Showing 37,721 - 37,740 results of 46,768 for search '"Design"', query time: 0.19s Refine Results
  1. 37721

    Ternary polynomial based key management scheme for wireless sensor network by Zhi-tao GUAN, Yue XU, Jun WU

    Published 2013-12-01
    “…A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated,which can ensure the value of the cracking threshold is bigger than the number of nodes of a clus-ter and all clusters separately,which means it's very hard to be cracked even all nodes of a cluster or all clusters are com-promised.To assure the communication security,inter-cluster multi-hop routing mechanism was designed based on con-structing secure conjunct neighbor table.Finally,the updating parameter and the updating authentication number were in-troduced in rekeying phase.The analysis shows that the proposed scheme can meet the security requirement of key man-agement,and it also has less computation cost and storage cost than the existing schemes.…”
    Get full text
    Article
  2. 37722

    Statistical Study of Physicochemical Characteristicsof Wastewater in Odogunyan, Lagos, Nigeria by I. S. Akoteyon, O. Soladoye

    Published 2011-01-01
    “…Samples collected were designated (OWS1-OWS5) representing 5 sampling points and were analyzed for 14 parameters including; (pH, TSS, TDS, Cl, EC, BOD, COD, DO, Pb, Cr, Cu, Hg, Fe and Zinc) during the month of September 2009. …”
    Get full text
    Article
  3. 37723

    STUDY ON BUFFETING ACTIVE CONTROL BASED ON MACRO FIBER COMPOSITES by SUN Jie, HUANG TingXuan, SUN LuJun, ZHU DongFang, HUANG Jing

    Published 2020-01-01
    “…The aerodynamic forces were simulated by the doublet-lattice method and the control laws were designed applying the negative velocity feedback algorithm. …”
    Get full text
    Article
  4. 37724

    Formation of Residual Bubbles in Diesel Engine Nozzle and Their Influence on Initial Jet by Xiaonan Ni, Hua Wen

    Published 2021-01-01
    “…An equal-size optical nozzle based on acrylic material is designed, and the injection process of the fuel nozzle is photographed using high-speed photography technology. …”
    Get full text
    Article
  5. 37725

    Performance analysis of covert wireless communication based on beam forming with noise uncertainty by Yuda LIN, Liang JIN, You ZHOU, Yangming LOU

    Published 2020-07-01
    “…In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was analysed.Firstly,the covert probability of communication was analyzed by using the hypothesis test theory.Secondly,the optimal detection threshold of the illegal detection party was given and proved,and the closed expressions of the average covert probability,connection interruption probability and covert throughput of the system were further obtained.Finally,by jointly designing the transmission power and target covert rate,the optimal goal of the maximum covert throughput of the system was achieved,and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty,the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment.…”
    Get full text
    Article
  6. 37726

    An Arabic Grammar Auditor Based on Dependency Grammar by Ameerah Alothman, AbdulMalik Alsalman

    Published 2020-01-01
    “…Its purpose is to extract patterns of grammatical rules from a projective dependency graph in order to designate the appropriate syntax dependencies of a sentence. …”
    Get full text
    Article
  7. 37727

    Data-driven prediction of chemically relevant compositions in multi-component systems using tensor embeddings by Hiroyuki Hayashi, Isao Tanaka

    Published 2025-01-01
    “…This study introduces a predictive model designed to forecast complex multi-component oxide compositions, leveraging data derived from simpler pseudo-binary systems. …”
    Get full text
    Article
  8. 37728

    Molecular optimization using a conditional transformer for reaction-aware compound exploration with reinforcement learning by Shogo Nakamura, Nobuaki Yasuo, Masakazu Sekijima

    Published 2025-02-01
    “…Abstract Designing molecules with desirable properties is a critical endeavor in drug discovery. …”
    Get full text
    Article
  9. 37729

    Approximation properties relative to continuous scale space for hybrid discretisations of Gaussian derivative operators by Tony Lindeberg

    Published 2025-01-01
    “…The presented results are intended as a guide, when designing as well as interpreting the experimental results of scale-space algorithms that operate at very fine scale levels.…”
    Get full text
    Article
  10. 37730

    Amplitude Modulation and Synchronization of Fractional-Order Memristor-Based Chua's Circuit by A. G. Radwan, K. Moaddy, I. Hashim

    Published 2013-01-01
    “…The nonlinear controller is designed to ensure the stability and convergence of the proposed synchronization scheme. …”
    Get full text
    Article
  11. 37731

    Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network by Yinghui ZHANG, Lingyun HU, Yixin LI, Jianting NING, Dong ZHENG

    Published 2022-04-01
    “…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
    Get full text
    Article
  12. 37732

    Multi mobile agent itinerary planning based on network coverage and multi-objective discrete social spider optimization algorithm by Zhou-zhou LIU, Shi-ning LI

    Published 2017-06-01
    “…The multi mobile agent collaboration planning model was constructed based on the mobile agent load balancing and total network energy consumption index.In order to prolong the network lifetime,the network node dormancy mechanism based on WSN network coverage was put forward,using fewer worked nodes to meet the requirements of network coverage.According to the multi mobile agent collaborative planning technical features,the multi-objective discrete social spider optimization algorithm (MDSSO) with Pareto optimal solutions was designed.The interpolation learning and exchange variations particle updating strategy was redefined,and the optimal set size was adjusted dynamically,which helps to improve the accuracy of MDSSO.Simulation results show that the proposed algorithm can quickly give the WSN multi mobile agent path planning scheme,and compared with other schemes,the network total energy consumption has reduced by 15%,and the network lifetime has increased by 23%.…”
    Get full text
    Article
  13. 37733

    Realising the Potential of the Internet in Business by Katarína Kleinová, Zuzana Lušňáková

    Published 2012-06-01
    “…Own company website is not uncommon today and it is almost a necessity if a business wants to succeed in the fierce competitive environment. With well-designed page that includes the psychological elements, enterprise can use the Internet network as its advantage. …”
    Get full text
    Article
  14. 37734

    STUDY ON ANFIS CONTROL STRATEGY OF ENGINEERING VEHICLE SEAT SUSPENSION (MT) by LI ZhanLong, ZHANG YaBin, ZHANG Zheng, GAO ShanTie, LI Hong, GUO BeiJun

    Published 2023-01-01
    “…Then, the fuzzy neural control system of seat suspension was designed by adding feed-forward and feedback links. …”
    Get full text
    Article
  15. 37735

    A Study of Missing Collaborative Data Imputation Models based on Same-City Delivery by Xintong Zou, Hui Jin

    Published 2022-01-01
    “…To address these issues, an improved matrix decomposition model was designed to interpolate the missing data by taking into account the spatiotemporal correlation between warehouses. …”
    Get full text
    Article
  16. 37736

    Ultra-low-power media access control protocol based on clock drift characteristics in wireless sensor networks by Wooguil Pak

    Published 2017-07-01
    “…Using the characteristics, a new media access control protocol, WideMAC, was designed to support a wide range of duty cycles for various applications. …”
    Get full text
    Article
  17. 37737

    Communication service priority in smart substation and its queue scheduling method by Jun’e LI, Qiuyu LU, Jian LIU, Kai YUAN, Wei TIAN, Bijun PENG

    Published 2021-07-01
    “…The future development of power grid puts forward the requirement of unified network for all the communication services in smart substation.In order to meet the different quality of service (QoS) requirements of various communication services, as well as ensure the real-time and reliability of key services when the network congestion occurs, a priority scheme and its queue scheduling method for the smart substation was proposed.The priorities of the communication services in the smart substation were assigned considering the delay requirements, the importance to power grid operation control, and the traffic of the communication services.The queue scheduling algorithm of hierarchical deficit weighted round robin (HDWRR), combining the advantages of strict priority queue (SPQ) algorithm and deficit weight round robin (DWRR) algorithm, was designed for the proposed priority scheme.The simulation results show that the proposed method has isolation ability for malicious traffic, and can ensure the real-time and reliable transmission of key services in smart substation once the network is congested.…”
    Get full text
    Article
  18. 37738

    Synthesis and Characterization of New Heterocyclic Liquid Crystals by D. Srividhya, S. Manjunathan, S. Thirumaran

    Published 2009-01-01
    “…In these liquid crystals the methylene chain length at non polar end was varied from six to ten carbons to investigate the association properties of non polar chain on the melt. The compound was designed to have a polar ether chain at the other side of the molecule adjacent to the triazole ring and synthesized to enhance the dipolar interactions. …”
    Get full text
    Article
  19. 37739

    Shock Reduction Technique in Thin-Plate Structure Using Elastic Patches with Gradual Thickness Variations by Hyun-Su Park, Dae-Hyun Hwang, Jae-Hung Han

    Published 2024-01-01
    “…Elastic patches with gradual thickness variation were designed and thoroughly investigated both numerically and experimentally. …”
    Get full text
    Article
  20. 37740

    A distributed strategy for the multi-target rescue using a UAV swarm under communication constraints by Hanqing YU, Yan LIN, Linqiong JIA, Qiang LI, Yijin Zhang

    Published 2022-09-01
    “…The current designs of the cooperative decision-making of an unmanned aerial vehicle (UAV) swarm usually adopt unreasonable assumptions on the communication ability between UAVs.Focusing on a multi-target rescue problem of a UAV swarm under constraints of energy, load and path, the limitation on the information sharing due to the communication constraints and the flight path of UAVs were taken into account.Firstly, the problem was formulated as a partially observable Markov decision process (POMDP).Then, a recurrent neural network was used to propose a deep-reinforcement-learning-based distributed rescue strategy, which is able to adapt to the changeable communication topology.Simulation results show that the proposed strategy outperforms other strategies under communication constraints, and further show that a careful joint setting of the size and communication ability of a UAV swarm is needed to achieve the best compromise between the UAV swarm rescue performance and the cost.…”
    Get full text
    Article