Showing 38,081 - 38,100 results of 46,768 for search '"Design"', query time: 0.18s Refine Results
  1. 38081

    RIS-assisted multi-user beam tracking system and hardware experiment by DING Chenlong, XU Wenjun, ZHANG Hongtao

    Published 2024-07-01
    “…A RIS-assisted single base station positioning scheme was designed to sense the movement of users and switch beams in real-time. …”
    Get full text
    Article
  2. 38082

    Research on safety supervision data sharing of railway construction projects based on edge computing by Liang YANG, Chunhui PIAO, Yuhong LIU, Meimei JI

    Published 2020-06-01
    “…Information security monitoring system is widely used in railway construction projects,but the existing safety supervision model has problems such as high server load,heavy network bandwidth pressure,monitoring data can’t be effectively shared,key monitoring data may be tampered,and security accident responsibility is difficult to determine.A credible sharing model of safety supervision data for railway construction projects based on edge computing was proposed.On one hand,the construction of a safety monitoring edge computing framework for construction projects was constructed,and the data processing flow of edge nodes was described; on the other hand,a trusted data sharing framework based on blockchain was established,and a safety supervision data sharing process was designed and trusted sharing data was implemented through smart contracts.The proposed solution combined with edge computing and blockchain technology,which not only could strengthen the safety supervision of railway construction projects by industry authorities,but also provide new opportunities for stakeholders to share safety monitoring data in real time.…”
    Get full text
    Article
  3. 38083

    Dynamic switching based real-time routing in low-duty-cycle wireless sensor networks by Quan CHEN, Hong GAO

    Published 2015-10-01
    “…The dynamic switching based real-time(DSRT)routing protocol was proposed to handle the arbitrary end-to-end(E2E)real-time communication in the low-duty-cycle wireless sensor networks.Firstly,the concept of available speed was designed to compensate for the big sleep latency and facilitate discovering the routes with less latency based on two-hop neighbors’ information(at lease about 20% routing path with less latency was discovered by DRST in the experiments).Moreover,it was noticed that the congestion extent in the low-duty-cycle network was determined not only by the number of packets in the network output queue,but also the destination of the packets.However,the traditional method with one-hop neighbors’ information cannot differentiate this kind of congestion.Therefore,combined with the dynamic switching mechanism,the DSRT proposed a congestion avoiding algorithm by classifying the packets in the queue.Through comprehensive experiments,the efficiency of routing discovering and congestion avoiding of the DSRT protocol is demonstrated,and the E2E delay is decreased by at least 200% when the traffic was high.…”
    Get full text
    Article
  4. 38084

    Wireless vision-based fuzzy controllers for moving object tracking using a quadcopter by Mohammed Algabri, Hassan Mathkour, Mohamed Amine Mekhtiche, Mohamed Abdelkader Bencherif, Mansour Alsulaiman, Mohammed Amer Arafah, Hamid Ghaleb

    Published 2017-04-01
    “…The second component addresses the visual servoing control that is designed to guide the unmanned aerial vehicle according to the target position and inclination. …”
    Get full text
    Article
  5. 38085

    Building for Birds Evaluation Tool: Breeding and Wintering Habitat for Forest Birds by Mark Hostetler, Jan-Michael Archer

    Published 2017-02-01
    “…This evaluation tool is most useful for small developments or developments in already fragmented landscapes. The tool is designed for use when no opportunity is available to conserve large forest areas of 125 acres or more within a proposed development. …”
    Get full text
    Article
  6. 38086

    Towards edge-collaborative, lightweight and privacy-preserving classification framework by Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN

    Published 2022-01-01
    “…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
    Get full text
    Article
  7. 38087

    Game-theoretical analysis of mobile contributors in mobile crowd sourcing network with word of mouth mode by Feng ZENG, Runhua WANG, Jia PENG, Zhigang CHEN

    Published 2019-03-01
    “…The crowdsourcer who calls for sensing service can recruit enough mobile contributors quickly with the word of mouth mode,improving the quality of sensing tasks.The behavior of mobile contributors in mobile crowdsourcing with the WoM was investigated.It was supposed that each mobile contributor was rational,seeking for the highest utility.The behavior of mobile contributors with a two-level Stackelberg game was formulated.In the first-level game,a mobile contributor who directly worked for the crowdsourcer acted as the leader,while contributors invited by first-level contributors were followers called the second-level contributors.In the second-level game,the second-level contributors were the leaders and contributors invited by them were followers.The Nash equilibrium for each Stackelberg game was proved was existed and unique,and designed an algorithm to reach the equilibrium.Backward induction approach to compute the best response of each game was adopted,and the simulation results show the correctness of theoretical analysis for the interaction among contributors in crowdsoucing with WoM.…”
    Get full text
    Article
  8. 38088

    Coding-aware secure routing for multi-hop wireless networks by Xian GUO, Tao FENG, Zhan-ting YUAN

    Published 2012-06-01
    “…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
    Get full text
    Article
  9. 38089

    Statistical Validity of Neural-Net Benchmarks by Alain Hadges, Srikar Bellur

    Published 2025-01-01
    “…Claims of better, faster or more efficient neural-net designs often hinge on low single digit percentage improvements (or less) in accuracy or speed compared to others. …”
    Get full text
    Article
  10. 38090

    Adaptive Distributed Fixed-Time Cooperative Three-Dimensional Guidance Law for Multimissiles against Manoeuvring Target by Jiwei Gao, Xiaojing Li, Shaofei Zang, Jianwei Ma, Jinpeng Zhang

    Published 2023-01-01
    “…Next, novel nonsingular terminal sliding mode (NTSM) is designed to establish adaptive fixed-time guidance law for steering LOS angular rates to the origin or its small neighbourhood. …”
    Get full text
    Article
  11. 38091

    Gear Cutting Machining of Klingelnberg Cyclo-palloid Bevel Gear based on Monolithic Cutter Disc by Wang Zhiyong, Yang Weiyin, Zhang Yu, Zhai Huaming

    Published 2018-01-01
    “…According to the structure parameters of two-part cutters,the method for designing cutter-head and cutter blade of monolithic cutter disc is proposed.According to the curvature relationship between the meshed tooth flanks,a method for determining the amount of modification of cutter radius is established by iteration algorithm. …”
    Get full text
    Article
  12. 38092

    Acoustic Signal Aided Detection Method of Spiral Bevel Gears Based on PSO-MCKD by Li Xianshan, Tian Yu, Wei Lilin, Zhao Xiaofeng, Yan Changfeng

    Published 2024-01-01
    “…Combining the gear rolling inspection machine with the developed acoustic signal acquisition system, a real-time acoustic signal acquisition experiment is designed for detecting the quality of the contact marks on the tooth surface of the spiral bevel gear. …”
    Get full text
    Article
  13. 38093

    New trends in electric motors and selection for electric vehicle propulsion systems by Sreedhar Madichetty, Sukumar Mishra, Malabika Basu

    Published 2021-09-01
    “…A detailed review is presented of existing motors and the application of power electronic techniques to EVs, and recommendations for some new designs of brushless DC motors. These include permanent magnet hybrid motors, permanent magnet spoke motors and permanent magnet inset motors.…”
    Get full text
    Article
  14. 38094

    Sports de nature et décentralisation by Ludovic Falaix

    Published 2015-03-01
    “…The PDESI, which stands for the Department Program for Territories, Sites and Itineraries, is a plan for the territorial designing and local development, which is created by the CDESI, i.e. the Department Committee for Territories, Sites and Itineraries. …”
    Get full text
    Article
  15. 38095

    RAEF: An Imputation Framework Based on a Gated Regulator Autoencoder for Incomplete IIoT Time-Series Data by Jianyong Zhao, Jiachen Qiu, Danfeng Sun, Baiping Chen

    Published 2021-01-01
    “…However, the current methods are largely designed to reconstruct a single missing pattern, where a robust and flexible imputation framework would be able to handle many different missing patterns. …”
    Get full text
    Article
  16. 38096

    Development of rules for budget allocation and methods for evaluating media plans for the digital space by D. A. Khokhlov

    Published 2023-09-01
    “…A form of media plan specifically designed for digital space has been presented. Special attention is paid to two types of advertising campaigns: those that pay for clicks or impressions and those that use direct marketing tools (SMS, mobile notifications and email newsletters). …”
    Get full text
    Article
  17. 38097

    The climate-economic model of 27 EU countries at the NUTS 3 level by Daniela Hadačová, Dominika Jusková, Lenka Maličká, Jana Vancová

    Published 2025-01-01
    “…In addition to the analysis provided at the NUTS 3 level, the paper’s uniqueness also lies in focusing on temperature variations using the Cooling index, a weather-based technical measure designed to describe the need for air cooling (or air conditioning). …”
    Get full text
    Article
  18. 38098

    The interpretation of overt subject pronominals in Turkish by Oktay ÇINAR

    Published 2023-12-01
    “…The research employs a task designed to elicit responses that either force a bound or disjoint interpretation within biased contexts. …”
    Get full text
    Article
  19. 38099

    Transformative Cyber Marketing: Fostering Regional Growth and Engagement by Nana Storada Dwi Martadi, Mohamad Sidiq, Inaya Sari Melati

    Published 2024-01-01
    “…Employing social network analysis (SNA) through the Net-Map tool, the study introduced an innovative cyber marketing approach, labeled as Semarang Cyber Marketing (SCyMark), designed to meet the unique requirements of the region. …”
    Get full text
    Article
  20. 38100

    Western Drywood Termite, Incisitermes minor (Hagen) (Insecta: Isoptera: Kalotermitidae) by Brian J. Cabrera, Rudolf H. Scheffrahn

    Published 2005-02-01
    “…In California, Incisitermes minor infestations are still sometimes referred to by some pest control operators as "Kalos" and designated with a "K" on termite inspection reports. …”
    Get full text
    Article