Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5201
Equity decentralized consensus algorithm based on incentive compatibility
Published 2022-12-01“…The PoW consensus algorithm has been proved to be incentive incompatible, existing computing centralization under high reward differences and slow convergence of forks in extreme cases.Based on this, an incentive-compatiblebased consensus algorithm SSPoW was proposed.By introducing local solutions to calculate the computing power aggregated on the block chain, the explicit quantification of computing power was used to speed up the convergence of the fork, thus satisfying the consistency of the blockchain.Incentive compatibility was achieved by improving the reward scheme, which reduced the problem of computing centralization caused by high reward differences.Simulation results prove that the proposed algorithm could effectively reduce the reward differences and is more efficient than the traditional PoW consensus algorithm, which has positive implications for improving system security and consensus efficiency.…”
Get full text
Article -
5202
OPTIMAL DESIGN OF CRANK BASED ON BOX-BEHNKEN METHOD
Published 2017-01-01“…Solid Works can’t fully fit the data. Design the BBD by DOE software Design-Expert and input the simulation data. …”
Get full text
Article -
5203
Smart Shift Decision Method Based on Stacked Autoencoders
Published 2018-01-01“…Experiments are conducted to obtain training and testing data. Different neural networks are trained with experimental data on a real vehicle under different road conditions collected using the CANcaseXL device and control AMESim simulation model, which was constructed based on real vehicle parameters. …”
Get full text
Article -
5204
Service chain mapping algorithm based on reinforcement learning
Published 2018-01-01“…A service chain resource scheduling architecture of multi-agent based on artificial intelligence technology was proposed.Meanwhile,a service chain mapping algorithm based on reinforcement learning was designed.Through the Q-learning mechanism,the location of each virtual network element in the service chain was determined according to the system status and the reward and punishment feedback after the deployment.The experimental results show that compared with the classical algorithms,the algorithm effectively reduces the average transmission delay of the service and improves the load balance of the system.…”
Get full text
Article -
5205
Segmentation Strategy of Streaming Media Based on Popularity Classifying
Published 2015-01-01“…Respecting the characteristics that cache replacements are focus on a small rang of popularity, a segmentation method based on popularity classifying of streaming media, which uses smaller segments on videos replaced frequently and bigger segments on the other videos, was proposed. …”
Get full text
Article -
5206
Robust deepfake detection method based on siamese network
Published 2024-04-01“…The proliferation of deepfake (DF) technology for generating manipulated facial expressions in synthetic images has raised concerns due to its potential negative impacts on individuals and society. …”
Get full text
Article -
5207
Binary image steganography method based on layered embedding
Published 2021-10-01Get full text
Article -
5208
Weibo spammers’ identification algorithm based on Bayesian model
Published 2017-01-01“…In order to distinguish the spammers efficiently,a classifier based on the behavior characteristics was established.By analyzing the previous research,the ratio of followers,total number of blog posts,the number of friends,comprehensive quality evaluation and favorites according to latest data set,the Weibo spammers’ identification algorithm was realized based on Bayesian model and genetic algorithm.The experiment result based on the real-time data of Sina Weibo verify that the Bayesian model recognition algorithm can ensure spammers recognition accuracy without sacrificing recognition rate of non-spammers,and the proposed threshold value matrix proposed optimization can significantly improve recognition accuracy navy.…”
Get full text
Article -
5209
Implementing Workplace-Based Assessments at Scale: The SIMPL Approach
Published 2023-12-01“…Over the past decade, medical education has shifted from a time-based approach to a competency-based approach for surgical training. …”
Get full text
Article -
5210
Genome-Based Virus Taxonomy with the ICTV Database Extension
Published 2018-12-01Subjects: “…ICTV DB extension…”
Get full text
Article -
5211
Construction of intelligent evolution network based on outbound call
Published 2019-04-01“…With the obvious improvement of various telecom business demands,the outbound call industry,which is the main channel for marketing,resolution and notification of telephone services under the traditional mode,is facing more and more pain points,including market,personnel,training,customer sentiment,cost,accurate data and people flow in all aspects.In order to realize the cost reduction and efficiency increase,inject wisdom and improve capability of telecom services,the main needs of the existing network outbound call system were combined with the application of artificial intelligence and big data technology in the field of outbound calls,aim to build intelligent and high efficiency.A discussion of the feasibility of the program was given based on the network construction involved in the efficiency of the "smart outbound system".…”
Get full text
Article -
5212
-
5213
Development of a Model ofProject-Based Learning
Published 2020-02-01Subjects: Get full text
Article -
5214
Analysis of packet loss rate based on the measured traffic
Published 2013-09-01“…The packet loss rate is one of key indicators to evaluate the performance of network.A method for calculating packet loss rate in the measured data based on the intact TCP flows was presented.Based on the measured data,the packet loss rate of Jiangsu Province in CERNET network and different partitions outside was analysed.The algorithm gives the packet loss rate including first packet loss rate p<sub>fl</sub>,overall packet loss rate p<sub>sl</sub>and retransmission rate p<sub>rp</sub>.Through statistical analysis,p<sub>fl</sub>is smaller than p<sub>sl</sub>in the vast majority of cases,and p<sub>rp</sub>is significantly higher than p<sub>fl</sub>and p<sub>sl</sub>,which proves the impact of packet loss on the performance of network,and retransmission rate is obviously higher than packet loss rate.…”
Get full text
Article -
5215
Computation of New Degree-Based Topological Indices of Graphene
Published 2016-01-01Get full text
Article -
5216
Topology prediction for opportunistic network based on spatiotemporal convolution
Published 2023-03-01“…The high dynamics of opportunistic network topology leads to the challenges of topology prediction.The existing research mainly focuses on the long-term spatiotemporal dependence of networks, ignoring the short-term spatiotemporal features.A topology prediction method for opportunistic network based on dynamic time warping algorithm and spatiotemporal convolution (DTW-STC) was proposed, which integrated long-short term spatiotemporal dependence in opportunistic network.The time slot was determined based on dynamic time warping algorithm, so that the opportunistic network was sliced into snapshots which topology was presented by link state matrix.Temporal convolution was employed to extract short-term temporal features.The spatiotemporal graph, representing the short-term spatiotemporal relationship, was constructed by temporal features and network changes.The short-term spatiotemporal features were captured by graph convolution.After stacks of spatiotemporal convolution, the long-short term spatiotemporal features of network were achieved.Based on the autoencoder structure, vector space transformation was realized, so that the future network topology was predicted.The results on three real opportunistic network datasets, ITC, MIT, and Asturias-er, show that the proposed DTW-STC has better prediction performance than ones of other baseline methods.…”
Get full text
Article -
5217
Forecasting Using Information and Entropy Based on Belief Functions
Published 2020-01-01“…According to the results, our approach performs well under a wide array of simulated data models and distributions. There are pieces of evidence that the prediction interval obtained from the frequentist method has a much narrower prediction interval, while our entropy-based method performs the widest. …”
Get full text
Article -
5218
Ebaco-R: Refinement of organizational commitment bases scale
Published 2019-01-01“…Therefore, this research proposed to refine the Organizational Commitment Bases Scale (EBACO) in search for an instrument with better psychometric properties and a better theoretical adjustment. …”
Get full text
Article -
5219
Cooperative spectrum sensing detector based on generalized eigenvalue
Published 2013-01-01“…The available eigenvalue based cooperative spectrum sensing detectors require that the primary signals among sensing nodes were correlated.A maximum generalized eigenvalue based cooperative spectrum sensing detector was proposed.The proposed detector exploited the received signals from the previous sensing durations without primary user.The maximum generalized eigenvalue between the sample iance matrices from current and previous sensing durations was taken as test-statistic to implement spectrum sensing.No prior knowledge of primary signal and noise power was needed in the proposed detector.The proposed detector still has high detection performance while the primary signals among sensing nodes are uncorrelated,although the available eigenvalue based detectors fail.Finally,the val ity of the detector is proved by simulations.…”
Get full text
Article -
5220
HEARING CORRECTION SYSTEM BASED ON MOBILE COMPUTING PLATFORM
Published 2016-10-01“…An implementation of digital hearing aid based on the mobile computing platform iPhone is proposed. …”
Get full text
Article