Showing 1,121 - 1,140 results of 15,549 for search '"adaptation"', query time: 0.07s Refine Results
  1. 1121

    An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree by Wei Zhang, Yajun Guo, Xueming Tang, Guohua Cui, Longkai Wu, Ying Mei

    Published 2013-12-01
    “…To reduce these excessive idle timeslots the 4-ary tree anticollision algorithm brings, an anti-collision algorithm based on adaptive 4-ary pruning query tree (A4PQT) is proposed in this paper. …”
    Get full text
    Article
  2. 1122
  3. 1123

    Management of surface and spring water for rice cultivation as climate adaptation in dry land by Anshori Arif, Suswatiningsih Tri Endar

    Published 2025-01-01
    “…This research aims to examine the use of rainfall, surface flow and spring water to support rice planting in the second growing season as a form of adaptation to climatic conditions of dry land in karst areas. …”
    Get full text
    Article
  4. 1124

    Adaptive Control Using Neural Networks and Approximate Models for Nonlinear Dynamic Systems by Khadija El Hamidi, Mostafa Mjahed, Abdeljalil El Kari, Hassan Ayad

    Published 2020-01-01
    “…In this research, a comparative study of two recurrent neural networks, nonlinear autoregressive with exogenous input (NARX) neural network and nonlinear autoregressive moving average (NARMA-L2), and a feedforward neural network (FFNN) is performed for their ability to provide adaptive control of nonlinear systems. Three dynamical nonlinear systems of different complexity are considered. …”
    Get full text
    Article
  5. 1125
  6. 1126

    Avoiding catastrophic overfitting in fast adversarial training with adaptive similarity step size. by Jie-Chao Zhao, Jin Ding, Yong-Zhi Sun, Ping Tan, Ji-En Ma, You-Tong Fang

    Published 2025-01-01
    “…To address these issues, this paper proposes a fast adversarial training method-fast adversarial training with adaptive similarity step size (ATSS). In this method, random noise is first added to the input clean samples, and the model then calculates the gradient for each input sample. …”
    Get full text
    Article
  7. 1127

    Psychological preconditions for the implementation of the police officers` coping behavior in the context of adaptive perfectionism by S. M. Boiko, V. M. Filonenko

    Published 2021-09-01
    “…The first group consisted of subjects with an adaptive form of perfectionism (63 people), the second - subjects with a maladaptive form of perfectionism (39 people). …”
    Get full text
    Article
  8. 1128
  9. 1129
  10. 1130

    Lossless image authentication algorithm based on adaptive combinations of image basic blocks by Jian-gao LUO, Guo-qiang HAN, Yan WO, Xiang-yang LI

    Published 2012-06-01
    “…As the existing block-wise lossless image authentication algorithms were inadequate in the division of image authentication blocks,a novel lossless image authentication algorithm based on adaptive combinations of image basic blocks was proposed.The image authentication block was composed of some basic image blocks by the source image characteristics and requirements of watermarking image fidelity,and the authentication code was generated by a digital signature algorithm and embedded into the authentication block via a lossless watermarking algorithm.Moreover,the robust transmission of the image ID was achieved via multi-embedding,and using the ID and authentication block ID the image authentication algorithm could prevent vector quantizationattack.Theoretical analyses and experimental results demonstrate that the algorithm not only improves the existing tamper localization accuracy but also has strong adaptability and can resist vector quantization attack.…”
    Get full text
    Article
  11. 1131

    Comparative transcriptomics reveal stage-dependent parasitic adaptations in the myxozoan Sphaerospora molnari by Monika M. Wiśniewska, Jiří Kyslík, Gema Alama-Bermejo, Alena Lövy, Martin Kolísko, Astrid S. Holzer, Anush Kosakyan

    Published 2025-02-01
    “…We identified genes that are thus far unique to S. molnari, which reveal their evolutionary novelty and likely role as adaptations to specific host niches. In addition, we describe the pathogenicity-associated genetic toolbox of S. molnari and discuss the implications of our discoveries for disease control by shedding light on specific targets for potential intervention strategies.…”
    Get full text
    Article
  12. 1132
  13. 1133

    An Adaptive Fuzzy-Logic Traffic Control System in Conditions of Saturated Transport Stream by N. R. Yusupbekov, A. R. Marakhimov, H. Z. Igamberdiev, Sh. X. Umarov

    Published 2016-01-01
    “…This paper considers the problem of building adaptive fuzzy-logic traffic control systems (AFLTCS) to deal with information fuzziness and uncertainty in case of heavy traffic streams. …”
    Get full text
    Article
  14. 1134

    Polymorphism in the TRP8 gene in Kyrgyz population: putative association with highland adaptation by V. N. Babenko, Ж. Т. Isakova, E. T. Talaibekova, D. A. Asambaeva, V. F. Kobzev, T. A. Potapova, M. I. Voevoda, A. A. Aldashev

    Published 2015-12-01
    Subjects: “…trpm8 gene, population analysis, singlenucleotide polymorphisms, associations, distribution, cold adaptation…”
    Get full text
    Article
  15. 1135

    Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud by Jianhua LIU, Minglu LI, Dazhi LI, Luqun LI

    Published 2017-06-01
    “…Industrial wireless sensor networks and production equipments are deployed in unattended and distributed intelligent manufacturing system (IMS).Sensor-cloud as a potential technology can effectively integrate distributed equipments as a service and provide it to mobile robots.However,when the mobile robots access the remote devices via sensor-cloud platform,because potential attackers easily intercept keys and eavesdrop equipment operation contents through wireless channels,which makes the key management and the control of equipment operation permission become crucial to the safe and reliable operation of IMS.Therefore,the utility function of game players were formalized,the adaptive trust update process was analyzed,and an adaptive trust management mechanism based on evolutionary game was proposed.Simulation results show that the proposed method can effectively improve the security of sensor-cloud network systems and equipments.…”
    Get full text
    Article
  16. 1136

    Hurst and priority adaptive RED combined with dynamic scheduling algorithm based on AOS by Yu-xia BIE, Cheng-sheng PAN, Hai-yan LIU, Yan-chun WANG

    Published 2012-10-01
    “…In order to efficiently transmit different types of high-capacity and burst data,based on virtual channel multiplexing technology on advanced orbiting systems(AOS),a Hurst and priority adaptive random early detection(RED) combined with dynamic scheduling algorithm named HPRED-DS was proposed.In queue management state,the algorithm designed an adaptive two-level packet dropping strategy based on Hurst parameter and priority.In virtual channel scheduling state,a VIP,synchronous and asynchronous mixed virtual channels scheduling mode was designed.Meanwhile,the algorithm efficiently combined queue management and virtual channel scheduling.Experimental results show that on the basis of maintaining high treatment efficiency and throughput,the algorithm stabilizes queue length,reduces delay and delay jitter,can meet various services’transmitting requirement.…”
    Get full text
    Article
  17. 1137
  18. 1138

    IPTV user’s on-demand behavior based on adaptive segmental stretched exponential model by Buhua CHEN, Ge CHEN, Jie LIANG

    Published 2018-05-01
    “…The IPTV user’s on-demand behavior model based on adaptive segmental stretched exponential (ASSE) was proposed to optimize the configuration of IPTV CDN system,to improve the video scheduling and storage strategy,and to provide users with better experience for video access.At the same time,the probability of the video access by using the actual IPTV user’s on-demand data of China Telecom was simulated.Experiments show that compared with the traditional modeling methods,the ASSE model proposed not only achieves the purpose of simplifying the mathematical model and reducing the computation,but also improves the accuracy of the curve fitting.It has good consistency with the actual data.…”
    Get full text
    Article
  19. 1139
  20. 1140

    Research on cloud-based traffic adaptive command and control method for mobile botnet by Wei CHEN, Shi-wen ZHOU, Cheng-yu YIN

    Published 2014-11-01
    “…Botnet is a serious attack evolved from traditional malwares.With the rapid development of computing capability and mobile Internet access technology,building a realistic mobile botnet has become a potential threat.An adaptive traffic control mechanism for cloud-based mobile botnet was proposed.It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments.Then scheduling algorithms to execute botnet commands was applied.The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.…”
    Get full text
    Article