The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dual-tracer PET imaging may improve overall lesion detectability due to different tracer kinetics. However, separating two tracers in the mixed acquired data is difficult because of unknown individual activity change over time. We proposed an effective and robust method to separate two tracers dynamically, by introducing joint Patlak and Logan analysis in dual-tracer PET imaging. Several patients...
Power generation corporations face challenges from emission reduction targets (ERTs) of government policy from the increasingly explicit demand for carbon dioxide (CO2) emission reduction. CO2 capture and storage (CCS) is receiving considerable attention as a potential greenhouse gas mitigation option for fossil-fuelled power plants. In this study, a mathematical model is built to select the proper...
Anomaly detection of small target in sea clutter based on S.D.E. theory is a cutting-edge research topic. This paper discusses the effect of window size of correlation on anomaly detection. A novel method is presented to adaptively adjust the window size, which results an obvious improvement of performance.
Motivated by the principles of artificial neural networks in artificial intelligence, this paper presents the concept of mathematical templates and method for the construction of the mathematical model (called model for short) through these templates nesting and recursive calls. Based on this idea, a new strategy for the construction and its application of the model in embedded GIS are advanced, first,...
We consider the problem of group key agreement among n parties communicating over an insecure ad hoc network. Firstly, we analyze the state and the problem of existing group key management schemes, and then present a secure, efficient and contributory group key management scheme, which is based on elliptic curve cryptosystems (ECC). The security of our scheme relies on the hardness of elliptic curve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.