ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Economy
Social Sciences
Technology
Research
Literature
Environment
Administration - Business
Mathematics
Architecture and Urbanism
all records (74)

Languages
English
Portuguese
Spanish
German
Finnish

Countries
Indonesia
Brazil
USA
Italy
South Africa
Ukraine
Spain
Chile
Canada
Switzerland
all records (71)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
126.508  Articles
1 of 12.652 pages  |  10  records  |  more records»
A set S of vertices in a graph G is called a dominating set of G if every vertex in V (G)\S is adjacent to some vertex in S. A set S is said to be a power dominating set of G if every vertex in the system is monitored by the set S following a set of rules... see more

Connections between vital linkages and zero forcing are established. Specifically, the notion of a rigid linkage is introduced as a special kind of unique linkage and it is shown that spanning forcing paths of a zero forcing process form a spanning rigid ... see more

ABSTRAKKebutuhan layanan data pada teknologi 5G sangatlah tinggi. FBMC sebagai solusi dari kelemahan yang ada di OFDM menjadi teknologi yang digunakan pada komunikasi 5G. Pada OFDM, penggunaan ekualisasi sudah sangat banyak dilakukan penelitiannya dan men... see more

ABSTRAKKebutuhan layanan data pada teknologi 5G sangatlah tinggi. FBMC sebagai solusi dari kelemahan yang ada di OFDM menjadi teknologi yang digunakan pada komunikasi 5G. Pada OFDM, penggunaan ekualisasi sudah sangat banyak dilakukan penelitiannya dan men... see more

Settings and participants: analogous semantic extensions in conceptually remote domainsThis article concerns a phenomenon, claimed to be semantic in nature, which can be observed in expressions from conceptually distant categories. The phenomenon in quest... see more

Settings and participants: analogous semantic extensions in conceptually remote domainsThis article concerns a phenomenon, claimed to be semantic in nature, which can be observed in expressions from conceptually distant categories. The phenomenon in quest... see more

Implementation of authentication tools is the requirement for secured information system in open networks. Known authentication protocols are based on some secret knowledge (key or password) checking. Preferable scheme for checking procedure is client-ser... see more

Yellowfin (Thunnus albacares) and bigeye (T. obesus) tuna have been intensively exploited by longline fleets since 1980’s, however, a large proportion of zero catch per set of target species still accurred. Zero catch data contributed significantly to the... see more

In this paper, a sparse set-membership proportionate normalized least mean square (SM-PNLMS) algorithm integrated with a correntropy induced metric (CIM) penalty is proposed for acoustic channel estimation and echo cancellation. The CIM is used for constr... see more

1 of 12.652 pages  |  10  records  |  more records»