In this experiment, ammonium metavanadate(NHVO) and zinc nitrate Zn(NO) as raw materials, combustion ZnVO yellow phosphor prepared by using X-ray diffraction pattern(XRD), scanning electron microscopy(SEM) and emissio...
详细信息
In this experiment, ammonium metavanadate(NHVO) and zinc nitrate Zn(NO) as raw materials, combustion ZnVO yellow phosphor prepared by using X-ray diffraction pattern(XRD), scanning electron microscopy(SEM) and emission spectrum Study on the crystal structure of the test ZnVO phosphor morphology analysis and optical properties, in order to obtain vanadate matrix fluorescent material having excellent thermal stability and chemical stability, can be widely used in lighting and displays.
With the rapid development of cloud services in multi-cloud environment, it is convenient to generate multi-replica for user's data stored in multi-cloud servers. On the one hand, multi-replica is able to improve ...
详细信息
The Zn3V2O8 and (Zn1-xEux)3V2O8 have been production by Solid phase method. The crystal structure, the crystal morphology and the luminescence property of Zn3V2O8 and (Zn1-xEux)3V2O8 have been studied. Based on the fi...
The Zn3V2O8 and (Zn1-xEux)3V2O8 have been production by Solid phase method. The crystal structure, the crystal morphology and the luminescence property of Zn3V2O8 and (Zn1-xEux)3V2O8 have been studied. Based on the first-principles planar wave super-soft pseudopotential method of density functional theory (DFT), the α-Zn3V2O8 crystal model was used to calculate the electronic structure and optical properties of the model. The results show that the crystal structure of Zn3V2O8 and (Zn1-xEux)3V2O8 were the same, and the particle uniformity of (Zn1-xEux)3V2O8 was better than Zn3V2O8. The emission band Zn3V2O8 and (Zn1-xEux)3V2O8 were present at the wave length of 420-690 nm and 300-400nm, the luminescence property of (Zn1-xEux)3V2O8 was enhance by Eu-doped. α-Zn3V2O8 is an indirect band gap, α-Zn3V2O has a band gap of 2.715eV, pure α-Zn3V2O8 has a peak, appeared at 3.91eV that is caused by the optical transition between V 3d and O 2p states.
In this paper, Zn3V2O8 phosphors were synthesized by high temperature solid method. The effect of flux on the luminescent properties was studied. And based on the first-principles planar wave super-soft pseudo potenti...
In this paper, Zn3V2O8 phosphors were synthesized by high temperature solid method. The effect of flux on the luminescent properties was studied. And based on the first-principles planar wave super-soft pseudo potential method of density functional theory (DFT), the α- Zn3V2O8 crystal model was used to calculate the electronic structure and optical properties of the model. The results show that the crystal morphology of the sample is improved, the grain agglomeration is reduced and the crystal structure isn't changed. The excitation spectrum ranges from 300-400nm, the excitation peak is at 360nm, and the emission spectrum is in the range of 420-690 nm, the peak at 550 nm. α- Zn3V2O8 is an indirect band gap, α- Zn3V2O8 has a band gap of 2.715eV, α- Zn3V2O8 has a strong UV-near ultraviolet light absorption capacity.
A general wireless sensor network (WSN) is a system composed of a large number of sensor nodes. In the WSN system, all sensor nodes are responsible for sensing the interested events and transmitting the related inform...
详细信息
Developers often have to trace links among software artifacts during software maintenance and evolution tasks. This activity, which is referred to as traceability recovery in software engineering, is human-intensive a...
详细信息
Rapid development of cloud storage services produces a tremendous amount of user data outsourcing to cloud servers. Therefore, it is easy to generate data multi-replica, which is able to improve data availability and ...
详细信息
ISBN:
(纸本)9781509009886
Rapid development of cloud storage services produces a tremendous amount of user data outsourcing to cloud servers. Therefore, it is easy to generate data multi-replica, which is able to improve data availability and users' experience. However, when the management of data is poor, the sensitive information will be disclosed more easily. This may bring serious security and privacy challenges for both user's data and its multi-replica in cloud environment. In order to tackle the above issues, in this paper, we propose a multi-replica associated deleting scheme (MADS) in cloud environment. We first introduce a replica associated model to organize all of data replicas among different cloud servers. Furthermore, we propose the MADS scheme which is consists of data storage algorithm, replica generation algorithm, replica deletion and feedback algorithm. Finally, we employ Amazon S3 to implement MADS and the results indicate that the proposed scheme is available and effective.
In this paper, we propose a novel model for unsupervised segmentation of viewer's attention object from natural images based on localizing region-based active con-tour (LRAC). Firstly, we proposed the saliency det...
详细信息
In cloud computing environment, especially in bigdata era, adversary may use data deduplication service supported by the cloud service provider as a side channel to eavesdrop users' privacy or sensitive informati...
详细信息
ISBN:
(纸本)9781509053827
In cloud computing environment, especially in bigdata era, adversary may use data deduplication service supported by the cloud service provider as a side channel to eavesdrop users' privacy or sensitive information. In order to tackle this serious issue, in this paper, we propose a secure data deduplication scheme based on differential privacy. The highlights of the proposed scheme lie in constructing a hybrid cloud framework, using convergent encryption algorithm to encrypt original files, and introducing differential privacy mechanism to resist against the side channel attack. Performance evaluation shows that our scheme is able to effectively save network bandwidth and disk storage space during the processes of data deduplication. Meanwhile, security analysis indicates that our scheme can resist against the side channel attack and related files attack, and prevent the disclosure of privacy information.
In this paper, a new method of non contact and on-line measurement is presented for the change of the axis of the rotation axis. Under the condition of a constant light source, the image of the original position and t...
详细信息
暂无评论