A new anion exchangeable layered compound with a composition of Ni1-xZn2x(OH)2(OCOCH3)2x·nH2O (0.15 < x < 0.25) was prepared by hydrothermal hydrolysis of Ni-Zn mixed acetate solutions. The structure is rel...
A new anion exchangeable layered compound with a composition of Ni1-xZn2x(OH)2(OCOCH3)2x·nH2O (0.15 < x < 0.25) was prepared by hydrothermal hydrolysis of Ni-Zn mixed acetate solutions. The structure is related to zinc basic salts such as Zn5(OH)8Cl2·nH2O and Zn5(OH)8Cl2·nH2O; nickel ions form brucite-type hydroxide layers with vacanciesNi1-x(OH)2, and zinc ions occupy the tetrahedral sites above and below the vacant sites outside the hydroxide layers. Acetate ions are weakly bound to the Zn2+ ions, completing the tetrahedra, and easily exchanged with most of inorganic as well as organic anions. The reactions are reversible. Exchange with [Si8O20]8- ions resulted in the formation of two-dimensional silicate layers analogous to those of 2:1 type clay minerals.
Based on common programming language the establishment of three-dimensional human bone motion and control platform can be achieved to simulate the motion relationship between bones. There are two motion controlling mo...
详细信息
Based on common programming language the establishment of three-dimensional human bone motion and control platform can be achieved to simulate the motion relationship between bones. There are two motion controlling modes based on the algorithm AABB. One is the interaction of human to computer and another is the interaction virtual environments to physical. The solution model is proposed to establish the relationship between reference point in motion video image to motion attitude. The application programming of simulation movement, based on three-dimensional graphics standard OpenGL 3D interface, can display motion relationship between the bone joints to the body and bone. It realizes many actions, such as body fat, bone nodding, shaking his head, raising his hand, leg lift, rotate, zoom, walking, etc.. It can be used for robot, medical education, telemedicine, and other fields of human motion research.
Frames are mathematical tools which can represent redundancies in many application problems. In the studies of frames, the frame bounds and frame bound ratio are very important indices characterizing the robustness an...
详细信息
ISBN:
(纸本)9789898425744
Frames are mathematical tools which can represent redundancies in many application problems. In the studies of frames, the frame bounds and frame bound ratio are very important indices characterizing the robustness and numerical performance of frame systems. In this paper, the frame bounds of a class of frame, which can be modeled by the bi-directional impulse response of linear time systems, are analyzed and computed. By using the state space approach, the tightest lower and upper frame bounds can be directly and efficiently computed.
Effective exploitation of the application-specific parallel patterns and computation operations through their direct implementation in hardware is the base for construction of high-quality application-specific (re-) c...
详细信息
Analyzed Bayesian classifier with string, n -gram and API as features, we found that it is very difficult to improve Bayesian classifier detection accuracy because selected features are not completely independent. In ...
详细信息
Analyzed Bayesian classifier with string, n -gram and API as features, we found that it is very difficult to improve Bayesian classifier detection accuracy because selected features are not completely independent. In order to solve this problem, we propose a new improved choose features method which are most representative properties, and show that our method achieve high detection rates, even on completely new, previously unseen malicious executables.
The first step towards a heart attack is a condition called Ventricular Arrhythmia. This paper proposes a system that uses the advanced digital signal processing techniques to analyse electrocardiogram (ECG) signals a...
详细信息
This paper studies a vital issue in wireless communications, which is the transmission of images over Wireless Personal Area Networks (WPANs) through the Bluetooth network. It presents a simple method to improve the e...
详细信息
This paper studies a vital issue in wireless communications, which is the transmission of images over Wireless Personal Area Networks (WPANs) through the Bluetooth network. It presents a simple method to improve the efficiency of error control code of old Bluetooth versions over mobile WPANs through Interleaved Error Control Code (IECC) technique. The encoded packets are interleaved by simple block interleaver. Also, the paper presents a chaotic interleaving scheme as a tool against bursts of errors which depends on the chaotic Baker map. Also, the paper proposes using the chaotic interleaver instead of traditional block interleaver with Forward Error Control (FEC) scheme. A comparison study between the proposed and standard techniques for image transmission over a correlated fading channel is presented. Simulation results reveal the superiority of the proposed chaotic interleaving scheme to other schemes. Also, the superiority of FEC with proposed chaotic interleaver to the conventional interleavers with enhancing the security level with chaotic interleaving packetby- packet basis.
Since the sensors collect personal medical data, security and privacy are important factors in wireless sensor networks. Due to small memory capacity, constrained power supply, limited computational capability and com...
详细信息
Since the sensors collect personal medical data, security and privacy are important factors in wireless sensor networks. Due to small memory capacity, constrained power supply, limited computational capability and communications bandwidth of WSNs, applying key management in wireless sensor networks is hard to achieve. Energy is a central concern in the deployment of cryptographic techniques in WSNs. This paper has identified the most suitable key management technique among the popular techniques available to secure data in consideration of the application requirements and the WSN constraints. To achieve this objective, some common key management techniques are implemented, simulated and compared based on their energy cost and then best techniques for healthcare application will be suggested. Simulation results show that hybrid technique consumes the lowest amount of energy among the others for secure patient monitoring in wireless sensor network environment.
We model a nonsaturated IEEE 802.11e EDCA network for a small buffer size. Our model is much simpler and more accurate than others that have appeared in the literature. The model is simple because 1) we invoke the Kum...
详细信息
We model a nonsaturated IEEE 802.11e EDCA network for a small buffer size. Our model is much simpler and more accurate than others that have appeared in the literature. The model is simple because 1) we invoke the Kumar renewal-reward approach for the saturated collision probability rather than the Bianchi Markov-chain approach, as in previous work, and 2) we approximate the nonsaturated attempt rate by scaling the attempt rate of the saturated setting with the probability of a packet arrival. We verify the accuracy of our model using ns-2 simulation and show that the collision probability obtained in our model is the most accurate amongst related work. The collision probability governs all other performance metrics, such as throughputs and delay characteristics; we show that since prior works do not model the nonsaturated collision probabilities accurately, they fail to correctly capture the delay characteristics. Also, our results indicate that if we accurately model the nonsaturated collision probability, the same formulas used for the saturated performance descriptors can produce accurate results for nonsaturated operation, and therefore is unnecessary to construct specific formulas for nonsaturated performance descriptors, as done in previous work.
暂无评论