precision device
Recently Published Documents


TOTAL DOCUMENTS

29
(FIVE YEARS 7)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Vol 2131 (2) ◽  
pp. 022061
Author(s):  
I G Kiselev ◽  
D A Belov

Abstract An urgent task is the development of devices that provide a precision temperature change. The devices used in the real-time polymerase chain reaction method require not only repeated cyclic temperature changes with high accuracy, but also the temperature gradient minimization over the working fluid. In this article, the modeling of the working processes taking place in the thermal block of the device with the previously proposed thermohydraulic system, which ensures the temperature change together with the Peltier elements, is carried out. A mathematical model is formulated and a differential equation, boundary and initial conditions are substantiated. Numerical methods for solving the mathematical model in the Elcut software were applied. An experimental setup was developed and a study of heat exchange processes in the thermal block of a nucleic acid analyzer with a thermohydraulic system was carried out, confirming the adequacy of the developed mathematical model.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Fangzhou Zhu ◽  
Liang Liu ◽  
Simin Hu ◽  
Ting Lv ◽  
Renjun Ye

The widespread application of wireless communication technology brings great convenience to people, but security and privacy problems also arise. To assess and guarantee the security of wireless networks and user devices, discovering and identifying wireless devices become a foremost task. Currently, effective device identification is still a challenging issue, as device fingerprinting requires huge training datasets and is difficult to expand, and rule-based identification is not accurate and reliable enough. In this paper, we propose WND-Identifier, a universal and extensible framework for the identification of wireless devices, which can generate high-precision device labels (vendor, type, and product model) efficiently without user interaction. We first introduce the concept of device-info-related network protocols. WND-Identifier makes full use of the natural language features in such protocol messages and combines with the device description in the welcome page, thereby utilizing extraction rules to generate concrete device labels. Considering that the device information in the protocol messages may be incomplete or forged, we further take advantage of the application logic independence and stability of the device-info-related protocol, so as to build a multiprotocol text classification model, which maps the device to a known label. We conduct experiments in homes and public networks and present three application scenarios to verify the effectiveness of WND-Identifier.


2021 ◽  
Vol 11 (1) ◽  
pp. 122-126
Author(s):  
Svetlana Gazhva ◽  
Roman Gorbatov ◽  
Elena Yakubova ◽  
Ruslan Kasumov ◽  
Natalia Krasnokutskaya

This study proves the necessity of using new minimum intervention tooth-preserving technologies and their implementation methods in hard dental tissue pathology treatment, in particular, wedge-shaped defects within enamel. Personalized approach to choosing the treatment method for this type of pathology is updated. The study prioritizes the pathogenetic mechanisms of this process, taking into account morphofunctional changes in enamel. Changes in architectonics of tooth enamel and its elemental composition are studied and discussed. A method of delivering the medication directly into the lesion is suggested. The objective of this study was to develop a precision device for targeted delivery of medication and creation of isolated reservoirs in the wedge-shaped lesion. Materials: slices of teeth removed due to orthodontic indications. Methods: experimental, analytical, statistical, sociological, electron microscopy. The scientific basis and principles of the research concept are based on the data on microstructural transformations, changes in the elemental composition of the tooth with a wedge-shaped defect. It is proved that oxygenation increases in a wedge-shaped lesion while the amount of fluorine and carbon compounds decreases, leading to the presence of such non-specific microelements as sulfur. The results obtained are the basis for the application of a targeted and personalized algorithm for treating this pathology, using additive technologies and 3D printing


2019 ◽  
Vol 21 (11) ◽  
Author(s):  
S. Askari ◽  
H. Machhadani ◽  
J. Benedikt ◽  
U. Helmersson

Abstract We present a gas-phase process for surface patterning and 3D self-assembly of nanoparticles (NPs) of functional materials such as metals, oxides, and nitrides. The method relies on electrostatic assembly of free-flying NPs with unipolar charge produced in plasma sources. We demonstrate the capability of the process in self-assembly of NPs, with the size in the range 10–60 nm, into arrays of free-standing 3D microstructures with complex morphologies. Considering that the plasma nanoparticle sources are compatible with synthesis of a large library of material NPs, the process introduces a novel approach for 3D printing of various functional NPs, high-precision device integration of NPs on sub-micrometer scales, and large-area parallel surface patterning of NPs.


2017 ◽  
Vol 27 (07) ◽  
pp. 1750103 ◽  
Author(s):  
Lingfeng Liu ◽  
Jun Lin ◽  
Suoxia Miao ◽  
Bocheng Liu

The digital Baker map is widely used in different kinds of cryptosystems, especially for image encryption. However, any chaotic map which is realized on the finite precision device (e.g. computer) will suffer from dynamical degradation, which refers to short cycle lengths, low complexity and strong correlations. In this paper, a novel double perturbation method is proposed for reducing the dynamical degradation of the digital Baker map. Both state variables and system parameters are perturbed by the digital logistic map. Numerical experiments show that the perturbed Baker map can achieve good statistical and cryptographic properties. Furthermore, a new image encryption algorithm is provided as a simple application. With a rather simple algorithm, the encrypted image can achieve high security, which is competitive to the recently proposed image encryption algorithms.


Sign in / Sign up

Export Citation Format

Share Document