Search alternatives:
feature » features (Expand Search)
Showing 5,041 - 5,060 results of 11,103 for search 'feature problems', query time: 0.12s Refine Results
  1. 5041

    Research of the Fractal Extrapolation of Transmission System Load Signal of Tracked Vehicle by Wang Yanzhong, Chen Yanyan, Zhou Guangming, Jia Shuang, Lv Qingjun, Zhang Zuzhi

    Published 2016-01-01
    “…Aiming at the problem of load test data volume of transmission system of heavy tracked vehicles(HTVs) is huge and extraction rate of effective information is low,the inherent fractal hierarchical rule of this data is studied,this data have the typical fractal characteristic is verified and the fractal parameter of the tracked vehicle transmission system load data under a certain road condition.Under the premise of ensurse data accuracy and fractal character,a new fractal interpolation method(FIM) is built,the continuation to simplify data information is realized.Moreover,obvious advantages could be observed in the results of the FIM,comparing to those of the linear interpolation method and the spline interpolation method.It could be concluded that by combining a’low-frequency-and-long- time’ sampling approach and the proposed FIM,the test efficiency of load history can be improved,the complex chaotic feature of high frequency sampling data can be represented.And a analysis way for researching the dynamic chaos characteristic of the HTVs transmission system is provided.…”
    Get full text
    Article
  2. 5042

    Semi-Supervised Clustering via Constraints Self-Learning by Xin Sun

    Published 2025-05-01
    “…To address this challenge, this paper attempts to solve the semi-supervised clustering problem by self-learning sufficient constraints. The essential motivation is that constraints can be learned from the local neighbor structures within appropriate feature spaces, and sufficient constraints can directly divide the data into clusters. …”
    Get full text
    Article
  3. 5043

    The Prospects of Radical Change Today by Slavoj Žižek

    Published 2018-05-01
    “…These are times that feature multiple crises, right-wing populism à la Donald Trump and Marine Le Pen, the lower classes’ opposition to immigration, and the refugee crisis. …”
    Get full text
    Article
  4. 5044

    Fingerprint localization algorithm based on linear spatial dependence of WLAN RSS by Xiaoliang XU, Jian GAO, He HUANG, Zhe MA

    Published 2017-03-01
    “…Due to RSS time-varying and difference of signal receiving ability of different terminals,the performance of RSS-based technologies is usually instability.In order to solve such problem, a novel fingerprint localization algorithm based on linear spatial dependence of RSS was proposed.Multiple sets of RSS samples were collected at each reference point to form a feature matrix and an offline location fingerprint database was conducted.When the real-time RSS matrix was used to calculate the correlation between the real-time RSS matrix and the reference point of the fingerprint library, the k-reference points were obtained, and the final position of the user was calculated by the quadratic weighted centroid algorithm.In order to effectively reduce the influence of signal time-varying,the sampling and sorting process were carried out, and the number of sampling times increased as much as possible when constructing the offline fingerprint database,but the samples needed to be aggregated to fit the positioning correlation calculation.Experiment results show that the proposed algorithm can guarantee the high positioning accuracy and also achieve the better stability for different terminal.…”
    Get full text
    Article
  5. 5045

    A Local World Evolving Model for Energy-Constrained Wireless Sensor Networks by Nan Jiang, Huan Chen, Xiang Xiao

    Published 2012-05-01
    “…Energy efficiency is one of the basic requirements of wireless sensor networks (WSNs) yet this problem has not been sufficiently explored in the context of cluster-based sensor networks. …”
    Get full text
    Article
  6. 5046

    Direct-Write Ion Beam Lithography by Alexandra Joshi-Imre, Sven Bauerdick

    Published 2014-01-01
    “…Indeed, the capability of easily creating three-dimensional patterns and shaping objects by milling and deposition is probably the most recognized feature of ion beam lithography (IBL) and micromachining. …”
    Get full text
    Article
  7. 5047

    Statistically Bounding Detection Latency in Low-Duty-Cycled Sensor Networks by Yanmin Zhu

    Published 2012-02-01
    “…This paper studies the fundamental problem of bounding detection delays when the sensor network is low duty cycled. …”
    Get full text
    Article
  8. 5048

    Holographic mean field theory and Kondo lattice by Young-Kwon Han, Debabrata Ghorai, Taewon Yuk, Sang-Jin Sin

    Published 2024-12-01
    “…The coupling of the two fermions with the scalar order representing the Kondo condensation provides the hybrization of the two spectrum, reproducing the main feature of the Kondo lattice together with the fuzzy character of the spectrum of the strongly coupled system.…”
    Get full text
    Article
  9. 5049

    Local Differential Privacy Graph Data Modeling Method for Link Prediction by HANQilong, WUXiaoming

    Published 2023-10-01
    “…At the same time , combined with the subgraph partitioning strategy of two rounds of data collection , the subgraph cluster feature of the original graph is retained. …”
    Get full text
    Article
  10. 5050

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  11. 5051

    Evidence conflict measurement method based on Pignistic probability transformation and singular value decomposition by Xinglin GUO, Zhenxiao SUN, Yuyao ZHOU, Lianzhi QI, Yi ZHANG

    Published 2021-04-01
    “…In view of the problem of poor adaptability and low accuracy of common evidence conflict measurement method, an evidence conflict measurement method based on Pignistic probability transformation and singular value decomposition was proposed.First, Pignistic probability transformation was used to map the evidence focal element difference to the belief difference, and the evidence composite belief function matrix was constructed.Then, the matrix features were extracted by singular value decomposition, and the matrix feature space was divided into similar subspace and conflict subspace according to singular value characteristics.Considering the similarity and conflict characteristics of the evidence matrix, and the ratio of the singular value of the conflict subspace to the singular value of the similar subspace was taken as the new conflict measure factor.Finally, the proposed method was compared with common methods in various evidence conflict scenarios, such as full conflict scenario, variable reliability scenario, variable focus element scenario, focal element nested scenario, and the results show that the proposed method has wide adaptability, high accuracy and good stability.…”
    Get full text
    Article
  12. 5052

    Estimation of Canopy Water Content by Integrating Hyperspectral and Thermal Imagery in Winter Wheat Fields by Chenkai Gao, Shuimiao Liu, Pengnian Wu, Yanli Wang, Ke Wu, Lingyun Li, Jinghui Wang, Shilong Liu, Peimeng Gao, Zhiheng Zhao, Jing Shao, Haolin Yu, Xiaokang Guan, Tongchao Wang, Pengfei Wen

    Published 2024-11-01
    “…Multi-sensor data fusion is one of the solutions to this problem, but suitable spectral preprocessing methods and data fusion methods still need further research. …”
    Get full text
    Article
  13. 5053
  14. 5054
  15. 5055

    Model-Free Closed-Loop Control of Flow Past a Bluff Body: Methods, Applications, and Emerging Trends by Feng Ren, Xin Wen, Hui Tang

    Published 2024-11-01
    “…Flow past one or multiple bluff bodies is almost ubiquitous in nature and industrial applications, and its rich underlying physics has made it one of the most typical problems in fluid mechanics and related disciplines. …”
    Get full text
    Article
  16. 5056

    Methodology for ensuring employee engagement in the context of enterprise digital transformation by I. V. Kablashova, I. V. Logunova, V. N. Rodionova

    Published 2023-09-01
    “…The purpose of the study is to present the results of research on methodological approaches development that reveal the content and features of employee engagement management in the activities of the enterprise. …”
    Get full text
    Article
  17. 5057

    Formation and Promotion of the Territory Brand as an Instrument of Its Development on the Example of the Arkhangelsk Oblast by Kristina V. Zavetskas, Marina V. Minina

    Published 2025-06-01
    “…It is impossible to ignore the internal characteristics of the territory: its history, natural and climatic features, level of urbanization, resource potential, dynamics of social processes, etc. …”
    Get full text
    Article
  18. 5058

    GPU Parallelization Nested Decomposition Method for Solving Large Linear Systems in Reservoir Numerical Simulation by Xin Shi, Yuan Di

    Published 2019-07-01
    “…This paper designs a highly parallel Nested Factorization (NF) to solve large linear equations generated in reservoir numerical simulation problems. The NF method is a traditional linear solution preprocessing method for reservoir numerical simulation problems, and has regained attention in recent years due to its potential to extend to parallel architectures such as GPUs (Graphics Processor Units). …”
    Get full text
    Article
  19. 5059

    Problematic aspects of management accounting for operating costs by Ya.F. Averkyn

    Published 2020-08-01
    “…The article reveals the features of management accounting of operating costs of enterprises in the brewing industry. …”
    Get full text
    Article
  20. 5060

    Capacity and current use of the Formoso river watershed, bonito municipality, Mato Grosso do Sul, Brazil: conflicts and land use recommendations by Rafael Brugnolli Medeiros, Charlei Aparecido Silva da

    Published 2024-10-01
    “…The goal of this study is to figure out how much land can be used based on its natural and physical features and to find problems that come up because of the heavy use in the Formoso River watershed. …”
    Get full text
    Article