首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
工业技术   7篇
  2023年   1篇
  2022年   2篇
  2021年   1篇
  2019年   1篇
  2005年   1篇
  1992年   1篇
排序方式: 共有7条查询结果,搜索用时 15 毫秒
1
1.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
2.
Wireless Personal Communications - The edge computing paradigm has experienced quick development in recent years. This paradigm is featured by pushing the storage and computational resources closer...  相似文献   
3.
Wireless Personal Communications - This paper presents the designing of a low voltage low power single ended operational transconductance amplifier (OTA) for low frequency application. The designed...  相似文献   
4.
5.

To ensure confidentiality and efficient network bandwidth, digital data must be compressed and encrypted. In most communication systems, these two factors are critical for information processing. Image compression and encryption may result in lower restoration quality and performance. Secure-JPEG is an effort to create a compression and encryption technique for digital data. This approach is based on the JPEG compression standard, which is the most extensively used lossy compression scheme. It enhances the usual JPEG compression algorithm to encrypt data during compression. The Secure-JPEG approach encrypts the data while it is compressed, and it may be easily modified to offer near lossless compression. Lossless compression, on the other hand, has a lower compression ratio and is only useful in certain situations. The paper addresses the issue of insufficient security as a result of the usage of a simple random number generator that is not cryptographically safe. The enhanced security characteristics are provided via the Generalized Bernoulli Shift Map, which has a chaotic system with proven security. Several cryptographic tests are used to validate the algorithm's security, and the chaotic system's behavior is also examined.

  相似文献   
6.
The relationship between hydraulic gradient and transmissivity for most synthetic drainage materials is known to be non-linear. Performance transmissivity tests, often required for the purpose of design and material acceptance, must be performed at site-specific gradients. Since the accuracy of measured transmissivity values at low gradients (less than 0.1) can be poor, this article suggests an alternative approach where transmissivity at the lower gradients is calculated based on the measured values at a series of higher gradients. Rather than perform a test at a single low gradient, this approach proposes performing exactly the same test but taking measurements at three or more arbitrary higher gradients. The resulting relationship is typically non-linear and can be used to calculate transmissivity at any site-specific gradient. This method significantly improves the accuracy of transmissivity values at low gradients and, as such, helps with resolving disputes during product conformance testing.  相似文献   
7.
Under certain unique situations a permeating liquid can approach a geotextile filter under dynamic conditions. Such hydrodynamic conditions can represent the ultimate challenge to the proper functioning of the filter, particularly from a soil retention perspective.

This short note presents a laboratory test method which can be used to simulate such hydrodynamic conditions. The soil (in total or its fine fraction) is added incrementally to the test setup. Dynamics pulses are then applied under controlled pressure conditions for a given time period. Flow rate, or permittivity, tests are then conducted in the conventional manner. The limiting behavior developed over successive soil increments can then be assessed.

The purpose of this technical note is to describe the test setup and illustrate the flow rate behavior under a variety of soil, geotextile and pulse intensity conditions.  相似文献   

1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号