نتایج جستجو برای: germinate glass anomalous behavior

تعداد نتایج: 720542  

2009
Siddhartha Chhabra Yan Solihin

Traditional memory systems based on memory technologies such as DRAM are fast approaching their cost and power limits. Alternative memory technologies such as Phase Change Memory (PCM) are being widely researched as a scalable, costand power-efficient alternative for DRAM. However, a PCM memory cell has a limited endurance of 10− 10 writes, resulting in an ideal lifetime of only a few years whi...

Journal: :Physical review letters 2016
M L Ackerman P Kumar M Neek-Amal P M Thibado F M Peeters Surendra Singh

We report subnanometer, high-bandwidth measurements of the out-of-plane (vertical) motion of atoms in freestanding graphene using scanning tunneling microscopy. By tracking the vertical position over a long time period, a 1000-fold increase in the ability to measure space-time dynamics of atomically thin membranes is achieved over the current state-of-the-art imaging technologies. We observe th...

ایمان ضیائیان, , سعید سهیلی, ,

  We have calculated the fission fragment angular anisotropy for 16O + 232Th,12C + 236U , 11B + 237 Np , 14 N + 232 Th , 11B + 235U , 12C + 232Th systems with the saddle point statistical model and compared the fission fragment angular anisotropy for these systems. This comparison was done with two methods a) without neutron correction and b) with neutron correction. Also we studied normal and ...

2014
Edward McFowland Daniel B. Neill Jeff Schneider Roy Maxion

We propose Discovering Novel Anomalous Patterns (DAP), a new method for continual and automated discovery of anomalous patterns in general datasets. Currently, general methods for anomalous pattern detection attempt to identify data patterns that are unexpected as compared to “normal” system behavior. We propose a novel approach for discovering data patterns that are unexpected given a profile ...

Journal: :journal of mechanical research and application 2011
reza eslami farsani seyed mohammad reza khalili vahid daghighi reza fazaeli

the creep behavior of basalt fiber reinforced epoxy (bfre) and glass fiber reinforced epoxy (gfre) composites was studied through tensile testing at high temperature. to study the effect of reinforcing epoxy, the micro glass powder (mgp) was added at various volume percentage into the epoxy resin in bfre composites. the initial strain for all the specimens were evaluated and compared with each ...

2009
Kombaiah Boopathy Douglas C. Hofmann William L. Johnson Upadrasta Ramamurty

A major drawback in using bulk metallic glasses (BMGs) as structural materials is their extremely poor fatigue performance. One way to alleviate this problem is through the composite route, in which second phases are introduced into the glass to arrest crack growth. In this paper, the fatigue crack growth behavior of in situ reinforced BMGs with crystalline dendrites, which are tailored to impa...

2005
Emilio Corchado Álvaro Herrero José Manuel Sáiz

This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behavior patterns and successfully demonstrates that such models respond well to the demands and dynamic features of the problem. It illustrates the effectiveness of neural networks in the field of Intrusion Detection (ID)...

2006
Daniele Posenato Francesca Lanata Daniele Inaudi Ian F. C. Smith

No current methodology for detection of anomalous behavior from continuous measurement data can be reliably applied to complex structures in practical situations. This paper summarizes two methodologies for model-free data interpretation to identify and localize anomalous behavior in civil engineering structures. Two statistical methods i) moving principal component analysis and ii) moving corr...

2014
Binhua Yang Junjie Zhang Lili Hu Liyan Zhang

Energy transfer mechanisms between Er and Pr in Er/Pr codoped germinate glass are investigated in detail. Under 980 nm LD pumping, 2.7 μm fluorescence intensity enhanced greatly. Meanwhile, 1.5 μm lifetime and fluorescence were suppressed deeply due to the efficient energy transfer from Er:I13/2 to Pr:F3,4, which depopulates the I13/2 level and promotes the 2.7 μm transition effectively. The ob...

2016
Abhinav Bhandari

Tools required for the security purposes are firewall, passwords, IDS, IPS for the detection of anomaly and prevent it from sending out the harmful traffic to the network. So, it is very necessary to examine the behavior of traffic that coming to the network and recognize the anomalous behavior. In this paper, statistical based chi-square method is used to detect the anomalous behavior and pred...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید