Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 2
- Moral and ethical aspects 2
- African literature 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- CRAFTS & HOBBIES / Pottery & Ceramics 1
- CRAFTS & HOBBIES / Reference 1
- Constitutional law 1
- Delivery of Health Care 1
- Derecho de familia 1
- Diagnostic Imaging 1
- Domestic relations 1
- Economic policy 1
- Ego (Psychology) 1
- History and criticism 1
- Imaging 1
- Journalistic ethics 1
- Magnetic Resonance Imaging 1
- Mental Health 1
- Nursing 1
- Osteoarthritis 1
- Photojournalism 1
- Potters' wheels 1
- Pottery 1
- Proposal Writing 1
- Psychiatric Nursing 1
- Psychological aspects 1
- Public health 1
- Social policy 1
- Technique 1
-
4361
Novel opportunistic cooperative multicast scheme for NOMA
Published 2020-11-01“…The cognitive radio technology was applied to non-orthogonal multiple access (NOMA) cooperative multicast system,the feasibility of using users as relays was studied,and a two-level cooperative transmission scheme with parameterized multicast candidate sets was proposed.Specifically,the scheme first selected the candidate set according to the cardinality q,and then selected the best forwarding node based on the channel gain between the primary users and the candidate secondary users.Simulation results show that,through the reasonable selection of the cardinality q,the proposed scheme can greatly reduce the diversity gain of the secondary users while simultaneously increasing the diversity gain of the primary users.In NOMA cooperative multicast scenario composed of N multicast users,the proposed scheme can increase the diversity gain of the primary users from 2 to min(N-q+2,q+1) to meet their reliability requirements.…”
Get full text
Article -
4362
Management technologies of cyberspace endogenous safety and security test site
Published 2021-03-01“…The cyber range has been widely recognized as an effective way to study the technologies of network attack/defense and the vulnerability of network architecture.The endogenous safety and security test site that receives high attention recently is a type of cyber range for cyber space endogenous safety and security technologies.Based on the new situation of cyberspace with 5G development, a test site management technology for virtual-real network settings was proposed, and a test site management architecture based on the endogenously secured software defined network controller was designed.A design of the endogenously secured network control system was also proposed, which used a middle layer forwarding agent to achieve data isolation and supported multiple heterogeneous open-source controllers.Finally, a test site scenario reconfiguration and resource orchestration method was proposed based on a test site networking scheme.…”
Get full text
Article -
4363
“Nowadays the house would be called a stately home”: Pastoral Relocations in Tom Stoppard’s Arcadia
Published 2011-12-01“…Tom Stoppard’s Arcadia has a narrative structure that works backwards and forwards through time, examining concepts of change across the whole spectrum of philosophy and the arts. …”
Get full text
Article -
4364
Software defined data center network with hybrid routing
Published 2016-04-01“…SHR extends the OpenFlow scheme by offloading some basic functions such as flow statistical detection and mice flow forwarding to switches to reduce the switch-controller interaction overhead. …”
Get full text
Article -
4365
Policy conflict detection in software defined network by using deep learning
Published 2017-11-01“…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
Get full text
Article -
4366
A load balanced and energy efficient underwater clustering protocol for UWSN
Published 2016-11-01“…Focused on the low energy efficiency and short lifetime of underwater wireless sensor network(UWSN),a load balanced and energy efficient underwater clustering(LBEEUC)protocol for UWSN was proposed.For cluster head settings,due to the consideration of load balanced,the proportion of cluster heads based on experience-load was set.The area with high experience-load could obtain more cluster heads than other areas to process data forwarding.And then,for intra-cluster communication,some relay nodes were set to save energy of long range data transmission between cluster head and nodes.Relay nodes also could be used to eliminate redundant information by advance data fusion.Finally,for inter-cluster routing,Q-learning algorithm was used to implement optimal path planning based on the criterion of least energy consuming.The simulation results demonstrate that the LBEEUC protocol can efficiently improve the energy utilization,prolong the network lifetime and balance the energy consumption of the network.…”
Get full text
Article -
4367
Naked Censorship: Stripping the Censors’ Discourse
Published 2013-11-01“…This inter-disciplinary paper aims to shed light on the principles that led to the establishment of theatre censorship legislation and the politics of inertia of the ensuing governments, hence offering an alternative perspective to the moral argument first utilised by Walpole and later forwarded as a final defence. In doing so, we will explore the gap between the censors’ procedures and their discourses, thereby gaining an insight into the means and hidden dynamics of this disciplinary control. …”
Get full text
Article -
4368
Effectiveness of primary school principals in managing the implementation of civic and ethical education curriculum
Published 2023-06-01“…In view of this, areas of intervention that could possibly mitigate the problem are forwarded. …”
Get full text
Article -
4369
Cable and wireless integrated flat campus network design
Published 2013-09-01“…The campus network topology of the existing problems was analyzed,and according to a large flat layer 2 network design ideas,a device for the network core BARS wired and wireless integrated network topology was proposed.The topology can maximize the protection of existing investments,simply increasing the core layer BRAS device,and all of the original switches can be linked to the BRAS as a layer 2 device.BRAS equipment performance and characteristics were used to finish tunnel network users inside and outside the establishment,isolation,flow control,fault location and other fine management; large two-story structure features were used to achieve net IPv4/IPv6 dual and multicast services,various brands the unified management of wired and wireless devices.The topology used in the actual network environment BRAS equipment must be hot standby,wireless AC needs to support local forwarding.…”
Get full text
Article -
4370
Congestion control mechanism based on data delivery probability in DTN data dissemination network
Published 2015-11-01“…A congestion control mechanism based on data delivery probability (CCM-DP) was proposed to work out the decline of data delivery performance on account of data congestion in delay tolerant networks (DTN) network coding-based data dissemination process.Considering the node mobility model,data delivery probability and data congestion degree,the data delivery probability model was constructed,and the congestion control mechanism was designed from two aspects,on the one hand,by the means of adjusting the packet forwarding process,it equilibriums the data packet delivery to avoid node congestion caused by too many packets received; and on the other hand,through the design of efficient discarding strategy,it reduces the impact of packet loss caused by data congestion.Ultimately,it was put into use in data dissemination process and some simulations were taken,the simulation results show that,CCM-DP can improve data delivery performance in data congestion environment.…”
Get full text
Article -
4371
Geographical routing and participant collaboration model based communication mechanism of WSAN
Published 2019-07-01“…The communication mechanism of wireless sensor and actor network (WSAN) was studied.Firstly,a proactive location management mechanism based on the update messages sent by mobile actors to sensors and the actors’ scope limited by Voronoi diagram was proposed.Thus,sensors predicted the movement of actors using Kalman filtering of the previously received updates.Then,an optimal energy-aware forwarding rule based on geographical routing was presented for sensor-actor communication,and the delay of the data delivery process was controlled using the power control and the network congestion was dealed with by forcing multiple actors to share the traffic generated in the event area.Finally,based on the characteristics of multiple concurrent events,a model for actor-actor coordination was proposed to coordinate their movements in order to optimally accomplish the tasks.Performance simulation results show that the proposed cooperative communication mechanism for WSAN can effectively reduce end-to-end delays,energy consumption and percentage of packet drops.…”
Get full text
Article -
4372
Challenges and innovative solutions of space-ground integrated network security
Published 2024-06-01“…Firstly, the developmental backdrop and evolving trends of the integrated network’s architecture were outlined, highlighting the distinct features and application contexts of both the transparent forwarding and on-board regeneration frameworks. Secondly, the security challenges faced by the space-ground integrated network were analyzed, especially the risks of data transmission security and access authentication. …”
Get full text
Article -
4373
Multidimensional detection and dynamic defense method for link flooding attack
Published 2019-08-01“…Aiming at the shortcomings of the existing link flooding attack defense methods,a multi-dimensional index detection algorithm is proposed,which performs multi-dimensional detection on the abnormal forwarding links through the five-dimensional elements of connection length,low-speed ratio of data packets,uniformity of data packet distance,average low-speed ratio of data packets,and change rate of low-speed ratio of data packets,thus effectively solving the problem of high false alarm rate of the existing detection methods.Furthermore,a controller switch dynamic deployment method based on coloring theory is proposed,which solves the problem of difficult to be actually deployed in the actual environment with limited switch variant types existing in the existing defense mitigation mechanisms.Experimental analysis show the feasibility of the proposed method.…”
Get full text
Article -
4374
Effectiveness of primary school principals in managing the implementation of civic and ethical education curriculum
Published 2023-06-01“…In view of this, areas of intervention that could possibly mitigate the problem are forwarded. …”
Get full text
Article -
4375
iAMCTD: Improved Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks
Published 2014-11-01“…We propose forwarding-function ( F F ) based routing protocol for underwater sensor networks (UWSNs): improved adaptive mobility of courier nodes in threshold-optimized depth-based-routing (iAMCTD). …”
Get full text
Article -
4376
IoT-Based Propane and Butane Pressure Measurement
Published 2023-12-01“…The sensor receives data then the Arduino processes the data for conversion, the final results will be sent to the cloud using the esp8266 module and then forwarded to the smartphone as a monitoring user to see and also check gas conditions.…”
Get full text
Article -
4377
Efficient Coded-Block Delivery and Caching in Information-Centric Networking
Published 2020-01-01“…Incorporating network coding into ICN can offer several benefits, but a consumer may receive the same coded block from multiple content routers since the coded block may be cached by any of the content routers on its forwarding path. In this paper, we introduce a request-specific coded-block scheme to avoid linear dependency of blocks that are utilizing in-network caching. …”
Get full text
Article -
4378
A Protein Sequence Analysis Hardware Accelerator Based on Divergences
Published 2012-01-01“…This stage discards poorly aligned sequences with a low similarity score and forwards sequences with good similarity scores to software, where they are reprocessed to generate the sequence alignment. …”
Get full text
Article -
4379
Valeur, fonction et médiation dans les espaces naturels sensibles : une patrimonialisation inachevée de la nature. Exemples dans les Pays de la Loire
Published 2013-05-01“…We were able to put forwards a common feature in the evolution of the criteria for the selection of ENS sites : the growing importance of ecological criteria. …”
Get full text
Article -
4380
Connectivity Analysis for Free-Flow Traffic in VANETs: A Statistical Approach
Published 2013-10-01“…Therefore, the indirect connectivity from multihop forwarding is also a necessary complement especially for the case where direct connection is hardly achieved. …”
Get full text
Article