Results 21 to 30 of about 1,635,468 (215)

TESTING GROUND CONDITIONS FOR EFFECTIVE BURIED SENSOR WIRELESS LORAWAN SIGNAL TRANSMISSION [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2022
Long-range, low-power, wide-area network modulation technique (LoRa) is already used in a variety of fields, such as agriculture and healthcare, to reliably transmit a small amount of data above ground.
Y. Lai   +6 more
doaj   +1 more source

Network Properties for Robust Multilayer Infrastructure Systems: A Percolation Theory Review [PDF]

open access: yesIEEE Access 2021, 2021
Infrastructure systems, such as power, transportation, telecommunication, and water systems, are composed of multiple components which are interconnected and interdependent to produce and distribute essential goods and services. So, the robustness of infrastructure systems to resist disturbances is crucial for the durable performance of modern ...
arxiv   +1 more source

Persistent Identifier Practice for Big Data Management at NCI

open access: yesData Science Journal, 2017
The National Computational Infrastructure (NCI) manages over 10 PB research data, which is co-located with the high performance computer (Raijin) and an HPC class 3000 core OpenStack cloud system (Tenjin).
Jingbo Wang   +5 more
doaj   +1 more source

InfraRisk: An Open-Source Simulation Platform for Asset-Level Resilience Analysis in Interconnected Infrastructure Networks [PDF]

open access: yesSustainable Cities and Society 83 (2022) 103963, 2022
Integrated simulation models are emerging as an alternative for analyzing large-scale interdependent infrastructure networks due to their modeling advantages over traditional interdependency models. This paper presents an open-source integrated simulation package for the asset-level analysis of interdependent infrastructure systems.
arxiv   +1 more source

The Current Approaches to Substantiation of Criteria for Evaluation and Selection of Suppliers [PDF]

open access: yesBìznes Inform, 2021
The article is aimed at studying the current approaches to substantiating the criteria for evaluating and selecting suppliers. The study of theoretical and practical aspects allowed to distinguish modern methods of selecting suppliers in the field of ...
Petrenko Olha I.   +2 more
doaj   +1 more source

PREFACE

open access: yesІсторія науки і техніки, 2022
In the new issue, our scientific journal offers you nine scientific articles. As always, we try to offer a wide variety of topics and areas and follow current trends in the history of science and technology.
Oleh Pylypchuk   +2 more
doaj   +3 more sources

Coherent combining of broadband pulses after free space optical parametric amplification [PDF]

open access: yesEPJ Web of Conferences
In this study, we present the proof of concept of the polarization-based filled-aperture coherent combination of two distinct broadband sub-20fs transform limited pulse duration optical parametric chirped pulse amplification systems in free-space.
Jansonas Gaudenis   +7 more
doaj   +1 more source

Flexural Capacity Prediction Model For Steel Fibre-Reinforced Concrete Beams

open access: yesInternational Journal of Concrete Structures and Materials, 2021
Steel fibre (SF) reinforcement has been shown to improve the ductility of high strength concrete (HSC), which is known to be brittle. Research conducted to date on steel fibre reinforced concrete and its effects have emphasised post-failure performance ...
Aocheng Zhong   +4 more
doaj   +1 more source

Formation of the Organization’s Information and Communication Management [PDF]

open access: yesBìznes Inform, 2023
The article is aimed at studying and substantiating information and communication links and managing them in an organization, i. e. systematizing the entire communication space relating to enterprise management and promotion of goods and services.
Semenchuk Tetiana B.   +2 more
doaj   +1 more source

Groups from Cyclic Infrastructures and Pohlig-Hellman in Certain Infrastructures [PDF]

open access: yesAdvances in Mathematics of Communications, 2 (3), 2008, 2008
In discrete logarithm based cryptography, a method by Pohlig and Hellman allows solving the discrete logarithm problem efficiently if the group order is known and has no large prime factors. The consequence is that such groups are avoided. In the past, there have been proposals for cryptography based on cyclic infrastructures.
arxiv   +1 more source

Home - About - Disclaimer - Privacy