首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   34篇
  免费   0篇
化学   13篇
晶体学   1篇
力学   2篇
数学   2篇
物理学   3篇
无线电   13篇
  2022年   1篇
  2021年   1篇
  2020年   7篇
  2019年   1篇
  2018年   1篇
  2017年   2篇
  2014年   1篇
  2013年   6篇
  2012年   1篇
  2011年   1篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2005年   1篇
  2004年   4篇
  2002年   1篇
  1999年   1篇
  1983年   1篇
排序方式: 共有34条查询结果,搜索用时 281 毫秒
1.
Russian Journal of General Chemistry - In the present study novel 1,2,4-oxadiazolo sulfonamides 3a–3o are synthesized by an efficient method based on the reaction of 1,2,4-oxadiazole amines...  相似文献   
2.
The third-order nonlinear optical properties of newly synthesized soluble polyoxadiazoles containing 3,4-dialkoxythiophenes were investigated by using Z-scan and degenerate four-wave mixing (DFWM) techniques. The measurements were performed at 532 nm with 7 ns pulses from a Nd:YAG laser. We found a good agreement between the values of χ(3) determined from both the experiments. Z-scan results indicate a negative nonlinear refractive index, n2, whose magnitude is of the order of 10−10 esu for all the copolymers. The variation of nonlinear response among the copolymers clearly indicates the dependence of χ(3) on donor and acceptor type of units present in these copolymers. The copolymers exhibit strong reverse saturable absorption and good optical limiting properties at 532 nm.  相似文献   
3.
Let Y1,…, Yn be independent identically distributed random variables with distribution function F(x, θ), θ = (θ′1, θ′2), where θi (i = 1, 2) is a vector of pi components, p = p1 + p2 and for θI, an open interval in p, F(x, θ) is continuous. In the present paper the author shows that the asymptotic distribution of modified Cramér-Smirnov statistic under Hn: θ1 = θ10 + n−1/2γ, θ2 unspecified, where γ is a given vector independent of n, is the distribution of a sum of weighted noncentral χ12 variables whose weights are eigenvalues of a covariance function of a Gaussian process and noncentrality parameters are Fourier coefficients of the mean function of the Gaussian process. Further, the author exploits the special form of the covariance function by using perturbation theory to obtain the noncentrality parameters and the weights. The technique is applicable to other goodness-of-fit statistics such as U2 [G. S. Watson, Biometrika 48 (1961), 109–114].  相似文献   
4.
Russian Journal of Organic Chemistry - tert-Butyl 4-[(E)-but-1-en-3-yn-1-yl]-3-{[tert-butyl(dimethyl)silyl]oxy}-1H-indole-1-carboxylate has been synthesized with a good yield and selectivity...  相似文献   
5.
Inelastic neutron scattering and low-temperature specific heat measurements are reported for a polycrystalline sample of Zr2Fe. Lattice dynamical calculation of the phonon spectrum, along with first-principles LMTO electronic structure calculations have been used for deriving the specific heat parameters, the electron–phonon coupling constant and the superconducting transition temperature. The results are in fair agreement with the experimental data.  相似文献   
6.
Location aware computing is popularized and location information use has important due to huge application of mobile computing devices and local area wireless networks. In this paper, we have proposed a method based on Semi-supervised Locally Linear Embedding for indoor wireless networks. Previous methods for location estimation in indoor wireless networks require a large amount of labeled data for learning the radio map. However, labeled instances are often difficult, expensive, or time consuming to obtain, as they require great efforts, meanwhile unlabeled data may be relatively easy to collect. So, the use of semi-supervised learning is more feasible. In the experiment 101 access points (APs) have been deployed so, the RSS vector received by the mobile station has large dimensions (i.e. 101). At first, we use Locally Linear Embedding to reduce the dimensions of data, and then we use semi-supervised learning algorithm to learn the radio map. The algorithm performs nonlinear mapping between the received signal strengths from nearby access points and the user??s location. It is shown that the proposed scheme has the advantage of robustness and scalability, and is easy in training and implementation. In addition, the scheme exhibits superior performance in the nonline-of-sight (NLOS) situation. Experimental results are presented to demonstrate the feasibility of the proposed SSLLE algorithm.  相似文献   
7.
Cloud computing technology provides flexibility to Cloud Service Provider (CSP) for providing the cloud resources based on the users' requirements. In on‐demand pricing model, the attackers exploit this feature and cause unwanted scaling‐up of the cloud resources without any intent to pay for them. The associated cost for the unpaid malicious usage burdens the CSP, and over a long period, economic losses occur at the CSP end. Thus, the resources and services offered by the CSP become unsustainable, and the attack is termed as Economic Denial‐of‐Sustainability (EDoS) attack. The existing defense approaches for EDoS attacks are reactive. Thus, the associated attack detection/mitigation cost is high; consequently, the approaches are not suitable for the Small and Medium Enterprises (SMEs). The aim of this paper is to detect and mitigate, internal and external, stealthy EDoS attacks proactively. The attack is detected using average CPU utilization threshold and utility function (in terms of cost for the utilized cloud computing resources) and mitigated using virtual firewalls. Amazon Elastic Compute Cloud (Amazon EC2) is used to evaluate the performance of the proposed approach. The proposed approach accurately detects the EDoS attack and mitigates its effect as well with reduced cost. It is observed that the approach provides competitive response time, victim service downtime, and attack reporting time. Thus, the overall performance is improved.  相似文献   
8.

Distributed Denial-of-Service (DDoS) attack has been a serious threat to the availability feature of cloud computing. As traditional DDoS attacks are implemented using a huge volume of malicious traffic, the detection of such attacks becomes a naive task. To evade this detection, attackers are moving towards the Low-Rate DDoS (LRDDoS) attacks. The stealthy behavior of LRDDoS attack makes it difficult to get detected due to its low volume traffic. The existing frequency-domain approaches for LRDDoS detection are not feasible in terms of computational and storage requirements. This paper aims to propose a lightweight, accurate, and adaptive approach for the detection of LRDDoS attacks in frequency-domain. In this paper, the LRDDoS attack is detected by analyzing the power spectral distribution. The novelty of the proposed approach is to calculate the power spectral density using Fast Hartley Transform (FHT). The FHT processes real-valued input data, and has low computational and storage complexities. The approach is implemented on OpenStack cloud platform, and the aggregate network traffic (external and internal) is captured and analyzed. Experimental results show that the computational and storage complexities involved in FHT are lower than other transformation algorithms’ complexities. Thus, the approach provides faster response with an average detection time of 60.16 s. The average true negative and true positive rates obtained by the proposed approach are 99.83% and 99.46% respectively, which are competitive.

  相似文献   
9.
Wireless Networks - Solutions for energy hole problem in wireless sensor networks (WSNs) have been excessively explored using mobile sink (MS). Although, MS provides a considerable amount of energy...  相似文献   
10.
Wireless Personal Communications - Recently, the Internet of Things (IoT) had emerged very rapidly and became the most important technology in today’s era. In an IoT-based environment, every...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号