-
2181
ZnO1−xSx Nanosphere in Ferroelectric Liquid Crystal Matrix: The Effect of Aggregation and Defects on the Dielectric and Electro-Optical Properties
Published 2013-01-01“…The high concentration of NS causes an aggregation in the FLC matrix and creates topological defects. The defects and aggregation cause the change in electro-optical and dielectric properties of the pure FLC material. …”
Get full text
Article -
2182
DDoS defense with IP traceback and path identification
Published 2011-01-01“…A novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Meanwhile the border router of the destination domain deployed the traceback marking scheme.The victim could retrieve related information from arrived malicious packets.Then Pi-based filtering could be implemented at the border ingresses.A practical marking,storing and filtering scheme was provided in detail.The results of large-scale simulations with authoritative Internet topologies show the scheme is effective to alleviate attack impacts on the victim and upstream links in the destination domain.…”
Get full text
Article -
2183
Modeling and simulation analysis of interleaved double dual boost converters in energy storage field
Published 2024-12-01“…To this end, this paper systematically analyzes features regarding interleaved double dual boost converters to provide the basis of the controller design. First, the topological structure and working principle are introduced, which is an indispensable pretreatment for the steady‐state feature analysis. …”
Get full text
Article -
2184
Kinematic Characteristic Analysis of Hypoid Gear based on Two Kinds of Eigenfunction
Published 2021-01-01“…It lays a foundation for further topological design and meshing performance control of tooth surface.…”
Get full text
Article -
2185
Optimization design of structure invulnerability for air defense multiple sensor network
Published 2017-06-01“…To improve the invulnerability of air defense multiple sensor network,its topological structure optimization model was established with the constraint of network node’s degree and network connectivity,combined with the total sum of network’s natural connectivity for attack strategy as object function.Then,solving steps of the model were designed based on improve artificial immune algorithm to solve the model.In order to improve the searching efficiency of the algorithm,new steps of immune review and antibody correction were designed to increase the number of effective antibodies in population.Simulation and results prove rationality of the model and feasibility of the modified artificial immune algorithm,optimization based on the index of total natural connectivity for attack strategy can improve the invulnerability of air defense multiple sensor network.…”
Get full text
Article -
2186
New Optimality Conditions for a Nondifferentiable Fractional Semipreinvex Programming Problem
Published 2013-01-01“…We study a nondifferentiable fractional programming problem as follows: (P)minx∈Kf(x)/g(x) subject to x∈K⊆X, hi(x)≤0, i=1,2,…,m, where K is a semiconnected subset in a locally convex topological vector space X, f:K→ℝ, g:K→ℝ+ and hi:K→ℝ, i=1,2,…, m. …”
Get full text
Article -
2187
3D bulk field theories for 2D non-unitary N $$ \mathcal{N} $$ = 1 supersymmetric minimal models
Published 2025-01-01“…The correspondence relates a 3D N $$ \mathcal{N} $$ = 4 rank-0 superconformal field theory to 2D chiral rational conformal field theories. A topologically twisted theory of the rank-0 SCFT supports the rational chiral algebra at the boundary upon a proper choice of boundary condition. …”
Get full text
Article -
2188
Recent Developments in Instantons in Noncommutative ℝ𝟒
Published 2010-01-01“…In the operator formalism, we study how to make noncommutative instantons by using the ADHM method, and we review the relation between topological charges and noncommutativity. In the ADHM methods, there exist instantons whose commutative limits are singular. …”
Get full text
Article -
2189
Comparison of Photonic to Plasmonic Mode Converters for Plasmonic Multiple-Input Devices
Published 2024-01-01“…In this work, we simulate and benchmark five photonic to plasmonic mode converter topologies for the application of multiple-input plasmonic devices. …”
Get full text
Article -
2190
-
2191
-
2192
Medium Affect Desire: Hybridising Real Virtual and the Actualised through Affective Medium Ecology
Published 2014-04-01“…This new materialistic, non-anthropocentric liberty of affect is creating an arena of strange attractors and other topological vector fields in which our own unconscious drive is as effective as that of the steel ball in a pinball machine. …”
Get full text
Article -
2193
Sum-Connectivity Coindex of Graphs under Operations
Published 2022-01-01“…Topological indices or coindices are mathematical parameters which are widely used to investigate different properties of graphs. …”
Get full text
Article -
2194
Stiffness Analysis of a New Low Coupling 3T1R Asymmetrical Parallel Mechanism
Published 2019-12-01“…The stiffness performance of a new 3T1R asymmetrical parallel mechanism is analyzed. Firstly, the topological structure of the mechanism is described. …”
Get full text
Article -
2195
Coda: The Open
Published 2020-12-01“…Exploring little known areas in American poetry, namely the 1973 anthology of Open Poetry put out by Ronald Gross and George Quasha, but also Charles Olson’s projective verse project, the full scope of Duncan’s Opening of the Field comes into view as an attempt at a new condition of poetry, as a kind of topological reality, where compositional decisions proceed seemingly from ad hoc pressures as if it too were a form of listening to the text. …”
Get full text
Article -
2196
On r-Generalized Fuzzy ℓ-Closed Sets: Properties and Applications
Published 2021-01-01“…In the present study, we introduce and characterize the class of r-generalized fuzzy ℓ-closed sets in a fuzzy ideal topological space X,τ,ℓ in Šostak sense. Also, we show that r-generalized fuzzy closed set by Kim and Park (2002) ⟹r-generalized fuzzy ℓ-closed set, but the converse need not be true. …”
Get full text
Article -
2197
Measuring Chern–Simons level k by braiding $$SU(2)_k$$ S U ( 2 ) k anyons
Published 2025-01-01“…It is implied that anyons additionally possess certain properties which are required for topological quantum computations.…”
Get full text
Article -
2198
UAV ad hoc network link prediction based on deep graph embedding
Published 2021-07-01“…Aiming at the characteristics of the UAV ad hoc network (UAANET), such as topological temporal-varying, node mobility and intermittent connection, a temporal graph embedding model was proposed to present the preprocessed UAANET.To improve the sampling efficiency, the sampling interval was calculated based on linear probability.The network structure features were mapped to the relationship between nodes, and the contextual semantic features of nodes were extracted by adversarial training.With the help of long and short-term memory network, the temporal characteristics of the UAANET were extracted to predict the connection at the next moment.AUC, MAP, and Error Rate were employed as evaluation indexes.The simulation experiments based on NS-3 show that compared with Node2vec, DDNE and E-LSTM-D, the proposed method has a better accuracy.…”
Get full text
Article -
2199
Optimal path identification to defend against DDoS attacks
Published 2008-01-01“…A novel packet marking scheme,optimal path identification(OPi),was proposed to defend against DDoS at-tacks.Instead of using fixed 1 or 2 bit in previous schemes,in OPi a router deduces the traveling distance of an arrived packet by its TTL value and inserts a variable-length marking of 1~16 bit into the packet.The marking field is filled completely even the path is very short and the distinguishability is improved.OPi outperforms previous schemes,espe-cially when attacker paths adjoin user paths seriously.To obtain better performance,an OPi+TTL filtering strategy was proposed to frustrate attackers’ tries with spoofed initial TTL values.Theoretical analyses and simulations with actual Internet topologies show OPi performs excellently.…”
Get full text
Article -
2200
Function Spaces with Bounded Lp Means and Their Continuous Functionals
Published 2014-01-01“…Part of this paper is a review of the topological vector space structure, inclusion relations, and convolution operators. …”
Get full text
Article