期刊文献+
共找到89,879篇文章
< 1 2 250 >
每页显示 20 50 100
基于HEC-RAS的莲花水库溃坝洪水风险分析 被引量:1
1
作者 代梦缘 王瑞 +2 位作者 周毓彦 崔盈 刘莹 《黑龙江水利科技》 2025年第1期10-14,共5页
准确高效预测分析大坝失事后溃坝洪水的演进,对于应急抢险决策与风险处置有重要意义。文章以黑龙江省牡丹江市莲花水库为研究对象,在HEC-RAS软件中输入水库的库容、水位以及2023年8月水库洪水过程数据,来分析计算莲花水库大坝溃坝后的... 准确高效预测分析大坝失事后溃坝洪水的演进,对于应急抢险决策与风险处置有重要意义。文章以黑龙江省牡丹江市莲花水库为研究对象,在HEC-RAS软件中输入水库的库容、水位以及2023年8月水库洪水过程数据,来分析计算莲花水库大坝溃坝后的淹没范围,并建立二维水动力模型模拟水库溃坝后的洪水演进过程。研究结果表明溃坝洪水将对下游河道沿岸的居民和田地造成严重威胁,溃坝洪水影响范围超400km^(2)。研究成果可为水库防洪抢险指挥和应急预案的编制提供理论依据。 展开更多
关键词 hec-ras 二维模型 溃坝洪水 莲花水库
在线阅读 下载PDF
Arcmap和HEC-RAS在南海子蓄滞洪区优化调度中的应用
2
作者 王盼 许丹 +4 位作者 吴梓萌 杨丽 李宝元 赵振亚 张超 《水利水电技术(中英文)》 北大核心 2025年第S1期239-243,共5页
南海子蓄滞洪区是北运河流域防洪体系的重要组成部分,为探究其现状滞洪库容、洪水演进过程,为优化调度提供支撑,根据最新实测高精度地形图,采用Arcmap复核南海子蓄滞洪区现状滞洪库容,并基于HEC-RAS建立二维水动力模型进行洪水演进分析... 南海子蓄滞洪区是北运河流域防洪体系的重要组成部分,为探究其现状滞洪库容、洪水演进过程,为优化调度提供支撑,根据最新实测高精度地形图,采用Arcmap复核南海子蓄滞洪区现状滞洪库容,并基于HEC-RAS建立二维水动力模型进行洪水演进分析,明确设计调度方案。结果表明,南海子蓄滞洪区现状滞洪库容为230万m^(3),比50 a一遇规划蓄洪量260万m^(3)少30万m^(3),将麋鹿苑作为蓄滞洪区的一部分可最优地解决这一问题,并明确当南海子公园湖区水位达到29.75 m时,打开新建连通渠节制闸,开始向麋鹿苑分洪,当麋鹿苑水位达到29.65 m时,关闭连通渠节制闸。为了保证工程的稳定性,根据模拟结果,确定新建连通渠及节制闸宽度为5 m。根据各区域滞洪水位的对比,相较于水位~库容曲线,基于HEC-RAS的二维水动力模型能够考虑水体的流动方向和水头损失,更好地模拟实际水体的流动。 展开更多
关键词 ARCMAP hec-ras 蓄滞洪区 优化调度
在线阅读 下载PDF
基于HEC-RAS模型灞河河段设计洪水及淹没范围研究
3
作者 王韬 彭定志 +3 位作者 樊正龙 龚雨薇 罗群 古玉 《南水北调与水利科技(中英文)》 北大核心 2025年第S1期61-65,共5页
为研究超标设计洪水对于城市型河流的影响,以陕西省西安市灞河部分河段为例,采用地区经验法、面积比拟法、水文比拟法、同频叠加法等不同方法计算河段100 a和200 a一遇设计洪水,结合HEC-RAS模型分析100 a和200 a一遇洪水的河道洪水位、... 为研究超标设计洪水对于城市型河流的影响,以陕西省西安市灞河部分河段为例,采用地区经验法、面积比拟法、水文比拟法、同频叠加法等不同方法计算河段100 a和200 a一遇设计洪水,结合HEC-RAS模型分析100 a和200 a一遇洪水的河道洪水位、水面线及淹没范围。结果表明:不同方法计算所得设计洪水结果相近;灞河、浐河河段100 a一遇及200 a一遇设计洪水未出主河道,且不同河段洪水流速差异显著;浐河支流桥梁在面对100 a一遇及200 a一遇设计洪水时存在较大风险。研究结果对城市型河道洪水防治和防洪工程设计具有重要参考价值。 展开更多
关键词 灞河 设计洪水 hec-ras 水动力模拟 淹没分析
在线阅读 下载PDF
基于HEC-RAS的多尺度河漫滩恢复适宜性评估框架构建与应用
4
作者 李硕星 王南希 查艳 《风景园林》 北大核心 2025年第6期106-114,共9页
【目的】在城市化进程和极端气候变化的影响下,河流生态系统面临着生境退化和洪水风险。恢复河漫滩作为一种基于自然的解决方案,可提供防洪、生态及景观游憩等多重效益。因此,如何选择优先恢复的河漫滩以平衡流域的生态和社会效益,成为... 【目的】在城市化进程和极端气候变化的影响下,河流生态系统面临着生境退化和洪水风险。恢复河漫滩作为一种基于自然的解决方案,可提供防洪、生态及景观游憩等多重效益。因此,如何选择优先恢复的河漫滩以平衡流域的生态和社会效益,成为当前流域管理的核心科学问题。【方法】整合高程、土地利用、植被以及土壤等多源数据,基于地理信息系统和HEC-RAS水动力模型,提出了一套系统的河漫滩恢复适宜性评估框架,可识别各尺度上关键的水文、生态及社会经济等参数,并采用熵权法计算漫滩恢复适宜性指数。以广州流溪河中下游流域为案例,筛选高恢复适宜性的漫滩区域,并通过水动力模型验证恢复效益。【结果】流溪河中下游地区漫滩恢复适宜性较高,共筛选出9个适宜恢复的区域,这些区域多位于平坦的河岸带林地和水源补给充足的区域。单个漫滩恢复后显著增强了河流的水文调节功能,洪峰流量降低了7.7%,流量过程更平稳,同时在小规模洪水作用下适宜栖息地面积增加了56.52 hm^(2)。【结论】所提出的评估框架有效识别了适宜恢复的潜在河漫滩,为科学优化河漫滩恢复选址提供了量化依据。恢复后预期可提升洪水防御和生态功能,同时兼顾社会游憩需求,为流域管理与漫滩恢复策略的制定提供了科学支持。 展开更多
关键词 风景园林 河漫滩 基于自然的解决方案 恢复适宜性评估 社会-生态效益 hec-ras模型
在线阅读 下载PDF
When Software Security Meets Large Language Models:A Survey 被引量:1
5
作者 Xiaogang Zhu Wei Zhou +3 位作者 Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期317-334,共18页
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research. 展开更多
关键词 Large language models(LLMs) software analysis software security software testing
在线阅读 下载PDF
基于HEC-RAS模拟的区域内涝水位分析研究
6
作者 姜彪 《水利规划与设计》 2025年第5期51-54,78,共5页
极端天气频发影响下区域内涝洪水研究对工程建筑物设计及运行安全保障尤为重要。文章以石油天然气站场内涝洪水影响分析为例,在研究区域不同频率降雨量、净雨量特性的基础上,以净雨分析结果为模型输入边界条件,利用HEC-RAS软件对区域内... 极端天气频发影响下区域内涝洪水研究对工程建筑物设计及运行安全保障尤为重要。文章以石油天然气站场内涝洪水影响分析为例,在研究区域不同频率降雨量、净雨量特性的基础上,以净雨分析结果为模型输入边界条件,利用HEC-RAS软件对区域内涝水位进行了模拟。通过分析得出不同频率降雨条件下站场所在位置局部内涝水深,为确定站场设计标高提供依据。研究采用的方法可为其他类似工程内涝淹没影响分析提供借鉴。 展开更多
关键词 hec-ras 区域内涝 数值模拟 洪水分析
在线阅读 下载PDF
基于HEC-RAS的呼和浩特抽水蓄能电站下水库溃坝洪水分析 被引量:1
7
作者 张振江 汤新武 郭家兴 《中国水能及电气化》 2025年第5期1-7,12,共8页
文章以呼和浩特抽水蓄能电站下水库为研究对象,借助HEC-RAS模型构建溃坝二维洪水演进模型,设置3种计算工况,深入剖析溃坝洪水向下游演进过程中的水力要素变化规律以及洪水淹没状况。研究成果对呼和浩特抽水蓄能电站大坝安全管理与水库... 文章以呼和浩特抽水蓄能电站下水库为研究对象,借助HEC-RAS模型构建溃坝二维洪水演进模型,设置3种计算工况,深入剖析溃坝洪水向下游演进过程中的水力要素变化规律以及洪水淹没状况。研究成果对呼和浩特抽水蓄能电站大坝安全管理与水库应急能力建设具有重要意义,可为相关水利工程的防灾减灾提供理论依据与实践参考。 展开更多
关键词 溃坝洪水 hec-ras 应急能力 抽水蓄能电站
在线阅读 下载PDF
基于HEC-RAS的典型山丘区洪水淹没分析
8
作者 王靖雯 邓斌 +1 位作者 周翀 熊凯 《水利水电快报》 2025年第8期9-17,共9页
山丘区因地形复杂、居民点分散且山洪频发,防洪减灾措施实施难度大,亟需寻找适用模型开展洪水风险评估,为防洪抢险工作提供支撑。以湖南省长沙县、汝城县为例,通过提取研究区域地形数据和历史洪水资料,利用GIS技术处理地形数据,使用HEC-... 山丘区因地形复杂、居民点分散且山洪频发,防洪减灾措施实施难度大,亟需寻找适用模型开展洪水风险评估,为防洪抢险工作提供支撑。以湖南省长沙县、汝城县为例,通过提取研究区域地形数据和历史洪水资料,利用GIS技术处理地形数据,使用HEC-RAS软件建立了二维洪水淹没分析模型,模拟了研究区域内洪水重现期20 a和50 a的淹没变化,分析了最大淹没范围、淹没水深和流速。结果表明:长沙县、汝城县流速变化趋势同地势变化较为一致,最大淹没水深分别相差1.8 m和1.2 m,最大淹没流速分别相差1.11 m/s和1.36 m/s。根据淹没水深划分风险等级,分析识别了受灾严重区域主要分布在长沙县南部的捞刀河、浏阳河流域,以及汝城县中部的浙江河流域和东北部的沤江流域。HEC-RAS二维模型适用于模拟山丘区洪水淹没,并能够捕捉到洪水在这一地形条件下的传播特性和时空分布特征。 展开更多
关键词 洪水淹没分析 hec-ras 二维模型 山丘区
在线阅读 下载PDF
Two-Phase Software Fault Localization Based on Relational Graph Convolutional Neural Networks 被引量:1
9
作者 Xin Fan Zhenlei Fu +2 位作者 Jian Shu Zuxiong Shen Yun Ge 《Computers, Materials & Continua》 2025年第2期2583-2607,共25页
Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accu... Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments. 展开更多
关键词 software fault localization graph neural network RankNet inter-class dependency class imbalance
在线阅读 下载PDF
A Survey of Link Failure Detection and Recovery in Software-Defined Networks
10
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期103-137,共35页
Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhance... Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhanced networkmanagement capabilities than those of traditional networks.However,because SDN is designed to ensure high-level service availability,it faces additional challenges.One of themost critical challenges is ensuring efficient detection and recovery from link failures in the data plane.Such failures can significantly impact network performance and lead to service outages,making resiliency a key concern for the effective adoption of SDN.Since the recovery process is intrinsically dependent on timely failure detection,this research surveys and analyzes the current literature on both failure detection and recovery approaches in SDN.The survey provides a critical comparison of existing failure detection techniques,highlighting their advantages and disadvantages.Additionally,it examines the current failure recovery methods,categorized as either restoration-based or protection-based,and offers a comprehensive comparison of their strengths and limitations.Lastly,future research challenges and directions are discussed to address the shortcomings of existing failure recovery methods. 展开更多
关键词 software defined networking failure detection failure recovery RESTORATION PROTECTION
在线阅读 下载PDF
Review of Techniques for Integrating Security in Software Development Lifecycle
11
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
A Decentralized and TCAM-Aware Failure Recovery Model in Software Defined Data Center Networks
12
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期1087-1107,共21页
Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive s... Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive schemes have longer recovery times while proactive schemes provide faster recovery but overwhelm the memory of switches by flow entries.As SDN adoption grows,ensuring efficient recovery from link failures in the data plane becomes crucial.In particular,data center networks(DCNs)demand rapid recovery times and efficient resource utilization to meet carrier-grade requirements.This paper proposes an efficient Decentralized Failure Recovery(DFR)model for SDNs,meeting recovery time requirements and optimizing switch memory resource consumption.The DFR model enables switches to autonomously reroute traffic upon link failures without involving the controller,achieving fast recovery times while minimizing memory usage.DFR employs the Fast Failover Group in the OpenFlow standard for local recovery without requiring controller communication and utilizes the k-shortest path algorithm to proactively install backup paths,allowing immediate local recovery without controller intervention and enhancing overall network stability and scalability.DFR employs flow entry aggregation techniques to reduce switch memory usage.Instead of matching flow entries to the destination host’s MAC address,DFR matches packets to the destination switch’s MAC address.This reduces the switches’Ternary Content-Addressable Memory(TCAM)consumption.Additionally,DFR modifies Address Resolution Protocol(ARP)replies to provide source hosts with the destination switch’s MAC address,facilitating flow entry aggregation without affecting normal network operations.The performance of DFR is evaluated through the network emulator Mininet 2.3.1 and Ryu 3.1 as SDN controller.For different number of active flows,number of hosts per edge switch,and different network sizes,the proposed model outperformed various failure recovery models:restoration-based,protection by flow entries,protection by group entries and protection by Vlan-tagging model in terms of recovery time,switch memory consumption and controller overhead which represented the number of flow entry updates to recover from the failure.Experimental results demonstrate that DFR achieves recovery times under 20 milliseconds,satisfying carrier-grade requirements for rapid failure recovery.Additionally,DFR reduces switch memory usage by up to 95%compared to traditional protection methods and minimizes controller load by eliminating the need for controller intervention during failure recovery.Theresults underscore the efficiency and scalability of the DFR model,making it a practical solution for enhancing network resilience in SDN environments. 展开更多
关键词 software defined networking failure detection failure recovery RESTORATION protection TCAM size
在线阅读 下载PDF
FURobot:A software control platform for construction robots for large-scale construction
13
作者 LU Ming Philip F.YUAN 《土木与环境工程学报(中英文)》 北大核心 2025年第5期1-11,共11页
The advent of parametric design has resulted in a marked increase in the complexity of building.Unfortunately,traditional construction methods make it difficult to meet the needs.Therefore,construction robots have bec... The advent of parametric design has resulted in a marked increase in the complexity of building.Unfortunately,traditional construction methods make it difficult to meet the needs.Therefore,construction robots have become a pivotal production tool in this context.Since the arm span of a single robot usually does not exceed 3 meters,it is not competent for producing large-scale building components.Accordingly,the extension of the robot,s working range is often achieved by external axes.Nevertheless,the coupling control of external axes and robots and their kinematic solution have become key challenges.The primary technical difficulties include customized construction robots,automatic solutions for external axes,fixed axis joints,and specific motion mode control.This paper proposes solutions to these difficulties,introduces the relevant basic concepts and algorithms in detail,and encapsulates these robotics principles and algorithm processes into the Grasshopper plug-in commonly used by architects to form the FURobot software platform.This platform effectively solves the above problems,lowers the threshold for architects,and improves production efficiency.The effectiveness of the algorithm and software in this paper is verified through simulation experiments. 展开更多
关键词 construction robots CUSTOMIZATION CONSTRUCTION ROBOTICS KINEMATICS software
在线阅读 下载PDF
Parallel Implementation of Radiation Hydrodynamics Coupled with Particle Transport on Software Infrastructure JASMIN
14
作者 REN Jian WEI Junxia CAO Xiaolin 《计算物理》 北大核心 2025年第5期608-618,共11页
In this work,we present a parallel implementation of radiation hydrodynamics coupled with particle transport,utilizing software infrastructure JASMIN(J Adaptive Structured Meshes applications INfrastructure)which enca... In this work,we present a parallel implementation of radiation hydrodynamics coupled with particle transport,utilizing software infrastructure JASMIN(J Adaptive Structured Meshes applications INfrastructure)which encapsulates high-performance technology for the numerical simulation of complex applications.Two serial codes,radiation hydrodynamics RH2D and particle transport Sn2D,have been integrated into RHSn2D on JASMIN infrastructure,which can efficiently use thousands of processors to simulate the complex multi-physics phenomena.Moreover,the non-conforming processors strategy has ensured RHSn2D against the serious load imbalance between radiation hydrodynamics and particle transport for large scale parallel simulations.Numerical results show that RHSn2D achieves a parallel efficiency of 17.1%using 90720 cells on 8192 processors compared with 256 processors in the same problem. 展开更多
关键词 processors strategy parallel performance radiation hydrodynamics particle transport multi-physics models software infrastructure
原文传递
基于HEC-RAS软件鹤峰城区防洪现状能力研究
15
作者 刘远 袁延泰 +1 位作者 金锴 李畅 《云南水力发电》 2025年第2期143-146,共4页
以江坪河水库为研究对象,对其运行水位对上游鹤峰城区防洪影响进行分析评价。通过采用鹤峰水文站资料、参证站考证及复核,推求了鹤峰水文站和麂子峡的设计洪水成果。同时,利用HEC-RAS软件进行水面线推求,结合对鹤峰城区2020年洪水调查成... 以江坪河水库为研究对象,对其运行水位对上游鹤峰城区防洪影响进行分析评价。通过采用鹤峰水文站资料、参证站考证及复核,推求了鹤峰水文站和麂子峡的设计洪水成果。同时,利用HEC-RAS软件进行水面线推求,结合对鹤峰城区2020年洪水调查成果,得出了溇水鹤峰城区段的水面线计算成果。最后,对鹤峰城区防洪进行评价,发现亲水平台防洪标准较低,部分河段未满足防洪标准,提出了相应的建议和改进措施。通过分析评价,能够为鹤峰县城区防洪安全提供科学依据和指导,有助于保障人民生命财产安全,维护城市稳定发展。 展开更多
关键词 hec-ras软件 鹤峰城区 防洪能力 分析评价
在线阅读 下载PDF
A Metamodeling Approach to Enforcing the No-Cloning Theorem in Quantum Software Engineering
16
作者 Dae-Kyoo Kim 《Computers, Materials & Continua》 2025年第8期2549-2572,共24页
Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints... Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints,notably the no-cloning theorem,which prohibits the exact duplication of unknown quantum states and has profound implications for cryptography,secure communication,and error correction.While existing quantum circuit representations implicitly honor such constraints,they lack formal mechanisms for early-stage verification in software design.Addressing this constraint at the design phase is essential to ensure the correctness and reliability of quantum software.This paper presents a formal metamodeling framework using UML-style notation and and Object Constraint Language(OCL)to systematically capture and enforce the no-cloning theorem within quantum software models.The proposed metamodel formalizes key quantum concepts—such as entanglement and teleportation—and encodes enforceable invariants that reflect core quantum mechanical laws.The framework’s effectiveness is validated by analyzing two critical edge cases—conditional copying with CNOT gates and quantum teleportation—through instance model evaluations.These cases demonstrate that the metamodel can capture nuanced scenarios that are often mistaken as violations of the no-cloning theorem but are proven compliant under formal analysis.Thus,these serve as constructive validations that demonstrate the metamodel’s expressiveness and correctness in representing operations that may appear to challenge the no-cloning theorem but,upon rigorous analysis,are shown to comply with it.The approach supports early detection of conceptual design errors,promoting correctness prior to implementation.The framework’s extensibility is also demonstrated by modeling projective measurement,further reinforcing its applicability to broader quantum software engineering tasks.By integrating the rigor of metamodeling with fundamental quantum mechanical principles,this work provides a structured,model-driven approach that enables traditional software engineers to address quantum computing challenges.It offers practical insights into embedding quantum correctness at the modeling level and advances the development of reliable,error-resilient quantum software systems. 展开更多
关键词 METAMODELING no-cloning theorem quantum software software engineering
在线阅读 下载PDF
Software Defect Prediction Based on Semantic Views of Metrics:Clustering Analysis and Model Performance Analysis
17
作者 Baishun Zhou Haijiao Zhao +4 位作者 Yuxin Wen Gangyi Ding Ying Xing Xinyang Lin Lei Xiao 《Computers, Materials & Continua》 2025年第9期5201-5221,共21页
In recent years,with the rapid development of software systems,the continuous expansion of software scale and the increasing complexity of systems have led to the emergence of a growing number of software metrics.Defe... In recent years,with the rapid development of software systems,the continuous expansion of software scale and the increasing complexity of systems have led to the emergence of a growing number of software metrics.Defect prediction methods based on software metric elements highly rely on software metric data.However,redundant software metric data is not conducive to efficient defect prediction,posing severe challenges to current software defect prediction tasks.To address these issues,this paper focuses on the rational clustering of software metric data.Firstly,multiple software projects are evaluated to determine the preset number of clusters for software metrics,and various clustering methods are employed to cluster the metric elements.Subsequently,a co-occurrence matrix is designed to comprehensively quantify the number of times that metrics appear in the same category.Based on the comprehensive results,the software metric data are divided into two semantic views containing different metrics,thereby analyzing the semantic information behind the software metrics.On this basis,this paper also conducts an in-depth analysis of the impact of different semantic view of metrics on defect prediction results,as well as the performance of various classification models under these semantic views.Experiments show that the joint use of the two semantic views can significantly improve the performance of models in software defect prediction,providing a new understanding and approach at the semantic view level for defect prediction research based on software metrics. 展开更多
关键词 software defect prediction software engineering semantic views CLUSTERING INTERPRETABILITY
在线阅读 下载PDF
Large Language Models in Software Engineering Education: A Preliminary Study on Software Requirements Engineering Courses
18
作者 Feng Chen Shaomin Zhu +1 位作者 Xin Liu Ying Qian 《计算机教育》 2025年第3期24-33,共10页
The advent of large language models(LLMs)has made knowledge acquisition and content creation increasingly easier and cheaper,which in turn redefines learning and urges transformation in software engineering education.... The advent of large language models(LLMs)has made knowledge acquisition and content creation increasingly easier and cheaper,which in turn redefines learning and urges transformation in software engineering education.To do so,there is a need to understand the impact of LLMs on software engineering education.In this paper,we conducted a preliminary case study on three software requirements engineering classes where students are allowed to use LLMs to assist in their projects.Based on the students’experience,performance,and feedback from a survey conducted at the end of the courses,we characterized the challenges and benefits of applying LLMs in software engineering education.This research contributes to the ongoing discourse on the integration of LLMs in education,emphasizing both their prominent potential and the need for balanced,mindful usage. 展开更多
关键词 Large language models software engineering software requirements engineering EDUCATION
在线阅读 下载PDF
Portable Software Environment for Ultrahigh-Resolution ELM Development on GPUs
19
作者 Dali Wang Peter Schwartz +5 位作者 Fengming Yuan Franklin Eaglebarge Danial Riccuito Peter Thornton Chris Layton Qinglei Cao 《Journal of Computer and Communications》 2025年第2期28-36,共9页
This paper presents our endeavors in developing the large-scale, ultra-high-resolution E3SM Land Model (uELM), specifically designed for exascale computers furnished with accelerators such as Nvidia GPUs. The uELM is ... This paper presents our endeavors in developing the large-scale, ultra-high-resolution E3SM Land Model (uELM), specifically designed for exascale computers furnished with accelerators such as Nvidia GPUs. The uELM is a sophisticated code that substantially relies on High-Performance Computing (HPC) environments, necessitating particular machine and software configurations. To facilitate community-based uELM developments employing GPUs, we have created a portable, standalone software environment preconfigured with uELM input datasets, simulation cases, and source code. This environment, utilizing Docker, encompasses all essential code, libraries, and system software for uELM development on GPUs. It also features a functional unit test framework and an offline model testbed for comprehensive numerical experiments. From a technical perspective, the paper discusses GPU-ready container generations, uELM code management, and input data distribution across computational platforms. Lastly, the paper demonstrates the use of environment for functional unit testing, end-to-end simulation on CPUs and GPUs, and collaborative code development. 展开更多
关键词 E3SM Land Model Ultrahigh-Resolution ELM Portable software Environment GPU-Ready Environment
在线阅读 下载PDF
HEC-RAS在复杂地形河堤工程设计中的应用与优化——以迭部县电尕镇护田河堤为例
20
作者 王刚 《甘肃科技》 2025年第9期17-23,共7页
文章以迭部县电尕镇护田河堤工程为研究对象,探究HEC-RAS模型在复杂地形条件下河堤工程设计与优化中的应用。电尕镇位于青藏高原边缘与秦岭山脉过渡区域,地形地貌复杂,洪水特性明显,对河堤设计标准形成较高挑战。基于翔实的地形地貌及... 文章以迭部县电尕镇护田河堤工程为研究对象,探究HEC-RAS模型在复杂地形条件下河堤工程设计与优化中的应用。电尕镇位于青藏高原边缘与秦岭山脉过渡区域,地形地貌复杂,洪水特性明显,对河堤设计标准形成较高挑战。基于翔实的地形地貌及水文数据资料,构建HEC-RAS模型,对谢协段、白云段和拉路段的防洪能力及河道稳定性展开系统性分析。分析结果显示,各河段存在防洪能力薄弱、堤防高程不足及结构稳定性欠佳等状况。针对这些问题,提出了优化设计方案,同时强调了生态近自然工法与河道监测系统的重要性。研究表明,通过优化设计,可有效提升区域防洪能力,增强河道稳定性,并兼顾生态环境保护,为类似复杂地形条件下的河堤工程设计与优化提供了有益参考,具有重要的理论与实践价值。 展开更多
关键词 hec-ras模型 河堤工程 防洪能力 优化设计
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部