Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6741
Simultaneous Altitude and RCS Estimation with Propagation Attenuation in Bistatic HFSWR
Published 2013-01-01“…To simultaneously estimate the target altitude and radar cross-sections (RCS) with bistatic HFSWR, a novel estimation model is proposed with the variation of the propagation attenuation, and the target echoes are utilized to construct the measurement equation. …”
Get full text
Article -
6742
Study on the Tooth Surface Equation and Parametric Modeling for New Type of Cylindrical Gear with Arc Tooth Trace
Published 2016-01-01“…The cylindrical gear with arc tooth trace is a novel cylindrical gear with the features of good meshing performance,large overlap coefficient,smooth transmission,low noise,high efficiency,long service life and so forth. …”
Get full text
Article -
6743
A Stochastic-Variational Model for Soft Mumford-Shah Segmentation
Published 2006-01-01“…In combination, the two can lead to much more powerful novel models and efficient algorithms. In the current work, we propose a stochastic-variational model for <emph>soft</emph> (or fuzzy) Mumford-Shah segmentation of mixture image patterns. …”
Get full text
Article -
6744
Study on Meshing Characteristic of Face Gear Pair based on Pinion Modified by Continuous Shifting
Published 2018-01-01“…The numerical example shows that the proposed novel modified face gear pair has following features of can avoid the occurrence of gear deviation load and can decrease the sensitivity of the contact path to the installation errors,there is no curvature interference at meshing points. …”
Get full text
Article -
6745
Development of a Wearable-Sensor-Based Fall Detection System
Published 2015-01-01“…This paper develops a novel fall detection system based on a wearable device. …”
Get full text
Article -
6746
VM migration across subnets in future internet architecture—XIA
Published 2016-03-01“…When a VM migrates among hosts residing in two IP subnets,the network attachment point of VM changed,which causes the IP mobility problem.It was meaningful to design and evaluate VM migration performance under the future internet architecture.XIA (expressive Internet architecture)was focused,a novel future internet architecture,sup-port for VM live migration.Motivated by the natural f res of ID/location decoupling,versatile routing with DAG (di-rected acyclic graphs) in XIA,The design and implementation of rendezvous agent based migration (RABM) approach was given.In demonstrate that XIA supported VM migration can achieve fast network re-connection between VM and correspondent node,while keeping the network control plane simplicity and data plane efficiency.…”
Get full text
Article -
6747
Core-Shell Columns in High-Performance Liquid Chromatography: Food Analysis Applications
Published 2016-01-01“…The literature hereby described shows how the outstanding performances provided by core-shell particles column on a traditional HPLC instruments are comparable to those obtained with a costly UHPLC instrumentation, making this novel column a promising key tool in food analysis.…”
Get full text
Article -
6748
Odstępstwa od normy w kategorii gramatycznej liczby w powieści Wojna polsko-ruska pod flagą biało-czerwoną i ich odzwierciedlenie w przekładzie na język rosyjski
Published 2020-06-01“…In the Russian translation of the novel reflecting this phenomenon should not pose any problems. …”
Get full text
Article -
6749
Formation Control for Unmanned Aerial Vehicles with Directed and Switching Topologies
Published 2016-01-01“…Then, by variable transformation, the formation problem is transformed into a consensus problem, which can be solved by a novel matrix decomposition method. Sufficient conditions to achieve formation with directed and switching topologies are provided and an explicit expression of the formation reference function is given. …”
Get full text
Article -
6750
Multiuser secret key generation based on received signal
Published 2018-10-01“…The secret key generation method based on channel characteristic provides a new way for communication security.But under the conditions of multiuser and slow fading,because of the slow channel parameter changing rate,using the secret key generation method above can result in a low secret key rate.To solve this problem,a multiuser secret key generation method based on the received signal was proposed.By distributing the random signals to different users using block diagonalization precoding,base station and user can extract the secret key from the received signal.The novel method could significantly increase the secret key rate of multiuser under the quasi-static channel and slow-fading channel,which is verified by simulations.…”
Get full text
Article -
6751
Optimal path identification to defend against DDoS attacks
Published 2008-01-01“…A novel packet marking scheme,optimal path identification(OPi),was proposed to defend against DDoS at-tacks.Instead of using fixed 1 or 2 bit in previous schemes,in OPi a router deduces the traveling distance of an arrived packet by its TTL value and inserts a variable-length marking of 1~16 bit into the packet.The marking field is filled completely even the path is very short and the distinguishability is improved.OPi outperforms previous schemes,espe-cially when attacker paths adjoin user paths seriously.To obtain better performance,an OPi+TTL filtering strategy was proposed to frustrate attackers’ tries with spoofed initial TTL values.Theoretical analyses and simulations with actual Internet topologies show OPi performs excellently.…”
Get full text
Article -
6752
Low-overhead routing algorithm for opportunistic networks based on immunity information piggybacked by SV
Published 2014-10-01“…A novel routing algorithm,LRPI (low-overhead routing with piggybacked immunity information) was proposed.LRPI contains the following four new mechanisms:piggybacking the immune information with SV(summary vectors),fast generation of the immune information through a cross-layer method,an improved exchange mechanism of SV,and adaptive compression of SV.Based on the above new mechanism,LRPI not only avoids using special data structure but also can achieve the same immune function more quickly.Theoretical analysis and simulation results show that LRPI outperforms the classical epidemic routing algorithm and a few of its improvements in terms of control overhead,the number of saved packets,and average end-to-end delay.…”
Get full text
Article -
6753
Jointed LDPC codes design for half-duplex relay channels
Published 2013-03-01“…In order to increase the coding gain of decode-and-forward half-duplex relay channel, a jointed LDPC coding structure and its corresponding optimization scheme was proposed. Novel structure made the subcodes of both source and relay nodes as parts of the overall code. …”
Get full text
Article -
6754
O romance dos pais, o romance dos filhos: os personagens secundários de Alejandro Zambra
Published 2023-12-01“…According to the notion of « secondary characters » this paper aims to investigate the relations introduced by the narrator of the novel Formas de voltar para casa, (Ways to go back home), Alejandro Zambra, specially in contexts of family and school lives. …”
Get full text
Article -
6755
SUPPORT VECTOR MACHINE FOR HUMAN IDENTIFICATION BASED ON NON-FIDUCIAL FEATURES OF THE ECG
Published 2023-05-01“…Using the mean frequency, median frequency, band power, and Welch power spectral density (PSD) of ECG data, we proposed a novel biometric approach in this study. ECG signals are more secure than other traditional biometric modalities because they are impossible to forge and duplicate. …”
Get full text
Article -
6756
Axiological parameter of the image of a literary character
Published 2016-12-01“…In this article axiological parameter of the image of a literary character is considered by the example of Scarlett O'Hara, the heroine of the novel "Gone with the Wind" by M. Mitchell and its official sequel - "Scarlett" by A. …”
Get full text
Article -
6757
QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things
Published 2013-07-01“…This paper presents a novel anticollision algorithm named Query Splitting-based Anticollision (QSA) for mobile RFID-based internet-of-things. …”
Get full text
Article -
6758
A Retrospective on Nuclear Receptor Regulation of Inflammation: Lessons from GR and PPARs
Published 2011-01-01“…A better understanding of the molecular mechanism by which nuclear receptors inhibit proinflammatory signaling pathways will enable novel therapies to treat chronic inflammation.…”
Get full text
Article -
6759
Research on high security G function algorithm
Published 2019-06-01“…The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless communication system such as large capacity DFH network,which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result,in order to improve the security of the system,the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover,the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly.…”
Get full text
Article -
6760
Research progress and evolution prospect of passive internet of things communication
Published 2023-09-01“…Passive internet of things (IoT) is the fundamentally enabling technology of promoting digital transformation and upgrading of industries.In recent years, passive IoT communication technology such as radio frequency identification has been widely used in asset management fields due to its advantages of low cost, zero power consumption, and easy deployment.In this context, passive IoT communication technology and the latest research progress were introduced, the potential evolution prospects of passive IoT were analyzed.Based on that, development bottlenecks and challenges of passive IoT communication were given, a novel passive IoT communication system with deep fusion of the cellular system was presented, and the key technology research directions of this field were proposed.It is aimed to inspire new thoughts for the development of passive IoT communication technology.…”
Get full text
Article