Showing 6,301 - 6,320 results of 19,871 for search '"*** (novel)"', query time: 0.08s Refine Results
  1. 6301

    Improving achievable traffic load of cognitive wireless networks under GoS constraints by Liang YU, Tao JIANG, Yang CAO

    Published 2012-11-01
    “…To improve the achievable traffic load of secondary user(SU) under grade of service (GoS) constraints in cognitive wireless networks with heterogeneous traffic,a novel spectrum sharing scheme was proposed.The key idea of the proposed scheme was to introduce preemptive priority and buffering mechanism for real-time traffic and non-real-time traffic,respectively,according to their different delay characteristics.The proposed scheme could reduce the forced termination probability and the blocking probability for heterogeneous calls simultaneously.Numerical results show that the proposed scheme can effectively improve the achievable traffic load of SUs under GoS constraints.…”
    Get full text
    Article
  2. 6302

    Heart to Heart: The Power of Lyrical Bonding in Romantic Nationalism by Joep Leerssen

    Published 2023-08-01
    “… In nineteenth-century nation-building, the textual genres investigated by researchers are usually long-distance, mediated ones, such as journalism and the novel. This article attempts to assess the function of a much more intimate literary genre, the lyrical, in that process. …”
    Get full text
    Article
  3. 6303

    Cinquante ans après : mémoire oweniste et chartiste du roman radical des années 1790 by Marion Leclair

    Published 2024-12-01
    “…This article looks at the memory of the British radical novel of the 1790s in the Owenist and Chartist literature of the 1830s and 1840s. …”
    Get full text
    Article
  4. 6304

    Round-priority-based anti-collision tag identification method in a mobile radio-frequency identification system by Liqian Zhang, Xueliang Fu, Honghui Li

    Published 2019-05-01
    “…In this article, we proposed a novel tag anti-collision identification method based on tags’ priority called RPA in the mobile radio-frequency identification system. …”
    Get full text
    Article
  5. 6305

    DCT and Wiener filter based on approach for speech enhancement using a single microphone by OU Shi-feng, ZHAO Xiao-hui, GU Hai-jun

    Published 2006-01-01
    “…Considering the enhancement of speech corrupted by complicated additive noise,a novel algorithm was proposed based on discrete cosine transform(DCT) and Wiener filter using a single microphone.This algorithm did not rely on any speech signal model and could efficiently attain the optimal estimation of clean speech components using successive noisy speech components and minimum mean square error estimation in DCT domain.Furthermore,it could overcome the disad-vantage of independent assumptions in classic methods for speech components.Simulation results demonstrate that the pro-posed algorithm possesses good performance both in objective and subjective tests with different kinds of noise.…”
    Get full text
    Article
  6. 6306

    Towards Accurate Node-Based Detection of P2P Botnets by Chunyong Yin

    Published 2014-01-01
    “…In this paper, we propose a novel direction for P2P botnet detection called node-based detection. …”
    Get full text
    Article
  7. 6307

    Flow-awared identification model of sophisticated network application by Luo-shi ZHANG, Da-wei WANG, Yi-bo XUE

    Published 2015-03-01
    “…Traditional methods of protocol identification, which is mainly based on individual flow, lose their effective-ness as dealing with sophisticated network applications. A novel model of identifying sophisticated network applications, called flow-aware model, is addressed. …”
    Get full text
    Article
  8. 6308

    Network Virtualization Interconnection Technology by Sai Ma, Hui Huang, Shijun Xia, Yaohui Jin, Xuan Luo

    Published 2015-06-01
    “…The key challenges of realizing the interconnection were discussed,then a novel software defined networking based interconnection architecture Omni-Bridge was proposed. …”
    Get full text
    Article
  9. 6309

    Le tracé extravagant des cartes dans Moby-Dick et Walden by Michel Imbert, Julien Nègre

    Published 2013-06-01
    “…Michel Imbert comments more specifically on the chapters of Melville’s novel explicitly devoted to maps: both the map of Nantucket and the charts used by Captain Ahab to set his course are telltale signs of the will to plot an empire even as they blot out the abyss within. …”
    Get full text
    Article
  10. 6310

    Iterative Splitting Methods for Integrodifferential Equations: Theory and Applications by Jürgen Geiser

    Published 2014-01-01
    “…We present novel iterative splitting methods to solve integrodifferential equations. …”
    Get full text
    Article
  11. 6311

    From Chicago to Hollywood: the Metamorphosis of V.I. Warshawski by Nicole Décuré

    Published 2004-12-01
    “…The passage from novel to film is often a difficult one. When it comes to feminist fiction, the problem becomes acute because the ideology of Hollywood combined with that of a male director find it hard to accommodate such a vision. …”
    Get full text
    Article
  12. 6312

    PyFuzzer:automatic in-memory fuzz testing method by Wei-ming LI, Jun-qing YU, Shao-bo AI

    Published 2013-09-01
    “…Fuzz Testing is an effective method to mine all kinds of vulnerabilities.But the main drawbacks to current fuzz testing tools are:firstly,it produces high volume testing data and it’s extraordinary time consumption; secondly,if the accessing needs authentication,the greatest part of test data will be abandoned.PyFuzzer,a novel automatic in-memory fuzz testing tool combining static analysis,dynamic analysis and in-memory fuzz testing,was presented.The tool is highly automatic and effective.Compared with 4n FTP Fuzzer in testing WarFTPD and Serv-U,PyFuzzer can discover all vulnerabilities and improve test efficiency greatly.…”
    Get full text
    Article
  13. 6313

    Reducing the sign problem with line integrals by Rasmus N. Larsen

    Published 2025-02-01
    “…Abstract We present a novel strategy to strongly reduce the severity of the sign problem, using line integrals along paths of changing imaginary action. …”
    Get full text
    Article
  14. 6314

    Study of CABAC-based digital video encryption in the H.264/AVC standard by BAO Xian-yu1, JIANG Jian-guo1.2, YUAN Wei1, LI Yuan1

    Published 2007-01-01
    “…Several candidate domains were analyzed and summarized to apply encryption to the latest video coding standard H.264/AVC,and a novel digital video encryption scheme based on CABAC(context-based adaptive binary arithmetic coding) was proposed.During the CABAC encoding,two kinds of secure encryption operations including RCME(regular coding mode encryption) and BCME(bypass coding mode encryption) were utilized,in order to encrypt residual coefficient codeword,motion vector difference codeword and intra-prediction mode,respectively.The experimental results show that the scheme has significant advantages on security,coding efficiency,and errors robustness.…”
    Get full text
    Article
  15. 6315

    Ecopoetics in Yorùbá Riddles by Olumide Adegbodu

    Published 2023-11-01
    “…For instance, the motif of environment/ecosystem seen to be novel in literary representations. However, Africans, long before their contact with coloniality, have engaged their literary texts in interrogating various aspects of their cultural milieu, including the ecosystem. …”
    Get full text
    Article
  16. 6316

    Multi-service transmission method based on multi-chirp-rate CSS by ZHAO Qi-ming1, ZHANG Qin-yu1, ZHANG Nai-tong1

    Published 2011-01-01
    “…A novel multi-services transmission scheme based on multi-chirp-rate CSS was proposed,which provided dif-ferent quality of transmission to services on the physical layer.Using fractional fourier transform(FrFT),signals of dif-ferent services could be recognized and classified.Multi-services transmission problem had been simplified into trans-form domain multiplexing/ multiple access design and suppress the interference of other different service signals.By the collaborative design of services frequencies and time slots,and application of filtering in transform domain,the problem of services signals interference had been settled.…”
    Get full text
    Article
  17. 6317

    An Information-Based Classification of Elementary Cellular Automata by Enrico Borriello, Sara Imari Walker

    Published 2017-01-01
    “…We propose a novel, information-based classification of elementary cellular automata. …”
    Get full text
    Article
  18. 6318

    Harmonising Theory: Integrating Singing With Grounded Theory Methods by Belinda Densley, Virginia Dickson-Swift, Jane Mills

    Published 2025-01-01
    “…Additionally, we introduce novel concepts such as practice-informed research, song reaching, and song fragments, and explore their implications for developing a grounded theory of group singing. …”
    Get full text
    Article
  19. 6319

    Spherical Simplex-Radial Cubature Quadrature Kalman Filter by Zhaoming Li, Wenge Yang

    Published 2017-01-01
    “…The Gaussian probability weighted integral of the nonlinear function is decomposed into spherical integral and radial integral, which are approximated by spherical simplex cubature rule and arbitrary order Gauss-Laguerre quadrature rule, respectively, and the novel spherical simplex-radial cubature quadrature rule is obtained. …”
    Get full text
    Article
  20. 6320

    Realization of WAVE System Based on IEEE 802.11p by Juan Chen, Sunzeng Cai, Zhenghang Zhu, Haiping Jiang, Kai Kang

    Published 2014-03-01
    “…Then, key technologies of system design include OFDM parameter bandwidth and data rate choice, pilots' structure design, synchronization and channel estimation design, were presented. A novel channel estimation method to eliminate the disadvantage in vehicle environment was proposed. …”
    Get full text
    Article