首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85篇
  免费   0篇
电工技术   1篇
综合类   1篇
化学工业   11篇
金属工艺   2篇
机械仪表   8篇
轻工业   1篇
无线电   16篇
一般工业技术   8篇
原子能技术   2篇
自动化技术   35篇
  2023年   1篇
  2019年   4篇
  2017年   2篇
  2016年   13篇
  2015年   2篇
  2014年   2篇
  2013年   13篇
  2012年   5篇
  2011年   3篇
  2010年   3篇
  2009年   10篇
  2008年   8篇
  2007年   3篇
  2006年   3篇
  2005年   3篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1999年   3篇
  1998年   1篇
排序方式: 共有85条查询结果,搜索用时 0 毫秒
11.
12.
In this paper, we designed and implemented the active emergency call system for emergency call service actively. Active emergency call system has two physical components; E-Device (Emergency Mobile Device) and E-Server (Emergency Server). The role of E-Device is the mobile device in order to call emergency by using mild handicapped, the elderly and children who are able to communicate their intention to another. E-Server is the server for management E-Devices with realtime monitoring. E-Device will be developed to the portable size for easily mild handicapped, the elderly and children. When they need the service of emergency call, the button of E-Device can be used and the call signal is transmitted to the emergency office and the guardian through Internet and CDMA. E-Server should be developed the integrated control system for management of E-Devices basically. And it also supported to realtime monitoring of E-Devices with respect to high quality of emergency call service for rise the efficiency. And finally we describe the results of performance evaluation about the location error of E-Device between coordinate of GPS received signal and actual E-Device coordinate, when it has been called emergency, by using DEVS (Discrete Event System Specification) formalism.  相似文献   
13.

In recent years, various studies on OpenStack-based high-performance computing have been conducted. OpenStack combines off-the-shelf physical computing devices and creates a resource pool of logical computing. The configuration of the logical computing resource pool provides computing infrastructure according to the user’s request and can be applied to the infrastructure as a service (laaS), which is a cloud computing service model. The OpenStack-based cloud computing can provide various computing services for users using a virtual machine (VM). However, intensive computing service requests from a large number of users during large-scale computing jobs may delay the job execution. Moreover, idle VM resources may occur and computing resources are wasted if users do not employ the cloud computing resources. To resolve the computing job delay and waste of computing resources, a variety of studies are required including computing task allocation, job scheduling, utilization of idle VM resource, and improvements in overall job’s execution speed according to the increase in computing service requests. Thus, this paper proposes an efficient job management of computing service (EJM-CS) by which idle VM resources are utilized in OpenStack and user’s computing services are processed in a distributed manner. EJM-CS logically integrates idle VM resources, which have different performances, for computing services. EJM-CS improves resource wastes by utilizing idle VM resources. EJM-CS takes multiple computing services rather than single computing service into consideration. EJM-CS determines the job execution order considering workloads and waiting time according to job priority of computing service requester and computing service type, thereby providing improved performance of overall job execution when computing service requests increase.

  相似文献   
14.
15.
11β-Hydroxysteroid dehydrogenase type1 (11βHSD1) regulates the conversion from inactive cortisone to active cortisol. Increased cortisol results in diabetes, hence quelling the activity of 11βHSD1 has been thought of as an effective approach for the treatment of diabetes. Quantitative hypotheses were developed and validated to identify the critical chemical features with reliable geometric constraints that contribute to the inhibition of 11βHSD1 function. The best hypothesis, Hypo1, which contains one-HBA; one-Hy-Ali, and two-RA features, was validated using Fischer's randomization method, a test and a decoy set. The well validated, Hypo1, was used as 3D query to perform a virtual screening of three different chemical databases. Compounds selected by Hypo1 in the virtual screening were filtered by applying Lipinski's rule of five, ADMET, and molecular docking. Finally, five hit compounds were selected as virtual novel hit molecules for 11βHSD1 based on their electronic properties calculated by Density functional theory.  相似文献   
16.
In this paper, we study the sensor deployment pattern problem in cyber physical systems. When designing the sensor deployment pattern, the network lifetime maximization while covering the given area/targets and forwarding sensor data to a sink node is an important issue. In order to prolong the network lifetime by balancing energy depletion across all sensors, we propose a novel nonuniform sensor distribution strategy. Since sensors located closer to the sink are more involved in data forwarding, sensor densities in different areas should be varied according to the distance to the sink. Based on the nonuniform sensor distribution, we propose sensor deployment patterns to satisfy the coverage and connectivity requirements and prolong the network lifetime. A numerical computation is performed to validate and compare the effectiveness of the proposed deployment patterns.  相似文献   
17.
Digital content is easy to reproduce and manipulate. It is difficult to distinguish the original content from pirated copies. A cryptographic method is needed to protect content author’s ownership and secure content distribution. The method should be extended to the case of multiple authors since the content is completed with the assistance of many authors. In this paper, the biometric-based, convertible, and undeniable multi-signature scheme is proposed. The private and public keys are generated using a signer’s biometric data and a random secret value. Thus, lending the private key to the proxy signer is not possible. All the signers should participate in multi-signature generation and verification stages. The proposed scheme also provides a signature conversion process in which undeniable multi-signature is converted to the ordinary one. We demonstrate how our scheme is useful to ensure multi-author copyrights and profits.  相似文献   
18.
Ghim YS  Davies A 《Applied optics》2012,51(12):1922-1928
White-light interferometry uses a white-light source with a short coherent length that provides a narrowly localized interferogram that is used to measure three-dimensional surface profiles with possible large step heights without 2π-ambiguity. Combining coherence and phase information improves the vertical resolution. But, inconsistencies between phase and coherence occur at highly curved surfaces such as spherical and tilted surfaces, and these inconsistencies often cause what are termed ghost steps in the measurement result. In this paper, we describe a modified version of white-light interferometry for eliminating these ghost steps and improving the accuracy of white-light interferometry. Our proposed technique is verified by measuring several test samples.  相似文献   
19.
This paper proposes Cyber-Physical System (CPS) architectures for Large Scale Intelligent and Cooperative Surveillance (ICS) and presents an Adaptive Network-based Fuzzy Inference Model (ANFIM) for reducing the false accident-event report rates of Controller Manager (CM) systems among CPS components. In ICS, sensor nodes detect traffic accident events from general roads and crossroads and transmit event attribute values (car and accident types), time attribute values (date, month, day, year), environmental variable values (weather, temperature, luminous intensity, humidity and sound), and accident event videos to the Controller through WSN mesh networks. Using these pieces of information, the Controller conducts image processing and delivers all sensing data to the CM together with accident-event probability values. The CM conducts data filtering with multi regression analysis utilizing the past accident event database. Centering on the resultant values obtained through the foregoing process, this paper proposes a mathematical model for influence analysis of environmental variables that affect accident events. Based on the model’s results, the authors establish a Sugeno Type fuzzy rule base for reducing false accident-event report rates to propose an ANFIM.  相似文献   
20.
Lithium niobate films grown epitaxially on sapphire substrate were prepared using a thermal chemical vapor deposition method from the metalorganic compounds Li(C11H19O2) and Nb(OC2H5)5. The range of operating conditions for obtaining pure epitaxially grown LiNbO3 without other oxides is within that for obtaining pure polycrystalline LiNbO3 grown on silicon substrate. On analyzing the composition of the epitaxially grown LiNbO3 film, the composition of the film was similar to that of the LiNbO3 solid solution in the phase diagram of the Li-Nb composite oxide obtained for crystal growth from a molten solution.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号