-
361
A compressive data gathering method based on El Gamal cryptography
Published 2019-12-01“…As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.…”
Get full text
Article -
362
Analysis and Semantic Mining in Heterogeneous Information Network
Published 2015-07-01“…Heterogeneous information network(HIN),which is composed of different types of objects and links,has gradually become a hot topic in social network analysis.As a unique characteristic of HIN,meta path contains rich semantic information.Heterogeneous information network with values on links are ubiquitous in real world.Therefore,the traditional meta path,which doesn’t consider weight on links,can not exactly capture semantics in many cases.Related concepts of HIN were introduced and a brief introduction of applications of HIN was given.Then subtle semantic information in HIN was explored by extending the traditional meta path to weighted meta path.Experiments on two real data sets demonstrate the applications of the weighted meta path in recommendation,relevance search.…”
Get full text
Article -
363
Progress of UAV Ad Hoc Network:A Survey
Published 2015-04-01“…With the emphasis on effective utilization of UAV of the national interests,the upsurge in multi-UAV cooperative application development and the rapid development of Ad Hoc network application research,UAV Ad Hoc network has become a new hot research area.The basic conception,the main characteristics and the application advantages of the UAV Ad Hoc network were summarized firstly,then a more detailed description of five important research topics of networking technology was given:MAC protocols,routing protocols,transport protocols,cross-1ayer protocols design and opportunistic networks.The development environment of experimental platform of the research organizations on UAV Ad Hoc network were introduced,finally the challenges which encountered in current research and the key issues need to be solved were investigated.…”
Get full text
Article -
364
Dynamic Modeling and Analysis of Micro-Video Teaching System Based on Cloud Computing in College English Teaching
Published 2022-01-01“…The application research of computer technology in the field of education is a hot topic at present. The cultivation of talents required the training of schools and teachers. …”
Get full text
Article -
365
UAV-enabled integrated sensing and communication:architecture, techniques, and future vision
Published 2023-02-01“…UAV emergency communication has been regarded as a typical application of the sixth generation mobile communication system (6G), and it can be flexible deployed and provide on-demand services.Meanwhile, integrated sensing and communication (ISAC) is a key feature and enabling technology for 6G.With the aid of the ISAC techniques, the spectral efficiency and the sensing accuracy of UAV emergency communication can be improved, while the system costs can be simultaneously reduced.However, how to efficiently integrate the ISAC techniques into the UAV emergency communication remains a hot and challenging research issue for both the academia and industry.Against these backdrops, a UAV-enabled ISAC architecture was proposed.Then, the fundamental principles that supported the proposed architecture were discussed.Finally, the future directions and challenges in UAV-enabled ISAC were provided.…”
Get full text
Article -
366
Research development and forecast of automatic speech recognition technologies
Published 2018-02-01“…The purpose of automatic speech recognition (ASR) is to make the machine to be able to “understand” the human speech and transform it to readable text information.ASR is one of the key technologies of human machine interaction and also a hot research domain for a long time.In recent years,due to the application of deep neural networks,the use of big data and the popularity of cloud computing,ASR has made great progress and break through the threshold of application in many industries.More and more products with ASR have entered people’s daily life,such as Apple’s Siri,Amazon’s Alexa,IFLYTEK speech input method and Dingdong intelligent speaker and so on.The development status and key breakthrough technologies in recent years were introduced.Also,a forecast of ASR technologies’ trend of development was given.…”
Get full text
Article -
367
Survey on the search of Internet of Things
Published 2015-12-01“…With the popularization and development of the Internet of Things,the search of Internet of Things urgently needs to be solved in academia and industry and becomes a hot research topic.With the increasing data generated by sensors,only the search of IoT makes this data valuable.However,different from the traditional Internet search engines (such as Baidu,Google,Bing,Yahoo,etc),the search of IoT has different search objects and search architecture and data in the Internet of Things are massive,real-time,highly dynamic,heterogeneous,highly insecure.The above characteristics make search of IoT face more challenges.Firstly,the concept,characteristics,related technologies of search of IoT were summarized and presented.Secondly,several typical systems and related algorithms were described in detail.Finally,the current problems,the challenges and research prospects of this field for future were presented…”
Get full text
Article -
368
Research on a stable clustering algorithm based on the optimal connectivity power for wireless sensor networks
Published 2009-01-01“…In realistic environment, the actual layout of nodes is easy to make network separated and nodes are always densely deployed in hot spots like the site of an accident or disaster where the competition intense was very high.A stable clustering algorithm based on the optimal connectivity power for wireless sensor networks was proposed.The algorithm makes use of the alterable power control technology to raise the channel utilization ratio and network throughput based on the optimal number of neighbors, and realizes the stable connectivity and clustering of network.The algorithm simplifies the topology of network so that prolong the network lifetime at the best.The simulation results show that the algorithm maintains the connectivity and stability of network effectively, and has good auto-adapted ability to environment and obvious effects in the promotion of whole performance of network.…”
Get full text
Article -
369
Research on 5G base station radiation safety and corresponding network planning
Published 2021-09-01“…With the rapid development of 5G network, the radiation safety of base stations is a hot issue of public concern.As 5G has the characteristics of high frequency band and large bandwidth, ultra-dense heterogeneous network applications are becoming more common.The impact of electromagnetic radiation from typical 5G base stations on the human body was analyzed, and the safety distances of base stations with different powers were calculated in detail.Based on various common 5G base station equipment forms such as outdoor macro stations, outdoor pole stations, telephone booth base stations, and indoor micro stations, the safe area of different scenarios was analyzed and theoretically calculated.The results were verified based on field test and specific networking planning recommendations were proposed.…”
Get full text
Article -
370
Scalable geometric routing scheme based on location-independent names
Published 2016-01-01“…Name-based routing has become one of the hot topics in future network.However,due to the sustained growth of the size of nodes and information,the scalability issue is becoming one of the bottlenecks of name-based routing.As a new type of scalable routing,geometric routing provides both scalable routing tables and low routing paths,but it is difficult to support name-based routing.A universal scalable geometric routing scheme based on location-independent names(GRIN)was proposed.GRIN implemented a hybrid geometric routing(HGR)combining greedy routing with source routing,introduced a distributed name resolution using 2-level sloppy groups.Then the state and the path stretch upper bound of GRIN were analyzed.The simulation results show that GRIN guarantees scalability,low stretch and reliability.It outperformanced other similar routing schemes.…”
Get full text
Article -
371
MIMO OTA performance testing of vehicles
Published 2021-02-01“…Intelligent traffic system is one of promising technologies for traffic industry.Based on communication among cars, pedestrian, traffic infrastructure and cellular networks, it’s able to significantly promote on road safety and efficiency by making proper traffic instructions.How to precisely evaluate the communication performance of a whole vehicle become a hot-topic in the field.Unfortunately, there is still no solution about the setup and procedures for the OTA testing.A low-cost solution was proposed by reconstructing channel models and optimizing the existing testing system framework that referred to as multi-probe anechoic chamber.The proposed method was able to multiple the test area with limited channel emulator RF channels by introducing a low-cost digital converter.Numerical simulations indicate that the proposed method has the ability to reproduce spatial and temporal correlation features of the target channel model, which is coherent with related standards’ requirements.…”
Get full text
Article -
372
Acer palmatum 'Bloodgood'
Published 2004-10-01“… 'Bloodgood' Japanese maple has a round shape with a height and spread of about 20 feet, making it nicely suited to residential landscapes (Figure 1). …”
Get full text
Article -
373
Characterization of Photovoltaic Panels by means of Thermograph Analysis
Published 2016-01-01“…Their increased module efficiencies have caused not only a massive production but also a sensible drop on sale prices. …”
Get full text
Article -
374
Dependable identity recognition and authorization based on visual information
Published 2020-11-01“…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
Get full text
Article -
375
Survey of the intelligent and connected vehicle cybersecurity
Published 2020-06-01“…Cyber attacks on vehicles not only cause privacy leaks and economic losses but also endanger human life and even rise to national public safety issues.Therefore,the research on the cybersecurity of intelligent and connected vehicle (ICV) has become a research hot spot.Firstly,the structural status and characteristics of the in-vehicle network (IVN) in ICV were introduced,and the challenges and constraints of cybersecurity enhancement design for IVN were also presented.Secondly,focusing on the current functional safety and cybersecurity issues of IVN,a survey of the current cybersecurity enhancement researches for IVN was conducted.Finally,according to the characteristics of the IVN structure,some important research directions and suggestions about cybersecurity problems of ICV were pointed out from the three aspects of standard construction,functional safety and cybersecurity.…”
Get full text
Article -
376
Survey of the deterministic network
Published 2019-06-01“…The current Internet faces a huge increase in video traffic and industrial machine applications,causing a lot of congestion and packet delays.Besides,many network applications,such as industrial Internet,telemedicine,driverless,VR games,etc,require a latency from 1 to 10 milliseconds and jitters within microsecond.But traditional network can only reduce the end-to-end latency to tens of milliseconds.Under this background,how to transit from “best effort” to“punctuality,accuracy”,controlling the end-to-end delay has become a hot field of global network research.The application scenarios and requirements of the deterministic network were introduced,and the main research results of the current parties were described as well as the trend of development and core issues were summarized.It hopes to provide a reference and help for the research in this field.…”
Get full text
Article -
377
Neural network and Markov based combination prediction algorithm of video popularity
Published 2021-08-01“…Caching popular video into user-side in advance improves the user experience and reduces operator costs, which is a common practice in the industry.How to effectively predict the popularity of videos has become a hot issue in the industry.On account of the shortcomings of traditional prediction algorithms such as poor nonlinear mapping ability, low prediction accuracy and weak adaptability, a video popularity prediction algorithm based on a neural network and Markov combined model (Mar-BiLSTM) was proposed.Information dependencies were preserved by constructing bidirectional memory network model (bi-directional long short-term memory, BiLSTM), the prediction accuracy of the model was further improved by using Markov properties while avoiding the increase of the complexity of the model caused by the introduction of external variables.Experimental results show that compared with traditional time series and classic neural network algorithms, the proposed algorithm improves predicting accuracy, effectiveness and reduces the amount of calculation.…”
Get full text
Article -
378
Interaction between 𝛼-Synuclein and Other Proteins in Neurodegenerative Disorders
Published 2011-01-01“…Protein aggregation is a common characteristic of many neurodegenerative disorders, and the interaction between pathological/toxic proteins to cause neurodegeneration is a hot topic of current neuroscience research. …”
Get full text
Article -
379
How Are Cows Cooled on Dairy Farms in Florida?
Published 2019-04-01“… While hot and humid conditions cause grief for dairy producers, additional impacts of heat and humidity on the dairy cow are sometimes overlooked. …”
Get full text
Article -
380
Survey of identity resolution system in industrial Internet of things
Published 2019-11-01“…With the development of the internet of things (IoT),5G and industrial technology,industrial IoT has become a new research field.Due to the specific requirements of delay,security and stability in industrial production,the traditional DNS has limitations to meet the needs of industrial IoT because of its single identity object,rigid resolution results,and weak security.In this context,how to provide efficient,flexible and secure resolution services for universal objects has become a hot area worldwide.Firstly,we discussed the design principles and key supporting technologies of the identity resolution system in industrial IoT.Then summarized and compared the existing identity resolution systems in detail.Next,the new identity resolution schemes in academic research were introduced.Finally,the core problems and the future research trend in this field were discussed.…”
Get full text
Article