-
1061
Deep learning powered single-cell clustering framework with enhanced accuracy and stability
Published 2025-02-01“…This method incorporates two key innovations: (1) Dual-topology adjacency graph: scG-cluster integrates information about node distribution into the traditional adjacency graph used by GCNs. …”
Get full text
Article -
1062
A duality theorem for solutions of elliptic equations
Published 1990-01-01“…We consider the linear space of all solutions of the equation Lu=0 on Ω with the topology of uniform convergence on compact subsets and describe the topological dual of this space. …”
Get full text
Article -
1063
The Monoid Consisting of Kuratowski Operations
Published 2013-01-01“…Some results apply only to topology, and one cannot bring them out, using only properties of the complement and a closure-like operation. …”
Get full text
Article -
1064
The Viro Method for Construction of Piecewise Algebraic Hypersurfaces
Published 2013-01-01“…We propose a new method to construct a real piecewise algebraic hypersurface of a given degree with a prescribed smoothness and topology. The method is based on the smooth blending theory and the Viro method for construction of Bernstein-Bézier algebraic hypersurface piece on a simplex.…”
Get full text
Article -
1065
Hierarchical-ring application layer multicast model based on diff-services
Published 2009-01-01“…In the model, the ring topology was employed to reduce the control overhead. …”
Get full text
Article -
1066
Intelligent ubiquitous network
Published 2011-01-01“…The first overview of ubiquitous computing,cloud computing and ubiquitous network technology was made.Then a new concept of Intelligent ubiquitous network,its concrete realization of the distributed intelligent open system and business data system were proposed.Finally,the network topology,architecture and key technologies of DIOS were discussed in detail.Intelligent ubiquitous network is the trend of future telecommunication network and can provide "everywhere,all-powerful" service.…”
Get full text
Article -
1067
On the Homomorphisms of the Lie Groups and
Published 2013-01-01“…We first construct all the homomorphisms from the Heisenberg group to the 3-sphere. Also, defining a topology on these homomorphisms, we regard the set of these homomorphisms as a topological space. …”
Get full text
Article -
1068
Epi-α-Normality and Epi-β-Normality
Published 2021-01-01“…A topological space Y,τ is called epi-α-normal (epi-β-normal) if there is a coarser topology τ′ on Y such that Y,τ′ is T1 α-normal (T1 β-normal). …”
Get full text
Article -
1069
Terahertz wireless networking: principles, status and challenges
Published 2021-06-01“…To achieve huge capacity, terahertz communication has become an important technical option for 6G.Application and performance requirements of terahertz communication in typical indoor and outdoor scenarios were introduced emphatically.Then, based on the requirements of terahertz wireless networking, the research progress of key technologies such as topology design, media access control (MAC) layer protocol and neighbor discovery were summarized in detail.Last but not least, the challenges of terahertz wireless networking were discussed, and the possible future research directions were described.…”
Get full text
Article -
1070
The Fuzzy Prime Spectrum of Partially Ordered Sets
Published 2023-01-01“…We study the space of prime fuzzy ideals (and the space of maximal fuzzy ideals as a subspace) equipped with the hull-kernel topology in partially ordered sets. Mainly, we investigate the conditions for which the fuzzy prime spectrum of a poset is compact, Hausdorff, and normal, respectively.…”
Get full text
Article -
1071
A Novel Mixed-Mode Current-Controlled Current-Conveyor-Based Filter
Published 2003-01-01“…The circuit uses four dual-output second-generation currentcontrolled current-conveyors (DOCCCIIs) and two grounded capacitors and can realize lowpass, highpass, bandpass and notch responses from the same topology. The circuit can be driven by voltage or current and its output can be voltage or current. …”
Get full text
Article -
1072
Geometric Representations of Interacting Maps
Published 2010-01-01“…On the other hand, automata appear in various contexts in topology, combinatorics, and integrable systems. In this paper we study the analysis of these materials passing through tropical geometry. …”
Get full text
Article -
1073
A network status evaluation method based on random projection
Published 2016-08-01“…In recent years,machine learning has been widely used in network management.However,the complexity of the communication network is increasing,nonlinear and uncertain factors in the network make the machine learning more difficult.In order to improve the effect of machine learning,a scheme of artificial nervous network based on random projection was proposed.The characteristic of such scheme was the introduction of randomness in machine learning and network topology,which took the learning process more adaptability,and achieve faster and more accurate convergence.…”
Get full text
Article -
1074
METHODS FOR LOCAL CHANGES IN THE PLASTIC DEFORMATION DIAGNOSTICS ON THE WORK FUNCTION
Published 2015-08-01“…The techniques end examples of their application of localization of plastic deformation studies using the Kelvin probe are developed and present. The study topology of work function the deformed surface possible to determine the type of deformation and dynamics of…”
Get full text
Article -
1075
Mobility-aware zoned MANET routing protocol
Published 2007-01-01“…Based on requests of MANET and its applications,a mobility-aware zoned MANET routing protocol —MAFZP was proposed,which zoned by the distance to minID node and only a simple basic network topology was maintained.By using nodes’ neighbors information smart and subtly,the protocol’s request delay and control overhead were all descended to O(2R).Moreover,nodes’ mobility patterns were also used to descend control overhead.At a result,the protocol’s routing request delay and control overhead were very low.…”
Get full text
Article -
1076
Research on enhanced channel assignment scheme in wireless mesh network
Published 2012-10-01“…To ensure the reliability of the wireless mesh network resource assignment,an interference model to node traffic model of WMN was introduced,and channel assignment strategy based on fixed traffic-awareness C-HYA channel assignment strategy was improved,which a greedier algorithm to avoid ripple effect and reduce network interference was adopted.In addition,the network topology and simulates the algorithm was built.The results of theoretical analysis and simulation show the performance of improved channel assignment strategy compared with traditional algorithm in terms of resisting ripple effect and channel interference.…”
Get full text
Article -
1077
A weak ergodic theorem for infinite products of Lipschitzian mappings
Published 2003-01-01“…Endowing it with an appropriate topology, we establish a weak ergodic theorem for the infinite products corresponding to generic sequences in this space.…”
Get full text
Article -
1078
Generic well-posedness in minimization problems
Published 2005-01-01“…The goal of this paper is to provide an overview of results concerning, roughly speaking, the following issue: given a (topologized) class of minimum problems, “how many” of them are well-posed? …”
Get full text
Article -
1079
Intermediate values and inverse functions on non-Archimedean fields
Published 2002-01-01“…These problems are due to the total disconnectedness of the field in the order topology. In this paper, we show that differentiability (in the topological sense), together with some additional mild conditions, is indeed sufficient to guarantee that the function assumes all intermediate values and has a differentiable inverse function.…”
Get full text
Article -
1080
Research and Realization of Ethernet Service MEF 2.0 Certification
Published 2015-08-01“…MEF Carrier Ethernet(CE)2.0 has been widely concerned and supported by international major telecom service providers.It has become new generation standard of Ethernet service interoperability and transparent management.By researching MEF CE 2.0 related standards,methods and key technical details in depth,related service definition,operation flow,network topology,test items and practical application of CE 2.0 authentication testing were summarized.…”
Get full text
Article