Suggested Topics within your search.
Suggested Topics within your search.
- Digital techniques 2
- Photography 2
- Anatomy 1
- Anesthesia 1
- Computer graphics 1
- Critical Care 1
- Digitale Photographie 1
- Economic conditions 1
- Economic development 1
- Economic forecasting 1
- Economic stabilization 1
- General 1
- Image processing 1
- Mathematical Concepts 1
- PHOTOGRAPHY 1
- Phototechnik 1
- Physical Phenomena 1
- Physiology 1
- Regression analysis 1
- Social sciences 1
- Statistical methods 1
- Techniques 1
-
3121
Bayesian Inference of Elevation to Reduce Large Interpolation Errors in 2-d Road Features Draped Over Digital Elevation Models
Published 2024-01-01“…The topological network defined by feature shapes is used as auxiliary information. Correcting the output of naïve interpolation shows reduction of mean errors, and reduced overprediction of elevation change outliers, compared to both naïve interpolation and Kriging.…”
Get full text
Article -
3122
Intelligent Antenna Array Systems for Modern Communication Networks
Published 2025-01-01“… In last two decades, Smart Antenna Systems (SAS) as well as Multiple Input Multiple Output (MIMO) systems have emerged as strong and efficient contenders for 5G wireless communication networks due to the advantages they may bring based on the improvements in transmission and reception of electromagnetic signals with respect to omnidirectional antennas. …”
Get full text
Article -
3123
An Inverse Source Problem for Singular Parabolic Equations with Interior Degeneracy
Published 2018-01-01“…For the numerical solution, the reconstruction is formulated as a minimization problem using the output least squares approach with the Tikhonov regularization. …”
Get full text
Article -
3124
Research on the performance evaluation model of national key special projects of blood center
Published 2024-12-01“…The weights of the three first-level indicators of budget preparation, project management and project output were 0.301, 0.267 and 0.432, respectively. …”
Get full text
Article -
3125
Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection
Published 2013-01-01“…The model and framework of secure multi-party computational geometry were presented based on the existing protocols.The new framework has three dimensions,the math model,the security model and the communication model.Using the new model and framework,a secure two-party line segments intersection protocol based on Paillier homomorphic encryption scheme is proposed.This protocol solves the problem that the existing secure two party intersect-determination schemes of line segments cannot output the exact coordinates of the intersection.The security of the protocol is demonstrated using Goldreich method.The results show that this protocol has better efficiency than the existing ones.In addition,the secure two-party line segments intersection in malicious model is also designed.As an application,a privacy-preserving convex hull intersection protocol is proposed based on the O’Rourke scheme.This application makes up for the gap in privacy-preserving convex hull intersection protocol in the area of secure multi-party computational geometry.…”
Get full text
Article -
3126
Intelligent Manipulator with Flexible Link and Joint: Modeling and Vibration Control
Published 2020-01-01“…Additionally, a LQR controller is designed based on the output function of the improved model. The simulation results demonstrate that the CRRM is consistent with reality and the active controller has good performance in suppressing vibration of the manipulator with both the flexible link and the flexible joint.…”
Get full text
Article -
3127
A LiDAR - camera fusion detection method based on weight allocation
Published 2025-01-01“…The weighted fusion method is adopted, image feature points are extracted by Fast RCNN, and then LiDAR point cloud data is fused into the model by the weighted method, environment variables are introduced, and different weight allocation methods are output under different environments through full connection layer preprocessing. …”
Get full text
Article -
3128
Joint optimization of dispersion matrix and 3D constellation for STSK system based on improved genetic algorithm
Published 2021-09-01“…Space-time shift keying (STSK) is a modulation scheme used in multi-input multi-output (MIMO) communication systems.It uses a pre-designed dispersion matrix set (DMS) to realize the flexible design of the system between multiplexing and diversity.An improved genetic algorithm (GA) was proposed to assist the joint optimization of DMS and 3D constellations, that is, the DMS and 3D constellations were jointly coded as the chromosome of GA , and the coding gain corresponding to the rank and determinant criterion was adopted as the overall fitness value.Through efficient selection and improved mutation and crossover strategies, DMS and 3D constellations with low bit error rate (BER) can be obtained.At the same time, the symmetry of the 3D constellation was used to greatly reduce the computational complexity of according to the fitness value the coding gain.The theoretical average paired error probability (ABEP) of the 3D STSK scheme was deducted.The simulation results show that, compared with the traditional GA and random search schemes, the improved GA proposed can significantly reduce the complexity of system implementation while ensuring BER performance.…”
Get full text
Article -
3129
Research on the Impact of Regional Economy on Industrial Development from the Perspective of Big Data
Published 2021-01-01“…The information entropy output from the Internet big data system has led to a significant entropy reduction process in China’s economic environment and a more orderly economic system, which is also an important reason for the rapid development of China’s economy.…”
Get full text
Article -
3130
Design and Simulation of Ornithopter based on Four-bar Mechanism
Published 2017-01-01“…According to the range of bird joint angular motion,the output angle of the robot linkage mechanism is determined so that it can move within the expected range. …”
Get full text
Article -
3131
Bias Identification and Attribution in NLP Models With Regression and Effect Sizes
Published 2022-08-01“…This article proposes to analyze bias in the output of NLP systems using multivariate regression models. …”
Get full text
Article -
3132
A Multicomponent Magnetic Proxy for Solar Activity
Published 2021-12-01“…Abstract We present a new, multicomponent magnetic proxy for solar activity derived from full disk magnetograms that can be used in the specification and forecasting of the Sun’s radiative output. To compute this proxy we project Carrington maps, such as the synchronic Carrington maps computed with the Advective Flux Transport (AFT) surface flux transport model, to heliographic cartesian coordinates and determine the total unsigned flux as a function of absolute magnetic flux density. …”
Get full text
Article -
3133
Noise-sensitive measure for stochastic resonance in biological oscillators
Published 2006-07-01“…Here we show that,when the resonance is understood as a manifestation of phase synchronization,the average synchronization time between the input and the output signal hasan extremely high sensitivity in that it exhibits a cusp-like behavior aboutthe optimal noise level. …”
Get full text
Article -
3134
Fabrication and Optoelectrical Properties of IZO/Cu2O Heterostructure Solar Cells by Thermal Oxidation
Published 2012-01-01“…The measured parameters of cells were the short-circuit current (Isc), the open-circuit voltage (Voc), the maximum output power (Pm), the fill factor (FF), and the efficiency (η), which had values of 0.11 mA, 0.136 V, 5.05 μW, 0.338, and 0.56%, respectively, under AM 1.5 illumination.…”
Get full text
Article -
3135
Reachability Analysis of Low-Order Discrete State Reaction Networks Obeying Conservation Laws
Published 2019-01-01“…We consider network structures composed of reactions having at most one input and one output species beyond the possible catalyzers. We give a proof that, assuming all the reactions are charged in the initial and target states, the reachability problems of sub- and superconservative reaction networks are equivalent to the existence of nonnegative integer solution of the corresponding d-CRN state equations. …”
Get full text
Article -
3136
Emergency Abdominal Aortic Aneurysm Repair in a Patient with Failing Heart: Axillofemoral Bypass Using a Centrifugal Pump Combined with Levosimendan for Inotropic Support
Published 2011-01-01“…The patient's hemodynamic status was monitored with continuous cardiac output monitoring and transesophageal echocardiography. …”
Get full text
Article -
3137
The Ambivalent Representation of the Orient in T. E. Lawrence’s Seven Pillars of Wisdom: A Triumph (1935)
Published 2020-06-01“…The literary output that was produced during the rise of the British Empire often reflected the imperialist spirit that dominated the world at that time. …”
Get full text
Article -
3138
Particle Swarm Optimization Based Sliding Mode Controller for Performance Improvement of Unified Power Quality Controllers Inverters
Published 2024-02-01“…In this paper particle swarm optimasation algorithm (PSO) based sliding mode controller(SMC) introduced to control invrters of Uniefied power quality Controllers(UPQC) to control and improve the power quality in microgrids through controlling the output power of the distributed generation source. …”
Get full text
Article -
3139
Underactuated Spatial Mechanism of Vehicle Door Latch with Force Constraint
Published 2021-11-01“…The dimension of equation variables is reduced by projection in a specific direction,and the kinematic equation variables of the spatial RRRSR mechanism are minimized,and the relationship between input angle and output angle is obtained analytically. The Adams simulation results show that the RRSSR underactuated mechanism with force constraint can not only complete the power release process,but also has the motion compatibility adaptability under the condition of manual release.…”
Get full text
Article -
3140
BgCut: Automatic Ship Detection from UAV Images
Published 2014-01-01“…Then the background trimap is obtained by combing some templates matching with region growing algorithm. The output trimap initializes Grabcut background instead of manual intervention and the process of segmentation without iteration. …”
Get full text
Article