首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24篇
  免费   2篇
化学工业   2篇
机械仪表   1篇
能源动力   1篇
无线电   3篇
一般工业技术   3篇
自动化技术   16篇
  2020年   2篇
  2019年   1篇
  2018年   2篇
  2017年   1篇
  2016年   1篇
  2015年   3篇
  2014年   1篇
  2012年   2篇
  2011年   4篇
  2010年   2篇
  2008年   4篇
  2007年   1篇
  2006年   2篇
排序方式: 共有26条查询结果,搜索用时 15 毫秒
1.
A tangent vector field on a surface is the generator of a smooth family of maps from the surface to itself, known as the flow. Given a scalar function on the surface, it can be transported, or advected, by composing it with a vector field's flow. Such transport is exhibited by many physical phenomena, e.g., in fluid dynamics. In this paper, we are interested in the inverse problem: given source and target functions, compute a vector field whose flow advects the source to the target. We propose a method for addressing this problem, by minimizing an energy given by the advection constraint together with a regularizing term for the vector field. Our approach is inspired by a similar method in computational anatomy, known as LDDMM, yet leverages the recent framework of functional vector fields for discretizing the advection and the flow as operators on scalar functions. The latter allows us to efficiently generalize LDDMM to curved surfaces, without explicitly computing the flow lines of the vector field we are optimizing for. We show two approaches for the solution: using linear advection with multiple vector fields, and using non‐linear advection with a single vector field. We additionally derive an approximated gradient of the corresponding energy, which is based on a novel vector field transport operator. Finally, we demonstrate applications of our machinery to intrinsic symmetry analysis, function interpolation and map improvement.  相似文献   
2.
Recent advances in data-acquisition technologies have equipped team coaches and sports analysts with the capability of collecting and analyzing detailed data of team activity in the field. It is now possible to monitor a sports event and record information regarding the position of the players in the field, passing the ball, coordinated moves, and so on. In this paper we propose a new method to analyze such team activity data. Our goal is to segment the overall activity stream into a sequence of potentially recurrent modes, which reflect different strategies adopted by a team, and thus, help to analyze and understand team tactics. We model team activity data as a temporal network, that is, a sequence of time-stamped edges that capture interactions between players. We then formulate the problem of identifying a small number of team modes and segmenting the overall timespan so that each segment can be mapped to one of the team modes; hence the set of modes summarizes the overall team activity. We prove that the resulting optimization problem is \(\mathrm {NP}\)-hard, and we discuss its properties. We then present a number of different algorithms for solving the problem, including an approximation algorithm that is practical only for one mode, as well as heuristic methods based on iterative and greedy approaches. We benchmark the performance of our algorithms on real and synthetic datasets. Of all methods, the iterative algorithm provides the best combination of performance and running time. We demonstrate practical examples of the insights provided by our algorithms when mining real sports-activity data. In addition, we show the applicability of our algorithms on other types of data, such as social networks.  相似文献   
3.
4.
5.
6.
Wireless Local Area Networks have gained popularity at an unprecedented rate over the last few years. However, as the spectrum of applications they are called to support broadens, their inefficiency in meeting the diverse requirements of a wider range of applications becomes evident. Most existing access mechanisms cannot provide Quality-of-Service (QoS) assurances. Even those that are QoS aware can only provide relative service differentiation. In this work, we propose a dynamic priority medium access scheme to provide time-bounded services. By approximating an ideal Earliest Deadline First (EDF) scheduler, the proposed scheme can offer delay and delay jitter assurances while achieving high medium utilization. Analytical studies and simulation experiments document and confirm the positive characteristics of the proposed mechanism. Orestis Tsigkas received his Diploma in electrical and computer engineering from the Aristotle University of Thessaloniki, Greece in 2002. He is currently working towards his Ph.D. degree in the same department. His research interests include medium access, as well as quality-of-service provisioning. Fotini-Niovi Pavlidou received the Ph.D. degree in electrical engineering from the Aristotle University of Thessaloniki, Greece, in 1988 and the Diploma in mechanical-electrical engineering in 1979 from the same institution. She is currently a Professor at the Department of Electrical and Computer Engineering at the Aristotle University engaged in teaching for the under- and post-graduate program in the areas of mobile communications and telecommunications networks. Her research interests are in the field of mobile and personal communications, satellite communications, multiple access systems, routing and traffic flow in networks and QoS studies for multimedia applications over the Internet. She is being involved with many national and international projects in these areas (Tempus, COST, Telematics,IST) and she has been chairing the European COST262 Action on “Spread Spectrum Systems and Techniques for Wired and Wireless Communications”. She has served as member of the TPC in many IEEE/IEE conferences and she has organized/chaired some conferences like, the “IST Mobile Summit 2002”, the 6th “International Symposium on Power Lines Communications-ISPLC2002”, the “International Conference on Communications-ICT1998” etc. She is a permanent reviewer for many IEEE/IEE journals. She has published about 80 papers in refereed journals and conferences. She has served as guest-editor on special issues as: “Mobile Ad Hoc Networks (MANETs): Standards, Research, Applications” in the International Journal of Wireless Information Networks and “Power Line Communications and Applications” in the International Journal on Communications Systems. She is a senior member of IEEE, currently chairing the joint IEEE VT&AES Chapter in Greece.  相似文献   
7.
8.
Diamond nanoparticles are promising photoluminescent probes for tracking intracellular processes, due to embedded, perfectly photostable color centers. In this work, the spontaneous internalization of such nanoparticles (diameter 25 nm) in HeLa cancer cells is investigated by confocal microscopy and time-resolved techniques. Nanoparticles are observed inside the cell cytoplasm at the single-particle and single-color-center level, assessed by time-correlation intensity measurements. Improvement of the nanoparticle signal-to-noise ratio inside the cell is achieved using a pulsed-excitation laser and time-resolved detection taking advantage of the long radiative lifetime of the color-center excited state as compared to cell autofluorescence. The internalization pathways are also investigated, with endosomal marking and colocalization analyses. The low colocalization ratio observed proves that nanodiamonds are not trapped in endosomes, a promising result in prospect of drug delivery by these nanoparticles. Low cytotoxicity of these nanoparticles in this cell line is also shown.  相似文献   
9.
Malware classification based on call graph clustering   总被引:1,自引:0,他引:1  
Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based on call graph clustering. By representing malware samples as call graphs, it is possible to abstract certain variations away, enabling the detection of structural similarities between samples. The ability to cluster similar samples together will make more generic detection techniques possible, thereby targeting the commonalities of the samples within a cluster. To compare call graphs mutually, we compute pairwise graph similarity scores via graph matchings which approximately minimize the graph edit distance. Next, to facilitate the discovery of similar malware samples, we employ several clustering algorithms, including k-medoids and Density-Based Spatial Clustering of Applications with Noise (DBSCAN). Clustering experiments are conducted on a collection of real malware samples, and the results are evaluated against manual classifications provided by human malware analysts. Experiments show that it is indeed possible to accurately detect malware families via call graph clustering. We anticipate that in the future, call graphs can be used to analyse the emergence of new malware families, and ultimately to automate implementation of generic detection schemes.  相似文献   
10.
The aim of this research is to investigate a type of failure of dry carbide hobbing that occurs when the generated chips are pinched and crushed between the hob cutting edge and the work gear tooth flank by utilizing the finite element method. This problem is of great importance because gear hobbing is extensively used in the manufacturing industry. Many machine tool manufacturers have so far developed dry hobbing techniques using carbide hobs as there is a growing acknowledgment that it is necessary to employ carbide hobbing for higher productivity and pollution free gear cutting. To meet the increasing needs of cost reduction and environmentally friendly methods, dry hobbing being employed for gear mass production has completely eliminated the need of tool cooling. However, carbide hobbing has not come into wide use due to the high cost of carbide hobs, and mainly due to the unexpected chipping of the brittle carbide material, making it difficult to control the tool service life. Dry hobbing often causes problems such as chipping of the carbide hob tooth and/or damage of the surface finishing when the generated chips are pinched and crushed between the hob cutting edge and the work gear tooth flank. A manufacturing case of helical gears is taken as a case study, and it was simulated using a coupled thermomechanical rigid viscoplastic FEM analysis. Simulations have successfully identified a chip crush between four adjacent generating positions and thus, a definite mechanism that cause chip crush is revealed. Furthermore, valuable insights during chip formation, i.e., stress, strain, strain rate, temperature gradients, etc., are also provided.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号