首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   1篇
  国内免费   2篇
系统科学   3篇
综合类   11篇
  2009年   3篇
  2008年   3篇
  2006年   3篇
  2003年   1篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1994年   1篇
排序方式: 共有14条查询结果,搜索用时 255 毫秒
1.
一种振型相关分析方法   总被引:3,自引:0,他引:3       下载免费PDF全文
试验模态分析与有限元计算相结合的研究方法是一种实用且可靠的结构动态分析方法。本文着重研究了它的核心和基础,采用直接比较振型的方法实现了试验模态与计算模态的相关分析。  相似文献   
2.
基于Bayes估计的多传感器数据融合方法研究   总被引:22,自引:0,他引:22  
对多传感器数据融合方法进行研究 ,以 Bayes估计理论为基础得到了多传感器最优融合数据 ,并将它与其它方法得到的融合数据进行了比较 .  相似文献   
3.
模糊神经系统及其应用研究   总被引:4,自引:0,他引:4  
吴小俊  曹奇英 《系统工程》1999,17(4):61-64,32
本文将模糊逻辑与神经网络相结合,对一种能表达知识规划的模糊神经系统模型进行研究,给出了该模型神经系统的结构和学习算法。并将其用于105组稻米香数据的数值实验,仿真结果表明,该模型的性能优于一般模糊系统,从而表明了这一模型的有效性。  相似文献   
4.
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.  相似文献   
5.
In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is constructed.The location-aware model has the capabilities of sharing knowledge,reasoning and adjusting the usage policies of services dynamically through a unified semantic location manner.At last,the work process of our proposed location-aware model is explained by an application scenario.  相似文献   
6.
普适计算中的位置感知综述   总被引:2,自引:0,他引:2  
位置感知计算是普适计算中的重要研究内容之一。根据国外已有的各种位置感知系统及其优缺点,总结了在普适计算环境中位置感知的特点。分析了现有位置感知技术在普适计算环境中的特性。最后指出普适计算中位置感知研究的方向。  相似文献   
7.
应用ASP与SQL Server数据库相结合实现铁路公文的Web管理,该系统能够实现铁路站段公文信息的收藏、检索与发布.该系统主要应用了ADO技术,ASP分页显示技术,全文信息检索技术.  相似文献   
8.
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bidirectional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.  相似文献   
9.
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.  相似文献   
10.
网络拓扑的仿真与协议分析是网络研究领域的一种重要方法和手段.分析了Ad Hoc网络的特点和体系结构,详细介绍Ad Hoc网络以及它的3个协议(AODV:Ad HOC on Demand Distance Vector,DSDV:Destination Sequenced Distance Vector,DSR:Dynamic Source Routing),并从网络仿真目标、仿真方案设计、仿真环境设定、OTcl脚本编写等方面分析了移动Ad Hoc网络仿真的过程和方法,最后利用仿真软件NS2对这3个协议进行了仿真,生成了相应的仿真运行图和参数对照图表,并从数据包成功接收率和端到端的时延2个方面对仿真结果进行了分析.通过网络仿真和对仿真结果的分析、比较,可以从中得出:在运动场景不剧烈的情况下,可以选用路由协议DSR,此时它的丢包率和端到端时延都较低;而在运动场景剧烈的情况下,则可以选用路由协议AODV,它综合了DSR和DSDV协议的优点,数据包成功接收率很高.且端到端时延较低.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号