-
481
Social Inversions and Education
Published 2019-01-01“…The article focuses on hierarchical and inverse relations in social systems. …”
Get full text
Article -
482
Adaptive Fuzzy Sliding Mode Tracking Control of Uncertain Underactuated Nonlinear Systems: A Comparative Study
Published 2016-01-01“…The trajectory tracking of underactuated nonlinear system with two degrees of freedom is tackled by an adaptive fuzzy hierarchical sliding mode controller. The proposed control law solves the problem of coupling using a hierarchical structure of the sliding surfaces and chattering by adopting different reaching laws. …”
Get full text
Article -
483
Cascaded algorithm for background modeling using pixel-based and block-based methods
Published 2013-04-01“…Block-based background modeling couldn't obtain the exact shape of foreground,while pixel-based approaches couldn't handle non-stationary backgrounds effectively.To solve the problem,a hierarchical scheme for background modeling was presented.The hierarchical model used block-based method proposed to obtain coarse background and foreground regions firstly,and then the operations of pixel-level foreground refining and model updating based on Gaussian mixture model were performed on special regions of the input image.These two algorithms in different levels were combined by adopting an asymmetric feed-forward strategy.Experimental results show that the hierarchical method proposed can obtain the exact shape of foreground and process non-stationary scenes well,in addition,it is insensitive to illumination change and can provide better results than any single approach in it,meanwhile,the integrated computation time is shorter than the sum of those of running the block and pixel-level methods,and satisfies real-time processing.…”
Get full text
Article -
484
Optimal Design of a Hazardous Materials Transportation Network considering Uncertainty in Accident Consequences
Published 2024-01-01“…However, designing such a network presents two major challenges: quantifying the risk associated with hazardous materials transportation and addressing the hierarchical relationship between government and companies. …”
Get full text
Article -
485
Video Traffic Flow Analysis in Distributed System during Interactive Session
Published 2016-01-01“…The distributed hierarchical network system contains all the local and remote storage multimedia servers. …”
Get full text
Article -
486
Routing and Clustering of Sensor Nodes in the Honeycomb Architecture
Published 2019-01-01“…The simulations testify the superiority of our protocol against the existing geographical and hierarchical protocols.…”
Get full text
Article -
487
Does muscle fatigue change motor synergies at different levels of neuromotor control?
Published 2025-01-01“…We investigated the effects of static and dynamic fatigue on motor synergies, focusing on their hierarchical control. Specifically, we examined whether changes in fatigue influence the central nervous system’s ability to preserve movement stability. …”
Get full text
Article -
488
Tracking Control for Mobile Robots Considering the Dynamics of All Their Subsystems: Experimental Implementation
Published 2017-01-01“…The highest hierarchical level is a kinematic control for the mechanical structure; the medium level includes two controllers based on differential flatness for the actuators; and the lowest hierarchical level consists of two average controllers also based on differential flatness for the power stage. …”
Get full text
Article -
489
EMIKNet: Expanding Multiple-Instance Inverse Kinematics Network for Multiple End-Effector and Multiple Solutions
Published 2025-01-01“…We also verify multiple solutions obtained through hierarchical computation of GMM.…”
Get full text
Article -
490
Multiscale deformable registration of noisy medical images
Published 2007-12-01“…Accurate registration of noisy images is achieved byobtaining a hierarchical multiscale decomposition of the images and iterativelyregistering the resulting components. …”
Get full text
Article -
491
Une incursion en sociologie
Published 2025-01-01“…This leads to different hierarchical structures depending on the discipline maintained. …”
Get full text
Article -
492
Flavoured leptogenesis and CPμτ symmetry
Published 2020-01-01“…In addition to the strong hierarchical N1-dominated scenario (N1DS) in the ‘two flavour regime’ of leptogenesis, we show that one may choose the right-handed (RH) neutrino mass hierarchy as mild as M2 ≃ 4.7M1 for a perfectly valid hierarchical N1DS. …”
Get full text
Article -
493
Hybrid multiscale landmark and deformable image registration
Published 2007-07-01“…A briefoverview of landmark and deformable registration techniques ispresented. The hierarchical multiscale image decomposition of E.Tadmor, S. …”
Get full text
Article -
494
Adaptive Parameter Approaching Law-Based Sliding Mode Control for Wheeled Robots
Published 2025-01-01“…By integrating the advantages of hierarchical sliding mode control and neural networks, the method effectively tracks the target trajectory. …”
Get full text
Article -
495
Research on Situation Awareness Model of Information Content Security Incidents in Telecommunication Network
Published 2014-02-01“…Aiming at the main features of the information content security incidents and telecommunication network themselves,a design of situation awareness model was presented.The model using distributed character data collection and hierarchical progressive integration,the status of security situation of the whole telecommunication network was analyzed.According to the structure of model,hierarchical information fusion proximate calculation based on evidence theory was used to resolve the problem of how to use the initial information to determine the probability in high level information fusion.The simulation results show that the model can compute fast in real time in high accuracy,and it can perceive and determine the incidents effectively.…”
Get full text
Article -
496
A self-adapting scalable model for distributed network management
Published 2002-01-01“…A flexible, dynamic, self-adapting and scalable model is presented for managing large-scale distributed networks. A hierarchical architecture, supporting distributed management based on domain, is adopted. …”
Get full text
Article -
497
Design for database access control mechanism based on blockchain
Published 2020-05-01“…Aiming at the current problems of database access control,the thought of blockchain technology applied to database access control was proposed.The implementation mechanism of database access control based on blockchain was designed from several aspects as blockchain hierarchical structure,logical hierarchical structure of access control process,implementation principle of access control,consensus authentication principle of access control,and construction mechanism of access control blockchain system.The performance of database access control system based on blockchain was assessed.A complete framework was provided for blockchain applied in database access control.Through strengthening the authentication and supervision of visitor identity,access permission and access behavior,the database access control ability is improved effectively.…”
Get full text
Article -
498
Research and implementation of text classification method for customer service orders based on multi-model fusion
Published 2021-11-01“…Due to the large amount of order categories and their hierarchical associations, traditional manual order classification method of customer service in telecom call center has the problems of long archiving time, low efficiency and unsustainable accuracy.To solve this problem, a novel text classification algorithm based on multi-model fusion was proposed, which intelligently classify orders with multiple models based on data characteristics and their hierarchical associations, the effectiveness of this method was verified.The current manual operation process was optimized and operation efficiency was enhanced, which support the intelligent transformation and upgradation of existing customer service system.…”
Get full text
Article -
499
Suggestion on establishing curriculum system for information security major
Published 2016-07-01“…The problems of information security demands for professional talents and existing curriculum system setting of information security major were analyzed.A modular and hierarchical curriculum system construction scheme of information security was given under the guidance of information security professional standards promulgated by the Ministry of Education Information Security Teaching Guidance Committee.The construction of curriculum system for information security major at Xi'an University of Posts and Telecommunications was taken as the example.The modular and hierarchical optimization and implementation scheme of information se-curity undergraduate curriculum system were designed.It will be valuable to the information security profes-sional talent training.…”
Get full text
Article -
500
SYN flood attack defense strategy for asymmetric routing
Published 2013-08-01“…The detection method uses SYN packet rate and destination IP address entropy, and the hierarchical connection management strategy consists of a method based on SYN packet and a method based on data packet. …”
Get full text
Article