首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38篇
  免费   0篇
无线电   25篇
自动化技术   13篇
  2010年   3篇
  2001年   1篇
  1998年   2篇
  1997年   1篇
  1995年   2篇
  1994年   1篇
  1993年   4篇
  1992年   2篇
  1991年   1篇
  1989年   5篇
  1987年   3篇
  1985年   1篇
  1983年   1篇
  1982年   1篇
  1979年   3篇
  1977年   4篇
  1976年   2篇
  1975年   1篇
排序方式: 共有38条查询结果,搜索用时 45 毫秒
1.
The RC filter-hard limiter-RC filter nonlinear system is the subject of this paper. Because of computational difficulties implicated in the analysis of the above system, only its response to the zero mean Gaussian system input has been analytically investigated. An approximate output density has also been found for nonzero mean Gaussian, while verified to be “close” to the real one for finite means. In the present paper, a close form of the system output density is obtained when the input mean tends to infinity. For that, ε-upcrossing methods were used.  相似文献   
2.
We consider the case where data sequences may be generated by either one of a number of non-parametrically defined processes and where the data generating process may change at any point in time. The objective is to effectively track the latter changes, where each acting process is essentially represented by a whole class of parametrically defined processes. We present, analyze and evaluate robust sequential algorithms which attain the objective for a variety of scenarios. Our robust algorithms consist of appropriate modifications of previously presented parametric sequential algorithms, to mainly resist the occurrence of occasional data outliers in terms of dramatic performance deterioration.  相似文献   
3.
We consider two mutually independent traffic streams whose arrivals are stored in an infinite capacity buffer. The two arrival traffics are modelled by renewal processes and are competing for service by a single processor, where one of the processes requires a strict upper bound on the total delay per arrival. It is assumed that the processing per arrival, for both processes, is a constant; the value of this constant is different for each of the two traffic streams. Given the above model, we consider policies that operate in a non-interruptive mode. We first find the optimal scheduling policy, which attains throughput one and minimizes the expected delays of both traffic streams. The delays induced by the latter policy are analysed via a methodology based on the regenerative theorem. The theoretical results are supported by numerical examples.  相似文献   
4.
Two feedforward neural structures intended for binary hypothesis testing are considered. The first structure, FFS1, is a tandem structure, while the second structure, FFS2, involves cumulative feedforward feedback. Both parametric and robust designs for the two structures are considered and analyzed in terms of induced false alarm and power probabilities. The inferiority of the FFS1 is rigorously proved in terms of the rate with which the induced power probability increases with respect to the number of the neural elements. Asymptotic results are presented, as well as numerical results, with emphasis on the Gaussian and location parameter nominal hypotheses model. Learning algorithms for the parameter involved in the robust network designs are discussed as well  相似文献   
5.
Two mutually independent traffic streams whose arrivals are modeled as renewal processes are considered. The arrivals are stored in an infinite capacity buffer. One of the processes requires a strict upper bound on the total delay per arrival, and it is assumed that the processing time per arrival for both processes is a constant. Given the above model, the class of nonpreemptive scheduling policies which satisfy the delay constraint while maintaining the system stability is found. The delays induced by the latter policy are analyzed via a methodology based on the regenerative theorem. A numerical example is given in which the policy that minimizes the expected delays for both traffic streams is also considered  相似文献   
6.
We examine the relation between the finite and the infinite population models for a class of random access algorithms. The algorithms in the class are a combination of random access and reservation techniques, they are synchronous, and they are studied under the condition that each of the users can monitor the channel feedback continuously (full feedback sensing). For any finite number of independent and identical users in the system, and any i.i.d. arrival process per user, the algorithms are stable, provided that the total input rate is less than one. However, as the population size increases, the stability of an algorithm in the class is determined by its throughput in the presence of the infinite population model for all practical purposes.  相似文献   
7.
The design of hybrid transmission algorithms for the multiplexing of voice and data over a common digital channel is of interest to various communication networks, including cellular radio and high-speed topologies. In environments where the characteristics of the voice and data traffics may vary dynamically, the issue is the deployment of hybrid multiplexing algorithms (HMAs) which satisfy the constraints imposed by the voice traffic, while they simultaneously attain high channel utilization and induce low implementation overhead. In this paper, we propose, evaluate, and compare two HMAs: a semidynamic and a dynamic. The former induces lower implementation overhead than the latter, but it is applicable only to environments where the rate of the voice traffic may vary relatively slowly and its statistics are parametrically known. The semidynamic HMA induces frame structures, where the capacity allocation per frame, for the voice versus data traffic, is dictated by a superimposed traffic monitoring algorithm. The dynamic HMA, on the other hand, assigns each channel slot to voice versus data packets dynamically; it requires no statistical knowledge about the voice traffic, at the expense of significantly increased implementation overhead.  相似文献   
8.
The authors propose and analyze a stable random access algorithm which is a modification of the two-cell algorithm proposed by M. Paterakis (1984). The authors assume ternary feedback broadcast per slot, and in the presence of capture, identification of the captured packet by all the users in the system. It is also assumed that a successfully received signal transmission cannot be distinguished from a capture in the presence of multiple transmission. The performance of the algorithm is compared to an appropriate modification of J.I Capetanakis' (1979) dynamic algorithm. The proposed algorithm, and in contrast to the latter, it can be easily modified to operate in limited feedback sensing environments  相似文献   
9.
In cellular radio, accessing requests are transmitted through signaling channels in the form of minipackets. The accessing requests are generated by a variety of mobile users that impose different constraints. The authors consider data and high-priority public-safety cellular users and isolate a single channel that is shared by the mixed user population. They devise and analyze a mixed protocol that satisfies the constraints of the high-priority public-safety users, while maintaining the data traffic with satisfactory delays. For the high-priority users, a well-defined and finite but bursty population and a number of different priorities are considered. The population of data users is assumed time-varying and not well-defined, and is modeled as limit Poisson and in the analysis of the protocol  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号