首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
Cathodoluminescence (CL) image analysis of zircon is a key step of mineral micro?area compositional investigation and U-(Th)-Pb dating. We introduce a system consisting of field emission ESEM and high performance cathodoluminescence. This system has obvious advantages in imaging resolution and CL spectrum. We acquired some zircon CL images and spectra to demonstrate the ability of this system. Our results show that this system has a great potential application to characterize and identify the genesis of zircon.  相似文献   

2.
For finite-dimensional quantum systems,we propose a quantum control scheme based on a multi-step unitary evolution and quantum projective measurements.The objective is to design a control law to steer the system to a target eigenstate of the measurement operator in the least number of steps.Within each control step,unitary evolution and quantum projective measurement are performed in turn until the system reaches the target state.The control process can be modeled as a finite-state Markov chain with an absorbing state.We prove that the controlled system will converge to the target eigenstate with probability one after a finite number of control steps and find a minimal-step-number condition that would steer the system to the target eigenstate in the least number of steps.  相似文献   

3.
It is simple with good quality,and versatile with low costto use a step motor drive for the let-off mechanism ofweaving machines.This paper deals with the investiga-tion of this mechanism about the warp tension detectingand the design of the step motor drive system,which ispracticable,reliable and with low power consumption.So it is worthwhile to spread and push forward its appli-cation.  相似文献   

4.
We recently described a new combinatorial strategy for modular catalyst development, one using self-as-embly in the ligand scaffold-generating step to produce libraries of chiral self-assembled ligands. Metal-directed self-assembly of bifunetional subunits around a structural metal (typically zinc) can be used to form a heteroleptic complex in which a second set of ligating groups are suitably disposed to form a heterobimetallie cata- lyst system. See Fig. 1  相似文献   

5.
This paper puts forward a new variable step size LMS adaptive algorithm based on variable region. The step size p(k) in the algorithm varies with the variation of the region of deviation e (k) to ensure the optimization of the three performance objectives including initial convergent speed, trace ability of the time-varying system and steady disregulation. The paper demonstrates the convergence of the algorithm accompanied by random noise,  相似文献   

6.
The selection of weighting matrix in design of the linear quadratic optimal controller is an important topic in the control theory. In this paper, an approach based on genetic algorithm is presented for selecting the weighting matrix for the optimal controller. Genetic algorithm is adaptive heuristic search algorithm premised on the evolutionary ideas of natural selection and genetic. In this algorithm, the fitness function is used to evaluate individuals and reproductive success varies with fitness. In the design of the linear quadratic optimal controller, the fitness function has relation to the anticipated step response of the system. Not only can the controller designed by this approach meet the demand of the performance indexes of linear quadratic controller, but also satisfy the anticipated step response of close-loop system. The method possesses a higher calculating efficiency and provides technical support for the optimal controller in engineering application. The simulation of a three-order single-input single-output (SISO) system has demonstrated the feasibility and validity of the approach.  相似文献   

7.
The simplified transfer function diagram block for a monitor automatic gauge control (Mon-AGC) system of strip steel rolling process was investigated. The new notion of strip sample length was given. In this way, the delay time varying with the rolling speed was evaded. After a Smith predictor was used to monitor the AGC system, the control laws were deduced for both proportional and integral regulators. The control strategies showed that by choosing the controller parameter P=∞ for both control algorithms each regulator could compensate the whole strip gage error in the first control step. The result shows that the integral algorithm is more controllable for the system regulating process and has a better steady-state precision than the proportional regulator. Compared with the traditional control strategy, the new control laws have a faster response speed and a hieher steadv-state precision.  相似文献   

8.
The key technology of semi-continuous conveyor system decides the successful using of this system. The key technology includes optimal initial building depth of this system,the crusher moving step and the layout of conveyor system are studied, and their calculating models are built up.  相似文献   

9.
The nanoscale alloying of metals with bulk miscibility gaps, Ag-Pt and Ag-Rh, has been investigated using pulsed laser ablation of solids in solution(PLASiS). The procedure was in two steps. In the first step, the suspensions of monometallic nanoparticles were prepared by ablation of a metal rod submerged in water. In the second step,the monometallic suspensions were mixed and alloying was induced by re-irradiation. For the Ag-Pt system, a surface plasmon resonance was observed in the monometallic silver suspension. The surface plasmon resonance vanished in re-irradiated Ag-Pt suspensions, indicating alloying. Selected Area Electron Diffraction(SAED)analysis showed that the nanoparticles had a fcc structure with a lattice constant intermediate between that of monometallic Ag and Pt nanoparticles. First principles theoretical investigations of the mixing energy of Ag-Pt clusters confirm that mixing is favored at around ~1 nm. The same procedure used for Ag-Pt was followed for Ag-Rh. In this system where the two metals present miscibility gaps even in the liquid phase, no evidence of alloying was observed. Correspondingly, theoretical investigations found that the mixing energy of Ag-Rh clusters did not favor alloying.  相似文献   

10.
The GM-PHD framework as recursion realization of PHD filter is extensively applied to multi-target tracking system .A new idea of improving the estimation precision of time-varying multi-target in non-linear system is proposed due to the advantage of computation efficiency in this paper .First, a novel cubature Kalman probability hypothesis density filter is designed for single sensor measure -ment system under the Gaussian mixture framework .Second , the consistency fusion strategy for multi-sensor measurement is proposed through constructing consistency matrix .Furthermore, to take the advantage of consistency fusion strategy , fused measurement is introduced in the update step of cubature Kalman probability hypothesis density filter to replace the single-sensor measurement .Then a cubature Kalman probability hypothesis density filter based on multi-sensor consistency fusion is proposed .Capabilily of the proposed algorithm is illustrated through simulation scenario of multi-sen-sor multi-target tracking .  相似文献   

11.
随着大型电子商务和电子政务系统中客户数量的增多,主机端密码系统的性能成为提供安全服务限制因素,针对该问题提出了一种基于高性能、可编程密码模块硬件的密码服务系统体系结构.通过设计统一设备API(Application Program Interface)接口和在模块内的芯片之间实现并行密码运算,该方法可以实现系统密码运算的高性能.该系统已在IBM Services345服务器和密码模块硬件上实现.通过对1024位RSA签名性能与并行密码模块数目间的关系进行测试分析,结果显示,基于该体系结构实现的密码服务系统是高性能的和可扩展的.  相似文献   

12.
可信密码模块是以我国研发的密码算法为基础,结合国内安全需求与产业市场,借鉴国际先进的可信计算技术框架与技术理念自主创新研发的.本文中首先对可信计算平台密码技术方案和国际可信计算组织规范在密码算法、授权协议和密钥管理等几方面进行了比较.基于可信密码模块,提出的基于隐藏属性证书的远程证明方案,用属性证书代替平台配置信息,不仅能有效防止隐私性的暴露,而且可以在系统升级和备份过程中完成可信检测,提高了实现的效率.  相似文献   

13.
客观可信的交易数据是数字资源交易系统应用的重要基础.文章设计了一种基于可信计算的数字资源交易计数系统,应用密码技术实现内容安全和通信安全,应用代码验证技术实现代码完整性,保证交易数据的完整、机密和不可篡改.文章描述了该系统的总体框架、功能模块和安全机制.  相似文献   

14.
The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG specifications cannot directly function on platforms complying with Chinese specifications because the two cryptography schemes are not compatible with each other. In order to transplant those applications with little to no modification, the paper presents a formal compatibility model based on Zaremski and Wing’s type system. Our model is concerned not only on the syntactic compatibility for data type, but also on the semantic compatibility for cryptographic attributes according to the feature of trusted computing. A compatibility algorithm is proposed based on the model to generate adapters for trusted computing applications.  相似文献   

15.
本文首先讨论了在XJDCCS分布式计算机控制系统上如何设计一套适合于该系统的人机接口,并选用结构化程序设计语言True BASIC和汇编语言加以实现。最后,运用专家系统的设计思想,讨论了基于知识的辅助操作员的决策系统的设计问题,并在XJDCCS上以大型玻璃窑炉的计算机控制为模拟对象进行了仿真。  相似文献   

16.
数据库加密与密文数据查询技术综述   总被引:1,自引:0,他引:1  
数据库加密是对敏感数据进行安全保护的有效手段.归纳了数据库加密系统的应用需求,综述了数据库加密的实现机制、加密粒度、加密算法及密钥管理,分析了密文数据库的索引机制与查询策略,讨论了数据库加密的局限性,并展望了数据库加密与密文数据查询技术的发展方向.  相似文献   

17.
In cloud computing applications, users' data and applications are hosted by cloud providers. This paper proposed an access control scheme that uses a combination of discretionary access control and cryptographic techniques to secure users' data and applications hosted by cloud providers. Many cloud applications require users to share their data and applications hosted by cloud providers. To facilitate resource sharing, the proposed scheme allows cloud users to delegate their access permissions to other users easily. Using the access control policies that guard the access to resources and the credentials submitted by users, a third party can infer information about the cloud users. The proposed scheme uses cryptographic techniques to obscure the access control policies and users' credentials to ensure the privacy of the cloud users. Data encryption is used to guarantee the confidentiality of data. Compared with existing schemes, the proposed scheme is more flexible and easy to use. Experiments showed that the proposed scheme is also efficient.  相似文献   

18.
 云计算和大数据的广泛应用使得多媒体数据的隐私保护面临越来越严峻的挑战,而多方计算、同态密码、函数加密等密码技术为数据在密文下的盲计算奠定了基础。视觉盲计算是在不接触图像、视频等视觉数据原始内容的情况下对其进行检测、识别、检索及更复杂的处理,是计算机视觉与密码学等领域学科交叉的新方向,在视频监控、多媒体数据共享、云计算、移动计算等领域有广泛的应用前景。本文回顾视觉盲计算技术的发展历史,从隐私保护的视频监控、人脸检测、人脸识别、人脸检索、机器学习等方面综述了该领域关键技术的发展情况,展望了视觉盲计算技术的发展趋势。  相似文献   

19.
0 IntroductionThe security of most commonly used cryptographicschemesis essentially based onthree families of compu-tational problems :the integer factoring problem(RSAprob-lem) ,the Diffie-Hell man problemand the discrete logarithmproblem,andthe elliptic curve variants thereof .Inthe middleof 1990s , Shor[1], Bonehet al[2]presented some remarkablequantumalgorithms which can solveinteger factoring problemand discrete logarithmproblemover any group including Ga-lois fields and elliptic curve…  相似文献   

20.
基于Pairing计算和密钥树提出了一种高效的动态群密钥协商方案.通过引入群公钥证书并在群密钥中结合群以及成员的长期密钥和临时密钥,提供了隐含密钥认证,以有效地对抗中间人攻击.此外,该方案的设计思想可以作为一种通用方法,把可认证两方Diffile-Hellman协议扩展到群环境.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号