022-11-01
    “…To study the influence of Chinese Pinyin on detecting and correcting text errors in speech recognition, a text proofreading model based on Chinese semantic and phonological information was proposed.Five Pinyin coding methods were designed to construct the character-Pinyin embedding vector that was employed as the input of the Seq2Seq model based on gated recurrent unit.At the same time, the attention mechanism was adopted to extract the Chinese semantic and phonological information of sentences to correct speech recognition errors.Aiming at the problem of insufficient labeled corpus, a data augmentation method was introduced, which could automatically obtain annotated corpora by exchanging the initials or finals of Chinese Pinyin.The experimental results on AISHELL-3’s public data show that phonological information is conducive to the text proofreading model to detect and correct text errors after speech recognition, and the proposed data augmentation method can improve the error detection performance of the model.…”
    Get full text
    Article
  13. 37993

    Experimental Study of Measuring Algorithm Accuracy of the Electromagnetic Distance Measurement Anticollision Tool by Cui Li, Lei Li, Yuzheng Zhao, Ruichao Zhang, Yuanwei Sun

    Published 2022-01-01
    “…Based on the electromagnetic anticollision measuring calculation method, the electromagnetic anticollision detection tool was designed and simulation experiments were carried out. …”
    Get full text
    Article
  14. 37994

    Sequential image deep learning-based Wi-Fi human activity recognition method by Qizhen ZHOU, Jianchun XING, Qiliang YANG, Deshuai HAN

    Published 2020-08-01
    “…For the problems existing in most of the researches,such as weak anti-noise ability,incompatible signal size and insufficient feature extraction of deep-learning-based Wi-Fi human activity recognition,a kind of sequential image deep learning-based recognition method was proposed.Based on the idea of sequential image deep learning,a series of image frames were reconstructed from time-varied Wi-Fi signal to ensure the consistency of input size.In addition,a low-rank decomposition method was innovatively designed to separate low-rank activity information merged in noises.Finally,a deep model combining temporal stream and spatial stream was proposed to automatically capture the spatiotemporal features from length-varied image sequences.The proposed method was extensively tested in WiAR dataset and self collected dataset.The experimental results show the proposed method could achieve the accuracy of 0.94 and 0.96,which indicate its high-accuracy performance and robustness in pervasive environments.…”
    Get full text
    Article
  15. 37995

    Fuzzy co-clustering algorithm for high-order heterogeneous data by Shao-bin HUANG, Xin-xin YANG, Lin-shan SHEN, Yan-mei LI

    Published 2014-06-01
    “…The update rules for fuzzy memberships of objects and weights of features were derived, and then an iterative algorithm was designed for the clus-tering process. Additionally, convergence of iterative algorithm was proved. …”
    Get full text
    Article
  16. 37996

    Research on optimal parallel routing and wide diameter of unidirectional double-loop networks by Hui LIU, Zhen ZHANG, Mu-yun FANG, GXiao ZHEN, Ye-bin CHEN

    Published 2014-08-01
    “…Secondly, the parallel distance diagram(PDD) of DLN which is expanded by MDD is designed and simulated. Based on the PDD, a method to find two shortest parallel pathes quickly without any repeating node was proposed. …”
    Get full text
    Article
  17. 37997

    Babuinare by Joana Antunes

    Published 2024-01-01
    “…Attesting to this close relationship, the first known medieval designation for what we now call marginalia, comes from the term babewyn, or baboon, summoning the generality of the simian species and behaviours then known. …”
    Get full text
    Article
  18. 37998

    NEED ANALYSIS ON DEVELOPING SKILL-BASED MATERIALS FOR D3 NURSING STUDENTS by Yansyah Yansyah, Dina Rafidiyah, Hafizhatu Nadia

    Published 2019-06-01
    “…Need analysis was conducted to map the students’ need so suitable materials can be designed for effective teaching. There were fifteen students of D3 Nursing in the University of Muhammadiyah Banjarmasin invited to be the participants of this research. …”
    Get full text
    Article
  19. 37999

    Client grouping and time-sharing scheduling for asynchronous federated learning in heterogeneous edge computing environment by Qianpiao MA, Qingmin JIA, Jianchun LIU, Hongli XU, Renchao XIE, Tao HUANG

    Published 2023-11-01
    “…., edge heterogeneity, data Non-IID, and communication resource constraints, a grouping asynchronous federated learning (FedGA) mechanism was proposed.Edge nodes were divided into multiple groups, each of which performed global updated asynchronously with the global model, while edge nodes within a group communicate with the parameter server through time-sharing communication.Theoretical analysis established a quantitative relationship between the convergence bound of FedGA and the data distribution among the groups.A time-sharing scheduling magic mirror method (MMM) was proposed to optimize the completion time of a single round of model updating within a group.Based on both the theoretical analysis for FedGA and MMM, an effective grouping algorithm was designed for minimizing the overall training completion time.Experimental results demonstrate that the proposed FedGA and MMM can reduce model training time by 30.1%~87.4% compared to the existing state-of-the-art methods.…”
    Get full text
    Article
  20. 38000

    KNOWLEDGE AND AWARENESS OF HAZARDS ASSOCIATED WITH THE USEOF COTTON BUDS IN SAUDI COMMUNITY by Akram Ibrahem Alwasse et al

    Published 2024-10-01
    “…A cross-sectional descriptive survey has been performed over a two weeks period on a sample composed of 93 individuals where a pre-designed questionnaire was filled by the participants. …”
    Get full text
    Article