期刊文献+
共找到337篇文章
< 1 2 17 >
每页显示 20 50 100
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
1
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
在线阅读 下载PDF
系统电磁脉冲的定标关系及在腔体系统电磁脉冲中的应用
2
作者 孙会芳 易涛 +1 位作者 张玲玉 杨冬 《强激光与粒子束》 北大核心 2026年第1期175-181,共7页
研究系统电磁脉冲(SGEMP)的定标理论,掌握SGEMP的定标法则,并将其应用于腔体SGEMP,提出保持腔壁材料厚度不变的规范变换方法,应用全电磁粒子模拟方法方法进行数值模拟研究,通过对比实验室激光等离子体源条件下的原模型与10倍扩比模型的... 研究系统电磁脉冲(SGEMP)的定标理论,掌握SGEMP的定标法则,并将其应用于腔体SGEMP,提出保持腔壁材料厚度不变的规范变换方法,应用全电磁粒子模拟方法方法进行数值模拟研究,通过对比实验室激光等离子体源条件下的原模型与10倍扩比模型的模拟结果,发现两者在电场、磁场及电荷密度的空间分布规律上呈现严格一致性,幅值大小完全遵循定标关系:发射端面表面电场峰值原模型为2.0 MV/m,扩比模型为200 kV/m;磁场峰值原模型为0.8×10^(-3) T,扩比模型为0.8×10^(-4) T;电荷密度峰值原模型为6.0×10^(-3) m^(-3),扩比模型为6.0×10^(-5) m^(-3)。模拟结果验证了定标法则应用于腔体SGEMP的有效性。该研究为腔体SGEMP的物理机制解析及实验室模拟实验设计提供了理论依据。 展开更多
关键词 系统电磁脉冲 定标关系 全电磁粒子模拟方法 扩比模型
在线阅读 下载PDF
基于MBR码的分布式存储系统扩容研究
3
作者 黎聪 唐聃 +2 位作者 王子豪 蔡红亮 何磊 《计算机应用与软件》 北大核心 2026年第3期245-254,共10页
随着数据存储量的剧增,分布式存储系统需要扩容节点分担存储与计算压力。而目前已有的MBR码扩容方案较少,且参数限制过多,实用性不高。针对这些不足,SPMMBRScale扩容方案结合SPM_MBR码对称布局的特点,设计节点内的数据块迁移算法,并提... 随着数据存储量的剧增,分布式存储系统需要扩容节点分担存储与计算压力。而目前已有的MBR码扩容方案较少,且参数限制过多,实用性不高。针对这些不足,SPMMBRScale扩容方案结合SPM_MBR码对称布局的特点,设计节点内的数据块迁移算法,并提出适用于不同应用场景的两种校验更新算法,利用校验组合的思想使其适用于所有MBR码参数,实用性高。实验结果表明,相比RRScale与EMBRScale方案,SPMMBRScale方案扩容时的传输量分别减少了40%~63%和11%~31%。随着扩容节点数增多,SPMMBRScale优势越发明显,具有很高的实际应用价值。 展开更多
关键词 纠删码 再生码 扩容 分布式存储
在线阅读 下载PDF
基于preCICE的多尺度耦合不确定性分析方法研究
4
作者 董士豪 邓俊杰 +3 位作者 黄喆 刘紫静 李卫 赵鹏程 《核技术》 北大核心 2026年第3期136-147,共12页
当前反应堆热工水力多尺度耦合研究主要聚焦于多尺度耦合程序开发与验证,针对耦合程序不确定性的系统性研究仍较为匮乏。本研究基于preCICE开源框架,集成计算流体力学(Computational Fluid Dynamics,CFD)程序FLUENT、子通道程序SUBCHANF... 当前反应堆热工水力多尺度耦合研究主要聚焦于多尺度耦合程序开发与验证,针对耦合程序不确定性的系统性研究仍较为匮乏。本研究基于preCICE开源框架,集成计算流体力学(Computational Fluid Dynamics,CFD)程序FLUENT、子通道程序SUBCHANFLOW以及DAKOTA不确定性量化模块,构建多尺度耦合不确定性分析程序。通过建立3×3棒束模型,开展稳态与瞬态条件下的数值验证,并进行不确定性量化与灵敏度分析。研究结果显示:1)稳态工况下耦合系统轴向温度分布与单体程序计算结果最大相对误差为1.65%,误差较小;2)瞬态验证中,入口流量正弦扰动工况下,出口流量波动在周期和相位上完全同步;3)不确定性量化表明冷却剂温度、包壳峰值温度等参数平均值位于95%置信区间内,标准差小,计算可信度高;4)灵敏度分析揭示出口压力和燃料棒热流密度对系统响应量影响较大,入口质量流量和包壳热导率分别对不同响应量产生显著的负向影响,研究结果验证了多尺度耦合系统在动态工况下的响应可靠性。 展开更多
关键词 preCICE开源耦合库 多尺度耦合 不确定性分析 子通道程序 CFD程序
原文传递
安全评审程序用CSAU法 被引量:1
5
作者 陈炳德 《核动力工程》 EI CAS CSCD 北大核心 1992年第5期22-26,共5页
为支持和配合新修订的“危急堆芯冷却系统验收准则”,美国 NRC 组织发展了一种程序模拟、可用性和误差评估方法(Code Scaling,Applicability and Uncertainty EvaluationMethodology,简称 CSAU)。该方法为安全评审和颁发许可证所需的评... 为支持和配合新修订的“危急堆芯冷却系统验收准则”,美国 NRC 组织发展了一种程序模拟、可用性和误差评估方法(Code Scaling,Applicability and Uncertainty EvaluationMethodology,简称 CSAU)。该方法为安全评审和颁发许可证所需的评审计算误差的定量化分析提供了一个系统的、严密的逻辑框架。例题演示证明,该方法具有结构化、实用和可核查的特点,可满足安全评审管理领域的需要。此外,该方法对我国引进程序和评审方法规范化及程序的改进和发展均是有益的。 展开更多
关键词 反应堆安全 估计 评价 程序 csau
在线阅读 下载PDF
基于链码标定的皮带秤计量优化及稳定性提升研究
6
作者 杨小燕 《计量与测试技术》 2026年第3期104-108,共5页
本文基于皮带秤在化工计量领域应用现状,通过探讨实物检定与链码标定的原理、步骤及优缺点,研究如何将实物检定与链码标定互补结合,从而开展有效的企业内部期间核查,进而提升其测量的稳定性。
关键词 皮带秤 实物检定 链码标定 企业内部期间核查
在线阅读 下载PDF
基于DeepSeek与Cursor工具的DRG智能分析方法与应用探讨
7
作者 陈松鹤 陈志文 朱伟丽 《医院管理论坛》 2026年第1期54-56,共3页
目的探讨基于DeepSeek大模型与Cursor集成工具分析DRG数据的应用。方法研究以DeepSeek-V3医疗专用大模型和Cursor工具构建智能分析框架,以浙江省某妇产科医院328份DRG分组数据为样本,通过自然语言指令驱动模型自动完成数据预处理、指标... 目的探讨基于DeepSeek大模型与Cursor集成工具分析DRG数据的应用。方法研究以DeepSeek-V3医疗专用大模型和Cursor工具构建智能分析框架,以浙江省某妇产科医院328份DRG分组数据为样本,通过自然语言指令驱动模型自动完成数据预处理、指标统计和报告生成。结果方案显著提升了DRG管理效能。在准确性方面,AI模型对复杂数据的处理能力优于传统人工统计;在效率上,报告生成时间从数日缩短至十几分钟,并能实时适应DRG分组规则更新;在成本控制方面,开源架构使软硬件投入远低于商业软件(年费节省数十万元),同时降低了人员技能门槛。结论基于国产大模型的DRG智能分析方案实现了操作便捷性、决策前瞻性和管理精细化的范式创新。 展开更多
关键词 诊断相关分组 AI大模型 深度求索 AI代码编辑器
暂未订购
LncRNA NEAT1与帕金森病患者病情严重程度及预后的相关性研究
8
作者 朱虹 史明磊 朱晓涵 《长治医学院学报》 2026年第1期24-28,共5页
目的:探讨长链非编码RNA核旁斑组装转录本1(LncRNA NEAT1)与帕金森病(PD)患者病情严重程度及预后的相关性。方法:回顾性分析125例PD患者的病例资料,根据病情严重程度不同分为轻度组(35例)、中度组(45例)和重度组(45例),分析LncRNA NEAT1... 目的:探讨长链非编码RNA核旁斑组装转录本1(LncRNA NEAT1)与帕金森病(PD)患者病情严重程度及预后的相关性。方法:回顾性分析125例PD患者的病例资料,根据病情严重程度不同分为轻度组(35例)、中度组(45例)和重度组(45例),分析LncRNA NEAT1与PD患者帕金森病综合量表(UPDRS)评分、神经递质水平、神经功能指标的相关性,以及对患者不良预后的预测效能。结果:重度组患者的LncRNA NEAT1、UPDRS评分分别为(1.72±0.35)、(165.22±20.36)分,均高于中度组[(1.18±0.47)、(142.24±20.37)分]和轻度组[(1.04±0.22)、(135.44±20.29)分],差异有统计学意义(P<0.05);重度组的5-羟色胺(5-HT)、多巴胺(DA)、去甲肾上腺素(NE)均低于中度组和轻度组,差异有统计学意义(P<0.05);重度组的脑源性神经营养因子(BDNF)、神经生长因子(NGF)、神经营养因子-3(NT-3)均低于中度组和轻度组,差异有统计学意义(P<0.05);LncRNA NEAT1与UPDRS评分呈正相关,与5-HT、DA、NE、BDNF、NGF、NT-3呈负相关(P<0.05);LncRNA NEAT1与UPDRS评分联合检测对PD患者不良预后的预测灵敏度和特异度分别为84.29%、82.34%,均高于LncRNA NEAT1单独检测(81.22%、78.36%)、UPDRS单独检测(80.35%、71.28%),差异有统计学意义(P<0.05)。结论:LncRNA NEAT1表达水平与PD患者的病情严重程度呈正相关,联合检测LncRNA NEAT1与UPDRS评分能实现对患者不良预后的早期预测。 展开更多
关键词 帕金森病 长链非编码RNA核旁斑组装转录本1 帕金森病综合量表 预测效能
暂未订购
Design and Implementation of Verification Code Identification Based on Anisotropic Heat Kernel 被引量:2
9
作者 LIU Lizhao LIU Jian +3 位作者 DAI Yaomei XU Huarong YIN Huayi ZHU Shunzhi 《China Communications》 SCIE CSCD 2016年第1期100-112,共13页
Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as ... Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually.Improving the verification code security system needs the identification method as the corresponding testing system.We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom,design a multi-step anisotropic verification code identification algorithm which includes core procedure of building anisotropic heat kernel,settingwave energy information parameters,combing outverification codccharacters and corresponding peripheral procedure of gray scaling,binarizing,denoising,normalizing,segmenting and identifying,give out the detail criterion and parameter set.Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters,mathematical,Chinese,voice,3D,programming,video,advertising,it has a higher rate of 25%and 50%than neural network and context matching algorithm separately for Yahoo site,49%and 60%for Captcha site,20%and 52%for Baidu site,60%and 65%for 3DTakers site,40%,and 51%.for MDP site. 展开更多
关键词 verification code image recognition data mining scale space anisotropic heat kernel
在线阅读 下载PDF
Malicious Code Modeling and Analysis in Weighted Scale-Free Networks 被引量:2
10
作者 WANG Changguang WANG Fangwei +1 位作者 ZHANG Yangkai MA Jianfengi 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期51-54,共4页
We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in... We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in a power-law form, which is different from the well-known result in unweighted network case. Simulation results show that the nodes with larger strength are preferential to be infected, but the hierarchical dynamics are not clearly found. The simulation results also show that larger dispersion of weight of networks leads to slower propagating, which indicates that malicious code propagates more quickly in unweighted scale-free networks than in weighted scale-free networks under the same condition. These results show that not only the topology of networks but also the link weights affect the malicious propagating process. 展开更多
关键词 malicious code weighted scale-free networks propagation model
在线阅读 下载PDF
Criteria for level 1 and level 2 trauma codes: Are pelvic ring injuries undertriaged?
11
作者 Brittany E Haws Scott Wuertzer +2 位作者 Laura Raffield Leon Lenchik Anna N Miller 《World Journal of Orthopedics》 2016年第8期481-486,共6页
AIM: To determine the association of unstable pelvic ring injuries with trauma code status.METHODS: A retrospective review of all pelvic ring injuries at a single academic center from July 2010 to June 2013 was perfor... AIM: To determine the association of unstable pelvic ring injuries with trauma code status.METHODS: A retrospective review of all pelvic ring injuries at a single academic center from July 2010 to June 2013 was performed. The trauma registry was used to identify level 1 and level 2 trauma codes for each injury. The computed tomography scans in all patients were classified as stable or unstable using the Abbreviated Injury Scale. Pelvic injury classifications in level 1 and level 2 groups were compared. Patient disposition at discharge in level 1 and level 2 groups were also compared.RESULTS: There were 108 level 1 and 130 level 2 blunt trauma admissions. In the level 1 group, 67% of pelvic injuries were classified as stable fracture patterns and 33% were classified as unstable. In the level 2 group, 62% of pelvic injuries were classified as stable fracture patterns and 38% were classified as unstable. level 1 trauma code was not associated with odds of having an unstable fracture pattern(OR = 0.83, 95%CI: 0.48-1.41, P = 0.485). In the level 1 group with unstable pelvic injuries, 33% were discharged to home, 36% to a rehabilitation facility, and 32% died. In the level 2 group with unstable pelvic injuries, 65% were discharged to home, 31% to a rehabilitation facility, and 4% died. For those with unstable pelvic fractures(n = 85), assignment of a level 2 trauma code was associated with reduced odds of death(OR = 0.07, 95%CI: 0.01-0.35, P = 0.001) as compared to being discharged to home.CONCLUSION: Trauma code level assignment is not correlated with severity of pelvic injury. Because an unstable pelvis can lead to hemodynamic instability, these injuries may be undertriaged. 展开更多
关键词 PELVIC ring TRAUMA code TRIAGE UNSTABLE PELVIS Abbreviated injury scale
暂未订购
Scaling Laws for Plasma Focus Machines from Numerical Experiments
12
作者 S. H. SAW S. LEE 《Energy and Power Engineering》 2010年第1期65-72,共8页
Numerical experiments carried out systematically using the Lee Model code unveil insightful and practical wide-ranging scaling laws for plasma focus machines for nuclear fusion energy as well as other applications. An... Numerical experiments carried out systematically using the Lee Model code unveil insightful and practical wide-ranging scaling laws for plasma focus machines for nuclear fusion energy as well as other applications. An essential feature of the numerical experiments is the fitting of a measured current waveform to the computed waveform to calibrate the model for the particular machine, thus providing a reliable and rigorous determination of the all-important pinch current. The thermodynamics and radiation properties of the resulting plasma are then reliably determined. This paper provides an overview of the recently published scaling laws for neutron (Yn) and neon soft x-ray, SXR (Ysxr) yields: Yn = 3.2x1011 Ipinch4.5;Yn = 1.8x1010 Ipeak3.8;Ipeak (0.3 to 5.7), Ipinch (0.2 to 2.4) in MA. Yn^E02.0 at tens of kJ to Yn^E00.84 at MJ level (up to 25MJ) and Ysxr = 8.3x103 Ipinch3.6;Ysxr = 6x102 Ipeak3.2;Ipeak (0.1 to 2.4), Ipinch (0.07 to1.3) in MA. Ysxr^E01.6 (kJ range) to Ysxr^E00.8 (towards MJ). 展开更多
关键词 dense PLASMA FOCUS PLASMA FOCUS scaling LAWS NEUTRON scaling LAWS soft x-ray scaling LAWS PLASMA FOCUS modeling LEE model code
暂未订购
An FPGA-based LDPC decoder with optimized scale factor of NMS decoding algorithm
13
作者 LI Jinming ZHAGN Pingping +1 位作者 WANG Lanzhu WANG Guodong 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第4期398-406,共9页
Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm wi... Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm with variable scale factor is proposed for the near-earth space LDPC codes(8177,7154)in the consultative committee for space data systems(CCSDS)standard.The shift characteristics of field programmable gate array(FPGA)is used to optimize the quantization data of check nodes,and finally the function of LDPC decoder is realized.The simulation and experimental results show that the designed FPGA-based LDPC decoder adopts the scaling factor in the NMS decoding algorithm to improve the decoding performance,simplify the hardware structure,accelerate the convergence speed and improve the error correction ability. 展开更多
关键词 LDPC code NMS decoding algorithm variable scale factor QUANTIZATION
在线阅读 下载PDF
Scaling Factor Optimization of Turbo-Polar Iterative Decoding
14
作者 Zhenzhen Liu Kai Niu +2 位作者 Jiaru Lin Jingyuan Sun Hao Guan 《China Communications》 SCIE CSCD 2018年第6期169-177,共9页
In this paper, we investigate the weighted iterative decoding to improve the performance of turbo-polar code. First of all, a minimum weighted mean square error criterion is proposed to optimize the scaling factors(SF... In this paper, we investigate the weighted iterative decoding to improve the performance of turbo-polar code. First of all, a minimum weighted mean square error criterion is proposed to optimize the scaling factors(SFs). Secondly, for two typical iterative algorithms,such as soft cancellation(SCAN) and belief propagation(BP) decoding, genie-aided decoders are proposed as the ideal reference of the practical decoding. Guided by this optimization framework, the optimal SFs of SCAN or BP decoders are obtained. The bit error rate performance of turbo-polar code with the optimal SFs can achieve 0.3 dB or 0.7 dB performance gains over the standard SCAN or BP decoding respectively. 展开更多
关键词 turbo-polar code BP decoder SCAN decoder mean square error scaling factors
在线阅读 下载PDF
Secret Codes of Scale Distribution of Different Matter Stratums from Planck Scale to the Sun-Scale, Proof of Anthropic Principle and Different Stratum Sciences
15
作者 Changyu Huang Yong-Chang Huang 《Journal of Modern Physics》 2017年第9期1537-1546,共10页
This paper discovers the secret codes of the scale distribution from Planck scale to the Sun-scale by using Planck length derived from three fundamental physics constants, i.e., gravitation constant G, light speed c a... This paper discovers the secret codes of the scale distribution from Planck scale to the Sun-scale by using Planck length derived from three fundamental physics constants, i.e., gravitation constant G, light speed c and Plank constant, and starting from the global consideration of treating the whole universe as a well unified entity in all scales. According to this symmetric scale distribution law of different scale regions: (a) we naturally give a possibility overcoming the difficulty of the desert effect between the grand unification scale and electroweak unification scale relevant to quarks and leptons, and it is really surprising to discover that the scales of quarks & electrons, protons & neutrons and atoms again all sequentially locate at the predicted points of the scale space;(b) we closely uncover the scale of the cells, which is the basic unit constructing the human bodies;(c) even the average height of human being is naturally deduced;(d) further, it is very surprising that the scales of the celestial bodies tightly related to us human beings, including the earth and the sun, also exactly fall at the predicted points in scale space in order. Therefore, all these scales with 105n cm order (n = 0, 1, 2, …, 9) above just give a proof of very key anthropic principle for whole mankind (which just makes the anthropic principle be reduced as anthropic theorem), i.e., matter stratums (a) and (b) are inorganic and organic bases of constructing human being respectively;matter stratum (c) is just human being;matter stratums (d) are the living environments of human being. Namely, everything is for or relevant to the existence of human being. Consequently, the experimentally checked scale ladder of well-known matter levels just coincides with the scale ladder predicted by the deduced distribution law. From Planck scale to the Sun scale, people may systematically build up the exact scientific theories corresponding ten matter stratums, may set up the different sciences among the different cross stratums, further, can systematically understand all the different sciences and their relations in the deepest way up to now. 展开更多
关键词 Astroparticle PHYSICS Particle PHYSICS PLANCK SCALE Basic Constant SCALE Secret codes Earth The Sun Anthropic Principle
暂未订购
Performance Enhancement of SOVA Based Decoder in SCCC and PCCC Schemes
16
作者 Ahmed A. Hamad 《Wireless Engineering and Technology》 2013年第1期40-45,共6页
This study proposes a simple scaling factor approach to improve the performance of parallel-concatenated convolutional code (PCCC) and serial concatenated convolutional code (SCCC) systems based on suboptimal soft-inp... This study proposes a simple scaling factor approach to improve the performance of parallel-concatenated convolutional code (PCCC) and serial concatenated convolutional code (SCCC) systems based on suboptimal soft-input soft-output (SISO) decoders. Fixed and adaptive scaling factors were estimated to mitigate both the optimistic nature of a posteriori information and the correlation between intrinsic and extrinsic information produced by soft-output Viterbi (SOVA) decoders. The scaling factors could be computed off-line to reduce processing time and implementation complexity. The simulation results show a significant improvement in terms of bit-error rate (BER) over additive white Gaussian noise and Rayleigh fading channel. The convergence properties of the suggested iterative scheme are assessed using the extrinsic information transfer (EXIT) chart analysis technique. 展开更多
关键词 TURBO codes SOVA SCCC scaling Factor EXIT
在线阅读 下载PDF
On the Construction of the Kernel Matrix by Primitive BCH Codes for Polar Codes
17
作者 Liping Lin 《Communications and Network》 2022年第1期23-35,共13页
The polar codes defined by the kernel matrix are a class of codes with low coding-decoding complexity and can achieve the Shannon limit. In this paper, a novel method to construct the 2<sup>n</sup>-dimensi... The polar codes defined by the kernel matrix are a class of codes with low coding-decoding complexity and can achieve the Shannon limit. In this paper, a novel method to construct the 2<sup>n</sup>-dimensional kernel matrix is proposed, that is based on primitive BCH codes that make use of the interception, the direct sum and adding a row and a column. For ensuring polarization of the kernel matrix, a solution is also put forward when the partial distances of the constructed kernel matrix exceed their upper bound. And the lower bound of exponent of the 2<sup>n</sup>-dimensional kernel matrix is obtained. The lower bound of exponent of our constructed kernel matrix is tighter than Gilbert-Varshamov (G-V) type, and the scaling exponent is better in the case of 16-dimensional. 展开更多
关键词 Polar code Kernel Matrix Matrix Interception Partial Distance EXPONENT scaling Exponent
在线阅读 下载PDF
Proposed Simplified Procedure for Safety Factor Scaling for Various Life Cycles
18
作者 Eliezer Shamir 《Journal of Civil Engineering and Architecture》 2014年第10期1317-1326,共10页
It is common to assume that structures are designed in view of 50 year life cycle as per Euro-Code 2 and other codes. In special cases, structures are designed in view of longer life cycle, such as bridges, important ... It is common to assume that structures are designed in view of 50 year life cycle as per Euro-Code 2 and other codes. In special cases, structures are designed in view of longer life cycle, such as bridges, important infrastructure facilities, important religious structures or in case of extended returning period of seismic event or floods. Beside issues of durability and maintenance aspects, this involves also the need to cover the probability of exceeding characteristic design live loads during the extended period, while keeping the same levels of the accepted risk that were assumed by the various codes, as good enough for the standard 50 year life cycle. Bearing in mind that design procedures, formulations, materials characteristic strengths and partial safety factors are used for these structures as per the existing codes, scaling of partial safety factors, or alternatively an additional "compensating" factor is required. A simplified approach and procedure to arrive at a reasonable calibration of the code safety factors based on 50 years to compensate for an extended life cycle, based upon structural reliability considerations, is proposed. 展开更多
关键词 Life cycle code calibration scaling safety factors target reliability factor.
在线阅读 下载PDF
改进MSE和BTSVM的往复压缩机轴承智能诊断研究
19
作者 闫旭辉 武文革 邓诗俊 《机械设计与制造》 北大核心 2025年第12期277-282,共6页
针对往复压缩机轴承故障诊断识别准确率不高,故障特征信息耦合等问题,提出了基于改进MSE和优化BTSVM的故障诊断新方法。鉴于多尺度样本熵算法在冗余计算与特征提取效率方面存在的局限性,本研究深入剖析其多尺度处理策略与样本熵计算流程... 针对往复压缩机轴承故障诊断识别准确率不高,故障特征信息耦合等问题,提出了基于改进MSE和优化BTSVM的故障诊断新方法。鉴于多尺度样本熵算法在冗余计算与特征提取效率方面存在的局限性,本研究深入剖析其多尺度处理策略与样本熵计算流程,针对性地实施了优化措施。由此,本文提出了改进多尺度样本熵算法(IMSE),旨在显著提升算法的计算效率与特征提取精度。其次,针对传统纠错码无法确定码长及最优排列顺序这两方面的不足,将Hadamard矩阵应用于纠错码,提出一种基于Hadamard纠错码结合二叉树支持向量机(BTSVM)的故障识别方法。最后,将两种改进方法进行混合应用于往复压缩机故障诊断中,结果表明,本方法不但提高了故障诊断的准确率,还极大地加快了故障诊断的计算速度。 展开更多
关键词 往复压缩机 改进多尺度样本熵算法 纠错码 二叉树支持向量机 故障诊断
在线阅读 下载PDF
多尺度热工水力分析方法研究及其在海洋核动力小堆中的应用
20
作者 罗涵禹 宋厚德 刘晓晶 《核技术》 北大核心 2025年第10期130-139,共10页
海洋核动力小堆作为未来海洋核能应用的重要形式,其热工水力特性受到周期性流体波动和复杂运动的影响,增加了设计与安全评估的挑战。本研究旨在开发一种多尺度分析方法,通过适应性改造和多层次模拟,系统评估海洋条件下核动力小堆的热工... 海洋核动力小堆作为未来海洋核能应用的重要形式,其热工水力特性受到周期性流体波动和复杂运动的影响,增加了设计与安全评估的挑战。本研究旨在开发一种多尺度分析方法,通过适应性改造和多层次模拟,系统评估海洋条件下核动力小堆的热工水力行为与安全性。首先,选用STAR-CCM+作为改造系统分析、子通道和计算流体力学(Computational Fluid Dynamics,CFD)等程序的工具,对RELAP5源程序进行了修改,对海洋小堆进行简化建模,以适应海洋环境下的系统行为、组件传热、燃料棒束等关键特性;其次,针对反应堆系统级、组件级和棒束级的多尺度特性,构建跨尺度数据传递机制,实现多尺度分析,同时考虑了5 cm直径的小破口以及主泵失电失流的典型事故瞬态的模拟计算和分析。计算结果表明,海洋条件下小堆热工水力特性发生显著变化,尤其在摇摆条件下,系统热力学参数呈现周期性波动,换热系数受周期性振荡影响显著增强。本研究提出的多尺度分析方法适用于海洋核动力小堆的安全评估和设计优化,有助于提升其在海洋环境中的可靠性和运行效率,为海洋核能技术的应用提供理论和实践支持。 展开更多
关键词 多尺度分析 海洋核动力小堆 系统程序 子通道程序 CFD程序
原文传递
上一页 1 2 17 下一页 到第
使用帮助 返回顶部