Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 13
- methods 13
- History 6
- Human anatomy 5
- Management 5
- Orthopedics 5
- Research 5
- Abdomen 4
- Anatomy 4
- Chest 4
- Dissection 4
- Extremities (Anatomy) 4
- Methodology 4
- Social aspects 4
- Study and teaching 4
- Anesthesia 3
- Design 3
- Education 3
- English language 3
- Examinations 3
- General 3
- Marketing 3
- Organizational behavior 3
- Physical diagnosis 3
- Social conditions 3
- Sports medicine 3
- Women 3
- 44.83 rheumatology, orthopedics 2
- Academic writing 2
- Anesthetics 2
-
1161
A peak-to-average power ratio reduction method for mixed-numerology multi-carrier systems
Published 2023-10-01“…In order to support diverse service demands of communication scenarios, 5G adopts the mixed-numerology system based on orthogonal frequency division multiplexing (OFDM).The mixed-numerology systems still have the problem of high peak-to-average power ratio (PAPR).Furthermore, its design structure makes it difficult to apply traditional PAPR suppression methods straight forwardly, in which mixed signals are generated by superimposing multiple sub-signals with different parameters.An optimization model for minimizing PAPR in mixed-numerology systems was established based on tone reservation method.Utilizing the characteristic of single-peak of time-domain kernel, the multiple copies were generated in different numerologies based on the peak position of the mixed signal.The mixed time-domain kernel was then superimposed to reduce the peaks of the mixed signal.Since the proposed algorithm didn’t require inverse fast Fourier transform (IFFT)/ fast Fourier transform (FFT) operations during iteration, it had relatively low computational complexity.Simulation results show that the proposed algorithm effectively reduces the PAPR of mixed signals.…”
Get full text
Article -
1162
Evaluation and Testing in Operational Environments: Accelerating Development Cycles for Maritime Unmanned Systems
Published 2024-12-01“…SoS will have both and fast development scales, thus requiring fast development models that can only be achieved by streamlining modeling, simulation, and operational experimentation processes.…”
Get full text
Article -
1163
Improving the Sound Source Identification Performance of Sparsity Constrained Deconvolution Beamforming Utilizing SFISTA
Published 2020-01-01“…In this paper, an alternative sparsity constrained deconvolution beamforming utilizing the smoothing fast iterative shrinkage-thresholding algorithm (SFISTA) is proposed for sound source identification. …”
Get full text
Article -
1164
Forest defoliation scenarios
Published 2006-10-01“…These changes in scale of the state variables result in fast dynamics not associated with the time scales. …”
Get full text
Article -
1165
Option Pricing under Two-Factor Stochastic Volatility Jump-Diffusion Model
Published 2020-01-01“…We derive a semianalytical formula for European vanilla option and develop a fast and accurate numerical algorithm for the computation of the option prices using the fast Fourier transform (FFT) technique. …”
Get full text
Article -
1166
Automatic classification of mobile apps to ensure safe usage for adolescents.
Published 2025-01-01“…With the imminent arrival of fast internet (6G), offering increased bandwidth and reduced latency compared to its predecessor (5G), real-time streaming of high-quality video and audio to mobile devices will become feasible. …”
Get full text
Article -
1167
Awakened Oscillations in Coupled Consumer-Resource Pairs
Published 2014-01-01“…This is done by treating consumers and resources in the coupled system as fast-scale and slow-scale variables, respectively, and subsequently considering developments in phase planes of these variables, fast and slow, as if they are independent. …”
Get full text
Article -
1168
Fractional-Order Sliding Mode with Active Disturbance Rejection Control for UAVs
Published 2025-01-01“…Through the inner and outer loop design, the jitter of the sliding mode controller (SMC) is effectively suppressed, and fast response and strong anti-jamming ability are achieved, which, in turn, improves the control accuracy. …”
Get full text
Article -
1169
Analysis of the EBR-II SHRT-45R Unprotected Loss of Flow Experiment with ERANOS and RELAP
Published 2015-01-01“…This paper presents the results of the analysis of the Unprotected Loss of Flow (ULOF) experiment SHRT-45R performed in the EBR-II fast reactor. These experiments are being analyzed in the scope of a benchmark exercise coordinated by the IAEA. …”
Get full text
Article -
1170
Economic Evaluation on the MOX Fuel in the Closed Fuel Cycle
Published 2012-01-01“…It is flexible to be applied either in the thermal reactor like pressurized water reactor (PWR) or in the fast reactor (FR). This paper compares the two approaches from the view of fuel cost. …”
Get full text
Article -
1171
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01“…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
Get full text
Article -
1172
Comparing the semantic structures of lexicon of Mandarin and English
Published 2025-01-01“…We used a wide range of predefined semantic categories in Mandarin and English and compared the clusterings of these categories using FastText word embeddings. Three techniques of dimensionality reduction were applied to mapping 300-dimensional FastText vectors into two-dimensional planes: multidimensional scaling, principal components analysis, and t-distributed stochastic neighbor embedding. …”
Get full text
Article -
1173
The Line-Haul Feeder Vehicle Routing Problem: A Classification and Review
Published 2023-01-01“…In fact, the issue of LFVRP is related to the fast customer service in urban areas because in this case, all that are considered to be of priority are to minimize transportation costs and overall distribution time for fast customer service, especially in urban areas. …”
Get full text
Article -
1174
Efficient Model Predictive Algorithms for Tracking of Periodic Signals
Published 2012-01-01“…This paper studies the design of efficient model predictive controllers for fast-sampling linear time-invariant systems subject to input constraints to track a set of periodic references. …”
Get full text
Article -
1175
Singularity Calculation and Kinematics Modeling of High Speed Six-bar Parallel Measuring Machine
Published 2016-01-01“…The parallel robots have some advantages of strong load capacity,fast speed moving and large stiffness,it makes up for the deficiency of series robot and will become a potential motion platform with high speed and high precision. …”
Get full text
Article -
1176
Research on Access Authentication and Re-Authentication Mechanism of User Devices in Terrestrial Default Scenario in Satellite Internet
Published 2023-06-01“…For the current user device access authentication mechanism requires ground participation to bring about large communication delays and poor scalability, a user device access authentication and re-authentication protocol in the ground default scenario in the space-ground integrated network was proposed, and further for the user device authentication process may occur in the power outage reconnection and AV asynchronization and other problems, a user device fast authentication mechanism and AV fast security synchronization mechanism under power failure reconnection scenario were proposed to ensured that users could safely accessed the satellite network and obtain related services.In the proposed scheme, the AV vector generated in the initial access authentication was used to assisted the re-authentication process to completed the authentication between entities without the involvement of the network control center, which guaranteed the communication system resilience.The formal verification tool Scyther showed that the proposed protocol was resistant to common protocol attacks, guaranteed the confidentiality and integrity of the communication process, and had a small signaling, computational, and bandwidth overhead, made it suitable for the satellite internet.…”
Get full text
Article -
1177
Application of Certain π-Acceptors for the Spectrophotometric Determination of Alendronate Sodium in Pharmaceutical Bulk and Dosage Forms
Published 2011-01-01“…Two simple, fast, and accurate spectrophotometric methods for the determination of alendronate sodium are described. …”
Get full text
Article -
1178
A large synthetic dataset for machine learning applications in power transmission grids
Published 2025-01-01“…Abstract With the ongoing energy transition, power grids are evolving fast. They operate more and more often close to their technical limit, under more and more volatile conditions. …”
Get full text
Article -
1179
Forward Kinematics Solution of Stewart Platform based on Improved Non-dominated Sorting Genetic Algorithm
Published 2019-03-01“…In conclusion, the NSGA-II with LS algorithm is fast and of high accuracy while using on forward solution of parallel platform.…”
Get full text
Article -
1180
Gaussian Pyramid for Nonlinear Support Vector Machine
Published 2022-01-01“…Support vector machine (SVM) is one of the most efficient machine learning tools, and it is fast, simple to use, reliable, and provides accurate classification results. …”
Get full text
Article