-
881
Exploration of the Main Models and Optimization Paths for the Market-Oriented Operation of Urban Parks
Published 2025-06-01“…Only through systematic design can the problem be solved. On this basis, through innovation in institutional design and market guidance, implementation paths are proposed to explore how to resolve the contradictions between the public and commercial attributes of parks and balance the short-term interests of parks with long-term ecological benefits, providing practical references for park authorities and operation implementation units.…”
Get full text
Article -
882
Multi-granularity Android malware fast detection based on opcode
Published 2019-12-01“…The detection method based on opcode is widely used in Android malware detection,but it still contains some problems such as complex feature extraction method and low efficiency.In order to solve these problems,a multi-granularity fast detection method based on opcode for Android malware was proposed.Multi-granularity refers to the feature based on the bag of words model,and with the function as basic unit to extract features.By step-by-level aggregation feature,the APK multi-level information is obtained.The log length characterizes the scale of the function.And feature can be compressed and mapped to improve the efficiency and construct the corresponding classification model based on the semantic similarity of the Dalvik instruction set.Tests show that the proposed method has obvious advantages in performance and efficiency.…”
Get full text
Article -
883
Lampsy: An Invisible Real-Time Epilepsy Video Monitoring and Automatic Seizure Detection Device
Published 2025-01-01“…However, no video-based, medically certified seizure detection devices exist, possibly due to the hardware costs needed for accurate real-time video-based detection. This work seeks to solve this problem by exploring the feasibility of real-time video-based seizure detection on affordable edge devices. …”
Get full text
Article -
884
إشكالية التناقض بين الريع النفطي والتنمية المستدامة في العراق
Published 2017-05-01“…Abstract Iraqi economy was, and still is, suffering from many permanent developmental problems. …”
Get full text
Article -
885
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
Published 2021-03-01“…Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.…”
Get full text
Article -
886
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
Published 2021-03-01“…Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.…”
Get full text
Article -
887
Design of a Vehicle Parking Management Information System in Tanjung Duren Central Park Area West Jakarta
Published 2025-01-01“…Tanjung Duren Parking is a parking lot whose operational activities still use a manual system, so that parking officers often experience problems such as incorrectly calculating the total parking fee or incorrectly recording incoming and outgoing vehicles, which results in parking revenue anomalies and inaccurate parking space availability data. …”
Get full text
Article -
888
GRAV3D Validation using Generalized Cross-Validation (GCV) Algorithm by Lower Bounds Approach for 3D Gravity Data Inversion
Published 2018-11-01“…GRAV3D is one software that can be used to solve 3D inversion problems of gravity data. Nevertheless there are still fundamental problems related to how to ensure the validity of GRAV3D to be used in 3D inversion. …”
Get full text
Article -
889
Route Optimization of Pipeline in Gas-Liquid Two-Phase Flow Based on Genetic Algorithm
Published 2017-01-01“…This paper describes the problems in route optimization of two-phase pipelines. …”
Get full text
Article -
890
Review on the Recent Advances in the Impulsive Control Strategy Based Coordination of the Multi-agent Systems
Published 2020-03-01“…The impulsive control strategy has attracted the immense research attention due to its excellent performance in terms of the robustness, the simplicity and the convergence, which has widely been utilized to solve the coordinated control problems of multi-agent systems. …”
Get full text
Article -
891
Prospects for the digital transformation of the transport industry
Published 2024-04-01“…The issue of employment, potentially arising from the spread of artificial intelligence and unmanned vehicles, is also touched upon. In order to solve urgent problems, the need for mandatory insurance of the most risky elements of the transport system is justified, which is still an omission. …”
Get full text
Article -
892
Improved Blockchain Technology for Performance Optimization Model Design of Sports Clubs
Published 2022-01-01“…However, the development of professional sports clubs in China is still facing many challenges. Among them, the key to their long-term development is to improve their financing ability and solve their financing difficulties in order to improve the performance of professional sports club. …”
Get full text
Article -
893
Research onconvolutional neural network for reservoir parameter prediction
Published 2016-10-01“…As the branch of artificial intelligence,artificial neural network solved many difficult practical problems in pattern recognition and classification prediction field successfully.However,they cannot learn the feature from networks.In recent years,deep learning becomes more and more advanced,but the research on the field of geological reservoir pa-rameter prediction is still rare.A method to predict reservoir parameters by convolutional neural network was presented,which can not only predict reservoir parameters accurately,but also get features of the geological reservoir.The study es-tablished the convolutional neural network model.Results show that the convolutional neural network can be used for reservoir parameter prediction,and get high prediction precision.Moreover,convolutional features from convolutional neural network provided important support for geological modeling and logging interpretation.…”
Get full text
Article -
894
Critical reading and critical thinking The State of the Art
Published 2000-01-01“…In modern society, even in everyday life people frequently need to deal with complicated public and political issues, make decisions, and solve problems. In order to do this efficiently and effectively, citizens must be able to evaluate critically what they see, hear, and read. …”
Get full text
Article -
895
Exploration and practice of data quality governance in privacy computing scenarios
Published 2022-09-01“…Privacy computing is a new data processing technology, which can realize the transformation and circulation of a data value on the premise of protecting data privacy and security.However, the invisible feature of data in private computing scenarios poses a great challenge to traditional data quality management.There is still a lack of perfect solutions.To solve the above problems in the industry, a data quality governance method and process suitable for privacy computing scenarios were proposed.A local and multi-party data quality evaluation system was constructed, which could take into account the data quality governance of the local domain and the federal domain.At the same time, a data contribution measurement method was proposed to explore the long-term incentive mechanism of privacy computing, improve the data quality of privacy computing, and improve the accuracy of computing results.…”
Get full text
Article -
896
Perspectives on Image Aesthetic Evaluation Techniques
Published 2025-01-01“…Although deep learning technology can improve the accuracy of evaluation and has achieved some results in aesthetic evaluation tasks, the technology still faces challenges such as high subjectivity and poor diversity, and it is believed that with the progress of science and technology, these problems will be solved. …”
Get full text
Article -
897
Applications of Transition Metal NMR Spectroscopy in Coordination Chemistry
Published 1986-05-01“…We shall try to answer this question by (i) elucidating the interpretive background and (ii) presenting a number of illustrative examples where transition metal NMR is exploited to solve problems which otherwise could not easily be dealt with. …”
Get full text
Article -
898
SISTEM INFORMASI TUGAS AKHIR & PRAKTEK KERJA LAPANGAN BERBASIS WEB MENGGUNAKAN METODE UNIFIED PROCESS
Published 2012-03-01“…The Final Project and Job Training Information System is built to solve those problems. This information system was developed using unified process method. …”
Get full text
Article -
899
Technologies éducatives et développement : une brève histoire de la télévision scolaire au Niger
Published 2019-05-01“…The failure of some of those projects shows the limits of the technocentrist approach which has recently resurfaced in the developmentalist discourse and which is based on the idea that technology (and technology alone) can solve all the social and economic problems Africa is facing. …”
Get full text
Article -
900
應用智慧型家教系統於國小學童閱讀策略 教學之學習歷程研究 A Study on the Learning Process of Applying an Autotutoring System to Teach Reading Strategies to Elementary School Children...
Published 2025-06-01“…Second, most studies rely on general instructional guidelines to address subject knowledge and problem-solving but lack specific designs for incorporating reading strategies. …”
Get full text
Article