期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
虚拟现实的三维实体的场景储存结构 被引量:6
1
作者 吴云 周庭美 王仲范 《计算机仿真》 CSCD 2001年第2期44-48,56,共6页
虚拟现实技术是一门由应用驱动的涉及众多学科的新的实用技术 ,是集先进的计算机技术、传感与测量技术、仿真技术、微电子技术等为一体的综合集成技术。在论文中 ,作者讨论了虚拟现实技术中的三维实体的场景储存结构理论、结构构成原理... 虚拟现实技术是一门由应用驱动的涉及众多学科的新的实用技术 ,是集先进的计算机技术、传感与测量技术、仿真技术、微电子技术等为一体的综合集成技术。在论文中 ,作者讨论了虚拟现实技术中的三维实体的场景储存结构理论、结构构成原理与设计方法以及典型应用系统等内容。作者特别列举了一个汽车模型的三维实体的场景储存结构的例子。 展开更多
关键词 虚拟现实 场景储存结构 三维实体 计算机仿真 汽车车身
下载PDF
对军用物资储存结构的探讨
2
作者 黄永平 郭志明 《仓储管理与技术》 1999年第6期12-13,共2页
关键词 军事后勤 军用物资 储存结构
下载PDF
建立合理储存结构
3
作者 李金峰 《铁道物资科学管理》 1993年第3期38-41,共4页
关键词 储存结构 分析法 物资企业
下载PDF
浅析电视台制播网络系统中的网络储存体系结构
4
作者 赵金文 《价值工程》 2011年第9期184-184,共1页
硬盘制播网络系统在近几年快速发展,并且随着各种新媒体业务呈多元化发展,网络规模越来越大,结构也越来越复杂。作为关键技术的网络储存体系在发挥其资源共享、分工合作起到重要作用,理解并探索这些储存体系有着重要意义。
关键词 电视台制播网络系统 网络储存体系结构 硬盘制播网络系统
下载PDF
浅谈商业企业商品储存
5
作者 张凤琴 《宁夏财会》 2000年第2期51-51,共1页
关键词 商业企业 商品储存 储存 储存结构 储存
下载PDF
油气储集结构的测井分析模型
6
作者 周远田 贾光美 《国外测井技术》 1989年第1期11-20,共10页
关键词 油气储集 测井 储存结构
下载PDF
非结构化数据存储中面向访问任务的小文件合并策略
7
作者 宋立华 闫丽飞 林晖 《通讯世界(下半月)》 2016年第6期295-296,共2页
分析了非结构化数据储存方式下云存储层次结构,探讨了面向访问任务的小文件存储问题,提出了小文件合并的策略。
关键词 结构化数据储存 云存储 访问任务 小文件合并
下载PDF
柴油蒸汽重整制氢贵金属催化剂的研究进展 被引量:2
8
作者 李夺 钟和香 +3 位作者 张晶 王博磊 王鹤臻 潘立卫 《石油化工》 CAS CSCD 北大核心 2021年第6期598-603,共6页
与部分氧化重整、自热重整相比,蒸汽重整相对温和,反应温度低,氢产率高,是柴油制氢的有效技术之一。贵金属催化剂因优异的催化活性在柴油蒸汽重整制氢的应用中备受关注。从催化剂的活性组分、助剂、载体、制备方法及催化剂失活等方面进... 与部分氧化重整、自热重整相比,蒸汽重整相对温和,反应温度低,氢产率高,是柴油制氢的有效技术之一。贵金属催化剂因优异的催化活性在柴油蒸汽重整制氢的应用中备受关注。从催化剂的活性组分、助剂、载体、制备方法及催化剂失活等方面进行综述,指出通过添加助剂和开发制备方法及结合探索贵金属活性组分自身抗失活性质,可明显提高贵金属活性组分的分散度;研究氧储存结构对抗碳能力的贡献及结构化载体被金属取代产生的相互作用并用于催化剂的设计,可以显著增加柴油制氢贵金属催化剂的稳定性。 展开更多
关键词 柴油蒸汽重整 制氢 贵金属催化剂 分散度 储存结构 催化剂失活
下载PDF
零库存法在医院药品存货管理中的应用 被引量:6
9
作者 雷志勤 《中国卫生经济》 北大核心 2004年第3期78-78,共1页
关键词 零库存法 医院 药品 存货管理 储存结构
下载PDF
基于代理重加密的财务数据安全共享技术 被引量:1
10
作者 崔嵬 杨同军 苗凯 《现代电子技术》 2023年第1期74-78,共5页
为保证财务数据的机密性,提出基于代理重加密的财务数据安全共享技术。建立用户私钥,分别利用对称加密与属性加密混合方法获得密钥密文与数据密文,生成新的访问结构并获取重加密密文;分析云储存结构,将云储存结构分为接入、接口、管理... 为保证财务数据的机密性,提出基于代理重加密的财务数据安全共享技术。建立用户私钥,分别利用对称加密与属性加密混合方法获得密钥密文与数据密文,生成新的访问结构并获取重加密密文;分析云储存结构,将云储存结构分为接入、接口、管理和储存四个层次,定义云端储存设备、信息属主与请求用户三个角色的基本职责,设置领导与群众节点构建数据储存模型,通过Raft协议集群内部实现节点的储存与传输;创新性地设计共享合约机制,确认签名信息,发布储存与共享交易信息,经过权限校对与安全检测,实现信息安全共享。实验结果表明,所提技术加密和解密时间均低于100 s,数据被破解数量仅为8个,能够降低数据特征显著度,减少被破解次数,为信息共享提供可靠保障。 展开更多
关键词 代理重加密 财务数据 数据共享 用户私钥 储存结构 共享权限 安全共享
下载PDF
Formation mechanisms of recrystallization textures in aluminum sheets based on theories of oriented nucleation and oriented growth 被引量:1
11
作者 毛卫民 杨平 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2014年第6期1635-1644,共10页
The recrystallization textures in 95%rolled aluminum sheets with different purities and initial textures were investigated.The effects of recovery levels and the dragging effects induced by impurities on the effective... The recrystallization textures in 95%rolled aluminum sheets with different purities and initial textures were investigated.The effects of recovery levels and the dragging effects induced by impurities on the effective driving force and corresponding behaviors of oriented nucleation and oriented growth during annealing were analyzed.The oriented nucleation is a common behavior in the initial stage of primary recrystallization if the effective driving force in deformed matrix is not too high to reduce the necessity of nucleation period.Oriented growth might appear if the temperature is not too high and the grains,of which the misorientation to matrix is about 40°〈111〉,have enough time and space to expand growth advantages,while certain reduction of effective driving force is also necessary.The recrystallization textures could be changed by controlling initial textures and effective driving forces which can be regulated by recovery levels and dragging effects. 展开更多
关键词 aluminum RECRYSTALLIZATION TEXTURE recovery stored energy boundary migration
下载PDF
A Novel Non-Planar Cell Structure for Flash Memory
12
作者 欧文 李明 钱鹤 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2002年第11期1158-1161,共4页
Proposed herein is a novel non planar cell structure for flash memory which has been fabricated to achieve high programming speed with low operating voltage.This memory cell preserves a simple stacked gate structure ... Proposed herein is a novel non planar cell structure for flash memory which has been fabricated to achieve high programming speed with low operating voltage.This memory cell preserves a simple stacked gate structure which only requires an additional masking step to form the novel structure in the channel.For the cell of the 1 2μm gate length,the programming speed of 43μs under the measuring condition of V g=15V, V d=5V,and the erasing time of 24ms under V g=-5V, V s=8V are obtained.The programming speed is faster than that of the conventional planar cell structure.This superior programming speed makes it suitable for high speed application. 展开更多
关键词 flash memory non planar structure programming speed
下载PDF
从四十种商品周转快慢研究商品购销规律
13
作者 倪厚裕 《山西财经大学学报》 1987年第5期22-23,共2页
供销社企业的主要职能是组织商品流通,其经济效益的高低,很大程度要看商品流通周转速度的快慢。目前,许多地区对商品总体(即总额)周转速度的研究较为重视,而对商品细分的周转速度研究尚显薄弱。因此,掩盖了商品经营中不少矛盾。现以某... 供销社企业的主要职能是组织商品流通,其经济效益的高低,很大程度要看商品流通周转速度的快慢。目前,许多地区对商品总体(即总额)周转速度的研究较为重视,而对商品细分的周转速度研究尚显薄弱。因此,掩盖了商品经营中不少矛盾。现以某市供销社为例,1986年商品纯销售额17517万元,平均商品库存额4881万元,一年中周转了3.59次,101.9天周转一次。但从解剖40种日用工业品周转速度看,悬殊颇大。一年周转12次的有食盐、糕点; 展开更多
关键词 商品周转 商品营销 周转速度 购销 供销社企业 商品库存 进货周期 商品储存结构 胶鞋 汗衫
下载PDF
加强商业企业库存管理之我见
14
作者 药建英 《山西财经大学学报》 1987年第3期16-19,共4页
商业企业的商品储存,是指已购进的尚未销售而在商业企业中停留的待销商品。商品从生产领域向消费领域的转移过程中,必然会在流通领域暂时相对地停滞,从而形成一定数量的商品储备。一定量的商品储备是指正常的、合理的商品储备。一方面,... 商业企业的商品储存,是指已购进的尚未销售而在商业企业中停留的待销商品。商品从生产领域向消费领域的转移过程中,必然会在流通领域暂时相对地停滞,从而形成一定数量的商品储备。一定量的商品储备是指正常的、合理的商品储备。一方面,它在总量上保证商品流通不致中断,人民生活和社会再生产过程能够正常进行,另一方面,商品储存结构必须和社会商品购买力的结构相适应。这就是说,合理的一定量商品储备,包括总量上和结构上的合理。 展开更多
关键词 商业企业 商品储备 商品储存结构 商品脱销 库存管理 库存商品 有问题商品 国营商业 适销 消费资金
下载PDF
Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups 被引量:3
15
作者 Yue Zhang Hanlin Zhang +1 位作者 Rong Hao Jia Yu 《China Communications》 SCIE CSCD 2018年第11期111-121,共11页
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica... Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient. 展开更多
关键词 cloud storage cloud storage auditing large-scale users third party auditor
下载PDF
New Generation Processor Architecture Research 被引量:1
16
作者 陈红松 Hu +2 位作者 Mingzeng Ji Zhenzhou 《High Technology Letters》 EI CAS 2003年第4期94-96,共3页
With the rapid development of microelectronics and hardware,the use of ever faster micro processors and new architecture must be continued to meet tomorrow′s computing needs. New processor microarchitectures are need... With the rapid development of microelectronics and hardware,the use of ever faster micro processors and new architecture must be continued to meet tomorrow′s computing needs. New processor microarchitectures are needed to push performance further and to use higher transistor counts effectively.At the same time,aiming at different usages,the processor has been optimized in different aspects,such as high performace,low power consumption,small chip area and high security. SOC (System on chip)and SCMP (Single Chip Multi Processor) constitute the main processor system architecture. 展开更多
关键词 new microarchitecture development trend reusing explore parallelism
下载PDF
Microscopic Mechanism of Large Fluctuation in Odd-Even Differences in Moments of Inertia for Actinide Nuclei
17
作者 YULei GONGLun-Xun +1 位作者 LIUShu-Xin ZENGJin-Yan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第2期287-294,共8页
The experimental large fluctuation in odd-even differences in moments ofinertia of deformed actinide nuclei is investigated using the particle-number conserving (PNC)method for treating the cranked shell model with mo... The experimental large fluctuation in odd-even differences in moments ofinertia of deformed actinide nuclei is investigated using the particle-number conserving (PNC)method for treating the cranked shell model with monopole and quadrupole pairing interactions. PNCcalculations show that the large odd-even difference in moments of inertia mainly comes from theinterference contributions j(μv) from particles in high j intruder orbitals μ and v quite near theFermi surface, which have no counterpart in the BCS formalism. The effective monopole andquadrupole pairing interaction strengths are determined to fit the experimental odd-even differencesin binding energies and bandhead moments of inertia. The experimental results for the variation ofmoments of inertia with rotational frequency ω are reproduced well by the PNC calculation. Thenearly identical experimental moments of inertia between ~(236)U(gsb) and ~(238)U(gsb) at lowfrequencies hω ≤ 0.20 MeV are also reproduced quite well. 展开更多
关键词 odd-even differences in moments of inertia cranked shell model particle-number conserving treatment
下载PDF
CCPA: Component-based communication protocol architecture for embedded systems
18
作者 戴鸿君 陈天洲 陈纯 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第B08期79-86,共8页
For increased and various communication requirements of modem applications on embedded systems, general purpose protocol stacks and protocol models are not efficient because they are fixed to execute in the static mod... For increased and various communication requirements of modem applications on embedded systems, general purpose protocol stacks and protocol models are not efficient because they are fixed to execute in the static mode. We present the Component-Based Communication Protocol Architecture (CCPA) to make communication dynamic and configurable. It can develop, test and store the customized components for flexible reuse. The protocols are implemented by component assembly and support by configurable environments. This leads to smaller memory, more flexibility, more reconfiguration ability, better concurrency, and multiple data channel support. 展开更多
关键词 Component-Based Protocol Component-Based Protocol Architecture (CCPA) Dynamic configuration Embedded communication system
下载PDF
Thermal and Textural Changes of Turkish Delight with Storage Relative Humidity
19
作者 Sevim Kayat Gokce Ozkaleli Tattan 《Journal of Food Science and Engineering》 2017年第4期186-191,共6页
Lokum (Turkish delight) is a high sugar and starch containing food. Since the major deterioration factor affecting the storability of lokum is moisture gain or loss, the effect of the possible ambient conditions (3... Lokum (Turkish delight) is a high sugar and starch containing food. Since the major deterioration factor affecting the storability of lokum is moisture gain or loss, the effect of the possible ambient conditions (32%, 53%, 75% RH and 15, 25, 35 ℃) on weight change and firmness of tokum was determined to estimate its structural changes. The variations in thermal properties of lokurn samples stored at different RH (32, 53, 65, 75, and 85% RH) were also determined. Increasing RH decreased glass transition of lokum samples, and two glass transitions (Tg) were observed at 75 and 85% RH. The presence of the second Tg could be related with phase separation which was increased with increasing moisture content and RH. Lokum should be kept at around 50% RH and 15℃, higher storage RH's and temperatures will cause the product to become unacceptable by the consumer within 20 days. 展开更多
关键词 FIRMNESS glass transition temperature lokum texture.
下载PDF
Stand-Alone Wind Power System Operating with Different Storage Structures
20
作者 M. Druga C. Nichita +1 位作者 G. Barakat E. Ceanga 《Journal of Energy and Power Engineering》 2011年第5期385-391,共7页
This paper deals with control method related to a wind system operating in stand-alone applications. The stand-alone wind system is composed of three energy transfer subsystems: wind generator subsystem (wind turbin... This paper deals with control method related to a wind system operating in stand-alone applications. The stand-alone wind system is composed of three energy transfer subsystems: wind generator subsystem (wind turbine and electrical generator), energy storage subsystem, respectively, specific local network subsystem (controlled loads). This wind power system performs in the same time the maximization of wind energy conversion and the power balance between produced and required power. Three structures of the energy storage subsystem, based on buffer battery operation and/or capacitor voltage control, are discussed. The simulation results show that the proposed stand-alone wind power system ensures a good management of the local energy request. The design of the structures is analyzed in Matlab/Simulink environment, using PowerSim toolbox. 展开更多
关键词 Stand-alone wind system wind power system MPPT control energy storage local network wind energy conversion.
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部