To see the other types of publications on this topic, follow the link: "block-scheme" form.

Journal articles on the topic '"block-scheme" form'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic '"block-scheme" form.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

S, Nandhini, and Durgesh Singh. "SELF RECOVERABLE ADAPTIVE FRAGILE WATERMARKING SCHEME WITH TAMPER DETECTION AND RECOVERY." ICTACT Journal on Image and Video Processing 15, no. 4 (2025): 3596–605. https://doi.org/10.21917/ijivp.2025.0509.

Full text
Abstract:
A self recoverable adaptive fragile watermarking scheme to detect and recover attacked parts with improved tamper detection ability is proposed in this paper. The Cover image is divided into 2x2 blocks and an adaptive watermark is generated from the quantized version of the 2x2 block. Instead of choosing the best possible values, the proposed watermark generation scheme divides the 2x2 quantized block into two 1x2 blocks to form the watermark. In order to aid in tamper detection, authentication bits are generated from the mapped block of the 2x2 block. The watermark bits (authentication bits and recovery bits) are embedded into the mapped block to form the watermarked image. The proposed watermark embedding scheme provides a quality PSNR of the watermarked image well above 35 dB. The watermarked image was tampered using different attacks like object deletion, object addition, change of content attack and addition of noises. The tampered blocks were detected using the proposed multi-level tamper detection scheme. The attacked parts of the watermarked image were reconstructed using the proposed tamper recovery scheme. The proposed tamper recovery scheme provides a quality PSNR well above 30 dB for various types of attacks. The performance of the proposed fragile watermarking scheme was also evaluated in terms of PSNR (peak signal to noise ratio), SSIM (Structural Similarity Index Measure), Probability of False Rejection (PFR) and Probability of False Acceptance (PFA) of the reconstructed image for various tampering ratios. The PFR and PFA Values of the proposed scheme are close to zero indicating that the tampered pixels are detected correctly.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Chuan Mu. "A Robust Algorithm for Digital Watermarking with Tamper Recovery." Applied Mechanics and Materials 432 (September 2013): 533–37. http://dx.doi.org/10.4028/www.scientific.net/amm.432.533.

Full text
Abstract:
A block-wise and content-based image authentication scheme with location and recovery is presented. In this scheme, the watermark of each block is an encrypted form of its content-feature, which is embedded in another block which selected by an ergodic matrix of a chaotic sequence. The randomicity of selected block can robust the VQ attack. The encryption further strengthens the security. That all security parameters are user dependent and can be computed at both ends individually based on Diffie-Hellman key exchange method makes the scheme not only robust against collage attack but also truly oblivious. The experiments demonstrate that the proposed scheme can detect and localize any tampering of size 8x8 pixels and above and can recover a 40% damaged image to an intelligible one.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Xianan, Xiaoxiang Wang, Wenrong Gong, and Zijia Huang. "Generalized Block-Diagonalization Schemes for MIMO Relay Broadcasting Systems." International Journal of Digital Multimedia Broadcasting 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/305846.

Full text
Abstract:
We propose two generalized block-diagonalization (BD) schemes for multiple-input multiple-output (MIMO) relay broadcasting systems with no channel state information (CSI) at base station. We first introduce a generalized zero forcing (ZF) scheme that reduces the complexity of the traditional BD scheme. Then the optimal power loading matrix for the proposed scheme is analyzed and the closed-form solution is derived. Furthermore, an enhanced scheme is proposed by employing the minimum-mean-squared-error (MMSE) criterion. Simulation results show that the proposed generalized MMSE scheme outperforms the other schemes and the optimal power loading scheme improves the sum-rate performance efficiently.
APA, Harvard, Vancouver, ISO, and other styles
4

Akinnukawe, Blessing Iziegbe, John Olusola Kuboye, and Solomon Adewale Okunuga. "Numerical Solution of Fourth-order Initial Value Problems Using Novel Fourth-order Block Algorithm." Journal of Nepal Mathematical Society 6, no. 2 (2024): 7–18. http://dx.doi.org/10.3126/jnms.v6i2.63016.

Full text
Abstract:
In this paper, a one-step fourth-order block scheme for solving fourth order Initial Value Problems (IVPs) of Ordinary Differential Equations (ODE) is developed using interpolation and collocation techniques. The derived schemes contain two hybrid points which are chosen such that 0 < w1 < w2 < 1 where w1 and w2 are defined as hybrid points. The characteristics of the developed schemes are analyzed. The obtained schemes are applied in block form to solve some fourth-order IVPs and the numerical results show the accuracy and effectiveness of the block scheme compared with some existing methods.
APA, Harvard, Vancouver, ISO, and other styles
5

Samuel, Sunday, Musa Kida, Adamu M. Alkali, and Sambo B. Mohammed. "A Second Derivative Simpson's Method for Solving Initial Value Problems with Stiff." International Journal of Development Mathematics (IJDM) 2, no. 2 (2025): 026–37. https://doi.org/10.62054/ijdm/0202.02.

Full text
Abstract:
Collocation and interpolation of power series approximation solution is used to develop a continuous hybrid Second Derivative of Simpson's scheme with four off-grid points for the solution of the Stiff System of ordinary differential equations (ODEs). Evaluating the continuous scheme at various grid and off-grid points, the discrete schemes are obtained and written in block form. The block method's fundamental characteristics, including order, zero stability, and stability region, were examined. After testing the block method on a few numerical instances, it was discovered to provide a better approximation than comparable methods reported in the literature.
APA, Harvard, Vancouver, ISO, and other styles
6

Hou, Shi-wang, Zhibin Li, and Hui Wang. "A Fast Algorithm to Generate Feasible Solution of Production Facilities Layout Based on Plane Segmentation." Mathematical Problems in Engineering 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/1712376.

Full text
Abstract:
For facility layout problem with continuous block and unequal area, it is key to generate feasible solution of facility layout with arbitrary space form in order to find the optimal arrangement scheme under a given goal. According to the given slicing position and slicing mode, the plane for arrangement was divided into many block areas by use of plane segmentation, which was consistent with the facilities in number. The precise coordinates of the lower-left corner and the top-right corner of each facility were calculated in light of its area, width, and length. The corresponding algorithm was designed in the form of pseudocode. The procedure proposed can provide a feasible facility layout solution. The running results of facilities layout instance containing 14 facilities show that the scheme can output facilities plane layout scheme quickly and provide decision support for the facilities planning.
APA, Harvard, Vancouver, ISO, and other styles
7

Filelis-Papadopoulos, Christos K., and George A. Gravvanis. "Hybrid multilevel solution of sparse least-squares linear systems." Engineering Computations 34, no. 8 (2017): 2752–66. http://dx.doi.org/10.1108/ec-10-2016-0353.

Full text
Abstract:
Purpose Large sparse least-squares problems arise in different scientific disciplines such as optimization, data analysis, machine learning and simulation. This paper aims to propose a two-level hybrid direct-iterative scheme, based on novel block independent column reordering, for efficiently solving large sparse least-squares linear systems. Design/methodology/approach Herewith, a novel block column independent set reordering scheme is used to separate the columns in two groups: columns that are block independent and columns that are coupled. The permutation scheme leads to a two-level hierarchy. Using this two-level hierarchy, the solution of the least-squares linear system results in the solution of a reduced size Schur complement-type square linear system, using the preconditioned conjugate gradient (PCG) method as well as backward substitution using the upper triangular factor, computed through sparse Q-less QR factorization of the columns that are block independent. To improve the convergence behavior of the PCG method, the upper triangular factor, computed through sparse Q-less QR factorization of the coupled columns, is used as a preconditioner. Moreover, to further reduce the fill-in, then the column approximate minimum degree (COLAMD) algorithm is used to permute the block consisting of the coupled columns. Findings The memory requirements for solving large sparse least-squares linear systems are significantly reduced compared to Q-less QR decomposition of the original as well as the permuted problem with COLAMD. The memory requirements are reduced further by choosing to form larger blocks of independent columns. The convergence behavior of the iterative scheme is improved due to the chosen preconditioning scheme. The proposed scheme is inherently parallel due to the introduction of block independent column reordering. Originality/value The proposed scheme is a hybrid direct-iterative approach for solving sparse least squares linear systems based on the implicit computation of a two-level approximate pseudo-inverse matrix. Numerical results indicating the applicability and effectiveness of the proposed scheme are given.
APA, Harvard, Vancouver, ISO, and other styles
8

Shukla, Vineeta, Kuntala Ray, and Mausumi Basu. "Barriers and Solutions Pertaining to Pradhan Mantri Matru Vandana Yojana (PMMVY) Implementation in A Block of West Bengal: A Mixed-Methods Approach." January-March 2023 14, no. 1 (2023): 9–16. http://dx.doi.org/10.51957/healthline_467_2022.

Full text
Abstract:
Introduction: Improvement of maternal health care services will not only put a positive impact on maternal health, but also on the health of the new born. Objectives: This study was conducted to estimate the proportion of eligible beneficiaries who received the benefits provided by the scheme, to identify the barriers faced by the beneficiaries and health providers related to the scheme and to find possible solutions to overcome the barriers found as suggested by them in a block of West Bengal. Method: A cross-sectional study with sequential explanatory mixed-method approach was conducted in a block of West Bengal from January-December 2021. Quantitative data was collected from the digital portal of PMMVY. All beneficiaries who had their Last Menstrual Period (LMP) on and after 1st March 2020 up to 31st December 2020 were included. To identify the barriers faced and suggest possible solutions, Focused Group Discussions (FGDs) were held with the beneficiaries, ANMs and ASHAs and Key-Informant Interviews (KIIs) with the Block Medical Officer and Data Entry Operator. Data were analyzed using SPSS version 25.0. Descriptive statistics were used to summarize quantitative data while qualitative data were analyzed in the form of themes, codes and verbatim. Results: Total eligible beneficiaries for the three installments were 1066, 917 and 708 respectively. About 95.5% beneficiaries received the first installment, 93.0% received the second and 98.3% had received the third installment. The broad themes [codes] generated from the FGDs were challenges during antenatal care [ANC refused, home visit preferred, home ANC difficult, lockdown], challenges related to the PMMVY scheme [documents unavailable, incomplete forms, payment issues], possible solutions [prepare pre-requisites beforehand, provide cash]. Widely two main themes emerged from the KIIs: Form related issues and Payment issues. Conclusion: Coverage of PMMVY scheme in the block was satisfactory. However, speeding the payment process and stricter monitoring of the scheme is required.
APA, Harvard, Vancouver, ISO, and other styles
9

Ogunniran, M. O., N. A. Tijani, K. A. Adedokun, and K. O. O.Kareem. "An accurate hybrid block technique for second order singular problems in ordinary differential equations." African Journal of Pure and Applied Sciences 3, no. 1 (2022): 144–54. http://dx.doi.org/10.33886/ajpas.v3i1.257.

Full text
Abstract:
A block hybrid method for solution of second order singular problems in ordinary differential equations is proposed in this work. For this purpose, two basis functions were combined for the development of a continuous hybrid schemes using collocation and interpolation technique. To make the continuous scheme self-starting, a block method of discrete hybrid form was derived. The scheme was analyzed using appropriate existing definitions to investigate their stability, consistency and convergence which were then shown to be consistent, zero-stable and hence convergent. Illustrative examples have been discussed to demonstrate the validity and applicability of the technique and the results have been compared with those of existing methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Shams, Rifat Ara. "Effect of Different Block Cipher Modes of Operation for Secured Data Transmission in Convolutional Encoded Dwt Based Mimo Mc-Cdma System." DIU Journal of Science & Technology 12, no. 1 (2024): 61–69. https://doi.org/10.5281/zenodo.13770817.

Full text
Abstract:
In this proposed model, performance of different block cipher Modes of operation over ZF channel equalization technique and BPSK modulation scheme in DWT based MIMO Multi-Carrier Code Division Multiple Access (MC-CDMA) system has been analyzed for security issues through simulation. This system is proposed using convolutional coding scheme over AWGN and Rayleigh fading channel with Walsh Hadamard code as orthogonal spreading code. In this research paper, the performance of Electronic Codebook (ECB) mode, Cipher Block Chaining (CBC) mode, Cipher Feedback (CFB) mode, Output Feedback (OFB) mode and Counter (CTR) mode is compared as cryptographic algorithms to encrypt the actual data and decrypt its original form.
APA, Harvard, Vancouver, ISO, and other styles
11

Chang, Ching-Chun, Yijie Lin, Jui-Chuan Liu, and Chin-Chen Chang. "Reversible Data Hiding in Absolute Moment Block Truncation Codes via Arithmetical and Logical Differential Coding." Cryptography 9, no. 1 (2024): 4. https://doi.org/10.3390/cryptography9010004.

Full text
Abstract:
To reduce bandwidth usage in communications, absolute moment block truncation coding is employed to compress cover images. Confidential data are embedded into compressed images using reversible data-hiding technology for purposes such as image management, annotation, or authentication. As data size increases, enhancing embedding capacity becomes essential to accommodate larger volumes of secret data without compromising image quality or reversibility. Instead of using conventional absolute moment block truncation coding to encode each image block, this work proposes an effective reversible data-hiding scheme that enhances the embedding results by utilizing the traditional set of values: a bitmap, a high value, and a low value. In addition to the traditional set of values, a value is calculated using arithmetical differential coding and may be used for embedding. A process involving joint neighborhood coding and logical differential coding is applied to conceal the secret data in two of the three value tables, depending on the embedding capacity evaluation. An indicator is recorded to specify which two values are involved in the embedding process. The embedded secret data can be correctly extracted using a corresponding two-stage extraction process based on the indicator. To defeat the state-of-the-art scheme, bitmaps are also used as carriers in our scheme yet are compacted even more with Huffman coding. To reconstruct the original image, the low and high values of each block are reconstructed after data extraction. Experimental results show that our proposed scheme typically achieves an embedding rate exceeding 30%, surpassing the latest research by more than 2%. Our scheme reaches outstanding embedding rates while allowing the image to be perfectly restored to its original absolute moment block truncation coding form.
APA, Harvard, Vancouver, ISO, and other styles
12

Mesnager, Sihem, Ahmet Sınak, and Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain." Mathematics 8, no. 12 (2020): 2218. http://dx.doi.org/10.3390/math8122218.

Full text
Abstract:
Blockchain systems store transaction data in the form of a distributed ledger where each node stores a copy of all data, which gives rise to storage issues. It is well-known that the tremendous storage and distribution of the block data are common problems in blockchain systems. In the literature, some types of secret sharing schemes are employed to overcome these problems. The secret sharing method is one of the most significant cryptographic protocols used to ensure the privacy of the data. The main purpose of this paper is to improve the recent distributed storage blockchain systems by proposing an alternative secret sharing method. We first propose a secure threshold verifiable multi-secret sharing scheme that has the verification and private communication steps based on post-quantum lattice-based hard problems. We then apply the proposed threshold scheme to the distributed storage blockchain (DSB) system to share transaction data at each block. In the proposed DSB system, we encrypt the data block with the AES-256 encryption algorithm before distributing it among nodes at each block, and both its secret key and the hash value of the block are privately shared among nodes simultaneously by the proposed scheme. Thereafter, in the DSB system, the encrypted data block is encoded by the Reed–Solomon code, and it is shared among nodes. We finally analyze the storage and recovery communication costs and the robustness of the proposed DSB system. We observe that our approach improves effectively the recovery communication cost and makes it more robust compared to the previous DSB systems. It also improves extremely the storage cost of the traditional blockchain systems. Furthermore, the proposed scheme brings to the DSB system the desirable properties such as verification process and secret communication without private channels in addition to the known properties of the schemes used in the previous DSB systems. As a result of the flexibility on the threshold parameter of the scheme, a diverse range of qualified subsets of nodes in the DSB system can privately recover the secret values.
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Chein-Shan, Chih-Wen Chang, and Chia-Cheng Tsai. "Numerical Simulations of Complex Helmholtz Equations Using Two-Block Splitting Iterative Schemes with Optimal Values of Parameters." AppliedMath 4, no. 4 (2024): 1256–77. http://dx.doi.org/10.3390/appliedmath4040068.

Full text
Abstract:
For a two-block splitting iterative scheme to solve the complex linear equations system resulting from the complex Helmholtz equation, the iterative form using descent vector and residual vector is formulated. We propose splitting iterative schemes by considering the perpendicular property of consecutive residual vector. The two-block splitting iterative schemes are proven to have absolute convergence, and the residual is minimized at each iteration step. Single and double parameters in the two-block splitting iterative schemes are derived explicitly utilizing the orthogonality condition or the minimality conditions. Some simulations of complex Helmholtz equations are performed to exhibit the performance of the proposed two-block iterative schemes endowed with optimal values of parameters. The primary novelty and major contribution of this paper lies in using the orthogonality condition of residual vectors to optimize the iterative process. The proposed method might fill a gap in the current literature, where existing iterative methods either lack explicit parameter optimization or struggle with high wave numbers and large damping constants in the complex Helmholtz equation. The two-block splitting iterative scheme provides an efficient and convergent solution, even in challenging cases.
APA, Harvard, Vancouver, ISO, and other styles
14

YU, XIANGBIN, and GUANGGUO BI. "FULL-RATE AND LOW-COMPLEXITY SPACE-TIME BLOCK CODING CONCATENATED WITH CHANNEL CODES." International Journal of Information Technology & Decision Making 06, no. 01 (2007): 5–14. http://dx.doi.org/10.1142/s0219622007002381.

Full text
Abstract:
Space-time block (STB) coding has been an effective transmit diversity technique for combating fading recently. In this paper, a full-rate and low-complexity STB coding scheme with complex orthogonal design for multiple antennas is proposed, and turbo code is employed as channel coding to improve the proposed code scheme performance further. Compared with full-diversity multiple antennas STB coding schemes, the proposed scheme can implement full data rate, partial diversity and a smaller complexity, and has more spatial redundancy information. Moreover, using the proposed scheme can form efficient spatial interleaving, thus performance loss due to partial diversity is effectively compensated by the concatenation of turbo coding. Simulation results show that on the condition of the same system throughput and concatenation of turbo code, the proposed scheme has lower bit error rate (BER) than those low-rate and full-diversity multiple antennas STB coding schemes.
APA, Harvard, Vancouver, ISO, and other styles
15

Ahmed, Irfan. "On the Error Rate and Delay Performance Analysis of OFDM based Cooperative Protocol for 802.11 Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 2 (2013): 1339–48. http://dx.doi.org/10.24297/ijct.v10i2.7001.

Full text
Abstract:
We develop and analyze a distributed space-frequency block code-orthogonal frequency division multiplexing protocol for cooperative communications in 802.11 networks. Space frequency block codes (SFBC) are spread over OFDM subcarriers instead of OFDM symbols to compensate for the small coherence time. Medium access control (MAC) layer packet retransmission limit has been used as an actuator for transmit cooperative diversity initialization. Transmit diversity is provided by the relays in close proximity to source node. Closed form expressions are obtained for packet error rate (PER) and average delay for the proposed scheme in Nakagami-m fading channels. This cooperative scheme achieves lower signal-to-noise ratio (SNR) values for desired packet error rate and markedly improves the average delay per packet compared to the direct transmissions at low SNR regime. Finally, the results of computer simulations are included to demonstrate the efficacy of the proposed scheme and to verify the accuracy of analytical expressions.
APA, Harvard, Vancouver, ISO, and other styles
16

Liu, Feng, Jian Yu Bai, and Lin Jun Sun. "A Robust Grayscale Watermarking Algorithm." Advanced Materials Research 225-226 (April 2011): 8–12. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.8.

Full text
Abstract:
In this paper, a novel robust grayscale watermarking algorithm based on Two-Levels DCT and SVD is proposed. The watermark signal is (32× 32 × 8) bit gray image. First, the original image is divided into blocks according to the size of the watermark; each block corresponds to each pixel value of watermark. Second, the DCT is applied in each block twice and form new blocks. Then, Get the largest value of each new block to form a new matrix .Apply SVD on the new matrix to get matrices U, S and V for each block. The pixel value of watermark is embedded into the S matrix of the new matrix. And the watermark can be detected with the original image. The experimental results show that the algorithm can satisfy the transparence and robustness of the watermarking system very well. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks very well.
APA, Harvard, Vancouver, ISO, and other styles
17

Zhong, Qing Hua, Kai Yan Chen, and Han Zhang. "Equalization of Rapidly Varying Channels for OFDM Systems Using Subblock Tracking." Applied Mechanics and Materials 263-266 (December 2012): 1044–50. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1044.

Full text
Abstract:
A novel equalization approach for rapidly time-varying channels of OFDM systems is presented,which we propose receiver windowing based ‘subblockwise’ tracking scheme to combat with intercarrier interference (ICI),whose aim is to force each subblock of one OFDM block as time-invariant such that channel equalization can be performed by a time-invariant structure. Meanwhile, signal-to-interference ratio (SIR) is numerically evaluated and derived as a close-form expression for performance analysis. Simulation results show that the proposed scheme outperforms the existing equalizers, while requiring a lower complexity.
APA, Harvard, Vancouver, ISO, and other styles
18

Abdulazeez, Sikiru Adeyinka. "A Statistical Modeling Approach of Examining Hypertension-Related Risk Factors in Adults." KASU JOURNAL OF MATHEMATICAL SCIENCES 4, no. 2 (2023): 46–56. https://doi.org/10.5281/zenodo.10648623.

Full text
Abstract:
<strong>Abstract</strong> Due to severe step size restriction, it becomes absolutely necessary that only methods with large regions of absolute stability remain suitable for stiff equations. In this paper, the continuous Block one-step embedded numerical integrator of order 4 and order 5 have been constructed. The continuous scheme was evaluated at different points to obtain discrete schemes. The order, error constant, zero stability and consistency of the resulting discrete schemes were ascertained. The region of absolute stability of the block hybrid scheme was plotted. Their accuracy and stability investigated shows that the new methods are A(&alpha;)- stable, a property desirable of numerical methods suitable for the solutions of stiff ODE&rsquo;s. The new one-step embedded Numerical Integrators used in block form tested on stiff systems of Ordinary Differential Equations confirms that they are efficient and they compare favorably with exact solution and the state of the art Matlab ODE solver, ode15s.&nbsp; (ode 15s is for stiff problems while ode 45s are for non-stiff problems)
APA, Harvard, Vancouver, ISO, and other styles
19

Li, Shu-Cun, Xiang-Gui Li, and Fang-Yuan Shi. "Numerical Methods for the Derivative Nonlinear Schrödinger Equation." International Journal of Nonlinear Sciences and Numerical Simulation 19, no. 3-4 (2018): 239–49. http://dx.doi.org/10.1515/ijnsns-2016-0184.

Full text
Abstract:
AbstractIn this work, a second-order accuracy in both space and time Crank–Nicolson (C-N)-type scheme, a fourth-order accuracy in space and second-order accuracy in time compact scheme and a sixth-order accuracy in space and second-order accuracy in time compact scheme are proposed for the derivative nonlinear Schrödinger equation. The C-N-type scheme is tested to satisfy the conservation of discrete mass. For the two compact schemes, the iterative algorithm and the Thomas algorithm in block matrix form are adopted to enhance the computational efficiency. Numerical experiment is given to test the mass conservation for the C-N-type scheme as well as the accuracy order of the three schemes. In addition, the numerical simulation of binary collision and the influence on the solitary solution by adding a small random perturbation to the initial condition are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
20

Zou, Le, and Shuo Tang. "A New Approach to General Interpolation Formulae for Bivariate Interpolation." Abstract and Applied Analysis 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/421635.

Full text
Abstract:
General interpolation formulae for bivariate interpolation are established by introducing multiple parameters, which are extensions and improvements of those studied by Tan and Fang. The general interpolation formulae include general interpolation formulae of symmetric branched continued fraction, general interpolation formulae of univariate and bivariate interpolation, univariate block based blending rational interpolation, bivariate block based blending rational interpolation and their dual schemes, and some interpolation form studied by many scholars in recent years. We discuss the interpolation theorem, algorithms, dual interpolation, and special cases and give many kinds of interpolation scheme. Numerical examples are given to show the effectiveness of the method.
APA, Harvard, Vancouver, ISO, and other styles
21

Vitols, Aigars, and Ivars Rankis. "Experimental Results from Physical Model of Bidirectional Power Flow Regulator for Power Substations of Electrical Transport." Scientific Journal of Riga Technical University. Power and Electrical Engineering 25, no. 25 (2009): 127–32. http://dx.doi.org/10.2478/v10144-009-0027-x.

Full text
Abstract:
Experimental Results from Physical Model of Bidirectional Power Flow Regulator for Power Substations of Electrical TransportThis article is about model of bidirectional power flow regulator for power substations of electrical transport. The paper presents an experimental model which is made in the laboratory of Power and electrical engineering of Riga Technical University. Also principal block scheme and principal schemes of that model are presented in the form of computer modeling as well as some main results of experiments are presented in the form of diagrams.
APA, Harvard, Vancouver, ISO, and other styles
22

Gong, Li-Hua, Jin Du, Jing Wan, and Nan-Run Zhou. "Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation." Security and Communication Networks 2021 (February 22, 2021): 1–16. http://dx.doi.org/10.1155/2021/6627005.

Full text
Abstract:
A new image encryption scheme is proposed with a combination of block scrambling, closed-loop diffusion, and DNA molecular mutation. The new chaotic block scrambling mechanism is put forward to replace the traditional swapping rule by combining the rectangular-ambulatory-plane cyclic shift with the bidirectional random disorganization. The closed-loop diffusion strategy is designed to form a feedback system, which improves the anti-interference capacity of the algorithm. To further destroy the blocks characteristics and eliminate the correlations among adjacent blocks, two efficient methods of DNA molecular mutation are adopted in the mutation stage. Moreover, the proposed algorithm possesses a large key space and the keys are highly related with the plaintext image. Experimental results demonstrate that the suggested image encryption strategy is practicable and has strong ability against a variety of common attacks.
APA, Harvard, Vancouver, ISO, and other styles
23

Malkin, V. "IMPROVING THE MECHANISM OF THE PROCESS OF PROVIDING UNIFIED PUBLIC SERVICES." Actual directions of scientific researches of the XXI century: theory and practice 11, no. 1 (2023): 8–18. http://dx.doi.org/10.34220/2308-8877-2023-11-1-8-18.

Full text
Abstract:
As a result of the scientific research, the author's development of a generalized scheme of the mechanism for providing unified public services is presented, while the electronic system of unified public services is presented in the form of three main blocks: a pre-order processing block; block of the main order processing; block of the organization of the provision of services. An enlarged scheme of the mechanism for processing an order for a public service has been developed. The main areas of activity of the provision of state and municipal services in electronic form are the optimization of procedures for the provision of state and municipal services, as well as services provided by budget organizations (budget services) using information technology, and the improvement of the information technology infrastructure of e-government. As a result of the use of certain software designed to process the established type of order, the type of service is identified, followed by its registration and execution of the order. It is noted that in case of disagreement with the reasons for not providing the service, or providing a low-quality service, the client has the right to file a complaint. The complaint is considered by the system in a semi-automatic mode with the involvement of expert experts in the affected area. The author's development of a mechanism for processing customer complaints about not providing a service, or providing a low-quality service, is presented.
APA, Harvard, Vancouver, ISO, and other styles
24

THOMSEN, MICHAEL KIRKEDAL, and HOLGER BOCK AXELSEN. "PARALLELIZATION OF REVERSIBLE RIPPLE-CARRY ADDERS." Parallel Processing Letters 19, no. 02 (2009): 205–22. http://dx.doi.org/10.1142/s0129626409000171.

Full text
Abstract:
The design of fast arithmetic logic circuits is an important research topic for reversible and quantum computing. A special challenge in this setting is the computation of standard arithmetical functions without the generation of garbage. Here, we present a novel parallelization scheme wherein m parallel k-bit reversible ripple-carry adders are combined to form a reversible mk-bit ripple-block carry adder with logic depth [Formula: see text] for a minimal logic depth [Formula: see text], thus improving on the mk-bit ripple-carry adder logic depth [Formula: see text]. The underlying mechanisms of the parallelization scheme are formally proven correct. We also show designs for garbage-less reversible comparison circuits. We compare the circuit costs of the resulting ripple-block carry adder with known optimized reversible ripple-carry adders in measures of circuit delay, width, gate, transistor count, and relative power efficiency, and find that the parallelized adder offers significant speedups at realistic word sizes with modest parallelization overhead.
APA, Harvard, Vancouver, ISO, and other styles
25

Cao, Peng, and Wenhui Li. "Evaluation and optimization of outdoor wind environment in block based on space syntax and CFD simulation." PLOS ONE 19, no. 3 (2024): e0297683. http://dx.doi.org/10.1371/journal.pone.0297683.

Full text
Abstract:
The wind environment quality at the height of pedestrians can significantly affect the thermal comfort and physical and mental health of pedestrians, promote the diffusion of air pollutants and inhibit the formation of urban heat island effect, and has been paid more and more attention in the field of urban and rural planning. This paper takes Jianlan Road commercial pedestrian Street as an example to maximize the thermal comfort of pedestrians. Based on CFD numerical simulation technology and space syntax theory, the pedestrian wind environment of the accessible space of the block is selected for quantitative research. Through numerical simulation, the influence of block spatial form on the wind environment at pedestrian height under the initial condition of uniform air flow is analyzed, and some suggestions are put forward for the optimization of block spatial form. Finally, the block optimization scheme is verified and simulated. The visualization results show that the wind environment quality of the optimized high-accessibility space is significantly improved, the proportion of comfort zone is increased from 58.2% to 86%, and the static wind rate is reduced from 41.8% to 14%. The wind environment optimization effect is obvious.
APA, Harvard, Vancouver, ISO, and other styles
26

Davidovich, Mihail. "Signal to noise output ratio improvement in nonlinear amplifier under the stochastic resonance." Izvestiya VUZ. Applied Nonlinear Dynamics 6, no. 5 (1998): 43–55. http://dx.doi.org/10.18500/0869-6632-1998-6-5-43-55.

Full text
Abstract:
The numerical simulations of nonlinear four—ports under the stochastic resonance are resulted and presented. The wide—band amplification of modulated signals with the noise coefficient in the range 1.5 — 2.0 dB has been shown. The possibility of noise coefficient decreasing in the circuit with several branches having non-identical four—ports has been investigated. The block—scheme for extraction the sinusoidal signal from white noise has been introduced and investigated. The signal has the form of separated sinusoidal series with carrying frequency ω0. The peculiarities of the scheme are the subharmonic signal ω0/3 producing which is proportional to the input signal and also the nonlinear signal transformation.
APA, Harvard, Vancouver, ISO, and other styles
27

Dang, Xiaoyu, Xiangbin Yu, and Xiaomin Chen. "Performance of Cross-Layer Design with Antenna Selection and Imperfect Feedback Information in MIMO Systems." International Journal of Antennas and Propagation 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/328457.

Full text
Abstract:
By combining adaptive modulation and automatic repeat request, a cross-layer design (CLD) scheme for MIMO system with antenna selection (AS) and imperfect feedback is presented, and the corresponding performance is studied. Subject to a target packet loss rate and fixed power constraint, the variable switching thresholds of fading gain are derived. According to these results, and using mathematical manipulation, the average spectrum efficiency (SE) and packet error rate (PER) of the system are further derived. As a result, closed-form expressions of the average SE and PER are obtained, respectively. These expressions include the expressions under perfect channel state information as special cases and provide good performance evaluation for the system. Numerical results show that the proposed CLD scheme with antenna selection has higher SE than the existing CLD scheme with space-time block coding, and the CLD scheme with variable switching thresholds outperforms that with conventional-fixed switching thresholds.
APA, Harvard, Vancouver, ISO, and other styles
28

Razavi, R., M. Fleury, and M. Ghanbari. "Enabling Cognitive Load-Aware AR with Rateless Coding on a Wearable Network." Advances in Multimedia 2008 (2008): 1–12. http://dx.doi.org/10.1155/2008/853816.

Full text
Abstract:
Augmented reality (AR) on a head-mounted display is conveniently supported by a wearable wireless network. If, in addition, the AR display is moderated to take account of the cognitive load of the wearer, then additional biosensors form part of the network. In this paper, the impact of these additional traffic sources is assessed. Rateless coding is proposed to not only protect the fragile encoded video stream from wireless noise and interference but also to reduce coding overhead. The paper proposes a block-based form of rateless channel coding in which the unit of coding is a block within a packet. The contribution of this paper is that it minimizes energy consumption by reducing the overhead from forward error correction (FEC), while error correction properties are conserved. Compared to simple packet-based rateless coding, with this form of block-based coding, data loss is reduced and energy efficiency is improved. Cross-layer organization of piggy-backed response blocks must take place in response to feedback, as detailed in the paper. Compared also to variants of its default FEC scheme, results from a Bluetooth (IEEE 802.15.1) wireless network show a consistent improvement in energy consumption, packet arrival latency, and video quality at the AR display.
APA, Harvard, Vancouver, ISO, and other styles
29

Luo, Xuan, Gaoming Jiang, Honglian Cong, and Yan Zhao. "Cloth Simulation with Adaptive Force Model in Three-Dimensional Space." Journal of Engineered Fibers and Fabrics 13, no. 1 (2018): 155892501801300. http://dx.doi.org/10.1177/155892501801300105.

Full text
Abstract:
An adaptive force model is proposed to achieve better performance between the accuracy and the speed of cloth simulation in three-dimensional (3D) space. The proposed force model can be expressed with a general mathematical form demonstrated by the distance between the clothing and the human body. This paper defines how a continuous adaptive area can be established with a shape “block”. It is clarified that, within a specific block, a force model is expressed with the gravity of the clothing, the forces of the adjacent blocks and the anti-force of the human body to the block. In this manner, the force model of the desired clothing can be obtained through a general mathematical expression. The simulations and experimental results demonstrate that the acceptable clothing simulation in 3D space can be achieved with higher speed by saving about 20.2% runtime, and the efficiency of the proposed scheme can be verified.
APA, Harvard, Vancouver, ISO, and other styles
30

Polyakov, V. A. "Automation of the Algorithm for Designing a Reinforcement Scheme for a Structure Made of Composite Materials." LETI Transactions on Electrical Engineering & Computer Science 15, no. 7 (2022): 14–19. http://dx.doi.org/10.32603/2071-8985-2022-15-7-14-19.

Full text
Abstract:
The paper considers the development and automation of an algorithm for designing a reinforcement scheme based on bending deformation. The algorithm is presented in the form of a block diagram. When searching for a reinforcement trajectory, the algorithm takes into account the specified criteria for searching and designing a scheme. On the basis of the algorithm, a program is developed that can operate with the data of the model under study, use them to construct and synthesize the reinforcement trajectory. The program code is based on a simple example – bending deformation. The stress-strain state (SSS) is analyzed, the deformation proceeds linearly and in one direction. As a result, the reinforcement paths are straight lines. For nonlinear deformation, this code provides a spline function that is used to construct curved trajectories. Automation of the algorithm for designing reinforcement trajectories in the form of a program made it possible to reduce the time of searching, processing and compiling trajectories.
APA, Harvard, Vancouver, ISO, and other styles
31

Dong, Zhekang, Shukai Duan, Xiaofang Hu, Lidan Wang, and Hai Li. "A Novel Memristive Multilayer Feedforward Small-World Neural Network with Its Applications in PID Control." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/394828.

Full text
Abstract:
In this paper, we present an implementation scheme of memristor-based multilayer feedforward small-world neural network (MFSNN) inspirited by the lack of the hardware realization of the MFSNN on account of the need of a large number of electronic neurons and synapses. More specially, a mathematical closed-form charge-governed memristor model is presented with derivation procedures and the corresponding Simulink model is presented, which is an essential block for realizing the memristive synapse and the activation function in electronic neurons. Furthermore, we investigate a more intelligent memristive PID controller by incorporating the proposed MFSNN into intelligent PID control based on the advantages of the memristive MFSNN on computation speed and accuracy. Finally, numerical simulations have demonstrated the effectiveness of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Ruliang, Jie Li, Shanshan Zhang, Dongmei Gao, and Huanlong Sun. "Robust Adaptive Control for a Class of Uncertain Nonlinear Systems with Time-Varying Delay." Scientific World Journal 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/963986.

Full text
Abstract:
We present adaptive neural control design for a class of perturbed nonlinear MIMO time-varying delay systems in a block-triangular form. Based on a neural controller, it is obtained by constructing a quadratic-type Lyapunov-Krasovskii functional, which efficiently avoids the controller singularity. The proposed control guarantees that all closed-loop signals remain bounded, while the output tracking error dynamics converge to a neighborhood of the desired trajectories. The simulation results demonstrate the effectiveness of the proposed control scheme.
APA, Harvard, Vancouver, ISO, and other styles
33

Adeyefa, Emmanuel Oluseye, Ezekiel Olaoluwa Omole, Ali Shokri, and Shao-Wen Yao. "Hermite Fitted Block Integrator for Solving Second-Order Anisotropic Elliptic Type PDEs." Fractal and Fractional 6, no. 9 (2022): 497. http://dx.doi.org/10.3390/fractalfract6090497.

Full text
Abstract:
A Hermite fitted block integrator (HFBI) for numerically solving second-order anisotropic elliptic partial differential equations (PDEs) was developed, analyzed, and implemented in this study. The method was derived through collocation and interpolation techniques using the Hermite polynomial as the basis function. The Hermite polynomial was interpolated at the first two successive points, while the collocation occurred at all the suitably chosen points. The major scheme and its complementary scheme were united together to form the HFBI. The analysis of the HFBI showed that it had a convergence order of eight with small error constants, was zero-stable, absolutely-stable, and satisfied the condition for convergence. In order to confirm the usefulness, accuracy, and efficiency of the HFBI, the method of lines approach was applied to discretize the second-order anisotropic elliptic partial differential equation PDE into a system of second-order ODEs and consequently used the derived HFBI to obtain the approximate solutions for the PDEs. The computed solution generated by using the HFBI was compared to the exact solutions of the problems and other existing methods in the literature. The proposed method compared favorably with other existing methods, which were validated through test problems whose solutions are presented in tabular form, and the comparisons are illustrated in the curves.
APA, Harvard, Vancouver, ISO, and other styles
34

Wilson, Daniel W., Andrew J. Abbo, Scott W. Sloan, and Andrei V. Lyamin. "Undrained stability of a circular tunnel where the shear strength increases linearly with depth." Canadian Geotechnical Journal 48, no. 9 (2011): 1328–42. http://dx.doi.org/10.1139/t11-041.

Full text
Abstract:
This paper investigates the undrained stability of a plane strain circular tunnel in clay, where the shear strength profile is assumed to increase linearly with depth. Stability solutions for a variety of geometries and soil conditions are found using rigid-block upper bound methods as well as finite element limit analysis (which gives both upper and lower bounds). The latter procedures employ a discrete form of the bound theorems of classical plasticity, use a bespoke conic programming scheme to solve the resulting optimization problems, and bracket the true collapse load to within 5% for all the cases considered. Results from the study are summarized in the form of stability charts as well as an approximate closed-form expression that can be used by practising engineers.
APA, Harvard, Vancouver, ISO, and other styles
35

Kim, Cheonshik, Ching-Nung Yang, and Lu Leng. "High-Capacity Data Hiding for ABTC-EQ Based Compressed Image." Electronics 9, no. 4 (2020): 644. http://dx.doi.org/10.3390/electronics9040644.

Full text
Abstract:
We present a new data hiding method based on Adaptive BTC Edge Quantization (ABTC-EQ) using an optimal pixel adjustment process (OPAP) to optimize two quantization levels. The reason we choose ABTC-EQ as a cover media is that it is superior to AMBTC in maintaining a high-quality image after encoding is executed. ABTC-EQ is represented by a form of t r i o ( Q 1 , Q 2 , [ Q 3 ] , BM) where Q is quantization levels ( Q 1 ≤ Q 2 ≤ Q 3 ) , and BM is a bitmap). The number of quantization levels are two or three, depending on whether the cover image has an edge or not. Before embedding secret bits in every block, we categorize every block into smooth block or complex block by a threshold. In case a block size is 4x4, the sixteen secret bits are replaced by a bitmap of the smooth block for embedding a message directly. On the other hand, OPAP method conceals 1 bit into LSB and 2LSB respectively, and maintains the quality of an image as a way of minimizing the errors which occur in the embedding procedure. The sufficient experimental results demonsrate that the performance of our proposed scheme is satisfactory in terms of the embedding capacity and quality of an image.
APA, Harvard, Vancouver, ISO, and other styles
36

Bhaskar Prince. "An Unequal Radial Division-based Clustering to minimize Energy Hole for Larger Wireless Sensor Networks." Journal of Information Systems Engineering and Management 10, no. 2s (2025): 01–13. https://doi.org/10.52783/jisem.v10i2s.196.

Full text
Abstract:
Energy conservation in Wireless Sensor Networks (WSN) is a key research area because sensors are energy-constrained devices. Sensor energy saving in the large and harsh geographical environment is a major challenge in WSN. This paper presents novel strategies for enhancing energy efficiency in routing and data collection, employing clustering techniques and mobile sinks to address this challenge. The sensing area is considered a circular shape and divided into blocks. The blocks are formed by dividing the circular area into concentric circles and dividing sector lines to form unequal blocks. Based on the block node centroid, the block head is selected. The block and block head are similar to the cluster and cluster head respectively. Two mobile base stations (MBS) are used to collect block head data. Two MBS move with a predefined path with constant speed and halt at sojourn points to collect data from the blockheads. After collecting data, it transfers data to the gateway nodes or base station. In simulation results, the mobile node-based scenario outperforms the centralized base station and static block heads communication. The proposed work is also compared with existing works and this scheme shows a 21% improvement in network life and end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
37

Yang, Ching-Yu. "Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm." Advances in Multimedia 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/473896.

Full text
Abstract:
This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS) algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR) performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.
APA, Harvard, Vancouver, ISO, and other styles
38

Minh Nam, Pham, Ha Duy Hung, Lam-Thanh Tu, Pham Viet Tuan, Tran Trung Duy, and Tan Hanh. "Outage Performance of Interference Cancellation-Aided Two-Way Relaying Cognitive Network with Primary TAS/SC Communication and Secondary Partial Relay Selection." Electronics 11, no. 22 (2022): 3645. http://dx.doi.org/10.3390/electronics11223645.

Full text
Abstract:
In this paper, we propose a two-way relaying scheme using digital network coding in an underlay cognitive radio network. In the proposed scheme, the transmit antenna selection and selection techniques are combined using a primary transmitter and a primary receiver, respectively. In the secondary network, two source nodes that cannot directly communicate attempt to exchange their data with each other. As a result, the relaying technique using partial relay selection is applied to assist the data exchange. Particularly, at the first time slot, the selected secondary relay applies an interference cancellation technique to decode the data received from the secondary sources. Then, the selected relay uses digital network coding to send XOR-ed data to the sources at the second time slot. We first derive the outage probability of the primary network over block the Rayleigh fading channel. Then, the transmit power of the secondary transmitters including the source and relay nodes are calculated to guarantee the quality of service of the primary network. Finally, the exact closed-form formulas of the outage probability of the secondary sources over the block Rayleigh fading channel are derived, and then verified by computer simulations using the Monte Carlo method.
APA, Harvard, Vancouver, ISO, and other styles
39

Kaltchenko, A., and E.-H. Yang. "Universal compression of ergodic quantum sources." Quantum Information and Computation 3, no. 4 (2003): 359–75. http://dx.doi.org/10.26421/qic3.4-5.

Full text
Abstract:
For a real number r&gt;0, let F(r) be the family of all stationary ergodic quantum sources with von Neumann entropy rates less than r. We prove that, for any r&gt;0, there exists a blind, source-independent block compression scheme which compresses every source from F(r) to rn qubits per input block length~n with arbitrarily high fidelity for all large n.}As our second result, we show that the stationarity and the ergodicity of a quantum source \rho_m_{m=1}^{\infty} are preserved by any trace-preserving completely positive linear map of the tensor product form {\cal E}^{\otimes m}, where a copy of {\cal E} acts locally on each spin lattice site. We also establish ergodicity criteria for so called classically-correlated quantum sources.
APA, Harvard, Vancouver, ISO, and other styles
40

Khalaf, Walaa, Ahmad Saeed Mohammad, and Dhafer Zaghar. "Chimera: A New Efficient Transform for High Quality Lossy Image Compression." Symmetry 12, no. 3 (2020): 378. http://dx.doi.org/10.3390/sym12030378.

Full text
Abstract:
A novel scheme is presented for image compression using a compatible form called Chimera. This form represents a new transformation for the image pixels. The compression methods generally look for image division to obtain small parts of an image called blocks. These blocks contain limited predicted patterns such as flat area, simple slope, and single edge inside images. The block content of these images represent a special form of data which be reformed using simple masks to obtain a compressed representation. The compression representation is different according to the type of transform function which represents the preprocessing operation prior the coding step. The cost of any image transformation is represented by two main parameters which are the size of compressed block and the error in reconstructed block. Our proposed Chimera Transform (CT) shows a robustness against other transform such as Discrete Cosine Transform (DCT), Wavelet Transform (WT) and Karhunen-Loeve Transform (KLT). The suggested approach is designed to compress a specific data type which are the images, and this represents the first powerful characteristic of this transform. Additionally, the reconstructed image using Chimera transform has a small size with low error which could be considered as the second characteristic of the suggested approach. Our results show a Peak Signal to Noise Ratio (PSNR) enhancement of 2.0272 for DCT, 1.179 for WT and 4.301 for KLT. In addition, a Structural Similarity Index Measure (SSIM) enhancement of 0.1108 for DCT, 0.051 for WT and 0.175 for KLT.
APA, Harvard, Vancouver, ISO, and other styles
41

Wei, Jinxia, Xinxin Niu, Ru Zhang, Jianyi Liu, and Yuangang Yao. "Efficient data possession–checking protocol with deduplication in cloud." International Journal of Distributed Sensor Networks 13, no. 8 (2017): 155014771772746. http://dx.doi.org/10.1177/1550147717727461.

Full text
Abstract:
Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. The signatures of all data blocks are generated and sent to the cloud server. Once receiving the data blocks and signatures, the cloud server compares the received signatures with the stored signatures. If there is a signature that has the same value as some stored signature, the received signature and data block will not be stored by the cloud server. Otherwise, the cloud server stores all received signatures and data blocks. In fact, these operations bring a lot of computational costs. To solve this problem, we propose a data integrity verification scheme with deduplication. In this scheme, the deduplication is performed by the cloud users, which can avoid additional communicational and computational costs. The experiment evaluation indicates that our scheme is practical for real application scenario. We demonstrate that the proposed scheme satisfies signature unforgeability, and the malicious users cannot obtain any legitimate file from the cloud server in the form of deception.
APA, Harvard, Vancouver, ISO, and other styles
42

Woo, Jong Hun, Young Joo Song, Yong Woo Kang, and Jong Gye Shin. "Development of the Decision-Making System for the Ship Block Logistics Based on the Simulation." Journal of Ship Production and Design 26, no. 04 (2010): 290–300. http://dx.doi.org/10.5957/jspd.2010.26.4.290.

Full text
Abstract:
Nowadays, the simulation technology aiming at preverifying extensively continues to develop in the manufacturing industry. Though it is possible to apply simulation methodology to various fields in various methods, in particular, the computer simulation of the production system in the manufacturing industry is applied most extensively. Lots of shipyards have made continual studies of the improvement plans on logistics operation of shipyards to cover the ship product constructed anew that consists of various ship types increasing day by day in the fixed area of the yard in recent years. The block to form a ship, a transporter to transfer the block, and the jig that is the support of the block are related physically, and the planning and scheduling and the operating scheme of the distribution are related informatively in the logistics of the shipyard. We introduce cases to build the decision-making system with which one can perform the logistics verification on the planning and scheduling and the assessment of the quantitative effect of the changes of the shipyard layout.
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Zhongjie, Chuanfu Xin, Yan Peng, et al. "Power Density Improvement of Piezoelectric Energy Harvesters via a Novel Hybridization Scheme with Electromagnetic Transduction." Micromachines 12, no. 7 (2021): 803. http://dx.doi.org/10.3390/mi12070803.

Full text
Abstract:
A novel hybridization scheme is proposed with electromagnetic transduction to improve the power density of piezoelectric energy harvester (PEH) in this paper. Based on the basic cantilever piezoelectric energy harvester (BC-PEH) composed of a mass block, a piezoelectric patch, and a cantilever beam, we replaced the mass block by a magnet array and added a coil array to form the hybrid energy harvester. To enhance the output power of the electromagnetic energy harvester (EMEH), we utilized an alternating magnet array. Then, to compare the power density of the hybrid harvester and BC-PEH, the experiments of output power were conducted. According to the experimental results, the power densities of the hybrid harvester and BC-PEH are, respectively, 3.53 mW/cm3 and 5.14 μW/cm3 under the conditions of 18.6 Hz and 0.3 g. Therefore, the power density of the hybrid harvester is 686 times as high as that of the BC-PEH, which verified the power density improvement of PEH via a hybridization scheme with EMEH. Additionally, the hybrid harvester exhibits better performance for charging capacitors, such as charging a 2.2 mF capacitor to 8 V within 17 s. It is of great significance to further develop self-powered devices.
APA, Harvard, Vancouver, ISO, and other styles
44

Symonenko, N. А., O. S. Shpychak, and Ye A. Bezrukavyi. "Development of industrial technology of tablets with cardioprotective action based on cultivated parsnip herb thick extract." Current issues in pharmacy and medicine: science and practice 16, no. 1 (2023): 33–39. http://dx.doi.org/10.14739/2409-2932.2023.1.264981.

Full text
Abstract:
The aim of the work is to develop the industrial technology of tablets with cardioprotective action based on the domestic raw material of cultivated parsnip herb thick extract (CPHTE). Materials and methods. Experimental samples of mixtures of the plant substance CPHTE (Pastinacae sativae herbae extracti spissi) with excipients approved for medical application were used as objects of the study. Results. The results of experimental studies were used during the development of a block diagram of the technological process to produce tablets with cardioprotective action based on the plant raw material CPHTE and an apparatus scheme was tested in the industrial conditions of LLC “Pharmaceutical Company “Zdorovye” (Kharkiv); the control technological parameters for each stage of the technological process of medicine preparation were established. Conclusions. The technology to produce cardioprotective tablets based on the domestic raw material CPHTE was theoretically substantiated and experimentally developed, as well as a block diagram of the technological process of their production and an apparatus scheme tested in industrial conditions by the LLC “Pharmaceutical Company “Zdorovye” (Kharkiv). The results of the experiment were used while development of projects of quality control methods and technological regulations for the developed medicine in the form of tablets under the conventional name “Pastinocard”.
APA, Harvard, Vancouver, ISO, and other styles
45

Wilson, Daniel W., Andrew J. Abbo, Scott W. Sloan, and Kentaro Yamamoto. "Undrained stability of rectangular tunnels where shear strength increases linearly with depth." Canadian Geotechnical Journal 54, no. 4 (2017): 469–80. http://dx.doi.org/10.1139/cgj-2016-0072.

Full text
Abstract:
This paper investigates the stability of a plane strain rectangular tunnel under undrained conditions, where the shear strength profile increases linearly with depth. The undrained stability of tunnels for a range of geometries and soil conditions is found using rigid-block upper bound methods as well as finite element limit analysis (FELA). The latter procedures employ a discrete form of the bound theorems of classical plasticity to formulate an optimization problem that is solved using a bespoke conic programming scheme. Rigorous solutions, obtained using adaptive re-meshing of the finite element mesh, generally bracket the true collapse load with upper and lower bound solutions to within 2%. Results from the parametric study are summarized in the form of stability charts.
APA, Harvard, Vancouver, ISO, and other styles
46

Shah, Abdullah, Sadia Saeed, and L. Yuan. "An Artificial Compressibility Method for 3D Phase-Field Model and its Application to Two-Phase Flows." International Journal of Computational Methods 14, no. 05 (2017): 1750059. http://dx.doi.org/10.1142/s0219876217500591.

Full text
Abstract:
In this work, a numerical scheme based on artificial compressibility formulation of a phase-field model is developed for simulating two-phase incompressible flow problems. The coupled nonlinear systems composed of the incompressible Navier–Stokes equations and volume preserving Allen–Cahn-type phase-field equation are recast into conservative form with source terms, which are suited to implement high-resolution schemes originally developed for hyperbolic conservation laws. The Boussinesq approximation is used to account for the buoyancy effect in flow with small density difference. The fifth-order weighted essentially nonoscillatory (WENO) scheme is used for discretizing the convective terms while dual-time stepping (DTS) technique is used for obtaining time accuracy at each physical time step. Beam–Warming approximate factorization scheme is utilized to obtain block tridiagonal system of equations in each spatial direction. The alternating direction implicit (ADI) algorithm is used to solve the resulting system of equations. The performance of the method is demonstrated by its application to some 2D and 3D benchmark viscous two-phase flow problems.
APA, Harvard, Vancouver, ISO, and other styles
47

Ge, Songhu, Jibo Wei, Shengchun Huang, Yong Xi, and Yue Ma. "Approximate closed-form power allocation scheme for multiple-input–multiple-output hybrid automatic repeat request protocols over Rayleigh block fading channels." IET Communications 9, no. 16 (2015): 2023–32. http://dx.doi.org/10.1049/iet-com.2014.1263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ibrahimov, F., G. Abdurahmanova, and G. Garayeva. "INTERPRETATION OF THE CHARACTERISTICS OF THE ELEMENTS OF THE "ASSESSMENT OF STUDENT ACHIEVEMENTS" BLOCK OF THE INFORMATICS SUBJECT CURRICULUM APPLIED IN GENERAL EDUCATION SCHOOLS OF AZERBAIJAN BASED ON THE "SYSTEMSTRUCTURE" APPROACH." Scientific heritage, no. 106 (February 5, 2023): 20–31. https://doi.org/10.5281/zenodo.7607409.

Full text
Abstract:
In the article, it is emphasized that the curriculum reform is conditioned by the need to ensure the adequacy of the implementation of education in Azerbaijan to the challenges of the 21st century, to train a creative, selfdeveloping personality. Also, in the research work, the importance of the educator&#39;s reference to the &ldquo;systemstructure&rdquo; approach both in familiarizing himself with the essence of the &ldquo;General education program&rdquo; and in his practical activities related to its implementation is drawn into the center of attention. The article presents adequate generalizations of the evidence collected on the basis of the &ldquo;system-structure&rdquo; dialectical approach, which aims to reveal the nature of the subsystems included in the &ldquo;Evaluation of Student Achievements&rdquo; block of the &ldquo;block-scheme&rdquo; form of the structure of the Informatics curriculum in Azerbaijan secondary schools.
APA, Harvard, Vancouver, ISO, and other styles
49

Ibrahimov, F., and G. Abdullayeva. "INTERPRETATİON OF THE CHARACTERİSTİCS OF THE ELEMENTS OF THE "ASSESSMENT OF STUDENT ACHİEVEMENTS" BLOCK OF SUBJECT CURRİCULA BASED ON THE "SYSTEMSTRUCTURE" APPROACH." Scientific heritage, no. 110 (April 6, 2023): 62–73. https://doi.org/10.5281/zenodo.7804553.

Full text
Abstract:
In the article, it is emphasized that the curriculum reform is conditioned by the need to ensure the adequacy of the implementation of education in Azerbaijan to the challenges of the 21st century, to train a creative, selfdeveloping personality. Also, in the research work, the importance of the educator&#39;s reference to the &quot;systemstructure&quot; approach both in familiarizing himself with the essence of the &quot;General education program&quot; and in his practical activities related to its implementation is drawn into the center of attention. The article presents adequate generalizations of the evidence collected on the basis of the &quot;system-structure&quot; dialectical approach, which aims to reveal the nature of the sub-systems included in the &quot;Assessment of Student Achievements&quot; block of the &quot;block-scheme&quot; form of the structure of subject curricula in general education schools of Azerbaijan.
APA, Harvard, Vancouver, ISO, and other styles
50

Wong, Wendy C., Qinghua Li, and Shilpa Talwar. "A Transmit Beamforming and Nulling Approach with Distributed Scheduling to Improve Cell Edge Throughput." International Journal of Digital Multimedia Broadcasting 2010 (2010): 1–9. http://dx.doi.org/10.1155/2010/956847.

Full text
Abstract:
We propose a transmit scheme for WiMAX systems, where multiple base stations (BSs) employ downlink transmit beamforming and nulling for interference mitigation, with minimal coordination amongst BSs. This scheme improves system throughput and robustness, by increasing cell edge and overall cell throughputs by 68% and 19%, respectively, and by delivering improvement for mobile speed up to 60 km/h. First, cell edge users suffering from severe interferences are identified. Next, the RRM unit allocates resource to serving cell edge users only. BSs will schedule to serve their cell edge users independently using the allocated resources by the RRM. A special uplink sounding region is designed for BSs to learn the interference environment and form proper beams and nulls. The nulls formed towards users served by other BSs reduced interference from a BS towards these users and is the basic building block of our algorithm.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!