Suggested Topics within your search.
Suggested Topics within your search.
- History 61
- English language 32
- Management 23
- Research 23
- methods 22
- Politics and government 20
- Rhetoric 19
- Study and teaching 19
- Methodology 17
- Report writing 17
- Social aspects 17
- Moral and ethical aspects 15
- Social conditions 15
- Economic conditions 14
- Economic development 14
- Economic policy 14
- Law 14
- Philosophy 14
- Grammar 13
- History and criticism 12
- Anesthesia 11
- Mass media 11
- Constitutional court 10
- Biochemistry 9
- Court of Appeal 9
- Handbooks, manuals, etc 9
- Law reports, digests, etc 9
- Psychological aspects 9
- Education 8
- Medicine 8
-
419881
Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case
Published 2020-10-01“…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
Get full text
Article -
419882
Design Mixers to Minimize Effects of Erosion and Corrosion Erosion
Published 2012-01-01“…A thorough review of the major parameters that affect solid-liquid slurry wear on impellers and techniques for minimizing wear is presented. …”
Get full text
Article -
419883
Bandwidth extension method based on nonlinear audio characteristics classification
Published 2013-08-01“…A bandwidth extension method based on audio classification was proposed.Time series of audio signals were classified into four types based on recurrence plot and recurrence quantification analysis,and the fine spectrums were recovered by taking advantage of four methods respectively.In addition,the spectrum envelope and energy gain were adjusted by Gaussian mixture model and codebook mapping on the basis of soft decision respectively.Subjective and objective testing results indicate that the proposed method has good quality compared with conventional blind bandwidth extension methods,and the performance of ITU-T G.722.1 codec with the proposed algorithm is better than that of G.722.1C codec at the same bit rate.…”
Get full text
Article -
419884
Pilot based channel estimation in amplify-and-forward MIMO relay networks
Published 2014-09-01“…A channel estimation method in two time slots for two-hop amplify-and-forward MIMO relay channels is pro-posed.An algorithm for computing the optimal pair of source pilot and relay amplify matrix is developed,which mini-mizes the mean square error of the source-to-relay channel estimation subject to both power constraints at the source and the relay.The signal matrices are decomposed into unitary components and diagonal components.Then the bisection method is used to obtain the optimal diagonal components of the source pilot and the relay amplified matrix.The simula-tion results show that the proposed method has no ambiguity in the channel estimates.The effects of the channel correla-tion and the number of antennas on the performance of channel estimation are also analyed.…”
Get full text
Article -
419885
Study of wireless experiment platform in 60 GHz
Published 2016-03-01“…A scheme of 60 GHz wireless experimental platform was presented.The platform was made up of NI USRP(transceiver module),NetFPGA(data processing module)and PC(control module).NI USRP was connected with NetFPGA by Gigabit Nthernet interfaces,while NetFPGA was connected with PC by PCI-bus.This experiment platform works on Linux with the help of LabVIEW.The transceiver and data process module are reprogrammable.Many operations such as data stream capturing,classification and speed limit could be done with Linux and PCI.The platform has good performances in open-ended and expansibility.That would be convenient for farther research in channel modeling,timeslot allocation and multiple access algorithms.…”
Get full text
Article -
419886
Minimal coding cost and low delay multicast routing of wireless mesh networks
Published 2016-01-01“…A minimal network coding cost and low delay multicast routing (MNCLDMR)of wireless mesh networks was presented. …”
Get full text
Article -
419887
Centralized base station sleep algorithm based on non-neighbor relation clustering in dense heterogeneous networks
Published 2018-05-01“…A centralized base station sleeping algorithm based on non-neighbor relation clustering was proposed for dense heterogeneous networks.Firstly,based on the non-neighbor relationship criterion,the low power base stations with no direct switching relationship were clustered into several groups.Then,the low power base station running mode decision mechanism and possible base station sleeping decision mechanism was set according to the energy efficiency mean of base station in each cluster and the position relations between the users and the base station.At last,all clusters run the decision mechanism of inner cluster according to the order of the implementation of sleeping algorithm.The simulation results show that the proposed algorithm has satisfactory network performance.…”
Get full text
Article -
419888
RSU-coordinated multichannel MAC protocol in vehicular ad hoc network
Published 2018-11-01“…A road side unit (RSU)-coordinated multichannel media access control (MAC) (RMM) protocol was proposed in vehicular ad hoc network,which aimed to improve the transmission efficiency of non-safety messages.Under the coordination of RSU,nodes had more opportunities to make SCH reservations on control channel,and the contention-free message transmissions were thus realized.The proposed RMM protocol could use the service channel during the whole synchronization interval for non-safety message transmissions,and thus the saturated network throughput and channel utilization were improved,and the transmission delay was reduced.Compared with other existing protocols,extensive analysis and simulation results demonstrate the superiority of the RMM protocol.…”
Get full text
Article -
419889
Task distribution algorithm based on community in mobile crowd sensing
Published 2019-10-01“…A community-based task distribution algorithm was proposed to solve the problem of the validity of mobile crowd sensing (MCS) task distribution.By calculating the minimum spanning tree (MST),the connection parameter (CP) and the community convergence degree (CI) between the mobile nodes,the behavior patterns of the users were abstracted and identified to rationally divide the nodes into different communities.Then,the eigenvalue matching degree of the community behavior patterns with the sensing task was calculated.According to the matching degree,the distribution of the corresponding tasks was completed by the central node of the community.The simulation results show that the proposed method can effectively improve the accuracy of the task distribution and the task completion rate,and save the time cost of the task completion.…”
Get full text
Article -
419890
On coding over the spatial-temporal diversity for reliable transmission scheme in low-duty-cycle WSN
Published 2012-06-01“…A reliable data delivery scheme for low-duty-cycle wireless sensor networks(WSN)was proposed.Using this scheme,the unique spatial-temporal diversity in low-duty-cycle WSN was explored and exploited.Combining with coding schemes,the proposed scheme could achieve higher energy efficiency and lower delivery delay.The coding block allocation problem over multiple paths was formulated.As it was NP-hard,an approximate algorithm to tackle this difficulty was proposed.The impact of network parameters was further analyzed with experimental methods.Extensive simulations also show that,the coding over the spatial-temporal diversity scheme could achieve relatively reliable and low delay delivery with relatively less energy.…”
Get full text
Article -
419891
Grid chaotic attractors based on arc tangent and its secure communication
Published 2014-12-01“…A smooth arc tangent function series approach for creating multi-directional multi-scroll grid chaotic attractors was proposed,including one-directional n-scroll,two-directional n×m-grid scroll,and three-directional n×m×l-grid scroll chaotic attractors.The chotic properties were studied by equilibrium points analysis,numerical simulation,Lyapunov exponents spectrum,bifurcation diagrams and Poincaré section diagrams.Synchronize the two grid multi-scroll chaotic systems with same structure by designing simple linear feedback control lows,which is applied to secure communication.The effectiveness of this method has been verified by simple analysis and numerical simulation.…”
Get full text
Article -
419892
Molecular Identification of Enterocytozoon bieneusi Isolates from Nigerian Children
Published 2011-01-01“…A study was conducted to detect and identify enteric microsporidian species in 43 children from Oyo state, Nigeria. …”
Get full text
Article -
419893
Nonlinear distortion compensation algorithm aided by channel estimation of memoryless power amplifier for OTFS receiver
Published 2022-12-01“…A compensation algorithm for OTFS receiver was proposed to solve the problem of transmission signal distortion caused by the nonlinear characteristics of power amplifier (PA) in the orthogonal time frequency space (OTFS) system.The channel state information was estimated by Bussgang theorem combined with the complex coefficient polynomial of PA and the average energy of the distortion term.Based on it, the transmitted signal was reconstructed with distortion term and the estimated value was updated for the polynomial normalization.Furthermore, the iterative zero-forcing equalization algorithm was employed to complete adaptive compensation analysis of the nonlinear distortion at the receiver.The results show that the nonlinear influence on transmission signals is reduced, which caused by Saleh and Rapp models, and BER performance of OTFS system is improved effectively.…”
Get full text
Article -
419894
Diagnosis of Cellulitis in the Immunocompromised Host
Published 1990-01-01“…A prospective study of diagnostic techniques in cellulitis was performed on 28 patients with malignancy. …”
Get full text
Article -
419895
Location fingerprint optimization based access point deployment in indoor WLAN localization
Published 2015-11-01“…A novel access point (AP) deployment approach by optimizing the location fingerprints in indoor WLAN localization was proposed.Firstly,constructing the water-filling optimization model based on the maximum of the Euclidean distance of RSS between every two location fingerprints.Secoudly,after the process of the iterative cross-zero adjustment and discrete adjustment,the nonnegative and discrete weights of candidate AP locations were obtained.Finally,by using the criterion of maximum average weight,the APs,and consequently optimize the location fingerprints were deployed rationally.The experimental results demonstrate that the proposed approach is able to achieve high location fingerprint based localization precision,as well as consume low time overhead involved in the optimal AP location searching.…”
Get full text
Article -
419896
Image saliency detection in wavelet domain based on the contrast sensitivity function
Published 2015-10-01“…A method of high definition saliency detection based on contrast sensitive function and wavelet analysis was proposed in order to improve the resolution of saliency maps.Original image was filtered by contrast sensitive function in YCbCr space,which could simulate the contrast of human eyes; then wavelet decomposition was carried out in Y,Cb,and Cr three channels individually,low frequency and high frequency feature saliency maps were extracted and further combined to obtain saliency map in single channel; finally saliency maps in three channels were fused to the high resolution saliency map.Experiments result show that the saliency images have high resolution,well-defined boundaries,and whole highlight salient objects.…”
Get full text
Article -
419897
Optimal coalition structure generation strategy in multi-task concurrent edge computing environment
Published 2023-02-01“…A discrete recent past-position updating strategy based m-ary discrete particle swarm optimization (MDPSO-DRPPUS) algorithm was proposed for the problem of large search space and low efficiency when solving the optimal coalition structure.First, the coalition structure with index-based was coded.Then, the multi-objective optimization problem was transformed into an eigenvalue function of the coalition structure.Finally, the optimal coalition structure was searched by using the MDPSO-DRPPUS algorithm.Experiments show that compared with the m-ary discrete particle swarm optimization (MDPSO) algorithm and genetic algorithm (GA), the proposed algorithm dramatically reduces the average running time, and improves the efficiency and equilibrium of the coalition structure and task completion efficiency of edge nodes.…”
Get full text
Article -
419898
Nonlinear robust precoding for coordinated multipoint transmission
Published 2015-10-01“…A nonlinear robust precoding algorithm was proposed,which redesigned the feedback matrix,the forward matrix and the scaling matrix of the traditional tomlinson-harashima precoding algorithm based on the statistical characteristics of the downlink channel state information errors.Simulation results show that the nonlinear robust precoding algorithm can achieve better performance than the traditional linear and nonlinear precoding algorithms when the downlink channel state information errors exist.Due to the different downlink channel state information errors between user equipments in the coordinated multi-point transmission,the traditional “best-first” ordering algorithm was invalid.So an improved ordering algorithm was proposed to reduce the average bit error rate of the nonlinear robust precoding algorithm.…”
Get full text
Article -
419899
Virtual machine placement algorithm based on cuckoo search
Published 2017-10-01“…A cuckoo search algorithm was introduced for virtual machine placement.Firstly,the virtual machine placement program was mapped to the nest,and according to the level,the fitness would be divided into top and bottom nest.Secondly,the bottom nest and the top nest were disturbed by the disturbance function.Finally,by selecting,iterations got the best placement scheme.The algorithm was used for physical integration of cloud data centers,minimizing the number of physical machines placed.The algorithm is simulated by Cloudsim and the results show that the proposed method not only avoids the local optimum,but also has higher performance advantages than the reordered grouping genetic algorithm,the group genetic algorithm,the improved least load algorithm and the improved first fit decrease algorithm.…”
Get full text
Article -
419900
Storage system of power grid enterprise based on PBFT blockchain technology
Published 2021-02-01“…A blockchain technology based on practical Byzantine fault tolerance (PBFT)algorithm was proposed.First of all, the traditional practical Byzantine fault tolerant algorithm was explained.The traditional algorithm included six phases: pre-stage, demand, pre-preparation, preparation, confirmation, and response.However, traditional algorithms had the disadvantages of poor real-time performance, lack of penalty mechanisms, and high bandwidth.In response to these problems, the traditional algorithm was improved, which specifically involved the accounting node, the consensus process, and the view switching process.The feasibility of the improved algorithm was further proved by testing.Applying this algorithm to power grid enterprises, the federal reserve system was implemented by the constructedvirtual warehouse, which also reduced the consumption of inventory funds.And the efficiency of inventory management in power grid enterprises was improved.…”
Get full text
Article