Sr2La3Nb1?xTaxTi4O17 (0 ≤ x ≤ 1) ceramics were processed via a solid-state mixed oxide route. Sr2La3Nb1?xTaxTi4O17 (0 ≤ x ≤ 1) solid solutions were single phase in the whole range of x values within the x-ray diffraction (XRD) detection limit. The microstructure comprised elongated and needle-shaped grains. The ceramics exhibit relative permittivity (εr) of 73 to 68.6, product of unloaded quality factor and resonant frequency (Quf0) of 7100 GHz to 9500 GHz, and temperature coefficient of resonant frequency (τf) of 78.6 ppm/°C to 56.6 ppm/°C. 相似文献
The authors describe in detail the design considerations of our previously proposed novel optical quantizing and coding method for all-optical analog-to-digital (A/D) conversion using nonlinear optical switches based on the Sagnac interferometer. The multiperiod transfer function, which is the key to quantizing and coding, is achieved through a careful design of the Sagnac interferometer. In the experiments, the intensity of the pulse train input to our A/D converter is manually changed, and the corresponding digital signals are successfully mapped generated. Although the input-pulse trains are not the sampling of real analog signal, the principle of our proposed 3-bit A/D conversion at a 10 gigasample per second (Gsps) rate is demonstrated. The proposed optical quantizing and coding, combined with existing optical sampling techniques, will enable ultrafast photonic A/D conversion without electronics. The potential in the frequency regime of over a few hundred gigasamples per second was investigated by using an optical switch that utilizes the optical Kerr effect for fast operation. It was found out that the wavelength allocations and temporal widths of control and probe pulses have to be optimized with respect to the group-velocity dispersion of highly nonlinear fiber. 相似文献
Recently, directional sensor networks have received a great deal of attention due to their wide range of applications in different fields. A unique characteristic of directional sensors is their limitation in both sensing angle and battery power, which highlights the significance of covering all the targets and, at the same time, extending the network lifetime. It is known as the target coverage problem that has been proved as an NP-complete problem. In this paper, we propose four learning automata-based algorithms to solve this problem. Additionally, several pruning rules are designed to improve the performance of these algorithms. To evaluate the performance of the proposed algorithms, several experiments were carried out. The theoretical maximum was used as a baseline to which the results of all the proposed algorithms are compared. The obtained results showed that the proposed algorithms could solve efficiently the target coverage problem. 相似文献
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.
AC conductivity of consolidated nanoparticles of NiO, having different average particle sizes (2.5 nm–17 nm) was measured in the temperature range 313 K to 413 K and over the frequency range 50 Hz to 3 MHz. The ac conductivity of the samples was found to be enhanced by six to eight orders of magnitude over that of NiO single crystals reported in the literature. This large enhancement in conductivity is attributed to the high density of Ni2+ vacancies in the nanoparticles. The variation of ac conductivity with frequency of the applied signal and temperature is discussed on the basis of the Correlated Barrier Hopping (CBH) Model. The observed spread in activation energy and slope of the log ac Vs log plots is attributed to the distribution of the charge carrier hopping distance and localization energies in the nanoparticle samples. The effect of the interfacial region on the electrical conductivity of the samples is analyzed by taking into account the contributions due to grain boundaries and triple junctions. The observed variation of measured ac conductivity with average particle size is semi-quantitatively explained based on the reasoning that the role of the triple junctions is to reduce the conductivity. 相似文献
Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite network. The verification stage can verify the effectiveness of secret shares issued by the ground control center to each participant and verify the effectiveness of secret shares shown by participants. We use a lot of difficult assumptions based on mathematical problems in the verification stage, such as solving the difficult problem of the discrete logarithm, large integer prime factorization, and so on. Compared with other verifiable secret sharing schemes designed for difficult problems under the same security, the verifiable secret sharing scheme based on the Elliptic Curve Cryptography (ECC) system has the advantages of less computational overhead and shorter key. At present, the binary polynomial is a single secret scheme and cannot provide effective verification. Therefore, based on a Protected Verifiable Synchronous Multi Secret Sharing (PVS-MSS) scheme, this paper is designed based on bivariate asymmetric polynomials. The advanced verifiable attribute is introduced into the Protected Secret Sharing (PSS) scheme. This paper extends the protected synchronous multi-secret sharing scheme based on bivariate polynomial design. The ECC system constructs the security channel between the ground control center and participants and constructs the verification algorithm. Through the verification algorithm, any participant can verify the consistency and effectiveness of the secret shadow and secret share received from other participants or presented by the secret distribution center. Therefore, no additional key agreement protocol is required; participants do not need to negotiate the session key for encryption; the secret share polynomial can generate the session key between participants and speed up the secret reconstruction process. The verification stage has lower computational complexity than the verifiable scheme constructed by Rivest Shamir Adleman (RSA) and other encryption methods. Chinese Remainder Theorem (CRT) is used to update the secret shadow. The secret shadow does not need to be updated with the change of the scheme shared secret, and the public value update efficiency is higher. Reduce the complexity of sharing secret updates in a synchronous multi-secret sharing scheme. 相似文献
The formation of 3-monochloropropane-1,2-diol (3-MCPD) esters in refined palm oil during deodorisation is attributed to the intrinsic composition of crude palm oil. Utilising D-optimal design, the effects of the degumming and bleaching processes on the reduction in 3-MCPD ester formation in refined palm oil from poor-quality crude palm oil were studied relative to the palm oil minor components that are likely to be their precursors. Water degumming remarkably reduced 3-MCPD ester formation by up to 84%, from 9.79 mg/kg to 1.55 mg/kg. Bleaching with synthetic magnesium silicate caused a further 10% reduction, to 0.487 mg/kg. The reduction in 3-MCPD ester formation could be due to the removal of related precursors prior to the deodorisation step. The phosphorus content of bleached palm oil showed a significant correlation with 3-MCPD ester formation. 相似文献
Gelatin is a highly purified animal protein of pig, cow, and fish origins and is extensively used in food, pharmaceuticals, and personal care products. However, the acceptability of gelatin products greatly depends on the animal sources of the gelatin. Porcine and bovine gelatins have attractive features but limited acceptance because of religious prohibitions and potential zoonotic threats, whereas fish gelatin is welcomed in all religions and cultures. Thus, source authentication is a must for gelatin products but it is greatly challenging due to the breakdown of both protein and DNA biomarkers in processed gelatins. Therefore, several methods have been proposed for gelatin identification, but a comprehensive and systematic document that includes all of the techniques does not exist. This up-to-date review addresses this research gap and presents, in an accessible format, the major gelatin source authentication techniques, which are primarily nucleic acid and protein based. Instead of presenting these methods in paragraph form which needs much attention in reading, the major methods are schematically depicted, and their comparative features are tabulated. Future technologies are forecasted, and challenges are outlined. Overall, this review paper has the merit to serve as a reference guide for the production and application of gelatin in academia and industry and will act as a platform for the development of improved methods for gelatin authentication. 相似文献