Showing 5,421 - 5,440 results of 67,915 for search 'DASB~', query time: 2.22s Refine Results
  1. 5421
  2. 5422

    Shape description based on axis of least inertia and chain by LI Zong-min1, LU Tian-bo2, SANG Xin-yan1, QIN Bao-shan3

    Published 2009-01-01
    “…The imaged could be seemed to the approximation of the polygons,so it was important to the image match that researched the polygon match method.It is based the combination of the axis of least inertia and the chain,this method was capable of preserving both contour as well as region information,and it utilized the degree of triangular membership which computed by the feature triangular to compute the similarity between the two objects.This method was invariant to image transformations,and robust to concave polygons.The experimental results show that this method’s performance and retrieval efficiency is well.…”
    Get full text
    Article
  3. 5423

    Smart Irrigation Controllers: Operation of Evapotranspiration-Based Controllers by Michael D. Dukes, Mary L. Shedd, Stacia L. Davis

    Published 2009-04-01
    “…Dukes, Mary L. Shedd, and Stacia L. Davis, is part of the Smart Irrigation Controllers series. …”
    Get full text
    Article
  4. 5424

    Design of T-Shaped Micropump Based on Induced Charge Electroosmotic by Kai Zhang, Xiaojing Mi, Bingying Sheng

    Published 2013-01-01
    “…The fluid-driven efficiency of the micropump based on induced charge electroosmotic was studied by numerical simulation method. …”
    Get full text
    Article
  5. 5425

    Method of network slicing deployment based on performance-aware by Kaizhi HUANG, Qirun PAN, Quan YUAN, Wei YOU, Hongbo TANG

    Published 2019-08-01
    “…In order to deal with the performance degradation caused by resource contention due to the sharing of physical resources between VNF in the network slicing,a network slicing deployment method based on performance-awareness was proposed.When deploying network slice instances,first two-phase deployment that mapping virtual nodes was adopted,and then virtual links were mapped.In the virtual nodes mapping phase,the VNF performance influences factor was defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact.Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the network slice instance,the physical server with the smallest sum of performance influence factors was used as the mapping location,and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result.In the virtual links mapping phase,the shortest path algorithm was used to obtain the link mapping result.The simulation results show that the proposed method reduces the impact of other network slices on its own service performance.…”
    Get full text
    Article
  6. 5426

    Reliable Quantum Communications Based on Asymmetry in Distillation and Coding by Lorenzo Valentini, Rene Bodker Christensen, Petar Popovski, Marco Chiani

    Published 2024-01-01
    “…We address the problem through hybrid schemes that combine: indirect transmission based on teleportation and distillation, and direct transmission, based on quantum error correction (QEC). …”
    Get full text
    Article
  7. 5427

    Phishing attacks discovery based on HTML layout similarity by Xue-qiang ZOU, Peng ZHANG, Cai-yun HUANG, Zhi-peng CHEN, Yong SUN, Qing-yun LIU

    Published 2016-10-01
    “…Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.…”
    Get full text
    Article
  8. 5428
  9. 5429
  10. 5430

    Gear Fault Detection Based on Teager-Huang Transform by Hui Li, Haiqi Zheng, Liwei Tang

    Published 2010-01-01
    “…Gear fault detection based on Empirical Mode Decomposition (EMD) and Teager Kaiser Energy Operator (TKEO) technique is presented. …”
    Get full text
    Article
  11. 5431
  12. 5432

    An overview of skin cancer classification based on deep learning by Toqa A. Sadoon

    Published 2024-12-01
    “…Finally, some opportunities for skin cancer, such as data imbalance and limitation, generative adversarial network, various data sets, and data augmentation, are summarized.…”
    Get full text
    Article
  13. 5433
  14. 5434
  15. 5435

    Statics Analysis on Safe Manipulator based on Torque Limiter by Chen Guilan, Cao Yi, Wang Qiang

    Published 2015-01-01
    “…And the ratio of the maximum isotropic force and the maximum achievable force is proposed as a safety performance index applied in redundant manipulator kinematics to perform tasks effectively. Finally,through the MATLAB algorithm programming,the simplicity and effectiveness of the method steps are verified by numerical examples,which provide a control theoretical basis for manipulator architecture and configuration to calibrate torque limiter.…”
    Get full text
    Article
  16. 5436

    Distributed Power Trading System Based on Blockchain Technology by Shuguo Chen, Weibin Ding, Zhongzheng Xiang, Yuanyuan Liu

    Published 2021-01-01
    “…The traditional centralized power trading model has some problems, such as low data security and trust crisis of regulators. …”
    Get full text
    Article
  17. 5437
  18. 5438

    Transition-Based Techniques for Non-Projective Dependency Parsing by Marco Kuhlmann, Joakim Nivre

    Published 2010-10-01
    “… We present an empirical evaluation of three methods for the treatment of non-projective structures in transition-based dependency parsing: pseudo-projective parsing, non-adjacent arc transitions, and online reordering. …”
    Get full text
    Article
  19. 5439
  20. 5440