Showing 16,561 - 16,580 results of 29,723 for search 'Winaq~', query time: 2.24s Refine Results
  1. 16561

    Reliability Evaluation of Multiple DCFP System subject to Shifting Threshold by Chunping Li, Huibing Hao, Fang Xu, Guotao Zhao

    Published 2020-01-01
    “…Numerical results indicate that both random shocks and shifting threshold have significant effect on system reliability. Finally, some sensitivity analysis are also been given.…”
    Get full text
    Article
  2. 16562

    Challenges in observing transcription–translation for bottom-up synthetic biology by Vadim G. Bogatyr, Gijs J. L. Wuite

    Published 2025-01-01
    “…It also assesses approaches available to image transcription and translation with a diverse arsenal of fluorescence microscopy techniques and a broad collection of probes developed in recent decades. Finally, it highlights solutions for the challenge ahead, namely the decoupling of the two systems in PURE, and discusses the prospects of synthetic biology in the modern world.…”
    Get full text
    Article
  3. 16563

    New Jensen–Shannon divergence measures for intuitionistic fuzzy sets with the construction of a parametric intuitionistic fuzzy TOPSIS by Xinxing Wu, Qian Liu, Lantian Liu, Miin-Shen Yang, Xu Zhang

    Published 2025-01-01
    “…Based on our proposed divergence measure, entropy measure, and entropy-weight method, a new TOPSIS method is introduced to deal with multi-attribute decision making (MADM) problems under the intuitionistic fuzzy framework. Finally, a practical example on the credit evaluation of potential strategic partners and a comparative analysis with other TOPSIS methods is developed to illustrate the efficiency of the proposed TOPSIS method.…”
    Get full text
    Article
  4. 16564

    SD-WAN tunnel technology and network constuction by Jia NIU, Yongming YAN, Zhihua LIN

    Published 2021-01-01
    “…The status of SD-WAN technology was introduced, the SD-WAN advantages with traditional line were compared.The basic technical features of SD-WAN, the software definition network controllers of SD-WAN, security encryption and tenant isolation, the SD-WAN industry standards were described.The relevant technologies of SD-WAN main manufacturers were also analyzed, the tunnel technology used by SD-WAN was compared.And private IPSec tunnel , VxLAN over IPSec, NvGRE over IPSec, SSL tunnel network project used by the different companys was compared and analyzed, the optimized tunnel technology project was given, and optimizational suggestions on how to use tunnel technology to complete networking project were further put forwarded, combined with the advantages of Internet service product in establishing SD-WAN, the POP network and peer-to-peer networking solutions were given.Finally, it make future development prospect for SD-WAN standards, Internet service product and SD-WAN manufacturers trends.…”
    Get full text
    Article
  5. 16565

    Iris Localization Algorithm based on Effective Area by Jinfeng Yu, Lei Zhang, Zhi Wang

    Published 2021-01-01
    “…Furthermore, a method to remove reflective noise is proposed, which can effectively avoid the problem of noise interference in the process of inner boundary determination. Finally, aiming at the edge deviation caused by eyelashes, an outer boundary adjustment method is proposed. …”
    Get full text
    Article
  6. 16566

    Artificial Intelligence in Science and Society: The Vision of USERN by Tommaso Dorigo, Gary D. Brown, Carlo Casonato, Artemi Cerda, Joseph Ciarrochi, Mauro da Lio, Nicole D'Souza, Nicolas R. Gauger, Steven C. Hayes, Stefan G. Hofmann, Robert Johansson, Marcus Liwicki, Fabien Lotte, Juan J. Nieto, Giulia Olivato, Peter Parnes, George Perry, Alice Plebe, Idupulapati M. Rao, Nima Rezaei, Fredrik Sandin, Andrey Ustyuzhanin, Giorgio Vallortigara, Pietro Vischia, Niloufar Yazdanpanah

    Published 2025-01-01
    “…A discussion of the implications, opportunities, and liabilities of the diffusion of AI for research in a few representative fields of science follows this. Finally, we address the potential risks of AI to modern society, suggest strategies for mitigating those risks, and present our conclusions and recommendations.…”
    Get full text
    Article
  7. 16567

    A Short-Term Load Forecasting Model of LSTM Neural Network considering Demand Response by Xifeng Guo, Qiannan Zhao, Shoujin Wang, Dan Shan, Wei Gong

    Published 2021-01-01
    “…Secondly, an improved genetic algorithm (IGA) is used to obtain the best LSTM parameters; finally, the special gate structure of the LSTM model is used to selectively control the influence of input variables on the model parameters and perform load forecasting. …”
    Get full text
    Article
  8. 16568

    Research on the trusted environment of container cloud based on the TPCM by Guojie LIU, Jianbiao ZHANG, Ping YANG, Zheng LI

    Published 2021-08-01
    “…Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much attention.A method for constructing a trusted environment of container cloud using active immune trusted computing was proposed, and its security meet the requirements of network security level protection standards.First, container cloud servers were measured through the TPCM and a trust chain from the TPCM to the container's operating environment was established.Then, by adding the trusted measurement agent of the container to the TSB, the trusted measurement and trusted remote attestation of the running process of the container were realized.Finally, an experimental prototype based on Docker and Kubernetes and conduct experiments were built.The experimental results show that the proposed method can ensure the credibility of the boot process of the cloud server and the running process of the container and meet the requirements of the network security level protection standard evaluation.…”
    Get full text
    Article
  9. 16569

    Improved Dynamic Response of a Single-Phase-Integrated KY Boost Converter with an MLI System of a DC-AC Converter in Motor Speed Regulation by V. Mohan, K. Nandakumar

    Published 2023-01-01
    “…The simulation results of the KBC-MLI technique have been evaluated against the theoretical models. Finally, extensive experiments were carried out to validate the theoretical results.…”
    Get full text
    Article
  10. 16570

    Bio-screening and quantification of methyl paraben in vinegar and coconut juice separated by HPTLC by Yisheng Chen, Xingjun Xi

    Published 2024-05-01
    “…For accurate quantification, bioluminescent inhibition pattern caused by the analyte was processed by image analysis, giving useful sensitivity (LOD > 16 mg/kg), precision (RSD < 10.1%) and accuracy (spike-recovery rate 76.9%–112.2%). Finally, the suspected result was confirmed by determining its MS fingerprint, further strengthening the reliability of screening.…”
    Get full text
    Article
  11. 16571

    STUDY ON FAULT DIAGNOSIS METHOD BASED ON MORLET WAVELET-SVD AND VPMCD by QI Peng, FAN YuGang, WU JianDe

    Published 2017-01-01
    “…Firstly,Morlet wavelet transform was used to pre-process the signals in the time domain to obtain a time-frequency coefficient matrix,then SVD was applied to the matrix to remove noise and extract the weak fault information in the corresponding dimensions according to the singular value curvature spectrum; Secondly,the signal components near the optimal meature were selected,and the Shannon energy entropy were used as the characteristic parameters to construct the feature vectors,which were then used to establish the fault identification model based on VPMCD. Finally,5-fold cross validation method and Jackknife test method were adopted to verify the proposed method,and the results have demonstrated its effectiveness.…”
    Get full text
    Article
  12. 16572

    Challenges and opportunities in enhanced recovery after surgery programs: An overview by Vijaya Gottumukkala, Girish P. Joshi

    Published 2024-11-01
    “…Rapid cycle, randomised/quasi-randomised quality improvement projects must be the core foundation of an ERAS program. Finally, research methodologies should focus on controlling for adherence to the core elements of the pathways and testing for the effectiveness of an individual intervention in a randomised controlled trial.…”
    Get full text
    Article
  13. 16573

    The Power of Words from the 2024 United States Presidential Debates: A Natural Language Processing Approach by Ana Lorena Jiménez-Preciado, José Álvarez-García, Salvador Cruz-Aké, Francisco Venegas-Martínez

    Published 2024-12-01
    “…The empirical results reveal distinct linguistic profiles for each candidate: Trump consistently employed emotionally charged language with high sentiment volatility, while Biden and Harris demonstrated more measured approaches with higher lexical diversity. Finally, this research contributes to the understanding of political discourse in high-stakes debates through NLP and can offer information on the evolution of the communication strategies of the presidential candidates of any country with this regime.…”
    Get full text
    Article
  14. 16574

    AUTOMATIC ACQUISITION OF STRESS DISTRIBUTION CHARACTERISTIC AND INFLUENCE KNOWLEDGE FOR LARGE-SCALE COMPONENT by HUA HaiYan, LIN Hua

    Published 2019-01-01
    “…By constructing knowledge reasoning model based on multi-states adjusting strategy,the main influence factors as well as their saliency under different expectations were acquired to reflect the priority of structural parameters for adjusting. Finally,the gooseneck-type boom was taken as an example,which demonstrates that the process of modeling,analysis,feature extraction and knowledge acquisition can be realized automatically and the useful knowledge can be acquired efficiently and flexibly for the intelligent optimization of large-scale component.…”
    Get full text
    Article
  15. 16575

    Analysis of fermentation characteristics in fermented grains across seven rounds of sauce-flavored Baijiu: Microbial communities structure, physicochemical parameters, volatile and... by Xiaomin Liu, Yingchun Mu, Xiangxiang Lv, Nuo Chen, Lei Chen, Tangzheng Wen, Wei Su

    Published 2025-01-01
    “…Correlation analysis revealed Issatchenkia, Kroppenstedtia, Monascus, Virgibacillus, and Pichia significantly contributed to flavor compound. Finally, a metabolic network was constructed to predict microbial and flavor compound metabolic pathways. …”
    Get full text
    Article
  16. 16576

    Outage performance analysis for multi-UAV relay systems with threshold-based DF protocol by Zhenlei DAN, Xuewen WU, Jian OUYANG, Xiaoxiao WANG, Chenwei GU

    Published 2020-08-01
    “…The unmanned aerial vehicle (UAV) relay system has become a hot topic as an effective method for the remote transmission in wireless communications.By taking path loss into account,a relay cooperative transmission system model based on multiple UAVs was established firstly,and the maximum output signal-to-noise ratio (SNR) of the system with threshold-based decode-and-forward (DF) protocol was obtained.Then,by assuming that both the uplink and downlink experience Rician distribution,the closed-form expression for outage probability (OP) of the considered system with multiple UAVs was derived.Furthermore,the asymptotic OP formula at high SNR was also derived to show the diversity order and array gain of the considered system,which were convenient to reveal the effects of system parameters on the outage performance.Finally,the computer simulations verify the correctness of the theoretical analysis,and reveal the effect of the relay number,antenna number and the threshold on the system outage performance,thus the proposed scheme can provide guidance for the system design and application.…”
    Get full text
    Article
  17. 16577

    Voltammetric Determination of Homocysteine Using Multiwall Carbon Nanotube Paste Electrode in the Presence of Chlorpromazine as a Mediator by Fathali Gholami-Orimi, Farshad Taleshi, Pourya Biparva, Hassan Karimi-Maleh, Hadi Beitollahi, Hamid R. Ebrahimi, Mohamad Shamshiri, Hasan Bagheri, Masoud Fouladgar, Ali Taherkhani

    Published 2012-01-01
    “…SWV showed wide linear dynamic range (0.1–210.0 μM Hcy) with a detection limit of 0.08 μM Hcy. Finally, this method was also examined as a selective, simple, and precise electrochemical sensor for the determination of Hcy in real samples.…”
    Get full text
    Article
  18. 16578

    Advancing UAV Communications: A Comprehensive Survey of Cutting-Edge Machine Learning Techniques by Chenrui Sun, Gianluca Fontanesi, Berk Canberk, Amirhossein Mohajerzadeh, Symeon Chatzinotas, David Grace, Hamed Ahmadi

    Published 2024-01-01
    “…We therefore conduct a comprehensive review of advanced ML strategies, ranging from federated learning, transfer and meta-learning to explainable AI, to address those challenges. Finally, the use of state-of-the-art ML algorithms in these capabilities is explored and their potential extension to cloud and/or edge computing based network architectures is highlighted.…”
    Get full text
    Article
  19. 16579

    Improved ResNet algorithm based intelligent interference identification by Jian MA, Guangjin ZHANG, Lei ZHANG, Jingwei DAI

    Published 2022-10-01
    “…The labor cost of the current network operation and maintenance is high and the efficiency is low.How to quickly and accurately identify the type of network interference, and improve the work efficiency of the maintenance personnel has become an urgent problem to be solved.An intelligent interference identification method of improved deep residual network (ResNet) was studied.The interference data was collected and preprocessedby connecting with the communication interference data interface of the operator's northbound network management.The type of itwaslabelled and corrected by the current network experts to form an offline interference data set.Then the interference frequency domain information was used to generate the interference spectrum waveform image, and performed image processing and data processing for different interference types.After that, the traditional Res Net algorithm was improved according to the business characteristics to extract the features of single interference type.The features were weighted in the compound interference type to identify any type of interference.Finally, the interference data was identified online by importing the trained model, which effectively improved the accuracy and efficiency of interference identification.…”
    Get full text
    Article
  20. 16580

    Multiperiod Telser’s Safety-First Portfolio Selection with Regime Switching by Chuangwei Lin, Huiling Wu

    Published 2018-01-01
    “…By the Lagrange multiplier technique and the embedding method, we study in detail the existence of the optimal strategy and derive the closed-form optimal strategy. Finally, by mathematical and numerical analysis, we analyze the effects of the disaster level, the risk control level, the transition matrix of the Markov chain, the expected excess return, and the variance of the risky return.…”
    Get full text
    Article