期刊文献+
共找到2,109篇文章
< 1 2 106 >
每页显示 20 50 100
嵌入式Linux中基于Qt/Embeded触摸屏驱动的设计 被引量:7
1
作者 申伟杰 彭楚武 胡辉红 《中国仪器仪表》 2006年第4期48-51,共4页
本文主要介绍了在嵌入式Linux系统下基于Qt/Embeded的触摸屏驱动的设计,通过对Linux设备驱动和Qt/Embedded设备驱动接口的工作原理和机制介绍,并结合大量源代码进行分析,提出了基于Qt/Embeded的触摸屏驱动的开发方案。
关键词 嵌入式系统 LINUX QT/EMBEDDED 触摸屏 设备驱动
在线阅读 下载PDF
Dragonfang:An Open-Source Embedded Flight Controller with IMU-Based Stabilization for Quadcopter Applications
2
作者 Cosmin Dumitru Emanuel Pantelimon +1 位作者 Alexandru Guzu Georgian Nicolae 《Computers, Materials & Continua》 2026年第4期452-470,共19页
Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.Thi... Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.This paper presents a complete design and implementation of a compact autonomous quadcopter capable of trajectory tracking,object detection,precision landing,and real-time telemetry via long-range communication protocols.The system integrates an onboard flight controller running real-time sensor fusion algorithms,a vision-based detection system on a companion single-board computer,and a telemetry unit using Long Range(LoRa)communication.Extensive flight tests were conducted to validate the system’s stability,communication range,and autonomous capabilities.Potential applications in law enforcement,agriculture,search and rescue,and environmental monitoring are also discussed. 展开更多
关键词 Quadcopter UAV autonomous navigation visual detection sensor fusion TELEMETRY LoRa embedded systems
在线阅读 下载PDF
AI-driven interpretation and prediction of embedded printability based on rheology
3
作者 Xianhao Zhou Zhenrui Zhang +7 位作者 Jintian Yu Lixi Ma Sicheng Ma Bingyan Wu Zixuan Wang Ting Zhang Yongcong Fang Zhuo Xiong 《Bio-Design and Manufacturing》 2026年第1期63-79,I0003-I0012,共27页
Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the ... Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the complex interactions between inks and support baths.Here,we present an artificial intelligence(AI)-driven framework that interprets and predicts embedded printability using rheological data.Using a standardized workflow,we extracted 21 rheological descriptors and established 12 indicators to evaluate structural continuity and geometric fidelity.Interpretable machine learning models revealed that direction-dependent defects are governed by the synergistic interplay among ink yield stress,support bath zero shear viscosity,flow behavior index,and time constant.To enable the prediction of printability in a generalizable manner,we further developed a cascaded neural network,which achieved mean relative prediction errors below 15%across all indicators.Experimental validation using three-dimensional(3 D)-printed constructs and micro-computed tomography(μCT)reconstructions confirmed a strong correlation between predicted and actual fidelity.This work establishes a physics-informed,data-driven paradigm for decoding and optimizing embedded printing,offering broad applicability and providing a robust tool for the rapid pairing of suitable printable ink-support bath combinations. 展开更多
关键词 Embedded bioprinting PRINTABILITY RHEOLOGY Machine learning Neural network
在线阅读 下载PDF
Blockchain-Enabled Trusted Virtual Network Embedding in Intelligent Cyber-Physical Systems
4
作者 Zhu Hailong Huang Tao +2 位作者 Zhang Yi Chen Ning Zhang Peiying 《China Communications》 2026年第1期175-188,共14页
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further... With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate. 展开更多
关键词 blockchain cyber-physical system trusted embedding virtual network
在线阅读 下载PDF
Context-Aware Spam Detection Using BERT Embeddings with Multi-Window CNNs
5
作者 Sajid Ali Qazi Mazhar Ul Haq +3 位作者 Ala Saleh Alluhaidan Muhammad Shahid Anwar Sadique Ahmad Leila Jamel 《Computer Modeling in Engineering & Sciences》 2026年第1期1296-1310,共15页
Spam emails remain one of the most persistent threats to digital communication,necessitating effective detection solutions that safeguard both individuals and organisations.We propose a spam email classification frame... Spam emails remain one of the most persistent threats to digital communication,necessitating effective detection solutions that safeguard both individuals and organisations.We propose a spam email classification frame-work that uses Bidirectional Encoder Representations from Transformers(BERT)for contextual feature extraction and a multiple-window Convolutional Neural Network(CNN)for classification.To identify semantic nuances in email content,BERT embeddings are used,and CNN filters extract discriminative n-gram patterns at various levels of detail,enabling accurate spam identification.The proposed model outperformed Word2Vec-based baselines on a sample of 5728 labelled emails,achieving an accuracy of 98.69%,AUC of 0.9981,F1 Score of 0.9724,and MCC of 0.9639.With a medium kernel size of(6,9)and compact multi-window CNN architectures,it improves performance.Cross-validation illustrates stability and generalization across folds.By balancing high recall with minimal false positives,our method provides a reliable and scalable solution for current spam detection in advanced deep learning.By combining contextual embedding and a neural architecture,this study develops a security analysis method. 展开更多
关键词 E-mail spam detection BERT embedding text classification CYBERSECURITY CNN
在线阅读 下载PDF
A Hybrid Clique-Based Method with Structural Feature Node Extraction for Community Detection in Overlapping Networks
6
作者 Sicheng Ma Lixiang Zhang +3 位作者 Guocai Chen Zeyu Dai Junru Zhu Wei Fang 《Computers, Materials & Continua》 2026年第4期2231-2253,共23页
Community detection is a fundamental problem in network analysis for identifying densely connected node clusters,with successful applications in diverse fields like social networks,recommendation systems,biology,and c... Community detection is a fundamental problem in network analysis for identifying densely connected node clusters,with successful applications in diverse fields like social networks,recommendation systems,biology,and cyberattack detection.Overlapping community detection refers to the case of a node belonging to multiple communities simultaneously,which is a much more meaningful and challenging task.Graph representation learning with Evolutionary Computation has been studied well in overlapping community detection to deal with complex network structures and characteristics.However,most of them focus on searching the entire solution space,which can be inefficient and lead to inadequate results.To overcome the problem,a structural feature node extraction method is first proposed that can effectively map a network into a structural embedding space.Thus,nodes within the network are classified into hierarchical levels based on their structural feature strength,and only nodes with relatively high strength are considered in subsequent search steps to reduce the search space.Then,a maximal-clique representation method is employed on the given vertex set to identify overlapping nodes.A hybrid clique-based multi-objective evolutionary algorithmwith decomposition method is designed to address cliques and the remaining unexplored nodes separately.The number of communities generated with this allocation method is closer to the actual partition count with high division quality.Experimental results on nine usually used real-world networks,five synthetic networks,and two large-scale networks demonstrate the effectiveness of the proposed methodology in terms of community quality and algorithmic efficiency,compared to traditional,MOEA-based,and graph embedding-based community detection algorithms. 展开更多
关键词 Community detection graph embedding multi-objective evolutionary algorithm CLIQUES link strength
在线阅读 下载PDF
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
7
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 Protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
A Ransomware Detection Approach Based on LLM Embedding and Ensemble Learning
8
作者 Abdallah Ghourabi Hassen Chouaib 《Computers, Materials & Continua》 2026年第4期2327-2342,共16页
In recent years,ransomware attacks have become one of the most common and destructive types of cyberattacks.Their impact is significant on the operations,finances and reputation of affected companies.Despite the effor... In recent years,ransomware attacks have become one of the most common and destructive types of cyberattacks.Their impact is significant on the operations,finances and reputation of affected companies.Despite the efforts of researchers and security experts to protect information systems from these attacks,the threat persists and the proposed solutions are not able to significantly stop the spread of ransomware attacks.The latest remarkable achievements of large language models(LLMs)in NLP tasks have caught the attention of cybersecurity researchers to integrate thesemodels into security threat detection.Thesemodels offer high embedding capabilities,able to extract rich semantic representations and paving theway formore accurate and adaptive solutions.In this context,we propose a new approach for ransomware detection based on an ensemblemethod that leverages three distinctLLMembeddingmodels.This ensemble strategy takes advantage of the variety of embedding methods and the strengths of each model.In the proposed solution,each embedding model is associated with an independently trainedMLP classifier.The predictions obtained are then merged using a weighted voting technique,assigning each model an influence proportional to its performance.This approach makes it possible to exploit the complementarity of representations,improve detection accuracy and robustness,and offer a more reliable solution in the face of the growing diversity and complexity of modern ransomware. 展开更多
关键词 Ransomware detection ensemble learning LLM embedding
在线阅读 下载PDF
Hierarchical Attention Transformer for Multivariate Time Series Forecasting
9
作者 Qi Wang Kelvin Amos Nicodemas 《Computers, Materials & Continua》 2026年第5期1849-1868,共20页
Multivariate time series forecasting plays a crucial role in decision-making for systems like energy grids and transportation networks,where temporal patterns emerge across diverse scales from short-term fluctuations ... Multivariate time series forecasting plays a crucial role in decision-making for systems like energy grids and transportation networks,where temporal patterns emerge across diverse scales from short-term fluctuations to long-term trends.However,existing Transformer-based methods often process data at a single resolution or handle multiple scales independently,overlooking critical cross-scale interactions that influence prediction accuracy.To address this gap,we introduce the Hierarchical Attention Transformer(HAT),which enables direct information exchange between temporal hierarchies through a novel cross-scale attention mechanism.HAT extracts multi-scale features using hierarchical convolutional-recurrent blocks,fuses them via temperature-controlled mechanisms,and optimizes gradient flow with residual connections for stable training.Evaluations on eight benchmark datasets show HAT outperforming state-of-the-art baselines,with average reductions of 8.2%in MSE and 7.5%in MAE across horizons,while achieving a 6.1×training speedup over patch-based methods.These advancements highlight HAT’s potential for applications requiring multi-resolution temporal modeling. 展开更多
关键词 Time series forecasting multi-scale temporal modeling cross-scale attention transformer architecture hierarchical embeddings gradient flow optimization
在线阅读 下载PDF
Learning Time Embedding for Temporal Knowledge Graph Completion
10
作者 Jinglu Chen Mengpan Chen +2 位作者 Wenhao Zhang Huihui Ren Daniel Dajun Zeng 《Computers, Materials & Continua》 2026年第2期827-851,共25页
Temporal knowledge graph completion(TKGC),which merges temporal information into traditional static knowledge graph completion(SKGC),has garnered increasing attention recently.Among numerous emerging approaches,transl... Temporal knowledge graph completion(TKGC),which merges temporal information into traditional static knowledge graph completion(SKGC),has garnered increasing attention recently.Among numerous emerging approaches,translation-based embedding models constitute a prominent approach in TKGC research.However,existing translation-based methods typically incorporate timestamps into entities or relations,rather than utilizing them independently.This practice fails to fully exploit the rich semantics inherent in temporal information,thereby weakening the expressive capability of models.To address this limitation,we propose embedding timestamps,like entities and relations,in one or more dedicated semantic spaces.After projecting all embeddings into a shared space,we use the relation-timestamp pair instead of the conventional relation embedding as the translation vector between head and tail entities.Our method elevates timestamps to the same representational significance as entities and relations.Based on this strategy,we introduce two novel translation-based embedding models:TE-TransR and TE-TransT.With the independent representation of timestamps,our method not only enhances capabilities in link prediction but also facilitates a relatively underexplored task,namely time prediction.To further bolster the precision and reliability of time prediction,we introduce a granular,time unit-based timestamp setting and a relation-specific evaluation protocol.Extensive experiments demonstrate that our models achieve strong performance on link prediction benchmarks,with TE-TransR outperforming existing baselines in the time prediction task. 展开更多
关键词 Temporal knowledge graph(TKG) TKG embedding model link prediction time prediction
在线阅读 下载PDF
Extreme Attitude Prediction of Amphibious Vehicles Based on Improved Transformer Model and Extreme Loss Function
11
作者 Qinghuai Zhang Boru Jia +3 位作者 Zhengdao Zhu Jianhua Xiang Yue Liu Mengwei Li 《哈尔滨工程大学学报(英文版)》 2026年第1期228-238,共11页
Amphibious vehicles are more prone to attitude instability compared to ships,making it crucial to develop effective methods for monitoring instability risks.However,large inclination events,which can lead to instabili... Amphibious vehicles are more prone to attitude instability compared to ships,making it crucial to develop effective methods for monitoring instability risks.However,large inclination events,which can lead to instability,occur frequently in both experimental and operational data.This infrequency causes events to be overlooked by existing prediction models,which lack the precision to accurately predict inclination attitudes in amphibious vehicles.To address this gap in predicting attitudes near extreme inclination points,this study introduces a novel loss function,termed generalized extreme value loss.Subsequently,a deep learning model for improved waterborne attitude prediction,termed iInformer,was developed using a Transformer-based approach.During the embedding phase,a text prototype is created based on the vehicle’s operation log data is constructed to help the model better understand the vehicle’s operating environment.Data segmentation techniques are used to highlight local data variation features.Furthermore,to mitigate issues related to poor convergence and slow training speeds caused by the extreme value loss function,a teacher forcing mechanism is integrated into the model,enhancing its convergence capabilities.Experimental results validate the effectiveness of the proposed method,demonstrating its ability to handle data imbalance challenges.Specifically,the model achieves over a 60%improvement in root mean square error under extreme value conditions,with significant improvements observed across additional metrics. 展开更多
关键词 Amphibious vehicle Attitude prediction Extreme value loss function Enhanced transformer architecture External information embedding
在线阅读 下载PDF
Synergistic performance and yield improvement of embedded RRAM product through process optimization in 40 nm CMOS platform
12
作者 Zhenchao Sui Yanqing Wu +1 位作者 Zhichao Lv Xing Zhang 《Journal of Semiconductors》 2026年第3期65-71,共7页
To address the challenges of complexity,power consumption,and cost constraints in traditional display driver integrated circuits(DDICs)caused by external NOR Flash and SRAM,this work proposes an embedded resistive ran... To address the challenges of complexity,power consumption,and cost constraints in traditional display driver integrated circuits(DDICs)caused by external NOR Flash and SRAM,this work proposes an embedded resistive random-access memory(RRAM)integration solution based on a 40 nm high-voltage CMOS logic platform.Targeting the yield fluctuations and stability challenges during RRAM mass production,systematic process optimizations are implemented to achieve synergistic improvements in RRAM performance and yield.Through modifications to the film sputtering and pre-deposition treatment,the withinwafer resistance uniformity(RSU)of the oxygen-deficient layer(ODL)thin film is improved from 11%to 8%,while inter-wafer process stability variation reduces from 23%to below 6%.Consequently,the yield of 8 Mb RRAM embedded mass production products increases from 87%to 98.5%.In terms of device performance,the RRAM demonstrates a fast 4.8 ns read speed,exceptional read disturb immunity of 3×10^(8) cycles at 95℃,10^(3) write/erase endurance cycles for the 1 Mb cells,and data retention of 12.5 years at 125℃.Post high-temperature operating life(HTOL)testing exhibits stable high/low resistance window.This study provides process optimization strategies and a reliability assurance framework for the mass production of highly integrated,low-power embedded RRAM display driver IC. 展开更多
关键词 embedded RRAM 40 nm CMOS display driver IC process uniformity optimization yield improvement
在线阅读 下载PDF
Theoretical Mechanisms of New Quality Productive Forces Reshaping the Rural Division of Labor System
13
作者 Ximing ZHAO Xiejun CHENG 《Asian Agricultural Research》 2026年第2期19-22,29,共5页
In the context of the coordinated pursuit of"carbon peak and neutrality"objectives,alongside the strategy to establish a robust agricultural nation,the economic and social development of rural areas is under... In the context of the coordinated pursuit of"carbon peak and neutrality"objectives,alongside the strategy to establish a robust agricultural nation,the economic and social development of rural areas is undergoing a profound paradigm shift.The traditional rural division of labor pattern,which depends on tangible factors such as land,labor,and capital,has increasingly encountered developmental challenges characterized by diminishing marginal returns and a detrimental cycle of internal competition.The new quality productive force,centered on data,algorithms,green technologies,bioengineering,and clean energy,offers a potential pathway for the rural division of labor system to overcome the"low-level equilibrium".This force is characterized by attributes such as non-exclusivity,replicability,network collaboration,and ecological compatibility.This paper develops a three-dimensional collaborative analytical framework encompassing"technology,institution,and culture".It systematically elucidates the internal logic by which new quality productive forces drive the transformation of the rural division of labor from"quantitative factor matching"to"qualitative structural reorganization"through three principal mechanisms:technology embedding,institutional reconstruction,and cultural coupling.Furthermore,the study proposes corresponding policy recommendations,thereby offering theoretical insights to support the modernization of China s agriculture and rural areas,as well as the development of a strong agricultural country. 展开更多
关键词 New quality productive force Rural division of labor system Technology embedding Institutional reconstruction Cultural coupling
在线阅读 下载PDF
EDESC-IDS:An Efficient Deep Embedded Subspace Clustering-Based Intrusion Detection System for the Internet of Vehicles
14
作者 Lixing Tan Liusiyu Chen +2 位作者 Yang Wang Zhenyu Song Zenan Lu 《Computers, Materials & Continua》 2026年第5期997-1020,共24页
Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,ex... Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,existing unsupervised learning methods suffer from insufficient temporal and spatial constraints on shallow features,resulting in fragmented feature representations that compromise model stability and accuracy.To improve the extraction of valuable features,this paper investigates the influence of clustering constraints on shallow feature convergence paths at the model level and further proposes an end-to-end intrusion detection system based on efficient deep embedded subspace clustering(EDESC-IDS).Following the standard learning approach,continuous messages are encoded into two-dimensional data frames via a frame builder,which are then input into an extended convolutional autoencoder for extracting shallow features from high-dimensional data.On this basis,the dual constraints of these output features and the embedding clustering module facilitate end-to-end training of the EDESC-IDS in various attack scenarios.Extensive experimental results show that such a system exhibits significant detection performance on four types of attack datasets,including DoS,Gear,Fuzzy,and RPM,with precision,recall,and F1 scores consistently above 97.79%,while maintaining a false negative rate(FNR)and an error rate(ER)below 2.22%. 展开更多
关键词 Internet of vehicles control area network anomaly detection unsupervised learning deep embedded subspace clustering extended convolutional autoencoder
在线阅读 下载PDF
Optimum Operation of Low-Voltage AC/DC Distribution Areas with Embedded DC Interconnections under Three-Phase Unbalanced Compensation Conditions
15
作者 Zhukui Tan Dacheng Zhou +4 位作者 Song Deng Jikai Li Zhuang Wu Qihui Feng Xuan Zhang 《Energy Engineering》 2026年第3期81-95,共15页
This paper presents an optimal operation method for embedded DC interconnections based on low-voltage AC/DC distribution areas(EDC-LVDA)under three-phase unbalanced compensation conditions.It can optimally determine t... This paper presents an optimal operation method for embedded DC interconnections based on low-voltage AC/DC distribution areas(EDC-LVDA)under three-phase unbalanced compensation conditions.It can optimally determine the transmission power of the DC and AC paths to simultaneously improve voltage quality and reduce losses.First,considering the embedded interconnected,unbalanced power structure of the distribution area,a power flow calculation method for EDC-LVDA that accounts for three-phase unbalanced compensation is introduced.This method accurately describes the power flow distribution characteristics under both AC and DC power allocation scenarios.Second,an optimization scheduling model for EDC-LVDA under three-phase unbalanced conditions is developed,incorporating network losses,voltage quality,DC link losses,and unbalance levels.The proposed model employs an improved particle swarm optimization(IPSO)two-layer algorithm to autonomously select different power allocation coefficients for the DC link and AC section under various operating conditions.This enables embedded economic optimization scheduling while maintaining compensation for unbalanced conditions.Finally,a case study based on the IEEE 13-node system for EDC-LVDA is conducted and tested.The results show that the proposed optimal operation method achieves a 100%voltage compliance rate and reduces network losses by 13.8%,while ensuring three-phase power balance compensation.This provides a practical solution for the modernization and upgrading of low-voltage power grids. 展开更多
关键词 Power loss optimization low-voltage AC/DC distribution areas embedded DC interconnections
在线阅读 下载PDF
Tensor Low-Rank Orthogonal Compression for Convolutional Neural Networks
16
作者 Yaping He Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期227-229,共3页
Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression... Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression is crucial for deploying deep neural network(DNN)models on resource-constrained embedded devices. 展开更多
关键词 model compression convolutional neural network cnn which tensor low rank orthogonal compression deep neural network dnn models embedded devices convolutional neural networks
在线阅读 下载PDF
Metal‐Reduction‐Induced Dechlorination Coupling for Constructing All‐Inorganic Crosslinked Cyclotriphosphazene Networks With In Situ Metal Embedding
17
作者 Haoxiang Wen Hao Wang +6 位作者 Xuanbing Yao Birui Li Bo Pang Miao Zhang Lingjie Meng Zhenjiang Cao Daquan Wang 《cMat》 2026年第1期16-23,共8页
The metal‐reduction‐induced dechlorination coupling(MR-DC)strategy enables the first successful synthesis of an all‐inorganic crosslinked phosphazene network(aPN)from hexachlorocyclotriphosphazene(HCCP)under mild r... The metal‐reduction‐induced dechlorination coupling(MR-DC)strategy enables the first successful synthesis of an all‐inorganic crosslinked phosphazene network(aPN)from hexachlorocyclotriphosphazene(HCCP)under mild reaction conditions.Using Cu as a model,the resulting Cu-aPN(copper‐embedded all‐inorganic phosphazene network)retains the intrinsic N_(3)P_(3)backbone and exhibits an amorphous structure where Cu species are uniformly anchored at dense P/N coordination sites of the network.Time of flight secondary ion mass spectrometry(TOF‐SIMS)and X‐ray diffraction(XRD)reveal a gradual CuCl‐to‐CuO phase conversion during ammonia treatment,which effectively ensures the structural stability of the phosphazene framework.In 1 M KOH,Cu-aPN delivers an overpotential of 280 mV at 10 mA cm^(−2)and a Tafel slope of 48 mV dec^(−1),markedly outperforming Ga-aPN.In situ Raman and density functional theory(DFT)analyses indicate stronger Cu-P/N coordination coupling that lowers the*OH formation barrier(0.39 vs.0.88 eV for Ga).This MR-DC route furnishes a general and versatile pathway for constructing metal‐embedded all‐inorganic phosphazene frameworks with tunable coordination environments for advanced electrocatalytic applications. 展开更多
关键词 amorphous structure crosslinked phosphazene network apn all inorganic crosslinked cyclotriphosphazene networks electrocatalytic applications flight secondary i situ metal embedding structural stability metal reduction induced dechlorination coupling
在线阅读 下载PDF
基于DCNN-Transformer模型的XSS攻击检测方法 被引量:1
18
作者 何志伟 高大鹏 《信息技术》 2025年第3期93-100,共8页
为进一步提高XSS攻击的检测效果,文中提出一种基于DCNN-Transformer模型的XSS攻击检测方法。通过对收集的数据依次进行解码、规范化、分词、TF-IDF选词、构建词典和编码预处理,用于模型的训练和测试。文中提出的DCNN-Transformer模型引... 为进一步提高XSS攻击的检测效果,文中提出一种基于DCNN-Transformer模型的XSS攻击检测方法。通过对收集的数据依次进行解码、规范化、分词、TF-IDF选词、构建词典和编码预处理,用于模型的训练和测试。文中提出的DCNN-Transformer模型引入了Embedding层,还综合了一维深度卷积神经网络快速处理序列数据和Transformer模型并行处理序列数据及学习序列元素间依赖关系的能力。实验结果表明,DCNN-Transformer模型相比于LSTM、GRU、DCNN和DCNN-GRU模型,收敛速度最快且效果更优,准确率、召回率和f1值最高,模型轻量、检测速度快,综合表现显著优于其他4个模型,为XSS攻击检测提供了一个更优的方法。 展开更多
关键词 XSS攻击检测 卷积神经网络 Transformer Embedding层 TF-IDF
在线阅读 下载PDF
Embedded solar adaptive optics telescope:achieving compact integration for high-efficiency solar observations 被引量:1
19
作者 Naiting Gu Hao Chen +11 位作者 Ao Tang Xinlong Fan Carlos Quintero Noda Yawei Xiao Libo Zhong Xiaosong Wu Zhenyu Zhang Yanrong Yang Zao Yi Xiaohu Wu Linhai Huang Changhui Rao 《Opto-Electronic Advances》 2025年第5期60-74,共15页
Adaptive optics(AO)has significantly advanced high-resolution solar observations by mitigating atmospheric turbulence.However,traditional post-focal AO systems suffer from external configurations that introduce excess... Adaptive optics(AO)has significantly advanced high-resolution solar observations by mitigating atmospheric turbulence.However,traditional post-focal AO systems suffer from external configurations that introduce excessive optical surfaces,reduced light throughput,and instrumental polarization.To address these limitations,we propose an embedded solar adaptive optics telescope(ESAOT)that intrinsically incorporates the solar AO(SAO)subsystem within the telescope's optical train,featuring a co-designed correction chain with a single Hartmann-Shack full-wavefront sensor(HS f-WFS)and a deformable secondary mirror(DSM).The HS f-WFS uses temporal-spatial hybrid sampling technique to simultane-ously resolve tip-tilt and high-order aberrations,while the DSM performs real-time compensation through adaptive modal optimization.This unified architecture achieves symmetrical polarization suppression and high system throughput by min-imizing optical surfaces.A 600 mm ESAOT prototype incorporating a 12×12 micro-lens array HS f-WFS and 61-actuator piezoelectric DSM has been developed and successfully conducted on-sky photospheric observations.Validations in-cluding turbulence simulations,optical bench testing,and practical observations at the Lijiang observatory collectively confirm the system's capability to maintain aboutλ/10 wavefront error during active region tracking.This architectural breakthrough of the ESAOT addresses long-standing SAO integration challenges in solar astronomy and provides scala-bility analyses confirming direct applicability to the existing and future large solar observation facilities. 展开更多
关键词 embedded solar adaptive optics telescope(ESAOT) Hartmann-Shack full-wavefront sensor(HS f-WFS) deformable secondary mirror(DSM) high-resolution solar observations solar telescopes
在线阅读 下载PDF
基于元建模的实时系统模型转换方法研究 被引量:8
20
作者 刘亚萍 黄志球 祝义 《小型微型计算机系统》 CSCD 北大核心 2010年第11期2145-2153,共9页
通过模型转换将UML模型转换为形式化模型并进行模型检验是软件工程研究领域的热点,然而传统的模型转换多是ad-hoc式的,转换规则复杂且难以重用.本文针对这一研究现状,通过元建模实现MARTE到时间自动机模型的转换,从而提出一种基于元建... 通过模型转换将UML模型转换为形式化模型并进行模型检验是软件工程研究领域的热点,然而传统的模型转换多是ad-hoc式的,转换规则复杂且难以重用.本文针对这一研究现状,通过元建模实现MARTE到时间自动机模型的转换,从而提出一种基于元建模的实时系统模型转换方法.该方法有效的分离了语法转换与语义转换,框架标准的支撑使得转换易于重用.最后通过一个实例来说明该方法的可行性与有效性. 展开更多
关键词 模型转换 MARTE(modeling and analysis of REAL TIME and embeded systems) 模型验证 时间自动机
在线阅读 下载PDF
上一页 1 2 106 下一页 到第
使用帮助 返回顶部