首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Mobile Networks and Applications - The concept of cloud computing relies on central large datacentres with huge amounts of computational power. The rapidly growing Internet of Things with its vast...  相似文献   

3.
Social Internet of Things (SIoT) is a young paradigm that integrates Internet of Things and Social Networks. Social Internet of Things is defined as a social network of intelligent objects. SIoT has led to autonomous decision making and communication between object peers. SIoT has created and opened many research avenues in the recent years and it is vital to understand the impact of SIoT in the real world. In this paper, we have mined twitter to evaluate the user awareness and impact of SIoT among the public. We use R for mining twitter and perform extensive sentiment analysis using supervised and semi supervised algorithms to evaluate the user’s perception about SIoT. Experimental results show that the proposed Fragment Vector model, a semi supervised classification algorithm is better when compared to supervised classification algorithms namely Improved Polarity Classifier (IPC) and SentiWordNet Classifier (SWNC). We also evaluate the combined performance of IPC and SWNC and propose a hybrid classifier (IPC?+?SWNC). Our analysis was challenged by limited number of tweets with respect to our study. Experimental results using R has produced evidences of its social influences.  相似文献   

4.
In this work, a 9T subthreshold SRAM cell is proposed with the reduced leakage power and improved stability against the PVT variations. The proposed cell employs the read decoupling to improve the read stability, and the partial feedback cutting approach to control the leakage power with improved read/write ability. The incorporated stacking effect further improves the leakage power. The simulated leakage power for the proposed cell is 0.61×, 0.49×, 0.80× and 0.55×, while the read static noise margin (RSNM) is 2.5×, 1×, 1.05× and 0.96×, write static noise margin (WSNM) 0 is 1.5×, 1.8×, 1.68× and 1.9× and WSNM 1 is 0.95×, 1.2×, 1.05×, and 1.2× at 0.4 V when compared with the conventional 6T and state of arts (single ended 6T, PPN based 10T and data aware write assist (DAWA) 12T SRAM architectures) respectively. The minimum supply voltage at which this cell can successfully operate is 220 mV. A 4 Kb memory array has also been simulated using proposed cell and it consumes 0.63×, 0.67× and 0.63× less energy than 6T during read, write 1 and write 0 operations respectively for supply voltage of 0.3 V.  相似文献   

5.
Wireless Personal Communications - The Internet of Things (IoT) presents a new paradigm of the future internet that intends to provide interactive communication between various processing object...  相似文献   

6.
In recent years, intellectualized technology has gradually matured, and it has been applied to all aspects of life. Among them, the emerging industry represented by smart home is rising, but the current smart home industry cannot meet people’s demand because of the immature technology, high cost for maintenance and price. In the situation, this paper presents a decision method for user’s behaviours which based on the C4.5 algorithm, selecting samples from data collected by intelligent home system, analysing and processing samples to generate a decision tree. According to the user’s living habits, the decision tree is used to help users make decisions, so as to provide users with more intelligent and efficient services.  相似文献   

7.

Regularly the scam threat entails intended scams performed for gaining profits and the goal is to focus on this domain of services aiding payments with the electronic money. Precisely the usage of tools for prognostic safety estimation at the time of execution monitors the operational performance with respect to payments within money payment service and attempts to equalize them with the anticipated performance offered by the operational framework. The assessment variations from the specified performance required for abnormalities representing probable mishandling of the services in terms of money laundering behaviours. The assessment of the applications in terms of the designed scheme offering calibrations based on estimation and detection behaviour of the prognostic safety estimator created employed real-time processing and assessed logs. The intention of the analysis is to locate the mishandling prototypes imitating given money laundering mechanism in an artificial operational performance based on the features seized from the real-time payment actions with cloud infrastructure.

  相似文献   

8.
Popularly, based on electronic information technology (micro-electronics technology mostly), IT industry include electronic information equipment’s exploitation and manufacture, providing information communication, system integration and software exploitation, etc. As the forerunner industry and support industry in national economy, IT industry has some characteristic, such as better penetrating capability and leading function, faster development speed and great increasing potential. It has …  相似文献   

9.
Pan  Wenjun  Zhao  Huida  Miu  Lin 《Wireless Personal Communications》2019,109(2):761-775
Wireless Personal Communications - Nowadays, due to some social, legal, and economic reasons, dealing with supply chain risk is an unavoidable issue in many industries. Besides, regarding...  相似文献   

10.
Thermal fatigue properties of commercial LF35 (Sn-1.2Ag-0.5Cu-0.05Ni), SAC105 (Sn-1Ag-0.5Cu), and SAC305 (Sn-3Ag-0.5Cu) solders on Casio’s wafer-level packages are discussed from the viewpoints of both morphology and grain boundary character. Orientation imaging microscopy revealed that both LF35 and SAC305 resisted the coarsening of tin grains during thermal fatigue as compared with SAC105, correlating with their greater fraction of coincidence site lattice boundaries. This seems to explain why LF35 has superior thermal fatigue life in spite of its lower silver content.  相似文献   

11.
This paper focuses on the analysis of tags collection time of 2.4 GHz embedded active Radio Frequency Identification (RFID) system for indoor and outdoor real-time tracking and monitoring applications based on IEEE 802.15.4 standard. The main novelty of the system is the implementation of the communication method in order to provide Machine to Machine (M2M) communication and automated switching mechanism between indoor and outdoor location by utilizing active RFID, Wireless Sensor Network (WSN), Global Positioning System (GPS) and mobile communication on a single platform. In this work, GPS receiver covers outdoor location tracking, while active RFID provides identification and Receive Signal Strength Indicator (RSSI) reading for each tag holder to cover indoor location tracking especially near or inside building where location information is not detected by GPS. Several experiments were conducted on three different RFID tags which were active RFID tag embedded with GPS and GSM (ERFIDG2), active RFID tag embedded with GPS (ERFIDG) and standalone RFID tag communicating with the same active RFID reader. The experiment was done to evaluate the communication performance of the active RFID in terms of tags collection time using Transparent (AT) and Application Programming Interface (API) mode. The experiment was extended to measure tags collection time in single hop and multi hops communication for Tag Talk First (TTF) and Reader Talk First (RTF) protocols. The results show that the proposed active RFID system (ERFIDG2) is better than the standalone and ERFIDG systems. The in-depth research done in this work is to study the experience and identify the challenges that will be faced in the development and implementation of a wireless RFID-based system for tracking and monitoring applications.  相似文献   

12.
This study addressed the question of whether the Internet is a tool for democracy or oppression. To that end, it analyzed the relationships among national-level indicators on a global scale (national economy, human capital, ICT deployment, electoral rights, civil liberties, and online filtering). The results of the cross-national examination through the path analyses found that Internet-enabled participation did not significantly mediate political evolution from electoral democracy to liberal democracy. On the contrary, online filtering or censorship significantly mediated the relationship between electoral democracy and liberal democracy. Moreover, the study identified the countries that were experiencing inconsistencies between their technological readiness for Internet-enabled participation and the extent of oppression of their civil liberties by categorizing their levels of Internet-enabled participation and liberal democracy.  相似文献   

13.
Castro  R. A.  Khanin  S. D.  Smirnov  A. P.  Kononov  A. A. 《Semiconductors》2019,53(12):1646-1650
Semiconductors - The results of investigating charge-transfer processes in thin layers of a vitreous system (As2Se3)100 – xBix are presented. A power-law dependence of the...  相似文献   

14.
Semiconductors - Integrated field-emission devices and integrated circuits (ICs) based on them are a promising direction in microelectronics, which is associated with the use of low-voltage and...  相似文献   

15.
We prove that every key agreement protocol in the random oracle model in which the honest users make at most n queries to the oracle can be broken by an adversary who makes \(O(n^2)\) queries to the oracle. This improves on the previous \({\tilde{\Omega }}(n^6)\) query attack given by Impagliazzo and Rudich (STOC ’89) and resolves an open question posed by them. Our bound is optimal up to a constant factor since Merkle proposed a key agreement protocol in 1974 that can be easily implemented with n queries to a random oracle and cannot be broken by any adversary who asks \(o(n^2)\) queries.  相似文献   

16.
Zhang  Yinjun  Chen  Mengji 《Wireless Networks》2022,28(8):3787-3800
Wireless Networks - The advancement of technology, specifically the development of information technology (IT) has had a great influence on everyone life. Due to the rapid development of...  相似文献   

17.
Based on signal space concepts, a transmission error code performance for MPSK, square MQAM and star MQAM modulation schemes on the AGWN channel is analyzed. The corresponding BER formulas and computer aided numeric results are also given. Therefore it provides a theoretical basis for choosing MQAM modulation schemes in mobile communications.  相似文献   

18.
On 28 August 28,ZTE Corporation held the global launch of the Grand X LTE (T82) in Hong Kong.For this launch,ZTE partnered with China Mobile Hong Kong.Grand X LTE (T82) is the company’ s first single-chip LTE smartphone.It has a 1.5 GHz dual-core CPU based on advanced 28 nm technology.Compared to most phones on the market,the single-chip model is faster and more energy efficient.T82 has a 4.3-inch qHD screen,which  相似文献   

19.
Journal of Communications Technology and Electronics - Features of the electrical properties of n(p)-Hg1–xCdxTe (x = 0.21–0.23) with Al2O3 or SiO2/Si3N4 dielectrics are considered. The...  相似文献   

20.
New constructions of 1D and 2D generalized Kravchenko-Kotel’nikov sampling theorems based on atomic function up(t) are proposed and justified. The theorems are rigorously proved for both 2D and 1D cases. A simulation performed to analyze the construction and improvement of new series estimates shows their advantage over the classical Whittaker-Kotel’nikov-Shannon series.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号