Showing 481 - 500 results of 1,895 for search '"hierarchical"', query time: 0.06s Refine Results
  1. 481

    Social Inversions and Education by D. A. Sevost’yanov

    Published 2019-01-01
    “…The article focuses on hierarchical and inverse relations in social systems. …”
    Get full text
    Article
  2. 482

    Adaptive Fuzzy Sliding Mode Tracking Control of Uncertain Underactuated Nonlinear Systems: A Comparative Study by Faten Baklouti, Sinda Aloui, Abdessattar Chaari

    Published 2016-01-01
    “…The trajectory tracking of underactuated nonlinear system with two degrees of freedom is tackled by an adaptive fuzzy hierarchical sliding mode controller. The proposed control law solves the problem of coupling using a hierarchical structure of the sliding surfaces and chattering by adopting different reaching laws. …”
    Get full text
    Article
  3. 483

    Cascaded algorithm for background modeling using pixel-based and block-based methods by Wen-hua XIE, Ben-shun YI, Jin-sheng XIAO, Liang-cai GAN

    Published 2013-04-01
    “…Block-based background modeling couldn't obtain the exact shape of foreground,while pixel-based approaches couldn't handle non-stationary backgrounds effectively.To solve the problem,a hierarchical scheme for background modeling was presented.The hierarchical model used block-based method proposed to obtain coarse background and foreground regions firstly,and then the operations of pixel-level foreground refining and model updating based on Gaussian mixture model were performed on special regions of the input image.These two algorithms in different levels were combined by adopting an asymmetric feed-forward strategy.Experimental results show that the hierarchical method proposed can obtain the exact shape of foreground and process non-stationary scenes well,in addition,it is insensitive to illumination change and can provide better results than any single approach in it,meanwhile,the integrated computation time is shorter than the sum of those of running the block and pixel-level methods,and satisfies real-time processing.…”
    Get full text
    Article
  4. 484

    Optimal Design of a Hazardous Materials Transportation Network considering Uncertainty in Accident Consequences by Hongfei Jia, Junzhe Li

    Published 2024-01-01
    “…However, designing such a network presents two major challenges: quantifying the risk associated with hazardous materials transportation and addressing the hierarchical relationship between government and companies. …”
    Get full text
    Article
  5. 485

    Video Traffic Flow Analysis in Distributed System during Interactive Session by Soumen Kanrar, Niranjan Kumar Mandal

    Published 2016-01-01
    “…The distributed hierarchical network system contains all the local and remote storage multimedia servers. …”
    Get full text
    Article
  6. 486

    Routing and Clustering of Sensor Nodes in the Honeycomb Architecture by Amine Rais, Khalid Bouragba, Mohammed Ouzzif

    Published 2019-01-01
    “…The simulations testify the superiority of our protocol against the existing geographical and hierarchical protocols.…”
    Get full text
    Article
  7. 487

    Does muscle fatigue change motor synergies at different levels of neuromotor control? by Michał Pawłowski, Mariusz P. Furmanek, Mariusz P. Furmanek, Grzegorz Juras

    Published 2025-01-01
    “…We investigated the effects of static and dynamic fatigue on motor synergies, focusing on their hierarchical control. Specifically, we examined whether changes in fatigue influence the central nervous system’s ability to preserve movement stability. …”
    Get full text
    Article
  8. 488

    Tracking Control for Mobile Robots Considering the Dynamics of All Their Subsystems: Experimental Implementation by José Rafael García-Sánchez, Ramón Silva-Ortigoza, Salvador Tavera-Mosqueda, Celso Márquez-Sánchez, Victor Manuel Hernández-Guzmán, Mayra Antonio-Cruz, Gilberto Silva-Ortigoza, Hind Taud

    Published 2017-01-01
    “…The highest hierarchical level is a kinematic control for the mechanical structure; the medium level includes two controllers based on differential flatness for the actuators; and the lowest hierarchical level consists of two average controllers also based on differential flatness for the power stage. …”
    Get full text
    Article
  9. 489

    EMIKNet: Expanding Multiple-Instance Inverse Kinematics Network for Multiple End-Effector and Multiple Solutions by Youn-Jae Go, Jun Moon

    Published 2025-01-01
    “…We also verify multiple solutions obtained through hierarchical computation of GMM.…”
    Get full text
    Article
  10. 490

    Multiscale deformable registration of noisy medical images by Dana Paquin, Doron Levy, Lei Xing

    Published 2007-12-01
    “…Accurate registration of noisy images is achieved byobtaining a hierarchical multiscale decomposition of the images and iterativelyregistering the resulting components. …”
    Get full text
    Article
  11. 491

    Une incursion en sociologie by Bok, Julien

    Published 2025-01-01
    “…This leads to different hierarchical structures depending on the discipline maintained. …”
    Get full text
    Article
  12. 492

    Flavoured leptogenesis and CPμτ symmetry by Rome Samanta, Manibrata Sen

    Published 2020-01-01
    “…In addition to the strong hierarchical N1-dominated scenario (N1DS) in the ‘two flavour regime’ of leptogenesis, we show that one may choose the right-handed (RH) neutrino mass hierarchy as mild as M2 ≃ 4.7M1 for a perfectly valid hierarchical N1DS. …”
    Get full text
    Article
  13. 493

    Hybrid multiscale landmark and deformable image registration by Dana Paquin, Doron Levy, Lei Xing

    Published 2007-07-01
    “…A briefoverview of landmark and deformable registration techniques ispresented. The hierarchical multiscale image decomposition of E.Tadmor, S. …”
    Get full text
    Article
  14. 494

    Adaptive Parameter Approaching Law-Based Sliding Mode Control for Wheeled Robots by Ming Hou, Limeng Jia, Zhengqin Wang

    Published 2025-01-01
    “…By integrating the advantages of hierarchical sliding mode control and neural networks, the method effectively tracks the target trajectory. …”
    Get full text
    Article
  15. 495

    Research on Situation Awareness Model of Information Content Security Incidents in Telecommunication Network by Lin Ge, Xinsheng Ji, Tao Jiang

    Published 2014-02-01
    “…Aiming at the main features of the information content security incidents and telecommunication network themselves,a design of situation awareness model was presented.The model using distributed character data collection and hierarchical progressive integration,the status of security situation of the whole telecommunication network was analyzed.According to the structure of model,hierarchical information fusion proximate calculation based on evidence theory was used to resolve the problem of how to use the initial information to determine the probability in high level information fusion.The simulation results show that the model can compute fast in real time in high accuracy,and it can perceive and determine the incidents effectively.…”
    Get full text
    Article
  16. 496

    A self-adapting scalable model for distributed network management by WANG Ping1, ZHAO Hong1, LI Li2

    Published 2002-01-01
    “…A flexible, dynamic, self-adapting and scalable model is presented for managing large-scale distributed networks. A hierarchical architecture, supporting distributed management based on domain, is adopted. …”
    Get full text
    Article
  17. 497

    Design for database access control mechanism based on blockchain by Yonggui FU, Jianming ZHU

    Published 2020-05-01
    “…Aiming at the current problems of database access control,the thought of blockchain technology applied to database access control was proposed.The implementation mechanism of database access control based on blockchain was designed from several aspects as blockchain hierarchical structure,logical hierarchical structure of access control process,implementation principle of access control,consensus authentication principle of access control,and construction mechanism of access control blockchain system.The performance of database access control system based on blockchain was assessed.A complete framework was provided for blockchain applied in database access control.Through strengthening the authentication and supervision of visitor identity,access permission and access behavior,the database access control ability is improved effectively.…”
    Get full text
    Article
  18. 498

    Research and implementation of text classification method for customer service orders based on multi-model fusion by Liang ZHANG, Xiaoju DAI, Rong ZHENG, Tongze He

    Published 2021-11-01
    “…Due to the large amount of order categories and their hierarchical associations, traditional manual order classification method of customer service in telecom call center has the problems of long archiving time, low efficiency and unsustainable accuracy.To solve this problem, a novel text classification algorithm based on multi-model fusion was proposed, which intelligently classify orders with multiple models based on data characteristics and their hierarchical associations, the effectiveness of this method was verified.The current manual operation process was optimized and operation efficiency was enhanced, which support the intelligent transformation and upgradation of existing customer service system.…”
    Get full text
    Article
  19. 499

    Suggestion on establishing curriculum system for information security major by Xiang-shen MIN, Jiu-lun FAN, Xue-feng ZHANG, Yi-xian LIU, Fang REN

    Published 2016-07-01
    “…The problems of information security demands for professional talents and existing curriculum system setting of information security major were analyzed.A modular and hierarchical curriculum system construction scheme of information security was given under the guidance of information security professional standards promulgated by the Ministry of Education Information Security Teaching Guidance Committee.The construction of curriculum system for information security major at Xi'an University of Posts and Telecommunications was taken as the example.The modular and hierarchical optimization and implementation scheme of information se-curity undergraduate curriculum system were designed.It will be valuable to the information security profes-sional talent training.…”
    Get full text
    Article
  20. 500

    SYN flood attack defense strategy for asymmetric routing by Jian-xi TAO, Li ZHOU, Zhou ZHOU, Wei YANG, Qing-yun LIU, Rong YANG

    Published 2013-08-01
    “…The detection method uses SYN packet rate and destination IP address entropy, and the hierarchical connection management strategy consists of a method based on SYN packet and a method based on data packet. …”
    Get full text
    Article