首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Rhodes  J.D. 《Electronics letters》1965,1(10):281-282
The simple commensurate URC? four-port unit element is defined, and the transfer matrix for a cascade of these elements is derived. It is shown that certain terminal connections will produce a two-port network with two short-circuited admittance parameters (transfer and one driving-point) which are rational in the normalised URC? complex frequency variable t = tanh ?s. The real-frequency transfer response is investigated, and typical responses for networks containing two elements are presented.  相似文献   

2.
The possibility of using a physical approach to the analysis of a special class of commensurate URC networks is considered. The convenience of this approach is proved by applying it to the derivation of Rhodes's conditions.  相似文献   

3.
An evaluation is given on the effects of MIS losses and parasitic notch inductance on the tuning-range compression of a voltage-controlled tunable distributed URC notch filter.  相似文献   

4.
Wireless Personal Communications - Due to the technology growth in the fifth Generation (5G) in the modern era, there is an urgent need for Ultra-Reliable Communications (URC). It is considered one...  相似文献   

5.
Mili?  M. Gmitrovi?  M. 《Electronics letters》1976,12(13):327-328
Computer-simulation results of the evaluation of the step response of uniformly distributed RC networks (URC networks) are presented, using Liou's procedure. The advantages of using the procedure include obviating the finding of poles of the transfer function and ease of accommodating boundary conditions, as well as good numerical control.  相似文献   

6.
In recent years, motivated by the emergence of ubiquitous computing technologies, a new class of networked robots, ubiquitous robots, has been introduced. The Ubiquitous Robotic Companion (URC) is our conceptual vision of ubiquitous service robots that provide users with the services they need, anytime and anywhere in ubiquitous computing environments. To realize the vision of URC, one of the essential requirements for robotic systems is to support ubiquity of services: that is, a robot service must be always available even though there are changes in the service environments. Specifically robotic systems need to be automatically interoperable with sensors and devices in current service environments, rather than statically preprogrammed for them. In this paper, the design and implementation of a semantic‐based ubiquitous robotic space (SemanticURS) is presented. SemanticURS enables automated integration of networked robots into ubiquitous computing environments exploiting Semantic Web Services and AI‐based planning technologies.  相似文献   

7.
Using the knowledge-based view of the firm as our theoretical underpinning, we study partnerships between industrial firms and university research centers (URCs) in order to identify facilitators of knowledge transfer, particularly focusing on how firms learn from URCs. Data for this study were obtained from senior-level executives from a random sample of one hundred and seventy-three firms located in the northeastern US. Results indicate that social connectedness, trust, URC technology transfer-intellectual property policies, technological relatedness and technological capability are significant facilitators of knowledge transfer. We also found that the type of knowledge transferred, i.e., explicit versus tacit, moderated these relationships. We conclude with implications for future research and R&D policy  相似文献   

8.
In this contribution we introduce an EXtrinsic Information Transfer (EXIT) chart matching technique for the design of two serially concatenated irregular codecs, each constituted by a variety of component codes. This approach facilitates a higher degree of design freedom than matching the EXIT function of an irregular codec to that of a regular codec, comprising only a single component code. As a result, a narrower EXIT chart tunnel can be created, facilitating operation at Eb/N0 values that are closer to the channel?s capacity bound. This is demonstrated for a serial concatenation of iteratively decoded Irregular Variable Length Coding (IrVLC) and Irregular Unity Rate Coding (IrURC), which is favourably compared with an IrVLC and regular Unity Rate Coding (URC) based benchmarker. Finally, we show that the iterative decoding complexity of our IrVLCIrURC scheme can be reduced by about 25% upon employing a method of jointly performing EXIT chart matching, while seeking a reduced iterative decoding complexity.  相似文献   

9.
With the advent of ubiquitous computing environments, it has become increasingly important for applications to take full advantage of contextual information, such as the user's location, to offer greater services to the user without any explicit requests. In this paper, we propose context‐aware active services based on context‐aware middleware for URC systems (CAMUS). The CAMUS is a middleware that provides context‐aware applications with a development and execution methodology. Accordingly, the applications based on CAMUS respond in a timely fashion to contextual information. This paper presents the system architecture of CAMUS and illustrates the content recommendation and control service agents with the properties, operations, and tasks for context‐aware active services. To evaluate CAMUS, we apply the proposed active services to a TV application domain. We implement and experiment with a TV content recommendation service agent, a control service agent, and TV tasks based on CAMUS. The implemented content recommendation service agent divides the user's preferences into common and specific models to apply other recommendations and applications easily, including the TV content recommendations.  相似文献   

10.
We present a novel multi-functional Multiple-Input Multiple-Output (MIMO) scheme, that combines the benefits of Space-Time Codes (STC), of Vertical Bell Labs Layered Space- Time (V-BLAST) scheme as well as of beamforming. To further enhance the attainable system performance and to maximise the coding advantage of the proposed transmission scheme, the system is also combined with multi-dimensional Sphere Packing (SP) modulation. Additionally, we quantify the capacity of the proposed multi-functional MIMO aided multi-dimensional SP arrangement and propose a novel technique of computing an upper limit on the achievable bandwidth efficiency of the system based on EXtrinsic Infomation Transfer (EXIT) charts. Further system performance improvements can be attained by serially concatenating our proposed scheme with an outer code together with a Unity-Rate Code (URC), where three different receiver structures are created by varying the iterative detection configuration of the constituent decoders/demappers. Moreover, the convergence behaviour of the proposed schemes is evaluated with the aid of EXIT charts. Explicitly, the three proposed systems are capable of operating within 0.9 dB, 0.6 dB and 0.4 dB of the maximum achievable rate limit. Additionally, the three stage assisted SP aided scheme is capable of outperforming its counterpart employing QPSK by 1 dB at a BER of 10?6.  相似文献   

11.
MPLS技术是一项具有多协议支持的技术,它综合利用了网络核心的交换技术和网络边缘的IP路由技术各自的优点,它将标记分配给多协议的数据桢以便在基于我展品信元的网络中传输。它能够提供现有传统IP路由技术所不能支持的要求保障QoS的业务,通过MPLS技术,我们可以提供各种新兴的增值业务,有效的实施流量工程和计费管理措施,扩展和完善更高等级的基础服务。  相似文献   

12.
Ubiquitous computing applications or widespread robots interactions execute in unforeseen environments and need to adapt to changeful available services, user needs, and variations of the environment. Context-awareness ability addresses such a need, enabling, through adaptation rules, applications to react to the perceived dynamic variations. Responses to adaptation have to be quick enough to maximize the time during which the application is coherent with its environment. Adaptation rules, associating variations of the environment to application reactions, are usually established at design time. However, in unforeseen and partially anticipated environments, we claim that adaptation rules have to be dynamically extensible to match previously unexpected variations. Our approach enables rule composition and ensures a deterministic result. We propose to use parameter adaptation to quickly respond to environmental variations and dynamic compositional adaptation to provide extensibility to the parameter adaptation. To foster even lower response times, we internalize context-awareness processing and decision into the application.  相似文献   

13.
In the Paper, we proposed a threshold mult- proxy multi-signature with share verification.In the scheme,a subset of original signers allows a designated group to proxy signers to sign on behalf of the original group, A message m has to be signed of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group.A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature.In othe words,some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a messagye or to verify the proxy signature.  相似文献   

14.
Technical communicators need to be prepared for the challenges of international communication. This tutorial focuses on the need for technical communication faculty to prepare students to be skilled intercultural communicators and to play a role on the translation team. The tutorial begins with a discussion of the importance of writing for translation in the international workplace and then presents specific assignments designed to instruct students in intercultural communication and give them experience writing for translation. In addition to introducing students to the cultural issues that impact the creation of documentation for international audiences, these assignments also serve to reinforce core skills recognized as vital to professional success in the field of technical communication. Taken together, these assignments can be used as the basis for a course in international technical communication. An appendix to the tutorial includes numerous resources available to faculty who want either to develop a course in international technical communication or to include some of the assignments in existing technical communication courses.  相似文献   

15.
遗留系统是企业建立新信息系统时,面临的首要问题。在简单介绍了中间件技术的基础上,提出利用中间件技术通过构件化实现对遗留系统改造的方法,改造过程包括4个阶段:恢复遗留系统的软件体系结构;设计目标系统的软件体系结构;重新构造目标系统的构件;实现基于构件的目标系统。实践证明,该方法对遗留系统的再工程具有较大的实用价值。  相似文献   

16.
In this article, a novel approach to sensing static electric fields has been presented. The approach is extremely interesting due to the low cost of the technology and the simplicity of the architecture. The purpose of the article is to highlight the strategic role of behavioral models in the development and design of E-field sensors. It is important to observe that simulation results must always be supported by experimental evidence to confirm the predicted behaviors. A good solution to perform a reliable investigation, if allowed, is to model the main blocks of the system separately and at the same time to experimentally assess their real behavior to confirm theoretical expectations.  相似文献   

17.
以PMBOK项目管理思想为基础,结合集成类IT项目的具体实践,经过多个项目摸索,寻找CMMI模型与集成类IT项目管理过程之间的映射关系.在此基础上进行归纳、总结、提炼,提出了一个初步的、基于CMMI模型的集成类IT项目管理体系架构.  相似文献   

18.
Mobile ad-hoc networks require nodes to cooperate in the relaying of data from source to destination. However, due to their limited resources, selfish nodes may be unwilling to forward packets, which can deteriorate the multi-hop connectivity. Different reputation-based protocols have been proposed to cope with selfishness in mobile ad-hoc networks. These protocols utilize the watchdog detection mechanism to observe the correct relaying of packets, and to compile information about potential selfish nodes. This information is used to prevent the participation of selfish nodes in the establishment of multi-hop routes. Despite its wide use, watchdog tends to overestimate the selfish behavior of nodes due to the effects of radio transmission errors or packet collisions that can be mistaken for intentional packet drops. As a result, the availability of valid multi-hop routes is reduced, and the overall performance deteriorates. This paper proposes and evaluates three detection techniques that improve the ability of selfishness prevention protocols to detect selfish nodes and to increase the number of valid routes.  相似文献   

19.
自循迹小车沿不同特征的曲线轨道运行,运行轨迹直接决定了小车能否快捷到达目的地.本文以高清摄像头捕获小车运行坐标,再利用LabVIEW根据坐标数组绘制运行轨迹,根据背景差分法对比轨道图和实际小车运行轨迹图,实现快速获得当前曲线特征的轨道对应的PID控制参数.  相似文献   

20.
Organizational transformations have been widely adopted by firms who wish to improve their competitive advantage to be better prepared to face external challenges. This research has chosen Communities of Practice (CoPs) as the subject of discussion for an assessment model to reform organizations that undertake CoPs for collective knowledge to enhance their core competencies. Given the interrelationships between criteria, this research uses the nonadditive fuzzy integral to develop a framework for the CoPs performance assessment. The purposes of this paper are to identify the key dimensions/criteria in the CoPs, to use fuzzy logic method to analyze the relative importance of each criterion, and to rank the criteria so that proper resources can be allocated while managing the CoPs. Through interviews with experts, four strategy alternatives and 16 criteria along four dimensions are generated. A survey of the CoPs practitioners is then conducted to compare the results of each criterion. The results will not only help organizations that intend to initiate changes via the CoPs activities to decide the ranking of their appraisal criteria, but it can also assist them in guiding the behavior of their staff while effectively monitoring and improving the performances of the CoPs  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号