Search

Results: 3122
A Method of Sanitizing Privacy-Sensitive Sequence Pattern Networks Mined From Trajectories Released
Mobility patterns mined from released trajectories can help to allocate resources and provide personalized services, although these also pose a threat to personal location privacy. As the existing sanitization methods cannot...
Performing Locality and Identity
Lijun Zhang
Sep 21, 2016
The paper examines the fusion of narratives, time, space, and personal identity through ethnographic study of rickshaw driver’s performance in the context of “Hutong tour” as a form of urban tourism in Beijing, a cosmopolitan...
Periodicity of Single-Molecule Magnet Behaviour of Heterotetranuclear Lanthanide Complexes across the Lanthanide Series
Acetato-bridged palladium-lanthanide tetranuclear heterometallic complexes of the form [Pd2 Ln2 (H2 O)2 (CH3 COO)10 ]⋅2 CH3 COOH [Ln2 =Ce2 (1), Pr2 (2), Nd2 (3), Sm2 (4), Tb2 (5), Dy2 (6), Dy0.2 Y1.8 (6''), Ho2 (7), Er2 (8)...
Published by:
Spatiotemporal Data Prediction Model Based on a Multi-Layer Attention Mechanism
Spatiotemporal data prediction is of great significance in the fields of smart cities and smart manufacturing. Current spatiotemporal data prediction models heavily rely on traditional spatial views or single temporal...
Identification of high risk clinical and imaging features for intracranial artery dissection using high-resolution cardiovascular magnetic resonance
Abstract: Background: Intracranial artery dissection (IAD) often causes headache and cerebral vascular ischemic events. The imaging characteristics of IAD remain unclear. This study aims to characterize the appearance of culprit...
Published by:
An Empirical Research on the Construction of a Government Website Public Satisfaction Index Model in China
Haitao Li
Sep 01, 2021
With proliferated applications of the internet and world wide web, people are increasingly interacting with government websites. It is therefore significant to measure satisfaction on government systems from citizen's...
First birth following spindle transfer for mitochondrial replacement therapy
In this issue, Zhang et al. (2017) report the birth of a healthy boy after mitochondrial replacement therapy (MRT) by spindle transfer to prevent transmission of mitochondrial disease from mother to child. The case was first...
Published by:
Research on the Utilization and Evaluation of Library Resource Discovery Systems in China
According to the investigation of library resources discovery system construction in 20 universities in China, the aggregation discovery service provided by the multi-source aggregation function, the discovery function is based...
Dynamic pricing for responsive demand to increase distribution network efficiency

This paper designs a novel dynamic tariff scheme for demand response (DR) by considering networks costs through balancing the trade-off between network investment costs and congestion costs. The objective is to actively...

Published by:
Dynamic pricing for responsive demand to increase distribution network efficiency

This paper designs a novel dynamic tariff scheme for demand response (DR) by considering networks costs through balancing the trade-off between network investment costs and congestion costs. The objective is to actively...

Published by:
Application of an Encoding Revision Algorithm in Overlapping Coalition Formation
Overlapping coalition formation is a very active research field in multi-agent systems (MAS). In overlapping coalition, each agent can participate in different coalitions corresponding to multiple tasks at the same time. As each...
High-Efficiency Multihomed Multimedia Transmission in Wireless Sensors
For real-time video transmission in multimedia sensor networks, efficient and reliable communication is very important. However, under actual conditions, when the sensor transmits data to the sink node, the link between the...
Analysis of Big Data Network Security Defense Mechanism Application of Artificial Intelligence
In the context of the close integration of computer network technology and daily life, big data network security faces many challenges. With its powerful information processing ability, this AI can effectively identify and...
Research of Self-Attention in Image Segmentation
Although the traditional convolutional neural network is applied to image segmentation successfully, it has some limitations. That's the context information of the long-range on the image is not well captured. With the success...
The careful control of Polo kinase by APC/C-Ube2C ensures the intercellular transport of germline centrosomes during Drosophila oogenesis.
A feature of metazoan reproduction is the elimination of maternal centrosomes from the oocyte. In animals that form syncytial cysts during oogenesis, including Drosophila and human, all centrosomes within the cyst migrate to the...
Published by:
An Efficient Code-Embedding-Based Vulnerability Detection Model for Ethereum Smart Contracts
Efficient and convenient vulnerability detection for smart contracts is a key issue in the field of smart contracts. The earlier vulnerability detection for smart contracts mainly relies on static symbol analysis, which has high...
Dynamic Robust Particle Swarm Optimization Algorithm Based on Hybrid Strategy
Robust optimization over time can effectively solve the problem of frequent solution switching in dynamic environments. In order to improve the search performance of dynamic robust optimization algorithm, a dynamic robust...
Strong Coupling in Conserved Surface Roughening
The Kardar-Parisi-Zhang (KPZ) equation defines the main universality class for nonlinear growth and roughening of surfaces. But under certain conditions, a conserved KPZ equation (CKPZ) is thought to set the universality class...
Published by:
An Evaluation System Based on User Big Data Management and Artificial Intelligence for Automatic Vehicles
As artificial intelligence technique is widely used in the automatic driving system, the safety evaluation of automatic vehicles is considered to be the most important demand. Under this context, in this paper, an evaluation...

|<

<

1

2

3

4

5

>

>|