-
341
Kinetic Hydration Heat Modeling for High-Performance Concrete Containing Limestone Powder
Published 2017-01-01Get full text
Article -
342
Decision Support Model for Introduction of Gamification Solution Using AHP
Published 2014-01-01Get full text
Article -
343
One-bit maximum likelihood algorithm for sensor networks in non-ideal channels
Published 2020-03-01“…Wireless sensor networks typically consist of wireless sensor nodes that are distributed in a certain spatial range.In general,the energy storage,computing and communication capabilities of nodes are extremely limited.Direct transmission of the sampled signals of the various nodes to the fusion center will result in more energy consumption and greater network communication load.If the sampled signal value of each sensor node is compressed into a one-bit measurement value and then transmitted,the energy consumption and the communication load can be greatly reduced.The parameter estimation problem based on one-bit measurement of sensor networks in multiplicative noise environment was studied.Considering the non-ideal binary channel with interference between the node and the fusion center,a parameter estimation algorithm based on maximum likelihood was proposed,Cramér-Rao lower bound of the parameter estimation was analyzed,and the effectiveness of the algorithm was verified through a series of simulation experiments.…”
Get full text
Article -
344
-
345
Mitigation Method of Rockfall Hazard on Rock Slope Using Large-Scale Field Tests and Numerical Simulations
Published 2020-01-01Get full text
Article -
346
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01“…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
Get full text
Article -
347
Analysis of Hydration and Optimal Strength Combinations of Cement-Limestone-Metakaolin Ternary Composite
Published 2019-01-01Get full text
Article -
348
A Novel 3D Indoor Localization Scheme Using Virtual Access Point
Published 2014-04-01Get full text
Article -
349
-
350
-
351
-
352
Communication Network for Sports Activity Monitoring Systems
Published 2021-01-01Get full text
Article -
353
-
354
-
355
A Novel Subspecies of Didymella acutilobae Causing Leaf Spot in East Asian Hogweed
Published 2024-11-01“…During disease surveys in 2021 and 2022, outbreaks of leaf spot were observed in East Asian hogweed (Heracleum moellendorffii) plants in fields located in Pyeongchang and Yeongwol, Gangwon Province, Korea. The disease incidence in the fields ranged from 2% to 50%. …”
Get full text
Article -
356
-
357
Damage Identification by the Data Expansion and Substructuring Methods
Published 2018-01-01Get full text
Article -
358
A Novel Method for Functional Annotation Prediction Based on Combination of Classification Methods
Published 2014-01-01Get full text
Article -
359
Numerical Study on the Characteristics of Hydrogen Leakage, Diffusion and Ventilation in Ships
Published 2025-01-01Get full text
Article -
360