Showing 6,721 - 6,740 results of 19,871 for search '"*** (novel)"', query time: 0.11s Refine Results
  1. 6721

    Nonlinear Uncertainties Canceling in Multi-Agent Systems Enabled by Cooperative Adaptation by Cyuansi Shih, Chengyu Cao

    Published 2018-01-01
    “…This paper deals with uncertainties problem in multi-agent systems with novel cooperative adaptation approach. Since uncertainties in multi-agent systems are interconnected, local agent often faces uncertainties not only from itself but also from neighbors. …”
    Get full text
    Article
  2. 6722

    Optimal Algorithms for Nonlinear Equations with Applications and Their Dynamics by Amir Naseem, M. A. Rehman, Nasr Al Din Ide

    Published 2022-01-01
    “…In the present work, we introduce two novel root-finding algorithms for nonlinear scalar equations. …”
    Get full text
    Article
  3. 6723

    Application of X-Ray Computed Tomography in Monitoring Chloride Ion Penetration Paths in Recycled Aggregate Concrete by Yuan Zuo, Bing Qi, Jianming Gao, Weibin Li

    Published 2018-01-01
    “…This study used X-ray computed tomography (X-CT) as a novel approach to investigate chloride ion penetration paths in RAC. …”
    Get full text
    Article
  4. 6724

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  5. 6725

    Research on Spectrum Access Mechanism Based on Polling Scheduling by Jin Lu, Ming Huang, Zhijun Yang

    Published 2013-11-01
    “…The spectrum access mechanism based on polling control tends to realize the effective utilization of spectrum resources and rational allocation. A novel polling queuing model, in which the authorized users employ exhaustive service while the cognitive users employ loss service, was proposed. …”
    Get full text
    Article
  6. 6726

    DDoS defense with IP traceback and path identification by JIN Guang, ZHANG Fei, QIAN Jiang-bo, ZHANG Hong-hao

    Published 2011-01-01
    “…A novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Meanwhile the border router of the destination domain deployed the traceback marking scheme.The victim could retrieve related information from arrived malicious packets.Then Pi-based filtering could be implemented at the border ingresses.A practical marking,storing and filtering scheme was provided in detail.The results of large-scale simulations with authoritative Internet topologies show the scheme is effective to alleviate attack impacts on the victim and upstream links in the destination domain.…”
    Get full text
    Article
  7. 6727

    RFID dynamic positioning method by Cheng LI, Song-rong QIAN

    Published 2013-04-01
    “…A novel proximity method-RFID dynamic positioning method was presented,using a moving radio frequency identification (RFID) reader to accurately position the target based on reference tag arrays.The major advantage of the method was that through reading tags without any measurement data,e.g.…”
    Get full text
    Article
  8. 6728

    Spectrum Handoff with Channel Sensing Sequencing in Cognitive Radio Network by Xingyu Zhu, Huaibei Zhou, Junyuan Huang

    Published 2013-04-01
    “…In the cognitive radio network,when the primary users show up,the secondary users should vacate the channel and find another free channel for data transmissions.This is the so-called spectrum handoff.There are two most important performance metrics for spectrum handoff:handoff delay and handoff times.A novel spectrum handoff scheme with channel sensing sequencing was proposed in order to decrease both handoff delay and handoff times.When designing the channel sensing sequence,the channel free probability was considered,and the probability that no handoff will happen in a channel was considered as well.The simulation results show that the method not only can get the minimum handoff delay as the traditional method does,but also can decrease the handoff times were significantly compared with the traditional method.…”
    Get full text
    Article
  9. 6729

    Conventional versus ultrasound and microwave assisted synthesis: Some new environmentally friendly functionalized picolinium-based ionic liquids with potential antibacterial activi... by Messali Mouslim

    Published 2015-09-01
    “…The antimicrobial profile of the novel ionic liquids was evaluated and the minimum inhibitory concentration (MIC) showed their moderate to low antimicrobial activity against eight types of human pathogens.…”
    Get full text
    Article
  10. 6730

    An Energy-Efficient Collaborative Target Tracking Framework in Distributed Wireless Sensor Networks by Lin Shang, Kang Zhao, Zhengguo Cai, Dan Gao, Maolin Hu

    Published 2014-07-01
    “…To obtain a benefit from those issues, most of the recent work tends to reduce the spatial redundancy, while ignoring utilizing the attribute of time redundancy. In this paper, a novel energy-efficient framework of collaborative signal and information fusion is proposed for acoustic target tracking. …”
    Get full text
    Article
  11. 6731

    Recent Advances in the Recognition and Management of Eosinophilic Esophagitis by Gregory Eustace, Xianyong Gui, Marietta Iacucci

    Published 2015-01-01
    “…Dietary therapy, topical steroid therapy, proton pump inhibitors and endoscopic dilation are the main approaches to therapy; however, novel targeted therapies are being developed. Among the food items commonly implicated are wheat, dairy, nuts, soy, shellfish and eggs. …”
    Get full text
    Article
  12. 6732

    Fast dynamic channel allocation algorithm based on priority channel reservation by SHI Wen-xiao, ZHAO Jun, CHI Xue-fen, LI Na

    Published 2009-01-01
    “…Aiming at overcoming the shortages of the current fast dynamic channel allocation algorithm in TD-SCDMA system,a novel fast dynamic channel allocation algorithm based on priority channel reservation was proposed.This algorithm defined call priority by equipment attribution of baton handover user,reserved channels for baton handover calls.Combining with grouping borrowed algorithm,the algorithm made MB DCA strategy more flexible.Simulation results show that,comparing to the mixed-data rate grouping borrowed algorithm,the proposed algorithm achieves the preferential access of VIP and high rate mobile user,reduces the call failure probability resulted from the baton handover,improves the performance of data service,and increases the channel utilization efficiency.…”
    Get full text
    Article
  13. 6733

    Research on multi-source application level multicast for awareness driven virtual space teleconferencing by ZHANG Xu, WU Hui-zhong

    Published 2007-01-01
    “…Virtual space teleconferencing is a novel CSCW tool that has abroad application perspective.There is no effi-cient communication mechanism to realize virtual space teleconferencing on Internet because most of end hosts in today’s Internet have limited access bandwidth and the Internet does not support IP multicast.Adopting mesh-first and centralized strategies,a multi-source application level multicast method ESMVST for awareness driven virtual space teleconferenc-ing on Internet was devised.The research focused on ESMVST method’s application level multicast routing model VSTMMR and proposed a heuristic routing algorithm MDMM.The result of experiment shows that MDMM algorithm could reduce both algorithm’s rejection rate and data distribution trees’ maximal delay effectively,and ESMVST method is feasible.…”
    Get full text
    Article
  14. 6734

    Trasvasijes poéticos y literarios en el cine chileno.Entre Raúl Ruiz e Ignacio Agüero by Carolina Urrutia Neno, Felipe Blanco

    Published 2024-12-01
    “…We are interested in examining the ways in which both directors relate to literature: both from the novel and the story, as well as from poetry and the essay, and the ways in which from there they enrich their audiovisual narratives. …”
    Get full text
    Article
  15. 6735

    Les images d’enfermement dans John Marchmont’s Legacy de Mary Elizabeth Braddon by Marion Charret-Del Bove

    Published 2006-12-01
    “…Mary Elizabeth Braddon’s novel John Marchmont’s Legacy was serialized in Temple Bar from December 1862 to January 1864. …”
    Get full text
    Article
  16. 6736

    A Geography of Cultures: Or, Why New York’s Lower East Side Is an Important Case Study by Mario MAFFI

    Published 2010-03-01
    “…During the 19th century, but especially in the crucial turn-of-the-century decades, the quarter—an immigrant ghetto of appalling living and working conditions as well as a hotbed of radical politics—also functioned as a sort of cultural laboratory, a key factor in the development of such diverse but distinctive American arts such as the realist and naturalist novel, the budding movie making, the Ash Can School of painting, theatre, etc.…”
    Get full text
    Article
  17. 6737

    Optimal Control of Anti-Angiogenesis and Radiation Treatments for Cancerous Tumor: Hybrid Indirect Solver by Iman Alimirzaei, Alaeddin Malek

    Published 2023-01-01
    “…By combining steepest descent, conjugate gradient, and Armijo techniques, a novel hybrid indirect iterative solver is designed. …”
    Get full text
    Article
  18. 6738

    Du simulacre à la simulation : la vérité de l’artifice dans Galatea 2.2 de Richard Powers by Jean-Yves Pellegrin

    Published 2009-12-01
    “…This interactive feed-back loop, which simulates our sense of being caught in the ecosystem of the world, is not only the subject matter of the novel, it is also the active principle of the text. …”
    Get full text
    Article
  19. 6739

    The gospel contra Nietzsche: a South African literary critique of Wille zur Macht by F. Hale

    Published 2017-06-01
    “…The present article explores how Joseph Doke, a scholarly, transplanted Englishman who served as a Baptist pastor in Johannesburg and elsewhere and wrote the first biography of Gandhi, used fiction to criticise Nietzsche early in the twentieth century. His novel The queen of the secret city (1916) embodies an explicit rejection of this German philosopher’s pivotal notion of Wille zur Macht (will to power). …”
    Get full text
    Article
  20. 6740

    Impact socio-économique de l’aménagement hydro-rizicole de Guiguidou dans la sous-préfecture de Divo (Côte d’Ivoire) by Joachim Koffi Kotchi, Yagnama Rokia Ouattara-Coulibaly, Guillaume Kouassi N’guessan

    Published 2018-03-01
    “…The analysis of the data collected shows the recipients had access to farming novel methods and the socio-economic impact is remarkable with job creation. …”
    Get full text
    Article