Showing 5,341 - 5,360 results of 67,915 for search 'DASB~', query time: 2.30s Refine Results
  1. 5341

    Block-Based Mode Decomposition in Few-Mode Fibers by Chenyu Wang, Jianyong Zhang, Baorui Yan, Shuchao Mi, Guofang Fan, Muguang Wang, Peiying Zhang

    Published 2025-01-01
    “…The amplitude error of BMD can outperform SPMD by 15 dB. The experimental results show that BMD has a better performance than SPMD.…”
    Get full text
    Article
  2. 5342

    Research of Powertrain Control based on Power Shift Strategy by Mo Chongxiang, Wu Jian, Li Dianpeng

    Published 2017-01-01
    “…In order to solve the vehicle power discontinued transmission which influenced by the shift of the automated mechanical transmission and improve the shift quality,a new powertrain control strategy based on power shift is put forward. The traditional and hybrid powertrain interface based on this new strategy is designed. …”
    Get full text
    Article
  3. 5343

    SERS-Based Local Field Enhancement in Biosensing Applications by Yangdong Xie, Jiling Xu, Danyang Shao, Yuxin Liu, Xuzhou Qu, Songtao Hu, Biao Dong

    Published 2024-12-01
    “…Surface-enhanced Raman scattering (SERS) stands out as a highly effective molecular identification technique, renowned for its exceptional sensitivity, specificity, and non-destructive nature. It has become a main technology in various sectors, including biological detection and imaging, environmental monitoring, and food safety. …”
    Get full text
    Article
  4. 5344

    Geometrically synchronous watermarking algorithm based on the corner feature by LIU Quan1, ZHANG Le1, ZHANG Yong-gang2, Christian Bessiere3, FU Qi-ming1, WANG Xiao-yan1

    Published 2011-01-01
    “…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
    Get full text
    Article
  5. 5345

    Medical imaging-based companion diagnostics for solid tumors by Rui Yin, Qingpeng Zhang, Shiyi Liao, Chang Lu, Cheng Zhang, Qingyun Cai, Guosheng Song

    Published 2024-06-01
    “…This review provides an overview of the recent advances in medical imaging-based CDx for solid tumors and summarizes the various tumor microenvironment biomarkers utilized in imaging-based CDx. …”
    Get full text
    Article
  6. 5346

    Drivers and challenges for wood-based construction in urban areas by Oana Iliescu, Ali Amiri, Seppo Junnila

    Published 2025-01-01
    “…Wood-based construction (WBC) has gained prominence as a sustainable alternative to traditional construction, offering significant environmental benefits such as carbon storage and reduced greenhouse gas emissions. …”
    Get full text
    Article
  7. 5347

    Some aspects of the comparative analysis of legal knowledge bases by Laima Paliulionienė

    Published 1999-12-01
    “…The algorithm is based on derivation by model generation and it is grounded in the case when the knowledge bases are general logic programs. …”
    Get full text
    Article
  8. 5348

    Smart home with neural network based object detection by Agyan Panda, Sheila Maria Muniz

    Published 2022-03-01
    “…Big Data and Computing Visions…”
    Get full text
    Article
  9. 5349

    Food-Based Dietary Guidelines for the Arab Gulf Countries by Abdulrahman O. Musaiger, Hamed R. Takruri, Abdelmonem S. Hassan, Hamza Abu-Tarboush

    Published 2012-01-01
    “…The concept of food-based dietary guidelines (FBDG) has been promoted by several international organizations. …”
    Get full text
    Article
  10. 5350

    A Community-Based Walk-In Screening of Depression in Taiwan by Shu-Yu Tai, Tzu-Chiao Ma, Ling-Chun Wang, Yuan-Han Yang

    Published 2014-01-01
    “…However, the available data and study on the prevalence of depression in Taiwan were mostly completed within the previous 1 to 2 decades, and these studies were limited to certain areas or populations. …”
    Get full text
    Article
  11. 5351

    TDMA-based user scheduling policies for federated learning by Meixia TAO, Dong WANG, Rui SUN, Naifu ZHANG

    Published 2021-06-01
    “…To improve the communication efficiency in FL (federated learning), for the scenario with heterogeneous edge user's computing capacity and channel state, a class of time division multiple access (TDMA) based user scheduling policies were proposed for FL.The proposed policies aim to minimize the system delay in each round of model training subject to a given sample size constraint required for computing in each round.In addition, the convergence rate of the proposed scheduling algorithms was analyzed from a theoretical perspective to study the tradeoff between the convergence performance and the total system delay.The selection of the optimal batch size was further analyzed.Simulation results show that the convergence rate of the proposed algorithm is at least 30% higher than all the considered benchmarks.…”
    Get full text
    Article
  12. 5352
  13. 5353

    Certificate integration management platform based on identity key by Mu-zhou LIU, Jian-shu QIU, Yun-yong ZHANG, Bin-feng YAN, Si-yao ZHANG, Ya-fei TANG

    Published 2016-10-01
    “…Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system communication and storage cost.A management platform and its unique merits were introduced after analyzing the current security schemes and comparing their various advantages and defects.According to the analysis of technical principles and functions,this product has a promising future.…”
    Get full text
    Article
  14. 5354

    Design of Hand Rehabilitation Training Device based on SMA by Feng Kaidi, Yang Yan

    Published 2020-02-01
    “…A new type of hand rehabilitation training device based on shape memory alloy spring is proposed for the existing hand rehabilitation training device with complex structure and poor portability. …”
    Get full text
    Article
  15. 5355

    Federated learning optimization algorithm based on incentive mechanism by Youliang TIAN, Shihong WU, Ta LI, Lindong WANG, Hua ZHOU

    Published 2023-05-01
    “…Federated learning optimization algorithm based on incentive mechanism was proposed to address the issues of multiple iterations, long training time and low efficiency in the training process of federated learning.Firstly, the reputation value related to time and model loss was designed.Based on the reputation value, an incentive mechanism was designed to encourage clients with high-quality data to join the training.Secondly, the auction mechanism was designed based on the auction theory.By auctioning local training tasks to the fog node, the client entrusted the high-performance fog node to train local data, so as to improve the efficiency of local training and solve the problem of performance imbalance between clients.Finally, the global gradient aggregation strategy was designed to increase the weight of high-precision local gradient in the global gradient and eliminate malicious clients, so as to reduce the number of model training.…”
    Get full text
    Article
  16. 5356

    Secure distributed signcryption scheme based on vector space by LIU Jia, ZHUANG Yi, WANG Jian-dong

    Published 2009-01-01
    “…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
    Get full text
    Article
  17. 5357

    Blockchain sharding storage scheme based on concatenated coding by TIAN Youliang, HUANG Yuqing, WANG Shuai

    Published 2024-07-01
    “…Traditional blockchain faces the challenge of storage scalability. Existing research has reduced the storage overhead of blockchain based on erasure coding theory, but it brings high computational and communication spending during the decoding and recovery of blocks. …”
    Get full text
    Article
  18. 5358

    On the role of knowledge graphs in AI-based scientific discovery by Mathieu d’Aquin

    Published 2025-01-01
    “…These methodologies are based on the creation of large and opaque neural models. …”
    Get full text
    Article
  19. 5359

    RESEARCH OF THE COLD-BEATING GEAR HARDNESS ON THE BASIS OF MICROSTRUCTURE by LI YuXi, LI Yan, CUI LiMu, XIAO JiMing, CHEN YuZhao

    Published 2018-01-01
    “…The gear processed by traditional technology has a lower tooth surface hardness because of the cut metal fibre. …”
    Get full text
    Article
  20. 5360

    DEVELOPMENT OF ISLAMIC BANKINGIN RUSSIA ON THE BASIS OF THE BRITISH EXPERIENCE by A. Seliverstova, Z. Korzovatykh

    Published 2016-06-01
    “…Therefore, drawing on foreign experience Russia has every opportunity for a competent implementation of this activity on its territory.…”
    Get full text
    Article