期刊文献+
共找到61,665篇文章
< 1 2 250 >
每页显示 20 50 100
通过交叉验证堆栈和VAD信息检测Windows代码注入
1
作者 翟继强 韩旭 +2 位作者 王家乾 孙海旭 杨海陆 《哈尔滨理工大学学报》 CAS 北大核心 2024年第2期43-51,共9页
Windows 32/64位代码注入攻击是恶意软件常用的攻击技术,在内存取证领域,现存的代码注入攻击检测技术在验证完整性方面不能处理动态内容,并且在解析内存中数据结构方面无法兼容不同版本的Windows系统。因此提出了通过交叉验证进程堆栈和... Windows 32/64位代码注入攻击是恶意软件常用的攻击技术,在内存取证领域,现存的代码注入攻击检测技术在验证完整性方面不能处理动态内容,并且在解析内存中数据结构方面无法兼容不同版本的Windows系统。因此提出了通过交叉验证进程堆栈和VAD信息定位注入代码方法,将基于遍历栈帧得到的函数返回地址、模块名等信息结合进程VAD结构来检测函数返回地址、匹配文件名以定位注入代码,并且研发了基于Volatility取证框架的Windows代码注入攻击检测插件codefind。测试结果表明,即使在VAD节点被恶意软件修改,方法仍能够有效定位Windows 32/64位注入代码攻击。 展开更多
关键词 VAD 堆栈 windows代码注入 内存取证技术
下载PDF
基于Windows/RTX的实时仿测软件设计
2
作者 李勇波 田润梅 +2 位作者 张辉 郭善鹏 李琪 《系统仿真学报》 CAS CSCD 北大核心 2024年第6期1468-1474,共7页
针对传统测试软件实时性有限、传统仿真接口软件通用性程度低的问题,为满足半实物仿真软件需兼顾单元测试和控制系统仿真验证的需求,设计了基于Windows/RTX的实时仿测软件。仿测软件采用模块化的设计原则,开发了GUI层人机交互界面和RTX... 针对传统测试软件实时性有限、传统仿真接口软件通用性程度低的问题,为满足半实物仿真软件需兼顾单元测试和控制系统仿真验证的需求,设计了基于Windows/RTX的实时仿测软件。仿测软件采用模块化的设计原则,开发了GUI层人机交互界面和RTX层实时运行程序。为保证实时性,采用无锁循环缓冲区+双线程技术,解决了RTX环境下仿真步长为1 ms时串口数据收发的超时问题;提出一种超时检测算法监测仿真节点的实时状态。借助cJSON优化了测试用例配置文件,用户可以更灵活地编辑测试用例,利用RTW自动代码生成将弹体模型编译集成到RTX仿测软件工程。实验结果表明:该仿测软件有效兼顾了单测与仿真,提高了仿测软件的通用性和二次开发效率,降低了开发难度。 展开更多
关键词 windows/RTX 实时 部件单测 半实物仿真
下载PDF
Bimetallic In_(2)O_(3)/Bi_(2)O_(3) Catalysts Enable Highly Selective CO_(2) Electroreduction to Formate within Ultra-Broad Potential Windows 被引量:1
3
作者 Zhongxue Yang Hongzhi Wang +7 位作者 Xinze Bi Xiaojie Tan Yuezhu Zhao Wenhang Wang Yecheng Zou Huai ping Wang Hui Ning Mingbo Wu 《Energy & Environmental Materials》 SCIE EI CAS CSCD 2024年第1期257-264,共8页
CO_(2)electrochemical reduction reaction(CO_(2)RR)to formate is a hopeful pathway for reducing CO_(2)and producing high-value chemicals,which needs highly selective catalysts with ultra-broad potential windows to meet... CO_(2)electrochemical reduction reaction(CO_(2)RR)to formate is a hopeful pathway for reducing CO_(2)and producing high-value chemicals,which needs highly selective catalysts with ultra-broad potential windows to meet the industrial demands.Herein,the nanorod-like bimetallic ln_(2)O_(3)/Bi_(2)O_(3)catalysts were successfully synthesized by pyrolysis of bimetallic InBi-MOF precursors.The abundant oxygen vacancies generated from the lattice mismatch of Bi_(2)O_(3)and ln_(2)O_(3)reduced the activation energy of CO_(2)to*CO_(2)·^(-)and improved the selectivity of*CO_(2)·^(-)to formate simultaneously.Meanwhile,the carbon skeleton derived from the pyrolysis of organic framework of InBi-MOF provided a conductive network to accelerate the electrons transmission.The catalyst exhibited an ultra-broad applied potential window of 1200 mV(from-0.4 to-1.6 V vs RHE),relativistic high Faradaic efficiency of formate(99.92%)and satisfactory stability after 30 h.The in situ FT-IR experiment and DFT calculation verified that the abundant oxygen vacancies on the surface of catalysts can easily absorb CO_(2)molecules,and oxygen vacancy path is dominant pathway.This work provides a convenient method to construct high-performance bimetallic catalysts for the industrial application of CO_(2)RR. 展开更多
关键词 bimetallic catalyst CO_(2)electrochemical reduction reaction FORMATE oxygen vacancy wide potential window
下载PDF
基于Rife-Vincent(Ⅰ)窗的电力谐波分析方法
4
作者 黄冬梅 《电工技术》 2024年第3期22-26,共5页
快速傅里叶变换(FFT)的电力谐波分析方法应用最多,但存在频谱泄漏和栅栏现象,影响谐波分析的精确度。为解决这个问题,先分析了常用窗函数和插值算法,后提出了基于5项Rife-Vincent(Ⅰ)窗六谱线插值的谐波分析方法。通过多项式曲线拟合,... 快速傅里叶变换(FFT)的电力谐波分析方法应用最多,但存在频谱泄漏和栅栏现象,影响谐波分析的精确度。为解决这个问题,先分析了常用窗函数和插值算法,后提出了基于5项Rife-Vincent(Ⅰ)窗六谱线插值的谐波分析方法。通过多项式曲线拟合,推导出幅值、相位和频率的修正公式,并用于仿真验证。仿真结果证明了算法的有效性和准确性:在分析简单信号时,与Hanning窗、Hamming窗、Blackman窗相比,5项Rife-Vincent(Ⅰ)窗的检测精度更高,幅值和相位相对误差分别小于8.94×10^(-6)%和2.60×10^(-4)%,基波频率相对误差低至-1.44×10^(-8)%;在分析包含间谐波的复杂信号时,所提出的算法相比其他算法计算精度更高。 展开更多
关键词 快速傅里叶变换 rife-vincent(Ⅰ)窗 六谱线插值 谐波分析 多项式曲线拟合
下载PDF
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
5
作者 Juhwan Kim Baehoon Son +1 位作者 Jihyeon Yu Joobeom Yun 《Computers, Materials & Continua》 SCIE EI 2024年第11期3371-3393,共23页
Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the comp... Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies. 展开更多
关键词 Digital forensics autoencoder logarithmic entropy PRIORITIZATION anomaly detection windows artifacts artificial intelligence
下载PDF
Vehicle routing optimization algorithm based on time windows and dynamic demand
6
作者 LI Jun DUAN Yurong +1 位作者 ZHANG Weiwei ZHU Liyuan 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第3期369-378,共10页
To provide the supplier with the minimizum vehicle travel distance in the distribution process of goods in three situations of new customer demand,customer cancellation service,and change of customer delivery address,... To provide the supplier with the minimizum vehicle travel distance in the distribution process of goods in three situations of new customer demand,customer cancellation service,and change of customer delivery address,based on the ideas of pre-optimization and real-time optimization,a two-stage planning model of dynamic demand based vehicle routing problem with time windows was established.At the pre-optimization stage,an improved genetic algorithm was used to obtain the pre-optimized distribution route,a large-scale neighborhood search method was integrated into the mutation operation to improve the local optimization performance of the genetic algorithm,and a variety of operators were introduced to expand the search space of neighborhood solutions;At the real-time optimization stage,a periodic optimization strategy was adopted to transform a complex dynamic problem into several static problems,and four neighborhood search operators were used to quickly adjust the route.Two different scale examples were designed for experiments.It is proved that the algorithm can plan the better route,and adjust the distribution route in time under the real-time constraints.Therefore,the proposed algorithm can provide theoretical guidance for suppliers to solve the dynamic demand based vehicle routing problem. 展开更多
关键词 vehicle routing problem dynamic demand genetic algorithm large-scale neighborhood search time windows
下载PDF
基于Windows和Linux操作系统基线核查及加固技术的研究和应用
7
作者 吴英松 赵亮 隋明岐 《电脑知识与技术》 2024年第28期72-74,共3页
文章对Windows和Linux操作系统基线核查加固技术进行研究。针对电力系统主机存在的安全缺陷,从主机信息、账户及口令、主机配置、服务及应用以及日志及审计等五个大类着手,给出自动化基线核查与加固工具的总体开发架构与模块设计,重点阐... 文章对Windows和Linux操作系统基线核查加固技术进行研究。针对电力系统主机存在的安全缺陷,从主机信息、账户及口令、主机配置、服务及应用以及日志及审计等五个大类着手,给出自动化基线核查与加固工具的总体开发架构与模块设计,重点阐述2种操作系统基线安全与加固以及数据分析等核心功能的开发流程,经测试证明了该工具的可用性和健壮性。 展开更多
关键词 LINUX windows 基线核查 基线加固 数据分析
下载PDF
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
8
作者 Islam Zada Mohammed Naif Alatawi +4 位作者 Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi 《Computers, Materials & Continua》 SCIE EI 2024年第8期2917-2939,共23页
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar... Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats. 展开更多
关键词 Security and privacy challenges in the context of requirements engineering supervisedmachine learning malware detection windows systems comparative analysis Gaussian Naive Bayes K Nearest Neighbors Stochastic Gradient Descent Classifier Decision Tree
下载PDF
快速拓展Windows实时性!史上最小的PLC运动控制器发布
9
《智慧工厂》 2024年第1期26-26,共1页
为了解决Windows系统下可视化界面友好、软件开发容易、兼容性好,但无法实现实时性控制;其它带有实时控制功能的系统存在软件平台搭建困难、开发难度高、兼容性差等问题。立迈胜研发了一种NIMC301-A微型运动控制器,可以做到开箱即用,极... 为了解决Windows系统下可视化界面友好、软件开发容易、兼容性好,但无法实现实时性控制;其它带有实时控制功能的系统存在软件平台搭建困难、开发难度高、兼容性差等问题。立迈胜研发了一种NIMC301-A微型运动控制器,可以做到开箱即用,极大地增加了用户的易用性。其自带CANopen主站,具备PLC控制功能,也可为WindoWs平台提供实时性拓展,而体积仅相当于“U盘”大小! 展开更多
关键词 windows系统 可视化界面 软件开发 实时性控制 易用性 运动控制器 U盘 兼容性
下载PDF
畅玩3A、能装Windows和Linux!国产处理器KX-7000测评来了
10
《计算机应用文摘》 2024年第21期196-197,共2页
近日,有第三方媒体发布了关于兆芯KX-7000的评测视频,认为KX-7000不仅是目前桌面端最强的国产处理器之一,对于普通用户来说,也是最易上手的一款国产CPU。KX-7000是兆芯最新一代的国产X86处理器,部分海外网站媒体(如PC Watch)对其进行了... 近日,有第三方媒体发布了关于兆芯KX-7000的评测视频,认为KX-7000不仅是目前桌面端最强的国产处理器之一,对于普通用户来说,也是最易上手的一款国产CPU。KX-7000是兆芯最新一代的国产X86处理器,部分海外网站媒体(如PC Watch)对其进行了性能测试并发布了结果。测试内容围绕KX-7000的架构、性能及主流应用方面进行了测试,在介绍了兆芯x86架构来源及特点的同时,展现了KX-7000在Spec2006、视频编解码、3A游戏、主流办公等应用下的数据与体验。具体如下。 展开更多
关键词 国产处理器 LINUX 视频编解码 windows 普通用户 测试内容 性能测试 第三方
下载PDF
基于五项Rife-Vincent(Ⅰ)窗的四谱线插值FFT谐波分析方法 被引量:5
11
作者 李振华 喻彩云 +2 位作者 蒋伟辉 王兴桐 李振兴 《电测与仪表》 北大核心 2023年第4期78-84,98,共8页
目前,在电力谐波分析中快速傅里叶变换(FFT)应用得最为广泛,但是在非同步采样时,应用该变换容易产生频谱泄漏,出现栅栏效应。为减小非同步采样对FFT的影响,对旁瓣峰值电平小且下降速率快的五项Rife-Vincent(Ⅰ)窗进行了分析,并将它应用... 目前,在电力谐波分析中快速傅里叶变换(FFT)应用得最为广泛,但是在非同步采样时,应用该变换容易产生频谱泄漏,出现栅栏效应。为减小非同步采样对FFT的影响,对旁瓣峰值电平小且下降速率快的五项Rife-Vincent(Ⅰ)窗进行了分析,并将它应用于FFT算法中,提出了基于五项Rife-Vincent(Ⅰ)窗的四谱线插值FFT谐波检测算法。经过多项式函数的拟合,得到了简单实用的四谱线插值修正公式,使计算过程更为简单。结果表明,与Hanning窗、Nuttall窗和四项Rife-Vincent(Ⅰ)窗插值FFT相比,相同条件下,五项Rife-Vincent(Ⅰ)窗具有更高的准确度,其幅值相对误差EAh≤6.524×10-5%,相位相对误差Eφh≤7.751×10^(-3)%。 展开更多
关键词 谐波分析 非同步采样 快速傅里叶变换 rife-vincent(Ⅰ)窗 四谱线插值
下载PDF
基于通用可调(p,q)阶Rife-Vincent自乘-卷积窗的改进四谱线插值高精度谐波分析算法
12
作者 雷可君 李明皓 +4 位作者 汪旭明 张银行 胡力 王向明 杨喜 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2023年第10期3926-3936,共11页
加窗快速傅里叶变换(WIFFT)是一类重要的谐波参数估计方法。然而,快速傅里叶变换固有的栅栏效应以及非同步采样产生的频谱泄漏对谐波参数的估计精度有较大影响。为此,利用具有最大旁瓣衰减特性的I类Rife-Vincent窗作为父窗,提出一种新... 加窗快速傅里叶变换(WIFFT)是一类重要的谐波参数估计方法。然而,快速傅里叶变换固有的栅栏效应以及非同步采样产生的频谱泄漏对谐波参数的估计精度有较大影响。为此,利用具有最大旁瓣衰减特性的I类Rife-Vincent窗作为父窗,提出一种新型的通用可调(p,q)阶Rife-Vincent自乘-卷积窗(RVSMC p-q),其特点在于通过改变乘积阶数和卷积阶数可以灵活地改变窗函数的主瓣宽度、旁瓣峰值和衰减速度。在此基础上,提出一种基于RVSMC p-q窗的四谱线插值高精度谐波参数估计方法,利用最小二乘拟合原理给出谐波信号的幅值、频率及相位参数的低复杂度多项式估计公式。在复杂谐波、间谐波及基波频率波动的情况下对基于RVSMC p-q窗的四谱线插值谐波参数估计方法的效果进行仿真。研究结果表明:在较低的乘积和卷积阶数条件下,新算法可以获得比经典的基于自乘积窗或自卷积窗的WIFFT算法更为优越的参数估计精度,且算法复杂度较低。 展开更多
关键词 谐波分析 参数估计 (p q)阶rife-vincent自乘-卷积窗(RVSMC p-q) 四谱线插值 低复杂度
下载PDF
多媒体课件在Windows系统中的个性化创意设计
13
作者 陈瑶 《数字通信世界》 2023年第2期109-111,共3页
文章从Windows桌面操作系统中图形界面应用出发,探讨通过个性化的设计方法创建自己的Windows Space,给用户创造出虚拟的桌面和软件界面应用,以多媒体课件的设计为实例,分析了多媒体课件界面设计的组成要素以及运用Flash和Dreamweaver进... 文章从Windows桌面操作系统中图形界面应用出发,探讨通过个性化的设计方法创建自己的Windows Space,给用户创造出虚拟的桌面和软件界面应用,以多媒体课件的设计为实例,分析了多媒体课件界面设计的组成要素以及运用Flash和Dreamweaver进行个性化创意设计的基本步骤。 展开更多
关键词 图形界面 多媒体课件 windows系统 个性化创意
下载PDF
基于强化学习的自动化Windows域渗透方法 被引量:1
14
作者 占力戈 沙乐天 +2 位作者 肖甫 董建阔 张品昌 《网络与信息安全学报》 2023年第4期104-120,共17页
Windows域为用户之间的资源共享及信息交互提供统一的系统服务,在便利内网管理的同时带来了巨大的安全隐患。近年来,针对域控制器的各式攻击层出不穷,实现自动化渗透能够灵活检测Windows域中存在的漏洞威胁,保障办公网络安全稳定地持久... Windows域为用户之间的资源共享及信息交互提供统一的系统服务,在便利内网管理的同时带来了巨大的安全隐患。近年来,针对域控制器的各式攻击层出不穷,实现自动化渗透能够灵活检测Windows域中存在的漏洞威胁,保障办公网络安全稳定地持久运行,其核心是高效挖掘环境内可行的攻击路径。为此,将渗透测试过程进行强化学习建模,通过智能体与域环境的真实交互发现漏洞组合,进而验证有效的攻击序列;基于主机对渗透进程的贡献差异,减少强化学习模型中非必要的状态与动作,优化路径选择策略,提升实际攻击效率;使用状态动作删减、探索策略优化的Q学习算法筛选最优攻击路径,自动验证域环境中所有可能的安全隐患,为域管理员提供防护依据。实验针对典型内网业务场景展开测试,从生成的13种高效攻击路径中筛选最优路径,通过与相关研究成果对比,突出了所提方法在域控权限获取、主机权限获取、攻击步长、收敛性以及时间代价等方面的性能优化效果。 展开更多
关键词 windows 渗透测试 强化学习 攻击路径
下载PDF
基于Windows服务器的网络安全问题研究 被引量:2
15
作者 陈红娟 张曰花 刘婷婷 《黑龙江科学》 2023年第12期37-39,共3页
针对Windows服务器网络安全框架,分析了Windows服务器网络安全功能及应用,指出了Windows服务器网络安全的常见问题,包括操作系统漏洞、病毒攻击、恶意软件、黑客攻击、暴力破解及系统攻击等。提出了Windows服务器网络安全常用算法,包括W... 针对Windows服务器网络安全框架,分析了Windows服务器网络安全功能及应用,指出了Windows服务器网络安全的常见问题,包括操作系统漏洞、病毒攻击、恶意软件、黑客攻击、暴力破解及系统攻击等。提出了Windows服务器网络安全常用算法,包括Windows进程自动加载技术、端口隐藏、密码算法。分析了经典Windows服务器网络安全框架,需将网络监控系统放在同一个网络中,采用加密数据传输,以保证客户通信安全。 展开更多
关键词 windows服务器 网络安全 通信
下载PDF
Development of RF windows for 650 MHz multibeam klystron 被引量:2
16
作者 Sheng-Chang Wang Zu-Sheng Zhou +5 位作者 Zhi-Jun Lu Zhi-Qing Liu Shigeki Fukuda Yu Liu Jing-Yi Li Wei-Ming Li 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2023年第9期58-68,共11页
Radio frequency windows are developed and evaluated for a 650 MHz continuous-wave multibeam klystron.Thin-pillbox windows with alumina and beryllia disks are designed with an average RF power of CW 400 kW.Results of a... Radio frequency windows are developed and evaluated for a 650 MHz continuous-wave multibeam klystron.Thin-pillbox windows with alumina and beryllia disks are designed with an average RF power of CW 400 kW.Results of a cold test and tuning procedures are described.The final measured S11 curves under the required bandwidth are less than-32.0 and-26.9 dB for alumina and beryllia windows,respectively.The windows are tested up to CW 143 kW for traveling waves and CW 110 kW for standing waves using a solid-state amplifier as an RF power source.Multipactor simulations for windows and benchmark studies for the thermal analysis of ceramic disks are introduced. 展开更多
关键词 RF window High-power test MBK
下载PDF
Sol-gel-based porous Ti-doped tungsten oxide films for high-performance dual-band electrochromic smart windows 被引量:1
17
作者 Qiancheng Meng Sheng Cao +6 位作者 Juquan Guo Qingke Wang Ke Wang Tao Yang Ruosheng Zeng Jialong Zhao Bingsuo Zou 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2023年第2期137-143,I0004,共8页
Dual-band electrochromic smart windows(DESWs)with independent control of the transmittance of near-infrared and visible light show great potential in the application of smart and energy-saving buildings.The current st... Dual-band electrochromic smart windows(DESWs)with independent control of the transmittance of near-infrared and visible light show great potential in the application of smart and energy-saving buildings.The current strategy for building DESWs is to screen materials for composite or prepare plasmonic nanocrystal films.These rigorous preparation processes seriously limit the further development of DESWs.Herein,we report a facile and effective sol-gel strategy using a foaming agent to achieve porous Ti-doped tungsten oxide film for the high performance of DESWs.The introduction of foaming agent polyvinylpyrrolidone during the film preparation can increase the specific surface area and free carrier concentration of the films and enhance their independent regulation ability of near-infrared electrochromism.As a result,the optimal film shows excellent dual-band electrochromic properties,including high optical modulation(84.9%at 633 nm and 90.3%at 1200 nm),high coloration efficiency(114.9 cm^(2) C^(-1) at 633 nm and 420.3 cm^(2) C^(-1) at 1200 nm),quick switching time,excellent bistability,and good cycle stability(the transmittance modulation losses at 633 and 1200 nm were 11%and 3.5%respectively after 1000 cycles).A demonstrated DESW fabricated by the sol-gel film showed effective management of heat and light of sunlight.This study represents a significant advance in the preparation of dual-band electrochromic films,which will shed new light on advancing electrochromic technology for future energy-saving smart buildings. 展开更多
关键词 ELECTROCHROMISM Tungsten oxide Smart windows Sol-gel method Dual-band absorption
下载PDF
Effect of False Windows on Light Exposure and Sleep Quality in Hospitalized Patients
18
作者 Hiroki Onodera Mitsuru Ida Masahiko Kawaguchi 《Health》 CAS 2023年第4期281-288,共8页
Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients ... Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients admitted to the Department of Neurology at our hospital between September 2020 and August 2021. An Actigraph device was fitted to patients’ wrist and their beds to measure the amount of light received and sleep quality. Patients were divided into three groups: bed with a window, aisle bed with a false window, and aisle bed without a window. Mean sleep efficiency (%), mean steps (per day), and the amount of light (lux) received by the patients and beds were measured. Results: Valid data were obtained for 48 participants (median age, 66.5 years). There were 23 patients in beds with a window, 13 patients in aisle beds without a false window, and 12 in aisle beds with a false window. No statistically significant differences were found in terms of mean sleep efficiency, number of steps taken, and the amount of light received by the patients (P > 0.05);however, difference in the mean amount of light received by the beds at the location of the bed was statistically significant (P Conclusion: The amount of light that the patient receives is not necessarily affected by the location of the bed or the presence of a false window. 展开更多
关键词 ACTIGRAPH False window Sleep Efficiency
下载PDF
基于Windows服务器终端的远程信息获取研究
19
作者 刘婷婷 陈红娟 张曰花 《黑龙江科学》 2023年第10期129-130,133,共3页
分析了基于Windows服务器终端的远程信息获取技术,包括Microsoft Windows Server远程桌面服务、远程管理服务及网络管理服务。研究表明,使用Windows Server远程终端可实现信息获取与交互,通过套接字技术及TCP/IP等多种协议可完成Window... 分析了基于Windows服务器终端的远程信息获取技术,包括Microsoft Windows Server远程桌面服务、远程管理服务及网络管理服务。研究表明,使用Windows Server远程终端可实现信息获取与交互,通过套接字技术及TCP/IP等多种协议可完成Windows服务器终端通信,结合完成端口可搭建较为完成的系统框架。目前,搭建的系统框架能够满足客户的日常需求、服务器终端信息获取,采用加密技术可完成对隐私信息的网络保护。 展开更多
关键词 windows服务器 通信 远程交互
下载PDF
基于Windows平台的故障转移集群研究与应用
20
作者 李永 《信息技术》 2023年第8期47-50,共4页
针对目前铁路客运营销辅助决策系统的资料库存在单点故障的问题,研究Microsoft SQL Server数据库。在Windows Server服务器上利用微软公司内置的故障转移集群功能来提高应用的稳定性和可用性;基于故障转移集群实现SQL Server的Always O... 针对目前铁路客运营销辅助决策系统的资料库存在单点故障的问题,研究Microsoft SQL Server数据库。在Windows Server服务器上利用微软公司内置的故障转移集群功能来提高应用的稳定性和可用性;基于故障转移集群实现SQL Server的Always On功能;通过研究集群相关技术,完成基于Windows Server 2016的无域控故障转移集群部署实践。实践表明,利用Windows故障转移特性,可以实现SQL Server数据库的高可用性及应用或服务的高可用性。 展开更多
关键词 windows Server 故障转移集群 高可用 无域
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部