Results 41 to 50 of about 65,097 (295)

Study of high energy phenomena from near space using low-cost meteorological balloons

open access: yes, 2017
Indian Centre for Space Physics has taken a novel strategy to study low energy cosmic rays and astrophysical X-ray sources which involve very light weight payloads up to about five kilograms on board a single or multiple balloons which are usually used ...
Bhattacharya, Arnab   +3 more
core   +1 more source

Building self-optimized communication systems based on applicative cross-layer information [PDF]

open access: yes, 2008
This article proposes the Implicit Packet Meta Header(IPMH) as a standard method to compute and represent common QoS properties of the Application Data Units (ADU) of multimedia streams using legacy and proprietary streams’ headers (e.g.
Chassot, Christophe   +3 more
core   +1 more source

Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

open access: yes52nd Aerospace Sciences Meeting, 2014
Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System.
Groves, Curtis E.   +2 more
openaire   +4 more sources

Android Malware Clustering through Malicious Payload Mining

open access: yes, 2017
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party ...
I Santos   +7 more
core   +1 more source

Glycosylated LGALS3BP is highly secreted by bladder cancer cells and represents a novel urinary disease biomarker

open access: yesMolecular Oncology, EarlyView.
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece   +18 more
wiley   +1 more source

Simulation and Stability Analysis of a Coupled Parachute–Payload System

open access: yesAerospace
High-fidelity simulations are used to study the stability of a coupled parachute–payload system in different configurations. A 8.53 m ring–slot canopy is attached to two separate International Organization for Standardization (ISO) container payloads ...
Keith Bergeron   +2 more
doaj   +1 more source

An Edge-Based Architecture for Offloading Model Predictive Control for UAVs

open access: yesRobotics, 2022
Thanks to the development of 5G networks, edge computing has gained popularity in several areas of technology in which the needs for high computational power and low time delays are essential. These requirements are indispensable in the field of robotics,
Achilleas Santi Seisa   +3 more
doaj   +1 more source

High-Throughput Computing on High-Performance Platforms: A Case Study

open access: yes, 2017
The computing systems used by LHC experiments has historically consisted of the federation of hundreds to thousands of distributed resources, ranging from small to mid-size resource.
Angius, Alessio   +8 more
core   +1 more source

Data‐driven forecasting of ship motions in waves using machine learning and dynamic mode decomposition

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
Summary Data‐driven forecasting of ship motions in waves is investigated through feedforward and recurrent neural networks as well as dynamic mode decomposition. The goal is to predict future ship motion variables based on past data collected on the field, using equation‐free approaches.
Matteo Diez   +2 more
wiley   +1 more source

Analysis of Approaches to Detecting Attacks in Encrypted Traffic

open access: yesСовременные информационные технологии и IT-образование, 2021
The automatic detection of network intrusions has been under active study since the 1980s. Of particular interest is the detection of attacks in encrypted web traffic, the percentage of which on the Internet is increasing.
Marina Polyanskaya
doaj   +1 more source

Home - About - Disclaimer - Privacy