To see the other types of publications on this topic, follow the link: Power-Source-Aware.

Journal articles on the topic 'Power-Source-Aware'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Power-Source-Aware.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sharma, Kavita, and Vivek Sharma. "Energy Efficient Power Aware Multipath Dynamic Source Routing." International Journal of Computer Applications 77, no. 4 (2013): 38–42. http://dx.doi.org/10.5120/13385-1015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tekkalmaz, Metin, and Ibrahim Korpeoglu. "PSAR: power-source-aware routing in ZigBee networks." Wireless Networks 18, no. 6 (2012): 635–51. http://dx.doi.org/10.1007/s11276-012-0424-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tekkalmaz, Metin, and Ibrahim Korpeoglu. "PSAR: Power-Source-Aware Routing in ZigBee Networks." ACM Wireless Networks Journal 18, no. 6 (2012): 635–51. https://doi.org/10.1007/s11276-012-0424-5.

Full text
Abstract:
ZigBee is a recent wireless networking technology built on IEEE 802.15.4 standard and designed especially for low-data rate and low-duty cycle applications such as home and building automation and sensor networks. One of the primary goals of ZigBee is low power consumption and therefore long-living networks. Despite this goal, current network formation and routing protocols described in the ZigBee specification do not fully address power consumption issues. In this work, we propose a distributed routing algorithm to reduce power consumption of battery-powered devices by routing the communicati
APA, Harvard, Vancouver, ISO, and other styles
4

Tekkalmaz, Metin, and Ibrahim Korpeoglu. "Distributed power-source-aware routing in wireless sensor networks." Wireless Networks 22, no. 4 (2015): 1381–99. http://dx.doi.org/10.1007/s11276-015-1040-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matthew, N. O. Sadiku, A. Omotoso Adedamola, and M. Musa Sarhan. "Power Aware Computing." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 24–25. https://doi.org/10.5281/zenodo.3604651.

Full text
Abstract:
With the proliferation of portable computing devices, power consumption has become a major concern. Power consumption has posed a serious challenge to the high performance computing systems. Power aware computing is to minimize energy requirements for computation. The main objective of power aware computing is to conserve energy for routing messages from source to destination. This paper provides a brief introduction to power aware computing. Matthew N. O. Sadiku | Adedamola A. Omotoso | Sarhan M. Musa "Power Aware Computing" Published in International Journal of Trend in Scientific
APA, Harvard, Vancouver, ISO, and other styles
6

J., Lakshmi. "Power Aware Energy Efficient Cluster Based Network Coding Algorithm for Dynamic Source Routing (PA-EECSNC DSR)." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 1742–50. http://dx.doi.org/10.37200/ijpr/v24i5/pr201845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schoendienst, Thilo, and Vinod M. Vokkarane. "Reducing Greenhouse Gas Emissions With Power Source-Aware Multidomain Multilayer Networks." IEEE Systems Journal 11, no. 2 (2017): 673–83. http://dx.doi.org/10.1109/jsyst.2015.2448599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

De, Swades, Ravikant Saini, and Ashwani Sharma. "Source-Aware Adaptive Power Allocation in OFDM Systems for Rate Constrained Applications." IEEE Communications Letters 18, no. 10 (2014): 1855–58. http://dx.doi.org/10.1109/lcomm.2014.2358648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bheemalingaiah, M., M. M. Naidu, D. Sreenivasa Rao, and G. Varaprasad. "Power-aware node-disjoint multipath source routing with low overhead in MANET." International Journal of Mobile Network Design and Innovation 3, no. 1 (2009): 33. http://dx.doi.org/10.1504/ijmndi.2009.030445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Chih Min, Yih Bin Yu, and Chun Chih Chu. "P-AODV: Energy-Aware Routing for Wireless Mesh Networks." Applied Mechanics and Materials 764-765 (May 2015): 946–49. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.946.

Full text
Abstract:
This paper proposed an energy-aware routing method, P-AODV. Based on the AODV routing protocol, this study designed a passive power control (PPC) algorithm to enhance energy efficiency. The proposed method includes signal detection and power setting phases. During the signal detection phase, the source node broadcasts the route request packets (RREQ) and the downstream intermediate node calculates the optimum power level at the upstream intermediate node according to the received signal strength indicator (RSSI) after receiving the RREQ. During the power set phase, the destination node returns
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Jiandong, and Sheng Huang. "Delay-Aware Power Control for D2D Communication With Successive Interference Cancellation and Hybrid Energy Source." IEEE Wireless Communications Letters 6, no. 6 (2017): 806–9. http://dx.doi.org/10.1109/lwc.2017.2744625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

MANVI, S. S., M. M. KODABAGI, and BHANU PRASAD. "AN AGENT BASED POWER AND BANDWIDTH AWARE ROUTING FOR MOBILE AD-HOC NETWORKS." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 12, supp02 (2004): 83–100. http://dx.doi.org/10.1142/s0218488504003053.

Full text
Abstract:
Ad-hoc wireless networks are power constrained as the nodes operate with limited battery energy. To maximize the lifetime of these networks, transactions through each mobile node must be controlled in such a way that the power dissipation rates for the nodes are almost the same. At the same time, providing QoS for ad-hoc networks is a complex task due to the ever-changing network topology. This paper addresses the problem of power and bandwidth aware routing. We propose a power and bandwidth aware source initiated routing model for mobile ad-hoc networks. The model uses both the static and mob
APA, Harvard, Vancouver, ISO, and other styles
13

Kaur, Simerjit. "Understanding the Notion of Power in Franz Kafka’s Short Story “The Vulture”." SMART MOVES JOURNAL IJELLH 8, no. 12 (2020): 104–13. http://dx.doi.org/10.24113/ijellh.v8i12.10864.

Full text
Abstract:
Power influences the lives of human beings in every aspect. A human being is engulfed in the power structure so badly that sometimes he is not even aware the way power is controlling his life. The present paper addresses the nature of power and how it operates at different levels by analyzing Franz Kafka’s short story “The Vulture”. It is an attempt to understand both positive and negative aspects of power and how it controls the lives of people using mind as an important source to change and control their lives. The paper traces power in the shape of vulture controlling the man and making him
APA, Harvard, Vancouver, ISO, and other styles
14

Ishtiak, Khandakar Mohammad, S. M. Ishraqul Huq, Safayat-Al Imam, and Satyendra N. Biswas. "Design of Low-Power and PVT-Aware Quaternary Adder Circuits Based on Virtual Source-CNTFET Model." ECS Journal of Solid State Science and Technology 10, no. 8 (2021): 081015. http://dx.doi.org/10.1149/2162-8777/ac1d2a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Shankar, Shiva, Golla Varaprasad, and Hosahalli Narayanagowda Suresh. "Importance of on‐demand modified power aware dynamic source routing protocol in mobile ad‐hoc networks." IET Microwaves, Antennas & Propagation 8, no. 7 (2014): 459–64. http://dx.doi.org/10.1049/iet-map.2013.0230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Elewely, Dalia, Marwa Areed, and Hesham Ali. "A proposed routing scheme for power reduction in wireless networks." International Journal of Engineering & Technology 3, no. 1 (2013): 20. http://dx.doi.org/10.14419/ijet.v3i1.1111.

Full text
Abstract:
Ad-hoc networks consist of a set of mobile nodes with a restricted power supply resources that can communicate with each other without any established infrastructure or centralized administration. The loss of some nodes may cause significant topological changes, undermine the network operation, and affect the lifetime of the network. This paper discusses the energy consumption problem and summaries the existing power saving techniques in ad-hoc wireless networks. The main objective of this paper is to introduce a new power aware multi-path node disjoint routing scheme based on the Dynamic Sour
APA, Harvard, Vancouver, ISO, and other styles
17

Le, Chi-Bao, and Dinh-Thuan Do. "Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access." Bulletin of Electrical Engineering and Informatics 10, no. 2 (2021): 848–55. http://dx.doi.org/10.11591/eei.v10i2.2117.

Full text
Abstract:
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expre
APA, Harvard, Vancouver, ISO, and other styles
18

Chi-Bao, Le, and Do Dinh-Thuan. "Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access." Bulletin of Electrical Engineering and Informatics 10, no. 2 (2021): 848~855. https://doi.org/10.11591/eei.v10i2.2117.

Full text
Abstract:
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expre
APA, Harvard, Vancouver, ISO, and other styles
19

., Meenu, Dr Vivek Jaglan, and Akshat Agrawal. "Comparative analysis of power aware routing protocols in mobile ad-hoc network." International Journal of Engineering & Technology 7, no. 2.4 (2018): 170. http://dx.doi.org/10.14419/ijet.v7i2.4.13032.

Full text
Abstract:
The Mobile Ad-Hoc network is a self-governing wireless network having dynamic topology and scattered mobile nodes. Limited power supply is the major challenge in wireless Ad-Hoc networks. Thus, for overall functioning of the ad-hoc network, efficient power conser-vation mechanism becomes the critical and most important component in ad-hoc network. Various power aware routing mechanism have been evolved to preserve energy, prolonging the life span of its nodes and thus of the network itself. Various other metrics for preserving energy also considered viz. selecting shortest path from source to
APA, Harvard, Vancouver, ISO, and other styles
20

Madhurikkha, S., and R. Sabitha. "Hierarchical Honey Bee Model to Avoid Sleep Deprivation Attack in MANET." International Journal of Engineering & Technology 7, no. 3.6 (2018): 358. http://dx.doi.org/10.14419/ijet.v7i3.6.15133.

Full text
Abstract:
Ad-hoc networks are highly vulnerable to the attacks due to the dynamic nature of the network topology, lack of centralized management and cooperative algorithm. Nodes in the ad-hoc network are responsible to transmit packets to other nodes. One of many different kinds of attacks, a node may experience the exhaustion of power by consuming its batter power. Routing protocol controls the packet transmission over the network and calculates the routing path for transmission. The predefined static routed path is limited in ad-hoc network, and nodes have limited energy that is depleted due to transm
APA, Harvard, Vancouver, ISO, and other styles
21

Hu, Chenrui. "Optimization Design and Energy Efficiency Management of Robot Power Systems." Academic Journal of Science and Technology 12, no. 1 (2024): 232–37. http://dx.doi.org/10.54097/va1sr570.

Full text
Abstract:
This comprehensive review explores the critical field of robot power systems, focusing on optimization design principles and energy efficiency management strategies. The article examines the fundamental components of robot power systems, including power sources, distribution networks, and energy storage solutions. It delves into key optimization techniques, such as power source selection, thermal management, and weight reduction, while also discussing advanced energy efficiency management strategies like power-aware task planning and dynamic power management. The review highlights emerging tec
APA, Harvard, Vancouver, ISO, and other styles
22

Pawan and Susheela Hooda. "A New Approach for Power-Aware Routing for Mobile Adhoc Networks Using Cluster Head With Gateway Table." International Journal of Web-Based Learning and Teaching Technologies 16, no. 4 (2021): 47–59. http://dx.doi.org/10.4018/ijwltt.20210701.oa4.

Full text
Abstract:
Wireless ad-hoc networks have become the most vibrant and vital area of research over the past years. Most devices in MANET are power operated. Therefore, the need of the hour is to design a protocol that will not only saves the battery life but also increase the lifetime of participating nodes in the ad-hoc network. In this paper, a new power-aware routing protocol has been proposed which selects the best gateway node for sending the data packets from source to destination. Additionally, the proposed routing protocol extends the battery lifetime of a mobile node and also minimizes the power c
APA, Harvard, Vancouver, ISO, and other styles
23

Bradbury, Matthew, Arshad Jhumka, and Carsten Maple. "A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks." ACM Transactions on Internet of Things 2, no. 1 (2021): 1–32. http://dx.doi.org/10.1145/3430379.

Full text
Abstract:
Source Location Privacy (SLP) is an important property for monitoring assets in privacy-critical sensor network and Internet of Things applications. Many SLP-aware routing techniques exist, with most striking a tradeoff between SLP and other key metrics such as energy (due to battery power). Typically, the number of messages sent has been used as a proxy for the energy consumed. Existing work (for SLP against a local attacker) does not consider the impact of sleeping via duty cycling to reduce the energy cost of an SLP-aware routing protocol. Therefore, two main challenges exist: (i) how to ac
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Da Ren, Chiun Chieh Hsu, and Chun Fu Guo. "Energy-Efficient 2-Covered Path Routing for Distributed Wireless Sensor Networks with Variable Transmission Ranges." Applied Mechanics and Materials 764-765 (May 2015): 886–90. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.886.

Full text
Abstract:
A 2-covered path routing method providing each path with redundant antennas to provide high availability ensures reliable multi-hop communication under practical conditions. In real life, the transmission range of an antenna increases at a rate proportionate to its input power. This paper focuses on the 2-covered path problem in which antennas have discrete transmission power levels. Given a set of n antennas with m available radii, a source point A and a destination B on the plane, we propose three power-aware methods that construct the 2-covered paths between endpoints A and B. These methods
APA, Harvard, Vancouver, ISO, and other styles
25

Saleem, Kashif, and Iftikhar Ahmad. "Ant Colony Optimization ACO Based Autonomous Secure Routing Protocol for Mobile Surveillance Systems." Drones 6, no. 11 (2022): 351. http://dx.doi.org/10.3390/drones6110351.

Full text
Abstract:
Sensing plays a vital role in enabling smart cities. The mobile surveillance of different sectors, the retransmission of radio signals, and package delivery are the main applications conducted by unmanned vehicles in smart cities. Multiple unmanned vehicles or miniaturized real-time flying machines with onboard sensors, whether land- or air-based, communicate with each other to form a flying sensor network. Almost all of these machines are battery-operated. Therefore, power preservation is an extremely important factor to be taken into consideration. This paper proposes a power-aware biologica
APA, Harvard, Vancouver, ISO, and other styles
26

Kushwaha, Dinesh, and D. K. Mishra. "Nano Power Current Reference Circuit consisting of Sub-threshold CMOS Circuits." Circulation in Computer Science 2, no. 1 (2017): 1–4. http://dx.doi.org/10.22632/ccs-2016-251-36.

Full text
Abstract:
This paper proposes a low voltage CMOS Nano power current reference circuit and presents its performance with circuit simulation in 180- nm UMC CMOS technology. The proposed circuit consists of start-up, Bias-voltage, current-source sub-circuits with most of the MOSFETs operating in sub-threshold region. Simulation results shows that the circuit generates a stable reference current of 4-nA in supply voltage range 1 V- 1.8 V with line sensitivity of 0.203%/V.The temperature coefficient of the current was 7592ppm/°C at 1.8 V in the range of 0°C-100°C. The power dissipation was 380 NW at 1.8 V Su
APA, Harvard, Vancouver, ISO, and other styles
27

Park, Jung-Jin, Young-Min Kang, Geon-Hak Kim, Ik-Joon Chang, and Jinsang Kim. "A Fully Polarity-Aware Double-Node-Upset-Resilient Latch Design." Electronics 11, no. 15 (2022): 2465. http://dx.doi.org/10.3390/electronics11152465.

Full text
Abstract:
Due to aggressive scaling down, multiple-node-upset hardened design has become a major concern regarding radiation hardening. The proposed latch overcomes the architecture and performance limitations of state-of-the-art double-node-upset (DNU)-resilient latches. A novel stacked latch element is developed with multiple thresholds, regular architecture, increased number of single-event upset (SEU)-insensitive nodes, low power dissipation, and high robustness. The radiation-aware layout considering layout-level issues is also proposed. Compared with state-of-the-art DNU-resilient latches, simulat
APA, Harvard, Vancouver, ISO, and other styles
28

Chen, Yui-Liang, and Hong-Hsu Yen. "MAC-Aware and Power-Aware Image Aggregation Scheme in Wireless Visual Sensor Networks." Journal of Sensors 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/414731.

Full text
Abstract:
Traditional wireless sensor networks (WSNs) transmit the scalar data (e.g., temperature and irradiation) to the sink node. A new wireless visual sensor network (WVSN) that can transmit images data is a more promising solution than the WSN on sensing, detecting, and monitoring the environment to enhance awareness of the cyber, physical, and social contexts of our daily activities. However, the size of image data is much bigger than the scalar data that makes image transmission a challenging issue in battery-limited WVSN. In this paper, we study the energy efficient image aggregation scheme in W
APA, Harvard, Vancouver, ISO, and other styles
29

Gao, Hongming, Hongwei Liu, Haiying Ma, Cunjun Ye, and Mingjun Zhan. "Network-aware credit scoring system for telecom subscribers using machine learning and network analysis." Asia Pacific Journal of Marketing and Logistics 34, no. 5 (2021): 1010–30. http://dx.doi.org/10.1108/apjml-12-2020-0872.

Full text
Abstract:
PurposeA good decision support system for credit scoring enables telecom operators to measure the subscribers' creditworthiness in a fine-grained manner. This paper aims to propose a robust credit scoring system by leveraging latent information embedded in the telecom subscriber relation network based on multi-source data sources, including telecom inner data, online app usage, and offline consumption footprint.Design/methodology/approachRooting from network science, the relation network model and singular value decomposition are integrated to infer different subscriber subgroups. Employing th
APA, Harvard, Vancouver, ISO, and other styles
30

Gao, Hongming, Hongwei Liu, Haiying Ma, Cunjun Ye, and Mingjun Zhan. "Network-aware credit scoring system for telecom subscribers using machine learning and network analysis." Asia Pacific Journal of Marketing and Logistics 34, no. 5 (2021): 1010–30. http://dx.doi.org/10.1108/apjml-12-2020-0872.

Full text
Abstract:
PurposeA good decision support system for credit scoring enables telecom operators to measure the subscribers' creditworthiness in a fine-grained manner. This paper aims to propose a robust credit scoring system by leveraging latent information embedded in the telecom subscriber relation network based on multi-source data sources, including telecom inner data, online app usage, and offline consumption footprint.Design/methodology/approachRooting from network science, the relation network model and singular value decomposition are integrated to infer different subscriber subgroups. Employing th
APA, Harvard, Vancouver, ISO, and other styles
31

Moon, Jihwan. "Performance Comparison of Relay-Based Covert Communications: DF, CF and AF." Sensors 23, no. 21 (2023): 8747. http://dx.doi.org/10.3390/s23218747.

Full text
Abstract:
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF). We consider a source node that attempts to send both public and covert messages to a destination node through a relay on which a covert message detector is embedded. By taking the minimum detection error probability (DEP) at the relay into account, we optimize the power distribution between the public and covert messages to achieve the maximum covert rate. We further make a delay-aware comparison among DF,
APA, Harvard, Vancouver, ISO, and other styles
32

Shivashankar, Golla Varaprasad, and Suresh Hosahalli Narayanagowda. "Implementing a new power aware routing algorithm based on existing dynamic source routing protocol for mobile ad hoc networks." IET Networks 3, no. 2 (2014): 137–42. http://dx.doi.org/10.1049/iet-net.2013.0050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ramprakash.S and M.Durairasan Dr. "Minimizing Traffic Overhead And Improving Energy Efficiency in Wireless Sensor Networks by Power Context Aware Routing [PCAR] Mechanism." Journal of Advance Research in Mobile Computing 1, no. 3 (2020): 1–6. https://doi.org/10.5281/zenodo.3600087.

Full text
Abstract:
<em>A Wireless Sensor Network (WSN) consists of collection of autonomous efficiency storage of data and processing power. To maximize the lifetime of WSN, It is essential to prolong each individual mobility node&rsquo;s lifetime through minimizing the total transmission time for each communication Request. While transmitting the maximum amount of information to another nodes leads to replacement of battery. So it&rsquo;s very difficult to maintain the longer lifetime of the WSN nodes. Therefore it has been proposed to develop an algorithm for Power Context Aware Routing (PCAR) in WSN. The abov
APA, Harvard, Vancouver, ISO, and other styles
34

Shaikh, Mohsin, Irfan Tunio, Jawad Khan, and Younhyun Jung. "Effort-Aware Fault-Proneness Prediction Using Non-API-Based Package-Modularization Metrics." Mathematics 12, no. 14 (2024): 2201. http://dx.doi.org/10.3390/math12142201.

Full text
Abstract:
Source code complexity of legacy object-oriented (OO) software has a trickle-down effect over the key activities of software development and maintenance. Package-based OO design is widely believed to be an effective modularization. Recently, theories and methodologies have been proposed to assess the complementary aspects of legacy OO systems through package-modularization metrics. These package-modularization metrics basically address non-API-based object-oriented principles, like encapsulation, commonality-of-goal, changeability, maintainability, and analyzability. Despite their ability to c
APA, Harvard, Vancouver, ISO, and other styles
35

Mekonnen, Atinkut Molla, Yirga Yayeh Munaye, Yenework Belayneh Chekol, Getenesh Melie Bizuayehu, and Hari Maghfiroh. "Improving Dynamic Routing Protocol with Energy-aware Mechanism in Mobile Ad Hoc Network." Buletin Ilmiah Sarjana Teknik Elektro 6, no. 3 (2024): 317–23. https://doi.org/10.12928/biste.v6i3.11994.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is designed for specific communication needs, where nodes dynamically interact. In a MANET, mobile nodes self-configure and frequently adapt to changes in topology due to their ability to move freely. Each node operates as a router, forwarding data to other designated nodes within the network. Since these mobile nodes rely on battery power, energy management becomes critical. This paper addresses the challenges of routing in MANETs by improving the Dynamic Source Routing (DSR) protocol. The proposed enhancement, termed energy-aware DSR, aims to mitigate and redu
APA, Harvard, Vancouver, ISO, and other styles
36

Park, Yujun, Jeong Soo Choi, Hae Rim Chun, and Jinhun Chung. "A Case of Skin Burns Occurring during Laparoscopic Surgery." Soonchunhyang Medical Science 30, no. 1 (2024): 46–48. http://dx.doi.org/10.15746/sms.24.009.

Full text
Abstract:
Skin burn injury from light cables is a rare complication of laparoscopic surgery. We report the case of a 57-year-old female who underwent laparoscopic-assisted right hemicolectomy under general anesthesia. During surgery, the anesthesiologist discovered that the tip of the light cable, with the light source powered on, penetrated the surgical drape and was positioned on the right forearm of the patient, where a bulla measuring 2.0× 2.5 cm in size and a second-degree burn were identified. All medical personnel participating in laparoscopic and arthroscopic procedures should always be aware th
APA, Harvard, Vancouver, ISO, and other styles
37

Krunic, Momcilo V. "Power and Energy Consumption Models for Embedded Applications." Elektronika ir Elektrotechnika 28, no. 5 (2022): 45–54. http://dx.doi.org/10.5755/j02.eie.31345.

Full text
Abstract:
This paper describes a study on the power and energy consumption estimation models that have been defined to facilitate the development of ultra-low power embedded applications. During the study, various measurements have been carried out on the instruction and application level to challenge the models against empirical data. The study has been performed on the multicore heterogeneous hardware platform developed for ultra-low power Digital Signal Processors (DSP) applications. The final goal was to develop a tool that can provide insight into power dissipation during the execution of embedded
APA, Harvard, Vancouver, ISO, and other styles
38

Yusup, Andreian, Siti Komariah, and Siti Nurbayani K. "Identity Politics & Power Relations Against Sexual Violence in Religious Higher Education Environment." Jurnal Paedagogy 10, no. 3 (2023): 831. http://dx.doi.org/10.33394/jp.v10i3.7715.

Full text
Abstract:
This study aims to analyze how identity politics and power relations related to sexual violence in a religious campus environment. The research approach used was qualitative with a phenomenological method that can analyze the problem of sexual violence by analyzing the theory of hegemony and power relations. The informants for this study were campus officials, namely the Chancellor and his staff, the sexual violence task force and active university students with data collection techniques through observation, documentation, in-depth interviews, and literature studies, then analyzed descriptive
APA, Harvard, Vancouver, ISO, and other styles
39

Liang, Guangjun, Qi Zhu, An Yan, Ziyu Pan, Jianfang Xin, and Tianjiao Zhang. "Fairness-Aware and Energy Efficiency Resource Allocation in Multiuser OFDM Relaying System." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/7364154.

Full text
Abstract:
A fairness-aware resource allocation scheme in a cooperative orthogonal frequency division multiple (OFDM) network is proposed based on jointly optimizing the subcarrier pairing, power allocation, and channel-user assignment. Compared with traditional OFDM relaying networks, the source is permitted to retransfer the same data transmitted by it in the first time slot, further improving the system capacity performance. The problem which maximizes the energy efficiency (EE) of the system with total power constraint and minimal spectral efficiency constraint is formulated into a mixed-integer nonl
APA, Harvard, Vancouver, ISO, and other styles
40

Peszko, Kamila. "THE CONSUMER AS A SOURCE OF MARKETING INFORMATION IN THE INFORMATION SOCIETY." CBU International Conference Proceedings 3 (September 19, 2015): 361–67. http://dx.doi.org/10.12955/cbup.v3.625.

Full text
Abstract:
The development of IT technology has provided people with free access to the Internet, which is now a place for consumers to look for opportunities to share their observations with others. The Internet user wants to be more aware, and willingly participates in the development of emerging brands. Companies have also found their place on the Internet, where they source information from Internet users. They realize the power of the consumer as a source of marketing information, and "take advantage" of consumer behavior to promote their brands. They analyze information about consumers, especially
APA, Harvard, Vancouver, ISO, and other styles
41

Theis, Jonas, Luigi Vigneri, Lin Wang, and Animesh Trivedi. "Healthor: Heterogeneity-aware Flow Control in DLTs to Increase Performance and Decentralization." Distributed Ledger Technologies: Research and Practice 1, no. 2 (2022): 1–27. http://dx.doi.org/10.1145/3555676.

Full text
Abstract:
Permissionless reputation-based distributed ledger technologies (DLTs) have been proposed to overcome blockchains’ shortcomings in terms of performance and scalability, and to enable feeless messages to power the machine-to-machine economy. These DLTs allow machines with widely heterogeneous capabilities to actively participate in message generation and consensus. However, the open nature of such DLTs can lead to the centralization of decision-making power, thus defeating the purpose of building a decentralized network. In this article, we introduce Healthor, a novel heterogeneity-aware flow-c
APA, Harvard, Vancouver, ISO, and other styles
42

Al-Shamarti, Ahlam Dhahir Mohsin. "Hyper reality, Discursive Power and Resistance in Don Delillo's White Noise." Journal of Multidisciplinary Cases, no. 41 (December 5, 2023): 46–56. http://dx.doi.org/10.55529/jmc.41.46.56.

Full text
Abstract:
The exertion of power is interwoven with the concept of the loss of the real in Don DeLillo’s White Noise (1985). The present study aims to survey the relations between power and loss of the real in this novel based on Jean Baudrillard's postmodern theories of hyperreality and simulation, and Michel Foucault's theories of power discourses and resistance. As a qualitative, research-based study, this article highlights discourses of power like media, advertising, supermarkets and medical technology to show how reality is concealed and hyperreality takes its place in the novel. According to Fouca
APA, Harvard, Vancouver, ISO, and other styles
43

Abukhalil, Tamer, Harbi Almahafzah, Malek Alksasbeh, and Bassam A. Y. Alqaralleh. "Power Optimization in Mobile Robots Using a Real-Time Heuristic." Journal of Robotics 2020 (February 11, 2020): 1–8. http://dx.doi.org/10.1155/2020/5972398.

Full text
Abstract:
Mobile robots typically run using finite energy resources, supplied by finite batteries. The limitation of energy resources requires human intervention for recharging the batteries. To reduce human intervention, this work focuses on coordinating power in a group of robots. A power optimization subroutine provides some sense of distribution of power by the control unit (CU). A variety of on-board sensors, actuators, and communication modules are controlled by a heuristic-based controller class allowing such components to conserve the current taken from the attached power source. Using the propo
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Xinran, Peng Wu, Yulin Hu, Xuan Cai, Qinghua Song, and Hu Chen. "Joint Trajectories and Resource Allocation Design for Multi-UAV-Assisted Wireless Power Transfer with Nonlinear Energy Harvesting." Drones 7, no. 6 (2023): 354. http://dx.doi.org/10.3390/drones7060354.

Full text
Abstract:
In this work, we explore a multi-UAV-assisted wireless power transfer (WPT) network, where multiple UAVs are deployed to provide WPT services to multiple ground devices (GDs) in order to extend their lifespan. To enhance the WPT efficiency while considering fairness, we investigate the joint trajectories and transmit power design. For fairness-aware consideration, our objective is to maximize the harvested energy of the GD with the worst condition, taking into account UAV mobility, anti-collision, and power budget constraints. Unlike previous works that focus on the simplified linear energy ha
APA, Harvard, Vancouver, ISO, and other styles
45

Mathuriya, Aniket, Pushpraj Pal, and Lovedeep Grover. "Stability Aware Routing in Mobile Ad-Hoc Networks using multiple Route." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 163–70. http://dx.doi.org/10.24297/ijct.v2i3c.2716.

Full text
Abstract:
Previous work on routing in MANETs has resulted innumerous routing protocols that aim at satisfying constraints such asminimum hop or low energy. Existing routing protocols often fail todiscover stable routes between source and sink when route availabilityis transient, i.e., due to mobile devices switching their network cardsinto low-power sleep modes whenever no communication is takingplace. In this thesis, we introduce a new approach stability awaresource routing protocol that is capable of predicting the stability (i.e.,expiration time) of multiple routes. Proposed protocol selects the rout
APA, Harvard, Vancouver, ISO, and other styles
46

Tawfeeq, E. Abdoulabbas, and M. Mahmoud Sawsan. "Power consumption and energy management for edge computing: state of the art." TELKOMNIKA 21, no. 04 (2023): 836–45. https://doi.org/10.12928/telkomnika.v21i4.24350.

Full text
Abstract:
Edge computing aims to make internet-based services and remote computing power close to the user by placing information technology (IT) infrastructure at the network edges. This proximity provides data centers with low-latency and context-aware services. Edge computing power consumption is mainly caused by data centers, network equipment, and user equipment. With edge computing (EC), energy management platforms for residential, industrial, and commercial sectors are built. Energy efficiency is considered to be one of the key aspects of edge power constraints. This paper provides the state of t
APA, Harvard, Vancouver, ISO, and other styles
47

Thirukrishna, J. T., S. Karthik, and V. P. Arunachalam. "Revamp energy efficiency in Homogeneous Wireless Sensor Networks using Optimized Radio Energy Algorithm (OREA) and Power-Aware Distance Source Routing protocol." Future Generation Computer Systems 81 (April 2018): 331–39. http://dx.doi.org/10.1016/j.future.2017.11.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

You, Sirui. "Public perception of wireless power transfer safety." F1000Research 13 (March 4, 2025): 651. https://doi.org/10.12688/f1000research.144261.2.

Full text
Abstract:
Background WPT information combines the power source with the load to provide energy through technology instead of using a wire. People are concerned about the safety and health implications of wireless power transfer even though it is already being used in devices like cell phones, electric cars, and medical devices. Methods Here this concern research work has used a survey method to gather information from a diverse group of people, focusing on various demographic factors and educational aspects. The research has analysed the knowledge of people regarding the application of wireless power tr
APA, Harvard, Vancouver, ISO, and other styles
49

Flores, Tarcísio Santos. "UM BREVE ESTUDO COMPARATIVO ENTRE AS ENERGIAS EÓLICA E NUCLEAR." Ciência e Natura 37 (June 18, 2015): 24. http://dx.doi.org/10.5902/2179460x18494.

Full text
Abstract:
http://dx.doi.org/10.5902/2179460X18494It is apparent the human need to use electricity in the current globalized world. And along with the social and industrial and beyond the everyday comfort evolution came the abuse of power. Aware that Brazil is used as an energy source originating from hydroelectric and that it does not include all domestic demand, should be studied energy sources that can assist it. Two clean and cheap energy alternatives which can contribute to reducing the environmental impacts such as global warming and water shortages are wind and nuclear energy. Which again, exhibit
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Jin, Cenzhe Zhu, Teck Yoong Chai, and Wai-Choong Wong. "SCAR: A Coding-Aware Routing Protocol with Self-Recommendation in Static Wireless Ad Hoc Networks." Journal of Computer Networks and Communications 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/637278.

Full text
Abstract:
There have been researchers working on the design of coding-aware routing protocols to exploit the power of network coding in static wireless ad hoc networks. However, most of them have overlooked the fact that routing decisions for multiple flows need to be coordinated in order to achieve maximum throughput. A mechanism to alter prior routing decisions is mandatory for this purpose. In this paper, we propose Self-recommendation coding-aware routing (SCAR), to provide such a mechanism. With intermediate nodes sensing the arrival of new flows, they can send self-recommendations to source nodes,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!