Showing 5,561 - 5,580 results of 67,915 for search 'DASB~', query time: 2.64s Refine Results
  1. 5561

    Bearing Fault Diagnosis Based on Multilayer Domain Adaptation by Bingru Yang, Qi Li, Liang Chen, Changqing Shen

    Published 2020-01-01
    “…A special designed residual network for the fault diagnosis task is pretrained to extract domain-invariant features. …”
    Get full text
    Article
  2. 5562

    Research on the Classification of Policy Instruments Based on BERT Model by Jiani Zhao, Cheng Li

    Published 2022-01-01
    “…An entrepreneurship policy instrument classification model was established on the basis of the pretraining language model to realize the automatic classification of entrepreneurship policy instruments. …”
    Get full text
    Article
  3. 5563

    Research on intelligent control technology for OSU-based OTN by Yanxia TAN, Zhiyan DUAN, Xiangkun MAN, He ZHANG, Yacheng LIU, Yantao ZHOU, Shan DONG

    Published 2023-10-01
    “…With the development of information and cloud technology, the dynamic demand for OTN service is gradually increasing.As a next generation OTN switching technology, OSU needs to provide network and cloud services for high-quality enterprise leased lines and boutique home broadband services.The OSU-based OTN needs to be able to provide integrated services and automated service provisioning through end-to-end management and control capabilities to support one-hop service into the cloud.Firstly, the background, technical characteristics, and standardization progress of OSU technology were introduced.Then, a service-aware control framework for OSU-OTN was proposed to meet the demand for efficient bearer of government and enterprise leased lines.Finally, an experimental validation of the end-to-end management and control capability of the access OSU-OTN controller system was carried out.…”
    Get full text
    Article
  4. 5564
  5. 5565

    A Process Model for the Implementation of Blockchain-Based Systems by Muhammad Nasim Bahar, Michal Ries, Kristian Kostal

    Published 2025-01-01
    “…Furthermore, a real-world use case, “Blockchain-Based Property Registration and Succession System,” exemplifies the model’s applicability in tackling practical challenges. …”
    Get full text
    Article
  6. 5566

    Correlation calculation decrypting for BSS-based image cryptosystem by LIN Qiu-hua, DANG Jie, YIN Fu-liang

    Published 2008-01-01
    “…For a blind source separation (BSS) based method for encrypting multiple images, the multiple decrypted im- ages by BSS may have changed order and reversed pixel values. …”
    Get full text
    Article
  7. 5567

    Modeling methods and model for flow-based IP network by WANG Ying, MENG Luo-ming, QIU Xue-song, WANG Zhi-li

    Published 2008-01-01
    “…The management information modeling methods of IP network was studied based on the concept of "flow", which describes the connectionless characteristics of IP network. …”
    Get full text
    Article
  8. 5568

    RWA algorithm based on cost of photoelectric conversion device by Daoyun HU, Zhentai YANG, Qianchun LU, Jin QI

    Published 2020-04-01
    “…Over the past decade,carrier operator implement fine-grained traffic scheduling in optical transport network(OTN) by deploying optical-electric conversion(OEO) devices on ROADM,which can improve the spectrum utilization.However,OEO device is very expensive,which will increase the CAPEX and OPEX of carrier operator.A problem about traffic scheduling and the deployment of OEO devices in OTN was proposed.Then,the ILP model of this problem was built and it was proved NP-hard.Additionally,two novel algorithms named OEO-RWA and SA-RWA were proposed.At last,these algorithms were demonstrated can not only ensure flexibility of traffic scheduling,but also can reduce the number of OEO device through simulation.…”
    Get full text
    Article
  9. 5569
  10. 5570

    Retracted: Image Recognition Technology Based on Neural Network by Jianqiu Chen

    Published 2020-01-01
    “…Using deep learning algorithms to recognize and classify image has become a hot issue for scholars from all walks of life. …”
    Get full text
    Article
  11. 5571
  12. 5572

    Design of Fixed Beamformers Based on Vector-Sensor Arrays by Matthew Hawes, Wei Liu

    Published 2015-01-01
    “…The problem of designing fixed beamformers based on such an array, with a quaternionic signal model, is considered in this paper. …”
    Get full text
    Article
  13. 5573
  14. 5574

    Graph-Based Feature Crossing to Enhance Recommender Systems by Congyu Cai, Hong Chen, Yunxuan Liu, Daoquan Chen, Xiuze Zhou, Yuanguo Lin

    Published 2025-01-01
    “…Finally, a series of comprehensive experiments were conducted on several public data sets to show the performance of our model. It provides valuable insights into the capability of our model in recommendation tasks and offers a viable pathway for the public data operation.…”
    Get full text
    Article
  15. 5575

    Research on House Price Prediction based on Machine Learning by Yang Xiangjun

    Published 2025-01-01
    “…This study aims to evaluate and compare the performance of various machine learning models on the task of house price prediction. For the house price prediction task, Random Forests generally perform better than Linear Regression and Single Decision Tree because they can better capture complex patterns in the data and reduce the risk of overfitting. …”
    Get full text
    Article
  16. 5576
  17. 5577
  18. 5578
  19. 5579

    Research on the risk adjacency matrix based on attack graphs by YE Yun, XU Xi-shan, JIA Yan, QI Zhi-chang, CHENG Wen-cong

    Published 2011-01-01
    “…Aimed at the problem that the difficulty to understand the very complicated attack graphs generated by a variety of existing tools,a method of RAM(risk adjacency matrix) based on attack graphs was proposed,and feasibility and efficient of proposed method was verified in experiment.The experimental results on the network showed that visualization of attack graphs was extended significantly,and the re-computing problem caused by the rings and loops in the risk assessment was solved in a simple and efficient way.…”
    Get full text
    Article
  20. 5580