Showing 341 - 360 results of 830 for search 'Rangoon~', query time: 1.92s Refine Results
  1. 341
  2. 342
  3. 343

    One-bit maximum likelihood algorithm for sensor networks in non-ideal channels by Nana WANG, Zhaoting LIU, Yingbiao YAO

    Published 2020-03-01
    “…Wireless sensor networks typically consist of wireless sensor nodes that are distributed in a certain spatial range.In general,the energy storage,computing and communication capabilities of nodes are extremely limited.Direct transmission of the sampled signals of the various nodes to the fusion center will result in more energy consumption and greater network communication load.If the sampled signal value of each sensor node is compressed into a one-bit measurement value and then transmitted,the energy consumption and the communication load can be greatly reduced.The parameter estimation problem based on one-bit measurement of sensor networks in multiplicative noise environment was studied.Considering the non-ideal binary channel with interference between the node and the fusion center,a parameter estimation algorithm based on maximum likelihood was proposed,Cramér-Rao lower bound of the parameter estimation was analyzed,and the effectiveness of the algorithm was verified through a series of simulation experiments.…”
    Get full text
    Article
  4. 344
  5. 345
  6. 346

    WSN key recovery attack based on symmetric matrix decomposition by Xiangmin JI, Bo ZHAO, Jinhui LIU, Jianwei JIA, Huanguo ZHANG, Shuang XIANG

    Published 2018-10-01
    “…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
    Get full text
    Article
  7. 347
  8. 348
  9. 349
  10. 350
  11. 351
  12. 352
  13. 353
  14. 354
  15. 355

    A Novel Subspecies of Didymella acutilobae Causing Leaf Spot in East Asian Hogweed by Gyo-Bin Lee, Weon-Dae Cho, Wan-Gyu Kim

    Published 2024-11-01
    “…During disease surveys in 2021 and 2022, outbreaks of leaf spot were observed in East Asian hogweed (Heracleum moellendorffii) plants in fields located in Pyeongchang and Yeongwol, Gangwon Province, Korea. The disease incidence in the fields ranged from 2% to 50%. …”
    Get full text
    Article
  16. 356
  17. 357
  18. 358
  19. 359
  20. 360