-
5221
Searching for eclipsing binaries in the GSFC-Eleanor-Lite database.
Published 2023-08-01“…I also provide a catalog of the 66 new eclipsing binaries, including the properties measured by the two algorithms. In comparison with the majority of other papers, this pipeline is faster, consisting of per-light-curve runtimes of approximately one second, while still delivering accurate detections. …”
Get full text
Article -
5222
Extended Waltz Operators for Collinear Edges
Published 2025-05-01“…Keywords: Waltz Filtering Algorithm, Constraint Satisfaction Problem …”
Get full text
Article -
5223
AUTOMATIC DESIGNING OF POWER SUPPLY SYSTEMS
Published 2005-08-01“…Methodology and software correspond to the requirements of the up-to-date designing, describe a general algorithm of program process and also reveals properties of automatic designing system objects. …”
Get full text
Article -
5224
An Improved Line Search Filter Method for the System of Nonlinear Equations
Published 2012-01-01“…An improved line search filter algorithm for the system of nonlinear equations is presented. …”
Get full text
Article -
5225
A Maximal Concurrency and Low Latency Distributed Scheduling Protocol for Wireless Sensor Networks
Published 2015-08-01“…Extensive measurements on two testbeds independently attest to ONAMA's superb performance compared to existing work: improving concurrency, throughput, and delay by a factor of 3.7, 3.0, and 5.3, respectively, while still maintaining reliability.…”
Get full text
Article -
5226
An Approach to Situational Data Integration Based on Data Service Hyperlink
Published 2014-02-01“…Enlightened by web page hyperlink,a novel abstraction“data service hyperlink”for linking and integrating data was proposed.With the help of “data service hyperlink”,users can explicitly describe the relationship between data sources.Based on data service hyperlink,the approach to just-in-time data service construction was proposed to enable users integrate data while navigating data services.A data service hyperlink recommendation algorithm was also discussed to help users select proper data service hyperlink to deal with the temporary requirements.A case-study and some experiments how to build a situational data integration application based on data service hyperlink efficiently were presented.…”
Get full text
Article -
5227
Image colorization based on transformer
Published 2025-07-01“…To ensure the generated image mimics a real-life image in terms of pixel accuracy and visual quality, the algorithm employs a variety of loss functions. Experimental results demonstrate significant performance improvements in black and white image colorization. …”
Get full text
Article -
5228
Identifying a Global Optimizer with Filled Function for Nonlinear Integer Programming
Published 2011-01-01“…A corresponding filled function algorithm is established. Numerical experiments on several test problems are performed, and preliminary computational results are reported.…”
Get full text
Article -
5229
Numerical Generation of Trajectories Statistically Consistent with Stochastic Differential Equations
Published 2025-07-01“…The high accuracy of the method as compared to the standard Milstein algorithm is demonstrated on the example of Büttiker’s ratchet. …”
Get full text
Article -
5230
Optimized Design of Relay Node Placement for Industrial Wireless Network
Published 2014-11-01“…In addition, an edge coloring algorithm is proposed to solve the conflict of TDMA communication, which improves paralleled and real-time communication performance. …”
Get full text
Article -
5231
Comparative analysis of Landsat TM, ETM+, OLI and EO-1 ALI satellite images at the Tisza-tó area, Hungary
Published 2016-06-01“…We classified the study area using the Maximum Likelihood algorithm and used segmentation techniques for training area selection. …”
Get full text
Article -
5232
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01“…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
Get full text
Article -
5233
DIAGNOSTICS AND TREATMENT OF OBSTRUCTIVE JAUNDICE AT CHRONIC OPISTHORCHIASIS
Published 2016-06-01“…A differentiated algorithm of treatment was developed and applied in relation to the obtained data.…”
Get full text
Article -
5234
Reliable transmission mechanism with differentiated protection in virtualized fiber-wireless access network
Published 2019-03-01“…In view of the different reliability requirements of network service,a reliable transmission mechanism with differentiated protection was proposed in virtualized fiber-wireless access network.The quality of protection required by users and the fees that can be paid were used as a prerequisite.The backup protection resources were flexibly allocated by quantifying the multi-level protection quality with the probability of recovery.Then,for reducing traffic congestion and the unprotected services,the level service differentiation algorithm was used to choose protection link which was satisfied with the level of protection quality.The results show the proposed mechanism has more advantages in terms of long-term benefit-to-cost ratio and underlying network resource overhead,and provides users with a more flexible virtual network transmission while satisfying users’ reliability requirements.…”
Get full text
Article -
5235
APPLICATION OF PHRASEOLOGICAL PATTERNS IN THE RECOGNITION OF CONTROLLER’S INSTRUCTIONS, FOR AIR TRAFFIC CONTROL TRAINING COMPLEXES
Published 2016-11-01“…The paper proposes an algorithm for recognizing ATC controller’s messages using method of contextual analysis of phraseology elements based on the application of phraseological patterns. …”
Get full text
Article -
5236
Pengamanan Dokumen Digital Perusahaan Menggunakan Metode Least Significant Bit (LSB) Dan Algoritma RC4 Stream Chipher
Published 2022-03-01“…Steganography is a technique to hide messages or secret data in a place called a carrier file. While cryptography is a science that studies how to keep data or messages safe when sent, from sender to recipient without interference from other parties. …”
Get full text
Article -
5237
Quantum Key Relay Scheme Based on Trusted Control Center
Published 2014-06-01“…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
Get full text
Article -
5238
Efficient traceable identity-based signature scheme
Published 2009-01-01“…Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
Get full text
Article -
5239
Treatment of Subcorneal Pustular Dermatosis without Dapsone: A Case Report and Review of the Literature
Published 2024-01-01“…Subcorneal pustular dermatosis (SPD) is a rare neutrophilic dermatosis characterized by pustules on the trunk and intertriginous areas. While oral dapsone is the first-line treatment for SPD, alternative options are necessary for patients with glucose-6-phosphate dehydrogenase deficiency, drug hypersensitivity reactions, or refractory disease. …”
Get full text
Article -
5240
Dynamic Modeling and Composite Attitude Cooperative Control for Dumbbell-Shaped Spacecraft
Published 2025-01-01“…First, a dynamic model is formulated that accounts for actuator faults and external disturbances while enabling distributed attitude coordination control. …”
Get full text
Article