-
161
The Impact of Length-Scale Variation When Diagnosing the Standard Deviations of Background Error in a 4D-Var System and Filtering Method Investigation
Published 2020-01-01“…To eliminate such sampling noise, the spectral filtering method used widely in the operational system and a modified spatial averaging approach are investigated. …”
Get full text
Article -
162
Accuracy of the SWAY Mobile Cognitive Assessment Application
Published 2021-08-01“… # Methods 88 healthy, young adults, 18 to 48 years (*mean*= 22.09 ± *sd*=4.47 years) completed four, randomized and counter-balanced, reaction time tests (2- SWAY RT, 2- ImPACT QT) using different operating systems (iOS, Android) of 4 randomly assigned mobile devices…”
Get full text
Article -
163
Data-driven automated job shop scheduling optimization considering AGV obstacle avoidance
Published 2025-01-01“…In order to improve the collaboration between the production stages and the AGV operation system, a two-layer scheduling optimization model is proposed for simultaneous decision making of batching problems, job sequences and AGV obstacle avoidance. …”
Get full text
Article -
164
Robotic Autonomous Observatories: A Historical Perspective
Published 2010-01-01“…The author discusses the basic definitions, the differing telescope control operating systems, observatory managers, as well as a few current scientific applications.…”
Get full text
Article -
165
Can a Patient use an App at Home to Measure Knee Range of Motion? Utilizing a Mobile App, Curovate, to Improve Access and Adherence to Knee Range of Motion Measurements
Published 2022-04-01“…The reliability and validity of the Curovate app was tested across mobile devices and operating systems and compare to goniometric knee range of motion measurements. …”
Get full text
Article -
166
Study on Key Technologies of Intelligent IoT Device
Published 2015-08-01“…Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.…”
Get full text
Article -
167
Some Fixed Point Results for Perov-Ćirić-Prešić Type F-Contractions with Application
Published 2020-01-01“…To support our main result, an example and an application to nonlinear operator systems are presented.…”
Get full text
Article -
168
DIRECTIONS OF IMPROVING THE EFFICIENCY OF OPERATION MANAGEMENT OF MILITARY ENGINEERING OF THE VIETNAMESE PEOPLE'S ARMY
Published 2017-11-01“…The main principles of optimization of the military equipment operation system are presented and the main directions for increasing the effectiveness of the management of the operation of military equipment are recommended, in particular, the application of the method of controlling the technical resource of military equipment in a step-by-step schedule, and also the method of network planning. …”
Get full text
Article -
169
A detection method of Android system vulnerabilities based on matching
Published 2016-05-01“…Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android users.Android system vulnerabilities were studied,and a rapid detection method of Android system vulnerabilities based on matching was proposed.A script-based vulnerability scanning tool was also designed.Through the evaluation of experiments,the tool is running well.…”
Get full text
Article -
170
New Results on Passivity Analysis for Uncertain Neural Networks with Time-Varying Delay
Published 2014-01-01“…The main characteristic of this paper is to obtain novel stability and passivity analysis criteria for uncertain neural networks with time-delay in the delta operator system framework. A numerical example is presented to demonstrate the effectiveness of the proposed results.…”
Get full text
Article -
171
Reflection and Analysis on Network Maintenance Transition of Telecommunication Operators
Published 2014-07-01“…It was described that in order to improve customer perception and enhance the competitiveness of enterprises, how telecommunication operators worked on network maintenance transition, to realize network maintenance, support business refinement management, improve the capability of rapid response of operation system.…”
Get full text
Article -
172
Research and application of remote update technology of IoT terminal
Published 2018-10-01“…Remote updating of IoT terminal is the basis of supporting its iterative optimization,large-scale deployment and low-cost maintenance.The contradiction between the present status of remote updating of IoT terminals and the requirement of unified management and control was analyzed.Based on LWM2M protocol,a solution of remote updating of IoT terminals was proposed.In this solution,IoT platform provides the unified management and control of IoT terminals with heterogeneous operating systems and multi-model terminals,which helps reducing the impact of terminal scale updating on the network and improving the generality,reliability and stability of remote updating.…”
Get full text
Article -
173
On Max-Plus Algebra and Its Application on Image Steganography
Published 2018-01-01“…The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.…”
Get full text
Article -
174
Operations on Soft Sets Revisited
Published 2013-01-01“…We find that the new operation system on soft sets inherits all basic properties of operations on classical sets, which justifies our definitions.…”
Get full text
Article -
175
The SEMAINE API: Towards a Standards-Based Framework for Building Emotion-Oriented Systems
Published 2010-01-01“…By providing a Java and C++ wrapper around a message-oriented middleware, the API makes it easy to integrate components running on different operating systems and written in different programming languages. …”
Get full text
Article -
176
Study on Yaw Gearbox Broken Tooth of MW-class Wind Turbine
Published 2018-01-01“…The comprehensive analysis is carried out on the failure gears,the causes of gear damage,such as tooth fracture,design factor,production factor,factors of assembly and operation,system protection factor,etc. are analyzed one by one,the final positioning between the thrust pad bearing and yaw ring interference is the direct cause. …”
Get full text
Article -
177
Terminals behavior testing research under IPv6 Wi-Fi
Published 2014-10-01“…As lack of essential data,carrier operators are afraid to promote IPv6 in mobile Internet due to they cannot forecast the influence of user experience.The main current mobile terminals behavior under IPv6 Wi-Fi was tested,the key point to impact user experience was analyzed and the practicability of large-scale deployment of IPv6 in mobile Internet was studied.The main steps of establishing the test platform were detailed.Test results show that the operating systems and browsers with big market share supporting for IPv6 are still not perfect.They lead to worse user experience by bad internetworking.It is the main obstacle to promote IPv6 in mobile Internet.…”
Get full text
Article -
178
A Comprehensive Approach to Power Management in Embedded Systems
Published 2011-03-01“…As a result, this paper has its main contribution on the introduction of a comprehensive and systematic way to deal with power management issues in resource-constrained, battery-operated systems.…”
Get full text
Article -
179
Open service platform for IoT
Published 2016-02-01“…Currently,there are still some problems with IoT,specifically in:one is that the IoT gives priority to vertical service system;another is the lack of cross-system resource sharing.To solve the above problems,a scalable intelligence service architecture of IoT in which a unified service data model was proposed and a message middleware were built to overcome the multi-source heterogeneous problems in the data structure,data platforms and operating systems. In addition,a usage authorization mechanism was proposed to support security and privacy in the IoT environment, contributing to a scalable,secure and reliable intelligence open service platform for IoT.Finally,a prototype system was designed and concrete system was given to verify the feasibility and superiority of the proposed architecture.…”
Get full text
Article -
180
Dynamic and heterogeneous Byzantine system in cloud
Published 2018-05-01“…In order to improve the intrusion tolerance performance of cloud platforms,the Byzantine system model has been widely used.But the current Byzantine system is difficult to prevent a latent attack effectively,which can destroy the Byzantine system by accumulating the number of executive modules which the attacker controls and making it exceed the tolerance upper limit.To solve the problem,a dynamic and heterogeneous Byzantine system was proposed.In which the executive modules were maximized diversified in configurations such as different operating systems and so on.Meanwhile,every executive module was assigned a lifetime based on the attacker’s ability and the vulnerabilities of the module.The novel system can significantly enhance the intrusion tolerance of the cloud service by diverse and dynamic attack surface,which is verified by simulations.…”
Get full text
Article