Showing 581 - 600 results of 12,670 for search '((cers OR (chen OR when)) OR ((best OR been) OR (bears OR bear)))', query time: 0.18s Refine Results
  1. 581

    GBGVD: growth-based geodesic Voronoi diagrams by Qi, Yunjia, Zong, Chen, Zhang, Yunxiao, Chen, Shuangmin, Xu, Minfeng, Ran, Lingqiang, Xu, Jian, Xin, Shiqing, He, Ying

    Published 2024
    “…Generally speaking, each ordinary bisector point of the GVD is determined by two adjacent generators while each branching point of the GVD is given by at least three generators. When there are sufficiently many generators, straight-line distance serves as an effective alternative of geodesic distance for computing GVDs. …”
    Get full text
    Journal Article
  2. 582

    Study on the combined sewage sludge pyrolysis and gasification process : mass and energy balance by Wang, Zhonghui, Chen, Dezhen, Song, Xueding, Zhao, Lei

    Published 2012
    “…For sewage sludge with a moisture content of 80 wt%, LHV(db) of sewage sludge should be higher than 18 MJ/kg and the pyrolysis temperature should be higher than 450 °C to maintain energy self-sufficiency when volatile from the pyrolysis process is the only energy supplier; when the LHV(db) was in the range of 14.65–18 MJ/kg, energy self-balance could be maintained in this combined process with fuel gas from char gasification as a supplementary fuel; auxiliary fuel was always needed if the LHV(db) was lower than 14.65 MJ/kg.…”
    Get full text
    Get full text
    Journal Article
  3. 583

    Single channel speech enhancement by Chen, Guo., Koh, Soo Ngee., Soon, Inn Yann.

    Published 2008
    “…First, current major speech enhancement algorithms are reviewed and we conclude that the S-MMSE-LSAE algorithm is the best in overall performance among the well known algorithms reported in the existing literature and examined by the authors under most signal-to-noise ratios conditions. …”
    Get full text
    Research Report
  4. 584

    The impact of repeated notifications and notification checking mode on investors' reactions to managers’ strategic positive title emphasis by Chen, Wei, Tan, Hun-Tong, Wang, Elaine Ying

    Published 2023
    “…We also explore the impact of title emphasis when investors receive repeated notifications in an all-at-once mode. …”
    Get full text
    Journal Article
  5. 585

    Laplacian embedded regression for scalable manifold regularization by Chen, Lin, Tsang, Ivor Wai-Hung, Xu, Dong

    Published 2013
    “…Semi-supervised learning (SSL), as a powerful tool to learn from a limited number of labeled data and a large number of unlabeled data, has been attracting increasing attention in the machine learning community. …”
    Get full text
    Get full text
    Journal Article
  6. 586

    Portfolio insurance strategies : a comparison of OBPI versus CPPI by Chen, Xinyi, Zhang, Jenny Bi Zhen, Liu, Xinyi

    Published 2011
    “…Furthermore, the Sharpe and Sortino ratios indicate that OBPI outperforms CPPI in bullish years and when the market is moderately volatile. Only in situations when the market is extremely volatile does CPPI perform better than OBPI. …”
    Get full text
    Final Year Project (FYP)
  7. 587
  8. 588
  9. 589
  10. 590

    Context-aware deep model for joint mobility and time prediction by Chen, Yile, Long, Cheng, Cong, Gao, Li, Chenliang

    Published 2021
    “…We argue that it is more useful to know not only where but also when a user will arrive next in many scenarios such as targeted advertising and taxi service. …”
    Get full text
    Conference Paper
  11. 591

    Budget feasible mechanism design : from prior-free to Bayesian by Bei, Xiaohui, Chen, Ning, Gravin, Nick, Lu, Pinyan

    Published 2013
    “…Both of our mechanisms improve the best known approximation ratio O(log 2 n). • For the Bayesian framework, we provide a constant approximation mechanism for all subadditive functions, using the above prior-free mechanism for XOS valuations as a subroutine. …”
    Get full text
    Get full text
    Conference Paper
  12. 592

    A multi-view context-aware approach to Android malware detection and malicious code localization by Narayanan, Annamalai, Chandramohan, Mahinthan, Chen, Lihui, Liu, Yang

    Published 2020
    “…Subsequently, it employs Multiple Kernel Learning (MKL) to find a weighted combination of the views which yields the best detection accuracy. Besides multi-view learning, MKLDroid’s unique and salient trait is its ability to locate fine-grained malice code portions in dependency graphs (e.g., methods/classes). …”
    Get full text
    Journal Article
  13. 593

    Genetic studies of Prader-Willi patients from Taiwan identify two patients with atypical deletions and provide evidences for conservation of genomic architecture in proximal chromo... by Lin, Shuan Pei., Ho, Shi Yun., Chen, Yen Jiun., Huang, Chi Yu., Chiu, Hui Ching., Chuang, Chih Kuang., Hou, Aihua., Chen, Jennifer Chi Fung., Lin, Hsiang Yu., Chen, Ken-Shiung.

    Published 2011
    “…Despite a lack of data from Asians regarding the incident of deletion subtypes to allow for further comparison, it has previously been proposed that ethnic differences in genomic architecture may be responsible for the discrepancy in genetic etiology observed. …”
    Get full text
    Get full text
    Journal Article
  14. 594

    Optical properties of two-dimensional semi-conductive MXene Sc₂COₓ produced by sputtering by Chen, Qiran, Zhang, Daohua, Pan, Jisheng, Fan, Weijun

    Published 2021
    “…Structure of MXene will be broken when the annealing temperature is higher than 600 °C.…”
    Get full text
    Journal Article
  15. 595

    Tumor-targeted nano-assemblies for energy-blocking cocktail therapy in cancer by Chen, Manling, Liu, Yidu, Li, Yang, Liu, Xue

    Published 2024
    “…However, its antitumor efficacy is limited when used alone due to compensatory energy mechanisms. …”
    Get full text
    Journal Article
  16. 596

    A hamming distance and spearman correlation based star identification algorithm by Samirbhai, Mehta Deval, Chen, Shoushun, Low, Kay Soon

    Published 2019
    “…The Spearman-correlation approach provides reliable recognition even when the captured images are swayed and biased from the onboard star pattern database. …”
    Get full text
    Get full text
    Journal Article
  17. 597

    Compressed event sensing (CES) volumes for event cameras by Lin, Songnan, Ma, Ye, Chen, Jing, Wen, Bihan

    Published 2024
    “…In addition, our theoretical analysis show that, when integrated with a neural network, CES volumes demonstrates greater expressive power under the neural tangent kernel approximation. …”
    Get full text
    Journal Article
  18. 598

    Graph edit distance reward : learning to edit scene graph by Chen, Lichang, Lin, Guosheng, Wang, Shijie, Wu, Qingyao

    Published 2020
    “…Scene Graph, as a vital tool to bridge the gap between language domain and image domain, has been widely adopted in the cross-modality task like VQA. …”
    Get full text
    Conference Paper
  19. 599

    Understanding the bonding mechanisms of directly sputtered copper thin film on an alumina substrate by Lim, Ju Dy, Lee, Pui Mun, Chen, Zhong

    Published 2017
    “…Three different bonding mechanisms, viz., surface adsorption, mechanical interlocking, and diffusion bonding have been assessed. A tensile test was applied to measure the interfacial adhesion strength between the Cu films and the Al2O3 substrate. …”
    Get full text
    Get full text
    Journal Article
  20. 600

    Complexity of High-Dimensional Identity Testing with Coordinate Conditional Sampling by Blanca, Antonio, Chen, Zongchen, Stefankovic, Daniel, Vigoda, Eric

    Published 2024
    “…Given as input an explicit distribution , an > 0, and access to sampling oracle(s) for a hidden distribution , the goal in identity testing is to distinguish whether the two distributions and are identical or are at least -far apart. When there is only access to full samples from the hidden distribution , it is known that exponentially many samples (in the dimension) may be needed for identity testing, and hence previous works have studied identity testing with additional access to various “conditional” sampling oracles. …”
    Get full text
    Article