首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   63篇
  免费   8篇
  国内免费   1篇
化学工业   7篇
金属工艺   1篇
机械仪表   2篇
建筑科学   1篇
矿业工程   1篇
能源动力   7篇
轻工业   20篇
水利工程   1篇
无线电   9篇
一般工业技术   5篇
自动化技术   18篇
  2023年   2篇
  2022年   2篇
  2021年   6篇
  2020年   8篇
  2019年   2篇
  2018年   4篇
  2017年   8篇
  2016年   7篇
  2015年   4篇
  2014年   1篇
  2013年   5篇
  2012年   12篇
  2011年   3篇
  2010年   1篇
  2009年   2篇
  2008年   1篇
  2007年   2篇
  2005年   1篇
  1999年   1篇
排序方式: 共有72条查询结果,搜索用时 15 毫秒
51.
Frequently used approaches to solve discrete multivariable optimisation problems consist of computing solutions using a continuous optimisation technique. Then, using heuristics, the variables are rounded-off to their nearest available discrete values to obtain a discrete solution. Indeed, in many engineering problems, and particularly in analogue circuit design, component values, such as the geometric dimensions of the transistors, the number of fingers in an integrated capacitor or the number of turns in an integrated inductor, cannot be chosen arbitrarily since they have to obey to some technology sizing constraints. However, rounding-off the variables values a posteriori and can lead to infeasible solutions (solutions that are located too close to the feasible solution frontier) or degradation of the obtained results (expulsion from the neighbourhood of a ‘sharp’ optimum) depending on how the added perturbation affects the solution. Discrete optimisation techniques, such as the dynamic rounding-off technique (DRO) are, therefore, needed to overcome the previously mentioned situation.

In this paper, we deal with an improvement of the DRO technique. We propose a particle swarm optimisation (PSO)-based DRO technique, and we show, via some analog and RF-examples, the necessity to implement such a routine into continuous optimisation algorithms.  相似文献   
52.
Long term evolution (LTE) Advanced is a well designed system that meets the requirements of 4G cellular systems. Its standard specification has been lately released. One of its main features is supporting relaying topology inspired from ad hoc multihop networks. This paper is a survey upon the relaying architecture of LTE Advanced standard based on 3GPP Release 10 specifications. A comparison with other relaying architectures, i.e. IEEE 802.16m and IEEE 802.11s is handled. The originality of this work is in involving comparison with multihop architecture supported by IEEE 802.11s based wireless mesh networks. Several similarities are noted and differences are pointed out.  相似文献   
53.
Overlay networks support a wide range of peer-to-peer media streaming applications on the Internet. The user experience of such applications is affected by the churn resilience of the system. When peers disconnect from the system, streamed data may be delayed or lost due to missing links in the overlay topology. In this paper, we explore a proactive strategy to create churn-aware overlay networks that reduce the potential of disruptions caused by churn events. We describe Chams, a middleware for constructing overlay networks that mitigates the impact of churn. Chams uses a ??hybrid?? approach??it implicitly defines an overlay topology using a gossip-style mechanism, while taking the reliability of peers into account. Unlike systems for overlay construction, Chams supports a variety of topologies used in media streaming systems, such as trees, multi-trees and forests. We evaluate Chams with different topologies and show that it reduces the impact of churn, while imposing only low computational and message overheads.  相似文献   
54.

Information systems and cloud computing infrastructures are frequently exposed to various types of threats. Without detection and prevention mechanisms, the threats can materialize and cause different types of damages that usually lead to significant financial losses. The threats arise from a complex and multifaceted environment. Currently, organizations are struggling to identify the threats to their information assets and assess the overall damage they might inflict to their systems. In order to empower mangers to better plan for shielding their information systems, the paper presents two main contributions. First, a new approach to threat classification that leads to a security assessment model that is systematic, extendable, and modular. Second, a quantitative analysis of information systems based on the model.

  相似文献   
55.
Wireless mesh networks (WMNs) have acquired recently enormous attention and momentum; therefore, security aspects have been a fundamental concern for them. Among catastrophic threats on WMNs, Denial‐of‐Service attacks that have become a severe danger because of their plug‐and‐play structural design. Unfortunately, preventing a Denial‐of‐Service attack presents a challenging issue. This fact is induced with the appearance of the source IP addresses spoofing. The resolution key of this issue is to reveal the attack source based on the path through which the attack packet passes. For this, many researchers in IP traceability field propose various methods and techniques to deal with the issue. In this article, we conceive a novel approach named out of band IP traceback approach in WMN (IEEE 802.11s). We create a new architecture using signaling messages for discovering the real source(s) of IP packets. Our solution is based on a security‐oriented signaling protocol. This protocol allows specialized signaling entities to communicate via reliable signaling information. This fact permits us to perform a simple and efficient traceback. In our novel approach, we use 2 radios: the first one transmits normal data packets whereas the second is reserved to exchange IP traceback information. The performance of the proposed scheme is analyzed via simulation analysis using the Network Simulator 3. The simulation results show that our scheme is efficient in dealing with the traceback problem in WMN environments.  相似文献   
56.
57.
Afif  Mouna  Ayachi  Riadh  Said  Yahia  Atri  Mohamed 《Neural Processing Letters》2020,51(3):2827-2837
Neural Processing Letters - Recognizing indoor scene and objects and estimating their poses present a wide range of applications in robotic field. This task becomes more challenging especially in...  相似文献   
58.
Sn-doped In2S3 thin films are deposited on Pyrex. Tin is incorporated in the solution using SnCl2·2H2O. The properties of the films are investigated by X-ray diffraction (XRD), atomic force microscopy, scanning electron microscopy, spectrophotometry, and thermally stimulated current (TSC) measurements. XRD analysis reveals that the films become almost amorphous when tin exceeds well determined optimum quantity. The investigation of optical properties shows that the band gap depends on the value of the Sn concentration. It is also observed that upon adding the optimum quantity of tin, the maximum of the TSC intensity increased by 2 orders of magnitude. These results are discussed with respect to introduce the effect of tin incorporated in the physical properties.  相似文献   
59.
Radiation exchanges must be taken into account to improve the prediction of heat fluxes in turbulent combustion. The strong interaction with turbulence and its role on the formation of polluting species require the study of unsteady coupled calculations using Large Eddy Simulations (LESs) of the turbulent combustion process. Radiation is solved using the Discrete Ordinate Method (DOM) and a global spectral model. A detailed study of the coupling between radiative heat transfer and LES simulation involving a real laboratory flame configuration is presented. First the impact of radiation on the flame structure is discussed: when radiation is taken into account, temperature levels increase in the fresh gas and decrease in the burnt gas, with variations ranging from 100 K to 150 K thus impacting the density of the gas. Coupling DOM and LES allows to analyze radiation effects on flame stability: temperature fluctuations are increased, and a wavelet frequency analysis shows changes in the flow characteristic frequencies. The second part of the study focuses on the Turbulence Radiation Interaction (TRI) using the instantaneous radiative fields on the whole computational domain. TRI correlations are calculated and are discussed along four levels of approximation. The LES study shows that all the TRI correlations are significant and must be taken into account. These correlations are also useful to calculate the TRI correlations in the Reynolds Averaged Navier–Stokes (RANS) approach.  相似文献   
60.
Afif  Mouna  Ayachi  Riadh  Said  Yahia  Pissaloux  Edwige  Atri  Mohamed 《Neural Processing Letters》2020,51(3):2265-2279
Neural Processing Letters - Indoor object detection presents a computer vision task that deals with the detection of specific indoor classes. This task attracts a lot of attention, especially in...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号