-
101
A Comprehensive Approach to Power Management in Embedded Systems
Published 2011-03-01“…As a result, this paper has its main contribution on the introduction of a comprehensive and systematic way to deal with power management issues in resource-constrained, battery-operated systems.…”
Get full text
Article -
102
Research on the Influence of Sensor Network Communication in the Electromagnetic Environment of Smart Grid
Published 2016-01-01“…And the sensing and communication device must be after equal parameter simulation environment under strict evaluation and verification can be put to use in actual production operation system. In this paper, we analyze the application of wireless sensor network in smart grid and propose the test method of the interaction between WSN and smart grid.…”
Get full text
Article -
103
A Benders Decomposition Algorithm for the Passenger Train Service Planning
Published 2021-01-01“…The passenger train service planning is the key of the rail operations system to balance the transport service and the passenger demand. …”
Get full text
Article -
104
Cross-Platform Ecological Momentary Assessment App (JTrack-EMA+): Development and Usability Study
Published 2025-01-01“…ObjectiveThe primary aim of this research was to develop a cross-platform EMA app that ensures a uniform user experience and core features across various operating systems. Emphasis was placed on maximizing the integration and adaptability to various study designs, all while maintaining strict adherence to security and privacy protocols. …”
Get full text
Article -
105
Characterization of Antibiotics and Antibiotic Resistance Genes on an Ecological Farm System
Published 2015-01-01“…Therefore, continuous monitoring of antibiotics and their corresponding ARGs should be conducted in the agroecosystem near the concentrated animal farming operation systems.…”
Get full text
Article -
106
A ChIP-Seq Data Analysis Pipeline Based on Bioconductor Packages
Published 2017-03-01“…This workflow runs well independently of operating systems (e.g., Windows, Mac, or Linux) and processes the input fastq files into various results in one run. …”
Get full text
Article -
107
Access to Network Login by Three-Factor Authentication for Effective Information Security
Published 2016-01-01Get full text
Article -
108
THE CONSEQUENCES OF THE INTERNET FOR POLITICS
Published 2013-08-01“…Barack Obama influences global politics as if it were operation system of the computer. Thus the author believes that such problems as determination of the driving forces of the Arab spring and real reasons for the USA refusal to sign new telecommunications treaty at the ITU conference in Dubai deserve special analysis taking into account the role of the information and communication technologies.…”
Get full text
Article -
109
Grenoble entre natures et cultures : exemple de la valorisation de l’agriculture périurbaine grenobloise
Published 2012-01-01“…Taking into account the social demand for nature, as a pattern of the operating systems, allows to further develop the debate around agriculture, through the role assigned to peri-urban agriculture. …”
Get full text
Article -
110
An English Online Homework Tutoring System Supported by Internet Database
Published 2021-01-01“…It can be connected to different operating systems.…”
Get full text
Article -
111
Implementation of Static Line Voltage Stability Indices for Improved Static Voltage Stability Margin
Published 2019-01-01“…Nowadays, the changes of economic, environment, and regulations are forcing the electric utilities to operate systems at maximum capacity. Therefore, the operation and control of power system to improve the system stability has been receiving a great deal of attention. …”
Get full text
Article -
112
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. …”
Get full text
Article -
113
A Resilience-Based Security Assessment Approach for CBTC Systems
Published 2021-01-01“…With the rapid development of urban rail transit systems, large amounts of information technologies are applied to increase efficiency of train control systems, such as general computers, communication protocols, and operation systems. With the continuous exposure of information technology vulnerabilities, security risks are increasing, and information is easy to use by malicious attackers, which can bring huge property and economic losses. …”
Get full text
Article -
114
Operational strategy, capabilities, and successfully accomplishing business strategy
Published 2025-01-01“…The results exhibit the challenges posed by rapid market changes, revealing the deficiencies of traditional operational systems focused solely on efficiency and cost. …”
Get full text
Article -
115
Quorum Systems towards an Asynchronous Communication in Cognitive Radio Networks
Published 2012-01-01“…Quorum systems were originally developed for and widely used in the scope of operating systems. Recently, quorum systems have been also started to be applied to wireless communications. …”
Get full text
Article -
116
Using Shadow Page Cache to Improve Isolated Drivers Performance
Published 2015-01-01“…With the advantage of the reusability property of the virtualization technology, users can reuse various types and versions of existing operating systems and drivers in a virtual machine, so as to customize their application environment. …”
Get full text
Article -
117
Channel modeling and testing of wireless transmission for underground in-pipe leak and material loss detection
Published 2017-11-01“…This constitutes one of the timely and challenging issues of battery-operated systems. The purpose of this work is to characterize the radio transmission between underground buried pipes and base station using multi-layer media including both theoretical and experimental approaches by utilizing various modulation schemes. …”
Get full text
Article -
118
Pixel‐wise supervision for presentation attack detection on identity document cards
Published 2022-09-01“…The baseline benchmark is presented using different handcrafted and deep learning models on a newly constructed in‐house database obtained from an operational system consisting of 886 users with 433 bona fide, 67 print and 366 display attacks. …”
Get full text
Article -
119
Evaluation of Face Stability for Mega Tunnel Under Varying Ground Strength Parameters
Published 2024-12-01“…Mega Tunnels, defined as those with a diameter exceeding 10m, offer diverse functionalities, including facilitating the storage and movement of large equipment and establishing comprehensive operational systems for urban areas. However, ensuring the stability of these tunnels’ faces poses a significant challenge due to their larger diameter, making it a crucial research focus. …”
Get full text
Article -
120
Hierarchical Agent-Based Integrated Modelling Approach for Microgrids with Adoption of EVs and HRES
Published 2014-01-01“…Furthermore, HAIMA practically contributes to a comprehensive microgrid operation system, through which the assessment of the proposed model and the impact of the EVs adoption are achieved. …”
Get full text
Article