Other
Given the non-cooperative relationship between the transmitter and the jammer, two main challenges are addressed in this paper: how to model their interactions and how to devise a jamming strategy without prior knowledge of the transmitter. A non-zero-sum game is used to model and analyze such non-cooperative interactions. An approximate mixed-strategy Nash equilibrium (NE) under complete information is derived to serve as a benchmark for comparison.
- Categories:
The REST (REpresentational State Transfer) paradigm has become essential for designing distributed applications that leverage the HTTP protocol, enabling efficient data exchange and the development of scalable architectures such as microservices. However, selecting an appropriate framework among the myriad available options, especially given the diversity of emerging execution environments, presents a significant challenge. Often, this decision neglects crucial factors such as performance and energy efficiency, favoring instead developer familiarity and popularity within the industry.
- Categories:
This study proposes a stabilization approach when applying $N$th-order compensation for the average consensus of a multi-agent system affected by non-uniform, asymmetric, and time-varying delays in a communication network.
A continuous-time linear dynamical system with a local discrete-time controller modeled for each agent.
In our previous study, we proposed a packet selection algorithm that always selects the most recent packet and a synchronization algorithm that compensates for asymmetric delays to achieve an average consensus considering first-order compensation.
- Categories:
Most existing graph keyword search works assume that the graph data is complete and clean, that is, there are no missing information (such as keywords or edges) and contaminated information (such as keywords) on the graph. However, real-world graphs often suffer from missing or being contaminated, making the keyword search on graphs much more challenging. We provide this dataset for the keyword search on dirty graphs.
- Categories:
Normal
0
0
2
false
false
false
EN-US
JA
X-NONE
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:標準の表;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0mm 5.4pt 0mm 5.4pt;
mso-para-margin:0mm;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"Times New Roman",serif;
mso-fareast-language:EN-US;}
- Categories:
Electrical Impedance Tomography system measures change in path conductivity of a cross section of ROI. ROI is created by surrounding a cross-section by metal electrodes. These inject microlevel charges into ROI and attenuation due to ROI material is reconstructed.
X-ray CT is a well known non destructive imaging technology used primarily in medical applications. However, industrial CT are used for industrial applciations.
Computational Fluid dynamics assist flow simulation of fluid channels.
- Categories:
We investigated whether thinking in opposites can facilitate the solution process in Wason’s rule discovery task. Participants were exposed to three conditions: training prompting an analysis of the properties characterising the initial seed triple; training prompting the same action but subsequently demanding the identification of the opposites of each property and using it in the testing phase; and a no-prompt condition. Thinking in opposites turned out to be beneficial, almost doubling success rate.
- Categories:
Computer experiment is crucial for marine controlled-source electromagnetic (CSEM) forward modeling in hydrocarbon exploration. Marine CSEM computer experiment is used to discretize the governing equations of the electromagnetic (EM) fields. One dimensional (1D) simulation usually is fully utilized to determine the reliability of the higher dimensional marine CSEM computations. All the data were generated using Web Hosted Active-Source Modeling (WHAM) online resource.
- Categories:
The study investigates the relationship between people’s personality and the types of hats they like and would be willing to wear. The question is of interest for the psychology of personality and aesthetic preferences, empirical aesthetics, and potentially also for marketing studies. 539 Italian adults completed an on-line questionnaire showing black and white images of 34 iconic types of hat (set 1) and 8 types of baseball caps (set 2) one at a time. For each hat, they were asked to rate how much they liked it and how likely it was that they would wear it.
- Categories:
Single-source shortest path (SSSP) discovery, one of a shortest path problem in algorithmic graph theory, is a combinatorial optimization problem. Most propositions solving the SSSP problem rely on Dijkstra’s algorithm. Although theoretically inferior in asymptotic upper bound time complexity, Dijkstra’s algorithm Binary variant outperforms Fibonacci variant empirically, in SSSP computations for real-world datasets, especially on sparse input graphs.
- Categories: