首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17篇
  免费   3篇
电工技术   1篇
化学工业   2篇
能源动力   1篇
轻工业   3篇
无线电   5篇
一般工业技术   2篇
自动化技术   6篇
  2022年   2篇
  2021年   4篇
  2020年   2篇
  2019年   2篇
  2018年   1篇
  2016年   1篇
  2014年   1篇
  2013年   1篇
  2012年   1篇
  2009年   2篇
  2007年   1篇
  2006年   2篇
排序方式: 共有20条查询结果,搜索用时 15 毫秒
1.
We show new upper bounds for problems in the W-hierarchy of fixed-parameter complexity. A crucial ingredient of our proofs is an extension to the W-RAM model, which permits more-powerful operations but remains equivalent to the original. We use the extended model to give new upper bounds for Subsetsum, Maximum Irredundant Set, and various problems concerning intersection of finite-state machines.  相似文献   
2.
This survey investigates multipath routing protocols for mobile ad hoc networks (MANETs). The main objectives of multipath routing protocols are to provide reliable communication and to ensure load balancing as well as to improve quality of service (QoS) of MANETs. These multipath protocols are broadly classified into five categories based on their major goals. The goals are to improve delay, provide reliability, reduce overhead, maximize network life and support hybrid routing. Multipath routing protocols address issues such as multiple paths discovery and maintaining these paths. Issues, objectives, performances, advantages and disadvantages of these protocols are investigated and summarized. A checklist is provided as a guideline so that a network designer can choose an appropriate multipath routing protocol to meet the network's application objectives.  相似文献   
3.
We give simple, self-contained proofs of the basic hardness results for the classes W[t]W[t] of the weft hierarchy. We extend these proofs to higher levels of the hierarchy and illuminate the distinctions among its classes. The anti-monotone collapse at W[1,s]W[1,s] and the normalization of weft-tt formulas arise as by-products of the proofs.  相似文献   
4.
The accurate detection of the direct path in a dense multipath environment is critical in time-based and angle-of-arrival-based location estimation techniques. It is generally assumed that an infinitely large bandwidth is helpful in the accurate detection of the direct path and high-range resolution. It is experimentally demonstrated that, for a wideband system, a bandwidth of up to 4 GHz, centred on 12.5 GHz, is sufficient for accurate detection of direct path in a typical indoor scattering environment. Additionally, the bandwidth gain, incremental range accuracy with bandwidth, is an effective indicator of the bandwidth requirements for accurate detection of the direct path.  相似文献   
5.
Binary doped polypyrrole (PPy) encapsulated Titania (TiO2) nanoparticles were prepared by oxidative polymerization using FeCl3 as oxidant in presence of camphorsulfonic acid (CSA) as surfactant. Both FeCl3 (oxidant) and camphorsulfonic acid (surfactant) also act as dopant and hence thus prepared polypyrrole/Titania (TiO2@PPy) is termed as binary doped nanocomposite i.e. FeCl3 dopes polypyrrole by oxidation mechanism while camphorsulfonic acid dopes polypyrrole by protonic doping mechanism. The TiO2@PPy coreshell nanocomposites were characterized by Fourier transform infrared spectroscopy (FTIR), X‐ray diffraction (XRD), thermogravimetry, differential scanning calorimetry (DSC), field emission‐scanning electron microscopy (FE‐SEM), and inductance‐capacitance‐resistance (LCR) measurements. The results indicated that the structural and electrical properties of the TiO2@PPy coreshell nanocomposites were significantly influenced by the extent of TiO2 nanoparticles loading of polypyrrole. The direct current (DC) electrical conductivity of the as‐prepared TiO2@PPy coreshell nanocomposites was higher than that of PPy. As‐prepared TiO2@PPy coreshell nanocomposites were also studied for their dielectric losses for alternating current (AC) which is useful characteristic for their application in the fabrication of charge storing devices. TiO2@PPy coreshell nanocomposites showed synergistic effect of combining components in improving their alcohol sensing properties. This improvement may be attributed to the adsorption on and desorption from alcohols TiO2@PPy interface of the nanocomposites and alcohol vapors causing decrease in depletion region. The TiO2@PPy coreshell nanocomposites were observed to show better reproducibility of electrical conductivity and fast self‐recovery during the alcohol vapor sensing process. © 2016 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2016 , 133, 43411.  相似文献   
6.
In this paper, the performance of uncoded uplink transmissions in a broadband code division multiple access (CDMA) system using tapped delay line (TDL) antenna array under multipath conditions is investigated. An expression for broadband CDMA system is derived to calculate the optimal weights of TDL antenna array. Using the derived broadband expression, the performance of TDL antenna array is investigated and compared with that of the already existing narrowband systems. Simulation results show that TDL antenna array can reduce multipath fading and multiple access interference (MAI). It is shown that if the signal‐to‐noise ratio (SNR) level is maintained at 20 dB and two‐ray channel model is used, two antennas with four taps each can support 30 users with a BER of 10?3. If three‐ray channel model is used, the same antenna arrangement is not enough to support 30 users. To support these 30 users with BER of 10?3, the number of taps needs to be increased to eight. Finally, the number of taps needs to be further increased to 16 if four‐ray channel model is used. Not only that, the SNR should also be increased to 25 dB to achieve the same BER. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
7.
In this paper, development of a small signal model for 2 × 200 μm GaN HEMT based on the conventional 20-element model is presented. The proposed model presents a direct parameter extraction algorithm, instead of the hybrid optimization approach, that provides simplification, accuracy, and less computational complexity. The extrinsic elements are extracted using a modified cold pinch-off condition while discarding the unwanted forward biasing of the gate. The negative drain to source capacitance Cds is also observed in the ohmic region (for smaller VDS). An excellent agreement found between the measured and modeled data for a wide range of frequencies and bias values shows the effectiveness of the proposed approach. The proposed modeling technique is validated with a good agreement between the achieved bias dependency of intrinsic parameter values and the respective theoretical parameter values.  相似文献   
8.
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web. Therefore, security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks. The aim of this work is to provide efficient and effective healthcare web application security assessment. The study has worked with the hybrid computational model of Multi-Criteria Decision Making (MCDM) based on Analytical Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS) under the Hesitant Fuzzy (HF) environment. Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision. The proposed research endeavor will support designers and developers in identifying, selecting and prioritizing the best security attributes for web applications’ development. The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption, Authentication, Limit Access, Revoke Access, Data Validation, and Maintain Audit Trail. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security. The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications.  相似文献   
9.
10.
COVID-19 is the contagious disease transmitted by Coronavirus. The majority of people diagnosed with COVID-19 may suffer from moderate-to- severe respiratory illnesses and stabilize without preferential treatment. Those who are most likely to experience significant infections include the elderly as well as people with a history of significant medical issues including heart disease, diabetes, or chronic breathing problems. The novel Coronavirus has affected not only the physical and mental health of the people but also had adverse impact on their emotional well-being. For months on end now, due to constant monitoring and containment measures to combat COVID-19, people have been forced to live in isolation and maintain the norms of social distancing with no community interactions. Social ties, experiences, and partnerships are not only integral part of work life but also form the basis of human evolvement. However, COVID-19 brought all such communication to a grinding halt. Digital interactions have failed to support the fervor that one enjoys in face-to-face meets. The COVID-19 disease outbreak has triggered dramatic changes in many sectors, and the main among them is the software industry. This paper aims at assessing COVID-19’s impact on Software Industries. The impact of the COVID-19 disease outbreak has been measured on the basis of some predefined criteria for the demand of different software applications in the software industry. For the stated analysis, we used an approach that involves the application of the integrated Fuzzy ANP and TOPSIS strategies for the assessment of the impact of COVID-19 on the software industry. Findings of this research study indicate that Government administration based software applications were severely affected, and these applications have been the major apprehensions in the wake of the pandemic’s outbreak. Undoubtedly, COVID-19 has had a considerable impact on software industry, yet the damage is not irretrievable and the world’s societies can emerge out of this setback through concerted efforts in all facets of life.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号