首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   0篇
机械仪表   3篇
轻工业   4篇
无线电   5篇
自动化技术   9篇
  2021年   1篇
  2020年   2篇
  2017年   1篇
  2014年   1篇
  2013年   4篇
  2012年   3篇
  2011年   2篇
  2010年   3篇
  2008年   1篇
  2007年   1篇
  2006年   1篇
  1996年   1篇
排序方式: 共有21条查询结果,搜索用时 31 毫秒
1.
Wireless sensor network(WSN)is effective for monitoring the target environment,which consists of a large number of sensor nodes of limited energy.An efficient medium access control(MAC)protocol is thus imperative to maximize the energy efficiency and performance of WSN.The most existing MAC protocols are based on the scheduling of sleep and active period of the nodes,and do not consider the relationship between the load condition and performance.In this paper a novel scheme is proposed to properly determine the duty cycle of the WSN nodes according to the load,which employs the Q-leaming technique and function approximation with linear regression.This allows low-latency energy-efficient scheduling for a wide range of traffic conditions,and effectively overcomes the limitation of Q-learning with the problem of continuous state-action space.NS3 simulation reveals that the proposed scheme significantly improves the throughput,latency,and energy efficiency compared to the existing fully active scheme and S-MAC.  相似文献   
2.
Recently, as the incidents of the security breach and the personal information leakage in public institutions and the major information/communication infrastructure have increased, the importance of the development and training of human resources specialized in cybersecurity, who can immediately respond to this are emphasized. Accordingly, the government has announced policies for the development of human resources, established and operated public sector cybersecurity training centers; however, there is no method for understanding the investment performance and effect of the present cybersecurity education/training in the public sector. For the establishment of a training system and the quality control of continuing education, a method for evaluating the performance of the training is needed, and this can prove the justification of the promotion of the training program and the sustainability of the training center. The goal of this study is to analyze the outcome of education and training in the field of information security and economic return on investment. For this purpose, through literature research on the outcome of the domestic and overseas education and training, this study drew a model that can apply.  相似文献   
3.
Recently, Huang and Cao proposed a novel and efficient unlinkable secret handshakes scheme with several security features including the affiliation-hiding property and the AKE-security. In this paper, we examine the security of the Huang-Cao scheme and show that the scheme fails to achieve two fundamental security requirements, the affiliation-hiding property and the AKE-security.  相似文献   
4.
A high frequency and soft-switched AC-to-DC rectifier employing a series-type resonant circuit is proposed to overcome the disadvantages of the conventional peak-rectifying circuit. Using the proposed rectifier, a high power factor and low harmonic currents are obtained in the AC line. Furthermore, several advantages such as high power density and wide output voltage range can also be available. Through simulation and experimental results, the usefulness of the proposed rectifier is verified.  相似文献   
5.
Zernike phase contrast has been added to a full‐field X‐ray microscope with Fresnel zone plates that was in operation at 6.95 keV. The spatial resolution has also been improved by increasing the magnification of the microscope objective looking at the CsI(Tl) scintillation crystal. Cu no. 2000 meshes and a zone plate have been imaged to see the contrast as well as the spatial resolution. A Halo effect coming from the Zernike phase contrast was clearly visible on the images of meshes.  相似文献   
6.
A discrete time domain modelling is presented for the pulse-width modulated series resonant converter (PWM-SRC) with a discontinuous current mode. This nonlinear system is linearized about its equilibrium state to obtain a linear discrete time model for the investigation of small signal performances such as the stability and transient response. The usefulness of this small signal model is verified by dynamic simulation.  相似文献   
7.
8.
9.
Deniable authentication scheme is one of useful tools for secure communications. The scheme allows a sender to prove the authenticity of a message to a specified receiver without permitting the receiver to prove that the message was authenticated by the sender. Non-interactive schemes are more attractive than interactive schemes in terms of communication overhead, and thus several non-interactive deniable authentication scheme have been proposed. In this paper, we propose an efficient non-interactive deniable authentication scheme based on trapdoor commitment scheme. We construct an efficient trapdoor commitment scheme which provides very efficient commitment evaluation operation. Then we design an efficient non-interactive deniable authentication scheme by using the trapdoor commitment scheme. We also prove the security of our scheme under firmly formalized security model.  相似文献   
10.
With the fast development of software defined network (SDN), numerous researches have been conducted for maximizing the performance of SDN. Currently, flow tables are utilized in OpenFlows witch for routing. Due to the space limitation of flow table and switch capacity, variousissues exist in dealing with the flows.The existing schemes typically employ reactive approach such that the selection of evicted entries occurs when timeout or table miss occurs. In this paper a proactive approach is proposed based on the prediction of the probability of matching of the entries. Here eviction occurs proactively when the utilization of flow table exceeds a threshold, and the flow entry of the lowestmatching probability is evicted. The matching probability is estimated using hiddenMarkov model (HMM).Computersimulation reveals that it significantly enhances the prediction accuracy and decreases the number of table misses compared to the standard Hard timeout scheme and Flow master scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号