Showing 881 - 900 results of 1,115 for search 'problem solving still', query time: 0.09s Refine Results
  1. 881

    Exploration of the Main Models and Optimization Paths for the Market-Oriented Operation of Urban Parks by Yanting LI, Qiaowan YANG

    Published 2025-06-01
    “…Only through systematic design can the problem be solved. On this basis, through innovation in institutional design and market guidance, implementation paths are proposed to explore how to resolve the contradictions between the public and commercial attributes of parks and balance the short-term interests of parks with long-term ecological benefits, providing practical references for park authorities and operation implementation units.…”
    Get full text
    Article
  2. 882

    Multi-granularity Android malware fast detection based on opcode by Xuetao ZHANG, Meng SUN, Jinshuang WANG

    Published 2019-12-01
    “…The detection method based on opcode is widely used in Android malware detection,but it still contains some problems such as complex feature extraction method and low efficiency.In order to solve these problems,a multi-granularity fast detection method based on opcode for Android malware was proposed.Multi-granularity refers to the feature based on the bag of words model,and with the function as basic unit to extract features.By step-by-level aggregation feature,the APK multi-level information is obtained.The log length characterizes the scale of the function.And feature can be compressed and mapped to improve the efficiency and construct the corresponding classification model based on the semantic similarity of the Dalvik instruction set.Tests show that the proposed method has obvious advantages in performance and efficiency.…”
    Get full text
    Article
  3. 883

    Lampsy: An Invisible Real-Time Epilepsy Video Monitoring and Automatic Seizure Detection Device by Vicente M. Garcao, Mariana Abreu, Francisca Sa, Ana Rita Peralta, Carla Bentes, Ana Fred, Hugo Placido da Silva

    Published 2025-01-01
    “…However, no video-based, medically certified seizure detection devices exist, possibly due to the hardware costs needed for accurate real-time video-based detection. This work seeks to solve this problem by exploring the feasibility of real-time video-based seizure detection on affordable edge devices. …”
    Get full text
    Article
  4. 884

    إشكالية التناقض بين الريع النفطي والتنمية المستدامة في العراق by عامر جميل عبد الحسين, مانع حبش الطعمة

    Published 2017-05-01
    “…Abstract             Iraqi economy was, and still is, suffering from many permanent developmental problems. …”
    Get full text
    Article
  5. 885

    Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints by Ruyun ZHANG, Heyuan LI, Shunbin LI

    Published 2021-03-01
    “…Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.…”
    Get full text
    Article
  6. 886

    Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints by Ruyun ZHANG, Heyuan LI, Shunbin LI

    Published 2021-03-01
    “…Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the ecological resources of industrial application are relatively closed, and the number of realizable heterogeneous executors is limited.To solve the above problems, a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment, it can still maintain a high availability probability of 99.24%.…”
    Get full text
    Article
  7. 887

    Design of a Vehicle Parking Management Information System in Tanjung Duren Central Park Area West Jakarta by Topan Setiawan

    Published 2025-01-01
    “…Tanjung Duren Parking is a parking lot whose operational activities still use a manual system, so that parking officers often experience problems such as incorrectly calculating the total parking fee or incorrectly recording incoming and outgoing vehicles, which results in parking revenue anomalies and inaccurate parking space availability data. …”
    Get full text
    Article
  8. 888

    GRAV3D Validation using Generalized Cross-Validation (GCV) Algorithm by Lower Bounds Approach for 3D Gravity Data Inversion by Mochamad Aryono Adhi, Wahyudi Wahyudi, Wiwit Suryanto, Muh Sarkowi

    Published 2018-11-01
    “…GRAV3D is one software that can be used to solve 3D inversion problems of gravity data. Nevertheless there are still fundamental problems related to how to ensure the validity of GRAV3D to be used in 3D inversion. …”
    Get full text
    Article
  9. 889

    Route Optimization of Pipeline in Gas-Liquid Two-Phase Flow Based on Genetic Algorithm by Jun Zhou, Guangchuan Liang, Tao Deng, Jing Gong

    Published 2017-01-01
    “…This paper describes the problems in route optimization of two-phase pipelines. …”
    Get full text
    Article
  10. 890

    Review on the Recent Advances in the Impulsive Control Strategy Based Coordination of the Multi-agent Systems by TAN Xuegang; CAO Jinde

    Published 2020-03-01
    “…The impulsive control strategy has attracted the immense research attention due to its excellent performance in terms of the robustness, the simplicity and the convergence, which has widely been utilized to solve the coordinated control problems of multi-agent systems. …”
    Get full text
    Article
  11. 891

    Prospects for the digital transformation of the transport industry by O. B. Repkina

    Published 2024-04-01
    “…The issue of employment, potentially arising from the spread of artificial intelligence and unmanned vehicles, is also touched upon. In order to solve urgent problems, the need for mandatory insurance of the most risky elements of the transport system is justified, which is still an omission. …”
    Get full text
    Article
  12. 892

    Improved Blockchain Technology for Performance Optimization Model Design of Sports Clubs by Shuang Wang

    Published 2022-01-01
    “…However, the development of professional sports clubs in China is still facing many challenges. Among them, the key to their long-term development is to improve their financing ability and solve their financing difficulties in order to improve the performance of professional sports club. …”
    Get full text
    Article
  13. 893

    Research onconvolutional neural network for reservoir parameter prediction by You-xiang DUAN, Gen-tian LI, Qi-feng SUN

    Published 2016-10-01
    “…As the branch of artificial intelligence,artificial neural network solved many difficult practical problems in pattern recognition and classification prediction field successfully.However,they cannot learn the feature from networks.In recent years,deep learning becomes more and more advanced,but the research on the field of geological reservoir pa-rameter prediction is still rare.A method to predict reservoir parameters by convolutional neural network was presented,which can not only predict reservoir parameters accurately,but also get features of the geological reservoir.The study es-tablished the convolutional neural network model.Results show that the convolutional neural network can be used for reservoir parameter prediction,and get high prediction precision.Moreover,convolutional features from convolutional neural network provided important support for geological modeling and logging interpretation.…”
    Get full text
    Article
  14. 894

    Critical reading and critical thinking The State of the Art by Loni Kreis Taglieber

    Published 2000-01-01
    “…In modern society, even in everyday life people frequently need to deal with complicated public and political issues, make decisions, and solve problems. In order to do this efficiently and effectively, citizens must be able to evaluate critically what they see, hear, and read. …”
    Get full text
    Article
  15. 895

    Exploration and practice of data quality governance in privacy computing scenarios by Yan ZHANG, Yifan YANG, Ren YI, Shengmei LUO, Jianfei TANG, Zhengxun XIA

    Published 2022-09-01
    “…Privacy computing is a new data processing technology, which can realize the transformation and circulation of a data value on the premise of protecting data privacy and security.However, the invisible feature of data in private computing scenarios poses a great challenge to traditional data quality management.There is still a lack of perfect solutions.To solve the above problems in the industry, a data quality governance method and process suitable for privacy computing scenarios were proposed.A local and multi-party data quality evaluation system was constructed, which could take into account the data quality governance of the local domain and the federal domain.At the same time, a data contribution measurement method was proposed to explore the long-term incentive mechanism of privacy computing, improve the data quality of privacy computing, and improve the accuracy of computing results.…”
    Get full text
    Article
  16. 896

    Perspectives on Image Aesthetic Evaluation Techniques by Yang Kaiwei

    Published 2025-01-01
    “…Although deep learning technology can improve the accuracy of evaluation and has achieved some results in aesthetic evaluation tasks, the technology still faces challenges such as high subjectivity and poor diversity, and it is believed that with the progress of science and technology, these problems will be solved. …”
    Get full text
    Article
  17. 897

    Applications of Transition Metal NMR Spectroscopy in Coordination Chemistry by Dieter Rehder

    Published 1986-05-01
    “…We shall try to answer this question by (i) elucidating the interpretive background and (ii) presenting a number of illustrative examples where transition metal NMR is exploited to solve problems which otherwise could not easily be dealt with. …”
    Get full text
    Article
  18. 898

    SISTEM INFORMASI TUGAS AKHIR & PRAKTEK KERJA LAPANGAN BERBASIS WEB MENGGUNAKAN METODE UNIFIED PROCESS by Ryan Adiwinata, Eko Adi Sarwoko, Indriyati Indriyati

    Published 2012-03-01
    “…The Final Project and Job Training Information System is built to solve those problems. This information system was developed using unified process method. …”
    Get full text
    Article
  19. 899

    Technologies éducatives et développement : une brève histoire de la télévision scolaire au Niger by Gado ALZOUMA

    Published 2019-05-01
    “…The failure of some of those projects shows the limits of the technocentrist approach which has recently resurfaced in the developmentalist discourse and which is based on the idea that technology (and technology alone) can solve all the social and economic problems Africa is facing. …”
    Get full text
    Article
  20. 900