期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Energy and spectral analysis of confined solar flares from radio and X-ray observations
1
作者 Cheng-Ming Tan Karl Ludwig Klein +4 位作者 Yi-Hua Yan Satoshi Masuda Bao-Lin Tan Jing Huang Guo-Wu Yuan 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2021年第11期35-46,共12页
The energy and spectral shape of radio bursts may help us understand the generation mechanism of solar eruptions,including solar flares,coronal mass ejections,eruptive filaments,and various scales of jets.The differen... The energy and spectral shape of radio bursts may help us understand the generation mechanism of solar eruptions,including solar flares,coronal mass ejections,eruptive filaments,and various scales of jets.The different kinds of flares may have different characteristics of energy and spectral distribution.In this work,we selected 10 mostly confined flare events during October 2014 to investigate their overall spectral behaviour and the energy emitted in microwaves by using radio observations from microwaves to interplanetary radio waves,and X-ray observations of GOES,RHESSI,and Fermi/GBM.We found that:all the confined flare events were associated with a microwave continuum burst extending to frequencies of9.4~15.4 GHz,and the peak frequencies of all confined flare events are higher than 4.995 GHz and lower than or equal to 17 GHz.The median value is around 9 GHz.The microwave burst energy(or nuence)and the peak frequency are found to provide useful criteria to estimate the power of solar flares.The observations imply that the magnetic field in confined flares tends to be stronger than that in 412 flares studied by Nita et al.(2004).All 10 events studied did not produce detectable hard X-rays with energies above~300 keV indicating the lack of efficient acceleration of electrons to high energies in the confined flares. 展开更多
关键词 Sun:solar flare Sun:radio burst Sun:energy Sun:spectral
下载PDF
The Control System Simulation of Variable-Speed Constant-Frequency Wind Turbine
2
作者 窦金延 曹娜 《Journal of Measurement Science and Instrumentation》 CAS 2010年第S1期202-206,共5页
In general,Variable-Speed Constant Frequency (VSCF)Wind generation system is controlled by stator voltage orientation method which based on the mathematic model of VSCF Wind generation system and discussed the control... In general,Variable-Speed Constant Frequency (VSCF)Wind generation system is controlled by stator voltage orientation method which based on the mathematic model of VSCF Wind generation system and discussed the control strategy.Present the whole dynamic control model of variable-speed wind generator system in MATLAB/ Simulink,and the simulation results confirm the validity and effectiveness of the proposed control strategy. 展开更多
关键词 Variable-Speed constant-frequency MODEL wind turbines control system vector control
下载PDF
Communication-Based Attacks Detection in Android Applications 被引量:2
3
作者 Chuan Ma Tao Wang +3 位作者 Limin Shen Dongkui Liang Shuping Chen Dianlong You 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期596-614,共19页
The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method... The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method is proposed to model and detect inter-component communication behavior in Android applications. Firstly,we generate data flow graphs and data facts for each component through component-level data flow analysis.Secondly, our approach treats ICC just like method calls. After analyzing the fields and data dependencies of the intent, we identify the ICC caller and callee, track the data flow between them, and construct the ICC model. Thirdly,the behavior model of Android applications is constructed by a formal mapping method for component data flow graph based on Pi calculus. The runtime sensitive path trigger detection algorithm is then given. Communicationbased attacks are detected by analyzing intent abnormity. Finally, we analyze the modeling and detection efficiency,and compare it with relevant methods. Analysis of 57 real-world applications partly verifies the effectiveness of the proposed method. 展开更多
关键词 ANDROID inter-component COMMUNICATION intents COMPONENT HIJACKING attack DETECTION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部