Showing 2,321 - 2,340 results of 7,361 for search 'putout~', query time: 1.98s Refine Results
  1. 2321

    Performance analysis of coroutines and other concurrency techniques in Kotlin language for I/O operations by Michał Grabowiec, Sebastian Wiktor, Jakub Smołka

    Published 2024-12-01
    “…This article focuses on analyzing the performance of coroutines and other concurrent processing techniques in Kotlin language for input/output operations. For this purpose, coroutines, traditional threads, thread pool and virtual threads were put together. …”
    Get full text
    Article
  2. 2322

    Optimal Design of the Leg-wheel Crossing Obstacle Mechanism by Wang Zhou, Zhou Wei

    Published 2016-01-01
    “…Then,the feasibility of this algorithm is verified through the experimental,by using MATLAB,the graphical user interface is designed which can output the crossing obstacle time and the optimal mechanical foot size after input the parameters of obstacle and motor. …”
    Get full text
    Article
  3. 2323

    Comparative Study on the Kinematics Analytical Method of Hybrid-driven Five-bar Mechanism by Hou Zhili, 2Li Ruiqin, Wu Wenge

    Published 2015-01-01
    “…The kinematics characteristic of the closed chain two degree of freedom planar five-bar mechanism is analyzed by using the closed vector polygon projection method,complex number-vector method and matrix method.The kinematics equations are deduced,furthermore,the characteristic and application situations of each method are compared and analyzed.The kinematics equations are validated according to the example designed.By using the Solid Works motion simulation software,the motion path is changed with the original position of driving link,and the inner link between kinematics equations and output motion path is achieved.The reference for solving kinematic characteristic of hybrid driven mechanism in analytic method can be provided.…”
    Get full text
    Article
  4. 2324

    A Speech Recognition Method Using Competitive and Selective Learning Neural Networks by Hu Guangrui Xu Xiong Yan Yonghong

    Published 1998-01-01
    “…In this paper,a basic principle called the equidistortion principle for vector clustering is theoretically derived by using Gersho’s asymptotic theory,and a new competitive learning algorithm is prorosed with a selection mechanism,called the CLS(Competitive and Selective Learning)algorithm.Because the selection mechanism enables the system to escape from local minima,the proposed algorithm can obtain better performance without a particular initialization procedure.A new neural network algorithm with competitive learning and multiple safe rejection schemes are proposed in the context of parallel,self organizing,hierarchical neural networks(PSHNN).The input of PSHNN is a subset of the output scores of HMM.The experimental results indicate that the recognition ability of the method based on competitive learning neural network is higher than that of the traditional HMM method.…”
    Get full text
    Article
  5. 2325

    Control of the temperature regime of the process of bacterial oxidation on the basis of fuzzy logic by O. A. Jumaev, I. L. Kovaleva, G. B. Mahmudov

    Published 2023-10-01
    “…The substantiation of the set of input and output variables, the type of membership functions was carried out, the base of rules for the inference engine was formed. …”
    Get full text
    Article
  6. 2326

    Application and Exploration of VR and AI Technology in College English Teaching by Zhaodan Yang

    Published 2022-01-01
    “…In addition, in order to determine the output DC value of the cascode structure, the negative feedback loop is biased, and an intelligent teaching system is constructed. …”
    Get full text
    Article
  7. 2327

    MUMF:a mixed uni-and multicast fair scheduling scheme for CICQ switches by Hong-chao HU, Yun-fei GUO, Shu-qiao CHEN, Peng YI

    Published 2012-01-01
    “…Based on the CICQ (combined input and cross-point buffered) switches,how to support fair scheduli for uni-and multicast traffic was discussed thoroughly.Then,comed up with an ideal theoretical switching model for CICQ switches.Based on the theoretical model,a mixed uni-and multicast fair scheduling (MUMF) scheme was proposed.With MUMF,each input port and output port can schedule variable length packets independently.Simulation results based on SPES (switch performance evaluation system) show that MUMF can provide good delay,fair and throughput performance.…”
    Get full text
    Article
  8. 2328

    Resplittable threshold multi-broker proxy re-encryption scheme from lattices by Ju-yan LI, Chun-guang MA, Qian ZHAO

    Published 2017-05-01
    “…Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bound of noise was more relaxed.Threshold multi proxy not only ensure the safety of re-encryption key,but also ensure re-encryption scheme can still work even if the individual proxy could not provide normal services.The scheme is proven IND-UniRTPRE-CPA secure.…”
    Get full text
    Article
  9. 2329

    Channel modeling and performance test method for 5G by Guiming WEI, Xiang ZHANG, Yuhang GUO, Shangbing QIAO

    Published 2021-02-01
    “…With the rapid development of 5G wireless communication system, the throughput of 5G gNB and user equipment (UE) in the practical field environment is of great important.How to generate the accurate model in lab, which can represent the propogation condition in the field, has drawn great interests from both the academic and industrial communities.The channel modeling methods of 4G and 5G were introduced, and for 5G UE testing, the advantages of the multi-input multi-output (MIMO) and over-the-air (OTA) performance test solution were showed.Then, a detailed description of the OTA channel modeling principle and throughput simulation results were given in order to provide reference for related work.…”
    Get full text
    Article
  10. 2330

    Channel state information acquisition algorithm based on deep learning for IoT by Yong LIAO, Haimei YAO, Yuanxiao HUA

    Published 2019-03-01
    “…To solve the problem of high feedback overhead when the user sends channel state information (CSI) to the base station in massive multiple input multiple output (MIMO) based on Internet of things system,a CSI feedback network based on deep learning was proposed to feedback CSI.Firstly,the proposed network used convolutional neural network (CNN) to extract channel feature vectors and maxpooling to compress the data.Then the compressed CSI was decompressed by using full connection and CNN to restore the original channel.The simulation results show that compared with the existing CSI feedback methods,the CSI recovered by the proposed CSI feedback network is closer to the original channel,and the reconstruction quality is improved significantly.…”
    Get full text
    Article
  11. 2331

    À la recherche des réseaux intertextuels : défis de la recherche littéraire à grande échelle by Valentina Fedchenko, Dario Maria Nicolosi, Glenn Roe

    Published 2024-06-01
    “…Drawing on a large curated corpus of French texts of the Early Modern period, the authors describe in detail the various steps for building intertextual networks using the output of text reuse algorithms. From corpus and metadata cleaning to training a neural network for filtering ‘noisy’ passages, this article provides a pragmatic technical pipeline for similar projects working with massive collections of digitised text, highlighting both the promise and perils of conducting literary research at scale.…”
    Get full text
    Article
  12. 2332

    Differential fault attack on lightweight block cipher Klein by Yong-juan WANG, Quan-yu2 REN, Shi-yi ZHANG

    Published 2016-10-01
    “…As a lightweight block cipher algorithm based on SP structure,Klien has the characteristics of high efficiency and low energy consumption.By analyzing the S-boxes differential propagation path,it was found that under the condi-tion of same input and different difference,the intersection elements were unique,which fall in the intermediate state set corresponds to output difference,and a differential fault attack scheme was proposed.By injecting two different faults in the last round of the algorithm,all the keys of the Klein algorithm can be recovered,and the complexity is negligible.This method can be promoted to other block cipher algorithms based on SP structure and Feistel structure.…”
    Get full text
    Article
  13. 2333

    Research on Dynamic Equalization of Optical Power for Satellite-Ground Laser Communication by Yuefeng CAI, Haifeng LIU, Bo LIU, Wei LIN

    Published 2021-06-01
    “…Aiming at the problem of light intensity scintillation caused by atmospheric turbulence at the receiver of satellite-ground laser communication will aff ect the communication quality, an optical power balance system based on gain competition was studied.The experiment verifi ed that the received power fl uctuation increased the communication bit error rate.The static output curve of the equalization system under gain competition was studied and the equalization performance of the dynamic time domain signal was tested.The experimental results showed that the system could compress the power fl uctuation range of the dynamic signal to 4 dB.…”
    Get full text
    Article
  14. 2334

    Performance analysis of UWB-TR receiver by XIANG Xin1, WANG Yong-chao1, YI Ke-chu1, TIAN Hong-xin1

    Published 2007-01-01
    “…Based on the determination of UWB-STR receiver model,the performance of UWB-STR receiver was ana-lyzed by using a Gaussian approximation of the noise components at the output of the receiver and the analytical expres-sions of bit error rate(BER) performance were derived.The result shows that the receiver performance of BER is relevant to not only signal-to-noise ratio,but also input noise bandwidth and integration time.The characteristics can be applied to other kind of autocorrelation receivers.Finally,the analytical expressions of BER were compared with that in existing literatures and some results were modified.In addition,the expressions of BER for UWB-ATR receiver were given.…”
    Get full text
    Article
  15. 2335

    Fatigue Life Prediction of Tripod Sliding Universal Coupling based on RecurDyn by Zhao Shun, Sun Li, Luo Kaiyang, Liu Xin

    Published 2019-01-01
    “…The variation of contact stress of the sliding rod of the transmission element with the parameters such as the angle between the input shaft and the output shaft, rotation frequency and load is analyzed in depth. …”
    Get full text
    Article
  16. 2336

    Causality adversarial attack generation algorithm for intelligent unmanned communication system by Shuwen YU, Wei XU, Jiacheng YAO

    Published 2024-01-01
    “…A causality adversarial attack generation algorithm was proposed in response to the causality issue of gradient-based adversarial attack generation algorithms in practical communication system.The sequential input-output features and temporal memory capability of long short-term memory networks were utilized to extract the temporal correlation of communication signals while satisfying practical causality constraints, and enhance the adversarial attack performance against unmanned communication systems.Simulation results demonstrate that the proposed algorithm outperforms existing causality adversarial attack algorithms, such as universal adversarial perturbation, under identical conditions.…”
    Get full text
    Article
  17. 2337

    Design of a Chain Rammer Mechanism with Long-travel and Heavy-load by Deng Wang, Yuefei Gao, Yang Liu, Zhe Tao

    Published 2019-07-01
    “…Adding driving according to the driving motor output characteristic, the dynamics simulation of the work process of rammer is carried out and the stability of chain drive ramming is analyzed. …”
    Get full text
    Article
  18. 2338

    Iterative channel estimation based on the Turbo principle for UWB system by TENG Peng-wei1, WANG Yi-ming1, ZHU Hong-bo2

    Published 2008-01-01
    “…In each iteration, the soft-output of decoder is fed back to the channel estimation module, and used as the prior information, which means no training sequences are used. …”
    Get full text
    Article
  19. 2339

    Analysis of Dynamics Characteristic of the Helical Gear Transmission in Helicopter by Liu Tao, Li Jie, Dai Jinchun

    Published 2015-01-01
    “…When the input loads are symmetry,the motions of the two input gears are identical and certain modal responses are suppressed. The output gear only has rotational and axial vibrations. …”
    Get full text
    Article
  20. 2340

    Estimation of Approximating Rate for Neural Network inLwp Spaces by Jian-Jun Wang, Chan-Yun Yang, Jia Jing

    Published 2012-01-01
    “…A class of Soblove type multivariate function is approximated by feedforward network with one hidden layer of sigmoidal units and a linear output. By adopting a set of orthogonal polynomial basis and under certain assumptions for the governing activation functions of the neural network, the upper bound on the degree of approximation can be obtained for the class of Soblove functions. …”
    Get full text
    Article