-
341
Planar Monopoles with Different Radiator Shapes for UWB Body-Centric Wireless Communications
Published 2013-01-01Get full text
Article -
342
Fault Modeling and Testing for Analog Circuits in Complex Space Based on Supply Current and Output Voltage
Published 2015-01-01“…This paper deals with the modeling of fault for analog circuits. A two-dimensional (2D) fault model is first proposed based on collaborative analysis of supply current and output voltage. …”
Get full text
Article -
343
Study on Cleaning Effect of Different Water Flows on the Pulsed Cavitating Jet Nozzle
Published 2019-01-01“…During the experiment on erosion effects, the flow rate had little influence on outside diameter of the erosion circle. The erosion rate increased with the increase of the flow rate, reached the peak value at Q = 7.2 m3/h, but slightly decreased subsequently.…”
Get full text
Article -
344
Complex Atanassov's Intuitionistic Fuzzy Relation
Published 2013-01-01“…This paper presents distance measure between two complex Atanassov's intuitionistic fuzzy sets (CAIFSs). …”
Get full text
Article -
345
Evaluating and refining undersea cable path planning algorithms: A comparative study.
Published 2024-01-01“…We present a fair and comprehensive comparison method for evaluating multiple algorithms-DBA, the Fast Marching Method (FMM), and a great circle-based method. To evaluate the performance of automated path-planning methods, we compare them based on two main criteria: (1) the total weighted cost which is a combined measure of various costs and risks of the cable path according to their weights, and (2) the algorithm's runtime. …”
Get full text
Article -
346
Pinpointing Defects in Grounding Grids with Multistatic Radars
Published 2025-01-01“…With these difference signals, the parameters of the radar ellipses and circle are obtained, which delimit the area where the fault can be found. …”
Get full text
Article -
347
The Mammary Gland Carcinogens: The Role of Metal Compounds and Organic Solvents
Published 2013-01-01Get full text
Article -
348
Sensitivity Analysis of Copolar Complex Coherence for Crop Monitoring At L-Band
Published 2025-01-01“…This article investigates the sensitivity of the copolar complex coherence to the growth of three crop types (barley, corn, and canola) using <italic>L</italic>-band data from two airborne campaigns. The copolar complex coherence is represented on the complex plane (unit circle) for interpretation. …”
Get full text
Article -
349
Environmental photocatalytic processes with POM. The photodecomposition of atrazine and photoreduction of metal ions from aqueous solutions
Published 2002-01-01“…Polyoxometalate anions (POM), resulting from the condensation of tungstate anions in strongly acidified solutions, can absorb efficiently light in the UV-near Vis region.The produced excited state is a very powerful oxidative reagent which can, mainly via OH radical attack, oxidize and mineralize a great variety of organic pollutants in aqueous solutions, while the photocatalytic circle is closed by reoxidation of the reduced POM, mainly, by O2. …”
Get full text
Article -
350
-
351
The Artistic Links of Dora Pejačević and Svetislav Stančić Viewed Through the Stančić Legacy in the Library of the Academy of Music in Zagreb
Published 2024-01-01“…Of interest for this topic are boxes 1 and 2 in the archives, in which there are concert posters, programs and reviews of Stančić’s renderings of Dora’s works. …”
Get full text
Article -
352
Fog-aided identity privacy protection scheme for sensing users in mobile crowd sensing
Published 2019-12-01“…In mobile crowd sensing(MCS),attackers can reconstruct the social circle among sensing users,who use the social association information among sensing users and the correlation between the sensing user’s identity and sensing data to further attack a social alliance.In order to tackle this issue,a fog-aided identity privacy protection scheme is proposed.Firstly,two fog nodes are introduced which located at the edge of the sensing terminal.The one is task allocation center (TC) for handling the reasonable allocation of sensing tasks,and the other is data center (DC) for calculating sensing data.Furthermore,differential privacy is employed for preventing attackers from acquiring the specific social association weight of sensing users.Finally,in order to prevent attackers from obtaining the sensing users' identity information and sensing data at the same time,sensing users use different blind identities to communicate with TC and DC.Security analysis indicates that the proposed scheme can ensure the security of identity privacy information of sensing users in the process of completing sensing tasks.Experimental results show that the proposed scheme can protect the social association information between sensing users,and has a low delay.…”
Get full text
Article -
353
Blasting Vibration Signal Transform in Geotechnical Engineering Applied HHT and S Transform for Time-Frequency Analysis
Published 2022-01-01“…It expressed that these two methods are complete and effective and have the characteristics of adaptive multiresolution. …”
Get full text
Article -
354
State of competition: conceptual shoehorning behind priority on calcitonin precursor biosynthesis
Published 2019-11-01“…Irrespectively of political circumstances, the paper is focused on the competition between two different approaches in science particularly important for progress in medicine: the perspective presented by experimental studies in basic sciences (in animals) and the models developed in clinical sciences. …”
Get full text
Article -
355
Modeling Spatiotemporal Precipitation: Effects of Density, Interpolation, and Land Use Distribution
Published 2015-01-01Get full text
Article -
356
L’introduction de la notion de service environnemental et écosystémique à Madagascar
Published 2012-12-01“…The actors try to lobby for a project of national policy, what marks one difference with the Costa Rica process, where SE and PSE were introduced by a forest law in 1996. The preservationist circle has adopted this notion but it is not accepted by all the development actors yet. …”
Get full text
Article -
357
Moments of von mises and fisher distributions and applications
Published 2017-05-01Get full text
Article -
358
C. McGinn. A Religion of Hate / trans. from Engl. V. A. Sergeeva
Published 2023-05-01Get full text
Article -
359
Networking Method for the Structure of a Large Modular Deployable Space Antenna
Published 2022-01-01Get full text
Article -
360