Showing 7,441 - 7,460 results of 31,041 for search '"strategy"', query time: 0.12s Refine Results
  1. 7441

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    “…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
    Get full text
    Article
  2. 7442

    Research on Q-learning based rate control approach for HTTP adaptive streaming by Li-rong XIONG, Jing-zhi LEI, Xin JIN

    Published 2017-09-01
    “…HTTP adaptive streaming (HAS) has become the standard for adaptive video streaming service.In changing network environments,current hardcoded-based rate adaptation algorithm was less flexible,and it is insufficient to consider the quality of experience (QoE).To optimize the QoE of users,a rate control approach based on Q-learning strategy was proposed.the client environments of HTTP adaptive video streaming was modeled and the state transition rule was defined.Three parameters related to QoE were quantified and a novel reward function was constructed.The experiments were employed by the Q-learning rate control approach in two typical HAS algorithms.The experiments show the rate control approach can enhance the stability of rate switching in HAS clients.…”
    Get full text
    Article
  3. 7443

    Research of Cycloidal Pump for Hybrid Transmission(E-CVT) by Shi Chongshi, Yan Chenxi, Huang Mingyu, Ni Hongjun

    Published 2020-04-01
    “…The oil pump equipped with E-CVT has the function of providing cooling lubrication flow and brake flow.In order to study the use characteristics of cycloidal pump as the power source of E-CVT hydraulic system,the mathematical model is established based on theoretical analysis,and the multi-domain simulation model including signal domain,hydraulic domain and mechanical domain is built by AMESim platform.The model is verified by experimental data.Based on the simulation model,the effects of oil temperature,rotation speed and load pressure on volumetric efficiency and flow characteristics are dynamically studied.At the same time,the low oil temperature start failure of the oil pump in the E-CVT is predicted by the model connection filter,oil sump and pipeline,which provides a reference for the subsequent fuel pump motor related strategy design.…”
    Get full text
    Article
  4. 7444

    L’école est finie ! L’ère trans-moderne du savoir-relation et la fin de la transmission ? by Béatrice Mabilon Bonfils

    Published 2018-03-01
    “…Inclusion/exclusion processes take over from supervisory/control processes and translate into a shaky identity in the work of the teachers, a firming of the forms of control and adaptive ruses, a sort of survival strategy of a school in mutations. The loss of intelligibility of scholastic knowledge is obvious. …”
    Get full text
    Article
  5. 7445

    A flexible pruning on deep convolutional neural networks by Liang CHEN, Yaguan QIAN, Zhiqiang HE, Xiaohui GUAN, Bin WANG, Xing WANG

    Published 2022-01-01
    “…Despite the successful application of deep convolutional neural networks, due to the redundancy of its structure, the large memory requirements and the high computing cost lead it hard to be well deployed to the edge devices with limited resources.Network pruning is an effective way to eliminate network redundancy.An efficient flexible pruning strategy was proposed in the purpose of the best architecture under the limited resources.The contribution of channels was calculated considering the distribution of channel scaling factors.Estimating the pruning result and simulating in advance increase efficiency.Experimental results based on VGG16 and ResNet56 on CIFAR-10 show that the flexible pruning reduces FLOPs by 71.3% and 54.3%, respectively, while accuracy by only 0.15 percentage points and 0.20 percentage points compared to the benchmark model.…”
    Get full text
    Article
  6. 7446

    Can malaria parasite pathogenesis be prevented by treatment with tumor necrosis factor-alpha? by Avner Friedman, Edward M. Lungu

    Published 2013-03-01
    “…Our study is recommending administration of dual therapy as a strategy to prevent parasites from developing resistance to malaria treatment drugs.…”
    Get full text
    Article
  7. 7447

    Decoding Higgs Boson Branching Ratios from event shapes by Reichelt Daniel

    Published 2024-01-01
    “…This contribution will discuss a novel strategy for the simultaneous measurements of Higgs boson branching ratios into gluons and light quarks at a future lepton collider, operating in the Higgs-factory mode. …”
    Get full text
    Article
  8. 7448

    Selfish mining detection scheme based on the characters of transactions by Heli WANG, Qiao YAN

    Published 2023-04-01
    “…Selfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studies from researchers in recent years, there is no effective detection scheme as the vulnerability of blockchain in propagation delay makes it challenging to distinguish the attackers from honest miners.A scheme for selfish mining detection was introduced.In this scheme, a state value was assigned to the new block based on transaction amount and the transaction fee of the block.By analyzing the relationship between state value and transaction characteristics, we can determine if the block was mined by a selfish miner.The scheme is verified by an experiment with an accuracy of 86.02%.…”
    Get full text
    Article
  9. 7449

    Filantrocapitalismo y Cooperación al Desarrollo: el caso de la lucha contra la poliomielitis by Mediavilla-Merino, Juan José

    Published 2015-11-01
    “…This loss of social policies by the State and the pursuit of a global strategy for development have promoted the growth of these organizations. …”
    Get full text
    Article
  10. 7450

    Aux sources du sensationnel : Wilkie Collins lecteur de l’abbé Prévost ? by Shelly Charles

    Published 2007-03-01
    “…It analyses the author’s particular strategy in amplifying this « true story » and tries to explain the more general pertinence of Prévost’s work as a journalist and a « documentary novelist » for the formation of Wilkie Collins’s poetics of fiction. …”
    Get full text
    Article
  11. 7451

    Screening Drone Warfare by Delphine Letort

    Published 2022-06-01
    “…The duration of observation sequences creates spaces for reflection and ethical debates about the military strategy of drone strikes. Such reflection pervades National Bird (Sonya Kennebeck, 2016) and Drone (Tonje Hessen Schei, 2014), two documentaries built from the testimonies of drone operators. …”
    Get full text
    Article
  12. 7452

    The Economics of Planting New Citrus Groves in Florida in the Era of HLB by Ariel Singerman, Marina Burani-Arouca, Stephen Hubbard Futch

    Published 2019-03-01
    “…To this date there is no cure or successful management strategy to deal with HLB. This 8-page fact sheet written by Ariel Singerman, Marina Burani-Arouca, and Stephen H. …”
    Get full text
    Article
  13. 7453

    Dependable-cooperative channel resource allocation scheme in wireless mesh network by Mingming LI, Guangxue YUE, Shaoqing DAI, Bolin MA

    Published 2017-05-01
    “…For improving utilization of channel resources and service quality effectively in wireless mesh network,a dependable-cooperative channel resource allocation scheme was proposed.According to the adaptive features of mesh node,engaging game theory and establishing reputation mechanism to achieve dependable-cooperative of nodes,and channel resource allocation result was utilized.The comparison of this experiment proves the situation of service level and network utility of cooperative service.The result of it shows that networks benefit will be optimal when the cooperative service level is 3 and node hops synergies with the service level.Comparing with classic syn-ergetic algorithm,with the same context of network topology,dependable-cooperative channel allocation strategy is clearly dominated with 1.04 on UACRR and 1.069.…”
    Get full text
    Article
  14. 7454

    Semantic guidance attention network for occluded person re-identification by Xuena REN, Dongming ZHANG, Xiuguo BAO, Bing LI

    Published 2021-10-01
    “…To solve the problem of misalignment and mismatch in occluded person Re-ID, SGAN (semantic guided attention network) was proposed.In SGAN, the semantic masks of pedestrians were used as supervision to learn the global and local features through the attention modules, and the training process was dynamically adjusted according to the visibility of local regions.In the inference stage, the part-to-part matching strategy was adopted to adaptively measure visible features based on the feature visibility, which was obtained based on the learned masks from the attention modules.Experimental results show that the average accuracy of SGAN on the holistic datasets is better than most advanced models.Additionally, it is tolerant of occlusions and largely outperforms existing person Re-ID methods on two larger-scale complex occlusion datasets (Occluded-DukeMTMC and P-DukeMTMC-reID).…”
    Get full text
    Article
  15. 7455

    Research on the SQL injection filtering based on SQL syntax tree by Chen-wang HAN, Hui LIN, Chuan HUANG

    Published 2016-11-01
    “…The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL injection filtering method was proposed to detect SQL injection attack by introducing a security strategy based on SQL syntax tree to the design of the user input filtering.The experimental results show that the method can effectively prevent SQL injection attacks,and has higher recognition rate and lower rate of false positives.…”
    Get full text
    Article
  16. 7456

    Structure Design and Finite Element Analysis of a Rope Traction Upper Limb Rehabilitation Robot by Yu Junwei, Xu Hongbin, Xu Taojin, Zheng Chengjie, Lu Shiqing

    Published 2018-01-01
    “…At the same time,the inherent characteristic of the whole frame is obtained,which is prepared for the later control strategy.…”
    Get full text
    Article
  17. 7457

    Diversity of controllable anonymous communication system by Yan-wei ZHOU, Zhen-qiang WU, Bo YANG

    Published 2015-06-01
    “…With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs,controls users’ malicious anonymous activities,and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system,DC-ACS not only has anonymity,but also has higher security and anti-attack capability,which eliminated potential security risks existed in the Tor anonymous communications system.…”
    Get full text
    Article
  18. 7458

    L’Alliance pour l’Est de Montréal : vers un New Deal territorial ? by Juan-Luis Klein, Jean-Marc Fontan, René Audet, Benoît Levesque

    Published 2022-09-01
    “…The text discusses the situation of the area, the issues at stake in the process of reconversion, the launching and orientations of a group of socioeconomic actors called “Alliance pour l’Est de Montréal”, the sources of inspiration for this group, as well as the elements of a strategy for ecological and societal transition in this important area of the city.…”
    Get full text
    Article
  19. 7459

    Research on Resource Pool for Carrierˊs Service Platform Based on Cloud Computing by Yongjin Liu, Ke Huang

    Published 2013-09-01
    “…Then according to characters of the service network, an implementation strategy of platform integration based on cloud computing platform was proposed. …”
    Get full text
    Article
  20. 7460

    Secure supply and demand relationship perception routing in intermittently connected wireless networks by Peng YANG, Yang TANG, Na SHU, Ru-yan WANG

    Published 2015-11-01
    “…Because of low message delivery probability and nodes malicious attack behaviors in the quota-limit routing for intermittently connected wireless networks,a secure routing is proposed based on supply and demand relationship perception.According to activity degree,average residual buffer ratio of neighbors and encountered nodes reputation dynamically perceived by nodes,the encountered nodes in real time build the supply and demand model and determine the message quota allocation combined with the message survival ratio in common.When network status meets constraint situations,update message quota dynamically based on demand elasticity of message.Simulation results show that the proposed strategy effectively reduces influence of nodes malicious behaviors and improve network performance greatly.…”
    Get full text
    Article