Showing 181 - 200 results of 8,687 for search 'Mbuti~', query time: 4.56s Refine Results
  1. 181
  2. 182

    Multi-level agent architecture for war games by YU Xiaohan, YUAN Duo, YAO Changhua

    Published 2025-02-01
    “…To address this, this paper proposes a multi-level agent architecture for military strategy games based on the "Intent-Task-Action" framework, aiming to integrate various technical strengths for intelligent agent modeling in these games. …”
    Get full text
    Article
  3. 183

    Multi-Joint Dynamics and the Development of Movement Control by E. Otten

    Published 2005-01-01
    “…One hypothesis is that the nervous system controls multi-segment limbs by simply planning in terms of these equilibrium points and trajectories. …”
    Get full text
    Article
  4. 184

    Recent advanced applications of metasurfaces in multi-dimensions by Yuan Quan, Ge Qin, Chen Linsen, Zhang Yi, Yang Yuhang, Cao Xun, Wang Shuming, Zhu Shining, Wang Zhenlin

    Published 2023-02-01
    “…Here, we review the recent advances of metasurfaces in multi-dimensions, including light wavelength, polarization, orbital angular momentum(OAM), and angular response. …”
    Get full text
    Article
  5. 185

    Fermionic steering in multi-event horizon spacetime by Shu-Min Wu, Jin-Xuan Li, Yu-Xuan Wang, Si-Han Shang, Jianbo Lu

    Published 2025-01-01
    “…Interestingly, we can indirectly protect quantum steering by using appropriate types of Bell states in multi-event horizon spacetime. These conclusions are helpful to guide the task of processing relativistic quantum information for quantum steering in SdS spacetime.…”
    Get full text
    Article
  6. 186

    Dynamic multi-keyword searchable encryption scheme by Chenghao YUAN, Yong LI, Shuang REN

    Published 2023-04-01
    “…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
    Get full text
    Article
  7. 187
  8. 188
  9. 189

    Fair multi-party concurrent signature scheme by Qing YE, Yun YANG, Shi-hui ZHENG, Li-wei CHANG, Da XIAO, Yi-xian YANG

    Published 2014-03-01
    Subjects: “…multi-party concurrent signature…”
    Get full text
    Article
  10. 190

    Emerging technologies of single-cell multi-omics by Yi June Kim, Koichi Takahashi

    Published 2025-02-01
    “…Amidst the evolving landscape of single-cell multi-omics technologies, our main objective is to guide investigators in selecting the most suitable platforms for their research needs. …”
    Get full text
    Article
  11. 191

    Multi‐subband fusion algorithm based on autoencoder by Yilin Jiang, Liting Zhang, Li Li, Jinxin Li, Yaozu Yang

    Published 2022-12-01
    “…The method uses a deep‐learning autoencoder more fully described as a multi‐subband fusion autoencoder (MSFAE). This autoencoder comprises two parts: a multi‐subband encoder and a full‐band decoder. …”
    Get full text
    Article
  12. 192

    Date recognition based on multi feature extraction by Min WANG, Jia WU, Shuo SUN, Sheng LI, Kang WANG

    Published 2022-09-01
    “…Drug production date and expiration date are important indicators to measure the safety and effectiveness of drugs.The production date and validity period of liquid drugs in vertical bags are printed with numbers of 0~9.The recognition of the drug date of the hospital needs to meet the requirements of high speed and accuracy.The conventional template matching method and neural network recognition method have large amount of calculation and complex training.A drug date recognition method was proposed based on multi feature extraction.The combination of vertical line feature and three features for fine feature extraction of different digital characters has advantages of small amount of calculation and fast recognition speed.Compared with the recognition method of single extracted feature, it can effectively distinguish 10 different numbers, especially suitable for numbers of similar shape.It can provide patients with safe drug use guarantee, improve the management mode of the medical staff, improve the work efficiency, so as to improve the level of the pharmaceutical service of the hospital.…”
    Get full text
    Article
  13. 193
  14. 194

    Cooperative Space Analysis and Simulation of Multi Manipulator by Chengwen Zou, Ping Tao

    Published 2022-02-01
    Subjects: “…Multi manipulator cooperative system…”
    Get full text
    Article
  15. 195
  16. 196

    Multi-Granularity User Anomalous Behavior Detection by Wenying Feng, Yu Cao, Yilu Chen, Ye Wang, Ning Hu, Yan Jia, Zhaoquan Gu

    Published 2024-12-01
    “…To address these challenges, this paper presents a novel approach for insider threat detection, leveraging machine learning techniques to conduct multi-granularity anomaly detection. We introduce the Multi-Granularity User Anomalous Behavior Detection (MG-UABD) system, which combines coarse-grained and fine-grained anomaly detection to improve the accuracy and effectiveness of detecting anomalous behaviors. …”
    Get full text
    Article
  17. 197
  18. 198

    Information on mouth breathing in children and adolescents’ mothers by Silvia Maholy Vera Torres, Genesis Magerly García Noguera, Jaime Fernando Armijos Moreta, Silvia Marisol Gavilánez Villamarín

    Published 2022-12-01
    “…<p><strong>Background:</strong> the mouth breather syndrome is more common than it seems; most people suffer from it, but affects frequently children and adolescents.…”
    Get full text
    Article
  19. 199
  20. 200