-
421
Research progress and trend of text summarization
Published 2018-06-01“…With the explosive growth of information on the Internet,how to extract useful information from massive information has become a key technical issue.The text summarization technology can compress and extract refined and concise document information from big data,effectively reducing the user information overload problem,and it has become a research hotspot.The domestic and foreign text summarization methods and their concrete realization in recent years were analyzed,the advantages and disadvantages between traditional methods and deep learning summary methods were compared,and a reasonable outlook for future research directions was made.…”
Get full text
Article -
422
Intelligent routing strategy in the Internet of things based on deep reinforcement learning
Published 2019-06-01“…At the era of the Internet of things,networking mode that connects everything would bring tremendous increase in the data volume and challenge the traditional routing protocols.The limitations of the existing routing protocols was analyzed when facing the data explosion and then the routing selection problem was re-modeled as a Markov decision process.On this basis,the deep reinforcement learning technique was utilized to choose the next-hop router for data transmission task in order to shorten the transmission path length while network congestion was avoided.The simulation results demonstrate that the congestion probability can be reduced significantly and the network throughput can be enhanced by the proposed strategy.…”
Get full text
Article -
423
ANYTHING NEW UNDER THE SUN?! EXPLORING FURTHER AVENUES FOR WRITING ANOTHER COMMENTARY ON CHRONICLES
Published 2018-12-01“… Over the past two decades, there has been an explosion of new commentaries on Chronicles. Scholars may justifiably ask whether there is anything new under the sun to investigate in another commentary on this book. …”
Get full text
Article -
424
Component-Based Formal Modeling of PLC Systems
Published 2013-01-01“…At one hand, the model must be consistent with the system at the other hand, the model must have suitable scale because of the state explosion problem of verification. This paper proposes a systemic method for the construction of verification model. …”
Get full text
Article -
425
Research on technology mechanism used in P2P network video surveillance system
Published 2022-12-01“…At present, the scale of video monitoring of small and medium-sized enterprises and families in the civil market is growing explosively.In view of the monitoring demand of tens of millions of cameras, peer to peer (P2P) network video monitoring technology was widely used in the industry.The principle of P2P network video monitoring technology was expounded comprehensively, and the streaming media control technology, transmission technology and private network crossing technology adopted by the mainstream P2P network video monitoring were analyzed.Finally, a large-scale deployment of P2P video surveillance solution was proposed.…”
Get full text
Article -
426
Slot development using the controlled blasting in the ore body "Borska reka"
Published 2024-01-01“…Blasting the lower and upper parts of the slot created a free space of approximately 840 m³ with an approximate specific explosive consumption of 2.25 kg/m³…”
Get full text
Article -
427
Smart Internet of things aided by“terminal-edge-cloud” cooperation
Published 2018-09-01“…The further expansion of the Internet of things (IoT) traffic and the explosive growth of the terminal data require higher delay performance and computing ability of the access network.The traditional wireless network architecture has been unable to support the rapid development of IoT.Thus,the edge-driven smart IoT architecture was proposed.Firstly,the main factors that restrict the development of IoT were analyzed,and then the edge computing technology was introduced into the IoT to form a “terminal-edge-cloud” cooperative computing architecture to deal with the traffic data efficiently and timely.Finally,the challenges of the edge-driven smart IoT were analyzed and the future work of this system was proposed.…”
Get full text
Article -
428
Research and application of broadband speed-up technology based on IPTV
Published 2018-07-01“…With the increasing competition of broadband business homogenization and the explosive growth of IPTV users,differentiated products and service promotion are particularly important in the market competition.The development of IPTV industry and the technology of broadband speed-up technology was introduced,the core business process of broadband speed technology based on IPTV was expounded.Research results show that IPTV-based broadband speed-up technology can provide users with convenient and dynamic bandwidth adjustment services to meet the requirements of broadband bandwidth and IPTV users’ personalized bandwidth,the differentiation service advantage can be established,the risk of losing customers was reduced,the value of broadband and IPTV users is promoted.…”
Get full text
Article -
429
Malware classification method based on static multiple-feature fusion
Published 2017-11-01“…In recent years,the amount of the malwares has tended to rise explosively.New malicious samples emerge as variability and polymorphism.By means of polymorphism,shelling and confusion,traditional ways of detecting can be avoided.On the basis of massive malicious samples,a safe and efficient method was designed to classify the mal-wares.Extracting three static features including file byte features,assembly features and PE features,as well as im-proving generalization of the model through feature fusion and ensemble learning,which realized the complementarity between the features and the classifier.The experiments show that the sample achieve a stable F1-socre (93.56%).…”
Get full text
Article -
430
Hyperbolic (3+1)-Dimensional Nonlinear Schrödinger Equation: Lie Symmetry Analysis and Modulation Instability
Published 2022-01-01“…As a result, the modulation instability condition and the explosive rate are also discussed.…”
Get full text
Article -
431
Performance and key issues of 5G multi-channel joint transceiver technology
Published 2020-07-01“…With the explosive growth of data services,5G indoor coverage has become the top priority.Deploying 5G indoor subsystem is one of the important means to solve the problem of 5G indoor coverage.An upgrading scheme of 5G indoor subsystem based on multi-channel transceiver technology was introduced.This scheme can achieve double flow with single feeder and four flow with double feeder,and improve the performance of 5G with low cost.The main construction of the scheme includes:adding shaft cable,adding combiner,adding coupler,without changing the flat floor network structure.…”
Get full text
Article -
432
Optimization of Key Parameters for Coal Seam L-CO<sub>2</sub> Phase Transition Blasting Based on Response Surface Methodology
Published 2025-01-01“…This caused the aspect ratio of the external ellipse of the explosion fracture zone to range between 1.00 and 1.72. …”
Get full text
Article -
433
Asymmetries and Circumstellar Interaction in the Type II SN 2024bch
Published 2025-01-01“…Optical spectra from 2.8 days after the estimated explosion reveal narrow lines of H i , He ii , C iv , and N iv that disappear by day 6. …”
Get full text
Article -
434
Investigation on the Vibration Effect of Shock Wave in Rock Burst by In Situ Microseismic Monitoring
Published 2018-01-01“…Rock burst is a physical explosion associated with enormous damage at a short time. …”
Get full text
Article -
435
Behavior of unconfined steel-fiber reinforced UHPC post high-temperature exposure
Published 2025-07-01“…While many studies have focused on thermal effects such as explosive spalling and the compressive and flexural properties of UHPC, there is limited research on its residual uniaxial tensile behavior. …”
Get full text
Article -
436
SYMBOLIC EXECUTION IN AUTOMATICALLY GENERATIONOF DATA OF SOFTWARE TESTING
Published 2016-06-01“…This paper also shows different challenges that need setting in this field such as the explosion of execution paths in a program, the ability of constraint solving, memory modelling or concurrent problems etc. …”
Get full text
Article -
437
Adaptive Asymptotic Tracking Control for a Class of Uncertain Switched Systems via Dynamic Surface Technique
Published 2019-01-01“…In addition, a dynamic surface control method is proposed by employing a nonlinear filter such that the “explosion of complexity” problem existing in the conventional backstepping design can be overcome. …”
Get full text
Article -
438
Derechos reproductivos y políticas demográficas en América Latina
Published 2009-09-01“…Dichos debates incluían la explosión demográfica, la implementación de programas de desarrollo promocionados por organismos internacionales, la creciente movilización social y política de su población, y las transformaciones en la sexualidad y los roles de género. …”
Get full text
Article -
439
Vernuwing in die kerklied: die Liedboek van die Kerk (2001)
Published 2003-06-01“… Renewal in hymnody and an “explosion” of hymns are taking place world-wide. Many new hymnals were published in the past decades. …”
Get full text
Article -
440
Optimization of task scheduling for computing reuse in computing power network
Published 2023-11-01“…To cope with the challenges posed by the future explosive growth in computing power demand, computing reuse technology was introduced into the computing power network to reduce service latency and computational resource consumption by reusing the results of computational tasks.Based on this, a service federation-based context-aware online learning algorithm was proposed.First, the reuse index was designed to reduce the extra lookup latency.Then, online learning was performed based on the service federation mechanism to make computational task scheduling decisions according to contextual information and historical experience.The experimental results show that the proposed algorithm outperforms the baseline algorithms in terms of service latency and computational resource consumption.…”
Get full text
Article