-
401
Tropospheric ozone sensing with a differential absorption lidar based on a single CO<sub>2</sub> Raman cell
Published 2025-01-01Get full text
Article -
402
Application research on distributed Zabbix network monitoring system
Published 2013-09-01“…With the increasing number of server,to ensure the normal operation of the server and application services becomes more and more complex.The importance of server monitoring system in modern server management was explained.With Zabbix,a distributed monitoring and control system was deployed,realizing some important application services monitoring in Windows and Linux environment with distributed network monitor and control system.The principle and configuration of the monitoring of Web Server,Database and DNS Server were introduced.Finally,the use cases using in the network center were shown.…”
Get full text
Article -
403
GlobeSen:an interconnection framework of information-centric IoT
Published 2017-09-01“…Interconnection framework of information-centric IoT:GlobeSen was proposed,which implemented the efficient interconnection of sensor networks and Internet.According to the characteristic of weak network elements,such as wireless sensor nodes,and the spatio-temporal relationship of sensory data,an information-centric network protocol for sensor networks NDNs was designed.Then,a protocol translation mechanism in the gateway was designed to interconnect NDNs and NDNx that running in Internet.A prototype by using the TelosB wireless sensor node and ARM board was implemented,and the proposed design by deploying the prototype in the environment was evaluated.…”
Get full text
Article -
404
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…In body sensor networks, both wearable and implantable biosensors are deployed in a patient body to monitor and collect patient health record information. …”
Get full text
Article -
405
Balancing Profit and Cultural Heritage: Multi-Objective Dynamic Pricing for Hanfu Using Deep Deterministic Policy Gradient
Published 2025-01-01“…MOHPSO-DDPG, Multi-Objective Particle Swarm Optimization (MOPSO), and Multi-Objective Hybrid Particle Swarm Optimization (MOHPSO) were each deployed to interact with the environment to explore the Pareto front of pricing decisions. …”
Get full text
Article -
406
End of the INF Treaty: Are We Entering a New Cold War Era?
Published 2021-06-01“…The new environment, with regional and global crises and massive armament by the global powers, including missile defense systems and hypersonic missiles, would endanger possible cooperation.…”
Get full text
Article -
407
Automatic generating regular expression signatures for real network worms
Published 2013-03-01“…Based on the honeypot system Honeybow deployed in Internet, the method was implemented and evaluated by several in-wild worms under real Internet environment. …”
Get full text
Article -
408
Lite-CA based key pre-distribution scheme in wireless sensor network
Published 2009-01-01“…Large-scale sensor nodes were usually deployed in potentially adverse or even hostile environment, so the security in these networks was very important.Due to its constraints on node cost, size and power dissipation, sensor’s energy and capabilities on computation, storage and communication were considerably weak compared with general computers.It leaded to many new challenges for designing of key management protocols in WSN.Therefore, a lite-CA based key pre-distribution scheme was suggested.The traits of CA-based authentication framework and identity-based authentication framework were combined by this scheme.Further, the scheme was efficiently implemented based on quadratic residue theory.…”
Get full text
Article -
409
Intrusion Detection Systems in Wireless Sensor Networks: A Review
Published 2013-05-01“…Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. …”
Get full text
Article -
410
Research and implementation of pedestrian detection technology based on smart road
Published 2019-09-01“…Aiming at the problem of single detection function,higher cost and lower detection efficiency and reliability for current pedestrian detection,which was mostly realized by vehicle mounted equipment,a pedestrian detection technology based on smart road was proposed.By deploying a large number of low-cost,highly reliable Internet of things devices on the road,real-time detection of pedestrian information in the surrounding environment was realized.Early warning information can be provided to vehicles with very low latency wireless communication technology,which can improve road safety.At present,the prototype of the pedestrian detection system has been developed,and verified by field test,the pedestrian detection system can detect pedestrians effectively.Within the detection range of 4 meters,the accuracy of single device can reach 80%,and the accuracy of multiple cross-deployed devices can reach 100%.…”
Get full text
Article -
411
Secure localization scheme against wormhole attack for wireless sensor networks
Published 2015-03-01“…However, WSNs are often deployed in the hostile environment, in which the attackers can eas-ily disrupt the localization procedure of the nodes. …”
Get full text
Article -
412
Detecting Ground Level Enhancements Using Soil Moisture Sensor Networks
Published 2021-08-01“…Abstract Ground level enhancements (GLEs) are space weather events that pose a potential hazard to the aviation environment through single event effects in avionics and increased dose to passengers and crew. …”
Get full text
Article -
413
Research of connectivity for wireless sensor networks
Published 2009-01-01“…It was crucial to acquire the knowledge of nodes connectivity before management,application and research of wireless sensor networks when they had been deployed in the interest randomly.Under real environment there can be some nodes called unreachable node in interest,which could not communicate with base station for some reason,for ex-ample there are some nodes lie out of the radio range of base station or the interest range.A scheme to make those un-reachable nodes be able to communicate with base station was proposed.At the same time,a judgment algorithm for nodes connectivity based on a normal wireless sensor networks model was proposed.In simulation two-experiment scheme to test the proposed scheme and judgment algorithm were set.From the results of simulation conclude that the proposed scheme can improve nodes’ connectivity in the interest and the proposed algorithm can judge the connectivity efficiently and accurately.…”
Get full text
Article -
414
Research on active defense application based on honeypot
Published 2018-01-01“…Abstract:With the rapid development of financial information technology,cyber security events on the financial system have also increased greatly.Active defense plays an important role in improving the defense level of defined private network.How to quickly and effectively deploy and apply honeypot to capture and attack behavior,analyze the attack intention and raise the threshold of attack is the key to ensure the security of the defined private network.From the perspective of active defense,the advantage of honeypot active defense was analyzed,an active defense and defense filling passive defense integration was designed,and a honeypot within private network experimental environment was set up,the results show that the active defense technology can effectively improve the threshold of the attacker's attack,so as to improve the security level of the whole network.…”
Get full text
Article -
415
Cost-Effective Autonomous Drone Navigation Using Reinforcement Learning: Simulation and Real-World Validation
Published 2024-12-01“…The motivation behind this study is the growing interest in deploying AI in public spaces, particularly in autonomous vehicles such as flying drones, to address challenges in navigation and control. …”
Get full text
Article -
416
Online energy-aware task dispatching with QoS guarantee in edge computing
Published 2021-06-01“…Edge computing can provide users with low-latency and high-bandwidth services by deploying many edge servers at the network edge.However, a large number of deployments also bring problems of high energy consumption.When dispatching tasks from end devices to different edge servers, different energy consumption and delays will occur due to the edge servers’ heterogeneity.Therefore, it is a challenge to select an optimal server among many edge servers for task dispatching so that energy consumption and delay are relatively low.An energy-aware task dispatching method with quality of service (QoS) guarantee based on online learning was proposed.It can obtain real-time information by interacting with the environment to ensure energy consumption was minimal while the QoS was acceptable when dispatching tasks.Experiments show that the proposed method can dispatch tasks efficiently to the optimal server compared with other methods, thereby reducing the edge computing network’s overall energy consumption significantly.…”
Get full text
Article -
417
Innovative IaaS Management System for Sensor Devices and IT Resources
Published 2014-06-01“…We implemented SC and deployed it on actual server environments hosting the existing cloud software. …”
Get full text
Article -
418
HistoNeXt: dual-mechanism feature pyramid network for cell nuclear segmentation and classification
Published 2025-01-01“…Its low computational complexity makes the model well suited for local deployment in resource-constrained environments, thereby supporting a broad spectrum of clinical and research applications. …”
Get full text
Article -
419
Le développement durable est-il bienvenu dans les organisations ? Cas de l’implantation d’un Système de Management Environnemental en Tunisie
Published 2014-07-01“…Their engagement is materialised by deploying environment friendly practices such as environmental management system (EMS). …”
Get full text
Article -
420
Routing metric based on interference measurement for multi-radio multi-channel wireless mesh networks
Published 2013-04-01“…An interference sensing based(ISB)routing metric which mainly depend on the estimation of signal power was introduced for the multi-radio multi-channel wireless mesh networks.The existing metric such like WCETT and iAWARE all have their drawbacks were shown.As shown in the equations of iAWARE,it could be proved that worse background noise corresponds to a better metric value which was imprecise.The iAWARE to make it suited for the environment with background noise was improved,and the isotonic property was regained that the Bellman-Ford and Dijkstra algorithm could be deployed in ISB.The simulation results prove the novel algorithm takes the advantages of higher efficiency both in throughput and end to end delays,compared with the traditional ones HopCount,ETT,WCETT and iAWARE.…”
Get full text
Article