首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   103篇
  免费   8篇
电工技术   8篇
化学工业   8篇
金属工艺   8篇
机械仪表   1篇
建筑科学   4篇
矿业工程   1篇
能源动力   8篇
轻工业   5篇
水利工程   2篇
石油天然气   2篇
无线电   25篇
一般工业技术   10篇
冶金工业   7篇
自动化技术   22篇
  2023年   5篇
  2022年   5篇
  2021年   3篇
  2020年   7篇
  2019年   3篇
  2018年   8篇
  2017年   5篇
  2016年   5篇
  2015年   4篇
  2014年   12篇
  2013年   10篇
  2012年   3篇
  2011年   6篇
  2010年   5篇
  2009年   4篇
  2008年   5篇
  2007年   4篇
  2006年   5篇
  2005年   5篇
  2002年   3篇
  2001年   1篇
  1998年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有111条查询结果,搜索用时 0 毫秒
1.
Network securityprotocolssuch as IPsechave been used for many years to ensure robust end-to-end communication and are impor-tant in the context of SDN.Despite the widespread installation of IPsec to date,per-packet protection offered by the protocol isnot very compatible with OpenFlow and flow-like behavior.OpenFlow architecture cannot aggregate IPsec-ESP flows in transportmode or tunnel mode because layer-3 information is encrypted and therefore unreadable.In this paper,we propose using the Secu-rity Parameter Index(SPI)of IPsec within the OpenFlow architecture to identify and direct IPsec flows.Thisenables IPsec to con-form to the packet-based behavior of OpenFlow architecture.In addition,by distinguishing between IPsec flows,the architectureis particularly suited to secure group communication.  相似文献   
2.
Quasi‐Z source indirect matrix converter (IMC) combines both advantages of conventional IMC and quasi‐Z source inverter, for example, no direct current (DC) link capacitor, compact all‐silicon power converter, bidirectional power flow, input power factor controllable, and high voltage gain; moreover, it does not require additional input filter, because continuous quasi‐Z source network integrates LC filter function. However, there is no literature to disclose common mode voltage (CMV) issue of quasi‐Z source IMC. In this paper, for the first time, the CMV issue and reduction of quasi‐Z source IMC are investigated. Firstly, the CMV of quasi‐Z source IMC is analyzed when using current typical modulation method, which follows the brief introduction of topology and modulation method for quasi‐Z source IMC, and the factors that affect the CMV are figured out; Secondly, referring to the CMV reduction methods of conventional IMC, two solutions named as Methods I and II to reduce the CMV for quasi‐Z source IMC are developed, which are achieved in the inverter stage; the third CMV reduction method is proposed in the rectifier stage through redefining the six sectors of the rectifier stage, which can implement zero current commutation. Experimental bench is built to test three approaches for reducing the CMV of quasi‐Z source IMC. Comparative evaluation is carried out between three methods and conventional modulation method. Experimental results verify that three methods can significantly reduce the CMV of quasi‐Z source IMC, with the CMV peak value reduction of 42%, but they present different features in terms of input and output current THDs, switching loss, CMV root mean square (RMS) value, modulation index limitation, and so on. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
3.
4.
The measurement of transportation network travel time reliability is imperative to provide drivers with accurate route guidance information and to generate the shortest path (or alternative paths) connecting origins and destinations, especially under conditions of varying demands and limited capacities. Previous studies assumed that link failures in a road network are statistically independent and that reliability probabilities are perfectly determinable. In real life, these assumptions are dubious, because the failure of a link in one particular area does not necessarily result in the complete failure of the neighboring link, but may lead to deterioration of its performance. This paper presents a new methodology to study the multistate system reliability analysis of transportation networks for which one cannot formulate an “all or nothing” type of failure criterion and in which dependent link failures are considered. The methodology is presented, using a numerical example, for computing the probability that travel time between an origin and a destination may exceed a threshold.  相似文献   
5.
This paper presents the results of an investigation and pilot study into an active binocular vision system that combines binocular vergence, object recognition and attention control in a unified framework. The prototype developed is capable of identifying, targeting, verging on and recognising objects in a cluttered scene without the need for calibration or other knowledge of the camera geometry. This is achieved by implementing all image analysis in a symbolic space without creating explicit pixel-space maps. The system structure is based on the ‘searchlight metaphor’ of biological systems. We present results of an investigation that yield a maximum vergence error of ~6.5 pixels, while ~85% of known objects were recognised in five different cluttered scenes. Finally a ‘stepping-stone’ visual search strategy was demonstrated, taking a total of 40 saccades to find two known objects in the workspace, neither of which appeared simultaneously within the field of view resulting from any individual saccade.  相似文献   
6.
A multi-wavelength copy interconnect is a switching network capable of replicating a signal arriving at the input on a specific wavelength to one or more outputs possibly on different wavelengths. Such an interconnect can be useful in building optical multicast switches for wavelength division multiplexing (WDM) networks. In this article, we investigate, for the first time, the problem of designing copy networks that can simultaneously multicast input signals to a set of outputs while changing the wavelength of the replica according to the required routing pattern. We propose a novel multi-wavelength crossbar (MWX) switch that can switch an input signal on a specific wavelength to two different output wavelengths. The proposed MWX is used as a building block to construct two classes of multi-log2N copy networks, namely, baseline and Bene? interconnects. The design space of the proposed interconnect classes is characterized and their hardware complexity is analyzed. We show that the proposed interconnects are transparent to existing multicast routing algorithms, and present simple routing algorithms for routing of multicast requests over the proposed designs. Comparisons with existing designs confirm that the proposed interconnects require a smaller number of space switches and wavelength conversion processes as compared to most conventional copy networks. In particular, for a large number of wavelengths and for any number of fibers the proposed design requires 50% less switching elements as compared to best available designs.  相似文献   
7.
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost .  相似文献   
8.
Polarization-sensitive optical coherence tomography provides high-resolution cross-sectional characterization of birefringence in turbid media. Weakly birefringent biological tissues such as the retinal nerve fiber layer (RNFL) require advanced speckle noise reduction for high-sensitivity measurement of form birefringence. We present a novel method for high-sensitivity birefringence quantification by using enhanced polarization-sensitive optical coherence tomography (EPS-OCT) and introduce the polarimetric signal-to-noise ratio, a mathematical tool for analyzing speckle noise in polarimetry. Multiple incident polarization states and non-linear fitting of normalized Stokes vectors allow determination of retardation with +/-1 degrees uncertainty with invariance to unknown unitary polarization transformations. Results from a weakly birefringent turbid film and in vivo primate RNFL are presented. In addition, we discuss the potential of EPS-OCT for noninvasive quantification of intracellular filamentous nanostructures, such as neurotubules in the RNFL that are lost during the progression of glaucoma.  相似文献   
9.

SDN enables a new networking paradigm probable to improve system efficiency where complex networks are easily managed and controlled. SDN allows network virtualization and advance programmability for customizing the behaviour of networking devices with user defined features even at run time. SDN separates network control and data planes. Intelligently controlled network management and operation, such that routing is eliminated from forwarding elements (switches) while shifting the routing logic in a centralized module named SDN Controller. Mininet is Linux based network emulator which is cost effective for implementing SDN having in built support of OpenFlow switches. This paper presents practical implementation of Mininet with ns-3 using Wi-Fi. Previous results reported in literature were limited upto 512 nodes in Mininet. Tests are conducted in Mininet by varying number of nodes in two distinct scenarios based on scalability and resource capabilities of the host system. We presented a low cost and reliable method allowing scalability with authenticity of results in real time environment. Simulation results show a marked improvement in time required for creating a topology designed for 3 nodes with powerful resources i.e. only 0.077 sec and 4.512 sec with limited resources, however with 2047 nodes required time is 1623.547 sec for powerful resources and 4615.115 sec with less capable resources respectively.

  相似文献   
10.
This article presents a single-stage three-phase power factor correction (PFC) circuit for AC-to-DC converter using a single-switch boost regulator, leading to improve the input power factor (PF), reducing the input current harmonics and decreasing the number of required active switches. A novel PFC control strategy which is characterised as a simple and low-cost control circuit was adopted, for achieving a good dynamic performance, unity input PF, and minimising the harmonic contents of the input current, at which it can be applied to low/medium power converters. A detailed analytical, simulation and experimental studies were therefore conducted. The effectiveness of the proposed controller algorithm is validated by the simulation results, which were carried out using MATLAB/SIMULINK environment. The proposed system is built and tested in the laboratory using DSP-DS1104 digital control board for an inductive load. The results revealed that the total harmonic distortion in the supply current was very low. Finally, a good agreement between simulation and experimental results was achieved.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号