Results 11 to 20 of about 2,371,758 (319)
Ghost edge detection based on HED network
In this paper, we present an edge detection scheme based on ghost imaging (GI) with a holistically-nested neural network. The so-called holistically-nested edge detection (HED) network is adopted to combine the fully convolutional neural network (CNN ...
Shengmei Zhao+3 more
doaj +1 more source
Capturing the amplitude and phase profile of the vortex beam based on coherent detection
In this study, we propose a scheme to capture the amplitude and phase profile of the orbital angular momentum (OAM) beam based on coherent detection. In the scheme, the OAM beam to be measured is interfered with a local plain wave which is prepared at ...
Shengmei Zhao+3 more
doaj +1 more source
Performance Comparison of Impedance-Based Fault Location Methods for Transmission Line
Electric transmission lines play a very essential role in transmitting power energy from generation centers to consumption regions. They can be exposed to fault occurrences due to various reasons, such as lightning strikes, malfunction of components, and
N. Khoa+3 more
semanticscholar +1 more source
Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters.
Ke Xue+3 more
doaj +1 more source
The world of telecommunications, from some years, is revitalizing an high interest to Deep Space Communication (DSC) and Delay Tolerant Network (DTN) architecture as enabling technologies to offer internet services for aerospace vehicles or orbital ...
F. De Rango, M. Tropea
semanticscholar +1 more source
Error correction in data storage systems using polar codes
This paper investigates error correction in two‐dimensional (2‐D) intersymbol interference (ISI) channels using polar codes. 2‐D channels offer high data storage capacity compared to traditional one‐dimensional (1‐D) channels but suffer from greater ISI ...
Nana Kobina Gerrar+2 more
doaj +1 more source
Network Coding Datagram Protocol for TCP/IP Networks
In this article, a new multicast protocol is introduced at the session layer, which is based on network coding and is called the Network Coding Datagram Protocol (NCDP). The NCDP protocol is specifically designed for content delivery systems that utilize
Sergey S. Vladimirov+4 more
doaj +1 more source
Regarding New Traveling Wave Solutions for the Mathematical Model Arising in Telecommunications
This research paper focuses on the application of the tanh function method to find the soliton solutions of the (2+1)-dimensional nonlinear electrical transmission line model.
H. Baskonus+4 more
semanticscholar +1 more source
Seeing through multimode fibers with real-valued intensity transmission matrices [PDF]
Image transmission through multimode optical fibers has been an area of immense interests driven by the demand for miniature endoscopes in biomedicine and higher speed and capacity in telecommunications.
Tianrui Zhao+3 more
semanticscholar +1 more source
DD-FoG: Intelligent Distributed Dynamic FoG Computing Framework
Nowadays, 5G networks are emerged and designed to integrate all the achievements of mobile and fixed communication networks, in which it can provide ultra-high data speeds and enable a broad range of new services with new cloud computing structures such ...
Volkov Artem+4 more
doaj +1 more source