Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct information security system causing huge consumption of budget, yet many of them are not affordable to orga...
详细信息
Spectrum absorption optical fiber gas sensor has characteristics such as high measuring resolution, high precision and good gas differential ability when it is applied on gas measurement. As ideal illuminant and key c...
详细信息
We investigated the focusing properties of a double ring shaped azimuthally polarized beam using a high NA lens and a dedicated binary phase filter. The definition of azimuthally polarized double ring beam is stated, ...
详细信息
Human interaction involves exchanging not only explicit content, but also implicit information about the affective state of the interlocutor. In recent years, researchers attempt to endow the computers or robots with ...
详细信息
To design the lifting points of large-span steel structure when the various compatibility equations are undefined in the lifting process, the programs based on improved evolutionary programming are developed by MATLAB...
详细信息
Smart home is a sub branch of ambient intelligencetechnology. It was initially used to control environmental systems such as lighting and heating;but recently the use of smart technology has been strengthened and exp...
详细信息
Lift path planning is a key subtask in preparing lift plan. Many researchers have concerned the topic of automated path planning for crane lifts. Previous studies provided some exact approaches or optimization methods...
详细信息
Network-on-Chip (NoC) is a promising interconnection solution for systems on chip. Mapping Intellectual Property (IP) cores onto NoC architecture is an important phase of NoC design. It affects heavily the NoC perform...
详细信息
To satisfy the requirement of developing software rapidly for business processes with compensation, a special kind of computation independent model with compensation named well-structured associated business process m...
详细信息
The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search...
详细信息
暂无评论