992 resultados para Exposition lumineuse


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We demonstrate the on-chip nanoscale focusing of surface plasmons in metallic nanotip coupled to the silicon waveguide. Strong field enhancement is observed at the apex of the tip. Enhancing light matter interactions is discussed. © 2012 OSA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An three phase adjustable output voltage rectifier with constant power flow based on waveform gap patching principle is resented. By patching the gapes in the phase currents in parallel way as well as the ripple of the output voltage in series way, it implements the constant power flow from the three-phase line to the DC output without using any line frequency (and its harmonics) energy storage components. Principally, by treating only 22.4% power of the needed power output, this rectifier can supply constant power flow with adjustable output voltages without bring about any harmonic interferences to the power utility and achieve unite power factor.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a new generation 980 nm submarine pump module that consists of a hermitically sealed 8-pin ceramic MiniDIL package without thermo-electric cooler.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We report a new technique, called SAP, for side pumping of double-clad, rare-earth-doped fiber lasers using fiber-coupled pump sources. The highest coupling efficiency can even exceed 92% in theory with this structure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An improved selective area growth (SAG) method is proposed to better the fabrication and performance of the Electroabsorption modulated laser The typical threshold current of the EML is 18mA, and the output power is 5.6mW at EAM facet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bita lake provincial natural reserve is located in Shangri La region of North western Yunnan,and was set as a demonstrating area for ecotourism exploitation in 1998.After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists,it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism,i.e,tourism,protection,poverty clearing and environment education.Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model,local Tibetan family reception model and environmental monitoring model,were also successful,which were demonstrated and spreaded to the whole province.Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

谢绪恺、聂义勇判据的提出 比国外学者的同类发现要早得多。由于历史原因,这判据过去未曾宣扬。81年本刊上的简要介绍 曾引起了我国广大读者的重视和兴趣。现在,应读者要求,再作一次较详细的介绍。谢聂判据,简单地说,就是:(A)给多项式式 a_0x~n+a_1x~(n-1)+…+a_n 或 a_0+a_1+…+a_nx~n(a_i>0,i=0,1,2,…n)定义一判定系数α_i=a_i-|a|+2/a_ia_i+1,(B)多项式所表征的系统的稳定性由这判定系数α_i 判定,稳定的必要条件是α_(?)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Program design is an area of programming that can benefit significantly from machine-mediated assistance. A proposed tool, called the Design Apprentice (DA), can assist a programmer in the detailed design of programs. The DA supports software reuse through a library of commonly-used algorithmic fragments, or cliches, that codifies standard programming. The cliche library enables the programmer to describe the design of a program concisely. The DA can detect some kinds of inconsistencies and incompleteness in program descriptions. It automates detailed design by automatically selecting appropriate algorithms and data structures. It supports the evolution of program designs by keeping explicit dependencies between the design decisions made. These capabilities of the DA are underlaid bya model of programming, called programming by successive elaboration, which mimics the way programmers interact. Programming by successive elaboration is characterized by the use of breadth-first exposition of layered program descriptions and the successive modifications of descriptions. A scenario is presented to illustrate the concept of the DA. Technques for automating the detailed design process are described. A framework is given in which designs are incrementally augmented and modified by a succession of design steps. A library of cliches and a suite of design steps needed to support the scenario are presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rothwell, W., Femina (Trinity College, Cambridge MS B.14.40); edited with an Introduction and Notes (The Anglo-Norman On-Line Hub, 2005) RAE2008

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Real-time adaptive music is now well-established as a popular medium, largely through its use in video game soundtracks. Commercial packages, such as fmod, make freely available the underlying technical methods for use in educational contexts, making adaptive music technologies accessible to students. Writing adaptive music, however, presents a significant learning challenge, not least because it requires a different mode of thought, and tutor and learner may have few mutual points of connection in discovering and understanding the musical drivers, relationships and structures in these works. This article discusses the creation of ‘BitBox!’, a gestural music interface designed to deconstruct and explain the component elements of adaptive composition through interactive play. The interface was displayed at the Dare Protoplay games exposition in Dundee in August 2014. The initial proof-of- concept study proved successful, suggesting possible refinements in design and a broader range of applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Monografia apresentada à Universidade Fernando Pessoa para obtenção do grau Licenciada em Medicina Dentária

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Ciências Farmacêuticas

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are several proofs now for the stability of Toom's example of a two-dimensional stable cellular automaton and its application to fault-tolerant computation. Simon and Berman simplified and strengthened Toom's original proof: the present report is simplified exposition of their proof.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node’s resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage of each node. Motivated by content networking applications – including web caching, CDNs, and P2P – this paper extends our previous work on the off-line version of the problem, which was limited to object replication and was conducted under a game-theoretic framework. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache replacement/redirection/admission policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that online cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. When this becomes possible, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to the exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the “outlier” characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node's resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage at each node. Motivated by content networking applications -- including web caching, CDNs, and P2P -- this paper extends our previous work on the on-line version of the problem, which was conducted under a game-theoretic framework, and limited to object replication. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache management policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that on-line cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. To appear in a substantial manner, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the "outlier" characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes. Our framework utilizes a simple control-theoretic approach to dynamically parameterize the cache management scheme. We show performance evaluation results that quantify the benefits from instantiating such a framework, which could be substantial under skewed demand profiles.