Showing 8,241 - 8,260 results of 9,373 for search 'ensuring complex', query time: 0.15s Refine Results
  1. 8241

    Research on Simplified 3D-SVPWM Method for Three-level Inverter by XUE Shuo, SHEN Shuli, WU Di

    Published 2017-01-01
    “…By establishing the simulation model with Matlab/Simulink, it proved that the validity of the new simplified strategy which could really optimize the calculation process and reduce the complexity of the algorithm on condition that it ensured the output performance.…”
    Get full text
    Article
  2. 8242

    New insights on potency assays from recent advances and discoveries in CAR T-cell therapy by Lipei Shao, Yanyan Zheng, Robert P. Somerville, David F. Stroncek, Ping Jin

    Published 2025-05-01
    “…Furthermore, as manufacturing strategies continue to evolve, conventional potency assays may no longer fully capture the complexity of these products. Therefore, it is essential to examine these emerging characteristics and manufacturing approaches and consider the development of tailored potency assays to ensure products are fully characterized.…”
    Get full text
    Article
  3. 8243

    Design of SoC/SIP simulation acceleration based on distributed computing by Wang Feng, Zhang Lirong, Wang Lei

    Published 2024-01-01
    “…With the continuous growth of IC design scale and complexity, traditional EDA verification is more and more restricted especially for sub-system and SoC full chip level simulation efficiency. …”
    Get full text
    Article
  4. 8244

    A comprehensive functional classification of cleft hand: The DAST concept by Alok Sharma, Namita Sharma

    Published 2017-09-01
    “…Numerical values were assigned to each component in increasing order of complexity. Score for each determinant as well as the aggregate score indicates the degree of complexity in a graphic manner. …”
    Get full text
    Article
  5. 8245

    String processing model for knowledge-driven systems by V. P. Ivashenko

    Published 2020-10-01
    “…As a result of the experiments, theoretical estimates of the computational complexity of the implemented operations and the validity of the choice of parameters of the used data structures were confirmed, which ensures near-optimal throughput and operation time indicators of operations. …”
    Get full text
    Article
  6. 8246

    Objective Feedback Recommendation in Multicriteria Large-Group Emergency Decision-Making by D. D. Orshella, N. A. Masruroh, H. M. Arini

    Published 2025-01-01
    “…In emergencies, a comprehensive solution must be determined using large-group emergency decision making (LGEDM), which relies on the perspectives of experts from various fields. The inherent complexity and uncertainty of these situations necessitate the adoption of multicriteria decision-making approaches. …”
    Get full text
    Article
  7. 8247

    Cardiovascular Nursing Workforce Challenges: Transforming the Model of Care for the Future by Gail M. Vozzella, Michelle C. Hehman

    Published 2023-03-01
    “…The complexities of acute and critical care cardiovascular management demand specialty trained and experienced nurses to ensure quality patient outcomes. …”
    Get full text
    Article
  8. 8248

    PROJECT EDUCATION IS THE KEY TO THE TRAINING OF A SUCCESSFUL SPECIALIST by S. Sycheva, R. Arzumanova

    Published 2019-06-01
    “…Advantages and disadvantages of the project-education, as well as the complexity of the transition from traditional learning, have been considered. …”
    Get full text
    Article
  9. 8249

    Lightweight authentication method for network interconnection control protocols by Bo LU, Yun LIU, Jie ZHANG, Yueming LU

    Published 2018-11-01
    “…As network interconnection controls are required for the space-earth integrated network and the limited resources are not suitable for high computing complexity degree authentication methods,a lightweight authentication method for network interconnection control protocols is proposed.Through the calculation of limited resources,using the idea of random fill,It design and implement public key encryption and signature algorithm which is components of the networks interconnection control authentication protocol.Formal analysis tool Scyther is used to analyze the security of the protocol.Comparing with other secure communication protocols,the method can meet the requirements of resource-constrained networks and ensure the safety.…”
    Get full text
    Article
  10. 8250

    Image forgery detection algorithm based on U-shaped detection network by Zhuzhu WANG

    Published 2019-04-01
    “…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
    Get full text
    Article
  11. 8251

    Improved Air Mesh Refinement for Accurate Strand-Solid and Self-Collision Handling by Jong-Hyun Kim

    Published 2025-01-01
    “…Traditional collision handling at the primitive level requires extensive computations, such as time-stepping and solving cubic equations, to ensure simulation stability. Moreover, depending on scene complexity, both discrete collision detection (DCD) and continuous collision detection (CCD) often need to be considered. …”
    Get full text
    Article
  12. 8252

    Pedagogical Culture of Teachers at Technical Universities for Safe Educational Process During the War in Ukraine. by Natalia Tverdokhliebova, Nataliіa Yevtushenko

    Published 2023-04-01
    “…Teaching in the context of the war in Ukraine involves the use of various forms of education with the introduction of digital technologies and tools to ensure the safety of all participants in the educational process and flexibility in time and space. …”
    Get full text
    Article
  13. 8253

    Les fermiers d’impôts de Naxos by Niki Papaïliaki

    Published 2015-03-01
    “…Based on the analysis of documents discovered in the French archives, this study focuses on the speculative activities of the community of Kastro on the public revenues of Naxos, during the late 18th and the early 19th century. To ensure the necessary funds to farming taxes, the authorities of Kastro rely more and more on the ottoman capitals of Constantinople, and that exposes them to the complexity of the Ottoman administration. …”
    Get full text
    Article
  14. 8254

    IMPLEMENTATION OF WALANT ANESTHESIA FOR HAND AND WRIST SURGERIES IN A TERTIARY HOSPITAL: PILOT STUDY by Lucas Moratelli, Maria Teresa Cursino Moratelli, Marcos Felipe Marcatto de Abreu, João Carlos Nakamoto, Rodrigo Gonçalves Pagnano

    Published 2025-08-01
    “…Conclusion: The WALANT technique showed sufficient anesthetic and vasoconstrictor efficacy for most low-complexity hand and wrist surgeries and ensured patient comfort even without sedation. …”
    Get full text
    Article
  15. 8255

    Synchronization method for long-term evolution-based machine-type communication in low-power cellular Internet of Things by Rothna Pec, Joo-Hyung Choi, Chang-Hwan Park, Yong Soo Cho

    Published 2016-08-01
    “…In this article, a complete synchronization and cell search procedure is described for machine-type communication devices in long-term evolution systems. Low-complexity algorithms for primary synchronization signal and secondary synchronization signal detection, which requires the highest computational complexity in synchronization and cell search period, are also proposed for low-power machine-type communication devices. …”
    Get full text
    Article
  16. 8256

    PAPR Reduction in DCO-OFDM Visible Light Communication Systems Using Optimized Odd and Even Sequences Combination by Wei-Wen Hu

    Published 2019-01-01
    “…This paper proposes a novel peak-to-average power ratio (PAPR) reduction scheme, which has several advantages, such as low-complexity candidate construction and no side information (SI) transmission in direct current-biased optical orthogonal frequency division multiplexing (DCO-OFDM) visible light communication (VLC) systems. …”
    Get full text
    Article
  17. 8257

    Bilateral Kohler’s Disease in a 5-Year-Old Girl: A Case Report by Furkan Soy, Ibrahim Deniz Canbeyli, Meric Cirpar, Yasin Kozan, Sancar Serbest

    Published 2025-06-01
    “…In 1908, Köhler highlighted these complexities by describing concurrent osteochondrosis of the tarsal navicular. …”
    Get full text
    Article
  18. 8258

    A Two-Stage Estimator for Change Point in the Mean of Panel Data by Wenzhi Zhao, Yinqian Yang, Di Zhang

    Published 2021-01-01
    “…Simulation results show that our method can not only ensure the estimation accuracy but also greatly reduce time complexity.…”
    Get full text
    Article
  19. 8259

    Generation of decryption key for the RSA cryptosystem using the minimum redundant modular number system by Andrey Alekseevich Kolyada, Alexander Fedorovich Chernyavsky

    Published 2022-09-01
    “…The realized approach allows to minimize the volume of the carried-out calculations. This is ensured thanks to achieved within the minimum excess modular coding to reduce the extremely low level of complexity of accounting ratios used for the integral characteristics of the code - interval-index characteristics.…”
    Get full text
    Article
  20. 8260

    CP-ABE based data access control for cloud storage by SUN Guo-zi1, DONG Yu1, LI Yun1

    Published 2011-01-01
    “…To solve the safety issues in cloud storage services for network characteristics and data sharing characteristics,and based on the CP-ABE(cipertext policy-attribute based encryption) algorithm,a cipher text access control mechanism was proposed.According to access control and related architecture,the corresponding secure data structure algorithms were given.After this,the simulations and the performance analysis were given to evaluate our algorithm.Under the premise of untrusted service provider,the proposed mechanism can ensure the data security of the cloud storage system in an open environment,and can reduce right management complexity through property management.…”
    Get full text
    Article