-
1601
Model of a Photovoltaic Module for the MatLab/Simulink SimPowerSystems Library
Published 2020-12-01“…The developed Simulink model operates on the base of a well-known exponential dependence describing the volt-ampere characteristic of a photovoltaic module, and also takes into account the real circuit of the module with bypass diodes. …”
Get full text
Article -
1602
Numerical Simulation of Rock Plate Cutting with Three Sides Fixed and One Side Free
Published 2018-01-01“…The cutting speed has nonsignificant influence on the peak force. The strong exponential relationship was obtained between the peak force and cutting position, thickness, height, and width of the rock plate at a confidence level of 0.95. …”
Get full text
Article -
1603
Time Characteristics of the Influence Radius by Injecting N2 to Displace Coalbed Methane: A Case Study
Published 2019-01-01“…The results show the following: Under different gas injection pressure conditions, the influence radius increases exponentially as injection time increases, but the rate of increase of the influence radius decreases gradually. …”
Get full text
Article -
1604
Design and Analysis of a Multiple and Wide Nulling Collaborative Beamforming Scheme in the Domain of 3-Dimensional Wireless Sensor Networks
Published 2022-01-01“…An increase in the number of collaborating nodes is found to increase nulling depth at an exponentially decaying rate. An increase in the collaborating nodes’ cluster radius yields a reduction in null width. …”
Get full text
Article -
1605
Dual medical image watermarking using SRU-enhanced network and EICC chaotic map
Published 2024-12-01“…In this study, a dual watermarking scheme based on SRU-ConvNeXt V2 (SCNeXt) model and exponential iterative-cubic-cosine (EICC) chaotic map is proposed for medical image integrity verification, tamper localization, and copyright protection. …”
Get full text
Article -
1606
Coupled Effect of Water Temperature and Cyclic Wetting and Drying on Dynamic Mechanical Characteristics of Sandstone
Published 2019-01-01“…Both physical and dynamic uniaxial compressive characteristics deteriorate in an exponential function with the increase of wetting and drying cycles. …”
Get full text
Article -
1607
The Effect of Delay Techniques on a Lassa Fever Epidemic Model
Published 2024-01-01“…By introducing a delay parameter and decay exponential term into the existing model in the literature, we got the system of highly nonlinear delay differential equations (DDEs). …”
Get full text
Article -
1608
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01“…A single public key is computed as the first and the second public keys, elements of which are computed exponentiating two different generators of cyclic groups in each of the algebras. …”
Get full text
Article -
1609
Wall Pressure and Blade Surface Pressure in a Side Channel Blower
Published 2018-01-01“…Low integral pressure differences show a nearly linear increase of the pressure in circumferential direction, while greater integral pressure differences evolve exponentially over the azimuth. The results confirm the circulatory flow theory. …”
Get full text
Article -
1610
Therapeutic ultrasound transducer technology and monitoring techniques: a review with clinical examples
Published 2024-12-01“…The exponential growth of therapeutic ultrasound applications demonstrates the power of the technology to leverage the combinations of transducer technology and treatment monitoring techniques to effectively control the preferred bioeffect to elicit the desired clinical effect.Objective: This review provides an overview of the most commonly used bioeffects in therapeutic ultrasound and describes existing transducer technologies and monitoring techniques to ensure treatment safety and efficacy.Methods and materials: Literature reviews were conducted to identify key choices that essential in terms of transducer design, treatment parameters and procedure monitoring for therapeutic ultrasound applications. …”
Get full text
Article -
1611
Review of Image Processing Methods in Solar Photospheric Data Analyzes
Published 2023-10-01“…With the exponential growth in data volume, especially in recent decades, the demand for data processing has surged across all scientific fields. …”
Get full text
Article -
1612
CMOS Single-Photon Avalanche Diode Circuits for Probabilistic Computing
Published 2024-01-01“…Results from the circuit design space show that the time-to-analog-based designs introduced in this work can produce highly exponential and analytical transfer functions, but that the less analytically tractable output of the previously proposed filter-based designs can achieve less variability in a smaller footprint. …”
Get full text
Article -
1613
Comparisons between Asphalt Pavement Responses under Vehicular Loading and FWD Loading
Published 2020-01-01“…Field strain measurements indicate that the asphalt layer strain under vehicular loading increases with the rising temperature roughly in an exponential mode, while it decreases with the rising vehicular speed approximately linearly. …”
Get full text
Article -
1614
A retrial queueing system with processor sharing and impatient customers
Published 2022-06-01“…Customers in orbit show impatience: each of them can leave orbit forever if the time of its stay in orbit exceeds some random time distributed according to an exponential law. Service times of customers of different types are distributed according to the phase law with different parameters. …”
Get full text
Article -
1615
Assessment of Groundwater Quality in the Talensi District, Northern Ghana
Published 2020-01-01“…Based on the water quality index (WQI) technique modified for the district and an interpolation technique using ordinary kriging developed from a well-fitted exponential semivariogram for the estimated WQIs, the groundwater quality has been spatially classified as generally ‘good’ to ‘excellent’ for domestic purposes. …”
Get full text
Article -
1616
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
Get full text
Article -
1617
Experimental Investigation of Geosynthetic-Reinforced Pile-Supported Composite Foundations under Cyclic Loading
Published 2020-01-01“…The relationship between the foundation settlement and the number of load cycles can be expressed by an exponential regression function. The pile strain varied from place to place that the strain of the upper part of the pile was greater than that of the lower part. …”
Get full text
Article -
1618
Studying Forgetting in Faster R-CNN for Online Object Detection: Analysis Scenarios, Localization in the Architecture, and Mitigation
Published 2025-01-01“…First, we observe that the forgetting curves of the Faster R-CNN exhibit patterns similar to those described in human memory studies by Hermann Ebbinghaus: knowledge is lost exponentially over time and recall improves knowledge retention. …”
Get full text
Article -
1619
COLLAPSE TECTOLOGY AND MODERNITY
Published 2024-12-01“…The study found that the Enlightenment belief in the constant and exponential growth of society is a myth. Modernity is faced with numerous problems: an increase in the costs of human self-maintenance, an aging population and a decrease in its number as the scientific and technological development of the countries of the world grows. …”
Get full text
Article -
1620
Experimental investigation of gas seepage characteristics in coal seams under gas-water-stress function
Published 2025-01-01“…On the other hand, the connection between permeability and moisture content, can be represented by a quadratic or exponential function. At low levels of moisture content, gas pressure has the most pronounced effect on permeability of coal samples, followed by moisture content and effective stress. …”
Get full text
Article