Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37721
Ternary polynomial based key management scheme for wireless sensor network
Published 2013-12-01“…A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated,which can ensure the value of the cracking threshold is bigger than the number of nodes of a clus-ter and all clusters separately,which means it's very hard to be cracked even all nodes of a cluster or all clusters are com-promised.To assure the communication security,inter-cluster multi-hop routing mechanism was designed based on con-structing secure conjunct neighbor table.Finally,the updating parameter and the updating authentication number were in-troduced in rekeying phase.The analysis shows that the proposed scheme can meet the security requirement of key man-agement,and it also has less computation cost and storage cost than the existing schemes.…”
Get full text
Article -
37722
Statistical Study of Physicochemical Characteristicsof Wastewater in Odogunyan, Lagos, Nigeria
Published 2011-01-01“…Samples collected were designated (OWS1-OWS5) representing 5 sampling points and were analyzed for 14 parameters including; (pH, TSS, TDS, Cl, EC, BOD, COD, DO, Pb, Cr, Cu, Hg, Fe and Zinc) during the month of September 2009. …”
Get full text
Article -
37723
STUDY ON BUFFETING ACTIVE CONTROL BASED ON MACRO FIBER COMPOSITES
Published 2020-01-01“…The aerodynamic forces were simulated by the doublet-lattice method and the control laws were designed applying the negative velocity feedback algorithm. …”
Get full text
Article -
37724
Formation of Residual Bubbles in Diesel Engine Nozzle and Their Influence on Initial Jet
Published 2021-01-01“…An equal-size optical nozzle based on acrylic material is designed, and the injection process of the fuel nozzle is photographed using high-speed photography technology. …”
Get full text
Article -
37725
Performance analysis of covert wireless communication based on beam forming with noise uncertainty
Published 2020-07-01“…In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was analysed.Firstly,the covert probability of communication was analyzed by using the hypothesis test theory.Secondly,the optimal detection threshold of the illegal detection party was given and proved,and the closed expressions of the average covert probability,connection interruption probability and covert throughput of the system were further obtained.Finally,by jointly designing the transmission power and target covert rate,the optimal goal of the maximum covert throughput of the system was achieved,and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty,the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment.…”
Get full text
Article -
37726
An Arabic Grammar Auditor Based on Dependency Grammar
Published 2020-01-01“…Its purpose is to extract patterns of grammatical rules from a projective dependency graph in order to designate the appropriate syntax dependencies of a sentence. …”
Get full text
Article -
37727
Data-driven prediction of chemically relevant compositions in multi-component systems using tensor embeddings
Published 2025-01-01“…This study introduces a predictive model designed to forecast complex multi-component oxide compositions, leveraging data derived from simpler pseudo-binary systems. …”
Get full text
Article -
37728
Molecular optimization using a conditional transformer for reaction-aware compound exploration with reinforcement learning
Published 2025-02-01“…Abstract Designing molecules with desirable properties is a critical endeavor in drug discovery. …”
Get full text
Article -
37729
Approximation properties relative to continuous scale space for hybrid discretisations of Gaussian derivative operators
Published 2025-01-01“…The presented results are intended as a guide, when designing as well as interpreting the experimental results of scale-space algorithms that operate at very fine scale levels.…”
Get full text
Article -
37730
Amplitude Modulation and Synchronization of Fractional-Order Memristor-Based Chua's Circuit
Published 2013-01-01“…The nonlinear controller is designed to ensure the stability and convergence of the proposed synchronization scheme. …”
Get full text
Article -
37731
Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
Published 2022-04-01“…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
Get full text
Article -
37732
Multi mobile agent itinerary planning based on network coverage and multi-objective discrete social spider optimization algorithm
Published 2017-06-01“…The multi mobile agent collaboration planning model was constructed based on the mobile agent load balancing and total network energy consumption index.In order to prolong the network lifetime,the network node dormancy mechanism based on WSN network coverage was put forward,using fewer worked nodes to meet the requirements of network coverage.According to the multi mobile agent collaborative planning technical features,the multi-objective discrete social spider optimization algorithm (MDSSO) with Pareto optimal solutions was designed.The interpolation learning and exchange variations particle updating strategy was redefined,and the optimal set size was adjusted dynamically,which helps to improve the accuracy of MDSSO.Simulation results show that the proposed algorithm can quickly give the WSN multi mobile agent path planning scheme,and compared with other schemes,the network total energy consumption has reduced by 15%,and the network lifetime has increased by 23%.…”
Get full text
Article -
37733
Realising the Potential of the Internet in Business
Published 2012-06-01“…Own company website is not uncommon today and it is almost a necessity if a business wants to succeed in the fierce competitive environment. With well-designed page that includes the psychological elements, enterprise can use the Internet network as its advantage. …”
Get full text
Article -
37734
STUDY ON ANFIS CONTROL STRATEGY OF ENGINEERING VEHICLE SEAT SUSPENSION (MT)
Published 2023-01-01“…Then, the fuzzy neural control system of seat suspension was designed by adding feed-forward and feedback links. …”
Get full text
Article -
37735
A Study of Missing Collaborative Data Imputation Models based on Same-City Delivery
Published 2022-01-01“…To address these issues, an improved matrix decomposition model was designed to interpolate the missing data by taking into account the spatiotemporal correlation between warehouses. …”
Get full text
Article -
37736
Ultra-low-power media access control protocol based on clock drift characteristics in wireless sensor networks
Published 2017-07-01“…Using the characteristics, a new media access control protocol, WideMAC, was designed to support a wide range of duty cycles for various applications. …”
Get full text
Article -
37737
Communication service priority in smart substation and its queue scheduling method
Published 2021-07-01“…The future development of power grid puts forward the requirement of unified network for all the communication services in smart substation.In order to meet the different quality of service (QoS) requirements of various communication services, as well as ensure the real-time and reliability of key services when the network congestion occurs, a priority scheme and its queue scheduling method for the smart substation was proposed.The priorities of the communication services in the smart substation were assigned considering the delay requirements, the importance to power grid operation control, and the traffic of the communication services.The queue scheduling algorithm of hierarchical deficit weighted round robin (HDWRR), combining the advantages of strict priority queue (SPQ) algorithm and deficit weight round robin (DWRR) algorithm, was designed for the proposed priority scheme.The simulation results show that the proposed method has isolation ability for malicious traffic, and can ensure the real-time and reliable transmission of key services in smart substation once the network is congested.…”
Get full text
Article -
37738
Synthesis and Characterization of New Heterocyclic Liquid Crystals
Published 2009-01-01“…In these liquid crystals the methylene chain length at non polar end was varied from six to ten carbons to investigate the association properties of non polar chain on the melt. The compound was designed to have a polar ether chain at the other side of the molecule adjacent to the triazole ring and synthesized to enhance the dipolar interactions. …”
Get full text
Article -
37739
Shock Reduction Technique in Thin-Plate Structure Using Elastic Patches with Gradual Thickness Variations
Published 2024-01-01“…Elastic patches with gradual thickness variation were designed and thoroughly investigated both numerically and experimentally. …”
Get full text
Article -
37740
A distributed strategy for the multi-target rescue using a UAV swarm under communication constraints
Published 2022-09-01“…The current designs of the cooperative decision-making of an unmanned aerial vehicle (UAV) swarm usually adopt unreasonable assumptions on the communication ability between UAVs.Focusing on a multi-target rescue problem of a UAV swarm under constraints of energy, load and path, the limitation on the information sharing due to the communication constraints and the flight path of UAVs were taken into account.Firstly, the problem was formulated as a partially observable Markov decision process (POMDP).Then, a recurrent neural network was used to propose a deep-reinforcement-learning-based distributed rescue strategy, which is able to adapt to the changeable communication topology.Simulation results show that the proposed strategy outperforms other strategies under communication constraints, and further show that a careful joint setting of the size and communication ability of a UAV swarm is needed to achieve the best compromise between the UAV swarm rescue performance and the cost.…”
Get full text
Article