期刊文献+
共找到75,798篇文章
< 1 2 250 >
每页显示 20 50 100
使用Monte-Carlo模拟和实例数据验证基于回归的定量一致性评价样本量计算公式
1
作者 陈飞龙 曹雅琦 +2 位作者 于淼 丁佳琪 徐涛 《中国卫生统计》 北大核心 2026年第1期2-6,共5页
目的验证基于回归的定量指标一致性评价样本量计算公式在不同正态分布、不同变异程度以及不同一致性总体条件下的适用性。方法事先设定检验效能的预期水平。使用Monte-Carlo模拟法,通过设定不同的总体参数,产生相应的虚拟数据总体。随后... 目的验证基于回归的定量指标一致性评价样本量计算公式在不同正态分布、不同变异程度以及不同一致性总体条件下的适用性。方法事先设定检验效能的预期水平。使用Monte-Carlo模拟法,通过设定不同的总体参数,产生相应的虚拟数据总体。随后,分别从虚拟总体中抽取小样本进行预试验,以计算样本量,并在相应样本量条件下从虚拟总体中重复1000次抽样以获得模拟把握度。此外,为了获得模拟把握度的分布情况,重复进行100次模拟验证过程,并将模拟把握度的分布情况与预期水平进行比较。同时,本研究还将使用一个实例数据以验证回归法样本量公式在实际应用中的适用性。结果固定参数Monte-Carlo模拟的结果显示,无论预期把握度设定为80%还是90%,均有预期数量的模拟验证试验的把握度达到预设水平。在不断改变总体参数设定条件下,模拟验证试验把握度的第25百分位数水平均稳定在预期把握度附近。实例数据验证进一步证明了回归法样本量公式在实际应用中的适用性。总体而言,基于回归的定量一致性评价样本量计算公式在不同数据条件下均展示了良好的稳健性。结论本研究进一步完善了基于回归的定量一致性评价的方法学体系,为该方法的正确应用及推广提供了理论支持。 展开更多
关键词 定量指标 回归 一致性评价 样本量 monte-carlo模拟
暂未订购
基于Monte-Carlo的弃渣场可靠度分析
2
作者 董福 李鹏 王武钢 《陕西水利》 2026年第2期6-9,共4页
弃渣在堆积过程中由于其颗粒大小不均匀,致使其不同部位取样测得的参数值具有空间差异性。为研究降雨对紫阳县一处弃渣场稳定性的影响,在现场勘查及取样试验的基础上考虑弃渣在堆积过程中内摩擦角和粘聚力的随机性,并借助Geo-Studio软... 弃渣在堆积过程中由于其颗粒大小不均匀,致使其不同部位取样测得的参数值具有空间差异性。为研究降雨对紫阳县一处弃渣场稳定性的影响,在现场勘查及取样试验的基础上考虑弃渣在堆积过程中内摩擦角和粘聚力的随机性,并借助Geo-Studio软件对边坡在不同降雨条件下的稳定性进行可靠度分析。得出不同条件下该边坡失效的概率及稳定系数,以此来弥补单纯数值计算的缺陷,提高边坡稳定性预测的准确性,可为该弃渣场后续治理工程提供一定的参考依据。 展开更多
关键词 弃渣场 可靠度分析 monte-carlo Geo-Studio
在线阅读 下载PDF
ASME Code Case 3029高温许用压应力计算方法的介绍及工程应用
3
作者 马忠明 《化工设备与管道》 北大核心 2026年第1期24-30,共7页
介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及... 介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。 展开更多
关键词 code Case 3029 蠕变屈曲 失稳 压力容器 许用应力
在线阅读 下载PDF
ChatGPT+VS Code在高中地理地图开发中的应用——以“国内人口迁移”为例
4
作者 王凌宇 白絮飞 《中国信息技术教育》 2026年第1期81-84,共4页
人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为... 人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为“助教者”,若教师生成教学设计的指令过于宽泛,结果易出现“张冠李戴”或“似是而非”等问题,需教师二次加工。相反,若教师能针对教学设计中的特定模块提供详细准确的指令,人工智能技术输出的结果将更具准确性和实用性,展现出更高研究价值。因此,本文从人工智能技术“助教者”身份出发,摒弃传统完整的教学过程设计,聚焦备课中的“地图开发”模块,采用由人工智能技术生成地图代码并通过第三方软件运行的方式,实现快速辅助教师生成所需地图的目标,提升备课效率与教学质量。 展开更多
关键词 ChatGPT VS code 人工智能技术 中学地理 地图开发
在线阅读 下载PDF
基于Monte-Carlo的菠萝根区氧气模拟与缺氧时空特征识别
5
作者 汪春 于珍珍 +3 位作者 王宏轩 李海亮 孙海天 赵云龙 《热带作物学报》 北大核心 2026年第2期417-432,共16页
为识别菠萝根区缺氧时段、掌握氧气变化机制,并为增氧灌溉技术管理与土壤调控提供充足的反应时间,以应对菠萝根区含氧量的异常波动,本研究基于Monte-Carlo方法,融合多物理场过程,构建土壤氧气扩散-消耗耦合模型,利用参数扰动与不确定性... 为识别菠萝根区缺氧时段、掌握氧气变化机制,并为增氧灌溉技术管理与土壤调控提供充足的反应时间,以应对菠萝根区含氧量的异常波动,本研究基于Monte-Carlo方法,融合多物理场过程,构建土壤氧气扩散-消耗耦合模型,利用参数扰动与不确定性采样,引入实测边界条件与深度分层的初始浓度设定,结合多层土壤剖面监测数据,对壤土、沙土、黏土三类典型土壤在10~40 cm深度范围内的含氧量变化进行模拟,建立了相应的模拟体系。然后通过2025年春季田间试验数据对模型进行验证。结果表明:该模型在多种土壤与深度条件下均具备较强预测能力(R^(2)>0.95,RMSE最低为0.214 mol/m^(3)),误差分布随土层深度增加略有波动,但整体维持在可接受范围。进一步研究表明,该模型能够成功识别灌溉与降雨事件后3~12 h内易发生缺氧的时段,在缺氧识别中,模型对临界浓度(1.5 mol/m^(3))以下的响应判断准确率超过90%。上述结果验证所构建模型在根区氧气动态模拟与风险预警中的有效性,研究结果旨在为菠萝大田智能化增氧管理提供理论依据与预测基础。 展开更多
关键词 菠萝根区 缺氧识别 monte-carlo 不确定性采样 氧气扩散-消耗耦合
在线阅读 下载PDF
VS Code软件技术在红绿彩文化网站构建中的应用研究
6
作者 李萍 杨冬梅 《办公自动化》 2026年第6期1-3,共3页
红绿彩文化作为中华民族传统文化的重要组成部分,有着悠久的历史和独特的艺术价值。其兴起打破以往以单色釉为主导的高温烧瓷的局面,在历史的长河中不断地推陈出新。然而,在现代社会中,随着文化的多元化和工业化的冲击,红绿彩文化发展... 红绿彩文化作为中华民族传统文化的重要组成部分,有着悠久的历史和独特的艺术价值。其兴起打破以往以单色釉为主导的高温烧瓷的局面,在历史的长河中不断地推陈出新。然而,在现代社会中,随着文化的多元化和工业化的冲击,红绿彩文化发展面临着诸多挑战。在此背景下,借助VS Code以及JavaScript相关技术,对红绿彩文化网站进行深化设计与研究,为构建交互型红绿彩文化网站提供借鉴,同时也将为传播红绿彩文化提供具体可行的方法。 展开更多
关键词 红绿彩文化 JAVASCRIPT VS code 网站
在线阅读 下载PDF
Rateless Polar Codes with Unequal Error Protection Property
7
作者 Cui Chen Xiang Wei +1 位作者 Ma Siwei Guo Qing 《China Communications》 2026年第1期10-23,共14页
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom... Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency. 展开更多
关键词 matrix extension polar codes rateless coding unequal error protection
在线阅读 下载PDF
CoDefense:面向对抗性攻击的多粒度代码归一化防御方法
8
作者 田朝 邝仕琦 +2 位作者 闫明 王海弛 陈俊洁 《软件学报》 北大核心 2026年第3期1170-1196,共27页
近年来,以代码为输入的预训练模型在许多基于代码的关键任务中取得了显著的性能优势,但这类模型可能容易受到通过保留语义的代码转换实现的对抗性攻击,这种攻击会显著降低模型鲁棒性并可能进一步引发严重的安全问题.尽管已有对抗性训练... 近年来,以代码为输入的预训练模型在许多基于代码的关键任务中取得了显著的性能优势,但这类模型可能容易受到通过保留语义的代码转换实现的对抗性攻击,这种攻击会显著降低模型鲁棒性并可能进一步引发严重的安全问题.尽管已有对抗性训练方法通过生成对抗性样本作为增强数据来提升模型鲁棒性,但其有效性和效率在面对不同粒度和策略的未知对抗性攻击时仍显不足.为了克服这一局限性,提出一种基于代码归一化的预训练代码模型对抗性防御方法CoDefense.该方法的核心思想是作为代码模型的一个前置数据处理模块,通过多粒度代码归一化技术,对训练阶段的原始训练集和推理阶段的代码输入进行归一化预处理,以避免潜在对抗性样本对代码模型的影响.这种策略能够高效地防御不同粒度和策略的对抗性攻击.为验证CoDefense的有效性和效率,针对3种先进的对抗性攻击方法、3种流行的预训练代码模型以及3个基于代码的分类和生成任务,共设计了27个实验场景进行全面的实证研究.实验结果表明,CoDefense相较于最先进的对抗性训练方法,在防御对抗性攻击方面显著提升了有效性和效率.具体而言,CoDefense平均成功防御了95.33%的对抗性攻击.同时,在时间效率上,CoDefense相对于对抗性训练方法平均提升了85.86%. 展开更多
关键词 对抗性防御 预训练代码模型 深度学习
在线阅读 下载PDF
Impact of flex power on inter-and intra-differential code bias variation
9
作者 Jiayu Li Yan Xiang +1 位作者 Chengeng Su Xiaolin Ji 《Geodesy and Geodynamics》 2026年第2期154-167,共14页
Differential Code Bias(DCB)is the time delays between two different GNSS signals,which is crucial for GNSS positioning.Previous studies have shown that it can be significantly affected by the flex power operations in ... Differential Code Bias(DCB)is the time delays between two different GNSS signals,which is crucial for GNSS positioning.Previous studies have shown that it can be significantly affected by the flex power operations in satellites.This study proposes a 15-min short-term DCB estimation method to analyze flex power's impact on DCB variations.The method jointly estimates satellite DCB,receiver DCB,and ionospheric parameters using over 300 MGEX stations.We examined three representative flex power events in 2024,achieving average internal RMS values of 0.042 ns and 0.0068 ns for inter-frequency and intra-frequency scenarios respectively.Results show that intra-frequency DCB exhibits clear shift biases synchronized with flex power state transitions while maintaining stability within 0.20 ns during nontransition periods.No definitive impact on inter-frequency DCB was observed at current estimation precision levels. 展开更多
关键词 Differential code bias Flex power GNSS
原文传递
Efficient Polar Codes with Low Complexity for Correcting Insertions/Deletions in DPPM
10
作者 Li Leran Liu Yuan +2 位作者 Yuan Ye Xiahou Wenqian Chen Maonan 《China Communications》 2026年第1期24-33,共10页
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv... Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance. 展开更多
关键词 DPPM insertions/deletions polar codes SC decoding
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
11
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
12
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Improving MCUCN code to simulate ultracold neutron storage and transportation in superfluid^(4)He
13
作者 Xue-Fen Han Fei Shen +6 位作者 Bin Zhou Xiao-Xiao Cai Tian-Cheng Yi Zhi-Liang Hu Song-Lin Wang Tian-Jiao Liang Robert Golub 《Nuclear Science and Techniques》 2026年第3期235-246,共12页
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ... The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ. 展开更多
关键词 Ultracold neutron Storage TRANSPORTATION Improved MCUCN code Upscattering effect Absorption by^(3)He
在线阅读 下载PDF
TLS Blind Recognition Algorithm of LDPC Codes
14
作者 Ning Xiaoyan Sun Jingjing +1 位作者 Wang Zhenduo Sun Zhiguo 《China Communications》 2026年第2期112-121,共10页
Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively ... Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively high row weights,the existing blind recognition algorithms based on a candidate set generally perform worse.In this paper,we propose a blind recognition method for LDPC codes,called as tangent function assisted least square(TLS)method,which improves recognition performances by constructing a new cost function.To characterize the constraint degree among received vectors and paritycheck vectors,a feature function based on tangent function is constructed in the proposed algorithm.A cost function based on least square method is also established according to the feature function values satisfying the parity-check relationship.Moreover,the minimum average value in TLS is obtained on the candidate set.Numerical analysis and simulation results show that recognition performances of TLS algorithm are consistent with theoretical results.Compared with existing algorithms,the proposed method possesses better recognition performances. 展开更多
关键词 blind recognition cost function least square low-density parity-check(LDPC)codes
在线阅读 下载PDF
Beyond Accuracy:Evaluating and Explaining the Capability Boundaries of Large Language Models in Syntax-Preserving Code Translation
15
作者 Yaxin Zhao Qi Han +1 位作者 Hui Shu Yan Guang 《Computers, Materials & Continua》 2026年第2期1371-1394,共24页
LargeLanguageModels(LLMs)are increasingly appliedinthe fieldof code translation.However,existing evaluation methodologies suffer from two major limitations:(1)the high overlap between test data and pretraining corpora... LargeLanguageModels(LLMs)are increasingly appliedinthe fieldof code translation.However,existing evaluation methodologies suffer from two major limitations:(1)the high overlap between test data and pretraining corpora,which introduces significant bias in performance evaluation;and(2)mainstream metrics focus primarily on surface-level accuracy,failing to uncover the underlying factors that constrain model capabilities.To address these issues,this paper presents TCode(Translation-Oriented Code Evaluation benchmark)—a complexity-controllable,contamination-free benchmark dataset for code translation—alongside a dedicated static feature sensitivity evaluation framework.The dataset is carefully designed to control complexity along multiple dimensions—including syntactic nesting and expression intricacy—enabling both broad coverage and fine-grained differentiation of sample difficulty.This design supports precise evaluation of model capabilities across a wide spectrum of translation challenges.The proposed evaluation framework introduces a correlation-driven analysis mechanism based on static program features,enabling predictive modeling of translation success from two perspectives:Code Form Complexity(e.g.,code length and character density)and Semantic Modeling Complexity(e.g.,syntactic depth,control-flow nesting,and type system complexity).Empirical evaluations across representative LLMs—including Qwen2.5-72B and Llama3.3-70B—demonstrate that even state-of-the-art models achieve over 80% compilation success on simple samples,but their accuracy drops sharply below 40% on complex cases.Further correlation analysis indicates that Semantic Modeling Complexity alone is correlated with up to 60% of the variance in translation success,with static program features exhibiting nonlinear threshold effects that highlight clear capability boundaries.This study departs fromthe traditional accuracy-centric evaluation paradigm and,for the first time,systematically characterizes the capabilities of large languagemodels in translation tasks through the lens of programstatic features.The findings provide actionable insights for model refinement and training strategy development. 展开更多
关键词 Large language models(LLMs) code translation compiler testing program analysis complexity-based evaluation
在线阅读 下载PDF
DAYU3D:a modern code for HTGR thermal-hydraulic design and accident analysis
16
作者 Hao-Jie Zhang Yu-Tong Wen +2 位作者 Ding She Yan-Hua Zheng Lei Shi 《Nuclear Science and Techniques》 2026年第5期345-360,共16页
DAYU3D is a modern three-dimensional(3D)computer code for thermal-hydraulic design and accident analysis in hightemperature gas-cooled reactors(HTGRs),developed by the Institute of Nuclear and New Energy Technology(IN... DAYU3D is a modern three-dimensional(3D)computer code for thermal-hydraulic design and accident analysis in hightemperature gas-cooled reactors(HTGRs),developed by the Institute of Nuclear and New Energy Technology(INET)at Tsinghua University.Compared to the traditional codes like TINTE,the DAYU3D code has advantages due to its refined framework,improved models,and more efficient algorithms.It is able to simulate the continuous movement of control rods and is more rigorous in treating radiation heat transfer and the break mass flow.Advanced computational methods significantly improve the computational efficiency of DAYU3D,achieving a time reduction of over 60%compared to TINTE.Extensive verification and validation with more than 100 cases demonstrate that DAYU3D is promising for HTGR 3D thermal-hydraulic design and accident analyses. 展开更多
关键词 High-temperature gas-cooled reactor Thermal-hydraulic design and accident analysis code THREE-DIMENSIONAL DAYU3D
在线阅读 下载PDF
Integrating Attention Mechanism with Code Structural Affinity and Execution Context Correlation for Automated Bug Repair
17
作者 Jinfeng Ji Geunseok Yang 《Computers, Materials & Continua》 2026年第3期1708-1725,共18页
Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite cons... Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness. 展开更多
关键词 Automated bug repair autoencoder algorithm buggy code analysis stack trace similarity machine learning for debugging
在线阅读 下载PDF
Cognitive Erasure-Coded Data Update and Repair for Mitigating I/O Overhead
18
作者 Bing Wei Ming Zhong +2 位作者 Qian Chen Yi Wu Yubin Li 《Computers, Materials & Continua》 2026年第2期1706-1725,共20页
In erasure-coded storage systems,updating data requires parity maintenance,which often leads to significant I/O amplification due to“write-after-read”operations.Furthermore,scattered parity placement increases disk ... In erasure-coded storage systems,updating data requires parity maintenance,which often leads to significant I/O amplification due to“write-after-read”operations.Furthermore,scattered parity placement increases disk seek overhead during repair,resulting in degraded system performance.To address these challenges,this paper proposes a Cognitive Update and Repair Method(CURM)that leverages machine learning to classify files into writeonly,read-only,and read-write categories,enabling tailored update and repair strategies.For write-only and read-write files,CURM employs a data-differencemechanism combined with fine-grained I/O scheduling to minimize redundant read operations and mitigate I/O amplification.For read-write files,CURM further reserves adjacent disk space near parity blocks,supporting parallel reads and reducing disk seek overhead during repair.We implement CURM in a prototype system,Cognitive Update and Repair File System(CURFS),and conduct extensive experiments using realworld Network File System(NFS)and Microsoft Research(MSR)workloads on a 25-node cluster.Experimental results demonstrate that CURMimproves data update throughput by up to 82.52%,reduces recovery time by up to 47.47%,and decreases long-term storage overhead by more than 15% compared to state-of-the-art methods including Full Logging(FL),ParityLogging(PL),ParityLoggingwithReservedspace(PLR),andPARIX.These results validate the effectiveness of CURM in enhancing both update and repair performance,providing a scalable and efficient solution for large-scale erasure-coded storage systems. 展开更多
关键词 Erasure coding machine learning cognitive update and repair I/O amplification mitigation seekefficient recovery
在线阅读 下载PDF
应用Monte-Carlo模拟的MSD结构失效概率预测方法 被引量:1
19
作者 卢翔 宋挺 刘兆鹏 《机械设计与制造》 北大核心 2025年第7期354-359,共6页
针对多部位损伤(Multiple Site Damage,MSD)结构安全性评估问题,通过Monte-Carlo方法对MSD结构的失效概率进行预测和分析。首先,基于多孔铝板的多裂纹萌生试验,得出裂纹萌生寿命服从对数正态分布,为多裂纹萌生分析提供支持;通过多孔铝... 针对多部位损伤(Multiple Site Damage,MSD)结构安全性评估问题,通过Monte-Carlo方法对MSD结构的失效概率进行预测和分析。首先,基于多孔铝板的多裂纹萌生试验,得出裂纹萌生寿命服从对数正态分布,为多裂纹萌生分析提供支持;通过多孔铝板的剩余强度试验得到铆钉孔直径、铆钉孔间距和裂纹萌生位置对结构剩余强度均有一定影响。其次,通过对裂纹萌生寿命分布进行随机抽样生成初始裂纹并使用组合法结合Paris公式,实现多裂纹随机扩展的模拟;在试验数据基础上,对传统的Irwin塑性区连通准则进行改进,发现改进的Irwin塑性区连通准则在孔间距大于10mm时的误差大大降低,并结合净截面屈服准则以获得更好的剩余强度预测结果;将随机性的裂纹萌生和扩展过程与确定性的剩余强度预测方法相结合,建立基于Monte-Carlo方法的MSD结构的失效概率预测模型。最后,通过算例分析,该模型能够得到MSD结构的失效概率曲线,实现结构安全性评估。结果表明MSD结构的失效概率会在短时间内迅速增加,需要在裂纹萌生寿命附近进行限制。 展开更多
关键词 结构安全性评估 多部位损伤 剩余强度 monte-carlo方法
在线阅读 下载PDF
基于Monte-Carlo模拟对辽宁高粱镉、铬的健康风险评估 被引量:1
20
作者 彭天舒 吴限鑫 +3 位作者 李丽娜 林秋君 郭春景 王建忠 《现代食品科技》 北大核心 2025年第8期316-325,共10页
采用电感耦合等离子体质谱法(ICP-MS)测定辽宁省五个地区49份高粱样品中Cd、Cr含量,基于蒙特卡罗(Monte-Carlo)模拟评估高粱的非致癌风险指数(HQ)、综合非致癌风险指数(HI)、致癌风险指数(CR)和综合致癌风险指数(TCR),并对存在的健康风... 采用电感耦合等离子体质谱法(ICP-MS)测定辽宁省五个地区49份高粱样品中Cd、Cr含量,基于蒙特卡罗(Monte-Carlo)模拟评估高粱的非致癌风险指数(HQ)、综合非致癌风险指数(HI)、致癌风险指数(CR)和综合致癌风险指数(TCR),并对存在的健康风险进行消费引导。辽宁五个地区49份高粱样品中Cd、Cr含量范围分别为0.002~0.056 mg/kg、0.116~0.782 mg/kg;五个地区高粱对成人的HQ和HI均小于1,CR和TCR均小于1×10^(-4);五个地区高粱对儿童的HQ和HI均小于1,CR小于1×10^(-4),双塔、铁岭地区的TCR小于1×10^(-4),但沈河、建平、阜蒙地区的TCR分别为1.04×10^(-4)、1.16×10^(-4)、1.06×10^(-4),略大于1×10^(-4)。辽宁省五个地区高粱样品的整体污染情况较轻,Cd、Cr含量均符合国家标准;五个地区高粱对成人的HQ、HI、CR和TCR均处于安全水平;五个地区高粱对儿童的HQ、HI和CR均处于安全水平,只有沈河、建平、阜蒙三个地区存在较低的综合致癌风险,但当沈河、建平、阜蒙三个地区暴露频率分别控制在58、52、57 d/a以下时,可规避综合致癌风险。 展开更多
关键词 高粱 重金属 健康风险评估 monte-carlo模拟
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部