Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
38081
RIS-assisted multi-user beam tracking system and hardware experiment
Published 2024-07-01“…A RIS-assisted single base station positioning scheme was designed to sense the movement of users and switch beams in real-time. …”
Get full text
Article -
38082
Research on safety supervision data sharing of railway construction projects based on edge computing
Published 2020-06-01“…Information security monitoring system is widely used in railway construction projects,but the existing safety supervision model has problems such as high server load,heavy network bandwidth pressure,monitoring data can’t be effectively shared,key monitoring data may be tampered,and security accident responsibility is difficult to determine.A credible sharing model of safety supervision data for railway construction projects based on edge computing was proposed.On one hand,the construction of a safety monitoring edge computing framework for construction projects was constructed,and the data processing flow of edge nodes was described; on the other hand,a trusted data sharing framework based on blockchain was established,and a safety supervision data sharing process was designed and trusted sharing data was implemented through smart contracts.The proposed solution combined with edge computing and blockchain technology,which not only could strengthen the safety supervision of railway construction projects by industry authorities,but also provide new opportunities for stakeholders to share safety monitoring data in real time.…”
Get full text
Article -
38083
Dynamic switching based real-time routing in low-duty-cycle wireless sensor networks
Published 2015-10-01“…The dynamic switching based real-time(DSRT)routing protocol was proposed to handle the arbitrary end-to-end(E2E)real-time communication in the low-duty-cycle wireless sensor networks.Firstly,the concept of available speed was designed to compensate for the big sleep latency and facilitate discovering the routes with less latency based on two-hop neighbors’ information(at lease about 20% routing path with less latency was discovered by DRST in the experiments).Moreover,it was noticed that the congestion extent in the low-duty-cycle network was determined not only by the number of packets in the network output queue,but also the destination of the packets.However,the traditional method with one-hop neighbors’ information cannot differentiate this kind of congestion.Therefore,combined with the dynamic switching mechanism,the DSRT proposed a congestion avoiding algorithm by classifying the packets in the queue.Through comprehensive experiments,the efficiency of routing discovering and congestion avoiding of the DSRT protocol is demonstrated,and the E2E delay is decreased by at least 200% when the traffic was high.…”
Get full text
Article -
38084
Wireless vision-based fuzzy controllers for moving object tracking using a quadcopter
Published 2017-04-01“…The second component addresses the visual servoing control that is designed to guide the unmanned aerial vehicle according to the target position and inclination. …”
Get full text
Article -
38085
Building for Birds Evaluation Tool: Breeding and Wintering Habitat for Forest Birds
Published 2017-02-01“…This evaluation tool is most useful for small developments or developments in already fragmented landscapes. The tool is designed for use when no opportunity is available to conserve large forest areas of 125 acres or more within a proposed development. …”
Get full text
Article -
38086
Towards edge-collaborative, lightweight and privacy-preserving classification framework
Published 2022-01-01“…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
Get full text
Article -
38087
Game-theoretical analysis of mobile contributors in mobile crowd sourcing network with word of mouth mode
Published 2019-03-01“…The crowdsourcer who calls for sensing service can recruit enough mobile contributors quickly with the word of mouth mode,improving the quality of sensing tasks.The behavior of mobile contributors in mobile crowdsourcing with the WoM was investigated.It was supposed that each mobile contributor was rational,seeking for the highest utility.The behavior of mobile contributors with a two-level Stackelberg game was formulated.In the first-level game,a mobile contributor who directly worked for the crowdsourcer acted as the leader,while contributors invited by first-level contributors were followers called the second-level contributors.In the second-level game,the second-level contributors were the leaders and contributors invited by them were followers.The Nash equilibrium for each Stackelberg game was proved was existed and unique,and designed an algorithm to reach the equilibrium.Backward induction approach to compute the best response of each game was adopted,and the simulation results show the correctness of theoretical analysis for the interaction among contributors in crowdsoucing with WoM.…”
Get full text
Article -
38088
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01“…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
Get full text
Article -
38089
Statistical Validity of Neural-Net Benchmarks
Published 2025-01-01“…Claims of better, faster or more efficient neural-net designs often hinge on low single digit percentage improvements (or less) in accuracy or speed compared to others. …”
Get full text
Article -
38090
Adaptive Distributed Fixed-Time Cooperative Three-Dimensional Guidance Law for Multimissiles against Manoeuvring Target
Published 2023-01-01“…Next, novel nonsingular terminal sliding mode (NTSM) is designed to establish adaptive fixed-time guidance law for steering LOS angular rates to the origin or its small neighbourhood. …”
Get full text
Article -
38091
Gear Cutting Machining of Klingelnberg Cyclo-palloid Bevel Gear based on Monolithic Cutter Disc
Published 2018-01-01“…According to the structure parameters of two-part cutters,the method for designing cutter-head and cutter blade of monolithic cutter disc is proposed.According to the curvature relationship between the meshed tooth flanks,a method for determining the amount of modification of cutter radius is established by iteration algorithm. …”
Get full text
Article -
38092
Acoustic Signal Aided Detection Method of Spiral Bevel Gears Based on PSO-MCKD
Published 2024-01-01“…Combining the gear rolling inspection machine with the developed acoustic signal acquisition system, a real-time acoustic signal acquisition experiment is designed for detecting the quality of the contact marks on the tooth surface of the spiral bevel gear. …”
Get full text
Article -
38093
New trends in electric motors and selection for electric vehicle propulsion systems
Published 2021-09-01“…A detailed review is presented of existing motors and the application of power electronic techniques to EVs, and recommendations for some new designs of brushless DC motors. These include permanent magnet hybrid motors, permanent magnet spoke motors and permanent magnet inset motors.…”
Get full text
Article -
38094
Sports de nature et décentralisation
Published 2015-03-01“…The PDESI, which stands for the Department Program for Territories, Sites and Itineraries, is a plan for the territorial designing and local development, which is created by the CDESI, i.e. the Department Committee for Territories, Sites and Itineraries. …”
Get full text
Article -
38095
RAEF: An Imputation Framework Based on a Gated Regulator Autoencoder for Incomplete IIoT Time-Series Data
Published 2021-01-01“…However, the current methods are largely designed to reconstruct a single missing pattern, where a robust and flexible imputation framework would be able to handle many different missing patterns. …”
Get full text
Article -
38096
Development of rules for budget allocation and methods for evaluating media plans for the digital space
Published 2023-09-01“…A form of media plan specifically designed for digital space has been presented. Special attention is paid to two types of advertising campaigns: those that pay for clicks or impressions and those that use direct marketing tools (SMS, mobile notifications and email newsletters). …”
Get full text
Article -
38097
The climate-economic model of 27 EU countries at the NUTS 3 level
Published 2025-01-01“…In addition to the analysis provided at the NUTS 3 level, the paper’s uniqueness also lies in focusing on temperature variations using the Cooling index, a weather-based technical measure designed to describe the need for air cooling (or air conditioning). …”
Get full text
Article -
38098
The interpretation of overt subject pronominals in Turkish
Published 2023-12-01“…The research employs a task designed to elicit responses that either force a bound or disjoint interpretation within biased contexts. …”
Get full text
Article -
38099
Transformative Cyber Marketing: Fostering Regional Growth and Engagement
Published 2024-01-01“…Employing social network analysis (SNA) through the Net-Map tool, the study introduced an innovative cyber marketing approach, labeled as Semarang Cyber Marketing (SCyMark), designed to meet the unique requirements of the region. …”
Get full text
Article -
38100
Western Drywood Termite, Incisitermes minor (Hagen) (Insecta: Isoptera: Kalotermitidae)
Published 2005-02-01“…In California, Incisitermes minor infestations are still sometimes referred to by some pest control operators as "Kalos" and designated with a "K" on termite inspection reports. …”
Get full text
Article