Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 2
- Moral and ethical aspects 2
- African literature 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- CRAFTS & HOBBIES / Pottery & Ceramics 1
- CRAFTS & HOBBIES / Reference 1
- Constitutional law 1
- Delivery of Health Care 1
- Derecho de familia 1
- Diagnostic Imaging 1
- Domestic relations 1
- Economic policy 1
- Ego (Psychology) 1
- History and criticism 1
- Imaging 1
- Journalistic ethics 1
- Magnetic Resonance Imaging 1
- Mental Health 1
- Nursing 1
- Osteoarthritis 1
- Photojournalism 1
- Potters' wheels 1
- Pottery 1
- Proposal Writing 1
- Psychiatric Nursing 1
- Psychological aspects 1
- Public health 1
- Social policy 1
- Technique 1
-
4281
Conditions of construction of the system of digital transport and logistics in the management of competitiveness
Published 2018-09-01“…The article highlights the role of modern technologies in the process of implementing the principles of a client-oriented approach to transport, which contributes to the improvement of the quality of work of companies in the sphere of freight forwarding and logistics services.…”
Get full text
Article -
4282
Relative age effect across the talent identification process of youth female soccer players in the United States: Influence of birth year, position, biological maturation, and skil...
Published 2024-05-01“…Significant RAEs prevalence for players born in Q1 were found in Goalkeepers, Center Backs, Midfielders, and Center Forwards at Club and TID Center (except Wide Forwards). …”
Get full text
Article -
4283
SDN Technology and Industry Analysis and Strategy Recommendations for Telecom Operator
Published 2015-10-01“…Software defined networking(SDN)proposed a new concept of network design,which emphasized the separation of network control plane and forwarding plane.It made network architecture more open and encourage network innovation.The basic concept and characteristics of SDN were introduced,the SDN core technology and its industry development status were analyzed,the influence of SDN on the future network from the perspective of operators was discussed,and the corresponding application suggestions were given.…”
Get full text
Article -
4284
Active measurement mechanism measuring SDN performances
Published 2015-06-01“…An active SDN measurement mechanism was proposed,which could measure the end-to-end path performance between any two nodes,then the OpenFlow measurement protocol OFMP was designed,and a prototype OFMd was implemented,which could measure multiple performance metrics of the flow between two nodes without changing the switch forwarding rule.The experiment results show that OFMd can acquire multiple end to end path performance metrics only by sending a single probe packet.…”
Get full text
Article -
4285
Intrusion Detection Systems in Wireless Sensor Networks: A Review
Published 2013-05-01“…Their distributed nature, multihop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. …”
Get full text
Article -
4286
THE INFLUENCE OF THE SELECTED INTERNATIONAL ORGANIZATIONS ON THE DEVELOPMENT OF TRANSPORT
Published 2023-06-01“…An important role in the effective functioning and promotion of transport is played not only by transport and forwarding companies, but also by non-governmental organizations, closely cooperating with the industry and representing them in decision-making bodies. …”
Get full text
Article -
4287
Research on MIX-based anonymous communications
Published 2007-01-01“…Privacy and anonymity on the Internet are gaining increasing attention from both the scientific and the large Internet user community in recent years.Privacy does not only mean the confidentiality of information,but also mean not revealing who is communicating with whom,and how often.After describing the technology of MIX,a survey of ano-nymity technologies based on it was given.Finally WonGoo,a scalable and practical decentralized peer-to-peer protocol was presented that provides strong anonymity and high efficiency with layered encryption and random forwarding.…”
Get full text
Article -
4288
Congestion control scheme based on frame transmission utility in wireless ad hoc networks
Published 2010-01-01“…A MAC layer congestion notification scheme was proposed by using frame transmission utility.The TCP sender would reduce the congestion window based on ECN when forwarding nodes detect that the frame transmission utility was smaller than the threshold.This congestion control mechanism was realized only at the link layer and need not modify the existing transport protocol.The simulation results show that this scheme can effectively improve the network efficiency,especially in the case of multi TCP flows.The TCP throughput is increased by 50% and the fairness is satisfactory in the mean time.…”
Get full text
Article -
4289
Finding Global Minima with a Filled Function Approach for Non-Smooth Global Optimization
Published 2010-01-01“…First, the definition of filled function in Zhang (2009) for smooth global optimization is extended to non-smooth case and a new one is put forwarded. Then, a novel filled function is proposed for non-smooth the global optimization and a corresponding non-smooth algorithm based on the filled function is designed. …”
Get full text
Article -
4290
Selective Cooperative Transmission in Ad Hoc Networks with Directional Antennas
Published 2013-11-01“…In other words, when the node sends data, SCT determines its transmission strategy on either direct or cooperative transmission via a relay node called a forwarder, depending on the transmission time. Simulation results are provided to validate the effectiveness of the proposed scheme.…”
Get full text
Article -
4291
Service public local des déchets ménagers. A la recherche d'indicateurs de performance.
Published 2008-03-01“…In the light of an analysis of feasibility and relevance, the paper puts forwards few, quite simple and complementary indicators which are gathered up into a synoptic table and make up an instrument panel.…”
Get full text
Article -
4292
The relationships between distances covered above generic and relative speed thresholds by male soccer players in English Premier League matches across two competitive seasons. The...
Published 2024-03-01“…Sixteen elite male soccer players (seven defenders, six midfielders and three forwards) participated in this study (age 27.8 ± 3.5 years, height 183.7 ± 5.4 cm, body mass 83.9 ± 7.1 kg). …”
Get full text
Article -
4293
Objective Neurophysiological Measures of Cognitive Performance in Elite Ice Hockey Players
Published 2025-01-01“…While brain vital signs were collected to help manage concussion, the current investigation focused on a retrospective performance analysis of cognitive processing differences.Results: The results revealed three interesting findings: 1) Player position differences were detectable in sensory N100 latency, with significantly faster responses for forwards compared to defense; 2) Goalies showed significantly higher attention P300 amplitude compared to all other positions; and 3) Cognitive N400 processing differences were detectable only during competitive combine testing, showing 60ms latency differences between forwards and defense on average.Discussion: The current findings suggest that neurophysiological responses, which are also sensitive to concussion, may be used to identify sensory, attentional, and cognitive processing differences to help optimize peak performance.Keywords: electroencephalography, event-related potentials, brain vital signs, performance optimization, ice hockey…”
Get full text
Article -
4294
Improved Epidemic algorithm based on trust mechanism in opportunistic networks
Published 2017-08-01“…Aiming at the problem of routing reliability caused by Epidemic algorithm,an improved Epidemic algorithm based on trust mechanism was proposed.Through the establishment of trust mechanism between nodes,this mechanism can provide sufficient trusted nodes as the next hop node of message forwarding,and can promote that the Epidemic algorithm performs the limited scope of flooding under the constraint of trust mechanism.Simulation results and analysis show that the improved Epidemic algorithm can avoid the network congestion caused by flooding mechanism,and the reliability of routing and transmission performance are improved to some extent.…”
Get full text
Article -
4295
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01“…Investigate the secure and efficient algorithm for scalar multiplication on Edwards curves.First,several new addition and doubling formulas were proposed.Analysis shows that our new formulas are more efficient than existed formulas.Then a new scalar multiplication algorithm was forwarded,called EDSM algorithm.Finally,our EDSM algo-rithm with the improved Montgomery method and other existed secure and efficient algorithms were compared.Experi-mental results show that our EDSM(scalar multiplication on Edwards curve) algorithm make great improvements in as-pects of efficiency and security.…”
Get full text
Article -
4296
Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network
Published 2018-01-01“…Sensors’ ability was utilized to perceive the mobile attacker nearby,and SPA (silent-pool approach) was proposed,which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes.In addition,a novel DPIOP (dummy packet injection out pool) method was proposed to entice the adversary far away from the transmission path without changing the original routing path.Through simulation studies and experiments,the outstanding performance of SPA and DPIOP in privacy preservation were demonstrated,with saving energy by about 63%,and reducing delay by about 35%.…”
Get full text
Article -
4297
Anthropometric, aerobic and muscle power profile of young costa rican basketball players
Published 2022-07-01“…The assessment was carried outa on 99 young players (43 women and 56 men; 18 guards, 51 forwards and 30 centers; 42 in the U16 category and 57 in the U18 category) from eight different teams. …”
Get full text
Article -
4298
A Novel Energy-Efficient Reception Method Based on Random Network Coding in Cooperative Wireless Sensor Networks
Published 2015-06-01“…In OR, the sensor nodes in intermediate cluster generate the independent coding vector through simple forwarding or decoding-recoding manners opportunistically, so that the number of received packets can be reduced. …”
Get full text
Article -
4299
Overlay multicast strategy based on utility optimization for wireless mesh networks
Published 2008-01-01“…Multicast support is a critical and desirable feature of wireless mesh network(WMN).A distributed algorithm was presented based on pricing scheme by using Lagrange dual decomposition technique.According to the algorithm to joint optimizing rate allocation of flows and power consumption of links for forwarding data flows,to maximize the net utility.The price is associated with each individual network link,which reflects the traffic load on this link.The flow in turn collects the prices of all links on its multicast path and calculates the overall network price,then adjusts the stream-ing rate.The validity and effectiveness of the approach are demonstrated in simulations.…”
Get full text
Article -
4300
Network layer protocol architecture for many-nets internetworking
Published 2019-10-01“…Based on the analysis of the evolution history of existing network protocol technologies,the innovative guiding principles applicable to the future data network unified protocol system was proposed.By dividing the nature of network functions into the connections between network elements,five areas of protocol innovation such as data plane,control plane,user plane,management control and intrinsic network security were proposed.The implementation and application of the protocol system in many heterogeneous scenario were analyzed.Finally,the rationality of the protocol innovation guidelines was verified by analyzing the protocol innovation process in deterministic network forwarding technology and intrinsic security network technology.…”
Get full text
Article