期刊文献+
共找到30,988篇文章
< 1 2 250 >
每页显示 20 50 100
UPLC-PDA法同时测定舒肝平胃丸中8种成分的含量
1
作者 陈帅 李舒曼 +1 位作者 张吉波 王慧竹 《中成药》 北大核心 2025年第10期3196-3199,共4页
目的建立UPLC-PDA法同时测定舒肝平胃丸中甘草苷、异甘草苷、甘草素、异甘草素、柚皮苷、橙皮苷、新橙皮苷、和厚朴酚的含量。方法分析采用ACQUITY UPLC HSS T3色谱柱(2.1 mm×100 mm,1.8μm);流动相乙腈-0.2%甲酸,梯度洗脱;体积流... 目的建立UPLC-PDA法同时测定舒肝平胃丸中甘草苷、异甘草苷、甘草素、异甘草素、柚皮苷、橙皮苷、新橙皮苷、和厚朴酚的含量。方法分析采用ACQUITY UPLC HSS T3色谱柱(2.1 mm×100 mm,1.8μm);流动相乙腈-0.2%甲酸,梯度洗脱;体积流量0.4 mL/min;柱温38℃;检测波长276、283、294、361、371 nm。结果8种成分在各自范围内线性关系良好(r>0.9990),平均加样回收率96.87%~108.46%,RSD 1.06%~1.79%。结论该方法专属性强,准确度高,重复性好,可用于舒肝平胃丸的质量控制。 展开更多
关键词 舒肝平胃丸 化学成分 含量测定 UPLC-pda
暂未订购
医疗失效模式和效应分析对提高临床护理人员用药过程中PDA扫码率的效果
2
作者 李红 孟小转 +2 位作者 郑晓红 王爱华 李红 《医疗装备》 2025年第9期54-56,共3页
目的分析医疗失效模式和效应分析(HFMEA)对提高临床护理人员用药过程中个人数字助理(PDA)扫码率的效果。方法选取2023年1月至3月医院实施HFMEA前PDA扫码率作为对照组,2023年4月至11月实施HFMEA后PDA扫码率为观察组,采用HFMEA对护士用药... 目的分析医疗失效模式和效应分析(HFMEA)对提高临床护理人员用药过程中个人数字助理(PDA)扫码率的效果。方法选取2023年1月至3月医院实施HFMEA前PDA扫码率作为对照组,2023年4月至11月实施HFMEA后PDA扫码率为观察组,采用HFMEA对护士用药过程中PDA扫码流程存在的失效模式进行风险评估,对失效模式进行有效的分析和整改,比较两组PDA扫码率及用药错误不良事件情况。结果观察组每月PDA扫码率均高于对照组,用药错误不良事件发生率低于对照组(P<0.05)。结论HFMEA模式可有效提高护士用药PDA扫码率,规范护士用药PDA扫码流程,避免用药差错,确保患者用药安全。 展开更多
关键词 失效模式与效应分析 临床护理人员 临床用药 pda扫码率
暂未订购
甘油法、砂土法及PDA斜面法保藏虫生真菌效果比较 被引量:1
3
作者 何凤婷 区翠仪 +3 位作者 何广位 张珂 胡琼波 翁群芳 《广东农业科学》 2025年第1期81-94,共14页
【目的】虫生真菌在传代过程中易发生菌种退化和活性降低等现象,选择适宜的菌种保藏方法是减少实验室菌种传代的重要措施。【方法】采用PDA斜面法、砂土法和甘油法3种不同的保藏方法,对13种共18株虫生真菌菌株进行为期3、6、12个月的保... 【目的】虫生真菌在传代过程中易发生菌种退化和活性降低等现象,选择适宜的菌种保藏方法是减少实验室菌种传代的重要措施。【方法】采用PDA斜面法、砂土法和甘油法3种不同的保藏方法,对13种共18株虫生真菌菌株进行为期3、6、12个月的保藏,通过观察菌株复活效果,检测菌丝生长速率、脱氢酶活性及菌株产孢量,比较3种不同保藏方法的保藏效果。【结果】保藏期为3个月时,除砂土保藏的个别菌株外,3种方法的保藏效果均良好,其中PDA斜面法保藏表现更佳,所有保藏的菌株菌丝长势良好、色泽正常,有15个菌株的菌丝生长速率、脱氢酶活性和12个菌株的产孢量高于其他保藏方法。保藏期为6个月时,甘油法的保藏效果更佳,14个菌株的菌丝生长速率、15个菌株的产孢量和18个菌株的菌丝长势优于其他保藏方法;除斜面法中6个菌株色泽发生变化外,其余菌株色泽无变化;在脱氢酶活性方面,有9个菌株在砂土保藏法中呈现的效果最好。保藏期为12个月时,甘油法的保藏效果最好,其菌落色泽、菌丝生长速率及产孢量等指标均与保藏3个月时变化不大;砂土法的保藏效果次之,但对罗伯茨绿僵菌(Metarhizium robertsii)MrGX0603、球孢白僵菌(Beauveria bassiana)BbGX7303、淡紫紫孢菌(Purpureocillium lilacinum)PiGX0201、环链虫草(Cordyceps cateniannulata)CcGX32S01及玫烟色虫草(C.fumosorosea)CfGX4206表现出较好的保藏效果,其菌丝脱氢酶活性较高,OD490分别为1.18、1.17、1.13、1.12、1.27,产孢量也较好,分别为53.50×10^(6)、52.23×10^(6)、62.00×10^(6)、54.21×10^(6)、53.79×10^(6)孢子/cm^(2),且菌株的菌丝生长速率、脱氢酶活性、产孢量下降的幅度较小;PDA斜面法的保藏效果最差,保藏的18株菌种活力指标下降明显。【结论】当保藏方法与保藏时间相同时,不同菌种的保藏效果表现出明显差异。可根据菌种特性和保藏期限选择不同的保藏方法,PDA斜面法最适用于3个月左右的短期保藏;甘油在保藏期为1年时保藏效果最好;而砂土法更适合保藏产孢量大于50×10^(6)孢子/cm^(2)的菌株。 展开更多
关键词 虫生真菌 菌种保藏 保藏时间 pda斜面 甘油 砂土
在线阅读 下载PDF
生物医用MgZn合金表面PDA/HA复合涂层制备及性能 被引量:1
4
作者 于迎雪 张倩倩 《特种铸造及有色合金》 北大核心 2025年第2期252-256,共5页
采用水热法在Mg-2Zn-0.5Nd-1Y-0.5Zr镁合金表面制备羟基磷灰石涂层(HA),然后,利用水浴加热法在其表面制备聚多巴胺(PDA)/HA复合涂层。水热处理后获得的HA单膜层组织,表面涂层较稀松,涂层间存在较大的空隙,经PDA涂层预处理得到的PDA/HA... 采用水热法在Mg-2Zn-0.5Nd-1Y-0.5Zr镁合金表面制备羟基磷灰石涂层(HA),然后,利用水浴加热法在其表面制备聚多巴胺(PDA)/HA复合涂层。水热处理后获得的HA单膜层组织,表面涂层较稀松,涂层间存在较大的空隙,经PDA涂层预处理得到的PDA/HA复合涂层,表面为均匀的交叉密布的细小片状结构,显示出完整致密的结构。通过浸泡试验计算腐蚀速率,采用OM分析合金的微观组织,探究含涂层稀土镁合金的腐蚀行为和机理,并评价涂层的保护效率。结果表明,PDA/HA复合涂层较单一HA涂层合金展现出了更好的耐腐蚀性,起到了较好的保护作用。在100℃、4 h下制备的PDA/HA复合涂层的试样综合性能最佳,腐蚀电压为0.06382 V,腐蚀电流密度为8.166×10^(−7)A/cm^(2)。 展开更多
关键词 镁合金 pda/HA复合涂层 耐腐蚀性能
原文传递
Adaptive Update Distribution Estimation under Probability Byzantine Attack
5
作者 Gang Long Zhaoxin Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第10期1667-1685,共19页
The secure and normal operation of distributed networks is crucial for accurate parameter estimation.However,distributed networks are frequently susceptible to Byzantine attacks.Considering real-life scenarios,this pa... The secure and normal operation of distributed networks is crucial for accurate parameter estimation.However,distributed networks are frequently susceptible to Byzantine attacks.Considering real-life scenarios,this paper investigates a probability Byzantine(PB)attack,utilizing a Bernoulli distribution to simulate the attack probability.Historically,additional detection mechanisms are used to mitigate such attacks,leading to increased energy consumption and burdens on distributed nodes,consequently diminishing operational efficiency.Differing from these approaches,an adaptive updating distributed estimation algorithm is proposed to mitigate the impact of PB attacks.In the proposed algorithm,a penalty strategy is initially incorporated during data updates to weaken the influence of the attack.Subsequently,an adaptive fusion weight is employed during data fusion to merge the estimations.Additionally,the reason why this penalty term weakens the attack has been analyzed,and the performance of the proposed algorithm is validated through simulation experiments. 展开更多
关键词 Distribution estimation network security least-mean-square binomial distribution probability Byzantine attack
在线阅读 下载PDF
PVDF/PAN-f/PDA复合膜的制备及其光热水蒸发性能研究
6
作者 李小梅 江明航 +1 位作者 张均 刘艳 《塑料科技》 北大核心 2025年第3期54-58,共5页
在聚偏二氟乙烯(PVDF)膜表面负载聚丙烯腈纤维(PAN-f),然后在其表面沉积聚多巴胺(PDA),制备聚偏二氟乙烯/聚丙烯腈纤维/聚多巴胺(PVDF/PAN-f/PDA)复合光热蒸发膜,并对其水蒸发性能、光热水净化能力进行研究。结果表明:聚丙烯腈(PAN)的... 在聚偏二氟乙烯(PVDF)膜表面负载聚丙烯腈纤维(PAN-f),然后在其表面沉积聚多巴胺(PDA),制备聚偏二氟乙烯/聚丙烯腈纤维/聚多巴胺(PVDF/PAN-f/PDA)复合光热蒸发膜,并对其水蒸发性能、光热水净化能力进行研究。结果表明:聚丙烯腈(PAN)的加入提高了复合薄膜的亲水性以及提供较多的水输运通道,PVDF/PAN-f/PDA-0.4薄膜的光热蒸发性能最高,达到2.26 kg/m^(2),在循环10次后仍表现出优异的性能。针对不同的污染物水溶液,PVDF/PAN-f/PDA-0.4薄膜表现出优异的光热净化能力,蒸发量保持在2.0 kg/m^(2)以上,在长时间运行后仍表现出稳定的性能。因此,PVDF/PAN-f/PDA-0.4薄膜可以有效用于光热污水净化应用。 展开更多
关键词 聚偏二氟乙烯 聚多巴胺 聚丙烯腈 光热效应 污水净化
原文传递
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:1
7
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network DoS attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
Anomaly Detection of Controllable Electric Vehicles through Node Equation against Aggregation Attack
8
作者 Jing Guo Ziying Wang +1 位作者 Yajuan Guo Haitao Jiang 《Computers, Materials & Continua》 SCIE EI 2025年第1期427-442,共16页
The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charg... The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charging stations,addressing the unique challenges posed by third-party aggregation platforms.Our approach integrates node equations-based on the parameter identification with a novel deep learning model,xDeepCIN,to detect abnormal data reporting indicative of aggregation attacks.We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation.The xDeepCIN model,incorporating a Compressed Interaction Network,has the ability to capture complex feature interactions in sparse,high-dimensional charging data.Experimental results on both proprietary and public datasets demonstrate significant improvements in anomaly detection performance,with F1-scores increasing by up to 32.3%for specific anomaly types compared to traditional methods,such as wide&deep and DeepFM(Factorization-Machine).Our framework exhibits robust scalability,effectively handling networks ranging from 8 to 85 charging points.Furthermore,we achieve real-time monitoring capabilities,with parameter identification completing within seconds for networks up to 1000 nodes.This research contributes to enhancing the security and reliability of renewable energy systems against evolving cyber threats,offering a comprehensive solution for safeguarding the rapidly expanding EV charging infrastructure. 展开更多
关键词 Anomaly detection electric vehicle aggregation attack deep cross-network
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
9
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
Experimental Observing Damage Evolution in Cement Pastes Exposed to External Sulfate Attack by in situ X-ray Computed Tomography
10
作者 WU Min CAO Kailei +4 位作者 XIAO Weirong YU Zetai CAO Jierong DING Qingjun LI Jinhui 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2025年第1期164-170,共7页
The paper presents experimental investigation results of crack pattern change in cement pastes caused by external sulfate attack(ESA).To visualize the formation and development of cracks in cement pastes under ESA,an ... The paper presents experimental investigation results of crack pattern change in cement pastes caused by external sulfate attack(ESA).To visualize the formation and development of cracks in cement pastes under ESA,an X-ray computed tomography(X-ray CT)was used,i e,the tomography system of Zeiss Xradia 510 versa.The results indicate that X-CT can monitor the development process and distribution characteristics of the internal cracks of cement pastes under ESA with attack time.In addition,the C3A content in the cement significantly affects the damage mode of cement paste specimens during sulfate erosion.The damage of ordinary Portland cement(OPC)pastes subjected to sulfate attack with high C3A content are severe,while the damage of sulfate resistant Portland cement(SRPC)pastes is much smaller than that of OPC pastes.Furthermore,a quadratic function describes the correlation between the crack volume fraction and development depth for two cement pastes immermed in sulfate solution. 展开更多
关键词 CONCRETE external sulfate attack damage evolution situ X-ray computed tomography
原文传递
BT@PDA增强PVDF/PMMA复合薄膜的介电与储能性能研究
11
作者 黄云龙 崔巍巍 +1 位作者 侯亚娟 董昊霖 《材料导报》 北大核心 2025年第13期242-251,共10页
本工作采用多巴胺(DA)在钛酸钡(BT)纳米颗粒表面自聚合得到具有核壳结构的钛酸钡@聚多巴胺(BT@PDA)颗粒,分别将相同质量的BT和BT@PDA颗粒分散到聚偏氟乙烯/聚甲基丙烯酸甲酯(PVDF/PMMA)共混聚合物基质中,制得BT/PVDF/PMMA复合薄膜和BT@P... 本工作采用多巴胺(DA)在钛酸钡(BT)纳米颗粒表面自聚合得到具有核壳结构的钛酸钡@聚多巴胺(BT@PDA)颗粒,分别将相同质量的BT和BT@PDA颗粒分散到聚偏氟乙烯/聚甲基丙烯酸甲酯(PVDF/PMMA)共混聚合物基质中,制得BT/PVDF/PMMA复合薄膜和BT@PDA/PVDF/PMMA复合薄膜。实验结果表明,PDA包覆层在提高介电常数、抑制介电损耗、提高击穿场强和改善力学性能方面发挥了积极的促进作用。室温下BT@PDA/PVDF/PMMA复合薄膜在10~2Hz下介电常数达到10.9,与未加填料的PVDF/PMMA薄膜相比提升了67.7%;介电损耗为0.052,降低了32.4%;击穿场强达到606 kV/mm,提升了68.8%;放电能量密度达到10.3 J/cm^(3),提升了128.9%,并且充放电效率保持在58%以上。在高温(50~90℃)情况下,PDA包覆层在介电性能、储能性能方面仍然发挥了积极作用。70℃时,BT@PDA/PMMA/PVDF复合薄膜的储能密度为6.48 J/cm^(3),充放电效率仍然在53%以上。 展开更多
关键词 储能密度 介电性能 聚偏氟乙烯(PVDF) 聚甲基丙烯酸甲酯(PMMA) BT@pda
在线阅读 下载PDF
CuFe_(2)O_(4)@PDA-AC对水中日落黄的吸附性能研究
12
作者 管鲲 梁肇海 丘汾 《科技创新与应用》 2025年第5期87-90,共4页
该研究以铁酸铜来负载活性炭,并在其表面实施聚多巴胺的修饰,合成出一种名为CuFe_(2)O_(4)@PDA-AC的新型复合材料。该文考察复合材料对环境污染物日落黄(SY)的吸附效果,复合材料对日落黄的最大吸附量达到266.08 mg/g(303 K,pH 3),酸性... 该研究以铁酸铜来负载活性炭,并在其表面实施聚多巴胺的修饰,合成出一种名为CuFe_(2)O_(4)@PDA-AC的新型复合材料。该文考察复合材料对环境污染物日落黄(SY)的吸附效果,复合材料对日落黄的最大吸附量达到266.08 mg/g(303 K,pH 3),酸性环境下有利于复合材料对日落黄的吸附。吸附机理研究发现,吸附过程更符合Langmuir吸附等温模型和伪二级动力学模型,升温有利于吸附。 展开更多
关键词 新型复合材料 CuFe_(2)O_(4)@pda-AC 日落黄 吸附量 吸附机理
在线阅读 下载PDF
智能化PDA手持系统在静脉用药调配中心退药环节中的应用效果评价 被引量:1
13
作者 严大鹏 陈继涢 +3 位作者 朱振茂 曾娜婷 叶岩荣 姜维文 《中国临床药学杂志》 2025年第2期107-111,共5页
目的评价智能化PDA手持系统在静脉用药调配中心(PIVAS)退药环节中的应用效果。方法收集2022年1月至2023年12月我院PIVAS的部门内差登记表、部门排班表及部门日常工作记录表,将2022年(智能化PDA手持系统应用前)数据作为对照组,2023年(智... 目的评价智能化PDA手持系统在静脉用药调配中心(PIVAS)退药环节中的应用效果。方法收集2022年1月至2023年12月我院PIVAS的部门内差登记表、部门排班表及部门日常工作记录表,将2022年(智能化PDA手持系统应用前)数据作为对照组,2023年(智能化PDA手持系统应用后)数据作为试验组。通过对比2组退药差错率、退药工作耗费时间、参与退药的人数以及因退药错误导致的药品损耗率等指标,评价PDA手持系统的实际应用效果。结果与对照组比较,试验组的退药差错发生率显著降低(1.01%vs 0.18%,P<0.05),每月退药工作耗费时间明显缩短[(120.96±10.90)h vs(40.10±5.26)h,P<0.05],参与退药人次数明显减少(1825人次vs 548人次,P<0.05),以及因退药未找出而导致的药品损耗量明显减少(398袋vs 55袋,P<0.05)。结论智能化PDA手持系统的应用,可有效提高PIVAS工作效率,减少差错,同时有效避免因退药未找出而出现的药品损耗。 展开更多
关键词 智能化pda手持系统 自动化建设 静脉用药集中调配中心 工作差错
原文传递
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
14
作者 Chunhui Li Xiaoying Wang +2 位作者 Qingjie Zhang Jiaye Liang Aijing Zhang 《Computers, Materials & Continua》 SCIE EI 2025年第1期645-674,共30页
Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convol... Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neural Networks(CNN)combined with LSTM,and so on are built by simple stacking,which has the problems of feature loss,low efficiency,and low accuracy.Therefore,this paper proposes an autonomous detectionmodel for Distributed Denial of Service attacks,Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention(MSCNN-BiGRU-SHA),which is based on a Multistrategy Integrated Zebra Optimization Algorithm(MI-ZOA).The model undergoes training and testing with the CICDDoS2019 dataset,and its performance is evaluated on a new GINKS2023 dataset.The hyperparameters for Conv_filter and GRU_unit are optimized using the Multi-strategy Integrated Zebra Optimization Algorithm(MIZOA).The experimental results show that the test accuracy of the MSCNN-BiGRU-SHA model based on the MIZOA proposed in this paper is as high as 0.9971 in the CICDDoS 2019 dataset.The evaluation accuracy of the new dataset GINKS2023 created in this paper is 0.9386.Compared to the MSCNN-BiGRU-SHA model based on the Zebra Optimization Algorithm(ZOA),the detection accuracy on the GINKS2023 dataset has improved by 5.81%,precisionhas increasedby 1.35%,the recallhas improvedby 9%,and theF1scorehas increasedby 5.55%.Compared to the MSCNN-BiGRU-SHA models developed using Grid Search,Random Search,and Bayesian Optimization,the MSCNN-BiGRU-SHA model optimized with the MI-ZOA exhibits better performance in terms of accuracy,precision,recall,and F1 score. 展开更多
关键词 Distributed denial of service attack intrusion detection deep learning zebra optimization algorithm multi-strategy integrated zebra optimization algorithm
在线阅读 下载PDF
基于PDA称重技术的智能钢材堆场管理系统研究
15
作者 刘远礼 黄佩 《广东造船》 2025年第4期91-94,共4页
本文通过研究船厂钢材堆场管理流程,提出了基于RFID、PDA移动端、动态优化算法、称重等技术应用的船厂智能化钢材堆场系统,实现钢材入库定位、出库管理、动态盘点的全流程自动化,极大地提升了管理效能与资源利用程度,减少了人工成本投... 本文通过研究船厂钢材堆场管理流程,提出了基于RFID、PDA移动端、动态优化算法、称重等技术应用的船厂智能化钢材堆场系统,实现钢材入库定位、出库管理、动态盘点的全流程自动化,极大地提升了管理效能与资源利用程度,减少了人工成本投入并降低了错误发生概率,为船厂的智能化管理工作给予了有力支撑。 展开更多
关键词 pda 智能称重技术 船厂 钢材堆场系统
在线阅读 下载PDF
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
16
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
Stackelberg game-based optimal secure control against hybrid attacks for networked control systems
17
作者 Wei Xiong Yi Dong Liubin Zhou 《Journal of Automation and Intelligence》 2025年第3期236-241,共6页
This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional m... This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional methods by considering both denial-of-service(DoS)and false data injection(FDI)attacks simultaneously.Additionally,the stability conditions for the system under these hybrid attacks are established.It is technically challenging to design the control strategy by predicting attacker actions based on Stcakelberg game to ensure the system stability under hybrid attacks.Another technical difficulty lies in establishing the conditions for mean-square asymptotic stability due to the complexity of the attack scenarios Finally,simulations on an unstable batch reactor system under hybrid attacks demonstrate the effectiveness of the proposed strategy. 展开更多
关键词 Stackelberg game Networked control systems Hybrid attacks DoS attack FDI attack
在线阅读 下载PDF
PDA@Fe_(3)O_(4)-N^(+)对蔗糖溶液中没食子酸的吸附性能研究
18
作者 黄秋琳 朱玉连 +4 位作者 石梁稳 陈芝蓉 黄挺 农富 梁咏洁 《甘蔗糖业》 2025年第2期81-91,共11页
纳米四氧化三铁(Fe_(3)O_(4))通过自交联和季铵化改性合成了具有季铵基团的聚多巴胺改性四氧化三铁(PDA@Fe_(3)O_(4)-N^(+)),采用红外光谱(FTIR)和振动样品强磁计(VSM)对PDA@Fe_(3)O_(4)-N^(+)进行表征,红外光谱显示改性后Fe_(3)O_(4)... 纳米四氧化三铁(Fe_(3)O_(4))通过自交联和季铵化改性合成了具有季铵基团的聚多巴胺改性四氧化三铁(PDA@Fe_(3)O_(4)-N^(+)),采用红外光谱(FTIR)和振动样品强磁计(VSM)对PDA@Fe_(3)O_(4)-N^(+)进行表征,红外光谱显示改性后Fe_(3)O_(4)基团发生了改变,聚多巴胺和季铵官能团均成功与Fe_(3)O_(4)结合,得到了PDA@Fe_(3)O_(4)-N^(+)复合材料。VSM结果表明,PDA@Fe_(3)O_(4)-N^(+)是良好的超顺磁性材料。通过模拟吸附试验研究PDA@Fe_(3)O_(4)-N^(+)对蔗糖溶液中没食子酸的吸附效果,研究结果表明:PDA@Fe_(3)O_(4)-N^(+)对蔗糖溶液中没食子酸的吸附最佳pH值为9.0,最佳吸附温度为55℃,吸附时间越长,越有利于吸附完全;吸附过程符合准二级动力学模型和Langmuir等温线吸附模型;热力学研究表明吸附过程为自发吸热过程。本研究为开发无硫和高效的糖汁脱色剂的研究提供理论依据和参考。 展开更多
关键词 季铵盐 pda Fe_(3)O_(4) 吸附 没食子酸
在线阅读 下载PDF
AMA:Adaptive Multimodal Adversarial Attack with Dynamic Perturbation Optimization
19
作者 Yufei Shi Ziwen He +2 位作者 Teng Jin Haochen Tong Zhangjie Fu 《Computer Modeling in Engineering & Sciences》 2025年第8期1831-1848,共18页
This article proposes an innovative adversarial attack method,AMA(Adaptive Multimodal Attack),which introduces an adaptive feedback mechanism by dynamically adjusting the perturbation strength.Specifically,AMA adjusts... This article proposes an innovative adversarial attack method,AMA(Adaptive Multimodal Attack),which introduces an adaptive feedback mechanism by dynamically adjusting the perturbation strength.Specifically,AMA adjusts perturbation amplitude based on task complexity and optimizes the perturbation direction based on the gradient direction in real time to enhance attack efficiency.Experimental results demonstrate that AMA elevates attack success rates from approximately 78.95%to 89.56%on visual question answering and from78.82%to 84.96%on visual reasoning tasks across representative vision-language benchmarks.These findings demonstrate AMA’s superior attack efficiency and reveal the vulnerability of current visual language models to carefully crafted adversarial examples,underscoring the need to enhance their robustness. 展开更多
关键词 Adversarial attack visual language model black-box attack adaptive multimodal attack disturbance intensity
在线阅读 下载PDF
Differential-Linear Attacks on Ballet Block Cipher
20
作者 ZHOU Yu CHEN Si-Wei +2 位作者 XU Sheng-Yuan XIANG Ze-Jun ZENG Xiang-Yong 《密码学报(中英文)》 北大核心 2025年第2期469-488,共20页
Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective ... Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively. 展开更多
关键词 Ballet block cipher differential-linear(DL)cryptanalysis MILP/MIQCP distinguisher key-recovery attacks
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部