Search alternatives:
vector » sector (Expand Search)
Showing 341 - 360 results of 4,440 for search 'vector (processes OR process)', query time: 0.18s Refine Results
  1. 341
  2. 342
  3. 343
  4. 344
  5. 345
  6. 346

    Impact of a typical scanner delay processing parameter on local microstructure in metallic laser-based powder bed fusion by Brenda Leticia Valadez Mesta, Pascal Thome, Marcus C. Lam, Sammy Tin, Jorge Mireles, Ryan B. Wicker

    Published 2025-04-01
    “…Future PBF-LB/M studies should focus more on understanding time-resolved laser beam processing effects to better reduce inconsistencies and improve part quality.…”
    Get full text
    Article
  7. 347
  8. 348

    Seepage area of the cold seep exhibits strong homogeneous selection on prokaryotic community assembly and supports high depth variability of both archaeal and bacterial communities by Xueling Xiong, Furun Li, Haokun Yang, Chunshan Li, Haiming Chen, Dan He, Qinglong L. Wu, Sijun Huang, Lijuan Ren

    Published 2025-07-01
    “…In this study, we comprehensively investigated the microbial depth variability and its underlying assembly process in the seepage and non-seepage areas of Haima Cold Seep. …”
    Get full text
    Article
  9. 349

    A Robust Sidelobe Cancellation Algorithm Based on Beamforming Vector Norm Constraint by Qing Wang, Huanding Qin, Kai Yang, Hao Wu, Fangmin He, Jin Meng

    Published 2024-01-01
    “…However, traditional SLC suffers from the issue of partially canceling the desired signal at high signal-to-noise ratio (SNR), primarily due to unconstrained beamforming processing. Extensive research has been conducted to address this problem; however, existing algorithms have limitations such as dependence on knowledge of signal array vectors or number of interferers and involve high computational complexity. …”
    Get full text
    Article
  10. 350

    TreeVector: scalable, interactive, phylogenetic trees for the web. by Ralph Pethica, Gary Barker, Tim Kovacs, Julian Gough

    Published 2010-01-01
    “…TreeVector is designed as a framework to integrate with these processes and produce user-customized phylogenies automatically. …”
    Get full text
    Article
  11. 351
  12. 352

    Unsupervised Deep Clustering on Spatiotemporal Objects Extracted from 4D Point Clouds for Automatic Identification of Topographic Processes in Natural Environments by J. Wang, K. Anders

    Published 2025-07-01
    “…Topographic processes, such as sediment erosion, accumulation, and transport are crucial for understanding the evolution of natural landscapes. …”
    Get full text
    Article
  13. 353
  14. 354

    Secure distributed signcryption scheme based on vector space by LIU Jia, ZHUANG Yi, WANG Jian-dong

    Published 2009-01-01
    “…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
    Get full text
    Article
  15. 355

    Secure distributed signcryption scheme based on vector space by LIU Jia, ZHUANG Yi, WANG Jian-dong

    Published 2009-01-01
    “…A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ends of both threshold signature and threshold encryption simultaneously, however, its cost was equal to threshold signature only.Furthermore, based on the discrete logarithm, properties were verified and structured, the legitimacy of the participators could be confirmed during the processes of the keys generation, distributed signcryption and distributed unsigncryption, which prevented the participators cheating.…”
    Get full text
    Article
  16. 356
  17. 357

    Modeling and Verification of A Novel Vector Hysteron Model by Kai DENG, Yongjian LI, Hao CHENG, Xuehai GONG, Fuyao YANG

    Published 2020-10-01
    “…In order to simulate the effect of anisotropy on the magnetization process more effectively, this paper changes the method of using the equipotential surface to simulate the magnetization process in the VHM model, and discusses a new scheme. …”
    Get full text
    Article
  18. 358

    Accelerating Streaming Subgraph Matching via Vector Databases by Liuyi Chen, Yi Ding, Xushuo Tang, Fangyue Chen, Siyuan Gong, Xu Zhou, Zhengyi Yang

    Published 2025-01-01
    “…Building on this foundation, we perform k-nearest neighbor search on high-dimensional vectors by using a vector database for indexing. Inverted file and product quantization techniques within the vector database were employed to accelerate the process. …”
    Get full text
    Article
  19. 359

    Adaptive Matched Filter Based on Power Vector Method by A. V. Yastrebov

    Published 2017-02-01
    “…An adaptive transversal filter capable of suppressing broadband jams and receiving broadband signal simultaneously is considered. Signal processing algorithm using power vector basis is proposed. …”
    Get full text
    Article
  20. 360

    Privacy Preserving Inner Product of Vectors in Cloud Computing by Gang Sheng, Tao Wen, Quan Guo, Ying Yin

    Published 2014-05-01
    “…In this paper, we consider the scenario where three parties are involved in the computing process of cloud computing. We propose a new privacy preserving scheme for inner product of two vectors in the cloud and give the correctness analysis and performance analysis for the scheme. …”
    Get full text
    Article