The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Chip-embedded organic resonator is fabricated with 2,5-Bis(4-biphenylyl)thiophene (BP1T) crystals encapsulated with polydimethylsiloxane (PDMS). Whispering gallery mode lasing is demonstrated in these on-chip embedded crystalline microresonators, without decline in the spectral properties, and performance in comparison to the unencapsulated devices. The encapsulated lasers exhibit quality factor (Q)...
Albayzin 2012 language recognition evaluation (LRE) is one of the most challenging language recognition evaluation, which is mainly reflected in: (1) the target languages are more confusable with other languages, which might push down the system performance; (2) developing and test data is heterogeneous regarding duration, number of speakers, ambient noise/music, channel conditions, etc. (3) signals...
We report a complete experimental realization of measurement device independent quantum key distribution system with decoy method, which closes loopholes in both source and detection. 25-kbit secure key is generated over a 50-km fiber link.
Under the background of the accidents frequently occurring when carrying solid bulk cargoes by sea, this paper analyzed the existing related rules and international codes about maritime solid bulk cargoes. On the basis of the maritime experts' experiences and laboratory test data, it established a maritime solid bulk cargoes safety management expert database. In addition, the connection of the expert...
This paper mainly discusses the regional efficiency of financial resources allocation (EFRA) in China with Data Envelopment Analysis (DEA). Distinctively, we consider the influence of regional money multiplier. The research result indicates that the influence of regional money multiplier on the EFRA does really exist. And furthermore, the influence of regional money multiplier is stronger in the western...
Department of Applied Science and Technology and Center for Microplasma Science and Technology, Saint Peter's College, New Jersey, USA, 07306 In dental clinics, caries is one of the highest incidence diseases in human, and Streptococcus mutans (S. mutans) is the most contributing cariogenic bacteria in oral environment. The primary step in the occurrence of dental caries is the colonization of S....
The development of the Internet and E-commerce makes the enterprises' competition beyond the time-space constraints. The rules of traditional market competition also have been changed. Soft power has become as important as hard power in the enterprises' development. A clear exposition of the relationship between soft power and hard power is very important for acquiring sustainable competitive advantage...
One important prerequisite for improving the level of university interdisciplinary is to establish a comprehensive evaluation system for the evaluation of existing interdisciplinary. A comprehensive evaluation system including ten indices was built based on the analysis of interdisciplinary construction in college. On the basis of this evaluation system, it analyzes the interdisciplinary level of...
The malicious software detection based on characteristics matching cannot find unknown malicious software and the origin of harms. To solve this problem, a method is proposed to detect malicious software according to the subject-object association. It uses SSDT HOOK technology to monitor the software behaviors and records those into logs. To improve the accuracy of detection, it proposes a risk assessment...
To solve the multi-user identification problems in multi-touch system, based on trusted computing theory, this paper presents the identity authentication platform which is realized with gesture passwords. It uses the collaboration of four cameras to locate touches and quantities gesture tracks, and then calculates the hash values as user passwords. It realizes identity authentication by comparing...
This paper studies how to calculate the difference between two intuitionistic fuzzy sets (IFSs). A new property of distance measure on IFSs is proposed at first. Some new distance measures on IFSs are proposed secondly. These new properties and new distances measure can be used in pattern recognition, and the new distances measure is more flexible as the decision-maker can set different weights according...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.