Showing 6,861 - 6,880 results of 19,871 for search '"*** (novel)"', query time: 0.09s Refine Results
  1. 6861

    New Results for Periodic Solution of High-Order BAM Neural Networks with Continuously Distributed Delays and Impulses by Chang-Bo Yang, Ting-Zhu Huang, Jin-Liang Shao

    Published 2013-01-01
    “…By M-matrix theory, inequality techniques, and Lyapunov functional method, certain sufficient conditions are obtained to ensure the existence, uniqueness, and global exponential stability of periodic solution for a new type of high-order BAM neural networks with continuously distributed delays and impulses. These novel conditions extend and improve some previously known results in the literature. …”
    Get full text
    Article
  2. 6862

    Community Detection by Node Betweenness and Similarity in Complex Network by Chong Feng, Jianxu Ye, Jianlu Hu, Hui Lin Yuan

    Published 2021-01-01
    “…Based on previous work, the paper designs a novel algorithm from the perspective of node betweenness properties and gives the detailed steps of the algorithm and simulation results. …”
    Get full text
    Article
  3. 6863

    Dynamical Behaviors of the Stochastic Hopfield Neural Networks with Mixed Time Delays by Li Wan, Qinghua Zhou, Zhigang Zhou, Pei Wang

    Published 2013-01-01
    “…By employing the theory of stochastic functional differential equations and linear matrix inequality (LMI) approach, some novel criteria on asymptotic stability, ultimate boundedness, and weak attractor are derived. …”
    Get full text
    Article
  4. 6864

    AS-level model for restraining DoS attacks by Xian-liang JIANG, Guang JIN, Jian-gang YANG, Jia-ming HE

    Published 2013-09-01
    “…Combined with the next generation security architecture,a novel AS-level defense scheme was proposed to restrain DoS attacks in the Internet.And the deficiencies of previous capability schemes were analyzed in detail,especially on requesting/withdrawing authorization of capabilities.The scheme takes account of a congestion feedback mechanism,a combination with multi-level active queue management,and the credit computation.Then a further analysis on the scheme’s effectiveness was presented.Several experiments with NS2 and CAIDA’s topology datasets were performed to evaluate the authorizing time and traffic,the average requesting time and common file transfer time of different schemes.The results show that this scheme can effectively reduce the average requesting time of capabilities,improve common file transfer efficiency,and enhance the feasibility and robustness.…”
    Get full text
    Article
  5. 6865

    Design and Simulation Analysis of an Impact-resistant Flexible Joint by Li Yang, Cui Shipeng, Liu Yiwei

    Published 2017-01-01
    “…A series elastic actuator which uses a novel torsional elasticity instead of traditional torsional spring as elastic element to make the joint more integrated is embedded between the joint motor and load. …”
    Get full text
    Article
  6. 6866

    Computational Tools for Cohomology of Toric Varieties by Ralph Blumenhagen, Benjamin Jurke, Thorsten Rahn

    Published 2011-01-01
    “…Novel nonstandard techniques for the computation of cohomology classes on toric varieties are summarized. …”
    Get full text
    Article
  7. 6867

    Accelerated CT Sub-pixel Super Resolution by Lucas Determan, Kirk Busche, Pradeep Bhattad

    Published 2025-02-01
    “…Super resolution is a class of techniques used to improve the reconstruction resolution beyond the physical limitations of the detector, via pure computational methods or with novel trajectories to acquire additional data. This work characterizes an improved accelerated super resolution technique that builds upon an existing method, SubpiX, and acquires projections along a trajectory of sub-pixel detector translations. …”
    Get full text
    Article
  8. 6868

    A Space-Time Model for Demand in Free-Floating Carsharing Systems by Reto Bürgin, Corrado Muratori, Mireia Roca-Riu, Christoph Heitz

    Published 2023-01-01
    “…A novel model approach is proposed to estimate the spatiotemporal distribution of demand for free-floating carsharing. …”
    Get full text
    Article
  9. 6869

    Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain by Yukun NIU, Lingbo WEI, Chi ZHANG, Xia ZHANG, Vejarano Gustavo

    Published 2020-04-01
    “…In designing an access control scheme for public wireless LAN (WLAN),user privacy protection and user accountability are two conflict goals.A novel user management and access control scheme was proposed to solve this problem by utilizing the bitcoin blockchain and Intel SGX.It utilized unmodified bitcoin blockchain to manage the ownership of access credentials for users without relying on any trusted third party.It adopted Intel SGX-based mixing technology to enhance anonymity of users’ access credentials.It designed verification path rule to resolve the conflicts between the privacy-preserving and accountability objectives.The effectiveness and feasibility of the proposed scheme are also demonstrated by security analysis and performance evaluation.…”
    Get full text
    Article
  10. 6870

    Rule Britannia, Brexit and Cornish Identity by Ella Westland

    Published 2021-11-01
    “…This article returns Rule Britannia to its own political, geographical and biographical context at a time when Daphne Du Maurier’s last novel has achieved a kind of afterlife in post-2016 Brexit referendum discourse. …”
    Get full text
    Article
  11. 6871

    Investigation of Mechanical Properties of Basalt Particle-Filled SMC Composites by Kadir Cavdar, Mahmut Bingol

    Published 2016-01-01
    “…Basalt particles have been investigated as a novel additive for the production of glass fibre reinforced composite using sheet moulding compound (SMC) method. …”
    Get full text
    Article
  12. 6872

    Control method to prevent malicious UAV intrusion into electricity inspection area by Peng WANG, Xiaolong HAO, Yaokang ZHU, Guang YANG, Yang CUI, Qiwei PENG, Daojing HE

    Published 2018-06-01
    “…In recent years,the exploitation and deployment of UAV (unmanned aerial vehicle) has grown rapidly.The number of UAV is increasing and it is becoming more and more important in many areas.For example,the power inspection method has be upgraded from the original manual inspection to unmanned intelligent inspection.However,malicious UAV intrude on the power patrol work area and also bring about safety problems to the power plant's production.Because the electronic fence technology (geo-fencing) lacks the real time and flexibility when it controls the UAV,a novel control method to prevent malicious UAV from invading the power inspection area is proposed.The experimental results demonstrate the effectivity of our proposed method.…”
    Get full text
    Article
  13. 6873

    Stereo Image Segmentation Based on Graph Cut and Visual Correlation by Qingyan Dai, Zhongjie Zhu

    Published 2015-11-01
    “…Stereo image segmentation is a crucial and difficult issue in the field of object-based stereo image processing.By improving the Grabcut algorithm and exploiting the inter-view correlations,a novel stereo image segmentation scheme was proposed.The original left image was firstly transformed into a super-pixel image by improving the Slic algorithm.Then the super-pixel image was segmented and the foreground object in the left image is extracted based on the framework of Grabcut,where the energy function was rebuilt.Finally,by exploiting the inter-view correlations between the left and the right images,the foreground object in the right image was obtained based on contour correspondence by fusing color and texture features.The experimental results show that the proposed algorithm is more efficient and can achieve better segmentation results than the existing methods.…”
    Get full text
    Article
  14. 6874

    The Satirical Vision of Canadian/Scottish Songwriter, Poet, and Novelist Graeme Williamson by Victor Kennedy

    Published 2022-04-01
    “…This paper will analyse several of Williamson’s song lyrics, poems, short stories, and his novel, Strange Faith, to show how his writing presents a critical view of modern society.…”
    Get full text
    Article
  15. 6875

    Time-frequency analysis of freqency-hopping signals based on sparse recovery by Zhi-chao SHA, Zhi-tao HUANG, Yi-yu ZHOU, Jun-hua WANG

    Published 2013-05-01
    “…To overcome the common shortcomings shared by the existing methods: weak suppression noise interference and feeble performance of time-frequency concentration,a novel time-frequency analysis method based on sparse repre-sentation was developed,which could get clear and concentrate time-frequency representation.Firstly,the unconstrained sparse representation model of FH signals was established according to the punish function theory.Then,the guideline of punish parameters were analysed theoretically and got time-frequency representation by sloving the optimization problem used approximate l<sub>0</sub>norm finally.The simulation results show that this method is capable of getting clear time-frequency pattern.…”
    Get full text
    Article
  16. 6876

    Tractable yet effective approximation to directional antenna array for millimeter-wave networks by Na DENG, Haichao WEI

    Published 2018-12-01
    “…The complexity of the actual antenna pattern imposes restrictions on investigating the benefits of directional antenna arrays in large-scale networks.Hence,a novel multi-level flat-top antenna pattern was proposed to approximate and simplify the actual one and was applied in millimeter-wave cellular networks for performance analysis.To fully characterize the impact of the directional antenna array on the user performance,stochastic geometry was adopted to establish an analytical framework for millimeter-wave cellular networks and derive the coverage probability and transmission rate of the typical user with the proposed multi-level flat-top antenna pattern,including the exact and bounding expressions.The simulation results show that the proposed antenna pattern provides a better tradeoff between the accuracy and tractability than previous patterns.…”
    Get full text
    Article
  17. 6877

    Chronic Constipation: Current Management and Challenges by Martin Storr

    Published 2011-01-01
    “…This holds especially true for patients who fail an initial treatment. With promising novel drugs either close to approval for the Canadian market or on the horizon, many of these unmet needs may be addressed. …”
    Get full text
    Article
  18. 6878

    Le Flaubert de Claude Simon by Gisèle Séginger

    Published 2017-12-01
    “…Examining in his works or interviews the explicit references to Flaubert, allusions or re-writings sometimes difficult to detect in his novels, this article strives to define both the place from which Claude Simon wants to write, and his particular positioning with respect to other authors who renewed the novel’s formulas by defending various solutions of the nouveau roman. …”
    Get full text
    Article
  19. 6879

    Présentations de Londres : Ackroyd, Moorcock, Sinclair et l’éthique de l’adjacence by Jean-Michel Ganteau

    Published 2009-12-01
    “…This article focuses on three contemporary novels that are emblematic of the canon of the contemporary London novel: Peter Ackroyd’s Hawksmoor, Michael Moorcock’s Mother London and Iain Sinclair’s White Chappell, Scarlet Tracings. …”
    Get full text
    Article
  20. 6880

    A Computational Approach towards the Development of Newer Anticancer Agents by Javed I. Sheikh, H. D. Juneja, V. N. Ingle

    Published 2010-01-01
    “…In silico molecular docking analyses of the novel 1-(2', 4'-dihydroxy-5'-chlorophenyl)-3-aryl-propane-1, 3-diones were performed in the active sites of enzyme cytochrome P450 reductase to obtain new anticancer agents computationally. 1-(2', 4'-dihydroxy-5'-chlorophenyl)-3-(4"-methoxy-phenyl)-propane-1, 3-dione (3f) was found to have maximum affinity for the active sites of enzyme.…”
    Get full text
    Article