排序方式: 共有1859条查询结果,搜索用时 31 毫秒
141.
Cluster tools have advantages of shorter cycle times, faster process development, and better yield for less contamination.
The sequence of dual-arm cluster tools is a complex logistics process during the semiconductor production. Efficient use of
cluster tools is naturally very significant to competitive fab operations. Generating an optimized sequence in a computationally
efficient manner and assessing the quality of the requirements to improve the fab production are the key factors for semiconductor
manufacturing productivity. The Petri net modeling is introduced to minimize the makespan of the process for the three different
logical modes and select a better mode after comparing the makespan among the three logical modes. The tool sequence optimization
problem is formulated as optimization firing transition sequences based on the Petri net and then the formulation is converted
to be linearly solved by the branch-and-cut method in the standard commercial solver CPLEX. Special methods for the linear
conversion are highlighted. Due to the limited calculation time requirement for the real production and the large scale of
the problem, special methods for the efficiency tuning are applied according to the characteristics of the problem. Numerical
testing is supported by one of the most advanced semiconductor enterprises and the computational results show significant
improvement compared with the traditional manual sequence results. 相似文献
142.
An enhancement-based Poisson denoising method for photon-limited images is presented. The noisy image is firstly pre-processed for enhancing incomplete object information, and then it is denoised while preserving the restored structural details. A variational regularization model based on Euler’s elastica (EE) is proposed for image enhancement pre-processing. A nonlocal total variation (NLTV) regularization model is then employed in the second stage of image denoising. The above two optimization problems are solved by the alternating direction method of multipliers (ADMM). For Poissonian images with low image peak values, experiments demonstrate the validity and efficiency of the proposed method for both restoring geometric structure and removing noise. 相似文献
143.
We propose a semiparametric approach that can capture the nonlinearity of deterministic components of the utility functions
in discrete choice models and demonstrate it by analyzing travel mode choice behaviour for an interregional trip. The proposed
smoothing spline-based specification method can be used to make ex ante evaluations regarding the parametric specifications of the deterministic utility functions in discrete choice models. 相似文献
144.
Uncontrolled expansion of combustion wave in spark ignited internal combustion engine causes knock effect which seriously degrades efficiency and lifetime of the engine. Thus, accurate knock detection and control are essential for obtaining a desired performance from the engine. Usually, knock sensor is used to detect this phenomenon but it has limited accuracy especially at engine high-speed rotations because of natural vibration and external noises. In this study an effective method based on Non-Local Mean (NLM) algorithm has been proposed to improve the knock detection accuracy. This method is evaluated based on four different indicators and four engine cylinders. The results show 52.9 % improvement in knock detection. Also feasibility of real time execution of this method based on embedded hardware has been studied. 相似文献
145.
Alan J. Horowitz 《Transportation》2010,37(4):689-703
This paper describes a group of techniques for disaggregating origin–destination tables for travel forecasting that makes
explicit use of observed traffic on a network. Five models within the group are presented, each of which uses nonlinear least-squares
estimation to obtain row and column factors for splitting trip totals from and to larger geographical areas into smaller ones.
The techniques are philosophically similar to Fratar factoring, although the solution method is quite different. The techniques
are tested on a full-sized network for Northfield, MN and are found to work effectively. 相似文献
146.
Jerzy Ejsmont Stanislaw Taryma Grzegorz Ronowski Beata Swieczko-Zurek 《International Journal of Automotive Technology》2018,19(1):45-54
Temperature is a very important factor controlling rolling resistance of road vehicle tyres. There are at least three different temperatures that may be considered as important factors controlling thermal conditions of the rolling tyre. The most common measure of the thermal conditions during tyre rolling is ambient air temperature. The other two are: pavement temperature and “tyre” temperature. Tyre temperature is the most difficult to establish, as temperatures of different parts of rolling tyres differ considerably, thus there is a problem to obtain representative values. In the authors’ opinion, air temperature is the most universal and reliable parameter to measure. The article presents results obtained in the Technical University of Gdańsk during laboratory and road measurements of different car tyres rolling on different pavements. The knowledge of rolling resistance characteristics is important for modelling car dynamics as well as fuel consumption. It is also necessary to establish proper test conditions in the future standardized on-road method of measuring rolling resistance. The results indicate that generally each tyre and pavement combination is influenced by the air temperature in a unique way, but at the same it is possible to propose some general influence factors that may be used to normalize measurements to the standard temperature of 25 °C. 相似文献
147.
Edmondo Di Pasquale Daniel Coutellier 《International Journal of Automotive Technology》2017,18(4):631-642
Head on bonnet impact is becoming more and more important in automotive design as regulations on pedestrian safety become more demanding. Despite the relatively low amount of energy involved, these impacts are truly dynamic phenomena as the event duration is comparable with the traveling time of the different wavefronts generated by the impact. In this paper, we show that we can build up a simplified model for the impact based on wave propagation analysis. Using this model, we can analyze head acceleration on existing bonnets or predict it on new ones. Head acceleration in a bonnet impact can thus be estimated over the whole area of the bonnet with a few minutes of CPU. 相似文献
148.
It is well known that it is difficult to explore underwater terrains using an autonomous underwater vehicle due to the varieties and complexities of underwater terrain elements. Since conventional underwater terrain coverage techniques are usually based on the assumption that the underwater surface is planar, they generate an unnecessary exploration path especially on steep sloped surfaces of ocean basins. This paper proposes a new type of coverage technique, the hybrid terrain coverage framework (HTCF), which considers various surface conditions in three-dimensional environments and generates an efficient exploration path for all environments. The HTCF incorporates a planar terrain coverage algorithm, a spiral path terrain coverage algorithm, and a hybrid decision module to recognize and select the most suitable technique depending on the sloped surface variations. Simulation results show that the proposed HTCF is more efficient than the conventional terrain coverage algorithm in terms of the energy consumption of the underwater vehicle. 相似文献
149.
In the connected vehicles, connecting interfaces bring threats to the vehicles and they can be hacked to impact the vehicles and drivers. Compared with traditional vehicles, connected vehicles require more information transfer. Sensor signals and critical data must be protected to ensure the cyber security of connected vehicles. The communications among ECUs, sensors, and gateways are connected by in-vehicle networks. This paper discussed the state-of-art techniques about secure communication for in-vehicle networks. First, the related concepts in automotive secure communication have been provided. Then we have compared and contrasted existing approaches for secure communication. We have analyzed the advantages/disadvantages of MAC and digital signatures for message authentication and compared the performance and limitations of different cryptographic algorithms. Firewall and intrusion detection system are introduced to protect the networks. The constraints and features of different intrusion detection approaches are presented. After that, the technical requirements for cryptographic mechanism and intrusion detection policy are concluded. Based on the review of current researches, the future development directions of the automotive network security have been discussed. The purpose of this paper is to review current techniques on automotive secure communication and suggest suitable secure approaches to implement on the in-vehicle networks. 相似文献
150.
It has always been a daunting task for any government to allocate the budgets for public infrastructure effectively so as
to maximize the benefits of the limited resources. The most important contribution this paper makes is to conduct an empirical
study of the budget allocations of the six region-based road system construction plans in northern Taiwan using the transportation
budget allocation model devised in this paper. After reviewing the results, the experts consulted while preparing this paper
believe that these results are both objective and able to meet the actual requirements. The competent authority also believes
that they are better than those obtained using their original approach. In particular, the construction of this model takes
into consideration the highest-level supervisors. To a certain degree, it caters for the practices in budget allocation so
that the managers are able to assume the authority corresponding to their responsibility concerning management efficiency
and final outcomes. 相似文献