期刊文献+
共找到508篇文章
< 1 2 26 >
每页显示 20 50 100
VARIABLE-RATE MULTIUSER DIVERSITY IN CORRELATED MIMO CHANNEL VIA VIRTUAL CHANNEL REPRESENTATION
1
作者 Tang Lan You Xiaohu Liang Yingchang 《Journal of Electronics(China)》 2006年第3期332-337,共6页
This paper studies the multiuser diversity with constellation selection based on a virtual representation of realistic Multiple Input Multiple Output (MIMO) correlated channels. To realize multiuser diversity in slo... This paper studies the multiuser diversity with constellation selection based on a virtual representation of realistic Multiple Input Multiple Output (MIMO) correlated channels. To realize multiuser diversity in slow fading channels, random beamforming is adopted. Random beamforming matrix exploiting virtual channel representation is constructed, which can match the channel matrix of the desired user better. Sirnultaneously, adaptive coded modulation is applied to each sub-channel of the selected user to improve the system performance further. 展开更多
关键词 Multiple Input Multiple Output (MIMO) Correlated channel virtual channel BEAMFORMING Multiuser diversity Adaptive modulation
在线阅读 下载PDF
Virtual channel load-balanced routing algorithm for Torus networks 被引量:1
2
作者 WANG Ya-gang DU Hui-min SHEN Xu-bang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第1期70-76,共7页
In order to improve the network performance furthermore, a routing algorithm for 2D-Torus is investigated from the standpoint of load balance for virtual channels. The 2D-Torus network is divided into two virtual netw... In order to improve the network performance furthermore, a routing algorithm for 2D-Torus is investigated from the standpoint of load balance for virtual channels. The 2D-Torus network is divided into two virtual networks and each physical channel is split into three virtual channels. A novel virtual channel allocation policy and a routing algorithm are proposed, in which traffic load is distributed to those three virtual channels in a more load-balanced manner by introducing a random parameter. Simulations of the proposed algorithm are developed with a SystemC-based test bench. The results show that compared with the negative first for Torus networks (NF-T) algorithm, the proposed algorithm can achieve better performance in terms of network latency and throughput under different traffic patterns. It also shows that a routing algorithm with load balance for virtual channels can significantly improve the network performance furthermore. 展开更多
关键词 interconnection network Torus networks routing algorithm virtual channel load balance
原文传递
Fault-Tolerant Wormhole Routing with 2 Virtual Channels in Meshes
3
作者 周继鹏 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第6期822-830,共9页
In wormhole meshes, a reliable routing is supposed to be deadlock-free and fault-tolerant. Many routing algorithms are able to tolerate a large number of faults enclosed by rectangular blocks or special convex, none o... In wormhole meshes, a reliable routing is supposed to be deadlock-free and fault-tolerant. Many routing algorithms are able to tolerate a large number of faults enclosed by rectangular blocks or special convex, none of them, however, is capable of handling two convex fault regions with distance two by using only two virtual networks. In this paper, a fault-tolerant wormhole routing algorithm is presented to tolerate the disjointed convex faulty regions with distance two or no less, which do not contain any nonfaulty nodes and do not prohibit any routing as long as nodes outside faulty regions are connected in the mesh network. The processors' overlapping along the boundaries of different fault regions is allowed. The proposed algorithm, which routes the messages by X-Y routing algorithm in fault-free region, can tolerate convex fault-connected regions with only two virtual channels per physical channel, and is deadlock- and livelock-free. The proposed algorithm can be easily extended to adaptive routing. 展开更多
关键词 disjoint fault-connected region deadlock freedom fault-tolerant wormhole routing virtual channel
原文传递
Blind Channel Identification for Cyclic-Prefixed MIMO-OFDM Systems with Virtual Carriers 被引量:3
4
作者 Jung-Lang Yu Biling Zhang +1 位作者 Yipu Yuan Wei-Ting Hsu 《China Communications》 SCIE CSCD 2020年第3期101-116,共16页
This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(... This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(VCs)in the environment of the number of receive antennas being no less than that of transmit antennas.The VCs will cause a rank deficiency problem in computing the subspace information.With the subcarrier mapping matrix,the received signal is simplified to remove the rank deficiency.We use the RIS scheme to generate many times of equivalent symbols so the channel identification can converge with few received OFDM blocks.The RIS scheme will convert the white noise into non-white noise.With the Cholesky factorization,a noise whitening technique is developed to turn the non-white noise back to white noise.We further analyze the necessary conditions of identifiability of channel estimation.Simulations are performed to show the superiority of the proposed method. 展开更多
关键词 OFDM MIMO virtual CARRIER channel identification Cholesky FACTORIZATION
在线阅读 下载PDF
Pilot Placement for Time-Varying MIMO OFDM Channels with Virtual Subcarriers 被引量:1
5
作者 Alieh Moradi Hamidreza Bakhshi Vahid Najafpoor 《Communications and Network》 2011年第1期31-38,共8页
The rapid time-variation of a fading multipath environment can impair the performance of multiple-input multiple-output orthogonal frequency division multiplexing (MIMO OFDM). This paper proposes a pilot placement met... The rapid time-variation of a fading multipath environment can impair the performance of multiple-input multiple-output orthogonal frequency division multiplexing (MIMO OFDM). This paper proposes a pilot placement method for MIMO OFDM systems under time-varying channels with the guard band. The time-varying channel is described by complex exponential basis expansion model (BEM). We discuss the least square (LS) channel estimation to obtain the minimum mean square error (MSE) and derive the pilot allocation that can satisfy the minimum MSE with regard to guard band in time-varying channels. It is shown that optimal pilot clusters can distribute non-uniformly in frequency domain and minimize the MSE. We generalize our scheme over G OFDM symbols and compare it with comb pilots. It is demonstrated that the proposed approach is more effective than previous work. Simulation results validate our theoretical analysis. 展开更多
关键词 GUARD Band MIMO OFDM PILOT TIME-VARYING channel virtual Subcarriers
在线阅读 下载PDF
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment 被引量:2
6
作者 Anyi Liu Jim X. Chen Harry Wechsler 《Intelligent Information Management》 2015年第6期283-302,共20页
Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection appr... Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection approaches use either signature-based approaches to detect known TCs or anomaly-based approach by modeling the legitimate network traffic in order to detect unknown TCs. Un-fortunately, in a software-defined networking (SDN) environment, most existing TC detection approaches would fail due to factors such as volatile network traffic, imprecise timekeeping mechanisms, and dynamic network topology. Furthermore, stealthy TCs can be designed to mimic the legitimate traffic pattern and thus evade anomalous TC detection. In this paper, we overcome the above challenges by presenting a novel framework that harnesses the advantages of elastic re-sources in the cloud. In particular, our framework dynamically configures SDN to enable/disable differential analysis against outbound network flows of different virtual machines (VMs). Our framework is tightly coupled with a new metric that first decomposes the timing data of network flows into a number of using the discrete wavelet-based multi-resolution transform (DWMT). It then applies the Kullback-Leibler divergence (KLD) to measure the variance among flow pairs. The appealing feature of our approach is that, compared with the existing anomaly detection approaches, it can detect most existing and some new stealthy TCs without legitimate traffic for modeling, even with the presence of noise and imprecise timekeeping mechanism in an SDN virtual environment. We implement our framework as a prototype system, OBSERVER, which can be dynamically deployed in an SDN environment. Empirical evaluation shows that our approach can efficiently detect TCs with a higher detection rate, lower latency, and negligible performance overhead compared to existing approaches. 展开更多
关键词 Covert channel TIMING channel INTRUSION Detection virtualIZATION Software-Defined Network
在线阅读 下载PDF
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
7
作者 WANG Xiaorui WANG Qingxian +1 位作者 GUO Yudong LU Jianping 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期377-384,共8页
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between vip and virtual machine monitor to pass data directly. The vip machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode. 展开更多
关键词 virtualIZATION safety protection information extraction of virtual machine covert channel process control structure
原文传递
Neural Network and GBSM Based Time-Varying and Stochastic Channel Modeling for 5G Millimeter Wave Communications 被引量:7
8
作者 Xiongwen Zhao Fei Du +4 位作者 Suiyan Geng Ningyao Sun Yu Zhang Zihao Fu Guangjian Wang 《China Communications》 SCIE CSCD 2019年第6期80-90,共11页
In this work,a frame work for time-varying channel modeling and simulation is proposed by using neural network(NN)to overcome the shortcomings in geometry based stochastic model(GBSM)and simulation approach.Two NN mod... In this work,a frame work for time-varying channel modeling and simulation is proposed by using neural network(NN)to overcome the shortcomings in geometry based stochastic model(GBSM)and simulation approach.Two NN models are developed for modeling of path loss together with shadow fading(SF)and joint small scale channel parameters.The NN models can predict path loss plus SF and small scale channel parameters accurately compared with measurement at 26 GHz performed in an outdoor microcell.The time-varying path loss and small scale channel parameters generated by the NN models are proposed to replace the empirical path loss and channel parameter random numbers in GBSM-based framework to playback the measured channel and match with its environment.Moreover,the sparse feature of clusters,delay and angular spread,channel capacity are investigated by a virtual array measurement at 28 GHz in a large waiting hall. 展开更多
关键词 TIME-VARYING channel NEURAL network CLUSTER channel modeling virtual array measurement 5G
在线阅读 下载PDF
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud 被引量:3
9
作者 Chao Yang Yunfei Guo +2 位作者 Hongchao Hu Wenyan Liu Yawen Wang 《China Communications》 SCIE CSCD 2019年第4期151-171,共21页
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi... Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures. 展开更多
关键词 side-channel ATTACKS information LEAKAGE virtual machine migration GENETIC algorithm
在线阅读 下载PDF
Multi-Frequency Channel Characterization for Massive MIMO Communications in Lobby Environment 被引量:1
10
作者 Jianzhi Li Bo Ai +2 位作者 Ruisi He Mi Yang Zhangdui Zhong 《China Communications》 SCIE CSCD 2019年第9期79-92,共14页
In this paper,a massive multiple input multiple output(MIMO)channel measurement campaign with two setups is conducted in an indoor lobby environment.In the first setup,two types of 256-element virtual uniform rectangu... In this paper,a massive multiple input multiple output(MIMO)channel measurement campaign with two setups is conducted in an indoor lobby environment.In the first setup,two types of 256-element virtual uniform rectangular arrays(URAs),i.e.,the 4×64 virtual URA and the 64×4 virtual URA are used.The carrier frequency is 11 GHz;in the second setup,measurements are performed at 4,6,11,13,15,18 GHz at two different user locations.The channel characterization is presented by investigating the typical channel parameters,including average power delay profile(APDP),K factor,root mean square(RMS)delay spread,and coherence bandwidth.Moreover,the channel characteristics in angular domain are investigated by applying the space-alternating generalized expectation-maximization(SAGE)algorithm.The extracted multipath components(MPCs)are preliminarily clustered by visual inspection,and related to the interacting objects(IOs)in physical environment.Multipath structures at multiple frequency bands are examined.Direction spread of departure is estimated to evaluate the directional dispersion at the base station(BS)side.The results in this paper can help to reveal the propagation mechanisms in massive MIMO channels,and provide a foundation for the design and application of the practical massive MIMO system. 展开更多
关键词 5G MASSIVE MIMO channelmeasurement virtual array SAGE K factor RMS delay SPREAD coherence bandwidth SCATTERER localization direction SPREAD
在线阅读 下载PDF
Virtual 5G Network Embedding in a Heterogeneous and Multi-Domain Network Infrastructure 被引量:6
11
作者 Cunqian Yu Weigang Hou +2 位作者 Yingying Guan Yue Zong Pengxing Guo 《China Communications》 SCIE CSCD 2016年第10期29-43,共15页
The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex vi... The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark. 展开更多
关键词 5G virtual network embedding heterogeneous and multi-domain infrastructure wireless channel capacity data center
在线阅读 下载PDF
Analysis and Comparison of Time Replica and Time Linear Interpolation for Pilot Aided Channel Estimation in OFDM Systems
12
作者 Donglin Wang 《International Journal of Communications, Network and System Sciences》 2010年第5期446-452,共7页
This paper analyzes and compares two time interpolators, i.e., time replica and time linear interpolator, for pilot aided channel estimation in orthogonal frequency division multiplexing (OFDM) systems. The mean squar... This paper analyzes and compares two time interpolators, i.e., time replica and time linear interpolator, for pilot aided channel estimation in orthogonal frequency division multiplexing (OFDM) systems. The mean square error (MSE) of two interpolators is theoretically derived for the general case. The equally spaced pilot arrangement is proposed as a special platform for these two time interpolators. Based on this proposed platform, the MSE of two time interpolators at the virtual pilot tones is derived analytically;moreover, the MSE of per channel estimator at the entire OFDM symbol based on per time interpolator is also derived. The effectiveness of the theoretical analysis is demonstrated by numerical simulation in both the time-invariant frequency-selective channel and the time varying frequency-selective channel. 展开更多
关键词 OFDM channel Estimation TIME REPLICA TIME Linear INTERPOLATION virtual Pilots
在线阅读 下载PDF
基于改进虚拟弹簧模型的无人机路径规划算法研究 被引量:1
13
作者 肖蘅 张汇 +1 位作者 周文 穆震杰 《航空工程进展》 2025年第2期23-30,共8页
由于无人机的路径规划问题以及虚拟弹簧模型(VSM)在路径规划过程中存在目标不可达和狭窄通道易振荡问题,在虚拟弹簧模型的基础上,提出一种改进虚拟弹簧模型的无人机路径规划算法。首先,建立无人机与障碍物的排斥力公式以及无人机与目标... 由于无人机的路径规划问题以及虚拟弹簧模型(VSM)在路径规划过程中存在目标不可达和狭窄通道易振荡问题,在虚拟弹簧模型的基础上,提出一种改进虚拟弹簧模型的无人机路径规划算法。首先,建立无人机与障碍物的排斥力公式以及无人机与目标点的牵引公式,完成无人机的局部路径规划;然后,在虚拟弹簧模型中引入边界力概念,解决无人机狭窄通道易振荡及目标不可达的问题;最后,结合仿真实验对所提算法的有效性进行验证。结果表明:相较于传统虚拟弹簧模型和改进虚拟弹簧模型,本文提出的无人机路径算法在狭窄通道环境下进行无人机路径规划所形成的路径更加平滑,在目标不可达情况下能够使无人机顺利到达目标点,能够在相对复杂的环境中对无人机路径进行规划。 展开更多
关键词 路径规划 无人机 虚拟弹簧模型 边界力 目标不可达性 狭窄通道
在线阅读 下载PDF
虚拟装配实训具身交互技术应用研究
14
作者 颜羽鹏 姜可 +3 位作者 石星辰 张靖宇 明世杰 何自强 《包装工程》 北大核心 2025年第18期84-95,共12页
目的为应对未来装配训练人机交互中的诸多挑战,梳理和分析了虚拟装配实训具身交互技术的研究现状并提出了研究思路,为人机交互理论和实践的发展提供支撑。方法分析虚拟装配实训系统现状及人机交互技术需求,结合具身交互技术特性,对系统... 目的为应对未来装配训练人机交互中的诸多挑战,梳理和分析了虚拟装配实训具身交互技术的研究现状并提出了研究思路,为人机交互理论和实践的发展提供支撑。方法分析虚拟装配实训系统现状及人机交互技术需求,结合具身交互技术特性,对系统的实施路径与关键技术进行归纳与总结。结果虚拟装配实训中多通道交互反馈融合是当前学界所面临的难题。具身交互技术促进了视听触多感官协同,为学员带来了更为高效和生动的认知体验。结论针对具身交互技术的应用研究,以多通道交互指令整合、交互反馈调控为核心目标。通过多通道交互实操、交互反馈融合及反馈信息调节,提升学员的认知效率,对促进虚拟装配实训及具身交互技术的未来发展具有至关重要的作用。 展开更多
关键词 虚拟装配 具身交互 多通道交互反馈融合 反馈调节
在线阅读 下载PDF
2D Mesh的多故障容错路由算法
15
作者 胡宇杨 代广珍 陈乃金 《天津理工大学学报》 2025年第1期70-76,共7页
容错路由算法是确保片上网络(network on chip, NoC)可靠性的主要方法,然而多故障点的绕行容错往往会导致网络负载不均衡及网络时延增大,为了解决这个问题提出了一种多故障点的无虚通道绕行容错路由算法。算法依赖于内建自测试(built-in... 容错路由算法是确保片上网络(network on chip, NoC)可靠性的主要方法,然而多故障点的绕行容错往往会导致网络负载不均衡及网络时延增大,为了解决这个问题提出了一种多故障点的无虚通道绕行容错路由算法。算法依赖于内建自测试(built-in self-test, BIST)技术获取故障区域的位置信息,继而传输到部分节点的故障存储器中。通过数据包在X维度和Y维度遇到故障区域的情况分别采用了不同的绕行策略,且无死锁特性。在8×8的2D Mesh中,相比于参考的算法,在故障区域大小横向扩展为2×2,2×3,2×4的情况下,饱和注入率分别提高了18.75%,30.23%,12.85%,并且均衡了故障区域周围的网络负载。通过周期精确的仿真模拟器实验表明,随着故障区域的横纵扩展,所提算法有效地减少了网络时延,提高了饱和注入率。 展开更多
关键词 片上网络 路由算法 无虚通道 容错 饱和注入率
在线阅读 下载PDF
基于冲突的缓存侧信道攻击与驱逐集综述
16
作者 姚梓豪 马自强 +1 位作者 李扬 魏良根 《计算机应用》 北大核心 2025年第7期2070-2078,共9页
缓存侧信道攻击是一种利用计算机缓存共享特性的侧信道攻击手段,对跨处理器、跨虚拟机的目标密码系统构成严重威胁。其中基于冲突的缓存侧信道攻击突破了使用特权指令的限制,能构造一组与目标地址映射到同一缓存集的虚拟地址,即驱逐集,... 缓存侧信道攻击是一种利用计算机缓存共享特性的侧信道攻击手段,对跨处理器、跨虚拟机的目标密码系统构成严重威胁。其中基于冲突的缓存侧信道攻击突破了使用特权指令的限制,能构造一组与目标地址映射到同一缓存集的虚拟地址,即驱逐集,从而造成缓存冲突,进而最终获取目标的隐私数据。构造驱逐集已成为基于冲突的缓存侧信道攻击和推测执行攻击的关键技术之一。因此,对基于冲突的缓存侧信道攻击与驱逐集的研究进行综述。首先,剖析了基于冲突的缓存侧信道攻击的基本原理;其次,分析了驱逐集构造算法的基本原理、发展现状,根据候选地址的操作策略和驱逐集的构造策略不同,将算法分为冲突移除法和冲突渐增法两类;再次,对驱逐集构造算法的影响因素进行了归纳;最后,讨论了基于冲突的缓存侧信道攻击的现状及未来的研究方向。 展开更多
关键词 系统安全 缓存侧信道攻击 驱逐集 虚拟地址 缓存替换策略
在线阅读 下载PDF
机载FC网络冗余管理的算法设计
17
作者 牛泽田 白焱 +1 位作者 孙翔宇 孙万录 《飞机设计》 2025年第5期76-80,共5页
在航空电子系统高度集成化的背景下,为满足复杂数据交互对网络可靠性与实时性的严苛需求,文中以提升机载光纤通道技术(Fibre Channel, FC)网络数据传输可靠性为目标,深入研究FC协议架构,剖析冗余调度管理的核心机制,构建双冗余网络架构... 在航空电子系统高度集成化的背景下,为满足复杂数据交互对网络可靠性与实时性的严苛需求,文中以提升机载光纤通道技术(Fibre Channel, FC)网络数据传输可靠性为目标,深入研究FC协议架构,剖析冗余调度管理的核心机制,构建双冗余网络架构。通过理论分析与工程实践验证,冗余调度算法在复杂航空环境下展现出优异性能。实际应用表明,该算法显著提升了FC网络在链路故障等异常条件下的可靠性,并具备简洁性、精准度、稳定性等显著优点。在机载FC网络的频繁发生流量控制时,依然能保障冗余管理机制的有效性和任务数据传输的实时性,具有很高的实用价值,实现了设计的要求。 展开更多
关键词 光纤通道技术 冗余管理 航空电子 端系统 虚拟链路
原文传递
考虑情感交互的生鲜电商混合渠道决策研究
18
作者 陈航琦 郑琪 《宁波工程学院学报》 2025年第4期46-53,共8页
为了研究生鲜电商混合渠道决策,引入情感交互效应,构建了生鲜农产品供应链的博弈模型;采用Mathematica软件进行数值仿真,对不同情境下的生鲜电商供应链决策进行了分析。研究结果表明:更高的情感交互效应系数有利于提升传统电商、网红直... 为了研究生鲜电商混合渠道决策,引入情感交互效应,构建了生鲜农产品供应链的博弈模型;采用Mathematica软件进行数值仿真,对不同情境下的生鲜电商供应链决策进行了分析。研究结果表明:更高的情感交互效应系数有利于提升传统电商、网红直播渠道和AI虚拟直播渠道的销售价格和利润;AI虚拟直播和网红直播市场份额合理分配有助于生鲜供应链获取最大利润,生鲜供应商应根据自身情况选择合适的直播形式;网红主播的佣金比例应该维持在较低水平,佣金比例过高,会降低生鲜供应链的利润。 展开更多
关键词 AI虚拟直播 混合渠道 生鲜电商 供应链决策 情感交互
在线阅读 下载PDF
一种基于时间触发光纤通道的lp-QPS算法
19
作者 杨佳宁 苏皓 +1 位作者 王一 冉成 《光通信技术》 北大核心 2025年第3期90-96,共7页
为解决光纤通道交换机调度算法在高吞吐率和低延时性能之间的权衡问题,提出了一种基于时间触发光纤通道的队列比例抽样(lp-QPS)算法。该算法通过引入长队列有效机制,优先匹配超过门限阈值的虚拟输出队列(VOQ),同时对其余队列采用队列比... 为解决光纤通道交换机调度算法在高吞吐率和低延时性能之间的权衡问题,提出了一种基于时间触发光纤通道的队列比例抽样(lp-QPS)算法。该算法通过引入长队列有效机制,优先匹配超过门限阈值的虚拟输出队列(VOQ),同时对其余队列采用队列比例抽样进行循环调度,并与其它迭代调度算法进行实验对比。实验结果表明:在Bernoulli到达过程和突发到达过程的4种流量模型下,该算法均可以获得100%的吞吐率,并提供更优的延时性能,为光纤通道交换机的性能优化提供了重要参考。 展开更多
关键词 光纤通道 Crossbar交换网络 调度算法 虚拟输出队列 输入排队
在线阅读 下载PDF
地理学中文科技期刊虚拟专题发展情况与优化策略研究
20
作者 郭亿华 《出版与印刷》 2025年第2期36-44,共9页
调查地理学科技期刊虚拟专题发展情况,以促进中国科技期刊虚拟专题的高质量发展。文章以《中文核心期刊要目总览(2023年版)》收录的20种地理学中文核心科技期刊为研究对象,采用网络信息搜索法调研其虚拟专题组织情况,调研内容主要包括... 调查地理学科技期刊虚拟专题发展情况,以促进中国科技期刊虚拟专题的高质量发展。文章以《中文核心期刊要目总览(2023年版)》收录的20种地理学中文核心科技期刊为研究对象,采用网络信息搜索法调研其虚拟专题组织情况,调研内容主要包括虚拟专题的发布数量、发布时间、选题方向、收录论文数量、收录周期、提供信息内容、传播形式及渠道、阅读量等。研究发现,地理学中文核心科技期刊虚拟专题的开展率不高,存在发布较为零散、组织策划视角有所局限、主题聚焦度不足、文章择优意识有待加强、呈现形式单一、推广渠道不够丰富等问题。提出地理学中文科技期刊虚拟专题优化策略:基于期刊文献资源和用户需求制订推送计划,采用多样化的组织策划视角,优选文章以提高虚拟专题学术质量,注重内容加工以形成虚拟专题知识脉络,借助融媒体技术创新呈现形式,多平台发布以扩大学术影响力。 展开更多
关键词 科技期刊 虚拟专题 内容加工 推广渠道 组织策划 地理学
在线阅读 下载PDF
上一页 1 2 26 下一页 到第
使用帮助 返回顶部