Showing 981 - 1,000 results of 2,574 for search 'wicket~', query time: 2.08s Refine Results
  1. 981

    Design of Optical Wireless Networks with Fair Traffic Flows by Artur Tomaszewski

    Published 2014-01-01
    “…A mathematical programming model of the network design problem is presented that assumes that the packet rates of elastic traffic flows decrease fairly. …”
    Get full text
    Article
  2. 982

    The Value of Gambling and its Research by Pauliina Raento

    Published 2011-01-01
    “…Most people in Western societies have some experience of   ambling, and many buy a lottery ticket, play slot machines, or bet on sports as a regular part of their leisure. …”
    Get full text
    Article
  3. 983

    Geometric modeling of the process of digging trench pits during pipeline repair by F. N. Pritykin, I. S. Kuznetsov

    Published 2023-11-01
    “…When performing work on the repair of the pipeline, the main machine designed for digging trench pits is a single-bucket excavator. Pit digging currently uses two excavators moving along the pipeline in parallel directions. …”
    Get full text
    Article
  4. 984

    Multi-Cell Displacement Measurement During the Assembly of Automotive Power Batteries Based on Machine Vision by Yueda Xu, Yanfeng Xing, Hongbo Zhao, Yufang Lin, Lijia Ren, Zhihan Zhou

    Published 2025-01-01
    “…In order to enhance the accuracy of tab displacement calculation, a novel method for feature point detection and displacement calculation of lithium battery stacks based on the MicKey (Metric Keypoints) method is introduced. MicKey can predict the coordinates of corresponding keypoints in the 3D camera space through keypoint matching based on neural networks, and it can acquire feature point pairs of the subject to be measured through its unique depth reduction characteristics. …”
    Get full text
    Article
  5. 985

    5G Fronthaul in Modular P4: eCPRI Protocol Processing and Precise BMv2 Timestamps for PTP-1588 by Atabak Nojavan, Bill Pontikakis, Francois-Raymond Boyer, Yvon Savaria

    Published 2025-01-01
    “…By implementing an eCPRI packet processing unit based on the eCPRI Specification Version 2 and inspired by Intel’s FPGA-based IP, we enable modular addition of new message types and custom packet processing functionality in P4. …”
    Get full text
    Article
  6. 986

    Gambling and Consumption by Riitta Matilainen

    Published 2011-01-01
    “…Sociologist Emma Casey (2008: 3), who has studied British working-class women’s  xperiences of the National lottery, points out that buying a lottery ticket is a very popular routine purchase with unique mass appeal. …”
    Get full text
    Article
  7. 987

    Covert Channel Construction Method Based on HTTP Composite Protocols by Longxing Jin, Zijun Liu, Fuquan Huang, Zizhao Lin, Ming Li

    Published 2022-01-01
    “…The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts access objects, data packet time interval, and data packet length, thus improving the concealment of the channel. …”
    Get full text
    Article
  8. 988

    Modeling of Random Delays in Networked Control Systems by Yuan Ge, Qigong Chen, Ming Jiang, Yiqing Huang

    Published 2013-01-01
    “…In networked control systems (NCSs), the presence of communication networks in control loops causes many imperfections such as random delays, packet losses, multipacket transmission, and packet disordering. …”
    Get full text
    Article
  9. 989

    Control Theory-Based Load Balancing for Wireless Sensor Network by Sanqi Zhou, Yinchao Chen

    Published 2014-03-01
    “…We first formulate the packet forwarding problem into a classic control model and then derive the controller model. …”
    Get full text
    Article
  10. 990

    Beamforming Transmission in IEEE 802.11ac under Time-Varying Channels by Heejung Yu, Taejoon Kim

    Published 2014-01-01
    “…The relationship between packet length and throughput is also investigated for single-user and multiuser BF modes.…”
    Get full text
    Article
  11. 991

    The Effect of Electroplated Ni Nanocoating on Fatigue Life of 1020 AISI Low Carbon Steel by Israa Akram Hantoosh, Aliaksandr Skaskevich

    Published 2023-09-01
    “…The prepared specimens are exposed to electroplated process using Nano nickel with 40 nm at diverse situations to improve the fatigue limit of metal. …”
    Get full text
    Article
  12. 992

    LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation by Yashar Salami, Vahid Khajehvand

    Published 2021-01-01
    “…Then, we simulated the proposed scheme with the NS3 tool and compared it with Throughput, packet loss, Packet Delivery, and end-to-end delay with Yashar et al. scheme. …”
    Get full text
    Article
  13. 993

    Fuel Cell Electrodes Based on Carbon Nanotube/Metallic Nanoparticles Hybrids Formed on Porous Stainless Steel Pellets by S. M. Khantimerov, E. F. Kukovitsky, N. A. Sainov, N. M. Suleimanov

    Published 2013-01-01
    “…The catalytic growth of carbon nanotubes was carried out by CVD on a nickel catalyst obtained by impregnation of pellets with a highly dispersive colloidal solution of nickel acetate tetrahydrate in ethanol. …”
    Get full text
    Article
  14. 994

    Road Perception Based Geographical Routing Protocol for Vehicular Ad Hoc Networks by Kashif Naseer Qureshi, Abdul Hanan Abdullah, Jaime Lloret

    Published 2016-02-01
    “…To handle high mobility and environmental obstacles, most of geographical routing protocols do not consider stable links during packet transmission which lead to higher delay and packet dropping in network. …”
    Get full text
    Article
  15. 995

    Biology : concepts & connections / by Taylor, Martha R.

    Published 2019
    View in OPAC
    Book
  16. 996

    Detecting and Predicting Models for QoS Optimization in SDN by Getahun Wassie, Jianguo Ding, Yihenew Wondie

    Published 2024-01-01
    “…More specifically, elephant flow management is a critical task that needs further research since its heavy hit behavior leads to high CPU utilization, packet drops, high latency, packet overflow, and network congestion problems. …”
    Get full text
    Article
  17. 997

    Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system by Yumei Li, Futai Zhang, Yinxia Sun

    Published 2021-01-01
    “…Pollution attack can be prevented by using homomorphic network coding signature schemes to check whether a corrupted packet is injected. However, existing schemes require high computational cost for signature verification which will reduce the transmission efficiency. …”
    Get full text
    Article
  18. 998

    Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis by Du Tianqing

    Published 2025-01-01
    “…In this paper, PCAP refers to Packet Capture, Network Intrusion Detection Systems refers to NIDS, Artificial Intelligence refers to AI, machine learning refers to ML, Computer Vision refers to CV, and Natural Language Processing refers to NLP. …”
    Get full text
    Article
  19. 999

    V-BAG: A virtual bandwidth aggregation scheme for Internet of Things data by Yongsu Gwak, Young Yong Kim, Ronny Yongho Kim

    Published 2017-04-01
    “…The proposed scheme consists of three salient functions: packet scheduler, estimator, and ACK buffer. The packet scheduler provides an efficient heterogeneous link selection using the proposed scheduling algorithm. …”
    Get full text
    Article
  20. 1000

    Link Layer Time-Varying Model for IEEE 802.15.4 Radio in Industrial Environment by Wan Yadong, Duan Shihong

    Published 2014-12-01
    “…The paper proposed a link layer statistical model (LTM) for time-varying of 16 channels based on packet drop rate (PDR) data collected from typical industrial environments. …”
    Get full text
    Article