首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23篇
  免费   0篇
电工技术   1篇
综合类   1篇
化学工业   2篇
金属工艺   1篇
建筑科学   1篇
能源动力   6篇
无线电   6篇
一般工业技术   2篇
自动化技术   3篇
  2023年   1篇
  2022年   9篇
  2021年   2篇
  2020年   3篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2007年   1篇
  2003年   2篇
  1988年   1篇
  1985年   1篇
排序方式: 共有23条查询结果,搜索用时 0 毫秒
1.

The Low-Density Parity Check (LDPC) codes of Euclidean Geometry (EG) are encrypted and decrypted in numerous ways, namely Soft Bit Flipping (SBF), Sequential Peeling Decoder (SPD), Belief Propagation Decoder (BPD), Majority Logic Decoder/Detector (MLDD), and Parallel Peeling Decoder (PPD) decoding algorithms. These algorithms provide aextensive range of trade-offs between latency decoding, power consumption, hardware complexity-required resources, and error rate performance. Therefore, the problem is to communicate a sophisticated technique specifying the both soft and burst errors for effective information transmission. In this research, projected a technique named as Hybrid SBF (HSBF) decoder for EG-LDPC codes, which reduces the decoding complexity and maximizes the signal transmission and reception. In this paper, HSBF is also known as Self Reliability based Weighted Soft Bit Flipping (SRWSBF) Decoder. It is obvious from the outcomes that the proposed technique is better than the decoding algorithms SBF, MLDD, BPD, SPD and PPD. Using Xilinx synthesis and SPARTAN 3e, a simulation model is designed to investigate latency, hardware utilization and power consumption. Average latency of 16.65 percent is found to be reduced. It is observed that in considered synthesis parameters such as number of 4-input LUTs, number of slices, and number of bonded IOBs, excluding number of slice Flip-Flops, hardware utilization is minimized to an average of 4.25 percent. The number of slices Flip-Flops resource use in the proposed HSBF decoding algorithm is slightly higher than other decoding algorithms, i.e. 1.85%. It is noted that, over the decoding algorithms considered in this study, the proposed research study minimizes power consumption by an average of 41.68%. These algorithms are used in multimedia applications, processing systems for security and information.

  相似文献   
2.
Metal magnetic memory (MMM) technique can evaluate early damages of ferromagnets and search possible defect locations, while just classifies the defect types roughly. To promote study in this area, the magnetic gradient tensor (MGT) of the self-magnetic leakage field (SMLF) on the fracture zone of crack and stress concentration was measured using a tri-axis magnetometer. From measured results, both the plane and the vertical characteristics of SMLF distributions were discussed. To remove the influence of the measuring direction on experimental results, a new parameter of the analytical signal of magnetic gradient tensor (AMGT) was introduced to determine the location and boundary of the defect. Then, the vertical features were acquired by measuring the plane distributions of AMGT under different lift offs. Through analyzing the vertical features, it was concluded that change rule of the maximum AMGT can be used to predict the defect type. At last, the explanation of the relationship between the vertical feature and the defect type was discussed, which can give some useful inspirations to researchers on magnetic leakage field testing.  相似文献   
3.
4.

Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined permission model. Without classification, the mobile operating system permits installation of mobile applications of all kinds, including Trojans, thus making its trustworthiness into question. In this paper, we present a security system called collaborative policy-based security scheme (CSS) that permits users to customize the access permissions of Android applications during runtime. The proposed CSS security scheme validates the trustworthiness of each application before being installed. The experimental results show that the proposed CSS successfully detects all malicious applications with a run-time overhead of 2.7%.

  相似文献   
5.
The Journal of Supercomputing - Today, the internet of things (IoT) is becoming more common and finds applications in several domains, especially in the healthcare sector. Due to the rising demands...  相似文献   
6.
A novel sulfated zirconia (ZrO2/SO42 ) catalyst was prepared and the catalytic property of this catalyst was compared with active clay and zeolite (USY) in removing olefins from aromatics. Pyridine-FTIR indicated that the abundance of Lewis acid centers on sulfated zirconia is a vital factor for its excellent catalytic activity. N2 adsorption analysis shows that sulfated zirconia is a promising mesopore catalyst material. The superior catalytic performance as well as efficient reusability demonstrated that sulfated zirconia possesses bright application prospects in industry.  相似文献   
7.
8.
《Energy and Buildings》2003,35(3):229-237
Vertically perforated bricks were developed with the view to building environmentally friendly houses since they make insulating materials unnecessary. Indeed, walls can be constructed without any other materials than clay and mortar. Furthermore, they offer better mechanical properties than horizontally perforated ones. However, heat transfer in this geometry, and particularly the influence of the assembly method, is not totally known. In this numerical study, we propose to verify that convection heat transfer is negligible in the perforations. This condition is necessary to increase the thermal resistance of the brick. We then show that a masonry bedded on several strips does not penalize the thermal performance of the wall. A particular study of the ruptures concludes that the convection present in these regions is a local phenomenon preferable to the thermal bridges caused by continuous mortar joints.  相似文献   
9.
A numerical investigation on MHD fluid flow in parabolic mode has been performed to point out its significant properties. Thermal radiation, porous medium, heat generation, chemical reaction, and thermal diffusion along with variable temperature and concentration are taken into consideration in the analysis. The novelty of the work is the inclusion of heat generation and thermal diffusion along with exponentially varying temperature and concentration. The constituent governing equations are solved by using finite difference schemes in explicit form. The fluctuations in velocity, concentration, and temperature are observed and discussed with the help of graphs as well as numerical data. Their gradients are also calculated and analyzed the flow properties by using numerical tables. The existence of heat generation, as well as viscous dissipation, creates an increment in the temperature. The gradient of heat transfer rises with the impact of Prandtl number and decay in it is examined under the existence of a source of heat and viscous dissipation.  相似文献   
10.
Wireless Personal Communications - Despite many advances, Handwritten Devanagari Character Recognition (HDCR) remains unsolved due to the presence of complex characters. For HDCR, the traditional...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号