The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studied the typical clustering Routing Protocol-LEACH protocol, analysed its deficiencies and proposed improved ideas. N-LEACH protocol improved the election process of LEACH cluster head node while the remaining energy as the basis of election cluster head node,and increased the process of choosing root node in all the cluster head nodes. It was root node that collected data then sent...
A large number of functional modules are involved in seismic data processing, only under unified control of the execution control system such a complex systematic project with these functional modules in seismic data processing can be completed, and pipeline technology in existing computer operating system can support the control of single channel operation, but can't realize the control of multi-channel...
When Image feature extracted from the sub-block in image is used in object segmentation, it can cause object boundary inaccurate. Texture feature extracting algorithm based on every pixel is purposed in the paper. After the pixel texture feature is standardized and reduced dimension by PCA, it is clustered by hierarchical method. Improved segmentation algorithm segments the complex image into different...
With the rapid development of Wireless Sensor Network, the security of WSN becomes a very important issue. In this paper, The Intrusion Detection of Wireless Sensor Network is presented in detail. An overview of intrusion detection of WSN including detected objects, the current techniques of intrusion detection, and their advantages and disadvantages are presented. Finally possible new directions...
The high performance computing cluster(HPC) administered a parallel computation. A cluster node which consisted of Cluster was in charge of examining each natural number less than or equal to vertices number of the graph. The cluster can calculate the minimal domination number (MDN) effectively. In this paper, taking W(3,n) Knödel graph for an example, the definit bounds of the MDN has been worked...
Social capital refers primarily to resources, knowledge, and capability accessed in a social network, and resources mobilized through ties in the network. How does social capital influence the knowledge flows and innovations in inter-organizational networks in developing countries? This article will answer this question based on the data of software companies in Zhangjiang Software Cluster, Shanghai,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.