首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
The realization of a class of state equations by RC network and one voltage-controlled voltage source is described. The linear graph of the network has at least one complete tree such that the tree branches correspond to all capacitances, to all voltage sources and to the controlled source only.  相似文献   

2.
We keep about 16,000 engineers on the ground across three continents to hear and understand your customers’ demands.  相似文献   

3.
Secure communications for vehicular ad hoc networks (VANETs) have become an important research issue these years. Many protocols for secure vehicle-to-vehicle communications and vehicle-to-infrastructure communications have been proposed, yet fewer protocols are concerned with secure group communications for VANETs. Of those existing protocols for group communications, some of them form a group of vehicles based on geographical regions and provide broadcasting to the group members with or without message confidentiality. The others allow secure vehicle-to-vehicle communications within a group with session keys, but they do not preserve user privacy for communicating parties within the group. In this paper, we propose a novel group communication scheme for vehicular networks, in which a group is formed by a set of related vehicles of the same purpose, such as a platoon of recreational vehicles targeted for the same tourist spot. The scheme not only offers efficient and secure group communications but also provides privacy preservation for vehicle-to-vehicle communications within a group. Security analysis is given to demonstrate the robustness of the proposed scheme.  相似文献   

4.
As low-power wide-area network (LPWAN) end devices (EDs) are deployed in massive scale, their economic and environmental costs of operation are becoming too significant to ignore and too difficult to estimate. While LPWAN architectures and protocols are designed to primarily save energy, this study shows that energy saving does not necessarily lead to lower cost or environmental footprint of the network. Accordingly, a theoretical framework is proposed to estimate the operational expenditure (OpEx) and environmental footprint of LPWAN EDs. An extended constrained optimization model is provided for the ED link assignment to gateways (GWs) based on heterogeneous ED configurations and hardware specifications. Based on the models, a simulation framework is developed which demonstrates that OpEx, energy consumption, and environmental footprint can be in conflict with each other as constrained optimization objectives. We demonstrate different ways to achieve compromises in each dimension for overall improved network performance.  相似文献   

5.
The impact of information and communications technology (ICT) in tourism (e-tourism) has altered the ways tourism services are accessed and consumed. Ubiquitous and highly innovative ICTs provide different channels for consumers to use tourism services; thus, studies on e-tourism are numerous and fragmented. Different factors account for how consumers embrace these channels. The purpose of this study is to review studies on consumers’ acceptance or adoption of e-tourism in order to group the studies, synthesize the theories, models and frameworks used and identify the antecedents influencing consumers’ e-tourism acceptance and usage. A total of 71 studies from 2005 to 2016 (inclusive) from both tourism-based and non-tourism-based journals were selected, synthesized, and included. Based on their contexts, similarity and relevance, the 71 studies were segregated into three distinct groups. This study found that research among the groups is uneven. Implications and research directions are suggested.  相似文献   

6.
《III》1992,5(3):50-52
  相似文献   

7.
《数字通信世界》2006,(11):95-95
President Zhao Jibin of China Titong goes to Jiangsu to do some surveys and after listening to the working report of Jiangsu Tietong, he inspects the network development in Nanjing, Suzhou, Changzhou and other cities. Zhao JiBin emphasizes China Tietong should be on the way of "enlarge private network coverage and make great progress in network regionalization", make every effort to lay a solid management foundation and improve management level so as to ensure the accurate orientation and implement of the whole development strategy. All members of China Tietong must hold a clear understanding about future development direction.  相似文献   

8.
The increasing number of radio access technologies and the availability of multi-radio devices boost the need for novel resource allocation schemes in cellular networks. This paper uses a cooperative game theoretic approach for resource allocation at the network level, while utilizing simultaneous use of available radio interfaces at the device level. We model resource allocation management using the well known bankruptcy model and apply Kalai-Smorodinsky bargaining solution method to find a distribution rule, based on which we propose resource allocation and call admission control schemes. Performance analysis of our allocation and control schemes demonstrates significant improvements over previous approaches in terms of utilization of the available bandwidth and the number of call drops. We also study the performance of proposed approach for different operator policies.  相似文献   

9.
A novel method of correlation function for analyzing cross-sensitivity between strain and temperature is reported for the first time in this paper. Using the new method,the correlative characteristics between strain and temperature of fiber Bragg grating sensors are studied both theoretically and experimentally The experimental results accord with the theoretical calculations.  相似文献   

10.
In this paper, a substructure-based network behavior anomaly detection approach, called WFS (Weighted Frequent Subgraphs), is proposed to detect the anomalies of a large-scale IP networks. With application of WFS, an entire graph is examined, unusual substructures of which are reported. Due to additional information given by the graph, the anomalies are able to be detected more accurately. With multivariate time series motif association rules mining (MTSMARM), the patterns of abnormal traffic behavior are able to be obtained. In order to verify the above proposals, experiments are conducted and, together with application of backbone networks (Internet2) Netflow data, show some positive results.  相似文献   

11.
12.
13.
The extent to which the deliberative scenario brackets socio-economic inequalities (i.e., functioning as an ideal public sphere) has been long-debating. This study empirically addresses this question in the online setting. We test whether offline advantages (i.e., economic and cultural capitals) can be translated into power in online deliberation and how their dynamic relations further influence interlocutors’ deliberation experience (i.e., perceived procedural fairness and validity claim). Power is conceptualized as network power, including prestige (indegree), leadership (outdegree), and brokering power (betweenness). A national sample of Singaporeans participated in a three-week online deliberation, and network power is measured based on the web log. The participants answered a two-wave (i.e., pre- and post-deliberation) survey to indicate individual attributes. Structural equation modeling finds that online deliberation brackets as well as reinforces offline status. Economic capital is suppressed while cultural capital translates into network power, which further influences interlocutors’ evaluation of the deliberation.  相似文献   

14.
This article proposes a novel nonlinear network code in the GF(2m) finite field. Different from previous linear network codes that linearly mix multiple input flows, the proposed nonlinear network code mixes input flows through both multiplication and exponentiation in the GF(2m). Three relevant rules for selecting proper parameters for the proposed nonlinear network code are discussed, and the relationship between the power parameter and the coding coefficient K is explored. Further analysis shows that the proposed nonlinear network code is equivalent to a linear network code with deterministic coefficients.  相似文献   

15.
The mass spreading of COVID-19 has changed the paradigm of the education industry. In China and many other nations, universities have introduced compulsory remote education programs such as mobile learning (m-learning) to prevent public health hazards caused by the pandemic. However, so far, there is still a lack of understanding of student’s learning experience responses in compulsory m-learning programs. As such, there is a necessity to explore the factors and mechanisms which drives students’ experience. This paper evaluates the influence of both pedagogy and technology on learner’s compulsory m-learning experience response (ER) by extending the mobile technology acceptance model (MTAM) during the COVID-19 pandemic. An online self-administered questionnaire was used to collect the data, which was then analysed through SmartPLS 3.2.9. Importance-performance matrix analysis was applied as a post-hoc procedure to gauge the importance and performance of the exogenous constructs. The results revealed that perceptions of m-learning’s learning content quality, user interface, and system’s connectivity affect the perceived mobile usefulness and easiness which in turn affects ER. This paper validates MTAM in the field of education by integrating MTAM with pedagogy and technology attributes under a social emergency setting such as the COVID-19 pandemic. In addition, the current research explains users' ER rather than behaviour intention which is commonly adopted in past studies.  相似文献   

16.
Based on the Computers Are Social Actors (CASA) paradigm, this study extends the expectations regarding the superiority of specialists over generalists to mobile technology by examining whether the specialization of a hardware agent (i.e., a smartphone) and a software agent (i.e., an application) has psychological effects on smartphone users who are exposed to mobile advertisements. Results from a between-subjects experiment (N = 80) show that specialist smartphones and applications induce greater trust in advertisements and an increased purchase intention toward the advertised products than generalist smartphones and applications. In addition, the effects of specialization on purchase intention are mediated by trust in advertisements. Theoretical and practical implications of these findings are discussed.  相似文献   

17.
The IEEE 802.11 MAC protocol is the standard for wireless LANs; it is widely used in testbeds and simulations for wireless multihop ad hoc networks. However, this protocol was not designed for multihop networks. Although it can support some ad hoc network architecture, it is not intended to support the wireless mobile ad hoc network, in which multihop connectivity is one of the most prominent features. In this article we focus on the following question: can the IEEE 802.11 MAC protocol function well in multihop networks? By presenting several serious problems encountered in an IEEE 802.11-based multihop network and revealing the in-depth cause of these problems, we conclude that the current version of this wireless LAN protocol does not function well in multihop ad hoc networks. We thus doubt whether the WaveLAN-based system is workable as a mobile ad hoc testbed  相似文献   

18.
This paper presents an investigation into using a combination of two alternative digital number representations; the residue number system (RNS) and the signed-digit (SD) number representation in digital arithmetic circuits. The combined number system is called RNS/SD for short. Since the performance of RNS/SD arithmetic circuits depends on the choice of the moduli set (a set of pairwise prime numbers), the purpose of this work is to compare RNS/SD number systems based on different sets. Five specific moduli sets of different lengths are selected. Moduli-set-specific forward and reverse RNS/SD converters are introduced for each of these sets. A generic conversion technique for moduli sets consisting of any number of elements is also presented. Finite impulse response (FIR) filters are used as reference designs in order to evaluate the performance of RNS/SD processing. The designs are evaluated with respect to delay and circuit area in a commercial 0.13 μm CMOS process. For the case of FIR filters it is shown that generic moduli sets with five or six moduli results in designs with the best area × delay products.
Lars Bengtsson (Corresponding author)Email:
  相似文献   

19.

Recent developments in dynamic mobile ad-hoc network enhance the network speed and reliability. The nodes in the dynamic ad-hoc network are moving in nature. Due to the increased subscribers in this network, the network traffic has increased to manifold which in turn creating the challenge of maintaining the energy level. In path optimization process in mobile ad-hoc network consumes more energy and the draining of the energy is dependent on network reliability and connectivity. Further, the network also suffers by harmful attacks such as denial of service attack, black hole attack and warm hole attack. The primary focus of this paper is to prevent these attacks with the help of dynamic mobile ad-hoc network on demand protocol and hybrid meta-heuristics methodologies, and also to reduce the energy drain rate. This is achieved by estimating the velocity and fitness value of the nodes. Finally, the empirical simulation results of hybrid particle swarm optimization with bat algorithm (PSO–BAT) shows that the energy drain rate level is reduced 90% as 1 mJ/s than ad-hoc on demand vector. The end-to-end delay minimized to 50% than existing Ad hoc on-demand distance vector routing. The performance metrics routing overhead and execution time has been reduced and throughput is gradually increased in PSO–BAT optimization in dynamic mobile ad hoc network scenario.

  相似文献   

20.
Smartphone use by adolescents is increasingly attracting the interest of social scientists, parents, and educational stakeholders (teachers, educators, educational policy makers), generally in a negative context. There are, however, many myths surrounding the issue, resulting from the reproduction of stereotypes about the psychosocial functioning of adolescents in cyberspace, as well as inadequately constructed research tools that measure how new media are used. This text is an attempt to show the phenomenon of problematic Internet use through the prism of screen time measured using real data from smartphones. The research was conducted in first half of 2022 among adolescents aged 13–19 in Bosnia and Herzegovina (N = 1185, mean age = 15.47 with standard deviation = 1.84). The research was implemented using a triangulation of tools such as the Smartphone Addiction Scale (SAS Scale), Software Installed on the Smartphone (SIS Scale), The Bergen Social Media Addiction Scale (BSMAS), and the Screen Time Scale (STS). From the data collected, it was noted that: 1) Screen time correlates weakly with problematic smartphone use and social networking; 2)The average period of smartphone use in the study group is 3 h49 minutes per day, of which 37 min are related to web browsing, while 2 h22 minutes are related to social networking; 3) A quarter of adolescents use a smartphone more than 5.5 h per day, of which more than 2 h15 minutes is screen time related to social media; 4) Approximately half of the respondents use smartphones slightly more than 2 h per day; 5) Girls use smartphones for longer than boys; 6) Place of residence (city or countryside) does not affect screen time; 7) Screen time is related to a medium degree to the type of software installed on the smartphone; 8) There is a need to refine the measurement methodology of screen time and to abandon self-declaration in this area.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号