Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6861
New Results for Periodic Solution of High-Order BAM Neural Networks with Continuously Distributed Delays and Impulses
Published 2013-01-01“…By M-matrix theory, inequality techniques, and Lyapunov functional method, certain sufficient conditions are obtained to ensure the existence, uniqueness, and global exponential stability of periodic solution for a new type of high-order BAM neural networks with continuously distributed delays and impulses. These novel conditions extend and improve some previously known results in the literature. …”
Get full text
Article -
6862
Community Detection by Node Betweenness and Similarity in Complex Network
Published 2021-01-01“…Based on previous work, the paper designs a novel algorithm from the perspective of node betweenness properties and gives the detailed steps of the algorithm and simulation results. …”
Get full text
Article -
6863
Dynamical Behaviors of the Stochastic Hopfield Neural Networks with Mixed Time Delays
Published 2013-01-01“…By employing the theory of stochastic functional differential equations and linear matrix inequality (LMI) approach, some novel criteria on asymptotic stability, ultimate boundedness, and weak attractor are derived. …”
Get full text
Article -
6864
AS-level model for restraining DoS attacks
Published 2013-09-01“…Combined with the next generation security architecture,a novel AS-level defense scheme was proposed to restrain DoS attacks in the Internet.And the deficiencies of previous capability schemes were analyzed in detail,especially on requesting/withdrawing authorization of capabilities.The scheme takes account of a congestion feedback mechanism,a combination with multi-level active queue management,and the credit computation.Then a further analysis on the scheme’s effectiveness was presented.Several experiments with NS2 and CAIDA’s topology datasets were performed to evaluate the authorizing time and traffic,the average requesting time and common file transfer time of different schemes.The results show that this scheme can effectively reduce the average requesting time of capabilities,improve common file transfer efficiency,and enhance the feasibility and robustness.…”
Get full text
Article -
6865
Design and Simulation Analysis of an Impact-resistant Flexible Joint
Published 2017-01-01“…A series elastic actuator which uses a novel torsional elasticity instead of traditional torsional spring as elastic element to make the joint more integrated is embedded between the joint motor and load. …”
Get full text
Article -
6866
Computational Tools for Cohomology of Toric Varieties
Published 2011-01-01“…Novel nonstandard techniques for the computation of cohomology classes on toric varieties are summarized. …”
Get full text
Article -
6867
Accelerated CT Sub-pixel Super Resolution
Published 2025-02-01“…Super resolution is a class of techniques used to improve the reconstruction resolution beyond the physical limitations of the detector, via pure computational methods or with novel trajectories to acquire additional data. This work characterizes an improved accelerated super resolution technique that builds upon an existing method, SubpiX, and acquires projections along a trajectory of sub-pixel detector translations. …”
Get full text
Article -
6868
A Space-Time Model for Demand in Free-Floating Carsharing Systems
Published 2023-01-01“…A novel model approach is proposed to estimate the spatiotemporal distribution of demand for free-floating carsharing. …”
Get full text
Article -
6869
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01“…In designing an access control scheme for public wireless LAN (WLAN),user privacy protection and user accountability are two conflict goals.A novel user management and access control scheme was proposed to solve this problem by utilizing the bitcoin blockchain and Intel SGX.It utilized unmodified bitcoin blockchain to manage the ownership of access credentials for users without relying on any trusted third party.It adopted Intel SGX-based mixing technology to enhance anonymity of users’ access credentials.It designed verification path rule to resolve the conflicts between the privacy-preserving and accountability objectives.The effectiveness and feasibility of the proposed scheme are also demonstrated by security analysis and performance evaluation.…”
Get full text
Article -
6870
Rule Britannia, Brexit and Cornish Identity
Published 2021-11-01“…This article returns Rule Britannia to its own political, geographical and biographical context at a time when Daphne Du Maurier’s last novel has achieved a kind of afterlife in post-2016 Brexit referendum discourse. …”
Get full text
Article -
6871
Investigation of Mechanical Properties of Basalt Particle-Filled SMC Composites
Published 2016-01-01“…Basalt particles have been investigated as a novel additive for the production of glass fibre reinforced composite using sheet moulding compound (SMC) method. …”
Get full text
Article -
6872
Control method to prevent malicious UAV intrusion into electricity inspection area
Published 2018-06-01“…In recent years,the exploitation and deployment of UAV (unmanned aerial vehicle) has grown rapidly.The number of UAV is increasing and it is becoming more and more important in many areas.For example,the power inspection method has be upgraded from the original manual inspection to unmanned intelligent inspection.However,malicious UAV intrude on the power patrol work area and also bring about safety problems to the power plant's production.Because the electronic fence technology (geo-fencing) lacks the real time and flexibility when it controls the UAV,a novel control method to prevent malicious UAV from invading the power inspection area is proposed.The experimental results demonstrate the effectivity of our proposed method.…”
Get full text
Article -
6873
Stereo Image Segmentation Based on Graph Cut and Visual Correlation
Published 2015-11-01“…Stereo image segmentation is a crucial and difficult issue in the field of object-based stereo image processing.By improving the Grabcut algorithm and exploiting the inter-view correlations,a novel stereo image segmentation scheme was proposed.The original left image was firstly transformed into a super-pixel image by improving the Slic algorithm.Then the super-pixel image was segmented and the foreground object in the left image is extracted based on the framework of Grabcut,where the energy function was rebuilt.Finally,by exploiting the inter-view correlations between the left and the right images,the foreground object in the right image was obtained based on contour correspondence by fusing color and texture features.The experimental results show that the proposed algorithm is more efficient and can achieve better segmentation results than the existing methods.…”
Get full text
Article -
6874
The Satirical Vision of Canadian/Scottish Songwriter, Poet, and Novelist Graeme Williamson
Published 2022-04-01“…This paper will analyse several of Williamson’s song lyrics, poems, short stories, and his novel, Strange Faith, to show how his writing presents a critical view of modern society.…”
Get full text
Article -
6875
Time-frequency analysis of freqency-hopping signals based on sparse recovery
Published 2013-05-01“…To overcome the common shortcomings shared by the existing methods: weak suppression noise interference and feeble performance of time-frequency concentration,a novel time-frequency analysis method based on sparse repre-sentation was developed,which could get clear and concentrate time-frequency representation.Firstly,the unconstrained sparse representation model of FH signals was established according to the punish function theory.Then,the guideline of punish parameters were analysed theoretically and got time-frequency representation by sloving the optimization problem used approximate l<sub>0</sub>norm finally.The simulation results show that this method is capable of getting clear time-frequency pattern.…”
Get full text
Article -
6876
Tractable yet effective approximation to directional antenna array for millimeter-wave networks
Published 2018-12-01“…The complexity of the actual antenna pattern imposes restrictions on investigating the benefits of directional antenna arrays in large-scale networks.Hence,a novel multi-level flat-top antenna pattern was proposed to approximate and simplify the actual one and was applied in millimeter-wave cellular networks for performance analysis.To fully characterize the impact of the directional antenna array on the user performance,stochastic geometry was adopted to establish an analytical framework for millimeter-wave cellular networks and derive the coverage probability and transmission rate of the typical user with the proposed multi-level flat-top antenna pattern,including the exact and bounding expressions.The simulation results show that the proposed antenna pattern provides a better tradeoff between the accuracy and tractability than previous patterns.…”
Get full text
Article -
6877
Chronic Constipation: Current Management and Challenges
Published 2011-01-01“…This holds especially true for patients who fail an initial treatment. With promising novel drugs either close to approval for the Canadian market or on the horizon, many of these unmet needs may be addressed. …”
Get full text
Article -
6878
Le Flaubert de Claude Simon
Published 2017-12-01“…Examining in his works or interviews the explicit references to Flaubert, allusions or re-writings sometimes difficult to detect in his novels, this article strives to define both the place from which Claude Simon wants to write, and his particular positioning with respect to other authors who renewed the novel’s formulas by defending various solutions of the nouveau roman. …”
Get full text
Article -
6879
Présentations de Londres : Ackroyd, Moorcock, Sinclair et l’éthique de l’adjacence
Published 2009-12-01“…This article focuses on three contemporary novels that are emblematic of the canon of the contemporary London novel: Peter Ackroyd’s Hawksmoor, Michael Moorcock’s Mother London and Iain Sinclair’s White Chappell, Scarlet Tracings. …”
Get full text
Article -
6880
A Computational Approach towards the Development of Newer Anticancer Agents
Published 2010-01-01“…In silico molecular docking analyses of the novel 1-(2', 4'-dihydroxy-5'-chlorophenyl)-3-aryl-propane-1, 3-diones were performed in the active sites of enzyme cytochrome P450 reductase to obtain new anticancer agents computationally. 1-(2', 4'-dihydroxy-5'-chlorophenyl)-3-(4"-methoxy-phenyl)-propane-1, 3-dione (3f) was found to have maximum affinity for the active sites of enzyme.…”
Get full text
Article