首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   0篇
化学工业   1篇
金属工艺   2篇
建筑科学   1篇
一般工业技术   1篇
自动化技术   3篇
  2023年   2篇
  2019年   2篇
  2018年   1篇
  2016年   2篇
  2010年   1篇
排序方式: 共有8条查询结果,搜索用时 16 毫秒
1
1.
The grafting of methyl methacrylate (MMA) onto ultra‐high‐molecular‐weight polyethylene (UHMWPE) and chromic acid etched UHMWPE was conducted with a preirradiation method in air in the presence of a Mohr salt and sulfuric acid. The grafted samples were characterized by Fourier transform infrared (FTIR) spectroscopy, a gravimetric method, differential scanning calorimetry, scanning electron microscopy (SEM), and interfacial bonding strength measurements. The FTIR results showed the presence of ether and carbonyl groups in the MMA‐grafted UHMWPE (MMA‐g‐UHMWPE) samples. The Taguchi experimental design method was used to find the best degree of grafting (DG) and bonding strength. The efficient levels for different variables were calculated with an analysis of variance of the results. SEM micrographs of MMA‐g‐UHMWPE samples showed that with increasing DG and chromic acid etching, the MMA‐g‐UHMWPE rich phase increased on the surface; this confirmed the high interfacial bonding strength of the grafted samples with bone cement. The grafting of the MMA units onto UHMWPE resulted in a lower crystallinity, and the crystallization process proceeded at a higher rate for the MMA‐g‐UHMWPE samples compared to the initial UHMWPE; this suggested that the MMA grafted units acted as nucleating agents for the crystallization of UHMWPE. © 2009 Wiley Periodicals, Inc. J Appl Polym Sci, 2010  相似文献   
2.
Neural Processing Letters - This paper introduces a new approach to maximum likelihood learning of the parameters of a restricted Boltzmann machine (RBM). The proposed method is based on the...  相似文献   
3.

With the growth of the internet, development of IP based services has increased. Voice over IP (VoIP) technology is one of the services which works based on the internet and packet switching networks and uses this structure to transfer the multimedia data e.g. voices and images. Recently, Chaudhry et al., Zhang et al. and Nikooghadam et al. have presented three authentication and key agreement protocols, separately. However, in this paper, it is proved that the presented protocols by Chaudhry et al. and also Nikooghadam et al. do not provide the perfect forward secrecy, and the presented protocol by Zhang et al. not only is vulnerable to replay attack, and known session-specific temporary information attack, but also does not provide user anonymity, re-registration and revocation, and violation of fast error detection. Therefore, a secure and efficient two-factor authentication and key agreement protocol is presented. The security analysis proves that our proposed protocol is secure against various attacks. Furthermore, security of proposed scheme is formally analyzed using BAN logic and simulated by means of the AVISPA tool. The simulation results demonstrate security of presented protocol against active and passive attacks. The communication and computation cost of the proposed scheme is compared with previously proposed authentication schemes and results confirm superiority of the proposed scheme.

  相似文献   
4.
The E-health care systems allow patients to gain the health monitoring facility and access medical services remotely. A secure mechanism for mutual authentication and session key agreement is the most important requirements for E-Health Care Systems. Recently, Amin et al.’s proposed a mutual authentication and session key agreement protocol and claimed that their scheme is secure against all possible attacks. In this paper, we show that not only their scheme is vulnerable to privileged-insider attack, replay attack, session key disclosure attack, but also does not provide patient untraceability and backward secrecy. In order to withstand the mentioned security weaknesses, we propose an efficient remote mutual authentication scheme for the systems which are using ECC and Fuzzy Extractor. The proposed scheme not only resists against different security attacks, but it also provides an efficient registration, login, mutual authentication, session key agreement, and password and biometric update phases. During the experimentation, it has been observed that the proposed scheme is secure against various known attacks. Beside, our scheme is robust against privileged-insider attack that it rarely checked in security analysis. The informal analysis will ensure that our scheme provides well security protection against the different security attacks. Furthermore, we analyzed the security of the scheme using AVISPA software and Random Oracle Model. The formal analysis results and performance evaluation vouch that our scheme is also secure and efficient in computation and communication cost.  相似文献   
5.
6.
7.
The microplastic particles (MPs) and effects of storage time and direct sunlight on the MPs in bottled mineral waters were investigated by three experiments conditions. The mean MPs concentration was 63.9 ± 38.9 MPs/L. Pellet forms, white/yellow colour and sizes < 100 μm were predominant MPs, accounted for 35.3%, 51% and 60.2% of the total MPs, respectively. Storage of bottled water under darkness and sunlight caused an increase of 1.5% and 2.5% of MPs pollution, respectively. Also, the estimated daily intake (EDI) of MPs was 2.1, 6.4 and 9.6 MPs/kg BW.day for adults, children and infants, respectively. It is concluded that high storage time and direct sunlight may lead to a greater MPs pollution in mineral water and also high human intake through drinking bottled water. Therefore, it is suggested to reduce the expiry date of the bottled mineral water and avoid sunlight contact before consumption.  相似文献   
8.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号