期刊文献+
共找到14,683篇文章
< 1 2 250 >
每页显示 20 50 100
A Novel Approach to Estimating Proof Test Coverage for Emergency Shutdown Valves using a Fuzzy Inference System
1
作者 Steve Kriescher Roderick Thomas +2 位作者 Chris Phillips Neil Mac Parthaláin David J.Smith 《Journal of Dynamics, Monitoring and Diagnostics》 2025年第1期44-52,共9页
Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken us... Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken using component failure rate data to predict PTC for a full stroke test and a partial stroke test.Given the subjective and uncertain aspects of the FMEDA approach,specifically the selection of component failure rates and the determination of the probability of detecting failure modes,a Fuzzy Inference System(FIS)was proposed to manage the data,addressing the inherent uncertainties.Fuzzy inference systems have been used previously for various FMEA type assessments,but this is the first time an FIS has been employed for use with FMEDA.ESDV PTC values were generated from both the standard FMEDA and the fuzzy-FMEDA approaches using data provided by FMEDA experts.This work demonstrates that fuzzy inference systems can address the subjectivity inherent in FMEDA data,enabling reliable estimates of ESDV proof test coverage for both full and partial stroke tests.This facilitates optimized maintenance planning while ensuring safety is not compromised. 展开更多
关键词 emergency shutdown valves failure modes effects diagnostics analysis fuzzy inference systems proof test coverage
在线阅读 下载PDF
防寒靴热湿舒适性能的主客观综合评测试点研究
2
作者 弓太生 李文博 +3 位作者 杜美娴 吴婷 周素静 刘世超 《皮革科学与工程》 北大核心 2026年第1期80-87,共8页
【目的】为探究防寒靴整鞋热湿舒适性及鞋帮材料、环境温度对防寒靴热湿舒适性的影响。【方法】使用气候仓模拟0、-5和-10°C三个温度条件,用传感器测量两款防寒靴鞋腔的温度和相对湿度,同时分别采用四点和七点强度等级量表进行闷... 【目的】为探究防寒靴整鞋热湿舒适性及鞋帮材料、环境温度对防寒靴热湿舒适性的影响。【方法】使用气候仓模拟0、-5和-10°C三个温度条件,用传感器测量两款防寒靴鞋腔的温度和相对湿度,同时分别采用四点和七点强度等级量表进行闷湿感和热暖感评价。【结果】在三种环境温度下,气凝胶防寒靴各部位的温度都高于17防寒靴2~4°C。气凝胶防寒靴的相对湿度略高于17防寒靴,17防寒靴的平均吸湿量高于气凝胶防寒靴1.39 g。气凝胶防寒靴的热湿舒适性主观评价优于17防寒靴。【结论】气凝胶保温棉可提高鞋靴的保温性能、减轻鞋靴质量。低温环境下Coolmax做内里材料仍有较好的吸湿排汗能力,可提高防寒靴的湿舒适性能。在防寒靴的热湿舒适性测评中,受试者对潮湿和足部不适的感知与高排汗部位并不对应。 展开更多
关键词 防寒靴 热湿舒适性 鞋腔内温湿度 气候仓 主客观评价 革制品
原文传递
Fool-Proof法在图书馆工作中的应用浅探 被引量:3
3
作者 黄建年 《冶金信息导刊》 2007年第1期36-39,22,共5页
防呆法在企业生产中有大量的应用,在一些大型企业中也取得了显著的效果。作为一个服务部门和信息生产部门,图书馆应用防呆法无疑有助于图书馆的自动化和规范化。根据防呆法原理从10个方面详细列举了防呆法在图书馆的可能应用。
关键词 Fool-proof PKKA-YOKE 愚巧法 防错法 图书馆
在线阅读 下载PDF
A Blockchain-Based Efficient Verification Scheme for Context Semantic-Aware Ciphertext Retrieval
4
作者 Haochen Bao Lingyun Yuan +2 位作者 Tianyu Xie Han Chen Hui Dai 《Computers, Materials & Continua》 2026年第1期550-579,共30页
In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic q... In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic queries.Additionally,they typically rely on honest but curious cloud servers,which introduces the risk of repudiation.Furthermore,the combined operations of search and verification increase system load,thereby reducing performance.Traditional verification mechanisms,which rely on complex hash constructions,suffer from low verification efficiency.To address these challenges,this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification.Building on existing single and multi-keyword search methods,the scheme uses vector models to semantically train the dataset,enabling it to retain semantic information and achieve context-aware encrypted retrieval,significantly improving search accuracy.Additionally,a blockchain-based updatable master-slave chain storage model is designed,where the master chain stores encrypted keyword indexes and the slave chain stores verification information generated by zero-knowledge proofs,thus balancing system load while improving search and verification efficiency.Finally,an improved non-interactive zero-knowledge proof mechanism is introduced,reducing the computational complexity of verification and ensuring efficient validation of search results.Experimental results demonstrate that the proposed scheme offers stronger security,balanced overhead,and higher search verification efficiency. 展开更多
关键词 Searchable encryption blockchain context semantic awareness zero-knowledge proof
在线阅读 下载PDF
电信网络诈骗案件“综合认定”犯罪数额的机理、风险与防范
5
作者 刘甜甜 《法治研究》 北大核心 2026年第1期121-132,共12页
综合认定强调对间接证据、逻辑法则与经验法则的运用以及多元证据分析方法优势的发挥,有效实现了对印证证明的纠偏和优化,成为解决电信网络诈骗案件犯罪数额认定难题的重要方法,在打击电信网络诈骗、推动我国刑事证明体系走向层次化等... 综合认定强调对间接证据、逻辑法则与经验法则的运用以及多元证据分析方法优势的发挥,有效实现了对印证证明的纠偏和优化,成为解决电信网络诈骗案件犯罪数额认定难题的重要方法,在打击电信网络诈骗、推动我国刑事证明体系走向层次化等方面发挥了积极作用。但与此同时,综合认定却与证明标准降低、证明方法被错误扩充等潜在风险相伴生。基于此,除了在电信网络诈骗案件中始终坚守证明标准、明确推定与概率型抽样取证不应被视为综合认定的具体方法外,还需要通过细化综合认定规则、吸纳新证据类型以及强化法官与被追诉人释明说理义务等进行体系化完善。 展开更多
关键词 电信网络诈骗 综合认定 印证证明 证明标准 释明说理义务
在线阅读 下载PDF
电影《相助》片尾曲《The Living Proof》的功能文体学分析
6
作者 盛桂兰 《兰州教育学院学报》 2018年第10期98-100,共3页
电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系... 电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系统功能语法理论为指导,从语境、经验功能、人际功能着手解析电影《相助》片尾曲《The Living Proof》,以期丰富系统功能语法的研究内容,为电影歌词的分析提供新的视角,帮助观影者深度理解影片主题。 展开更多
关键词 《相助》 《The LIVING proof 系统功能语法
在线阅读 下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
7
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
在线阅读 下载PDF
区块链电子证据与最佳证据规则的适用冲突及其应对
8
作者 龚善要 《河北法学》 北大核心 2026年第2期123-139,共17页
区块链电子证据不具有原始件证据属性,不能等同于证据原件,其本质是借助哈希值计算与分布式存储实现对电子证据的防篡改保管。基于多维度考察,区块链电子证据在证据载体、技术保真以及规范表达上均与原始件证据相悖,呈现出显著的复制件... 区块链电子证据不具有原始件证据属性,不能等同于证据原件,其本质是借助哈希值计算与分布式存储实现对电子证据的防篡改保管。基于多维度考察,区块链电子证据在证据载体、技术保真以及规范表达上均与原始件证据相悖,呈现出显著的复制件属性,并引发最佳证据规则在法理、目的以及规范层面上的适用困境。鉴于推定具有可反驳性的代真特性,可以将区块链电子证据推定为证据原件,并通过对推定标准与反驳证据责任分配的明确,推进最佳证据规则在区块链电子证据案件中的具体应用,进而回应区块链电子证据中最佳证据规则的适用困境。 展开更多
关键词 电子数据 证据规则 推定原则 真实性 证明责任
原文传递
Blockchain-Assisted Improved Cryptographic Privacy-Preserving FL Model with Consensus Algorithm for ORAN
9
作者 Raghavendra Kulkarni Venkata Satya Suresh kumar Kondeti +1 位作者 Binu Sudhakaran Pillai Surendran Rajendran 《Computers, Materials & Continua》 2026年第1期1862-1884,共23页
The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)... The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)and artificial intelligence(AI)techniques,have become standard practice.The need for Federated Learning(FL)for ML model training in ORAN environments is heightened by the modularised structure of the ORAN architecture and the shortcomings of conventional ML techniques.However,the traditional plaintext model update sharing of FL in multi-BS contexts is susceptible to privacy violations such as deep-leakage gradient assaults and inference.Therefore,this research presents a novel blockchain-assisted improved cryptographic privacy-preserving federated learning(BICPPFL)model,with the help of ORAN,to safely carry out federated learning and protect privacy.This model improves on the conventional masking technique for sharing model parameters by adding new characteristics.These features include the choice of distributed aggregators,validation for final model aggregation,and individual validation for BSs.To manage the security and privacy of FL processes,a combined homomorphic proxy-reencryption(HPReE)and lattice-cryptographic method(HPReEL)has been used.The upgraded delegated proof of stake(Up-DPoS)consensus protocol,which will provide quick validation of model exchanges and protect against malicious attacks,is employed for effective consensus across blockchain nodes.Without sacrificing performance metrics,the BICPPFL model strengthens privacy and adds security layers while facilitating the transfer of sensitive data across several BSs.The framework is deployed on top of a Hyperledger Fabric blockchain to evaluate its effectiveness.The experimental findings prove the reliability and privacy-preserving capability of the BICPPFL model. 展开更多
关键词 Open radio access network homomorphic proxy-re-encryption lattice-cryptography hyperledger fabric blockchain technology upgraded delegated proof of stake federated learning
在线阅读 下载PDF
大数据侦查的法律规制路径
10
作者 贺紫荆 杜航 《辽宁警察学院学报》 2026年第1期75-81,共7页
在大数据与人工智能技术快速发展的背景下,大数据侦查已成为现代犯罪治理的重要手段。大数据侦查通过海量数据挖掘、智能算法分析等技术手段,显著提升了侦查工作的精准性和预测预警的时效性。然而,这种技术驱动的侦查方式对传统法治体... 在大数据与人工智能技术快速发展的背景下,大数据侦查已成为现代犯罪治理的重要手段。大数据侦查通过海量数据挖掘、智能算法分析等技术手段,显著提升了侦查工作的精准性和预测预警的时效性。然而,这种技术驱动的侦查方式对传统法治体系提出了严峻挑战。数据算法与司法公正的冲突、侦查权对隐私权的侵蚀、数据对证据规则的冲击等问题也日益凸显。对此,可从规制数据质量以确保决策基础准确、规范算法设计以确保司法决策公正、依据比例原则以保障公民隐私权、创新证据的证明规则以辅助证明案件事实等方面提出法律规制路径。这既为平衡侦查效能与权利保护提供新思路,也为构建安全可靠的大数据侦查体系提供制度保障。最终实现技术理性与法律价值的有机统一,推动大数据侦查在法治轨道上规范发展。 展开更多
关键词 大数据侦查 法律规制 算法 隐私权 证明规则
在线阅读 下载PDF
Comments and Research on Proofs of Chain Rule 被引量:1
11
作者 张通 《Chinese Quarterly Journal of Mathematics》 CSCD 2001年第3期100-104,共5页
In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independe... In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independednt variable u, but is not differentiable with respect to the dependent variable u=g(x). A strict proof of Chain Rule is presented. Incon sistency of the form and content of Chain Rule is disclosed. 展开更多
关键词 Chain Rule proof unstrict
在线阅读 下载PDF
Study on Ignition Proof AZ91D Magnesium Alloy Chips with Cerium Addition 被引量:8
12
作者 周宏 李伟 +1 位作者 王明星 赵宇 《Journal of Rare Earths》 SCIE EI CAS CSCD 2005年第4期466-469,共4页
The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ... The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ignition point, however, the shift of the content of Ce has much effect on ignition point. Increasing the Ce content, x from 0.15 to 0.25, the ignition point increases with increasing of Ce; however, x from 0.25 to 0.45, the ignition point decreases with increasing of Ce. By the addition of Ce of 0.25 %. the ignition point is raised by 43℃. 展开更多
关键词 metal materials ignition proof CERIUM CHIPS magnesium alloy rare earths
在线阅读 下载PDF
基于区块链的财务信息隐私保护数据集成方法
13
作者 王飞扬 《四川师范大学学报(自然科学版)》 2026年第1期106-113,共8页
针对区块链账户模型中交易关联性强、隐私泄露风险突出的问题,提出了一种基于双平衡模型与两步交易流程的财务信息隐私保护方案.通过融合零知识简洁非交互式知识论证(zk-SNARKs)技术,构建了包含明文余额与零知识余额的双层账户体系,并... 针对区块链账户模型中交易关联性强、隐私泄露风险突出的问题,提出了一种基于双平衡模型与两步交易流程的财务信息隐私保护方案.通过融合零知识简洁非交互式知识论证(zk-SNARKs)技术,构建了包含明文余额与零知识余额的双层账户体系,并设计了铸造、赎回、发送、存款等4类零知识交易协议.实验表明:在零知识证明系统选型中,Groth16方案展现出显著优势,其运行时间较PGHR13和GM17分别降低19.3%和38.5%,系统参数量缩减16.7%和37.8%,证明规模压缩93.6%和0.9%.实验结果验证了本框架可有效保障隐私与安全,该框架具有广阔的应用前景. 展开更多
关键词 财务信息 区块链 隐私保护 双平衡模型 零知识证明
在线阅读 下载PDF
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
14
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
在线阅读 下载PDF
石油化工装置的仪表信号远距离传输的研究
15
作者 周宝林 靳亚铭 《石油化工自动化》 2026年第1期80-84,共5页
在工程设计中,经常出现现场仪表距离现场机柜室较远的问题,经过长距离电缆传输,导致仪表信号受到影响。结合石油化工装置中仪表电缆的特点和信号类型,分析对比了本安仪表信号、隔爆仪表信号,研究了这些信号传输的最大距离,以及电缆绝缘... 在工程设计中,经常出现现场仪表距离现场机柜室较远的问题,经过长距离电缆传输,导致仪表信号受到影响。结合石油化工装置中仪表电缆的特点和信号类型,分析对比了本安仪表信号、隔爆仪表信号,研究了这些信号传输的最大距离,以及电缆绝缘和护套材质、电缆绞合钮环、电缆屏蔽方式对信号传输的影响,并对仪表电缆的选型提出了一些参考建议。 展开更多
关键词 本安仪表信号 隔爆仪表信号 信号传输距离 仪表电缆
在线阅读 下载PDF
Effect of yttrium,calcium and zirconium on ignition-proof principle and mechanical properties of magnesium alloys 被引量:7
16
作者 FAN Jianfeng CHEN Zhiyuan +2 位作者 YANG Weidong FANG Shuang XU Bingshe 《Journal of Rare Earths》 SCIE EI CAS CSCD 2012年第1期74-78,共5页
Good ignition-proof principle and mechanical properties were realized in Mg-Y-Ca-Zr alloy system.By adding Y and Ca elements,the ignition point of Mg-3.5Y-0.8Ca alloy was improved to over 1173 K,and the alloy could be... Good ignition-proof principle and mechanical properties were realized in Mg-Y-Ca-Zr alloy system.By adding Y and Ca elements,the ignition point of Mg-3.5Y-0.8Ca alloy was improved to over 1173 K,and the alloy could be melted in air without any protections.The ef-fect of Zr addition on the microstructures and mechanical properties of Mg-3.5Y-0.8Ca alloys were investigated,and Mg-3.5%Y-0.8%Ca-0.4%Zr alloy had good comprehensive properties with tensile strength of 190 MPa and elongation of 11%.Auger electron spectros-copy(AES)and X-ray diffraction(XRD)analysis revealed that the oxide film formed on the surface of Mg-3.5Y-0.8Ca alloy was mainly composed of Y2O3.Thermogravimetric measurements in dry air indicated that the oxidation dynamics curves measured at 773,873 and 973 K followed the cubic law.Moreover,the semiconductor characteristic of Y2O3 film and its effect on ignition-proof properties of Magnesium al-loys were discussed from the viewpoint of electrochemistry. 展开更多
关键词 magnesium alloys ignition proof principle mechanical properties rare earths
原文传递
A SIMPLE PROOF OF STABILITY AND CONVERGENCE IN L_2 FOR SOME DIFFERENCE SCHEMES AND THEIR EXTRAPOLATION METHOD FOR PARABOLIC EQUATIONS 被引量:1
17
作者 孙志忠 《Journal of Southeast University(English Edition)》 EI CAS 1994年第2期1-6,共6页
ASIMPLEPROOFOFSTABILITYANDCONVERGENCEINL_2FORSOMEDIFFERENCESCHEMESANDTHEIREXTRAPOLATIONMETHODFORPARABOLICEQU... ASIMPLEPROOFOFSTABILITYANDCONVERGENCEINL_2FORSOMEDIFFERENCESCHEMESANDTHEIREXTRAPOLATIONMETHODFORPARABOLICEQUATIONSSunZhizhong... 展开更多
关键词 simpld proof Wabelic equatiuns DIFFERENCE SCHEMES STABILITY convergenee EXTRAPOLATION METHOD
在线阅读 下载PDF
矿用防爆永磁电机温升特性及其散热优化设计研究
18
作者 陈万庆 宋艾江 《科学技术创新》 2026年第2期205-208,共4页
为保障矿用防爆永磁电机的性能和安全性,提出矿用防爆永磁电机温升特性及其散热优化设计研究。通过对矿用防爆永磁电机的温升特性进行分析,揭示电机内部各部件的温升规律。并基于该温升特性,对该电机散热优化进行设计,同时,设计水道结构... 为保障矿用防爆永磁电机的性能和安全性,提出矿用防爆永磁电机温升特性及其散热优化设计研究。通过对矿用防爆永磁电机的温升特性进行分析,揭示电机内部各部件的温升规律。并基于该温升特性,对该电机散热优化进行设计,同时,设计水道结构,以增强电机的散热性能。实验结果表明:优化之后的电机,其散热能力有了明显提高,温升情况得到显著改善。这有效提升了矿用防爆永磁电机的可靠性,延长了电机的使用寿命,为矿用电机的高效运行提供了有力的理论和技术支持。 展开更多
关键词 温升特性 散热设计 矿用防爆永磁电机 电机损耗 煤炭开采
在线阅读 下载PDF
Game-Based Automated Security Proofs for Cryptographic Protocols 被引量:1
19
作者 顾纯祥 光焱 祝跃飞 《China Communications》 SCIE CSCD 2011年第4期50-57,共8页
Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof ... Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme. 展开更多
关键词 cryptographic protocols probable security automatic security proof process calculus
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部