Showing 5,141 - 5,160 results of 67,915 for search 'DASB~', query time: 2.59s Refine Results
  1. 5141

    Microseismic Signal Classification Based on Artificial Neural Networks by Chong-wei Xin, Fu-xing Jiang, Guo-dong Jin

    Published 2021-01-01
    “…An automatic classification algorithm based on artificial neural networks (ANNs) has been proposed. …”
    Get full text
    Article
  2. 5142

    Link prediction method based on the similarity of high path by Qiuyang GU, Bao WU, Renyong CHI

    Published 2021-07-01
    “…For the problem that the existing link prediction method has many problems, including low accuracy and low efficiency, a method of high-order path similarity link prediction was proposed.Firstly, the path was used as the judging feature to predict missing links in complex networks, which could make resource allocation more effective and restricts information leakage by punishing public neighbor pairs.Secondly, by using high order paths as judging features, the available long paths between seed nodes would be punished.Finally, several real complex network datasets were used for numerical examples calculation.Experimental results show that the proposed algorithm is more accurate and efficient than other baseline methods.…”
    Get full text
    Article
  3. 5143

    Fall Detection and Direction Judgment Based on Posture Estimation by Chunmiao Yuan, Pengju Zhang, Qingyong Yang, Jianming Wang

    Published 2022-01-01
    “…Therefore, we propose a video-based fall detection and direction judgment method based on human posture estimation for the first time. …”
    Get full text
    Article
  4. 5144

    Identity authentication scheme of Android client based on identifiers by Ya-wei WANG, Chang-gen PENG, Hong-fa DING, Kai ZHOU

    Published 2017-04-01
    “…The Android mobile terminal’s own identifier information was used,which was credibly ensured by the Android system,then combining the Hash function and operation such as xor or connection,an algorithm of authentication information generation for the Android client was created.The traditional mobile client’s process of register and login were analyzed,putting the identity information generation and authentication on the sever.A novel authentication scheme was constructed,which made the users free from the cumbersome authentication process and privacy divulges.Finally,the security and efficiency of the scheme were analyzed.The results show that the new scheme has strong security and high convenience.…”
    Get full text
    Article
  5. 5145

    Neural network based image and video coding technologies by Chuanmin JIA, Zhenghui ZHAO, Shanshe WANG, Siwei MA

    Published 2019-05-01
    “…Deep neural networks have achieved tremendous success in artificial intelligence,which makes the broad and in-depth research of neural network resurge in recent years.Recently,the neural network based image and video coding has become one of the front-edge topics.A systematic and comprehensive review of neural network based image and video coding approaches based on network structure and coding modules were provided.The development of neural network based image compression,e.g.multi-layer perceptron,random neural network,convolutional neural network,recurrent neural network and generative adversarial network based image compression methods and neural network based video compression tools were introduced respectively.Moreover,the future trends in neural network based compression were also envisioned and discussed.…”
    Get full text
    Article
  6. 5146

    STUDENTS’ INTRINSIC MOTIVATION USING GAME-BASED ACTIVITIES by Nestor L. Lasala Jr

    Published 2024-03-01
    Subjects: “…Game-based activities…”
    Get full text
    Article
  7. 5147

    Dynamic adaptive offloading method based on WPT-MEC by Lin SU, Xiaochao DANG, Zhanjun HAO, Chunrui RU, Xu SHANG

    Published 2022-12-01
    “…For the dynamic fading time-varying channel state information, a dynamic adaptive offloading (RLDO) method based on WPT-MEC was proposed to solve the task offloading and resource optimization problems for multiple users by combining wireless power transmission (WPT) technology and mobile edge computing (MEC).The wireless power transmission technology can provide energy to wireless end-user (WEU) and effectively alleviate the problem of limited energy supply from conventional batteries.To maximize the resource utilization, a wireless powered MEC network model was designed where the energy collected by the wireless end-user from the wireless access point (AP) was stored in a rechargeable battery, and then this energy was used for task computation or task offloading.The approach performed real-time offloading decisions through a fully connected deep neural networks (DNN) deployed in the MEC server.A fully binary offloading strategy was used for the offloading decision.Simulation results show that the computation rate of the method can still be maintained above 92% in a multi-user time-varying wireless channel-oriented environment.Compared with the basic method, it has great advantages in improving the calculation rate, reducing the delay and energy consumption,and effectively reduces computational complexity.…”
    Get full text
    Article
  8. 5148

    Resource reservation based on relaxed policy for grid workflow by Peng XIAO, Zhi-gang HU, Chao-kun YAN, Xi-long QU

    Published 2012-02-01
    “…To address the problem that applications tend to overestimate reservation duration,a novel reservation technique based on overlapping relaxing policy was proposed,so as to mitigate the negative effects of stringent reservation mechanisms on system performance.The analysis of the relaxed policy was represented theoretically and a relaxed admission algorithm was designed for large-scale grid workflows.Experimental results show that relaxed policy can significantly mitigate the negative effects of classical policies when system is in presence of heavy workload.Experimental results based on a real workflow indicate that the relaxed policy is able to decreasing the efficiency loss due to the overestimation of reservation durations.…”
    Get full text
    Article
  9. 5149

    Communication community detection algorithm based on ranking of strength by Hong-quan WEI, Hong-chang CHEN, Li-xiong LIU, Ju-long LAN

    Published 2014-10-01
    “…According to the characteristics of how to effectively describe real weighted network of the current telecom network problems,improvement and development of related models of complex networks,especially for communication community detection results hierarchy was not clear and the problem of high complexity,from the analysis of the characteristics of complex network,a new algorithm for community detection design communication.The algorithm to achieve effective communication strength ranking method based on community detection in communication,communication density distribution of generating high resolution based on hierarchical nesting tree,the distance vector pruning nested tree,the level of analysis and structure of community stability and reduce the computational complexity.The algorithm is verified using real network data.…”
    Get full text
    Article
  10. 5150

    The Role of Ground-Based Robotic Observatories in Satellite Projects by R. Hudec

    Published 2010-01-01
    “…In this project, robotic telescopes are expected not only to verify the triggers detected by satellite (such as transients and flares) but also to provide additional (mostly photometric) data for better scientific cases.…”
    Get full text
    Article
  11. 5151
  12. 5152
  13. 5153

    Image Encryption Performance Evaluation Based on Poker Test by Shanshan Li, Weiyang Sun

    Published 2016-01-01
    “…The fast development of image encryption requires performance evaluation metrics. …”
    Get full text
    Article
  14. 5154
  15. 5155

    Comparison and Correction of Runoff Simulation Based on XGBoost and SWAT by LIANG Lisha, JIANG Xiaolei, HU Leyi, SHEN Jing, ZHANG Liping, FU Xiaolei

    Published 2024-01-01
    “…Based on the extreme gradient boosting (XGBoost) algorithm and soil and water assessment tool (SWAT) model, a runoff simulation model was constructed by using the observed hydrological data of Waizhou hydrological station in Ganjiang River Basin, and the simulation effects of the two models were compared. …”
    Get full text
    Article
  16. 5156

    Plant Diseases Recognition Based on Image Processing Technology by Guiling Sun, Xinglong Jia, Tianyu Geng

    Published 2018-01-01
    “…A new image recognition system based on multiple linear regression is proposed. …”
    Get full text
    Article
  17. 5157
  18. 5158

    Attribute-based encryption with hidden policies in the access tree by Yan SONG, Zhen HAN, Feng-mei LIU, Lei LIU

    Published 2015-09-01
    Subjects: “…attribute-based encryption…”
    Get full text
    Article
  19. 5159

    AdaBoost algorithm based on fitted weak classifier by Pengfeng SONG, Qingwei YE, Zhihua LU, Yu ZHOU

    Published 2019-11-01
    “…AdaBoost algorithm was proposed to minimize the accuracy caused by weak classifiers by minimizing the training error rate,and the single threshold was weaker and difficult to converge.The AdaBoost algorithm based on the fitted weak classifier was proposed.Firstly,the mapping relationship between eigenvalues and marker values was established.The least squares method was introduced to solve the fitting polynomial function,and the continuous fitting values were converted into discrete categorical values,thereby obtaining a weak classifier.From the many classifiers obtained,the classifier with smaller fitting error was selected as the weak classifier to form a new AdaBoost strong classifier.The UCI dataset and the MIT face image database were selected for experimental verification.Compared with the traditional Discrete-AdaBoost algorithm,the training speed of the improved algorithm was increased by an order of magnitude.And the face detection rate can reach 96.59%.…”
    Get full text
    Article
  20. 5160