Results 31 to 40 of about 271,920 (286)
Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for
Chao Pei +3 more
doaj +1 more source
Ethical Issues in Network System Design [PDF]
Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely.
Langford, Duncan
core +3 more sources
Controlled Communication Networks [PDF]
Summary: This paper considers a generalization of communication situations, namely controlled communication networks. Three solution concepts for controlled communication networks are introduced, the Myerson value the position value and the mixed value, which are inspired by corresponding solution concepts for communication situations, and axiomatic ...
Feltkamp, V., van den Nouweland, A.
openaire +2 more sources
Power System Anomaly Detection Based on OCSVM Optimized by Improved Particle Swarm Optimization
This paper tries to solve anomaly detection, a very important issue in ensuring the safe and stable operation of power system. As the proportion of abnormal data in the operation of power system is very small, a one-class support vector machine (OCSVM ...
Zhongfeng Wang +4 more
doaj +1 more source
An Aggregative High-Order Singular Value Decomposition Method in Edge Computing
In edge computing, for dimensionality reduction and core data extraction, both edge computing node (ECN) and cloud server may implement a high-order singular value decomposition (HOSVD) algorithm before data are passed to local computing models. However,
Junhua Chen +3 more
doaj +1 more source
Fiber-reinforced composites (FRC) are widely used in various fields due to their excellent mechanical properties. The mechanical properties of FRC are significantly governed by the orientation of fibers in the composite.
Yuanye Xu, Yinlong Zhang, Wei Liang
doaj +1 more source
Weak Resilience of Networked Control Systems
In this paper, we propose a method to establish a networked control system that maintains its stability in the presence of certain undesirable incidents on local controllers. We call such networked control systems weakly resilient.
Besselink, Bart +5 more
core +1 more source
Saliency Based Control in Random Feature Networks [PDF]
The ability to rapidly focus attention and react to salient environmental features enables animals to move agiley through their habitats. To replicate this kind of high-performance control of movement in synthetic systems, we propose a new approach to ...
Baillieul, John, Kong, Zhaodan
core +1 more source
PID controllers are the most widely used control scheme in industry. Traditionally these controllers have been implemented in analog or digital form on specifically dedicated communication links. However, there has been significant recent interest into deploying control over general purpose communication channels, which allow one to transmit data ...
Quevedo, Daniel E. +3 more
openaire +2 more sources
“Third Space” und “Third Mission”. Eine innovative Fallstudie der Universität Klagenfurt
Die "Third Mission" betont die gesellschaftliche Verantwortung der Hochschulen mit Fokus auf Wissens- und Technologietransfer, Weiterbildung und soziales Engagement.
Barbara Pöcher +3 more
doaj +1 more source

