The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Gamma spectra is the fingerprint of uranium materials in the arms control verification technology. To calculate and analyse delayed gamma spectra of fission products, we simplified the decay chain into basic state linear chain and excitation state linear chain. We deduced formulas of the changing rule for nuclide number before and after zero-time. We made the C program to calculate the delayed gamma...
In order to measure the surface contamination level effectively, the large area surface contamination measuring instrument is widely used. This research designs a thin-window flow gas proportional counter with 1000cm2 detecting area. When to achieve simultaneous measurement of α and β rays in using pulse-height discrimination technology, the selection of high voltage operation point for this detector...
Generally, people use Monte Carlo and Geant4 methods to simulate the interactions of gamma photons with the detectors (NaI(Tl), Ge(Li), HPGe and so on), to calculate the response function of detecting system. But when they make separate lines of the measured spectra, energy peaks are hard to simulate for noise signals. In order to including noise signals from the statistical fluctuation of the detector,...
Web information is diverse, complex and dynamic, while information search is heterogeneous and distributive. The traditional method of web information search is built on the basis of Client / Server model, demanding the high immediacy and timeliness of information search. When large amounts of data need to be transmitted, communication delays. This paper, from the perspectives of intelligent routing,...
Most of the current plug-in technology researches and designs focus on the implementation of a single plug-in function, but is lack in support from safety technology and metadata. However, as an open, dynamic running system, plug-in framework requires the infrastructure framework to control the legitimacy of plug-ins, and constrain the implementation of its function. This paper presents a plug-in...
Using frequency weighted mining algorithm with real-time data processing capability to calculate each system call's frequency value for existed audit records, and we got a vector set of progress. The vector set was linearly scanned and its progresses were labeled as ??normal?? or ??attack?? according to their distance relations. Then we got a SVM training set without man-made supervision. Finally,...
While the use of intrusion detection system (IDS), which monitors passively specific computing resources, and reports anomalous or intrusive activities, is becoming ubiquitous in today's network, evaluating IDS performance has been found to be challenging. Most IDS testing approaches are faced with selections with regard to their use of background traffic, which plays an important role in IDS testing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.