首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29篇
  免费   0篇
金属工艺   3篇
无线电   9篇
冶金工业   3篇
自动化技术   14篇
  2010年   1篇
  2007年   2篇
  2006年   2篇
  2004年   4篇
  2003年   4篇
  2002年   2篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1998年   2篇
  1997年   1篇
  1996年   3篇
  1994年   1篇
  1990年   1篇
  1988年   1篇
排序方式: 共有29条查询结果,搜索用时 15 毫秒
1.
Wireless transmissions are highly susceptible to noise and interference. As a result, the error characteristics of a wireless link may vary widely depending on environmental factors such as location of the communicating systems and activity of competing radiation sources, making error control a difficult task. In this paper we evaluate error control strategies for a wireless LAN. Based on low-level packet traces of WaveLAN, we first show that forward error correction (FEC) is effective in recovering from bit corruptions and that packet length adjustment can reduce packet truncation. However, as expected, fixed error control policies can perform very poorly, because they either introduce too much overhead in good environments or are not aggressive enough in bad environments. We address this problem through adaptive error control, i.e., error control policies that adapt the degree of FEC redundancy and the packet size to the environment. The effectiveness of adaptive error control depends on the characteristics of the error environment, e.g., the type of errors and the frequency with which the error environment changes. Our evaluation shows that adaptive error control can improve throughput consistently across a wide range of wireless LAN error environments. The reason for this effectiveness is that changes in the error environment are often caused by human mobility-related events such as the motion of a cordless phone, which take place over seconds, while adaptation protocols can respond in tens of milliseconds. Evaluating adaptive error control in a wireless environments is challenging because repeatable experiments are difficult: the wireless environment cannot easily be isolated and the adaptation process itself changes the environment, which may make trace-based evaluation difficult. We introduce a trace-based evaluation methodology that deals appropriately with changes in packet content and size.  相似文献   
2.
One unique advantage of the kinetic spray process is its ability to mix constituents that would normally react with each other to form coatings. This attribute was used to produce composite coatings with different rare earth iron alloys (REFe2) and several ductile matrices. Composite coatings of Terfenol-D [(Tb0.3Dy0.7)Fe1.9] and SmFe2 were combined with ductile matrices of aluminum, copper, iron, and molybdenum. Evidence of an induced magnetic coercivity was measured for the REFe2-Mo and Fe composite coatings. Coatings were produced on flat substrates and shafts. Coating morphology as well as the physical, magnetostrictive, and magnetic properties of these coatings are discussed. This article was originally published inBuilding on 100 Years of Success: Proceedings of the 2006 International Thermal Spray Conference (Seattle, WA), May 15–18, 2006, B.R. Marple, M.M. Hyland, Y.-Ch. Lau, R.S. Lima, and J. Voyer, Ed., ASM International, Materials Park, OH, 2006.  相似文献   
3.
Multicomputers built around a general network are an attractive architecture for a wide class of applications. The architecture provides many benefits compared with special-purpose approaches, including heterogeneity, reuse of application and system code, and sharing of resources. The architecture also poses new challenges to both computer system implementers and users. First, traditional local-area networks do not have enough bandwidth and create a communication bottleneck, thus seriously limiting the set of applications that can be run effectively. Second, programmers have to deal with large bodies of code distributed over a variety of architectures, and work in an environment where both the network and nodes are shared with other users. Our experience in the Nectar project shows that it is possible to overcome these problems. We show how networks based on high-speed crossbar switches and efficient protocol implementations can support high bandwidth and low latency communication while still enjoying the flexibility of general networks, and we use three applications to demonstrate that network-based multicomputers are a practical architecture. We also show how the network traffic generated by this new class of applications poses severe requirements for networks  相似文献   
4.
Evaluation and characterization of available bandwidth probing techniques   总被引:17,自引:0,他引:17  
The packet pair mechanism has been shown to be a reliable method to measure the bottleneck link capacity on a network path, but its use for measuring available bandwidth is more challenging. In this paper, we use modeling, measurements, and simulations to better characterize the interaction between probing packets and the competing network traffic. We first construct a simple model to understand how competing traffic changes the probing packet gap for a single-hop network. The gap model shows that the initial probing gap is a critical parameter when using packet pairs to estimate available bandwidth. Based on this insight, we present two available bandwidth measurement techniques, the initial gap increasing (IGI) method and the packet transmission rate (PTR) method. We use extensive Internet measurements to show that these techniques estimate available bandwidth faster than existing techniques such as Pathload, with comparable accuracy. Finally, using both Internet measurements and ns simulations, we explore how the measurement accuracy of active probing is affected by factors such as the probing packet size, the length of probing packet train, and the competing traffic on links other than the tight link.  相似文献   
5.
The Internet is rapidly changing from a set of wires and switches that carry packets into a sophisticated infrastructure that delivers a set of complex value-added services to end users. Services can range from bit transport all the way up to distributed value-added services like video teleconferencing, virtual private networking, data mining, and distributed interactive simulations. Before such services can be supported in a general and dynamic manner, we have to develop appropriate resource management mechanisms. These resource management mechanisms must make it possible to identify and allocate resources that meet service or application requirements, support both isolation and controlled dynamic sharing of resources across services and applications sharing physical resources, and be customizable so services and applications can tailor resource usage to optimize their performance. The Darwin project has developed a set of customizable resource management mechanisms that support value-added services. We present and motivate these mechanisms, describe their implementation in a prototype system, and describe the results of a series of proof-of-concept experiments  相似文献   
6.
Tantalum (Ta) coatings have been produced using a relatively new process, kinetic spray. Ta starting powders having particle diameters greater than 65 μm are injected into a de Laval-type nozzle, entrained in a supersonic gas stream, and accelerated to high velocities due to drag effects. The particles’ kinetic energy is transformed via plastic deformation into strain and heat on impact with the substrate surface. Particles are not thermally softened or melted, producing relatively low oxide, reduced residual stress, high adhesion and low porosity coatings. Analysis of the mechanical and physical properties of these Ta coatings demonstrated increasing hardness, cohesive adhesion, and decreasing porosity as a function of particle velocity. Comparison between kinetically sprayed coatings and coatings produced using conventional coating methods will be discussed.  相似文献   
7.
We extend the well-known interval analysis method so that it can be used to gather global flow information for individual array elements. Data dependences between all array accesses in different basic blocks, different iterations of the same loop, and across different loops are computed and represented as labelled arcs in a program flow graph. This approach results in a uniform treatment of scalars and arrays in the compiler and builds a systematic basis from which the compiler can perform numerous global optimizations. This global dataflow analysis is performed as a separate phase in the compiler. This phase only gathers the global relationships between different accesses to a variable, yet the use of this information is left to the code generator. This organization substantially simplifies the engineering of an optimizing compiler and separates the back end of the compiler (e.g. code generator and register allocator) from the flow analysis part. The global dataflow analysis algorithm described in this paper has been implemented and used in an optimizing compiler for a processor with deep pipelines. This paper describes the algorithm and its compact implementation and evaluates it, both with respect to the accuracy of the information and to the compile-time cost of obtaining and using it.  相似文献   
8.
The Internet is evolving from an infrastructure that provides basic communication services into a more sophisticated infrastructure that supports a wide range of electronic services such as virtual reality games and rich multimedia retrieval services. However, this evolution is happening only slowly, in part because the communication infrastructure is too rigid. In this article we present a programmable router architecture in which the control plane functionality of the router can be extended dynamically through the use of delegates. Delegates can control the behavior of the router through a well-defined control interface, allowing service providers and third-party software vendors to implement customized traffic control policies or protocols. We describe Darwin, a system that implements such an architecture. We emphasize the runtime environment the system provides for delegate execution and the programming interface the system exports to support delegates. We demonstrate the advantages of using this system with two delegate examples  相似文献   
9.
Percutaneous transluminal coronary balloon angioplasty has been associated with acute myocardial infarction (MI) as a complication of the procedure. Abrupt closure, distal coronary embolization, intimal dissection, coronary spasm, and acute thrombosis are the principal etiologies. New interventional devices (stent, laser, and atherectomy catheters) have been introduced as alternatives or adjuncts to balloon angioplasty. With use of the New Approaches to Coronary Intervention Registry, the incidence, predictors, and outcome of MI as a complication of using these devices as the primary mode of intervention were studied. There were 3,265 patients from 39 participating centers in the cohort treated with new devices. MI was reported as an in-hospital complication of using new devices in 154 patients (4.7%), including Q-wave MI in 36 patients (1.1%), and non-Q-wave MI in 119 patients (3.6%). MI rates were not significantly different among all patients with devices in the cohort treated with atherectomy (directional, extractional, rotational), laser (AIS, Spectranetics) or the Palmaz-Schatz stent. Multivariate logistic regression showed that post-procedure MI was associated with multivessel disease, high surgical risk, postinfarction angina, and presence of a thrombus prior to the procedure. Prior percutaneous transluminal coronary angioplasty was inversely related to the incidence of MI. When a specific cause of MI could be detected, the main etiologies were: coronary embolus 16.9%, and abrupt closure 27.3%. Other major in-hospital complications were higher in the MI group than the non-MI group: death 7.8% versus 0.8% (p <0.001), and bypass surgery 13.6% versus 1.7% (p <0.001). At 1 year, mortality rates remain higher at 12.9% in the MI group versus 4.9% in the non-MI group (p <0.01). Despite different indications for the use of new devices, they were not predictors for MI with the exception of the rotablator. The incidence of MI (1.1% Q-wave, 3.6% non-Q-wave) was comparable to previously reported rates for balloon angioplasty. The occurrence of MI is associated with an increase in other in-hospital complications and a doubling of 1-year mortality.  相似文献   
10.
We established a novel cancer cell line (MAST) from the ascitic fluid of a metastatic infiltrating ductal carcinoma of the breast. The epithelial and neoplastic nature of the MAST cells was confirmed by ultrastructural analysis. The cell line was maintained as a monolayer with a doubling time of about 68 h, and it possessed an abnormal karyotype with a modal chromosome number of 60, a trisomy of chromosome 18 and other unidentified rearranged chromosomes. Among the markers consistently found in MAST metaphases, we noted a t(14; 14) and a very large subtelocentric, a large satellited acrocentric and a very large submetacentric chromosome with striking fluorescent bands. Immunoenzymatic assay demonstrated that the MAST cell line was positive for estrogen and progesterone receptors. The in vitro drug-sensitivity assay showed a marked resistance of the cell line to 5-fluorouracil and 4-hydroperoxycyclophosphamide and a moderate resistance to etoposide and 4'-epidoxorubicin. The molecular analysis showed a four-to sixfold amplification of the c-myc gene and no amplification or rearrangement of the int-2, c-erbB-2, c-Ha-ras, c-mos and hst-1 genes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号