|
Go
Mar 14, 2023Open Access
Energy resolution is an important index to measure the performance of nuclear instruments, and the noise, ballistic defect and accumulation of nuclear pulse signal are important factors affecting energy resolution. In the digital nuclear spectrum measurement system, the digital shaping algorithm is usually used to process the nuclear pulse signal to improve the energy resolution of the measurement system. In this paper, the algorithm is simulated by the theoretical formula of spike pulse forming...
May 16, 2022Open Access
The study is aimed at investigating the effect of Information and Communication Technology (ICT) use on library service delivery in two universities namely, University of Ghana library (Ghana) and Jiangsu university library (China). The paper adopted quantitative method and used a structured questionnaire to gather the research data. A sample size of 62 staff from Jiangsu University Library and 80 staff from the University of Ghana Library were selected. In all, a sample size of 142 respondents ...
Dec 30, 2021Open Access
The sustainability of a company depends on the permanent availability of its information system. This reality influences the behavior of companies, which are becoming increasingly mature in their investments in information system security, which is an absolutely vital element. The use of a service called “SYSLOG” to centralize the network event logs that are sent by printers, servers, routers, firewalls, IDS and IPS in an SYSLOG server is a perfect example for network optimization. In this work,...
Jun 30, 2020Open Access
In this paper, two algorithms first, considered to be one of hybrid algorithms. And it is algorithm represents an Invasive Weed Optimization (IWO). This algorithm is a random numerical algorithm and the second algorithm repre- senting the Bat Optimization Algorithm (BA). This algorithm is one of the swarm intelligence algorithms in smart optimization. The Invasive Weed Optimization Algorithm is inspired by nature, as the weeds have colonial behavior and were introduced in 2006 by Mehrabian and L...
Apr 12, 2018Open Access
Based on the form of questionnaire, this paper
explores the use of foreign academic e-books by teachers and students in a
certain school from a subjective view. 367 Users’ behavior, habits and
needs were analyzed. Based on the results of the analysis, four suggestions are
put forward to improve the overall utilization: Promote the localization of
interface, pay attention to users’ advice while ...
Aug 07, 2017Open Access
Recently, it was proposed by Cai a new semantic/ syntactic/ episodic model of language encompassing the sentential meanings, while deriving three corresponding principles from it for machine translation, respectively as first to establish the dictionary of words/phrases, second to translate the grammar, and third to determine the meanings of some words/phrases of multiple meanings by statistic ...
Jun 29, 2017Open Access
New transmission scheme
based on space-time code is proposed for massive MIMO system, which consists of K users and a base station. Each user
is equipped with four antennas and two of them are selected to send space-time
codeword with Alamouti coded by using the method of generalized spatial
modulation. The base station estimates the index of transmit antennas u ...
May 04, 2017Open Access
In this paper, we investigate how to cancel multi-user
interference without feedback amount over multiple-input multiple-output (MIMO) interference
channel using space-time code. Three transmitter-receiver pairs are considered and
each node is equipped with four antennas. Space-time codeword with dimension 4 × 4 is designed for three transmitters, respectively. The number of interfering
codeword is reduced through the de ...
Oct 09, 2015Open Access
Concurrency control is the problem that database management system (DBMS)
meets with difficulties, especially distributed DBMS. There are two main
methods of concurrency control such as locking-based
and timestamp-based. Each method gets involved in its own disadvantages, but locking-based approach is often realized in most
distributed DBMS because its feasibility and strictness lessen danger in distributed environment.
Otherwise, timestamp ordering algorithm is merely implemented in central
DBM...
Oct 09, 2014Open Access
Particle swarm optimization (PSO) is an evolutionary computation
technique; it has shown its effectiveness as an efficient, fast and simple
method of optimization. In this paper, the mathematical model represents
NP-hard in the strong sense; since any instance of the quadratic assignment
problem (QAP), I will implement the particle swarm optimization (PSO) for the
quadratic assignment problem (QAP). The results show that the PSO is an appropriate
optimization tool for use in determining the trai...
Go
|
|
|