Hydrolysis technology that releases hydrogen from chemical hydrogen storage materials is a method to produce hydrogen. Hydrogen storage has excellent development potential and is also one of the sources of large amoun...
详细信息
The cutting fluid plays a significant role by cooling the surface of tool, substrate and removing chips from the cutting area during metal machining operations (turning, milling, grinding etc.). However, by adopting t...
详细信息
A Nickel (Ni) microcantilever beam array with tin (Sn) solder bumps has been designed for flip-chip bonding with high-density electrodes. Micro-electro-mechanical system (MEMS) technology and the micro-electroplating ...
详细信息
PEMF therapy, a non-invasive technology, is frequently reported in medical journals. It can send electric and magnetic fields to the body through induction coils [1,2], so as to provoke cells to stimulate nerves and m...
详细信息
This study designed a planar carbon fiber composite collector plate with excellent conductivity and mechanical strength for use in the proton exchange membrane fuel cell (PEMFC). The collector plate is made of phenoli...
详细信息
I report on numerical experiments in which a detector reliably found chaotic signals at signal to noise ratios as low as - 15 dB. The detector was based on a variant of the hidden Markov models used in speech research...
I report on numerical experiments in which a detector reliably found chaotic signals at signal to noise ratios as low as - 15 dB. The detector was based on a variant of the hidden Markov models used in speech research. The task was particularly difficult because the Fourier power spectrum of the noise was constructed to match the spectrum of the signal. I review likelihood ratio detectors, limitations on the performance of linear models implied by the broad Fourier power spectra of chaotic signals, and the upper limit that the Kolmogorov-Sinai (KS) entropy of a chaotic system places on the expected log likelihood attainable by any model. I find that KS entropy estimates indicate that even better detection performance is possible.
In NFC applications, user privacy information must be protected first. Cao and Liu recently proposed a lightweight NFC authentication scheme based on an improved hash function to ensure that the user's private inf...
详细信息
This paper proposes a fitness movement evaluation system using deep learning. The system uses a deep convolutional neural network (CNN) to extract features from pictures of fitness movements. The features are then use...
详细信息
Mitigation and adaptation have become two main strategies that governments around the world are focusing on in response to the threat of global climate change. In August 2009, Typhoon Morakot heavily damaged the centr...
详细信息
Mitigation and adaptation have become two main strategies that governments around the world are focusing on in response to the threat of global climate change. In August 2009, Typhoon Morakot heavily damaged the central and southern parts of Taiwan, causing irreversible damage to the environment, especially in the mountain areas. In this study, the goal is to attain sustainable reservoir management, thus comprehensive storm water management is used to develop mitigation strategies. Overlay-map methods of GIS, along with vulnerability analysis and land use sustainability analysis, are used to map out optimal land use patterns containing development potentials, growth limits, and suitability concerns that aim to reduce the impact of human development on the ecological environment. Finally, the mitigation strategies proposed by this study for the land use of Zengwen Reservoir and its catchment will be implement shortly.
VANET (Vehicular Ad Hoc Network) was developed to address the unique challenges of communication in a mobile vehicular environment. This technology can enhance driving safety and traffic control. Moreover, similar pri...
详细信息
暂无评论