-
781
Global μ-Stability of Impulsive Complex-Valued Neural Networks with Leakage Delay and Mixed Delays
Published 2014-01-01“…As direct applications of these results, several criteria on the exponential stability, power-stability, and log-stability are obtained. …”
Get full text
Article -
782
Novel similarity calculation method of multisource ontology based on graph convolution network
Published 2021-10-01“…In the information age, the amount of data is growing exponentially.However, different data sources are heterogeneous, which makes it inconvenient to share and multiplex data.With the rapid development of semantic network, ontology mapping is an effective method to solve this problem.The core of ontology mapping is ontology similarity calculation.Therefore, a calculation method based on graph convolution network was proposed.Firstly, ontologiesare modeled as a heterogeneous graph network, then the graph convolution network was used to learn the text embedding rules, which made ontologies were definedin global unified representation.Lastly, multisource data fusion was completed.The experimental results show that the accuracy of the proposed method is higher than other methods, and the accuracy of multi-source data fusion was effectively improved.…”
Get full text
Article -
783
Modelling to Engineering Data Using a New Class of Continuous Models
Published 2021-01-01“…Simulations are carried out to show the consistency and efficiency of parameter estimates, and finally, real data sets are used to demonstrate the flexibility and potential usefulness of the proposed family of algorithms by using the TLW exponential model as example of the new suggested family.…”
Get full text
Article -
784
MHD Flow with Hall Current and Ion-Slip Effects due to a Stretching Porous Disk
Published 2013-01-01“…The leading order approximations show sinusoidal behavior that is decaying exponentially, as we move away from the disk surface. …”
Get full text
Article -
785
An image inpainting method based on weighted priority and classification matching
Published 2017-04-01“…The calculation of the priority of the pixel to be repaired and the determination of the best matching block are based on two basic steps of the texture synthesis image inpainting method.The traditional method is not suitable because it is difficult to determine the confidence in the priority calculation,and it is difficult to search for the best matching block.An image inpainting method based on weighted priority and classification matching was proposed.In the priority model,the exponential function and the normalization function were introduced to optimize the confidence and data items separately,the further benefit of which was a more objective priority of calculation and a more reasonable repair order.Based on the proposed functions,the structure information was used as a measure factor of the search matching block,and the best matching block was selected by the classification and screening method.Experimental results show that the proposed method can shorten the repair time under the condition of obtaining good repair effect.…”
Get full text
Article -
786
L’invention de la médiation paysagère
Published 2022-09-01“…Since the 1980s, the notion of mediation has flourished and there has been exponential growth in mediation practices and the use of mediators. …”
Get full text
Article -
787
DNA Damage and Base Excision Repair in Mitochondria and Their Role in Aging
Published 2011-01-01“…During the last decades, our knowledge about the processes involved in the aging process has exponentially increased. However, further investigation will be still required to globally understand the complexity of aging. …”
Get full text
Article -
788
Challenges for beyond 5G:ultra-densification of radio access network
Published 2020-11-01“…Ultra-densification of radio access network (RAN) is a key to efficiently support the exponentially growing mobile data traffic in 5G era.Furthermore,extremely high frequency band like mmWave band was utilized to solve the bandwidth shortage problem.However,untra-dense reusing the same radio resource produced severe interference.And the mmWave link was very harsh due to frequent blockage by obstacles.Therefore a new RAN architecture needed to be introduced to realize ultra-reliable communications in such a severe radio propagation environment.An architecture of distributed MIMO based RAN was presented.Then,enhanced interference coordination (eIC) was described.Finally,the effectiveness of distributed MIMO based RAN with eIC by computer simulation was showed.…”
Get full text
Article -
789
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
790
On Convergence of Infinite Matrix Products with Alternating Factors from Two Sets of Matrices
Published 2018-01-01“…We show that, in this case, the convergence of the matrix products under consideration is uniformly exponential; that is, AnBn⋯A1B1≤Cλn, where the constants C>0 and λ∈(0,1) do not depend on the sequence {Ai} and the corresponding sequence {Bi}. …”
Get full text
Article -
791
Survey of code-based digital signatures
Published 2021-08-01“…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
Get full text
Article -
792
About Normative Sanctities and Dissident Spiritualities
Published 2024-12-01“…These spiritual anomalies that germinated since that century grew exponentially towards the 20th century, so much that today religious practices and spiritualities in Mexico often seem to be made "à la carte", some even associated with criminal lifestyles. …”
Get full text
Article -
793
Spatial channel modeling for MIMO underwater wireless optical links
Published 2023-05-01“…Underwater wireless optical communication (UWOC) has been widely used in the construction of underwater communication network for the advantages of high data rates, small latency, high flexibility and scalability.However, due to the absorption and scattering effects of seawater, the spatial characteristics of UWOC links have not been studied extensively, especially in multiple-input multiple-output (MIMO) scenario.A linear array MIMO UWOC link geometry was considered and a weighted exponential function polynomial (WEFP) model was proposed to characterize the photon irradiance distribution at the receiving plane of general MIMO UWOC links with arbitrary numbers of light sources.Numerical results suggest that the proposed WEFP model fits well with the results of Monte Carlo simulations in turbid water environment.…”
Get full text
Article -
794
Experimental Analysis and Design Method of the JS75 Bevel- cylindrical Gear Reducer
Published 2015-01-01“…The analytical results indicate that they have a high fitting precision in the heat balance and transmission efficiency perfectly matching exponential distribution curve,and so it can be used in a forecast of the correlative experimental data. …”
Get full text
Article -
795
On the Analyticity for the Generalized Quadratic Derivative Complex Ginzburg-Landau Equation
Published 2014-01-01“…The strategy is to develop uniform and dyadic exponential decay estimates for the generalized Ginzburg-Landau semigroup e-a+it-Δα to overcome the derivative in the nonlinear term.…”
Get full text
Article -
796
On the Use of Weighted Least Squares for Time Domain Modal Parameter Identification
Published 2004-01-01“…A number of different weighting schemes are explored, based upon exponential weighting and the envelope of the measured data. …”
Get full text
Article -
797
Boundary Stabilization of Underground Multirobot System with Virtual String Constraints
Published 2022-01-01“…In this way, we get the controller to make sure the closed-loop system converge to the zero point exponentially. Then, we construct a Lyapunov function to analyze the stability for the closed-loop system. …”
Get full text
Article -
798
Chemical Application of Topological Indices in Infertility Treatment Drugs and QSPR Analysis
Published 2023-01-01“…We conducted a QSPR investigation on the prospective degree-based topological descriptors using quadratic, cubic, exponential, and logarithmic regression models.…”
Get full text
Article -
799
Link quality based path delay analysis in wireless sensor networks
Published 2014-06-01“…The upper bound of the probability of a path meeting the deadline was given based on link quality, of which the time complexity was proved to be exponential. Moreover, the greedy algorithm (RROP) was proposed to maximize the end-to-end packet deliver ratio under a given deadline, considering the quality of each link. …”
Get full text
Article -
800
Research of fast decoding for longer constraint length convolutional codes
Published 2010-01-01“…To overcome the disadvantage of Viterbi decoding algorithm, in which its complexity exponentially increases with the increasing constraint length of convolutional codes, and the decoding delay was too large to fit the decoding of longer constraint length convolutional codes, a fast decoding of convolutional codes for longer constraint length, based on improved particle swarm optimization algorithm, was proposed. …”
Get full text
Article