虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

BEST

  • 自动导引小车调度(外文)

    Guided vehicles (GVs) are commonly used for the internal transportation of loads in warehouses, production plants and terminals. These guided vehicles can be routed with a variety of vehicle dispatching rules in an attempt to meet performance criteria such as minimizing the average load waiting times. In this research, we use simulation models of three companies to evaluate the performance of several real-time vehicle dispatching rules, in part described in the literature. It appears that there is a clear difference in average load waiting time between the different dispatching rules in the different environments. Simple rules, based on load and vehicle proximity (distance-based) perform BEST for all cases. The penalty for this is a relatively high maximum load waiting time. A distance-based rule with time truncation, giving more priority to loads that have to wait longer than a time threshold, appears to yield the BEST possible overall performance. A rule that particularly considers load-waiting time performs poor overall. We also show that using little pre-arrival information of loads leads to a significant improvement in the performance of the dispatching rules without changing their performance ranking.

    标签: Testing and classifying vehicle dispatching rules in three real-world settings

    上传时间: 2016-04-01

    上传用户:五块钱的油条

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the BEST modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • The Cognitive Early Warning Predictive System

    I saw the light of the future when I first read Ray Kurzweil’s BEST-seller book The Singularity Is Near: When Humans Transcend Biology. One cubic inch of nanotube cir- cuitry, once fully developed, would be up to one hundred million times more powerful than the human brain.

    标签: Predictive Cognitive Warning System Early The

    上传时间: 2020-05-26

    上传用户:shancjb

  • A Foundation in Digital Communication

    Without conceding a blemish in the first edition, I think I had BEST come clean and admit that I embarked on a second edition largely to adopt a more geometric approach to the detection of signals in white Gaussian noise. Equally rigorous, yet more intuitive, this approach is not only student-friendly, but also extends more easily to the detection problem with random parameters and to the radar problem

    标签: Communication Foundation Digital in

    上传时间: 2020-05-26

    上传用户:shancjb

  • Understanding+Telecommunications+Business

    The dictionary definition of telecommunications is ‘communication over long distance by cable, telegraph, telephone or broadcasting’, but since its initiation over 100yearsagothingshavemovedrapidly.Telecommunicationsisnowaverycomplex industrywithmanydifferentpressures,operatinginahighlydynamic environment.It is BEST viewed as part of a wider industry known as information and communication technology (ICT). The purpose of this chapter is to explain where telecommunication fits in, to highlight some of the complexities – hopefully to simplify them – and to position the industry in today’s dynamic business environment.

    标签: Telecommunications Understanding Business

    上传时间: 2020-06-01

    上传用户:shancjb

  • Ceramic+Thick+Films+for+MEMS+and+Microdevices

    As a student I did my BEST to avoid text books – a strange statement for a Professor to make and one that I should clarify before you put this book down; I did my BEST to avoid text books that did not help me.

    标签: Microdevices Ceramic Thick Films MEMS for and

    上传时间: 2020-06-06

    上传用户:shancjb

  • MEMS and Nanotechnology-Based Sensors

    Recent advancements in nanotechnology (NT) materials and growth of micro/ nanotechnology have opened the door for potential applications of microelectro- mechanical systems (MEMS)- and NT-based sensors and devices. Such sensors and devices are BEST suited for communications, medical diagnosis, commercial, military, aerospace, and satellite applications. This book comes at a time when the future and well-being of Western industrial nations in the twenty-first century’s global eco- nomy increasingly depend on the quality and depth of the technological innovations they can commercialize at a rapid pace.

    标签: MEMS

    上传时间: 2020-06-06

    上传用户:shancjb

  • Smart+Grid

    The term “ smart grid ” defi nes a self - healing network equipped with dynamic optimiza- tion techniques that use real - time measurements to minimize network losses, maintain voltage levels, increase reliability, and improve asset management. The operational data collected by the smart grid and its sub - systems will allow system operators to rapidly identify the BEST strategy to secure against attacks, vulnerability, and so on, caused by various contingencies. However, the smart grid fi rst depends upon identifying and researching key performance measures, designing and testing appropriate tools, and developing the proper education curriculum to equip current and future personnel with the knowledge and skills for deployment of this highly advanced system.

    标签: Smart Grid

    上传时间: 2020-06-07

    上传用户:shancjb

  • 开关电源设计(英文版)

    It all started rather innocuously. I walked into Dr GT Murthy’s office one fine day, andchanged my life. “Doc” was then the General Manager, Central R&D, of a very largeelectrical company headquartered in Bombay. In his new state-of-the-art electronics center,he had hand-picked some of India’s BEST engineers (over a hundred already) ever assembledunder one roof. Luckily, he too was originally a Physicist, and that certainly helped me gainsome empathy. Nowadays he is in retirement, but I will always remember him as athoroughly fair, honest and facts-oriented person, who led by example. There were severalthings I absorbed from him that are very much part of my basic engineering persona today.You can certainly look upon this book as an extension of what Doc started many years agoin India … because that’s what it really is! I certainly wouldn’t be here today if I hadn’t metDoc. And in fact, several of the brash, high-flying managers I’ve met in recent years,desperately need some sort of crash course in technology and human values from Doc!

    标签: 开关电源

    上传时间: 2021-11-23

    上传用户:

  • 网络安全技术-QoS技术白皮书

    网络安全技术-QoS技术白皮书摘 要:本文对Internet的三种服务模型(BEST-Effort、IntServ和DiffServ),以及服务模型的 发展历程进行了简单介绍,较为详细地介绍了H3C系列数据通信产品所支持的QoS技 术,内容包括:流量分类和标记、拥塞管理、拥塞避免、流量监管与流量整形、链路 效率机制以及MPLS网络相关QoS技术,并且简要描述了在实际应用中的QoS解决方 案。网络运营商及行业用户等通过对这些QoS技术的灵活运用,可以在Internet或任何 基于IP的网络上为客户提供有保证的区分服务。1 概述 1.1 产生背景 在传统的IP网络中,所有的报文都被无区别的等同对待,每个转发设备对所有的报 文均采用先入先出(FIFO)的策略进行处理,它尽最大的努力(BEST-Effort)将报 文送到目的地,但对报文传送的可靠性、传送延迟等性能不提供任何保证。 网络发展日新月异,随着IP网络上新应用的不断出现,对IP网络的服务质量也提出 了新的要求,例如VoIP等实时业务就对报文的传输延迟提出了较高要求,如果报 文传送延时太长,用户将不能接受(相对而言,E-Mail和FTP业务对时间延迟并不 敏感)。为了支持具有不同服务需求的语音、视频以及数据等业务,要求网络能够 区分出不同的通信,进而为之提供相应的服务。传统IP网络的尽力服务不可能识别 和区分出网络中的各种通信类别,而具备通信类别的区分能力正是为不同的通信提 供不同服务的前提,所以说传统网络的尽力服务模式已不能满足应用的需要。 QoS技术的出现便致力于解决这个问题。 1.2 技术优点 QoS旨在针对各种应用的不同需求,为其提供不同的服务质量。如: z 可以限制骨干网上 FTP 使用的带宽,也可以给数据库访问以较高优先级。 z 对于 ISP,其用户可能传送语音、视频或其他实时业务,QoS 使 ISP 能区分 这些不同的报文,并提供不同服务。 z 可以为时间敏感的多媒体业务提供带宽和低时延保证

    标签: 网络安全 qos

    上传时间: 2022-02-26

    上传用户:kingwide