scispace - formally typeset
Search or ask a question

Answers from top 10 papers

More filters
Papers (10)Insight
Open accessProceedings ArticleDOI
Ping Wang, ZhangBin Chen 
01 Apr 2017
So NTP protocol is not suitable for wireless sensor networks.
We observe that the NTP offset can accurately indicate the network congestion, measured from the monitoring station to the NTP server.
In addition, when the temperature is below 150 °C especially at 120 °C, the regeneration efficiency of air-fed NTP is lower than oxygen-fed NTP, nevertheless, when the temperature is above 150 °C, air-fed NTP has a superiority in regeneration and the higher the temperature is, the more obvious the superiority will be.
Proceedings ArticleDOI
16 Jul 2018
12 Citations
Importantly, time shifting attacks on NTP are possible even if all NTP communications are encrypted and authenticated.
The service aims at broad applicability rather than low uncertainty and can provide traceability to any networked computer that is configured as an NTP server.
We propose a round-trip hop-counts-capable NTP server response for the accurate selection of the nearest server.
Results show that the nTP method produces superior devices in which the electrical transport in nTP devices occurs through the 1,8-octanedithiol molecules.
Therefore, a facile and efficient synthesis of NTP analogues is required.
Dually, HLC can be used in lieu of physical/NTP clocks since it maintains its logical clock to be always close to the NTP clock.
The procedures reported so far are lengthy and cumbersome and do not enable the simultaneous determination of NTP.

See what other people are reading

How to measure the time using internet in Vietnam?
5 answers
To measure time using the internet in Vietnam, various studies provide insights. An essential aspect is the development of a time server for space surveillance systems, ensuring accurate timing for astrometry measurements. Additionally, research on internet banking in Vietnam highlights the impact of internet indicators on bank profitability, particularly through increased income from service activities, albeit with a lag time of over 3 years. Furthermore, factors influencing customer intention towards internet banking services in Vietnam include perceived usefulness, ease of use, credibility, behavioral control, subjective norms, and attitude toward use, as identified in an extended technology acceptance model study. These findings collectively contribute to understanding and measuring time spent on the internet in Vietnam.
How to decide concentration of niacinamide for skincare?
5 answers
To determine the concentration of niacinamide for skincare products, various methods can be employed. Studies have utilized techniques such as liquid-liquid extraction, high-performance liquid chromatography (HPLC), and differential spectrophotometry to analyze niacinamide content in cosmetics and creams. Additionally, formulations containing niacinamide have been evaluated for their quality using methods like determination of niacinamide content by HPTLC and assessment of physical properties such as spreadability and consistency. Furthermore, research has focused on optimizing carrier systems like niosomes to enhance the penetration of niacinamide into the skin, with formulations showing increased skin penetration efficiency based on varying concentrations of Span 60 in the niosome system. These studies collectively provide insights into determining the optimal concentration of niacinamide for effective skincare formulations.
What is TCP and UDP?
4 answers
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two fundamental transport layer protocols used for communication. TCP is connection-oriented, ensuring reliable end-to-end connections with mechanisms like congestion control and packet reordering. On the other hand, UDP is connectionless, employing a send-and-forget mechanism without the overhead of connection setup or reliability features. While TCP accounts for a significant portion of network traffic, UDP's share is increasing due to real-time and multimedia applications. Studies have shown that UDP flows can impact TCP performance by capturing network resources, leading to a decrease in TCP's efficiency. Understanding the characteristics and differences between TCP and UDP is crucial for optimizing network performance and resource utilization in various communication scenarios.
Can the implementation of a ticketing system improve the accuracy and timeliness of disaster reporting?
5 answers
The implementation of a ticketing system can indeed enhance the accuracy and timeliness of disaster reporting. By integrating machine learning with traditional ticketing systems, businesses can optimize operational efficiency in customer service departments, leading to improved response times and productivity. Additionally, geographically distributed ticket servers can prioritize network flows related to disaster response, military operations, or emergencies, ensuring timely and accurate handling of critical information. Moreover, the use of electronic ticketing systems can streamline ticket reporting processes, resulting in more effective recording systems and increased ticket numbers, as seen in the case of PT. Astra Otoparts Tbk.. These findings collectively suggest that the adoption of ticketing systems can significantly enhance the accuracy and timeliness of disaster reporting processes.
How does offsite construction contribute to faster recovery times in disaster affected areas?
5 answers
Offsite construction methods, such as modular construction, play a crucial role in expediting recovery times in disaster-affected areas. These methods offer time-efficiency efficiency advantages by reducing the need for on-site labor, overcoming local labor constraints, and enhancing productivity in a controlled environment^[Context_4. Additionally, offsite construction allows for concurrent and non-seasonal work, leading to shorter schedules, reduced site congestion, and improved labor productivity, akin to an assembly line process. By leveraging offsite construction technologies, post-disaster housing reconstruction can be accelerated, providing quick and efficient solutions for temporary and permanent housing needs in the aftermath of natural disasters.
What is a freeway?
5 answers
A freeway is a type of high-speed road designed for uninterrupted traffic flow, typically connecting major urban areas and facilitating long-distance travel. Freeways are part of a larger highway system, such as the Interstate Highway System in the United States, which was meticulously planned to enhance transportation efficiency and reduce travel times and costs. Freeways often incorporate advanced features like heating/cooling fluid systems for road surfaces to improve safety and performance. Additionally, innovative models like Freeway have been developed to optimize network capacity and data transfer speeds over high-bandwidth inter-DC WANs, addressing issues like packet loss and flow control bottlenecks. Overall, freeways play a crucial role in modern transportation networks, shaping the spatial organization of regions and influencing travel patterns globally.
What is the effect of colupulone on the taste and aroma of beer?
5 answers
Colupulone, a hop beta-acid, undergoes thermal treatment during wort boiling, leading to the formation of various bitter-tasting transformation products such as cohulupone, hulupinic acid, and tricyclocolupone derivatives. These compounds contribute significantly to the bitterness of beer, with recognition thresholds ranging from 7.9 to 90.3 micromol/L. Cohulupone and hydroxytricyclocolupone exhibit distinct bitter profiles, with cohulupone imparting a short-lasting bitterness similar to iso-alpha-acids, while hydroxytricyclocolupone provides a long-lasting, harsh bitterness perceived on the posterior tongue and throat. Additionally, the oxidation of colupulone results in the formation of spiroacetal and furanone derivatives, explaining their presence in aged hops. The bittering effect of colupulone and its transformation products significantly influences the taste and aroma profile of beer, highlighting the importance of hop chemistry in brewing processes.
Is SmartPLS NFI 0.47 acceptable?
5 answers
The Normalized Fit Index (NFI) of 0.47 in SmartPLS may not be considered acceptable as it indicates a relatively low level of fit for the model. SmartPLS is a tool primarily used for statistical analysis, particularly in fields like information technology, marketing, and human resources. It has significantly contributed to the popularity of Partial Least Square Structural Equation Modeling (PLS-SEM) due to its user-friendly interface. However, the fit indices generated by SmartPLS, such as NFI, play a crucial role in evaluating the model's robustness and validity. Therefore, a NFI value of 0.47 might suggest that the model may need further refinement or adjustment to improve its overall fit and reliability for accurate statistical analysis.
What is the state of the art in cybersecurity monitoring?
10 answers
The state of the art in cybersecurity monitoring encompasses a broad spectrum of technologies and methodologies designed to protect digital infrastructures and ensure the secure operation of systems. At the forefront, cybersecurity monitoring devices have evolved to detect electromagnetic (EM) fields emanating from electrical cables, enabling the monitoring of data transmission without direct electrical contact. This advancement allows for the decoding of signals across different communication protocols, enhancing the ability to detect and report potential security breaches remotely. In the realm of critical infrastructures, the integration of cyber components necessitates a resilient cybersecurity framework that assesses the potential impacts of cyberattacks on both cyber and physical systems. This involves aggregating diverse modeling and simulation-based approaches to characterize the impact of attacks, guiding future impact analysis studies. Network Security Monitoring (NSM) systems play a pivotal role in detecting security incidents by monitoring network events, with a taxonomy developed to assess current NSM tools and identify challenges in modern network deployments, such as Software Defined Networks (SDN) and the Internet of Things (IoT). Cybersecurity monitoring extends to the electrical power grid, where monitoring nodes generate time-series data to assess the operation of grid components. This data is used to rank components based on risk, enabling focused monitoring of critical components to detect cyber-attacks or faults. Trap-based monitoring systems have also been identified as an efficient method for inferring Internet threat activities, utilizing sensors to detect and analyze cyberattacks. Innovative approaches include the use of AI techniques in avionics and critical control systems for cybersecurity monitoring, learning to predict normal behaviors and outputs to detect deviations indicative of cyber intrusions. The flexibility of Network Security Monitors (NSMs) has been enhanced to accommodate the diversity of packet-oriented layers below TCP/IP, improving the performance and integration of lower-layer protocol dissectors. The economic aspect of cybersecurity monitoring is highlighted by the development of dynamic IoT architectures for industrial NSM, offering significant savings in installation and operation costs while promoting environmentally friendly operations. The commercial sector's contribution to cybersecurity monitoring is underscored by the identification of new products and trends, facilitating the relationship between commercial developments and military applications. Collectively, these advancements represent the cutting edge in cybersecurity monitoring, addressing both technical and economic challenges to protect against the ever-evolving landscape of cyber threats.
Can transfer learning be used to improve the efficiency and effectiveness of edge computing for face recognition?
9 answers
Transfer learning has emerged as a pivotal technique in enhancing the efficiency and effectiveness of edge computing for face recognition tasks. By leveraging pre-trained models and adapting them to new, but related tasks, transfer learning can significantly reduce the computational resources required, which is crucial for edge devices with limited processing capabilities. The EdgeFace network, inspired by the hybrid architecture of EdgeNeXt, demonstrates how combining CNN and Transformer models with a low-rank linear layer can achieve high face recognition accuracy optimized for edge devices, showcasing the potential of sophisticated model architectures in edge computing scenarios. Moreover, the practice of face recognition, which is widely applied in various sectors, benefits from deep learning advancements, particularly CNNs. The use of pre-trained CNN models like VGG16, ResNet-50, and MobileNet through transfer learning has shown promising results in face recognition, indicating the effectiveness of leveraging deep learning in edge computing environments. Additionally, the proposal of a face recognition-based video retrieval system for edge computing environments further underscores the practical applications of these technologies in real-world scenarios. The efficiency of transfer learning is highlighted by the ETL technique, which retains only cross-task aware filters from a pre-trained model, resulting in a sparse transferred model. This approach not only reduces the size and inference time of the model but also retains high accuracy, demonstrating the potential for lightweight yet effective face recognition models on edge devices. Similarly, incorporating transfer learning into vehicular edge networks has shown to improve the agility of environment construction for computation-intensive tasks, further validating the approach's utility in edge computing. Facial Expression Recognition (FER) systems also benefit from transfer learning, with the EfficientNet architecture achieving high accuracy on small datasets, showcasing the technique's power in enhancing model performance with limited data. Lastly, the application of transfer learning in a Siamese network for face recognition further illustrates its versatility and effectiveness in improving recognition rates, even in challenging conditions. In conclusion, transfer learning significantly enhances the efficiency and effectiveness of edge computing for face recognition by enabling the use of advanced deep learning models on devices with limited computational resources, thereby facilitating real-time, accurate, and efficient face recognition applications.
What is the importance of management support in IT integration post M?
4 answers
Management support plays a crucial role in IT integration post M&A activities. The success of post-merger information systems integration heavily relies on effective decision-making processes and management backing. Additionally, the provision of appropriate information systems and technologies is vital for the effectiveness and sustainability of standardized corporate management systems. Furthermore, monitoring and management support are essential for maintaining enterprise integration, especially in scenarios where different applications and services are involved, requiring comprehensive monitoring mechanisms. Moreover, a management support method involving the operation of reference servers and applications is highlighted as a key element in ensuring continuous operation and decision-making in IT management. Overall, top management team support is identified as a critical factor for the success of management control systems innovations, emphasizing the importance of TMT belief and participation in MCS innovations.