Showing 12,941 - 12,960 results of 14,440 for search 'BCIT~', query time: 1.27s Refine Results
  1. 12941

    Study of Rock Burst Risk Evolution in Front of Deep Longwall Panel Based on Passive Seismic Velocity Tomography by Kunyou Zhou, Linming Dou, Siyuan Gong, Jiazhuo Li, Jinkui Zhang, Jinrong Cao

    Published 2020-01-01
    “…In this study, rock burst risk assessment criterion was built based on the correlativity between seismic velocity and stress state in coal and rock body. …”
    Get full text
    Article
  2. 12942

    Signal quality comparison of customer base and branching methods in fiber to the home network design by Yusnita Rahayu, Muhammad Raihan Azhary, Razali Ngah, Arbiansyah Ali

    Published 2025-01-01
    “…One communication medium that is well-known for its outstanding and reliable performance is fiber optic. …”
    Get full text
    Article
  3. 12943

    A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation by Abid Mahboob, Muhammad Asif, Muhammad Nadeem, Aysha Saleem, Sayed M. Eldin, Imran Siddique

    Published 2022-01-01
    “…The usefulness of the constructed S-box was also tested using several criteria such as nonlinearity, differential uniformity, strict avalanche criteria, linear approximation probability and bit independence criteria. To assess the reliability of S-box, its performance outcomes are compared to those of previously developed S-boxes. …”
    Get full text
    Article
  4. 12944

    Posterior Positivity Distribution Analysis of Subclinical Bluetongue in the Eastern and North-Eastern States of India: A Wakeup Call for Outbreak Preparedness by Siddhartha Narayan Joardar, Aritra Sanyal, Ahmed Abd El Wahed, Saibal Ray

    Published 2024-12-01
    “…Bluetongue (BT) is considered endemic in the southern states of India, with sporadic incidences reported from the northern, western and central parts of India. …”
    Get full text
    Article
  5. 12945

    Parallel convolutional neural network and empirical mode decomposition for high accuracy in motor imagery EEG signal classification. by Jaipriya D, Sriharipriya K C

    Published 2025-01-01
    “…The enhanced performance and robustness of our method underscore its potential for broader applicability in real-world scenarios.…”
    Get full text
    Article
  6. 12946

    Dual-Polarization Self-Coherent Transceivers for Free Space Optical Communications in the Presence of Atmospheric Turbulence by Yeganeh Nasr, Shiva Kumar, Jiaoyang Bi, Mahdi Naghshvarianjahromi, M. Jamal Deen

    Published 2025-01-01
    “…The self-coherent scheme offers significant advantages for free-space optical (FSO) communications, particularly due to its higher oscillator-signal mixing efficiency compared to conventional coherent schemes. …”
    Get full text
    Article
  7. 12947

    LoRa Resource Allocation Algorithm for Higher Data Rates by Hossein Keshmiri, Gazi M. E. Rahman, Khan A. Wahid

    Published 2025-01-01
    “…LoRa modulation is a widely used technology known for its long-range transmission capabilities, making it ideal for applications with low data rate requirements, such as IoT-enabled sensor networks. …”
    Get full text
    Article
  8. 12948

    Efficient task migration and resource allocation in cloud–edge collaboration: A DRL approach with learnable masking by Yang Wang, Juan Chen, Zongling Wu, Peng Chen, Xi Li, Junfeng Hao

    Published 2025-01-01
    “…By evaluating MGSAC on the real-world Bit-Brain dataset and simulating it using Cloud-Sim, experimental results demonstrate its superiority over existing algorithms in energy consumption, task response time, task migration time, and task Service-Level-Agreement violations rate, showcasing its effectiveness in real-world scenarios.…”
    Get full text
    Article
  9. 12949

    Influence of drilling incidence angle on the drilling force distribution of pneumatic impactor by Dongfang Li, Zengyang Huang, Haibin Lin, Huiyi Zhu, Wentao Fu, Yujuan Deng

    Published 2025-01-01
    “…For the rocks with initial holes, the ratio of maximum to minimum drilling force under the same and different incidence angles is 1.810 and 2.090, respectively. Through nonlinear fitting for numerical results, the corresponding fitting solution is obtained, and the relative error between fitting solution and numerical solution is analyzed to be between 11.72%~15.58%, which can meet the requirements of engineering application. …”
    Get full text
    Article
  10. 12950

    Solving Nonnative Combinatorial Optimization Problems Using Hybrid Quantum–Classical Algorithms by Jonathan Wurtz, Stefan H. Sack, Sheng-Tao Wang

    Published 2024-01-01
    “…These methods are demonstrated using a publicly available neutral-atom quantum computer on two simple problems of Max <inline-formula><tex-math notation="LaTeX">$k$</tex-math></inline-formula>-Cut and maximum independent set. We find improvements in solution quality when comparing the hybrid algorithm to its &#x201C;no quantum&#x201D; version, a demonstration of a &#x201C;comparative advantage.…”
    Get full text
    Article
  11. 12951

    Numerical and Analytical Calculations for Modeling and Designing Drilling Wicks or Rotary Cutters Based of Functionally Graded Materials by Luc Leroy Mambou Ngueyep, Joseph Ndop, Elise Rose Atangana Nkene, Jean-Marie Bienvenu Ndjaka

    Published 2018-01-01
    “…Drilling tools or drilling pipes, such as drill bit and mill drill, are often subjected to various forces, including essentially tangential forces, centered on their axis of rotation. …”
    Get full text
    Article
  12. 12952

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. …”
    Get full text
    Article
  13. 12953

    Performance Analysis of Multi-UAV Optical Communication Systems Over Foggy Channel Under M&#x00E1;laga Turbulence and Pointing Error Impairments by Guanjun Xu, Xiaozong Yu, Jialin Wang, Zhaohui Song, Qinyu Zhang

    Published 2024-01-01
    “…Specifically, some critical statistical expressions, such as probability and cumulative density functions, were derived, which were employed to assess the performance metrics, including outage probability, average bit error rate, and ergodic capacity. Additionally, these performance metrics obtained through theoretical analysis in the presence of atmospheric turbulence, fog absorption, and pointing errors were corroborated by Monte Carlo simulations. …”
    Get full text
    Article
  14. 12954

    Improving Performance of Integrated Ground-HAPS FSO Communication Links With MIMO Application by Emna Zedini, Yalcn Ata, Mohamed-Slim Alouini

    Published 2024-01-01
    “…Capitalizing on this PDF expression, we present novel results for fundamental performance metrics, including outage probability, average bit-error rate (BER) of on-off keying (OOK) modulation scheme, and ergodic capacity expressed in terms of the Meijer&#x0027;s G function. …”
    Get full text
    Article
  15. 12955

    Computer Simulation and Field Experiment for Downlink Multiuser MIMO in Mobile WiMAX System by Kazuhiro Yamaguchi, Takaharu Nagahashi, Takuya Akiyama, Hideaki Matsue, Kunio Uekado, Takakazu Namera, Hiroshi Fukui, Satoshi Nanamatsu

    Published 2015-01-01
    “…In computer simulation, a MU-MIMO transmission system can be realized by using the block diagonalization (BD) algorithm, and each user can receive signals without any signal interference from other users. The bit error rate (BER) performance and channel capacity in accordance with modulation schemes and the number of streams were simulated in a spatially correlated multipath fading environment. …”
    Get full text
    Article
  16. 12956

    Adversarial example defense algorithm for MNIST based on image reconstruction by Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN

    Published 2022-02-01
    “…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&amp;W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
    Get full text
    Article
  17. 12957

    Motor Control System for Adaptation of Healthy Individuals and Recovery of Poststroke Patients: A Case Study on Muscle Synergies by Fady S. Alnajjar, Juan C. Moreno, Ken-ichi Ozaki, Izumi Kondo, Shingo Shimoda

    Published 2019-01-01
    “…The altered neural activities dramatically adjusted through behavior training to suit the unfamiliar environment requirements. Interestingly, we observed similar neuromuscular behaviors in patients with moderate stroke during the follow-up period of their motor recovery. …”
    Get full text
    Article
  18. 12958

    Monte Carlo simulation of interferometric measurement and wavefront shaping under influence of shot noise and camera noise by Chunghyeong Lee, Jaeyeon Oh, Hakseok Ko, Mooseok Jang

    Published 2025-01-01
    “…In this tutorial, we provide a Monte Carlo simulation tool to calculate the accuracy of interferometric measurements and its impact on wavefront shaping in the context of focusing through disordered media. …”
    Get full text
    Article
  19. 12959

    A Performance Analysis of Business Intelligence Techniques on Crime Prediction by Ivan, Niyonzima, Emmanuel Ahishakiye, Elisha Opiyo Omulo, Ruth Wario

    Published 2018
    “…The dataset was acquired from UCI machine learning repository website with a title ‘Crime and Communities’. …”
    Get full text
    Article
  20. 12960