Suggested Topics within your search.
Suggested Topics within your search.
- History 5
- Study and teaching 3
- Customer relations 2
- Customer services 2
- Leadership 2
- Mass media 2
- Archaeological expeditions 1
- Archeology 1
- Autonomy and independence movements 1
- COMPUTERS / Desktop Applications / Suites 1
- Citizen participation 1
- Clinical Competence 1
- Clinical Medicine 1
- Clinical medicine 1
- Cognitive therapy 1
- Collection and preservation 1
- Communication 1
- Cultural property 1
- Decolonization 1
- Demographic surveys 1
- Dinosaurs 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- Economic conditions 1
- Economic policy 1
- Electronic Health Records 1
- English 1
- Evidence (Law) 1
- FICTION 1
-
101
On coding over the spatial-temporal diversity for reliable transmission scheme in low-duty-cycle WSN
Published 2012-06-01Subjects: “…low-duty-cycle WSN…”
Get full text
Article -
102
Research on a hexagonal lattice optimal clustering routing algorithm based on hybrid CS for WSN
Published 2016-05-01“…A hexagon lattice clustering model for WSN was proposed based on hybrid CS.The relationship between data transmission times and compression ratio and clus er size was analyzed quantitatively to get optimal clustering number.Then,a hexagon lattice optimal clustering routing algorithm for WSN based on ybrid CS was proposed,to balance network communication overhead and reduce data transmission times.Simulation experiment proved that the optimal clustering model and algorithm proposed are better than traditional ones in reducing data transmis-sion times in WSN.…”
Get full text
Article -
103
Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game
Published 2018-09-01“…To apply intrusion detection system (IDS) efficiently so as to suppress WSN malware propagation,a cloud-based network infrastructure for realizing functions of WSN IDS was presented,considering the real basis that the resources of WSN nodes were limited whilst the resources of cloud computing platform were almost unlimited.Based on the analysis of the game process between a sensor node and the corresponding WSN IDS agent,a WSN-malware-propagation-suppression game model was constructed by employing the dynamic Bayesian game,and the requirements of energy consumption in sending monitored data and privacy protection for sensor nodes were satisfied.According to the proposed game type and refined Bayesian equilibrium,the optimal strategie for suppressing WSN malware was proposed as well the algorithm for actual application was given.The factors that influence WSN IDS agents to select their optimal strategies were analyzed,and the experimental foundation was provided for the application of the proposed approach.…”
Get full text
Article -
104
Chasing the Beginning of Reionization in the JWST Era
Published 2025-01-01“…Recent JWST observations at z > 6 may imply galactic ionizing photon production above prior expectations. …”
Get full text
Article -
105
-
106
-
107
Hsp90α promotes lipogenesis by stabilizing FASN and promoting FASN transcription via LXRα in hepatocellular carcinoma
Published 2025-01-01Subjects: Get full text
Article -
108
Segment routing for WSN using hybrid optimization with energy-efficient game theory-based clustering technique
Published 2025-01-01“…This research focuses on Wireless Sensor Networks (WSNs) and proposes a three-phase approach to achieve energy-efficient routing. …”
Get full text
Article -
109
A Workload Indicators of Staffing Need (WISN) based framework and implementation tool for dietitians at South African central and tertiary public hospitals
Published 2025-01-01“…Methods We followed the eight step WISN methodology as a basis for this developmental study. …”
Get full text
Article -
110
-
111
-
112
-
113
-
114
TDOA-based WSN localization with hybrid covariance matrix adaptive evolutionary strategy and gradient descent distance techniques
Published 2025-01-01“…Wireless Sensor Networks (WSNs) play a vital role in modern intelligent systems, with localization techniques critical for determining the precise positions of sensor nodes. …”
Get full text
Article -
115
Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head
Published 2017-11-01“…To overcome the problem that partial cluster heads were drastically exhausted by the energy sink-hole attack in wireless sensor network,a novel suppression model based on the optimal path of mobile cluster heads was proposed,which was shown to balance the energy consumption in each cluster head.With the adoption of unequal cluster radius and data traffic monitoring explicitly,the inhibition mechanism was modeled as multivariate linear equations.Furthermore,toroidal projection was adopted to calculate the Euclidean distance,based on which the initial energy of mobile cluster head was configured correspondingly.On this basis,an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack.The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN.…”
Get full text
Article -
116
Study on Convergent Pooling Technology Strategy with SGSN and MME
Published 2013-09-01Get full text
Article -
117
-
118
POI recommendation by incorporating trust-distrust relationship in LBSN
Published 2018-07-01Subjects: “…LBSN…”
Get full text
Article -
119
-
120
Transition to the sustainable supply chains: (on the example of PJSC Uralkali)
Published 2024-12-01“…The article proposes a systematization of the tasks of managing the supply and sale of products of the industrial enterprise PJSC Uralkali that produces potash fertilizers according to various management levels. …”
Get full text
Article