Showing 5,921 - 5,940 results of 67,915 for search 'DASB~', query time: 2.42s Refine Results
  1. 5921

    Intersection-based geographical perception routing protocol in VANET by Yuqi YANG, Guoan ZHANG, Min WU

    Published 2017-01-01
    “…In order to solve the problem of the communication performance of degradation,which caused by multi-intersections in city environment and no sensitivity to individual node movements,an intersection-based geographical perception routing protocol in vehicular Ad Hoc network was proposed.The network gateways select road intersections to form the backbone of the route,ensuring a high probability of communication and meeting delay and bit error rate requirements.Mathematical formula of the average delay and the average number of hops were obtained on the basis of a two-way road model.Simulation results show that the transmission delay of IGPR is smaller,the number of hops of IGPR is less,and the communication performance of IGPR is better compared with the FRGR protocols and VRR protocols.…”
    Get full text
    Article
  2. 5922
  3. 5923

    Resource- Based Conflict and Rural Poverty in Benue State by W. Yio Benjamin

    Published 2023-09-01
    “…Consequently, the struggle over some of these resources in the region especially agricultural land and water resources between Farmers and Pastoralists in the last two decades has led to a sustained violent conflict in the area leading to a large displacement of farmers, damage to infrastructure, institutions, production and brake up of communities and social networks therefore exacerbating poverty in the region. …”
    Get full text
    Article
  4. 5924

    Simultaneous Pose and Correspondence Estimation Based on Genetic Algorithm by Haiwei Yang, Fei Wang, Zhe Li, Hang Dong

    Published 2015-11-01
    “…In this paper, we derive a novel method which estimates the initial value based on genetic algorithm, considering the influences of different initial guesses comprehensively. …”
    Get full text
    Article
  5. 5925

    Vulnerability Analysis of CSP Based on Stochastic Game Theory by Jiajun Shen, Dongqin Feng

    Published 2016-01-01
    “…With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. …”
    Get full text
    Article
  6. 5926

    Hadoop-Based Distributed Sensor Node Management System by In-Yong Jung, Ki-Hyun Kim, Byong-John Han, Chang-Sung Jeong

    Published 2014-03-01
    “…It offers various efficient ways for collecting sensor data and managing multiple sensor nodes by launching specific mapreduce applications on sensor nodes which upload data of sensor nodes to DFS and retrieve sensor data periodically from DFS. …”
    Get full text
    Article
  7. 5927

    Exploiting Attitude Sensing in Vision-Based Navigation for an Airship by Luiz G. B. Mirisola, Jorge Dias

    Published 2009-01-01
    “…An Attitude Heading Reference System (AHRS) is used to compensate for rotational motion, facilitating vision-based navigation above smooth terrain by generating virtual images to simulate pure translation movement. …”
    Get full text
    Article
  8. 5928
  9. 5929
  10. 5930
  11. 5931

    Attribute-based lightweight reconfigurable access control policy by Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO

    Published 2020-02-01
    “…Aiming at the severe challenges of access control policy redundancy and conflict detection,the efficiency of access control policy evaluation in complex network environment,an attribute-based lightweight reconfigurable access control policy was proposed.Taking the attribute-based access control policy as an example,the attribute-based access control policy was divided into multiple disjoint atomic access control rules according to the operation type,subject attribute,object attribute,and environment attribute in the access control policy.Complex access control policies were constructed through atomic access control rules and an algebraic expression formed by AND,OR logical relationships.A method for redundancy and collision detection of atomic access control rules was proposed.A method was proposed for decompose a complex access control policy into equivalent atomic access control rules and an algebraic expression.The method for redundancy and collision detection of complex access control policies were proposed through redundancy and collision detection of equivalent atomic access control rules and algebraic expressions.From time complexity and space complexity,the efficiency of the equivalent transformation access control policy was evaluated.It showes that the reconstruction method for access control policy greatly reduces the number,size and complexity of access control policy,improves the efficiency of access control policy redundancy and collision detection,and the efficiency of access control evaluation.…”
    Get full text
    Article
  12. 5932

    Augmented Reality based Gamified Mandarin Learning Application by Steffi Adam, Marfuah Marfuah, Ummul Fitri Afifah, Abdullah Abdullah

    Published 2024-11-01
    “…Unfortunately, many children become bored and unwilling to learn Mandarin because Mandarin has a complex language structure, starting from writing, pronunciation, and grammar. …”
    Get full text
    Article
  13. 5933
  14. 5934

    An IDM-Based Approach for Information Requirement in Prefabricated Construction by Zhao Xu, Jimmy Abualdenien, Hao Liu, Rui Kang

    Published 2020-01-01
    “…This paper extends the IFC data model to support prefabricated construction. …”
    Get full text
    Article
  15. 5935
  16. 5936

    Stress Analysis of Cup Flexspline based on Different Model by Wang Changlu, Wei Leyu, Zhang Liyong, Qiao Xuetao, Liu Xinmeng

    Published 2017-01-01
    “…In view of the stress of flexspline calculated on the basis of the theory of thin-walled cylinder,there are many assumptions of the theory,which will lead to the difference between the calculated value and the actual value. …”
    Get full text
    Article
  17. 5937

    Network-Based Bag-of-Words Model for Text Classification by Dongyang Yan, Keping Li, Shuang Gu, Liu Yang

    Published 2020-01-01
    “…The rapidly developing internet and other media have produced a tremendous amount of text data, making it a challenging and valuable task to find a more effective way to analyze text data by machine. …”
    Get full text
    Article
  18. 5938

    BASED ON IMPROVED ACO WELDING JOINT OPTIMIZATION ANALYSIS by ZHANG ShengYue, QING Li, FENG QiuXia, ZHANG YuDong

    Published 2016-01-01
    “…The method to establish the T-type pipe ring joint welding simulation,and analyzes its corresponding welding path respectively,the results show that compared with the traditional ant colony algorithm,based on improved ant colony algorithm of welding path not only saves time resources,and reduce the waste of wire material. …”
    Get full text
    Article
  19. 5939

    Multisensor Based Neutral Function Identification of Solenoid Valve by Yanqing Guo, Yongling Fu, Xiaoye Qi, Chun Cao

    Published 2014-04-01
    “…The detection system learns to detect the change of output pressure of multipoints that represent a more complicated task. Linear correlation analysis is introduced for feature extraction, which allows for a significant reduction in the dimension of original data without compromising the change detection performance. …”
    Get full text
    Article
  20. 5940