Results 31 to 40 of about 271,920 (286)

Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for
Chao Pei   +3 more
doaj   +1 more source

Ethical Issues in Network System Design [PDF]

open access: yes, 1997
Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely.
Langford, Duncan
core   +3 more sources

Controlled Communication Networks [PDF]

open access: yes, 1993
Summary: This paper considers a generalization of communication situations, namely controlled communication networks. Three solution concepts for controlled communication networks are introduced, the Myerson value the position value and the mixed value, which are inspired by corresponding solution concepts for communication situations, and axiomatic ...
Feltkamp, V., van den Nouweland, A.
openaire   +2 more sources

Power System Anomaly Detection Based on OCSVM Optimized by Improved Particle Swarm Optimization

open access: yesIEEE Access, 2019
This paper tries to solve anomaly detection, a very important issue in ensuring the safe and stable operation of power system. As the proportion of abnormal data in the operation of power system is very small, a one-class support vector machine (OCSVM ...
Zhongfeng Wang   +4 more
doaj   +1 more source

An Aggregative High-Order Singular Value Decomposition Method in Edge Computing

open access: yesIEEE Access, 2020
In edge computing, for dimensionality reduction and core data extraction, both edge computing node (ECN) and cloud server may implement a high-order singular value decomposition (HOSVD) algorithm before data are passed to local computing models. However,
Junhua Chen   +3 more
doaj   +1 more source

Automated Industrial Composite Fiber Orientation Inspection Using Attention-Based Normalized Deep Hough Network

open access: yesMicromachines, 2023
Fiber-reinforced composites (FRC) are widely used in various fields due to their excellent mechanical properties. The mechanical properties of FRC are significantly governed by the orientation of fibers in the composite.
Yuanye Xu, Yinlong Zhang, Wei Liang
doaj   +1 more source

Weak Resilience of Networked Control Systems

open access: yes, 2015
In this paper, we propose a method to establish a networked control system that maintains its stability in the presence of certain undesirable incidents on local controllers. We call such networked control systems weakly resilient.
Besselink, Bart   +5 more
core   +1 more source

Saliency Based Control in Random Feature Networks [PDF]

open access: yes, 2014
The ability to rapidly focus attention and react to salient environmental features enables animals to move agiley through their habitats. To replicate this kind of high-performance control of movement in synthetic systems, we propose a new approach to ...
Baillieul, John, Kong, Zhaodan
core   +1 more source

Networked PID control [PDF]

open access: yes2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control, 2006
PID controllers are the most widely used control scheme in industry. Traditionally these controllers have been implemented in analog or digital form on specifically dedicated communication links. However, there has been significant recent interest into deploying control over general purpose communication channels, which allow one to transmit data ...
Quevedo, Daniel E.   +3 more
openaire   +2 more sources

“Third Space” und “Third Mission”. Eine innovative Fallstudie der Universität Klagenfurt

open access: yesZeitschrift für Hochschulentwicklung
Die "Third Mission" betont die gesellschaftliche Verantwortung der Hochschulen mit Fokus auf Wissens- und Technologietransfer, Weiterbildung und soziales Engagement.
Barbara Pöcher   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy