首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   0篇
一般工业技术   1篇
冶金工业   1篇
自动化技术   3篇
  2022年   2篇
  2021年   1篇
  2012年   1篇
  1997年   1篇
排序方式: 共有5条查询结果,搜索用时 0 毫秒
1
1.
2.
The human body contains a near-infinite supply of energy in chemical, thermal, and mechanical forms. However, the majority of implantable and wearable devices are still operated by batteries, whose insufficient capacity and large size limit their lifespan and increase the risk of hazardous material leakage. Such energy can be used to exceed the battery power limits of implantable and wearable devices. Moreover, novel materials and fabrication methods can be used to create various medical therapies and life-enhancing technologies. This review paper focuses on energy-harvesting technologies used in medical and health applications, primarily power collectors from the human body. Current approaches to energy harvesting from the bodies of living subjects for self-powered electronics are summarized. Using the human body as an energy source encompasses numerous topics: thermoelectric generators, power harvesting by kinetic energy, cardiovascular energy harvesting, and blood pressure. The review considers various perspectives on future research, which can provide a new forum for advancing new technologies for the diagnosis, treatment, and prevention of diseases by integrating different energy harvesters with advanced electronics.  相似文献   
3.
With the potential for tens to hundreds of processing elements on future single chip multicore designs also comes the potential to execute a wider variety of input streams, or workloads. At the same time, the trend is for single users to utilize an entire single chip multicore computer. A central challenge for these computers is how to model and identify persistent changes in the input stream, or workload modes. Computer architects often model single program phases as Markov chains. We define workload modes and analyze and evaluate two modeling techniques, a Workload Classification Model (WCM) and a Hidden Markov Model (HMM). We include experimentation on a cell phone example, illustrating how WCM is, on average, 34 times more time efficient and 83% more space efficient than HMM, while improving overall performance by an average of 191% and being, on average, 56% more energy efficient. We found that even sub-optimal use of WCM can outperform HMM, further supporting the need for design time workload models. Our main contribution is to show how the design of single user multicore architecture to models of workloads that arise from single user usage patterns will be necessary as the complexity of applications and architectures grows. Thus, we advocate Workload Specific Processors as a new means of orienting single-user chip heterogeneous multiprocessors.  相似文献   
4.
The IEEE 802.11n standard has provided prominent features that greatly contribute to ubiquitous wireless networks. Over the last ten years, voice over IP (VoIP) has become widespread around the globe owing to its low-cost or even free call rate. The combination of these technologies (VoIP and wireless) has become desirable and inevitable for organizations. However, VoIP faces a bandwidth utilization issue when working with 802.11 wireless networks. The bandwidth utilization is inefficient on the grounds that (i) 80 bytes of 802.11/RTP/UDP/IP header is appended to 10–730 bytes of VoIP payload and (ii) 765 µs waiting intervals follow each 802.11 VoIP frame. Without considering the quality requirements of a VoIP call, be including frame aggregation in the IEEE 802.11n standard has been suggested as a solution for the bandwidth utilization issue. Consequently, several aggregation methods have been proposed to handle the quality requirements of VoIP calls when carried over an IEEE 802.11n wireless network. In this survey, we analyze the existing aggregation methods of VoIP over the A-MSDU IEEE 802.11n wireless standard. The survey provides researchers with a detailed analysis of the bandwidth utilization issue concerning the A-MSDU 802.11n standard, discussion of the main approaches of frame aggregation methods and existing aggregation methods, elaboration of the impact of frame aggregation methods on network performance and VoIP call quality, and suggestion of new areas to be investigated in conjunction with frame aggregation. The survey contributes by offering guidelines to design an appropriate, reliable, and robust aggregation method of VoIP over 802.11n standard.  相似文献   
5.
Infrastructure as a Service (IaaS) provides logical separation between data, network, applications and machines from the physical constrains of real machines. IaaS is one of the basis of cloud virtualization. Recently, security issues are also gradually emerging with virtualization of cloud computing. Different security aspects of cloud virtualization will be explored in this research paper, security recognizing potential threats or attacks that exploit these vulnerabilities, and what security measures are used to alleviate such threats. In addition, a discussion of general security requirements and the existing security schemes is also provided. As shown in this paper, different components of virtualization environment are targets to various attacks that in turn leads to security issues compromising the whole cloud infrastructure. In this paper an overview of various cloud security aspects is also provided. Different attack scenarios of virtualization environments and security solutions to cater these attacks have been discussed in the paper. We then proceed to discuss API security concerns, data security, hijacking of user account and other security concerns. The aforementioned discussions can be used in the future to propose assessment criteria, which could be useful in analyzing the efficiency of security solutions of virtualization environment in the face of various virtual environment attacks.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号