Showing 5,941 - 5,960 results of 31,041 for search '"strategy"', query time: 0.10s Refine Results
  1. 5941

    Model split-based data privacy protection method for federated learning by CHEN Ka

    Published 2024-09-01
    “…In addition, the leakage-restriction training strategy was proposed to further reduce data leaks. …”
    Get full text
    Article
  2. 5942

    PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark by Shi-zhuo DENG, Ji-tao YAO, Bo-tao WANG, Yue-mei CHEN, Ye YUAN, Yan-hui LI, Guo-ren WANG

    Published 2016-05-01
    “…To address the low-efficiency problem for query privacy protection on big data,parallel CPIR-V (PCPIR-V),which had a high level of privacy protection for nearest neighbor query,was presented and implemented based on spark.Two parallel strategies for PCPIR-V,Row strategy and Bit strategy,were proposed.To avoid redundant multiplications,the repeated products were cached based on a clustering technique while computing CPIR on Spark.According to the evaluation results of PCPIR-V on three datasets,the scalablity of PCPIR-V is good until the number of core is larger than 40.The cost of PCPIR-V with the method of caching partial multiplication results is reduced by 20% averagely.…”
    Get full text
    Article
  3. 5943

    Bacon et la méthode : la libération de l’invention by Luc Peterschmitt

    Published 2014-10-01
    “…I take such a claim to be mainly a rhetorical strategy aiming at preventing men from being satisfied with their present knowledge. …”
    Get full text
    Article
  4. 5944

    THE COMPETENCE-BASED FOCUSED FORMS OF ESTIMATION OF PROFESSIONAL FOREIGN-LANGUAGE COMMUNICATIVE COMPETENCE (CRITERIA ESTIMATION) by I. A. Mazaieva

    Published 2013-10-01
    “…It also contains a pedagogical strategy of developing criteria-referenced descriptors of performance assessment which serve as guidelines for teachers as well as a strategy of developing checking lists for students. …”
    Get full text
    Article
  5. 5945

    Study on the Composite Driving System of Dexterous Hand by Luo Tianhong, Liu Lang, Chen Cai

    Published 2017-01-01
    “…Aiming at the problems which perform in the traditional driving mode,for example,the complex structure of motor drive system,the large volume of hydraulic drive system,the difficult control of air pressure drive system,a composite driving system actuated by micro- motor and shape memory alloy( SMA) spring is proposed,then this system is applied to a humanoid multi- finger dexterous hand,the overall structure of the dexterous hand is simplified,and the control strategy gets optimized. The relation of the restoring force and displacement of the SMA spring is researched,then the relationships among knuckles movement and the influence factor on the contact force of grasping object are analyzed,by using the sliding mode PID intelligent control strategy,the movement of the finger is controlled,the control efficiency of dexterous hand is improved. …”
    Get full text
    Article
  6. 5946

    Robust Fractional-Order PID Controller Tuning Based on Bode’s Optimal Loop Shaping by Lu Liu, Shuo Zhang

    Published 2018-01-01
    “…This paper presents a novel fractional-order PID controller tuning strategy based on Bode’s optimal loop shaping which is commonly used for LTI feedback systems. …”
    Get full text
    Article
  7. 5947

    Alberto Fujimori : le populisme de l’efficacité by Diana Burgos-Vigna

    Published 2005-09-01
    “…Throughout his successive terms of office, he developed a political strategy aimed at establishing his legitimacy. This strategy was based on the following measures: the setting up of a direct and almost emotional relationship with the most underprivileged classes through clientelist practices; the disintegration of the social fabric in order to prevent any opposition and strengthen the power of the Head of State; the instrumentalisation of certain groups, in particular via social programmes; lastly, the constant and ever-increasing control over information by keeping a close watch on the media and political opponents. …”
    Get full text
    Article
  8. 5948

    Defectology and inclusion by Stine Vik, Hege Merete Somby

    Published 2018-09-01
    “…In our opinion, the educational strategy as a “negative education” is a paradox to the overarching aim of inclusive education. …”
    Get full text
    Article
  9. 5949

    Proactive caching and personalized delivery mechanism of heterogeneous content for MAR applications in the Metaverse by XU Siya, FU Qimeng, GUO Shaoyong

    Published 2024-10-01
    “…Specially, by introducing the personalized recommendation mechanism of foreground content, a differentiated delivery strategy of foreground content was designed. Simulation results show that the proposed mechanism outperforms NCPCR, CCS-AGP, and AIEC-RSC strategy in terms of cache hit rate, average response latency for foreground content and heterogeneous content.…”
    Get full text
    Article
  10. 5950

    Cost Analysis of Monitoring Asthma Treatment using Sputum Cell Counts by Liesel D’silva, Amiram Gafni, Lehana Thabane, Lata Jayaram, Pat Hussack, Frederick E Hargreave, Parameswaran Nair

    Published 2008-01-01
    “…BACKGROUND: In a four-centre trial, the use of sputum cell counts (sputum strategy [SS]) to guide treatment had resulted in fewer and less severe exacerbations without the need for a higher corticosteroid dose, compared with the use of symptoms and spirometry (clinical strategy [CS]).…”
    Get full text
    Article
  11. 5951

    Speech enhancement method based on multi-domain fusion and neural architecture search by Rui ZHANG, Pengyun ZHANG, Chaoli SUN

    Published 2024-02-01
    “…In order to further improve the self-learning and noise reduction ability of speech enhancement model, a speech enhancement method based on multi-domain fusion and neural architecture search was proposed.The multi-spatial domain mapping and fusion mechanism of speech signals were designed to realize the mining of real complex number correlation.Based on the characteristics of convolution pooling of the model, a complex neural architecture search mechanism was proposed, and the speech enhancement model was constructed efficiently and automatically through the designed search space, search strategy and evaluation strategy.In the comparison and generalization experiment between the optimal speech enhancement model and the baseline model, the two indexes of PESQ and STOI increase by 5.6% compared with the optimal baseline model, and the number of model parameters is the lowest.…”
    Get full text
    Article
  12. 5952

    Routing optimization based on topology control in satellite network by Xiaogang QI, Jiulong MA, Lifang LIU

    Published 2018-02-01
    “…A new double-layer satellite network model for space networking was established and a routing algorithm based on topology control (TCRA) was proposed considering the advantages of low earth orbit and stationary earth orbit satellite networks.This model used virtual node strategy and satellite grouping idea,which regarded the coverage area of each low earth orbit satellite as a virtual node.The network took into account the influence of the polar area on the division of the satellite footprints,such that the upper management satellites can accurately acquire the topology of the lower satellites.Using the improved virtual node strategy,the time slices were superior to other network models in quantity,length and other aspects.Based on the network topology,stationary earth orbit satellites calculate routing for low earth orbit satellites,while low earth orbit satellites were responsible for forwarding data.The simulation results show that the routing algorithm is superior to other algorithms in average end-to-end delay and packet loss rate.…”
    Get full text
    Article
  13. 5953

    CATHARE Assessment of Natural Circulation in the PKL Test Facility during Asymmetric Cooldown Transients by Anis Bousbia Salah, Jacques Vlassenbroeck

    Published 2012-01-01
    “…The calculation results emphasize, mainly, the effect of the cooldown strategy, and the conditions that could lead to the occurrence of the NCI phenomenon.…”
    Get full text
    Article
  14. 5954

    A institucionalização da participação comunitária no SUS e a função imunitária do direito by Lutiane de Lara, Neuza Maria de Fátima Guareschi

    Published 2016-01-01
    “…In its approximation to law, the focus of the community experience as a political strategy for struggle and institutionalization in the State has taken the path of negative immunization of the right to health by the State. …”
    Get full text
    Article
  15. 5955

    Optimum response scheme of intrusion detection based on information theory by Youliang TIAN, Yulong WU, Qiuxian LI

    Published 2020-07-01
    “…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
    Get full text
    Article
  16. 5956

    Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers by Hui QIAN, Guangqiu LI, Yifan DING

    Published 2020-05-01
    “…The locations of the eavesdroppers have serious impact on the physical layer security performance of simultaneous wireless information and power transfer (SWIPT) systems with transmit antenna selection (TAS) and power split (PS) strategy,which can be considered to be modeled as Poisson point process (PPP).The closed-form expressions for secrecy outage probability (SOP) of SWIPT system with TAS and PS strategy under non-colluding and colluding eavesdropping scenarios were derived by using probability generation function of PPP,respectively.Numerical and simulation results show that,the larger the number of transmit antennas,the smaller the distance between the transmitter and the information receiver,and the smaller the PS factor,the smaller SOP of SWIPT system under non-colluding and colluding eavesdropping scenarios.Colluding eavesdropping will further deteriorate the physical layer security performance of SWIPT systems.…”
    Get full text
    Article
  17. 5957

    CATALYSTS AND INHIBITORS OF POLITICAL CAREER IN RUSSIA by I. A. Lavrov

    Published 2020-02-01
    “…Studying the basic principles of the political elite formation in Russia is the cornerstone for understanding the country’s future strategy and its development vector, since the development strategy will depend on those people who will be at the helm of the country’s governance. …”
    Get full text
    Article
  18. 5958

    Research on the multiuser MIMO linear cooperative spectrum sensing in cognitive radio networks by Yong-qiang HEI, Xiao-hui LI, Wen-tao LI

    Published 2012-02-01
    “…The multiuser MIMO based linear cooperative spectrum sensing problem was investigated in cognitive radio system to improve the reliability of spectrum sensing.Both the local spectrum detecting strategy and global spectrum detecting strategy for multiuser MIMO based linear cooperative spectrum sensing system were derived.Then the optimization model that the different weights assigned on the receive signals of each user at the fusion center for global decision were optimized to maximize the detection probability given a targeted probability of false alarm is established.Furthermore,genetic algorithm (GA) was introduced to find the optimal weight vector of the above-mentioned cooperative spectrum sensing problem,with the purpose of reducing the sensing time in the spectrum sensing process.The simulation results show that,the reliability of spectrum sensing in cooperative spectrum sensing system can be efficiently enhanced with multiple antennas.Besides,the proposed GA method is efficient and stable,and achieves better detection performance when compared with the existing methods.…”
    Get full text
    Article
  19. 5959

    La séduction et l’idéologie : sémantique, syntaxe, argumentation by Jean SZLAMOWICZ

    Published 2017-12-01
    “…In this instance, seduction is a rhetorical battle between logos and pathos.Studying the vocabulary of wine tasting, then other fields with more of an ideological stake, such as antisemitism, the article will show how political activism enlists seductive values as a strategy to win the audience over.The article will stress the role of incantatory importance of ‘word ethos’ and will develop the concept of hypostello, to mean a rhetorical strategy of hiding one’s intentions. …”
    Get full text
    Article
  20. 5960

    Energy Sharing and Performance Bounds in MIMO DFRC Systems: A Trade-Off Analysis by Ziheng Zheng, Xiang Liu, Tianyao Huang, Yimin Liu, Yonina C. Eldar

    Published 2024-01-01
    “…We analyze the properties of the performance bound and the corresponding waveform design strategy to achieve the bound. When the downlink user and the radar target meet certain conditions, we obtain analytical expressions for the bound and the corresponding waveform design strategy. …”
    Get full text
    Article