Suggested Topics within your search.
Suggested Topics within your search.
-
10481
A Local World Evolving Model for Energy-Constrained Wireless Sensor Networks
Published 2012-05-01“…Energy efficiency is one of the basic requirements of wireless sensor networks (WSNs) yet this problem has not been sufficiently explored in the context of cluster-based sensor networks. …”
Get full text
Article -
10482
Quantum State Designs with Clifford-Enhanced Matrix Product States
Published 2025-03-01“…Here, we address the problem of quantifying the average nonstabilizerness of random matrix product states (RMPSs). …”
Get full text
Article -
10483
Direct-Write Ion Beam Lithography
Published 2014-01-01“…Indeed, the capability of easily creating three-dimensional patterns and shaping objects by milling and deposition is probably the most recognized feature of ion beam lithography (IBL) and micromachining. …”
Get full text
Article -
10484
Statistically Bounding Detection Latency in Low-Duty-Cycled Sensor Networks
Published 2012-02-01“…This paper studies the fundamental problem of bounding detection delays when the sensor network is low duty cycled. …”
Get full text
Article -
10485
Holographic mean field theory and Kondo lattice
Published 2024-12-01“…The coupling of the two fermions with the scalar order representing the Kondo condensation provides the hybrization of the two spectrum, reproducing the main feature of the Kondo lattice together with the fuzzy character of the spectrum of the strongly coupled system.…”
Get full text
Article -
10486
Nantucket Pine Tip Moth, Rhyacionia frustrana (Comstock) (Insecta: Lepidoptera: Tortricidae)
Published 2023-01-01“….), in Florida poses an ever-increasing problem of Nantucket pine tip moth infestations. This document is EENY-304 (originally published as DPI Entomology Circular 298), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
10487
Local Differential Privacy Graph Data Modeling Method for Link Prediction
Published 2023-10-01“…At the same time , combined with the subgraph partitioning strategy of two rounds of data collection , the subgraph cluster feature of the original graph is retained. …”
Get full text
Article -
10488
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article -
10489
Improving the Incident Management Process Based on a Use Case Approach
Published 2021-08-01“…In the course of the study, the main problem in the incident management process was identified - violation of the deadlines adopted in the SLA. …”
Get full text
Article -
10490
Development of an autoregressive neural network model for predicting accidents in the Khabarovsk Territory
Published 2025-06-01“…The relevance of this study is justified by the fact that the problem of accidents on highways is a serious social and economic problem, one of the possible solutions to which is the prevention and prevention of road accidents. …”
Get full text
Article -
10491
Possible use of spermatogonial stem cells in the treatment of male infertility
Published 2020-02-01“…This review focuses on the problem of obtaining and preserving spermatogonial stem cells for future transplantation to restore spermatogenesis. …”
Get full text
Article -
10492
Parameter Identification and Transition Process Online Calibration Method of Pulsed Eddy Current Receiving Coil Based on Underdamped Dynamic Response Characteristics
Published 2025-06-01“…In order to solve the problem that the system parameters will be offset during the detection process of the pulsed eddy current receiving coil, this paper first analyzes the response signal of the receiving system and the deconvolution process of the response signal, and discusses the influence of various system parameters on the deconvolution accuracy. …”
Get full text
Article -
10493
PS-GAN: Pseudo Supervised Generative Adversarial Network With Single Scale Retinex Embedding for Infrared and Visible Image Fusion
Published 2025-01-01“…First, a pseudoground truth fusion image conception and its computation method was proposed to solve ground truth fusion image shortage problem. Second, a novel SSR module embedded residual GAN was designed to improve fusion image contrast and naturalness. …”
Get full text
Article -
10494
Multi-Robot System for Cooperative Tidying Up with Mobile Manipulators and Transport Agents
Published 2025-05-01“…This paper presents a system in which mobile manipulators and transport agents cooperate to solve a multi-agent pickup and delivery (MAPD) problem. The primary objective is to allocate appropriate tasks to heterogeneous robots by considering their capabilities and states. …”
Get full text
Article -
10495
BigLoc: A Two-Stage Positioning Method for Large Indoor Space
Published 2016-06-01“…Firstly, we design a floor-level recognition feature based on WiFi access points and the RSS values to recognize floor. …”
Get full text
Article -
10496
Bifurcation analysis of fractional Kirchhoff–Schrödinger–Poisson systems in $\mathbb R^3$
Published 2024-01-01“…We show that the existence of components of (weak) solutions of the above equation bifurcates out from the first eigenvalue $\lambda_1$ of the problem $$(-\Delta)^s u+V(x)u=\lambda g(x)u\quad\mbox{in }\mathbb R^3.$$ The main feature of this paper is the inclusion of a potentially degenerate Kirchhoff model, combined with the critical nonlinearity.…”
Get full text
Article -
10497
A Fast Logdet Divergence Based Metric Learning Algorithm for Large Data Sets Classification
Published 2014-01-01“…It is a challenging task to classify large data sets efficiently, accurately, and robustly, as large data sets always contain numerous instances with high dimensional feature space. In order to deal with this problem, in this paper we present an online Logdet divergence based metric learning (LDML) model by making use of the powerfulness of metric learning. …”
Get full text
Article -
10498
Parametric Analysis of Auxetic Honeycombs
Published 2025-05-01“…The auxetic honeycomb can change mechanical behavior from positive to negative Poisson’s ratio by slightly adjusting the geometrical feature. As a first step, the paper investigates existing analytical solutions to the problem to provide the theoretical background. …”
Get full text
Article -
10499
THE EFFECT OF TIME ON TRANSPORT SERVICES OF THE INTERNATIONAL SUPPLY CHAIN
Published 2018-02-01“…The basis of the research consists of the chain substitutions’ methods and the comparison index. The problem, the developed block-scheme and algorithm of adjustment factor calculation and the traffic volume dependence. …”
Get full text
Article -
10500
Three-Step Epipolar-Based Visual Servoing for Nonholonomic Robot with FOV Constraint
Published 2014-01-01“…Finally, by using the difference of feature points, the robot reaches the desired configuration. …”
Get full text
Article