首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   53篇
  免费   0篇
工业技术   53篇
  2023年   17篇
  2022年   13篇
  2021年   1篇
  2020年   2篇
  2019年   1篇
  2018年   1篇
  2016年   2篇
  2012年   2篇
  2011年   3篇
  2010年   2篇
  2009年   3篇
  2008年   2篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  2004年   1篇
排序方式: 共有53条查询结果,搜索用时 31 毫秒
11.
In recent years, Software Defined Networking (SDN) has become an important candidate for communication infrastructure in smart cities. It produces a drastic increase in the need for delivery of video services that are of high resolution, multiview, and large-scale in nature. However, this entity gets easily influenced by heterogeneous behaviour of the user's wireless link features that might reduce the quality of video stream for few or all clients. The development of SDN allows the emergence of new possibilities for complicated controlling of video conferences. Besides, multicast routing protocol with multiple constraints in terms of Quality of Service (QoS) is a Nondeterministic Polynomial time (NP) hard problem which can be solved only with the help of metaheuristic optimization algorithms. With this motivation, the current research paper presents a new Improved Black Widow Optimization with Levy Distribution model (IBWO-LD)-based multicast routing protocol for smart cities. The presented IBWO-LD model aims at minimizing the energy consumption and bandwidth utilization while at the same time accomplish improved quality of video streams that the clients receive. Besides, a priority-based scheduling and classifier model is designed to allocate multicast request based on the type of applications and deadline constraints. A detailed experimental analysis was carried out to ensure the outcomes improved under different aspects. The results from comprehensive comparative analysis highlighted the superiority of the proposed IBWO-LD model over other compared methods.  相似文献   
12.
Cyberbullying (CB) is a challenging issue in social media and it becomes important to effectively identify the occurrence of CB. The recently developed deep learning (DL) models pave the way to design CB classifier models with maximum performance. At the same time, optimal hyperparameter tuning process plays a vital role to enhance overall results. This study introduces a Teacher Learning Genetic Optimization with Deep Learning Enabled Cyberbullying Classification (TLGODL-CBC) model in Social Media. The proposed TLGODL-CBC model intends to identify the existence and non-existence of CB in social media context. Initially, the input data is cleaned and pre-processed to make it compatible for further processing. Followed by, independent recurrent autoencoder (IRAE) model is utilized for the recognition and classification of CBs. Finally, the TLGO algorithm is used to optimally adjust the parameters related to the IRAE model and shows the novelty of the work. To assuring the improved outcomes of the TLGODL-CBC approach, a wide range of simulations are executed and the outcomes are investigated under several aspects. The simulation outcomes make sure the improvements of the TLGODL-CBC model over recent approaches.  相似文献   
13.
Multimedia Tools and Applications - Numerous seismic datasets are routinely acquired, stored and transferred via different systems and networks. Significant reduction of data sizes with encryption...  相似文献   
14.
This article describes methods for online model-based diagnosis of subsystems of the advanced life support system (ALS). The diagnosis methodology is tailored to detect, isolate, and identify faults in components of the system quickly so that fault-adaptive control techniques can be applied to maintain system operation without interruption. We describe the components of our hybrid modeling scheme and the diagnosis methodology, and then demonstrate the effectiveness of this methodology by building a detailed model of the reverse osmosis (RO) system of the water recovery system (WRS) of the ALS. This model is validated with real data collected from an experimental testbed at NASA JSC. A number of diagnosis experiments run on simulated faulty data are presented and the results are discussed.  相似文献   
15.
This article presents a novel low‐cost integrated multiband antenna design customized for navigation media applications. The distinctive feature of the design consists in using a broadband planar dipole with four arms and a miniaturized feeding‐point, easy to deploy inside the tracking devices, and cost‐effective for supply chain industry. The article first introduces the main challenges and the benefits of miniaturizing antennas for supply‐chain and particularly for navigation media system which is the case‐study. Further the parametric study and final dimensions of the design and the simulation results are discussed. The proposed design is fabricated and the measurements of the radiation pattern and the return loss are performed proving that the antenna with maximum gain up to 10 dBi and S11 up to ?30 dB, exhibits excellent performance for all the frequencies required in the navigation media systems such as 1.6, 1.8, 2.3, 2.4, 2.6, 3.6, and 5.8 GHz. The proposed design was implemented and tested inside a tracking device mounted on a vehicle and compared with existing commercial antennas. This study showed that the proposed antenna is suitable for tracking devices as it is miniaturized for internal integration and it has better 4G and GPS signal detection and low power consumption comparatively with existing commercial antennas.  相似文献   
16.
Recent increases in energy prices, especially oil prices, have become a principal concern for consumers, corporations, and governments. Most analysts believe that oil price fluctuations have considerable consequences on economic activity. Oil markets have become relatively free, resulting in a high degree of oil-price volatility and generating radical changes to world energy and oil industries. Consequently, oil markets are naturally vulnerable to significant high price shifts. An example of such a case is the oil embargo crisis of 1973. In this newly created climate, protection against market risk has become a necessity. Value at Risk (VaR) measures risk exposure at a given probability level and is very important for risk management. Appealing aspects of Extreme Value Theory (EVT) have made convincing arguments for its use in managing energy price risks. In this paper, we model VaR for long and short trading positions in oil market by applying both unconditional and conditional EVT models to forecast Value at Risk. These models are compared to the performances of other well-known modelling techniques, such as GARCH, Historical Simulation and Filtered Historical Simulation. Both conditional EVT and Filtered Historical Simulation procedures offer a major improvement over the conventional methods. Furthermore, GARCH(1, 1)-t model may provide equally good results which are comparable to two combined procedures. Finally, our results confirm the importance of filtering process for the success of standard approaches.  相似文献   
17.
Human fall detection (FD) acts as an important part in creating sensor based alarm system, enabling physical therapists to minimize the effect of fall events and save human lives. Generally, elderly people suffer from several diseases, and fall action is a common situation which can occur at any time. In this view, this paper presents an Improved Archimedes Optimization Algorithm with Deep Learning Empowered Fall Detection (IAOA-DLFD) model to identify the fall/non-fall events. The proposed IAOA-DLFD technique comprises different levels of pre-processing to improve the input image quality. Besides, the IAOA with Capsule Network based feature extractor is derived to produce an optimal set of feature vectors. In addition, the IAOA uses to significantly boost the overall FD performance by optimal choice of CapsNet hyperparameters. Lastly, radial basis function (RBF) network is applied for determining the proper class labels of the test images. To showcase the enhanced performance of the IAOA-DLFD technique, a wide range of experiments are executed and the outcomes stated the enhanced detection outcome of the IAOA-DLFD approach over the recent methods with the accuracy of 0.997.  相似文献   
18.
Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems. This may result in compromised security of the systems, scams, and other such cyberattacks. These attacks hijack huge quantities of the available data, incurring heavy financial loss. At the same time, Machine Learning (ML) and Deep Learning (DL) models paved the way for designing models that can detect malicious URLs accurately and classify them. With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. The presented AFSADL-MURLC model intends to differentiate the malicious URLs from genuine URLs. To attain this, AFSADL-MURLC model initially carries out data preprocessing and makes use of glove-based word embedding technique. In addition, the created vector model is then passed onto Gated Recurrent Unit (GRU) classification to recognize the malicious URLs. Finally, AFSA is applied to the proposed model to enhance the efficiency of GRU model. The proposed AFSADL-MURLC technique was experimentally validated using benchmark dataset sourced from Kaggle repository. The simulation results confirmed the supremacy of the proposed AFSADL-MURLC model over recent approaches under distinct measures.  相似文献   
19.
Line-of-sight clarity and assurance are essential because they are considered the golden rule in wireless network planning, allowing the direct propagation path to connect the transmitter and receiver and retain the strength of the signal to be received. Despite the increasing literature on the line of sight with different scenarios, no comprehensive study focuses on the multiplicity of parameters and basic concepts that must be taken into account when studying such a topic as it affects the results and their accuracy. Therefore, this research aims to find limited values that ensure that the signal reaches the future efficiently and enhances the accuracy of these values’ results. We have designed MATLAB simulation and programming programs by Visual Basic .NET for a semi-realistic communication system. It includes all the basic parameters of this system, taking into account the environment's diversity and the characteristics of the obstacle between the transmitting station and the receiving station. Then we verified the correctness of the system's work. Moreover, we begin by analyzing and studying multiple and branching cases to achieve the goal. We get several values from the results, which are finite values, which are a useful reference for engineers and designers of wireless networks.  相似文献   
20.
Big health data collection and storing for further analysis is a challenging task because this knowledge is big and has many features. Several cloud-based IoT health providers have been described in the literature previously. Furthermore, there are a number of issues related to time consumed and overall network performance when it comes to big data information. In the existing method, less performed optimization algorithms were used for optimizing the data. In the proposed method, the Chaotic Cuckoo Optimization algorithm was used for feature selection, and Convolutional Support Vector Machine (CSVM) was used. The research presents a method for analyzing healthcare information that uses in future prediction. The major goal is to take a variety of data while improving efficiency and minimizing process time. The suggested method employs a hybrid method that is divided into two stages. In the first stage, it reduces the features by using the Chaotic Cuckoo Optimization algorithm with Levy flight, opposition-based learning, and distributor operator. In the second stage, CSVM is used which combines the benefits of convolutional neural network (CNN) and SVM. The CSVM modifies CNN’s convolution product to learn hidden deep inside data sources. For improved economic flexibility, greater protection, greater analytics with confidentiality, and lower operating cost, the suggested approach is built on fog computing. Overall results of the experiments show that the suggested method can minimize the number of features in the datasets, enhances the accuracy by 82%, and decrease the time of the process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号