期刊文献+
共找到435篇文章
< 1 2 22 >
每页显示 20 50 100
Exploiting a No-Regret Opponent in Repeated Zero-Sum Games
1
作者 LI Kai HUANG Wenhan +1 位作者 LI Chenchen DENG Xiaotie 《Journal of Shanghai Jiaotong university(Science)》 2025年第2期385-398,共14页
In repeated zero-sum games,instead of constantly playing an equilibrium strategy of the stage game,learning to exploit the opponent given historical interactions could typically obtain a higher utility.However,when pl... In repeated zero-sum games,instead of constantly playing an equilibrium strategy of the stage game,learning to exploit the opponent given historical interactions could typically obtain a higher utility.However,when playing against a fully adaptive opponent,one would have dificulty identifying the opponent's adaptive dynamics and further exploiting its potential weakness.In this paper,we study the problem of optimizing against the adaptive opponent who uses no-regret learning.No-regret learning is a classic and widely-used branch of adaptive learning algorithms.We propose a general framework for online modeling no-regret opponents and exploiting their weakness.With this framework,one could approximate the opponent's no-regret learning dynamics and then develop a response plan to obtain a significant profit based on the inferences of the opponent's strategies.We employ two system identification architectures,including the recurrent neural network(RNN)and the nonlinear autoregressive exogenous model,and adopt an efficient greedy response plan within the framework.Theoretically,we prove the approximation capability of our RNN architecture at approximating specific no-regret dynamics.Empirically,we demonstrate that during interactions at a low level of non-stationarity,our architectures could approximate the dynamics with a low error,and the derived policies could exploit the no-regret opponent to obtain a decent utility. 展开更多
关键词 no-regret learning repeated game opponent exploitation opponent modeling dynamical system system identification recurrent neural network(RNN)
原文传递
Data-driven Discovery: A New Era of Exploiting the Literature and Data 被引量:6
2
作者 Ying Ding Kyle Stirling 《Journal of Data and Information Science》 2016年第4期1-9,共9页
In the current data-intensive era, the traditional hands-on method of conducting scientific research by exploring related publications to generate a testable hypothesis is well on its way of becoming obsolete within j... In the current data-intensive era, the traditional hands-on method of conducting scientific research by exploring related publications to generate a testable hypothesis is well on its way of becoming obsolete within just a year or two. Analyzing the literature and data to automatically generate a hypothesis might become the de facto approach to inform the core research efforts of those trying to master the exponentially rapid expansion of publications and datasets. Here, viewpoints are provided and discussed to help the understanding of challenges of data-driven discovery. 展开更多
关键词 A New Era of exploiting the Literature and Data Data-driven Discovery
在线阅读 下载PDF
Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction 被引量:1
3
作者 Jiin-Chiou Cheng Wen-Chung Kuo Bo-Rong Su 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第2期123-128,共6页
Division arithmetic and generalized exploiting modification direction (DA-GEMD) method has perfect efficiency in data-hiding. However, there exist some weaknesses in DA-GEMD. Because the benchmarks are their median ... Division arithmetic and generalized exploiting modification direction (DA-GEMD) method has perfect efficiency in data-hiding. However, there exist some weaknesses in DA-GEMD. Because the benchmarks are their median of nine pixels in each block of cover-image, it will give a hint for the attacker to hack the stego-image. In the paper, we utilize the Sudoku table to randomize the benchmark for each 3×3 block of cover-image. It will mix up the pixels in each image block and prevent the secret information from being extracted. The proposed method still keeps the original efficiency as DA-GEMD while promoting the security for data-hiding. 展开更多
关键词 Cover-image division arithmetic and generalized exploiting modification direction(DAGEMD) STEGO-IMAGE SUDOKU
在线阅读 下载PDF
Economic value and exploiting approaches of sea asparagus, a seawater-irrigated vegetable 被引量:1
4
作者 Litian Feng Bin Ji Bin Su 《Agricultural Sciences》 2013年第9期40-44,共5页
Sea asparagus is a newly emerging seawater-irrigated vegetable. Firstly, the economic value of sea asparagus was introduced, and then, someexploiting approaches of sea asparagus werefully reviewed. The exploiting appr... Sea asparagus is a newly emerging seawater-irrigated vegetable. Firstly, the economic value of sea asparagus was introduced, and then, someexploiting approaches of sea asparagus werefully reviewed. The exploiting approaches mainly include fresh vegetable, pickle, bio-salt, health-care products, animal feed, vegetable oil, bio-diesel and skin-care products. 展开更多
关键词 Sea ASPARAGUS Seawater-Irrigated VEGETABLE ECONOMIC Value exploiting APPROACHES Bio-Salt
在线阅读 下载PDF
Ultra-Low Power Pipeline Structure Exploiting Noncritical Stage with Circuit-Level Timing Speculation
5
作者 Tao Luo Ya-Juan He +2 位作者 Ping Luo Yan-Ming He Feng Hu 《Journal of Electronic Science and Technology》 CAS 2013年第3期301-305,共5页
With the increase of the clock frequency and silicon integration, power aware computing has become a critical concern in the design of the embedded processor and system-on-chip (SoC). Dynamic voltage scaling (DVS)... With the increase of the clock frequency and silicon integration, power aware computing has become a critical concern in the design of the embedded processor and system-on-chip (SoC). Dynamic voltage scaling (DVS) is an effective method for low-power designs. However, traditional DVS methods have two deficiencies. First, they have a conservative safety margin which is not necessary for most of the time. Second, they are exclusively concerned with the critical stage and ignore the significant potential free slack time of the noncritical stage. These factors lead to a large amount of power waste. In this paper, a novel pipeline structure with ultra-low power consumption is proposed. It cuts off the safety margin and takes use of the noncritical stages at the same time. A prototype pipeline is designed in 0.13 μm technology and analyzed. The result shows that a large amount of energy can be saved by using this structure. Compared with the fixed voltage case, 50% of the energy can be saved, and with respect to the traditional adaptive voltage scaling design, 37.8% of the energy can be saved. 展开更多
关键词 Index Terms---Adaptive circuits dynamic voltagescaling exploiting noncritical stage ultra-low power.
在线阅读 下载PDF
Exploring and exploiting unique properties of the hippocampal dentate gyrus for post-stroke therapy:astrocytes link ischemic resistance with neurogenic potential
6
作者 Creed M.Stary 《Neural Regeneration Research》 SCIE CAS CSCD 2016年第11期1756-1757,共2页
Acute cerebral ischemia can occur secondary to embolism, cardiac arrest, hemorrhage, traumatic brain injury, edema, vascular compression, or any physiologic condition resulting in low cardiac output state. Survivors o... Acute cerebral ischemia can occur secondary to embolism, cardiac arrest, hemorrhage, traumatic brain injury, edema, vascular compression, or any physiologic condition resulting in low cardiac output state. Survivors of cerebral ischemic events frequently suffer from profound disability, 展开更多
关键词 Exploring and exploiting unique properties of the hippocampal dentate gyrus for post-stroke therapy VDAC
暂未订购
Yinan County Animal Husbandry Exploiting Corporation
7
作者 Yu Po Yang Jindong 《China's Foreign Trade》 1995年第3期21-21,共1页
The Yinan County Animal Husbandry Exploiting Corporation in Shandong Province is an enterprise established with a World Bank loan and domestic supplementary funds. With a total investment of RMB32.63 million, the comp... The Yinan County Animal Husbandry Exploiting Corporation in Shandong Province is an enterprise established with a World Bank loan and domestic supplementary funds. With a total investment of RMB32.63 million, the company includes a breeder 展开更多
关键词 World BANK Yinan County Animal Husbandry exploiting Corporation
在线阅读 下载PDF
REMOTE SENSING APPLICATION RESEARCH OF WATER POWER AT THE INITIAL EXPLOITING STAGE IN THE LOWER REACHES OF YALONG RIVER
8
作者 Lin Hengzhang, Xu Gengqin (Institute of Remote Sensing Appilcations, Academia Sinica) He Jianbang (National Lab of Resources and Environment Information System) 《遥感信息》 CSCD 1990年第A02期21-22,共2页
There are abundant water power resources in the Yalong River which are suitable for the large hydroelectric engineering. But a reliability study should be made for the valley which liable to frequent earthquakes. The ... There are abundant water power resources in the Yalong River which are suitable for the large hydroelectric engineering. But a reliability study should be made for the valley which liable to frequent earthquakes. The color infrared aerophotos, multi-spectral photography and thermal infrared scanning had been specially done besides MSS image, processing. Researches on remote sensing applications to engineering geology, hydrogeology, deformation of neo-tectonics, Iandslide, mud-rock flow, ecological environment and geographical information system had been carried out by more than 20 research units. 展开更多
关键词 REMOTE SENSING APPLICATION RESEARCH OF WATER POWER AT THE INITIAL exploiting STAGE IN THE LOWER REACHES OF YALONG RIVER AT
在线阅读 下载PDF
Driving Chinese Televisions Out of Europe and Exploiting China's Market Philips Seizes All the Advantages
9
《China's Foreign Trade》 2000年第5期18-18,共1页
关键词 Driving Chinese Televisions Out of Europe and exploiting China’s Market Philips Seizes All the Advantages
在线阅读 下载PDF
Analysis of the influence of exploiting water closing to the river on the regional environment in northern suburb water resource of Zhengzhou
10
《Global Geology》 1998年第1期104-104,共1页
关键词 Analysis of the influence of exploiting water closing to the river on the regional environment in northern suburb water resource of Zhengzhou
在线阅读 下载PDF
Environmental issues and countermeasures in exploiting water resources of rivers
11
作者 周厚贵 《Journal of Chongqing University》 CAS 2006年第2期111-114,共4页
Based on affirming the tremendous benefits that water resources of rivers can provide in their exploitation, main environmental problems and their countermeasures have been proposed and analyzed in this paper. It is a... Based on affirming the tremendous benefits that water resources of rivers can provide in their exploitation, main environmental problems and their countermeasures have been proposed and analyzed in this paper. It is argued that multiple measures should be applied to solving those problems by simultaneously carrying out engineering measures, scientific research and also programs to cultivate the society’s awareness, aimed at a sustainable development strategy for exploiting water resources. 展开更多
关键词 water resources exploitation environment protection measures sustainable development
在线阅读 下载PDF
EXPLOITING VIDEO FILMS FOR EFL TEACHING PURPOSES 被引量:4
12
作者 Lin Shuchun Hebei University,Baoding 《Chinese Journal of Applied Linguistics》 1999年第1期63-68,共6页
Using video films can be a very effective way of teaching and learning English only when the films areproperly selected and some activities are organized around them.This paper offers the criteria forchoosing films an... Using video films can be a very effective way of teaching and learning English only when the films areproperly selected and some activities are organized around them.This paper offers the criteria forchoosing films and suggests some activities for a variety of language teaching purposes.As video units and video films in English are now more easily available,the use of video films has becomean increasingly important component of teaching English as a foreign language.Here I use the term"video film"in a loose sense to mean"feature film on video".In recent years,textbooks have appeared inChina,such as English Through Films(Wu Qing,Yang Limin 1993)and English and American 展开更多
关键词 EFL exploiting VIDEO FILMS FOR EFL TEACHING PURPOSES
原文传递
Geminivirus-associated betasatellites: exploiting chinks in the antiviral arsenal of plants
13
《Science Foundation in China》 CAS 2019年第2期50-50,共1页
With the support of the National Natural Science Foundation of China,the research team led by Prof.Zhou XuePing(周雪平)at the State Key Laboratory for Biology of Plant Diseases and Insect Pests,Institute of Plant Prot... With the support of the National Natural Science Foundation of China,the research team led by Prof.Zhou XuePing(周雪平)at the State Key Laboratory for Biology of Plant Diseases and Insect Pests,Institute of Plant Protection,Chinese Academy of Agricultural Sciences,revealed the counter-defensive strategies deployed by geminivirus-associated betasatellites to overcome the antiviral arsenal of plants,which has been published in Trends in Plant Science(2019,http://doi.org/10/1016/j.tplants.2019.03.010). 展开更多
关键词 Geminivirus-associated betasatellites exploiting chinks in the ANTIVIRAL arsenal of PLANTS
原文传递
EXPLOITING A READING TEXT FOR INTEGRATED SKILLS ACTIVITIES
14
作者 Li Qinghong Guiyang University 《Chinese Journal of Applied Linguistics》 1996年第1期53-55,共3页
Introduction‘Integrated skills is when the main language skills are practised in conjunction with each other.(Willis,1981)In EFL teaching in China,most teachers believe that skills should be practised in isolation in... Introduction‘Integrated skills is when the main language skills are practised in conjunction with each other.(Willis,1981)In EFL teaching in China,most teachers believe that skills should be practised in isolation in theclassroom.That is,in a reading lesson,special attention is paid only to reading.Lessons generallyfollow the same pattern going through the new words;reading the text aloud paragraph by paragraph;explaining difficult points(especially the grammatical items);asking comprehension questions;andfinally doing the exercises after the text.In such a reading lesson,even the reading skill itself is notpractised,let alone other skills.What is more,both teacher and students find this kind of teachingdull and de-motivating. 展开更多
关键词 EFL exploiting A READING TEXT FOR INTEGRATED SKILLS ACTIVITIES
原文传递
EXPLOITING THE LANGUAGE LAB: A WAY TO FIT LAB-BASED LISTENING COURSES INTO THE COMMUNICATIVE FRAMEWORK
15
作者 Zhang Xu Beijing Normal University, Beijing 《Chinese Journal of Applied Linguistics》 1998年第1期124-130,共7页
This paperlanalyzes why the language laboratory still has an important role to play in ELT in China. Two methods of incorporating lab-based courses into a communicative framework, involving classroom interaction patte... This paperlanalyzes why the language laboratory still has an important role to play in ELT in China. Two methods of incorporating lab-based courses into a communicative framework, involving classroom interaction patterns and task-based listening materials, are suggested, and a model lesson applying these two methods is presented. 展开更多
关键词 A WAY TO FIT LAB-BASED LISTENING COURSES INTO THE COMMUNICATIVE FRAMEWORK exploiting THE LANGUAGE LAB
原文传递
Rapid species identification of pathogenic bacteria from a minute quantity exploiting three-dimensional quantitative phase imaging and artificial neural network 被引量:3
16
作者 Geon Kim Daewoong Ahn +14 位作者 Minhee Kang Jinho Park DongHun Ryu YoungJu Jo Jinyeop Song Jea Sung Ryu Gunho Choi Hyun Jung Chung Kyuseok Kim Doo Ryeon Chung In Young Yoo Hee Jae Huh Hyun-seok Min Nam Yong Lee YongKeun Park 《Light: Science & Applications》 SCIE EI CAS CSCD 2022年第7期1595-1606,共12页
The healthcare industry is in dire need of rapid microbial identification techniques for treating microbial infections.Microbial infections are a major healthcare issue worldwide,as these widespread diseases often dev... The healthcare industry is in dire need of rapid microbial identification techniques for treating microbial infections.Microbial infections are a major healthcare issue worldwide,as these widespread diseases often develop into deadly symptoms.While studies have shown that an early appropriate antibiotic treatment significantly reduces the mortality of an infection,this effective treatment is difficult to practice.The main obstacle to early appropriate antibiotic treatments is the long turnaround time of the routine microbial identification,which includes time-consuming sample growth.Here,we propose a microscopy-based framework that identifies the pathogen from single to few cells.Our framework obtains and exploits the morphology of the limited sample by incorporating three-dimensional quantitative phase imaging and an artificial neural network.We demonstrate the identification of 19 bacterial species that cause bloodstream infections,achieving an accuracy of 82.5%from an individual bacterial cell or cluster.This performance,comparable to that of the gold standard mass spectroscopy under a sufficient amount of sample,underpins the effectiveness of our framework in clinical applications.Furthermore,our accuracy increases with multiple measurements,reaching 99.9%with seven different measurements of cells or clusters.We believe that our framework can serve as a beneficial advisory tool for clinicians during the initial treatment of infections. 展开更多
关键词 artificial NEURAL EXPLOIT
原文传递
Biochemical sensing exploiting plasmonic sensors based on gold nanogratings and polymer optical fibers 被引量:2
17
作者 FRANCESCO ARCADIO LUIGI ZENI +7 位作者 DOMENICO MONTEMURRO CATERINA ERAMO STEFANIA DI RONZA CHIARA PERRI GIROLAMO D’AGOSTINO GUIDO CHIARETTI GIOVANNI PORTO NUNZIO CENNAMO 《Photonics Research》 SCIE EI CAS CSCD 2021年第7期1397-1408,共12页
In this work,we present a novel biochemical sensing approach based on a plasmonic sensor chip,combined with a specific receptor,excited and interrogated via a custom 3D-printed holder through a transmission-based expe... In this work,we present a novel biochemical sensing approach based on a plasmonic sensor chip,combined with a specific receptor,excited and interrogated via a custom 3D-printed holder through a transmission-based experimental setup,exploiting polymer optical fibers. The setup is designed to measure a disposable plasmonic chip based on a gold nanograting fabricated on a polymethylmethacrylate substrate. The examined sensor configurations here presented are simulated,realized,and experimentally tested. More specifically,first,a numerical analysis is carried out by changing several sensor parameters,then an experimental optical characterization of different sensor configurations is reported. Finally,to test the biosensing capabilities of the proposed method,as a proof of concept,we deposit on the best sensor configuration a biomimetic receptor specific for bovine serum albumin detection. The experimental results demonstrate that the proposed sensor shows an ultra-low limit of detection,equal to about 37 pmol/L. 展开更多
关键词 EXPLOIT optical POLYMER
原文传递
Investigation and Analysis of Chinese Enterprises Exploiting Forest Resources in Russia
18
作者 HU Yanjie Research Institute of Forestry Policy and Information, Chinese Academy of Forestry, Beijing 100091, P. R. China 《Chinese Forestry Science and Technology》 2009年第4期53-60,共8页
Based on collected data and information from journals, newspapers, internet and reports, the main distribution regions of China’s enterprises in Russia were presented firstly. According to the investigation by questi... Based on collected data and information from journals, newspapers, internet and reports, the main distribution regions of China’s enterprises in Russia were presented firstly. According to the investigation by questionnaire and telephone, the general situation of Chinese enterprises exploiting forest resources in Russia was introduced and analyzed. The main difficulties faced by Chinese enterprises in Russia were summarized. Future trends faced by Chinese enterprises, such as increasing competition, encouraging timber downstream processing projects, increasing exploiting costs and more preferential policies on developing forest resources, were described in the end. 展开更多
关键词 Chinese enterprises forest resources EXPLOIT RUSSIA
原文传递
Water storage in underground mined-out space as a geothermal reservoir:Heat extraction performance and temperature evolution
19
作者 Cunli Zhu Yuejin Zhou +2 位作者 Jixiong Zhang Meng Li Zhen Li 《International Journal of Mining Science and Technology》 2025年第12期2089-2105,共17页
As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect... As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect that offers both promise and challenges.In response,this study proposes a functional backfilling method using mining solid waste to construct a high-porosity heat extraction space.The research integrates experiments,theoretical analysis,and simulations to examine the mechanical and permeability properties of solid waste backfill materials.It further aims to elucidate how flow velocity and initial temperature influence the evolution of the temperature field and the thermal performance.Results indicate that the backfill material achieves optimal mechanical strength with a glass fiber content of 10‰ and a length of 6 mm.Furthermore,the permeability of the solid waste backfill demonstrates a quadratic relationship with both axial and confining pressure.During the recovery stage,the temperature in the heat extraction space remains lower than that of the surrounding rock,with geothermal energy being extracted via convective heat transfer between the water medium and the rock.The amount of heat extracted shows a positive correlation with the flow velocity of the water medium and a negative correlation with its initial temperature. 展开更多
关键词 Mine geothermal energy Heat transfer mechanism Water storage and geothermal exploiting Deep mine space utilization
在线阅读 下载PDF
Barber Optimization Algorithm:A New Human-Based Approach for Solving Optimization Problems
20
作者 Tareq Hamadneh Belal Batiha +8 位作者 Omar Alsayyed Widi Aribowo Zeinab Montazeri Mohammad Dehghani Frank Werner Haider Ali Riyadh Kareem Jawad Ibraheem Kasim Ibraheem Kei Eguchi 《Computers, Materials & Continua》 2025年第5期2677-2718,共42页
In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions ... In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions between barbers and customers,BaOA captures two key processes:the customer’s selection of a hairstyle and the detailed refinement during the haircut.These processes are translated into a mathematical framework that forms the foundation of BaOA,consisting of two critical phases:exploration,representing the creative selection process,and exploitation,which focuses on refining details for optimization.The performance of BaOA is evaluated using 52 standard benchmark functions,including unimodal,high-dimensional multimodal,fixed-dimensional multimodal,and the Congress on Evolutionary Computation(CEC)2017 test suite.This comprehensive assessment highlights BaOA’s ability to balance exploration and exploitation effectively,resulting in high-quality solutions.A comparative analysis against twelve widely known metaheuristic algorithms further demonstrates BaOA’s superior performance,as it consistently delivers better results across most benchmark functions.To validate its real-world applicability,BaOA is tested on four engineering design problems,illustrating its capability to address practical challenges with remarkable efficiency.The results confirm BaOA’s versatility and reliability as an optimization tool.This study not only introduces an innovative algorithm but also establishes its effectiveness in solving complex problems,providing a foundation for future research and applications in diverse scientific and engineering domains. 展开更多
关键词 Optimization METAHEURISTIC barber HAIRSTYLE human-based algorithm exploration EXPLOITATION
在线阅读 下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部