Results 41 to 50 of about 3,004,676 (269)
Spectrum Allocation Scheme Based on Stable Matching in Hierarchical Cognitive Satellite Network
Aiming at the problem that the number of users and available bandwidth of the current satellite service are increasing significantly, and the spectrum utilization rate of the existing spectrum allocation scheme is low, this paper first establishes a ...
Zhiguo Liu, Wenqiang Lv, Xiaobo Ren
doaj +1 more source
Laser weld spot detection based on YOLO-weld
Laser weld point detection is crucial in modern industrial manufacturing, yet it faces challenges such as a limited number of samples, uneven distribution, and diverse, irregular shapes.
Jianxin Feng +4 more
doaj +1 more source
Sensor Networks with Random Links: Topology Design for Distributed Consensus
In a sensor network, in practice, the communication among sensors is subject to:(1) errors or failures at random times; (3) costs; and(2) constraints since sensors and networks operate under scarce resources, such as power, data rate, or communication ...
José M. F. Moura +2 more
core +3 more sources
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source
A lightweight UAV target detection algorithm based on improved YOLOv8s model
Model lightweighting and efficiency are essential in UAV target recognition. Given the limited computational resources of UAVs and the system’s high stability demands, existing complex models often do not meet practical application requirements.
Fubao Ma +3 more
doaj +1 more source
Load balancing mechanism for clustered PMIPv6 protocol
Proxy Mobile IPv6 (PMIPv6) has become a credible member of pertinent research areas. This is attributed mainly to its capability of enabling mobility without imposing constraints or requirements on the mobile node (MN).
Safwan M. Ghaleb +3 more
doaj +1 more source
Research on Improvement of the Click-Through Rate Prediction Model Based on Differential Privacy
Click-through rate prediction is crucial in network applications such as recommendation systems and online networks. Designing feature extraction schemes to obtain features and modeling users’ click behavior are used to estimate the probability of
Lei Tian +5 more
doaj +1 more source
Multipoint-to-multipoint network communication [PDF]
We have formulated an exact ILP model for the problem of communicating on a virtual network. While this ILP model was successful in solving small problems, it is not recommended to handle larger instances, due to the fact that the number of variables in ...
Kilby, Philip +2 more
core
Communication via entangled coherent quantum network
A quantum network is constructed via maximum entangled coherent states. The possibility of using this network to achieve communication between multi-participants is investigated.
Allati, A. El +2 more
core +1 more source
The role and implications of mammalian cellular circadian entrainment
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley +1 more source

