Results 21 to 30 of about 136,842 (319)
Multi-Hop Cognitive Wireless Powered Networks: Outage Analysis and Optimization
This paper analyzes and optimizes the outage performance of multi-hop cognitive wireless powered networks (CWPNs) in underlay paradigms. To be specific, there are multiple power beacons (PBs) performing wireless power transfer (WPT) for multiple battery ...
Chi Xu +4 more
doaj +1 more source
Controlling General Polynomial Networks [PDF]
We consider networks of massive particles connected by non-linear springs. Some particles interact with heat baths at different temperatures, which are modeled as stochastic driving forces. The structure of the network is arbitrary, but the motion of each particle is 1D.
Cuneo, Noé, Eckmann, Jean-Pierre
openaire +5 more sources
“Third Space” und “Third Mission”. Eine innovative Fallstudie der Universität Klagenfurt
Die "Third Mission" betont die gesellschaftliche Verantwortung der Hochschulen mit Fokus auf Wissens- und Technologietransfer, Weiterbildung und soziales Engagement.
Barbara Pöcher +3 more
doaj +1 more source
Power System Anomaly Detection Based on OCSVM Optimized by Improved Particle Swarm Optimization
This paper tries to solve anomaly detection, a very important issue in ensuring the safe and stable operation of power system. As the proportion of abnormal data in the operation of power system is very small, a one-class support vector machine (OCSVM ...
Zhongfeng Wang +4 more
doaj +1 more source
As a key characteristic for industrial wireless sensor networks, deterministic scheduling aims to ensure that real-time data flows arrive at destination devices under deadline constraints by allocating necessary communication resources, such as time ...
Heng Wang +3 more
doaj +1 more source
Fiber-reinforced composites (FRC) are widely used in various fields due to their excellent mechanical properties. The mechanical properties of FRC are significantly governed by the orientation of fibers in the composite.
Yuanye Xu, Yinlong Zhang, Wei Liang
doaj +1 more source
Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for
Chao Pei +3 more
doaj +1 more source
Low-Cost Emergent Dynamic Scheduling for Flexible Job Shops
Flexible production is a typical representative of high-end manufacturing and is also a manifestation of a country’s national production capability.
Yue Yin +4 more
doaj +1 more source
An Aggregative High-Order Singular Value Decomposition Method in Edge Computing
In edge computing, for dimensionality reduction and core data extraction, both edge computing node (ECN) and cloud server may implement a high-order singular value decomposition (HOSVD) algorithm before data are passed to local computing models. However,
Junhua Chen +3 more
doaj +1 more source

