期刊文献+
共找到758篇文章
< 1 2 38 >
每页显示 20 50 100
C-BIVM:A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities
1
作者 Radhika Kumari Kiranbir Kaur +4 位作者 Ahmad Almogren Ayman Altameem Salil Bharany Yazeed Yasin Ghadi Ateeq Ur Rehman 《Computers, Materials & Continua》 2025年第9期5509-5525,共17页
The exponential growth of the Internet of Things(IoT)has revolutionized various domains such as healthcare,smart cities,and agriculture,generating vast volumes of data that require secure processing and storage in clo... The exponential growth of the Internet of Things(IoT)has revolutionized various domains such as healthcare,smart cities,and agriculture,generating vast volumes of data that require secure processing and storage in cloud environments.However,reliance on cloud infrastructure raises critical security challenges,particularly regarding data integrity.While existing cryptographic methods provide robust integrity verification,they impose significant computational and energy overheads on resource-constrained IoT devices,limiting their applicability in large-scale,real-time scenarios.To address these challenges,we propose the Cognitive-Based Integrity Verification Model(C-BIVM),which leverages Belief-Desire-Intention(BDI)cognitive intelligence and algebraic signatures to enable lightweight,efficient,and scalable data integrity verification.The model incorporates batch auditing,reducing resource consumption in large-scale IoT environments by approximately 35%,while achieving an accuracy of over 99.2%in detecting data corruption.C-BIVM dynamically adapts integrity checks based on real-time conditions,optimizing resource utilization by minimizing redundant operations by more than 30%.Furthermore,blind verification techniques safeguard sensitive IoT data,ensuring privacy compliance by preventing unauthorized access during integrity checks.Extensive experimental evaluations demonstrate that C-BIVM reduces computation time for integrity checks by up to 40%compared to traditional bilinear pairing-based methods,making it particularly suitable for IoT-driven applications in smart cities,healthcare,and beyond.These results underscore the effectiveness of C-BIVM in delivering a secure,scalable,and resource-efficient solution tailored to the evolving needs of IoT ecosystems. 展开更多
关键词 Internet of Things(IoT) smart cities data integrity verification BDI cognitive intelligence algebraic signatures batch auditing resource-constrained devices blind verification
在线阅读 下载PDF
Establishment and verification of anthropogenic speciated VOCs emission inventory of Central China 被引量:3
2
作者 Xuan Lu Dong Zhang +9 位作者 Lanxin Wang Shefang Wang Xinran Zhang Yali Liu Keying Chen Xinshuai Song Shasha Yin Ruiqin Zhang Shanshan Wang Minghao Yuan 《Journal of Environmental Sciences》 2025年第3期406-418,共13页
Improving the accuracy of anthropogenic volatile organic compounds(VOCs)emission inventory is crucial for reducing atmospheric pollution and formulating control policy of air pollution.In this study,an anthropogenic s... Improving the accuracy of anthropogenic volatile organic compounds(VOCs)emission inventory is crucial for reducing atmospheric pollution and formulating control policy of air pollution.In this study,an anthropogenic speciated VOCs emission inventory was established for Central China represented by Henan Province at a 3 km×3 km spatial resolution based on the emission factormethod.The 2019 VOCs emission in Henan Provincewas 1003.5 Gg,while industrial process source(33.7%)was the highest emission source,Zhengzhou(17.9%)was the city with highest emission and April and August were the months with the more emissions.High VOCs emission regions were concentrated in downtown areas and industrial parks.Alkanes and aromatic hydrocarbons were the main VOCs contribution groups.The species composition,source contribution and spatial distribution were verified and evaluated through tracer ratio method(TR),Positive Matrix Factorization Model(PMF)and remote sensing inversion(RSI).Results show that both the emission results by emission inventory(EI)(15.7 Gg)and by TRmethod(13.6 Gg)and source contribution by EI and PMF are familiar.The spatial distribution of HCHO primary emission based on RSI is basically consistent with that of HCHO emission based on EI with a R-value of 0.73.The verification results show that the VOCs emission inventory and speciated emission inventory established in this study are relatively reliable. 展开更多
关键词 VOCs verification Species composition Tracer ratio PMF Remote sensing inversion
原文传递
Research on multi-scale simulation and dynamic verification of high dynamic MEMS components in additive manufacturing 被引量:1
3
作者 Sining Lv Hengzhen Feng +2 位作者 Wenzhong Lou Chuan Xiao Shiyi Li 《Defence Technology(防务技术)》 2025年第5期275-291,共17页
Metal Additive Manufacturing(MAM) technology has become an important means of rapid prototyping precision manufacturing of special high dynamic heterogeneous complex parts. In response to the micromechanical defects s... Metal Additive Manufacturing(MAM) technology has become an important means of rapid prototyping precision manufacturing of special high dynamic heterogeneous complex parts. In response to the micromechanical defects such as porosity issues, significant deformation, surface cracks, and challenging control of surface morphology encountered during the selective laser melting(SLM) additive manufacturing(AM) process of specialized Micro Electromechanical System(MEMS) components, multiparameter optimization and micro powder melt pool/macro-scale mechanical properties control simulation of specialized components are conducted. The optimal parameters obtained through highprecision preparation and machining of components and static/high dynamic verification are: laser power of 110 W, laser speed of 600 mm/s, laser diameter of 75 μm, and scanning spacing of 50 μm. The density of the subordinate components under this reference can reach 99.15%, the surface hardness can reach 51.9 HRA, the yield strength can reach 550 MPa, the maximum machining error of the components is 4.73%, and the average surface roughness is 0.45 μm. Through dynamic hammering and high dynamic firing verification, SLM components meet the requirements for overload resistance. The results have proven that MEM technology can provide a new means for the processing of MEMS components applied in high dynamic environments. The parameters obtained in the conclusion can provide a design basis for the additive preparation of MEMS components. 展开更多
关键词 Additive manufacturing High dynamic MEMS components Multiscale control Process optimization High dynamic verification
在线阅读 下载PDF
Enhanced Kinship Verification through Ear Images:A Comparative Study of CNNs,Attention Mechanisms,and MLP Mixer Models
4
作者 Thien-Tan Cao Huu-Thanh Duong +3 位作者 Viet-Tuan Le Hau Nguyen Trung Vinh Truong Hoang Kiet Tran-Trung 《Computers, Materials & Continua》 2025年第6期4373-4391,共19页
Kinship verification is a key biometric recognition task that determines biological relationships based on physical features.Traditional methods predominantly use facial recognition,leveraging established techniques a... Kinship verification is a key biometric recognition task that determines biological relationships based on physical features.Traditional methods predominantly use facial recognition,leveraging established techniques and extensive datasets.However,recent research has highlighted ear recognition as a promising alternative,offering advantages in robustness against variations in facial expressions,aging,and occlusions.Despite its potential,a significant challenge in ear-based kinship verification is the lack of large-scale datasets necessary for training deep learning models effectively.To address this challenge,we introduce the EarKinshipVN dataset,a novel and extensive collection of ear images designed specifically for kinship verification.This dataset consists of 4876 high-resolution color images from 157 multiracial families across different regions,forming 73,220 kinship pairs.EarKinshipVN,a diverse and large-scale dataset,advances kinship verification research using ear features.Furthermore,we propose the Mixer Attention Inception(MAI)model,an improved architecture that enhances feature extraction and classification accuracy.The MAI model fuses Inceptionv4 and MLP Mixer,integrating four attention mechanisms to enhance spatial and channel-wise feature representation.Experimental results demonstrate that MAI significantly outperforms traditional backbone architectures.It achieves an accuracy of 98.71%,surpassing Vision Transformer models while reducing computational complexity by up to 95%in parameter usage.These findings suggest that ear-based kinship verification,combined with an optimized deep learning model and a comprehensive dataset,holds significant promise for biometric applications. 展开更多
关键词 Biometric analytics ear kin Inceptionv4 kinship verification KIN ear images
在线阅读 下载PDF
Design and Ground Verification for Vision-Based Relative Navigation Systems of Microsatellites
5
作者 DU Ronghua LIAO Wenhe ZHANG Xiang 《Transactions of Nanjing University of Aeronautics and Astronautics》 2025年第1期37-55,共19页
This paper presents the design and ground verification for vision-based relative navigation systems of microsatellites,which offers a comprehensive hardware design solution and a robust experimental verification metho... This paper presents the design and ground verification for vision-based relative navigation systems of microsatellites,which offers a comprehensive hardware design solution and a robust experimental verification methodology for practical implementation of vision-based navigation technology on the microsatellite platform.Firstly,a low power consumption,light weight,and high performance vision-based relative navigation optical sensor is designed.Subsequently,a set of ground verification system is designed for the hardware-in-the-loop testing of the vision-based relative navigation systems.Finally,the designed vision-based relative navigation optical sensor and the proposed angles-only navigation algorithms are tested on the ground verification system.The results verify that the optical simulator after geometrical calibration can meet the requirements of the hardware-in-the-loop testing of vision-based relative navigation systems.Based on experimental results,the relative position accuracy of the angles-only navigation filter at terminal time is increased by 25.5%,and the relative speed accuracy is increased by 31.3% compared with those of optical simulator before geometrical calibration. 展开更多
关键词 microsatellites vision-based relative navigation optical simulator ground verification angles-only navigation
在线阅读 下载PDF
Verification and Validation for Large Eddy Simulation of Cavitating Flow Around a Projectile Near the Free Surface
6
作者 Linfeng Deng Yun Long +1 位作者 Huaiyu Cheng Bin Ji 《哈尔滨工程大学学报(英文版)》 2025年第4期659-681,共23页
Verification and validation(V&V)is a helpful tool for evaluating simulation errors,but its application in unsteady cavitating flow remains a challenging issue due to the difficulty in meeting the requirement of an... Verification and validation(V&V)is a helpful tool for evaluating simulation errors,but its application in unsteady cavitating flow remains a challenging issue due to the difficulty in meeting the requirement of an asymptotic range.Hence,a new V&V approach for large eddy simulation(LES)is proposed.This approach offers a viable solution for the error estimation of simulation data that are unable to satisfy the asymptotic range.The simulation errors of cavitating flow around a projectile near the free surface are assessed using the new V&V method.The evident error values are primarily dispersed around the cavity region and free surface.The increasingly intense cavitating flow increases the error magnitudes.In addition,the modeling error magnitudes of the Dynamic Smagorinsky-Lilly model are substantially smaller than that of the Smagorinsky-Lilly model.The present V&V method can capture the decrease in the modeling errors due to model enhancements,further exhibiting its applicability in cavitating flow simulations.Moreover,the monitoring points where the simulation data are beyond the asymptotic range are primarily dispersed near the cavity region,and the number of such points grows as the cavitating flow intensifies.The simulation outcomes also suggest that the re-entrant jet and shedding cavity collapse are the chief sources of vorticity motions,which remarkably affect the simulation accuracy.The results of this study provide a valuable reference for V&V research. 展开更多
关键词 Cavitating flow Free surface verification and validation Error analyses Asymptotic range
在线阅读 下载PDF
Toward next-generation networks:A blockchain-based approach for core network architecture and roaming identity verification
7
作者 Yi Gong Boyuan Yu +4 位作者 Lei Yang Fanke Meng Lei Liu Xinjue Hu Zhan Xu 《Digital Communications and Networks》 2025年第2期326-336,共11页
With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN ... With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN and data security by proposing a novel framework based on blockchain technology that is specifically designed for communication networks.Traditional centralized network architectures are vulnerable to Distributed Denial of Service(DDoS)attacks,particularly in roaming scenarios where there is also a risk of private data leakage,which imposes significant operational demands.To address these issues,we introduce the Blockchain-Enhanced Core Network Architecture(BECNA)and the Secure Decentralized Identity Authentication Scheme(SDIDAS).The BECNA utilizes blockchain technology to decentralize data storage,enhancing network security,stability,and reliability by mitigating Single Points of Failure(SPoF).The SDIDAS utilizes Decentralized Identity(DID)technology to secure user identity data and streamline authentication in roaming scenarios,significantly reducing the risk of data breaches during cross-network transmissions.Our framework employs Ethereum,free5GC,Wireshark,and UERANSIM tools to create a robust,tamper-evident system model.A comprehensive security analysis confirms substantial improvements in user privacy and network security.Simulation results indicate that our approach enhances communication CNs security and reliability,while also ensuring data security. 展开更多
关键词 Blockchain Core network Privacy data protection Decentralized identity Roaming identity verification
在线阅读 下载PDF
Verification and validation of a numerical wave tank with momentum source wave generation
8
作者 Housheng Zhang Yijing Hu +1 位作者 Biao Huang Xin Zhao 《Acta Mechanica Sinica》 2025年第3期23-38,共16页
systematic verification and validation(V&V)of our previously proposed momentum source wave generation method is performed.Some settings of previous numerical wave tanks(NWTs)of regular and irregular waves have bee... systematic verification and validation(V&V)of our previously proposed momentum source wave generation method is performed.Some settings of previous numerical wave tanks(NWTs)of regular and irregular waves have been optimized.The H2-5 V&V method involving five mesh sizes with mesh refinement ratio being 1.225 is used to verify the NWT of regular waves,in which the wave height and mass conservation are mainly considered based on a Lv3(H s=0.75 m)and a Lv6(H s=5 m)regular wave.Additionally,eight different sea states are chosen to validate the wave height,mass conservation and wave frequency of regular waves.Regarding the NWT of irregular waves,five different sea states with significant wave heights ranging from 0.09 m to 12.5 m are selected to validate the statistical characteristics of irregular waves,including the profile of the wave spectrum,peak frequency and significant wave height.Results show that the verification errors for Lv3 and Lv6 regular wave on the most refined grid are−0.018 and−0.35 for wave height,respectively,and−0.14 and for−0.17 mass conservation,respectively.The uncertainty estimation analysis shows that the numerical error could be partially balanced out by the modelling error to achieve a smaller validation error by adjusting the mesh size elaborately.And the validation errors of the wave height,mass conservation and dominant frequency of regular waves under different sea states are no more than 7%,8% and 2%,respectively.For a Lv3(H_(s)=0.75 m)and a Lv6(H_(s)=5 m)regular wave,simulations are validated on the wave height in wave development section for safety factors FS≈1 and FS≈0.5-1,respectively.Regarding irregular waves,the validation errors of the significant wave height and peak frequency are both lower than 2%. 展开更多
关键词 verification and validation Wave generation Momentum source function Regular wave Irregular wave Uncertainty estimation
原文传递
Contextual design and real-time verification for agile casting design
9
作者 Dong Xiang Chu-hao Zhou +3 位作者 Xuan-pu Dong Shu-ren Guo Yan-song Ding Hua-tang Cao 《China Foundry》 2025年第2期231-238,共8页
In the foundry industries,process design has traditionally relied on manuals and complex theoretical calculations.With the advent of 3D design in casting,computer-aided design(CAD)has been applied to integrate the fea... In the foundry industries,process design has traditionally relied on manuals and complex theoretical calculations.With the advent of 3D design in casting,computer-aided design(CAD)has been applied to integrate the features of casting process,thereby expanding the scope of design options.These technologies use parametric model design techniques for rapid component creation and use databases to access standard process parameters and design specifications.However,3D models are currently still created through inputting or calling parameters,which requires numerous verifications through calculations to ensure the design rationality.This process may be significantly slowed down due to repetitive modifications and extended design time.As a result,there are increasingly urgent demands for a real-time verification mechanism to address this issue.Therefore,this study proposed a novel closed-loop model and software development method that integrated contextual design with real-time verification,dynamically verifying relevant rules for designing 3D casting components.Additionally,the study analyzed three typical closed-loop scenarios of agile design in an independent developed intelligent casting process system.It is believed that foundry industries can potentially benefit from favorably reduced design cycles to yield an enhanced competitive product market. 展开更多
关键词 agile design context-design casting process design real-time verification smart manufacturing
在线阅读 下载PDF
Research on Variable Condition Properties and Experimental Verification of a Variable Cross-Section Scroll Expander
10
作者 Junying Wei Guangxian Yin +5 位作者 Jihao Zhang Wenwen Chang Chenrui Zhang Zhengyi Li Long Chang Minghan Peng 《Frontiers in Heat and Mass Transfer》 2025年第4期1185-1201,共17页
The scroll expander,as the core component of the micro-compressed air energy storage and power generation system,directly affects the output efficiency of the system.Meanwhile,the scroll profile plays a central role i... The scroll expander,as the core component of the micro-compressed air energy storage and power generation system,directly affects the output efficiency of the system.Meanwhile,the scroll profile plays a central role in determining the output performance of the scroll expander.In this study,in order to investigate the output characteristics of a variable cross-section scroll expander,numerical simulation and experimental studies were con-ducted by using Computational Fluid Dynamics(CFD)methods and dynamic mesh techniques.The impact of critical parameters on the output performance of the scroll expander was analyzed through the utilization of the control variable method.It is found that increasing the inlet pressure and temperature within a certain range can improve the output power of the scroll expander.However,the increase in temperature and meshing clearance leads to a decline in the overall output performance of the scroll expander,leading to a decrease in volumetric efficiency by 8.43%and 12.79%,respectively.The experiments demonstrate that under equal inlet pressure conditions,increasing the inlet temperature elevates both the rotational speed and torque output of the scroll expander.Specifically,compared to operating at normal temperatures,the output torque increases by 21.8%under high-temperature conditions.However,the rate of speed and torque variation decreases as a consequence of enlarged meshing clearance,resulting in increased internal leakage and reduction in isentropic efficiency. 展开更多
关键词 Circular involute variable cross-section scroll expander numerical simulation internal flow field output characteristics experimental verification
在线阅读 下载PDF
Study on the Construction and Verification of CDIO Teaching Model Based on AI Virtual Scene Data Feedback
11
作者 Yanyan Wang Wenyan Qu Yuman Yuan 《Journal of Contemporary Educational Research》 2025年第10期164-173,共10页
Combining the characteristics of the course“Comprehensive Training of E-Commerce Live Streaming,”this paper embeds the CDIO(Conceive-Design-Implement-Operate)method into the live streaming training process,carries o... Combining the characteristics of the course“Comprehensive Training of E-Commerce Live Streaming,”this paper embeds the CDIO(Conceive-Design-Implement-Operate)method into the live streaming training process,carries out the virtual scene“e-commerce live streaming”course design and project-based teaching reform that integrates teaching training with learning effects,and establishes a set of cross-professional student live streaming training procedures guided by the CDIO engineering method.The training results show that the CDIO practical teaching model supported by data feedback plays an important role and significance in improving students’learning effects,and also provides some new experiences for integrating engineering thinking into the construction of new liberal arts. 展开更多
关键词 CDIO Teaching model Construction and verification
在线阅读 下载PDF
Refinement modeling and verification of secure operating systems for communication in digital twins
12
作者 Zhenjiang Qian Gaofei Sun +1 位作者 Xiaoshuang Xing Gaurav Dhiman 《Digital Communications and Networks》 SCIE CSCD 2024年第2期304-314,共11页
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations. 展开更多
关键词 Theorem proving Isabelle/HOL Formal verification System modeling Correctness verification
在线阅读 下载PDF
Verification and Application Evaluation of Intelligent Audit Rules for The UN9000 Urine Analysis System
13
作者 Hualin He Ling Zhang +8 位作者 Weiwei Shi Rui Wang Chuanxin Dai Jun Li Zheng Wang Li Zuo Qunchao Wang Ning Li Jianmin Li 《Journal of Clinical and Nursing Research》 2024年第3期238-246,共9页
Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to... Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to November 2021 were randomly selected,and all samples were manually microscopic examined after the detection of the UN9000 urine analysis line.The intelligent audit rules(including the microscopic review rules and manual verification rules)were validated based on the manual microscopic examination and manual audit,and the rules were adjusted to apply to our laboratory.The laboratory turnaround time(TAT)before and after the application of intelligent audit rules was compared.Result:The microscopic review rate of intelligent rules was 25.63%(292/1139),the true positive rate,false positive rate,true negative rate,and false negative rate were 27.66%(315/1139),6.49%(74/1139),62.34%(710/1139)and 3.51%(40/1139),respectively.The approval consistency rate of manual verification rules was 84.92%(727/856),the approval inconsistency rate was 0%(0/856),the interception consistency rate was 12.61%(108/856),and the interception inconsistency rate was 0%(0/856).Conclusion:The intelligence audit rules for urine analysis by Cui et al.have good clinical applicability in our laboratory. 展开更多
关键词 URINALYSIS Manual verification rules Intelligent verification TAT
在线阅读 下载PDF
Semantic Consistency and Correctness Verification of Digital Traffic Rules 被引量:1
14
作者 Lei Wan Changjun Wang +3 位作者 Daxin Luo Hang Liu Sha Ma Weichao Hu 《Engineering》 SCIE EI CAS CSCD 2024年第2期47-62,共16页
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules... The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS). 展开更多
关键词 Autonomous driving Traffic rules DIGITIZATION FORMALIZATION verification
在线阅读 下载PDF
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing 被引量:1
15
作者 Xu Li Gwanggil Jeon +1 位作者 Wenshuo Wang Jindong Zhao 《Digital Communications and Networks》 SCIE CSCD 2024年第3期645-654,共10页
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ... The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data. 展开更多
关键词 5G network Crowd-sensing Privacy protection Ring signature Batch verification
在线阅读 下载PDF
The First Verification Test of Space-Ground Collaborative Intelligence via Cloud-Native Satellites 被引量:1
16
作者 Wang Shangguang Zhang Qiyang +2 位作者 Xing Ruolin Qi Fei Xu Mengwei 《China Communications》 SCIE CSCD 2024年第4期208-217,共10页
Recent advancements in satellite technologies and the declining cost of access to space have led to the emergence of large satellite constellations in Low Earth Orbit(LEO).However,these constellations often rely on be... Recent advancements in satellite technologies and the declining cost of access to space have led to the emergence of large satellite constellations in Low Earth Orbit(LEO).However,these constellations often rely on bent-pipe architecture,resulting in high communication costs.Existing onboard inference architectures suffer from limitations in terms of low accuracy and inflexibility in the deployment and management of in-orbit applications.To address these challenges,we propose a cloud-native-based satellite design specifically tailored for Earth Observation tasks,enabling diverse computing paradigms.In this work,we present a case study of a satellite-ground collaborative inference system deployed in the Tiansuan constellation,demonstrating a remarkable 50%accuracy improvement and a substantial 90%data reduction.Our work sheds light on in-orbit energy,where in-orbit computing accounts for 17%of the total onboard energy consumption.Our approach represents a significant advancement of cloud-native satellite,aiming to enhance the accuracy of in-orbit computing while simultaneously reducing communication cost. 展开更多
关键词 cloud-native satellite orbital edge computing satellite inference verification test
在线阅读 下载PDF
Aeroengine thrust estimation and embedded verification based on improved temporal convolutional network
17
作者 Wanzhi MENG Zhuorui PAN +2 位作者 Sixin WEN Pan QIN Ximing SUN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2024年第1期106-117,共12页
Thrust estimation is a significant part of aeroengine thrust control systems.The traditional estimation methods are either low in accuracy or large in computation.To further improve the estimation effect,a thrust esti... Thrust estimation is a significant part of aeroengine thrust control systems.The traditional estimation methods are either low in accuracy or large in computation.To further improve the estimation effect,a thrust estimator based on Multi-layer Residual Temporal Convolutional Network(M-RTCN)is proposed.To solve the problem of dead Rectified Linear Unit(ReLU),the proposed method uses the Gaussian Error Linear Unit(GELU)activation function instead of ReLU in residual block.Then the overall architecture of the multi-layer convolutional network is adjusted by using residual connections,so that the network thrust estimation effect and memory consumption are further improved.Moreover,the comparison with seven other methods shows that the proposed method has the advantages of higher estimation accuracy and faster convergence speed.Furthermore,six neural network models are deployed in the embedded controller of the micro-turbojet engine.The Hardware-in-the-Loop(HIL)testing results demonstrate the superiority of M-RTCN in terms of estimation accuracy,memory occupation and running time.Finally,an ignition verification is conducted to confirm the expected thrust estimation and real-time performance. 展开更多
关键词 Thrust estimation Temporal convolutional network Embedded deployment Hardware-in-the-loop testing Ignition verification
原文传递
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
18
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
在线阅读 下载PDF
Research on Verification Method of Motor Startups in Nuclear Power Plants Based on Topology Recognition
19
作者 Li Baozhu Dong Weijie Chen Chao 《系统仿真学报》 CAS CSCD 北大核心 2024年第12期2813-2823,共11页
There are many motors in operation or on standby in nuclear power plants,and the startup of group motors will have a great impact on the voltage of the emergency bus.At present,there is no special or inexpensive softw... There are many motors in operation or on standby in nuclear power plants,and the startup of group motors will have a great impact on the voltage of the emergency bus.At present,there is no special or inexpensive software to solve this problem,and the experience of engineers is not accurate enough.Therefore,this paper developed a method and system for the startup calculation of group motors in nuclear power plants and proposed an automatic generation method of circuit topology in nuclear power plants.Each component in the topology was given its unique number,and the component class could be constructed according to its type and upper and lower connections.The subordination and topology relationship of switches,buses,and motors could be quickly generated by the program according to the component class,and the simplified direct power flow algorithm was used to calculate the power flow for the startup of group motors according to the above relationship.Then,whether the bus voltage is in the safe range and whether the voltage exceeds the limit during the startup of the group motor could be judged.The practical example was used to verify the effectiveness of the method.Compared with other professional software,the method has high efficiency and low cost. 展开更多
关键词 power supply for nuclear power plant automatic topology recognition startup of group motor simplified direct power flow algorithm verification method
原文传递
Ghost Module Based Residual Mixture of Self-Attention and Convolution for Online Signature Verification
20
作者 Fangjun Luan Xuewen Mu Shuai Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第4期695-712,共18页
Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries.However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational h... Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries.However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toaddress these issues, we propose a novel approach for online signature verification, using a one-dimensionalGhost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolutionwith a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residualstructure is introduced to leverage both self-attention and convolution mechanisms for capturing global featureinformation and extracting local information, effectively complementing whole and local signature features andmitigating the problem of insufficient feature extraction. Then, the Ghost-based Convolution and Self-Attention(ACG) block is proposed to simplify the common parts between convolution and self-attention using the Ghostmodule and employ feature transformation to obtain intermediate features, thus reducing computational costs.Additionally, feature selection is performed using the random forestmethod, and the data is dimensionally reducedusing Principal Component Analysis (PCA). Finally, tests are implemented on the MCYT-100 datasets and theSVC-2004 Task2 datasets, and the equal error rates (EERs) for small-sample training using five genuine andforged signatures are 3.07% and 4.17%, respectively. The EERs for training with ten genuine and forged signaturesare 0.91% and 2.12% on the respective datasets. The experimental results illustrate that the proposed approacheffectively enhances the accuracy of online signature verification. 展开更多
关键词 Online signature verification feature selection ACG block ghost-ACmix residual structure
在线阅读 下载PDF
上一页 1 2 38 下一页 到第
使用帮助 返回顶部