Search alternatives:
whole » while (Expand Search)
Showing 541 - 560 results of 1,170 for search 'whole algorithm', query time: 0.08s Refine Results
  1. 541

    Extensible hierarchical codec semantic communication system by Yuyuan ZHANG, Haitao ZHAO, Jibo WEI, Kuo CAO, Yichi ZHANG, Peng LUO, Yueling LIU, Kai MEI

    Published 2023-08-01
    “…Aiming at the problem that most current researches on text semantic communication mainly rely on simulation system for theoretical verification, an extensible hierarchical semantic communication system was proposed by taking advantage of the separation of hierarchical encoding and decoding architecture in semantic level and grammatical level.The system was compatible with the reliable communication technology under the framework of Shannon information through the mode of semantic and syntactic separation, and realized the nested combination of semantic communication and traditional communication.Furthermore, a universal and extensible verification system was built based on the software radio platform to verify the proposed semantic communication system architecture.The verification system took semantic communication software platform as the driving core of hardware drive and algorithm call, integrated the whole process of signal generation, information transmission, data acquisition, decoding and evaluation at the receiving end, and could be further extended for semantic and syntactic level.Finally, the text semantic communication was tested based on this verification system, which verified that it had higher validity and reliability than the traditional communication mode.…”
    Get full text
    Article
  2. 542

    Saliency Detection via Fusing Color Contrast and Hash Fingerprint by Yin Lv, Xuanrui Zhang, Yong Wang

    Published 2022-01-01
    “…Based on this, a saliency map that highlights the whole salient region is obtained by estimating color contrast. …”
    Get full text
    Article
  3. 543

    SPECT/CT WITH 99MTC-MIBL IN MONITORING OF ESTHESIONEUROBLASTOMA by A. S. Krylov, S. V. Shiryaev, A. D. Ryzhkov, Е. М. Mikhailova, M. O. Goncharov, D. D. Sevryukov

    Published 2017-06-01
    “…This article describes a new approach to the diagnosis of esthesioneuroblastoma. The classical algorithm examination included the whole body 99mTc-MIBI scans and SPECT/CT of the head. …”
    Get full text
    Article
  4. 544

    The Combination of Spectrum Subtraction and Cross-power Spectrum Phase Method for Time Delay Estimation by Feng BIN, Xu LEI

    Published 2020-07-01
    “…Finally, the joint simulation results of the whole algorithm show that the combination of spectrum subtraction and crosspower spectrum phase method can effectively sharpen the peak value of cross-correlation function and improve the accuracy of time delay estimation in the low SNR environment. …”
    Get full text
    Article
  5. 545

    Experimental studies on engine test system based on virtual instrument technology by YE Sheng, HE Yong, XU Xiao-ming

    Published 2003-09-01
    “…The accuracy and stability of the whole control system has been proved satifactory. …”
    Get full text
    Article
  6. 546

    Unsupervised learning-based quantitative analysis of CT intratumoral subregions predicts risk stratification of bladder cancer patients by Ying Wang, Hexiang Wang, Na Li, Siyu Wu, Rongchao Shi, Kui Sun, Ximing Wang

    Published 2025-06-01
    “…Developing and evaluating the performance of an unsupervised clustering algorithm-based intratumoral subregion radiomics model for distinguishing between bladder muscle invasion and AJCC stage. …”
    Get full text
    Article
  7. 547

    Creation of WebQuests for Cultural Education and Refugee Integration in Germany: On the Example of Cologne by Oleksii Nalyvaiko, Olena Ronzhes

    Published 2023-10-01
    “…The format of web quests allows people to involve their whole family with the process, which significantly increases their cohesion in a new place and enables integration and adaption with not solely individual family members, but the whole family, which expands the level of awareness of the culture and history of their new home.…”
    Get full text
    Article
  8. 548

    Osteoporosis and sarcopenia in women with rheumatoid arthritis by O. V. Dobrovolskaya, A. Yu. Feklistov, A. O. Efremova, N. V. Toroptsova, O. A. Nikitinskaya, N. V. Demin

    Published 2020-05-01
    “…BMD in the femoral neck and in the proximal femur as a whole was significantly lower in the presence of SP than in its absence (p=0.0006 and p=0.0061, respectively). …”
    Get full text
    Article
  9. 549

    Genetic Subtype‐Based International Prognostic Index Prognostic Model in Diffuse Large B‐Cell Lymphoma by Lan Mi, Jili Deng, Jiayue Qin, Chen Zhang, Lixia Liu, Shunli Yang, Libin Chen, Hua‐Jun Wu, Haojie Wang, Jun Zhu, Hong Chen, Feng Lou, Shanbo Cao, Yuqin Song, Weiping Liu

    Published 2025-07-01
    “…Here, we retrospectively performed whole genome sequencing, whole exome sequencing, and fluorescence in situ hybridization in newly diagnosed DLBCLs, established a simplified LymphType algorithm for classification evaluation, and proposed a new integrated prognostic stratification system, combined molecular subtypes and International Prognostic Index (IPI) scoring system in our in‐house sequencing cohort (N = 100), and validated in three public cohorts (N = 1480). …”
    Get full text
    Article
  10. 550

    Robust Resilient Adaptive Control of Aero-engine Based on Parametric Perturbation Model by MA Jing, CAO Du, MA Lili

    Published 2023-04-01
    “…In complex operating environments, both model uncertainty and controller parameter variation exist simultaneously, which greatly affect the control performance in the whole flight envelope. Therefore, a robust elastic adaptive control method based on parameter perturbation model is proposed in this paper. …”
    Get full text
    Article
  11. 551

    Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model by GAO Xuning, YANG Song, LI Mingzhe, ZHANG Yanfeng

    Published 2025-01-01
    “…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
    Get full text
    Article
  12. 552

    Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model by GAO Xuning, YANG Song, LI Mingzhe, ZHANG Yanfeng

    Published 2025-01-01
    “…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
    Get full text
    Article
  13. 553

    Transforming Area Coverage to Target Coverage to Maintain Coverage and Connectivity for Wireless Sensor Networks by Xiu Deng, Jiguo Yu, Dongxiao Yu, Congcong Chen

    Published 2012-10-01
    “…It aims at selecting a minimum number of sensor nodes to cover the whole sensing region and maximizing the lifetime of the network. …”
    Get full text
    Article
  14. 554

    Design and Performance Characterization of the E-Core Outer-Rotor Hybrid-Excitation Flux Switching Machine by Zhiyuan Xu, Ming Cheng

    Published 2025-01-01
    “…On this basis, the aforementioned four performances were optimized by means of the non-dominated sorting genetic algorithm II (NSGA-II). Based on the optimization result, a prototype was manufactured and tested to verify the whole investigation of this paper.…”
    Get full text
    Article
  15. 555

    Opportunistic spectrum sharing protocol and optimal resource allocation based on OFDM cooperation relaying by Wei-dang LU, Xuan-li WU, Xue-jun SHA, Nai-tong ZHANG

    Published 2012-11-01
    “…An opportunistic spectrum sharing protocol based on OFDM cooperation relaying was proposed.When the primary user experiences weak channel conditions,it could not achieve its target rate.If the cognitive user could help the primary user achieve its target rate,it accessed the pectrum of the primary user in the cooperation way.In this access way,the cognitive user used a fraction of the subcarriers to amplify-and-forward the signal of the primary user,to help the primary user achieve its target rate.And uses the remained subcarriers to transmit its own signal.The resource allocation was analyzed in this cooperation way.An optimal resource allocation algorithm based on dual ethod was proposed,which maximized the rate of the cognitive user while g anteeing the primary user achieve its target rate.If the cognitive user could not help the primary user achieve its target rate,to make use the spectrum efficiently,the cognitive user accessed the spectrum of the primary user in the non-cooperation way,and uses the whole accessed spectrum to transmit its own signal.The simulation demonstrates the efficiency of the proposed spectrum sharing protocol as well as its benefit to both primary and cognitive user.…”
    Get full text
    Article
  16. 556

    Research on Dynamic Storage Location Assignment of Picker-to-Parts Picking Systems under Traversing Routing Method by Xiangbin Xu, Chenhao Ren

    Published 2020-01-01
    “…Then, the adjustment gain model of dynamic storage location assignment is built, and a genetic algorithm is designed to find the final adjustment solution. …”
    Get full text
    Article
  17. 557

    Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception by Lihua SONG, Yangyang JIANG, Changyou XING, Guomin ZHANG

    Published 2022-11-01
    “…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
    Get full text
    Article
  18. 558

    Numerical Simulation of Flooding Process on Downstream Structure by Three-dimensional Dam-break Wave by YU Ruixing, LIN Qin, HE Shiming, ZHENG Yipeng, ZHENG Kaiyuan

    Published 2024-08-01
    “…The information of the whole flow field describes the disaster-causing flow patterns that change many times in a short period. …”
    Get full text
    Article
  19. 559

    Research on knowledge concept extraction method based on few-shot learning and chain-of-thought prompting by SHE Linlin, XIONG Longyang, LU Xuesong

    Published 2025-01-01
    “…Experimental results on multiple datasets demonstrate that the few-shot learning and chain-of-thought prompting for knowledge concept extraction method, onthe whole, has shown results superior over existing methods.…”
    Get full text
    Article
  20. 560

    An Efficient Data Evacuation Strategy for Sensor Networks in Postdisaster Applications by Ming Liu, Bang Liu, Yonggang Wen

    Published 2013-01-01
    “…Numerical investigations reveal the effectiveness of our proposed DE algorithm.…”
    Get full text
    Article