首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
电工技术   3篇
综合类   1篇
化学工业   1篇
无线电   4篇
自动化技术   3篇
  2021年   1篇
  2014年   2篇
  2009年   1篇
  2007年   2篇
  2006年   2篇
  1994年   1篇
  1992年   1篇
  1988年   1篇
  1976年   1篇
排序方式: 共有12条查询结果,搜索用时 31 毫秒
1.
罗马尼亚商务立法制度对外国投资者非常有列,允许外国投资者拥有100%的所有权,允许将利润与资本转向国外,也允许减免税收。根据1990年31号公司法的规定,外国投资者可以在罗建立新公司或分公司,全部外资或合资,法人或自然人。凡在罗投资者,需向罗开发局提出申请,罗开发局收到申请后应在30天内予以答复,在此期间未收到答复,则视为批准。外国投资者在罗可享受各种优惠:外资既可投向各工业部门,也可投向农业、基础设施、交通运输、工民建、科技开发、贸易、旅游、银行、保险等;外国投资者所获合法利润可以自由转换成货币输出国外:按合同条款规定,还可向国外转让版权、技术和其他服务项目;外资在罗将不会国有化,不会征用,不会剥夺所有权;根据法律规定及合同条款,外国投资者有权参加投资管理;外国投资者可以免征海关进口税等。当然,外国投资者必须遵守罗马尼亚的有关法律,特别是不允许违反环境保护法,不允许影响罗马尼亚的国家安全与国防利益,不允许危害公共秩序、健康与道德规范。  相似文献   
2.
This article shows how service mediation can be used to add security features to services in a mobile service platform. This base platform takes care of security, charging, and other basic functions, which are then configured for services at runtime using a pluggable mediator framework. Service providers can focus on content, and thus leverage the signaling and mediation capabilities of the core platform. Mediators add specific functionality to a service, and are a specific form of service composition and selection. We examine how security technologies for authentication and authorization are integrated by mediators into a single policy infrastructure with a homogeneous interface for services. We consider here the Web services SAML and the 3GPP GBA security bootstrapping standard in the context of mobile services. We give an example using a video on demand service, and discuss how and when security concerns of services can be transferred from the services to mediators.  相似文献   
3.
In this paper, we propose an architecture for secure push services for mobile users that supports common-of-the-shelf (COTS) WLAN base stations. The architecture focuses on the creation of flexible access networks based on easily deployable base stations. The push functionality is realized using client-initiated connections with SIP, and TLS or dTLS for security. The central building block of the distributed system is the edge proxy, which manages and implicitly authenticates all inbound connections, and performs privacy enhancement. The main driving force of our architecture has been airline services, but the system is applicable also for other service domains.  相似文献   
4.
In der Arbeit werden neue Methoden zur Erforschung des dynamischen Verhaltens eines Schaltlichtbogens, unter Anwendung eines Analogrechners, vorgeschlagen und angewandt. Die mathematische Beschreibung des Lichtbogens wird aufgrund nichtlinearer Differentialgleichungen durchgeführt, die in einer für ihre Lösung auf dem Rechner günstigen Weise umgeschrieben wurden. Es wird sowohl der Lichtbogen ohne Rückwirkung als auch der mit einer Ersatzschaltung des Wechselstromnetzes in Wechselwirkung befindliche Lichtbogen untersucht, wobei das dynamische Verhalten des Lichtbogens vor und nach dem Nulldruchgang des unterbrochenen Stromes analysiert wird. Die Arbeit ist ein Beitrag zur grundsätzlichen Kenntnis des phänomenologischen Verhaltens des Lichtbogens und weist neue Wege zur Behandlung der Probleme, die sich beim Bau und bei der Verbesserung von Schaltgeräten ergeben.  相似文献   
5.
Anemia, characterized by a decrease of the hemoglobin level in the blood and a reduction in carrying capacity of oxygen, is a major public health problem which affects people of all ages. The methods used to treat anemia are blood transfusion and oral administration of iron-based supplements, but these treatments are associated with a number of side effects, such as nausea, vomiting, constipation, and stomach pain, which limit its long-term use. In addition, oral iron supplements are poorly absorbed in the intestinal tract, due to overexpression of hepcidin, a peptide hormone that plays a central role in iron homeostasis. In this review, we conducted an analysis of the literature on biologically active compounds and plant extracts used in the treatment of various types of anemia. The purpose of this review is to provide up-to-date information on the use of these compounds and plant extracts, in order to explore their therapeutic potential. The advantage of using them is that they are available from natural resources and can be used as main, alternative, or adjuvant therapies in many diseases, such as various types of anemia.  相似文献   
6.
In recent years, dual-homed topologies have appeared in data centers in order to offer higher aggregate bandwidth by using multiple paths simultaneously. Multipath TCP (MPTCP) has been proposed as a replacement for TCP in those topologies as it can efficiently offer improved throughput and better fairness. However, we have found that MPTCP has a problem in terms of incast collapse where the receiver suffers a drastic goodput drop when it simultaneously requests data over multiple servers. In this paper, we investigate why the goodput collapses even if MPTCP is able to actively relieve hot spots. In order to address the problem, we propose an equally-weighted congestion control algorithm for MPTCP, namely EW-MPTCP, without need for centralized control, additional infrastructure and a hardware upgrade. In our scheme, in addition to the coupled congestion control performed on each subflow of an MPTCP connection, we allow each subflow to perform an additional congestion control operation by weighting the congestion window in reverse proportion to the number of servers. The goal is to mitigate incast collapse by allowing multiple MPTCP subflows to compete fairly with a single-TCP flow at the shared bottleneck. The simulation results show that our solution mitigates the incast problem and noticeably improves goodput in data centers.  相似文献   
7.
Contents The first part of the paper deals with the modelling of an electric arc, simulated by a first-order approximation for theG(t) arc conductance function, an exponentially decreasing conductance. In the second part of the paper there is presented an original method of mathematical simulation the dynamic behaviour of an electric arc after disconnecting, which allows the analytical calculation of the transient recovery voltage taking into account theR(t) resistance of the disruptive interval. A series of results obtained on a digital computer for certain parameters of the circuit-breakers equivalent test circuit are presented as examples.
Mathematische Analyse des Einflusses des elektrischen Schaltlichtbogens auf den Ersatzstromkreis des Schalters
Übersicht Der erste Teil des Beitrages befaßt sich mit der Bildung eines Modells auf einem Analogrechner für einen elektrischen Schaltlichtbogen, dessen exponentiell abnehmende Leitfähigkeit durch eine Näherung erster Ordnung der BogenleitfähigkeitsfunktionG(t) simuliert wurde. Im zweiten Teil des Beitrags wird eine neue Methode zur mathematischen Simulation des dynamischen Verhaltens eines elektrischen Lichtbogens nach dem Abschalten vorgestellt, die die analytisch Berechnung der transienten Wiederkehrspannung erlaubt, wobei der WiderstandR(t) der Funkenstrecke in Betracht gezogen wird. Als Beispiel werden eine Reihe von auf einem Digitalrechner erhaltenen Ergebnisse für bestimmte Parameter der Ersatzstromkreise der Schalter vorgestellt.

List of symbols R(t) electric are resistance - R 0 resistance of the disruptive interval when the breaking current passes through zero - thermal time constant of the electric arc - G(t) electric arc conductance - G 0 conductance of the disruptive interval when the breaking current passes through zero - r equivalent resistance of the test circuit - L equivalent inductance of the test circuit - C equivalent capacity of the test circuit - I1, I2 switches - I circuit-breaker - top value of the alternating voltage supplying the test circuit - i instant value of the total current in the test circuit - u instant value of the transient recovery voltage - TRV transient recovery voltage - t, i, G, G 0,u, u L real quantities - , normed quantities - t 0 disconnection moment - t f total computation time - U n rated voltage of the network - I r breaking current - lagging (phase difference) between the electromotive voltage and the short-circuit current - f network frequency - f 0 proper oscillation frequency of the test circuit - 0 oscillation factor - amplitude factor - HV high voltage Dr. Eng. Mimi Sasu is principal scientific researcher at the Research Institute for Electrotechnics, ICPE, Bucharest, Romania  相似文献   
8.
Fuzzy ARTMAP with input relevances   总被引:1,自引:0,他引:1  
We introduce a new fuzzy ARTMAP (FAM) neural network: Fuzzy ARTMAP with relevance factor (FAMR). The FAMR architecture is able to incrementally "grow" and to sequentially accommodate input-output sample pairs. Each training pair has a relevance factor assigned to it, proportional to the importance of that pair during the learning phase. The relevance factors are user-defined or computed. The FAMR can be trained as a classifier and, at the same time, as a nonparametric estimator of the probability that an input belongs to a given class. The FAMR probability estimation converges almost surely and in the mean square to the posterior probability. Our theoretical results also characterize the convergence rate of the approximation. Using a relevance factor adds more flexibility to the training phase, allowing ranking of sample pairs according to the confidence we have in the information source. We analyze the FAMR capability for mapping noisy functions when training data originates from multiple sources with known levels of noise.  相似文献   
9.
Event-based systems are seen as good candidates for supporting distributed applications in dynamic and ubiquitous environments because they support decoupled and asynchronous one-to-many and many-to-many information dissemination. Event systems are widely used because asynchronous messaging provides a flexible alternative to RPC. They are typically implemented using an overlay network of routers. A content-based router forwards event messages based on filters that are installed by subscribers and other routers. This paper addresses the optimization of content-based routing tables organized using the covering relation and presents novel configurations for improving local and distributed operation. We present the poset-derived forest data structure and variants that perform considerably better under frequent filter additions and removals than existing data structures. The results offer a significant performance increase to currently known covering-based routing mechanisms. Sasu Tarkoma received his M.Sc. and Ph.Lic degrees in Computer Science from the University of Helsinki, Department of Computer Science. He has over 20 scientific publications and has also contributed to several books on mobile middleware. His research interests include distributed computing and middleware. Jaakko Kangasharju is a PhD student at the University of Helsinki and working as a researcher at the Helsinki Institute for Information Technology. His research is concentrated on XML messaging and processing in the mobile wireless environment. He has participated in related standardization efforts at the Object Management Group and the World Wide Web Consortium.  相似文献   
10.
In this paper, we present a middleware for synchronization of opaque and structured data in a mobile and resource-constrained environment. The presented Syxaw (Synchronizer with XML-awareness) system distinguishes itself from related proposals in that it interoperates transparently with resources on the World Wide Web, and by exhibiting a model of synchronization that is both easy to understand and well suited for weak devices in a mobile and ubiquitous environment. We demonstrate the feasibility of the proposed system by considering several usage scenarios, including working on the Web and collaborative XML editing. We consider system performance on a mobile wireless device, and examine the impact of different optimization techniques to the performance. According to our analysis, Web interoperability suggests that the data share model be kept simple and conservative, and that moving functionality onto the client is advantageous. We find that the techniques of operation bundling and concurrent use of network downlink and uplink improve network utilization, but that achieving full bandwidth usage with a weak client is challenging in practice.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号