Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
33621
Data aggregation scheme based on SDN for internet of things
Published 2019-02-01“…There are many redundant parts in the data generated and transmitted by IoT devices.Transmitting this data reduces network lifetime and bandwidth.Aiming at the problem,the aggregation gateway layer was proposed,and a SDN-based IoT data aggregation architecture and algorithm were designed.The simulation analysis shows that compared with the architecture of the ordinary gateway and OF-GW,the network lifetime is improved by about 32.6%,and the amount of data packets sent by the sensing layer to the network layer is reduced by 6.1% to 55.1%.Compared with the LEACH algorithm,the designed rule algorithm reduces the average delay of data aggregation by about 24.1%,while avoiding data loss and improving the accuracy of data aggregation.…”
Get full text
Article -
33622
Axial Ratio-Tuned Circularly Polarized Square Patch Antenna with Long Stubs
Published 2018-01-01“…The proposed antenna is designed in a very straightforward manner by applying four long stubs to a square patch. …”
Get full text
Article -
33623
Research on Diameter Protocol Monitoring Scheme of S6a Interface in LTE Network Tester
Published 2014-05-01“…On the basis of introducing the functions of LTE network tester, the Diameter protocol's basic concept and functions of S6a interface were described, and the Diameter protocol monitoring scheme were designed. In consideration of the characteristics of Diameter message structure, the Diameter protocol decoding scheme was designed with the idea of modularization. …”
Get full text
Article -
33624
Probabilistic Model Checking: One Step Forward in Wireless Sensor Networks Simulation
Published 2015-05-01“…The algorithm called 2CS-WSN is specifically designed to be used during the contention phase of IEEE 802.15.4. …”
Get full text
Article -
33625
-
33626
Unsupervised Quality Estimation Model for English to German Translation and Its Application in Extensive Supervised Evaluation
Published 2014-01-01“…The authors also explore the performances of the designed metric on traditional supervised evaluation tasks. …”
Get full text
Article -
33627
Cooperative Overbooking-Based Resource Allocation and Application Placement in UAV-Mounted Edge Computing for Internet of Forestry Things
Published 2024-12-01“…Second, for the multiple-tenant overbooking case, a Proportional Fairness-based Cooperative Resource Overbooking (PF-MCROB) scheme is designed, and a bisection search algorithm is also designed to obtain the corresponding minimized aggregated resource demand. …”
Get full text
Article -
33628
Research on Hexapod Movement Based on the Spatial Crankshaft
Published 2023-07-01“…The connecting parts with each foot are designed into different spatial linkage mechanisms. …”
Get full text
Article -
33629
Derivation of induced pluripotent stem cell TUSMi013-A from a 66-year-old Chinese Han Parkinson’s disease patient carrying VPS13C and TBP mutations
Published 2025-03-01“…The present study was designed to establish an iPSC line, designated TUSMi013-A, from the dermal fibroblasts of a 66-year-old female afflicted with PD, harboring mutations in VPS13C and TBP. …”
Get full text
Article -
33630
Speed Control of Permanent Magnet Synchronous Motor Based on Variable Fractional-Order Fuzzy Sliding Mode Controller
Published 2025-01-01“…A variable fractional-order (VFO) fuzzy sliding mode controller is designed to control the speed of a permanent magnet synchronous motor (PMSM). …”
Get full text
Article -
33631
Internet of Things Technology for an Autonomous Photovoltaic Solar Energy System Monitoring
Published 2025-01-01“…Furthermore, it proposes a low-cost monitoring system designed to monitor a PV system consisting of a PV module, a DC-DC boost converter, and a load.…”
Get full text
Article -
33632
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01“…In designing an access control scheme for public wireless LAN (WLAN),user privacy protection and user accountability are two conflict goals.A novel user management and access control scheme was proposed to solve this problem by utilizing the bitcoin blockchain and Intel SGX.It utilized unmodified bitcoin blockchain to manage the ownership of access credentials for users without relying on any trusted third party.It adopted Intel SGX-based mixing technology to enhance anonymity of users’ access credentials.It designed verification path rule to resolve the conflicts between the privacy-preserving and accountability objectives.The effectiveness and feasibility of the proposed scheme are also demonstrated by security analysis and performance evaluation.…”
Get full text
Article -
33633
Simplified Printed Log-Periodic Dipole Array Antenna Fed by CBCPW
Published 2013-01-01“…A novel simple approach for designing single-layer printed log-periodic dipole array (PLPDA) antenna fed by conductor-backed coplanar waveguide (CBCPW) is presented. …”
Get full text
Article -
33634
2.4 GHz CMOS Power Amplifier with Mode-Locking Structure to Enhance Gain
Published 2014-01-01“…The measured power added efficiency is 34.9%, while the saturated output power is 23.32 dBm. The designed chip size is 1.4×0.6 mm2.…”
Get full text
Article -
33635
Adaptive Compensation Control of Closed-chain Lower Limb Rehabilitation Robots Based on the RBF Neural Network
Published 2024-04-01“…Firstly, a closed chain horizontal lower limb rehabilitation robot structure with four working modes and stable movement is designed. Secondly, the Lagrange method is used to solve the kinetic nominal model, the uncertainty factors such as model parameters and external interference of the rehabilitation device are separated, and the adaptive compensation algorithm based on the RBF neural network is designed for the approximate control. …”
Get full text
Article -
33636
Carnivore activity across landuse gradients in a Mexican biosphere reserve
Published 2025-02-01“…Area-based conservation measures, such as protected areas (PAs), employ different management strategies via land-use designations to mitigate anthropogenic pressures and reduce human-wildlife conflicts in shared landscapes. …”
Get full text
Article -
33637
A fully differential switched‐capacitor integrator based programmable resolution hybrid ADC architecture for biomedical applications
Published 2021-03-01“…The designed OTA offers 83 dB DC gain. The proposed ADC, designed and laid out in UMC 180 nm standard CMOS technology, occupies an area of 0.228 mm2. …”
Get full text
Article -
33638
Predicting and synthesizing terahertz spoof surface plasmon polariton devices with a convolutional neural network model
Published 2025-01-01“…Three examples are provided for inversely designing several sensor devices and absorbers in the terahertz band using the proposed CNN and the genetic optimization algorithm.…”
Get full text
Article -
33639
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01“…To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockchain.The consortium blockchain was introduced into the cross-domain authentication scene by designing the layered cross-domain authentication architecture including entity layer, proxy layer, blockchain layer and storage layer.In the storage layer, abstract data format was designed and stored in the chain, and the complete data corresponding to the abstract data was stored in the interplanetary file system under the chain.This safe and reliable on-chain distributed storage scheme solved the limitation problem of on-chain storage caused by introduction of blockchain.Besides, an identity management scheme based on permanent autonomy identity and temporary identity was proposed to solve the challenges that it is difficult to cancel identity and to supervise anonymous identity after combining IBC system.On this basis, complete cross-domain full authentication, re-authentication and key negotiation protocols were designed to implement the cross-domain authentication process.In terms of security, SVO logic was used to analyze the authentication protocol, and the security of the cross-domain authentication protocol was proved.The performance of calculation overhead, communication overhead and consortium blockchain were tested and analyzed by simulation.Analysis results showed that the protocol satisfies the security requirements and has improved calculation overhead performance on both server and client sides, comparing with other related works.In terms of communication overhead, it also has better performance.The query/write latency was tested by the consortium blockchain tool, and the results showed that the scheme has good usability.…”
Get full text
Article -
33640
Images et société au début du xie siècle : le décor sculpté de Saint-Benoît-sur-Loire et Saint-Germain-des-Prés
Published 2018-09-01“…This ideology also designates the ruling elites : the clerics and the king, dedicated to collaborate for a just governance. …”
Get full text
Article