Suggested Topics within your search.
Suggested Topics within your search.
- Sociolinguistics 4
- Criminal law 3
- Philosophy 3
- Effective teaching 2
- Elementary school teaching 2
- English language 2
- History 2
- History and criticism 2
- Rhetoric 2
- Academic writing 1
- African American psychologists 1
- Anatomy 1
- Anthropometry 1
- Benefactors 1
- Black people 1
- Clinical cases 1
- Consumers 1
- Consumption (Economics) 1
- Criticism 1
- Diabetes 1
- Diabetes Mellitus, Type 2 1
- Dissertations, Academic 1
- Economics 1
- Electrocardiography 1
- English 1
- Ethnopsychology 1
- Etiology 1
- Ex-convicts 1
- Fathers and sons 1
- Genanalyse 1
-
961
Validation of polymorphic Gompertzian model of cancer through in vitro and in vivo data.
Published 2025-01-01“…Additionally, for the in vivo data of tumor dynamics in patients undergoing treatment, we compare the goodness of fit of the polymorphic Gompertzian model to that of the classical oncologic models, which were previously identified as the models that fit this data best. …”
Get full text
Article -
962
Time as a Founding Factor in Architectural Thought
Published 2023-12-01“… The research dealt with the concepts of time and architectural thought and the extent of the influence of Ideas derived from the element of time on the variation and differentiation of architectural movements and schools, by reviewing a group of vocabulary such as nostalgia, present, and looking forward to the future, the null of the present and immortality in architecture and the null or deferred future, and the study of the duration of its reflection on architectural thought to lead to the differentiation of each of the architecture of Mesopotamia, Classical architecture, Modern architecture, Post-modernism, and Autonomous architecture, Deconstruction architecture according to these terms. …”
Get full text
Article -
963
Statistical mechanics and machine learning of the α-Rényi ensemble
Published 2025-01-01“…We study the statistical physics of the classical Ising model in the so-called α-Rényi ensemble, a finite-temperature thermal state approximation that minimizes a modified free energy based on the α-Rényi entropy. …”
Get full text
Article -
964
High-NOON States with High Flux of Photons Using Coherent Beam Stimulated Noncollinear Parametric Down Conversion
Published 2019-01-01“…The scheme is based on higher-order interference between “quantum” down-converted light and “classical” coherent light. However, this requires optimizing the amplitude ratio of classical to quantum light, thereby limiting the overall count rate for the interferometric super-resolution signal. …”
Get full text
Article -
965
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…Abstract The authors present a classical polynomial‐time attack against the branching program obfuscator of Fernando–Rasmussen–Sahai (for short FRS, Asiacrypt’17) (with one zerotest parameter), which is robust against all known classical cryptanalyses on obfuscators when instantiated with the CLT13 multilinear map. …”
Get full text
Article -
966
LIGHTWEIGHT OPTIMIZATION OF THE AUTOMOBILE FRONT AXLE BASED ON THE IMPROVED MANTA RAY FORAGING ALGORITHM (MT)
Published 2023-01-01“…In order to improve the convergence speed and accuracy of the automobile front axle lightweight, an improved manta ray algorithm based on manta ray self-defense strategy is proposed. Six classical benchmark functions are used to verify the performance of the improved manta ray algorithm. …”
Get full text
Article -
967
Succinct scheme of DCT coefficient selection towards enhanced security of JPEG image steganography
Published 2016-09-01“…Based on the characteristics of JPEG compression,a succinct and effective scheme of DCT coefficients selection was proposed,in which not only the non-zero AC coefficients but also part of the zero coefficients were exploited.Moreover,the scheme embedded messages in a different order than the conventional practice and gave priority to the low frequency coefficients so as to achieve enhanced security.The embedding manners of two typical steganographic algorithms(EPES and APPM)were extended from the spatial to the compression domain and the proposed scheme was applied to them for coefficient selection and embedding.Experimental results showed that larger capacity and better security were achieved compare to three classical steganographic algorithms(JSteg,F5 and nsF5)and one current steganographic algorithm based on STC framework(LPD).The proposed coefficient se-lection and embedding scheme can effectively improved the performance of some classic DCT domain steg-anographic methods in terms of capacity and security.The scheme was general and could be easily applied to dif-ferent steganography methods.…”
Get full text
Article -
968
Good and Justice in the Context of Environmental Ethics
Published 2022-03-01“…The concepts of classical and modern scientists are also analyzed. …”
Get full text
Article -
969
Markov Switching Model Analysis of Implied Volatility for Market Indexes with Applications to S&P 500 and DAX
Published 2014-01-01“…Then the classical approach shall be tested on data taken from the Standard & Poor’s 500 and the Deutsche Aktien Index series of returns in different time periods. …”
Get full text
Article -
970
Nonprotein Structures from Mycobacteria: Emerging Actors for Tuberculosis Control
Published 2012-01-01“…For many decades, consistent to classical biochemistry, most studies regarding immunity to the tubercle bacilli focused mainly on protein structures. …”
Get full text
Article -
971
Clustering Algorithm for Urban Taxi Carpooling Vehicle Based on Data Field Energy
Published 2018-01-01“…The clustering results of the proposed algorithm are better than those of the classical clustering algorithm. In the case of cluster numbers 25, 249, 409, and 599, the algorithm has good clustering results for the taxi trajectory dataset with certain regularity in space distribution and irregular distribution in time distribution. …”
Get full text
Article -
972
Efficient i-DFA construction algorithm based on state grouping
Published 2013-08-01“…Regular expression matching plays an important role in many network and security applications.DFA is the preferred representation to perform regular expression matching in high-speed network,because of its high and stable matching efficiency.However,DFA may experience state explosion,and thus consume huge memory space.As a classical solution for the problem of state explosion,i-DFA can reduce the memory consumption significantly and guarantee the worst matching performance at the same time.However,prior methods are inefficient in both time and space during the construction of i-DFA.An efficient i-DFA construction algorithm based on the idea of state grouping was proposed.Furthermore,a formal description for the problem of state grouping was given,and it was proved that it was NP-hard to get the best state grouping result.Thus,based on local search strategy,a near-optimal algorithm was introduced to divide states into different groups.Compared with the classical construction method,the significant improvement in both time and space is achieved; the i-DFA of the proposed method may have 2/3 states as that of prior method and the proposed i-DFA is constructed with only 1/16 time of it.…”
Get full text
Article -
973
Noether and partial Noether approach for the nonlinear (3+1)-dimensional elastic wave equations.
Published 2025-01-01“…For the conservation laws, we applied Noether's theorem to the nonlinear elastic wave equations owing to the availability of a classical Lagrangian. However, for the damped version, we cannot obtain a classical Lagrangian, which makes Noether's theorem inapplicable. …”
Get full text
Article -
974
Modeling Drug Concentration Level in Blood Using Fractional Differential Equation Based on Psi-Caputo Derivative
Published 2022-01-01“…The second best is the simple fractional method whose MSE is 0.04116 and, finally, the classical approach with an MSE of 0.048640.…”
Get full text
Article -
975
A Multiroute Signal Control Model considering Coordination Rate of Green Bandwidth
Published 2021-01-01“…Oriented to characteristics of the inflow and outflow of routes in urban road network, we modified the classical fundamental green wave bandwidth model, in which separate turning green wave band is available for traffic flow from subarterials merging into an arterial, and this variable green wave band can be more flexible to service the commuting traffic. …”
Get full text
Article -
976
Shortwave multichannel information fusion method based on DSmT evidence discount theory
Published 2024-03-01“…In response to the problem of poor performance of classical fusion methods in combining multiple shortwave channel information due to the complexity and harshness of shortwave channels and prominent conflicts among channel in-formation, a shortwave multi-channel information fusion method based on the DSmT evidence discounting theory was pro-posed.The DSmT evidence discounting theory was employed as the fusion framework to achieve fusion, inference, and de-cision-making of multiple shortwave channel information.Firstly, the relative envelope standard deviation of the OFDM frame was normalized, and the discount weight was calculated through the relative envelope standard deviation and the dis-count factor.Then, the bit soft information extraction function was used to obtain the bit probability, which was quantita-tively assigned to the basic belief assignment function as evidence.Finally, the PCR6 fusion rule was applied to fuse, infer, and make decisions on the soft information from multiple channels.Simulation experiments comparing the proposed method with classical fusion methods under various channel conditions and modulation schemes indicate significant gains in bit error rate and packet error.…”
Get full text
Article -
977
Enhancing Scalability of Quantum Eigenvalue Transformation of Unitary Matrices for Ground State Preparation through Adaptive Finer Filtering
Published 2025-02-01“…Hamiltonian simulation is a domain where quantum computers have the potential to outperform their classical counterparts. One of the main challenges of such quantum algorithms is increasing the system size, which is necessary to achieve meaningful quantum advantage. …”
Get full text
Article -
978
Continuous dependence of solutions in magneto-elasticity theory
Published 2003-01-01“…We use logarithmic convexity arguments similar to those of Ames and Straughan (1992) in classical thermoelasticity.…”
Get full text
Article -
979
An Extension of Wright Function and Its Properties
Published 2015-01-01“…The paper is devoted to the study of the function Wα,βγ,δ(z), which is an extension of the classical Wright function and Kummer confluent hypergeometric function. …”
Get full text
Article -
980
Matrix transformations of starshaped sequences
Published 2001-01-01“…Also, we discuss the nature of the mappings of starshaped sequences by some classical matrices.…”
Get full text
Article