-
681
Robustness of Dengue Complex Network under Targeted versus Random Attack
Published 2017-01-01“…The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. …”
Get full text
Article -
682
Deadbeat Control of a Modified Single-Phase Five-Level Photovoltaic Inverter with Reduced Number of Switches
Published 2020-01-01“…Compared with the presented inverters, the introduced topology has the advantage of decreased device count and the first switching frequency for high blocking voltage switches. …”
Get full text
Article -
683
Exploiting Partial Reconfiguration through PCIe for a Microphone Array Network Emulator
Published 2018-01-01“…However, the evaluation and the selection of the most accurate and power-efficient network’s topology are not trivial when considering dynamic MEMS microphone arrays. …”
Get full text
Article -
684
Modal Strain Based Method for Dynamic Design of Plate-Like Structures
Published 2016-01-01“…Firstly, the application of the proposed method is conducted on a central-massed flat plate which was topologically optimized by the Reference. The results of modal strain analysis at the first mode have good agreement with the results from the topology optimization. …”
Get full text
Article -
685
-
686
Extremal points without compactness in L1(μ)
Published 2007-01-01“…We investigate the existence of extremal points and the Krein-MIlman representation A=co̅ExtA of bounded convex subsets of L1(μ) which are only closed with respect to the topology of μ-a.e. convergence.…”
Get full text
Article -
687
An approximate likelihood method reveals ancient gene flow between human, chimpanzee and gorilla
Published 2024-01-01“…., gene trees that differ in topology from each other and from the species tree. …”
Get full text
Article -
688
Phylogenomic approaches reveal a robust time-scale phylogeny of the Terminal Fusarium Clade
Published 2024-06-01“…We presented a new robust topology of the TFC that differs at some nodes from previous studies. …”
Get full text
Article -
689
Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network
Published 2014-01-01“…In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. …”
Get full text
Article -
690
A High-Speed and Low-Offset Dynamic Latch Comparator
Published 2014-01-01“…In this research, a novel topology of dynamic latch comparator is illustrated, which is able to provide high speed, low offset, and high resolution. …”
Get full text
Article -
691
Some Properties of Fuzzy Quasimetric Spaces
Published 2010-01-01“…Some properties of fuzzy quasimetric spaces are studied. We prove that the topology induced by any 0𝑥0005𝑒𝑀-complete fuzzy-quasi-space is a 0𝑥0005𝑒𝑑-complete quasimetric space. …”
Get full text
Article -
692
A Network-Based Impact Measure for Propagated Losses in a Supply Chain Network Consisting of Resilient Components
Published 2018-01-01“…The topology of a supply chain network affects the impacts of disruptions in it. …”
Get full text
Article -
693
A Novel Active Vibration Control Method for Helicopter Fuselages Based on Diffusion Cooperation
Published 2023-01-01“…It determined whether a secondary path was discarded or not and formed the topology of a large-scale multichannel system control network. …”
Get full text
Article -
694
Elimination of the Impact Produced by DG Units on the Voltage Profile of Distribution Networks
Published 2020-01-01“…The criteria of the allocation of the var devices and the required network reinforcement are developed in this paper, considering all possible topology structures, and an innovative codification method is introduced to reduce the needed computation time and communication data to actualize the sensitivity coefficients and get the proposed control approach flexible with network topology reconfiguration. …”
Get full text
Article -
695
Resting-State fMRI Whole Brain Network Function Plasticity Analysis in Attention Deficit Hyperactivity Disorder
Published 2022-01-01“…We compared altered topology properties of brain network between the groups from multilevel, mainly including modularity at mesolevel. …”
Get full text
Article -
696
A voltage weak node identification method considering fault reconstruction in distribution networks
Published 2025-01-01“…In this paper, based on the holomorphic embedding method, the offset characteristics of node voltage indicator trajectories under topology changes are studied, and a weak node identification method considering fault reconfiguration in distribution networks is proposed. …”
Get full text
Article -
697
Children Tracking System Based on ZigBee Wireless Network and Neural Network
Published 2023-03-01“…The findings indicate that the 20-20 ANN topology can achieve higher accuracy than other topologies. …”
Get full text
Article -
698
A Dynamic Probabilistic Based Broadcasting Scheme for MANETs
Published 2016-01-01“…The basic characteristic of MANET is dynamic topology. Due to the dynamic behavior nature, the topology of the network changes very frequently, and this will lead to the failure of the valid route repeatedly. …”
Get full text
Article -
699
Modular nine-level single-phase inverter with quadruple voltage gain using reduced blocking voltage switches
Published 2025-03-01“…An essential feature of this topology is that all the switches are subjected to a maximum blocking voltage four times lower than the maximum AC voltage that can be applied to the load. …”
Get full text
Article -
700
Key Transmission Section Search Based on Graph Theory and PMU Data for Vulnerable Line Identification in Power System
Published 2023-01-01“…First, the method combines with the graph theory and PMU data to construct the grid topology map. Second, the comprehensive indicators for screening vulnerable lines are proposed by fully considering the network topology and line capacity, which combines with power exchange efficiency and energy fluctuation probability. …”
Get full text
Article