Results 31 to 40 of about 25,721,817 (393)

Monte Carlo Radiative Transfer in Embedded Prestellar Cores [PDF]

open access: yes, 2003
We implement a Monte Carlo radiative transfer method, that uses a large number of monochromatic luminosity packets to represent the radiation transported through a system. These packets are injected into the system and interact stochastically with it. We
Stamatellos, D., Whitworth, A. P.
core   +2 more sources

A secure and efficient range query method for two‐layer wireless sensor networks

open access: yesIET Cyber-Physical Systems, 2022
Traditional range query methods of work still have shortcomings in node energy consumption and privacy security, so a two‐layer secure and efficient range query method for wireless sensor networks is proposed.
Yun Deng, Yanping Kang
doaj   +1 more source

On limits of embedded systems in network packet processing [PDF]

open access: yes, 2016
The paper deals with a measurement of single-hop one way packet delay on embedded systems used for networking. The single-hop one way packet delay is essential parameter when we need to process packets with strict delivery time constrains.
Kocur, Zbyněk   +2 more
core   +2 more sources

Managing Elders’ Wandering Behavior Using Sensors-based Solutions: A Survey

open access: yesInternational Journal of Gerontology, 2014
Wandering is one of the most frequent, problematic, and injurious behaviors of elderly people with dementia. It often leads to negative consequences such as falling and getting lost.
Qiang Lin   +4 more
doaj   +1 more source

Identifying lncRNA–disease association based on GAT multiple-operator aggregation and inductive matrix completion

open access: yesFrontiers in Genetics, 2022
Computable models as a fundamental candidate for traditional biological experiments have been applied in inferring lncRNA–disease association (LDA) for many years, without time-consuming and laborious limitations. However, sparsity inherently existing in
Yi Zhang   +8 more
doaj   +1 more source

Sensitivity-based multistep MPC for embedded systems [PDF]

open access: yes, 2015
In model predictive control (MPC), an optimization problem is solved every sampling instant to determine an optimal control for a physical system. We aim to accelerate this procedure for fast systems applications and address the challenge of implementing
Kerrigan, EC, Palma, V, Suardi, A
core   +1 more source

Locating and Controlling Unsound Transitions in Workflow Systems Based on Workflow Net With Data Constraints

open access: yesIEEE Access, 2018
Data has a great influence on the analysis of the correctness of workflow systems. How to ensure that a system runs without data errors is very important.
Yaqiong He   +4 more
doaj   +1 more source

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

open access: yes, 2017
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Operational Technology (OT) systems that are meant to operate harmonically under a security critical framework.
A. Fournaris   +2 more
semanticscholar   +1 more source

Urban Traffic Data Imputation With Detrending and Tensor Decomposition

open access: yesIEEE Access, 2020
Due to various uncontrollable factors (such as random faulty acquisition equipment and data distortion), urban traffic flow data inevitably suffers from some form of data loss.
Chuanfei Gong, Yaying Zhang
doaj   +1 more source

Towards PageRank Update in a Streaming Graph by Incremental Random Walk

open access: yesIEEE Access, 2022
As the internet and the Internet of Things (IoT) have been widely applied in many application fields, a large number of graphs are continuously produced and change over time, which leads to difficulties in graph analysis and utilization.
Zhipeng Sun, Guosun Zeng, Chunling Ding
doaj   +1 more source

Home - About - Disclaimer - Privacy