WO3 nanowires (WO3-NWs) decorated with gold nanoparticles (AuNPs) were utilized in resistive gas sensor devices to detect ethanol by use of fluctuation enhanced sensing (FES). The experimental system records both DC r...
详细信息
WO3 nanowires (WO3-NWs) decorated with gold nanoparticles (AuNPs) were utilized in resistive gas sensor devices to detect ethanol by use of fluctuation enhanced sensing (FES). The experimental system records both DC resistance and fluctuations of the sensing film. Our data verify that the sensitivity and selectivity of the gas sensor are improved by applying FES when the sensor is stimulated with a combination of UV light and heating. We conclude that UV light can produce improved gas sensing at low operating temperatures for the investigated AuNP-decorated WO3-NWs films.
With the widespread use of integrated library management system in the libraries,on the one hand,the libraries have accumulated a large amount of raw *** the other hand,collection development,performance evaluation an...
详细信息
With the widespread use of integrated library management system in the libraries,on the one hand,the libraries have accumulated a large amount of raw *** the other hand,collection development,performance evaluation and management decision-making also encountered a shortage of support *** paper introduces a Federal Library's collection analysis system based on the data *** applies a series of technology such as privacy data publishing,data integration,data cubes and data visualization,through the introduction of Business Intelligence,and can service the decision-making activities of universities and society library's various *** successful implementation of the system can obtain significant economic benefits,and it also has broad application value.
In this short paper,we show the equivalence between weak context bisimulation and strong bisimulation for the linear *** as a corollary,we get a complete proof system of weak context bisimulation over the linear HOcore.
In this short paper,we show the equivalence between weak context bisimulation and strong bisimulation for the linear *** as a corollary,we get a complete proof system of weak context bisimulation over the linear HOcore.
This paper reveals the causes for the emergence of global service outsourcing,and itsdevelopment status as well as future *** analyzes the important role that service outsourcingindustry plays in China's economic ...
详细信息
This paper reveals the causes for the emergence of global service outsourcing,and itsdevelopment status as well as future *** analyzes the important role that service outsourcingindustry plays in China's economic transformation into a low carbon ***,itstudies the human resources issues encountered during the development of China's serviceoutsourcing industry;in addition,it sets forth the importance of service outsourcing talent trainingmechanism ***,the paper comes up with specific recommendations for speeding upservice outsourcing talent training to cater for the needs of China's service outsourcing industrydevelopment.
WOSA / XFS is a standard protocol based on the extensions for financial services of WOSA, which provides a seamless interface among the Windows operating system, Windows- based applications and the customer service. I...
详细信息
WOSA / XFS is a standard protocol based on the extensions for financial services of WOSA, which provides a seamless interface among the Windows operating system, Windows- based applications and the customer service. It is an advanced technology for solving all sorts of equipment reliability, platform-independent accessing interface and security management, and it has been put into use in the current financial equipment in China. This paper first introduces the foundation and development of WOSA / XFS, and then elaborates WOSA / XFS Synchronous mechanism and Asynchronous mechanism, and then discuss the selected call model of financial facilities based on compositions of different parts. Finally, it chooses the proper call model used in ABIO.
Putting forward a network intrusion detection system model based on data mining and improving the FP-Growth algorithm based on associative *** experimental results show that the system developed by this paper can work...
详细信息
Putting forward a network intrusion detection system model based on data mining and improving the FP-Growth algorithm based on associative *** experimental results show that the system developed by this paper can work stably,find out intrusion activities accurately in time,improve the speed of data mining effectively,enhance the detective ability of intrusion detection,and provide a solid safeguard to the network security.
For the routers of network on chip(No C),arbitrator plays an important role in the performance of packets switching between each *** round robin algorithm is extensively used as its ***,the RR scheme seems difficult t...
详细信息
For the routers of network on chip(No C),arbitrator plays an important role in the performance of packets switching between each *** round robin algorithm is extensively used as its ***,the RR scheme seems difficult to guarantee Qo S and satisfy the delay sensitive *** this reason,a priority based parallel round robin(PP-RR) algorithm is proposed,which is aim to provide differentiated service according to the communication traffic ***,a mathematic analytic model is utilized for the performance evaluation of PP-RR *** closed form expression of mean waiting time is achieved.
The web service security standards of OASIS can not support trust evaluation and authorization decision-making based on *** this paper,in order to resolve access control and authorization in virtual temporary team of ...
详细信息
The web service security standards of OASIS can not support trust evaluation and authorization decision-making based on *** this paper,in order to resolve access control and authorization in virtual temporary team of web service,a swift-trust-based access control for web service(WS-STBAC) is designed based on ***-STBAC is a kind of middleware like authentication center,and composed of three parts:policy management,trust value computing,and decision-making of *** datum about trust computing from providers,WS-STBAC computes trust value of *** based on policy,WS-STBAC decides whether to give requestors permission,instead of providers.
Gobang is very popular around the world, and human-computer game Gobang is a issue of Artificial Intelligence research. In this paper, intelligent Gobang algorithms are analyzed to construct the valuation function, ga...
详细信息
Gobang is very popular around the world, and human-computer game Gobang is a issue of Artificial Intelligence research. In this paper, intelligent Gobang algorithms are analyzed to construct the valuation function, game tree, and α-β pruning algorithm is used to improve game-tree search efficiency, enhancing the level of computer intelligence. Finally, an intelligent Gobang system was designed and realized in Visual C ++ according to intelligent algorithms.
In this paper,the states of components and systems are considered as uncertain *** the uncertain coherent system is defined and its structural properties are ***,the dual of uncertain coherent system is introduced and...
详细信息
In this paper,the states of components and systems are considered as uncertain *** the uncertain coherent system is defined and its structural properties are ***,the dual of uncertain coherent system is introduced and some useful theorems are ***,the reliability of uncertain coherent system is arrived and some examples are given.
暂无评论