Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Rundong Yang"'
Publikováno v:
Sensors, Vol 24, Iss 16, p 5430 (2024)
Nowadays, metamaterial absorbers still suffer from limited bandwidth, poor bandwidth scalability, and insufficient modulation depth. In order to solve this series of problems, we propose a metamaterial absorber based on graphene, VO2, gallium silver
Externí odkaz:
https://doaj.org/article/bc189cc0445a47cc8bb04c5795b00296
Publikováno v:
Marine Drugs, Vol 21, Iss 1, p 13 (2022)
The aim of this study is to investigate the differences in the accumulation capacity of chrysolaminarin among six Tribonema species and to isolate this polysaccharide for immunomodulatory activity evaluation. The results showed that T. aequale was th
Externí odkaz:
https://doaj.org/article/6f5a8f21455948c799140be66d975ffe
Publikováno v:
Sensors, Vol 21, Iss 24, p 8281 (2021)
Phishing has become one of the biggest and most effective cyber threats, causing hundreds of millions of dollars in losses and millions of data breaches every year. Currently, anti-phishing techniques require experts to extract phishing sites feature
Externí odkaz:
https://doaj.org/article/81e20e82e8024f2e83e6d35f8f463d6b
Publikováno v:
IEEE Transactions on Industrial Electronics. 69:13494-13503
Publikováno v:
Computer Systems Science & Engineering; 2023, Vol. 47 Issue 2, p2153-2170, 18p
Publikováno v:
Mathematical Problems in Engineering. 2022:1-10
Phishing is a very serious security problem that poses a huge threat to the average user. Research on phishing prevention is attracting increasing attention. The root cause of the threat of phishing is that phishing can still succeed even when anti-p
Publikováno v:
IEEE Sensors Journal. 22:8604-8613
Autor:
Jian Yang, Kai Yao, Rundong Yang, Liu Le, Sheng Wang, Chen Jienan, Gao Yang, Wang Zesong, Wu Chengjian, Jiazhen Li, Zhiqiang Jin
Publikováno v:
IEEE Transactions on Power Electronics. 36:1828-1843
Buck–buck/Boost power factor correction (PFC) converter is a great choice to compensate the inherent dead zones in the input current of buck PFC converter. However, whether the converter operates with traditional constant on-time control in critica
Publikováno v:
Computational Intelligence and Neuroscience
Computational Intelligence and Neuroscience, Vol 2022 (2022)
Computational Intelligence and Neuroscience, Vol 2022 (2022)
While antiphishing techniques have evolved over the years, phishing remains one of the most threatening attacks on current network security. This is because phishing exploits one of the weakest links in a network system—people. The purpose of this
Publikováno v:
Edge Computing and IoT: Systems, Management and Security ISBN: 9783030734282
In recent years, deep learning model has made remarkable achievements in image, voice, text recognition and other fields. However, deep learning model relies heavily on large number of labeled data, which limits its application in the special field o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::11d9d1f38037b5b9f0b01a1722d6a983
https://doi.org/10.1007/978-3-030-73429-9_6
https://doi.org/10.1007/978-3-030-73429-9_6