Zobrazeno 1 - 10
of 598
pro vyhledávání: '"ZHANG Qizhi"'
Publikováno v:
Gong-kuang zidonghua, Vol 50, Iss 6, Pp 142-149 (2024)
The health status of the planetary gears in the cutting section of shearer's rocker arm directly affects the cutting efficiency. The strong noise interference caused by multiple impacts during the cutting of coal and rock by the shearer, the complex
Externí odkaz:
https://doaj.org/article/07cd6e6488d74ddb92da8af338aec603
Publikováno v:
网络与信息安全学报, Vol 7, Iss 2, Pp 57-63 (2021)
Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit. In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed. As o
Externí odkaz:
https://doaj.org/article/1ba8951b3c40433d8dd77a7e73d66ca3
Autor:
Sun, Qingfeng, Zhang, Qizhi
We compute the quantum variance of holomorphic cusp forms on the vertical geodesic for smooth compactly supported test functions. As an application we show that almost all holomorphic Hecke cusp forms, whose weights are in a short interval, satisfy Q
Externí odkaz:
http://arxiv.org/abs/2408.15259
Publikováno v:
Gong-kuang zidonghua, Vol 43, Iss 1, Pp 9-12 (2017)
In order to solve problems that conventional time-frequency domain analysis methods were sensitive to noise and had poor adaptability of energy change in coal-rock interface identification based on vibration signal analysis, a vibration signal identi
Externí odkaz:
https://doaj.org/article/5c87760a27aa48f3ace1e293a69dc417
Autor:
Zhang Qizhi, Jia Yongle
Publikováno v:
Shock and Vibration, Vol 8, Iss 1, Pp 15-19 (2001)
The active noise control (ANC) is discussed. Many digital ANC systems often based on the filter-x algorithm for finite impulse response (FIR) filter use adaptive filtering techniques. But if the primary noise path is nonlinear, the control system bas
Externí odkaz:
https://doaj.org/article/50c6e265117d4c208abee38ee5b25d2b
Publikováno v:
In Case Studies in Construction Materials December 2024 21
Publikováno v:
In Advanced Engineering Informatics October 2024 62 Part B
Autor:
Qian, Kang, Yang, Peng, Li, Yixian, Meng, Ran, Cheng, Yunlong, Zhou, Lingling, Wu, Jing, Xu, Shuting, Bao, Xiaoyan, Guo, Qian, Wang, Pengzhen, Xu, Minjun, Sheng, Dongyu, Zhang, Qizhi
Publikováno v:
In Asian Journal of Pharmaceutical Sciences August 2024 19(4)
Secure multi-party computation enables multiple mutually distrusting parties to perform computations on data without revealing the data itself, and has become one of the core technologies behind privacy-preserving machine learning. In this work, we p
Externí odkaz:
http://arxiv.org/abs/2109.11726