Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 2
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 2
- Language and languages 2
- MATHEMATICS / Mathematical Analysis 2
- Mathematical analysis 2
- Sociolinguistics 2
- Context (Linguistics) 1
- Criminal law 1
- Estate planning 1
- Grammar, Comparative and general 1
- Inheritance and succession 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- LAW / Estates & Trusts 1
- LAW / Living Trusts 1
- LAW / Wills 1
- Perspective (Linguistics) 1
- Philosophy 1
- Probate law and practice 1
- Semantics 1
- Subjectivity (Linguistics) 1
- Syntax 1
-
2741
Evaluation of the angular coordinates in survey radar stations with subsystems for spatial noise compensation
Published 2019-06-01“…Algorithms are based on intraperiod interference cancellation operations with «whitening» of their results in the time domain by dividing the sum of weighted internal noise by estimating the root-mean-square voltage value and uncompensated residuals of external interference, calculating the expected signal for all possible target positions within the uncertainty domain, constructing and maximizing the likelihood function in the form of the mutual correlation function of isolated implementation and the reference signal. …”
Get full text
Article -
2742
Incremental clustering method based on Gaussian mixture model to identify malware family
Published 2019-06-01“…Aiming at the logical similarity of the behavioral characteristics of malware belonging to the same family,the characteristics of malware were extracted by tracking the logic rules of API function call from the perspective of behavior detection,and the static analysis and dynamic analysis methods were combined to analyze malicious behavior characteristics.In addition,according to the purpose,inheritance and diversity of the malware family,the transitive closure relationship of the malware family was constructed,and then the incremental clustering method based on Gaussian mixture model was improved to identify the malware family.Experiments show that the proposed method can not only save the storage space of malware detection,but also significantly improve the detection accuracy and recognition efficiency.…”
Get full text
Article -
2743
Global dynamics of the chemostat with different removal rates and variable yields
Published 2011-05-01“…In this paper, we consider a competition model between $n$ species in a chemostat includingboth monotone and non-monotone growth functions, distinct removal rates and variable yields.We show that only the species with the lowest break-even concentration survives, provided that additional technicalconditions on the growth functions and yields are satisfied.We construct a Lyapunov function which reduces to the Lyapunov function used byS. …”
Get full text
Article -
2744
A Solution-Structure B-Spline-Based Framework for Hybrid Boundary Problems on Implicit Domains
Published 2024-12-01“…By leveraging B-splines within the R-function method structure and adopting the stability principles of the WEB method, we construct a well-conditioned basis for numerical analysis. …”
Get full text
Article -
2745
IMPLEMENTATION OF FUZZY SELECTION OF EQUIPMENT IN INFORMATION NETWORK DESIGN SYSTEM
Published 2014-09-01“…The algorithm of the fuzzy SQL-queries assignment is proposed. An example of constructing a fuzzy query to select the best equipment in terms of price and quality is given. …”
Get full text
Article -
2746
A Novel Prescribed-Time Convergence Acceleration Algorithm with Time Rescaling
Published 2025-01-01“…Some important theorems are given, and the convergence of the acceleration algorithms is proven using the Lyapunov function method. Finally, we provide numerical simulations to verify the effectiveness and rationality of our theoretical results.…”
Get full text
Article -
2747
Adaptive routing and wavelength assignment method based on SDN
Published 2019-09-01“…Routing and wavelength assignment is an important resource allocation method of all-optical network.Aiming at the problem of traditional method combined with the new architecture,an adaptive multi-objective routing and wavelength assignment method based on SDN was proposed,which could realize the allocation of link resources of all-optical network through self-regulation.Based on the SDN service function chain model,service scheduling time and link service quality were taken as the scheduling objective,routing and wavelength assignment problem was constructed as the 0-1 integer programming problem,meanwhile,binary hybrid topology particle swarm optimization algorithm was used to optimize the network resources for optimal scheduling.The simulation results show that the proposed method is superior to the traditional classical algorithms in the test of recovery time,blocking rate and resource utilization.…”
Get full text
Article -
2748
STRUCTURAL RELIABILITY OPTIMIZATION DESIGN OF REINFORCED SHELL MODEL BASED ON ADAPTIVE SURROGATE MODEL
Published 2024-01-01“…Reinforced shell structure is widely used in aerospace load-bearing structures because its high specific stiffness and specific strength.By considering the uncertainty and risk factors in the structural parameters,the Reliability-Based Design Optimization (RBDO) can avoid the overly conservative design of the structure and ensure its reliability and safety.An efficient RBDO method based on adaptive agent model was proposed.This method solves the problem of lightweight design of reinforced shell structure under buckling reliability constraints.The adaptive addition of sample points was implemented through the expected feasibility function criterion,and the discrete variables was continued by constructing piecewise functions.This increases optimization efficiency while ensuring the reliability of design results.Finally,the effectiveness of the proposed method is verified by comparing the RBDO results with the deterministic optimization results.…”
Get full text
Article -
2749
Blind recognition of STBC-OFDM signals based on modified K-S test
Published 2017-04-01“…Aiming at the problem that existed blind classification of STBC-OFDM in multiple input single output (MISO) communication system,an efficient method for blind classification of space-time block coded orthogonal frequency-division multiplexing (STBC-OFDM) signals based on modified Kolmogorov-Smirnov (K-S) test was proposed,when a single receiver antenna was employed at the receiver.Firstly,the model of received STBC-OFDM signals in MISO systems was given.Secondly,with the correlation of the coding matrix of STBC-OFDM signals,and the discrimination features function provided by the empirical cumulative distribution (CDFs) of the received OFDM blocks was constructed.Finally,the distance between CDFs was tested by the two-sample K-S test,which could blindly classify the STBC-OFDM signals.The proposed algorithm didn't need the estimation of channel,noise statistics and modulation type,and consequently,was well suited for non-cooperative communication context.Theoretical analysis and experimental verify its validity.…”
Get full text
Article -
2750
Stabilization of Stochastic Dynamic Systems with Markov Parameters and Concentration Point
Published 2025-07-01“…We provide explicit constructions of Lyapunov functions adapted to scenarios with jump concentration points and develop conditions under which these functions ensure system stability. …”
Get full text
Article -
2751
HRDA-Net: image multiple manipulation detection and location algorithm in real scene
Published 2022-01-01Get full text
Article -
2752
Adaptive coordinated control for an under-actuated airplane–tractor system with parameter uncertainties
Published 2025-02-01“…A decoupling control approach for velocity and angle control is adopted based on the analysis of system dynamics. Second, a function reflecting global coordination is constructed, and then it is transformed into an unconstrained variable through a designed performance function. …”
Get full text
Article -
2753
On Isaac’s War Game of Attrition and Attack Using Dynamic Programming Approach
Published 2024-10-01“…The admissible feedback strategies and the corresponding value function are constructed through a refined application of Cauchy’s Method of characteristics for stratified Hamilton–Jacobi equations. …”
Get full text
Article -
2754
A survey of task deployment and recovery in space-air-ground integrated networks based on SDN and NFV
Published 2025-05-01“…Finally, a use case was constructed, setting node deployment and service function chain modeling. …”
Get full text
Article -
2755
Collaborative filtering recommendation algorithm based on hybrid clustering and user preferences fusion
Published 2022-04-01“…Firstly, a multiple mixed clustering model of Canopy+ Bi-Kmeans was constructed according to the personal information of users. …”
Get full text
Article -
2756
Identification of the ADH gene family in Trichosporon asahii and the role of TaADH_like in pathogenicity and fluconazole resistance
Published 2025-04-01“…This study is the first to elucidate the function of the alcohol dehydrogenase gene in T. asahii, providing a foundation for future genetic research on this pathogen.…”
Get full text
Article -
2757
Morph_CNeT: A new GIS tool to extract morphometric attributes characterising channel network topology of Indian catchments
Published 2025-08-01“…Finally, the empirical width functions constructed based on the morphometric attributes are shown to capture the multi-peaked behaviour of hydrographs to highlight significance of the attributes. …”
Get full text
Article -
2758
Cosmological Evolution of Fast Radio Bursts and the Star Formation Rate
Published 2025-01-01“…These data, in addition to a mean redshift, give the 1 σ errors. We construct three samples with lower, mean, and upper redshifts and apply the above methods to each. …”
Get full text
Article -
2759
Vehicle detection method based on multi-layer selective feature for UAV aerial images
Published 2025-07-01“…For the detection head, a Generalized Wasserstein Distance Loss (GWDLoss) function is proposed to quantify positional and scale discrepancies, improving the adaptability of bounding box regression to geometric variations. …”
Get full text
Article -
2760
Investigating the Two Optimization Algorithms (GWO and ACO) Coupling with Radial Basis Neural Network to Estimate the Pile Settlement
Published 2023-03-01“…Pile Settlement (PS) which seems one of the most critical matters in constructional project failure, has attracted experts’ attention to be predicted before starting projects with piles. …”
Get full text
Article