期刊文献+
共找到8,007篇文章
< 1 2 250 >
每页显示 20 50 100
Reliable Data Collection Model and Transmission Framework in Large-Scale Wireless Medical Sensor Networks
1
作者 Haosong Gou Gaoyi Zhang +2 位作者 RenêRipardo Calixto Senthil Kumar Jagatheesaperumal Victor Hugo C.de Albuquerque 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1077-1102,共26页
Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present ... Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs. 展开更多
关键词 Wireless sensor networks reliable data transmission medical emergencies CLUSTER data collection routing scheme
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
2
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor Networks(WSNs) elliptic curve cryptography
下载PDF
Real-time performance of periodic data transmission in EPA industrial Ethernet 被引量:2
3
作者 刘宁 仲崇权 莫亚林 《Journal of Beijing Institute of Technology》 EI CAS 2012年第3期336-342,共7页
To evaluate and improve the real-time performance of Ethernet for plant automation(EPA) industrial Ethernet,the real-time performance of EPA periodic data transmission was theoretically and experimentally studied.By... To evaluate and improve the real-time performance of Ethernet for plant automation(EPA) industrial Ethernet,the real-time performance of EPA periodic data transmission was theoretically and experimentally studied.By analyzing information transmission regularity and EPA deterministic scheduling mechanism,periodic messages were categorized as different modes according to their entering-queue time.The scheduling characteristics and delivery time of each mode and their interacting relations were studied,during which the models of real-time performance of periodic information transmission in EPA system were established.On this basis,an experimental platform is developed to test the delivery time of periodic messages transmission in EPA system.According to the analysis and the experiment,the main factors that limit the real-time performance of EPA periodic data transmission and the improvement methods were proposed. 展开更多
关键词 Ethernet for plant automation(EPA) industrial Ethernet periodic data transmission real-time performance delivery time
下载PDF
Real-Time Intelligent Diagnosis of Co-frequency Vibration Faults in Rotating Machinery Based on Lightweight-Convolutional Neural Networks
4
作者 Xin Pan Xiancheng Zhang +1 位作者 Zhinong Jiang Guangfu Bin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第2期264-282,共19页
The co-frequency vibration fault is one of the common faults in the operation of rotating equipment,and realizing the real-time diagnosis of the co-frequency vibration fault is of great significance for monitoring the... The co-frequency vibration fault is one of the common faults in the operation of rotating equipment,and realizing the real-time diagnosis of the co-frequency vibration fault is of great significance for monitoring the health state and carrying out vibration suppression of the equipment.In engineering scenarios,co-frequency vibration faults are highlighted by rotational frequency and are difficult to identify,and existing intelligent methods require more hardware conditions and are exclusively time-consuming.Therefore,Lightweight-convolutional neural networks(LW-CNN)algorithm is proposed in this paper to achieve real-time fault diagnosis.The critical parameters are discussed and verified by simulated and experimental signals for the sliding window data augmentation method.Based on LW-CNN and data augmentation,the real-time intelligent diagnosis of co-frequency is realized.Moreover,a real-time detection method of fault diagnosis algorithm is proposed for data acquisition to fault diagnosis.It is verified by experiments that the LW-CNN and sliding window methods are used with high accuracy and real-time performance. 展开更多
关键词 Co-frequency vibration real-time diagnosis LW-CNN data augmentation
下载PDF
A Real-time Lithological Identification Method based on SMOTE-Tomek and ICSA Optimization
5
作者 DENG Song PAN Haoyu +5 位作者 LI Chaowei YAN Xiaopeng WANG Jiangshuai SHI Lin PEI Chunyu CAI Meng 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2024年第2期518-530,共13页
In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on ... In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on machine learning and mud logging data is studied in this paper.This method can effectively utilize downhole parameters collected in real-time during drilling,to identify lithology in real-time and provide a reference for optimization of drilling parameters.Given the imbalance of lithology samples,the synthetic minority over-sampling technique(SMOTE)and Tomek link were used to balance the sample number of five lithologies.Meanwhile,this paper introduces Tent map,random opposition-based learning and dynamic perceived probability to the original crow search algorithm(CSA),and establishes an improved crow search algorithm(ICSA).In this paper,ICSA is used to optimize the hyperparameter combination of random forest(RF),extremely random trees(ET),extreme gradient boosting(XGB),and light gradient boosting machine(LGBM)models.In addition,this study combines the recognition advantages of the four models.The accuracy of lithology identification by the weighted average probability model reaches 0.877.The study of this paper realizes high-precision real-time lithology identification method,which can provide lithology reference for the drilling process. 展开更多
关键词 mud logging data real-time lithological identification improved crow search algorithm petroleum geological exploration SMOTE-Tomek
下载PDF
Research on Total Electric Field Prediction Method of Ultra-High Voltage Direct Current Transmission Line Based on Stacking Algorithm
6
作者 Yinkong Wei Mucong Wu +3 位作者 Wei Wei Paulo R.F.Rocha Ziyi Cheng Weifang Yao 《Computer Systems Science & Engineering》 2024年第3期723-738,共16页
Ultra-high voltage(UHV)transmission lines are an important part of China’s power grid and are often surrounded by a complex electromagnetic environment.The ground total electric field is considered a main electromagn... Ultra-high voltage(UHV)transmission lines are an important part of China’s power grid and are often surrounded by a complex electromagnetic environment.The ground total electric field is considered a main electromagnetic environment indicator of UHV transmission lines and is currently employed for reliable long-term operation of the power grid.Yet,the accurate prediction of the ground total electric field remains a technical challenge.In this work,we collected the total electric field data from the Ningdong-Zhejiang±800 kV UHVDC transmission project,as of the Ling Shao line,and perform an outlier analysis of the total electric field data.We show that the Local Outlier Factor(LOF)elimination algorithm has a small average difference and overcomes the performance of Density-Based Spatial Clustering of Applications with Noise(DBSCAN)and Isolated Forest elimination algorithms.Moreover,the Stacking algorithm has been found to have superior prediction accuracy than a variety of similar prediction algorithms,including the traditional finite element.The low prediction error of the Stacking algorithm highlights the superior ability to accurately forecast the ground total electric field of UHVDC transmission lines. 展开更多
关键词 DC transmission line total electric field effective data multivariable outliers LOF algorithm Stacking algorithm
下载PDF
Real-time prediction of mechanical behaviors of underwater shield tunnel structure using machine learning method based on structural health monitoring data 被引量:1
7
作者 Xuyan Tan Weizhong Chen +2 位作者 Tao Zou Jianping Yang Bowen Du 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2023年第4期886-895,共10页
Predicting the mechanical behaviors of structure and perceiving the anomalies in advance are essential to ensuring the safe operation of infrastructures in the long run.In addition to the incomplete consideration of i... Predicting the mechanical behaviors of structure and perceiving the anomalies in advance are essential to ensuring the safe operation of infrastructures in the long run.In addition to the incomplete consideration of influencing factors,the prediction time scale of existing studies is rough.Therefore,this study focuses on the development of a real-time prediction model by coupling the spatio-temporal correlation with external load through autoencoder network(ATENet)based on structural health monitoring(SHM)data.An autoencoder mechanism is performed to acquire the high-level representation of raw monitoring data at different spatial positions,and the recurrent neural network is applied to understanding the temporal correlation from the time series.Then,the obtained temporal-spatial information is coupled with dynamic loads through a fully connected layer to predict structural performance in next 12 h.As a case study,the proposed model is formulated on the SHM data collected from a representative underwater shield tunnel.The robustness study is carried out to verify the reliability and the prediction capability of the proposed model.Finally,the ATENet model is compared with some typical models,and the results indicate that it has the best performance.ATENet model is of great value to predict the realtime evolution trend of tunnel structure. 展开更多
关键词 Shied tunnel Machine learning MONITORING real-time prediction data analysis
下载PDF
Development and prospect of downhole monitoring and data transmission technology for separated zone water injection 被引量:1
8
作者 LIU He ZHENG Lichen +4 位作者 YU Jiaqing MING Eryang YANG Qinghai JIA Deli CAO Gang 《Petroleum Exploration and Development》 2023年第1期191-201,共11页
This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptabi... This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptability and application status of traditional downhole data acquisition method,cable communications and testing technology,cable-controlled downhole parameter real-time monitoring communication method and downhole wireless communication technology are introduced in detail.Problems and challenges of existing technologies in downhole monitoring and data transmission technology are pointed out.According to the production requirement,the future development direction of the downhole monitoring and data transmission technology for separated zone water injection is proposed.For the large number of wells adopting cable measuring and adjustment technology,the key is to realize the digitalization of downhole plug.For the key monitoring wells,cable-controlled communication technology needs to be improved,and downhole monitoring and data transmission technology based on composite coiled tubing needs to be developed to make the operation more convenient and reliable.For large-scale application in oil fields,downhole wireless communication technology should be developed to realize automation of measurement and adjustment.In line with ground mobile communication network,a digital communication network covering the control center,water distribution station and oil reservoir should be built quickly to provide technical support for the digitization of reservoir development. 展开更多
关键词 separated zone water injection downhole monitoring data transmission cable communication vibration wave pressure wave flow wave
下载PDF
Secure and Efficient Data Transmission Scheme Based on Physical Mechanism
9
作者 Ping Zhang Haoran Zhu +3 位作者 Wenjun Li Osama Alfarraj Amr Tolba Gwang-jun Kim 《Computers, Materials & Continua》 SCIE EI 2023年第5期3589-3605,共17页
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based o... Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based on the physicalmechanism has attracted extensive attention.How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism.In this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed.In order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same time.Theoretical analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work. 展开更多
关键词 data transmission key generation data privacy compressive sensing Internet of Things(IoT)
下载PDF
Autonomous UAV 3D trajectory optimization and transmission scheduling for sensor data collection on uneven terrains
10
作者 Andrey V.Savkin Satish C.Verma Wei Ni 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第12期154-160,共7页
This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors ha... This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors harvest renewable energy and are equipped with batteries and data buffers.The ground sensor model takes into account sensor data buffer and battery limitations.An asymptotically globally optimal method of joint UAV 3D trajectory optimization and data transmission schedule is developed.The developed method maximizes the amount of data transmitted to the UAV without losses and too long delays and minimizes the propulsion energy of the UAV.The developed algorithm of optimal trajectory optimization and transmission scheduling is based on dynamic programming.Computer simulations demonstrate the effectiveness of the proposed algorithm. 展开更多
关键词 Unmanned aerial system UAS Unmanned aerial vehicle UAV Wireless sensor networks UAS-Assisted data collection 3D trajectory optimization data transmission scheduling
下载PDF
Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks
11
作者 Dae-Young Kim Seokhoon Kim 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期727-737,共11页
As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-t... As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach. 展开更多
关键词 data aggregation data transmission ultra-dense network machine-type communication Internet of Things
下载PDF
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
12
作者 Lingwei Xu Hao Yin +4 位作者 Hong Jia Wenzhong Lin Xinpeng Zhou Yong Fu Xu Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期400-410,共11页
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc... Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase. 展开更多
关键词 Mobile IIoT networks data secure transmission Performance analysis Intelligent prediction Improved CNN
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
13
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience real-time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT
14
作者 Muhammad Tahir Mingchu Li +4 位作者 Irfan Khan Salman AAl Qahtani Rubia Fatima Javed Ali Khan Muhammad Shahid Anwar 《Computers, Materials & Continua》 SCIE EI 2023年第11期2529-2544,共16页
Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)framework.Yet,delays in data retrieval can markedly hinder the eff... Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)framework.Yet,delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems.We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this.This strategy is devised to streamline the data retrieval path,subsequently diminishing network strain.Crafting an adept cache processing scheme poses its own set of challenges,especially given the transient nature of monitoring data and the imperative for swift data transmission,intertwined with resource allocation tactics.This paper unveils a novel mobile healthcare solution that harnesses the power of our collaborative caching approach,facilitating nuanced health monitoring via edge devices.The system capitalizes on cloud computing for intricate health data analytics,especially in pinpointing health anomalies.Given the dynamic locational shifts and possible connection disruptions,we have architected a hierarchical detection system,particularly during crises.This system caches data efficiently and incorporates a detection utility to assess data freshness and potential lag in response times.Furthermore,we introduce the Cache-Assisted Real-Time Detection(CARD)model,crafted to optimize utility.Addressing the inherent complexity of the NP-hard CARD model,we have championed a greedy algorithm as a solution.Simulations reveal that our collaborative caching technique markedly elevates the Cache Hit Ratio(CHR)and data freshness,outshining its contemporaneous benchmark algorithms.The empirical results underscore the strength and efficiency of our innovative IoHT-based health monitoring solution.To encapsulate,this paper tackles the nuances of real-time health data monitoring in the IoHT landscape,presenting a joint edge-cloud caching strategy paired with a hierarchical detection system.Our methodology yields enhanced cache efficiency and data freshness.The corroborative numerical data accentuates the feasibility and relevance of our model,casting a beacon for the future trajectory of real-time health data monitoring systems. 展开更多
关键词 real-time health data monitoring Cache-Assisted real-time Detection(CARD) edge-cloud collaborative caching scheme hierarchical detection Internet of Health Things(IoHT)
下载PDF
Modeling and Statistical Properties Research on Online Real-Time Information Transmission Network 被引量:2
15
作者 Guangming Deng Zhen Jia 《Open Journal of Applied Sciences》 2014年第5期234-241,共8页
In this paper, the model of the online real-time information transmission network, such as wechat, micro-blog, and QQ network, is proposed and built, based on the connection properties between users of the online real... In this paper, the model of the online real-time information transmission network, such as wechat, micro-blog, and QQ network, is proposed and built, based on the connection properties between users of the online real-time information transmission network, and combined with the local world evolving characteristics in complex network, then the statistical topological properties of the network is obtained by numerical simulation. Furthermore, we simulated the process of information transmission on the network, according to the actual characteristics of the online real-time information transmission. Statistics show that the degree distribution presents the characteristics of scale free network, presenting power law distribution, while the average path length, the average clustering coefficient and the average size of the network also has a power-law relationship, moreover, the model parameters has no effect on power-law exponent. The spread of information on the network represents obvious fluctuation scaling, reflecting the characteristics that information transmission fluctuates over time. 展开更多
关键词 Network INFORMATION transmission real-time INFORMATION FLUCTUATION SCALING
下载PDF
Transmission Considerations with QoS Support to Deliver Real-Time Distributed Speech Recognition Applications
16
作者 Zhu Xiao-gang Zhu Hong-wen Rong Meng-tian 《Wuhan University Journal of Natural Sciences》 EI CAS 2002年第1期65-70,共6页
Distributed speech recognition (DSR) applications have certain QoS (Quality of service) requirements in terms of latency, packet loss rate, etc. To deliver quality guaranteed DSR application over wirelined or wireless... Distributed speech recognition (DSR) applications have certain QoS (Quality of service) requirements in terms of latency, packet loss rate, etc. To deliver quality guaranteed DSR application over wirelined or wireless links, some QoS mechanisms should be provided. We put forward a RTP/RSVP transmission scheme with DSR-specific payload and QoS parameters by modifying the present WAP protocol stack. The simulation result shows that this scheme will provide adequate network bandwidth to keep the real-time transport of DSR data over either wirelined or wireless channels. 展开更多
关键词 distributed speech recognition quality of service real-time transmission protocol resource reservation protocol wireless application protocol
下载PDF
Development of 16-channels Compact EEG System Using Real-time High-speed Wireless Transmission
17
作者 B. R. Myung S. K. Yoo 《Engineering(科研)》 2013年第5期93-97,共5页
For the convenience of people with disability and for normal people, a demand for intelligent interfaces is ever increasing and therefore related studies are actively being conducted. Recently a study is being conduct... For the convenience of people with disability and for normal people, a demand for intelligent interfaces is ever increasing and therefore related studies are actively being conducted. Recently a study is being conducted to develop an interface through face expression, movement of the body and eye movements, and further more active attempts to use electrical signals(brainwave, electrocardiogram, electromyogram) measured from the human body is also actively being progressed. In addition, the development and the usage of mobile devices and smart devices are promoting these research activities even more. The brainwave is measured by electrical activities between nerve cells in the cerebral cortex using scalp electrodes. The brainwave is mainly used for diagnosis and treatment of diseases such as epilepsy, encephalitis, brain tumors and brain damage. As a result, the brainwave measurement methods and analytical methods were developed. Interface using the brainwave will not go through language or body behavior which is the result of the information processed by the brain but will pass directly to the system providing a brain-computer interface (BCI). This is possible because a variety of the brainwave appears depending on the human’s physical and mental state. Using the brainwave with the intelligent brain-computer interface or combining it with mobile devices and smart devices, regardless of space constraints, the brainwave measurement should be possible.[4,7] In this study, in order to measure the brainwave without spatial constraint, 16 channel compact brainwave measurements system using a high-speed wireless communications were designed. It was designed with a 16 channel to classify the various brainwave patterns that appear and for estimating the location of the nerve cells that triggered the brainwave. And in order to transmit the brainwave data within the channel without loss, a high-speed wireless communication must be possible that can enable a high-speed wireless transmission more sufficient than the Bluetooth, therefore, 802.11 compliant Wi-Fi communication methods were used to transfer the data to the PC. In addition, by using an analog front-end IC having a single-chip configuration with real-time digital filters, the miniaturization of the system was implemented and in order to verify the system Eye-blocking was used to observe the changes in the EEG signal. 展开更多
关键词 ELECTROENCEPHALOGRAPHY HIGH-SPEED WIRELESS transmission real-time
下载PDF
Development of TaqMan-based Real-time PCR Assay for Detecting Transmissible Gastroenteritis Virus and Its Application in Vaccine Evaluation 被引量:2
18
作者 俞正玉 徐向伟 +8 位作者 孙冰 何孔旺 郭容利 杜露平 温立斌 张雪寒 茅爱华 倪艳秀 李彬 《Agricultural Science & Technology》 CAS 2014年第9期1487-1490,共4页
[Objective] This study aimed to establish a TaqMan-based real-time PCR assay for detecting transmissible gastroenteritis virus (TGEV). [Method] Primers and a probe were designed according to the conserved sequence o... [Objective] This study aimed to establish a TaqMan-based real-time PCR assay for detecting transmissible gastroenteritis virus (TGEV). [Method] Primers and a probe were designed according to the conserved sequence of N gene in TGEV genome. After gradient dilution, the recombinant plasmid harboring the N gene was used as a standard for real-time PCR assay to establish the standard curve. [Re- sult] The results showed that the established real-time PCR assay exhibited a good linear relationship within the range of 102-10^10 copies/ul; the correlation coefficient was above 0.99 and the amplification efficiency ranged from 90% to 110%. The de- tection limit of real-time PCR assay for TGEV was 10 copies/μl, suggesting a high sensitivity; there was no cross reaction with other porcine viruses, indicating a good specificity; coefficients of variation within and among batches were lower than 3%, suggesting a good repeatability. The established real-time PCR method could be ap- plied in quantitative analysis and evaluation of the immune efficacy of TGEV vac- cines and detection of TGEV in clinical samples. [Conclusion] The TaqMan-based real-time PCR assay established in this study is highly sensitive and specific, which can provide technical means for the epidemiological survey of TGEV, development of TGEV vaccines and investigation of the pathogenesis of TGE. 展开更多
关键词 transmissible gastroenteritis virus (TGEV) TaqMan-based real-time PCR: Detection
下载PDF
High-SpeedReal-TimeDataAcquisitionSystem Realized by Interleaving/Multiplexing Technique 被引量:1
19
作者 吕洁 莫毅群 罗伟雄 《Journal of Beijing Institute of Technology》 EI CAS 2000年第2期183-188,共6页
The interleaving/multiplexing technique was used to realize a 200?MHz real time data acquisition system. Two 100?MHz ADC modules worked parallelly and every ADC plays out data in ping pang fashion. The design improv... The interleaving/multiplexing technique was used to realize a 200?MHz real time data acquisition system. Two 100?MHz ADC modules worked parallelly and every ADC plays out data in ping pang fashion. The design improved the system conversion rata to 200?MHz and reduced the speed of data transporting and storing to 50?MHz. The high speed HDPLD and ECL logic parts were used to control system timing and the memory address. The multi layer print board and the shield were used to decrease interference produced by the high speed circuit. The system timing was designed carefully. The interleaving/multiplexing technique could improve the system conversion rata greatly while reducing the speed of external digital interfaces greatly. The design resolved the difficulties in high speed system effectively. The experiment proved the data acquisition system is stable and accurate. 展开更多
关键词 real-time data acquisition interleaving/multiplexing high-speed AD converter
下载PDF
Remote wireless transmission and error recovery of log data
20
作者 赵亦朋 李宁 王才志 《Applied Geophysics》 SCIE CSCD 2007年第4期308-312,共5页
Remote transmission of log data is an urgent problem for service companies. Remote transmission technology of log data here refers to both the transmission solution in combination with the CifNet multi-well data manag... Remote transmission of log data is an urgent problem for service companies. Remote transmission technology of log data here refers to both the transmission solution in combination with the CifNet multi-well data management system to automate the transmission, storage, management, and retrieval of log data to reduce turn-over time. It is an applied digital signature technology to implement breakpoint transmission and error recovery and ensure the effectiveness and reliability of log data transmission. 展开更多
关键词 data transmission LOG CifNet
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部