首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   0篇
工业技术   18篇
  2022年   2篇
  2021年   1篇
  2019年   2篇
  2018年   3篇
  2017年   3篇
  2015年   1篇
  2014年   1篇
  2013年   2篇
  2011年   1篇
  2010年   2篇
排序方式: 共有18条查询结果,搜索用时 16 毫秒
1.
Data replication techniques are used in data grid to reduce makespan, storage consumption, access latency and network bandwidth. Data replication enhances data availability and thereby increases the system reliability. There are two steps involved in data replication, namely, replica placement and replica selection. Replica placement involves identifying the best possible node to duplicate data based on network latency and user request. Replica selection involves selecting the best replica location to access the data for job execution in the data grid. Various replica placement and selection algorithms are available in the literature. These algorithms measure and analyze different parameters such as bandwidth consumption, access cost, scalability, execution time, storage consumption and makespan. In this paper, various replica placement and selection strategies along with their merits and demerits are discussed. This paper also analyses the performance of various strategies with respect to the parameters mentioned above. In particular, this paper focuses on the dynamic replica placement and selection strategies in the data grid environment.  相似文献   
2.
Wireless Personal Communications - Wireless Sensor Network plays a vital role and part of real time communication applications. Location of unknown node is difficult to find in the presence of...  相似文献   
3.
In this research article, a triangular‐shaped microwave network cloak made out of interconnected patches was designed at the frequency of 2.88 GHz. Its performances in terms of field distributions and radar cross section scattering were compared with the existing structures. The novel triangular‐shaped cloak structure was then applied to cloak a hindering obstacle placed in front of an electromagnetic source. The simulated scattering parameter and radiation pattern of antenna source were then validated through the experimental results. Also, the proposed structure was applied to reduce the mutual interference between two neighboring antennas. The effects of various parameters such as position and size of the cloak, dielectric constant, and substrate thickness on the cloaking effect were also simulated and studied.  相似文献   
4.
Wireless Personal Communications - Efficient, quick and reliable spectrum sensing in consonance with maximum throughput is required at the cognitive radios to achieve maximum utilization of the...  相似文献   
5.
Appearance of highly intelligent and advanced robots that react and recognize to their environment has lead to the increment in the complexity of the embedded systems that govern their reaction. This developing multifaceted nature, over a timeframe, has influenced the general responsiveness and battery life of the robot. From controlling a drone to an internet controlled coffee maker, an on-board processor for the calculation of all control signs is required for setting off a reaction to the stimuli. At the point when the unpredictability of the embedded system rises, more convoluted computation is required to react to those inputs. This has not only reduced the general responsiveness and battery life of the robot but also has additionally prompted the need of overhauling the equipment to suit the upsurge in the calculation required. The solution to this problem is by offloading the critical tasks like control signal computation or image processing to a centralized server which would eliminate the requirement of complex on-board processors. A comprehensive analysis is presented on the feasibility of such code offloading in embedded robotic systems and its applicability to other domains is discussed. The obtained results will be compared to the results obtained in other domains involving code offloading and analysed to strike out any patterns in their results.  相似文献   
6.
Although standards for orifice flow meter design, installation, and calibration are supported herein, noncompliant devices exist in many pilot-, lab-scale, and on-board applications. For these, a common calibration practice is to preserve the ideal square root relation and determine a device specific discharge coefficient value. This work provides theoretical and empirical analyses to support relaxing the square root relation between orifice pressure drop and flow rate for noncompliant devices. The resulting power law relation is shown to improve accuracy, precision, and rangeability. Whether a device specific square root or power law model is used, it requires off-line or in-line calibration data. As such, a power law calibration model may only be useful for on-board and small-scale applications.  相似文献   
7.
The communication process is very easy today due to the rapid growth of information technology. In addition, the development of cloud computing technology makes it easier than earlier days by facilitating the large volume of data exchange anytime and from anywhere in the world. E-businesses are successfully running today due to the development of cloud computing technology. Specifically in cloud computing, cloud services are providing enormous support to share the resources and data in an efficient way with less cost expenses for businessmen. However, security is an essential issue for cloud users and services. For this purpose, many security policies have been introduced by various researchers for enhancing the security in e-commerce applications. However, the available security policies are also failing to provide the secured services in the society and e-commerce applications. To overcome this disadvantage, we propose a new policy-oriented secured service model for providing the security of the services in the cloud. The proposed model is the combination of a trust aware policy scheduling algorithm and an effective and intelligent re-encryption scheme. Here, the dynamic trust aware policy-oriented service for allocating the cloud user’s request by the cloud service provider and an effective and re-encryption scheme is used that uses intelligent agent for storing the data in the cloud database securely. The proposed model assures the scalability, reliability, and security for the stored e-commerce data and service access.  相似文献   
8.
The non‐enzymatic glycation of macromolecules resulting into advanced glycation end products (AGEs) that constituents lead secondary complication in diabetes. Currently, scientists are focusing on identifying a novel compound that possibly inhibits AGEs without affecting normal cellular function. So far a number of natural and synthetic compounds were reported. This study intended to evaluate the gold nanoparticles (GNPs) on carbohydrate digestive enzymes inhibition and methylglyoxal (MGO) trapping ability. Initially, GNPs were synthesised using Couroupita guianensis and characterised. Further, remarkable inhibition of α‐amylase, and glucosidase was found through calorimetric techniques. In addition, the results concluded that GNPs limited the glucose uptake and lead to AGEs inhibition. Also, the mechanistic link behind this study illustrated as MGO inhibition will restrict further glycation of macromolecules, eventually control the complication progression. Collectively, GNPs have significant inhibition of digestive enzymes, MGO and AGEs on dose‐dependent manner and metal coated polyphenols have an ideal therapeutic role in controlling diabetes and its complications.Inspec keywords: gold, nanomedicine, enzymes, molecular biophysics, diseases, biochemistry, nanoparticles, calorimetry, patient treatmentOther keywords: gold nanosupplement, selective methylglyoxal inhibition, selective enzyme inhibition, diabetes, nonenzymatic glycation, macromolecules, advanced glycation end products, lead secondary complication, normal cellular function, natural compounds, synthetic compounds, carbohydrate digestive enzymes inhibition, methylglyoxal trapping ability, Couroupita guianensis, α‐amylase, glucosidase, calorimetric techniques, glucose uptake, dose‐dependent inhibition, metal coated polyphenols, therapeutics, Au  相似文献   
9.
Wireless Personal Communications - The power over fiber (PoF) scheme delivers simultaneous multiband data and feed power transmission via a double-clad fiber (DCF) for bidirectional radio over...  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号