Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mass media 2
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- Research 2
- Agriculture 1
- Anesthesiology 1
- Communication in rehabilitation 1
- Corporate culture 1
- Descriptive cataloging 1
- Economic aspects 1
- Electronic circuits 1
- Examinations, questions, etc 1
- Medical rehabilitation 1
- Nursing 1
- Nursing Assessment 1
- Nursing Care 1
- Organizational behavior 1
- Organizational sociology 1
- Perioperative Nursing 1
- Regression analysis 1
- Rehabilitation 1
- Social sciences 1
- Standards 1
- Statistical methods 1
- Surgical nursing 1
- Telecommunication in medicine 1
- Telemedicine 1
-
4061
Receiver design of sparse Bayesian learning based MIMO-OFDM power line communication system
Published 2022-02-01“…The rich impulsive noise in the power line channel poses a huge challenge to the design of MIMO-OFDM transceiver.To solve this problem, a design scheme that can jointly estimate the channel and impulsive noise was proposed, which exploited the parametric sparsity of the classical multipath model and the sparsity of the time domain impulsive noise.In this scheme, the unknown channel model parameters and the impulsive noise were jointly regarded as a sparse vector.By observing the spatial correlation of MIMO system, a compressed sensing model based on multiple measurement vectors was constructed.The multiple response sparse Bayesian learning theory was introduced to jointly estimate the MIMO channel parameters and impulsive noise.The simulation results show that, compared with the traditional receiver scheme that considers MIMO channel estimation and impulsive noise suppression separately, the receiver proposed has a significant improvement in channel estimation performance and bit error rate performance.…”
Get full text
Article -
4062
Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking
Published 2017-07-01“…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
Get full text
Article -
4063
Energy Sharing and Performance Bounds in MIMO DFRC Systems: A Trade-Off Analysis
Published 2024-01-01“…It is a fundamental problem to analyze the performance bound of multiple-input multiple-output dual-functional radar-communication systems. …”
Get full text
Article -
4064
Recent Advances: The Imbalance of Cytokines in the Pathogenesis of Inflammatory Bowel Disease
Published 2017-01-01“…Recent studies show the beneficial effects of anticytokine treatments to IBD patients, and multiple novel cytokines are found to be involved in the pathogenesis of IBD. …”
Get full text
Article -
4065
Double reputation and multi-angle weight-based cooperative spectrum sensing method against SSDF attacks
Published 2023-12-01“…In order to improve the ability of cooperative spectrum sensing to withstand spectrum sensing data falsification (SSDF) attacks, a double reputation and multi-angle weight-based cooperative spectrum sensing (DRMW-CSS) method was proposed.Firstly, a scoring reputation was obtained by multiple iterations of historical local decision results, and an accuracy reputation was calculated on this basis.Secondly, secondary users (SU) were screened by double reputation and multiple reputation thresholds.Then, the impact of SSDF attacks on the screening method was judged and divided into three situations.Finally, the final global decision was made using the corresponding multi-angle weight data fusion decision method according to different situations.Simulation results show that the proposed method has good sensing accuracy when facing SSDF attacks with different attack strategies and probabilities, and has better anti-attack capability compared to traditional methods.…”
Get full text
Article -
4066
An survey on application of artificial intelligence in 5G system
Published 2021-05-01“…With the continuous development of 5G, the era of the internet of everything is coming.Problems such as massive device connections, massive application requests, ultra-high network load and complex dynamic network environment pose great challenges to the optimization of 5G systems in the context of the internet of everything.Facing these challenges, artificial intelligence (AI) shows its unique advantages.Firstly, the advantages of deep learning driven AI algorithms in 5G system compared with conventional algorithms were briefly introduced.Then, the application of AI algorithms in multi-access edge computing (MEC) and mmWave massive multiple-input multiple-output (MIMO) system were described in detail, with advantages and disadvantages of each method being compared and analyzed.Finally, according to the existing research, the shortcomings of AI algorithms in 5G application scenarios were summarized and the future research directions were forecasted.…”
Get full text
Article -
4067
Abandon Policies for Two Types of Multiattempt Missions
Published 2022-01-01“…When the task is important, the systems can try to execute the task multiple times after the task is abandoned and the rescue is completed, to improve the probability of task completion. …”
Get full text
Article -
4068
Compressed Sensing in On-Grid MIMO Radar
Published 2015-01-01“…The accurate detection of targets is a significant problem in multiple-input multiple-output (MIMO) radar. Recent advances of Compressive Sensing offer a means of efficiently accomplishing this task. …”
Get full text
Article -
4069
Phase-Feeding the Beef Herd for Improved Feed Utilization
Published 2005-12-01“…Phase feeding in the dairy industry is implemented based on placing cows into multiple feeding groups based on their lactation status. …”
Get full text
Article -
4070
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
4071
Low pilot overhead parametric channel estimation scheme for RIS-assisted mmWave MIMO systems
Published 2024-09-01“…To address the timely acquisition of channel state information in reconfigurable intelligent surface (RIS)-assisted millimetre wave (mmWave) multiple-input multiple-output (MIMO) systems, a channel estimation scheme based on tensor decomposition was proposed. …”
Get full text
Article -
4072
Hazardous State Analysis of Landslide Mass Based on Cumulative Displacement of Landslide
Published 2023-01-01“…To solve the problem of incomplete analysis of individual landslide hazardous states,this paper proposes a multiple perspective analysis method of landslide's hazardous state based on landslide cumulative displacement.Firstly,the limit displacement criterion is used to determine the early warning stage where the landslide locates.Secondly,the landslide stable state is evaluated by the cusp mutation theory.Thirdly,the development trend of the landslide mass is determined by using rescaled range analysis.Then,the fuzzy matrix is established to determine the hazardous state of the landslide.However,since a single detection point cannot accurately reflect the overall hazardous state of the landslide,multiple monitoring points are used to identify the overall hazardous state of the landslide.Finally,the method is applied to the Bazimen landslide to verify its effectiveness.The results show that this method can effectively identify the local and the whole hazardous state of the landslide.…”
Get full text
Article -
4073
Art Online Design Based on Digital Simulation Technology
Published 2021-01-01“…In addition, by combining the two free-form surfaces to enter the 3D modeling software, we can obtain an optical lens with multiple free-form surfaces to improve the digital simulation effect. …”
Get full text
Article -
4074
6G oriented wireless communication channel characteristics analysis and modeling
Published 2020-03-01“…,global coverage,all spectrums and all applications,we comprehensively survey 6G related wireless channel measurements,channel characteristics,and channel models for all frequency bands and all scenarios.Millimeter wave (mmWave),terahertz (THz),optical band,satellite,unmanned aerial vehicle (UAV),maritime,underwater acoustic,high-speed train (HST),vehicle-to-vehicle (V2V),massive/ultra-massive multiple-input multiple-output (MIMO),orbital angular momentum (OAM),and industry Internet of things (IoT) communication channels were particularly investigated.The related 6G channel measurement and modeling results were also given.Finally,future research challenges on 6G channel measurements and modeling were pointed out.…”
Get full text
Article -
4075
Dynamic Range Consideration in MIMO Systems with Hybrid Antenna Selection
Published 2011-01-01“…A Hybrid Antenna Selection (HAS), also called Soft Antenna Selection (SAS), method is basically implemented by a Linear Network (LN) located in RF domain of Multiple Input Multiple Output (MIMO) systems. In this paper, we evaluate the SAS-MIMO system, which is optimally tuned based on spatial multiplexing/diversity transmissions, in terms of receiver dynamic range issue. …”
Get full text
Article -
4076
Blueprint for All-to-All-Connected Superconducting Spin Qubits
Published 2025-01-01“…While recent experiments have successfully coupled two ASQs, how to realize a scalable architecture for extending this coupling to multiple distant qubits remains an open question. In this work, we resolve this challenge by introducing an architecture that achieves all-to-all connectivity between multiple remote ASQs. …”
Get full text
Article -
4077
Novel antenna selection algorithm for STBC and VBLAST hybrid coding systems
Published 2009-01-01“…Multiple-input multiple-output (MIMO) systems improve the bit error rate (BER) performance, meanwhile,in order to reduce the impact to system capacity, a novel antenna selection algorithm for space-time block coding (STBC) and vertical Bell laboratories layered space time (VBLAST) hybrid coding systems was proposed. …”
Get full text
Article -
4078
Node-link simultaneous mapping based multi-type service resource orchestration algorithm
Published 2024-04-01“…The physical network node attributes were considered when mapping the first node, the physical network node attributes and link attributes were comprehensively considered when mapping node-link tuples, and the network link attributes were considered when mapping links, so as to find the mapping policy for virtual network requests in the underlying physical network containing multiple types of service resources. Simulation results show that the proposed algorithm can reduce the blocking rate of virtual network requests and improve the utilization efficiency of multiple types of resources in the physical network.…”
Get full text
Article -
4079
Energy dissipation balanced and reliable clustering algorithm for wireless sensor networks
Published 2012-11-01“…A novel clustering algorithm for wireless sensor networks was proposed to resolve the hot spot problem and the single failure problem.The algorithm divided the network into unequal grids,and the nodes in the same grid form a cluster.The number of cluster heads in each grid was determined according to the failure probability of nodes,and the data collection of nodes in a grid was implemented by multiple cluster heads of the grid cooperatively.By adjusting the number of nodes that could participate in cluster head rotation of each grid,the algorithm was able to balance the energy dissipation of nodes on a long view.The algorithm reduced the reliance of cluster members to single cluster head by forming cluster with multiple cluster heads.Furthermore,the algorithm adopted some measures to diminish energy consumption.Simulation results show that the algorithm has higher balanced extent of energy dissipation and reliability of data collection,and prolongs the lifetime of network.…”
Get full text
Article -
4080
Alternative RNA Splicing in Cardiac Diseases
Published 2025-01-01“…In the cardiovascular system, AS of transcripts of sarcomere, ion channel, and cell signaling protein genes, as well as long non-coding RNAs, can contribute to the development of cardiovascular diseases. In addition, multiple hereditary heart-related diseases are caused by mutations associated with AS. …”
Get full text
Article