首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38篇
  免费   0篇
化学工业   8篇
轻工业   1篇
无线电   19篇
一般工业技术   4篇
自动化技术   6篇
  2015年   1篇
  2014年   1篇
  2013年   5篇
  2012年   3篇
  2011年   2篇
  2010年   2篇
  2009年   1篇
  2008年   3篇
  2006年   1篇
  2005年   2篇
  2004年   1篇
  2003年   3篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1998年   2篇
  1997年   3篇
  1996年   2篇
  1995年   1篇
  1993年   1篇
排序方式: 共有38条查询结果,搜索用时 15 毫秒
1.
The communication infrastructure of a mobile computing environment can be based on the structure of a cellular/microcellular telephone system or a PCS network. In such a system, the occurrence of handoffs cannot be avoided and when handoffs occur, wireless links held by mobile computers crossing cell boundaries may be forced to terminate. The probability that a handoff access request will result in forced termination has a significant effect on the performance of a mobile computing environment, as does the probability that an initial access request will be blocked. Although some research has been done on initial and handoff accesses in cellular/microcellular telephone systems and PCS networks, the analytical models used in this research are not appropriate for mobile computing, since unlike a telephone, a mobile computer may use several channels at once. In this paper, we develop an analytical model to study initial and handoff accesses in a mobile computing environment. The model is based on a multi-dimensional continuous time Markov chain. The accuracy of the model is verified by comparison with simulation results. We then use the model to find a practical approach to balancing the initial access blocking probability and avarage forced termination probability of a connection in a mobile computing network.This research was supported by the National Science Council, ROC, under grant NSC 85-2213-E-009-063.  相似文献   
2.
Diethylether (DEE) was used as a structure modifier during the synthesis of linear styrene-butadiene block copolymers of poly A-block-polyB-block-polyA type (SBS). The microstructures of synthesized polymers were analyzed, and the effect of DEE on polymerization kinetics was studied. Addition of DEE at 2 wt% concentration results in the highest styrene polymerization rate, while addition at 6 wt% concentration gives the highest butadiene polymerization rate. The vinyl content of the polybutadiene portion increases from 14 to 47% with an increase in the DEE concentration from 500 ppm to 10 wt% while thetrans- l,4 andcis-1,4 isomers decrease. For SBS polymer synthesized via a sequential method, the addition of DEE as a structure modifier minimizes the crossover deficiency which would otherwise result in a skewed molecular weight distribution with a higher polydispersity. For SBS polymers made via a coupling method, the coupling efficiency appears to be constant in a range of DEE concentration from 500 ppm to 1 wt% before declining with a further increase in DEE.  相似文献   
3.
4.
This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes require the SN to interact with the HN for authenticating respective MSs, at the cost of repeated message exchanges and communication delay. Instead, in our design, when the first MS of a group visits, the SN performs full authentication with the concerned HN and thereby obtains authentication information for the MS and other members. Thus when any other MS of the same group visits, the SN can authenticate locally without subsequent involvement of the HN, so as to simplify protocol operations. We will show that our scheme does not trade performance for security and robustness to the extent that security requirements are unduly weakened. Both qualitative and quantitative discussions indicate that our proposed scheme lends itself to pragmatic settings.  相似文献   
5.
The increasing number of Wi-Fi-compatible mobile devices highlights various wireless access challenges, including the need for smooth hand offs between Internet attachment points in mobile IPv6 networks. To confirm address uniqueness in a new domain, mobile nodes must run duplicate address detection (DAD), which is a time-consuming process. The Proactive DAD approach uses topology information and layer-2 signals to predict the new network domains prior to or in parallel with layer-3 hand offs. Experimental results show that P-DAD can significantly reduce both hand-off latency and packet loss  相似文献   
6.
An experimental study concerning the recycling of slightly crosslinked polyethylene foams produced in the manufacturing process was conducted. The recycled polyethylene (RPE) was blended with virgin low-density polyethylene (PE) and irradiated by electron-beams and expanded by heat to make regenerated foams. Four RPE/PE blends with different RPE contents ranging from 0 to 15 phr were foamed and the amount of blowing agent was varied in order to make foams of various densities. The mean cell size of the RPE/PE blend increased with an increase in the RPE content and the degree of anisotropy was generally higher for foams with larger RPE contents. The homogeneity of cell distribution and the type of cell distribution seem to be independent of the expansion ratio at a low RPE content. Furthermore, RPE/PE blends with 05 phr of RPE were capable of producing good regenerated foams without losses of tensile and tear strength and other properties such as compression set, resiliency, dimensional change on heating, and Asker C hardness.  相似文献   
7.
8.
This study first reviews state-of-the-art fast handoff techniques for IEEE 802.11 or Mobile IP networks. Based on that review, topology-aided cross-layer fast handoff designs are proposed for Mobile IP over IEEE 802.1.1 networks. Time-sensitive applications, such as voice over IP (VoIP), cannot tolerate the long layer-2 plus layer-3 handoff delays that arise in IEEE 802.11/Mobile IP environments. Cross-layer designs are increasingly adopted to shorten the handoff latency time. Handoff-related layer-2 triggers may reduce the delay between layer-2 handoff completion and the associated layer-3 handoff activation. Cross-layer topology information, such as the association between 802.11 access points and Mobile IP mobility agents, together with layer-2 triggers, can be utilized by a mobile node to start layer-3 handoff-related activities, such as agent discovery, address configuration, and registration, in parallel with or prior to those of layer-2 handoff. Experimental results indicate that the whole handoff. delay can meet the delay requirement of VoIP applications when layer-3 handoff activities occur prior to layer-2 handoffs.  相似文献   
9.
Hybrid Address Configuration for Tree-based Wireless Sensor Networks   总被引:1,自引:0,他引:1  
This letter proposes a new scheme to alleviate the issue on address acquisition failure in wireless sensor networks (WSNs). The basic idea is to use a hierarchical address structure to make the proposed scheme less susceptible to physical distribution of WSN devices. Simulation results show that the new scheme significantly reduces the failure probability.  相似文献   
10.
One of the main challenges in personal communication service (PCS) is to locate many mobiles that may move frequently from place to place. Such a system operation is called location tracking. Many network signals flow, and database queries are required to achieve such a task. In addition to the two-level hierarchical strategy in IS-41 and GSM, several strategies have been proposed to improve the efficiency of location tracking. Pointer forwarding was used to reduce the expensive home location register (HLR) accesses. Previously, the distributed HLR scheme was proposed to prevent the HLR from becoming a bottleneck in the signaling network. However, the length of a forwarding pointer chain may be lengthened in a distributed HLR environment. We propose a more efficient strategy to overcome this potential problem. This strategy attempts to migrate the locating chains in a distributed HLR system when a mobile issues a registration operation. As a consequence, the length of any forwarding pointer chain does not exceed one in our strategy. Simulation results indicate that our strategy significantly decreases the locating cost. In fact, this strategy provides an upper bound of location tracking time owing to the fact that the length of any locating path does not exceed one. Furthermore, obsolete entries in local databases visitor location registers can be reclaimed in this strategy  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号