Showing 4,281 - 4,300 results of 4,508 for search '"The Forward"', query time: 0.06s Refine Results
  1. 4281

    Conditions of construction of the system of digital transport and logistics in the management of competitiveness by D. R. Abdyusheva, A. O. Merenkov, A. A. Stepanov

    Published 2018-09-01
    “…The article highlights the role of modern technologies in the process of implementing the principles of a client-oriented approach to transport, which contributes to the improvement of the quality of work of companies in the sphere of freight forwarding and logistics services.…”
    Get full text
    Article
  2. 4282

    Relative age effect across the talent identification process of youth female soccer players in the United States: Influence of birth year, position, biological maturation, and skil... by Laura Finnegan, Mirelle van Rijbroek, José M. Oliva-Lozano, Rick Cost, Matthew Andrew

    Published 2024-05-01
    “…Significant RAEs prevalence for players born in Q1 were found in Goalkeepers, Center Backs, Midfielders, and Center Forwards at Club and TID Center (except Wide Forwards). …”
    Get full text
    Article
  3. 4283

    SDN Technology and Industry Analysis and Strategy Recommendations for Telecom Operator by Yongbing Fan, Zhilan Huang

    Published 2015-10-01
    “…Software defined networking(SDN)proposed a new concept of network design,which emphasized the separation of network control plane and forwarding plane.It made network architecture more open and encourage network innovation.The basic concept and characteristics of SDN were introduced,the SDN core technology and its industry development status were analyzed,the influence of SDN on the future network from the perspective of operators was discussed,and the corresponding application suggestions were given.…”
    Get full text
    Article
  4. 4284

    Active measurement mechanism measuring SDN performances by Ming CHEN, Fei DAI, Bo XU, Chang-you XING, Bing LI, Guo-min ZHANG

    Published 2015-06-01
    “…An active SDN measurement mechanism was proposed,which could measure the end-to-end path performance between any two nodes,then the OpenFlow measurement protocol OFMP was designed,and a prototype OFMd was implemented,which could measure multiple performance metrics of the flow between two nodes without changing the switch forwarding rule.The experiment results show that OFMd can acquire multiple end to end path performance metrics only by sending a single probe packet.…”
    Get full text
    Article
  5. 4285

    Intrusion Detection Systems in Wireless Sensor Networks: A Review by Nabil Ali Alrajeh, S. Khan, Bilal Shams

    Published 2013-05-01
    “…Their distributed nature, multihop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. …”
    Get full text
    Article
  6. 4286

    THE INFLUENCE OF THE SELECTED INTERNATIONAL ORGANIZATIONS ON THE DEVELOPMENT OF TRANSPORT by Maciej MINDUR, Leszek MINDUR

    Published 2023-06-01
    “…An important role in the effective functioning and promotion of transport is played not only by transport and forwarding companies, but also by non-governmental organizations, closely cooperating with the industry and representing them in decision-making bodies. …”
    Get full text
    Article
  7. 4287

    Research on MIX-based anonymous communications by LU Tian-bo, CHENG Xiao-ming, ZHANG Bing

    Published 2007-01-01
    “…Privacy and anonymity on the Internet are gaining increasing attention from both the scientific and the large Internet user community in recent years.Privacy does not only mean the confidentiality of information,but also mean not revealing who is communicating with whom,and how often.After describing the technology of MIX,a survey of ano-nymity technologies based on it was given.Finally WonGoo,a scalable and practical decentralized peer-to-peer protocol was presented that provides strong anonymity and high efficiency with layered encryption and random forwarding.…”
    Get full text
    Article
  8. 4288

    Congestion control scheme based on frame transmission utility in wireless ad hoc networks by YE Jin1, WANG Jian-xin3, LIAO Qiu-li1

    Published 2010-01-01
    “…A MAC layer congestion notification scheme was proposed by using frame transmission utility.The TCP sender would reduce the congestion window based on ECN when forwarding nodes detect that the frame transmission utility was smaller than the threshold.This congestion control mechanism was realized only at the link layer and need not modify the existing transport protocol.The simulation results show that this scheme can effectively improve the network efficiency,especially in the case of multi TCP flows.The TCP throughput is increased by 50% and the fairness is satisfactory in the mean time.…”
    Get full text
    Article
  9. 4289

    Finding Global Minima with a Filled Function Approach for Non-Smooth Global Optimization by Weixiang Wang, Youlin Shang, Ying Zhang

    Published 2010-01-01
    “…First, the definition of filled function in Zhang (2009) for smooth global optimization is extended to non-smooth case and a new one is put forwarded. Then, a novel filled function is proposed for non-smooth the global optimization and a corresponding non-smooth algorithm based on the filled function is designed. …”
    Get full text
    Article
  10. 4290

    Selective Cooperative Transmission in Ad Hoc Networks with Directional Antennas by Eui-Jik Kim, Sungkwan Youm

    Published 2013-11-01
    “…In other words, when the node sends data, SCT determines its transmission strategy on either direct or cooperative transmission via a relay node called a forwarder, depending on the transmission time. Simulation results are provided to validate the effectiveness of the proposed scheme.…”
    Get full text
    Article
  11. 4291

    Service public local des déchets ménagers. A la recherche d'indicateurs de performance. by Gérard Bertolini

    Published 2008-03-01
    “…In the light of an analysis of feasibility and relevance, the paper puts forwards few, quite simple and complementary indicators which are gathered up into a synoptic table and make up an instrument panel.…”
    Get full text
    Article
  12. 4292

    The relationships between distances covered above generic and relative speed thresholds by male soccer players in English Premier League matches across two competitive seasons. The... by Ronan Kavanagh, Rocco Di Michele, Rafael Oliveira, Kevin McDaid, David Rhodes, Ryland Morgans

    Published 2024-03-01
    “…Sixteen elite male soccer players (seven defenders, six midfielders and three forwards) participated in this study (age 27.8 ± 3.5 years, height 183.7 ± 5.4 cm, body mass 83.9 ± 7.1 kg). …”
    Get full text
    Article
  13. 4293

    Objective Neurophysiological Measures of Cognitive Performance in Elite Ice Hockey Players by Kirby ED, Jones K, Campbell N, Fickling SD, D'Arcy RCN

    Published 2025-01-01
    “…While brain vital signs were collected to help manage concussion, the current investigation focused on a retrospective performance analysis of cognitive processing differences.Results: The results revealed three interesting findings: 1) Player position differences were detectable in sensory N100 latency, with significantly faster responses for forwards compared to defense; 2) Goalies showed significantly higher attention P300 amplitude compared to all other positions; and 3) Cognitive N400 processing differences were detectable only during competitive combine testing, showing 60ms latency differences between forwards and defense on average.Discussion: The current findings suggest that neurophysiological responses, which are also sensitive to concussion, may be used to identify sensory, attentional, and cognitive processing differences to help optimize peak performance.Keywords: electroencephalography, event-related potentials, brain vital signs, performance optimization, ice hockey…”
    Get full text
    Article
  14. 4294

    Improved Epidemic algorithm based on trust mechanism in opportunistic networks by Guang-hua ZHANG, Shao-bo PANG, Yao-hong YANG, Zhen-guo CHEN

    Published 2017-08-01
    “…Aiming at the problem of routing reliability caused by Epidemic algorithm,an improved Epidemic algorithm based on trust mechanism was proposed.Through the establishment of trust mechanism between nodes,this mechanism can provide sufficient trusted nodes as the next hop node of message forwarding,and can promote that the Epidemic algorithm performs the limited scope of flooding under the constraint of trust mechanism.Simulation results and analysis show that the improved Epidemic algorithm can avoid the network congestion caused by flooding mechanism,and the reliability of routing and transmission performance are improved to some extent.…”
    Get full text
    Article
  15. 4295

    EDSM:secure and efficient scalar multiplication algorithm on Edwards curves by ZHANG Bao-hua1, YIN Xin-chun2, ZHANG Hai-ling2

    Published 2008-01-01
    “…Investigate the secure and efficient algorithm for scalar multiplication on Edwards curves.First,several new addition and doubling formulas were proposed.Analysis shows that our new formulas are more efficient than existed formulas.Then a new scalar multiplication algorithm was forwarded,called EDSM algorithm.Finally,our EDSM algo-rithm with the improved Montgomery method and other existed secure and efficient algorithms were compared.Experi-mental results show that our EDSM(scalar multiplication on Edwards curve) algorithm make great improvements in as-pects of efficiency and security.…”
    Get full text
    Article
  16. 4296

    Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network by Qian ZHOU, Xiaolin QIN, Youwei DING

    Published 2018-01-01
    “…Sensors’ ability was utilized to perceive the mobile attacker nearby,and SPA (silent-pool approach) was proposed,which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes.In addition,a novel DPIOP (dummy packet injection out pool) method was proposed to entice the adversary far away from the transmission path without changing the original routing path.Through simulation studies and experiments,the outstanding performance of SPA and DPIOP in privacy preservation were demonstrated,with saving energy by about 63%,and reducing delay by about 35%.…”
    Get full text
    Article
  17. 4297

    Anthropometric, aerobic and muscle power profile of young costa rican basketball players by Randall Gutiérrez-Vargas, José Alexis Ugalde-Ramírez, José Pino-Ortega, José Andrés Trejos-Montoya, Luis Blanco-Romero, Braulio Sánchez-Ureña, Juan Carlos Gutiérrez-Vargas, Daniel Rojas-Valverde

    Published 2022-07-01
    “…The assessment was carried outa on 99 young players (43 women and 56 men; 18 guards, 51 forwards and 30 centers; 42 in the U16 category and 57 in the U18 category) from eight different teams. …”
    Get full text
    Article
  18. 4298

    A Novel Energy-Efficient Reception Method Based on Random Network Coding in Cooperative Wireless Sensor Networks by Yulun Cheng, Longxiang Yang

    Published 2015-06-01
    “…In OR, the sensor nodes in intermediate cluster generate the independent coding vector through simple forwarding or decoding-recoding manners opportunistically, so that the number of received packets can be reduced. …”
    Get full text
    Article
  19. 4299

    Overlay multicast strategy based on utility optimization for wireless mesh networks by ZHU Cui-tao1, YANG Zong-kai1, CHENG Wen-qing1, WU Di1, YAN He 1

    Published 2008-01-01
    “…Multicast support is a critical and desirable feature of wireless mesh network(WMN).A distributed algorithm was presented based on pricing scheme by using Lagrange dual decomposition technique.According to the algorithm to joint optimizing rate allocation of flows and power consumption of links for forwarding data flows,to maximize the net utility.The price is associated with each individual network link,which reflects the traffic load on this link.The flow in turn collects the prices of all links on its multicast path and calculates the overall network price,then adjusts the stream-ing rate.The validity and effectiveness of the approach are demonstrated in simulations.…”
    Get full text
    Article
  20. 4300

    Network layer protocol architecture for many-nets internetworking by Guangpeng LI, Sheng JIANG, Chuang WANG

    Published 2019-10-01
    “…Based on the analysis of the evolution history of existing network protocol technologies,the innovative guiding principles applicable to the future data network unified protocol system was proposed.By dividing the nature of network functions into the connections between network elements,five areas of protocol innovation such as data plane,control plane,user plane,management control and intrinsic network security were proposed.The implementation and application of the protocol system in many heterogeneous scenario were analyzed.Finally,the rationality of the protocol innovation guidelines was verified by analyzing the protocol innovation process in deterministic network forwarding technology and intrinsic security network technology.…”
    Get full text
    Article