首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17篇
  免费   0篇
化学工业   3篇
机械仪表   1篇
轻工业   2篇
无线电   1篇
一般工业技术   2篇
自动化技术   8篇
  2021年   3篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2015年   1篇
  2014年   3篇
  2013年   1篇
  2012年   1篇
  2011年   1篇
  2009年   3篇
  2001年   1篇
排序方式: 共有17条查询结果,搜索用时 15 毫秒
11.
The deployment of wireless data broadcast to empower mobile information services as a resource-conserving means offers significant benefits due to the scalability feature offered by the technology. In this paper, we present a novel and holistic data broadcast management approach in 4 G wireless networks with multiple-input multiple-output (MIMO) antennae. The proposed scheme consists of three elements, namely: (i) broadcast ordering; (ii) Global indexing; and (iii) merging data structure. With the integration of these elements, we expect to obtain substantial efficiency for mobile computing clients when retrieving data on-air. We have experimentally evaluated the performance of the proposed model including comparison with the relevant schemes. The results from the experiments affirm the effectiveness of our proposed approach in respect to minimizing query access time and conserving energy utilization of the clients.  相似文献   
12.
In a decentralised system like P2P where each individual peers are considerably autonomous, the notion of mutual trust between peers is critical. In addition, when the environment is subject to inherent resource constraints, any efficiency efforts are essentially needed. In light of these two issues, we propose a novel trustworthy-based efficient broadcast scheme in a resource-constrained P2P environment. The trustworthiness is associated with the peer?s reputation. A peer holds a personalised view of reputation towards other peers in four categories namely SpEed, Correctness, qUality, and Risk-freE (SeCuRE). The value of each category constitutes a fraction of the reliability of individual peer. Another factor that contributes to the reliability of a peer is the peer?s credibility concerning trustworthiness in providing recommendation about other peers. Our trust management scheme is applied in conjunction with our trust model in order to detect malicious and collaborative-based malicious peers. Knowledge of trustworthiness among peers is used in our proposed broadcast model named trustworthy-based estafet multi-point relays (TEMPR). This model is designed to minimise the communication overhead between peers while considering the trustworthiness of the peers such that only trustworthy peer may relay messages to other peers. With our approach, each peer is able to disseminate messages in the most efficient and reliable manner.  相似文献   
13.
Dimensionality reduction is an important technique for preprocessing of high-dimensional data. Because only one side of the original data is represented in a low-dimensional subspace, useful information may be lost. In the present study, novel dimensionality reduction methods were developed that are suitable for metabolome data, where observation varies with time. Metabolomics deal with this type of data, which are often obtained in microorganism fermentation processes. However, no dimensionality reduction method that utilizes information from the original data in a positive manner has been reported to date. The ordinary dimensionality reduction methods of principal component analysis (PCA), partial least squares (PLS), orthonormalized PLS (OPLS), and regularized Fisher discriminant analysis (RFDA) were extended by introducing differential penalties to the latent variables in each class. A nonlinear extension of this approach, using kernel methods, was also proposed in the form of kernel-smoothed PCA, PLS, OPLS, and FDA. Since all of these methods are formulated as generalized eigenvalue problems, the solutions can be computed easily. These methods were then applied to intracellular metabolite data of a xylose-fermenting yeast in ethanol fermentation. Visualization in the low-dimensional subspace suggests that smoothed PCA successfully preserves the information about the time course of observations during fermentation, and that RFDA can produce high separation among different strains.  相似文献   
14.
Microsystem Technologies - The purpose of this work is to show the effects of drop impact on the creep-fatigue evolution of solder balls in an electronic device. Finite element method analysis was...  相似文献   
15.
Cycling LiCoO2 to above 4.5 V for higher capacity is enticing; however, hybrid O anion- and Co cation-redox (HACR) at high voltages facilitates intrinsic Oα (α < 2) migration, causing oxygen loss, phase collapse, and electrolyte decomposition that severely degrade the battery cyclability. Hereby, commercial LiCoO2 particles are operando treated with selenium, a well-known anti-aging element to capture oxygen-radicals in the human body, showing an “anti-aging” effect in high-voltage battery cycling and successfully stopping the escape of oxygen from LiCoO2 even when the cathode is cycled to 4.62 V. Ab initio calculation and soft X-ray absorption spectroscopy analysis suggest that during deep charging, the precoated Se will initially substitute some mobile Oα at the charged LiCoO2 surface, transplanting the pumped charges from Oα and reducing it back to O2− to stabilize the oxygen lattice in prolonged cycling. As a result, the material retains 80% and 77% of its capacity after 450 and 550 cycles under 100 mA g−1 in 4.57 V pouch full-cells matched with a graphite anode and an ultralean electrolyte (2 g Ah−1).  相似文献   
16.
This paper presents a lightweight middleware to be used for wireless medical body area networks. The middleware is designed to reside in mobile devices, and acts as a gateway to receive sensor data as well as to control a set of sensor devices attached to the wearer. The main essence of the middleware is to simplify and accelerate the development of wireless healthcare applications by providing highly reusable codes. The architecture of the middleware including its main functions such as data acquisition, dynamic plug-and-play capabilities, on-the-fly sensor reconfiguration, and resource management (i.e., sensor sleep/wake-up, critical self-wake) will be discussed. A security feature as a means to protect critical sensor data from malicious/unauthorized parties has also been incorporated in our proposed middleware. The prototype system of the middleware has been built and is presented in this paper together with its performance measurements.  相似文献   
17.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号