-
14401
Backward Surface Wave Propagation and Radiation along a One-Dimensional Folded Cylindrical Helix Array
Published 2015-01-01“…Both the propagation constant and the mode distribution of the dominant wave mechanism are extracted by ESPRIT algorithm, which indicates that a backward propagating surface wave is supported by the array structure. …”
Get full text
Article -
14402
Polarization demultiplexing by ICA in a polarization multiplexing system with both PMD and PDL
Published 2013-10-01“…Due to polarization mode dispersion(PMD)and polarizat dependent loss(PDL)in a system,the coherent detection scheme was chosen at the receiver side of the system and T-CMN algorithm was used to separate the polariza-tion multiplexed signals.Simulation results show that after demultiplexed by independent component analysis(ICA),the transmission quality of polarization signals is obviously improved,and when the optical signal to noise ratio of the sys-tem is greater than 20.86 dB,the bit error rate can be kept lower than10<sup>- 9</sup>,which meets the requirement of a communica-tion system.…”
Get full text
Article -
14403
Static-analysis-based event input generation approach for Android application
Published 2017-06-01“…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
Get full text
Article -
14404
Novel robust content-based watermarking for image
Published 2005-01-01“…To lay the watermarking information in the notable areas of the features, an algorithm of fuzzy entropy estimation was proposed. …”
Get full text
Article -
14405
Centralized scheduling contention resolution for wireless metropolitan area networks
Published 2006-01-01“…In comparison with the contention resolution based on truncated binary exponential backoff (BEB) algorithm given by IEEE 802.16, the CSCR resolution is not only easy to be implemented and more efficient in utilizing the transmission opportunities, but also can reduce the delay of admission. …”
Get full text
Article -
14406
Carrier frequency estimation method of time-frequency overlapped signals based on cyclic correntropy spectrum
Published 2018-06-01“…According to the performance degradation problem of the carrier frequency estimation method of time-frequency overlapped BPSK signals in Alpha-stable distribution noise,a novel carrier frequency estimation algorithm of the time-frequency overlapped BPSK signals based on the cyclic correntropy spectrum was proposed.The relationship between cyclic frequency and carrier frequency on the zero frequency section of the cyclic correntropy spectrum was deduced,which could be utilized for carrier frequency estimation.The proposed method can suppress the impulse noise and has better estimation performance than that of the contrastive methods.Simulation results are presented to demonstrate the effectiveness and robustness of the proposed method.…”
Get full text
Article -
14407
A Scatter Search Approach for Multiobjective Selective Disassembly Sequence Problem
Published 2014-01-01“…The validity of ISS is verified by comparing the optimization effects of ISS and nondominated sorting genetic algorithm (NSGA-II).…”
Get full text
Article -
14408
Service selection approach for enhancing trustworthiness of Web service
Published 2011-01-01“…Making use of the game theory,a model of service selection based on Nash bargaining solution was build,and an approach for enhancing Web service trustworthiness was proposed.A bargaining algorithm is designed between ser-vice sides of both complete rationality,through adjusting service price,to achieve maximum utility for both service re-questor and provider,and increase the success rate of transactions and service trustworthiness.Results of experiments show that,on the basis of the game that according to quality of service,reputation and security between service provider and requestor,the service selection can promote the establishment of trustable service computing environment and en-hance credibility of the service.…”
Get full text
Article -
14409
South African Rheumatism and Arthritis Association 2024 guidelines for the management of axial spondyloarthritis
Published 2024-10-01“…The ankylosing spondylitis disease activity score is recommended as a measure of disease activity, and a stepwise algorithm for therapy is provided. Screening for comorbidities and vaccination is advised. …”
Get full text
Article -
14410
The Networked Author: Looking at Contemporary Authorship Through Postdigital Comics
Published 2024-10-01“…In a conceptual reframing of this landscape, the article divides the former into ‘collaborative’ or ‘participatory’ authorship, and the latter into ‘algorithmic’ and ‘rhizomatic’ authorship, surveying and discussing their configurations.…”
Get full text
Article -
14411
Simple and Efficient Preconditioner for Surface Integral Solution of Scattering from Multilayer Dielectric Bodies
Published 2016-01-01“…Furthermore, the multilevel fast multipole algorithm (MLFMA) is employed to improve the capability of the solutions. …”
Get full text
Article -
14412
Shining Lights on Limits: Optimizing Luminescent Solar Concentrators for Solar Windows
Published 2025-01-01“…To optimize this trade‐off, a numerical algorithm is used to find the power conversion efficiency of 92 luminophores, ensuring an average visible transmission >55% and a color rendering index >70. …”
Get full text
Article -
14413
A Novel Virtual Voltage Comparison Compensation for Dynamic Voltage Restorer
Published 2022-01-01“…This paper proposes a new virtual voltage comparison compensation dynamic voltage recovery method. The algorithm that uses the invariant constant signal as the input quantity, and the real-side input load side signal reduces the influence of the input quantity uncertainty change on the generated compensation signal and improves the simplicity of the system operation control and the system stability. …”
Get full text
Article -
14414
Improved Optimization Study of Integration Strategies in Solar Aided Coal-Fired Power Generation System
Published 2015-01-01“…This study mainly improves the solar thermal storage system. Genetic algorithm is used to optimize the SACFPGS. The best integration approach of the system, the collector area, and the corresponding thermal storage capacity to replace each high-pressure extraction are obtained when the amount of coal saving in unit solar investment per hour is at its largest. …”
Get full text
Article -
14415
THE TECHNIQUES SEPARATING THREE OVERLAP PEAKS IN GAMMA SPECTRUM
Published 2017-09-01“…The calculation procedure was performed by the Levenberg-Marquardt algorithm with linear and nonlinear background. Based on separating the two overlap peaks method has been implemented in our previous article, the separating three overlap peaks was successfully implemented in this paper, in which the calculations were tested with gamma-ray spectra by using a Semiconductor detector and a Scintillator detector.…”
Get full text
Article -
14416
Efficient Midfrequency Analysis of Built-Up Structure Systems with Interval Parameters
Published 2015-01-01“…Extreme values of the expanded variables are searched by using efficient search algorithm. For large parameter intervals, the subinterval perturbation method is introduced. …”
Get full text
Article -
14417
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01“…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
Get full text
Article -
14418
Design and implementation of a video recommendation system in campus network
Published 2013-09-01“…According to the feature of video-sharing with P2P in campus network,a video recommendation system in campus network called FP-CNVR system was designed and implemented; a novel data cleaning method based on customer segmentation was proposed; the structure of FP-tree in the process of frequent pattern mining with FP-growth algorithm was improved.Experimental results show that the novel recommendation system can provide more reliable recommended results,and also the novel data cleaning method can improve the accuracy of the recommendation results.The research may have some inspiration to related subjects in campus network.…”
Get full text
Article -
14419
A New Iterative Scheme for Generalized Mixed Equilibrium, Variational Inequality Problems, and a Zero Point of Maximal Monotone Operators
Published 2012-01-01“…Moreover, the strong convergence theorems of this method are established under the suitable conditions of the parameter imposed on the algorithm. Finally, we apply our results to finding a zero point of inverse-strongly monotone operators and complementarity problems. …”
Get full text
Article -
14420
Pythagorean Fuzzy (R,S)-Norm Information Measure for Multicriteria Decision-Making Problem
Published 2018-01-01“…The monotonic behavior and maximality feature of the proposed information measure have been studied and presented. Further, an algorithm for solving the multicriteria decision-making problem with the help of the proposed information measure has been provided keeping in view of the different cases for weight criteria, when weights are unknown and other when weights are partially known. …”
Get full text
Article