Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5141
Microseismic Signal Classification Based on Artificial Neural Networks
Published 2021-01-01“…An automatic classification algorithm based on artificial neural networks (ANNs) has been proposed. …”
Get full text
Article -
5142
Link prediction method based on the similarity of high path
Published 2021-07-01“…For the problem that the existing link prediction method has many problems, including low accuracy and low efficiency, a method of high-order path similarity link prediction was proposed.Firstly, the path was used as the judging feature to predict missing links in complex networks, which could make resource allocation more effective and restricts information leakage by punishing public neighbor pairs.Secondly, by using high order paths as judging features, the available long paths between seed nodes would be punished.Finally, several real complex network datasets were used for numerical examples calculation.Experimental results show that the proposed algorithm is more accurate and efficient than other baseline methods.…”
Get full text
Article -
5143
Fall Detection and Direction Judgment Based on Posture Estimation
Published 2022-01-01“…Therefore, we propose a video-based fall detection and direction judgment method based on human posture estimation for the first time. …”
Get full text
Article -
5144
Identity authentication scheme of Android client based on identifiers
Published 2017-04-01“…The Android mobile terminal’s own identifier information was used,which was credibly ensured by the Android system,then combining the Hash function and operation such as xor or connection,an algorithm of authentication information generation for the Android client was created.The traditional mobile client’s process of register and login were analyzed,putting the identity information generation and authentication on the sever.A novel authentication scheme was constructed,which made the users free from the cumbersome authentication process and privacy divulges.Finally,the security and efficiency of the scheme were analyzed.The results show that the new scheme has strong security and high convenience.…”
Get full text
Article -
5145
Neural network based image and video coding technologies
Published 2019-05-01“…Deep neural networks have achieved tremendous success in artificial intelligence,which makes the broad and in-depth research of neural network resurge in recent years.Recently,the neural network based image and video coding has become one of the front-edge topics.A systematic and comprehensive review of neural network based image and video coding approaches based on network structure and coding modules were provided.The development of neural network based image compression,e.g.multi-layer perceptron,random neural network,convolutional neural network,recurrent neural network and generative adversarial network based image compression methods and neural network based video compression tools were introduced respectively.Moreover,the future trends in neural network based compression were also envisioned and discussed.…”
Get full text
Article -
5146
STUDENTS’ INTRINSIC MOTIVATION USING GAME-BASED ACTIVITIES
Published 2024-03-01Subjects: “…Game-based activities…”
Get full text
Article -
5147
Dynamic adaptive offloading method based on WPT-MEC
Published 2022-12-01“…For the dynamic fading time-varying channel state information, a dynamic adaptive offloading (RLDO) method based on WPT-MEC was proposed to solve the task offloading and resource optimization problems for multiple users by combining wireless power transmission (WPT) technology and mobile edge computing (MEC).The wireless power transmission technology can provide energy to wireless end-user (WEU) and effectively alleviate the problem of limited energy supply from conventional batteries.To maximize the resource utilization, a wireless powered MEC network model was designed where the energy collected by the wireless end-user from the wireless access point (AP) was stored in a rechargeable battery, and then this energy was used for task computation or task offloading.The approach performed real-time offloading decisions through a fully connected deep neural networks (DNN) deployed in the MEC server.A fully binary offloading strategy was used for the offloading decision.Simulation results show that the computation rate of the method can still be maintained above 92% in a multi-user time-varying wireless channel-oriented environment.Compared with the basic method, it has great advantages in improving the calculation rate, reducing the delay and energy consumption,and effectively reduces computational complexity.…”
Get full text
Article -
5148
Resource reservation based on relaxed policy for grid workflow
Published 2012-02-01“…To address the problem that applications tend to overestimate reservation duration,a novel reservation technique based on overlapping relaxing policy was proposed,so as to mitigate the negative effects of stringent reservation mechanisms on system performance.The analysis of the relaxed policy was represented theoretically and a relaxed admission algorithm was designed for large-scale grid workflows.Experimental results show that relaxed policy can significantly mitigate the negative effects of classical policies when system is in presence of heavy workload.Experimental results based on a real workflow indicate that the relaxed policy is able to decreasing the efficiency loss due to the overestimation of reservation durations.…”
Get full text
Article -
5149
Communication community detection algorithm based on ranking of strength
Published 2014-10-01“…According to the characteristics of how to effectively describe real weighted network of the current telecom network problems,improvement and development of related models of complex networks,especially for communication community detection results hierarchy was not clear and the problem of high complexity,from the analysis of the characteristics of complex network,a new algorithm for community detection design communication.The algorithm to achieve effective communication strength ranking method based on community detection in communication,communication density distribution of generating high resolution based on hierarchical nesting tree,the distance vector pruning nested tree,the level of analysis and structure of community stability and reduce the computational complexity.The algorithm is verified using real network data.…”
Get full text
Article -
5150
The Role of Ground-Based Robotic Observatories in Satellite Projects
Published 2010-01-01“…In this project, robotic telescopes are expected not only to verify the triggers detected by satellite (such as transients and flares) but also to provide additional (mostly photometric) data for better scientific cases.…”
Get full text
Article -
5151
-
5152
Synchronization based on preamble symbol for DVB-T2 system
Published 2017-08-01Subjects: “…DVB-T2…”
Get full text
Article -
5153
Image Encryption Performance Evaluation Based on Poker Test
Published 2016-01-01“…The fast development of image encryption requires performance evaluation metrics. …”
Get full text
Article -
5154
Cobalt‐Based Materials in Supercapacitors and Batteries: A Review
Published 2025-02-01Subjects: Get full text
Article -
5155
Comparison and Correction of Runoff Simulation Based on XGBoost and SWAT
Published 2024-01-01“…Based on the extreme gradient boosting (XGBoost) algorithm and soil and water assessment tool (SWAT) model, a runoff simulation model was constructed by using the observed hydrological data of Waizhou hydrological station in Ganjiang River Basin, and the simulation effects of the two models were compared. …”
Get full text
Article -
5156
Plant Diseases Recognition Based on Image Processing Technology
Published 2018-01-01“…A new image recognition system based on multiple linear regression is proposed. …”
Get full text
Article -
5157
SINDy and PD-Based UAV Dynamics Identification for MPC
Published 2025-01-01Subjects: Get full text
Article -
5158
Attribute-based encryption with hidden policies in the access tree
Published 2015-09-01Subjects: “…attribute-based encryption…”
Get full text
Article -
5159
AdaBoost algorithm based on fitted weak classifier
Published 2019-11-01“…AdaBoost algorithm was proposed to minimize the accuracy caused by weak classifiers by minimizing the training error rate,and the single threshold was weaker and difficult to converge.The AdaBoost algorithm based on the fitted weak classifier was proposed.Firstly,the mapping relationship between eigenvalues and marker values was established.The least squares method was introduced to solve the fitting polynomial function,and the continuous fitting values were converted into discrete categorical values,thereby obtaining a weak classifier.From the many classifiers obtained,the classifier with smaller fitting error was selected as the weak classifier to form a new AdaBoost strong classifier.The UCI dataset and the MIT face image database were selected for experimental verification.Compared with the traditional Discrete-AdaBoost algorithm,the training speed of the improved algorithm was increased by an order of magnitude.And the face detection rate can reach 96.59%.…”
Get full text
Article -
5160
Terminal replacement model based on big data mining
Published 2016-12-01Subjects: Get full text
Article