首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Mobile Networks and Applications - In wireless sensor networks (WSN), routing is quite challenging area of research where packets are forwarded through multiple nodes to the base station. The...  相似文献   

2.
1 Introduction Manycrucialapplicationssuchasteleconferencing ,distributedcomputingarebecomingfeasiblewithemerging high performancenetworkservices .ThesenetworkservicessuchasFDDI ,ATMandHIPPIpro videhighbandwidthandlowlatency .Forexample ,FDDIcouldoperateat 10 0Mb/s;Sonet/ATMOC 12couldoperateat 6 2 2Mb/s .Somehigh speedLANssuchasMyrinetandgigabit ethernet ,andSonet/ATMOC 4 8networkbackbonescanoperateat 1Gb/sandabove . However,thesehigh performancenetworkservicesareyettobefully…  相似文献   

3.
A Web‐based survey (N = 306) examined if Twitter use enhances individuals' news knowledge, and if so, how such effects might vary depending on their need for orientation (NFO) and the type of news (hard vs. soft). The duration of Twitter use positively predicted hard news knowledge, but only for those higher in NFO. In contrast, daily Twitter use had negative influence on high NFOs' soft news knowledge, with no corresponding effect for lows. Although high NFOs were more likely to use Twitter for information‐seeking than their less surveillance‐driven counterparts, such motivation did not facilitate knowledge gain. Systematic processing of public affairs information and selective avoidance were discussed as potential explanations for differential knowledge gain by high and low NFOs.  相似文献   

4.
Vector quantization (VQ) is an efficient technique for data compression and has been successfully used in various applications. The methods most commonly used to generate a codebook are the Linde, Buzo, Gray (LBG) algorithm, fuzzy vector quantization (FVQ) algorithm, Kekre‘s Fast Codebook Generation (KFCG) algorithm, discrete cosine transform based (DCT-based) codebook generation method, and k-principle component analysis (K-PCA) algorithm. However, if the separation boundaries in codebook generation are nonlinear, their performance can degrade fast. In this paper, we present a kernel fuzzy learning (KFL) algorithm, which takes advantages of the distance kernel trick and the gradient-based fuzzy clustering method, to create a codebook automatically. Experiments with real data show that the proposed algorithm is more efficient in its performance compared to that of the LBG, FVQ, KFCG, and DCT-based method, and to the K-PCA algorithm.  相似文献   

5.
《Mechatronics》2014,24(2):168-176
In this paper, we propose a human–robot cooperation controller for the motion of the upper limb exoskeleton. The system permits three degrees of freedom using an electrical actuator that is mainly controlled by force sensor signals. These signals are used to generate the torque required to drive the exoskeleton. However, singularities exist when the force signals in the Cartesian coordinate system are transformed into torques in the joint coordinate system. Therefore, we apply the damped least squares method. When handling a load, torque compensation is required about its mass. Therefore, we installed a force sensor at the point of the robot’s end-effector. It measures the forces between the exoskeleton and the load. Then, these forces are used to compensate within a static model for handling loads. We performed control stability and load handling experiments to verify the effectiveness of the controller. Via these, we confirmed the effectiveness of the proposed controller.  相似文献   

6.
Despite the seemingly obvious importance of a link between notions of place and the provision of context in location-based services (LBS), truly place-based LBS remain rare. Place is attractive as a concept for designing services as it focuses on ways in which people, rather than machines, represent and talk about places. We review papers which have extracted place-relevant information from a variety of sources, examining their rationales, the data sources used, the characteristics of the data under study and the ways in which place is represented. Although the data sources used are subject to a wide range of biases, we find that existing methods and data sources are capable of extracting a wide range of place-related information. We suggest categories of LBS which could profit from such information, for example, by using place-related natural language (e.g. vernacular placenames) in tracking and routing services and moving the focus from geometry to place semantics in location-based retrieval. A key future challenge will be to integrate data derived from multiple sources if we are to advance from individual case studies focusing on a single aspect of place to services which can deal with multiple aspects of place.  相似文献   

7.
8.
In this paper, we study optimal nonlinear pricing policy design for a monopolistic network service provider in the face of a large population of users of different types described by a given probability distribution. In an earlier work (Shen and Ba?ar in IEEE J. Sel. Areas Commun. 25(6):1216?C1223, 2007), we had considered games with symmetric information, in the sense that either users?? true types are public information available to all parties, or each user??s true type is private information known only to that user. In this paper, we study the intermediate case with information asymmetry; that is, users?? true types are shared information among the users themselves, but are not disclosed to the service provider. The problem can be formulated as an incentive-design problem, for which an ??-team optimal incentive (pricing) policy has been obtained, which almost achieves Pareto optimality for the service provider. A comparative study between games with information symmetry and asymmetry are conducted as well to evaluate the service provider??s game preferences.  相似文献   

9.
10.
This paper aims at answering the question whether it is practical to build a mesh-phone or not. A mesh-phone is a smartphone acting as a mesh router, i.e. either actively participating in the process of packet forwarding towards a mesh gateway, or acting itself as a gateway toward the Internet. Technical aspects of the mesh-phone implementation, such as design constraints and implementation details, are addressed. The technical feasibility is validated by describing the implementation of a prototype of the mesh-enabled phone over the OpenmokoTM open platform. Besides technical feasibility also convenience of the addressed solution is analyzed in terms of the consumed power, and some “energy-saving” related enhancements are suggested to be applied to future user’s devices.  相似文献   

11.
Journal of Signal Processing Systems - String sorting is a fundamental kernel of string matching and database index construction; yet, it has not been studied as extensively as fixed-length keys...  相似文献   

12.
Providing an efficient and stable communication framework of Vehicular Ad hoc Network (VANET) is an emerging issue. Most of conventional VANET communication schemes only support short range transmission, vehicles need to relay traffic data or frequently switch to different roadside units. Such an ad hoc-based method suffers a high jitter delay and makes it difficult to develop travel and real-time multimedia services, such as traffic information dissemination and fleet management. Fortunately, existing novel wireless technologies, e.g. WiMAX mobile multi-relay (MMR), provide long transmission range and high transmission rate in mobile environments. This study presents a Safety/Vehicular Information Delivery (SVID) framework, an application-layer VANET communication protocol. A power-abundant, large size vehicle, called SIP-based relay vehicle (SRV), e.g. long distance transportation bus, plays as a relay station (RS) providing the connectivity to other small vehicles around it. To provide VANET services in SVID, this work adopts a SIP-based mechanism. The proposed scheme can provide more efficient communication than conventional VANET ad hoc mode. Simulation results show that the proposed scheme achieves a low SIP transaction time, jitter delay, frame loss rate while avoiding the broadcast storm problem.  相似文献   

13.
• How will Year 2000 technology problems create acquisitions opportunities? • If we are heading towards deflationary times, will the Year 2000 problem further exacerbate the cycle? • What are the technology action items today, so we can be prepared to buy our competitors if the regulators shut them down? • If, due to the Millennium Bug, our targets fail as going concerns, what does it take to plug them into our technology environment? © 1998 John Wiley & Sons, Ltd.  相似文献   

14.
1 IntroductionTheInternethasrecentlybeenexperiencinganexplosivegrowthintheuseofreal timemultimediaservices.Real timemultimedia,asthenameim plies ,hastimingconstraints.Toavoidtheunac ceptabledelayintroducedbyretransmission ,real timemultimediaapplicationsusually preferUDP .However,aconsiderableamountof greedyUDPtrafficwoulddominatemuchnetworkbandwidth .Asaresult,theavailablebandwidthtoTCPconnec tionsisoppressedandtheirperformanceextremelydeteriorates.InorderforbothTCPandUDPses sionstof…  相似文献   

15.
Computer vision: a source of models for biological visualprocesses?   总被引:1,自引:0,他引:1  
This paper reviews some basic computer vision techniques and speculates about their possible relevance to the modeling of human visual processes. Special emphasis is given to image segmentation techniques and how they relate to processes of perceptual organization, such as those embodied in the Gestalt "laws."  相似文献   

16.
Management consultants appear to be particular knowledge workers that are characterised by an expert and self-sufficient profile. The aim of this research is to understand whether their professional characteristics still allow them to share knowledge and lead them to use a formal network (through a knowledge management system, kms) or an informal one (person-to-person). To study their kms using and sharing behaviour, a qualitative case study methodology was adopted, based on observation and multi-hierarchical ranking, multi-site, partly-structured interviews among consultants within the same consulting firm. The results firstly show that use and knowledge-sharing behaviours are differently influenced by practical and social characteristics; moreover, the social professional context of these self-sufficient experts encourages most of them to share knowledge within a more informal network.  相似文献   

17.
徐萌 《电子世界》2013,(6):137-138
<正>With the development of network technologies,people are no longer need to talk face to face;they can use telephone and internet.These telecommunication technologies develop very fast.It has already solved the problems of distance. In the 21th century,Telepresence can be a new style of communication technology. The advent of it gave people more  相似文献   

18.
According to uncertainty calculations, the values recorded by means of commercial monitoring systems are expected to be less accurate than those recorded by a system optimized for the measurement of electrical parameters—the so‐called dedicated system (DS). This study aims to verify if a larger expected uncertainty for commercial system (CS) actually turns into a larger spread of the measurements around the true value. In the Airport Bolzano Dolomiti plant, CS and DS are installed on the same photovoltaic arrays. The comparison performed considers the detailed uncertainty budget for the two systems using three performance indicators—energy, yield and performance ratio. Results show that the uncertainty level of the CS is much larger; for example, on performance ratio, it is about four times larger with respect to the optimized one (respectively ±16% and ±4%). Three sources mainly contribute to the uncertainty: measurements of irradiance, current and voltage. The measured values of the electrical parameter are compared in order to verify if the results of the budget calculations turn into a real difference. Results show that the CS is accurate in measuring current and voltage, respectively, ~2% and ~5% of difference from the DS, but not for irradiance—here, the difference is higher than 10%. In particular, the irradiance measured by the CS is systematically smaller; therefore, the performance ratio calculated through the CS is always overestimated and often larger than 100%. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

19.
Non-carbon-supported single-atom electrocatalysts (SACs) have attracted tremendous research interest for water splitting, owning to their remarkable differences in bond and coordination, and better and tunable catalytic performance, compared with those carbon-supported SACs and commercial catalysts. The electrocatalytic performance of these non-carbon-supported SACs is intimately related to the structure, surficial chemical groups, and vacancy defects of non-carbon host materials, as well as the physico-chemical properties and population of single atoms. The much widened range of host materials and types of single atoms create virtually limitless opportunities in the design of SACs with tunable structures and electrocatalysis behaviors. In this review, the recent progress of non-carbon-supported SACs for both oxygen evolution reaction (OER) and hydrogen evolution reaction (HER) is visited, where the unique local structures, electrocatalytic performance, catalytic centers and key preparation processes are presented. The characterizations down to atomic scales that can reveal the key local structures and catalytic mechanism are also investigated. New insights into the correlations between the structural evolution of these SACs during electrocatalytic reactions and their catalytic performance are examined. Finally, the major challenges faced by these new SACs are summarized, together with future perspectives on the rational design of superior non-carbon-supported SACs.  相似文献   

20.
Spatially single-mode lasing in the wavelength range of 1.25–1.28 μm was accomplished in injection lasers on GaAs substrates. The peak output power is 110 mW at room temperature, and the differential quantum efficiency amounts to 37%. The active region of the laser is formed by an array of self-organizing InAs quantum dots. __________ Translated from Fizika i Tekhnika Poluprovodnikov, Vol. 34, No. 1, 2000, pp. 117–120. Original Russian Text Copyright ? 2000 by Mikhrin, Zhukov, Kovsh, Maleev, Ustinov, Shernyakov, Kayander, Kondrat’eva, Livshits, Tarasov, Maksimov, Tsatsul’nikov, Ledentsov, Kop’ev, Bimberg, Alferov.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号