The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The bismuth triborate crystals BiB3O6 (BIBO) are multifunctional crystal materials with noncentrosymetric characteristics. In this paper, single crystal growth of BIBO crystals by using the top seeded solution method in a short period (within one month) was reported and the determination of the dielectric, elastic and piezoelectric constants were discussed for potential piezoelectric applications...
Under an extended proportional-integral (PI) control scheme, distributed average tracking (DAT) control algorithms are derived for networked Euler-Lagrange systems for two different kinds of reference signals: reference signals with steady states and reference signals with bounded derivatives.
This paper establishes a quantitative model of bullwhip effect under the max-min inventory management system with the market demand subjecting to the AR (1) demand process in a simple two-level supply system including a single supplier and a single retailer, resulting that the bullwhip effect will be extended with the increasing of lead time and service level. The result couldprovide some significant...
Aimed at the defects of current traffic accident rapid investigation methods, a traffic accident vision swift reconnaissance system based on coded target is proposed. Make use of the uniqueness and feature station's geometric constraint of coded target, and we can realize automatic recognition and match of coded target and precise space scale constraint. The coded targets distributed in the accident...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. Ensuring the correctness of firewall policies through testing is important. In firewall policy testing, test inputs are packets and test outputs are decisions. Packets with unexpected (expected) evaluated decisions are classified as failed (passed) tests. Given failed tests together...
In this paper, an edge driven model is proposed which allows all kinds of manipulations of complex networks that are common in most of the real-world networks. It is based on evolution features other than structural features that are employed in other models. Under this framework, a particular model is generated for reproducing the power-law distribution and the analytical results are also given.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.