Suggested Topics within your search.
Suggested Topics within your search.
- History 14
- Politics and government 8
- Social conditions 8
- Biochemistry 6
- Law 6
- methods 6
- Electric wiring, Interior 5
- Health 5
- Juvenile literature 5
- Physical fitness 5
- Sociology 5
- Digital techniques 4
- Economic conditions 4
- Economic policy 4
- Management 4
- Nursing 4
- Photography 4
- Race relations 4
- Social policy 4
- Social problems 4
- Cultural pluralism 3
- Discrimination 3
- Domestic relations 3
- Education 3
- Electric wiring 3
- Ethnic relations 3
- Ethnology 3
- Gays 3
- Health and Fitness 3
- History and criticism 3
-
12941
Study of Rock Burst Risk Evolution in Front of Deep Longwall Panel Based on Passive Seismic Velocity Tomography
Published 2020-01-01“…In this study, rock burst risk assessment criterion was built based on the correlativity between seismic velocity and stress state in coal and rock body. …”
Get full text
Article -
12942
Signal quality comparison of customer base and branching methods in fiber to the home network design
Published 2025-01-01“…One communication medium that is well-known for its outstanding and reliable performance is fiber optic. …”
Get full text
Article -
12943
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation
Published 2022-01-01“…The usefulness of the constructed S-box was also tested using several criteria such as nonlinearity, differential uniformity, strict avalanche criteria, linear approximation probability and bit independence criteria. To assess the reliability of S-box, its performance outcomes are compared to those of previously developed S-boxes. …”
Get full text
Article -
12944
Posterior Positivity Distribution Analysis of Subclinical Bluetongue in the Eastern and North-Eastern States of India: A Wakeup Call for Outbreak Preparedness
Published 2024-12-01“…Bluetongue (BT) is considered endemic in the southern states of India, with sporadic incidences reported from the northern, western and central parts of India. …”
Get full text
Article -
12945
Parallel convolutional neural network and empirical mode decomposition for high accuracy in motor imagery EEG signal classification.
Published 2025-01-01“…The enhanced performance and robustness of our method underscore its potential for broader applicability in real-world scenarios.…”
Get full text
Article -
12946
Dual-Polarization Self-Coherent Transceivers for Free Space Optical Communications in the Presence of Atmospheric Turbulence
Published 2025-01-01“…The self-coherent scheme offers significant advantages for free-space optical (FSO) communications, particularly due to its higher oscillator-signal mixing efficiency compared to conventional coherent schemes. …”
Get full text
Article -
12947
LoRa Resource Allocation Algorithm for Higher Data Rates
Published 2025-01-01“…LoRa modulation is a widely used technology known for its long-range transmission capabilities, making it ideal for applications with low data rate requirements, such as IoT-enabled sensor networks. …”
Get full text
Article -
12948
Efficient task migration and resource allocation in cloud–edge collaboration: A DRL approach with learnable masking
Published 2025-01-01“…By evaluating MGSAC on the real-world Bit-Brain dataset and simulating it using Cloud-Sim, experimental results demonstrate its superiority over existing algorithms in energy consumption, task response time, task migration time, and task Service-Level-Agreement violations rate, showcasing its effectiveness in real-world scenarios.…”
Get full text
Article -
12949
Influence of drilling incidence angle on the drilling force distribution of pneumatic impactor
Published 2025-01-01“…For the rocks with initial holes, the ratio of maximum to minimum drilling force under the same and different incidence angles is 1.810 and 2.090, respectively. Through nonlinear fitting for numerical results, the corresponding fitting solution is obtained, and the relative error between fitting solution and numerical solution is analyzed to be between 11.72%~15.58%, which can meet the requirements of engineering application. …”
Get full text
Article -
12950
Solving Nonnative Combinatorial Optimization Problems Using Hybrid Quantum–Classical Algorithms
Published 2024-01-01“…These methods are demonstrated using a publicly available neutral-atom quantum computer on two simple problems of Max <inline-formula><tex-math notation="LaTeX">$k$</tex-math></inline-formula>-Cut and maximum independent set. We find improvements in solution quality when comparing the hybrid algorithm to its “no quantum” version, a demonstration of a “comparative advantage.…”
Get full text
Article -
12951
Numerical and Analytical Calculations for Modeling and Designing Drilling Wicks or Rotary Cutters Based of Functionally Graded Materials
Published 2018-01-01“…Drilling tools or drilling pipes, such as drill bit and mill drill, are often subjected to various forces, including essentially tangential forces, centered on their axis of rotation. …”
Get full text
Article -
12952
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. …”
Get full text
Article -
12953
Performance Analysis of Multi-UAV Optical Communication Systems Over Foggy Channel Under Málaga Turbulence and Pointing Error Impairments
Published 2024-01-01“…Specifically, some critical statistical expressions, such as probability and cumulative density functions, were derived, which were employed to assess the performance metrics, including outage probability, average bit error rate, and ergodic capacity. Additionally, these performance metrics obtained through theoretical analysis in the presence of atmospheric turbulence, fog absorption, and pointing errors were corroborated by Monte Carlo simulations. …”
Get full text
Article -
12954
Improving Performance of Integrated Ground-HAPS FSO Communication Links With MIMO Application
Published 2024-01-01“…Capitalizing on this PDF expression, we present novel results for fundamental performance metrics, including outage probability, average bit-error rate (BER) of on-off keying (OOK) modulation scheme, and ergodic capacity expressed in terms of the Meijer's G function. …”
Get full text
Article -
12955
Computer Simulation and Field Experiment for Downlink Multiuser MIMO in Mobile WiMAX System
Published 2015-01-01“…In computer simulation, a MU-MIMO transmission system can be realized by using the block diagonalization (BD) algorithm, and each user can receive signals without any signal interference from other users. The bit error rate (BER) performance and channel capacity in accordance with modulation schemes and the number of streams were simulated in a spatially correlated multipath fading environment. …”
Get full text
Article -
12956
Adversarial example defense algorithm for MNIST based on image reconstruction
Published 2022-02-01“…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&amp;W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
Get full text
Article -
12957
Motor Control System for Adaptation of Healthy Individuals and Recovery of Poststroke Patients: A Case Study on Muscle Synergies
Published 2019-01-01“…The altered neural activities dramatically adjusted through behavior training to suit the unfamiliar environment requirements. Interestingly, we observed similar neuromuscular behaviors in patients with moderate stroke during the follow-up period of their motor recovery. …”
Get full text
Article -
12958
Monte Carlo simulation of interferometric measurement and wavefront shaping under influence of shot noise and camera noise
Published 2025-01-01“…In this tutorial, we provide a Monte Carlo simulation tool to calculate the accuracy of interferometric measurements and its impact on wavefront shaping in the context of focusing through disordered media. …”
Get full text
Article -
12959
A Performance Analysis of Business Intelligence Techniques on Crime Prediction
Published 2018“…The dataset was acquired from UCI machine learning repository website with a title ‘Crime and Communities’. …”
Get full text
Article -
12960
Synchrotron X-ray imaging study on the mechanism of solids transfer to bitumen froth during oil sands flotation 1: True flotation
Published 2025-03-01Subjects: “…X-ray micro-computed tomography (micro-CT)…”
Get full text
Article