期刊文献+
共找到7,702篇文章
< 1 2 250 >
每页显示 20 50 100
Active learning accelerated Monte-Carlo simulation based on the modified K-nearest neighbors algorithm and its application to reliability estimations
1
作者 Zhifeng Xu Jiyin Cao +2 位作者 Gang Zhang Xuyong Chen Yushun Wu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期306-313,共8页
This paper proposes an active learning accelerated Monte-Carlo simulation method based on the modified K-nearest neighbors algorithm.The core idea of the proposed method is to judge whether or not the output of a rand... This paper proposes an active learning accelerated Monte-Carlo simulation method based on the modified K-nearest neighbors algorithm.The core idea of the proposed method is to judge whether or not the output of a random input point can be postulated through a classifier implemented through the modified K-nearest neighbors algorithm.Compared to other active learning methods resorting to experimental designs,the proposed method is characterized by employing Monte-Carlo simulation for sampling inputs and saving a large portion of the actual evaluations of outputs through an accurate classification,which is applicable for most structural reliability estimation problems.Moreover,the validity,efficiency,and accuracy of the proposed method are demonstrated numerically.In addition,the optimal value of K that maximizes the computational efficiency is studied.Finally,the proposed method is applied to the reliability estimation of the carbon fiber reinforced silicon carbide composite specimens subjected to random displacements,which further validates its practicability. 展开更多
关键词 Active learning Monte-carlo simulation K-nearest neighbors Reliability estimation CLASSIFICATION
下载PDF
A Multi-Token Sector Antenna Neighbor Discovery Protocol for Directional Ad Hoc Networks
2
作者 Zhang Hang Li Bo +2 位作者 Yan Zhongjiang Yang Mao Li Xinru 《China Communications》 SCIE CSCD 2024年第7期149-168,共20页
In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work invo... In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work involves maintaining multiple tokens across the network.To prevent mutual interference among multi-token holders,we introduce the time and space non-interference theorems.Furthermore,we propose a master-slave strategy between tokens.When the master token holder(MTH)performs the neighbor discovery,it decides which 1-hop neighbor is the next MTH and which 2-hop neighbors can be the new slave token holders(STHs).Using this approach,the MTH and multiple STHs can simultaneously discover their neighbors without causing interference with each other.Building on this foundation,we provide a comprehensive procedure for the M-SAND protocol.We also conduct theoretical analyses on the maximum number of STHs and the lower bound of multi-token generation probability.Finally,simulation results demonstrate the time efficiency of the M-SAND protocol.When compared to the QSAND protocol,which uses only one token,the total neighbor discovery time is reduced by 28% when 6beams and 112 nodes are employed. 展开更多
关键词 multi-token neighbor discovery SAND protocol sector antenna ad hoc network
下载PDF
Cultural Adaptation in Tim Winton's "Neighbors" 被引量:2
3
作者 曹丽华 《海外英语》 2012年第6X期174-175,共2页
As the most productive and prestigious writer in contemporary Australian literature,Tim Winton is noted not only for his novels but also for his short stories.Neighbors is a case in point.The short story describes the... As the most productive and prestigious writer in contemporary Australian literature,Tim Winton is noted not only for his novels but also for his short stories.Neighbors is a case in point.The short story describes the daily trivial incidents in the multi-cultural background according to the line of a newly-weds moving to a new neighborhood.The young couple gradually understood and communicated with their neighbors and eventually achieved cultural adaptation. 展开更多
关键词 TIM Winton neighbors CULTURAL ADAPTATION
下载PDF
From Culture Shock to Cultural Assimilations in Tim Winton's Neighbors
4
作者 刘恬 杨蕴玉 《海外英语》 2014年第9X期230-231,共2页
Cultural assimilation consists of three stages:frustration and unease,acceptance mixed with interval uncertainty,assimilation.As a prestigious Western Australian,Tim Winton is famous for his novels and short stories.B... Cultural assimilation consists of three stages:frustration and unease,acceptance mixed with interval uncertainty,assimilation.As a prestigious Western Australian,Tim Winton is famous for his novels and short stories.Based on one of his popular short stories Neighbors,this essay aims to point out that a willingness to change and the powerful influence of the surroundings are both critical when one tries to get merged into a new culture. 展开更多
关键词 TIM Winton neighbors CULTURE Shock ASSIMILATION CH
下载PDF
The k Nearest Neighbors Estimator of the M-Regression in Functional Statistics 被引量:4
5
作者 Ahmed Bachir Ibrahim Mufrah Almanjahie Mohammed Kadi Attouch 《Computers, Materials & Continua》 SCIE EI 2020年第12期2049-2064,共16页
It is well known that the nonparametric estimation of the regression function is highly sensitive to the presence of even a small proportion of outliers in the data.To solve the problem of typical observations when th... It is well known that the nonparametric estimation of the regression function is highly sensitive to the presence of even a small proportion of outliers in the data.To solve the problem of typical observations when the covariates of the nonparametric component are functional,the robust estimates for the regression parameter and regression operator are introduced.The main propose of the paper is to consider data-driven methods of selecting the number of neighbors in order to make the proposed processes fully automatic.We use thek Nearest Neighbors procedure(kNN)to construct the kernel estimator of the proposed robust model.Under some regularity conditions,we state consistency results for kNN functional estimators,which are uniform in the number of neighbors(UINN).Furthermore,a simulation study and an empirical application to a real data analysis of octane gasoline predictions are carried out to illustrate the higher predictive performances and the usefulness of the kNN approach. 展开更多
关键词 Functional data analysis quantile regression kNN method uniform nearest neighbor(UNN)consistency functional nonparametric statistics almost complete convergence rate
下载PDF
China and Its Neighbors 被引量:1
6
作者 Dao Shulin Research Professor and Director at Division for South and Southeast Asian Studies, China Institute of Contemporary International Relations. 《Contemporary International Relations》 2002年第2期18-36,共19页
After the September 11 events, America timely took the opportunity of antiterrorism to spread its offensive to Central Asia. In so doing, its intention to push for its policy of "managing " Eurasia has becom... After the September 11 events, America timely took the opportunity of antiterrorism to spread its offensive to Central Asia. In so doing, its intention to push for its policy of "managing " Eurasia has become prominent. Undoubtedly, America’s series of measures ignited changes of the situation in China’s surrounding regions, bringing many negative 展开更多
关键词 In China and Its neighbors ASIA
下载PDF
Intrusion Detection Algorithm Based on Density,Cluster Centers,and Nearest Neighbors 被引量:6
7
作者 Xiujuan Wang Chenxi Zhang Kangfeng Zheng 《China Communications》 SCIE CSCD 2016年第7期24-31,共8页
Intrusion detection aims to detect intrusion behavior and serves as a complement to firewalls.It can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic fire... Intrusion detection aims to detect intrusion behavior and serves as a complement to firewalls.It can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic firewalls.Many intrusion detection methods are processed through machine learning.Previous literature has shown that the performance of an intrusion detection method based on hybrid learning or integration approach is superior to that of single learning technology.However,almost no studies focus on how additional representative and concise features can be extracted to process effective intrusion detection among massive and complicated data.In this paper,a new hybrid learning method is proposed on the basis of features such as density,cluster centers,and nearest neighbors(DCNN).In this algorithm,data is represented by the local density of each sample point and the sum of distances from each sample point to cluster centers and to its nearest neighbor.k-NN classifier is adopted to classify the new feature vectors.Our experiment shows that DCNN,which combines K-means,clustering-based density,and k-NN classifier,is effective in intrusion detection. 展开更多
关键词 聚类中心 基于密度 入侵行为 测算法 入侵检测方法 最近邻 混合学习 分类器
下载PDF
An Adaptive Steganographic Algorithm for Point Geometry Based on Nearest Neighbors Search
8
作者 Yuan-Yu Tsai Chi-Shiang Chan 《Journal of Electronic Science and Technology》 CAS 2012年第3期220-226,共7页
In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between p... In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between points is necessary. Therefore, a nearest neighbors search scheme, considering the local complexity of the processing point, is used to determinate the neighbors for each point in a point geometry. With the constructed virtual connectivity, the secret message can be embedded successfully after the vertex decimation and data embedding processes. The experimental results show that the proposed algorithm can preserve the advantages of previous work, including higher estimation accuracy, high embedding capacity, acceptable model distortion, and robustness against similarity transformation attacks. Most importantly, this work is the first 3D steganographic algorithm for point geometry with adaptation. 展开更多
关键词 ADAPTATION nearest neighbors search point geometry steganography.
下载PDF
China and US Strategic Choices and China’s Relations with Its Neighbors
9
作者 Sun Xuefeng Zhang Xikun 《Contemporary International Relations》 2019年第5期36-46,共11页
Strategic competition between China and the United States has gradually intensified while the relationship between China and neighboring countries has stabilized.The implementation of an " America First"poli... Strategic competition between China and the United States has gradually intensified while the relationship between China and neighboring countries has stabilized.The implementation of an " America First"policy along with a decline in US strategic credibility is prompting China's neighbors to adopt a more cooperative stance toward China.China's positive response to those gestures and its continued strategic reassurance improve China's strategic credibility.Allaying their security concerns lays a foundation for continuous improvement of China's neighboring security environment.It is imperative for China to grasp this opportunity to resolve disputes with its neighbors to ease its rise dilemma. 展开更多
关键词 China's neighboring security STRATEGIC REASSURANCE AMERICA First STRATEGIC CREDIBILITY rise DILEMMA
下载PDF
A NEW DAY FOR OLD NEIGHBORS
10
作者 Wang Fang 《China Report ASEAN》 2019年第4期20-21,共2页
The draft of the Foreign Investment Law was a hot topic of this year’s Two Sessions held in March.The newly-adopted law is an innovation in the legal system on foreign investment and serves as the basic law on foreig... The draft of the Foreign Investment Law was a hot topic of this year’s Two Sessions held in March.The newly-adopted law is an innovation in the legal system on foreign investment and serves as the basic law on foreign investment as China continues to open up in the new era.Thai enterprises were among the first foreign companies to enter China after the introduction of the reform and opening-up policy.On the sidelines of the Two Sessions,China Report ASEAN conducted an exclusive interview with Vithit Powattanasuk,Consul-General of Royal Thai Consulate-General in Chengdu. 展开更多
关键词 neighbors FOREIGN INVESTMENT China continues
下载PDF
China's Relations with Neighbors
11
作者 Zhang Yunling 《Contemporary World》 2022年第3期39-43,共5页
China has a large number of neighboring countries, and its relations with them together with the situation of the neighborhood mean special and important interests for China. Given that, China has put its relations wi... China has a large number of neighboring countries, and its relations with them together with the situation of the neighborhood mean special and important interests for China. Given that, China has put its relations with neighboring countries in the first place in its foreign relations, and has put forward the basic concepts of developing relations with the neighboring countries, such as good neighborliness. 展开更多
关键词 neighboring China neighborHOOD
下载PDF
Neighbors
12
作者 Gohn Sherrill 林纪平 《语言教育》 1994年第2期33-36,共4页
Jiro Ninomiya name to the United States ,from Japan .at the tum of the century and bought a few acres of land just northeast,of SanFrrincisco. There,next to a palm tree,
关键词 NORTHEAST something TOMORROW AFTERNOON GREENHOUSE neighbors things armed EXCLUSION handed
下载PDF
An Analysis of“Outsiders”Identity in Isaac Bashevis Singer's Neighbors
13
作者 张智荣 《海外英语》 2016年第12期182-183,共2页
Singer is a Polish — born Jewish author in Yiddish, awarded the Nobel Prize in Literature in 1978. Although Singer is exposed to the English culture of United States for more than 50 years, he always insists on the m... Singer is a Polish — born Jewish author in Yiddish, awarded the Nobel Prize in Literature in 1978. Although Singer is exposed to the English culture of United States for more than 50 years, he always insists on the mother tongue Yiddish creation.The way in which he writes with the dying language fully expresses his"outsiders"identity in the exotic culture. This thesis aims to analyze the"outsiders"identity revealed in Neighbors from the perspective of Singer's strict adherence to Yiddish and Jews as victims of the history. 展开更多
关键词 SINGER "outsiders" neighbors
下载PDF
Doubts Over Neighbors' Export Gear Up
14
作者 Liu Shuang 《China Textile》 2006年第3期40-42,共3页
Recently, a circular has been is- sued by the Ministry of Com merce to notify the domestictextile exporters not to be engaged in il- legal transit trade. If those practices are founded, there will be severe punishment.
关键词 US EU Export Gear Up Doubts Over neighbors
下载PDF
China’s Efforts to Build a Community with a Shared Future in the Neighborhood from the Perspective of Major-country Competition
15
作者 Zhou Fangyin 《Contemporary World》 2023年第4期12-17,共6页
Since the 18th National Congress of the Communist Party of China,China has proposed and actively acted on the important vision of building a community with a shared future for mankind.In October 2013,President Xi Jinp... Since the 18th National Congress of the Communist Party of China,China has proposed and actively acted on the important vision of building a community with a shared future for mankind.In October 2013,President Xi Jinping put forward that“the building of a community with a shared future should be advanced in China’s neighboring countries”. 展开更多
关键词 neighborHOOD neighboring MAJOR
下载PDF
CIIS Organizes International Symposium to Commemorate China’s Principle in Neighborhood Diplomacy
16
《China International Studies》 2023年第5期F0003-F0003,共1页
On October 24,the International Symposium to Commemorate the10th Anniversary of China's Principle of Amity,Sincerity,Mutual Benefit and Inclusiveness in Neighborhood Diplomacy was held in Beijing.Co-hosted by the ... On October 24,the International Symposium to Commemorate the10th Anniversary of China's Principle of Amity,Sincerity,Mutual Benefit and Inclusiveness in Neighborhood Diplomacy was held in Beijing.Co-hosted by the Office of the Central Commission for Foreign Affairs and the Ministry of Foreign Affairs,and organized by China Institute of International Studies(CIIS),the Symposium was attended by more than200 representatives including political figures from neighboring countries,heads of international and regional organizations,diplomatic envoys of neighboring countries to China and renowned experts and scholars. 展开更多
关键词 neighborHOOD neighboring diplomatic
下载PDF
Close Neighbors Plus Relatives──An unforgettable Trip to the Philippines
17
作者 Wang Fengying 《International Understanding》 1996年第2期13-14,共2页
At the invitation of the.Asian Center of the Philip-pine University,a five-mem-berCAFIU delegation visited the Philippines.The host high-ly regarded our visit,gave us a W arm and courteous recep-tion.Mr.Estrada.
关键词 PLUS An unforgettable Trip to the Philippines Close neighbors Plus Relatives
下载PDF
A Pattern Classification Model for Vowel Data Using Fuzzy Nearest Neighbor
18
作者 Monika Khandelwal Ranjeet Kumar Rout +4 位作者 Saiyed Umer Kshira Sagar Sahoo NZ Jhanjhi Mohammad Shorfuzzaman Mehedi Masud 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3587-3598,共12页
Classification of the patterns is a crucial structure of research and applications. Using fuzzy set theory, classifying the patterns has become of great interest because of its ability to understand the parameters. ... Classification of the patterns is a crucial structure of research and applications. Using fuzzy set theory, classifying the patterns has become of great interest because of its ability to understand the parameters. One of the problemsobserved in the fuzzification of an unknown pattern is that importance is givenonly to the known patterns but not to their features. In contrast, features of thepatterns play an essential role when their respective patterns overlap. In this paper,an optimal fuzzy nearest neighbor model has been introduced in which a fuzzifi-cation process has been carried out for the unknown pattern using k nearest neighbor. With the help of the fuzzification process, the membership matrix has beenformed. In this membership matrix, fuzzification has been carried out of the features of the unknown pattern. Classification results are verified on a completelyllabelled Telugu vowel data set, and the accuracy is compared with the differentmodels and the fuzzy k nearest neighbor algorithm. The proposed model gives84.86% accuracy on 50% training data set and 89.35% accuracy on 80% trainingdata set. The proposed classifier learns well enough with a small amount of training data, resulting in an efficient and faster approach. 展开更多
关键词 Nearest neighbors fuzzy classification patterns recognition reasoning rule membership matrix
下载PDF
Real-Time Data Transmission with Data Carrier Support Value in Neighbor Strategic Collection in WSN
19
作者 S.Ponnarasi T.Rajendran 《Computers, Materials & Continua》 SCIE EI 2023年第6期6039-6057,共19页
An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection.The metho... An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection.The method first discovers the routes between the data sensors and the sink node.Several factors are considered for each sensor node along the route,including energy,number of neighbours,previous transmissions,and energy depletion ratio.Considering all these variables,the Sink Reachable Support Measure and the Secure Communication Support Measure,the method evaluates two distinct measures.The method calculates the data carrier support value using these two metrics.A single route is chosen to collect data based on the value of data carrier support.It has contributed to the design of Secure Communication Support(SCS)Estimation.This has been measured according to the strategy of each hop of the route.The suggested method improves the security and efficacy of data collection in wireless sensor networks.The second stage uses the two-fish approach to build a trust model for secure data transfer.A sim-ulation exercise was conducted to evaluate the effectiveness of the suggested framework.Metrics,including PDR,end-to-end latency,and average residual energy,were assessed for the proposed model.The efficiency of the suggested route design serves as evidence for the average residual energy for the proposed framework. 展开更多
关键词 Data carrier support data collection neighbor strategy secure routing wireless sensor network
下载PDF
The g-Good-Neighbor Connectivity of Some Cartesian Product Graphs 被引量:1
20
作者 Yinkui Li Ting Xie Xiaoxiao Qin 《Open Journal of Discrete Mathematics》 2023年第1期27-37,共11页
The g-good-neighbor connectivity of G is a generalization of the concept of connectivity, which is just for, and an important parameter in measuring the fault tolerance and reliability of interconnection network. Many... The g-good-neighbor connectivity of G is a generalization of the concept of connectivity, which is just for, and an important parameter in measuring the fault tolerance and reliability of interconnection network. Many well-known networks can be constructed by the Cartesian products of some simple graphs. In this paper, we determine the g-good-neighbor connectivity of some Cartesian product graphs. We give the exact value of g-good-neighbor connectivity of the Cartesian product of two complete graphs and for , mesh for , cylindrical grid and torus for . 展开更多
关键词 CONNECTIVITY The g-Good-neighbor Connectivity Cartesian Product
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部