Showing 2,301 - 2,320 results of 29,992 for search 'Achaea~', query time: 2.12s Refine Results
  1. 2301

    Power Link Optimization for a Neurostimulator in Nasal Cavity by Seunghyun Lee, Jonghoek Kim, Sanghoek Kim

    Published 2017-01-01
    “…That is, from the optimal current distribution, the maximum achievable efficiency is derived first. Next, various design parameters are determined to achieve the target efficiency. …”
    Get full text
    Article
  2. 2302

    Fixed start method for repetitive project scheduling with simulated annealing by Francisco Moreno, Eric Forcael, Francisco Orozco, Felipe Baesler, Duzgun Agdas

    Published 2025-01-01
    “…Thus, the combined FSM and SA (FSSA) is a new method that decreases the variability of scheduling duration while achieving project completion times. Finally, the proposed FSSA method for construction scheduling was validated in a case study using Discrete Event Simulation.…”
    Get full text
    Article
  3. 2303

    Optimization and Modeling of Optical Emission Spatial Coverage from Underwater Multi-Faceted Optical Base Stations by Junjie Shi, Chunbo Ma, Xu Tian, Hanjun Guo, Jun Ao

    Published 2024-12-01
    “…These advancements aim to enhance beam coverage performance while also providing technical support for achieving omnidirectional communication in underwater optical wireless networks (UOWN).…”
    Get full text
    Article
  4. 2304
  5. 2305

    Research on the NOMA performance in cognitive cooperation network by Meiling LI, Ying LI, Muhaidat SAMI, Zengshou DONG, Anhong WANG, Jie LIANG, Liping DING

    Published 2018-09-01
    “…The non-orthogonal multiple access (NOMA) technology was studied in a downlink cognitive relay cooperation network.A cognitive multiuser relay cooperation based NOMA scheme was proposed (CM-RC-NOMA),in which,the outage performance of PU and SU were given under different cognitive relay cooperation schemes and the corresponding outage expressions were also derived.At the same time,the AF based relay cooperation method and the DF based relay cooperation method were compared.The simulation results show that the lower outage of PU can be achieved by AF method compared with DF method,when the channel condition of BS to PU is no more than that of SU to PU.It is also revealed that the optimal outage performance of PU can be achieved by the proposed best cognitive relay cooperation scheme in contrast to the traditional best cognitive relay cooperation scheme.…”
    Get full text
    Article
  6. 2306

    Isotopologue-selective laser cooling of molecules by Felix Kogel, Tatsam Garg, Marian Rockenhäuser, Sebastián A Morales-Ramírez, Tim Langen

    Published 2025-01-01
    “…The manipulation of the rare and previously uncooled ${} ^{136}\mathrm{BaF}$ is achieved in the presence of several isotopologues of significantly higher natural abundance. …”
    Get full text
    Article
  7. 2307

    A Study on College Students’ Cognitive Intention and Path Choice of Entrepreneurship from the Perspective of Individual and Group Cooperation by Yingjie Zhao

    Published 2022-01-01
    “…The method briefly introduces the achievement motivation theory, entrepreneurial intention theory, entrepreneurial cognition theory, classical game theory, computer simulation, and experimental methods. …”
    Get full text
    Article
  8. 2308

    Simple scheme combining space-time coded OFDM with multi-dimension beamforming by HUANG Yong-ming, YANG Lv-xi

    Published 2006-01-01
    “…The proposed scheme would achieve the maximum coding gain besides the expected diversity, and the selection of space time block codes was not limited to the number of the actual transmit antennas, thus the appropriate tradeoff among diversity, coding gain and rate was easily made. …”
    Get full text
    Article
  9. 2309

    Joint optimization of power and channel access in cognitive radio network by Jiang ZHU, Qingmin DU, Shaowei BA

    Published 2017-02-01
    “…In cognitive radio networks,according to the problem of all users can access the same channel to communicate,two joint optimization schemes for different scenarios were proposed.When the system is infeasible,a scheme of joint optimal power and admission control was proposed.As admission control is the NP problem,the LP-SO was used to achieve optimize control.At the same time,the convergence of the proposed algorithm was analyzed and proved.When the system is feasible,a scheme of joint optimal power and transmission rate allocation was proposed,using the improved Lagrange duality algorithm to achieve optimize control.The numerical results show that compared with other admission control algorithms,the time complexity of proposed algorithm is increased,but it can converge quickly,effectively improves the number of admitted uses while reducing power consumption.In addition,the proposed algorithm can allocate transmission rate more fairly.…”
    Get full text
    Article
  10. 2310

    Newton Linearization of the Curvature Operator in Structured Grid Generation with Sample Solutions by Pat Piperni, Maahi M. Talukder

    Published 2022-01-01
    “…However, the new operator exhibits slower convergence properties than the Laplacian, which can lead to increased turnaround times and in some cases preclude the achievement of convergence to machine accuracy. In the work presented here, a Newton linearization of the new operator is presented, with the objective of achieving more robust convergence properties. …”
    Get full text
    Article
  11. 2311

    Hybrid Quantum Cycle Generative Adversarial Network for Small Molecule Generation by Matvei Anoshin, Asel Sagingalieva, Christopher Mansell, Dmitry Zhiganov, Vishal Shete, Markus Pflitsch, Alexey Melnikov

    Published 2024-01-01
    “…The new hybrid quantum machine learning algorithms, as well as the achieved scores of pharmacokinetic properties, contribute to the development of fast and accurate drug discovery processes.…”
    Get full text
    Article
  12. 2312

    Forgotten customers, inclusive customers: personal values and coproduction of physically disabled persons in leisure consumption by Nuno Álvares Felizardo Jr, Irene Raguenet Troccoli, Patrícia Leite da Silva Scatulino

    Published 2018-07-01
    “…Consequently, they often cannot satisfy their wishes or achieve personal values through the acquisition of products and services. …”
    Get full text
    Article
  13. 2313

    Laser Enhanced Hydrogen Passivation of Silicon Wafers by Lihui Song, Alison Wenham, Sisi Wang, Phillip Hamer, Mohammad Shakil Ahmmed, Brett Hallam, Ly Mai, Malcolm Abbott, Evatt R. Hawkes, CheeMun Chong, Stuart Wenham

    Published 2015-01-01
    “…Localised hydrogenation is realised through the use of lasers to achieve localised illumination and heating of the silicon material and hence spatially control the hydrogenation process. …”
    Get full text
    Article
  14. 2314

    From Undergraduates to Doctorates: Exploring Student Perceptions of Effective Management Practices for Success by Khoirun Nisa, Munirul Abidin

    Published 2024-09-01
    “…The product of success, or the definition of success, can be in the form of achievement or accomplishment.…”
    Get full text
    Article
  15. 2315

    Research on asynchronous robust federated learning method in vehicle computing power network by YIN Hongbo, WANG Shuai, ZHANG Ke, ZHANG Yin

    Published 2024-12-01
    “…Finally, the simulation results show that this method can achieve efficient asynchronous federated learning while having good robustness.…”
    Get full text
    Article
  16. 2316

    Endogenous trusted network architecture for intelligent sharing by Shaoyong GUO, Yuanyuan QI, Meiling DAI, Xuesong QIU, Feng QI, Ping ZHANG

    Published 2020-11-01
    “…To address the needs of intelligent sharing of network resources,blockchain and artificial intelligence were integrated with the network,and an endogenous trusted resource intelligent sharing network architecture was proposed to make network asset sharing have endogenous trust.Based on distributed alliance blockchain,an integration mechanism of on-chain identification and off-chain resource was proposed to achieve credible management of network resources.Security and trusted sharing protocols for network data was designed to synchronize data consensus within the network.Based on smart contract,network resource scheduling and service composition methods were presented to achieve trusted service sharing.Finally,the proposed architecture was applied to decentralized scenarios such as domain name resolution,cross domain authentication,and virtual network operation.The proposed architecture realizes the integration of blockchain and network and supports the endogenous trusted sharing of network assets.…”
    Get full text
    Article
  17. 2317

    Sample Size Calculation for Controlling False Discovery Proportion by Shulian Shang, Qianhe Zhou, Mengling Liu, Yongzhao Shao

    Published 2012-01-01
    “…However, there has been little attempt to design study with direct FDP control to achieve certain level of efficiency. We provide a sample size calculation method using the variance formula of the FDP under weak-dependence assumptions to achieve the desired overall power. …”
    Get full text
    Article
  18. 2318

    Efficient Cross-Layer Optimization Algorithm for Data Transmission in Wireless Sensor Networks by Chengtie Li, Jinkuan Wang, Mingwei Li

    Published 2015-01-01
    “…In this paper, we address the problems of joint design for channel selection, medium access control (MAC), signal input control, and power control with cooperative communication, which can achieve tradeoff between optimal signal control and power control in wireless sensor networks (WSNs). …”
    Get full text
    Article
  19. 2319

    Design scheme of physical layer security for intelligent reflecting surface-assisted MISO communication system by Xiaorong JING, Zhenyuan SONG, Wei GAO, Weijia LEI, Qianbin CHEN

    Published 2022-01-01
    “…Intelligent reflecting surface (IRS) improves the physical layer security of the communication systems by adjusting the phases of the reflecting units.A scheme of physical layer security design based on alternative iteration was proposed for IRS-assisted multiple input single output (MISO) communication system.Firstly, aiming at maximizing the secrecy rate, a non-convex objective function with non-convex constraints was constructed.Secondly, the Dinkelbach algorithm and Riemannian manifold optimization algorithm were adopted to transform the non-convex problem into a series of solvable sub-problems.Finally, the alternate iteration method was used to achieve the optimization design of transmit beamforming and IRS phase shift matrix.The simulation results show that, compared with the several existing schemes, the proposed scheme can achieve a better tradeoff between computational complexity and system security rate.…”
    Get full text
    Article
  20. 2320

    Broadband RCS Reduction of Antenna with AMC Using Gradually Concentric Ring Arrangement by Fuwei Wang, Yuhui Ren, Ke Li

    Published 2017-01-01
    “…Therefore, the AMC structures can be used to achieve RCS reduction. However, the bandwidth of zero-degree reflection phase of AMC structures is very narrow. …”
    Get full text
    Article