-
61
Innovative soliton solutions for a (2+1)-dimensional generalized KdV equation using two effective approaches
Published 2024-12-01“…In this paper, we analyze and provide innovative soliton solutions for a (2+1)-dimensional generalized Korteweg-de Vries (gKdV) problem. We obtain phase shifts and dispersion relations by using the generalized Arnous technique and the Riccati equation approach, thus allowing different soliton solutions to be developed. …”
Get full text
Article -
62
The Impact of Polyphenol on General Nutrient Metabolism in the Monogastric Gastrointestinal Tract
Published 2020-01-01Get full text
Article -
63
Generalized Lacunary Statistical Difference Sequence Spaces of Fractional Order
Published 2015-01-01“…We generalize the lacunary statistical convergence by introducing the generalized difference operator Δνα of fractional order, where α is a proper fraction and ν=(νk) is any fixed sequence of nonzero real or complex numbers. …”
Get full text
Article -
64
Generalized orthogonal transmission system and its efficient implementation method
Published 2002-01-01“…Based on subband transformation theory, a general model for orthogonal transmultiplexers is constructed. …”
Get full text
Article -
65
-
66
-
67
Complex dynamics in a simple model of interdependent open economies
Published 2000-01-01Get full text
Article -
68
Stepwise order in protein complex assembly: approaches and emerging themes
Published 2025-01-01“…An explosion of high-resolution structures of multiprotein complexes has improved our understanding of what these machines look like and how they work, but we still know relatively little about how they assemble in living cells. …”
Get full text
Article -
69
Solving the Fragment Complexity of Official, Social, and Sensorial Urban Data
Published 2020-01-01“…Sources of urban data are generally categorized as one of the three types: official, social, and sensorial, which are from the government and enterprises, social networks of citizens, and the sensor network. …”
Get full text
Article -
70
Study of scenarios for the sustainability of technological development of regional industrial complexes
Published 2024-09-01Get full text
Article -
71
Improved QRD-M Detection Algorithm for Generalized Spatial Modulation Scheme
Published 2017-01-01“…In this paper an improved QRD-M algorithm is proposed for GSM signal detection, which achieves near-optimal performance but with relatively low complexity. Based on the QRD, the improved algorithm firstly transforms the maximum likelihood (ML) detection of the GSM signals into searching an inverted tree structure. …”
Get full text
Article -
72
Providing a General Model for the Successful Implementation of Digital Transformation in Organizations
Published 2024-06-01“…Data collection was primarily conducted through semi-structured interviews with 15 individuals until theoretical saturation was achieved. …”
Get full text
Article -
73
-
74
Simplified-Boost Reinforced Model-Based Complex Wind Signal Forecasting
Published 2020-01-01“…Wind signal forecasting has become more and more crucial in the structural health monitoring system and wind engineering recently. …”
Get full text
Article -
75
A Case Study of Complex Policy Design: The Systems Engineering Approach
Published 2019-01-01“…One way to address a complex system using a systematic approach is to combine creative and analytical methods, such as general morphological analysis and design structure matrix. …”
Get full text
Article -
76
Making complex things simpler: modern tools to edit the plant genome
Published 2017-03-01Get full text
Article -
77
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01“…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
Get full text
Article -
78
Investigation of paradoxical structures in Hafez's Ghazals
Published 2021-06-01“…What this means is that paradoxes, in addition to playing their role as aesthetic delusions, have a double application in the formation of a paradoxical space in general. The present paper attempts to study the paradoxical structures in Hafiz's sonnets by examining the paradoxical structures of how the paradoxical thing, apart from its intended nature, can function structurally in the creation of new spaces in poetry. …”
Get full text
Article -
79
Cluster Synchronization of Nonlinearly Coupled Complex Networks via Pinning Control
Published 2011-01-01“…We consider a method for driving general complex networks into prescribed cluster synchronization patterns by using pinning control. …”
Get full text
Article -
80