Showing 21 - 40 results of 53 for search '"Simula"', query time: 0.05s Refine Results
  1. 21

    Power allocation of hybrid spectrum sharing based on the spatial location by Yan CAI, Jing ZHANG, Hong-bo ZHU

    Published 2014-02-01
    “…Furthermore, the optimal power allocation scheme was deduced as well as the maximum achievable capacity of the spatial hybrid spectrum sharing system. Analysis and simula-tion results indicate the hybrid spectrum sharing system has higher capacity than single overlay system.…”
    Get full text
    Article
  2. 22

    Improved PESA algorithm based on comentropy by Kun WANG, Lin-lin WANG, Yan LIU, Yu-hua ZHANG, Meng WU

    Published 2013-11-01
    “…Thereby, the optimization process can be finished as soon as possible, and in a certain extent, the time complexity of PESA was simplified. Simula-tion results show that the computational effort of C-PESA increases linearly with the rising number of solutions. …”
    Get full text
    Article
  3. 23

    Comparison of confidence interval construction methods for discrete biological data by Alesia Kanopaitė, Eduardas Mickevičius, Marijus Radavičius

    Published 2002-12-01
    “…The c.i. obtained are compared with each other and with the standard student c.i. by simula­tion. The study is based on a real biological data about distribution of badger, fox, and raccoon dog borrow number in 1 km2 square areas uniformly allocated throughout Lithuania territory. …”
    Get full text
    Article
  4. 24

    Purity of Ion Beams: Analysis and Simulation of Mass Spectra and Mass Interferences in Ion Implantation by Volker Häublein, Heiner Ryssel, Lothar Frey

    Published 2012-01-01
    “…Based on those relations, the simulation tool ENCOTION (ENergetic COntamination simulaTION) has been developed. ENCOTION is a very powerful tool for the simulation of transport mechanisms of ions through a magnet analyzer and for the simulation of mass spectra, as will be demonstrated in this paper.…”
    Get full text
    Article
  5. 25

    Optimal cross-layer power allocation with channel and queue state information by CHEN Wei1, CAO Zhi-gang1, FAN Ping-yi1, LETAIEF K B2

    Published 2007-01-01
    “…The optimal power allocation was investigated when both channel and queue state information was taken into account.By modeling the system from a cross-layer perspective,an optimization problem was formulated on power allo-cation where the maximal power requirement of a user was determined by the number of its backlog packets.The ana-lytical solution as well as its algorithm,which refer to as water filling in cellar(WFIC),were proposed.The proposed WFIC can be reduced to traditional water-filling(TWF) method as a special case where queue state was ignored.Simula-tion results show that the proposed method can achieve lower queuing delay compared to conventional methods.…”
    Get full text
    Article
  6. 26

    High capacity cross layer optimization strategy for multi-hop wireless network with interference management by Lei SHI, Jiang-hong HAN, Yi SHI, Zhen-chun WEI

    Published 2014-12-01
    “…A high-throughput cross-layer optimization strategy based on the interference management for the multi-hop multi-base-station wireless network environment was proposed.In the physical layer the successive interference cancella-tion was used to realize the interference management.In the up layers,first the Voronoi algorithm was used to achieve the zoning,second based on the min-hop algorithm,the initial link allocation and multi-hop routing scheme was established,third optimize the scheme based on the multi-time-slot allocating or multi-hop routing,and at last try to find a better strategy in each iteration.Theoretical analysis shows that the strategy has a polynomial time complexity,and the simula-tion results show that the entire network throughput has a 2 to 5 fold increase by using interference management.…”
    Get full text
    Article
  7. 27

    Robust DWT-HMM image watermarking algorithm optimized with content-adaptive approach by WANG Chun-tao1, NI Jiang-qun1, HUANG Ji-wu1, ZHANG Rong-yue1, LUO Xi-zhang1

    Published 2007-01-01
    “…A robust watermarking algorithm based on content-adaptive approach was proposed to optimize the tradeoff between robustness and imperceptibility,which was characterized as follows: the entropy masking proposed by Watson etc.was constructed in wavelet domain,which was then used to constitute the integrated HVS model;three different measures,namely,energy,entropy and integrated HVS,for content-adaptive selection were constructed and investigated;repeat-accumulate(RA) code with erasure and error correction was used to tackle the synchronization issue of the exact positions for watermark embedding;and a posteriori DWT-HMM detector was utilized for watermark detection.Simula-tion results show that the proposed content-adaptive watermarking algorithm,under the same imperceptibility,has con-siderable improvement in robustness performance over the traditional one with stochastic approach.…”
    Get full text
    Article
  8. 28

    Multiple access based on three-stage modulation in multi-band OFDM-UWB system by BAO Zhi-hua, ZHANG Shi-bing, ZHANG Guo-an, QIN Jin-jing

    Published 2007-01-01
    “…According to the characteristics of multi-band orthogonal frequency-division multiplexing ultra-wideband(OFDM-UWB) system,a multiple access based on three-stage modulation(TSM-MA) was proposed.It combined multi-carrier code division multiple access(MC-CDMA) with orthogonal frequency division multiple access(OFDMA) and frequency hopping multiple access(FHMA),carried out the advantages of the three multiple access techniques.It reduced the multiple access interference and made full use of the available resource of the channel.The two-stage spread spectrum and two-stage frequency hopping were used to the TSM-MA for reducing the complexity of receiver.Simula-tion results showed that TSM-MA has obvious advantages in bit error rate(BER) performance over time frequency code multiple access(TF-MA) about 3 dB and lower complexity than that of TF-MA.…”
    Get full text
    Article
  9. 29
  10. 30
  11. 31

    Dual-station pseudo-Doppler localization method based on particle filtering with stable distribution noise by shuang QIUTian, zhe QIYin

    Published 2016-01-01
    “…The method employed particle filtering approach to jointly estimate the AOA of both stations, then applied a non-linear mapping to acquire the source location, forming an int tion of AOA calculation and dual-station localization. Simula-tions demonstrate that when the characteristic exponent of the stable distribution is in a medium degree, for example a=1.4, the proposed method is much more robust than the traditional method in low SNR circumstances, while main-taining the estimation accuracy of the traditional method when SNR is high. …”
    Get full text
    Article
  12. 32

    Uso de IA em educação: experiências metodológicas no ChatGPT by Fernanda Castilho Santana

    Published 2025-01-01
    “…Em vez da consulta a conhecidas bases de dados científicas nacionais e internacionais, iniciamos uma conversa com o ChatGPT, tecnologia de Inteligência Artificial que simula conversas humanas, a partir de perguntas, num ambiente virtual. …”
    Get full text
    Article
  13. 33
  14. 34
  15. 35

    Adaptive bandwidth allocation algorithm based on the multi-threshold reservation mechanism by Geng CHEN, Wei-wei XIA, Lian-feng SHEN

    Published 2014-12-01
    “…An adaptive bandwidth allocation algorithm based on multi-threshold reservation mechanism is proposed to guarantee the quality of service (QoS) of multi-services in heterogeneous wireless networks.With the bandwidth reserva-tion mechanism by setting multi-threshold in each network for every traffic,the adaptive bandwidth allocation scheme according to the transmission rate levels requirements for traffic k and the network status can be formulated as an optimal problem with the constraints of the bandwidth allocation matrix for each traffic and all users based on the multi-homing technology.A procedure of the iterative method is presented to solve the optimal problem of the formulated adaptive bandwidth allocation scheme.The optimized bandwidth allocation matrixes for traffics and for all users are obtained for the real-time network throughput maximization under bandwidth reserving thresholds and network capacity constrains and the bandwidth resource utilization efficiency of heterogeneous wireless network can be increased.Numerical simula-tion results show that the proposed algorithm can support QoS requiring transmission rate grades,decrease the new call blocking probability,increase the average user access rate and improve the network throughput of the heterogeneous wireless network by 40% to the largest extent.…”
    Get full text
    Article
  16. 36

    Semiótica da inteligência artificial: análise computacional de grandes bases de dados e geração automática de imagens by Maria Giulia Dondero, Gustavo Henrique Rodrigues de Castro, Matheus Nogueira Schwartzmann, Daniervelin Pereira

    Published 2024-12-01
    “… A inteligência artificial simula hoje, de maneira cada vez mais satisfatória, a complexidade da linguagem e das ações humanas. …”
    Get full text
    Article
  17. 37

    Vulnerability disclosure e penetration testing: profili giuridici rilevanti per l’adozione di una politica nazionale conforme alla Direttiva NIS 2 by Federico Niccolò Ricotta

    Published 2024-12-01
    “…Il contributo analizza le principali questioni giuridiche connesse all’adozione di politiche di cosiddetta vulnerability disclosure, espressione con la quale si designa il processo di comunicazione e correzione delle falle nella sicurezza, e i cosiddetti penetration test, attività che simula un attacco informatico proprio allo scopo di far emergere le vulnerabilità nella sicurezza. …”
    Get full text
    Article
  18. 38
  19. 39

    Funcionamiento cognitivo de niños entre 4 y 6 años para la resolución de conflictos interpersonales by María Paola Ayala Afanador, Jairo Andrés Montes González

    Published 2011-01-01
    “…El objetivo general del proyecto es describir los funcionamientos cognitivos de 20 niñas y niños entre cuatro y seis años de edad, para la resolución de conflictos interpersonales, a través de los desempeños obtenidos en una tarea,que simula tres escenarios con situaciones de disputa entre varios personajes. …”
    Get full text
    Article
  20. 40

    La infidelidad de los dioses: Lenguaje y simulacro en Pierre Klossowski by Rayiv David Torres Sanchez

    Published 2018-01-01
    “…Pierre Klossowski se sirvió de la doctrina del eterno retorno de Nietzsche para poner en tela de juicio el principio de identidad tanto en la escritura como en el lenguaje; un falso principio que, como el Dios-Uno, simula ser único y verdadero. Así mismo, Klossowski se sirvió de la figura nietzscheana de la “muerte de Dios” para hablar del ocaso de la identidad, y poner en entredicho las certezas depositadas en la suficiencia y eficacia del lenguaje. …”
    Get full text
    Article