Two closely related, low-sensitivity, active switched capacitor filter topologies are presented. Each of these circuits comprises two operational amplifiers and at most nine capacitors. The topologies have been carefu...
详细信息
Two closely related, low-sensitivity, active switched capacitor filter topologies are presented. Each of these circuits comprises two operational amplifiers and at most nine capacitors. The topologies have been carefully constructed so that they are immune to the various parasitic capacitor networks.
Aiming at the malicious attacks caused from the sensor identity authentication in wireless body area networks (WBAN), the sensor cannot transmit information normally and even cause the life-threatening problem. In thi...
详细信息
ISBN:
(纸本)9781538674130
Aiming at the malicious attacks caused from the sensor identity authentication in wireless body area networks (WBAN), the sensor cannot transmit information normally and even cause the life-threatening problem. In this paper, the physical unclonable function module is added to the sensor of the wireless body area networks, and an energy-saving, real-time sensor authentication protocol is proposed. The energy consumption of the authentication protocol based on the physical unclonable function is studied by analyzing the energy consumption of the authentication based on the public key cryptosystem and the physical unclonable function of the IOT device. The simulation results show that the authentication protocol can reduce the energy consumption of authentication when the networks security is satisfied.
Classical mechanism design assumes that an agent's value of any determined outcome depends only on its private information. However in many situations, an agent's value of an outcome depends on the private inf...
详细信息
ISBN:
(纸本)9783642250439
Classical mechanism design assumes that an agent's value of any determined outcome depends only on its private information. However in many situations, an agent's value of an outcome depends on the private information of other agents in addition to its private information. In such settings where agents have interdependent valuations, strategy-proof mechanisms have not been proposed yet, and when these mechanisms are possible is still an open research question. Toward addressing this question, we consider the interdependent task allocation (ITA) problem, where a set of tasks with predefined dependencies is to be assigned to self-interested agents based on what they report about their privately known capabilities and costs. We consider here the possibility that tasks may fail during their executions, which imposes interdependencies between the agents' valuations. In this study, we design mechanisms and prove their strategy-proofness along with other properties for a class of ITA settings where an agent's privately known costs are modeled as privately known durations.
In this study, the profile and antimicrobial activity of the secretions of Duttaphrynus melanostictus were studied. The protein profiles were investigated through SDS-PAGE and the proteins itself has been successfully...
详细信息
In this study, the profile and antimicrobial activity of the secretions of Duttaphrynus melanostictus were studied. The protein profiles were investigated through SDS-PAGE and the proteins itself has been successfully separated. The antimicrobial activity of the secretions was performed by disk diffusion method and was tested against Bacillus cereus ATCC11778, Escherichia coli ATCC 25922, Salmonella typhimurium IMR S 974/05 B, Staphylococcus aureus ATCC 25923, Staphylococcus eperdimidis IMR S 384/05 C, Klebsiella pneumoniae ATCC 700603 and Methicillin-resistant Staphylococcus aureus(MRSA) which had been clinically isolated. According to the findings, the secretions(5mg/ml) have lower antimicrobial activity in comparison to antibiotics used, Tetracycline HCl(120 mg/ml). The secretions however, failed to inhibit the growth of Methicillin-resistant Staphylococcus aureus.
The cold start and data sparsity problems of the recommendation system can be effectively alleviated by crossdomain *** is possible to achieve good results by combining information from several knowledge-rich domain s...
The cold start and data sparsity problems of the recommendation system can be effectively alleviated by crossdomain *** is possible to achieve good results by combining information from several knowledge-rich domain sources to recommend users with less information in the target *** other cross-domain recommendations,user and domain item information are embedded separately,and messages are transmitted through information sharing or potential feature mapping.A similarity relationship between items between domains and a relationship between users' preferences for items between domains are not considered in the transmission *** paper proposes Cross-domain recommendation of overlapping users based on self-attention graph convolution network(OUAG).We use the graph convolution neural network to extract characteristics of embedded users and items,the attention mechanism dynamically assigns weights,and captures the higher-order user preferences in the graph through the propagation layer.A large number of experiments on two real-world data sets show that our model performs better than the baseline algorithm.
The user location information represents a core dimension as understanding user context is a prerequisite for providing human-centered services that generally improve quality of life. In comparison with outdoor enviro...
详细信息
The user location information represents a core dimension as understanding user context is a prerequisite for providing human-centered services that generally improve quality of life. In comparison with outdoor environments, sensing location information in indoor environments requires a higher precision and is a more challenging task due in part to the expected various objects (such as walls and people) that reflect and disperse signals. In this paper, we survey the related work in the field of indoor positioning by providing a comparative analysis of the state-of-the-art technologies, techniques, and algorithms. Unlike previous studies and surveys, our survey present new taxonomies, review some major recent advances, and argue on the area open problems and future potential. We believe this paper would spur further exploration by the research community of this challenging problem space.
暂无评论