首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   26篇
  免费   0篇
电工技术   2篇
综合类   1篇
金属工艺   1篇
建筑科学   1篇
能源动力   5篇
无线电   8篇
一般工业技术   3篇
自动化技术   5篇
  2023年   1篇
  2022年   9篇
  2021年   2篇
  2020年   4篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2011年   1篇
  2009年   1篇
  2005年   1篇
  2003年   2篇
  1988年   1篇
  1985年   1篇
排序方式: 共有26条查询结果,搜索用时 15 毫秒
1.
Wireless Personal Communications - Now-a-days the most common pretentious disease is the lung cancer, which has become more prevalent in the world that primarily infects the pulmonary nodules of...  相似文献   
2.

The Low-Density Parity Check (LDPC) codes of Euclidean Geometry (EG) are encrypted and decrypted in numerous ways, namely Soft Bit Flipping (SBF), Sequential Peeling Decoder (SPD), Belief Propagation Decoder (BPD), Majority Logic Decoder/Detector (MLDD), and Parallel Peeling Decoder (PPD) decoding algorithms. These algorithms provide aextensive range of trade-offs between latency decoding, power consumption, hardware complexity-required resources, and error rate performance. Therefore, the problem is to communicate a sophisticated technique specifying the both soft and burst errors for effective information transmission. In this research, projected a technique named as Hybrid SBF (HSBF) decoder for EG-LDPC codes, which reduces the decoding complexity and maximizes the signal transmission and reception. In this paper, HSBF is also known as Self Reliability based Weighted Soft Bit Flipping (SRWSBF) Decoder. It is obvious from the outcomes that the proposed technique is better than the decoding algorithms SBF, MLDD, BPD, SPD and PPD. Using Xilinx synthesis and SPARTAN 3e, a simulation model is designed to investigate latency, hardware utilization and power consumption. Average latency of 16.65 percent is found to be reduced. It is observed that in considered synthesis parameters such as number of 4-input LUTs, number of slices, and number of bonded IOBs, excluding number of slice Flip-Flops, hardware utilization is minimized to an average of 4.25 percent. The number of slices Flip-Flops resource use in the proposed HSBF decoding algorithm is slightly higher than other decoding algorithms, i.e. 1.85%. It is noted that, over the decoding algorithms considered in this study, the proposed research study minimizes power consumption by an average of 41.68%. These algorithms are used in multimedia applications, processing systems for security and information.

  相似文献   
3.
Metal magnetic memory (MMM) technique can evaluate early damages of ferromagnets and search possible defect locations, while just classifies the defect types roughly. To promote study in this area, the magnetic gradient tensor (MGT) of the self-magnetic leakage field (SMLF) on the fracture zone of crack and stress concentration was measured using a tri-axis magnetometer. From measured results, both the plane and the vertical characteristics of SMLF distributions were discussed. To remove the influence of the measuring direction on experimental results, a new parameter of the analytical signal of magnetic gradient tensor (AMGT) was introduced to determine the location and boundary of the defect. Then, the vertical features were acquired by measuring the plane distributions of AMGT under different lift offs. Through analyzing the vertical features, it was concluded that change rule of the maximum AMGT can be used to predict the defect type. At last, the explanation of the relationship between the vertical feature and the defect type was discussed, which can give some useful inspirations to researchers on magnetic leakage field testing.  相似文献   
4.
5.

Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined permission model. Without classification, the mobile operating system permits installation of mobile applications of all kinds, including Trojans, thus making its trustworthiness into question. In this paper, we present a security system called collaborative policy-based security scheme (CSS) that permits users to customize the access permissions of Android applications during runtime. The proposed CSS security scheme validates the trustworthiness of each application before being installed. The experimental results show that the proposed CSS successfully detects all malicious applications with a run-time overhead of 2.7%.

  相似文献   
6.
Hierarchical 3D flower-like ZnCo2O4 (ZCO) microstructures assembled from petal-like nanosheets/flakes of non-uniform sizes were engineered by a polyvinylpyrrolidone (PVP)-assisted hydrothermal method. Four different samples/morphologies of ZCO were obtained (PVP-L@6, PVP-H@6, PVP-L@12, and PVP-H@12) by altering the reaction parameters such as surfactant concentration (PVP) and reaction time, which can play a significant role in the formation of flower-/petal-/flake-like architectures. The alteration of the reaction parameters not only resulted in morphological changes but also affected the surface area, pore size/volume, crystalline nature, non-stoichiometry of Zn, Co, and O in ZCO, and their electrochemical performance. The metal (Zn/Co)/O deficiencies of ZCO samples were investigated via X-ray photoelectron spectroscopy and supported by the Rietveld refinement method. Furthermore, a plausible growth mechanism for these flower-like ZCO microstructures was projected based on the experimental results. The four dissimilar samples/morphologies of ZCO, which exhibit different electrochemical performances, were investigated. Our results show that PVP-H@12 exhibits higher specific capacitance (761/680 F g−1 at 0.35/1 A g−1) and good cycling constancy (90% capacitive retention after 2000 cycles at 5 Ag−1) among all the four samples.  相似文献   
7.
The Journal of Supercomputing - Today, the internet of things (IoT) is becoming more common and finds applications in several domains, especially in the healthcare sector. Due to the rising demands...  相似文献   
8.
A numerical investigation on MHD fluid flow in parabolic mode has been performed to point out its significant properties. Thermal radiation, porous medium, heat generation, chemical reaction, and thermal diffusion along with variable temperature and concentration are taken into consideration in the analysis. The novelty of the work is the inclusion of heat generation and thermal diffusion along with exponentially varying temperature and concentration. The constituent governing equations are solved by using finite difference schemes in explicit form. The fluctuations in velocity, concentration, and temperature are observed and discussed with the help of graphs as well as numerical data. Their gradients are also calculated and analyzed the flow properties by using numerical tables. The existence of heat generation, as well as viscous dissipation, creates an increment in the temperature. The gradient of heat transfer rises with the impact of Prandtl number and decay in it is examined under the existence of a source of heat and viscous dissipation.  相似文献   
9.
Allocation of flexible AC transmission systems (FACTS) devices is a challenging power system problem. This paper proposes a new particle swarm optimisation (PSO) variant, called enhanced leader PSO (ELPSO), for solving this problem. This algorithm is capable of solving FACTS allocation problem in a way leading to lower amounts of power flow violations, voltage deviations and power losses with respect to other optimisation algorithms. Distributed thyristor controlled series compensators (D-TCSC’s) are used. D-TCSC’s are installed at all branches except those with regulating transformers. The reactances of D-TCSC’s are found in optimisation process. ELPSO features a five-staged successive mutation strategy which mitigates premature convergence problem of conventional PSO. ELPSO and other optimisation algorithms are applied to IEEE 14 bus and 118 bus power systems for N-1 contingencies and also for simultaneous outage of four branches. The results show that it leads to lower amounts of power flow violations, voltage deviations and power losses with respect to conventional PSO (CPSO) and eight other optimisation algorithms including genetic algorithm (GA), gravitational search algorithm (GSA), galaxy based search algorithm (GBSA), invasive weed optimisation (IWO), asexual reproduction optimisation (ARO), threshold acceptance (TA), pattern search and nonlinear programming (NLP).  相似文献   
10.
This paper presents the application of immune algorithm (IA) to find optimal location of unified power flow controller (UPFC) to achieve optimal power flow (OPF) and congestion management. Objective function in the OPF, that is to be minimized, is the overall cost functions, which includes the total active and reactive production cost function of the generators and installation cost of UPFCs. The OPF constraints are generators, transmission lines and UPFCs limits. In power system, it may not always be possible to dispatch all of the contracted power transactions due to congestion of the transmission corridors. We propose IA method to minimize the objective function under all equality and inequality constraints. Simulations are performed on 4-bus, IEEE 14-bus and IEEE 30-bus test systems for optimal location of UPFC and the results obtained are encouraging and will be useful in electrical restructuring.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号