Search

Showing total 629 results

Search Constraints

Start Over You searched for: Topic flow control (data transmission systems) Remove constraint Topic: flow control (data transmission systems)
629 results

Search Results

1. Facile and precise flow control for a paper-based microfluidic device through varying paper permeability.

3. Securing the Internet‐of‐Things: Advances, challenges, future trends.

5. Dissolvable Polyvinyl-Alcohol Film, a Time-Barrier to Modulate Sample Flow in a 3D-Printed Holder for Capillary Flow Paper Diagnostics.

6. Navigating Complexity.

7. FSO-Based Analysis of LTE-A MAC Protocols to Achieve Improved QoS.

8. A Fuzzy Comprehensive Evaluation Method of Regional Economic Development Quality Based on a Convolutional Neural Network.

9. Data-intensive workflow scheduling strategy based on deep reinforcement learning in multi-clouds.

10. Multi-Perspective Data Fusion Framework Based on Hierarchical BERT: Provide Visual Predictions of Business Processes.

11. Design and Fabrication of Digital Microfluidics Device for Lab-on-a-Chip Applications.

12. DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation.

13. Introducing dynamic consent for improved trust and privacy in research involving human biological material and associated data in South Africa.

14. A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems.

15. On the patterns of the nonstationary datagram based fast communication processes.

16. Smart Cities as Hubs: A Use Case in Public School Buildings.

17. Frequency conditions for stable networked controllers with time-delay.

18. INVESTIGATION OF A DIGITAL VALVE SYSTEM EFFICIENCY FOR METERING-IN SPEED CONTROL USING MATLAB/SIMULINK.

19. A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems.

20. Visual Workflow Process Modeling and Simulation Approach Based on Non-Functional Properties of Resources.

21. Data inequalities and why they matter for development.

22. The Role of Privacy Protection in Business Models for Sustainability: A Conceptual Integration from an Ecosystem Perspective.

23. Fuzzy based trusted malicious unmanned aerial vehicle detection using in flying ad-hoc network.

24. SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android.

25. A Method for Classifying Packets into Network Flows Based on GHSOM.

26. Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance.

27. Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks.

28. PFDCT: An Enhanced Transport Layer Protocol for Precise Flow Control in Data Centers.

29. DEVELOPMENT OF AN ALGORITHM FOR ADAPTING A MATHEMATICAL MODEL OF THE PROCESS OF MIXING AND MELTING COPPER CONCENTRATES.

30. A Secure Data Flow Forwarding Method Based on Service Ordering Management.

31. An information flow control model in a topic-based publish/subscribe system.

32. Hybrid Model with Multi-Level Code Representation for Multi-Label Code Smell Detection (077).

33. Implementation of Control Flow Checking—A New Perspective Adopting Model-Based Software Design.

34. Adaptable Cross-organizational Unstructured Business Processes via Dynamic Rule-based Semantic Network.

35. Vectorizing programs with IF-statements for processors with SIMD extensions.

37. Vision-based Robotic Arm Control for Screwdriver Bit Placement Tasks.

38. Applying stochastic network calculus to logical link control layer in underwater wireless communication: Underwater fish farming perspective.

39. Mixed-Flow Load-Balanced Scheduling for Software-Defined Networks in Intelligent Video Surveillance Cloud Data Center.

40. Network Topology Classification in SDN Ecosystem using Machine Learning.

41. Modelling and Control of an Interline Current Flow Controller for Meshed HVDC Grids.

42. A Smart Memory Controller for System on Chip-Based Devices.

43. Business Process Outcome Prediction Based on Deep Latent Factor Model.

44. Using Fuzzy Inference System in Gas Turbine to Overcome a High Exhaust Temperature Problem.

45. Browser-in-the-Middle (BitM) attack.

46. Analysis and assessment of weighted combinatorial criterion for test suite reduction.

47. Getting There and Back Again.

48. A Detection Method for Abnormal Transactions in E-Commerce Based on Extended Data Flow Conformance Checking.

49. DESIGNING HYDRAULIC AIR CHAMBER IN WATER TRANSMISSION SYSTEMS USING GENETIC ALGORITHM.

50. Low Frequency Sensitivity Function Constraints for Nonlinear.