-
541
Extensible hierarchical codec semantic communication system
Published 2023-08-01“…Aiming at the problem that most current researches on text semantic communication mainly rely on simulation system for theoretical verification, an extensible hierarchical semantic communication system was proposed by taking advantage of the separation of hierarchical encoding and decoding architecture in semantic level and grammatical level.The system was compatible with the reliable communication technology under the framework of Shannon information through the mode of semantic and syntactic separation, and realized the nested combination of semantic communication and traditional communication.Furthermore, a universal and extensible verification system was built based on the software radio platform to verify the proposed semantic communication system architecture.The verification system took semantic communication software platform as the driving core of hardware drive and algorithm call, integrated the whole process of signal generation, information transmission, data acquisition, decoding and evaluation at the receiving end, and could be further extended for semantic and syntactic level.Finally, the text semantic communication was tested based on this verification system, which verified that it had higher validity and reliability than the traditional communication mode.…”
Get full text
Article -
542
Saliency Detection via Fusing Color Contrast and Hash Fingerprint
Published 2022-01-01“…Based on this, a saliency map that highlights the whole salient region is obtained by estimating color contrast. …”
Get full text
Article -
543
SPECT/CT WITH 99MTC-MIBL IN MONITORING OF ESTHESIONEUROBLASTOMA
Published 2017-06-01“…This article describes a new approach to the diagnosis of esthesioneuroblastoma. The classical algorithm examination included the whole body 99mTc-MIBI scans and SPECT/CT of the head. …”
Get full text
Article -
544
The Combination of Spectrum Subtraction and Cross-power Spectrum Phase Method for Time Delay Estimation
Published 2020-07-01“…Finally, the joint simulation results of the whole algorithm show that the combination of spectrum subtraction and crosspower spectrum phase method can effectively sharpen the peak value of cross-correlation function and improve the accuracy of time delay estimation in the low SNR environment. …”
Get full text
Article -
545
Experimental studies on engine test system based on virtual instrument technology
Published 2003-09-01“…The accuracy and stability of the whole control system has been proved satifactory. …”
Get full text
Article -
546
Unsupervised learning-based quantitative analysis of CT intratumoral subregions predicts risk stratification of bladder cancer patients
Published 2025-06-01“…Developing and evaluating the performance of an unsupervised clustering algorithm-based intratumoral subregion radiomics model for distinguishing between bladder muscle invasion and AJCC stage. …”
Get full text
Article -
547
Creation of WebQuests for Cultural Education and Refugee Integration in Germany: On the Example of Cologne
Published 2023-10-01“…The format of web quests allows people to involve their whole family with the process, which significantly increases their cohesion in a new place and enables integration and adaption with not solely individual family members, but the whole family, which expands the level of awareness of the culture and history of their new home.…”
Get full text
Article -
548
Osteoporosis and sarcopenia in women with rheumatoid arthritis
Published 2020-05-01“…BMD in the femoral neck and in the proximal femur as a whole was significantly lower in the presence of SP than in its absence (p=0.0006 and p=0.0061, respectively). …”
Get full text
Article -
549
Genetic Subtype‐Based International Prognostic Index Prognostic Model in Diffuse Large B‐Cell Lymphoma
Published 2025-07-01“…Here, we retrospectively performed whole genome sequencing, whole exome sequencing, and fluorescence in situ hybridization in newly diagnosed DLBCLs, established a simplified LymphType algorithm for classification evaluation, and proposed a new integrated prognostic stratification system, combined molecular subtypes and International Prognostic Index (IPI) scoring system in our in‐house sequencing cohort (N = 100), and validated in three public cohorts (N = 1480). …”
Get full text
Article -
550
Robust Resilient Adaptive Control of Aero-engine Based on Parametric Perturbation Model
Published 2023-04-01“…In complex operating environments, both model uncertainty and controller parameter variation exist simultaneously, which greatly affect the control performance in the whole flight envelope. Therefore, a robust elastic adaptive control method based on parameter perturbation model is proposed in this paper. …”
Get full text
Article -
551
Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model
Published 2025-01-01“…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
Get full text
Article -
552
Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model
Published 2025-01-01“…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
Get full text
Article -
553
Transforming Area Coverage to Target Coverage to Maintain Coverage and Connectivity for Wireless Sensor Networks
Published 2012-10-01“…It aims at selecting a minimum number of sensor nodes to cover the whole sensing region and maximizing the lifetime of the network. …”
Get full text
Article -
554
Design and Performance Characterization of the E-Core Outer-Rotor Hybrid-Excitation Flux Switching Machine
Published 2025-01-01“…On this basis, the aforementioned four performances were optimized by means of the non-dominated sorting genetic algorithm II (NSGA-II). Based on the optimization result, a prototype was manufactured and tested to verify the whole investigation of this paper.…”
Get full text
Article -
555
Opportunistic spectrum sharing protocol and optimal resource allocation based on OFDM cooperation relaying
Published 2012-11-01“…An opportunistic spectrum sharing protocol based on OFDM cooperation relaying was proposed.When the primary user experiences weak channel conditions,it could not achieve its target rate.If the cognitive user could help the primary user achieve its target rate,it accessed the pectrum of the primary user in the cooperation way.In this access way,the cognitive user used a fraction of the subcarriers to amplify-and-forward the signal of the primary user,to help the primary user achieve its target rate.And uses the remained subcarriers to transmit its own signal.The resource allocation was analyzed in this cooperation way.An optimal resource allocation algorithm based on dual ethod was proposed,which maximized the rate of the cognitive user while g anteeing the primary user achieve its target rate.If the cognitive user could not help the primary user achieve its target rate,to make use the spectrum efficiently,the cognitive user accessed the spectrum of the primary user in the non-cooperation way,and uses the whole accessed spectrum to transmit its own signal.The simulation demonstrates the efficiency of the proposed spectrum sharing protocol as well as its benefit to both primary and cognitive user.…”
Get full text
Article -
556
Research on Dynamic Storage Location Assignment of Picker-to-Parts Picking Systems under Traversing Routing Method
Published 2020-01-01“…Then, the adjustment gain model of dynamic storage location assignment is built, and a genetic algorithm is designed to find the final adjustment solution. …”
Get full text
Article -
557
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
Published 2022-11-01“…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
Get full text
Article -
558
Numerical Simulation of Flooding Process on Downstream Structure by Three-dimensional Dam-break Wave
Published 2024-08-01“…The information of the whole flow field describes the disaster-causing flow patterns that change many times in a short period. …”
Get full text
Article -
559
Research on knowledge concept extraction method based on few-shot learning and chain-of-thought prompting
Published 2025-01-01“…Experimental results on multiple datasets demonstrate that the few-shot learning and chain-of-thought prompting for knowledge concept extraction method, onthe whole, has shown results superior over existing methods.…”
Get full text
Article -
560
An Efficient Data Evacuation Strategy for Sensor Networks in Postdisaster Applications
Published 2013-01-01“…Numerical investigations reveal the effectiveness of our proposed DE algorithm.…”
Get full text
Article