Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Computer terminals.

Zeitschriftenartikel zum Thema „Computer terminals“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer terminals" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Wilson, Karen S., und Thomas R. Callaghan. „Handheld Computer Terminals: Starting off Right the First Time“. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 38, Nr. 5 (Oktober 1994): 355–59. http://dx.doi.org/10.1177/154193129403800501.

Der volle Inhalt der Quelle
Annotation:
Advances in miniaturization and wireless communications are providing the computer industry with the impetus to design handheld, portable computer terminals. Until enough research and experience evolves from handheld terminals to build a literature on design factors and to develop design guidelines and standards that would provide starting points for product design, the human factors community must rely on its user-centered design approach of designing, prototyping, and testing to ensure a safe and usable form factor for such terminals. The methodology that was used in establishing the design criteria for such a terminal included literature research, focus groups with potential users, contextual field research, expert testimony, and primary laboratory research, including a grasp analysis and screen viewability, data entry, signature capture, and holsterability testing. The user-centered design process described here provided the information required to establish the basic design criteria that would assure user safety and task efficiency. It also revealed informational needs for the human factors community involved in the development of handheld computer terminals.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Pugliese, Gina, und Martin S. Favero. „MRSA Contamination of Computer Terminals“. Infection Control & Hospital Epidemiology 22, Nr. 7 (Juli 2001): 467. http://dx.doi.org/10.1017/s0195941700056964.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Oltedal, Leif, Svein Harald Mørkve, Margaret Lin Veruki und Espen Hartveit. „Patch-Clamp Investigations and Compartmental Modeling of Rod Bipolar Axon Terminals in an In Vitro Thin-Slice Preparation of the Mammalian Retina“. Journal of Neurophysiology 97, Nr. 2 (Februar 2007): 1171–87. http://dx.doi.org/10.1152/jn.01010.2006.

Der volle Inhalt der Quelle
Annotation:
To extend the usefulness of rod bipolar cells for studies of chemical synaptic transmission, we have performed electrophysiological recordings from rod bipolar axon terminals in an in vitro slice preparation of the rat retina. Whole cell recordings from axon terminals and cell bodies were used to investigate the passive membrane properties of rod bipolar cells and analyzed with a two-compartment equivalent electrical circuit model developed by Mennerick et al. For both terminal- and soma-end recordings, capacitive current decays were well fitted by biexponential functions. Computer simulations of simplified models of rod bipolar cells demonstrated that estimates of the capacitance of the axon terminal compartment can depend critically on the recording location, with terminal-end recordings giving the best estimates. Computer simulations and whole cell recordings demonstrated that terminal-end recordings can yield more accurate estimates of the peak amplitude and kinetic properties of postsynaptic currents generated at the axon terminals due to increased electrotonic filtering of these currents when recorded at the soma. Finally, we present whole cell and outside-out patch recordings from axon terminals with responses evoked by GABA and glycine, spontaneous inhibitory postsynaptic currents, voltage-gated Ca2+ currents, and depolarization-evoked reciprocal synaptic responses, verifying that the recorded axon terminals are involved in normal pre- and postsynaptic relationships. These results demonstrate that axon terminals of rod bipolar cells are directly accessible to whole cell and outside-out patch recordings, extending the usefulness of this preparation for detailed studies of pre- and postsynaptic mechanisms of synaptic transmission in the CNS.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sazonov, Konstantin, Maxim Tatarka, Andrey Tsyganov und Vitaliy Bessolcev. „Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems“. SPIIRAS Proceedings 19, Nr. 2 (23.04.2020): 446–74. http://dx.doi.org/10.15622/sp.2020.19.2.8.

Der volle Inhalt der Quelle
Annotation:
One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Casey, M. A. „Computer-assisted morphometry of synaptic terminal density in the aging brain“. Proceedings, annual meeting, Electron Microscopy Society of America 46 (1988): 430–31. http://dx.doi.org/10.1017/s0424820100104212.

Der volle Inhalt der Quelle
Annotation:
In studying the circuitry of a given region of the brain, some knowledge of the density of synaptic terminals is useful. Such data is especially valuable when studying the brain under pathological or experimental conditions. The methods outlined in this paper have been used to detect axosomatic synaptic terminal loss in the aging rat brain, but they would be applicable to other experimental paradigms.The methods in the present paper have been described elsewhere, and were recently used in our study of the lateral superior olivary nucleus (LSO), a well-characterized cell group in the rat superior olivary complex, and a key component of the rat lower auditory pathway. Virtually all synaptic terminals ending on the cell bodies of LSO principal cells originate in the medial nucleus of the trapezoid body (MTB), which undergoes a significant loss of neurons with age in rats. Thus, we wanted to determine whether loss of MTB cells resulted in a significant loss of axosomatic terminals in the LSO.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zhang, Yue Feng, Jun Wang und Chong Jun Wang. „All is MVC: Design and Implementation of a Thick Terminal for Telemedicine“. Applied Mechanics and Materials 330 (Juni 2013): 500–503. http://dx.doi.org/10.4028/www.scientific.net/amm.330.500.

Der volle Inhalt der Quelle
Annotation:
As the development of medical technology, computer technology and communication technology, telemedicine needs more powerful medical terminals to satisfy expanding user needs. In this paper we brought up that the new terminal should be a thick one to face the challenge, and then discussed the computing migration, a new trend as terminals becoming thick. We designed and implemented a thick terminal prototype for telemedicine, with the software using the MVC architecture and hardware using MVC-like architecture. This terminal achieved our expectation in actual use.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Refaee, Eshrag A., und Ali Ahmad. „A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors“. Complexity 2021 (26.04.2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.

Der volle Inhalt der Quelle
Annotation:
There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly connected to the central computer but not to one another. As such, any failure in the central computer will result in a failure of the entire network and computers in star network will not be able to communicate. The star topology design can be represented by a graph where vertices represent the computer nodes and edges represent the links between the computer nodes. In this paper, we study the vertex-edge-based topological descriptor for a newly designed hexagon star network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

MERKOURIS, A. V. „Computer-based documentation and bedside terminals“. Journal of Nursing Management 3, Nr. 2 (März 1995): 81–85. http://dx.doi.org/10.1111/j.1365-2834.1995.tb00085.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Comerford, R. „X, as in expediency (computer terminals)“. IEEE Spectrum 30, Nr. 5 (Mai 1993): 60–61. http://dx.doi.org/10.1109/6.275067.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Abdulazeez, Hussein Amer, und Ahmed Maher Shaker. „UAV-based edge computing system used in energy-saving offloading method“. Journal of Physics: Conference Series 2467, Nr. 1 (01.05.2023): 012023. http://dx.doi.org/10.1088/1742-6596/2467/1/012023.

Der volle Inhalt der Quelle
Annotation:
Abstract This paper proposes an offloading strategy based on unmanned aerial vehicle (UAV) managed computer resources to provide dependable communication and intensive processing power in complicated terrain. In order to reduce compute and offload user terminal energy consumption, a UAV-assisted edge computing model is built, taking into account the computing requirements of user terminals, the delay restrictions of computing jobs, and the energy limits of UAVs. The trajectory can be used to reduce the user terminal’s energy usage in the allotted amount of time. The simulation results demonstrate that the suggested approach is appropriate for various channel circumstances, allowing the user terminal to accomplish the work while outperforming existing benchmark systems in terms of energy usage. Optimizing the flight trajectory of the UAV will have a substantial impact when the signal-to-noise ratio SNR=20dB. The results demonstrate that, at T=5s, the UAV’s flying trajectory optimization strategy reduces energy consumption by 56.26%.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Liu, Yan, und Gan Zhou Liao. „Study on Portable Tracking and Monitoring System“. Applied Mechanics and Materials 329 (Juni 2013): 448–51. http://dx.doi.org/10.4028/www.scientific.net/amm.329.448.

Der volle Inhalt der Quelle
Annotation:
In this study, in combination with mobile communication technology, sensor technology and computer technology, a tracking and monitoring system solution for preventing children and the elderly from getting lost is proposed. With the purpose of realizing monitoring and exerting no effect on the normal activities of the monitored objects, a mobile wireless terminal is applied in this system. Through using embedded microcontroller controller as control core, data acquisition, storage, and distance detection are realized. Through using embedded GPS positioning technology and GSM technology, the instant positions of the monitored children and the elderly are detected. When the monitored objects need to move in a fixed place (kindergarten or nursing home), portable terminals can communicate with computer control terminals and will automatically send a signal for providing warnings and informing computers and guardians when the monitored objects exceed the warning scope, so that it becomes easier for guardians to take corresponding measures in time. Besides, the system can effectively prevent children and the elderly from getting lost, or the emergence of other dangers.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Mallula, Surya Kiran, und Janagama Sravanthi. „Computer Vision Syndrome and Scope of Homoeopathy“. International Journal of Research and Review 10, Nr. 8 (18.08.2023): 523–27. http://dx.doi.org/10.52403/ijrr.20230868.

Der volle Inhalt der Quelle
Annotation:
The utilization of technology has become a fundamental part of our daily lives. Therefore, regardless of whether one is an adult or a child, there are various motivations for individuals to remain attached to their digital devices. As the utilization of computers and video display terminals in the workplace increases, a growing number of individuals are experiencing symptoms associated with prolonged use of computers. These symptoms encompass visual and eye symptoms, as well as musculoskeletal symptoms, and are collectively referred to as Computer Vision Syndrome (CVS). There are a variety of allopathic treatments available, however, they are limited in their long-term use and associated side effects. Establishing an ergonomically designed work environment is an important factor in reducing the risk of developing CVS symptoms, and alternative treatments may be appropriate depending on the underlying causes of CVS and associated symptoms. Homeopathy is an alternative system of medicine that allow the court to choose the indicated homoeopathic medicine for management of computer vision syndrome. Keywords: Homeopathy, computer vision syndrome (cvs), Digital eyestrain (DES), Video display terminals (VDTs),
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Segev, I. „Computer study of presynaptic inhibition controlling the spread of action potentials into axonal terminals“. Journal of Neurophysiology 63, Nr. 5 (01.05.1990): 987–98. http://dx.doi.org/10.1152/jn.1990.63.5.987.

Der volle Inhalt der Quelle
Annotation:
1. The effect of presynaptic, axoaxonal inhibition, that exerts its action by producing a local conductance increase, on the behavior of action potentials at postsynaptic axon terminals is analyzed computationally. The significance of the location and strength of the presynaptic inhibition, as well as the morphology and membrane properties of the axonal terminals, are considered. 2. Keeping the specific properties of terminal membrane and axoplasm constant, the critical "silent" steady-state conductance change (gcrit) that blocks propagation is linearly scaled with the terminal diameter raised to the 3/2 power. At the midpoint of a 5 lambda long, 1 micron diameter axon that has the standard Hodgkin and Huxley (1952) kinetics at 18 degrees C (and an input conductance of 8.7 nS), gcrit is 72 nS. At 0 degrees C, gcrit = 200 nS, whereas at 30 degrees C gcrit = 30 nS. 3. The critical conductance change that blocks propagation depends steeply on the density of excitable channels (gNa) at the terminal. For a geometrically uniform terminal at 18 degrees C, the action potential can not be blocked by a local shunt when gNa greater than 600 mS/cm2. 4. An axoaxonal synapse in the proximity of the postsynaptic release site has graded control over the spike amplitude (and, therefore, over the postsynaptic output) at that site. Presynaptic inhibition located remotely from the release site has an all-or-none effect at the release site. 5. Inhibition is more effective in attenuating the spike at the terminal when it impinges onto a passive terminal rather than on an excitable one. 6. The detectability of the conductance increase as well as the change in action potential amplitude associated with the presynaptic inhibition is poor at only a short distance from the axoaxonal synapse. The presence of bottlenecks and varicosities at some axonal terminals enhances this decoupling effect even more. Thus presynaptic inhibition may reduce the potential near the output site of the affected axon significantly, without producing any noticeable conductance or voltage change at a distance of only several tens of micrometers (a few tenths of a space constant) away from it. 7. Varicosities and bottlenecks typically found along axonal terminals are the optimal loci for presynaptic inhibition to be most effective in attenuating the action potential at the terminal. Even with high density of excitable channels, propagation with such terminal geometry is insecure, and one, or few, quanta of inhibitory transmitter (a conductance change of several nanosiemens) can block propagation there.(ABSTRACT TRUNCATED AT 400 WORDS)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Naumov, Vitalii, Igor Taran, Yana Litvinova und Marek Bauer. „Optimizing Resources of Multimodal Transport Terminal for Material Flow Service“. Sustainability 12, Nr. 16 (13.08.2020): 6545. http://dx.doi.org/10.3390/su12166545.

Der volle Inhalt der Quelle
Annotation:
Multimodal transport terminals are the elements of transport systems that ensure the interaction of enterprises of various modes of transport. The effective functioning of transport terminals significantly affects the efficiency of the material flow servicing in a supply chain and the sustainability of the whole transport system. The paper proposes an approach to determine the optimal parameters of production resources in multimodal transport terminals, based on numerical computer simulations of technological operations in a transport terminal for the given parameters of incoming and outgoing material flows. The practical use of the proposed approach is shown on the example of the Amur Harbor cargo area of the Dnipro River Port.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Han, Liang, und Yan Song Li. „Design of Data Acquisition System Based on Ethernet and Virtual Instrument Technology“. Applied Mechanics and Materials 742 (März 2015): 203–7. http://dx.doi.org/10.4028/www.scientific.net/amm.742.203.

Der volle Inhalt der Quelle
Annotation:
Ethernet based on TCP/IP is a standard open network, which promotes the development of data acquisition in the direction of network. Data acquisition and processing systems connected by Ethernet make the data acquisition terminals (lower computer) and processing control center (upper computer) from integrated to discrete. Separate data acquisition terminals can realize miniaturization and modularization and increase the flexibility of the application. A new type, low cost, high precision data acquisition terminal based on ARM processor was designed for solving the problem of complicated structure, big volume and high cost of traditional data acquisition system. Combined with the technologies of network communication, a data acquisition PC system based on virtual instrument technology was designed by LabVIEW.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Man, G. S., M. Olapoju, M. V. Chadwick, P. Vuddamalay, A. V. Hall, A. Edwards und J. R. Kerr. „Bacterial contamination of ward-based computer terminals“. Journal of Hospital Infection 52, Nr. 4 (Dezember 2002): 314–15. http://dx.doi.org/10.1053/jhin.2002.1302.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

de Arruda, Zíngarah Májory Tôrres, António Jorge Correia de Gouveia Ferreira, Renato Alves Sandoval und Ruth Losada de Menezes. „PROFILE OF WORKERS WHO USE COMPUTER TERMINALS“. Brazilian Journal of Physical Therapy 28 (April 2024): 101026. http://dx.doi.org/10.1016/j.bjpt.2024.101026.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Thorning, L. „Introduction of new computing facilities at the Geological Survey of Greenland“. Rapport Grønlands Geologiske Undersøgelse 140 (31.12.1988): 7–9. http://dx.doi.org/10.34194/rapggu.v140.8023.

Der volle Inhalt der Quelle
Annotation:
From a cautious start in the use of computers in the early 1970s, the Geological Survey of Greenland has developed complex and varied uses of modern computer facilities for both scientific and administrative tasks. GGU's first computer installation, a noisy TTY connected to the Computing Centre of Copenhagen University by a 110 baud telephone modem, was a selfservice facility which was not easy to use. Over the years, first with use of a PDP-10 with just one Tektronix 4014 graphic terminal and later a succession of increasingly powerful PDP-11s with many terminals, GGU's in-house facilities just kept ahead of the ever increasing demand for computer services. At the same time a number of programs for special tasks were developed on external facilities, because they required larger computers or special facilities. In the 1980s the demands on the computer facilitiesrequiring many different types of programs, including word processing, had grown so large that GGU's in-house system could no longer handle them satisfactorily. A major reorganisation was required, and consequently activities were divided between personal computers (PCs; mainly administrative) and a new central computer (mainly scientific). This development took place in late 1986 with the purchase of 17 new personal computers and a new central computer with accessory peripheral equipment. This has allowed an increasing integration of computer methods into GGU's activities. A brief summary is given below.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Jiang, Bingcheng, Qian He, Mingliu He, Zhongyi Zhai und Baokang Zhao. „FACSC: Fine-Grained Access Control Based on Smart Contract for Terminals in Software-Defined Network“. Security and Communication Networks 2023 (15.05.2023): 1–13. http://dx.doi.org/10.1155/2023/6013270.

Der volle Inhalt der Quelle
Annotation:
Physical terminals provide network services to upper-layer applications, but their limited memory and processing power make it challenging to perform security updates and patches, leaving them vulnerable to known security threats. Attackers can exploit these weaknesses to control the terminals and attack the network. To restrict unauthorized access to the network and its resources, appropriate access control mechanisms are necessary. In this paper, we propose a fine-grained access control method based on smart contracts (FACSC) for terminals in software-defined networking (SDN). FACSC utilizes the attribute-based access control (ABAC) model to achieve fine-grained control over terminal access networks. To ensure the security and reliability of access control policies and terminal-related attribute information, we utilize smart contract technology to implement the ABAC model. Furthermore, we leverage the programming protocol-independent packet processor (P4) to filter and forward packets in the data plane based on the packet option field, enabling rapid terminal access. Experimental results show that our proposed method achieves fine-grained secure authentication of terminals in SDN networks with a low authentication processing overhead.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Chang, Daofang, Ting Fang, Junliang He und Danping Lin. „Defining Scheduling Problems for Key Resources in Energy-Efficient Port Service Systems“. Scientific Programming 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/7053962.

Der volle Inhalt der Quelle
Annotation:
This paper addresses the problem of key resource scheduling of container terminals for energy-efficient operation. A combination of key resource scheduling and energy-efficient operation in container terminals is firstly described. An energy-efficient evaluation model of the key resource scheduling is then proposed. The objective set, decision variable set, and constraint set of key resource scheduling of a container terminal for energy-efficient operation are established in this paper. At the same time, their mapping relationship is carefully analyzed and the system structure of the key resource scheduling for energy-efficient operation of a container terminal is finally proposed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Li, Wang, Zhu Xiaoning und Xie Zhengyu. „Efficient container stacking approach to improve handling: efficiency in Chinese rail–truck transshipment terminals“. SIMULATION 96, Nr. 1 (16.04.2019): 3–15. http://dx.doi.org/10.1177/0037549719843347.

Der volle Inhalt der Quelle
Annotation:
An efficient container stacking approach is vital to the handling efficiency of container transshipment terminals. In this paper, by considering container allocation preferences and operation distance, the container stacking problem in rail–truck transshipment terminals has been formulated as a multi-objective optimization model to minimize container overlapping amounts and crane moving distance. A simulation-based algorithm implementing process has been developed to stack containers to the optimum positions. Computational experiments on data from a rail–truck transshipment terminal in China are conducted to test the efficiency of the proposed approach. Experimental results demonstrate that the container stacking approach is efficient and significant for improving handling efficiency in rail–truck transshipment terminals.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Shih, Mao-Chang, Hani S. Mahmassani und M. Hadi Baaj. „Trip Assignment Model for Timed-Transfer Transit Systems“. Transportation Research Record: Journal of the Transportation Research Board 1571, Nr. 1 (Januar 1997): 24–30. http://dx.doi.org/10.3141/1571-04.

Der volle Inhalt der Quelle
Annotation:
A trip assignment model for timed-transfer transit systems is presented. Previously proposed trip assignment models focused on uncoordinated transit systems only. In timed-transfer transit systems, routes are coordinated and scheduled to arrive at transfer stations within preset time windows. Thus, passengers at coordinated operations terminals may face a choice among simultaneously departing buses serving alternative routes (unlike the case for uncoordinated operations terminals, where passengers generally board the first vehicle to arrive). A general trip assignment model is proposed that applies different assignment rules for three types of transfer terminals: uncoordinated operations terminals, coordinated operations terminals with a common headway for all routes, and coordinated operations terminals with integer-ratio headways for all routes. In addition, the care of missed connections at transfer terminals (due to vehicles arriving behind schedule) is accounted for. The model has been implemented in the LISP computer language, whose “list” data structure is specially suited to handle path search and enumeration. Results from an application to an example network with different combinations of terminal operations and headways indicate the following: ( a) demand tends to be assigned to higher-frequency paths in the uncoordinated transit network; ( b) demand is more concentrated, and tends to be assigned to paths with higher frequency and lower travel costs in the coordinated transit network; and ( c) missed connections have no significant effects on trip assignment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Zhao, Guotao, und Jie Ding. „Research on Massive Image Retrieval Method of Mobile Terminal Based on Weighted Aggregation Depth Feature“. Wireless Communications and Mobile Computing 2022 (08.03.2022): 1–7. http://dx.doi.org/10.1155/2022/9366845.

Der volle Inhalt der Quelle
Annotation:
Image self-coupling and feature interference lead to poor retrieval performance in massive image retrieval of mobile terminals. This paper proposes a massive image retrieval method of mobile terminals based on weighted aggregation depth features. The pixel big data detection model of massive images of mobile terminals is constructed, the collected pixel information of massive images of mobile terminals is restructured, the edge contour feature parameter set of massive images of mobile terminals is extracted, the feature fusion processing of massive images of mobile terminals is carried out in gradient pixel space by means of feature reconstruction and gray moment invariant feature analysis, the depth feature detection of massive images of mobile terminals is realized by using weighted aggregation method, the gradient value of pixels of massive images of each mobile terminal is calculated, and the optimized retrieval of massive images of mobile terminals is realized according to the fusion result of gradient weighted information. Simulation results show that this method has better feature clustering, stronger image detection and recognition, and anti-interference ability and improves the precision and recall of image retrieval.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Ge, Qian Qian. „Design and Implementation of Human-Computer Interaction Terminal Shockproof Device Based on LPC2478“. Advanced Materials Research 459 (Januar 2012): 553–56. http://dx.doi.org/10.4028/www.scientific.net/amr.459.553.

Der volle Inhalt der Quelle
Annotation:
With the extensive use of embedded mobile terminal in everyday life, embedded terminals are getting more and more powerful,but there is no significant improvement in shock proof and use protection.The paper introduces an implementation method of embedded mobile terminal shockproof device based on LPC2478. The device has wifi communication,multi-channel sampling, real-time measurement for temperature, humidity, horizontal and vertical conditions.It measures the device distances with other objects and triaxial acceleration to achieve parametric statistical analysis and diagnostics. Its characteristics of multipoint direction identification shock proof, wireless self-synchronous firmware upgrade and power management based on users’ action mode identification provide good protection for mobile terminal products, achieving the target of shockproof.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Yi-Qin Bao, Yi-Qin Bao, Qiang Zhao Yi-Qin Bao, Hao Zheng Qiang Zhao, Hong-Tao Zhang Hao Zheng, Wen-Bin Xu Hong-Tao Zhang und Zheng-Tang Sun Wen-Bin Xu. „Research on Remote Upgrade Method of Distributed Load Balancing for Power Monitoring Terminal“. 電腦學刊 32, Nr. 5 (Oktober 2021): 128–41. http://dx.doi.org/10.53106/199115992021103205010.

Der volle Inhalt der Quelle
Annotation:
With the increasing application of power monitoring terminal and the increasing demand for its function, it is necessary to upgrade the field embedded software remotely.The existing online upgrade schemes generally deal with the terminals one by one, and there are also distributed upgrade schemes. However, due to the large differences in the communication performance of terminals in different places, there is a problem of load imbalance, resulting in the low efficiency of the whole upgrade. Aiming at the efficiency of remote online upgrade of power monitoring terminal, a distributed load balancing remote upgrade method is proposed. The power monitoring terminal is upgraded at the same time through the cloud platform, and the genetic algorithm is used for load balancing processing, so as to improve the efficiency. The practical results show that this remote upgrade method improves the upgrade efficiency of the terminal by comparing a variety of upgrade schemes, compared with no load balancing method, the average time of upgrading a terminal is reduced by 36%, which achieves good application effect in practical application.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Nikishechkin, Petr, Nadezhda Chervonnova und Anatoly Nikich. „Approach to the construction of specialized portable terminals for monitoring and controlling technological equipment“. MATEC Web of Conferences 224 (2018): 01089. http://dx.doi.org/10.1051/matecconf/201822401089.

Der volle Inhalt der Quelle
Annotation:
The work deals with the features of construction of human-computer interaction to manage the complex process equipment. The mechanism for creating additional portable terminals for monitoring and controlling complex machine tools is presented. A practical example of using the mechanism for creating additional terminal solutions for monitoring and controlling the Quaser MV184P milling machining center is given.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Bird, Judith. „VDU terminals review“. Data Processing 27, Nr. 6 (Juli 1985): 25–26. http://dx.doi.org/10.1016/0011-684x(85)90266-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Gui, Jinsong, Jianglin Liu und Xinran Zhou. „An Efficient Radio Resource Allocation Scheme considering Terminal Mobility in Dense mmWave Cellular Networks“. Wireless Communications and Mobile Computing 2022 (23.06.2022): 1–20. http://dx.doi.org/10.1155/2022/9558031.

Der volle Inhalt der Quelle
Annotation:
In millimeter wave (mmWave) communication systems, beamforming-enabled directional transmission and network densification are commonly used to reduce high path loss and improve signal coverage quality. The combination of the two approaches will pose a challenge to radio resource allocation, which is especially true when terminals move frequently. The existing works presented some effective solutions for resource allocation in dense mmWave cellular networks, but they assumed that terminals move infrequently. So, these works cannot be directly applied to the dense mmWave cellular networks where terminals move frequently. In this paper, based on the results of the existing beamforming training (BFT) information-aided radio resource allocation algorithm, we propose a relay selection method to select a set of reasonable relays to take over the terminals whose performance deteriorates due to movement, which can ensure that each selected relay is as close as possible to the original performance of the corresponding moved terminal. Then, the resource allocation problem between the Device to Device (D2D) links from the selected relays to the corresponding moved terminals is formulated as a potential game model. By designing the utility function reasonably, the resource allocation results on the D2D links can converge to a Nash equilibrium solution. The simulation results show that the proposed scheme adapts to the scenario with frequent terminal movement, restrains the sharp performance decline caused by terminal movement, and outperforms the existing related algorithms in terms of average energy efficiency and throughput per link.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Asokan, N., Hervé Debar, Michael Steiner und Michael Waidner. „Authenticating public terminals“. Computer Networks 31, Nr. 8 (April 1999): 861–70. http://dx.doi.org/10.1016/s1389-1286(98)00020-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Davies, Ian, und Alistair McBain. „ISPBXs and terminals“. Computer Communications 11, Nr. 4 (August 1988): 203–7. http://dx.doi.org/10.1016/0140-3664(88)90083-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Gautam, Pramod Sharma, Uday Chandra Prakash und Subreena Dangol. „Study on Knowledge and Prevalence of Computer Vision Syndrome among Computer Operators in Nobel Medical College Teaching Hospital, Biratnagar, Nepal“. Journal of Nobel Medical College 9, Nr. 2 (14.12.2020): 45–49. http://dx.doi.org/10.3126/jonmc.v9i2.33386.

Der volle Inhalt der Quelle
Annotation:
Background: The eye and vision related problems that results from continuous use of computers and other visual display terminals for extended period of time leads to computer vision syndrome. Due to rapid digitalization in human life, the risk of developing it has also increased in many folds. So, with an aim of determining the prevalence and level of awareness of computer vision syndrome among computer users along with their attitude and practices to prevent it, this study was conducted in the office employees who use computer for a considerable period of time. Materials and Methods: A hospital based observational descriptive study was conducted in the out-patient department of Ophthalmology in Nobel Medical College and Teaching Hospital, Biratnagar, where 105 employees working in different work stations of same institution were enrolled. A questionnaire and the clinical findings were used to collect data. Results: About 80% of the employees were using computer for about (8-11) hours per day. Prevalence of computer vision syndrome noted was (92.4%) with low level of knowledge (85.7%) about it. About 45% of them wore glasses for their refractive errors but attitude and practices in work place to prevent the bad effects of using visual display terminals were found to be lacking (53.3%). Burning sensation in the eye, headache, ocular irritation and itching and neck, shoulder or back pain were the common symptoms. Around (60-70)% of the eyes tested positive for dry eye. Conclusion: Lack of awareness of computer vision syndrome and lack of personal protective measures were associated with its high level of prevalence.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Sundar, S. Shyam. „Loyalty to computer terminals: is it anthropomorphism or consistency?“ Behaviour & Information Technology 23, Nr. 2 (März 2004): 107–18. http://dx.doi.org/10.1080/01449290310001659222.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Parihar, J. K. S., Vaibhav Kumar Jain, Piyush Chaturvedi, Jaya Kaushik, Gunjan Jain und Ashwini K. S. Parihar. „Computer and visual display terminals (VDT) vision syndrome (CVDTS)“. Medical Journal Armed Forces India 72, Nr. 3 (Juli 2016): 270–76. http://dx.doi.org/10.1016/j.mjafi.2016.03.016.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Spennemann, Dirk, David Cornforth und John Atkinson. „A choice of terminals: spatial patterning in computer laboratories“. Campus-Wide Information Systems 24, Nr. 2 (03.04.2007): 76–96. http://dx.doi.org/10.1108/10650740710742691.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Pearson, Thomas E., und Sandra K. Strick. „The Physical Design of Computer Assisted Classroom/Laboratories“. Hospitality Education and Research Journal 9, Nr. 2 (Mai 1985): 46–52. http://dx.doi.org/10.1177/109634808500900205.

Der volle Inhalt der Quelle
Annotation:
Interest in the topic of computer assisted instruction (CAI) led the authors to study desirable features for a computer assisted classroom/laboratory. An informal survey was designed using instructors and computer experts as sources of information. Areas of concern included general educational concerns, the layout for student terminals, furniture features, and room layout. It was found that no two facilities were alike. CAI labs were commonly restructed by financial and physical limitations. However, the survey results showed considerable agreement as to desired features in a classroom/laboratory. The primary feature commonly valued was a design under which teacher and student terminals could be interactive. The other desirable features supported this philosophical objective.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Xue, Nian, und Li Wei Jia. „Construction and Research of Virtual Network User File System Based on Upnp and FUSE on Linux“. Applied Mechanics and Materials 299 (Februar 2013): 125–29. http://dx.doi.org/10.4028/www.scientific.net/amm.299.125.

Der volle Inhalt der Quelle
Annotation:
The Development of the computer has been from a single machine to the server, and then server clustering technology, and the emerging "cloud" network, which invariably show the network's role in the computer. Meanwhile, more and more high-end hardware trash or the users may be unbearable of high cost of servers, so the use of existing resources and integration of resources has become increasingly important. This paper will detail a virtual network file system, which based on Upnp (Universal Plug and Play) and FUSE (File system in Usese Space) in Linux operating system. In this study, users can share a computer terminal to collect and use that particular computer terminal on the network to all the resources users are interested in, provided that the shared computer terminals must be installed on a specific Upnp device. In this study, we have successfully implemented single-device-side and single-device-side multithread communication under the Linux or windows operating system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Rožić, Tomislav, Božidar Ivanković, Ivona Bajor und Martin Starčević. „A Network-Based Model for Optimization of Container Location Assignment at Inland Terminals“. Applied Sciences 12, Nr. 12 (08.06.2022): 5833. http://dx.doi.org/10.3390/app12125833.

Der volle Inhalt der Quelle
Annotation:
The development of inland terminals helps seaports mitigate inevitable storage capacity problems, extending their gravitational field and strengthening their competitive advantage. Optimizing the container storage, efficiency, and productivity of seaports and inland terminals is becoming increasingly important. The present paper develops a network-based mathematical model to optimize the location assignment of inbound containers at inland terminals. The model’s assumptions are based on the analysis of criteria at representative European inland terminals, and the model aims to reduce unproductive manipulations. The present study is one of the few to develop a single model that integrates all important criteria for container location assignment, including a container’s dimensions, its occupancy, cargo type, the container’s owner, and distance to the final user. These criteria are important for the terminal operator so that they can determine container locations in a way that minimizes unproductive manipulations. Data from a single inland terminal were used to validate the model within the FlexSim CT simulation environment. Our results suggest that the model can reduce unproductive manipulations and associated costs at inland terminals.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Рожкова, Т. С., В. В. Афанасьев und И. И. Ветров. „Approaches to statement of the resource distribution optimization problem in a computer network“. МОДЕЛИРОВАНИЕ, ОПТИМИЗАЦИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ 8, Nr. 4(31) (05.12.2020): 13–14. http://dx.doi.org/10.26102/2310-6018/2020.31.4.013.

Der volle Inhalt der Quelle
Annotation:
В статье рассматривается распределенная вычислительная система, представленная множеством мобильных терминалов, обеспечивающая возможность обслуживать запросы пользователей этих терминалов для выполнения программ, потребность в вычислительных ресурсах, которых превышает имеющиеся на этих терминалах локальные вычислительные ресурсы. Эта возможность обеспечивается путем реализации парадигмы кооперативных вычислений, поддерживающей процедуру динамического формирования кооперативного вычислительного ресурса множества мобильных терминалов, с учетом возможности их отключения и подключения к процедуре кооперативных вычислений. С использованием теоретико-множественного представления определяются такие параметры функционирования системы, как время отклика узла на запрос предоставления вычислительных ресурсов, а также период задержки в очереди для запросов, принадлежащих различным мобильным терминалам. На основе этих параметров, для указанных условий, в обобщенном виде ставится оптимизационная задача кооперативного использования вычислительных ресурсов. Детально рассматривается постановка частных задач оптимизации вычислительных ресурсов для системы, состоящей из двух мобильных терминалов, учитывающих различные условия их потребности в вычислительных ресурсах, а также текущего наличия вычислительных ресурсов в узлах системы. Подходы, полученные в результате постановки указанных частных задач, распространяются на систему, состоящую из множества мобильных терминалов. The article discusses a distributed computing system, represented by a variety of mobile terminals, providing the ability to serve the requests of users of these terminals to run programs, the need for computing resources, which exceeds the local computing resources available on these terminals. This possibility is provided by the implementation of the cooperative computing paradigm, which supports the procedure for dynamic formation of the cooperative computing resource of a plurality of mobile terminals, taking into account the possibility of their disconnection and connection to the cooperative computing procedure. Using the set-theoretic representation, such parameters of the system functioning are determined as the response time of the node to the request for the provision of computing resources, as well as the delay period in the queue for requests belonging to different mobile terminals. On the basis of these parameters, for the specified conditions, an optimization problem of the cooperative use of computing resources is posed in a generalized form. The formulation of particular problems of optimization of computing resources for a system consisting of two mobile terminals is considered in detail, taking into account various conditions of their need for computing resources, as well as the current availability of computing resources in the nodes of the system. The approaches obtained as a result of the formulation of these particular problems are extended to a system consisting of many mobile terminals.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

You, Huimin. „Safe Operation Management of Urban Smart Grid Based on Deep Learning“. Mobile Information Systems 2022 (24.08.2022): 1–11. http://dx.doi.org/10.1155/2022/4184941.

Der volle Inhalt der Quelle
Annotation:
The smart grid in the twenty-first century is constantly innovated by the big data technology and the Internet of Things (IoT) technology. As the second generation of a power network, the smart grid keeps developing towards automation and intelligence, driving the energy conversion rate, power utilization rate, and energy supply rate to increase. However, in the smart grid, the power terminal has a pivotal role in controlling, monitoring, and regulating the production process of electricity, which is currently facing many security challenges. The most critical aspect of smart grid security management is to ensure the security of power terminals. Existing solutions generally monitor power terminal devices by monitoring power terminal traffic; however, such security policies can only monitor attacks with characterization properties at the traffic level and cannot be used to monitor power terminal devices directly. Based on this, this paper reviewed the literature on intelligent operation and maintenance and deep learning at home and abroad and comprehensively analyzed the research progress of intelligent operation and maintenance, and in the comparative analysis of deep learning methods, because the convolutional neural network has fewer connections and parameters and can control the capacity by controlling its depth and width, it is convenient to establish a model with larger learning capacity, so a convolutional neural network is chosen for data analysis. In this study, we choose to use the convolutional neural network to analyze the data, combine the monitoring, management, and fault location of operation and maintenance work organically through some deep learning algorithms, reduce the number of model layers through a deep learning-based security monitoring technology for electric power terminals to improve the training speed and efficiency, and achieve all-round protection for electric power terminals at the device level and the network level. The management of urban smart grid dispatching operation also requires strict implementation of relevant technical standards to ensure the standardized operation and enhance the safety and stability of grid operation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

ABBE, BRIAN S., MARTIN J. AGAN und THOMAS C. JEDREY. „ACTS MOBILE TERMINALS“. International Journal of Satellite Communications 14, Nr. 3 (Mai 1996): 175–89. http://dx.doi.org/10.1002/(sici)1099-1247(199605)14:3<175::aid-sat550>3.0.co;2-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

King, Chris. „Choosing DEC-compatible terminals“. Data Processing 27, Nr. 6 (Juli 1985): 32–34. http://dx.doi.org/10.1016/0011-684x(85)90269-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Du, Tang, Li, Zou, Ma, Sun, Liu und Zeng. „Thermal Characteristics of Positive Leaders under Different Electrode Terminals in a Long Air Gap“. Energies 12, Nr. 21 (23.10.2019): 4024. http://dx.doi.org/10.3390/en12214024.

Der volle Inhalt der Quelle
Annotation:
The thermal characteristics of the positive leader discharges occurring under the different electrode terminals in a 1 m rod-plate air gap were studied quantitatively using Mach–Zehnder interferometry and a high-speed video camera. When disturbed by the discharge channel, the interference fringes are distorted because of the change in the refractive index of air, which is related to the gas density. Therefore, the gas temperature and gas density distribution in the leader channel can be retrieved from the offset of the interference fringes. Based on these results, the thermal characteristics of the leader channel were studied under different electrode terminals with a radius of curvature of 2.5 mm and 5 mm for cone electrodes and a diameter of 40 mm for a spherical electrode. The results show that the gas temperature in the leader channel increased while the gas density decreased as the radius of curvature of the electrode terminal decreased. Additionally, a smaller radius of curvature leads to a larger thermal diameter, but the difference in the thermal diameter is not obvious; for the terminals used in this paper, the difference is within 2 mm.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Song, Guanggang, Bin Li und Yuqing He. „Container Terminal Logistics Generalized Computing Architecture and Green Initiative Computational Pattern Performance Evaluation“. Information 10, Nr. 12 (05.12.2019): 383. http://dx.doi.org/10.3390/info10120383.

Der volle Inhalt der Quelle
Annotation:
Container terminals are the typical representatives of complex supply chain logistics hubs with multiple compound attributes and multiple coupling constraints, and their operations are provided with the strong characteristics of dynamicity, nonlinearity, coupling, and complexity (DNCC). From the perspective of computational logistics, we propose the container terminal logistics generalized computing architecture (CTL-GCA) by the migration, integration, and fusion of the abstract hierarchy, design philosophy, execution mechanism, and automatic principles of computer organization, computing architecture, and operating system. The CTL-GCA is supposed to provide the problem-oriented exploration and exploitation elementary frameworks for the abstraction, automation, and analysis of green production at container terminals. The CTL-GCA is intended to construct, evaluate, and improve the solution to planning, scheduling, and decision at container terminals, which all are nondeterministic polynomial hard problems. Subsequently, the logistics generalized computational pattern recognition and performance evaluation of a practical container terminal service case study is launched by the qualitative and quantitative approach from the sustainable perspective of green production. The case study demonstrates the application, utilization, exploitation, and exploration of CTL-GCA preliminarily, and finds the unsustainable patterns of production at the container terminal. From the above, we can draw the following conclusions. For one thing, the CTL-GCA makes a definition of the abstract and automatic running architecture of logistics generalized computation for container terminals (LGC-CT), which provides an original framework for the design and implementation of control and decision mechanism and algorithm. For another, the CTL-GCA can help us to investigate the roots of DNCC thoroughly, and then the CTL-GCA makes for conducting the efficient and sustainable running pattern recognition of LGC-CT. It is supposed to provide a favorable guidance and supplement to define, design, and implement the agile, efficient, sustainable, and robust task scheduling and resource allocation for container terminals by computational logistics whether in the strategy level or the tactical one.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Dávila de León, Alan, Eduardo Lalla-Ruiz und Belén Melián-Batista. „Disruption Management Approaches for Berth Scheduling in Bulk Terminals“. Journal of Advanced Transportation 2022 (31.08.2022): 1–17. http://dx.doi.org/10.1155/2022/8069796.

Der volle Inhalt der Quelle
Annotation:
Maritime terminals are complex transportation systems sensitive to several sources of uncertainty. An alteration in the baseline planning, as a consequence of one or more disruptive events, can lead terminals to a lower quality of the service provided. Therefore, in a context where a terminal strives to maintain or increase competitiveness, it is necessary to consider the uncertainty in the planning and define actions capable of efficiently and effectively mitigating disruptive events. This paper addresses berthing operations at bulk terminals, considering the arrival and handling times as stochastic variables. Hybrid approaches (i.e., proactive-reactive) are proposed in order to provide the port terminal with robust planning capable of reducing the impact of disruptive events by defining uncertainty-tolerant schedules and reactive actions capable of restoring the performance of the terminal when disruptive events arise. Finally, the solution approaches are evaluated together with and without the incorporation of buffer-time management. The computational results corroborate the effectiveness of integrating proactive and reactive approaches in order to maximize the performance of the terminal and reduce the penalty costs derived from alterations in the baseline schedule, with the consequent increase in the terminal competitiveness.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Zhu, Xiao Li. „Augmented Reality Based on Mobile Terminals“. Advanced Materials Research 926-930 (Mai 2014): 2454–57. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2454.

Der volle Inhalt der Quelle
Annotation:
Through the study, we found computer has powerful ability to analyze management in the colorful painting field.Spread of the mobile terminal augmented reality is a hot field in today's society technology development, composite is a new kind of create immersive virtual scene technology. Introduced the advantages of mobile terminal transmission of augmented reality and real life, the application of augmented reality and the mobile terminal transmission is discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Willems, Jan. „Terminals and Ports“. IEEE Circuits and Systems Magazine 10, Nr. 4 (2010): 8–26. http://dx.doi.org/10.1109/mcas.2010.938635.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Pidchenko, Sergiy, Oksana Kucheruk, Іlona Drach und Oleh Pyvovar. „Multi-criteria model for selection of optical linear terminals based on FUZZY TOPSIS method“. Radioelectronic and Computer Systems 2024, Nr. 1 (28.02.2024): 65–75. http://dx.doi.org/10.32620/reks.2024.1.06.

Der volle Inhalt der Quelle
Annotation:
Optical networks are an integral part of modern telecommunication systems. Huge traffic and ever-increasing requirements for data transmission capacity and quality encourage the wider use of modern optical technologies in telecommunications. The rational choice of equipment for the design of optical networks is an urgent task at present. The subject of this study is the process of selecting optical line terminals, which is associated with the evaluation of possible options by a set of indicators. The OLT (optical line terminal) in PON technology implements the function of organizing subscriber lines and is also a node equipment - an L4 switch that combines the functions of routing (IP), traffic fragmentation (VLAN), switching (MAC), quality of service (QoS), and some necessary network service functions. The optimal structuring of PON access networks demands a judicious selection of software and hardware, guided by their tactical and technical characteristics, in view of the substantial information load they entail. One of the effective approaches to solving such problems is the use of MCDM (Multiple Criteria Decision Making) methods. Purpose: to construct a TOPSIS model of the optimal choice of optical linear terminals in the conditions of unclear information for different cases of aggregation of evaluations of decision makers. Task: to formalize the process of selecting optical linear terminals; develop a multi-criteria mathematical model for the effective selection of optical line terminals. Methods used in the study: The fuzzy TOPSIS method, four methods of aggregating the opinions of decision makers. The following results were obtained. Alternatives and criteria for their evaluation are defined. On the basis of interviews with decision makers, evaluations of the degree of importance of the criteria and alternatives to the criteria were determined. Linguistic changes were used to describe decision-makers’ evaluations, which were interpreted as triangular fuzzy numbers. During this study, four methods of aggregating the evaluations of decision makers were used. A fuzzy TOPSIS model for selecting an optical line terminal is constructed. The ranking of the selected optical line terminals is obtained and the best alternative is determined. The results of modeling with different methods of aggregating assessments of decision makers are compared. Conclusions. The use of the Fuzzy TOPSIS method for optimal selection of optical linear terminals is proposed. The influence of the methods of aggregation of evaluations of decision-makers is analyzed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Wang, Zimeng, Wei Chen, Haifeng Jiang, Shuo Xiao und Haowen Yang. „A Task Allocation Algorithm for Coal Mine Mobile Crowd Sensing Based on Weighted Undirected Graph“. Security and Communication Networks 2021 (25.06.2021): 1–14. http://dx.doi.org/10.1155/2021/9999798.

Der volle Inhalt der Quelle
Annotation:
Existing applications of mining intelligent mobile terminals are all for the sensing of individual terminals, without considering the group attributes of terminal carriers and the cooperation opportunities brought by terminal movement, which is unable to complete large-scale and complex sensing tasks. In this article, mobile crowd sensing and mine safety monitoring are combined to construct the mobile crowd sensing network for coal mine. Aiming at the task allocation problem, a task allocation mechanism based on a weighted undirected graph is proposed. First, considering the similarity of task completion location and time and quality of data collected, the reputation evaluation model of miners is designed. In order to optimize the reputation of miners participating in the task, an emergency task allocation algorithm based on the weighted undirected graph is proposed. Second, based on the fatigue degree of miners and the residual energy of intelligent mobile terminals, the miner status evaluation model is constructed, which is combined with the reputation model to design a nonemergency task allocation algorithm, aiming at further optimizing the task allocation results. The simulation results show that the proposed algorithm has better performance in allocation time for sensing task, task allocation success rate, average reputation, and status value of miners.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Wu, Zheng, Laifu Li, Yubo Yuan, Xiaodong Yuan, Chenyu Zhang, Li Kong, Wei Pei und Wei Deng. „Research on Additional Control Technology Based on Energy Storage System for Improving Power Transfer Capacity of Multi-Terminal AC/DC System with Low Cost“. Energies 13, Nr. 2 (19.01.2020): 495. http://dx.doi.org/10.3390/en13020495.

Der volle Inhalt der Quelle
Annotation:
The multi-terminal AC/DC system will become one of the important forms of the future power grid. The negative impedance characteristic caused by the constant power load in the DC network will reduce the power transfer capacity between the terminals, especially when a grid fault occurs in AC system at any terminal. Energy storage has played an important role in improving the stability of AC and DC systems. This paper proposes an additional control method based on an energy storage system to improve system power transfer capacity with low cost. The state space model of two-terminal AC/DC system is established, and the feedback laws for additional control are further designed by Lyapunov theory. Furthermore, the additional control strategies based on the energy storage system is built, without changing the existing control system of each control object. Finally, the corresponding system simulation model is established by Matlab/Simulink for analysis and verification. The research results show that the proposed additional control method is effective. The power transfer limitation can be overcome by only adding small damping energy with the stable DC voltages under large disturbances, and the power transfer capacity between the terminals can be significantly improved with low control cost.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Yee, Yoke Chek, Su Wei Tan, Heng Siong Lim und Su Fong Chien. „Application of Particle Swarm Optimizer on Load Distribution for Hybrid Network Selection Scheme in Heterogeneous Wireless Networks“. ISRN Communications and Networking 2012 (05.09.2012): 1–7. http://dx.doi.org/10.5402/2012/340720.

Der volle Inhalt der Quelle
Annotation:
Mobile terminal with multiradios is getting common nowadays with the presence of heterogeneous wireless networks such as 3G, WiMAX, and WiFi. That Network selection mechanism plays an important role in ensuring mobile terminals are always connected to the most suitable network. In this paper, we introduce and evaluate the performance of load distribution model to facilitate better network selection. We focus on the optimization of network resource utilization using the particle swarm optimizer (PSO) with the objective to distribute the system load according to the various conditions of the heterogeneous networks in order to achieve minimum system cost. Simulation results showed that the proposed approach outperformed the conventional iterative algorithm by a cost improvement of 7.24% for network size of 1000 mobile terminals using 10 particles.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie