期刊文献+
共找到624篇文章
< 1 2 32 >
每页显示 20 50 100
Privacy Preserving Solution for the Asynchronous Localization of Underwater Sensor Networks 被引量:10
1
作者 Haiyan Zhao Jing Yan +1 位作者 Xiaoyuan Luo Xinping Guan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1511-1527,共17页
Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security atta... Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security attack and mobility characteristics of underwater environment make localization much more challenging as compared with terrestrial sensor networks.This paper is concerned with a privacy-preserving asynchronous localization issue for USNs.Particularly,a hybrid network architecture that includes surface buoys,anchor nodes,active sensor nodes and ordinary sensor nodes is constructed.Then,an asynchronous localization protocol is provided,through which two privacy-preserving localization algorithms are designed to estimate the locations of active and ordinary sensor nodes.It is worth mentioning that,the proposed localization algorithms reveal disguised positions to the network,while they do not adopt any homomorphic encryption technique.More importantly,they can eliminate the effect of asynchronous clock,i.e.,clock skew and offset.The performance analyses for the privacy-preserving asynchronous localization algorithms are also presented.Finally,simulation and experiment results reveal that the proposed localization approach can avoid the leakage of position information,while the location accuracy can be significantly enhanced as compared with the other works. 展开更多
关键词 asynchronous clock LOCALIZATION privacy preservation underwater sensor networks(USNs)
在线阅读 下载PDF
Resource saving based dwell time allocation and detection threshold optimization in an asynchronous distributed phased array radar network 被引量:2
2
作者 Haowei ZHANG Weijian LIU Xiao YANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第11期311-327,共17页
The resource optimization plays an important role in an asynchronous Phased Array Radar Network(PARN)tracking multiple targets with Measurement Origin Uncertainty(MOU),i.e.,considering the false alarms and missed dete... The resource optimization plays an important role in an asynchronous Phased Array Radar Network(PARN)tracking multiple targets with Measurement Origin Uncertainty(MOU),i.e.,considering the false alarms and missed detections.A Joint Dwell Time Allocation and Detection Threshold Optimization(JDTADTO)strategy is proposed for resource saving in this case.The Predicted Conditional Cramér-Rao Lower Bound(PC-CRLB)with Bayesian Detector and Amplitude Information(BD-AI)is derived and adopted as the tracking performance metric.The optimization model is formulated as minimizing the difference between the PC-CRLBs and the tracking precision thresholds under the constraints of upper and lower bounds of dwell time and false alarm ratio.It is shown that the objective function is nonconvex due to the Information Reduction Factor(IRF)brought by the MOU.A cyclic minimizer-based solution is proposed for problem solving.Simulation results confirm the flexibility and robustness of the JDTADTO strategy in both sufficient and insufficient resource scenarios.The results also reveal the effectiveness of the proposed strategy compared with the strategies adopting the BD without detection threshold optimization and amplitude information. 展开更多
关键词 asynchronous data fusion Bayesian detector Phased Array Radar network(PARN) Predicted Conditional CramE´R-Rao Lower Bound(PC-CRLB) Resource management
原文传递
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks 被引量:1
3
作者 Wei Zhou Xing Jiang +4 位作者 Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng 《Digital Communications and Networks》 CSCD 2024年第5期1405-1414,共10页
In Software-Defined Networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... In Software-Defined Networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of QoS can be defined as,for example,average latency,packet loss ratio,and throughput.The SDN controller can use network statistics and a Deep Reinforcement Learning(DRL)method to resolve this challenge.In this paper,we formulate dynamic routing in an SDN as a Markov decision process and propose a DRL algorithm called the Asynchronous Advantage Actor-Critic QoS-aware Routing Optimization Mechanism(AQROM)to determine routing strategies that balance the traffic loads in the network.AQROM can improve the QoS of the network and reduce the training time via dynamic routing strategy updates;that is,the reward function can be dynamically and promptly altered based on the optimization objective regardless of the network topology and traffic pattern.AQROM can be considered as one-step optimization and a black-box routing mechanism in high-dimensional input and output sets for both discrete and continuous states,and actions with respect to the operations in the SDN.Extensive simulations were conducted using OMNeT++and the results demonstrated that AQROM 1)achieved much faster and stable convergence than the Deep Deterministic Policy Gradient(DDPG)and Advantage Actor-Critic(A2C),2)incurred a lower packet loss ratio and latency than Open Shortest Path First(OSPF),DDPG,and A2C,and 3)resulted in higher and more stable throughput than OSPF,DDPG,and A2C. 展开更多
关键词 Software-defined networks asynchronous advantage actor-critic QoS-aware routing optimization mechanism
在线阅读 下载PDF
REA-MAC:A low latency routing-enhanced asynchronous duty-cycle MAC protocol for wireless sensor networks
4
作者 唐宏伟 曹建农 +1 位作者 孙彩霞 卢凯 《Journal of Central South University》 SCIE EI CAS 2013年第3期678-687,共10页
Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during th... Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during the operational cycle,which results in the packet delivery latency increased significantly on the multiple hops path.To reduce the packet delivery latency on multi-hop path and energy waste of the sender's idle listening,a new low latency routing-enhanced asynchronous duty-cycle MAC protocol was presented,called REA-MAC.In REA-MAC,each sensor node decided when it waked up to send the beacon based on cross-layer routing information.Furthermore,the sender adaptively waked up based on the relationship between the transmission request time and the wakeup time of its next hop node.The simulation results show that REA-MAC reduces delivery latency by 60% compared to RI-MAC and reduces 8.77% power consumption on average.Under heavy traffic,REA-MAC's throughput is 1.48 times of RI-MAC's. 展开更多
关键词 wireless sensor networks asynchronOUS duty-cycle media access control protocol idle listening low latency
在线阅读 下载PDF
Inference of interactions between players based on asynchronously updated evolutionary game data
5
作者 曾红丽 景浡 +1 位作者 王于豪 秦绍萌 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期142-149,共8页
The interactions between players of the prisoner's dilemma game are inferred using observed game data.All participants play the game with their counterparts and gain corresponding rewards during each round of the ... The interactions between players of the prisoner's dilemma game are inferred using observed game data.All participants play the game with their counterparts and gain corresponding rewards during each round of the game.The strategies of each player are updated asynchronously during the game.Two inference methods of the interactions between players are derived with naive mean-field(n MF)approximation and maximum log-likelihood estimation(MLE),respectively.Two methods are tested numerically also for fully connected asymmetric Sherrington-Kirkpatrick models,varying the data length,asymmetric degree,payoff,and system noise(coupling strength).We find that the mean square error of reconstruction for the MLE method is inversely proportional to the data length and typically half(benefit from the extra information of update times)of that by n MF.Both methods are robust to the asymmetric degree but work better for large payoffs.Compared with MLE,n MF is more sensitive to the strength of couplings and prefers weak couplings. 展开更多
关键词 network reconstruction prisoner's dilemma game asynchronously update
原文传递
Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
6
作者 黄征 龚征 李强 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期112-116,共5页
This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works ... This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network. 展开更多
关键词 secret share secure multi-party computation asynchronous network
原文传递
Joint optimization via deep reinforcement learning for secure-driven NOMA-UAV networks
7
作者 Danhao DENG Chaowei WANG +1 位作者 Lexi XU Fan JIANG 《Chinese Journal of Aeronautics》 2025年第10期134-143,共10页
Non-Orthogonal Multiple Access(NOMA)assisted Unmanned Aerial Vehicle(UAV)communication is becoming a promising technique for future B5G/6G networks.However,the security of the NOMA-UAV networks remains critical challe... Non-Orthogonal Multiple Access(NOMA)assisted Unmanned Aerial Vehicle(UAV)communication is becoming a promising technique for future B5G/6G networks.However,the security of the NOMA-UAV networks remains critical challenges due to the shared wireless spectrum and Line-of-Sight(LoS)channel.This paper formulates a joint UAV trajectory design and power allocation problem with the aid of the ground jammer to maximize the sum secrecy rate.First,the joint optimization problem is modeled as a Markov Decision Process(MDP).Then,the Deep Reinforcement Learning(DRL)method is utilized to search the optimal policy from the continuous action space.In order to accelerate the sample accumulation,the Asynchronous Advantage Actor-Critic(A3C)scheme with multiple workers is proposed,which reformulates the action and reward to acquire complete update duration.Simulation results demonstrate that the A3C-based scheme outperforms the baseline schemes in term of the secrecy rate and stability. 展开更多
关键词 asynchronous advantage actor-critic(A3C) NOMA-UAV networks Power allocation Secure transmission UAV trajectory design
原文传递
多模态残差注意力网络异步电动机故障诊断
8
作者 古玉锋 燕钢强 +1 位作者 黎程山 苟瑞龙 《振动.测试与诊断》 北大核心 2026年第1期123-131,220,共10页
针对在线故障诊断中多源信息利用不足与模型识别精度不高的问题,提出了一种主成分分析(principal component analysis,简称PCA)与残差注意力网络相结合的多传感器融合故障诊断方法(multi-sensor feature fusion residual attention netw... 针对在线故障诊断中多源信息利用不足与模型识别精度不高的问题,提出了一种主成分分析(principal component analysis,简称PCA)与残差注意力网络相结合的多传感器融合故障诊断方法(multi-sensor feature fusion residual attention network,简称MSF-ResAttNet),以实现三相异步交流电动机的高精度诊断。首先,采集电动机在不同运行状态下的振动、电压及电流等多源信号;其次,利用PCA对同源传感器数据进行数据层融合,增强多源信息的关联性与稳定性;然后,将数据层融合后的特征输入结合多分支残差结构与通道-空间双重注意力机制(convolutional block attention module,简称CBAM)注意力模块的深度神经网络,实现对关键特征通道和空间位置的自适应提取与强化;最后,在电动机故障诊断实验平台上与卷积神经网络(convolutional neural network,简称CNN)、残差神经网络(residual neural network,简称ResNet)、早期融合卷积神经网络(early fusion convolutional neural network,简称EF-CNN)及多传感器融合卷积神经网络(multi-sensor feature fusion convolutional neural network,简称MSF-CNN)进行对比,并在公开数据集KAIST上进行迁移测试。结果表明,MSF-ResAttNet在实验平台的诊断准确率为99.57%,在公开数据集KAIST测试的诊断准确率为98.86%,与其他方法相比均具有一定的优势,提升了电动机故障诊断的精度,具有较强的泛化能力。 展开更多
关键词 多传感器融合 异步电动机 故障诊断 残差神经网络 注意力机制
在线阅读 下载PDF
基于多源传感器异步融合与深度残差网络的行星减速器故障诊断研究
9
作者 袁琪 《模具制造》 2026年第2期192-194,共3页
针对传统行星减速器故障诊断方法依赖单一传感器或同步数据融合,存在信息利用不充分、时间延迟处理能力不足的问题。提出了一种基于多源传感器异步融合与深度残差网络的故障诊断方法,该方法通过构建异步融合策略有效处理不同传感器间的... 针对传统行星减速器故障诊断方法依赖单一传感器或同步数据融合,存在信息利用不充分、时间延迟处理能力不足的问题。提出了一种基于多源传感器异步融合与深度残差网络的故障诊断方法,该方法通过构建异步融合策略有效处理不同传感器间的时间差异,实现对行星减速器多种故障模式的精确识别,显著提升了故障诊断精度。 展开更多
关键词 异步融合 深度残差网络 行星减速器 故障诊断
在线阅读 下载PDF
基于IDBO-LSTM神经网络的异步电机故障辨识
10
作者 梁天添 杨健雄 钱振明 《大连交通大学学报》 2026年第1期130-139,共10页
针对长短期记忆神经网络(Long Short Term Memory Neural Network,LSTMNN)在辨识异步电机故障时,因人工选择网络超参数导致的辨识精度下降问题,提出一种改进的蜣螂优化算法寻优LSTMNN的重要参数。首先,建立具有定子匝间短路故障的异步... 针对长短期记忆神经网络(Long Short Term Memory Neural Network,LSTMNN)在辨识异步电机故障时,因人工选择网络超参数导致的辨识精度下降问题,提出一种改进的蜣螂优化算法寻优LSTMNN的重要参数。首先,建立具有定子匝间短路故障的异步电机系统模型;其次,利用精英反向学习策略、分段线性混沌映射、动态混沌权重因子和动态权重系数等方法改进蜣螂优化算法;最后,使用改进蜣螂优化算法对LSTMNN的关键超参数进行寻优。仿真结果表明,相较于基于蜣螂优化算法和基于改进麻雀算法的LSTMNN,提出的优化LSTMNN对故障及其他变量的辨识均方根误差分别降低了51.93%、36.49%,平均绝对误差分别降低了56.83%、43.99%,平均绝对百分误差分别降低了29.91%、22.25%,表明采用改进的蜣螂优化算法对LSTMNN的关键超参数寻优,可显著提高LSTM网络对电机故障及其他变量的辨识能力。 展开更多
关键词 异步电机 故障辨识 长短期记忆神经网络 改进的蜣螂优化算法
在线阅读 下载PDF
基于SHAM和时-空特征模型的电机故障诊断研究
11
作者 田宇 郭晓东 +3 位作者 马文彪 崔鸣伦 吴春辉 吴春华 《组合机床与自动化加工技术》 北大核心 2026年第2期123-128,共6页
针对异步电机信号的故障敏感性差异大和故障特征提取困难等问题,提出了一种基于自混合注意力机制和时-空特征挖掘模型的异步电机故障诊断方法。该方法首先将自注意力机制擅长处理长距离依赖和全局信息特征的优势与squeeze-and-excitatio... 针对异步电机信号的故障敏感性差异大和故障特征提取困难等问题,提出了一种基于自混合注意力机制和时-空特征挖掘模型的异步电机故障诊断方法。该方法首先将自注意力机制擅长处理长距离依赖和全局信息特征的优势与squeeze-and-excitation(SE)网络增强通道特征相关性的优点相结合,设计了一种新型的自混合注意力机制(self-hybrid attention mechanisms,SHAM),可以有效地降低异步电机电信号的故障敏感性差异;其次,将一维卷积神经网络(1D-convolutional neural network,1D-CNN)和SHAM相结合形成卷积自混合注意力模块(C-SHAM)来提取不同视野域的空间特征和捕获信号特征长范围依赖,同时抑制不同通道下同源信号内无关分量的影响;随后,将双向长短时记忆网络(bidirectional long and short term memory networks,Bi-LSTM)和SHAM相结合提出时序自混合注意力模块(BL-SHAM),进一步实现信号时序特征的再提取和不同通道特征的自适应融合;最后,通过分类器实现电机的故障识别。实验结果表明,在异步电机实验平台上,所提出的方法能够对异步电机的故障电信号进行有效地分类,平均准确率大于98%。 展开更多
关键词 异步电动机 故障诊断 电信号 自混合注意力机制 卷积神经网络 双向长短时记忆网络
在线阅读 下载PDF
Research on robust fault-tolerant control for networked control system with packet dropout 被引量:50
12
作者 Huo Zhihong Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期76-82,共7页
A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures an... A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures and actuators failures was analyzed using hybrid systems technique based on the robust fault-tolerant control theory. The parametric expression of controller is given based on the feasible solution of linear matrix inequality. The simulation results are provided on the basis of detailed theoretical analysis, which further demonstrate the validity of the proposed schema. 展开更多
关键词 networked control system (NCS) Fault-tolerant control (FTC) asynchronous dynamical systems (ADS) Integrity design Packet dropout Time delay
在线阅读 下载PDF
Stability of Iterative Learning Control with Data Dropouts via Asynchronous Dynamical System 被引量:15
13
作者 Xu-Hui Bu Zhong-Sheng Hou 《International Journal of Automation and computing》 EI 2011年第1期29-36,共8页
In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchr... In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations. 展开更多
关键词 Iterative learning control (ILC) networked control systems (NCSs) data dropouts asynchronous dynamical system robustness.
在线阅读 下载PDF
New structure of Kalman filter for radar networking 被引量:1
14
作者 HeYou DongYunlong WangGuohong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期241-244,共4页
Due to the different data rates of the sensors and communication delays in the radar netting, the research of the asynchronous multisensor data fusion problem is more practical than that of the synchronous one. Throug... Due to the different data rates of the sensors and communication delays in the radar netting, the research of the asynchronous multisensor data fusion problem is more practical than that of the synchronous one. Through discussing the sequential approach, which is the classical asynchronous multisensor data fusion algorithm, a new algorithm based on distributed computation structure is proposed. The new algorithm can meet the requirement of real-time computation of netting fusion system, and is more practical for engineering compared with the classical sequential approach. Simulation results show the validity of the presented algorithm. 展开更多
关键词 MULTI-SENSOR radar networking asynchronOUS FUSION SEQUENTIAL
在线阅读 下载PDF
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography 被引量:2
15
作者 Lein Harn Changlu Lin 《International Journal of Communications, Network and System Sciences》 2014年第1期22-29,共8页
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor... In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well. 展开更多
关键词 Shamir’s(t n)Secret Sharing Scheme SECRET RECONSTRUCTION THRESHOLD CRYPTOGRAPHY THRESHOLD DECRYPTION asynchronOUS networks
暂未订购
Asynchronism of the spreading dynamics underlying the bursty pattern 被引量:1
16
作者 Tong Wang Ming-Yang Zhou Zhong-Qian Fu 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第5期586-592,共7页
The potential mechanisms of the spreading phenomena uncover the organizations and functions of various systems.However,due to the lack of valid data,most of early works are limited to the simulated process on model ne... The potential mechanisms of the spreading phenomena uncover the organizations and functions of various systems.However,due to the lack of valid data,most of early works are limited to the simulated process on model networks.In this paper,we track and analyze the propagation paths of real spreading events on two social networks:Twitter and Brightkite.The empirical analysis reveals that the spreading probability and the spreading velocity present the explosive growth within a short period,where the spreading probability measures the transferring likelihood between two neighboring nodes,and the spreading velocity is the growth rate of the information in the whole network.Besides,we observe the asynchronism between the spreading probability and the spreading velocity.To explain the interesting and abnormal issue,we introduce the time-varying spreading probability into the susceptible-infected(SI)and linear threshold(LT)models.Both the analytic and experimental results reproduce the spreading phenomenon in real networks,which deepens our understandings of spreading problems. 展开更多
关键词 social network information diffusion spreading probability asynchronism
原文传递
Hardware-in-the-loop simulation of communication networks 被引量:3
17
作者 杨杰 李寅 《Journal of Beijing Institute of Technology》 EI CAS 2012年第3期376-381,共6页
To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits an... To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits and shortages were compared.Combing system-in-the-loop(SITL) simulation principle with high level architecture(HLA),an HITL simulation model of asynchronous transfer mode(ATM) network was constructed.The throughput and end-to-end delay of all-digital simulation and HITL simulation was analyzed,which showed that HITL simulation was more reliable and effectively improved the simulation credibility of communication network.Meanwhile,HLA-SITL method was fast and easy to achieve and low-cost during design lifecycle.Thus,it was a feasible way to research and analyze the large-scale network. 展开更多
关键词 hardware-in-the-loop(HITL) simulation high level architecture(HLA) system-in-the-loop(SITL) asynchronous transfer mode(ATM) network
在线阅读 下载PDF
TDOA Localization Algorithm with Compensation of Clock Offset for Wireless Sensor Networks 被引量:10
18
作者 XIONG Hui CHEN Zhiyuan +1 位作者 YANG Beiya NI Rongpei 《China Communications》 SCIE CSCD 2015年第10期193-201,共9页
This paper presents a source localization algorithm based on the source signal's time-difference-of-arrival(TDOA) for asynchronous wireless sensor network.To obtain synchronization among anchors,all anchors broadc... This paper presents a source localization algorithm based on the source signal's time-difference-of-arrival(TDOA) for asynchronous wireless sensor network.To obtain synchronization among anchors,all anchors broadcast signals periodically,the clock offsets and skews of anchor pairs can be estimated using broadcasting signal's time-of-arrivals(TOA) at anchors.A kalman filter is adopted to improve the accuracy of clock offsets and track the clock drifts due to random fluctuations.Once the source transmits signal,the TOAs at anchors are stamped respectively and source's TDOA error due to clock offset and skew of anchor pair can be mitigated by a compensation operation.Based on a Gaussian noise model,maximum likelihood estimation(MLE) for the source position is obtained.Performance issues are addressed by evaluating the Cramer-Rao lower bound and the selection of broadcasting period.The proposed algorithm is simple and effective,which has close performance with synchronous TDOA algorithm. 展开更多
关键词 wireless sensor network asynchronous sensors Kalman filter localiza-tion time-difference-of-arrival(TDOA) time-of-arrival(TOA) clock offset and skew estimation
在线阅读 下载PDF
A Shared Multi-buffer Banyan Network
19
作者 南华 《High Technology Letters》 EI CAS 1997年第1期67-69,共3页
A Shared Multi-buffer Banyan Network is presented in this letter. Its control algorithm and switching fabric are simple, and it fits the high speed ATM network well. The simulation results show that the throughput of ... A Shared Multi-buffer Banyan Network is presented in this letter. Its control algorithm and switching fabric are simple, and it fits the high speed ATM network well. The simulation results show that the throughput of the proposed model is high. 展开更多
关键词 asynchronOUS TRANSFER MODE Banyan network SHARED multi-buffer
在线阅读 下载PDF
Research on Networked Rapid Product Development Process
20
作者 NI Yan-rong, FAN Fei-ya, JIN Ji-wen, YAN Jun-qi (CIM Institute, Department of Mechanical Engineering, Shanghai Jiaotong University, Shanghai 200030, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期158-159,共2页
Today the cycle time of the product develop is requ ir ed to be shortened. At the same time the requirement of the customers becomes mo re and more diverse and complex. The capability of the develop unit is limited b ... Today the cycle time of the product develop is requ ir ed to be shortened. At the same time the requirement of the customers becomes mo re and more diverse and complex. The capability of the develop unit is limited b ecause of the existence of heterogeneous systems and distributed environments. I n this paper, we bring forward a new approach to solve the problem in product de velopment process. We also settle part key technologies in it. A great deal of information from all kinds of sources in the distributed develop ment process is interweaved. The solution to organize the workflow and manage th e information in the process is called for anxiously. We use a new approach that is asynchronous and synchronous coupling product development approach based on the network. The approach extends the develop process from the time axis. Then t he activities in the process are organized from the asynchronous and synchronous aspects. The state of every activity projects at the ASN (active semantic netwo rk). The ASN includes decision system, intelligent agent, user interface and net work. The ASN decides the types and states of the activities and deals with the couple relationship among them. The knowledge stored in ASN is open to all users through the relative interfaces. Every specialist keeps contact with their user s relying on collaborative platform implements CSCW (computer support collaborat ive work) that integrated product/process design and development. The lack of gl obal communication in product development process can be prevented in the most d egree. The key technologies that exist in the asynchronous and synchronous coupling pro duct develop approach include: integrated development structure, orderly organiz ation of information, transparent management of process, agile transfer of infor mation and rapid prototype. The development process can be completed quickly by these technologies. The technologies involve wide content. In this paper, we dis cuss some key technologies. We validate the approach by the projectrapid response manufacturing a pplication in the distributed environment. The expensive device, high technology and low using lead to RE (Rapid engineering) and RP (Rapid prototype) service a pplication by the network. RE and RP develop rapidly due to the accelerated prod uct development process. RE and RP application service platform is built in the project. 展开更多
关键词 distributed environment asynchronous and synchro nous coupled active semantic network product development process
在线阅读 下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部