Academic literature on the topic 'Source enumeration'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Source enumeration.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Source enumeration"

1

Lee, Yunseong, Chanhong Park, Taeyoung Kim, Yeongyoon Choi, Kiseon Kim, Dongho Kim, Myung-Sik Lee, and Dongkeun Lee. "Source Enumeration Approaches Using Eigenvalue Gaps and Machine Learning Based Threshold for Direction-of-Arrival Estimation." Applied Sciences 11, no. 4 (February 23, 2021): 1942. http://dx.doi.org/10.3390/app11041942.

Full text
Abstract:
Source enumeration is an important procedure for radio direction-of-arrival finding in the multiple signal classification (MUSIC) algorithm. The most widely used source enumeration approaches are based on the eigenvalues themselves of the covariance matrix obtained from the received signal. However, they have shortcomings such as the imperfect accuracy even at a high signal-to-noise ratio (SNR), the poor performance at low SNR, and the limited detection number of sources. This paper proposestwo source enumeration approaches using the ratio of eigenvalue gaps and the threshold trained by a machine learning based clustering algorithm for gaps of normalized eigenvalues, respectively. In the first approach, a criterion formula derived with eigenvalue gaps is used to determine the number of sources, where the formula has maximum value. In the second approach, datasets of normalized eigenvalue gaps are generated for the machine learning based clustering algorithm and the optimal threshold for estimation of the number of sources are derived, which minimizes source enumeration error probability. Simulation results show that our proposed approaches are superior to the conventional approaches from both the estimation accuracy and numerical detectability extent points of view. The results demonstrate that the second proposed approach has the feasibility to improve source enumeration performance if appropriate learning datasets are sufficiently provided.
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Taeyoung, Yunseong Lee, Chanhong Park, Yeongyoon Choi, Kiseon Kim, Dongkeun Lee, Myung-Sik Lee, and Hyunjin Kang. "Source Enumeration Method using Eigenvalue Gap Ratio and Performance Comparison in Rayleigh Fading." Journal of the Korea Institute of Military Science and Technology 24, no. 5 (October 5, 2021): 492–502. http://dx.doi.org/10.9766/kimst.2021.24.5.492.

Full text
Abstract:
In electronic warfare, source enumeration and direction-of-arrival estimation are important. The source enumeration method based on eigenvalues of covariance matrix from received is one of the most used methods. However, there are some drawbacks such as accuracy less than 100 % at high SNR, poor performance at low SNR and reduction of maximum number of estimating sources. We suggested new method based on eigenvalues gaps, which is named AREG(Accumulated Ratio of Eigenvalues Gaps). Meanwhile, FGML(Fast Gridless Maximum Likelihood) which reconstructs the covariance matrix was suggested by Wu et al., and it improves performance of the existing source enumeration methods without modification of algorithms. In this paper, first, we combine AREG with FGML to improve the performance. Second, we compare the performance of source enumeration and direction-of-arrival estimation methods in Rayleigh fading. Third, we suggest new method named REG(Ratio of Eigenvalues Gaps) to reduce performance degradation in Rayleigh Fading environment of AREG.
APA, Harvard, Vancouver, ISO, and other styles
3

Cuichun Xu and S. Kay. "Source Enumeration via the EEF Criterion." IEEE Signal Processing Letters 15 (2008): 569–72. http://dx.doi.org/10.1109/lsp.2008.2001112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ge, Shengguo, Siti Nurulain Mohd Rum, Hamidah Ibrahim, Erzam Marsilah, and Thinagaran Perumal. "A Source Number Enumeration Method at Low SNR Based on Ensemble Learning." International Journal of Emerging Technology and Advanced Engineering 13, no. 3 (March 1, 2023): 81–90. http://dx.doi.org/10.46338/ijetae0323_08.

Full text
Abstract:
Source number estimation is one of the important research directions in array signal processing. To solve the difficulty of estimating the number of signal sources under a low signal-to-noise ratio (SNR), a source number enumeration method based on ensemble learning is proposed. This method first preprocesses the signal data. The specific process is to decompose the original signal into several intrinsic mode functions (IMF) by using Complementary Ensemble Empirical Mode Decomposition (CEEMD), and then construct a covariance matrix and perform eigenvalue decomposition to obtain samples. Finally, the source number enumeration model based on ensemble learning is used to predict the number of sources. This model is divided into two layers. First, the primary learner is trained with the dataset, and then the prediction result on the primary learner is used as the input of the secondary learner for training, and then the prediction result is obtained. Computer theoretical signals and real measured signals are used to verify the proposed source number enumeration method, respectively. Experiments show that this method has better performance than other methods at low SNR, and it is more suitable for real environment. Keywords—Source number estimation; Array signal processing; SNR; IMF; CEEMD; Ensemble learning.
APA, Harvard, Vancouver, ISO, and other styles
5

Loyer, P., J. M. Moureaux, and M. Antonini. "Lattice codebook enumeration for generalized Gaussian source." IEEE Transactions on Information Theory 49, no. 2 (February 2003): 521–27. http://dx.doi.org/10.1109/tit.2002.807306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cozzens, J. H., and M. J. Sousa. "Source enumeration in a correlated signal environment." IEEE Transactions on Signal Processing 42, no. 2 (1994): 304–17. http://dx.doi.org/10.1109/78.275604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Akeroyd, Michael A., William M. Whitmer, David McShefferty, and Graham Naylor. "Sound-source enumeration by hearing-impaired adults." Journal of the Acoustical Society of America 139, no. 4 (April 2016): 2210. http://dx.doi.org/10.1121/1.4950605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Diaz-Santos, Jose A., and Kathleen E. Wage. "Whitening and source enumeration for large underwater arrays." Journal of the Acoustical Society of America 148, no. 4 (October 2020): 2477. http://dx.doi.org/10.1121/1.5146862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garg, Vaibhav, Ignacio Santamaria, David Ramirez, and Louis L. Scharf. "Subspace Averaging and Order Determination for Source Enumeration." IEEE Transactions on Signal Processing 67, no. 11 (June 1, 2019): 3028–41. http://dx.doi.org/10.1109/tsp.2019.2912151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eguizabal, Alma, Christian Lameiro, David Ramirez, and Peter J. Schreier. "Source Enumeration in the Presence of Colored Noise." IEEE Signal Processing Letters 26, no. 3 (March 2019): 475–79. http://dx.doi.org/10.1109/lsp.2019.2895548.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Source enumeration"

1

Lu, Zhihua [Verfasser], Abdelhak M. [Akademischer Betreuer] Zoubir, and Visa [Akademischer Betreuer] Koivunen. "Source Enumeration in Sensor Array Processing: A Model Order Selection Problem / Zhihua Lu. Betreuer: Abdelhak M. Zoubir ; Visa Koivunen." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://d-nb.info/1106256824/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Albezzawy, Muhammad Nabil Mustafa. "Advanced signal processing methods for source identification using references." Electronic Thesis or Diss., Lyon, INSA, 2024. http://www.theses.fr/2024ISAL0074.

Full text
Abstract:
Les techniques de référence à rang réduit sont couramment employées pour résoudre les problèmes d’extraction de source et de resynchronisation de champs physiques, lorsque le nombre de références dépasse celui des sources incohérentes. Dans ce cas, la matrice croisée-spectrale devient mal conditionnée, rendant la solution des moindres carrés invalide. Bien que la décomposition en valeurs singulières tronquée (DVST) soit utilisée pour résoudre ce problème, elle n'est valable que pour un bruit scalaire sur les références. De plus, il est difficile de définir un seuil de troncature lorsque les valeurs singulières diminuent progressivement. Cette thèse propose une solution nommée technique de référence maximale-coherent (RMC), basée sur la recherche d’un ensemble de références virtuelles maximales correlées avec les mesures de champ. Cette technique est optimale, surtout en présence d’un bruit corrélé sur la référence. Cependant, elle nécessite également une troncature des valeurs propres, exigeant la connaissance ou l’estimation préalable du nombre de sources incohérentes, un problème inverse mal posé et peu étudié. La thèse présente trois méthodes d’énumération de sources applicables à toutes les techniques de référence : un test du rapport de vraisemblance contre le modèle saturé, une technique de bootstrap paramétrique et une approche de validation croisée. Une étude comparative basée sur des données numériques et expérimentales montre deux résultats importants. D'abord, le nombre de fenêtres spectrales utilisées affecte grandement la performance des trois méthodes, qui se comportent différemment selon ce nombre. Ensuite, le bootstrap paramétrique s’avère être la meilleure méthode en termes de précision et de robustesse par rapport au nombre de fenêtres utilisées. Enfin, la technique RMC accompagnée de bootstrap a été utilisée pour l’extraction de source et la resynchronisation de données réelles provenant d’expériences en laboratoire et d’un moteur électrique, fournissant de meilleurs résultats que la solution des moindres carrés et la DVST dans les mêmes conditions
Rank-reduced reference/coherence techniques based on the use of references, i.e. fixed sensors, are widely used to solve the two equivalent problems of source extraction and resynchronization encountered during remote sensing of physical fields, when the number of references surpasses the number of incoherent sources. In such case, the cross-spectral matrix (CSM) becomes ill-conditioned, resulting in the invalidity of the least squares LS solution. Although the truncated singular value decomposition (TSVD) was successfully applied in the literature to solve this problem, its validity is limited only to the case of scalar noise on the references. It is also very difficult to define a threshold, for truncation, when the singular values are gradually decreasing. This thesis proposes a solution based on finding a set of virtual references that is maximally correlated with the field measurements, named the maximally-coherent reference (MCR) Technique. This solution is optimal, especially, in the case of correlated noise on the reference, where TSVD fails. However the technique also includes an eigenvalue truncation step, similar to the one required for the TSVD, which necessitates a priori knowledge or the estimation of the number of incoherent sources, i.e. source enumeration, which is an ill-posed inverse problem, insufficiently investigated in the literature within the framework of reference techniques. In this thesis, after providing a unified formalism for all the reference techniques in the literature, three alternative source enumeration methods, applicable to all the reference techniques, were presented namely; a direct likelihood ratio test (LRT) against the saturated model, a parametric bootstrap technique and a cross-validation approach. A comparative study is performed among the three methods, based on simulated numerical data, real sound experimental data, and real electrical motor data. The results showed two important outcomes. The first is that the number of snapshots (spectral windows), used in the spectral analysis, greatly affects the performance of the three methods, and that, they behave differently for the same number of used snapshots. The second is that parametric bootstrapping turned out to be the best method in terms of both estimation accuracy and robustness with regard to the used number of snapshots. Finally, the MCR technique accompanied with bootstrapping was employed for source extraction and resynchronization of real data from laboratory experiments, and an e-motor, and it returned better results than the LS solution and the TSVD when employed for the same purpose
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Zhihua. "Source Enumeration in Sensor Array Processing: A Model Order Selection Problem." Phd thesis, 2012. https://tuprints.ulb.tu-darmstadt.de/3153/4/DoctoralDissertation_Lu_v1.pdf.

Full text
Abstract:
In this PhD thesis, one of the most fundamental problems in sensor array processing is investigated, namely, determining the number of source signals impinging on a sensor array, which is referred to as source enumeration. As a problem of model order selection, source enumeration can be addressed using the information carried in the observed data at the array output, e.g., the sample covariance matrix of the observed data, or equivalently, its sample eigenvalues and eigenvectors. In the last three decades, this problem has received a large amount of attention and numerous approaches have been developed for it. It is shown that the distribution of the sample eigenvalues contains statistical information which is critical for the problem of source enumeration. However, such information is not taken into account by most of the existing approaches. As a result, these approaches yield unsatisfactory performance in terms of correctly detecting the number of sources in some practical situations such as very small sample size, very low signal-to-noise ratio, close spacing and high correlation of source signals. Here, distinct distributions of the sample eigenvalues are used to construct new approaches for source enumeration. The distributions are either estimated by computer-intensive resampling algorithms, such as bootstrap techniques, or derived from classical multivariate statistical theory and modern random matrix theory. As a consequence, four novel approaches are developed in a framework of hypothesis testing or information theoretic criteria. Firstly, the bootstrap-based test is improved in order to adapt itself to the case of impulsive noise or very small sample sizes. Secondly, based on random matrix theory, a two-step test procedure is developed for the case of extremely small sample sizes, including the case when the sample size is smaller than the array size. Thirdly, inspired by the performance analysis of the Bayesian information criterion (BIC), a flexible detection criterion is proposed by incorporating an extra parameter. Finally, a generalized BIC is proposed using the distributions of the sample eigenvalues and observations to construct the log-likelihood function, in contrast to the conventional BIC which contains only the distribution of the observations. Note that the last two approaches are more flexible and general than the conventional BIC. Theoretical analysis and numerical simulations show that the proposed approaches outperform significantly most of the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
4

McDonald, Andre Martin. "The analysis of enumerative source codes and their use in Burrows‑Wheeler compression algorithms." Diss., 2010. http://hdl.handle.net/2263/27862.

Full text
Abstract:
In the late 20th century the reliable and efficient transmission, reception and storage of information proved to be central to the most successful economies all over the world. The Internet, once a classified project accessible to a selected few, is now part of the everyday lives of a large part of the human population, and as such the efficient storage of information is an important part of the information economy. The improvement of the information storage density of optical and electronic media has been remarkable, but the elimination of redundancy in stored data and the reliable reconstruction of the original data is still a desired goal. The field of source coding is concerned with the compression of redundant data and its reliable decompression. The arithmetic source code, which was independently proposed by J. J. Rissanen and R. Pasco in 1976, revolutionized the field of source coding. Compression algorithms that use an arithmetic code to encode redundant data are typically more effective and computationally more efficient than compression algorithms that use earlier source codes such as extended Huffman codes. The arithmetic source code is also more flexible than earlier source codes, and is frequently used in adaptive compression algorithms. The arithmetic code remains the source code of choice, despite having been introduced more than 30 years ago. The problem of effectively encoding data from sources with known statistics (i.e. where the probability distribution of the source data is known) was solved with the introduction of the arithmetic code. The probability distribution of practical data is seldomly available to the source encoder, however. The source coding of data from sources with unknown statistics is a more challenging problem, and remains an active research topic. Enumerative source codes were introduced by T. J. Lynch and L. D. Davisson in the 1960s. These lossless source codes have the remarkable property that they may be used to effectively encode source sequences from certain sources without requiring any prior knowledge of the source statistics. One drawback of these source codes is the computationally complex nature of their implementations. Several years after the introduction of enumerative source codes, J. G. Cleary and I. H. Witten proved that approximate enumerative source codes may be realized by using an arithmetic code. Approximate enumerative source codes are significantly less complex than the original enumerative source codes, but are less effective than the original codes. Researchers have become more interested in arithmetic source codes than enumerative source codes since the publication of the work by Cleary and Witten. This thesis concerns the original enumerative source codes and their use in Burrows–Wheeler compression algorithms. A novel implementation of the original enumerative source code is proposed. This implementation has a significantly lower computational complexity than the direct implementation of the original enumerative source code. Several novel enumerative source codes are introduced in this thesis. These codes include optimal fixed–to–fixed length source codes with manageable computational complexity. A generalization of the original enumerative source code, which includes more complex data sources, is proposed in this thesis. The generalized source code uses the Burrows–Wheeler transform, which is a low–complexity algorithm for converting the redundancy of sequences from complex data sources to a more accessible form. The generalized source code effectively encodes the transformed sequences using the original enumerative source code. It is demonstrated and proved mathematically that this source code is universal (i.e. the code has an asymptotic normalized average redundancy of zero bits). AFRIKAANS : Die betroubare en doeltreffende versending, ontvangs en berging van inligting vorm teen die einde van die twintigste eeu die kern van die mees suksesvolle ekonomie¨e in die wˆereld. Die Internet, eens op ’n tyd ’n geheime projek en toeganklik vir slegs ’n klein groep verbruikers, is vandag deel van die alledaagse lewe van ’n groot persentasie van die mensdom, en derhalwe is die doeltreffende berging van inligting ’n belangrike deel van die inligtingsekonomie. Die verbetering van die bergingsdigteid van optiese en elektroniese media is merkwaardig, maar die uitwissing van oortolligheid in gebergde data, asook die betroubare herwinning van oorspronklike data, bly ’n doel om na te streef. Bronkodering is gemoeid met die kompressie van oortollige data, asook die betroubare dekompressie van die data. Die rekenkundige bronkode, wat onafhanklik voorgestel is deur J. J. Rissanen en R. Pasco in 1976, het ’n revolusie veroorsaak in die bronkoderingsveld. Kompressiealgoritmes wat rekenkundige bronkodes gebruik vir die kodering van oortollige data is tipies meer doeltreffend en rekenkundig meer effektief as kompressiealgoritmes wat vroe¨ere bronkodes, soos verlengde Huffman kodes, gebruik. Rekenkundige bronkodes, wat gereeld in aanpasbare kompressiealgoritmes gebruik word, is ook meer buigbaar as vroe¨ere bronkodes. Die rekenkundige bronkode bly na 30 jaar steeds die bronkode van eerste keuse. Die probleem om data wat afkomstig is van bronne met bekende statistieke (d.w.s. waar die waarskynlikheidsverspreiding van die brondata bekend is) doeltreffend te enkodeer is opgelos deur die instelling van rekenkundige bronkodes. Die bronenkodeerder het egter selde toegang tot die waarskynlikheidsverspreiding van praktiese data. Die bronkodering van data wat afkomstig is van bronne met onbekende statistieke is ’n groter uitdaging, en bly steeds ’n aktiewe navorsingsveld. T. J. Lynch and L. D. Davisson het tel–bronkodes in die 1960s voorgestel. Tel– bronkodes het die merkwaardige eienskap dat bronsekwensies van sekere bronne effektief met hierdie foutlose kodes ge¨enkodeer kan word, sonder dat die bronenkodeerder enige vooraf kennis omtrent die statistieke van die bron hoef te besit. Een nadeel van tel–bronkodes is die ho¨e rekenkompleksiteit van hul implementasies. J. G. Cleary en I. H. Witten het verskeie jare na die instelling van tel–bronkodes bewys dat benaderde tel–bronkodes gerealiseer kan word deur die gebruik van rekenkundige bronkodes. Benaderde tel–bronkodes het ’n laer rekenkompleksiteit as tel–bronkodes, maar benaderde tel–bronkodes is minder doeltreffend as die oorspronklike tel–bronkodes. Navorsers het sedert die werk van Cleary en Witten meer belangstelling getoon in rekenkundige bronkodes as tel–bronkodes. Hierdie tesis is gemoeid met die oorspronklike tel–bronkodes en die gebruik daarvan in Burrows–Wheeler kompressiealgoritmes. ’n Nuwe implementasie van die oorspronklike tel–bronkode word voorgestel. Die voorgestelde implementasie het ’n beduidende laer rekenkompleksiteit as die direkte implementasie van die oorspronklike tel–bronkode. Verskeie nuwe tel–bronkodes, insluitende optimale vaste–tot–vaste lengte tel–bronkodes met beheerbare rekenkompleksiteit, word voorgestel. ’n Veralgemening van die oorspronklike tel–bronkode, wat meer komplekse databronne insluit as die oorspronklike tel–bronkode, word voorgestel in hierdie tesis. The veralgemeende tel–bronkode maak gebruik van die Burrows–Wheeler omskakeling. Die Burrows–Wheeler omskakeling is ’n lae–kompleksiteit algoritme wat die oortolligheid van bronsekwensies wat afkomstig is van komplekse databronne omskakel na ’n meer toeganklike vorm. Die veralgemeende bronkode enkodeer die omgeskakelde sekwensies effektief deur die oorspronklike tel–bronkode te gebruik. Die universele aard van hierdie bronkode word gedemonstreer en wiskundig bewys (d.w.s. dit word bewys dat die kode ’n asimptotiese genormaliseerde gemiddelde oortolligheid van nul bisse het). Copyright
Dissertation (MEng)--University of Pretoria, 2010.
Electrical, Electronic and Computer Engineering
unrestricted
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Source enumeration"

1

'96, Celebration Dayton. Enumeration '96: A name & source descriptive index to persons in the Ohio counties of Montgomery & Greene, 1796-1810. [Dayton, Ohio]: Celebration Dayton '96 Bicentennial Committee, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

DeWeese, Oakes Helen, and Miami County Historical and Genealogical Society (Ohio), eds. 1827 quadrennial enumeration of adult white males of Miami County, Ohio. Troy, Ohio: Miami County Historical and Genealogical Society, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harsh, Sharon Wilmoth. School board minutes, enumeration lists, and account records: Barbour County, West Virginia, Township of Barker, 1870-1890, independent district of Belington, 1893-1899. Bowie, Md: Heritage Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pierre, Beguin, and Cetedoc, eds. Thesaurus Fontium Franciscanorum: Formae et lemmata : enumeratio lemmatum et formarum, index lemmatum a tergo ordinatorum, tabulae frequentiarum, onomasticon, index formarum et lemmatum, index formarum a tergo ordinatarum, concordantia lemmatum et formarum. Turnhout: Brepols, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wiebe, Peter H., Ann Bucklin, and Mark Benfield. Sampling, Preservation and Counting of Samples II: Zooplankton. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199233267.003.0010.

Full text
Abstract:
This chapter reviews traditional and new zooplankton sampling techniques, sample preservation, and sample analysis, and provides the sources where in-depth discussion of these topics is addressed. The net systems that have been developed over the past 100+ years, many of which are still in use today, can be categorized into eight groups: non-opening/closing nets, simple opening/closing nets, high-speed samplers, neuston samplers, planktobenthos plankton nets, closing cod-end samplers, multiple net systems, and moored plankton collection systems. Methods of sample preservation include preservation for sample enumeration and taxonomic morphological analysis, and preservation of samples for genetic analysis. Methods of analysis of zooplankton samples include determination of biomass, taxonomic composition, and size by traditional methods; and genetic analysis of zooplankton samples.
APA, Harvard, Vancouver, ISO, and other styles
6

Exordium magnum: Auctore Conrado Eberbacensi : Series A, Formae : Enumeratio formarum, index formarum a tergo ordinatarum, tabulae frequentiarum, index formarum secundum orthographiae normam collatarum,concondantia formarum. Turnhout: Brepols, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rhodes, R. A. W. On Being There? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198786115.003.0004.

Full text
Abstract:
What do we learn from observing public elites up close that we would not learn using more conventional methods? This chapter answers the ‘so what’ question, enumerating the benefits of observation and reflecting on lessons learnt about observing, surveying the strengths and weaknesses of the approach and describing the fun of observing elites. The author recounts the surprise findings and explores the mistakes made and problems encountered. Secondary sources are not relied on to identify the problems but mistakes are recounted to give the lessons both immediacy and relevance to the study of government elites. The chapter reflects on the pitfalls of observing politicians and bureaucrats at work, focusing on eight issues: speaking truth to power; secrecy; building and keeping trust; maintaining standards of reliability and validity; listening; going native; generalizing; and telling the tale. It closes with the author’s rules of thumb for observation.
APA, Harvard, Vancouver, ISO, and other styles
8

Honest and Friendly Address to Persons of All Ranks and Conditions, in a Manner Hitherto Unattempted; Which (instead of Enumerating Our Vices and Places of Diversion) Points Out the Source, Strikes at the Root, of the Load of Calamities, Follies, ... Creative Media Partners, LLC, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Philanthropos, Philanthropos. Honest and Friendly Address to Persons of All Ranks and Conditions, in a Manner Hitherto Unattempted; Which (instead of Enumerating Our Vices and Places of Diversion) Points Out the Source, Strikes at the Root, of the Load of Calamities, Follies, and I. Creative Media Partners, LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Source enumeration"

1

Rota, Gian-Carlo, Jon Folkman, Richard P. Stanley, R. P. Dilworth, Curtis Greene, Thomas A. Dowling, and Richard M. Wilson. "Enumeration in geometric lattices." In A Source Book in Matroid Theory, 201–65. Boston, MA: Birkhäuser Boston, 1986. http://dx.doi.org/10.1007/978-1-4684-9199-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ge, Shengguo, Siti Nurulain Mohd Rum, Hamidah Ibrahim, Erzam Marsilah, and Thinagaran Perumal. "Source Number Enumeration Approach Based on CEEMD." In Lecture Notes in Electrical Engineering, 595–602. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1428-9_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blümer, Agnes. "Between Order and Chaos: Lists in Children’s Literature." In Forms of List-Making: Epistemic, Literary, and Visual Enumeration, 227–48. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-76970-3_11.

Full text
Abstract:
AbstractThis chapter aims to contribute toward a poetics of the list in children’s literature. Lists are a recurrent technique in texts addressed to children and young adults. This chapter intends to show that the didactic function of lists is very important, especially in picturebooks, but that many lists in children’s literature are also intended to serve as a source of enjoyment through their reliance on rhymes, sounds, and their typical creative play with language. Many lists do not transfer knowledge or moral standards but play with concepts of narration.
APA, Harvard, Vancouver, ISO, and other styles
4

Sérée, Bastien, Loïg Jezequel, and Didier Lime. "An Algorithm for Single-Source Shortest Paths Enumeration in Parameterized Weighted Graphs." In Language and Automata Theory and Applications, 279–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68195-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marino, Andrea. "Telling Stories: Enumerating Maximal Directed Acyclic Graphs with Constrained Set of Sources and Targets." In Analysis and Enumeration, 47–63. Paris: Atlantis Press, 2015. http://dx.doi.org/10.2991/978-94-6239-097-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marino, Andrea, Marco Pesce, and Raffaella Succi. "Access to emergency care services and inequalities in living standards: Some evidence from two Italian northern regions." In Proceedings e report, 135–40. Florence: Firenze University Press and Genova University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0106-3.24.

Full text
Abstract:
Rapid access to emergency medical care is crucial in reducing the implications of negative health events in terms of both mortality and disability. Thus, in a well-designed health system the geographical distribution of emergency care services should be able to minimize the share of people whose access time lies beyond critical thresholds. In spite of this, statistical information measuring accessibility to emergency care services at a highly disaggregated level is unavailable in Italy. This paper makes a step in filling this gap, by providing geographically detailed estimates of accessibility in two northern regions, Liguria and Lombardia. To do so, we use three data sources: 1) georeferenced population data measured at the currently most possible detailed level (census enumeration areas, CEAs) from the 2011 Population Census; 2) open data on location of emergency care services; 3) crowdsourced data on road travel distances. Elaborating these data with an efficient algorithm based on open source routing machine provides us with a clear mapping of particularly disadvantaged areas. We find that in 2013 the population share whose access time to emergency care services lies beyond a critical –and policy relevant- threshold of 60 minutes is fairly limited (about 0.1% in both regions). Regional differences emerge when setting lower thresholds. We briefly discuss how accessibility may have evolved in recent years, based upon some conjecture on population dynamics at the CEA level and updated information on emergency care centers. Finally, we analyze how differences in accessibility are related to a set of characteristics describing the population’s living conditions. Different results emerge. In particular, older and less educated people in Liguria face significantly lower access to emergency care. Overall, our results suggest that spatial differences in accessibility -within and between regions- should be considered a relevant determinant of health inequality.
APA, Harvard, Vancouver, ISO, and other styles
7

Tinhofer, Ingeborg. "The Role of Liquid Biopsies for Monitoring Disease Evolution." In Critical Issues in Head and Neck Oncology, 53–64. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63234-2_4.

Full text
Abstract:
AbstractBody fluids of cancer patients have attracted increasing attention in biomedical research within the last 15 years since—as so-called liquid biopsies—they represent a non-invasive source of clinically exploitable biomarkers, including circulating tumor cells (CTCs) and cell-free tumor DNA (ctDNA). Assessment of CTCs in peripheral blood from solid cancer patients has proven useful for detection of subclinical disease which otherwise remains invisible for current staging techniques. Based on results from large cohort studies in breast and colon cancer, diagnostic tests for enumeration of CTCs have been developed which can be used for tumor staging, prognosis, and post-treatment surveillance. Circulating plasma DNA derived from Epstein–Barr or human papilloma viruses has been established as a sensitive and highly specific biomarker for early cancer detection and disease monitoring. More recently, first studies have been initiated for studying the diagnostic value of mutant variants in plasma-derived ctDNA for treatment selection, response assessment and early detection of treatment failure.Advanced Head and Neck Squamous Cell Carcinoma (HNSCC) represents a malignancy associated with locoregionally advanced stage at presentation, dismal prognosis and little improvement in treatment outcome over the past decade, especially for patients with metastatic disease. HNSCC patients might therefore benefit from incorporation of liquid biopsy-based assays in clinical management. In the following chapters, I will summarize current evidence of the diagnostic value of liquid biopsies in HNSCC and give examples of potential clinical applications.
APA, Harvard, Vancouver, ISO, and other styles
8

Johnson, Keith J. C., Andrew Reynolds, Thomas Reps, and Loris D’Antoni. "The SemGuS Toolkit." In Computer Aided Verification, 27–40. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65633-0_2.

Full text
Abstract:
AbstractSemantics-Guided Synthesis (SemGuS) is a programmable framework for defining synthesis problems in a domain- and solver-agnostic way. This paper presents the standardized SemGuS format, together with an open-source toolkit that providesa parser, a verifier, and enumerative SemGuS solvers. The paper also describes an initial set of SemGuS benchmarks, which form the basis for comparing SemGuS solvers, and presents an evaluation of the baseline enumerative solvers.
APA, Harvard, Vancouver, ISO, and other styles
9

Bernheimer, Teresa. "Revisiting Lists in Early Islamic Historiography." In Semitic Languages and Cultures, 172–90. Cambridge, UK: Open Book Publishers, 2023. http://dx.doi.org/10.11647/obp.0375.06.

Full text
Abstract:
Lists form a crucial part of early Islamic historiography: they provide the broad frameworks of organisation of the sources, and are ubiquitous in their content. Bernheimer’s contribution re-examines lists in early Islamic historiographical works as textual practice, that is, as a form of textual communication that is integral to scholarly writing and the creation of a historical narrative. Lists are not simply enumerations of people, events, or tax payments, but an important narrative strategy in the overall historiographic project of early Islam. Understanding lists as textual practice highlights their importance in the forging of a new cultural narrative and memory, and their function as a principal scholarly form. The chapter recapitulates how lists have thus far been understood in the scholarship, and offers some alternative perspectives, before two examples of lists in some of the main Arabic historiographical works of the ninth century ce are examined in more detail—lists of those who died in the battle of the Ḥarra, and the administrative lists for the reign of ʿAbd al-Malik.
APA, Harvard, Vancouver, ISO, and other styles
10

Kreager, Philip. "2. Evolution in the History of Population Thought." In Human Evolutionary Demography, 27–56. Cambridge, UK: Open Book Publishers, 2024. http://dx.doi.org/10.11647/obp.0251.02.

Full text
Abstract:
This chapter places evolutionary demography in the history of population thought, and more particularly in relations between demography and evolutionary population biology. Darwin conceived evolution as a dynamics of variation arising from the behaviour of populations at intra- and inter-species levels. While Malthus’s principle of population was an important early stimulus, Darwin resolved the core problem in evolution -- how mechanisms of variation combine to produce divergence of character -- by analogy to Smith’s account of the division of labour. With the benefit of hindsight, we can describe Darwinian population thinking as the first general methodology in which it became possible to combine bottom-up observation including enumeration of local population dynamics with top-down statistical methods. The two components entail different concepts of population, which may be characterised broadly as ‘open’ and ‘closed’. Their combination shows that evolutionary theory is rooted in the same sources of population thinking that gave rise to demography: the former lie in Classical population thinking and early modern population arithmetics, and the latter in 19th-century statistics and probability. Hereditary influences remained a ‘black box’ in Darwin’s theory, which only began to be unpacked with the rediscovery of Mendel’s research. The second half of the chapter traces the central role which demographic methods played in topical and analytical developments of the first half of the 20th century, including both the formulation and critique of eugenics, the emergence of population ecology, and the rise of the mathematical theory of population genetics. There is an irony here: even as demographic methods came to play an integral role, mainstream demographers became less and less involved. The ‘separatism’ of demography and evolutionary biology often remarked in the post-war era thus has deeper roots. These lie partly in topical issues, like reactions against eugenics, but more importantly in a conceptual shift in how we understand relationships between ultimate and proximate mechanisms of population change, and its implications for analysis and modelling. Evolutionary theory entails a balance of methods and insights drawing on both population concepts, which demography has not yet achieved. The concluding section provides examples of how current evolutionary demography is now integrating these developments into demographic explanation.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Source enumeration"

1

Liu, Chun-Lin. "Monte Carlo Source Enumeration for Sparse Arrays." In 2024 IEEE 13th Sensor Array and Multichannel Signal Processing Workshop (SAM), 1–5. IEEE, 2024. http://dx.doi.org/10.1109/sam60225.2024.10636447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yan, Hong-Sen, Feng-Ming Ou, and Ming-Feng Tang. "An Algorithm for the Enumeration of Serial and/or Parallel Combinations of Kinematic Building Blocks." In ASME 2004 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/detc2004-57295.

Full text
Abstract:
An algorithm is presented, based on graph theory, for enumerating all feasible serial and/or parallel combined mechanisms from the given rotary or translational power source and specific kinematic building blocks. Through the labeled out-tree representations for the configurations of combined mechanisms, the enumeration procedure is developed by adapting the algorithm for the enumeration of trees. A rotary power source and four kinematic building blocks: a crank-rocker linkage, a rack-pinion, a double-slider mechanism, and a cam-follower mechanism, are chosen as the combination to illustrate the algorithm. And, two examples are provided to validate the algorithm.
APA, Harvard, Vancouver, ISO, and other styles
3

Garg, Vaibhav, Pere Gimenez-Febrer, Alba Pages-Zamora, and Ignacio Santamaria. "Source Enumeration via Toeplitz Matrix Completion." In ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2020. http://dx.doi.org/10.1109/icassp40776.2020.9054048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Su, Qiao, Yimin Wei, Changliang Deng, and Yuehong Shen. "Source Enumeration Based on Spatial Correlation Function for Independent/Dependent Sources." In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2019. http://dx.doi.org/10.1109/itnec.2019.8729080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gilbert, Keith D., and Karen L. Payton. "Source enumeration of speech mixtures using pitch harmonics." In 2009 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA). IEEE, 2009. http://dx.doi.org/10.1109/aspaa.2009.5346491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ayllon, David, Roberto Gil-Pita, Manuel Rosa-Zurera, and Hamid Krim. "An information theoretic approach for speech source enumeration." In ICASSP 2013 - 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2013. http://dx.doi.org/10.1109/icassp.2013.6638471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Santamaria, I., D. Ramirez, and L. L. Scharf. "Subspace Averaging for Source Enumeration in Large Arrays." In 2018 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2018. http://dx.doi.org/10.1109/ssp.2018.8450837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Chun-Lin. "Sparse Array Source Enumeration Via Coarray Subspace Optimization." In ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022. http://dx.doi.org/10.1109/icassp43922.2022.9746474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ota, Takahiro, and Hiroyoshi Morita. "Two-dimensional source coding by means of subblock enumeration." In 2017 IEEE International Symposium on Information Theory (ISIT). IEEE, 2017. http://dx.doi.org/10.1109/isit.2017.8006540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sarjonen, Risto, and Marko Höyhtyä. "Elbow estimation -based source enumeration method for LPI/LPD signals." In 2023 Wireless Telecommunications Symposium (WTS). IEEE, 2023. http://dx.doi.org/10.1109/wts202356685.2023.10131679.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Source enumeration"

1

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2021. http://dx.doi.org/10.54813/uzav2714.

Full text
Abstract:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations Security Council to set policy preferences and configure legal obligations contribute significantly to this trajectory. In this guide for States, we present a framework to reconfigure relations between these core commitments by assessing the counterterrorism architecture through the lens of impartial humanitarianism. We aim in particular to provide an evidence base and analytical frame for States to better grasp key legal and policy issues related to upholding respect for principled humanitarian action in connection with carrying out the Security Council’s counterterrorism decisions. We do so because the lack of knowledge regarding interpretation and implementation of counterterrorism resolutions matters for the coherence, integrity, and comprehensiveness of humanitarian policymaking and protection of the humanitarian imperative. In addition to analyzing foundational concerns and evaluating discernible behaviors and attitudes, we identify avenues that States may take to help achieve pro-humanitarian objectives. We also endeavor to help disseminate indications of, and catalyze, States’ legally relevant positions and practices on these issues. In section 1, we introduce the guide’s impetus, objectives, target audience, and structure. We also describe the methods that we relied on and articulate definitions for key terms. In section 2, we introduce key legal actors, sources of law, and the notion of international legal responsibility, as well as the relations between international and national law. Notably, Security Council resolutions require incorporation into national law in order to become effective and enforceable by internal administrative and judicial authorities. In section 3, we explain international legal rules relevant to advancing the humanitarian imperative and upholding respect for principled humanitarian action, and we sketch the corresponding roles of humanitarian policies, programs, and donor practices. International humanitarian law (IHL) seeks to ensure — for people who are not, or are no longer, actively participating in hostilities and whose needs are unmet — certain essential supplies, as well as medical care and attention for the wounded and sick. States have also developed and implemented a range of humanitarian policy frameworks to administer principled humanitarian action effectively. Further, States may rely on a number of channels to hold other international actors to account for safeguarding the humanitarian imperative. In section 4, we set out key theoretical and doctrinal elements related to accepting and carrying out the Security Council’s decisions. Decisions of the Security Council may contain (binding) obligations, (non-binding) recommendations, or a combination of the two. UN members are obliged to carry out the Council’s decisions. Member States retain considerable interpretive latitude to implement counterterrorism resolutions. With respect to advancing the humanitarian imperative, we argue that IHL should represent a legal floor for interpreting the Security Council’s decisions and recommendations. In section 5, we describe relevant conduct of the Security Council and States. Under the Resolution 1267 (1999), Resolution 1989 (2011), and Resolution 2253 (2015) line of resolutions, the Security Council has established targeted sanctions as counterterrorism measures. Under the Resolution 1373 (2001) line of resolutions, the Security Council has adopted quasi-“legislative” requirements for how States must counter terrorism in their national systems. Implementation of these sets of resolutions may adversely affect principled humanitarian action in several ways. Meanwhile, for its part, the Security Council has sought to restrict the margin of appreciation of States to determine how to implement these decisions. Yet international law does not demand that these resolutions be interpreted and implemented at the national level by elevating security rationales over policy preferences for principled humanitarian action. Indeed, not least where other fields of international law, such as IHL, may be implicated, States retain significant discretion to interpret and implement these counterterrorism decisions in a manner that advances the humanitarian imperative. States have espoused a range of views on the intersections between safeguarding principled humanitarian action and countering terrorism. Some voice robust support for such action in relation to counterterrorism contexts. A handful call for a “balancing” of the concerns. And some frame respect for the humanitarian imperative in terms of not contradicting counterterrorism objectives. In terms of measures, we identify five categories of potentially relevant national counterterrorism approaches: measures to prevent and suppress support to the people and entities involved in terrorist acts; actions to implement targeted sanctions; measures to prevent and suppress the financing of terrorism; measures to prohibit or restrict terrorism-related travel; and measures that criminalize or impede medical care. Further, through a number of “control dials” that we detect, States calibrate the functional relations between respect for principled humanitarian action and countering terrorism. The bulk of the identified counterterrorism measures and related “control dials” suggests that, to date, States have by and large not prioritized advancing respect for the humanitarian imperative at the national level. Finally, in section 6, we conclude by enumerating core questions that a State may answer to help formulate and instantiate its values, policy commitments, and legal positions to secure respect for principled humanitarian action in relation to counterterrorism contexts.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography