期刊文献+
共找到14,534篇文章
< 1 2 250 >
每页显示 20 50 100
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
1
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 Protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
Intelligent Resource Allocation for Multiaccess Edge Computing in 5G Ultra-Dense Slicing Network Using Federated Multiagent DDPG Algorithm
2
作者 Gong Yu Gong Pengwei +3 位作者 Jiang He Xie Wen Wang Chenxi Xu Peijun 《China Communications》 2026年第1期273-289,共17页
Nowadays,advances in communication technology and cloud computing have spawned a variety of smart mobile devices,which will generate a great amount of computing-intensive businesses,and require corresponding resources... Nowadays,advances in communication technology and cloud computing have spawned a variety of smart mobile devices,which will generate a great amount of computing-intensive businesses,and require corresponding resources of computation and communication.Multiaccess edge computing(MEC)can offload computing-intensive tasks to the nearby edge servers,which alleviates the pressure of devices.Ultra-dense network(UDN)can provide effective spectrum resources by deploying a large number of micro base stations.Furthermore,network slicing can support various applications in different communication scenarios.Therefore,this paper integrates the ultra-dense network slicing and the MEC technology,and introduces a hybrid computing offloading strategy in order to satisfy various quality of service(QoS)of edge devices.In order to dynamically allocate limited resources,the above problem is formulated as multiagent distributed deep reinforcement learning(DRL),which will achieve low overhead computation offloading strategy and real-time resource allocation decisions.In this context,federated learning is added to train DRL agents in a distributed manner,where each agent is dedicated to exploring actions composed of offloading decisions and allocating resources,so as to jointly optimize system delay and energy consumption.Simulation results show that the proposed learning algorithm has better performance compared with other strategies in literature. 展开更多
关键词 federated learning multiaccess edge computing mutiagent deep reinforcement learning resource allocation ultra-dense slicing network
在线阅读 下载PDF
An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing
3
作者 Ratih Hikmah Puspita Jehad Ali Byeong-hee Roh 《Computers, Materials & Continua》 SCIE EI 2023年第5期4611-4631,共21页
5G use cases,for example enhanced mobile broadband(eMBB),massive machine-type communications(mMTC),and an ultra-reliable low latency communication(URLLC),need a network architecture capable of sustaining stringent lat... 5G use cases,for example enhanced mobile broadband(eMBB),massive machine-type communications(mMTC),and an ultra-reliable low latency communication(URLLC),need a network architecture capable of sustaining stringent latency and bandwidth requirements;thus,it should be extremely flexible and dynamic.Slicing enables service providers to develop various network slice architectures.As users travel from one coverage region to another area,the callmust be routed to a slice thatmeets the same or different expectations.This research aims to develop and evaluate an algorithm to make handover decisions appearing in 5G sliced networks.Rules of thumb which indicates the accuracy regarding the training data classification schemes within machine learning should be considered for validation and selection of the appropriate machine learning strategies.Therefore,this study discusses the network model’s design and implementation of self-optimization Fuzzy Qlearning of the decision-making algorithm for slice handover.The algorithm’s performance is assessed by means of connection-level metrics considering the Quality of Service(QoS),specifically the probability of the new call to be blocked and the probability of a handoff call being dropped.Hence,within the network model,the call admission control(AC)method is modeled by leveraging supervised learning algorithm as prior knowledge of additional capacity.Moreover,to mitigate high complexity,the integration of fuzzy logic as well as Fuzzy Q-Learning is used to discretize state and the corresponding action spaces.The results generated from our proposal surpass the traditional methods without the use of supervised learning and fuzzy-Q learning. 展开更多
关键词 5g network slice fuzzy q-Learning slice handover
在线阅读 下载PDF
A splicing algorithm for best subset selection in sliced inverse regression
4
作者 Borui Tang Jin Zhu +1 位作者 Tingyin Wang Junxian Zhu 《中国科学技术大学学报》 北大核心 2025年第5期22-34,21,I0001,共15页
In this study,we examine the problem of sliced inverse regression(SIR),a widely used method for sufficient dimension reduction(SDR).It was designed to find reduced-dimensional versions of multivariate predictors by re... In this study,we examine the problem of sliced inverse regression(SIR),a widely used method for sufficient dimension reduction(SDR).It was designed to find reduced-dimensional versions of multivariate predictors by replacing them with a minimally adequate collection of their linear combinations without loss of information.Recently,regularization methods have been proposed in SIR to incorporate a sparse structure of predictors for better interpretability.However,existing methods consider convex relaxation to bypass the sparsity constraint,which may not lead to the best subset,and particularly tends to include irrelevant variables when predictors are correlated.In this study,we approach sparse SIR as a nonconvex optimization problem and directly tackle the sparsity constraint by establishing the optimal conditions and iteratively solving them by means of the splicing technique.Without employing convex relaxation on the sparsity constraint and the orthogonal constraint,our algorithm exhibits superior empirical merits,as evidenced by extensive numerical studies.Computationally,our algorithm is much faster than the relaxed approach for the natural sparse SIR estimator.Statistically,our algorithm surpasses existing methods in terms of accuracy for central subspace estimation and best subset selection and sustains high performance even with correlated predictors. 展开更多
关键词 splicing technique best subset selection sliced inverse regression nonconvex optimization sparsity constraint optimal conditions
在线阅读 下载PDF
Slice-GCN:基于程序切片与图神经网络的智能合约漏洞检测方法
5
作者 张人娄 吴胜 +1 位作者 张浩 刘方宇 《信息安全学报》 2025年第1期105-118,共14页
智能合约是一段由计算机代码构成的程序。随着智能合约数量的暴涨,如何利用漏洞检测方法来提升智能合约的安全性显得更加重要。已有的符号执行、模糊测试与形式化验证等漏洞检测方法自动化程度低,而基于序列模型的深度学习方法由于对智... 智能合约是一段由计算机代码构成的程序。随着智能合约数量的暴涨,如何利用漏洞检测方法来提升智能合约的安全性显得更加重要。已有的符号执行、模糊测试与形式化验证等漏洞检测方法自动化程度低,而基于序列模型的深度学习方法由于对智能合约源代码的特征挖掘不足导致检测结果的精度偏低。因此,本文提出一个基于程序切片与图神经网络的以太坊智能合约(简称智能合约)漏洞检测方法Slice-GCN。该方法先对程序进行代码预处理简化程序,再使用基于图可达性和数据流方程的程序切片方法对预处理后的程序进行切片,并将切片结果输入长短期记忆网络(LSTM)中提取智能合约的程序语义特征。接着,简化程序依赖图后将其输入图卷积神经网络中,并提取智能合约的程序结构特征。然后,将智能合约的程序语义特征和结构特征拼接后输入多层感知机(MLP)中,并对智能合约进行漏洞检测。在提出Slice-GCN方法的基础上,针对重入攻击、时间戳依赖及整数溢出三类漏洞,本文对Slice-GCN方法与Oyente、Osiris和Soliditycheck三款智能漏洞检测工具进行了对比实验,并且通过消融实验分析了程序切片、图神经网络及图收缩比例对实验结果的影响。实验结果表明本文提出的方法在各类指标上均有较大提升,能有效提升检测准确度和精度,降低误报率,同时在检测速度上也明显优于传统的智能合约漏洞检测工具。 展开更多
关键词 智能合约 漏洞检测 图神经网络 程序切片
在线阅读 下载PDF
An automated raw tissue precision slicing system for methodological advances in biomedical applications:streamlining decellularization in porcine cornea-derived tissue-specific bioink fabrication and beyond
6
作者 Won Bin Choi Yeon-ju Lee +2 位作者 Ju Young Park Jinah Jang Wan Kyun Chung 《Bio-Design and Manufacturing》 2025年第3期375-390,I0013-I0016,共20页
A decellularized extracellular matrix(dECM)constitutes a pivotal biomaterial created by decellularizing the natural extracellular matrix(ECM).This material serves as a supportive medium for intricate cellular interact... A decellularized extracellular matrix(dECM)constitutes a pivotal biomaterial created by decellularizing the natural extracellular matrix(ECM).This material serves as a supportive medium for intricate cellular interactions,fostering cell growth,differentiation,and organization.However,challenges persist in decellularization,necessitating a balance between preserving the ECM structural integrity and achieving effective cellular removal.An approach to enhancing decellularization involves pre-eliminating unnecessary tissues and effectively reducing final DNA levels to lower than 50 ng/mg ECM on preprocessed tissues.Although this strategic step augments decellularization efficiency,the current manual execution method depends on the operator’s skill.To address this limitation,this study proposed an automated raw tissue slicing system that does not require tissue preparation for slicing.Through carefully controlled tissue applanation pressure and oscillatory incisions with optimized parameters,the system achieved a precision within±10µm in obtaining submillimeter-scale tissue slices of the porcine cornea while avoiding significant microscopic complications in the tissue structure,as observed by tissue histology.These findings suggested the system’s capability to streamline and automate preliminary tissue slicing operations.The efficacy of this approach for decellularization was validated by processing porcine corneas using the proposed system and subsequently decellularizing the processed tissues.DNA level analysis revealed that sliced,subdivided tissues created by this system could expedite DNA reduction even at the initial steps of decellularization,enhancing the overall decellularization procedure. 展开更多
关键词 Raw tissue slicing Submillimeter-scale slices High-precision Oscillatory incision Applanation DECELLULARIZATION
暂未订购
Soft Resource Slicing for Industrial Mixed Traffic in 5G Networks
7
作者 Jingfang Ding Meng Zheng Haibin Yu 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期463-465,共3页
Dear Editor,This letter proposes a dynamic switching soft slicing strategy for industrial mixed traffic in 5G networks. Considering two types of traffic, periodic delay-sensitive (PDS) traffic and sporadic delay-toler... Dear Editor,This letter proposes a dynamic switching soft slicing strategy for industrial mixed traffic in 5G networks. Considering two types of traffic, periodic delay-sensitive (PDS) traffic and sporadic delay-tolerant (SDT) traffic, we design a dynamic switching strategy based on a traffic-Qo S-aware soft slicing (TQASS) scheme and a resource-efficiency-aware soft slicing (REASS) scheme. 展开更多
关键词 G networks industrial mixed traffic dynamic switching soft slicing strategy periodic delay sensitive traffic soft slicing dynamic switching g networks dynamic switching strategy
在线阅读 下载PDF
Slice-Based 6G Network with Enhanced Manta Ray Deep Reinforcement Learning-Driven Proactive and Robust Resource Management
8
作者 Venkata Satya Suresh kumar Kondeti Raghavendra Kulkarni +1 位作者 Binu Sudhakaran Pillai Surendran Rajendran 《Computers, Materials & Continua》 2025年第9期4973-4995,共23页
Next-generation 6G networks seek to provide ultra-reliable and low-latency communications,necessitating network designs that are intelligent and adaptable.Network slicing has developed as an effective option for resou... Next-generation 6G networks seek to provide ultra-reliable and low-latency communications,necessitating network designs that are intelligent and adaptable.Network slicing has developed as an effective option for resource separation and service-level differentiation inside virtualized infrastructures.Nonetheless,sustaining elevated Quality of Service(QoS)in dynamic,resource-limited systems poses significant hurdles.This study introduces an innovative packet-based proactive end-to-end(ETE)resource management system that facilitates network slicing with improved resilience and proactivity.To get around the drawbacks of conventional reactive systems,we develop a cost-efficient slice provisioning architecture that takes into account limits on radio,processing,and transmission resources.The optimization issue is non-convex,NP-hard,and requires online resolution in a dynamic setting.We offer a hybrid solution that integrates an advanced Deep Reinforcement Learning(DRL)methodology with an Improved Manta-Ray Foraging Optimization(ImpMRFO)algorithm.The ImpMRFO utilizes Chebyshev chaotic mapping for the formation of a varied starting population and incorporates Lévy flight-based stochastic movement to avert premature convergence,hence facilitating improved exploration-exploitation trade-offs.The DRL model perpetually acquires optimum provisioning strategies via agent-environment interactions,whereas the ImpMRFO enhances policy performance for effective slice provisioning.The solution,developed in Python,is evaluated across several 6G slicing scenarios that include varied QoS profiles and traffic requirements.The DRL model perpetually acquires optimum provisioning methods via agent-environment interactions,while the ImpMRFO enhances policy performance for effective slice provisioning.The solution,developed in Python,is evaluated across several 6G slicing scenarios that include varied QoS profiles and traffic requirements.Experimental findings reveal that the proactive ETE system outperforms DRL models and non-resilient provisioning techniques.Our technique increases PSSRr,decreases average latency,and optimizes resource use.These results demonstrate that the hybrid architecture for robust,real-time,and scalable slice management in future 6G networks is feasible. 展开更多
关键词 Sliced network manta ray foraging optimization Chebyshev chaotic map levy flight
在线阅读 下载PDF
Ensemble Encoder-Based Attack Traffic Classification for Secure 5G Slicing Networks
9
作者 Min-Gyu Kim Hwankuk Kim 《Computer Modeling in Engineering & Sciences》 2025年第5期2391-2415,共25页
This study proposes an efficient traffic classification model to address the growing threat of distributed denial-of-service(DDoS)attacks in 5th generation technology standard(5G)slicing networks.The proposed method u... This study proposes an efficient traffic classification model to address the growing threat of distributed denial-of-service(DDoS)attacks in 5th generation technology standard(5G)slicing networks.The proposed method utilizes an ensemble of encoder components from multiple autoencoders to compress and extract latent representations from high-dimensional traffic data.These representations are then used as input for a support vector machine(SVM)-based metadata classifier,enabling precise detection of attack traffic.This architecture is designed to achieve both high detection accuracy and training efficiency,while adapting flexibly to the diverse service requirements and complexity of 5G network slicing.The model was evaluated using the DDoS Datasets 2022,collected in a simulated 5G slicing environment.Experiments were conducted under both class-balanced and class-imbalanced conditions.In the balanced setting,the model achieved an accuracy of 89.33%,an F1-score of 88.23%,and an Area Under the Curve(AUC)of 89.45%.In the imbalanced setting(attack:normal 7:3),the model maintained strong robustness,=achieving a recall of 100%and an F1-score of 90.91%,demonstrating its effectiveness in diverse real-world scenarios.Compared to existing AI-based detection methods,the proposed model showed higher precision,better handling of class imbalance,and strong generalization performance.Moreover,its modular structure is well-suited for deployment in containerized network function(NF)environments,making it a practical solution for real-world 5G infrastructure.These results highlight the potential of the proposed approach to enhance both the security and operational resilience of 5G slicing networks. 展开更多
关键词 5G slicing networks attack traffic classification ensemble encoders autoencoder AI-based security
在线阅读 下载PDF
Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique
10
作者 Chin-Shiuh Shieh Thanh-Lam Nguyen +1 位作者 Thanh-Tuan Nguyen Mong-Fong Horng 《Computers, Materials & Continua》 2025年第3期4881-4912,共32页
DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity,capable of crippling critical infrastructures and disrupting services globally.As networks continue to expand and threats become m... DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity,capable of crippling critical infrastructures and disrupting services globally.As networks continue to expand and threats become more sophisticated,there is an urgent need for Intrusion Detection Systems(IDS)capable of handling these challenges effectively.Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics.This paper presents a novel approach for detecting unknown Distributed Denial of Service(DDoS)attacks by integrating Sliced Iterative Normalizing Flows(SINF)into IDS.SINF utilizes the Sliced Wasserstein distance to repeatedly modify probability distributions,enabling better management of high-dimensional data when there are only a few samples available.The unique architecture of SINF ensures efficient density estimation and robust sample generation,enabling IDS to adapt dynamically to emerging threats without relying heavily on predefined signatures or extensive retraining.By incorporating Open-Set Recognition(OSR)techniques,this method improves the system’s ability to detect both known and unknown attacks while maintaining high detection performance.The experimental evaluation on CICIDS2017 and CICDDoS2019 datasets demonstrates that the proposed system achieves an accuracy of 99.85%for known attacks and an F1 score of 99.99%after incremental learning for unknown attacks.The results clearly demonstrate the system’s strong generalization capability across unseen attacks while maintaining the computational efficiency required for real-world deployment. 展开更多
关键词 Distributed denial of service sliced iterative normalizing flows open-set recognition CYBERSECURITY deep learning
在线阅读 下载PDF
Drying Characteristics and Process Optimization of Banana Slices Using Hot Air-Infrared Combined Drying
11
作者 Guofeng Han Chenxi Luo +4 位作者 Xin Liu Yuanyuan Li Yuling Cheng Shuai Huang Dan Huang 《Frontiers in Heat and Mass Transfer》 2025年第6期1981-1999,共19页
Bananas are highly perishable after harvest,and processing them into dried products is a crucial approach to reducing losses and adding their economic values.To address the inefficiency and prolonged duration of tradi... Bananas are highly perishable after harvest,and processing them into dried products is a crucial approach to reducing losses and adding their economic values.To address the inefficiency and prolonged duration of traditional hot air drying(HAD)and the quality inconsistency associated with single infrared drying(IRD),this study proposed a novel hot air-infrared combined drying(HAD-IRD)strategy.The effects of HAD,IRD,and HAD-IRD on the drying kinetics,color,rehydration capacity,moisture diffusion mechanism,and sensory quality of banana slices were systematically investigated.The parameters of the combined drying process were optimized using an L_(9)(3^(3))orthogonal experimental design.Results indicated that both IRD and HAD-IRD significantly reduced drying time compared to single HAD.While single IRD achieved a rapid drying rate,the lack of effective convective airflow led to potential case-hardening and unstable product quality.In contrast,the HAD-IRD strategy demonstrated a synergistic effect.The optimal parameters were determined as follows:hot air temperature of 70℃,infrared temperature of 60℃,and radiation distance of 16 cm.Under these optimized conditions,HAD-IRD reduced the total drying time by over 70%while simultaneously yielding products with superior color,higher sensory scores,and improved rehydration ratio.This study confirms that HAD-IRD is an efficient and high-quality drying method for banana slices,providing a reliable theoretical foundation and technical solution for the drying of thermosensitive fruits. 展开更多
关键词 Banana slices hot air drying(HAD) infrared drying(IRD) combined drying process optimization product quality
在线阅读 下载PDF
P-Slicer:面向路径表示学习的程序切片方法
12
作者 刘天阳 石剑君 +1 位作者 叶嘉威 计卫星 《电子学报》 北大核心 2025年第11期3894-3909,共16页
程序切片技术作为软件分析中的基础性手段,在程序理解、缺陷定位、代码重构等任务中具有重要作用.其核心挑战在于如何在复杂控制流和数据流结构中准确识别与切片准则相关的代码片段.近年来,基于预训练大语言模型的切片方法因其对程序语... 程序切片技术作为软件分析中的基础性手段,在程序理解、缺陷定位、代码重构等任务中具有重要作用.其核心挑战在于如何在复杂控制流和数据流结构中准确识别与切片准则相关的代码片段.近年来,基于预训练大语言模型的切片方法因其对程序语义建模能力较强而展现出良好性能,然而受限于模型输入长度限制,难以有效处理长方法体及跨过程依赖等实际场景.针对以上问题,本文提出一种面向路径表示学习的程序切片方法P-Slicer.该方法首先通过构建基于语法结构的控制流图,从中提取多条可能的执行路径,以实现高代码覆盖率并保留上下文信息;随后,采用基于学习的分类模型对方法内部语句进行切片相关性判断;最后,结合变量的定义-使用传播机制,实现跨过程切片的递归分析.该方法在保持可扩展性的同时,融合了语义理解能力,提升了切片结果的准确性与实用性.实验结果表明,P-Slicer在切片任务中取得了95.95%的准确率、86.89%精确度和88.95%的召回率,且在处理长方法和跨过程切片时仍能保持良好性能,表明其在软件工程领域中的良好应用前景. 展开更多
关键词 程序切片 路径提取 跨过程分析
在线阅读 下载PDF
基于电子鼻技术的不同白芷饮片气味特征分析
13
作者 孙健 李海申 +1 位作者 蔡龙 王志安 《核农学报》 北大核心 2026年第4期754-761,共8页
为实现对不同白芷饮片品质的快速分析,本研究采用Super Nose电子鼻分析技术,结合主成分分析(PCA)、聚类分析(CA)、正交偏最小二乘法判别分析(OPLS-DA)等化学模式识别方法,快速判别白芷的种源、产地以及是否硫熏加工。结果表明,同圃不同... 为实现对不同白芷饮片品质的快速分析,本研究采用Super Nose电子鼻分析技术,结合主成分分析(PCA)、聚类分析(CA)、正交偏最小二乘法判别分析(OPLS-DA)等化学模式识别方法,快速判别白芷的种源、产地以及是否硫熏加工。结果表明,同圃不同种源白芷间的传感器响应值近似,电子鼻区分度不高;不同产地以及是否硫熏加工可以应用电子鼻进行有效区分,PCA、CA分析将样品分为川、浙无硫熏组,四川硫熏组,安徽无硫熏组,安徽硫熏组,河南、河北硫熏组以及河南、河北无硫熏组6组;OPLS-DA模型能对是否硫熏进行准确判别(Q^(2)=0.808),其中S8、S1和S2的变量重要性投影(VIP)值大于1。本研究可为白芷品质快速区分提供技术参考。 展开更多
关键词 电子鼻 白芷 饮片 产地 硫熏加工
暂未订购
基于5G承载网硬切片部署方案研究及测试验证
14
作者 张旭 屠礼彪 +1 位作者 郭胜楠 任枫华 《邮电设计技术》 2026年第1期24-28,共5页
为满足5G业务的差异化服务需求,推进5G承载网网络差异化能力构建,提出基于5G承载网的网络切片部署方案,并通过模拟测试论证了方案可行性,实现了异厂家技术解耦。该方案在实现业务差异化承载的同时,满足用户的定制化需求,推动网络高质量... 为满足5G业务的差异化服务需求,推进5G承载网网络差异化能力构建,提出基于5G承载网的网络切片部署方案,并通过模拟测试论证了方案可行性,实现了异厂家技术解耦。该方案在实现业务差异化承载的同时,满足用户的定制化需求,推动网络高质量发展和业务综合承载。 展开更多
关键词 5G 硬切片 FlexE 差异化服务
在线阅读 下载PDF
基于图和代码切片的可解释性漏洞检测方法
15
作者 高文超 索建华 张傲 《电子与信息学报》 北大核心 2026年第1期311-320,共10页
深度学习已被广泛应用于漏洞检测,其主流方法可分为基于代码序列和基于代码图两类:前者易因忽视结构而误报,后者则难以捕获执行顺序。此外,两者普遍缺乏可解释性,难以定位漏洞根源。为此,该文提出一种基于图和代码切片的可解释性漏洞检... 深度学习已被广泛应用于漏洞检测,其主流方法可分为基于代码序列和基于代码图两类:前者易因忽视结构而误报,后者则难以捕获执行顺序。此外,两者普遍缺乏可解释性,难以定位漏洞根源。为此,该文提出一种基于图和代码切片的可解释性漏洞检测方法GSVD。该模型通过门控图卷积网络提取代码多维度图(AST,DDG,CDG)的结构语义,并结合“污点”分析驱动的代码切片与双向长短时记忆网络,精准捕获代码序列特征,实现二者优势互补。同时,引入HITS算法思想,设计VDExplainer解释器,直观揭示了模型的决策过程。实验表明,GSVD在Devign数据集上准确率达64.57%,优于多种基线模型,证明了其在有效检测漏洞的同时,能实现代码行级的可解释定位。 展开更多
关键词 漏洞检测 深度学习 图神经网络 代码切片 可解释性
在线阅读 下载PDF
硬模板构建纳米β-磷酸三钙和纳米羟基磷灰石根管封闭材料
16
作者 李倩 曲曼姑丽·阿布都克力木 +1 位作者 邵子瑜 胡杨 《中国组织工程研究》 北大核心 2026年第14期3597-3608,共12页
背景:现阶段根管封闭剂多存在生物相容性、机械力学性能和降解性不佳的缺点,纳米β-磷酸三钙和纳米羟基磷灰石具有较好的生物相容性能、降解性和封闭性,在根管封闭剂领域有重要研究价值。目的:以牙本质片硬模板调控纳米β-磷酸三钙和纳... 背景:现阶段根管封闭剂多存在生物相容性、机械力学性能和降解性不佳的缺点,纳米β-磷酸三钙和纳米羟基磷灰石具有较好的生物相容性能、降解性和封闭性,在根管封闭剂领域有重要研究价值。目的:以牙本质片硬模板调控纳米β-磷酸三钙和纳米羟基磷灰石材料晶体的成核、生长及重构,构建微观形态和三维结构与牙体硬组织结构类似的新型根管封闭材料。方法:收集因智齿阻生而拔除的废弃第三磨牙30颗,制备牙本质片。将不同质量的纳米β-磷酸三钙(或纳米羟基磷灰石)分别溶于蒸馏水中,将溶液倒入含有牙本质片的培养皿中,置于37℃恒温培养箱中12 h,得到10%,20%,30%纳米β-磷酸三钙/牙本质片和10%,20%,30%纳米羟基磷灰石/牙本质片,以单纯的纳米β-磷酸三钙、纳米羟基磷灰石为对照。通过扫描电子显微镜、拉曼光谱、X射线衍射仪和X射线光电子能谱技术对8组样本进行表征和分析。结果与结论:①扫描电子显微镜:在牙本质片的调控下,纳米β-磷酸三钙和纳米羟基磷灰石的微观结构和形貌特征均发生了改变,纳米β-磷酸三钙颗粒形态由不规则多边形变为短棒状、球状,排列成三维团簇状,纳米羟基磷灰石颗粒形态由棒状、针状变为短棒状等多种形态;纳米β-磷酸三钙和纳米羟基磷灰石颗粒有序地排列在牙本质胶原纤维网络之间,并且随着纳米β-磷酸三钙或纳米羟基磷灰石浓度的增加,附着及团聚现象越来越明显,排列越来越紧密。②拉曼光谱:在牙本质片的调控作用下,纳米β-磷酸三钙和纳米羟基磷灰石的官能团未发生改变,但是随着纳米β-磷酸三钙或纳米羟基磷灰石浓度的增加,官能团特征峰的强度增强。③X射线衍射:在牙本质片的调控作用下,纳米β-磷酸三钙和纳米羟基磷灰石的结晶度提升,晶体结构更完整,晶粒变小,其中30%纳米β-磷酸三钙/牙本质片和30%纳米羟基磷灰石/牙本质片的结晶性最好。④X射线光电子能谱:在牙本质片的调控作用下,纳米β-磷酸三钙和纳米羟基磷灰石的元素组成未变,但出现部分化学态变化以及特征峰强度增强特征。⑤结果表明,以牙本质片为硬模板构建的纳米β-磷酸三钙或纳米羟基磷灰石复合材料表征性能稳定,牙本质片对纳米β-磷酸三钙和纳米羟基磷灰石具有一定的调控功能,其中30%纳米β-磷酸三钙/牙本质片、30%纳米羟基磷灰石/牙本质片表征性能更为优异。 展开更多
关键词 纳米β-磷酸三钙 纳米羟基磷灰石 硬模板 牙本质片 表征性能 晶体 微观形貌 分子结构
暂未订购
云南省烤烟挥发性物质的叶面区位差异分布
17
作者 王玉胜 王初亮 +4 位作者 李鑫楷 战磊 魏红茹 付博 张玺 《河南农业科学》 北大核心 2026年第3期171-180,共10页
为探究云南省上部烟叶中挥发性物质的纵向分布规律,以采自云南省曲靖市罗平县的云烟100 B2F等级烟叶为研究对象,沿烟叶主脉纵向均匀划分为10个区段(Q1—Q10),采用气相色谱-质谱联用技术(GC-MS)测定挥发性物质含量,结合层次聚类分析对区... 为探究云南省上部烟叶中挥发性物质的纵向分布规律,以采自云南省曲靖市罗平县的云烟100 B2F等级烟叶为研究对象,沿烟叶主脉纵向均匀划分为10个区段(Q1—Q10),采用气相色谱-质谱联用技术(GC-MS)测定挥发性物质含量,结合层次聚类分析对区段进行差异分组,并通过正交偏最小二乘判别分析(OPLS-DA)筛选组间差异香味物质。结果表明,在10个区段中共鉴定出145种挥发性物质(以烃类、醇类和酮类为主),其挥发性化合物总量沿叶尖至叶基(Q1—Q10)呈现先升高后降低再升高的变化趋势,Q7总量最高(129.66μg/g),Q9总量最低(48.11μg/g);层次聚类将烟叶划分为上段(Q1—Q4)、中段(Q5—Q7)和下段(Q8—Q10)3个特征区段。基于OPLS-DA模型进一步筛选出39种差异挥发性物质(变量重要性投影≥1、差异倍数≥2或差异倍数≤0.5、p<0.05),其中中段上调物质数量明显多于上段和下段,包含茄尼酮、大马士酮、二氢猕猴桃内酯等关键致香物质。通过感官评价发现,中段烟叶在香气量、香气质、余味及综合得分等方面均显著优于上段和下段烟叶,这一结果与挥发性物质的分布规律一致。综上,明确挥发性物质在烟叶纵向分布上的梯度规律,尤其揭示中段烟叶在香气品质上的优势,为烟叶原料高值化利用提供了科学依据。 展开更多
关键词 烤烟 烟叶分切 聚类分析 正交偏最小二乘判别分析 差异挥发性物质 感官质量
在线阅读 下载PDF
急倾斜煤层群煤岩放出流动规律及控制
18
作者 伍永平 王乐辰 +8 位作者 王红伟 王立伟 解盘石 田程阳 焦建强 闫壮壮 白金源 茹笑辉 王正富 《煤炭科学技术》 北大核心 2026年第3期1-12,共12页
急倾斜近距离煤层群水平分段开采,受倾角与边壁效应影响,煤岩流动规律复杂、放出率低,严重制约该类煤层的安全高效开采。以新疆天顺煤矿水平分段大采高综放联合开采工作面为工程背景,采用数值计算方法,系统研究了不同放煤工艺对煤岩流... 急倾斜近距离煤层群水平分段开采,受倾角与边壁效应影响,煤岩流动规律复杂、放出率低,严重制约该类煤层的安全高效开采。以新疆天顺煤矿水平分段大采高综放联合开采工作面为工程背景,采用数值计算方法,系统研究了不同放煤工艺对煤岩流动规律、放出体形态、放出率的影响机制,提出了以控制散体间隔岩层优先放出为核心的高效放煤控制技术,优化了联合综放工作面放煤工艺,并结合相似模拟与工业性试验验证了放煤工艺的科学性。结果表明:在急倾斜联合工作面开采过程中,煤岩放出体流动规律与放出率受顶、底板倾斜边壁与间隔岩层破碎矸石影响,下层散体顶煤在间隔岩层破碎矸石与底板的夹持作用下,导致联合开采工作面底板侧三角煤量远大于顶板侧,上层散体顶煤受间隔岩层影响较小;根据不同放煤工艺下煤岩放出情况,提出优先保证散体间隔岩层放出,减少其对下煤层散体顶煤约束效应的控制技术,进而提高急倾斜联合开采工作面煤岩放出率;最后结合天顺矿井中组煤地质条件,提出采用顶板向底板多轮间隔放煤工艺,可有效削减间隔岩层破碎矸石对煤层的约束效应。根据现场工业性试验验证,采用该放煤工艺可使工作面日产量相较于其他放煤工艺提升最高达24.5%,大幅减少顶、底板侧三角煤损失。 展开更多
关键词 急倾斜近距离煤层群 水平分段 煤岩同放 放煤工艺 放煤规律
在线阅读 下载PDF
开发地震沉积学方法在松辽盆地M2区块扶余油层砂岩预测中的应用
19
作者 李操 杨春生 +2 位作者 刘宗堡 陈国松 史洪波 《物探与化探》 2026年第1期43-52,共10页
松辽盆地北部长垣南地区扶余油层砂岩储层发育,是大庆油田增储建产的重点区域,孔隙度为9.0%~13.6%,渗透率为0.1%~3.21%,属于致密砂岩储层,需要采用水平井+大规模体积压裂的方式开发动用,因而对砂体预测提出了较高的精度要求。本区扶余... 松辽盆地北部长垣南地区扶余油层砂岩储层发育,是大庆油田增储建产的重点区域,孔隙度为9.0%~13.6%,渗透率为0.1%~3.21%,属于致密砂岩储层,需要采用水平井+大规模体积压裂的方式开发动用,因而对砂体预测提出了较高的精度要求。本区扶余油层的主要储层以扶Ⅰ油层组、扶Ⅱ油层组为主,其沉积环境以三角洲平原亚相为主,砂体分布具有平面变化快、单层厚度薄、纵向错叠分布的特征,砂体的地震响应特征复杂,储层预测难度大。针对扶余油层致密砂岩储层的沉积特点,本文采用开发地震沉积学方法开展砂体预测,通过基于本区井参数的地震正演分析明确了薄层致密砂岩的地震响应特征,进而开展了地层切片自动优选、砂岩厚度平面定量预测等技术的综合应用。研究表明:长垣南扶余油层地震振幅与小层砂岩厚度之间存在正相关关系;开发地震沉积学技术的研究与应用能够定量描述小层砂体平面分布规律,有力支撑了本区水平井开发先导试验区的井位成功部署与实施。长垣南M2区块扶余致密油水平井开发试验的成功,为松辽盆地北部致密油开发提供了示范,在后续的水平井设计与实施中应强化开发地震沉积学砂岩预测技术的应用,保障砂岩和油层钻遇率,为扶余油层致密油的成功开发提供技术保障。 展开更多
关键词 地震正演 地层切片优选 开发地震沉积学 水平井 致密砂岩储层
在线阅读 下载PDF
基于Slice的H.264并行视频编码算法 被引量:11
20
作者 宁华 梅铮 李锦涛 《计算机工程》 EI CAS CSCD 北大核心 2005年第4期181-182,211,共3页
从H.264视频编码标准的特点出发,提出了基于Slice级别的H.264视频编码并行算法,该算法不仅能够保证节点间的负载平衡,减少各节点间数据的依赖关系,还充分利用了已有的计算能力。最后给出了在曙光3000上的实验结果。
关键词 H.264 视频编码 并行 SLICE
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部