Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5561
Bearing Fault Diagnosis Based on Multilayer Domain Adaptation
Published 2020-01-01“…A special designed residual network for the fault diagnosis task is pretrained to extract domain-invariant features. …”
Get full text
Article -
5562
Research on the Classification of Policy Instruments Based on BERT Model
Published 2022-01-01“…An entrepreneurship policy instrument classification model was established on the basis of the pretraining language model to realize the automatic classification of entrepreneurship policy instruments. …”
Get full text
Article -
5563
Research on intelligent control technology for OSU-based OTN
Published 2023-10-01“…With the development of information and cloud technology, the dynamic demand for OTN service is gradually increasing.As a next generation OTN switching technology, OSU needs to provide network and cloud services for high-quality enterprise leased lines and boutique home broadband services.The OSU-based OTN needs to be able to provide integrated services and automated service provisioning through end-to-end management and control capabilities to support one-hop service into the cloud.Firstly, the background, technical characteristics, and standardization progress of OSU technology were introduced.Then, a service-aware control framework for OSU-OTN was proposed to meet the demand for efficient bearer of government and enterprise leased lines.Finally, an experimental validation of the end-to-end management and control capability of the access OSU-OTN controller system was carried out.…”
Get full text
Article -
5564
-
5565
A Process Model for the Implementation of Blockchain-Based Systems
Published 2025-01-01“…Furthermore, a real-world use case, “Blockchain-Based Property Registration and Succession System,” exemplifies the model’s applicability in tackling practical challenges. …”
Get full text
Article -
5566
Correlation calculation decrypting for BSS-based image cryptosystem
Published 2008-01-01“…For a blind source separation (BSS) based method for encrypting multiple images, the multiple decrypted im- ages by BSS may have changed order and reversed pixel values. …”
Get full text
Article -
5567
Modeling methods and model for flow-based IP network
Published 2008-01-01“…The management information modeling methods of IP network was studied based on the concept of "flow", which describes the connectionless characteristics of IP network. …”
Get full text
Article -
5568
RWA algorithm based on cost of photoelectric conversion device
Published 2020-04-01“…Over the past decade,carrier operator implement fine-grained traffic scheduling in optical transport network(OTN) by deploying optical-electric conversion(OEO) devices on ROADM,which can improve the spectrum utilization.However,OEO device is very expensive,which will increase the CAPEX and OPEX of carrier operator.A problem about traffic scheduling and the deployment of OEO devices in OTN was proposed.Then,the ILP model of this problem was built and it was proved NP-hard.Additionally,two novel algorithms named OEO-RWA and SA-RWA were proposed.At last,these algorithms were demonstrated can not only ensure flexibility of traffic scheduling,but also can reduce the number of OEO device through simulation.…”
Get full text
Article -
5569
-
5570
Retracted: Image Recognition Technology Based on Neural Network
Published 2020-01-01“…Using deep learning algorithms to recognize and classify image has become a hot issue for scholars from all walks of life. …”
Get full text
Article -
5571
Modeling and simulation of carbon-nanocomposite-based gas sensors
Published 2025-01-01Subjects: “…co gas…”
Get full text
Article -
5572
Design of Fixed Beamformers Based on Vector-Sensor Arrays
Published 2015-01-01“…The problem of designing fixed beamformers based on such an array, with a quaternionic signal model, is considered in this paper. …”
Get full text
Article -
5573
Digital Video Monitoring System Based on Computor Network
Published 2002-01-01Get full text
Article -
5574
Graph-Based Feature Crossing to Enhance Recommender Systems
Published 2025-01-01“…Finally, a series of comprehensive experiments were conducted on several public data sets to show the performance of our model. It provides valuable insights into the capability of our model in recommendation tasks and offers a viable pathway for the public data operation.…”
Get full text
Article -
5575
Research on House Price Prediction based on Machine Learning
Published 2025-01-01“…This study aims to evaluate and compare the performance of various machine learning models on the task of house price prediction. For the house price prediction task, Random Forests generally perform better than Linear Regression and Single Decision Tree because they can better capture complex patterns in the data and reduce the risk of overfitting. …”
Get full text
Article -
5576
Hyperspectral Image Classification Based on Attentional Residual Networks
Published 2025-01-01Get full text
Article -
5577
An Equilibrium Model of Interbank Networks Based on Variational Inequalities
Published 2013-01-01Get full text
Article -
5578
-
5579
Research on the risk adjacency matrix based on attack graphs
Published 2011-01-01“…Aimed at the problem that the difficulty to understand the very complicated attack graphs generated by a variety of existing tools,a method of RAM(risk adjacency matrix) based on attack graphs was proposed,and feasibility and efficient of proposed method was verified in experiment.The experimental results on the network showed that visualization of attack graphs was extended significantly,and the re-computing problem caused by the rings and loops in the risk assessment was solved in a simple and efficient way.…”
Get full text
Article -
5580
Identity-based encryption scheme against adaptive leakage
Published 2012-07-01Subjects: Get full text
Article