Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: MITIGATION ALGORITHM.

Artykuły w czasopismach na temat „MITIGATION ALGORITHM”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „MITIGATION ALGORITHM”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Ding, Yi, Weiwei Fan, Zijing Zhang, Feng Zhou i Bingbing Lu. "Radio Frequency Interference Mitigation for Synthetic Aperture Radar Based on the Time-Frequency Constraint Joint Low-Rank and Sparsity Properties". Remote Sensing 14, nr 3 (7.02.2022): 775. http://dx.doi.org/10.3390/rs14030775.

Pełny tekst źródła
Streszczenie:
Synthetic aperture radar (SAR) is susceptible to radio frequency interference (RFI), which becomes especially commonplace in the increasingly complex electromagnetic environments. RFI severely detracts from SAR imaging quality, which hinders image interpretation. Therefore, some RFI mitigation algorithms have been introduced based on the partial features of RFI, but the RFI reconstruction models in these algorithms are rough and can be improved further. This paper proposes two algorithms for accurately modeling the structural properties of RFI and target echo signal (TES). Firstly, an RFI mitigation algorithm joining the low-rank characteristic and dual-sparsity property (LRDS) is proposed. In this algorithm, RFI is treated as a low-rank and sparse matrix, and the sparse matrix assumption is made for TES in the time–frequency (TF) domain. Compared with the traditional low-rank and sparse models, it can achieve better RFI mitigation performance with less signal loss and accelerated algorithm convergence. Secondly, the other RFI mitigation algorithm, named as TFC-LRS, is proposed to further reduce the signal loss. The TF constraint concept, in lieu of the special sparsity, is introduced in this algorithm to describe the structural distribution of RFI because of its aggregation characteristic in the TF spectrogram. Finally, the effectiveness, superiority, and robustness of the proposed algorithms are verified by RFI mitigation experiments on the simulated and measured SAR datasets.
Style APA, Harvard, Vancouver, ISO itp.
2

Dhineshkumar, K., i C. Subramani. "Kalman Filter Algorithm for Mitigation of Power System Harmonics". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 2 (1.04.2018): 771. http://dx.doi.org/10.11591/ijece.v8i2.pp771-779.

Pełny tekst źródła
Streszczenie:
<p>The maiden application of a variant of Kalman Filter (KF) algorithms known as Local Ensemble Transform Kalman Filter (LET-KF) are used for mitigation and estimation power system harmonics are proposed in this paper. The proposed algorithm is applied for estimating the harmonic parameters of power signal containing harmonics, sub-harmonics and inter-harmonics in presence of random noise. The KF group of algorithms are tested and applied for both stationary as well as dynamic signal containing harmonics. The proposed LET-KF algorithm is compared with conventional KF based algorithms like KF, Ensemble Kalman Filter (En-KF) algorithms for harmonic estimation with the random noise values 0.001, 0.05 and 0.1. Among these three noises, 0.01 random noise results will give better than other two noises. Because the phase deviation and amplitude deviation less in 0.01 random noise. The proposed algorithm gives the better results to improve the efficiency and accuracy in terms of simplicity and computational features. Hence there are less multiplicative operations, which reduce the rounding errors. It is also less expensive as it reduces the requirement of storing large matrices, such as the Kalman gain matrix used in other KF based methods.</p>
Style APA, Harvard, Vancouver, ISO itp.
3

Majumder, Swarnadeep, Christopher G. Yale, Titus D. Morris, Daniel S. Lobser, Ashlyn D. Burch, Matthew N. H. Chow, Melissa C. Revelle, Susan M. Clark i Raphael C. Pooser. "Characterizing and mitigating coherent errors in a trapped ion quantum processor using hidden inverses". Quantum 7 (15.05.2023): 1006. http://dx.doi.org/10.22331/q-2023-05-15-1006.

Pełny tekst źródła
Streszczenie:
Quantum computing testbeds exhibit high-fidelity quantum control over small collections of qubits, enabling performance of precise, repeatable operations followed by measurements. Currently, these noisy intermediate-scale devices can support a sufficient number of sequential operations prior to decoherence such that near term algorithms can be performed with proximate accuracy (like chemical accuracy for quantum chemistry problems). While the results of these algorithms are imperfect, these imperfections can help bootstrap quantum computer testbed development. Demonstrations of these algorithms over the past few years, coupled with the idea that imperfect algorithm performance can be caused by several dominant noise sources in the quantum processor, which can be measured and calibrated during algorithm execution or in post-processing, has led to the use of noise mitigation to improve typical computational results. Conversely, benchmark algorithms coupled with noise mitigation can help diagnose the nature of the noise, whether systematic or purely random. Here, we outline the use of coherent noise mitigation techniques as a characterization tool in trapped-ion testbeds. We perform model-fitting of the noisy data to determine the noise source based on realistic physics focused noise models and demonstrate that systematic noise amplification coupled with error mitigation schemes provides useful data for noise model deduction. Further, in order to connect lower level noise model details with application specific performance of near term algorithms, we experimentally construct the loss landscape of a variational algorithm under various injected noise sources coupled with error mitigation techniques. This type of connection enables application-aware hardware codesign, in which the most important noise sources in specific applications, like quantum chemistry, become foci of improvement in subsequent hardware generations.
Style APA, Harvard, Vancouver, ISO itp.
4

Yousif, Tasneem, i Paul Blunt. "Interference Mitigation for GNSS Receivers Using FFT Excision Filtering Implemented on an FPGA". Eng 3, nr 4 (31.10.2022): 439–66. http://dx.doi.org/10.3390/eng3040032.

Pełny tekst źródła
Streszczenie:
GNSS receivers process signals with very low received power levels (<−160 dBW) and, therefore GNSS signals are susceptible to interference. Interference mitigation algorithms have become common in GNSS receiver designs in both professional and mass-market applications to combat both unintentional and intentional (jamming) interference. Interference excision filters using fast Fourier transforms (FFTs) have been proposed in the past as a powerful method of interference mitigation. However, the hardware implementations of this algorithm mostly limited their use to military GNSS receivers where greater power and resources were available. Novel implementation of existing FPGA technology should make interference mitigation feasible with limited hardware resources. This paper details the practicalities of implementing excision filters on currently available FPGAs trading off the achievable performance against the required hardware resources. The hardware implementation of the FFT excision mitigation algorithm is validated with the GNSS software receiver. The results indicate that the desired performance of the developed algorithm has achieved the expectations and can provide significant improvement on mitigation techniques in current GNSS receiver hardware. Two hardware implementation designs (fixed-point and float-point data type format) are developed and compared to achieve the optimal design that can provide the best performance with the possible minimum hardware resources.
Style APA, Harvard, Vancouver, ISO itp.
5

Sánchez-Cartas, Juan Manuel, Alberto Tejero i Gonzalo León. "Algorithmic Pricing and Price Gouging. Consequences of High-Impact, Low Probability Events". Sustainability 13, nr 5 (26.02.2021): 2542. http://dx.doi.org/10.3390/su13052542.

Pełny tekst źródła
Streszczenie:
Algorithmic pricing may lead to more efficient and contestable markets, but high-impact, low-probability events such as terror attacks or heavy storms may lead to price gouging, which may trigger injunctions or get sellers banned from platforms such as Amazon or eBay. This work addresses how such events may impact prices when set by an algorithm and how different markets may be affected. We analyze how to mitigate these high-impact events by paying attention to external (market conditions) and internal (algorithm design) features surrounding the algorithms. We find that both forces may help in partially mitigating price gouging, but it remains unknown which forces or features may lead to complete mitigation.
Style APA, Harvard, Vancouver, ISO itp.
6

Ahmed, Mohamed, i Ezz Eldin Abdelkawy. "GPS correlated jammer mitigation utilizing MUSIC algorithm". International Conference on Electrical Engineering 7, nr 7 (1.05.2010): 1–10. http://dx.doi.org/10.21608/iceeng.2010.33043.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

VU, Trung Kien, Sungoh KWON i Sangchul OH. "Cooperative Interference Mitigation Algorithm in Heterogeneous Networks". IEICE Transactions on Communications E98.B, nr 11 (2015): 2238–47. http://dx.doi.org/10.1587/transcom.e98.b.2238.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Akanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye i Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS". Journal of Information and Communication Technology 20, Number 3 (11.06.2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.

Pełny tekst źródła
Streszczenie:
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. Researchers have been able to develop several techniques to curb volumetric DDoS which overwhelms the target with a large number of request packets. However, compared to slow DDoS, limited number of research has been executed on mitigating slow DDoS. Attackers have resorted to slow DDoS because it mimics the behaviour of a slow legitimate client thereby causing service unavailability. This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. Results obtained showed that the classifier had detection accuracy, Area Under Receiver Operating Curve (AUC), true positive rate, false positive rate and a false negative rate of 99.89%, 99.89%, 99.95%, 0.18%, and 0.05% respectively. Also, the algorithm for subsequent implementation of the selective adaptive bubble burst mitigation mechanism was presented. This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.
Style APA, Harvard, Vancouver, ISO itp.
9

SHIN, J. H., J. HEO, S. YOON i S. Y. KIM. "Interference Cancellation and Multipath Mitigation Algorithm for GPS Using Subspace Projection Algorithms". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, nr 3 (1.03.2008): 905–8. http://dx.doi.org/10.1093/ietfec/e91-a.3.905.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Garzia, Fabio, Johannes Rossouw van der Merwe, Alexander Rügamer, Santiago Urquijo i Wolfgang Felber. "HDDM Hardware Evaluation for Robust Interference Mitigation". Sensors 20, nr 22 (13.11.2020): 6492. http://dx.doi.org/10.3390/s20226492.

Pełny tekst źródła
Streszczenie:
Interference can significantly degrade the performance of global navigation satellite system (GNSS) receivers. Therefore, mitigation methods are required to ensure reliable operations. However, as there are different types of interference, robust, multi-purpose mitigation algorithms are needed. This paper describes the most popular state-of-the-art interference mitigation techniques. The high-rate DFT-based data manipulator (HDDM) is proposed as a possible solution to overcome their limitations. This paper presents a hardware implementation of the HDDM algorithm. The hardware HDDM module is integrated in three different receivers equipped with analog radio-frequency (RF) front-ends supporting signals with different dynamic range. The resource utilization and power consumption is evaluated for the three cases. The algorithm is compared to a low-end mass-market receiver and a high-end professional receiver with basic and sophisticated interference mitigation capabilities, respectively. Different type of interference are used to compare the mitigation capabilities of the receivers under test. Results of the HDDM hardware implementation achieve the similar or improved performance to the state of the art. With more complex interferences, like frequency hopping or pulsed, the HDDM shows even better performance.
Style APA, Harvard, Vancouver, ISO itp.
11

Andriansyah, Andriansyah, i Prima Denny Sentia. "PENENTUAN RUTE KENDARAAN PADA SISTEM DISTRIBUSI LOGISTIK PASCA BENCANA (STUDI KASUS)". Jurnal Manajemen Industri dan Logistik 2, nr 1 (4.12.2018): 79–89. http://dx.doi.org/10.30988/jmil.v2i1.28.

Pełny tekst źródła
Streszczenie:
The success indicators of disaster mitigation can be seen from the disaster logistics system. Effective and efficient distribution network can make a good disaster logistics system. The problem that related to the design of this network is the vehicle routing problem. The objective is determined optimal route of relief distribution from warehouse to victims with minimum time duration. The problem is solved by branch and bound, insertion heuristic, and local search algorithms. The results obtained by branch and bound and local search algorithm are optimal global. Time duration of vehicle using these algoritm is 1.0562 hours. However, computation time using branch and bound algorithm is very long until 22 hours while local search algorithm only takes 60 seconds. The insertion heuristic algorithm also produces a good solution. Time duration of vehicle using this algoritm is 1,1030 hours. This solution is local optimal, but the computation time is very short, only 0.001 seconds.
Style APA, Harvard, Vancouver, ISO itp.
12

Acakpovi, Amevi, Dominique Kogue, Koudjo Mawuefam Koumadi i Ibrahim Tahirou. "Inteference Mitigation in Femtocellular Networks". International Journal of Informatics and Communication Technology (IJ-ICT) 3, nr 2 (1.08.2014): 113. http://dx.doi.org/10.11591/ijict.v3i2.pp113-121.

Pełny tekst źródła
Streszczenie:
<span lang="EN-US">Femtocells can significantly boost up wireless cellular network capacity by reducing communication distances to user equipment and also by reusing resources already utilized in the macrocell network on which they overlay. However, the deployment of femtocells within a macrocell coverage area, causes severe interference between the femtocell and the macrocell, which may have an impact on the overall performance of the femtocells. Avoiding such interference is very important for the effective co-existence </span><span lang="EN-US">of femtocells and macrocell. This paper proposes an algorithm to mitigate cross-tier interference between </span><span lang="EN-US">a femtocell and a macrocell using adaptive power control. The proposed approach is modeled and simulated using MATLAB. The impact on the performance of the </span><span lang="EN-US">femtocell using the proposed algorithm </span><span lang="EN-US">is analysed. Results show that the proposed adaptive power control algorithm has tremendously reduced the negative effects on the system throughput, delay and outage probability for voice and data traffics.</span>
Style APA, Harvard, Vancouver, ISO itp.
13

Chen, Chien-Sheng. "A non-line-of-sight error mitigation method for location estimation". International Journal of Distributed Sensor Networks 13, nr 1 (styczeń 2017): 155014771668273. http://dx.doi.org/10.1177/1550147716682739.

Pełny tekst źródła
Streszczenie:
Because there are always non-line-of-sight effects in signal propagation, researchers have proposed various algorithms to mitigate the measured error caused by non-line-of-sight. Initially inspired by flocking birds, particle swarm optimization is an evolutionary computation tool for optimizing a problem by iteratively attempting to improve a candidate solution with respect to a given measure of quality. In this article, we propose a new location algorithm that uses time-of-arrival measurements to improve the mobile station location accuracy when three base stations are available. The proposed algorithm uses the intersections of three time-of-arrival circles based on the particle swarm optimization technique to give a location estimation of the mobile station in non-line-of-sight environments. An object function is used to establish the nonlinear relationship between the intersections of the three circles and the mobile station location. The particle swarm optimization finds the optimal solution of the object function and efficiently determines the mobile station location. The simulation results show that the proposed algorithm performs better than the related algorithms in wireless positioning systems, even in severe non-line-of-sight propagation conditions.
Style APA, Harvard, Vancouver, ISO itp.
14

Chakraborty, Soma, Rashmi Deka i Jibendu Sekhar Roy. "Interference Mitigation in Cognitive Radio using Genetic Algorithm". International Journal of Computer Applications 70, nr 12 (17.05.2013): 29–35. http://dx.doi.org/10.5120/12016-8059.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Chen, Shaoping, i Tianren Yao. "Blind algorithm for RIBI mitigation in OFDM systems". Electronics Letters 38, nr 22 (2002): 1382. http://dx.doi.org/10.1049/el:20020895.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

ZHENG, Nan-shan, Liang-shi CAI, He-fang BIAN i Cong LIN. "Hybrid particle filtering algorithm for GPS multipath mitigation". Transactions of Nonferrous Metals Society of China 24, nr 5 (maj 2014): 1554–61. http://dx.doi.org/10.1016/s1003-6326(14)63225-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Khodjaev, Jasurbek, Salvatore Tedesco i Brendan O'Flynn. "IMPROVED NLOS ERROR MITIGATION BASED ON LTS ALGORITHM". Progress In Electromagnetics Research Letters 58 (2016): 133–39. http://dx.doi.org/10.2528/pierl15100103.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Jianhua, Yang, Zhao Danfeng, Yue Li i Zhao Chunhui. "Simplified iterative algorithm for OFDM phase noise mitigation". Journal of Systems Engineering and Electronics 18, nr 4 (grudzień 2007): 716–20. http://dx.doi.org/10.1016/s1004-4132(08)60009-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Mai, Yun Fei, Shao Long Liu i Wen Jing Ding. "Design and MATLAB Simulation of a Composite PID Controller for EPS Test-Benches". Applied Mechanics and Materials 487 (styczeń 2014): 635–38. http://dx.doi.org/10.4028/www.scientific.net/amm.487.635.

Pełny tekst źródła
Streszczenie:
For the problems that exist in EPS composite test-benches, PID control laws are expounded, a composite PID controller is designed, which is integrated with multiple advanced PID control algorithms (variable-integral PID algorithm, PID algorithm with filters, partial derivative PID algorithm, PID algorithm with dead zone), and it is simulated by MATLAB. The simulation results show that the improvement of accuracy and the impacts mitigation of the nonlinearity and external electromagnetic interferences are achieved well through the composite PID controller, and there is practical significance.
Style APA, Harvard, Vancouver, ISO itp.
20

Tang, Hong, Yongwan Park i Tianshuang Qiu. "NLOS Mitigation for TOA Location Based on a Modified Deterministic Model". Research Letters in Signal Processing 2008 (2008): 1–4. http://dx.doi.org/10.1155/2008/970461.

Pełny tekst źródła
Streszczenie:
Wireless location becomes difficult due to contamination of measured time-of-arrival (TOA) caused by non-line-of-sight. In this letter, TOA measurements seen at base stations are adjusted by scale factors, and a modified deterministic model is built. An effective numerical solution is proposed to resolve the scale factors and mobile position. A simulation comparison of four algorithms indicates that the proposed algorithm outperforms the other three algorithms.
Style APA, Harvard, Vancouver, ISO itp.
21

Suchsland, Philippe, Francesco Tacchino, Mark H. Fischer, Titus Neupert, Panagiotis Kl Barkoutsos i Ivano Tavernelli. "Algorithmic Error Mitigation Scheme for Current Quantum Processors". Quantum 5 (1.07.2021): 492. http://dx.doi.org/10.22331/q-2021-07-01-492.

Pełny tekst źródła
Streszczenie:
We present a hardware agnostic error mitigation algorithm for near term quantum processors inspired by the classical Lanczos method. This technique can reduce the impact of different sources of noise at the sole cost of an increase in the number of measurements to be performed on the target quantum circuit, without additional experimental overhead. We demonstrate through numerical simulations and experiments on IBM Quantum hardware that the proposed scheme significantly increases the accuracy of cost functions evaluations within the framework of variational quantum algorithms, thus leading to improved ground-state calculations for quantum chemistry and physics problems beyond state-of-the-art results.
Style APA, Harvard, Vancouver, ISO itp.
22

Ding, Jicheng, Lin Zhao, Chun Jia i Zhibin Luo. "BDS Multipath Parameter Estimation in the Presence of Impulsive Noise". International Journal of Antennas and Propagation 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/864327.

Pełny tekst źródła
Streszczenie:
This study focuses on mitigating the multipath, especially the short-delay multipath of the BeiDou navigation satellite system under impulsive noise conditions. A modified least meanp-norm (LMP) algorithm is developed to reduce the convergence time with the same steady-state error by predicting the updating trend of weights. The modified normalized power and the normalized polynomial least meanpth power are also directly provided according to a similar principle. According to the research work, an average filter has been utilized to improve the processing gain of designed mitigation scheme. Some significant simulation results verified the performance of the proposed adaption algorithm. Multipath parameter estimation tests have been conducted under different noise levels. Some comparative statistics performance assessments are quantified and verified under impulsive and additional white Gaussian noise environments. Results with various window widths of the average filtering and carrier-to-noise ratios indicate that the proposed scheme is able to improve the performance of the short-delay multipath mitigation under normal and degraded environments.
Style APA, Harvard, Vancouver, ISO itp.
23

Liu, Wen Ping, Meng Wang i Zhen Jie Zhu. "Bottleneck Mitigation of Assembly Lines with Memetic Algorithms". Advanced Materials Research 655-657 (styczeń 2013): 1631–35. http://dx.doi.org/10.4028/www.scientific.net/amr.655-657.1631.

Pełny tekst źródła
Streszczenie:
Bottlenecks heavily affect the material flow and workloads of assembly lines, and eventually constrain the productivity. The most economic way to eliminate or mitigate bottlenecks of a specific assembly line is to smooth the workloads at different stations towards a balanced system. This paper formulates a smoothness index, by which to measure the uniformity of workloads at serially located stations. To minimize the smoothness index, a Memetic algorithm is adopted and coding/decoding methods of the algorithm are devised. The effectiveness of the proposed algorithm is validated by a comparison with computing results of Package Lingo 11.0.
Style APA, Harvard, Vancouver, ISO itp.
24

Zhang, Ruicheng, Chengfa Gao, Qing Zhao, Zihan Peng i Rui Shang. "An Improved Multipath Mitigation Method and Its Application in Real-Time Bridge Deformation Monitoring". Remote Sensing 13, nr 12 (9.06.2021): 2259. http://dx.doi.org/10.3390/rs13122259.

Pełny tekst źródła
Streszczenie:
A multipath is a major error source in bridge deformation monitoring and the key to achieving millimeter-level monitoring. Although the traditional MHM (multipath hemispherical map) algorithm can be applied to multipath mitigation in real-time scenarios, accuracy needs to be further improved due to the influence of observation noise and the multipath differences between different satellites. Aiming at the insufficiency of MHM in dealing with the adverse impact of observation noise, we proposed the MHM_V model, based on Variational Mode Decomposition (VMD) and the MHM algorithm. Utilizing the VMD algorithm to extract the multipath from single-difference (SD) residuals, and according to the principle of the closest elevation and azimuth, the original observation of carrier phase in the few days following the implementation are corrected to mitigate the influence of the multipath. The MHM_V model proposed in this paper is verified and compared with the traditional MHM algorithm by using the observed data of the Forth Road Bridge with a seven day and 10 s sampling rate. The results show that the correlation coefficient of the multipath on two adjacent days was increased by about 10% after residual denoising with the VMD algorithm; the standard deviations of residual error in the L1/L2 frequencies were improved by 37.8% and 40.7%, respectively, which were better than the scores of 26.1% and 31.0% for the MHM algorithm. Taking a ratio equal to three as the threshold value, the fixed success rates of ambiguity were 88.0% without multipath mitigation and 99.4% after mitigating the multipath with MHM_V. The MHM_V algorithm can effectively improve the success rate, reliability, and convergence rate of ambiguity resolution in a bridge multipath environment and perform better than the MHM algorithm.
Style APA, Harvard, Vancouver, ISO itp.
25

Zhang, Wen Ming. "A Novel Spoofing Mitigation Method of GNSS Receiver". Applied Mechanics and Materials 239-240 (grudzień 2012): 1206–12. http://dx.doi.org/10.4028/www.scientific.net/amm.239-240.1206.

Pełny tekst źródła
Streszczenie:
Spoofing is more malignant to GNSS receiver than noise jamming, both military and civil GNSS users need to detect and avoid spoofing. This paper presents a novel spoofing mitigation method based on multi-antenna receiver architecture. The algorithm strengthen the authentic signals in noise jamming environment, and the algorithm will place null in the direction of spoofer and reset the receiver to tracking the authentic signals when spoofing attack successfully. The rule to distinguish spoofing signal from authentic signal is spoofing transmitters often transmit several signals from the same antenna. The strategy and performance of the proposed method is independent of the spoofer’s complexity and ability. Computer simulation confirm the availability of the algorithm.
Style APA, Harvard, Vancouver, ISO itp.
26

Qin, Yechen, Ehsan Hashemi i Amir Khajepour. "Integrated Crash Avoidance and Mitigation Algorithm for Autonomous Vehicles". IEEE Transactions on Industrial Informatics 17, nr 11 (listopad 2021): 7246–55. http://dx.doi.org/10.1109/tii.2021.3058948.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Joshi, Gargi, i A. K. Bongale. "Anomaly Extraction and Mitigation using Efficient-Web Miner Algorithm". International Journal of Computer Applications 100, nr 2 (20.08.2014): 8–13. http://dx.doi.org/10.5120/17495-8024.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Jie Li, Renbiao Wu, Dan Lu i Wenyi Wang. "GPS Multipath Mitigation Algorithm Based on Signal Correlation Character". International Journal of Digital Content Technology and its Applications 7, nr 3 (15.02.2013): 837–46. http://dx.doi.org/10.4156/jdcta.vol7.issue3.100.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Wei, W., X. Jin-Yu i Z. Zhong-Liang. "A New NLOS Error Mitigation Algorithm in Location Estimation". IEEE Transactions on Vehicular Technology 54, nr 6 (listopad 2005): 2048–53. http://dx.doi.org/10.1109/tvt.2005.858177.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Fohlmeister, F., A. Iliopoulos, M. Sgammini, F. Antreich i J. A. Nossek. "Dual polarization beamforming algorithm for multipath mitigation in GNSS". Signal Processing 138 (wrzesień 2017): 86–97. http://dx.doi.org/10.1016/j.sigpro.2017.03.012.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Loehle, Craig. "Optimizing wildlife habitat mitigation with a habitat defragmentation algorithm". Forest Ecology and Management 120, nr 1-3 (lipiec 1999): 245–51. http://dx.doi.org/10.1016/s0378-1127(98)00546-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Padarti, Vijaya Kumar, i N. Venkateswara Rao. "Adaptive SOICAF Algorithm for PAPR Mitigation in OFDM Systems". Wireless Personal Communications 113, nr 2 (5.04.2020): 927–43. http://dx.doi.org/10.1007/s11277-020-07260-y.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Wu, Shixun, Dengyuan Xu i Honggang Wang. "Adaptive NLOS Mitigation Location Algorithm in Wireless Cellular Network". Wireless Personal Communications 84, nr 4 (18.06.2015): 3143–56. http://dx.doi.org/10.1007/s11277-015-2791-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Le Vine, David M., Paolo de Matthaeis, Christopher S. Ruf i David D. Chen. "Aquarius RFI Detection and Mitigation Algorithm: Assessment and Examples". IEEE Transactions on Geoscience and Remote Sensing 52, nr 8 (sierpień 2014): 4574–84. http://dx.doi.org/10.1109/tgrs.2013.2282595.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Ji, Jing, Jiantong Zhang, Wei Chen i Deliang Su. "A Multipath Mitigation Algorithm for vehicle with Smart Antenna". IOP Conference Series: Earth and Environmental Science 114 (styczeń 2018): 012010. http://dx.doi.org/10.1088/1755-1315/114/1/012010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Chien, Ying-Ren, Sendren Sheng-Dong Xu i Shao-Hang Lu. "Cyclostationary impulsive noise mitigation algorithm for narrowband powerline communications". Journal of the Franklin Institute 357, nr 1 (styczeń 2020): 687–703. http://dx.doi.org/10.1016/j.jfranklin.2019.10.026.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Georgiev, Yuliyan, Richard Verhoeven i Nirvana Meratnia. "Selfish Behavior in IEEE 802.11ah Networks: A Detection Algorithm and Mitigation Strategies". Sensors 22, nr 12 (13.06.2022): 4472. http://dx.doi.org/10.3390/s22124472.

Pełny tekst źródła
Streszczenie:
One of the latest protocols developed for the Internet of Things networks is IEEE 802.11ah, proposed by the WiFi Alliance. The new channel access mechanism in IEEE 802.11ah, which is called Restricted Access Window, aims at reducing the contention between the stations by allowing only selected stations to transmit data at certain time slots. Stations may exhibit selfish behavior to maximize their own throughput. This will come at the cost of the overall network quality of service. In this paper, we first analyze the default behavior of the IEEE 802.11ah protocol in terms of fairness. We then introduce various percentages of selfish stations and observe how the network’s quality of service in terms of fairness, throughput and packet-loss are affected. After establishing the inherent fairness of IEEE 802.11ah, we analyze applicability of two existing selfish behavior detection algorithms designed for IEEE 802.11 to the IEEE 802.11ah protocol. Due to their poor performance, we propose a new definition of ’selfish behavior’ specifically for IEEE 802.11ah, based on which we present a new algorithm for detecting selfish behavior. To combat selfish behavior and to create a better fairness, throughput and lower packet loss, we consequently present a novel mitigation algorithm called Selfish Stations Quarantine Punishment Algorithm (SSQPA). The proposed algorithm takes advantage of the RAW grouping to isolate selfish stations from the honest stations, thus mitigating the effect of the selfish behavior. SSQPA comes in two variants: honest stations-centric and network-centric. Our experimental results show that both variants can successfully mitigate selfish behavior effects in IEEE 802.11ah networks and either one can be used depending on the goal of the network.
Style APA, Harvard, Vancouver, ISO itp.
38

Hui, Yong Tao, Bing Bing Li, Zhao Tong, Xing Wang Zhong i Hao Liu. "A Short-Delay Multipath Mitigation Algorithm Based on Variable Step-Size LMS Adaptive Filtering". Applied Mechanics and Materials 571-572 (czerwiec 2014): 368–75. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.368.

Pełny tekst źródła
Streszczenie:
The multipath in the inter-spacecraft microwave ranging system is the short-delay multipath generally. The performance of existing multipath mitigation algorithms degrade in the short-delay scenario, and therefore an adaptive filtering algorithm based on variable step-size LMS is exploited for estimating the parameters of multipath signals. Firstly, the equation of variable step-size LMS is deduced. Then, the signals parameters are estimated recursively though the adaptive filtering algorithm. Multipath elimination is performed by substracting the estimated multipath effects from the measured correlation function. Simulation results validate that the proposed method is superior to the existing algorithms in the aspect of convergence rate and ranging accuracy for the short delay multipath. Therefore, it is a viable solution for achieving high accuracies measurements in microwave ranging system with short-delay multipath.
Style APA, Harvard, Vancouver, ISO itp.
39

Son, Pyo-Woong, Jongmin Park, Jaewon Yu, Suhui Jeong, Younghoon Han i Tae Hyun Fang. "Skywave Detection and Mitigation for the MF R-Mode Continuously Operating Reference Station". Sensors 23, nr 11 (24.05.2023): 5046. http://dx.doi.org/10.3390/s23115046.

Pełny tekst źródła
Streszczenie:
There is an increasing need for an independent terrestrial navigation system, owing to the increasing reliance on global navigation satellite systems (GNSS). The medium-frequency range (MF R-Mode) system is considered a promising alternative; however, the skywave effect caused by ionospheric changes at night can degrade its positioning accuracy. To address this problem, we developed an algorithm to detect and mitigate the skywave effect on MF R-Mode signals. The proposed algorithm was tested using data collected from Continuously Operating Reference Stations (CORS) monitoring the MF R-Mode signals. The skywave detection algorithm is based on the signal-to-noise ratio (SNR) induced by the groundwave and skywave composition, whereas the skywave mitigation algorithm was derived from the I and Q components of the signals obtained through IQ modulation. The results demonstrate a significant improvement in the precision and standard deviation of the range estimation using CW1 and CW2 signals. The standard deviations decreased from 39.01 and 39.28 m to 7.94 and 9.12 m, respectively, while the precision (2-sigma) increased from 92.12 and 79.82 m to 15.62 and 17.84 m, respectively. These findings confirm that the proposed algorithms can enhance the accuracy and reliability of MF R-Mode systems.
Style APA, Harvard, Vancouver, ISO itp.
40

Yao, Yuan, i Longyun Kang. "The Virtual Harmonic Power Droop Strategy to Mitigate the Output Harmonic Voltage of the Inverter". Energies 11, nr 9 (22.08.2018): 2196. http://dx.doi.org/10.3390/en11092196.

Pełny tekst źródła
Streszczenie:
The harmonic voltage issue becomes a challenge for a distributed generation system. Considering that droop control is the most common control algorithm used in the distributed system, a virtual harmonic power droop strategy which aims to mitigate the harmonic voltage is proposed in this paper. First, the conventional droop control is analyzed. Based on that concept, the virtual power algorithm is introduced. Second, the output harmonic voltage issue and the mathematical model of the inverter are presented. In addition, the second-order generalized integrator is briefly discussed. Third, taking into consideration the algorithms and models presented, a virtual harmonic power droop strategy is proposed to implement the harmonic voltage mitigation. In this algorithm, signals in fundamental frequency and harmonic frequency are separated with the help of second-order generalized integrators. Unlike the conventional voltage–current dual loop structure which is used to mitigate system harmonics, this method only needs the virtual power feedback to mitigate the harmonic voltage. Based on these features, the system’s control structure is simplified. Simulation and experimental results verified the harmonic voltage mitigation ability of the proposed strategy.
Style APA, Harvard, Vancouver, ISO itp.
41

Aldhyani, Theyazn H. H., i Hasan Alkahtani. "Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments". Sensors 22, nr 13 (21.06.2022): 4685. http://dx.doi.org/10.3390/s22134685.

Pełny tekst źródła
Streszczenie:
Cloud computing is currently the most cost-effective means of providing commercial and consumer IT services online. However, it is prone to new flaws. An economic denial of sustainability attack (EDoS) specifically leverages the pay-per-use paradigm in building up resource demands over time, culminating in unanticipated usage charges to the cloud customer. We present an effective approach to mitigating EDoS attacks in cloud computing. To mitigate such distributed attacks, methods for detecting them on different cloud computing smart grids have been suggested. These include hard-threshold, machine, and deep learning, support vector machine (SVM), K-nearest neighbors (KNN), random forest (RF) tree algorithms, namely convolutional neural network (CNN), and long short-term memory (LSTM). These algorithms have greater accuracies and lower false alarm rates and are essential for improving the cloud computing service provider security system. The dataset of nine injection attacks for testing machine and deep learning algorithms was obtained from the Cyber Range Lab at the University of New South Wales (UNSW), Canberra. The experiments were conducted in two categories: binary classification, which included normal and attack datasets, and multi-classification, which included nine classes of attack data. The results of the proposed algorithms showed that the RF approach achieved accuracy of 98% with binary classification, whereas the SVM model achieved accuracy of 97.54% with multi-classification. Moreover, statistical analyses, such as mean square error (MSE), Pearson correlation coefficient (R), and the root mean square error (RMSE), were applied in evaluating the prediction errors between the input data and the prediction values from different machine and deep learning algorithms. The RF tree algorithm achieved a very low prediction level (MSE = 0.01465) and a correlation R2 (R squared) level of 92.02% with the binary classification dataset, whereas the algorithm attained an R2 level of 89.35% with a multi-classification dataset. The findings of the proposed system were compared with different existing EDoS attack detection systems. The proposed attack mitigation algorithms, which were developed based on artificial intelligence, outperformed the few existing systems. The goal of this research is to enable the detection and effective mitigation of EDoS attacks.
Style APA, Harvard, Vancouver, ISO itp.
42

Patil, Sagargouda S., i H. A. Dinesha. "URL Redirection Attack Mitigation in Social Communication Platform using Data Imbalance Aware Machine Learning Algorithm". Indian Journal of Science and Technology 15, nr 11 (21.03.2022): 481–88. http://dx.doi.org/10.17485/ijst/v15i11.1813.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Bender, Emmanuel, Joseph B. Bernstein i Duane S. Boning. "Mitigation of Thermal Stability Concerns in FinFET Devices". Electronics 11, nr 20 (14.10.2022): 3305. http://dx.doi.org/10.3390/electronics11203305.

Pełny tekst źródła
Streszczenie:
Here, we developed a procedure for mitigating thermal hazards in packaged FinFET devices. A monitoring system was installed into devices, based on self-heating impact analysis in the system and device levels, to allow for the observation and alerting of chip temperature and reliability risks. A novel algorithm for reducing measurement noise by means of temperature fluctuation compensation and the filtering of invalid data is presented and demonstrated on packaged devices. The results presented in this work show that the proposed techniques make exceptional improvements to sensory accuracy. Using this methodology enables the mitigation of thermal concerns in systems, including large data servers, and accelerates development of smart resource allocation formations.
Style APA, Harvard, Vancouver, ISO itp.
44

Nweke, J. N., A. G. Gusau i L. M. Isah. "Reliability and protection in distribution power system considering customer-based indices". Nigerian Journal of Technology 39, nr 4 (24.03.2021): 1198–205. http://dx.doi.org/10.4314/njt.v39i4.28.

Pełny tekst źródła
Streszczenie:
A stable and reliable electric power supply system is a pre-requisite for the technological and economic growth of any nation. Nigeria's power supply has been experiencing incessant power interruptions caused by a failure in the distribution system. This paper developed a system planning approach as part of the key mitigation strategies for improved reliability and protection of the distribution network. The developed algorithm is tested using 33kV feeder supplying electricity to Kaura-Namoda, Zamfara State, Nigeria. A customer-based reliability index was used as a tool to evaluate the reliability assessment of the feeder test system. The result showed that alternative 3 gives better results in terms of improvement of the system average interruption duration index (SAIDI), which in turn gives the minimum interrupted energy. Also, it is found that a greater number of sectionalizing switches do not give better results. It is very important to place the sectionalizing switches at a strategic location. If it is located at such points that will facilitate to sectionalize the faulty sections faster and to make the supply available to the unfaulty part of the network. Hence the utility company should apply this mitigation algorithm for system reliability improvement, depending on their needs and requirements. Thus, utilities can optimize network performance and better serve customers by adopting mitigation strategies in addressing trouble-prone areas to achieve a stable and reliable supply Keywords: distribution system; reliability; reliability indices; system performance evaluation; protection system; mitigation algorithms and sectionalizing switches
Style APA, Harvard, Vancouver, ISO itp.
45

Steeb, Jan-Willem W., David B. Davidson i Stefan J. Wijnholds. "Mitigation of Non-Narrowband Radio Frequency Interference Incorporating Array Imperfections". Journal of Astronomical Instrumentation 08, nr 01 (marzec 2019): 1940013. http://dx.doi.org/10.1142/s2251171719400130.

Pełny tekst źródła
Streszczenie:
In a recent paper, we presented a non-narrowband spatial radio frequency interference (RFI) mitigation algorithm for radio astronomy arrays. The algorithm constructs a 2nd-order filter by combining a 1st-order subspace subtraction method with a non-narrowband signal model. The model is based on the assumption that the frequency response is approximately flat and that the array is calibrated. In this paper, we consider the effects of array imperfections such as unknown complex gains and mutual coupling, incorporate these into the non-narrowband signal model and extend the RFI mitigation algorithm to include a calibration step. With a calibration step and no mutual coupling, the proposed algorithm was able to process twice the bandwidth per channel when compared to conventional narrowband techniques. This performance declines to 1.6 times greater bandwidth when the effect of mutual coupling is included. The evaluation of the algorithm was done using the layout of a Low Frequency Array (LOFAR) High Band Antenna (HBA) station and a digital audio broadcast recorded with a software defined radio.
Style APA, Harvard, Vancouver, ISO itp.
46

Hong, Haisheng, i Quanyuan Jiang. "Model Predictive Control-Based Coordinated Control Algorithm with a Hybrid Energy Storage System to Smooth Wind Power Fluctuations". Energies 12, nr 23 (3.12.2019): 4591. http://dx.doi.org/10.3390/en12234591.

Pełny tekst źródła
Streszczenie:
Stochastically fluctuating wind power has an escalating impact on the stability of power grid operations. To smooth out short- and long-term fluctuations, this paper presents a coordinated control algorithm using model predictive control (MPC) to manage a hybrid energy storage system (HESS) consisting of ultra-capacitor (UC) and lithium-ion battery (LB) banks. In the HESS-computing period, the algorithm minimizes HESS operating costs in the subsequent prediction horizon by optimizing the time constant of a flexible first-delay filter (FDF) to obtain the UC power output. In the LB-computing period, the algorithm keeps the optimal time constant of the FDF from the previous period to directly obtain the power output of the UC bank to minimize the power output of the LB bank in the next prediction horizon. A relaxation technique is deployed when the problem is unsolvable. Thus, the fluctuation mitigation requirements are fulfilled with a large probability even in extreme conditions. A state-of-charge (SOC) feedback control strategy is proposed to regulate the SOC of the HESS within its proper range. Case studies and quantitative comparisons demonstrate that the proposed MPC-based algorithm uses a lower power rating and storage capacity than other conventional algorithms to satisfy one-minute and 30-min fluctuation mitigation requirements (FMR).
Style APA, Harvard, Vancouver, ISO itp.
47

Dai, Shaojun, Xuehua Li, Zhichao Bu, Yajun Chen, Jianxin He, Minghua Li i Maojie Xiong. "Signal Simulation of Dual-Polarization Weather Radar and Its Application in Range Ambiguity Mitigation". Atmosphere 13, nr 3 (8.03.2022): 432. http://dx.doi.org/10.3390/atmos13030432.

Pełny tekst źródła
Streszczenie:
In this paper, a dual-polarization weather radar echo signal simulation method is proposed for the evaluation of the performance enhancement of dual-polarization weather radar systems, the optimization of signal processing algorithms and the improvement of scanning strategies. The actual weather radar base data are used in the simulation as the reference weather scene, which avoids using a complex algorithm for weather modeling. Moreover, based on radar weather equations, the radar system parameters are added into the radar echo signal modeling to establish the relationship between the simulated echo signal and radar system. As a result, the final simulated echo signal not only shows both the time and frequency domain characteristics of the weather target, but also includes the effects of the important performance of the dual-polarization weather radar system. In addition, to evaluate the performance of range ambiguity mitigation using phase coding and batch working modes, two different simulation methods for the radar signal are established on the method above; one is for batch working mode with long-PRT (pulse repetition time) and short-PRT transmission and receiving, and the other is for phase-coded mode with phase-coded transmission and phase-uncoded receiving. Under the same weather scene, the observation of these two different methods of range ambiguity mitigation are simulated and compared. Results show that the performance of the phase coding mode for mitigating range ambiguity is better than that of the batch mode. Obviously, the simulation method can be used to directly show the observation of different algorithms for mitigation range ambiguity under the same weather process, and quickly compare and evaluate the algorithm’s performance, which is not possible for real radars.
Style APA, Harvard, Vancouver, ISO itp.
48

Olumoyin, K. D., A. Q. M. Khaliq i K. M. Furati. "Data-Driven Deep-Learning Algorithm for Asymptomatic COVID-19 Model with Varying Mitigation Measures and Transmission Rate". Epidemiologia 2, nr 4 (24.09.2021): 471–89. http://dx.doi.org/10.3390/epidemiologia2040033.

Pełny tekst źródła
Streszczenie:
Epidemiological models with constant parameters may not capture satisfactory infection patterns in the presence of pharmaceutical and non-pharmaceutical mitigation measures during a pandemic, since infectiousness is a function of time. In this paper, an Epidemiology-Informed Neural Network algorithm is introduced to learn the time-varying transmission rate for the COVID-19 pandemic in the presence of various mitigation scenarios. There are asymptomatic infectives, mostly unreported, and the proposed algorithm learns the proportion of the total infective individuals that are asymptomatic infectives. Using cumulative and daily reported cases of the symptomatic infectives, we simulate the impact of non-pharmaceutical mitigation measures such as early detection of infectives, contact tracing, and social distancing on the basic reproduction number. We demonstrate the effectiveness of vaccination on the transmission of COVID-19. The accuracy of the proposed algorithm is demonstrated using error metrics in the data-driven simulation for COVID-19 data of Italy, South Korea, the United Kingdom, and the United States.
Style APA, Harvard, Vancouver, ISO itp.
49

Ali, A., B. Chen, W. Raza, A. Ali i H. Li. "An Intelligent Detoxification Function of Liver Algorithm-Partial Transmit Sequence (IDFLA-PTS) for the Reduction of Peak to Average Power Ratio in Underwater Acoustic OFDM Communication". Engineering, Technology & Applied Science Research 12, nr 1 (12.02.2022): 8136–42. http://dx.doi.org/10.48084/etasr.4655.

Pełny tekst źródła
Streszczenie:
Intelligent algorithms in artificial intelligence have brought several benefits to digital signal processing. The boom in machine learning and intelligent systems provides new perspectives and methods to solve many research problems in Underwater Acoustic (UWA) Orthogonal Frequency Divisional Multiplexing (OFDM) communication. Partial transmit sequence is a tremendous technique for the mitigation of high Peak-to-Average Power Ratio (PAPR) in OFDM communication systems, but finding the optimum phase factors has still a few problems. In this paper, a Partial Transmit Sequence (PTS) based on an Intelligent Detoxification Function of Liver Algorithm-Partial Transmit Sequence (IDFLA-PTS) is proposed for the mitigation of PAPR in the UWA OFDM communication systems. This algorithm reduces the PAPR and the complexity of the proposed UWA OFDM model. The IDFLA-PTS is also compared with the Genetic Algorithm-Partial Transmit Sequence (GA-PTS). Besides this, the Bit Error Rate (BER) performance of the IDFLA-PTS is shown when a High Power Amplifier (HPA) is used for the BELLHOP channel model. The experimental results of the proposed IDFLA-PTS method achieved nearly optimum results with fair complexity as compared to GA-PTS and boosted the BER performance.
Style APA, Harvard, Vancouver, ISO itp.
50

Chen, Qian, Ye Cao, Min Jie Guo i Zheng Rong Tong. "A New Phase Noise and Channel Estimate Method in CO-OFDM System". Applied Mechanics and Materials 130-134 (październik 2011): 2936–39. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2936.

Pełny tekst źródła
Streszczenie:
High phase noise and low phase noise have been consideration in CO-OFDM systems, respectively. The hybrid mitigation algorithm is optimized to approach to high phase noise and low phase noise environment, and a hybrid half-blind phase noise compensation algorithm is proposed, which could be suitable to shifty DFB laser linewidth. 4QAM and 16QAM are used to modulate binary signal. The new proposed phase noise compensation algorithm is considered a mitigation method which has the ability of half-blind self-adaptation. It deduces the coefficient matrix in high and low phase noise compensation matrix and could improve performance under high or low modulation index situation.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii