-
1101
Minimizing Metro Transfer Waiting Time with AFCS Data Using Simulated Annealing with Parallel Computing
Published 2018-01-01“…This paper develops a method to optimize train departure times from terminals that minimizes total TWT for an urban rail network with many transfer stations. …”
Get full text
Article -
1102
Beetle Swarm Optimization Algorithm-Based Load Control with Electricity Storage
Published 2020-01-01“…Based on the real-time price scheme, the objective function and constraints are obtained, and the adaptive algorithm for beetle swarm optimization with variable whisker length is used to optimize so that the electric equipment can automatically change its power load through the intelligent terminal and even work in the way of reverse power transmission. …”
Get full text
Article -
1103
Malware detection technology analysis and applied research of android platform
Published 2014-08-01“…The server-side detection system is mainly responsible for testing suspicious samples submit-ted by the mobile terminals, meanwhile implements the functions of software behavior analysis, signature library updates, and mobile client synchronization, etc. …”
Get full text
Article -
1104
Idiopathic Superior Mesenteric Vein Thrombosis Resulting in Small Bowel Ischemia in a Pregnant Woman
Published 2011-01-01“…An emergency exploration revealed a segmental gangrene of the small intestine without any mechanical obstruction. Together with the termination of pregnancy, resection of the damaged small bowel was performed, and an end-to-end enterostomy was followed. …”
Get full text
Article -
1105
Leak bucket based admission control for content adaptation system
Published 2007-01-01“…Web server do content adaptation according to the characteristic parameters along with the user request.It would cost more system resource once in a heterogeneous environment where the request varied greatly.To avoid the overload of server,admission control technique must be adopted.Based on combining the terminal characteristic,seman-tic characteristic of content object and communication characteristic,user perceived Web page quality under real-time system load was evaluated and used as a reference in admission control.The leak bucket model and PID(proportional-integral-derivative) method were linked together to construct a feedback control loop.Technical analy-sis and analog simulation validate the feasible of the mechanism,and the QoS user achieved are improved in some degree.It opened up new vista of research for this research direction.…”
Get full text
Article -
1106
INTUSUSCEPCIÓN CECOCÓLICA E INVAGINACIÓN DEL CIEGO EN UN CANINO: REPORTE DE CASO
Published 2011-01-01“…Se decidió realizar una laparotomía exploratoria donde se encontró una intususcepción cecocólica y la invaginación del ciego, el procedimiento quirúrgico realizado consistió en hacer tiflectomia y enteroanastomosis término-terminal; luego de este procedimiento, el paciente se recuperó completamente del cuadro intestinal que presentaba.…”
Get full text
Article -
1107
Two-level cache based streaming media scheduling algorithm for mobile network
Published 2007-01-01“…A novel caching system architecture for mobile streaming was proposed,which was named 2CMSA(two-level cache mobile streaming architecture).In this system,limitations for mobile streaming system such as small memory size in mobile terminal and low bandwidth in wireless access network were avoided.According to the 2CMSA,a scheduling algorithm of 2CMSS(two-level cache based mobile streaming scheduling) was designed;mathematical models were also achieved to analyze the performance of this scheduling algorithm.Simulation experiment proves that,comparing to the original mobile streaming system,by using the new two-level cache architecture and cache based scheduling algorithm,the network transmission cost and the client startup delay of the mobile streaming services can be decreased effectively.…”
Get full text
Article -
1108
Application Research on Telecommunication Network Cloud Computing and Virtual Desktop
Published 2013-05-01“…Following technological development and combining actual situation of Anhui Province,OMS department of Anhui Unicom conducted thorough research on cloud computing and virtualization technology application,and changes traditional project construction concept,so as to provide an infrastructure for maintenance management information system,realize integration of terminal desktop,and guarantee consistency,flexibility,expansibility,normalization and security of background support system based on a uniform virtualized platform.…”
Get full text
Article -
1109
Psychological Violence at Work: Problems in Applying the Law in Lithuania
Published 2024-12-01“…The legislator has defined the scope where psychological violence is prohibited, as well as new ground for terminations of employment contract, and use of psychological violence. …”
Get full text
Article -
1110
Energy optimization strategy on the IoT equipment based on the scheduler
Published 2019-03-01“…A scheduling strategy to optimize energy consumption was proposed to reduce the energy consumption of the edge system in view of the fast growth of energy consumption demand in the internet of things.Based on the analysis of the power management architecture and the energy consumption composition in the typical multi-core terminal system,in view of the shortcomings of the existing system power management module,the scheduler load balancing mechanism was improved to control system energy consumption and the implementation process and implementation points of the strategy were given.The strategy was tested in the multi-core simulation system.The result shows that in low load scenarios,that is,in scenarios that CPU does not need to do data-intensive computing,the energy-saving effect of this strategy is obvious,such as data acquisition,equipment monitoring and other typical internet of things applications.…”
Get full text
Article -
1111
Workflow Modelling and Analysis Based on the Construction of Task Models
Published 2015-01-01“…We also introduce the concept of logical termination of workflows and provide conditions under which this property is valid. …”
Get full text
Article -
1112
Research on intelligent computing offloading model based on reputation value in mobile edge computing
Published 2020-07-01“…Aiming at the problem of high-latency,high-energy-consumption,and low-reliability mobile caused by computing-intensive and delay-sensitive emerging mobile applications in the explosive growth of IoT smart mobile terminals in the mobile edge computing environment,an offload decision-making model where delay and energy consumption were comprehensively included,and a computing resource game allocation model based on reputation that took into account was proposed,then improved particle swarm algorithm and the method of Lagrange multipliers were used respectively to solve models.Simulation results show that the proposed method can meet the service requirements of emerging intelligent applications for low latency,low energy consumption and high reliability,and effectively implement the overall optimized allocation of computing offload resources.…”
Get full text
Article -
1113
Rationalization of servicing reefer containers in sea port area with taking into account risk influence
Published 2014-04-01“…During servicing reefer containers in port container terminals, take place various combinations of risk factors which can lead to loss of quality merits of cargoes contained in them. …”
Get full text
Article -
1114
O rural agrícola na metrópole: o caso de Porto Alegre/RS
Published 2018-04-01“…Considering this context characterized by the presence of conflicts caused by urban expansion and the consequent termination of agricultural practices, this article aims to analyze the main economic, political and cultural elements that contribute to maintaining spaces for agriculture in large urban centers using the local farmers vision from the municipality of Porto Alegre / RS.…”
Get full text
Article -
1115
A Large Brown Tumor of Mandible as First Manifestation of Hyperparathyroidism
Published 2024-12-01“…It can be described as the terminal stage of bone remodeling process where abnormal bone metabolism takes place. …”
Get full text
Article -
1116
Hybrid RZF precoding algorithm for mmWave massive MIMO system
Published 2017-03-01“…A scheme with hybrid precoder at base station and analog combiner at user terminal was proposed. Based on the consideration of the channel characteristic, the analog precoding vectors and analog combining vectors were designed according to the antenna array response vectors of transmitting and receiving ends,respectively.Then a low dimension digital precoding was used to eliminate the influence of system noise and inter-user interference on the basis of the effective channel matrix.Simulation results show that,on the basis of effectively reducing the number of RF chain required by the system, the proposed hybrid precoding algorithm approach the performance of the full digital precoding.…”
Get full text
Article -
1117
Full-dimensional definable network capabilities
Published 2021-10-01“…To solve the problems of single form of existing network capabilities, poor dynamics, low efficiency, and difficulty in adapting to the needs of specialized and personalized services in complex scenarios in the future, a full-dimensional definable network capability model was proposed.Based on the design concept of “network centric”, each layer of the network is opened up to realize the definition of full-dimensional network capabilities such as communication subjects, network functions, network resources, and security, and supports dynamic loading and evolutionary development.Through self-mapping of service requirements and self-organization of network capabilities, it can flexibly adapt to service development needs, and actively output diversified network endogenous capabilities to terminal services in a variety of interface forms, which will naturally adapt to the complex and uncertain evolution of future services.…”
Get full text
Article -
1118
Regular Detection and Intelligent Monitoring Technology of Atmospheric Storage Tank Based on Acoustic Emission and Internet of Things
Published 2025-02-01“…Through the integration of intelligent acoustic wave (acoustic emission) collector, networking communication, cloud platform/server and customer terminal, the long-term online monitoring of storage tanks is realized, the detection efficiency and accuracy are improved, and the manual intervention and maintenance costs are reduced. …”
Get full text
Article -
1119
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01“…Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from the certificate management burden and key escrow issue.To address these issues, a verifiable multi-keyword searchable encryption scheme based on improved Merkle-Tree had been proposed recently.However, through cryptoanalysis, that scheme could not achieve the indistinguishability.With improvement, an efficient able certificateless searchable encryption scheme with verifiability was proposed.Rigorous analysis show that the proposed scheme not only supports the indistinguishability and the unforgeability, but also enjoys higher computing efficiency and lower communication cost, which is more suitable for terminal devices with limited resources.…”
Get full text
Article -
1120
Micro-station sleeping algorithm based on coverage area priority in 5G network
Published 2022-07-01“…With the maturity of 5G mobile communication technology and the rapid growth of the number of mobile terminals, the problem of intensive energy consumption of 5G wireless communication system base stations is prominent.A micro base station area hierarchical sleep algorithm was proposed.Considering the impact of micro base station load, inter station distance and inter layer cooperation on micro base station sleep, the transitions number of the micro base station in the overlapping coverage area between macro base stations is less, and the priority sleep operation has a good energy-saving effect.The simulation result shows that the energy-saving rate is 23%, which can adapt to different network sizes, and the energy-saving effect is better in large-scale networks.…”
Get full text
Article