Showing 5,881 - 5,900 results of 31,041 for search '"strategy"', query time: 0.12s Refine Results
  1. 5881

    Optimizing low complexity encoding method for systematic polar code by Linhua MA, Shiping LIU, Xing HU, Tianyu HUANG, Bin XU

    Published 2018-07-01
    “…In order to solve the delay caused by step-by-step calculation and the computational complexity caused by iterative “exclusive-or” computation during the encoding process,a dimensionality reduction strategy was proposed and defined.Based on this,system polarization code parallel coding algorithm for cracking strategy was proposed.Simulation and computational complexity analysis were carried out on AWGN channel.The results show that the coding gain of the above algorithm is slightly better than the traditional one or almost the same,but the computational complexity is up to 80.92%,which is more suitable for hardware implementation and engineering application.It is more suitable for hardware implementation and has a certain practical value.…”
    Get full text
    Article
  2. 5882

    Research of the Ramp Start Control of Signal Speed Ratio Electric Vehicle by Zhang Qing, Xiong Huiyuan

    Published 2016-01-01
    “…For signal speed ratio electric vehicle is prone to slide backward under ramp start condition,a ramp start control strategy based on road gradient identification is proposed. …”
    Get full text
    Article
  3. 5883

    Discrimination of three symmetric states by Lan-lan Li, Wen-hai Zhang, Ke Zhang, Cheng-yu Fan

    Published 2025-01-01
    “…To obtain completely accessible information about the input pure states, this strategy makes improvements to the two standard strategies of quantum state discrimination, namely the minimum error discrimination and unambiguous discrimination. …”
    Get full text
    Article
  4. 5884

    Adaptive JPEG steganography based on distortion cost updating by Guang-ming TANG, Yi SUN, Xiao-yu XU, Yu WANG

    Published 2017-09-01
    “…Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding,so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding,an adaptive JPEG steganography algorithm based on distortion cost updating was proposed.Firstly,three factors that affect embedding fluctuations were analyzed,including quantization step,the absolute value of the quantized DCT coefficient to be modified and perturbation error.Then the embedding update strategy (EUS) was proposed,which enabled to dynamically update the distortion costs.After that,an adaptive JPEG steganography algorithm was implemented combining the strategy.The experimental result illustrates that the algorithm can significantly improve the secure performance of JPEG steganography algorithm.…”
    Get full text
    Article
  5. 5885

    Design and Simulation Analysis of an Impact-resistant Flexible Joint by Li Yang, Cui Shipeng, Liu Yiwei

    Published 2017-01-01
    “…Then,the impedance control strategy for the joint are made based on the sensory ability of multiple sensors. …”
    Get full text
    Article
  6. 5886

    Comment approfondir la coopération entre rive nord et rive sud de la Méditerranée : Un renouveau économique tenant compte des effets de la rente sur le Sud de la Méditerranée... by Hartmut Elsenhans

    Published 2013-10-01
    “…Without an agricultural surplus, the Arab world cannot follow the East Asian strategy of massive devaluations to make manufactured exports competitive. …”
    Get full text
    Article
  7. 5887

    Proper Treatment and Management of Postcardiotomy Refractory Vasospasm by Caleb R. Weissman, Stephane Leung Wai Sang

    Published 2023-01-01
    “…This case demonstrates our management strategy to provide life-saving support for patients facing postcardiac surgery refractory vasospasm.…”
    Get full text
    Article
  8. 5888

    La controverse sur l’archiprêtre, ou les catholiques élisabéthains dans les coulisses de la clandestinité by Sandra Jusdado-Mollmann

    Published 2008-03-01
    “…But when a community is ordered by the same religious ideology, when it has been forced into clandestinity, and when its very survival is at stake, this strategy seems all the more appropriate. Such is the logic that should have determined the choices of Elizabethan Catholics. …”
    Get full text
    Article
  9. 5889

    Use of Active Learning to Design Wind Tunnel Runs for Unsteady Cavity Pressure Measurements by Ankur Srivastava, Andrew J. Meade

    Published 2014-01-01
    “…We applied the proposed intelligent sampling strategy in characterizing cavity flow classes at subsonic and transonic speeds and demonstrated that the scheme has better classification accuracies, using fewer training points, than a passive Latin Hypercube Sampling (LHS) strategy.…”
    Get full text
    Article
  10. 5890

    Copula-based trading of cointegrated cryptocurrency Pairs by Masood Tadi, Jiří Witzany

    Published 2025-01-01
    “…Abstract This study introduces a novel pairs trading strategy based on copulas for cointegrated pairs of cryptocurrencies. …”
    Get full text
    Article
  11. 5891

    Florida Consumer Preferences for Indoor Foliage Plant Attributes by Hayk Khachatryan, Alicia Rihn

    Published 2016-09-01
    “… Consumer demand for indoor foliage plants is decreasing. One strategy to counter decreasing demand is to align products with consumer needs. …”
    Get full text
    Article
  12. 5892

    Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization by Liming Zhou, Qiaoyan Wen

    Published 2014-03-01
    “…And we propose an energy efficient preserving sensor's location privacy based on ant colony optimization scheme, which is a flexible routing strategy to protect the sensor's location. Simulation results show that our strategy can efficiently reduce the chance of packets being detected and prolong the network lifetime. …”
    Get full text
    Article
  13. 5893

    Dynamic spectrum allocation based on one-band multi-winner auction by Wen-zhu ZHANG, Ling-yun WANG

    Published 2012-02-01
    “…In order to improve the effectiveness of traditional auction in DSA (dynamic spectrum allocation) issue in cognitive radio networks,a new dynamic spectrum allocation algorithm based on one-band multi-winner auction was proposed.Compared with the original greedy algorithm,the new algorithm can achieve better spectrum allocation solutions with lower computational complexity by introducing the multiple greedy strategy.It increases the seller's revenue by improving the VCG (vickery-clarke-groves) mechanism,while retaining the dominant strategy incentive compatible property.In addition,it suppresses the occurrence of collusion effectively.Simulation results show that the algorithm proposed can get spectrum allocation efficiency close to the optimal solution and increase the auction revenue significantly.…”
    Get full text
    Article
  14. 5894

    Hyperpath Searching Algorithm considering Delay at Intersection and Its Application in CVIS for Vehicle Navigation by Ziyan Ju, Muqing Du

    Published 2022-01-01
    “…A “recommendation priority passable phase” guidance strategy is proposed for the cooperative vehicle-infrastructure system (CVIS) based on the optimal hyperpath. …”
    Get full text
    Article
  15. 5895

    Adaptive Iterative Learning Control of Hybrid Drive Cable Parallel Manipulator by Jianbin Cao, Mingsheng Wei, Haixiao Zhao

    Published 2022-05-01
    “…For a HDCPM system with nonlinear, time-varying characteristics and repetitive time-varying disturbance, an adaptive iterative learning control strategy, which controls gain variations with the iterations, is designed. …”
    Get full text
    Article
  16. 5896

    An Enhanced Slime Mould Algorithm and Its Application for Digital IIR Filter Design by Xiaodan Liang, Dong Wu, Yang Liu, Maowei He, Liling Sun

    Published 2021-01-01
    “…The three enhanced strategies are chaotic initialization strategy (CIS), orthogonal learning strategy (OLS), and boundary reset strategy (BRS). …”
    Get full text
    Article
  17. 5897

    State of Charge Prediction for Electric Loader Battery Based on Extreme Learning Machine by Wei Ding, Fumin Zou, Jishun Liu, Cheng Zhang

    Published 2025-01-01
    “…In order to accurately predict the state of charge (SOC) of electric loader battery, a multi-strategy improved dung beetle optimization algorithm (MIDBO) is proposed to optimize the SOC prediction method of the extreme learning machine (ELM). …”
    Get full text
    Article
  18. 5898

    Countermeasures to Decrease Water Cut and Increase Oil Recovery from High Water Cut, Narrow-Channel Reservoirs in Bohai Sea by Gaocheng Feng, Yuhui Zhou, Weiying Yao, Lingtong Liu, Zhao Feng, Yanjun Yi, Yi Feng

    Published 2021-01-01
    “…Herein, three optimization strategies were developed based on the proposed development mode: a seepage field optimization strategy was developed based on the quantified injection-production index; a well pattern optimization strategy for narrow-channel reservoirs was developed to overcome the production energy refueling problem; an injection-production measure optimization strategy was developed to tap the different types of remaining oil. …”
    Get full text
    Article
  19. 5899

    Theoretical-methodological framework of analysis of Albanian public discourses on Serbian sacred monuments in Kosovo and Metohia by Pešić Milena

    Published 2024-01-01
    “…The key theoretical concept of strategy is a kind of synthesis of strategy categories from the mentioned model, and some categories of political discourse strategies are operationalized into analytical tools of our research. …”
    Get full text
    Article
  20. 5900

    Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss by Aryan Sharma, Haoming Wang, Deepak Mishra, Aruna Seneviratne

    Published 2025-01-01
    “…This proposed relationship was empirically verified, and our contention-based defence strategy was experimentally validated. Experiments show that our contention-based defence strategy increases the chances of evading undesired WiFi-based keystroke recognition by around 70%. …”
    Get full text
    Article