Showing 6,741 - 6,760 results of 19,871 for search '"*** (novel)"', query time: 0.10s Refine Results
  1. 6741

    Simultaneous Altitude and RCS Estimation with Propagation Attenuation in Bistatic HFSWR by Zhao Kongrui, Yu Changjun, Zhou Gongjian, Quan Taifan

    Published 2013-01-01
    “…To simultaneously estimate the target altitude and radar cross-sections (RCS) with bistatic HFSWR, a novel estimation model is proposed with the variation of the propagation attenuation, and the target echoes are utilized to construct the measurement equation. …”
    Get full text
    Article
  2. 6742

    Study on the Tooth Surface Equation and Parametric Modeling for New Type of Cylindrical Gear with Arc Tooth Trace by Li Qin, Liu Haidong, Zhang Qi

    Published 2016-01-01
    “…The cylindrical gear with arc tooth trace is a novel cylindrical gear with the features of good meshing performance,large overlap coefficient,smooth transmission,low noise,high efficiency,long service life and so forth. …”
    Get full text
    Article
  3. 6743

    A Stochastic-Variational Model for Soft Mumford-Shah Segmentation

    Published 2006-01-01
    “…In combination, the two can lead to much more powerful novel models and efficient algorithms. In the current work, we propose a stochastic-variational model for <emph>soft</emph> (or fuzzy) Mumford-Shah segmentation of mixture image patterns. …”
    Get full text
    Article
  4. 6744

    Study on Meshing Characteristic of Face Gear Pair based on Pinion Modified by Continuous Shifting by Zhang Jinzhao, Liu Lei

    Published 2018-01-01
    “…The numerical example shows that the proposed novel modified face gear pair has following features of can avoid the occurrence of gear deviation load and can decrease the sensitivity of the contact path to the installation errors,there is no curvature interference at meshing points. …”
    Get full text
    Article
  5. 6745

    Development of a Wearable-Sensor-Based Fall Detection System by Falin Wu, Hengyang Zhao, Yan Zhao, Haibo Zhong

    Published 2015-01-01
    “…This paper develops a novel fall detection system based on a wearable device. …”
    Get full text
    Article
  6. 6746

    VM migration across subnets in future internet architecture—XIA by Hong-wei MENG, Zhong CHEN, Zi-qian MENG, Chuck SONG

    Published 2016-03-01
    “…When a VM migrates among hosts residing in two IP subnets,the network attachment point of VM changed,which causes the IP mobility problem.It was meaningful to design and evaluate VM migration performance under the future internet architecture.XIA (expressive Internet architecture)was focused,a novel future internet architecture,sup-port for VM live migration.Motivated by the natural f res of ID/location decoupling,versatile routing with DAG (di-rected acyclic graphs) in XIA,The design and implementation of rendezvous agent based migration (RABM) approach was given.In demonstrate that XIA supported VM migration can achieve fast network re-connection between VM and correspondent node,while keeping the network control plane simplicity and data plane efficiency.…”
    Get full text
    Article
  7. 6747

    Core-Shell Columns in High-Performance Liquid Chromatography: Food Analysis Applications by Raffaella Preti

    Published 2016-01-01
    “…The literature hereby described shows how the outstanding performances provided by core-shell particles column on a traditional HPLC instruments are comparable to those obtained with a costly UHPLC instrumentation, making this novel column a promising key tool in food analysis.…”
    Get full text
    Article
  8. 6748

    Odstępstwa od normy w kategorii gramatycznej liczby w powieści Wojna polsko-ruska pod flagą biało-czerwoną i ich odzwierciedlenie w przekładzie na język rosyjski by Joanna Orzechowska

    Published 2020-06-01
    “…In the Russian translation of the novel reflecting this phenomenon should not pose any problems. …”
    Get full text
    Article
  9. 6749

    Formation Control for Unmanned Aerial Vehicles with Directed and Switching Topologies by Yahui Qi, Shaolei Zhou, Yuhang Kang, Shi Yan

    Published 2016-01-01
    “…Then, by variable transformation, the formation problem is transformed into a consensus problem, which can be solved by a novel matrix decomposition method. Sufficient conditions to achieve formation with directed and switching topologies are provided and an explicit expression of the formation reference function is given. …”
    Get full text
    Article
  10. 6750

    Multiuser secret key generation based on received signal by Aolin CAI, Liang JIN, Zhou ZHONG, Yangming LOU

    Published 2018-10-01
    “…The secret key generation method based on channel characteristic provides a new way for communication security.But under the conditions of multiuser and slow fading,because of the slow channel parameter changing rate,using the secret key generation method above can result in a low secret key rate.To solve this problem,a multiuser secret key generation method based on the received signal was proposed.By distributing the random signals to different users using block diagonalization precoding,base station and user can extract the secret key from the received signal.The novel method could significantly increase the secret key rate of multiuser under the quasi-static channel and slow-fading channel,which is verified by simulations.…”
    Get full text
    Article
  11. 6751

    Optimal path identification to defend against DDoS attacks by JIN Guang1, YANG Jian-gang1, LI Yuan2, ZHANG Hui-zhan2

    Published 2008-01-01
    “…A novel packet marking scheme,optimal path identification(OPi),was proposed to defend against DDoS at-tacks.Instead of using fixed 1 or 2 bit in previous schemes,in OPi a router deduces the traveling distance of an arrived packet by its TTL value and inserts a variable-length marking of 1~16 bit into the packet.The marking field is filled completely even the path is very short and the distinguishability is improved.OPi outperforms previous schemes,espe-cially when attacker paths adjoin user paths seriously.To obtain better performance,an OPi+TTL filtering strategy was proposed to frustrate attackers’ tries with spoofed initial TTL values.Theoretical analyses and simulations with actual Internet topologies show OPi performs excellently.…”
    Get full text
    Article
  12. 6752

    Low-overhead routing algorithm for opportunistic networks based on immunity information piggybacked by SV by Zhi REN, Cong CHEN, Ya-nan CAO, Chen PENG, Qian-bin CHEN

    Published 2014-10-01
    “…A novel routing algorithm,LRPI (low-overhead routing with piggybacked immunity information) was proposed.LRPI contains the following four new mechanisms:piggybacking the immune information with SV(summary vectors),fast generation of the immune information through a cross-layer method,an improved exchange mechanism of SV,and adaptive compression of SV.Based on the above new mechanism,LRPI not only avoids using special data structure but also can achieve the same immune function more quickly.Theoretical analysis and simulation results show that LRPI outperforms the classical epidemic routing algorithm and a few of its improvements in terms of control overhead,the number of saved packets,and average end-to-end delay.…”
    Get full text
    Article
  13. 6753

    Jointed LDPC codes design for half-duplex relay channels by Zi-qiang CHEN, Shan OUYANG, Hai-lin XIAO, Yue-lei XIE

    Published 2013-03-01
    “…In order to increase the coding gain of decode-and-forward half-duplex relay channel, a jointed LDPC coding structure and its corresponding optimization scheme was proposed. Novel structure made the subcodes of both source and relay nodes as parts of the overall code. …”
    Get full text
    Article
  14. 6754

    O romance dos pais, o romance dos filhos: os personagens secundários de Alejandro Zambra by Isabela Cordeiro Lopes

    Published 2023-12-01
    “…According to the notion of « secondary characters » this paper aims to investigate the relations introduced by the narrator of the novel Formas de voltar para casa, (Ways to go back home), Alejandro Zambra, specially in contexts of family and school lives. …”
    Get full text
    Article
  15. 6755

    SUPPORT VECTOR MACHINE FOR HUMAN IDENTIFICATION BASED ON NON-FIDUCIAL FEATURES OF THE ECG by HATEM ZEHIR, TOUFIK HAFS, SARA DAAS, AMINE NAIT-ALI

    Published 2023-05-01
    “…Using the mean frequency, median frequency, band power, and Welch power spectral density (PSD) of ECG data, we proposed a novel biometric approach in this study. ECG signals are more secure than other traditional biometric modalities because they are impossible to forge and duplicate. …”
    Get full text
    Article
  16. 6756

    Axiological parameter of the image of a literary character by Ludmila V. Paloyko

    Published 2016-12-01
    “…In this article axiological parameter of the image of a literary character is considered by the example of Scarlett O'Hara, the heroine of the novel "Gone with the Wind" by M. Mitchell and its official sequel - "Scarlett" by A. …”
    Get full text
    Article
  17. 6757

    QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things by Jianliang Gao, Jianxin Wang, Jianbiao He, Weiping Wang

    Published 2013-07-01
    “…This paper presents a novel anticollision algorithm named Query Splitting-based Anticollision (QSA) for mobile RFID-based internet-of-things. …”
    Get full text
    Article
  18. 6758

    A Retrospective on Nuclear Receptor Regulation of Inflammation: Lessons from GR and PPARs by Min-Dian Li, Xiaoyong Yang

    Published 2011-01-01
    “…A better understanding of the molecular mechanism by which nuclear receptors inhibit proinflammatory signaling pathways will enable novel therapies to treat chronic inflammation.…”
    Get full text
    Article
  19. 6759

    Research on high security G function algorithm by Rui CHEN, Zan LI, Jia SHI, Lei GUAN

    Published 2019-06-01
    “…The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless communication system such as large capacity DFH network,which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result,in order to improve the security of the system,the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover,the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly.…”
    Get full text
    Article
  20. 6760

    Research progress and evolution prospect of passive internet of things communication by Yuan LI, Yulu ZHANG, Yu DING, Shuai MA, Shanpeng XIAO, Jianming XIAO, Jian LI

    Published 2023-09-01
    “…Passive internet of things (IoT) is the fundamentally enabling technology of promoting digital transformation and upgrading of industries.In recent years, passive IoT communication technology such as radio frequency identification has been widely used in asset management fields due to its advantages of low cost, zero power consumption, and easy deployment.In this context, passive IoT communication technology and the latest research progress were introduced, the potential evolution prospects of passive IoT were analyzed.Based on that, development bottlenecks and challenges of passive IoT communication were given, a novel passive IoT communication system with deep fusion of the cellular system was presented, and the key technology research directions of this field were proposed.It is aimed to inspire new thoughts for the development of passive IoT communication technology.…”
    Get full text
    Article