Showing 1,981 - 2,000 results of 29,992 for search 'Achaea~', query time: 2.47s Refine Results
  1. 1981

    Artificial Potential Field-Based Multi-UAV Formation Control and Target Tracking by He Song, Shaolin Hu, Wenqiang Jiang, Qiliang Guo, Ming Zhu

    Published 2022-01-01
    “…To simultaneously achieve space formation flight and target tracking of multiple unmanned aerial vehicles (UAVs) and solve the rotation buffeting problem of the UAV, a robust formation control and target tracking algorithm is proposed. …”
    Get full text
    Article
  2. 1982

    Smart GNSS Integrity Monitoring for Road Vehicles: An Overview of AI Methods by Ines Viveiros, Helder Silva, Yuri Andrade, Cristiano Pendao

    Published 2025-01-01
    “…Integrity monitoring is a key criterion for achieving robust and safe navigation systems. This work explores two integrity frameworks: the classical methods and their respective evolution towards the road vehicle urban scenario, and the artificial intelligence-based methods, where the monitoring process is accomplished by data analysis and learning techniques. …”
    Get full text
    Article
  3. 1983

    The transparency of the South African Reserve Bank by Anna Oksiutycz

    Published 2022-11-01
    “…It revealed that the SARB, through having achieved a relatively high level of economic and policy transparency, achieved lower procedural and political transparency. …”
    Get full text
    Article
  4. 1984

    Attribute-based revocable collaborative access control scheme by Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU

    Published 2021-05-01
    “…To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group-based attribute group were changed to reflect the update of rights, and further, an efficient re-encryption algorithm was used to realize the immediate revocation of attributes and users.The translation value was used to achieve the revocation of collaborative policy by update corresponding ciphertext.The security analysis shows the scheme can guarantee data confidentiality, forward/backward security, and resist collusion attack under chosen plaintext attack.Compared with the related works, the proposal achieved more complete and efficient revocation scheme.…”
    Get full text
    Article
  5. 1985

    Controlled Environment Agriculture (CEA): A Promising Solution with Challenges in Tropical Zones by Choomjaihan Prasan, Onmankhong Jiraporn, Khwamphairn Bussaya, Sribua-iam Nattakan, Ninbua Metaporn, Subsomboon Ratchanon

    Published 2025-01-01
    “…However, a key limitation of DECS is the inability to achieve desired temperature reductions. This study investigated and compared a two-stage pre-cooling system utilizing a heat exchanger in combining with DECS, against the traditional single-stage approach. …”
    Get full text
    Article
  6. 1986

    Improved particle filtering based algorithm for time delay and symbols joint estimation of PSK signals by Nan XIA, Tian-shuang QIU

    Published 2012-04-01
    “…An adaptive particle filtering algorithm based on resampling was proposed for time delay estimation of PSK signals,which could eliminate the influence of inaccurate posterior possibility distribution caused by the small noise variance and the influence of the increase of estimation error caused by the large noise variance.Taking into account the small time delay estimation being invalid in the existing algorithms,a symbol forward and backward detection technique was applied to achieve random time delay accurate estimation in a symbol period.Otherwise,the carrier frequency offset of the received signal was estimated and compensated.Simulation results verify the novel algorithm can achieve more accurate time delay estimation and lower symbol error rate than the existing algorithm.…”
    Get full text
    Article
  7. 1987

    RSPEED:the reliability and real-time routing based on uncertain delay in wireless sensor network by Quan CHEN, Hong GAO

    Published 2013-08-01
    “…The forwarding reliability was proposed by considering the unreliability and the delay of a link,and with which,a novel real-time routing protocol(RSPEED) was designed.The forwarding reliability denoted the probability to deliver the data successfully to the neighbor node under a given deadline,and it was used to achieve probabilistic QoS guarantee in timeliness and reliability.The protocol can also make trade-off between the transmission delay and the reliability of transmission to improve the probability of successful transmission when the environment and link quality is very poor.The experimental results show that the proposed approach can significantly improve the reliability of transmission and reduces the number of the missed deadline,and even when the channel is very poor,it can achieve 20% higher performance than SPEED.…”
    Get full text
    Article
  8. 1988

    Enhancing the Journal by Keith A Sharkey

    Published 2004-01-01
    “…So, I would argue, we can achieve more and make the Journal better.…”
    Get full text
    Article
  9. 1989

    Collaborative Governance Challenges of the COVID-19 Pandemics: Czech Republic and Slovakia by Daniel Klimovsky, Ivan Maly, Juraj Nemec

    Published 2021-05-01
    “… The goal of this article is to evaluate what the Czech and Slovak governments have done to protect their countries and try to assess why they have achieved different results for the first and second waves of the Covid- 19 pandemic. …”
    Get full text
    Article
  10. 1990

    Research and Practice of Big Data Platform of Games by Yang Su, Xiaojun Liu, Yong Tang, Yang Huang

    Published 2014-10-01
    “…Two types of data to achieve the orderly were unified handed over to traditional relational database model to build relationships and showed that could be achieved through efficient handling of business analysis data, but also to meet the scale of disorderly log data processing requirements. …”
    Get full text
    Article
  11. 1991

    Observation of quantum temporal correlations well beyond Lüders bound by Chun-Wang Wu, Man-Chao Zhang, Yan-Li Zhou, Ting Chen, Ran Huang, Yi Xie, Wen-bo Su, Bao-Quan Ou, Wei Wu, Adam Miranowicz, Franco Nori, Jie Zhang, Hui Jing, Ping-Xing Chen

    Published 2025-01-01
    “…The ability of achieving strong quantum spatial correlations has helped the emergence of quantum information science. …”
    Get full text
    Article
  12. 1992

    Wczesna edukacja – między standaryzacją a upodmiotowieniem by Małgorzata Żytko

    Published 2020-06-01
    “…All these activities should favor the control of results achieved. The destination is defined at the beginning of the education process. …”
    Get full text
    Article
  13. 1993

    Applications of mixed finite element method based on Bernstein polynomials in numerical solution of Stokes equations by Lanyin Sun, Siya Wen

    Published 2024-12-01
    “…This approach highlights the advantages of Bernstein polynomial bases in achieving stable and accurate solutions for the 2D Stokes equation.…”
    Get full text
    Article
  14. 1994

    On considering the application of Amartya Sen’s capability approach to analyze the well-being of Hindu clergy in Bali by A.A K Ayuningsasi, M.K S Budhi, I.N M Yasa, A.A I.N Marhaeni

    Published 2023-06-01
    “…This study offers a conceptual framework to explain and predict the influence of variables in Sen's theory on the achievement of the well-being of Hindu clergy in Bali. …”
    Get full text
    Article
  15. 1995

    Teacher target language input and young learners’ aural comprehension of English by Erk Mirna, Takač Višnja Pavičić

    Published 2021-10-01
    “…The present paper reports on a longitudinal study of the relationship between the amount of non-native teachers’ EFL input and learners’ aural achievement in instructed SLA. Young learners (N=132) were followed over a three-year period. …”
    Get full text
    Article
  16. 1996

    Pneumothorax during Alectinib Treatment for a Uterine Inflammatory Myofibroblastic Tumor with Lung Metastasis by Chang-Ting Lin, Chen-Hsuan Wu, Hsuan-Ying Huang, Chien-Ting Liu

    Published 2023-04-01
    “…Anaplastic lymphoma kinase (ALK) gene rearrangement has been reported in half of the patients with IMTs; therefore, crizotinib, an ALK inhibitor, may achieve a response rate of 50% in these patients. …”
    Get full text
    Article
  17. 1997

    Study on the application of IGSO into mobile satellite communication by ZHANG Geng-xin1, LI Su-dan2, GAN Zhong-min1

    Published 2006-01-01
    “…The related coverage performance,Doppler shift and service-supporting capability of the IGSO constellation was studied for the given area.The results show that,the constellation,which consists of two or three IGSO satellites,can achieve good coverage characteristics(the percent of time of one and more satellites coverage and average elevation an-gle)to the Chinese and nearby area with small Doppler shift.The link budget shows that,adopting IGSO can effectively solve the low elevation angle problem faced by GEO satellite,and similar performance,which can only be implemented by a very big GEO satellite,can be achieved by two or three relatively small IGSO satellites.So the solution of adopting IGSO to provide mobile satellite communication system is technically feasible.…”
    Get full text
    Article
  18. 1998

    Fractal Acoustic Metamaterials with Subwavelength and Broadband Sound Insulation by Yu Liu, Meng Chen, Wenshuai Xu, Tao Yang, Dongliang Pei, Heng Jiang, Yuren Wang

    Published 2019-01-01
    “…The results illustrate that it is easy to form low-frequency bandgaps using these materials and thus achieve subwavelength-scale sound control. As the number of fractal orders increase, more bandgaps appear. …”
    Get full text
    Article
  19. 1999

    Secure authentication enhancement scheme for seamless handover and roaming in space information network by Kaiping XUE, Huancheng ZHOU, Wei MENG, Shaohua LI

    Published 2019-06-01
    “…Space information network composed of a variety of heterogeneous networks is widely concerned.However,the space information network is facing more security threats and more likely to roam due to its complex topology and large user scale.Considering the characteristics of space information network,a secure authentication enhancement scheme for seamless handover and roaming in space information network was presented.The fast mutual authentication and reasonable accounting between the user and the visiting domain based on the combination of Token and Hash chain was achieved.In addition,two seamless handover mechanisms were proposed to ensure the continuity of user communication.Finally,security analysis indicates that the scheme can not only provide essential security properties,but also achieve reasonable accounting.…”
    Get full text
    Article
  20. 2000

    Features of development of organizations in the context of digital transformation by Yu. V. Vertakova, O. A. Kryzhanovskaya

    Published 2020-12-01
    “…In conclusion, the authors emphasize the role of the head of an organization that implements digital technologies to achieve strategic goals in the context of the transformation of the economic space.…”
    Get full text
    Article