-
1
Diagnosis of Deviation Indicators of Distribution Network Engineering Based on Fuzzy Petri Net
Published 2022-07-01Subjects: Get full text
Article -
2
Research of the Dynamic Shift Schedule of Mining Track based on Neural Network Engine Model
Published 2017-01-01Get full text
Article -
3
Research and suggestion on the choice of the acceptance indexes of the TD-LTE VoLTE wireless network engineering
Published 2015-12-01“…Firstly,the similarities and differences between the acceptance of the TD-LTE VoLTE wireless network engineering and other wireless network engineering were discussed.Then,referring to the different phases of engineering acceptance,the choice of indexes was analyzed.And finally,by driving tests and comparison research,the values of the index were suggested.…”
Get full text
Article -
4
-
5
Dual‐coupling networks engineering of self‐assembled ferromagnetic microspheres with enhanced interfacial polarization and magnetic interaction for microwave absorption
Published 2025-04-01“…This study reveals that dual‐coupling networks engineering is an effective strategy for synergistically enhancing electromagnetic responses and improving the absorption performance of magnetic nanomaterials.…”
Get full text
Article -
6
-
7
-
8
Algorithm of software package of intellectual decision support when designing cyber security system at the enterprise
Published 2020-07-01Subjects: Get full text
Article -
9
Networked Control System Design for Turbofan Aeroengines with Aging and Deterioration
Published 2018-01-01“…By solving these LMIs simultaneously, a networked engine controller is obtained which guarantees both the robustness against delay/dropout and the satisfactory dynamic performance. …”
Get full text
Article -
10
Research on large-scale P2P worm simulation
Published 2011-01-01“…P2P worm has its own features and existing simulation approaches can not be used to it directly.In order to simulate large-scale P2P worm,a virtual-node based simulation approach and a double-engine based simulation architec-ture were proposed.In the virtual-node based P2P simulation solution,the data and the operation of worm nodes were separated to save computational power and storage.Therefore,large-scale P2P worms were simulated with available lim-ited physical resources in single or multiple simulating computers.In double-engine P2P simulation architecture,two en-gines,local engine and network engine,were used in simulation system.The local engine was responsible for local mes-sage processing and the network engine focused on message passing in communication network.Combined with these two engines,packet level P2P worm simulation was provided by the simulation system to enhance the fidelity and scal-ability.Experimental results showed that the novel simulation solution was practical to simulate large-scale P2P worms with high fidelity.…”
Get full text
Article -
11
Algorithms for Finding Inverse of Two Patterned Matrices over Zp
Published 2014-01-01“…Circulant matrix families have become an important tool in network engineering. In this paper, two new patterned matrices over Zp which include row skew first-plus-last right circulant matrix and row first-plus-last left circulant matrix are presented. …”
Get full text
Article -
12
On Skew Circulant Type Matrices Involving Any Continuous Fibonacci Numbers
Published 2014-01-01“…Circulant and skew circulant matrices have become an important tool in networks engineering. In this paper, we consider skew circulant type matrices with any continuous Fibonacci numbers. …”
Get full text
Article -
13
Norms and Spread of the Fibonacci and Lucas RSFMLR Circulant Matrices
Published 2015-01-01“…Circulant type matrices have played an important role in networks engineering. In this paper, firstly, some bounds for the norms and spread of Fibonacci row skew first-minus-last right (RSFMLR) circulant matrices and Lucas row skew first-minus-last right (RSFMLR) circulant matrices are given. …”
Get full text
Article -
14
Edge-Guided DETR Model for Intelligent Sensing of Tomato Ripeness Under Complex Environments
Published 2025-06-01Get full text
Article -
15
An Area-Time Efficient Hardware Architecture for ML-KEM Post-Quantum Cryptography Standard
Published 2025-01-01Get full text
Article -
16
Automatic extraction for the traffic of unknown network applications
Published 2014-07-01“…However, the sample traffic in network engineering is usually a mixed traffic generated by several unknown applications. …”
Get full text
Article -
17
-
18
-
19
-
20
Simulation of Fidelity in Entanglement-Based Networks with Repeater Chains
Published 2024-12-01“…The switch model includes several generalizations that are not currently available in other tools and are useful for gaining insight into practical and realistic quantum network engineering problems: an arbitrary number of memory registers at the switches, simplicity in including entanglement distillation mechanisms, arbitrary switching topologies, and routing protocols. …”
Get full text
Article