In conjugate symmetric data transmission, due to insufficient judgment of congestion during transmission, the amount of data is large and the transmission rate is low. In order to improve the data transmission rate, a...
详细信息
In conjugate symmetric data transmission, due to insufficient judgment of congestion during transmission, the amount of data is large and the transmission rate is low. In order to improve the data transmission rate, a conjugate symmetric data transmission control method based on machine learning is designed. Firstly, the data to be transmitted is tracked and determined, and then conjugate symmetric data fusion is completed according to the calculation result of the best tracking signal. According to the fusion results, the framework of the conjugate symmetric data coding system is established, and the data coding is completed. The average congestion mark value is calculated by the machine learning method, and the congestion judgment of data transmission is completed. On the basis of congestion determination, the efficient transmission control of conjugate symmetric data is realized by specifying the conjugate symmetric data transmission protocol. Experimental results show that compared with traditional control methods, this control method has the advantages of a high delivery rate, low message transmission overhead and low data transmission delay. Compared to the traditional two-way path model, the scheduling method proposed in this study increases the transmission delivery rate by 5%, while reducing the transmission cost and delay by 0.7 cost index and 1.1 min delay, respectively. In comparison with the performance of accurate error tracking equalization, the transmission delivery rate of the research method increased by 21%, and in transmission cost index and delay analysis, it also decreased by 3.1 and 2.9 minutes. Based on the above performance comparison analysis, it can be concluded that the machine learning method has more superior transmission control performance.
This computer program analyzes content by classifying each individual sentence or phrase by its single, most important meaning. The total content of a document is then the sum of these individual classifications (stat...
详细信息
This computer program analyzes content by classifying each individual sentence or phrase by its single, most important meaning. The total content of a document is then the sum of these individual classifications (statement meanings). In the examples studied, five key words can determine specific meaning for individual sentences.
This article presents the proposal of a novel encoding method for representing binary data in printable format. The encoding procedure reversibly transforms binary strings into printable letter sequences using a mappi...
详细信息
This article presents the proposal of a novel encoding method for representing binary data in printable format. The encoding procedure reversibly transforms binary strings into printable letter sequences using a mapping from bit strings to an alphabet of 41 symbols taken from a subset of the English uppercase and lowercase letters. The decoding process reversibly recovers an original bit string from the encoded printable string. The encoding and decoding algorithms along with the properties of this coding are examined and discussed. In particular, the use of only URL-safe and clearly visually distinguishable characters is emphasized.
Point source information system of geology and mineral resource consist of three major parts including reconnaissance data management, reconnaissance data processing and geological mineral source appraisal. Its struct...
详细信息
Point source information system of geology and mineral resource consist of three major parts including reconnaissance data management, reconnaissance data processing and geological mineral source appraisal. Its structure lies in the combination of technique methods and application models. The core of it is point source data base. With the application utilized more frequently, various datum on the Internet drastically increase which will cause more and more Internet attacks. Diverse security issues are hampering the normal running of the system. Therefore, it has been a critical problem and pressing job to guarantee a efficient and secure geological mineral information website.
Abstract This study was undertaken, in part, to analyse the means by which primary children familiarized themselves with a large database. Their approaches to the problems of codingdata for entry were studied and the...
详细信息
Intake reports from child protective service (CPS) agencies are the foundation for subsequent decisions and services within the child welfare system. They provide valuable information for understanding children's ...
详细信息
Intake reports from child protective service (CPS) agencies are the foundation for subsequent decisions and services within the child welfare system. They provide valuable information for understanding children's needs, yet the unstructured way that information is captured makes the information ascertained in these reports difficult to summarize. Utilizing CPS intake reports from a mid-sized urban county in the southeastern United States (N = 2,724), our study had three aims: (1) develop a coding system to abstract information from narrative CPS intake reports, (2) examine the prevalence of maltreatment subtypes, and (3) compare prevalence of maltreatment subtypes by screen-in/screen-out decisions. Improper discipline/physical abuse was the most common maltreatment subtype (34.6 %);over 40 % of reports involved a physical act toward the child not resulting in injury. Salient risk factors included caregiver drug use (20.6 %) and domestic violence (19 %). While substantial discrepancies were not found between screened-in and screened-out cases with respect to maltreatment types, maltreatment type-specific codes, or contributory factors, they were found for reporter type and child age. Our coding system to extract and assess child maltreatment intake narrative data can provide local agencies with descriptive information about why children come to their agency's attention and provide nuanced details regarding the children's and families' needs. This coding framework could be used to develop validated intake tools to better document and categorize child maltreatment which could inform the assessment/investigation process and create targeted prevention and intervention services for families that come to the attention of CPS.
暂无评论