Showing 7,941 - 7,960 results of 31,041 for search '"strategy"', query time: 0.10s Refine Results
  1. 7941

    DAGUARD: distributed backdoor attack defense scheme under federated learning by Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU

    Published 2023-05-01
    “…In order to solve the problems of distributed backdoor attack under federated learning, a distributed backdoor attack defense scheme (DAGUARD) under federated learning was proposed based on the assumption that the server selected no more than half of malicious clients for global aggregation.The partial update strategy of the triple gradient optimization algorithm (TernGrad) was designed to solve the backdoor attack and inference attack, an adaptive density clustering defense scheme was designed to solve the backdoor attacks with relatively large angle deflection, the adaptive clipping scheme was designed to limit the enhancement backdoor attack that amplify the gradients and the adaptive noise-enhancing scheme was designed to weaken distributed backdoor attacks.The experimental results show that in the federated learning scenario, the proposed scheme has better defense performance and defense stability than existing defense strategies.…”
    Get full text
    Article
  2. 7942

    DEVELOPMENT OF ALGORITHM OF THE BUILD-UP OF A TEACHING ESTABLISHMENT PROFILE ON THE BASIS OF RESEARCH AND COMPETITIVE APPROACH by Y. Danilina

    Published 2018-02-01
    “…The formation of the algorithm is based on the conceptions of resource-competence and stakeholders management, besides, current developments of domestic specialists in forming a strategy for interaction between an educational establishment and its stakeholders are taken into account. …”
    Get full text
    Article
  3. 7943

    Research to Avoid the Energy Hole Problem in the Wireless Sensor Network that Different Data Generation Rate in Different Regional by Mingsheng Liu, Sen Miao, Yan Li

    Published 2013-06-01
    “…Theory analysis and simulation test display that this strategy could balance energy consumption in network and prolong the network lifetime.…”
    Get full text
    Article
  4. 7944

    Improving the efficiency, safety and manageability of oil transportation processes by D. V. Shvechihin, M. A. Sheikina

    Published 2022-05-01
    “…A key component of a business transformation strategy is digital transformation. The authors analysed the challenges for the digital transformation of the oil and gas industry: changing the importance of oil as an energy source, changing the market, business conditions, technology development, and environmental and social factors. …”
    Get full text
    Article
  5. 7945

    Investment resources of the mining and metallurgical complex: management features, analysis of the composition, structure and sources of their formation by E. N. Gavrilova

    Published 2022-11-01
    “…The measures for the implementation of the strategy of sustainable development are proposed. The features of the formation of the composition and structure of investment resources of companies in the industry are revealed.…”
    Get full text
    Article
  6. 7946

    Autoportraits photographiques américains : De la blancheur à l’ombre chez Alfred Stieglitz ; de la nudité au pastiche chez Lee Miller by Marie Cordié-Levy

    Published 2013-12-01
    “…For Stieglitz, overexposure implies a strategy to free photography from the influence of painters present in the pictorialist movement in order to create a self-determined medium. …”
    Get full text
    Article
  7. 7947

    LIGHTWEIGHT DESIGN OF A SMALL FAMILY CAR DISC BRAKE BASED ON ANSYS (MT) by WANG SuoGuo, SHEN JingHu, SHI Le

    Published 2023-01-01
    “…NSGA-II hybrid variant algorithm based on the control elite strategy in Ansys was used to optimize the brake disc. …”
    Get full text
    Article
  8. 7948

    Research on data integration privacy preservation mechanism for DaaS by Zhi-gang ZHOU, Hong-li ZHANG, Xiang-zhan YU, Pan-pan LI

    Published 2016-04-01
    “…The experimental results indicate that the proposed strategy is feasible, simultaneously has the low computing overhead.…”
    Get full text
    Article
  9. 7949

    Access mechanism of TMP under mobile network by WU Zhen-qiang, ZHOU Yan-wei, QIAO Zi-rui

    Published 2010-01-01
    “…The publication of TCG MTM standard ensured the safety of mobile terminal and its promotion results in the changes of communication on mobile terminals.An access mechanism to trusted mobile platform(mobile terminals with MTM chips,TMP) was proposed on mobile Internet.This mechanism defined an extended service set as a service field,introduced TMP and Internet ISP of strategy decider management field,and defined two visit mode of TMP on mobile Internet,self field service and cross field visit.The progress of each mode was described in details.Cross field visit mode was defined as roaming service and resource request.The trusted evaluation system of TMP access mechanism was specifically described.Universal combinational safe mode was used to analyze the safety of the two TMP access.The analysis shows that this mechanism brings about trusted TMP access on mobile Internet and is safe,practical and high efficient.…”
    Get full text
    Article
  10. 7950

    Vibration Analysis of Multilink Manipulators Based on Timoshenko Beam Theory by Carmelo di Castri, Arcangelo Messina

    Published 2011-01-01
    “…It is herein presented an analytical modelling strategy that extends previous works through a more refined model which accounts for elastic complicating effects along with lumped inertial loads which are typically mounted on joints of manipulators; in this regard, more accurate results are provided. …”
    Get full text
    Article
  11. 7951

    The cluster approach as an effective tool for the development of the tourism potential of smaller towns by O. V. Gorbunova

    Published 2019-09-01
    “…It has been noted, that the clusters constitute the main approach for the implementation of the tourism strategy in the Russian Federation. The Southern Tourist Cluster of the Moscow Region has been currently developed, has been reviewed. …”
    Get full text
    Article
  12. 7952

    Integrating Qualitative Comparative Analysis With Reflexive Thematic Analysis in Theme Development by Yi Sun, Jasper Hsieh, Xuesong (Andy) Gao

    Published 2025-01-01
    “…In this article, we showcase how qualitative comparative analysis can be integrated into reflexive thematic analysis as a strategy for novice researchers. We demonstrate how novice researchers can develop codes and categories, use qualitative comparative analysis to facilitate the exploration of the complex causal relationships between categories, and construct candidate themes based on these analyses. …”
    Get full text
    Article
  13. 7953

    User allocation technology for multi-dimensional resource optimization of LEO satellite by ZHOU Jiaen, ZHAO Yafei, PENG Mugen

    Published 2024-08-01
    “…Simulation results indicate that this strategy, compared to three other methods, achieves higher resource utilization rates, serves more mobile phone users, and provides theoretical support for the development of direct-to-mobile satellite communication technology.…”
    Get full text
    Article
  14. 7954

    Abandon Policies for Two Types of Multiattempt Missions by Yuejiao Feng

    Published 2022-01-01
    “…This study further expands the existing research on multiple task abandon strategy by proposing degradation-based multicriteria mission abandon policies considering multiattempts and two types of task success criteria. …”
    Get full text
    Article
  15. 7955

    Integrated reports and changes in the presentation of companies' financial information by Pavlović Jelena

    Published 2023-01-01
    “…In the last decade, changes driven by globalization, constant shifts in consumer preferences, and frequent alterations in business strategy have become prominent. This research focuses on changes in the presentation and interpretation of information related to key company performances. …”
    Get full text
    Article
  16. 7956

    Successful Use of Pulmonary Vasodilators in Acute Chest Syndrome Complicated by Persistent Right Ventricular Failure by Jacqueline T. DesJardin, Lucas S. Zier

    Published 2019-01-01
    “…However, in patients with a history of precapillary PH in whom ACS is complicated by persistent RV failure and cardiogenic shock, RV afterload reduction with pulmonary vasodilators may be an effective treatment strategy. Here, we present a case of a young man with SCD-associated PH and ACS who was successfully managed with inhaled and oral pulmonary vasodilators in the setting of persistent elevations in pulmonary vascular resistance leading to acute RV failure and cardiogenic shock.…”
    Get full text
    Article
  17. 7957

    Comparative Study on Traffic Prediction Using Different Models by Jiao Zhtiofan

    Published 2025-01-01
    “…This paper discusses the development history and optimization strategies of TFP models. This paper first introduces the importance of TFP and outlines the basic concepts and characteristics of traditional and modern TFP models. …”
    Get full text
    Article
  18. 7958

    A hash-neighborhood-search-network-coding based opportunistic relay retransmission approach by Pengfei SHAO, Yanwei ZHAO, Zhaoxi FANG

    Published 2016-04-01
    “…According to the packet reception status and channel quality,this novel approach dynamically selected the best suitable receiving node whose channel quality was better than the source node as a relay,then hash-neighborhood-search-network-coding strategy was used for the relay to retransmit other receiving nodes’ lost packets. …”
    Get full text
    Article
  19. 7959

    Statistical Analysis of Dispelling Rumors on Sina Weibo by Yue Wu, Min Deng, Xin Wen, Min Wang, Xi Xiong

    Published 2020-01-01
    “…Analyzing the process and results of dispelling rumors is a prerequisite for designing an effective anti-rumor strategy. Current research on this subject focuses on the simulation experiments, short of empirical study. …”
    Get full text
    Article
  20. 7960

    Adaptive double auction mechanism for cloud resource allocation by Ding DING, Si-wei LUO, Li-hua AI

    Published 2012-09-01
    “…By integrating the auction mechanism in economic field into cloud,an adaptive double auction mechanism(ADAM) was proposed to allocate resources in cloud computing.Compared to traditional double auction mechanisms,ADAM traded cloud resource sellers and cloud resource buyers at their expected price and quantity,guaranteed the profits of all participants.Moreover,ADAM applied different auction rules in different cases to satisfy as more participants as possible.As a new mechanism for cloud resource allocation,ADAM was proved to be strategy-proof,weakly budget-balanced and individual rational even under the conditions that the price and quantity of participants were private information.Simulation results also confirm that ADAM outperforms the traditional one on both cloud user satisfaction degree and cloud resource utilization rate and is also economically efficient,especially as more users are involved in the auction market.…”
    Get full text
    Article