首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   3篇
  国内免费   1篇
综合类   1篇
物理学   1篇
无线电   5篇
  2023年   2篇
  2012年   2篇
  2011年   1篇
  2005年   1篇
  2002年   1篇
排序方式: 共有7条查询结果,搜索用时 15 毫秒
1
1.
我院自 1996~ 2 0 0 1年采用鼻内窥镜治疗鼻中隔偏曲及鼻中隔偏曲合并慢性鼻窦炎 ,鼻息肉 ,效果满意 ,现报告如下 :1 资料  本组病例 132例 ,男 87例 ,女 4 5例 ,年龄 18~71岁 ,其中单纯鼻中隔偏曲 5 6例 ,合并慢性鼻窦炎5 2例 ,鼻息肉 2 4例 .2 方法  从鼻腔局部麻醉至手术结束 ,均在 0度鼻内窥镜显像系统下进行 ,手术步骤基本同常规手术 ,对合并有鼻窦炎 ,鼻息肉则同期在鼻内窥镜下一次性进行鼻、鼻窦功能性手术 .3 结果  术后结合鼻腔冲洗 ,定期复查等常规处理 ,随访6~ 12个月 ,鼻中隔居中 ,未见穿孔 ,鼻腔、鼻窦通气引流均…  相似文献   
2.
李剑  宋丹劼  郭晓静  谢丰  彭勇 《中国通信》2011,8(7):122-127
In order to solve the various privacy and security problems in RFID system, a new low-cost RFID mutual authentication protocol based on ID updating mechanics is proposed. In the proposed scheme, the backend server keeps both the current ID and potential next ID for each tag, thus to solve the possible problem of de-synchronization attack in the most ID updating-based schemes. In the security analysis section, comparing several protocols in property required and attacker resistances, the comparison results s...  相似文献   
3.
研制了一套高温超导直流电缆低温制冷系统,冷源采用斯特林制冷机与抽空减压泵,二者与冷箱并联耦合可以实现独立维护与检修,配备两套泵箱并联运行,可以实现在线快速切换和维护,设置补液容器向冷箱补液,减小冷箱补液时的温度波动。制冷系统实现了过冷液氮循环,可输出净冷量大于3 500 W@70 K。  相似文献   
4.
王根  袁松  叶松  谢丰  陈娇 《红外》2023,44(7):39-45
风场对于天气形势的演变和预报至关重要。基于风云四号A星干涉式大气垂直探测仪(GIIRS)中波通道资料和ERA5风场资料,采用LightGBM进行大气三维风场反演研究。首先,构建模型特征变量。GIIRS通道最优选择采用二步特征选择法:(1)建立GIIRS通道黑名单;(2)采用置换特征重要性(Permutation Feature Importance, PFI)方法选择特征变量,在形成通道最优子集的基础上,构建含有时空信息的特征变量。其次,构建基于LightGBM的三维风场反演方法。最后,基于台风“利奇马”期间的GIIRS加密资料开展了LightGBM超参数优化和相关反演试验。结果表明,相对于ERA5风场资料,测试集中风场U和V分量的均方根误差(Root Mean Square Error, RMSE)分别小于1 m/s和1.5 m/s。本文中的二步特征选择法能够实现GIIRS通道的动态最优选择。  相似文献   
5.
针对网络安全技术的发展现状,阐述了对网络进行安全评估的重要意义,重点讨论了实现网络安全评估系列关键技术及其原理.在此基础上,给出了基于插件技术的网络安全评估模型及其工作原理.最后,对系统的运行结果进行了测试.  相似文献   
6.
李剑  郭晓静  宋丹劼  谢丰  彭勇 《中国通信》2012,9(1):111-116
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdroppers . In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50% ; while the presented protocol is 58% . At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.  相似文献   
7.
高洋  彭勇  谢丰  戴忠华  徐国爱 《中国通信》2012,9(12):137-143
A software network model with multiple links is constructed on the basis of a dynamical model of a general complex network with multiple links. The principle of network division of multiple links is introduced. Following these principles, the software network model is decomposed into three types of subnets and different relationships between classes are revealed. Then, the dynamic analysis of software networks is presented. A sufficient condi-tion for the stability of general complex networks is obtained followed by that of software networks. Fi-nally, the dynamics of an open-source software sys-tem is analyzed, and their simulations are provided to demonstrate the effectiveness of the presented model.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号