Showing 2,181 - 2,200 results of 2,667 for search '"Topology"', query time: 0.07s Refine Results
  1. 2181

    ZnO1−xSx Nanosphere in Ferroelectric Liquid Crystal Matrix: The Effect of Aggregation and Defects on the Dielectric and Electro-Optical Properties by Dharmendra Pratap Singh, Swadesh Kumar Gupta, Rajiv Manohar

    Published 2013-01-01
    “…The high concentration of NS causes an aggregation in the FLC matrix and creates topological defects. The defects and aggregation cause the change in electro-optical and dielectric properties of the pure FLC material. …”
    Get full text
    Article
  2. 2182

    DDoS defense with IP traceback and path identification by JIN Guang, ZHANG Fei, QIAN Jiang-bo, ZHANG Hong-hao

    Published 2011-01-01
    “…A novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Meanwhile the border router of the destination domain deployed the traceback marking scheme.The victim could retrieve related information from arrived malicious packets.Then Pi-based filtering could be implemented at the border ingresses.A practical marking,storing and filtering scheme was provided in detail.The results of large-scale simulations with authoritative Internet topologies show the scheme is effective to alleviate attack impacts on the victim and upstream links in the destination domain.…”
    Get full text
    Article
  3. 2183

    Modeling and simulation analysis of interleaved double dual boost converters in energy storage field by Baining Guo, Junqi Liu, Mingye Sun, Shuo Zhai, Zhiheng Zhao, Bin Hai

    Published 2024-12-01
    “…To this end, this paper systematically analyzes features regarding interleaved double dual boost converters to provide the basis of the controller design. First, the topological structure and working principle are introduced, which is an indispensable pretreatment for the steady‐state feature analysis. …”
    Get full text
    Article
  4. 2184

    Kinematic Characteristic Analysis of Hypoid Gear based on Two Kinds of Eigenfunction by Bingyang Wei, Ke Zhang, Bo Zhang, Yuliang Guo

    Published 2021-01-01
    “…It lays a foundation for further topological design and meshing performance control of tooth surface.…”
    Get full text
    Article
  5. 2185

    Optimization design of structure invulnerability for air defense multiple sensor network by Cheng-yu SUN, Mao-xing SHEN, Hao SHENG, Jin-ke XIAO

    Published 2017-06-01
    “…To improve the invulnerability of air defense multiple sensor network,its topological structure optimization model was established with the constraint of network node’s degree and network connectivity,combined with the total sum of network’s natural connectivity for attack strategy as object function.Then,solving steps of the model were designed based on improve artificial immune algorithm to solve the model.In order to improve the searching efficiency of the algorithm,new steps of immune review and antibody correction were designed to increase the number of effective antibodies in population.Simulation and results prove rationality of the model and feasibility of the modified artificial immune algorithm,optimization based on the index of total natural connectivity for attack strategy can improve the invulnerability of air defense multiple sensor network.…”
    Get full text
    Article
  6. 2186

    New Optimality Conditions for a Nondifferentiable Fractional Semipreinvex Programming Problem by Yi-Chou Chen, Wei-Shih Du

    Published 2013-01-01
    “…We study a nondifferentiable fractional programming problem as follows: (P)minx∈Kf(x)/g(x) subject to x∈K⊆X,  hi(x)≤0,  i=1,2,…,m, where K is a semiconnected subset in a locally convex topological vector space X, f:K→ℝ, g:K→ℝ+ and hi:K→ℝ, i=1,2,…, m. …”
    Get full text
    Article
  7. 2187

    3D bulk field theories for 2D non-unitary N $$ \mathcal{N} $$ = 1 supersymmetric minimal models by Seungjoo Baek, Dongmin Gang

    Published 2025-01-01
    “…The correspondence relates a 3D N $$ \mathcal{N} $$ = 4 rank-0 superconformal field theory to 2D chiral rational conformal field theories. A topologically twisted theory of the rank-0 SCFT supports the rational chiral algebra at the boundary upon a proper choice of boundary condition. …”
    Get full text
    Article
  8. 2188

    Recent Developments in Instantons in Noncommutative ℝ𝟒 by Akifumi Sako

    Published 2010-01-01
    “…In the operator formalism, we study how to make noncommutative instantons by using the ADHM method, and we review the relation between topological charges and noncommutativity. In the ADHM methods, there exist instantons whose commutative limits are singular. …”
    Get full text
    Article
  9. 2189

    Comparison of Photonic to Plasmonic Mode Converters for Plasmonic Multiple-Input Devices by Samantha Lubaba Noor, Francky Catthoor, Dennis Lin, Pol Van Dorpe, Azad Naeemi

    Published 2024-01-01
    “…In this work, we simulate and benchmark five photonic to plasmonic mode converter topologies for the application of multiple-input plasmonic devices. …”
    Get full text
    Article
  10. 2190

    A course in Mathematical Analysis / by Garling, D. J. H.

    Published 2013
    Cover image
    View in OPAC
    Book
  11. 2191

    A course in mathematical analysis / by Garling, D. J. H.

    Published 2013
    View in OPAC
    Book
  12. 2192

    Medium Affect Desire: Hybridising Real Virtual and the Actualised through Affective Medium Ecology by Marc Boumeester

    Published 2014-04-01
    “…This new materialistic, non-anthropocentric liberty of affect is creating an arena of strange attractors and other topological vector fields in which our own unconscious drive is as effective as that of the steel ball in a pinball machine. …”
    Get full text
    Article
  13. 2193

    Sum-Connectivity Coindex of Graphs under Operations by Muhammad Ibraheem, Ebenezer Bonyah, Muhammad Javaid

    Published 2022-01-01
    “…Topological indices or coindices are mathematical parameters which are widely used to investigate different properties of graphs. …”
    Get full text
    Article
  14. 2194

    Stiffness Analysis of a New Low Coupling 3T1R Asymmetrical Parallel Mechanism by Xu Zhengxiao, Wu Guanglei, Shen Huiping

    Published 2019-12-01
    “…The stiffness performance of a new 3T1R asymmetrical parallel mechanism is analyzed. Firstly, the topological structure of the mechanism is described. …”
    Get full text
    Article
  15. 2195

    Coda: The Open by Michael Palmer

    Published 2020-12-01
    “…Exploring little known areas in American poetry, namely the 1973 anthology of Open Poetry put out by Ronald Gross and George Quasha, but also Charles Olson’s projective verse project, the full scope of Duncan’s Opening of the Field comes into view as an attempt at a new condition of poetry, as a kind of topological reality, where compositional decisions proceed seemingly from ad hoc pressures as if it too were a form of listening to the text. …”
    Get full text
    Article
  16. 2196

    On r-Generalized Fuzzy ℓ-Closed Sets: Properties and Applications by I. M. Taha

    Published 2021-01-01
    “…In the present study, we introduce and characterize the class of r-generalized fuzzy ℓ-closed sets in a fuzzy ideal topological space X,τ,ℓ in Šostak sense. Also, we show that r-generalized fuzzy closed set by Kim and Park (2002) ⟹r-generalized fuzzy ℓ-closed set, but the converse need not be true. …”
    Get full text
    Article
  17. 2197

    Measuring Chern–Simons level k by braiding $$SU(2)_k$$ S U ( 2 ) k anyons by Artem Belov, Andrey Morozov

    Published 2025-01-01
    “…It is implied that anyons additionally possess certain properties which are required for topological quantum computations.…”
    Get full text
    Article
  18. 2198

    UAV ad hoc network link prediction based on deep graph embedding by Jian SHU, Qining WANG, Linlan LIU

    Published 2021-07-01
    “…Aiming at the characteristics of the UAV ad hoc network (UAANET), such as topological temporal-varying, node mobility and intermittent connection, a temporal graph embedding model was proposed to present the preprocessed UAANET.To improve the sampling efficiency, the sampling interval was calculated based on linear probability.The network structure features were mapped to the relationship between nodes, and the contextual semantic features of nodes were extracted by adversarial training.With the help of long and short-term memory network, the temporal characteristics of the UAANET were extracted to predict the connection at the next moment.AUC, MAP, and Error Rate were employed as evaluation indexes.The simulation experiments based on NS-3 show that compared with Node2vec, DDNE and E-LSTM-D, the proposed method has a better accuracy.…”
    Get full text
    Article
  19. 2199

    Optimal path identification to defend against DDoS attacks by JIN Guang1, YANG Jian-gang1, LI Yuan2, ZHANG Hui-zhan2

    Published 2008-01-01
    “…A novel packet marking scheme,optimal path identification(OPi),was proposed to defend against DDoS at-tacks.Instead of using fixed 1 or 2 bit in previous schemes,in OPi a router deduces the traveling distance of an arrived packet by its TTL value and inserts a variable-length marking of 1~16 bit into the packet.The marking field is filled completely even the path is very short and the distinguishability is improved.OPi outperforms previous schemes,espe-cially when attacker paths adjoin user paths seriously.To obtain better performance,an OPi+TTL filtering strategy was proposed to frustrate attackers’ tries with spoofed initial TTL values.Theoretical analyses and simulations with actual Internet topologies show OPi performs excellently.…”
    Get full text
    Article
  20. 2200

    Function Spaces with Bounded Lp Means and Their Continuous Functionals by Massimo A. Picardello

    Published 2014-01-01
    “…Part of this paper is a review of the topological vector space structure, inclusion relations, and convolution operators. …”
    Get full text
    Article