首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
无线电   3篇
一般工业技术   5篇
自动化技术   3篇
  2022年   6篇
  2021年   2篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.

In recent days, the manufacture of automotive vehicles is dramatically enhanced worldwide. Most vehicle crashes are due to the drive distraction on the real highway roads and traffic-density. In this proposed method, a novel collision detection and avoidance algorithm are coined for Midvehicle Collision Detection and Avoidance System (MCDAS), addressing two scenarios, namely, (a) A rear-end collision avoidance with host vehicle under no front-end vehicle condition and (b) offset-based curvilinear motion under critical conditions, while, suitable parallel parking manoeuvring also addressed using offset-based curvilinear motion. The Monte Carlo analysis of the proposed MCDAS is demonstrated using the Constant Velocity (CV) manoeuvring strategy and simulated with real-time data using the NGSIM database.

  相似文献   
2.
Recently, an innovative trend like cloud computing has progressed quickly in Information Technology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system’s virtualization accomplished using resource pooling, cloud computing resources become more accessible. The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this paper. With the help of multi-agents, we attempt to represent Open-Identity (ID) design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the cloud. This research aims to determine how authentication and authorization services were provided in an agreeable and preventive manner. Based on attack-oriented threat model security, the evaluation works. By considering security for both authentication and authorization systems, possible security threats are analyzed by the proposed security systems.  相似文献   
3.
Cloud computing is an Information Technology deployment model established on virtualization. Task scheduling states the set of rules for task allocations to an exact virtual machine in the cloud computing environment. However, task scheduling challenges such as optimal task scheduling performance solutions, are addressed in cloud computing. First, the cloud computing performance due to task scheduling is improved by proposing a Dynamic Weighted Round-Robin algorithm. This recommended DWRR algorithm improves the task scheduling performance by considering resource competencies, task priorities, and length. Second, a heuristic algorithm called Hybrid Particle Swarm Parallel Ant Colony Optimization is proposed to solve the task execution delay problem in DWRR based task scheduling. In the end, a fuzzy logic system is designed for HPSPACO that expands task scheduling in the cloud environment. A fuzzy method is proposed for the inertia weight update of the PSO and pheromone trails update of the PACO. Thus, the proposed Fuzzy Hybrid Particle Swarm Parallel Ant Colony Optimization on cloud computing achieves improved task scheduling by minimizing the execution and waiting time, system throughput, and maximizing resource utilization.  相似文献   
4.
Wireless Personal Communications - The climate has changed absolutely in every area in just a few years as digitized, making high-speed internet service a significant need in the future. Future...  相似文献   
5.
In this study, the endogenous lipid signalling molecules, N ‐myristoylethanolamine, were explored as a capping agent to synthesise stable silver nanoparticles (AgNPs) and Ag sulphide NPs (Ag2 S NPs). Sulphidation of the AgNPs abolishes the surface plasmon resonance (SPR) maximum of AgNPs at 415 nm with concomitant changes in the SPR, indicating the formation of Ag2 S NPs. Transmission electron microscopy revealed that the AgNPs and Ag2 S NPs are spherical in shape with a size of 5–30 and 8–30 nm, respectively. AgNPs and Ag2 S NPs exhibit antimicrobial activity against Gram‐positive and Gram‐negative bacteria. The minimum inhibitory concentrations (MIC) of 25 and 50 μM for AgNPs and Ag2 S NPs, respectively, were determined from resazurin microtitre plate assay. At or above MIC, both AgNPs and Ag2 S NPs decrease the cell viability through the mechanism of membrane damage and generation of excess reactive oxygen species.Inspec keywords: cellular biophysics, biomembranes, transmission electron microscopy, nanomedicine, microorganisms, molecular biophysics, antibacterial activity, nanofabrication, silver, biomedical materials, surface plasmon resonance, nanoparticles, materials preparation, silver compounds, lipid bilayersOther keywords: Gram‐negative bacteria, Gram‐positive bacteria, endogenous lipid signalling molecules, N‐myristoylethanolamine, capping agent, silver nanoparticles, Ag sulphide NPs, sulphidation, surface plasmon resonance, concomitant changes, transmission electron microscopy, minimum inhibitory concentrations, resazurin microtitre plate assay, cell viability, membrane damage, reactive oxygen species, Ag toxicities, Ag, Ag2 S  相似文献   
6.
Wireless Personal Communications - Network security plays a vital role in protecting the resources available in the network against various threats. There are vulnerabilities in every system...  相似文献   
7.
Herein, the authors reported a carbon dots mediated synthesis of gold nanoparticles (AuNPs) at room temperature. Transmission electron microscopy revealed that the AuNPs are spherical in shape with a size of 10 nm. As‐prepared AuNPs was immobilised on carbon paste electrode and subjected to electrochemical sensing of an important neurotransmitter dopamine. Differential pulse voltammetry studies revealed sensitive and selective determination of dopamine in the presence of commonly interfering ascorbic acid and uric acid. The linear detection range was 10–600 μM and the limit of detection was 0.7 ± 0.18 μM. The practical application was demonstrated by measuring dopamine in human blood serum and urine samples. The catalytic activity of AuNPs was evaluated by sodium borohydride mediated reduction of nitroaromatic compounds. The reduction kinetics was found to be pseudo‐first‐order kinetics. All the tested nitroaromatics reduced to corresponding amines in <10 min.Inspec keywords: voltammetry (chemical analysis), electrochemical sensors, biosensors, nanosensors, reduction (chemical), organic compounds, nanofabrication, gold, catalysis, transmission electron microscopy, electrochemical electrodes, blood, nanoparticles, carbon, chemical variables measurement, catalysts, particle sizeOther keywords: nitroaromatic compounds, reduction kinetics, gold nanoparticles, chemocatalyst, nitroaromatic reduction, carbon dots mediated synthesis, room temperature, transmission electron microscopy, carbon paste electrode, electrochemical sensing, ascorbic acid, uric acid, linear detection range, human blood serum, urine samples, sodium borohydride mediated reduction, neurotransmitter dopamine, differential pulse voltammetry, catalytic activity, pseudofirst‐order kinetics, amines, temperature 293 K to 298 K, C‐Au  相似文献   
8.
In this paper, the energy conservation in the ununiform clustered network field is proposed. The fundamental reason behind the methodology is that in the process of CH election, nodes Competition Radius (CR) task is based on not just the space between nodes and their Residual Energy (RE), which is utilized in Energy-Aware Distributed Unequal Clustering (EADUC) protocol but also a third-degree factor, i.e., the nearby multi-hop node count. In contrast, a third-factor nearby nodes count is also used. This surrounding data is taken into account in the clustering feature to increase the network’s life span. The proposed method, known as Energy Conscious Scattered Asymmetric Clustering (ECSAC), self-controls the nodes’ energy utilization for equal allotment and un-equal delivery. Besides, extra attention is agreed to energy consumption in the communication process by applying a timeslot-based backtracking algorithm for increasing the network’s lifetime. The proposed methodology reduces the clustering overhead and node communication energy consumption to extend the network’s lifetime. Our suggested method’s results are investigated against the classical techniques using the lifetime of the network, RE, alive hop count and energy consumption during transmission as the performance metric.  相似文献   
9.
Wireless Sensor Network (WSN) is an independent device that comprises a discrete collection of Sensor Nodes (SN) to sense environmental positions, device monitoring, and collection of information. Due to limited energy resources available at SN, the primary issue is to present an energy-efficient framework and conserve the energy while constructing a route path along with each sensor node. However, many energy-efficient techniques focused drastically on energy harvesting and reduced energy consumption but failed to support energy-efficient routing with minimal energy consumption in WSN. This paper presents an energy-efficient routing system called Energy-aware Proportional Fairness Multi-user Routing (EPFMR) framework in WSN. EPFMR is deployed in the WSN environment using the instance time. The request time sent for the route discovery is the foremost step designed in the EPFMR framework to reduce the energy consumption rate. The proportional fairness routing in WSN selects the best route path for the packet flow based on the relationship between the periods of requests between different SN. Route path discovered for packet flow also measure energy on multi-user route path using the Greedy Instance Fair Method (GIFM). The GIFM in EPFMR develops node dependent energy-efficient localized route path, improving the throughput. The energy-aware framework maximizes the throughput rate and performs experimental evaluation on factors such as energy consumption rate during routing, Throughput, RST, node density and average energy per packet in WSN. The Route Searching Time (RST) is reduced using the Boltzmann Distribution (BD), and as a result, the energy is minimized on multi-user WSN. Finally, GIFM applies an instance time difference-based route searching on WSN to attain an optimal energy minimization system. Experimental analysis shows that the EPFMR framework can reduce the RST by 23.47% and improve the throughput by 6.79% compared with the state-of-the-art works.  相似文献   
10.
Computing has become more invisible, widespread and ubiquitous since the inception of the Internet of Things (IoT) and Web of Things. Multiple devices that surround us meet user’s requirements everywhere. Multiple Middleware Framework (MF) designs have come into existence because of the rapid development of interactive services in Heterogeneous Systems. This resulted in the delivery of interactive services throughout Heterogeneous Environments (HE). Users are given free navigation between devices in a widespread environment and continuously interact with each other from any chosen device. Numerous interactive devices with recent interactive platforms (for example, Smart Phones, Mobile Phones, Personal Computer (PC) and Personal Digital Assistant (PDA)) are available in the market. For easy access to information and services irrespective of the device used for working and even at the drastic change of the environment, the execution of applications on a broad spectrum of computing devices is propelled by the availability of the above-mentioned platforms. Different applications that need interoperability to coordinate and correspond with each other should be facilitated. Using a standard interface and data format, HE must link various devices from various platforms together to communicate with each other. To aid the interactive services performed by a middleware framework that operates on Application Programming Interface (API) over HEs, this issue aims to endorse an Adaptable Service Application Programming Interface (ASAPI).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号