Suggested Topics within your search.
Suggested Topics within your search.
- methods 3
- Child care 2
- Child, Hospitalized 2
- Developing Countries 2
- Hospitals 2
- Mass media 2
- Orphans 2
- Pediatric Emergencies 2
- Pediatrics 2
- Young men 2
- ART / Digital 1
- Adaptations 1
- Arrhythmias, Cardiac 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Benefactors 1
- Board books 1
- Civil engineering 1
- Communication of technical information 1
- Computer animation 1
- Developmental psychology 1
- Diagnostic tests 1
- Digital cinematography 1
- Electrocardiography 1
- Emergency Medicine 1
- Ex-convicts 1
- Family Medicine 1
- Fathers and daughters 1
- HIV/AIDS Treatment 1
- Historiography 1
-
981
Design of Optical Wireless Networks with Fair Traffic Flows
Published 2014-01-01“…A mathematical programming model of the network design problem is presented that assumes that the packet rates of elastic traffic flows decrease fairly. …”
Get full text
Article -
982
The Value of Gambling and its Research
Published 2011-01-01“…Most people in Western societies have some experience of ambling, and many buy a lottery ticket, play slot machines, or bet on sports as a regular part of their leisure. …”
Get full text
Article -
983
Geometric modeling of the process of digging trench pits during pipeline repair
Published 2023-11-01“…When performing work on the repair of the pipeline, the main machine designed for digging trench pits is a single-bucket excavator. Pit digging currently uses two excavators moving along the pipeline in parallel directions. …”
Get full text
Article -
984
Multi-Cell Displacement Measurement During the Assembly of Automotive Power Batteries Based on Machine Vision
Published 2025-01-01“…In order to enhance the accuracy of tab displacement calculation, a novel method for feature point detection and displacement calculation of lithium battery stacks based on the MicKey (Metric Keypoints) method is introduced. MicKey can predict the coordinates of corresponding keypoints in the 3D camera space through keypoint matching based on neural networks, and it can acquire feature point pairs of the subject to be measured through its unique depth reduction characteristics. …”
Get full text
Article -
985
5G Fronthaul in Modular P4: eCPRI Protocol Processing and Precise BMv2 Timestamps for PTP-1588
Published 2025-01-01“…By implementing an eCPRI packet processing unit based on the eCPRI Specification Version 2 and inspired by Intel’s FPGA-based IP, we enable modular addition of new message types and custom packet processing functionality in P4. …”
Get full text
Article -
986
Gambling and Consumption
Published 2011-01-01“…Sociologist Emma Casey (2008: 3), who has studied British working-class women’s xperiences of the National lottery, points out that buying a lottery ticket is a very popular routine purchase with unique mass appeal. …”
Get full text
Article -
987
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01“…The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts access objects, data packet time interval, and data packet length, thus improving the concealment of the channel. …”
Get full text
Article -
988
Modeling of Random Delays in Networked Control Systems
Published 2013-01-01“…In networked control systems (NCSs), the presence of communication networks in control loops causes many imperfections such as random delays, packet losses, multipacket transmission, and packet disordering. …”
Get full text
Article -
989
Control Theory-Based Load Balancing for Wireless Sensor Network
Published 2014-03-01“…We first formulate the packet forwarding problem into a classic control model and then derive the controller model. …”
Get full text
Article -
990
Beamforming Transmission in IEEE 802.11ac under Time-Varying Channels
Published 2014-01-01“…The relationship between packet length and throughput is also investigated for single-user and multiuser BF modes.…”
Get full text
Article -
991
The Effect of Electroplated Ni Nanocoating on Fatigue Life of 1020 AISI Low Carbon Steel
Published 2023-09-01“…The prepared specimens are exposed to electroplated process using Nano nickel with 40 nm at diverse situations to improve the fatigue limit of metal. …”
Get full text
Article -
992
LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation
Published 2021-01-01“…Then, we simulated the proposed scheme with the NS3 tool and compared it with Throughput, packet loss, Packet Delivery, and end-to-end delay with Yashar et al. scheme. …”
Get full text
Article -
993
Fuel Cell Electrodes Based on Carbon Nanotube/Metallic Nanoparticles Hybrids Formed on Porous Stainless Steel Pellets
Published 2013-01-01“…The catalytic growth of carbon nanotubes was carried out by CVD on a nickel catalyst obtained by impregnation of pellets with a highly dispersive colloidal solution of nickel acetate tetrahydrate in ethanol. …”
Get full text
Article -
994
Road Perception Based Geographical Routing Protocol for Vehicular Ad Hoc Networks
Published 2016-02-01“…To handle high mobility and environmental obstacles, most of geographical routing protocols do not consider stable links during packet transmission which lead to higher delay and packet dropping in network. …”
Get full text
Article -
995
-
996
Detecting and Predicting Models for QoS Optimization in SDN
Published 2024-01-01“…More specifically, elephant flow management is a critical task that needs further research since its heavy hit behavior leads to high CPU utilization, packet drops, high latency, packet overflow, and network congestion problems. …”
Get full text
Article -
997
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…Pollution attack can be prevented by using homomorphic network coding signature schemes to check whether a corrupted packet is injected. However, existing schemes require high computational cost for signature verification which will reduce the transmission efficiency. …”
Get full text
Article -
998
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…In this paper, PCAP refers to Packet Capture, Network Intrusion Detection Systems refers to NIDS, Artificial Intelligence refers to AI, machine learning refers to ML, Computer Vision refers to CV, and Natural Language Processing refers to NLP. …”
Get full text
Article -
999
V-BAG: A virtual bandwidth aggregation scheme for Internet of Things data
Published 2017-04-01“…The proposed scheme consists of three salient functions: packet scheduler, estimator, and ACK buffer. The packet scheduler provides an efficient heterogeneous link selection using the proposed scheduling algorithm. …”
Get full text
Article -
1000
Link Layer Time-Varying Model for IEEE 802.15.4 Radio in Industrial Environment
Published 2014-12-01“…The paper proposed a link layer statistical model (LTM) for time-varying of 16 channels based on packet drop rate (PDR) data collected from typical industrial environments. …”
Get full text
Article