首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15篇
  免费   1篇
化学工业   2篇
轻工业   1篇
无线电   4篇
一般工业技术   8篇
自动化技术   1篇
  2023年   3篇
  2022年   6篇
  2021年   2篇
  2018年   1篇
  2014年   1篇
  2013年   3篇
排序方式: 共有16条查询结果,搜索用时 15 毫秒
1.
Van der Waals growth of GaAs on silicon using a two‐dimensional layered material, graphene, as a lattice mismatch/thermal expansion coefficient mismatch relieving buffer layer is presented. Two‐dimensional growth of GaAs thin films on graphene is a potential route towards heteroepitaxial integration of GaAs on silicon in the developing field of silicon photonics. Hetero‐layered GaAs is deposited by molecular beam epitaxy on graphene/silicon at growth temperatures ranging from 350 °C to 600 °C under a constant arsenic flux. Samples are characterized by plan‐view scanning electron microscopy, atomic force microscopy, Raman microscopy, and X‐ray diffraction. The low energy of the graphene surface and the GaAs/graphene interface is overcome through an optimized growth technique to obtain an atomically smooth low­ temperature GaAs nucleation layer. However, the low adsorption and migration energies of gallium and arsenic atoms on graphene result in cluster‐growth mode during crystallization of GaAs films at an elevated temperature. In this paper, we present the first example of an ultrasmooth morphology for GaAs films with a strong (111) oriented fiber‐texture on graphene/silicon using quasi van der Waals epitaxy, making it a remarkable step towards an eventual demonstration of the epitaxial growth of GaAs by this approach for heterogeneous integration.  相似文献   
2.
The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a secure way. Instead of the classical random walk, this paper proposes the quantum walk to achieve high image security. Classical random walk exhibits randomness due to the stochastic transitions between states, on the other hand, the quantum walk is more random and achieve randomness due to the superposition, and the interference of the wave functions. The proposed image encryption scheme is evaluated using extensive security metrics such as correlation coefficient, entropy, histogram, time complexity, number of pixels change rate and unified average intensity etc. All experimental results validate the proposed scheme, and it is concluded that the proposed scheme is highly secured, lightweight and computationally efficient. In the proposed scheme, the values of the correlation coefficient, entropy, mean square error (MSE), number of pixels change rate (NPCR), unified average change intensity (UACI) and contrast are 0.0069, 7.9970, 40.39, 99.60%, 33.47 and 10.4542 respectively.  相似文献   
3.
To secure web applications from Man-In-The-Middle (MITM) and phishing attacks is a challenging task nowadays. For this purpose, authentication protocol plays a vital role in web communication which securely transfers data from one party to another. This authentication works via OpenID, Kerberos, password authentication protocols, etc. However, there are still some limitations present in the reported security protocols. In this paper, the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern method. The proposed OpenID-based encrypted Email’s Authentication, Authorization, and Accounting (EAAA) protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String (SSEAS). This string is deployed on both the relying party and the email server, which is unique and trustworthy. The first authentication, OpenID Uniform Resource Locator (URL) identity, is performed on the identity provider side. A second authentication is carried out by the hidden Email’s server side and receives a third authentication link. This Email’s third SSEAS authentication link manages on the relying party (RP). Compared to existing cryptographic single sign-on protocols, the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing attacks. This study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods, such as Single Sign-On (SSO) and OpenID. The experimental sites were examined by 72 information technology (IT) specialists, who found that 88.89% of respondents successfully validated the user authorization provided to them via Email. The proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere.  相似文献   
4.
5.
In this study, a compact 2 × 2 interlaced sequentially rotated dual-polarized dielectric-resonator antenna array is proposed for 5.8 GHz applications. The array is composed of a novel unit elements that are made of rectangular dielectric resonator (RDR) coupled to an eye slot for generating the orthogonal modes, and to acquire circular polarization (CP) radiation. For the purpose of miniaturization and achieving dual polarized resonance, the array is fed by two interlaced ports and each port excites two radiating elements. The first port feeds horizontal elements to obtain left hand circular polarization (LHCP). The second port feeds vertical elements to obtain right hand circular polarization (RHCP). A quarter-wave length transformer is employed to reduce the attenuation and consequently increase the array gain performance. The 35 × 35 mm2 () gains were 8.4 and 8.2 dBi for port 1 and port 2, respectively, with port isolations of −33.51 dB. The design achieves a voltage standing-wave ratio (VSWR) < −10 dB and an axial ratio (AR) ˂ − 3 dB bandwidth of 2.48% (5.766 to 5.911 GHz) for LHCP at port 1 and a VSWR < −10 dB and AR ˂ −3 dB bandwidth of 2.28% (5.788 to 5.922 GHz) for RHCP at port 2. The findings of the proposed design validate its use for ISM band applications.  相似文献   
6.
7.
A propagation model for lossy building with tree attenuation in urban and residential areas is developed for satellite mobile communications. This model is used to characterize the signal transmitted from medium earth orbit (MEO) satellite when there are buildings and trees in the path of the signal. The analysis is performed using the uniform theory of diffraction (UTD). The tree attenuation is evaluated through the modified exponential decay model (MED).

The normalized signal level and signal attenuation rate are computed. Such information is useful in developing the mobile system's hand-off algorithm. In narrowband systems, the propagation attenuation and fading statistics are the main causes of signal degradation. So, the probability of error is calculated with and without the existence of the tree. Also the axial ratio (AR) is computed as function of satellite elevation angle. In wide band systems, the delay-spread is dominant because of the inter-symbol interference. For such case, the coherence bandwidth and impulse response are computed. Along with that, computed results are compared with actual measured data.  相似文献   
8.
Social media provide digitally interactional technologies to facilitate information sharing and exchanging individuals. Precisely, in case of disasters, a massive corpus is placed on platforms such as Twitter. Eyewitness accounts can benefit humanitarian organizations and agencies, but identifying the eyewitness Tweets related to the disaster from millions of Tweets is difficult. Different approaches have been developed to address this kind of problem. The recent state-of-the-art system was based on a manually created dictionary and this approach was further refined by introducing linguistic rules. However, these approaches suffer from limitations as they are dataset-dependent and not scalable. In this paper, we proposed a method to identify eyewitnesses from Twitter. To experiment, we utilized 13 features discovered by the pioneer of this domain and can classify the tweets to determine the eyewitness. Considering each feature, a dictionary of words was created with the Word Dictionary Maker algorithm, which is the crucial contribution of this research. This algorithm inputs some terms relevant to a specific feature for its initialization and then creates the words dictionary. Further, keyword matching for each feature in tweets is performed. If a feature exists in a tweet, it is termed as 1; otherwise, 0. Similarly, for 13 features, we created a file that reflects features in each tweet. To classify the tweets based on features, Naïve Bayes, Random Forest, and Neural Network were utilized. The approach was implemented on different disasters like earthquakes, floods, hurricanes, and Forest fires. The results were compared with the state-of-the-art linguistic rule-based system with 0.81 F-measure values. At the same time, the proposed approach gained a 0.88 value of F-measure. The results were comparable as the proposed approach is not dataset-dependent. Therefore, it can be used for the identification of eyewitness accounts.  相似文献   
9.
The present study reports, high-performance polymer absorbents for crude oil and organic solvents based on 3D cross-linked polystyrene-polymethyl methacrylate/divinyl benzene (PS-PMMA/DVB). The preparation of the 3D cross-linked polymer absorbents has been carried out by bulk polymerization method using styrene (S) and methyl methacrylate (MMA) monomers in the presence of DVB with azobisisobutyronitrile as an initiator. The prepared cross-linked polymer absorbents were characterized by Fourier transform infrared spectroscopy, thermogravimetric and differential scanning calorimetry, and dynamic mechanical analyses. The absorption kinetics, thermodynamics of the absorption process as well as the recyclability of the cross-linked polymer absorbents were investigated in detail. The developed 3D cross-linked PS-PMMA/DVB absorbents have demonstrated excellent absorption capacities for both organic solvents and crude oil. For instance, the developed polymer absorbent (PS-PMMA/DVB [1 wt%]) shows a maximum absorption capacity of 12 g/g for chloroform, 6 g/g for tetrahydrofuran, and 3 g/g for crude oil. The absorption capacities by the polymer absorbents show a direct relationship with the polarity of the solvents. Moreover, the change of absorption capacity after several repeated cycles of absorption/desorption was only marginal. The demonstrated absorption capacities and the excellent recyclability make polymer absorbents as potential candidates for the oilfield applications and produced water treatments.  相似文献   
10.
This study evaluated the shear bond strength of two coping materials (non-nickel chrome-based cast alloy and lithium disilicate ceramic (IPS Empress) to four different core foundation materials (resin composite, cast metal alloy, lithium disilicate, and dentin), luted with adhesive resin cement (RelyX Unicem). Specimens (N = 56) were fabricated and divided into eight groups (n = 7 per group). Each coping material was luted with self-adhesive resin cement (RelyX Unicem) to the core materials. Bond strength was measured in a Universal Testing Machine (0.5 mm/min). Data were statistically analyzed using a two-way analysis of variance (ANOVA) and Tukey’s HSD tests (alpha = 0.05). Both core (p = 0.000) and coping material type (p = 0.000) significantly affected the mean bond strength (MPa) values. Interaction terms were also significant (p = 0.001). The highest bond strength results were obtained when lithium disilicate was bonded to lithium disilicate (21.48) with the resin cement tested. Lithium disilicate in general presented the highest bond results when bonded to all core materials tested (16.55–21.38) except dentin (3.56). Both cast alloy (2.9) and lithium disilicate (3.56) presented the lowest bond results on dentin followed by cast-alloy-cast alloy combination (3.82).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号