Showing 3,941 - 3,960 results of 21,030 for search '"multiplication"', query time: 0.11s Refine Results
  1. 3941

    Stochastic Synchronization of Neutral-Type Neural Networks with Multidelays Based on M-Matrix by Wuneng Zhou, Xueqing Yang, Jun Yang, Jun Zhou

    Published 2015-01-01
    “…Firstly, we designed a control law of stochastic synchronization of the neural-type and multiple time-delays neural network. Secondly, by making use of Lyapunov functional and M-matrix method, we obtained a criterion under which the drive and response neutral-type multiple time-delays neural networks with stochastic disturbance and Markovian switching are stochastic synchronization. …”
    Get full text
    Article
  2. 3942

    High Isolation Millimeter-Wave Wideband MIMO Antenna for 5G Communication by Fei Wang, Zhaoyun Duan, Xin Wang, Qing Zhou, Yubin Gong

    Published 2019-01-01
    “…The operation band ranges from 24 GHz to 39 GHz which covers most of the Ka band. Furthermore, a 9×9 multiple-input-multiple-output (MIMO) antenna is developed. …”
    Get full text
    Article
  3. 3943

    Study on multi-channel reservation based MAC protocol for sensor networks by ZHANG De-sheng1, LI Jin-bao1, GUO Long-jiang1

    Published 2011-01-01
    “…Aiming at triple hidden terminal problems in wireless sensor networks,an adaptive duty cycle based multi-channel MAC protocol was proposed,called MCR.MCR efficiently handled triple hidden terminal problems with multiple channel reservation.By minimizing the lower bound of average times of channel switching in MCR,the optimal duty cycle in theoretical analysis was obtained.To investigate values of multiple channel reservation and dynamic duty cycling in MCR,extensive simulation and real testbed experiments were conducted.The results show that compared with other protocols,when the number of channels is larger or loads are heavy,M-cube improves throughput and energy effi-ciency significantly.…”
    Get full text
    Article
  4. 3944

    Magnetic Foreign Body Ingestion in Children: The Attractive Hazards by Anna Lin, Lawrence Chi Ngong Chan, Kam Lun Ellis Hon, Siu Yan Bess Tsui, Kristine Kit Yi Pang, Hon Ming Cheung, Alexander K. C. Leung

    Published 2019-01-01
    “…We present two cases of multiple magnetic foreign body ingestion, which to our knowledge are the first ones reported in Hong Kong. …”
    Get full text
    Article
  5. 3945

    Joint DOA and DOD Estimation Based on Tensor Subspace with Partially Calibrated Bistatic MIMO Radar by Junxiang Wang, Ping Huang, Dingjie Xu

    Published 2018-01-01
    “…A joint direction-of-departure (DOD) and direction-of-arrival (DOA) estimation algorithm based on tensor subspace approach for partially calibrated bistatic multiple-input multiple-output (MIMO) radar is proposed. …”
    Get full text
    Article
  6. 3946

    Research Progress of Programmed Cell Death Induced by Acrylamide by Jing Wang, Jinfeng Yu, Man Wang, Liangliang Fang, Wenjuan Yang, Wenbo Yao, Nan Li, Pin Gong

    Published 2023-01-01
    “…Multiple studies have shown that acrylamide could exert its toxic effect by inducing programmed cell death, but its specific molecular mechanism is still unclear. …”
    Get full text
    Article
  7. 3947

    Modeling and Analysis of Material Flows in Re-Entrant Supply Chain Networks Using Modified Partial Differential Equations by Fenglan He, Ming Dong, Xiaofeng Shao

    Published 2011-01-01
    “…Finally, based on the modified continuum model, numerical examples of different re-entrant degrees are given, meanwhile, the changes in the WIP and outflux are analyzed in details for multiple re-entrant supply chain systems.…”
    Get full text
    Article
  8. 3948

    A Narrative Review of Existing Options for COVID-19-Specific Treatments by Wasey Ali Yadullahi Mir, Abdul Hasan Siddiqui, Gautam Valecha, Shawn Patel, Fatima Ayub, Riddhi Upadhyay, Sana Ahmed Alhajri, Suman Gaire, Dhan Bahadur Shrestha

    Published 2021-01-01
    “…Therefore, drugs targeting various pathologic aspects of the disease are being explored. Multiple studies have been published to demonstrate their clinical efficacy until now. …”
    Get full text
    Article
  9. 3949

    Thoracic endovascular aortic repair (TEVAR) for an acute type A aortic dissection following transcatheter aortic valve replacement (TAVR) by Vy C. Dang, BS, Paul Haddad, MD, Ross G. McFall, MD, Jennifer Klopfenstein, MD, Michael J. Reardon, MD, Maham Rahimi, MD, PhD

    Published 2025-02-01
    “…An 86-year-old male with multiple medical comorbidities was referred for an elective transcatheter aortic valve replacement (TAVR) for severe symptomatic aortic stenosis with an ejection fraction of 35%. …”
    Get full text
    Article
  10. 3950

    Acute Pancreatitis Secondary to Hemobilia after Percutaneous Liver Biopsy: A Rare Complication of a Common Procedure, Presenting in an Atypical Fashion by Ramy Mansour, Justin Miller

    Published 2018-01-01
    “…Percutaneous Liver Biopsy is an often-required procedure for the evaluation of multiple liver diseases. The complications are rare but well reported. …”
    Get full text
    Article
  11. 3951

    Introduction: From the idea of Africa to the African idea of Africa by Sabelo J. Ndlovu-Gatsheni, Bongani Ngqulunga

    Published 2022-11-01
    “…At the University of Bayreuth, the research project is also part of The African Multiple Cluster of Excellence supported by the Deutsche Forschungsgemeinschaft (grant number EX 20521-390713894). …”
    Get full text
    Article
  12. 3952

    Host security threat analysis approach for network dynamic defense by Lixun LI, Bin ZHANG, Shuqin DONG

    Published 2018-04-01
    “…Calculating the host security threat in network dynamic defense (NDD) situation has to consider the vulnerabilities’ uncertainty because of dynamic mutation.Firstly,the vulnerabilities’ uncertainty caused by the mutation space and the mutation period was calculated by random sampling model,and combined with the CVSS,the attack success probability formula of single vulnerability was derived.Secondly,to avoid self-loop during the path searching process in multiple vulnerabilities situation,an improved recursive depth first algorithm which combined with node visited queue was proposed.Then,the host security threat was calculated based on attack success probability in the situation of multiple vulnerabilities and paths.Finally,approach’s availability and effectiveness were verified by an experiment conducted in a typical NDD situation.…”
    Get full text
    Article
  13. 3953

    Modified SLM algorithm based on cyclic shift and signal combination in MIMO-OFDM system by Wu-jun HU, Lin YANG

    Published 2015-04-01
    “…In order to reduce the computational complexity of conventional selective mapping (SLM) algorithm in multiple input multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system,more candidate sequence sets will be produced.With different peak to average power ratio (PAPR) by time domain cyclic shift and signal combination between the antennas.The receiving part can restore the rotation signals by using the sequence selection order of the transmitting part and also the original signals by comparing the inversed rotation sequence with its nearest constellation points.The simulation results show that the proposed method can effectively reduce the PAPR of OFDM signals.In addition,compared with the conventional SLM algorithm,the proposed method can reduce the algorithm computation complexity significantly and obtain similar bit error rate (BER) performance.…”
    Get full text
    Article
  14. 3954

    New NOMA power allocation strategy by Yong CAO, Zhen YANG, You-hong FENG

    Published 2017-10-01
    “…Non-orthogonal multiple access(NOMA) has been widely used in the research of the fifth generation communication,due to the advantages of improving the spectrum efficiency and data rate.In order to guarantee the service of users,a new power allocation strategy was proposed to improve the fairness of users in the cell edge.According to the proportional fairness method,the goal was to maximize the proportionality fairness factor among the users with the least fairness in multiplexed users.The nonconvex objective function was transformed into convex function,and the optimal solution of problem was obtained by KKT optimal constraint condition.Simulation results show that the new NOMA-based power allocation strategy proposed outperforms the traditional orthogonal multiple access technology (OMA).…”
    Get full text
    Article
  15. 3955

    Speeding Up FPGA Placement via Partitioning and Multithreading by Cristinel Ababei

    Published 2009-01-01
    “…In the first step of this approach placement subproblems are created by partitioning and then processed concurrently by multiple worker threads that are run on multiple cores of the same processor. …”
    Get full text
    Article
  16. 3956

    Network analytical model of tandem queuing RED and ERED by CHI Xue-fen, ZHAO Ying-ying

    Published 2011-01-01
    “…Based on the tandem queuing network theory,tandem queuing RED and ERED analytical models were established which emprise multiple network nodes.The RED algorithm with exponent packet loss distribution function was derived(ERED).In probability generation function domain,departure process of a node was derived and then fitted for the follow-up node’s arriving process,thus,the multiple nodes relayed congestion control sinarios could be depicted.Network performances of three tandem queuing AQM algorithms(RED,ERED and DT) were presented by solving queu-ing system.The problems of AQM parameter setting and its effect on system performance were analyzed.Considering two types of traffic with different degrees of burst,performance indicators for each node in tandem queuing system are investigated,and specially,system end-to-end performance indicators are derived.…”
    Get full text
    Article
  17. 3957

    Object detection and multimodal learning for product recommendations by Karolina Selwon, Paweł Wnuk

    Published 2025-01-01
    “…The proposed approach is an algorithm for recommending multiple products based on visual and textual features, ensuring compatibility with query items. …”
    Get full text
    Article
  18. 3958

    Semi-dynamic pilot allocation based on graph coloring in massive MIMO systems by Fangmin XU, Hui QIAN, Haiyan CAO

    Published 2020-11-01
    “…To alleviate the performance loss caused by pilot contamination in massive multiple-input multiple-output (MIMO) systems,a semi-dynamic pilot allocation scheme based on graph coloring was proposed.Firstly,a pilot reuse threshold was derived for users.Then,based on the pilot reuse threshold,users of each cell are divided into cell-center users and cell-edge users,where cell-center users were allowed to reuse the same pilot.Finally,based on the graph coloring theory,the pilot resources were allocated to cell-edge users with serious pilot interference by multi-cell coordination.The simulation results show that the proposed pilot allocation scheme reduces the pilot interference and improves the uplink achievable rate of the whole system effectively.…”
    Get full text
    Article
  19. 3959

    From Fibonacci Sequence to the Golden Ratio by Alberto Fiorenza, Giovanni Vincenzi

    Published 2013-01-01
    “…We show that the Golden ratio coincides with this limit not because it is the root with maximum modulus and multiplicity of the characteristic polynomial, but, from a more general point of view, because it is the root with maximum modulus and multiplicity of a restricted set of roots, which in this special case coincides with the two roots of the characteristic polynomial. …”
    Get full text
    Article
  20. 3960

    Joint estimation of doppler frequency and DOA-DOD based on FRFT in bistatic MIMO radar system by Li LI, Tian-shuang QIU

    Published 2012-11-01
    “…A novel method for the joint parameters estimate in the bistatic multiple-input multiple-output (MIMO) radar system was proposed.Firstly,a novel signal model to accurately estimate parameters of the et was proposed.Two Doppler parameters,initial Doppler frequency and Doppler frequency rate,were estimated by peak-searching in the fractional Fourier transform (FRFT) domain.Two sub-array models to accurately estimated the direction of departure (DOD) and direction of arrival (DOA) by employing the proposed fractional Fourier transform based MUSIC (FRFT-MUSIC) algorithm and the fractional Fourier transform ESPRIT (FRFT-ESPRIT) algorithm.Simulation results were presented to verify the effectiveness of the proposed method.…”
    Get full text
    Article