Showing 441 - 460 results of 590 for search '"Deployment environment', query time: 0.08s Refine Results
  1. 441

    Adaptive anti-jamming technologies based on direct sequence spread spectrum and single carrier frequency domain equalization by Fanglin GU, Yuzhen HUANG, Ying ZHAO, Haitao ZHAO, Jibo WEI

    Published 2022-11-01
    “…To solve the performance limitation of direct sequence spread spectrum system in complex multipath environment, an adaptive anti-jamming spread spectrum framework that organically combines single carrier frequency domain equalization (SCFDE) and direct sequence spread spectrum (DSSS) technologies was proposed.The frequency multipath fading was overcame by frequency domain equalization, and the transmission rates and high reliability was reconfigured by deploying variable spread factors.Moreover, the inherent fast Fourier transform process was made full use at the receiver to realize the adjoint detection and analysis of interference intensity, interference type and other information, etc.Then, the frequency domain bearing point online was optimized and selected to improve the adaptability to the interference, especially blocking interference.The simulation results show that the proposed direct spread spectrum waveform based on SCFDE has good communication performance in both Gaussian and multipath environments, and the notch of some frequency bands has little impact on the communication performance, which verifies the effectiveness of anti-jamming by adaptive optimizing information frequency domain bearers.…”
    Get full text
    Article
  2. 442

    Federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain by Ming YANG, Xuexian HU, Qihui ZHANG, Jianghong WEI, Wenfen LIU

    Published 2021-12-01
    “…Federated learning is a new distributed machine learning technology, where training tasks are deployed on user side and training model parameters are sent to the server side.In the whole process, participants do not need to share their own data directly, which greatly avoids privacy issues.However, the trust relationship between mobile users in the learning model has not been established in advance, there is hidden safety when users perform cooperative train with each other.In view of the above problems, a federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain was proposed.The scheme allowed the server side to use subjective logic models to evaluate the reputation of participating mobile users and provided them with credible reputation opinions sharing environment and dynamic access strategy interface based on the technique of smart contract of blockchain.Theoretical and experimental analys is results show that the scheme can enable the server side to select reliable users for training.And it can achieve more fair and effective reputation calculations, which improves the accuracy of federated learning.…”
    Get full text
    Article
  3. 443

    Analysis of renewable energy potential in the Asia-Europe geographical axis by Alexandru Marius Tătar

    Published 2023-12-01
    “…Energy policy instruments play a crucial role in implementing innovation and reducing costs in renewable energy production. Countries deploy various policies to promote renewable energy technologies, such as capital subsidies, feed-in tariffs, tradable certificates, and renewable portfolio standards. …”
    Get full text
    Article
  4. 444

    The role of sensors in smart agriculture by Seyyed Nourkhah, Goran Cirovic, Seyyed Edalatpanah

    Published 2023-12-01
    “…Smart agriculture, also known as precision agriculture, allows farmers to maximize yields using minimal resources such as water, fertilizer, and seeds. By deploying sensors and mapping fields, farmers can begin to understand their crops at a micro-scale, conserve resources, and reduce impacts on the environment. …”
    Get full text
    Article
  5. 445

    An access control scheme for IoT based on smart contracts and CP-ABE by SUN Changxia, ZHANG Chuanhu, LIU Bingjie, YANG Yingjie, BAÇÃO Fernando, LIU Qian

    Published 2024-10-01
    “…As the number of Internet of things (IoT) devices increases, traditional centralized access control solutions are inadequate for the current large-scale IoT environment. Existing distributed access control schemes suffer from high monetary costs and low throughput in processing access requests. …”
    Get full text
    Article
  6. 446

    Dynamic adaptive offloading method based on WPT-MEC by Lin SU, Xiaochao DANG, Zhanjun HAO, Chunrui RU, Xu SHANG

    Published 2022-12-01
    “…For the dynamic fading time-varying channel state information, a dynamic adaptive offloading (RLDO) method based on WPT-MEC was proposed to solve the task offloading and resource optimization problems for multiple users by combining wireless power transmission (WPT) technology and mobile edge computing (MEC).The wireless power transmission technology can provide energy to wireless end-user (WEU) and effectively alleviate the problem of limited energy supply from conventional batteries.To maximize the resource utilization, a wireless powered MEC network model was designed where the energy collected by the wireless end-user from the wireless access point (AP) was stored in a rechargeable battery, and then this energy was used for task computation or task offloading.The approach performed real-time offloading decisions through a fully connected deep neural networks (DNN) deployed in the MEC server.A fully binary offloading strategy was used for the offloading decision.Simulation results show that the computation rate of the method can still be maintained above 92% in a multi-user time-varying wireless channel-oriented environment.Compared with the basic method, it has great advantages in improving the calculation rate, reducing the delay and energy consumption,and effectively reduces computational complexity.…”
    Get full text
    Article
  7. 447

    Design of Hydrological Telemetry System Based on NB-IoT Communication Technology by ZHANG Xinmeng, LIU Shuyang, WANG Canhui

    Published 2022-01-01
    “…With the progress in society and information technology, the rapid emergency response capability for urban flood,drought,and wind prevention needs to be improved.Given the demand, this paper adopts the low-power Internet of Things (NB-IoT) communication technology to design water and rain telemetry terminals in the way of product integration instead of traditional system integration.This technology further reduces the dependence of the equipment on the external environment and improves the stability and reliability of the front-end data acquisition of the hydrological telemetry system,making it possible to deploy the hydrological telemetry terminal for monitoring on a large scale.According to urban emergency prevention and control requirements,Guangzhou Nansha District Flood and Drought Prevention Headquarters Office constructed a new generation of hydrological telemetry system with low cost,strong scalability,and high reliability.By quickly covering urban flood risk points,the system can master real-time water and rain data in the key position of Nansha District to assist the emergency decision,improve emergency response capabilities,and realize the precise distribution of flood control forces,thus reducing the property losses for urban residents.The results show that the hydrological telemetry system based on NB-IoT communication technology applied on a large scale for the first time in Guangzhou can provide efficient data support for dealing with various disasters in flood seasons.…”
    Get full text
    Article
  8. 448

    Hadoop-Based Painting Resource Storage and Retrieval Platform Construction and Testing by Chenhua Zu

    Published 2021-01-01
    “…The Hadoop development environment is installed and deployed, and functional and performance tests are conducted on the contents implemented in this system. …”
    Get full text
    Article
  9. 449

    Nutrition and Helicobacter pylori: Host Diet and Nutritional Immunity Influence Bacterial Virulence and Disease Outcome by Kathryn P. Haley, Jennifer A. Gaddy

    Published 2016-01-01
    “…In this review we will discuss how H. pylori is able to create a replicative niche within the hostile host environment by subverting and modifying the host-generated immune response as well as successfully competing for limited nutrients such as transition metals by deploying an arsenal of metal acquisition proteins and virulence factors. …”
    Get full text
    Article
  10. 450

    Holes Detection in Anisotropic Sensornets: Topological Methods by Wei Wei, Xiao-Lin Yang, Pei-Yi Shen, Bin Zhou

    Published 2012-10-01
    “…Wireless sensor networks (WSNs) are tightly linked with the practical environment in which the sensors are deployed. Sensor positioning is a pivotal part of main location-dependent applications that utilize sensornets. …”
    Get full text
    Article
  11. 451

    Applying the metacombination approach in order to design the native model of new product development by seyed Rohollah faraji, Hoseain Adab, jalal HaghighatMonfared

    Published 2024-12-01
    “…The proposed framework, called Gateway-Completed Phase, integrates the development process with design thinking and lean deployment approaches. The framework consists of six steps and five gates, and focuses on critical thinking to help entrepreneurs avoid mental traps and make sound decisions. …”
    Get full text
    Article
  12. 452

    Identifying and Evaluating the Components of Human Resource Competence in the Era of Digital Transformation by Mahdieh Abidi, Rashid Zolfaghari Zafarani, Masoud Haghighi

    Published 2024-09-01
    “…Digital transformation is the acquisition and deployment of digital technologies in such a way that products, business processes, sales channels, or value chains; in other words, business models are redesigned and transformed (Hess et al, 2016).Karamipur (2023) investigated the design of the model of artificial intelligence competencies on organizational performance by considering business-to-business marketing capabilities. …”
    Get full text
    Article
  13. 453

    Intelligent recognition algorithm and application of coal mine overhead passenger device based on multiscale feature fusion by Beijing XIE, Heng LI, Hang DONG, Zheng LUAN, Ben ZHANG, Xiaoxu LI

    Published 2024-12-01
    “…Partial implementation approaches for deploying the video media stream into the cmopd intelligent recognition system were provided. …”
    Get full text
    Article
  14. 454

    A novel lightweight Machine Learning framework for IoT malware classification based on matrix block mean Downsampling by Mahmoud E. Farfoura, Ibrahim Mashal, Ahmad Alkhatib, Radwan M. Batyha, Didi Rosiyadi

    Published 2025-01-01
    “…Despite that machine learning is incredibly successful at detecting malware, it cannot be deployed in IoT environment due to its computation complexity and high processing resources it demands. …”
    Get full text
    Article
  15. 455

    Modeling of Reinforced Concrete Beams Exposed to Fire by Using a Spectral Approach by Rui Sun, Bo Xie, Ricardo Perera, Yongjun Pan

    Published 2018-01-01
    “…Thermal behavior is captured using a two-dimensional finite element (FE) model in an environment of elevated temperatures, while a one-dimensional spectral numerical model is formulated to simulate the mechanical response of the beam under increasing loads. …”
    Get full text
    Article
  16. 456
  17. 457

    RESEARCH ON UNDERWATER COMMUNICATION AND SIMULATED ASSESSMENT OF MAIN PARAMETERS by Phan Thanh Minh, Nguyễn Ngọc Bình

    Published 2018-07-01
    “…The simplest and most effective way is using a cable connection between the transmitter and the receiver, which ensures high quality of signal and minimizes unwanted effects of the environment. However, it has disadvantages such as high cost of deploying communication, difficult maintenance, and particularly, if information exchanges take place at great depths and in mobile cases it will be very complex to ensure such exchanges. …”
    Get full text
    Article
  18. 458

    TSMC: A Novel Approach for Live Virtual Machine Migration by Jiaxing Song, Weidong Liu, Feiran Yin, Chao Gao

    Published 2014-01-01
    “…Cloud computing attracted more and more attention in recent years, and virtualization technology is the key point for deploying infrastructure services in cloud environment. …”
    Get full text
    Article
  19. 459

    Quality of experience provisioned mobile streaming protocol for the hyper-connected Internet of Things devices over the heterogeneous wireless access networks by Min Ho Park, Jun Kyun Choi, JungYul Choi

    Published 2016-09-01
    “…5G-based hyper-connected Internet of Things environment is emerging, where various connectivities such as BlueTooth, WiFi, and 3/4/5G are provided. …”
    Get full text
    Article
  20. 460

    Implementing a DVB-T/H Receiver on a Software-Defined Radio Platform by Yong Jiang, Wen Xu, Cyprian Grassmann

    Published 2009-01-01
    “…One of the most successful forms is Digital Video Broadcasting for Terrestrial (DVB-T), which has been deployed in most countries of the world for years. …”
    Get full text
    Article