Showing 24,821 - 24,840 results of 33,243 for search 'Theorbo~', query time: 3.01s Refine Results
  1. 24821

    A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things by Yong Shen, Xiaokang Tang, Xiang Zhang, Yongzhuang Zhou, Hongxin Zou

    Published 2022-11-01
    “…The security of the scheme is analyzed under the assumption of collective attacks in the asymptotic regime, and feasibility is theoretically verified with typical channel and commercial device parameters.…”
    Get full text
    Article
  2. 24822

    Thermal degradation in Carrara marbles as the cause of deformation of cladding slabs by A. Spagnoli, M. Migliazza, M. Zucali, A.M. Ferrero

    Published 2014-09-01
    “…In the present paper, a theoretical model to calculate the progressive bowing of marble slabs submitted to temperature cycles is briefly recalled and applied to a specific Carrara marble sample. …”
    Get full text
    Article
  3. 24823

    Sébastien Plociniczak, L’Encastrement Social des Marchés. Éléments théoriques et empiriques pour une analyse en termes de réseaux relationnels by Sébastien Plociniczak

    Published 2010-06-01
    “…Despite the core role played by market in economic theoretical frameworks, the market is still little addressed and finally remains a vague type at best equivoque. …”
    Get full text
    Article
  4. 24824

    What is Cultural Science? (And what it is not.) by Potts Jason, Hartley John

    Published 2014-06-01
    “…Hartley and Potts (2014) argue that cultural science represents a new theoretical and methodological approach to the study of cultural structure, dynamics and use. …”
    Get full text
    Article
  5. 24825

    The Nonsequential Fusion Method for Localization from Unscented Kalman Filter by Multistation Array Buoys by Gou Yanni, Wang Qi

    Published 2016-01-01
    “…From the result, the conclusion that multistation array buoy can complete the task of tracing target track very well can be reached, which provides theoretical foundation for putting the algorithm into engineering practice.…”
    Get full text
    Article
  6. 24826

    Design and Analysis of Apple Picking Robots Based on TRIZ by Huan Yuan, Ren Gongchang, Sun Jiangong, Xu Ruoxuan

    Published 2023-05-01
    “…The results show that the functions of each part of the robot are perfect, the design is reasonable, the operation is reliable, and it meets the needs of use, which provides theoretical support for the further development and improvement of the follow-up robot.…”
    Get full text
    Article
  7. 24827

    Un entretien pour évaluer des capacités à partir de situations professionnelles vécues : un nouveau défi pour l’enseignement agricole français by Christèle Roux, Françoise Héraut, Eliane Depalle, Emeline Roquelle, Estelle Veuillerot

    Published 2024-02-01
    “…How can an interview be designed to serve the certification of skills in vocational training? On which theoretical and technical corpus should it be based ? …”
    Get full text
    Article
  8. 24828

    A Semi-Stochastic Propagation Model for the Study of Beam Tilting in Cellular Systems by Konstantinos B. Baltzis

    Published 2008-01-01
    “…Analytically derived expressions for the fading envelopes, the error probability, the optimum tilting angle, and the downlink capacity of a WCDMA system are derived. Theoretical analysis and simulation results are provided to show the characteristics of the model. …”
    Get full text
    Article
  9. 24829

    Understanding the log file data from educational and psychological computer-based testing: A scoping review protocol. by Guanyu Chen, Yan Liu, Yue Mao

    Published 2024-01-01
    “…Therefore, we present this protocol for a scoping review that aims to characterize the application of log file data in current publications, including the data pre-processing techniques, analytical methodologies, and theoretical frameworks used by researchers. This review will also aim to illuminate how log file data can enhance psychological and educational assessments. …”
    Get full text
    Article
  10. 24830

    Analyse systématique du modèle de Bhaduri et Marglin à prix flexibles by Florian Botte, Thomas Dallery

    Published 2020-01-01
    “…We also study the stability conditions (in dimension and in proportion), and we show that some theoretically conceivable configurations do not have numerically plausible counterparts for realistic values of the parameters entering the composition of the model. …”
    Get full text
    Article
  11. 24831

    Port address overloading based packet forwarding verification in SDN by Ping WU, Chaowen CHANG, Yingying MA

    Published 2021-07-01
    “…Aiming at the problem that the existing forwarding verification mechanisms in software-defined networking (SDN) incur significant communication overhead caused by embedding additional packet fields, a packet forwarding verification mechanism based on port address overloading was proposed, which key idea was the ingress switch implemented port address overloading by reconstructing port and address of packet, downstream switches executed packet probabilistic verification based on overloading port address, and the controller acquired valid and invalid packet statistics of node verification in the path and localized anomaly.Anomaly detection threshold of malicious injecting and dropping packets was presented by theoretical analysis.Finally, the proposed scheme was implemented and evaluated.Experiments demonstrate the proposed scheme achieves efficient forwarding and effective anomaly localization with less than 10% of additional forwarding delays and less than 8% of throughput degradation.…”
    Get full text
    Article
  12. 24832

    An Extended Newmark-FDTD Method for Complex Dispersive Media by Yu-Qiang Zhang, Peng-Ju Yang

    Published 2018-01-01
    “…Then, its accuracy and stability are discussed from the two aspects of theoretical analysis and numerical computation. It is observed that this method possesses the advantages of high accuracy, high stability, and a wide application scope and can thus be applied to the treatment of many complex dispersion models, including the complex conjugate pole residue model, critical point model, modified Lorentz model, and complex quadratic rational function.…”
    Get full text
    Article
  13. 24833

    Radiation Shielding Properties Comparison of Pb-Based Silicate, Borate, and Phosphate Glass Matrices by Suwimon Ruengsri

    Published 2014-01-01
    “…Theoretical calculations of mass attenuation coefficients, partial interactions, atomic cross-section, and effective atomic numbers of PbO-based silicate, borate, and phosphate glass systems have been investigated at 662 keV. …”
    Get full text
    Article
  14. 24834

    Analysis of Two-Level Mesh Method for Partial Integro-Differential Equation by Quan Tang, Ziyang Luo, Xindong Zhang, Juan Liu

    Published 2022-01-01
    “…The numerical results are in good agreement with theoretical ones.…”
    Get full text
    Article
  15. 24835

    Saúde urbana no ensino de geografia: um relato de experiência no município de Olinda, Brasil by José Roberto Henrique Souza Soares, Anselmo César Vasconcelos Bezerra

    Published 2019-11-01
    “…Thus, a didactic sequence was elaborate related the geographic knowledge with the problematic of health in the city. Theoretical classes, field activities, mental mapping workshops and evaluation discussions of the teaching strategies used were carried out. …”
    Get full text
    Article
  16. 24836

    Enhancing Ikeda Time Delay System by Breaking the Symmetry of Sine Nonlinearity by Xiaojing Gao

    Published 2019-01-01
    “…Stability and Hopf bifurcation characteristics of the system are analyzed theoretically. Numerical simulations, carried out in terms of bifurcation diagrams, Lyapunov exponents spectrum, phase portraits, and two-parameter (2D) largest Lyapunov exponent diagrams are employed to highlight the complex dynamical behaviors exhibited by the enhanced system. …”
    Get full text
    Article
  17. 24837

    Simulation of transmission characteristics of oceanic wireless optical communication systems based on orbital angular momentum multiplexing with space-time coding by Xiaoli YIN, Tong ZHENG, Zhiwen SUN, Zhaoyuan ZHANG

    Published 2020-12-01
    “…In order to mitigate the crosstalk caused by oceanic turbulence in the underwater wireless orbital angular momentum multiplexing optical communication system, the application of space-time coding technology in the system was studied.Based on Rytov approximation, the covariance method and interpolation method were used to simulate correlated random phase screens and then the influence of time-varying oceanic turbulence channel on orbital angular momentum signal was studied.The transmission characteristics of orbital angular momentum multiplexing optical communication system with space-time coding was analyzed by simulation.The phase structure function of the time-varying phase screens and the detection probability distribution of the beam carrying the orbital angular momentum through the time-varying simulation channel were in line with theoretical expectations.The simulation results show that the space-time coding technology can effectively mitigate the influence of ocean turbulence on the system bit error rate.…”
    Get full text
    Article
  18. 24838
  19. 24839

    Research on a new network covert channel model in blockchain environment by Yanfeng LI, Liping DING, Jingzheng WU, Qiang CUI, Xuehua LIU, Bei GUAN

    Published 2019-05-01
    “…Blockchain is a decentralized architecture emerging with cryptocurrencies,which is credible and robust.A network covert channel model in blockchain environment was proposed for the first time,which was anti-interference,anti-tamper modification,multi-line communication,receiver anonymity and line independence.The shortcomings of network covert channel in existing network environment could be tackled by the new type of network covert channel,such as characteristic defect.etc.Firstly,A network covert channel model in blockchain environment was presented by formal method,its anti-interference and anti-tamper modification was proved.Then,a blockchain network covert channel scenario using service operation interval time was presented.Finally,the undetectability,robustness and rate of the blockchain network covert channel evaluation vectors was proposed.A theoretical foundation was laid for the practicality of the new type of network covert channel in blockchain.…”
    Get full text
    Article
  20. 24840