Showing 161 - 180 results of 349 for search '"Emulate"', query time: 0.03s Refine Results
  1. 161
  2. 162
  3. 163

    Survivability model for reconfigurable service carrying network based on the stochastic Petri net by Liang ZHAO, Hong ZOU, Xiao-hui ZHANG

    Published 2016-03-01
    “…Aiming at the defect that the security attribute of RSCN couldn't be described with measurement,a survivabil-ity model for RSCN was proposed based on the stochastic Petri net.Firstly,a non-Markovian stochastic Petri net for RSCN was proposed,and then the state schematics was educed based on the FCFS fault repair policy subsequently.Fina-ly,the survivability model was concluded based on the probability equation of system state by importing supplementary variable.The model was analyzed and validated for validity through emu ational experiments.The emulational results show that the comparability between the computed-results of model and emulational results is good,and the model can be used to discribe the survivability for RSCN.…”
    Get full text
    Article
  4. 164
  5. 165
  6. 166

    La concurrence militaire dans les Chroniques de Froissart : une idéologie chevaleresque et son écriture by Clara de Raigniac

    Published 2022-01-01
    “…The two meanings of competition are thus combined; we talk about emulation when it is a question of attaining an all-personal chivalrous honor, but it can also become a dangerous rivalry within an army whose objective of common good is more and more prevalent. …”
    Get full text
    Article
  7. 167

    Tourism and the demonstration effect: Empirical evidence by J. Carlos Monterrubio, M. Marivel Mendoza-Ontiveros

    Published 2014-01-01
    “…It has been commonly reported as a consequence of tourism, focusing on the emulation of tourists’ consumption patterns. However, there is very limited empirical evidence specifically focused on how tourist behaviour is actually or potentially emulated by locals. …”
    Get full text
    Article
  8. 168
  9. 169

    Research on LEO Satellite Network Routing Security by Wenhao XUE, Tian PAN, Chengcheng LU, Fan YANG, Tao HUANG, Yunjie LIU

    Published 2023-06-01
    “…The design of secure mechanisms and failure recovery mechanisms for inter-satellite routing has become pivotal in maintaining dependable communication within the LEO satellite network.To address the potential security threats faced by satellite networks, the impact of different routing attack behaviors on a typical inter-satellite routing protocol was analyzed and differentiated packet security authentication mechanisms and link failure recovery mechanisms were designed.Additionally, a satellite network emulation platform based on virtualization technology was constructed, enabled the verification of the effectiveness of the designed inter-satellite routing security mechanisms through the emulation of various routing attack scenarios.Furthermore, performance metrics such as CPU utilization and packet processing time were also evaluated before and after the introduction of security mechanisms.Experimental results demonstrated that the proposed inter-satellite routing security mechanism effectively mitigated multiple security threats in the space network environment while reduced communication latency caused by sudden link failures, thereby ensured secure and reliable communication within the LEO satellite network.…”
    Get full text
    Article
  10. 170
  11. 171

    Memristor-Based Canonical Chua’s Circuit: Extreme Multistability in Voltage-Current Domain and Its Controllability in Flux-Charge Domain by Han Bao, Tao Jiang, Kaibin Chu, Mo Chen, Quan Xu, Bocheng Bao

    Published 2018-01-01
    “…Furthermore, based on the accurate constitutive relation of the memristor emulator, a set of incremental flux-charge describing equations for the memristor-based canonical Chua’s circuit are formulated and a dimensionality reduction model is thus established. …”
    Get full text
    Article
  12. 172

    Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack by Hongbin Wang, Liping Feng

    Published 2020-01-01
    “…Utilizing the RSSI ratio values can exactly detect the Sybil attack. Emulation findings demonstrate that the detection method put forward by the thesis owns better security.…”
    Get full text
    Article
  13. 173

    Thrust-efficiency limits of a swimming tail with variable chordwise flexural rigidity by Hossam Alqaleiby, Muhammad R. Hajj

    Published 2025-02-01
    “…Abstract Emulating oscillations performed by natural swimmers can provide different functionalities than those of propeller-based underwater robots. …”
    Get full text
    Article
  14. 174

    FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications by Kazım Kılıç, İsmail Atacak, İbrahim Alper Doğru

    Published 2025-02-01
    “…The Kronodroid dataset contains different datasets obtained from both real devices and emulator runtimes. The tests of our method were carried out separately with the features extracted in the real device and emulator runtime. …”
    Get full text
    Article
  15. 175

    Bayesian calibration and uncertainty quantification for a large nutrient load impact modelZenodoZenodoZenodo by Karel Kaurila, Risto Lignell, Frede Thingstad, Harri Kuosa, Jarno Vanhatalo

    Published 2025-03-01
    “…Our computational algorithm allowed for fast posterior inference and the Gaussian process emulator had good predictive accuracy within the highest posterior probability mass region. …”
    Get full text
    Article
  16. 176

    Study of a new packet marking scheme for DDoS attack source traceback by LI Jin-ming, WANG Ru-chuan

    Published 2005-01-01
    “…Lastly, this scheme’s performances were emulated and tested and the result shows that the performances are better than other packet marking schemes.…”
    Get full text
    Article
  17. 177

    Hardware reconfigurable coding and evolution algorithm based on evolvable hardware by Ting WANG, Ju-long LAN, Jun-ting WU

    Published 2012-08-01
    “…A planar mapping function increments chromosome coding method based on FPGA platform with SRAM-architecture was proposed.The method could improve hardware reconfiguration efficiency by coding mapping realized by double platform mapping of binary configurable file string.Meanwhile,a betterment difference evolution algorithm was proposed based on local optimal mechanism introduced.The algorithm could promote convergence rate and whole efficiency.Finally,the result of the algorithm emulation shows that:MDE improves disadvantage of difference evolution algorithm with local optimal and approaches actual optimization outcome.…”
    Get full text
    Article
  18. 178

    Epidermoid cyst in lower lip mimicking Keratoacanthoma: A rare case report by V. Tharani, Nandhini Gunasekaran, K.K. Raja, Ramesh Kumar A

    Published 2024-03-01
    “…This article presents a case of epidermoid cyst presenting in a rare location and clinically emulating as Keratoacanthoma.…”
    Get full text
    Article
  19. 179

    Les théâtres à ciel ouvert de Ouagadougou by Karolina Svobodova

    Published 2022-09-01
    “…But these temporary moments of emulation should not overshadow cultural venues with basic equipment and means that host and develop cultural activities on a daily basis, especially theatre. …”
    Get full text
    Article
  20. 180

    Co-decode algorithm of network coding with hardware logic by Hui LI, Ming-long ZHANG, Fu-xing CHEN, Han-xu HOU, Kai PAN, Wei WANG, Hu-sheng YUAN, Tao SUN

    Published 2012-07-01
    “…Practical general coder and decoder of network coding(NC)with HDL(hardware description language)logic for wire-speed nodes was presented.The NC coders applied random linear network coding (RLNC) and the decoders recovered the original packets by Cramer’s rule.The structures and algorithms of NC coder and decoder were designed in detail and implemented in HDL with NetFPGA boards.Comparing with traditional stored-and-forward mechanism,network emulations showed that networks with wire-speed NC coder and decoder nodes could achieve the capacity bound of max-flow min-cut theorem,and the end-to-end delay was guaranteed on a small constant.…”
    Get full text
    Article