期刊文献+
共找到38,973篇文章
< 1 2 250 >
每页显示 20 50 100
Prediction of Shear Bond Strength of Asphalt Concrete Pavement Using Machine Learning Models and Grid Search Optimization Technique
1
作者 Quynh-Anh Thi Bui Dam Duc Nguyen +2 位作者 Hiep Van Le Indra Prakash Binh Thai Pham 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期691-712,共22页
Determination of Shear Bond strength(SBS)at interlayer of double-layer asphalt concrete is crucial in flexible pavement structures.The study used three Machine Learning(ML)models,including K-Nearest Neighbors(KNN),Ext... Determination of Shear Bond strength(SBS)at interlayer of double-layer asphalt concrete is crucial in flexible pavement structures.The study used three Machine Learning(ML)models,including K-Nearest Neighbors(KNN),Extra Trees(ET),and Light Gradient Boosting Machine(LGBM),to predict SBS based on easily determinable input parameters.Also,the Grid Search technique was employed for hyper-parameter tuning of the ML models,and cross-validation and learning curve analysis were used for training the models.The models were built on a database of 240 experimental results and three input variables:temperature,normal pressure,and tack coat rate.Model validation was performed using three statistical criteria:the coefficient of determination(R2),the Root Mean Square Error(RMSE),and the mean absolute error(MAE).Additionally,SHAP analysis was also used to validate the importance of the input variables in the prediction of the SBS.Results show that these models accurately predict SBS,with LGBM providing outstanding performance.SHAP(Shapley Additive explanation)analysis for LGBM indicates that temperature is the most influential factor on SBS.Consequently,the proposed ML models can quickly and accurately predict SBS between two layers of asphalt concrete,serving practical applications in flexible pavement structure design. 展开更多
关键词 Shear bond asphalt pavement grid search OPTIMIZATION machine learning
下载PDF
中文元搜索工具MetaSearcher的实现
2
作者 常璐 《新世纪图书馆》 CSSCI 2011年第12期49-51,89,共4页
论文讨论当前搜索引擎在检全率、检准率等方面存在的问题,提出一种基于C/S模式的中文元搜索工具MetaSearcher来解决上述问题,重点介绍了该工具的关键技术和排序算法。接着对该元搜索工具进行性能评估,得出该元搜索工具在响应速度和排序... 论文讨论当前搜索引擎在检全率、检准率等方面存在的问题,提出一种基于C/S模式的中文元搜索工具MetaSearcher来解决上述问题,重点介绍了该工具的关键技术和排序算法。接着对该元搜索工具进行性能评估,得出该元搜索工具在响应速度和排序客观性方面比一般搜索引擎具有一定优势的结论。论文同时指出了后续研究方向。 展开更多
关键词 信息检索 元检索工具 元搜索引擎 搜索引擎
下载PDF
Verification of Substring Searches on the Untrusted Cloud
3
作者 Faizal Riaz-ud-Din Robin Doss 《ZTE Communications》 2016年第B06期10-20,共11页
Ensuring the correctness of answers to substring queries has not been a concern for consumers working within the traditional confines of their own organisational infrastructure. This is due to the fact that organisati... Ensuring the correctness of answers to substring queries has not been a concern for consumers working within the traditional confines of their own organisational infrastructure. This is due to the fact that organisations generally trust their handling of their own data hosted on their own servers and networks. With cloud computing however, where both data and processing are delegated to unknown servers, guarantees of the correctness of queries need to be available. The verification of the results of substring searches has not been given much focus to date within the wider scope of data and query, verification. We present a verification scheme for existential substring searc, hes on text files, which is the first of its kind to satisfy the desired properties of authenticity, completeness, and freshness. The scheme is based on suffix arrays, Merkle hash trees and cryptographic hashes to provide strong guarantees of correctness for the consumer, even in fully untrusted environments. We provide a description of our scheme, along with the results of experiments conducted on a fully-working prototype. 展开更多
关键词 substring search query verification CLOUD
下载PDF
On the direct searches for non-smooth stochastic optimization problems
4
作者 Huang Tianyun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期889-898,共10页
Many difficult engineering problems cannot be solved by the conventional optimization techniques in practice. Direct searches that need no recourse to explicit derivatives are revived and become popular since the new ... Many difficult engineering problems cannot be solved by the conventional optimization techniques in practice. Direct searches that need no recourse to explicit derivatives are revived and become popular since the new century. In order to get a deep insight into this field, some notes on the direct searches for non-smooth optimization problems are made. The global convergence vs. local convergence and their influences on expected solutions for simulation-based stochastic optimization are pointed out. The sufficient and simple decrease criteria for step acceptance are analyzed, and why simple decrease is enough for globalization in direct searches is identified. The reason to introduce the positive spanning set and its usage in direct searches is explained. Other topics such as the generalization of direct searches to bound, linear and non-linear constraints are also briefly discussed. 展开更多
关键词 non-linear programming non-smooth optimization stochastic simulation direct searches positive spanning set convergence analysis pattern selection.
下载PDF
Computational Studies on Detecting a Diffusing Target in a Square Region by a Stationary or Moving Searcher
5
作者 Hongyun Wang Hong Zhou 《American Journal of Operations Research》 2015年第2期47-68,共22页
In this paper, we compute the non-detection probability of a randomly moving target by a stationary or moving searcher in a square search region. We find that when the searcher is stationary, the decay rate of the non... In this paper, we compute the non-detection probability of a randomly moving target by a stationary or moving searcher in a square search region. We find that when the searcher is stationary, the decay rate of the non-detection probability achieves the maximum value when the searcher is fixed at the center of the square search region;when both the searcher and the target diffuse with significant diffusion coefficients, the decay rate of the non-detection probability only depends on the sum of the diffusion coefficients of the target and searcher. When the searcher moves along prescribed deterministic tracks, our study shows that the fastest decay of the non-detection probability is achieved when the searcher scans horizontally and vertically. 展开更多
关键词 Diffusing TARGET Non-Detection PROBABILITY search Theory Optimal search Path
下载PDF
Evolutionary Neural Architecture Search and Its Applications in Healthcare 被引量:1
6
作者 Xin Liu Jie Li +3 位作者 Jianwei Zhao Bin Cao Rongge Yan Zhihan Lyu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期143-185,共43页
Most of the neural network architectures are based on human experience,which requires a long and tedious trial-and-error process.Neural architecture search(NAS)attempts to detect effective architectures without human ... Most of the neural network architectures are based on human experience,which requires a long and tedious trial-and-error process.Neural architecture search(NAS)attempts to detect effective architectures without human intervention.Evolutionary algorithms(EAs)for NAS can find better solutions than human-designed architectures by exploring a large search space for possible architectures.Using multiobjective EAs for NAS,optimal neural architectures that meet various performance criteria can be explored and discovered efficiently.Furthermore,hardware-accelerated NAS methods can improve the efficiency of the NAS.While existing reviews have mainly focused on different strategies to complete NAS,a few studies have explored the use of EAs for NAS.In this paper,we summarize and explore the use of EAs for NAS,as well as large-scale multiobjective optimization strategies and hardware-accelerated NAS methods.NAS performs well in healthcare applications,such as medical image analysis,classification of disease diagnosis,and health monitoring.EAs for NAS can automate the search process and optimize multiple objectives simultaneously in a given healthcare task.Deep neural network has been successfully used in healthcare,but it lacks interpretability.Medical data is highly sensitive,and privacy leaks are frequently reported in the healthcare industry.To solve these problems,in healthcare,we propose an interpretable neuroevolution framework based on federated learning to address search efficiency and privacy protection.Moreover,we also point out future research directions for evolutionary NAS.Overall,for researchers who want to use EAs to optimize NNs in healthcare,we analyze the advantages and disadvantages of doing so to provide detailed guidance,and propose an interpretable privacy-preserving framework for healthcare applications. 展开更多
关键词 Neural architecture search evolutionary computation large-scale multiobjective optimization distributed parallelism healthcare
下载PDF
Cooperative UAV search strategy based on DMPC-AACO algorithm in restricted communication scenarios 被引量:1
7
作者 Shiyuan Chai Zhen Yang +3 位作者 Jichuan Huang Xiaoyang Li Yiyang Zhao Deyun Zhou 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期295-311,共17页
Improvement of integrated battlefield situational awareness in complex environments involving dynamic factors such as restricted communications and electromagnetic interference(EMI)has become a contentious research pr... Improvement of integrated battlefield situational awareness in complex environments involving dynamic factors such as restricted communications and electromagnetic interference(EMI)has become a contentious research problem.In certain mission environments,due to the impact of many interference sources on real-time communication or mission requirements such as the need to implement communication regulations,the mission stages are represented as a dynamic combination of several communication-available and communication-unavailable stages.Furthermore,the data interaction between unmanned aerial vehicles(UAVs)can only be performed in specific communication-available stages.Traditional cooperative search algorithms cannot handle such situations well.To solve this problem,this study constructed a distributed model predictive control(DMPC)architecture for a collaborative control of UAVs and used the Voronoi diagram generation method to re-plan the search areas of all UAVs in real time to avoid repetition of search areas and UAV collisions while improving the search efficiency and safety factor.An attention mechanism ant-colony optimization(AACO)algorithm is proposed for UAV search-control decision planning.The search strategy is adaptively updated by introducing an attention mechanism for regular instruction information,a priori information,and emergent information of the mission to satisfy different search expectations to the maximum extent.Simulation results show that the proposed algorithm achieves better search performance than traditional algorithms in restricted communication constraint scenarios. 展开更多
关键词 Unmanned aerial vehicles(UAV) Cooperative search Restricted communication Mission planning DMPC-AACO
下载PDF
Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography
8
作者 Yangyang Wang Rongrong Ni +1 位作者 Yao Zhao Min Xian 《Computers, Materials & Continua》 SCIE EI 2018年第5期255-265,共11页
In this paper,two methods are proposed to embed visual watermark into direct binary search(DBS)halftone images,which are called Adjusted Direct Binary Search(ADBS)and Dual Adjusted Direct Binary Search(DADBS).DADBS is... In this paper,two methods are proposed to embed visual watermark into direct binary search(DBS)halftone images,which are called Adjusted Direct Binary Search(ADBS)and Dual Adjusted Direct Binary Search(DADBS).DADBS is an improved version of ADBS.By using the proposed methods,the visual watermark will be embedded into two halftone images separately,thus,the watermark can be revealed when these two halftone images are overlaid.Experimental results show that both methods can achieve excellent image visual quality and decoded visual patterns. 展开更多
关键词 Data hiding HALFTONE direct binary search visual watermark.
下载PDF
基于ElasticSearch的医疗数据检索系统的设计与实现 被引量:1
9
作者 汪睿 胡外光 +1 位作者 胡珊珊 周颖 《信息技术》 2024年第4期76-82,共7页
随着医疗技术的发展,医疗业务场景越加复杂,由此产生的医疗数据也越来越多,其来源复杂,结构多变,信息冗余,数据不完整。这些特性使得系统在进行检索时,无法快速、有效、精确地查询数据。为了解决这个问题,设计并实现了基于ElasticSearc... 随着医疗技术的发展,医疗业务场景越加复杂,由此产生的医疗数据也越来越多,其来源复杂,结构多变,信息冗余,数据不完整。这些特性使得系统在进行检索时,无法快速、有效、精确地查询数据。为了解决这个问题,设计并实现了基于ElasticSearch的医疗数据检索系统。该系统将医疗数据进行标准化,填补缺失值,选取合适的分词算法进行分词,将处理后的数据存入ElasticSearch中,同时使用SpringBoot构建系统应用,消耗多个医疗基础业务系统产生的数据,最终形成统一的医疗数据检索系统,给用户提供便捷、精确的查询服务。 展开更多
关键词 lasticsearch 医疗数据 文本分词 全文检索 分布式搜索
下载PDF
Information searches by consumers of miniature automobiles
10
作者 陈道平 《Journal of Chongqing University》 CAS 2008年第1期58-68,共11页
We studied the information search behaviors of Chinese consumers of miniature automobiles. First, we identified the main sources where consumers acquire or seek information about miniature automobiles and discussed th... We studied the information search behaviors of Chinese consumers of miniature automobiles. First, we identified the main sources where consumers acquire or seek information about miniature automobiles and discussed their extent of information search. Then, based on logistic regression and optimal scaling regression of statistics, we studied the influences of characteristics of consumers of miniature automobiles on the extent of information search and on Internet usage. The results indicate that consumers often utilize four sources to obtain information about miniature automobiles. The dominant information source for consumers is their friends/family, followed by dealers, newspapers, and TV. Age, occupation, education and income significantly affect the extent of information search, but gender and city of residence do not have significant impacts. Age, city of residence, occupation, education and income produce significant influences on Internet usage. Gender has an insignificant influence on whether a consumer uses the Internet to search for information. 展开更多
关键词 information retrieval consumers of miniature automobiles information search optimal scaling regression
下载PDF
Chinese Film Searches for Its “Missing Gun”
11
《China Today》 2002年第8期68-69,共2页
THE ceremonious premiere was recently held of a Chinese film whose theme is the grim search by a policeman in a small town for his missing gun. The film is the maiden work of a young director. It starred Jiang Wen, cur-
关键词 ICI CHINESE Missing Gun searches for Its HIC
下载PDF
An Exploratory Data Analysis of Mazu Culture Research Based on Diaolong-Full-Text Database of Ancient Chinese and Japanese Books
12
作者 QIN Yeqi YU Hongyan 《Cultural and Religious Studies》 2023年第6期286-296,共11页
Mazu is the most famous goddess of canal transport in China,and one of the three folk beliefs in China.Japan is our neighbor across the sea.As early as 1000 years ago,Japan was influenced by the Mazu ceremonial cultur... Mazu is the most famous goddess of canal transport in China,and one of the three folk beliefs in China.Japan is our neighbor across the sea.As early as 1000 years ago,Japan was influenced by the Mazu ceremonial culture.Through big data analysis,this study conducted database counting,screening,and analysis on the Mazu culture in Diaolong,the full-text database of Chinese and Japanese ancient books.Besides,it explored the hot topics of concern and emotional attitudes,and then analyzed the important role of Mazu culture in the cultural exchange and mutual learning between China and Japan in the new era,with a view to completing the contemporary task of“people-to-people bond”and achieving common development. 展开更多
关键词 Mazu culture JAPAN Diaolong—full-text database of ancient Chinese and Japanese books
下载PDF
Influences of digital resource acquisition on scientific research behaviors——The statistical analysis on the full-text downloading quantity and cited times
13
作者 LIU Xiaomin ZHANG Jianyong 《Chinese Journal of Library and Information Science》 2009年第4期71-78,共8页
With the emergence and further development of the digital library, the approaches of information acquisition correspondingly change a lot. This paper makes a statistical analysis on the journal downloading and citatio... With the emergence and further development of the digital library, the approaches of information acquisition correspondingly change a lot. This paper makes a statistical analysis on the journal downloading and citation behaviors under the digital environment conceived by the National Science Library(NSL), Chinese Academy of Sciences(CAS). It can be seen that the development of digital resources has influenced scientific research behaviors. For example, the large quantity of full-text downloading will maintain; the trend of journal downloading behaviors is basically same as the journal citation behavior; journals with large quantity of full-text downloading also boast the high cited times, and vice versa. Furthermore, authors make a linear regression analysis, with the journal downloading amount as the independent variable and journal cited times as dependent variable. Then they also prove the positive correlation between the journal downloading and citation behaviors by means of Pearson's correlation coefficient formula. 展开更多
关键词 full-text downloading Journal citation Correlation Cited times
下载PDF
Optimal search path planning of UUV in battlefeld ambush scene
14
作者 Wei Feng Yan Ma +3 位作者 Heng Li Haixiao Liu Xiangyao Meng Mo Zhou 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期541-552,共12页
Aiming at the practical application of Unmanned Underwater Vehicle(UUV)in underwater combat,this paper proposes a battlefield ambush scene with UUV considering ocean current.Firstly,by establishing these mathematical ... Aiming at the practical application of Unmanned Underwater Vehicle(UUV)in underwater combat,this paper proposes a battlefield ambush scene with UUV considering ocean current.Firstly,by establishing these mathematical models of ocean current environment,target movement,and sonar detection,the probability calculation methods of single UUV searching target and multiple UUV cooperatively searching target are given respectively.Then,based on the Hybrid Quantum-behaved Particle Swarm Optimization(HQPSO)algorithm,the path with the highest target search probability is found.Finally,through simulation calculations,the influence of different UUV parameters and target parameters on the target search probability is analyzed,and the minimum number of UUVs that need to be deployed to complete the ambush task is demonstrated,and the optimal search path scheme is obtained.The method proposed in this paper provides a theoretical basis for the practical application of UUV in the future combat. 展开更多
关键词 Battlefield ambush Optimal search path planning UUV path Planning Probability of cooperative search
下载PDF
Enhanced Differentiable Architecture Search Based on Asymptotic Regularization
15
作者 Cong Jin Jinjie Huang +1 位作者 Yuanjian Chen Yuqing Gong 《Computers, Materials & Continua》 SCIE EI 2024年第2期1547-1568,共22页
In differentiable search architecture search methods,a more efficient search space design can significantly improve the performance of the searched architecture,thus requiring people to carefully define the search spa... In differentiable search architecture search methods,a more efficient search space design can significantly improve the performance of the searched architecture,thus requiring people to carefully define the search space with different complexity according to various operations.Meanwhile rationalizing the search strategies to explore the well-defined search space will further improve the speed and efficiency of architecture search.With this in mind,we propose a faster and more efficient differentiable architecture search method,AllegroNAS.Firstly,we introduce a more efficient search space enriched by the introduction of two redefined convolution modules.Secondly,we utilize a more efficient architectural parameter regularization method,mitigating the overfitting problem during the search process and reducing the error brought about by gradient approximation.Meanwhile,we introduce a natural exponential cosine annealing method to make the learning rate of the neural network training process more suitable for the search procedure.Moreover,group convolution and data augmentation are employed to reduce the computational cost.Finally,through extensive experiments on several public datasets,we demonstrate that our method can more swiftly search for better-performing neural network architectures in a more efficient search space,thus validating the effectiveness of our approach. 展开更多
关键词 Differentiable architecture search allegro search space asymptotic regularization natural exponential cosine annealing
下载PDF
Bridge Bidding via Deep Reinforcement Learning and Belief Monte Carlo Search
16
作者 Zizhang Qiu Shouguang Wang +1 位作者 Dan You MengChu Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2111-2122,共12页
Contract Bridge,a four-player imperfect information game,comprises two phases:bidding and playing.While computer programs excel at playing,bidding presents a challenging aspect due to the need for information exchange... Contract Bridge,a four-player imperfect information game,comprises two phases:bidding and playing.While computer programs excel at playing,bidding presents a challenging aspect due to the need for information exchange with partners and interference with communication of opponents.In this work,we introduce a Bridge bidding agent that combines supervised learning,deep reinforcement learning via self-play,and a test-time search approach.Our experiments demonstrate that our agent outperforms WBridge5,a highly regarded computer Bridge software that has won multiple world championships,by a performance of 0.98 IMPs(international match points)per deal over 10000 deals,with a much cost-effective approach.The performance significantly surpasses previous state-of-the-art(0.85 IMPs per deal).Note 0.1 IMPs per deal is a significant improvement in Bridge bidding. 展开更多
关键词 Contract Bridge reinforcement learning search
下载PDF
Status and Perspectives of Dark Matter Searches in China
17
作者 Chang Jin 《空间科学学报》 CAS CSCD 北大核心 2010年第5期422-423,共2页
In this paper,we give a review of direct detection searches reported by the DAMA(China as a Co-Ⅰ),and indirect detection searches reported by the ATIC(China as a Co-Ⅰ).We also outline the future plans of dark matter... In this paper,we give a review of direct detection searches reported by the DAMA(China as a Co-Ⅰ),and indirect detection searches reported by the ATIC(China as a Co-Ⅰ).We also outline the future plans of dark matter search in China. 展开更多
关键词 中国搜索 暗物质 展望 检测报告 按需分配
下载PDF
A Lightweight, Searchable, and Controllable EMR Sharing Scheme
18
作者 Xiaohui Yang Peiyin Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第4期1521-1538,共18页
Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer fromprivacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR ... Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer fromprivacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR sharingscheme, which employs a large attribute domain and a linear secret sharing structure (LSSS), the computationaloverhead of encryption and decryption reaches a lightweight constant level, and supports keyword search andpolicy hiding, which improves the high efficiency of medical data sharing. The dynamic accumulator technologyis utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the datato achieve controllability of the data. Meanwhile, the data is re-encrypted by Intel Software Guard Extensions(SGX) technology to realize resistance to offline dictionary guessing attacks. In addition, blockchain technology isutilized to achieve credible accountability for abnormal behaviors in the sharing process. The experiments reflectthe obvious advantages of the scheme in terms of encryption and decryption computation overhead and storageoverhead, and theoretically prove the security and controllability in the sharing process, providing a feasible solutionfor the safe and efficient sharing of EMR. 展开更多
关键词 LIGHTWEIGHT keyword search large attribute domain CONTROLLABILITY blockchain
下载PDF
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
19
作者 Bin Wu Xianyi Chen +5 位作者 Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei 《Computers, Materials & Continua》 SCIE EI 2024年第3期3177-3194,共18页
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on... In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers.Servers on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure state.The issue of privacy data protection has become an important obstacle to data sharing and usage.How to query outsourcing graph data safely and effectively has become the focus of research.Adjacency query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same time.This work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a solution.In our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud server.Our proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental analysis.The research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology. 展开更多
关键词 PRIVACY-PRESERVING adjacency query multi-keyword fuzzy search encrypted graph
下载PDF
Spatial search weighting information contained in cell velocity distribution
20
作者 马一凯 李娜 陈唯 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期522-528,共7页
Cell migration plays a significant role in physiological and pathological processes.Understanding the characteristics of cell movement is crucial for comprehending biological processes such as cell functionality,cell ... Cell migration plays a significant role in physiological and pathological processes.Understanding the characteristics of cell movement is crucial for comprehending biological processes such as cell functionality,cell migration,and cell–cell interactions.One of the fundamental characteristics of cell movement is the specific distribution of cell speed,containing valuable information that still requires comprehensive understanding.This article investigates the distribution of mean velocities along cell trajectories,with a focus on optimizing the efficiency of cell food search in the context of the entire colony.We confirm that the specific velocity distribution in the experiments corresponds to an optimal search efficiency when spatial weighting is considered.The simulation results indicate that the distribution of average velocity does not align with the optimal search efficiency when employing average spatial weighting.However,when considering the distribution of central spatial weighting,the specific velocity distribution in the experiment is shown to correspond to the optimal search efficiency.Our simulations reveal that for any given distribution of average velocity,a specific central spatial weighting can be identified among the possible central spatial weighting that aligns with the optimal search strategy.Additionally,our work presents a method for determining the spatial weights embedded in the velocity distribution of cell movement.Our results have provided new avenues for further investigation of significant topics,such as relationship between cell behavior and environmental conditions throughout their evolutionary history,and how cells achieve collective cooperation through cell-cell communication. 展开更多
关键词 cell migration foraging efficiency random walk spatial search weight
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部