首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   55篇
  免费   0篇
化学工业   1篇
金属工艺   4篇
能源动力   1篇
轻工业   2篇
无线电   15篇
一般工业技术   10篇
冶金工业   11篇
自动化技术   11篇
  2022年   1篇
  2021年   2篇
  2018年   1篇
  2017年   3篇
  2014年   1篇
  2013年   4篇
  2012年   3篇
  2011年   1篇
  2010年   2篇
  2009年   1篇
  2008年   4篇
  2007年   2篇
  2006年   1篇
  2005年   2篇
  2004年   3篇
  2003年   2篇
  2002年   3篇
  2001年   2篇
  2000年   1篇
  1999年   2篇
  1998年   7篇
  1997年   4篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
排序方式: 共有55条查询结果,搜索用时 187 毫秒
51.
In this paper, the structure of a new system to broadcast multimedia information within a digital TV channel is outlined. The proposed scheme is based on the DSM-CC (digital storage media command and control) functions, and uses a newly developed protocol that allows to efficiently convey multimedia information. Such information has the same characteristics of HTML files used in WWW environments, as it may contain text, images, sounds and animation organized as hypertext. The transport structure used is the MPEG-2 transport stream, which is the most popular standardized platform for the development of new digital TV services. Prototype software was developed to encode the file system by means of DSM-CC operations and include it in a MPEG-2 compatible transport system  相似文献   
52.
Anonymity preserving pattern discovery   总被引:5,自引:0,他引:5  
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support threshold in frequent pattern mining. In this paper we show that this belief is ill-founded. By shifting the concept of k -anonymity from the source data to the extracted patterns, we formally characterize the notion of a threat to anonymity in the context of pattern discovery, and provide a methodology to efficiently and effectively identify all such possible threats that arise from the disclosure of the set of extracted patterns. On this basis, we obtain a formal notion of privacy protection that allows the disclosure of the extracted knowledge while protecting the anonymity of the individuals in the source database. Moreover, in order to handle the cases where the threats to anonymity cannot be avoided, we study how to eliminate such threats by means of pattern (not data!) distortion performed in a controlled way.  相似文献   
53.
54.
The energy dissipated to the surroundings as heat in a unit volume of material per cycle, Q, was recently proposed as fatigue damage index, and it was successfully applied to rationalise fatigue data obtained by carrying out stress‐controlled and strain‐controlled fatigue tests on AISI 304 L stainless steel plain and hole specimens. In this paper, it is shown that the Q parameter is independent on thermal and mechanical boundary conditions occurring during experiments. After that, additional stress‐controlled fatigue tests on plain and notched specimens characterised by smaller notch tip radii than those tested previously have been performed. Present data have been compared with previous ones, and it was found that all available results can be synthesised in terms of the energy parameter Q into a unique scatter band, independently on the testing conditions (stress‐controlled or strain‐controlled) and on the specimens' geometry (plain or notched). About 100 data were included in the statistical analysis to characterise the energy‐based scatter band of the material. Finally, some limitations of applicability of the experimental technique adopted in the present paper are discussed.  相似文献   
55.
In this paper we consider the scenario of a Multi-Homed Hybrid Ad Hoc Network, which consists of self-organized and self-configured mobile nodes that make use of two or more fixed gateways to connect to the Internet. Accordingly, different network segments are formed, each one associated with a different gateway. A node can maintain its connectivity to the Internet when moving from a network to another by performing handover procedures and changing its gateway to the Internet. This scenario is quite interesting for its capacity of increasing the geographical extension of a single mobile network. Within this scenario we focus on the modelling of the node connectivity, which is of practical interest for the design of rate control algorithms for multimedia streaming systems. We consider a network structure with gateways placed in a honey cell structure, where nodes move according to the RDMM (Random Direction Mobility Model). We then derive the probabilities for a node to change the route to connect to the Internet and to handover from a network to another, which both cause service interruptions that heavily affect the quality in multimedia streaming services. Numerical results show the accuracy of the proposed theoretical model with respect to simulated data and reveal the benefits of the model in controlling playback buffer starvation occurrences during video streaming.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号