Showing 8,341 - 8,360 results of 31,041 for search '"strategy"', query time: 0.09s Refine Results
  1. 8341

    Data quality optimized online task allocation method for mobile crowdsensing by Wei ZHANG, Zhuo LI, Xin CHEN

    Published 2020-12-01
    “…Optimization of the perceived quality and the recruitment of user are two important issues of mobile crowdsensing.As the amount of data increases rapidly,perceived data becomes redundant,and perceived quality is at risk of decreasing.A mechanism of task assignment based on the perceptive quality optimization was proposed to improve the perceived quality under the condition of full coverage.The clustering algorithm was used to evaluate the truth value of the task and quantify the quality of the user data.Based on Thompson sampling algorithm and greedy algorithm,a user recruitment strategy was designed and implemented to optimize the perceived quality on the basis of ensuring the spatial coverage of the task.The performance of Thompson based user recruit (TSUR) algorithm was simulated and analyzed that compared with the existing algorithms of BBTA and basic user recruitment (BUR).Experiments show that in the same area,compared with bandit-based task assignment (BBTA) algorithm and BUR algorithm,the quality of the cumulative sensing data was improved by 16% and 20%,and the spatial coverage was improved by 30% and 22%.…”
    Get full text
    Article
  2. 8342

    Services selection based on trust evolution and union for cloud computing by HU Chun-hua1, LIU Ji-bo1, LIU Jian-xun3

    Published 2011-01-01
    “…It was difficult for the service consumers to obtain high-quality composite services because of the existence of false or malicious service nodes in cloud computing environment.A novel cloud service-composition method based on the trust span tree was proposed.The trust relationship could be built after many times credible interaction between ser-vices requester and provider,and the trust union would be formed through the credible relationship evolution.So that the uncertain or malicious service should be excluded from the trust span tree,and the service composition would be carried out in a trust environment.At the same time,the measuring strategy of trust relationship among cloud services based on information entropy was designed,which could resolve the deficiencies of the trust parameter analysed by simply weighted angle in the previous studies.The experimental result shows that the method proposed in this paper is more su-perior in credibility and security,comparing to the traditional services selection methods.…”
    Get full text
    Article
  3. 8343

    Intangible heritage as a social construction of authenticity: the example of Tunisian cuisine by Wadie Othmani

    Published 2021-07-01
    “…This reasoning will show that the consumption strategy while on vacation is inevitably linked to daily consumption practices of all the tourists studied, either in a logic of rupture or of continuity. …”
    Get full text
    Article
  4. 8344

    Kinematics Analysis and Multi-objective Scale Synthesis of a New Three Translation Parallel Mechanism by Jianyuan Liu, Jianlin He, Zhixiong Jian, Junguo Gao

    Published 2020-12-01
    “…Finally,a multi-objective optimization design model is established,with elite retention strategy of rapid and dominate the multi-objective optimization algorithm (NSGA-Ⅱ),the scale synthesis of the structural parameters is carried out,a set of Pareto optimal solutions are obtained by optimization. …”
    Get full text
    Article
  5. 8345

    Electric power industry in the conditions of foreign companies exit by D. M. Ovodenko

    Published 2023-12-01
    “…Besides, there is need to develop and form new conceptual approaches to the strategy of energy systems development amid forced modernisation of the industry. …”
    Get full text
    Article
  6. 8346

    Construction and typical cases analysis of edge cloud platform for telecom operators by Huazhang LV, Dan CHEN, Youxiang WANG

    Published 2019-03-01
    “…Edge cloud technology is the product of ICT integration and also the key technology to support operators in 5G network transformation.Relying on the advantages of abundant communication cloud resources,operators can build edge cloud resource pools on the side of network edges for end users to ensure low delay and high bandwidth business requirements,so as to meet the future business development of high-definition video,VR/AR,industrial internet and internet of vehicles.The overall thinking of operators to build edge cloud platform were focused on,including hardware selection,lightweight virtualization layer,PaaS platform construction and business management scheduling strategy.In the end,several types of services enabled by edge cloud of operators were analyzed and explained,including security monitoring scenarios,CDN sinking,slice customization and service acceleration.In the future,operators will provide edge cloud to end solutions,establish a new industry ecology for 5G,and promote the development of the entire edge cloud industry chain.…”
    Get full text
    Article
  7. 8347

    CH of masonry materials via meshless meso-modeling by Giuseppe Giambanco, Emma La Malfa Ribolla, Antonino Spada

    Published 2014-07-01
    “…In the present study a multi-scale computational strategy for the analysis of masonry structures is presented. …”
    Get full text
    Article
  8. 8348

    The state and industrialization in Turkey since the nineteenth century by Şevket Pamuk

    Published 2024-01-01
    “…State directed industrialization in developing countries became a common strategy after World War II. The success of a small number of countries in East Asia added new dimensions to the debates on the role of states in taming domestic and international market forces. …”
    Get full text
    Article
  9. 8349

    Attempted Suicide by Massive Warfarin Ingestion Conservatively Managed Using Phytonadione by Katherine L. March, Kruti S. Patel, Jennifer D. Twilla

    Published 2016-01-01
    “…Treatment strategies for acute toxicity following massive ingestion of warfarin are not well described in the literature. …”
    Get full text
    Article
  10. 8350

    Quel développement durable pour le delta du Danube? Enquête à Pardina by Simona Niculescu, Dominique Pécaud, Élisabeth Michel-Guillou, Paul Soare, Laurence David

    Published 2015-05-01
    “…One of the objectives in terms of sustainable development in this area is to determine the right global strategy to reconcile respect for the biodiversity while insuring economic prosperity and decent living conditions.…”
    Get full text
    Article
  11. 8351

    KSP Polonia Warszawa’s Financial Problems – Analysis of Liquidity and Debt by Elżbieta Marcinkowska

    Published 2013-01-01
    “…Based on the results of the analysis of liquidity and debt the management should therefore prepare liquidity management strategy. The article is based on the available financial statements of KSP Polonia Warszawa Sportowa Spółka Akcyjna and presents an analysis of its liquidity and debt. …”
    Get full text
    Article
  12. 8352

    Pilot decontamination based on spectrum separation in massive MIMO system by Hairong WANG, Jian DONG, Yuhui WANG

    Published 2020-04-01
    “…In order to overcome uplink pilot contamination,the technical bottleneck of massive MIMO,and different from the existing parallel parameter design strategy for blind pilot decontamination,a hierarchical parameter design method was proposed,which points out that different system parameters have different effects on the exact spectrum separation of the sample covariance matrix of the received signal.In other words,different parameters have different priority.Next,it was found that to achieve spectral separation,the power of the desired signal didn’t have to be higher than the interference,and the difference between the two was more important.Furthermore,in a more practical scenario where the pilot sequence length was less than the number of base station receiving antennas,a numerical algorithm was given for the first time to achieve the above-mentioned exact spectral separation.Since the hierarchical parament design ensures the exact separation of the asymptotic spectrum,the results show that the proposed scheme is more suitable for practical applications than the existing blind pilot decontamination.…”
    Get full text
    Article
  13. 8353

    Optimal Feedback Control of Cancer Chemotherapy Using Hamilton–Jacobi–Bellman Equation by Yong Dam Jeong, Kwang Su Kim, Yunil Roh, Sooyoun Choi, Shingo Iwami, Il Hyo Jung

    Published 2022-01-01
    “…In this work, we study a feedback control problem of tumor-immune system to design an optimal chemotherapy strategy. For this, we first propose a mathematical model of tumor-immune interactions and conduct stability analysis of two equilibria. …”
    Get full text
    Article
  14. 8354

    Kinematics Modeling and Simulation of Wheel-foot Hybrid Walking Robot by Xinxing Tang, Deyong Zhang, Rui Wang, Chengzhi Su, Fangyuan Han

    Published 2021-11-01
    “…The correctness of the kinematics model obtained from the comparison of Matlab and Adams simulation is verified respectively,and the effectiveness of the body posture adjustment strategy is verified by the Adams/Simulink cosimulation,which lays the foundation for the further design of the wheel-foot hybrid walking robot control system.…”
    Get full text
    Article
  15. 8355

    L’expérimentation sociotechnique fondée sur les sciences comportementales : Un instrument au service de la production de l’acceptabilité sociale ?  by Benoit Granier

    Published 2015-12-01
    “…The latter is part of the state and private sector led strategy for producing the social acceptability of smart grids and their related products, equipments and services. …”
    Get full text
    Article
  16. 8356

    Non-unitarity maximizing unraveling of open quantum dynamics by Ruben Daraban, Fabrizio Salas-Ramírez, Johannes Schachenmayer

    Published 2025-02-01
    “…In this work, we introduce a new unraveling strategy that can adaptively minimize the averaged entanglement in the trajectory states. …”
    Get full text
    Article
  17. 8357

    The monetary policy of the Republic of Serbia in comparison with neighboring countries in the period from 2019-2024. years by Dubovac Stefan

    Published 2024-01-01
    “…Economic as well as economic progress of each country largely depends on the developed strategy and application of adequate monetary policy, where their mutual dependence permeates and is conditioned by numerous factors that are part of internal and external events. …”
    Get full text
    Article
  18. 8358

    A naïve ontology for concepts of time and space for searching and learning by M. Miwa, N. Kando

    Published 2007-01-01
    “…</b> Recorded interview data were fully transcribed and coded using Atlas.ti and analysed following a bottom-up strategy of the constant-comparative technique. <br><b>Results.…”
    Get full text
    Article
  19. 8359

    High-performance federated continual learning algorithm for heterogeneous streaming data by Hui JIANG, Tianliu HE, Min LIU, Sheng SUN, Yuwei WANG

    Published 2023-05-01
    “…Aiming at the problems of poor model performance and low training efficiency in training streaming data of AI models that provide intelligent services, a high-performance federated continual learning algorithm for heterogeneous streaming data (FCL-HSD) was proposed in the distributed terminal system with privacy data.In order to solve the problem of the current model forgetting old data, a model with dynamically extensible structure was introduced in the local training stage, and an extension audit mechanism was designed to ensure the capability of the AI model to recognize old data at the cost of small storage overhead.Considering the heterogeneity of terminal data, a customized global model strategy based on data distribution similarity was designed at the central server side, and an aggregation-by-block manner was implemented for different modules of the model.The feasibility and effectiveness of the proposed algorithm were verified under various data increment scenarios with different data sets.Experimental results show that, compared with existing works, the proposed algorithm can effectively improve the model performance to classify old data on the premise of ensuring the capability to classify new data.…”
    Get full text
    Article
  20. 8360

    Network traffic anomaly detection method based on multi-scale characteristic by Xueyuan DUAN, Yu FU, Kun WANG, Taotao LIU, Bin LI

    Published 2022-10-01
    “…Aiming at the problem that most of the traditional network traffic anomaly detection methods only pay attention to the fine-grained features of traffic data, and make insufficient use of multi-scale feature information, which may lead to low accuracy of anomaly detection results, a network traffic anomaly detection method based on multi-scale features was proposed.The original traffic was divided into sub-sequences with multiple observation spans by using multiple sliding windows of different scales, and the multi-level sequences of each sub-sequence were reconstructed by wavelet transform technology.Multi-level reconstructed sequences were generated by Chain SAE through feature space mapping, and a preliminary judgment of abnormality was made by the classifiers of each level according to the errors of the reconstructed sequences.The weighted voting strategy was adopted to summarize the preliminary judgment results of each level to form the final result judgment.Experimental results show that the proposed method can effectively mine the multi-scale feature information of network traffic, and the detection performance of abnormal traffic is obviously improved compared with traditional methods.…”
    Get full text
    Article