搜索资源列表
PKITS.pdf
- A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on
0514003
- 根据汽车内饰等行业需求,对皮制品加工的优化排样问题进行了研究.创新地采用离散化处理方式,同时引进边界约束,使排样过程与皮料和样片的几何信息无关,使用基于顺序的启发式底左布局将样片顺次布置到皮料上-According to the demand for such industries as automotive interior trim, leather processing for optimal layout problem is studied. Innovative approach o
DianliLunwen
- 根据本人近10年来项目管理的一些切身体验,重点论述项目投资控制管理中的几个方面。项目投资涉及的环节很多,需要动用的许多人员物资、大量资金。因此建设项目的投资控制的制约因素有很多方面。我想主要从决策、设计和施工三个阶段的投资控制问题谈一点粗浅的认识。-According to my past 10 years, a number of personal experience of project management, with emphasis on investment in several
nbis_v3_2_0_2
- One of the most misinterpreted terms in the software industry is actually one we know very well: entity relationship (ER). That’s because we often lack a common definition that is understood by all members of the development team. We assume that
wireless_sensor_network_survey
- A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent
4-Conventional-and-direct-current-control
- This paper proposes an optimal control strategy for an HVdc light system using a direct current vector control mechanism. The proposed approach is compared with the traditional vector control method for different HVdc control requirements, su
SFS_3
- 论文介绍了一种SFS 算法的参数估计及其实现。它在考虑自遮掩影响的情况下, 有效地估计了SFS 算法中涉及的各种控制参数, 并引入亮度约束、灰度梯度约束和可积性约束, 计算出表面高度和表面向量, 实现三维重构。最后还指出了在Matlab 中实现需要注意的问题。-The paper introduced a SFS algorithm parameter estimation and its implementation. It under the condition of considering
wireless-sensor-network
- In wireless sensor networks, owing to the limitation of energy, memory, and computation, it is necessary to design the networks under the constraints. Prolonged network lifetime and reliability are the most common requirements for many wireless senso
Project-Proposal
- In wireless sensor networks, owing to the limitation of energy, memory, and computation are necessary component to design the networks under the constraints. Prolonged network lifetime and reliability are the most common requirements for many wireles
Insider-threat-mitigation--preventing-unauthorize
- This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various types of dependencies as
Bezier.pdf
- The Bézier curve is one of the most commonly used parametric curves in CAGD and Computer Graphics and has many good properties for shape design. Developing more convenient techniques for designing and modifying Bézier curve is an im- portant prob
A stochastic, contingency-based security-constrained optimal power flow for the procurement of energy and distributed re
- It is widely agreed that optimal procurement of reserves,with explicit consideration of systemcontingencies, can improve reliability and economic efficiency in power systems.With increasing penetration of uncertain generation resources, this optimal
ajassp.2014.969.977
- Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to lar
create_pdf
- 基于某些常见蕴含算子模糊推理全蕴含三I约束算法-Operators fuzzy inference algorithm based on certain common constraints inherent in
A-combination-of-genetic-algorithm-and-particle-s
- A combination of genetic algorithm and particle swarm optimization for optimal DG location and sizing in distribution systems Distributed generation (DG) sources are becoming more prominent in distribution systems due to the incremental dema