In response to the increasingly complex and diverse network security threats, a network security monitoring system is introduced that combines intelligent algorithms and Python software to achieve efficient and accura...
详细信息
This article explores the application of computer vision technology in user interface design, particularly through gesture recognition to enhance human–computer interaction. Gestures offer natural and versatile advan...
详细信息
Graphene encapsulation has been shown to be an effective technique for improving the corrosion resistance of non-noble metal catalysts for the acidic water *** key challenge lies in enhancing the electrocatalytic acti...
详细信息
Graphene encapsulation has been shown to be an effective technique for improving the corrosion resistance of non-noble metal catalysts for the acidic water *** key challenge lies in enhancing the electrocatalytic activity of graphene-encapsulated metals while maintaining their durability in acidic ***,an electron-transfer-tuning strategy is investigated at the graphene/NiMo interface,aiming to improve the hydrogen evolution reaction(HER) performance of graphene-encapsulated NiMo *** doping of Ti,a low electronegativity element,into NiMo substrate was confirmed to increase electron transfer from the metal core toward the *** electron-rich state on graphene facilitates the adsorption of positively charged protons on graphene,thereby enabling a Pt/C-comparable performance in 0.5 M H2SO4,with only a 3.8% degradation in performance over a 120-h continuous *** proton exchange membrane(PEM) water electrolyzer assembled by the N-doped grapheneencapsulated Ti-doped NiMo exhibits a smaller cell voltage to achieve a current density of 2.0 A cm-2,in comparison to the Pt/C based *** study proposes a novel electron-transfer-tuning strategy to improve the HER activity of graphene-encapsulated non-noble metal catalysts without sacrificing durability in acidic electrolytes.
In this paper, the introduction of big data technology, from the hardware and software two aspects of communication security protection system design research. With the support of hardware equipment, the secure commun...
详细信息
In the realm of remote control, my preference is computer manipulation through hand gestures. Recent strides in technology showcase the feasibility of using manual gestures on Arduino platforms, facilitated by cloud c...
详细信息
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of t...
详细信息
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of the product based on the time truncated life test employing theWeibull *** control chart developed supports the examination of the mean lifespan variation for a particular product in the process of *** control limit levels are used:the warning control limit,inner control limit,and outer control ***,they enhance the capability for variation detection.A genetic algorithm can be used for optimization during the in-control process,whereby the optimal parameters can be established for the proposed control *** control chart performance is assessed using the average run length,while the influence of the model parameters upon the control chart solution is assessed via sensitivity analysis based on an orthogonal experimental design withmultiple linear regression.A comparative study was conducted based on the out-of-control average run length,in which the developed control chart offered greater sensitivity in the detection of process shifts while making use of smaller samples on average than is the case for existing control ***,to exhibit the utility of the developed control chart,this paper presents its application using simulated data with parameters drawn from the real set of data.
The study aims to improve student retention rate and maintain student engagement level by exploring the student motivation factors within a learning analytics context. This research is an exploratory case study within...
详细信息
In this paper, a 4.2–7.2 GHz(52.6%)beam-steering microstrip antenna was proposed. The proposed antenna consists of three tapered slots and *** three radiation directions of the antenna on the plane are independent of...
详细信息
In this paper, a 4.2–7.2 GHz(52.6%)beam-steering microstrip antenna was proposed. The proposed antenna consists of three tapered slots and *** three radiation directions of the antenna on the plane are independent of each other, and the three feeds correspond to the three radiation structures. Symmetry isolation trenches are introduced to improve isolation between different ports. Radiation pattern simulation and measurement show horizontal beam steering at the sampled frequencies of 4.2, 5, 6, and 7.2 GHz. The results shows that the overlapped beam of the three ports in the Eplane and H-plane can cover more than 200 degrees and 60degrees, respectively. Apart from the capability of beamsteering, high isolation(more than 28 d B) of the proposed antenna in the operating band is obtained.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut...
详细信息
暂无评论