Sentence examples for by exploiting the characteristic from inspiring English sources

Exact(5)

With a limited number of secondary data set, a class of covariance matrix estimators, defined as the geometric barycenters of some basic covariance matrix estimates obtained from the available secondary data set, are proposed by exploiting the characteristic of the positive-definite matrix space.

We considered the problem of building an actor model for a professional social network by exploiting the characteristic features.

More specifically, considerable carriers reduce the penetration capability to normal tissue and permit passive targeting of the cancerous tissue by exploiting the characteristic features of tumor biology, i.e., disturbed blood vessels with high permeability.

By exploiting the characteristic connectivity between RBCs and two downstream targets, we investigated how cross-synaptic synchrony influences the transmission of physiological inputs through the retina.

We therefore virtually linked the distal regulatory elements to their target genes, by exploiting the characteristic that regulatory regions become DNase hypersensitive (DHS) in synchrony with their target promoters.

Similar(55)

By exploiting the characteristics of flip ambiguity, which causes either huge or zero error, we propose the concept of optimistic localization and design an algorithm, OFA, that employs a global consistency check and a location correction phase in the localization process.

Several image-adaptive DM algorithms are presented by exploiting the characteristics of the human visual system in [11].

By exploiting the characteristics of shift-invariance, steerability, and scalability, we further derived the theoretical synchronization mechanisms for translation, rotation, and scaling.

Improvements in performance of digital audio watermarking schemes can be obtained by exploiting the characteristics of the human auditory system in watermarking process.

As a remedy of the traditional security mechanism, the concept of physical layer security (PHY-security) has been proposed recently to achieve secure communication for wireless systems by exploiting the characteristics of wireless channels.

The crucial considerations are how to maximize the effectiveness of the system by exploiting the characteristics of these TM systems, and how to reduce the burden of a user in interaction with these TM systems.

Show more...

Ludwig, your English writing platform

Write better and faster with AI suggestions while staying true to your unique style.

Student

Used by millions of students, scientific researchers, professional translators and editors from all over the world!

MitStanfordHarvardAustralian Nationa UniversityNanyangOxford

Since I tried Ludwig back in 2017, I have been constantly using it in both editing and translation. Ever since, I suggest it to my translators at ProSciEditing.

Justyna Jupowicz-Kozak quote

Justyna Jupowicz-Kozak

CEO of Professional Science Editing for Scientists @ prosciediting.com

Get started for free

Unlock your writing potential with Ludwig

Letters

Most frequent sentences: