-
2661
Location-Aware Cross-Layer Design Using Overlay Watermarks
Published 2007-01-01“…Our channel estimator iteratively estimates the channel impulse response and the combined signal vector from the overlay OFDM signal. …”
Get full text
Article -
2662
Research on evolution and security risk of Metaverse
Published 2022-04-01“…Recently, the Metaverse boom has swept the world.To improve the voice in the future digital field, major countries and well-known enterprises have accelerated arrangement of this emerging industry.However, there is no unified definition and ultimate form description of Metaverse.It is urgent to understand the essential characteristics, evolution trend and security risks of Metaverse scientifically, which can promote the high-quality development of China’s electronic information industry and ensure the cyberspace security.With literature research and related information analysis, the definition of Metaverse was put forward based on the core concepts such as technology and application iteration, economic and business model and the role of social relations.Additionally, the development and evolution of Metaverse were divided into four stages (data creation, digital bionics, virtual mirror and virtual-real symbiosis) according to the evolution degree of space category, space-time dimension, key technology and virtual real interaction.And the characteristics and corresponding forms of each stage were expounded.Then it analyzed the main reasons for the popularity of the Metaverse from the perspectives of innovative application demand, virtual life transformation, commercial value driving and political power driving.Focusing on the problems of challenging the national governance system, impacting the mainstream ideology, manipulating the capital market, causing potential social problems and misleading the layout of technology industry, it analyzed the multiple security risks and threats brought by the Metaverse wave from perspectives including politics, culture, economy, society and technology.It is suggested that the Metaverse is still in the stage of concept improvement and product exploration now.China should rationally grasp the development opportunities of the Metaverse based on the current situation of the electronic information industry, prepare for risks in advance, build a digital governance supervision system, stimulate industrial innovation and open development, consolidate the support of network information security, and create a healthy and orderly international environment.…”
Get full text
Article -
2663
Improved PID Control Design for Electric Power Steering DC Motor
Published 2025-01-01“…This process was achieved by iterative tuning within the stable region of the control loop and calculating the optimum controller parameters. …”
Get full text
Article -
2664
Novel Bounds for Incremental Hessian Estimation With Application to Zeroth-Order Federated Learning
Published 2024-01-01“…The algorithm exploits inexact cubic regularization to escape saddle points and guarantees convergence with optimal iteration complexity and high probability. Numerical results show that the proposed algorithm outperforms the existing zeroth-order federated algorithms in both convex and non-convex problems. …”
Get full text
Article -
2665
Fast Adaptive Character Animation Synthesis Based on Greedy Algorithm
Published 2021-01-01“…It uses the regularized subset method to generate multiple paths and chooses the path with the fastest residual reduction as the support set of this iteration. The simulation results show that the RMSP algorithm has better reconstruction performance than the SP algorithm.…”
Get full text
Article -
2666
Shared decision-making interventions in the choice of antipsychotic prescription in people living with psychosis (SHAPE): Protocol for a realist review.
Published 2024-01-01“…An understanding of how and why interventions work will be achieved by developing realist programme theories on intervention effectiveness through iterative literature reviews and engaging with various stakeholder groups, including patient, clinician and carer representatives.…”
Get full text
Article -
2667
On Damage Identification in Planar Frames of Arbitrary Size
Published 2022-01-01“…Applications to frames of different size confirm the validity of the presented identification algorithms. Furthermore, an iterative procedure, able to reduce the required computational burden related to the identification of the location and intensity of damage, is presented and applied in a parametric study concerning frames with increasing size.…”
Get full text
Article -
2668
A Novel Federated & Ensembled Learning-Based Battery State-of-Health Estimation for Connected Electric Vehicles
Published 2024-01-01“…The effectiveness of the proposed FEL algorithm has been evaluated using NASA battery dataset, showing significant improvement in SoH estimations with a mean average error of 3.24% after 30 iterations. Comparative analysis, including LSTM model with and without ensembled stakeholder data, reveals up to 75% accuracy improvement. …”
Get full text
Article -
2669
Investigation of the application of an automated monitoring system for detecting transmission cable deterioration in Nigeria: A case study of transmission cable lines between Offa...
Published 2025-03-01“…The best classification performance achieved a minimum mean squared error (MSE) of 0.074346 after 24 iterations (epochs) of training, validation, and testing. …”
Get full text
Article -
2670
Community pharmacy’s role in dispensing androgens and supporting harm reduction amid current policy dilemmas
Published 2025-01-01“…The data analysis followed an iterative process, developing a codebook for thematic analysis and aligning findings with relevant literature. …”
Get full text
Article -
2671
mHealth education for patients with chronic kidney disease: protocol for a scoping review
Published 2022-07-01“…Qualitative results will be organised into categories using an iterative process, as suggested by Pollock et al.Ethics and dissemination As this scoping review does not involve primary data collection, ethical permission is unnecessary. …”
Get full text
Article -
2672
Post operatory analgesia in caesarean surgery.
Published 2003-12-01“…This search included 120 patient who were selected to elective iterative caesarean section The variables under study were blood pressure, pulse and respiration during the pre- trans and post operative phases, onset of the anaesthetic effect and its duration, peri operatory complications , quality of the post operatory analgesia and its effect on the newborn measured by using Apgar values . …”
Get full text
Article -
2673
Complexity to Forecast Flood: Problem Definition and Spatiotemporal Attention LSTM Solution
Published 2020-01-01“…Considering the significance of modeling attention capability among hydrology factors, we believe extraction of discriminative hydrology factors not only reflect natural rules in physical space, but also optimally model iterations of factors to forecast run-off values in cyber space. …”
Get full text
Article -
2674
Diffusion Partition Consensus: Diffusion-Aided Time-of-Flight Estimates, Anomaly Detection, and Localization for Ultrasonic Nondestructive Evaluation Data
Published 2024-01-01“…Testing and evaluation are performed on a series of progressively information rich synthetic datasets, and on real-world ultrasonic NDE datasets taken from a Canada Deuterium Uranium nuclear reactor pressure tube and calibration fixture. The iterative technique is a blend of stochastic and deterministic methods that uses confidence and consensus of target parameter estimates to update several data classifying partitions over the dataset, which in turn allows a new set of estimates and confidence measures to be established. …”
Get full text
Article -
2675
Nonlinear Behaviour of Concrete Buttress Dams under High-Frequency Excitations Taking into Account Topographical Amplifications
Published 2021-01-01“…Here, a new deconvolution method for both shear and pressure wave propagation is developed based on an iterative time-domain procedure using a one-dimensional finite element column. …”
Get full text
Article -
2676
A New Double Truncated Generalized Gamma Model with Some Applications
Published 2021-01-01“…We use the Newton Raphson approach to approximate model parameters that increase the log-likelihood function and some of the parameters have a closed iterative structure. Six actual data sets and six simulated data sets were tested to demonstrate how the proposed model works in reality. …”
Get full text
Article -
2677
Racism in German healthcare: uncovering the construction and silencing of the “other”
Published 2025-01-01“…The data analysis developed iteratively, with inductive and deductive steps complementing one another. …”
Get full text
Article -
2678
Suppression of the Karman vortex behind a circular cylinder by ON-OFF control using the pressure gradient
Published 2024-12-01“…The previous study using model predictive control has the disadvantage that the computational cost is enormous because iterative calculations are performed while predicting future responses. …”
Get full text
Article -
2679
Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors.
Published 2024“…Future research should focus on enhancing sampling efficiency in matrix-vector products along MCGMRES iterations and implementing the RSVD algorithm on big data analysis platforms.…”
Get full text
Thesis -
2680
Advancing Anaesthetist Rostering Quality: A Practical Approach Toward Fairness and Efficiency
Published 2025-01-01“…The proposed model optimises the roster by satisfying mandatory constraints first (such as legal requirements), and then minimising soft constraint violations, such as employee preferences, through iterative refinement. The evaluation function assesses roster quality by minimising penalties for soft constraint violations. …”
Get full text
Article