首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   34篇
  免费   4篇
  国内免费   1篇
化学   16篇
数学   1篇
物理学   5篇
无线电   17篇
  2022年   2篇
  2021年   4篇
  2020年   3篇
  2017年   1篇
  2015年   1篇
  2014年   3篇
  2013年   6篇
  2012年   4篇
  2011年   3篇
  2010年   1篇
  2009年   3篇
  2008年   3篇
  2007年   1篇
  2006年   2篇
  2005年   1篇
  2003年   1篇
排序方式: 共有39条查询结果,搜索用时 15 毫秒
1.
Electron ionization (EI) mass spectra of 46 compounds from several different compound classes were measured. Their molecular ion abundances were compared as obtained with 70‐eV EI, with low eV EI (such as 14 eV), and with EI mass spectra of vibrationally cold molecules in supersonic molecular beams (Cold EI). We further compared these mass spectra in their National Institute of Standards and Technology (NIST) library identification probabilities. We found that
  1. Low eV EI is not a soft ionization method, and it has little or no influence on the molecular ion relative abundances for large molecules and those with weak or no molecular ions.
  2. Low eV EI for compounds with abundant or dominant molecular ions in their 70 eV mass spectra results in the reduction of low mass fragment ions abundances thereby reducing their NIST library identification probabilities thus rarely justifies its use in real‐world applications.
  3. Cold EI significantly enhances the relative abundance of the molecular ions particularly for large compounds; yet, it retains the low mass fragment ions; hence, Cold EI mass spectra can be effectively identified by the NIST library.
  4. Different standard EI ion sources provide different 70 eV EI mass spectra. Among the Agilent technologies ion sources, the “Extractor” exhibits relatively abundant molecular ions compared with the “Inert” ion source, while the “High efficiency source” (HES) provides mass spectra with depleted molecular ions compared with the “Inert” ion source or NIST library mass spectra.
These conclusions are demonstrated and supported by experimental data in nine figures and two tables.  相似文献   
2.
This work presents an analysis of the existing dependencies between the tests of the FIPS 140-2 battery. Two main analytical approaches are utilized, the first being a study of correlations through the Pearson’s correlation coefficient that detects linear dependencies, and the second one being a novel application of the mutual information measure that allows detecting possible non-linear relationships. In order to carry out this study, the FIPS 140-2 battery is reimplemented to allow the user to obtain p-values and statistics that are essential for more rigorous end-user analysis of random number generators (RNG).  相似文献   
3.
A tandem mass spectral database system consists of a library of reference spectra and a search program. State‐of‐the‐art search programs show a high tolerance for variability in compound‐specific fragmentation patterns produced by collision‐induced decomposition and enable sensitive and specific ‘identity search’. In this communication, performance characteristics of two search algorithms combined with the ‘Wiley Registry of Tandem Mass Spectral Data, MSforID’ (Wiley Registry MSMS, John Wiley and Sons, Hoboken, NJ, USA) were evaluated. The search algorithms tested were the MSMS search algorithm implemented in the NIST MS Search program 2.0g (NIST, Gaithersburg, MD, USA) and the MSforID algorithm (John Wiley and Sons, Hoboken, NJ, USA). Sample spectra were acquired on different instruments and, thus, covered a broad range of possible experimental conditions or were generated in silico. For each algorithm, more than 30 000 matches were performed. Statistical evaluation of the library search results revealed that principally both search algorithms can be combined with the Wiley Registry MSMS to create a reliable identification tool. It appears, however, that a higher degree of spectral similarity is necessary to obtain a correct match with the NIST MS Search program. This characteristic of the NIST MS Search program has a positive effect on specificity as it helps to avoid false positive matches (type I errors), but reduces sensitivity. Thus, particularly with sample spectra acquired on instruments differing in their setup from tandem‐in‐space type fragmentation, a comparably higher number of false negative matches (type II errors) were observed by searching the Wiley Registry MSMS. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
4.
贾宁  蒋水秀 《红外》2012,33(6):42-45
介绍了一种光谱可调光源。该光源可以用来实现各种各样的光谱功率分布。一个光谱可调光源系统的具体设计包括成千上万个高功率LED,其波段可覆盖整个可见光光谱。光谱可调光源具有极大的现实意义,它除了可以对光学遥感器进行定标之外,还可以用于光度计和辐射度计的检测校准。通过模拟不同的光照条件,可以对材料特性及物体反射率进行评估。另外,该光源也可用于展示。  相似文献   
5.

正交频分复用(OFDM)已被广泛应用于无线通信系统,其数据传输安全具有一定的实际意义。该文提出了一种双重加密方案,采用神经网络生成置乱矩阵实现第1次加密,通过基于Logistic映射与Sine映射的复合离散混沌系统产生的混沌序列进行第2次加密。该双重加密方案极大提升了OFDM通信系统的保密性,可以有效地防止暴力攻击。相比于单一的1维Logistic映射的混沌系统,基于Logistic映射与Sine映射的复合离散混沌系统具有更大的密钥空间。该文运用Lyapunov指数与NIST测试验证了该混沌系统的混沌特性及随机性,并仿真验证了双重加密方案的保密性能。仿真结果表明,该文所提出的加密方案密钥空间为4×1093,Lyapunov指数提高到0.9850,NIST测试中最大P值为0.9995。该双重加密方案可在不影响传输性能下极大提升OFDM通信系统的安全性。

  相似文献   
6.
An emitter-coupled pair chaotic generator is proposed with a control parameter that can be tuned for distinct chaotic behaviors. The proposed circuit is a compact, high-speed implementation of the chaotic map based on the hyperbolic tangent function. It is demonstrated that the circuit and map parameters are analytically related. As an application, we design a random number generator that passes all NIST statistical tests by applying a post-processing to the balanced bit sequence generated by a quantization of the circuit output.  相似文献   
7.
This paper introduces fully digital implementations of four different systems in the 3rd order jerk-equation based chaotic family using the Euler approximation. The digitization approach enables controllable chaotic systems that reliably provide sinusoidal or chaotic output based on a selection input. New systems are introduced, derived using logical and arithmetic operations between two system implementations of different bus widths, with up to 100× higher maximum Lyapunov exponent than the original jerk-equation based chaotic systems. The resulting chaotic output is shown to pass the NIST SP. 800-22 statistical test suite for pseudo-random number generators without post-processing by only eliminating the statistically defective bits. The systems are designed in Verilog HDL and experimentally verified on a Xilinx Virtex 4 FPGA for a maximum throughput of 15.59 Gbits/s for the native chaotic output and 8.77 Gbits/s for the resulting pseudo-random number generators.  相似文献   
8.
A laser ablation particle beam pulsed glow discharge mass spectrometer (LA-PB-GD-TOFMS) was designed and used for fundamental studies. The instrument consists of a three stage aerodynamic lens system, a hollow cathode pulsed glow discharge and a time-of-flight mass spectrometer. The particle beam interface was constructed to provide an efficient particle transfer into the hollow cathode. Calculations showed that particles between 1 and 3000 nm in diameter are able to pass through this interface.  相似文献   
9.
Chenguang Ma 《中国物理 B》2021,30(12):120504-120504
A new five-dimensional fractional-order laser chaotic system (FOLCS) is constructed by incorporating complex variables and fractional calculus into a Lorentz-Haken-type laser system. Dynamical behavior of the system, circuit realization and application in pseudorandom number generators are studied. Many types of multi-stable states are discovered in the system. Interestingly, there are two types of state transition phenomena in the system, one is the chaotic state degenerates to a periodical state, and the other is the intermittent chaotic oscillation. In addition, the complexity of the system when two parameters change simultaneously is measured by the spectral entropy algorithm. Moreover, a digital circuit is design and the chaotic oscillation behaviors of the system are verified on this circuit. Finally, a pseudo-random sequence generator is designed using the FOLCS, and the statistical characteristics of the generated pseudo-random sequence are tested with the NIST-800-22. This study enriches the research on the dynamics and applications of FOLCS.  相似文献   
10.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号