We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 101-120 of 10,000 results
  1. Social Network Analysis-Based Approach to Investigate the Network of Risk and Crisis Communication of Government Agencies During Early Stages of COVID-19 in Sri Lanka

    Effective communication and coordination between government agencies and the general public are important to manage disaster risks and mitigate the...
    K. K. C. L. Kannangara, C. S. A. Siriwardana, H. A. D. G. S. Jayathilaka in 12th International Conference on Structural Engineering and Construction Management
    Conference paper 2023
  2. Hardware Testbed Design and Performance Evaluation for ISAC Enabled CAVs

    To overcome the bottleneck of unreliable environment sensing caused by unpredictable weather and obstacle blockage, the cooperation among connected...
    Qixun Zhang, Zhiyong Feng, ** Zhang in Integrated Sensing and Communications
    Chapter 2023
  3. A Cloud-Edge Server-Based Cypher Scheme for Secure Data Sharing in IoT Environment

    As the technologies are growing, new challenges are emerging. The Internet is also one of these. IoT and cloud computing are considered a highly...
    Conference paper 2023
  4. An Interleaving Approach to Control Mobile Device and Elements via Screen Buffer and Audio Streaming

    Nowadays mobile devices are powered with huge features (voice enabled, OnDevice AI, health, IoT) which requires device access and validation methods...
    Jayavel Kanniappan, Rajesh Kumar Jayavel, Jithin Gangadharan in Communication and Intelligent Systems
    Conference paper 2022
  5. Positron Emission Tomography (PET) Imaging Based on Sub-millimeter Pixelated CdZnTe Detectors

    This chapter examines positron emission tomography (PET) imaging applications using sub-millimeter pixelated cadmium zinc telluride (CdZnTe)...
    Yongzhi Yin, Sergey Komarov in Advanced X-ray Detector Technologies
    Chapter 2022
  6. Interoperability and Portability in Big Data Analysis Based Cloud-Fog-Edge-Dew Computing

    A great deal of interoperability and portability exist in cloud computing, which affects the seamless integration and mobility of systems and...
    AmirHossein Jafari Pozveh, Seyedeh Maryam Mazinani, Mahsa Faraji Shoyari in Resource Management in Distributed Systems
    Chapter 2024
  7. Visual Simulation and Demonstration of Building Quality Improvement in Existing Residential Areas Driven by Integrated Information System

    Visual simulation and demonstration supported by digital simulation technology become an important way to promote and demonstrate scientific...
    Yue Fan, Li Zhang, ... Yu Zhao in Advances in Computer Science and Ubiquitous Computing
    Conference paper 2023
  8. Picture fuzzy Additive Ratio Assessment Method (ARAS) and VIseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) method for multi-attribute decision problem and their application

    The purpose of this paper is to study the multi-attribute decision-making problem under the fuzzy picture environment. First, a method to compare the...

    Jian** Fan, Dongshuai Han, Meiqin Wu in Complex & Intelligent Systems
    Article Open access 20 March 2023
  9. Control of VSI in Microgrid Using Improved Particle Swarm Optimization

    A real-time fine-tuning approach is used in this study to offer an optimum power control strategy for microgrid operation. The main theme of the...
    Dipesh B. Pardeshi, Sapana P. Sonar, ... Prashant V. Thokal in Recent Evolutions in Energy, Drives and e-Vehicles
    Conference paper 2024
  10. Modelling, Analysis, and Control of OmniMorph: an Omnidirectional Morphing Multi-rotor UAV

    This paper introduces for the first time the design, modelling, and control of a novel morphing multi-rotor Unmanned Aerial Vehicle (UAV) that we...

    Youssef Aboudorra, Chiara Gabellieri, ... Antonio Franchi in Journal of Intelligent & Robotic Systems
    Article Open access 25 January 2024
  11. Multi-objective Fuzzy Reliability Redundancy Allocation for \(x_{j}\) -out-of- \(m_{j}\) System Using Fuzzy Rank-Based Multi-objective PSO

    The main goal of this paper is to solve a fuzzy multi-objective reliability redundancy allocation problem (MORRAP) for...
    Satyajit De, Pratik Roy, Anil Bikash Chowdhury in Applied Computing for Software and Smart Systems
    Conference paper 2023
  12. Evaluating Performances of VPN Tunneling Protocols Based on Application Service Requirements

    A Virtual Private Network (VPN) creates a private communication path over the public network to ensure the security of the transmitted data. A...
    Conference paper 2022
  13. Information sharing in decentralised supply chains with partial collaboration

    We explore the value of information sharing for smoothing the dynamics of supply chains when some echelons do not collaborate. To this end, we study...

    Roberto Dominguez, Salvatore Cannella, ... Jose M. Framinan in Flexible Services and Manufacturing Journal
    Article 19 February 2021
  14. Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain

    Attribute-based encryption (ABE) allows users to encrypt and decrypt data based on attributes. It realizes fine-grained access control and can...

    Shengzhou Hu, Tingting Zhong, ... Wenhao Li in Annals of Telecommunications
    Article 18 May 2023
  15. BCSR: toward arbitrarily oriented text image super-resolution via adaptive Bezier curve network

    Although existing super-resolution networks based on deep learning have obtained good results, it is still challenging to achieve an ideal visual...

    Mingzhu Shi, Muxian Tan, ... Bin Zao in EURASIP Journal on Advances in Signal Processing
    Article Open access 18 July 2023
  16. Time-based information sharing approach for employed foragers of artificial bee colony algorithm

    Collective foraging and information sharing behaviors of honey bees have lead to emerge different swarm intelligence-based optimization techniques....

    Selcuk Aslan in Soft Computing
    Article 08 December 2018
  17. 3D Warehousing: Enabling Intelligent Warehousing Visualization Based on Three.js

    In the industry 4.0 era, the 3D visualization and real-time automatic monitoring of intelligent warehousing supported are becoming increasingly...
    Wenqian Shan, Wenbo Wan, ... Yantong Zhan in Signal and Information Processing, Networking and Computers
    Conference paper 2023
  18. Exploiting device-to-device (D2D) transmission strategy for throughput enhancement in WLANs

    The IEEE 802.11 MAC protocols have been implemented in many wireless ad hoc and infrastructure networks. Most of the IEEE 802.11-based networks adopt...

    Haythem Bany Salameh, Rasha Al-Bzoor, Khalid A. Darabkh in Wireless Networks
    Article 08 January 2022
  19. Quasi-Decentralized Cyber-Physical Fabrication Systems—A Practical Overview

    Building an effective cyber-physical system is difficult due to the overall complexity of technologies on their own, challenges with the interaction...
    Ilija Vukorep, Anatolii Kotov in Architecture and Design for Industry 4.0
    Chapter 2024
  20. Design and Development of Digital Intelligent Fracturing Platform

    There are many problems in data monitoring of fracturing construction site, such as many data types, large amount of data, single admission mode,...
    Conference paper 2023
Did you find what you were looking for? Share feedback.