-
21
On the existence of positive solutions for periodic parabolic sublinear problems
Published 2003-01-01Get full text
Article -
22
-
23
-
24
A Family of Boundary Value Methods for Systems of Second-Order Boundary Value Problems
Published 2017-01-01Get full text
Article -
25
Paul Groussac. Un articulador cultural en el pasaje del siglo XIX al XX argentino
Published 2006-01-01“…Groussac fue un personaje muy versátil y se desempeñó como profesor de destacadas instituciones educativas: Director de la Biblioteca Nacional, polemista, director de destacadas publicaciones, ensayista, crítico literario e historiador; se presentan aquí algunas de los rasgos particulares de su trayectoria pública multifacética.…”
Get full text
Article -
26
Intelligent adaptation and integrated scheduling method for computing and networking resources
Published 2023-08-01“…To effectively support the development needs of the deep integration of networking and computing, a novel computing and network convergence architecture has emerged.In this context, how to realize the intelligent perception of computing and networking resources and the efficient scheduling of computational tasks are key problems.To this end, the new network scenario for computing and networking convergence were analyzed, a scheduling model for computing tasks and nodes was designed, and a deep reinforcement learning-based resource scheduling algorithm was proposed.The proposed algorithm was able to intelligently make scheduling decisions that minimize the system cost by sensing key information such as user devices, available capacity of computing and networking resources, and link status.Finally, the effectiveness of the proposed algorithm in saving system cost was verified by simulation experiments.…”
Get full text
Article -
27
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01“…Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was shown that a certificateless aggregate signature in an anonymous roaming authentication scheme was vulnerable to the signature forge attack.To address the issue,a new secure and efficient certificateless aggregate signature scheme was presented,which required no bilinear pairing operations.And then the security of the scheme under the ECDLP assumption in the random oracle model was proved.Finally the performance of proposed scheme was evaluated.Compared with the original scheme,the proposal is more secure and the total computational cost is greatly reduced .…”
Get full text
Article -
28
Research on secure DPC localization algorithm of WSN
Published 2011-01-01“…In resource-constrained sensor networks,how to locate the sensor’s coordinates securely and effectively is one of the most challenging problems.A lot of algorithms of the security localization were analyzed,and a distributed RSSI-based DPC(distance and position consistent) security location algorithm was brought forth.The algorithm can de-tect and filter out the false nodes that are generated by malicious attacks applying the consistency of measure and com-puting;meanwhile all the nodes are involved in the activation without a central node.The performance of the algorithm is studied,and the experimental results show that DPC still has very high efficiency and good robustness in noisy conditions with a number of false nodes.…”
Get full text
Article -
29
Algorithm for Searching Inhomogeneities in Inverse Nonlinear Diffraction Problems
Published 2024-10-01Get full text
Article -
30
-
31
A New Legendre Spectral Galerkin and Pseudo-Spectral Approximations for Fractional Initial Value Problems
Published 2013-01-01Get full text
Article -
32
Power allocation algorithm for cognitive radio energy harvesting networks based on energy cooperation
Published 2017-09-01“…An algorithm to optimize the power allocation by maximizing the system throughput in cognitive radio energy harvesting networks was proposed.The algorithm formulated the throughput optimization model subject to the causality constraints of the harvested energy within the two secondary users and the interference constraint of the primary user.In addition,by applying the variable-substitution method and problem equivalence transformation,the joint optimization problem of power and cooperative energy was decoupled into two problems:a power allocation problem and a cooperative energy one.The former problem could be solved by iterating the two decoupled problems.As shown in the simulation results,the energy cooperation can significantly improve the system throughput when the harvested energy difference between two nodes is rather large.…”
Get full text
Article -
33
Status and Prospect of Reclaimed Water Reuse in China
Published 2023-01-01“…The shortage of water resources is the main obstacle to China's economic development,and the reuse of reclaimed water is an effective way to solve this problem.It is urgent to clarify the development status and existing problems of the reclaimed water industry in China,so as to achieve urban ecological and sustainable development.This study reviewed the policies,regulations,and standards of reclaimed water reuse in China and summarized the main ways to reuse reclaimed water.The development status and application examples of reclaimed water treatment technology were introduced,and future development was predicted.In summary,this paper put forward four suggestions for the reuse of reclaimed water in China:①perfecting the standards and specifications of reclaimed water reuse;②strengthening the transformation of the reclaimed water treatment process in sewage treatment plants;③establishing risk assessment system of reclaimed water;④intensifying the construction planning for the urban reclaimed water reuse.…”
Get full text
Article -
34
VM migration across subnets in future internet architecture—XIA
Published 2016-03-01“…When a VM migrates among hosts residing in two IP subnets,the network attachment point of VM changed,which causes the IP mobility problem.It was meaningful to design and evaluate VM migration performance under the future internet architecture.XIA (expressive Internet architecture)was focused,a novel future internet architecture,sup-port for VM live migration.Motivated by the natural f res of ID/location decoupling,versatile routing with DAG (di-rected acyclic graphs) in XIA,The design and implementation of rendezvous agent based migration (RABM) approach was given.In demonstrate that XIA supported VM migration can achieve fast network re-connection between VM and correspondent node,while keeping the network control plane simplicity and data plane efficiency.…”
Get full text
Article -
35
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
Published 2019-06-01“…,quantum communication,public key infrastructure,physical layer security,blockchain,trusted computing and privacy protection.Apart from teaching the related technologies,the remarkable achievements and efforts of Chinese scientists were shown and the future work was indicated.Students are grouped to do literature research,expand their knowledge,exchange the learning experience and explore the law of scientific research in these new aspects.Students can not only absorb the knowledge of cutting-edge technology,but also learn the method and spirit to address scientific problems.A useful reference for education and teaching method of course ideological for graduate students was provided.…”
Get full text
Article -
36
Appeal against court judgement (decision) in Polish civil procedure: Selected problems
Published 2019-08-01Get full text
Article -
37
Generalized Mixed Equilibria, Variational Inclusions, and Fixed Point Problems
Published 2014-01-01Get full text
Article -
38
ANALYSIS OF THE REASONS OF BREAKAGES OF RETAYNER OF THE CAMP OF PQF AND SOLUTION OF PROBLEMS
Published 2015-11-01Get full text
Article -
39
-
40
A Legendre Wavelet Spectral Collocation Method for Solving Oscillatory Initial Value Problems
Published 2013-01-01Get full text
Article