Showing 861 - 880 results of 124,197 for search '"Research', query time: 0.28s Refine Results
  1. 861
  2. 862

    Research on packet scheduling in input-queued switches by XIONG Qing-xu

    Published 2005-01-01
    “…The packet scheduling in electronic-optical switches was also discussed. Finally the future research work and directions were explored from the view of switch architecture and scheduling algorithm, respectively.…”
    Get full text
    Article
  3. 863

    Friendship Creates Intercontinental Cooperation in Aerosol Research by Heinz Fissan

    Published 2023-01-01
    “…Aerosol and Air Quality Research…”
    Get full text
    Article
  4. 864

    Research on security defense of mobile edge computing by Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI

    Published 2021-02-01
    “…Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.…”
    Get full text
    Article
  5. 865

    Review of Research on Upper Limb Assisted Exoskeletons by Guo Qiyuan, Hu Zhigang, Fu Dongliao

    Published 2023-03-01
    “…The existing problems in the current research are summarized and the future development trend of upper limb assisted exoskeletons is prospected.…”
    Get full text
    Article
  6. 866
  7. 867

    Research on safety methods of airborne embedded software by Ya-hui LI, Ya-di ZHANG, Peng GUO

    Published 2015-11-01
    “…By analyzed the process of development and running of airborne software with the standards of airworthiness and information security,the factors and threats related with airborne software safety were presented,and the security protected mechanisms based on embedded TMP and MILS software architecture were provided,which all support the research on safety of embedded software on aircrafts.…”
    Get full text
    Article
  8. 868
  9. 869

    Getting Engaged: “Public” Engagement Practices for Researchers by Kathryn A. Stofer

    Published 2017-05-01
    “…AEC610/WC272: Getting Engaged: “Public,” Stakeholder, and Community Engagement Practices for Researchers (ufl.edu) …”
    Get full text
    Article
  10. 870
  11. 871
  12. 872
  13. 873

    Research on models of network security evaluation and analysis by Wenyan LIU, Shumin HUO, Qing TONG, Miao ZHANG, Chao QI

    Published 2018-04-01
    “…Network security assessment helps to grasp the current and future risks of the network information system clearly,and gives corresponding security suggestions and countermeasures.Model of network security assessment and analysis is an important research direction and content,for which there is no review to give a comprehensive summary or analysis.A review of common network security evaluation and analysis model was given.The model that focus on attack was introduced,such as the attack tree,attack graph and kill chain,then the model that focus on network defense or offensive and defensive interaction was explained,such as attack surface,cyber epidemic model,Petri nets and automation machine,giving introduction to the basic concept,application field,modeling analysis process,advantages and disadvantages of the models.Then,typical examples were given to illustrate the application of the models in network defense technology evaluation and analysis.…”
    Get full text
    Article
  14. 874

    Research on full-field optical coherence tomography by Ning MU, Wan-rong GAO, Zhe-qiang WEI

    Published 2017-12-01
    “…Full-field optical coherence tomography(FFOCT)was used for imaging the interior part of an object.Firstly,the mathematical modeling and performance analysis of the FFOCT system mounted was provided.Secondly,images of several different human tissues were obtained by FFOCT system,including esophagus,uterus,etc.The images of different depths of the same tissue were shown and compared.It was the first time in China that FFOCT was used for generating depth images on human esophagus and uterus;high-resolution images had been obtained for different depths without cutting the tissue sample,in which intercellular substance and myofibril structure could be clearly identified.As the in-depth structure could be imaged without the process needed for frozen and paraffin sectioning methods,the technology could been highly valuable for early cancer diagnosis and pathological analysis in tumor research.…”
    Get full text
    Article
  15. 875
  16. 876
  17. 877

    Research on neuromorphic vision sensor and its applications by Yongsheng SANG, Renhao LI, Yaoqian LI, Qiangwei WANG, Yao MAO

    Published 2019-12-01
    “…Neuromorphic vision sensor is a biologically inspired artificial neural system that mimics algorithmic behavior of biological vision systems,which has numerous advantages over standard vision sensors,such as high temporal resolution,low latency,low power,high dynamic range,etc.At first,a brief introduction to neuromorphic engineering,neuromorphic chips,and vision sensors was given.Then the main computing methods for neuromorphic vision were reviewed,including probability and statistics,spiking neural network and deep neural network.Finally,several kinds of applications based on neuromorphic vision sensors were given,such as simultaneous localization and mapping (SLAM),image reconstruction (IR),etc.A review of hardware,computing methods and applications for neuromorphic vision sensors was given,which provided a comprehensive reference for researchers.…”
    Get full text
    Article
  18. 878

    Research progress on location privacy-preserving techniques by Sheng WAN, Feng-hua LI, Ben NIU, Zhe SUN, Hui LI

    Published 2016-12-01
    “…While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. …”
    Get full text
    Article
  19. 879
  20. 880

    Questions of Research of Digitalization in Various Fields of Activity by N. O. Yakushev

    Published 2024-09-01
    “…Based on the analysis of scientific literature, those accents (availability of digital technologies, impact on managerial and institutional spheres, sectoral and territorial features, applied significance) on which researchers focus their attention, are identified. The directions are systematized depending on the digitalization of individual objects, including the necessary elements of digitalization.…”
    Get full text
    Article