Showing 5,561 - 5,580 results of 6,436 for search '"sensors"', query time: 0.07s Refine Results
  1. 5561

    Integrated structure for a resonant micro-gyroscope and accelerometer by V. Zega, C. Comi, A. Corigliano, C. Valzasina

    Published 2014-07-01
    “…The new resonant micro-sensor proposed, fabricated by the ThELMA© surface-micromachining technique, bases detection of two components of external acceleration (one in-plane component and one out-of plane component) and two components of angular velocity (roll and yaw) on the variation of frequency of several elements set in resonance. …”
    Get full text
    Article
  2. 5562

    Adsorption of Molecular Gases on Silver/Carbon Nanotube Composites at Low Temperatures and Low Pressures by M. Barberio, P. Barone, F. Stranges, R. A. Romano, F. Xu, A. Bonanno

    Published 2014-01-01
    “…Our results show that the desorption kinetics is of the first order; furthermore comparative measurements indicate that Ag/MWCNTs have an adsorption capacity higher than that of a pure sample suggesting that these composites are good candidates as gas cryosorbers for applications in cryopumps or sensor of latest generation.…”
    Get full text
    Article
  3. 5563

    Cardiac arrhythmia assessment with patch electrocardiogram versus insertable cardiac monitor: a cohort study in endurance athletes with atrial fibrillation by Trygve Berge, Andre La Gerche, Bente Morseth, Maja-Lisa Løchen, Arnljot Tveit, Marius Myrstad, Jon Magne Letnes, Guido Claessen, Bjarne Martens Nes, Turid Apelland, Kristoffer Robin Johansen, Eivind Sørensen, Jan Pål Loennechen, Kristine Folkenborg, Kristin Espolin Johnson, Vegard Malmo, Andreas Berg Sellevold, Rune Byrkjeland, Steve Enger, Sophia Onarheim, Vigdis Bache-Semb, Boris Delpire, Ingrid Haagenrud Langmo, Fedelix Pethogo Brown, Lena Marie Kristiansen

    Published 2025-01-01
    “…One technical artefact was falsely classified as ventricular tachycardia by the ECG247 Smart Heart Sensor system.Conclusion Monitoring with patch ECG was feasible in endurance athletes, but ECG recording quality varied between athletes and by type of exercise.Trial registration NCT04991337 (for the related randomised controlled trial).…”
    Get full text
    Article
  4. 5564

    Abnormal dynamic features of cortical microstates for detecting early-stage Parkinson's disease by resting-state electroencephalography: Systematic analysis of the influence of eye... by G. Gimenez-Aparisi, E. Guijarro-Estelles, A. Chornet-Lurbe, D. Cerveró-Albert, Dongmei Hao, Guangfei Li, Y. Ye-Lin

    Published 2025-01-01
    “…We found that the dynamic features of the source-space microstates were more sensitive in detecting PD than the sensor-space microstates, while EO was able to detect neuropathological changes in PD patients better than EC. …”
    Get full text
    Article
  5. 5565

    Computer Vision Technologies in Controlling the Electric Drive of Railway Transport by Yaroslav Kyrylenko, Yurij Kutovoj, Tatiana Kunchenko, Oleksandr Nesterenko

    Published 2025-01-01
    “…The solution of these problems is possible with the help of a multipurpose sensor, which is a video camera, to form the feedback signals to the control system.…”
    Get full text
    Article
  6. 5566

    Optimal Control for Networked Control Systems with Markovian Packet Losses by Xiao Han, Zhijian Ji, Qingyuan Qi

    Published 2020-01-01
    “…In this paper, the packet losses occur both between the sensor and controller and between the controller and actuator. …”
    Get full text
    Article
  7. 5567

    Integrity verification protocol based on privacy homomorphism data aggregation by Xing LI, Chun-yan LI, Liang-min WANG

    Published 2014-11-01
    “…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
    Get full text
    Article
  8. 5568

    Discussion on the common sense of the Internet of things by Yu SUN

    Published 2020-12-01
    “…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
    Get full text
    Article
  9. 5569

    Acoustic and Vibration Control for an Underwater Structure under Mechanical Excitation by Shi-Jian Zhu, Xue-Tao Weng, Hong-Liang Dai, Yi-Ming Fu, Yi-Qi Mao

    Published 2014-01-01
    “…Based on negative feedback control algorithm, a control loop with a coupling use of piezoelectric sensor and actuator is built, and accordingly some numerical examples are carried out on active control of structural vibration and acoustic response. …”
    Get full text
    Article
  10. 5570

    Correlation Coefficient of Simplified Neutrosophic Sets for Bearing Fault Diagnosis by Lilian Shi

    Published 2016-01-01
    “…Vibration signals of rolling bearings are acquired by an acceleration sensor, and a morphological filter is used to reduce the noise effect. …”
    Get full text
    Article
  11. 5571

    Observer-Based PID Security Control for Discrete-Time T-S Fuzzy Systems under Distributed Dynamic Event-Triggered Mechanism by Sisi Lin, Mengzhuo Luo, Shouming Zhong, Kaibo Shi, Xingxu Tan

    Published 2022-01-01
    “…In order to reduce the burden of communication, a distributed dynamic event-triggered mechanism (DETM) is proposed, and each sensor node is equipped with an event-trigger generator. …”
    Get full text
    Article
  12. 5572

    Implantable Tx–Rx wireless systems. An overview of their efficiency analysis through scattering matrix formalism by Koulouridis, Stavros

    Published 2024-11-01
    “…Different scenarios including telemetry, wireless harvesting and sensor transmission information are included as examples.…”
    Get full text
    Article
  13. 5573

    Fuzzy Pruning Based LS-SVM Modeling Development for a Fermentation Process by Weili Xiong, Wei Zhang, Dengfeng Liu, Baoguo Xu

    Published 2014-01-01
    “…However, these data may be treated as the normal support vectors, which always deteriorate the performance of soft sensor modeling. Since the outliers also contaminate the correlation structure of the least square support vector machine (LS-SVM), the fuzzy pruning method is provided to deal with the problem. …”
    Get full text
    Article
  14. 5574

    Dynamic Watermarking for Finite Markov Decision Processes by Jiacheng Tang, Jiguo Song, Abhishek Gupta

    Published 2025-01-01
    “…We demonstrate the effectiveness of the proposed dynamic watermarking algorithm by detecting a spoofing attack in a sensor network system.…”
    Get full text
    Article
  15. 5575

    Design and Research of S-Box Based on Dynamic Strategy by Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong, Zhulin An

    Published 2015-11-01
    “…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
    Get full text
    Article
  16. 5576

    Study on the Model of Slider-crank Mechanism with Clearance based on Parameter Identification Method by Zeng Qingsheng, Wang Xiangjiang, Tang Xiaohuan

    Published 2017-01-01
    “…Starting from the simple mechanism of slider-crank mechanism,the simplified model is established. By using the sensor to measure the movement parameters of artifacts of the slider-crank mechanism,then system parameters of the slider-crank mechanism are identified by using the method of parameter identification. …”
    Get full text
    Article
  17. 5577

    Hexahedral Localization (HL): A Three-Dimensional Hexahedron Localization Based on Mobile Beacons by Linlan Liu, Haili Zhang, Xiaotian Geng, Xin Shu

    Published 2013-01-01
    “…In wireless sensor networks, localization is one of the fundamental technologies and is essential to its applications. …”
    Get full text
    Article
  18. 5578

    Research Progress and Prospect of Multi-robot Collaborative SLAM in Complex Agricultural Scenarios by MA Nan, CAO Shanshan, BAI Tao, KONG Fantao, SUN Wei

    Published 2024-11-01
    “…Firstly, the development of enhanced data fusion algorithms will facilitate improved integration of sensor information, leading to greater accuracy and robustness of the system. …”
    Get full text
    Article
  19. 5579

    Automated Assembly Technology of Chain and Application of Data Acquisition System by Xu Changming, Zheng Linquan

    Published 2016-01-01
    “…A new chain automated assembly line is designed,it including chain assembly,testing device,riveting device,pre- stretch and running- in device,chain length cutting device,it is not only process concentration,also can realize the production for chain with bent plates by sensor to closely co- ordinate each process and the next process. …”
    Get full text
    Article
  20. 5580

    Security monitoring system of intelligent substation based on IoT by Yeshen HE, Kun LIANG, Wei TAN, Xin HU

    Published 2018-09-01
    “…Through the deployment of the internet of things,such as intelligent terminal,sensing sensor etc.,in the intelligent substation,a scene awareness mechanism was established under the mixed conditions to intelligent functions,such as the smart sensing of substation environment,infrastructure support,personnel exchanges,abnormal conditions judgments and other factors,and the multi-dimensional depth perception was realized.Meanwhile,interoperability of the perception network,the establishment of intelligent substation security monitoring system could be achieved by using wired and wireless fusion of multi-state communication technology.The system can multi-dimensionally perceive and monitoring the security of substation environment,which effectively enhances the smart substation intelligent monitoring level to ensure safe and stable operation of the substation.…”
    Get full text
    Article