首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   1篇
电工技术   1篇
化学工业   1篇
无线电   6篇
冶金工业   1篇
  2022年   1篇
  2021年   1篇
  2018年   2篇
  2016年   1篇
  2013年   1篇
  2006年   1篇
  2005年   1篇
  1998年   1篇
排序方式: 共有9条查询结果,搜索用时 15 毫秒
1
1.
Recent work has considered encoding a string by separately conveying its symbols and its pattern-the order in which the symbols appear. It was shown that the patterns of independent and identically distributed (i.i.d.) strings can be losslessly compressed with diminishing per-symbol redundancy. In this correspondence, the pattern redundancy of distributions with memory is considered. Close lower and upper bounds are established on the pattern redundancy of strings generated by Hidden Markov models (HMMs) with a small number of states, showing in particular that their per-symbol pattern redundancy diminishes with increasing string length. The upper bounds are obtained by analyzing the growth rate of the number of multidimensional integer partitions, and the lower bounds, using Hayman's theorem  相似文献   
2.
3.
A Wireless Sensor Networks (WSNs) consist of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. WSNs are more vulnerable to attacks and failures due to the involvement of many numbers of tiny sensor nodes. As the technology is tremendously increasing in the recent past, the implementation of this for various time critical applications is quite interesting and challenging. Moreover, WSNs have no specific hierarchical structures, leads to security and maintenance problems. Trust in WSN is defined as the degree of belief or confidence about the nodes based on the past interactions and observations has which become a mandatory requirement for reliable communication in WSN under security constraints. In this paper, we propose a Heuristic Approach based Trust Worthy Architecture for WSN that considers the challenges of the system and focus on the collaborative mechanism for trust evaluation and maintenance. Our proposed Architecture could also be capable of fulfilling critical security, reliability, mobility and performance requirements for reliable communication while being readily adaptable to different applications. The simulation results of the proposed architecture outperformed the recent trust worthy architecture using the analysis of the performance requirements such as communication overhead, memory requirements and energy consumption.  相似文献   
4.
Reactions initiated by chlorine atoms can enhance the formation of ozone (O3) and secondary organic aerosol (SOA) in the troposphere. Environmental chamber experiments were conducted to quantify heterogeneous Cl2 production from NH4Cl and NaCl particles exposed to O3 and hydroxyl radicals (?OH). Observations are inconsistent with models of Cl2 production resulting solely from surface‐mediated reactions of ?OH and suggest that O3 plays a significant role. The production of Cl2 increased with relative humidity and decreased in the presence of SOA or nitric oxides (NOx). Heterogeneous reactive uptake coefficients for the production of Cl2 from O3 on pure NH4Cl ( ) averaged 1.4 ± 1.0 × 10?3. Cl2 production was six times more efficient on NH4Cl aerosol than on NaCl aerosol. Model calculations under atmospheric conditions suggest this heterogeneous Cl2 production could increase peak daily O3 concentrations by over 10%. © 2018 American Institute of Chemical Engineers AIChE J, 64: 3151–3158, 2018  相似文献   
5.
In the recent past information transmission through the vehicular ad hoc network (VANET) playing a vital role due to increase in accident statistics. There are numerous networking and VANET protocols helpful to control the trust while transmitting the data from source to destination nodes in traffic environment. In spite of many existing protocols for analyzing the trust in the network, the challenge of routing overhead, high energy consumption and malicious attacks issues still continue in the communication. This research introduces the trust collaboration nodes and Quality of Service (QoS) with energy multipath routing protocol for transmitting the information through VANET. Initially, the trusted nodes have been collected for analyzing the neighbouring nodes and the information are transmitted using the proposed QoS based energy efficient multipath routing protocol. During this transmission, the multi path protocol eliminates the intermediate attacks effectively when compared with the other existing protocols. The Proposed protocol maintains the QoS while routing the information from source to destination and further the efficiency has been analyzed through simulation experiments and Montgomery multiplier based Elliptic Curve Cryptography (ECC) will be used in future for better security and privacy.  相似文献   
6.
This paper describes the basic design, refinement, and verification using finite-element analysis, and operational simulation using the Virtual Test Bed, of a linear machine for an electromagnetic aircraft launcher, for the aircraft carrier of the future. Choices of basic machine format and procedures for determining basic dimensions are presented. A detailed design for a permanent-magnet version is presented, and wound-field coil and induction machine versions are briefly discussed. The long armature-short field geometry is justified, and in particular the impact of this geometry on the scale of the power electronic drive system is examined.  相似文献   
7.
Wireless Personal Communications - The miniaturized Electroencephalography (EEG) modules monitors the EEG signals over a smaller area, however, thus modules suffer from poor spatial coverage. The...  相似文献   
8.
9.

The decentralized administration and the lack of an appropriate infrastructure causes the MANET prone to attacks. The attackers play on the vulnerable characteristics of the MANET and its underlying routing protocols such as AODV, DSR etc. to bring about a disruption in the data forwarding operation. Hence, the routing protocols need mechanisms to confront and tackle the attacks by the intruders. This research introduces the novel host-based intrusion detection system (HIDS) known as analytical termination of malicious nodes (ATOM) that systematically detects one of the most significant black hole attacks that affects the performance of AODV routing protocol. ATOM IDS performs detection by computing the RREP count (Route Reply) and the packet drop value for each individual node. This system has been simulated over the AODV routing protocol merged with the black hole nodes and the resultant simulation scenario in NS2 has been generated. The trace obtained shows a colossal increase in the packet delivery ratio (PDR) and throughput. The results prove the efficacy of the proposed system.

  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号