Showing 561 - 580 results of 628 for search '"At the Hop"', query time: 0.03s Refine Results
  1. 561

    Cache replacement strategy based on content value by Dan HUANG, Rongfang SONG

    Published 2018-11-01
    “…The cache replacement mechanism is one of the important research issues of the content center network.Considering the limited cache space,the reasonable replacement of the cache content becomes a key factor affecting the overall performance of the network.Therefore,a cache replacement scheme based on content value was designed.Considering the dynamic popularity of content,the cost of caching,and the time of the most recently requested,a more realistic content value function was built,and an effective content storage and replacement scheme was designed based on the content value function.Specifically,when the cache space was insufficient,the existing cache contents were replaced according to the value from small to large.Simulation results show that compared with the traditional replacement algorithms LRU,LFU and FIFO,the proposed scheme effectively improves the content cache hit rate of network nodes and reduces the average hops of users’ content acquisition.…”
    Get full text
    Article
  2. 562

    Humidity Sensing Properties of Surface Modified Polyaniline Metal Oxide Composites by S. C. Nagaraju, Aashis S. Roy, J. B. Prasanna Kumar, Koppalkar R. Anilkumar, G. Ramagopal

    Published 2014-01-01
    “…The temperature dependent conductivity shows that the conductivity is due to the hopping of polarons and bipolarons. These composites show negative thermal coefficient (α) behavior as a function of temperature, which is characteristic behavior of semiconducting materials. …”
    Get full text
    Article
  3. 563

    Dynamic cache size transfer scheme based on replacement rate in content centric networking by EGuo-dong G, UOYun-fei G, ANJu-long L, IUCai-xia L

    Published 2015-05-01
    “…How to allocate an appropriate cache size to each router and efficiently utilize the finite storage resources poses challenges to the caching performance in CCN (content centric networking).On the basis of homogeneous cache allocation,a dynamic cache size transfer scheme based on replacement rate is proposed.In the scheme,the rationality of the cache size transfer is demonstrated firstly.And then,according to the level of actual demand for the storage resources,the cache transfer procedure is implemented dynamically on the nodes which have different caching states.The idle cache resources are temporarily transferred to the overload node to reduce cache miss rate and enhance the caching gain.The simulation results show that,with a small amount of additional cost,the proposed scheme can efficiently decrease the re-quest hops,increase the cache hit ratio,and improve the overall utilization of storage resources.…”
    Get full text
    Article
  4. 564

    Nanosecond level time synchronization in datacenter network based on Telemetry architecture by Qianli ZHANG, Chaofan ZHANG, Jilong WANG, Xiangyu TANG, Zhengchen SHEN, Hui WANG

    Published 2021-10-01
    “…To solve the problems of the traditional local time synchronization architecture being disconnected from centralized management, requiring extra interaction overhead, meanwhile with less time data susceptible to outliers, the nanosecond level time synchronization system was proposed based on Telemetry for the high-precision time synchronization requirements of data center networks.Combined with the outlier factor detection algorithm, timestamp information within the background traffic of the data center was collected, the large amount of time information reported was processed and analyzed, and a centralized automatic synchronization with nanosecond level precision was eventually achieved, which was convenient for subsequent global network scheduling.The proposed system was implemented and evaluated on the programmable switch.Experimental results show that between multiple hops and at different link rates, the nodes can achieve high-precision time synchronization at the nanosecond level.…”
    Get full text
    Article
  5. 565

    Emergent interaction-induced topology in Bose-Hubbard ladders by David Wellnitz, Gustavo A. Domínguez-Castro, Thomas Bilitewski, Monika Aidelsburger, Ana Maria Rey, Luis Santos

    Published 2025-01-01
    “…We investigate the quantum many-body dynamics of bosonic atoms hopping in a two-leg ladder with strong on-site contact interactions. …”
    Get full text
    Article
  6. 566

    Novel UWB communication pulse design method by LIN Zhi-yuan, WEI Ping

    Published 2006-01-01
    “…The comparison were presented for the bit error rate (BER) performance analyses of the pulse position modula- tion time hopping ultra wideband (PPM TH UWB) impulse radio (IR) communication system employing the iterative combination pulse or the second derivative Gaussian pulse in the additive white Gaussian noise (AWGN) channel, multi- ple user interference (MUI) and multiple path channel. …”
    Get full text
    Article
  7. 567

    Data Aggregation in Heterogeneous Wireless Sensor Networks by Using Local Tree Reconstruction Algorithm by Zhaohui Zhang, Jing Li, Xiaoli Yang

    Published 2020-01-01
    “…First, the algorithm divides the nodes of the network into different layers by their hops and chooses different numbers of nodes as relay nodes in different layers. …”
    Get full text
    Article
  8. 568

    A Proposed IoT-Enabled Smart Waste Bin Management System and Efficient Route Selection by Asim Zeb, Qurban Ali, Muhammad Qaiser Saleem, Khalid Mahmood Awan, Ali Saeed Alowayr, Jamal Uddin, Saleem Iqbal, Faisal Bashir

    Published 2019-01-01
    “…The proposed scheme considers the interference level, the length of the routing path, and the number of hops along the path. The simulation results show that the proposed scheme outperforms current schemes.…”
    Get full text
    Article
  9. 569

    Indoor RFID localization algorithm based on adaptive bat algorithm by Liangbo XIE, Yuyang LI, Yong WANG, Mu ZHOU, Wei NIE

    Published 2022-08-01
    “…Aiming at the problem that long time-consuming and poor positioning accuracy using geometric method in the traditional UHF RFID indoor localization algorithm, an RFID indoor positioning algorithm based on adaptive bat algorithm (ABA) was proposed.Firstly, the phase of multiple frequency points was obtained by frequency hopping technology, and the location evaluation function of bat algorithm was established based on the angle information of multiple signal classification (MUSIC) algorithm and the distance information of clustering.Secondly, the bat location was initialized by tent reverse learning to increase the diversity of the population, and the adaptive weight factor was introduced to update the bat location.Finally, the target position was searched iteratively based on the position evaluation function to achieve fast centimeter level positioning.Experimental results show that the median localization error of the proposed algorithm is 7.74 cm, and the real-time performance is improved by 12 times compared with the traditional positioning algorithm based on the Chinese remainder theorem (CRT).…”
    Get full text
    Article
  10. 570

    A Rendezvous Scheme for Self-Organizing Cognitive Radio Sensor Networks by Junhyung Kim, Gisu Park, Kijun Han

    Published 2014-01-01
    “…In this paper, we propose a hopping sequence algorithm to provide an effective method to implement a rendezvous without relying on a dedicated control channel. …”
    Get full text
    Article
  11. 571

    Impedance Spectroscopy, AC Conductivity, and Conduction Mechanism of Iron(II) Chloride/Polyvinyl Alcohol/Polyvinylpyrrolidone Polymer Blend by Huda AlFannakh

    Published 2022-01-01
    “…The conduction mechanism of the pure blend sample was based on a hopping mechanism, whereas the ionic conduction was applied to the blend composite sample. …”
    Get full text
    Article
  12. 572

    Maximizing Lifetime of Three-Dimensional Corona-Based Wireless Sensor Networks by Changqing Xia, Nan Guan, Qingxu Deng, Wang Yi

    Published 2014-05-01
    “…Then, we propose two strategies to configure nodes outside the first layer: the equal energy strategy (EES) which minimizes the number of hops to transmit data from sensor nodes to the sink and the local optimal energy (LOE) which stands for the fact that under this strategy each individual layer reaches its minimal energy consumption. …”
    Get full text
    Article
  13. 573

    A Self-Adaptive and Link-Aware Beaconless Forwarding Protocol for VANETs by Changle Li, Yun Chen, Xiaolei Han, Lina Zhu

    Published 2015-08-01
    “…The results show that the SLBF makes a great improvement in the delivery ratio, the end-to-end delay, and the average hops.…”
    Get full text
    Article
  14. 574

    Research on several key technologies of satellite Internet by Gengxin ZHANG, Yunfeng WANG, Xiaojin DIGN, Tao HONG, Ziwei LIU, Chen ZHANG

    Published 2021-08-01
    “…Satellite Internet has the ability of global seamless coverage, which will be an important part of the future land-sea-air-space integrated network.Firstly, the architecture of satellite Internet was discussed, which included the general composition of the system, networking mode, working process, etc.Secondly, the methods of modeling broadband and narrowband traffic were proposed to extract the uneven space-time distribution characteristics of traffic for satellite Internet.Then, the co-frequency interference of spectrum-sharing was analyzed, showing that there would be more serious co-frequency interference among different non-geostationary satellite orbit (NGSO) constellations in the future.Next, the schemes of both beamforming design for low earth orbit satellite and beam-hopping design for high orbit satellite were explored, which could significantly improve the system capacity through efficient mining of space-domain resources.Finally, the development prospect of several technologies of satellite Internet were given.…”
    Get full text
    Article
  15. 575

    Erasure channel modelling–based secure bit allocation schemes for multipath routing in wireless sensor networks by Zhenhua Yuan, Chen Chen, Ye Jin

    Published 2016-12-01
    “…The performance analysis shows that the probability of the secure bit allocation increases along with the number of multipaths and decreases along with the number of hops per path and eavesdroppers. Simulation results are presented to illustrate the proposed algorithms.…”
    Get full text
    Article
  16. 576

    Resilience and Resistance Among Migrant Male Domestic Workers in South Africa by David du Toit

    Published 2023-08-01
    “…Decision-making processes regarding migration to South Africa, engaging in job-hopping, and engaging in multiple piece jobs are examples of the resilience and reworking strategies used by male domestic workers to improve their living conditions. …”
    Get full text
    Article
  17. 577

    Design and Implementation of a Mobile Multihop WSN for AGV System by Jiaqi Zhang, Molin Jia, Noriyoshi Yamauchi, Takaaki Baba

    Published 2010-01-01
    “…It is also a topology-agnostic protocol which has no knowledge of neighbors, routes, or next hops. From the results of the 16-nodes simulation, S-DMDS protocol is proved to be efficient exchange data timely between the devices of AGV system in mobile multihop situation. …”
    Get full text
    Article
  18. 578

    Syntactic Analysis of Movement Transformation in Bahasa Indonesia by Ruly Adha

    Published 2022-12-01
    “…Some types of movement transformation that were applied in Bahasa Indonesia were Affix Hopping, Interrogative (Aux Movement), Wh-Movement, Passive Transformation, Dative Movement, Topicalization, Particle Movement, and Relative Movement. …”
    Get full text
    Article
  19. 579

    1D-Concatenate based channel estimation DNN model optimization method by Min LU, Zehao QIN, Zhihui CHEN, Min ZHANG, Guangxue YUE

    Published 2023-04-01
    “…In order to improve the channel estimation accuracy of DNN model in wireless communication, a DNN model optimization method based on 1D-Concatenate was proposed.In this method, Concatenate performs one-dimensional data transformation, the DNN model was introduced by hopping connection, the gradient disappearance problem was suppressed, and 1D-Concatenate was used to restore the data features lost during network training to improve the accuracy of DNN channel estimation.In order to verify the effectiveness of the optimization method, a typical DNN-based wireless communication channel estimation model was selected for comparative simulation experiments.Experimental results show that the estimated gain of the existing DNN model can be increased by 77.10% by the proposed optimization method, and the channel gain can be increased by up to 3 dB under high signal-to-noise ratio.This optimization method can effectively improve the channel estimation accuracy of DNN model in wireless communication, especially the improvement effect is significant under high signal-to-noise ratio.…”
    Get full text
    Article
  20. 580

    Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key by Xincheng YAN, Yue CHEN, Hongyong JIA, Yanru CHEN, Xinyue ZHANG

    Published 2018-05-01
    “…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
    Get full text
    Article