首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24篇
  免费   0篇
电工技术   1篇
化学工业   3篇
轻工业   2篇
无线电   5篇
一般工业技术   5篇
自动化技术   8篇
  2021年   4篇
  2020年   2篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   2篇
  2015年   1篇
  2014年   2篇
  2013年   1篇
  2011年   1篇
  2010年   1篇
排序方式: 共有24条查询结果,搜索用时 93 毫秒
21.
An increase of putrescine content in tiger prawn can be related to the deterioration of its quality. Increase in putrescine consumption causes nausea, vomiting, diarrhea, allergy, and flushing in humans. To address this issue, a glassy carbon electrode modified with diamine oxidase on ceria nanoparticles was fabricated for rapid determination of putrescine in tiger prawn. Based on the amperometric response, calibrated models such as linear, Hill, and Michaelis–Menten functions were constructed. The best performing model was based on Hill analysis, yielding relative prediction error of 0.035, percentage recovery of 113.10, and root mean square error of cross validation of 0.083. All the three models were verified with extract of tiger prawn sample. Among the three models, only the amperometric biosensor based on Hill analysis showed acceptable recovery with low relative standard deviation in tiger prawn sample.  相似文献   
22.
Wireless Personal Communications - Digital transferring of medical images in a fraction of second has become inevitable in this internet era. Hence, it is very much essential and need of the time...  相似文献   
23.
Recently, diverse types of chaotic image encryption algorithms have been explored to meet the high demands in realizing secured real time image sharing applications. In this context, to achieve high sensitivity and superior key space, a multiple chaotic map based image encryption algorithm has been proposed. The proposed algorithm employs three-stage permutation and diffusion to withstand several attacks and the same is modelled in reconfigurable platform namely Field Programmable Gate Array (FPGA). The comprehensive analysis is done with various parameters to exhibit the robustness of the proposed algorithm and its ability to withstand brute-force, differential and statistical attacks. The synthesized result demonstrates that the reconfigurable hardware architecture takes approximately 0.098 ms for encrypting an image of size 256 × 256. Further the resource utilization and timing analyzer results are reported.  相似文献   
24.
Multimedia Tools and Applications - Embedded devices with highly constrained resources are emerging in numerous application areas which include wireless sensor networks, Radio-Frequency...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号