نتایج جستجو برای: weak scenarios

تعداد نتایج: 248694  

Journal: :Optica 2016
Edward Haojiang Zhou Atsushi Shibukawa Joshua Brake Haowen Ruan Changhuei Yang

Imaging of a weak target hidden behind a scattering medium can be significantly confounded by glare. We report a method, termed coherence gated negation (CGN), that uses destructive optical interference to suppress glare and allow improved imaging of a weak target. As a demonstration, we show that by permuting through a set range of amplitude and phase values for a reference beam interfering wi...

2012
Grace B. Villamor Meine van Noordwijk Klaus G. Troitzsch Paul L.G. Vlek

Results from agent-based or multi-agent simulation (AB/MAS) modelling can provide relevant information for policy makers, scientists and stakeholders about the boundary conditions of rural development and the uncertainties involved in land-use/cover change (LUCC). However, the process of model validation that can build trust in the outcomes for new parameter conditions and in future scenarios i...

Journal: :bulletin of the iranian mathematical society 2014
f. mukhamedov

‎in the present paper we investigate the $l_1$-weak ergodicity of‎ ‎nonhomogeneous continuous-time markov processes with general state‎ ‎spaces‎. ‎we provide a necessary and sufficient condition for such‎ ‎processes to satisfy the $l_1$-weak ergodicity‎. ‎moreover‎, ‎we apply‎ ‎the obtained results to establish $l_1$-weak ergodicity of quadratic‎ ‎stochastic processes‎.

2017
Chengzhe Tian Szabolcs Semsey Namiko Mitarai

Toxin-antitoxin (TA) loci are widespread in bacteria including important pathogenic species. Recent studies suggest that TA systems play a key role in persister formation. However, the persistence phenotype shows only weak dependence on the number of TA systems, i.e. they are functionally redundant. We use a mathematical model to investigate the interaction of multiple TA systems in the switchi...

2008
Pavel V. Kuptsov Razvan A. Satnoianu

Flow and Diffusion Distributed Structures (FDS) are stationary spatially periodic patterns that can be observed in reaction-diffusion-advection systems. These structures arise when the flow rate exceeds a certain bifurcation point provided that concentrations of interacting species at the inlet differ from steady state values and the concentrations are held constant. Normally, theoretical studi...

2012
M. Mofidi A. Chaman-motlagh N. Mofidi

In spite of the several technical advantages of a freespace optical (FSO) communication, atmospheric turbulence can severely degrade the performance of a FSO link, because it creates random fluctuations in the phase and the amplitude of the received signal. The simultaneous usage of multiple transmit/receive apertures (MIMO) can mitigate the fading effects, that is particularly crucial for stro...

2016
Davide Bacco Jesper Bjerge Christensen Mario A. Usuga Castaneda Yunhong Ding Søren Forchhammer Karsten Rottwitt Leif Katsuo Oxenløwe

Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fund...

2007
Raheleh B. Dilmaghani Ramesh R. Rao

predict what technologies or devices show up at the site. Emergency needs and the ever-increasing design complexity AbstractEstablishing and accessing a reliable of heterogeneous environment challenge engineers to raise the communication infrastructure at crisis site is a challenging level of abstraction and replace traditional ad-hoc approaches research problem. Failure in communication infras...

2003
A. Kurylov M. J. Ramsey-Musolf S. Su

We compute the one-loop supersymmetric ~SUSY! contributions to the weak charges of the electron (QW e ), proton (QW p ), and cesium nucleus (QW ) in the minimal supersymmetric standard model ~MSSM!. Such contributions can generate several percent corrections to the corresponding standard model values. The magnitudes of the SUSY loop corrections to QW e and QW p are correlated over nearly all of...

2007
Shishir Nagaraja

There are a number of scenarios where users wishing to communicate, share a weak secret. Often, they are also part of a common social network. Connections (edges) from the social network are represented as shared link keys between participants (vertices). We propose mechanisms that utilise the graph topology of such a network, to increase the entropy of weak pre-shared secrets. Our proposal is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید