期刊文献+
共找到4,004篇文章
< 1 2 201 >
每页显示 20 50 100
ChatGPT+VS Code在高中地理地图开发中的应用——以“国内人口迁移”为例
1
作者 王凌宇 白絮飞 《中国信息技术教育》 2026年第1期81-84,共4页
人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为... 人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为“助教者”,若教师生成教学设计的指令过于宽泛,结果易出现“张冠李戴”或“似是而非”等问题,需教师二次加工。相反,若教师能针对教学设计中的特定模块提供详细准确的指令,人工智能技术输出的结果将更具准确性和实用性,展现出更高研究价值。因此,本文从人工智能技术“助教者”身份出发,摒弃传统完整的教学过程设计,聚焦备课中的“地图开发”模块,采用由人工智能技术生成地图代码并通过第三方软件运行的方式,实现快速辅助教师生成所需地图的目标,提升备课效率与教学质量。 展开更多
关键词 ChatGPT VS Code 人工智能技术 中学地理 地图开发
在线阅读 下载PDF
钢纤维混凝土裂缝宽度计算方法研究
2
作者 曹国栋 《建筑科学》 北大核心 2026年第1期60-66,共7页
为准确计算钢筋钢纤维混凝土梁构件裂缝宽度的值,设计了4组18根不同配筋率、不同受力方式的梁试验方案。通过对比分析国标、德标和Model Code规范并结合试验数据对Model Code计算公式进行分析,得到以下结论:3种规范对于裂缝宽度计算原... 为准确计算钢筋钢纤维混凝土梁构件裂缝宽度的值,设计了4组18根不同配筋率、不同受力方式的梁试验方案。通过对比分析国标、德标和Model Code规范并结合试验数据对Model Code计算公式进行分析,得到以下结论:3种规范对于裂缝宽度计算原理相同,计算表达式相似,均为裂缝间距与应变差的乘积;国标与德标是在普通混凝土裂缝宽度基础上考虑钢纤维影响系数,而Model Code则是直接根据钢纤维混凝土整体的物理力学参数对裂缝宽度进行计算;国标使用长期系数1.5来体现整体裂缝增加效果,Model Code使用长期系数β体现长期荷载下混凝土平均应变减小效果;通过对梁开裂截面受力分析得出了钢筋钢纤维混凝土梁在纯弯与压弯状态下钢筋应力的计算公式;分析Model Code计算裂缝宽度公式的不足并结合试验数据得出与配筋率有关的钢筋应力不均匀系数表达式。 展开更多
关键词 钢纤维混凝土 裂缝宽度 国标 德标 Model Code 钢筋应力系数
原文传递
ASME Code Case 3029高温许用压应力计算方法的介绍及工程应用
3
作者 马忠明 《化工设备与管道》 北大核心 2026年第1期24-30,共7页
介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及... 介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。 展开更多
关键词 Code Case 3029 蠕变屈曲 失稳 压力容器 许用应力
在线阅读 下载PDF
Rateless Polar Codes with Unequal Error Protection Property
4
作者 Cui Chen Xiang Wei +1 位作者 Ma Siwei Guo Qing 《China Communications》 2026年第1期10-23,共14页
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom... Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency. 展开更多
关键词 matrix extension polar codes rateless coding unequal error protection
在线阅读 下载PDF
基于x86架构的掉电保护实现方法
5
作者 费加杰 金靖淋 +1 位作者 高为民 林诗美 《工业控制计算机》 2026年第1期55-56,59,共3页
随着信息技术的快速发展和计算机市场的不断扩展,数据完整性成为计算机用户关注的核心问题。提出一种基于x86架构的掉电保护方法,通过配置BIOS中的GPIO中断生成GPE事件,并将这些事件绑定到ACPI Code中,以向驱动层发出中断通知。当GPIO... 随着信息技术的快速发展和计算机市场的不断扩展,数据完整性成为计算机用户关注的核心问题。提出一种基于x86架构的掉电保护方法,通过配置BIOS中的GPIO中断生成GPE事件,并将这些事件绑定到ACPI Code中,以向驱动层发出中断通知。当GPIO引脚检测到非法掉电事件时,通过GPE事件触发中断通知,驱动层接收到BIOS层的终端通知后,向操作系统层的掉电备份程序发出请求,掉电备份程序接收到驱动层发出的通知后立即执行掉电备份动作,将关键数据写入非易失性存储器,保证了数据的完整性,用户在遭遇意外断电时无需担忧数据丢失,计算机在重新上电后能够恢复到之前的状态,防止意外断电可能导致数据丢失或损坏,增强了用户数据的安全性,减少了数据损坏的风险。 展开更多
关键词 数据完整性 BIOS GPIO GPE ACPI Code
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
6
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Rao Zihe,Luminary in Structural Biology
7
作者 CHEN WENXIN 《China Today》 2026年第2期56-58,共3页
From cracking the code of viruses to mentoring the next generation of scientists,the former president of Nankai University has contributed a lot to turning microscopic discoveries into monumental shields for global he... From cracking the code of viruses to mentoring the next generation of scientists,the former president of Nankai University has contributed a lot to turning microscopic discoveries into monumental shields for global health.OVER the past 40 years,one man has distinguished himself through a deep commitment to researching protein structures of high pathogenic viruses,and published numerous significant works in top international scientific journals. 展开更多
关键词 viruses scientific mentoring protein structures structural biology global health cracking code viruses
在线阅读 下载PDF
Efficient Polar Codes with Low Complexity for Correcting Insertions/Deletions in DPPM
8
作者 Li Leran Liu Yuan +2 位作者 Yuan Ye Xiahou Wenqian Chen Maonan 《China Communications》 2026年第1期24-33,共10页
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv... Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance. 展开更多
关键词 DPPM insertions/deletions polar codes SC decoding
在线阅读 下载PDF
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
9
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 Protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
CUDA‑based GPU‑only computation for efficient tracking simulation of single and multi‑bunch collective effects
10
作者 Keon Hee Kim Eun‑San Kim 《Nuclear Science and Techniques》 2026年第1期61-79,共19页
Beam-tracking simulations have been extensively utilized in the study of collective beam instabilities in circular accelerators.Traditionally,many simulation codes have relied on central processing unit(CPU)-based met... Beam-tracking simulations have been extensively utilized in the study of collective beam instabilities in circular accelerators.Traditionally,many simulation codes have relied on central processing unit(CPU)-based methods,tracking on a single CPU core,or parallelizing the computation across multiple cores via the message passing interface(MPI).Although these approaches work well for single-bunch tracking,scaling them to multiple bunches significantly increases the computational load,which often necessitates the use of a dedicated multi-CPU cluster.To address this challenge,alternative methods leveraging General-Purpose computing on Graphics Processing Units(GPGPU)have been proposed,enabling tracking studies on a standalone desktop personal computer(PC).However,frequent CPU-GPU interactions,including data transfers and synchronization operations during tracking,can introduce communication overheads,potentially reducing the overall effectiveness of GPU-based computations.In this study,we propose a novel approach that eliminates this overhead by performing the entire tracking simulation process exclusively on the GPU,thereby enabling the simultaneous processing of all bunches and their macro-particles.Specifically,we introduce MBTRACK2-CUDA,a Compute Unified Device Architecture(CUDA)ported version of MBTRACK2,which facilitates efficient tracking of single-and multi-bunch collective effects by leveraging the full GPU-resident computation. 展开更多
关键词 Code development GPU computing Collective effects
在线阅读 下载PDF
Improving MCUCN code to simulate ultracold neutron storage and transportation in superfluid^(4)He
11
作者 Xue-Fen Han Fei Shen +6 位作者 Bin Zhou Xiao-Xiao Cai Tian-Cheng Yi Zhi-Liang Hu Song-Lin Wang Tian-Jiao Liang Robert Golub 《Nuclear Science and Techniques》 2026年第3期235-246,共12页
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ... The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ. 展开更多
关键词 Ultracold neutron Storage TRANSPORTATION Improved MCUCN code Upscattering effect Absorption by^(3)He
在线阅读 下载PDF
Design of a compact wide-field-of-view infrared imager based on wavefront coding
12
作者 Chonghui Zhu Jiaqian Yu Jingang Cui 《Chinese Physics B》 2026年第2期383-388,共6页
Compact size,high brightness,and wide field of view(FOV)are key requirements for long-wave infrared imagers used in military surveillance or night navigation.However,to meet the imaging requirements of high resolution... Compact size,high brightness,and wide field of view(FOV)are key requirements for long-wave infrared imagers used in military surveillance or night navigation.However,to meet the imaging requirements of high resolution and wide FOV,infrared optical systems often adopt complex optical lens groups,which will increase the size and weight of the optical system.In this paper,a strategy based on wavefront coding(WFC)is proposed to design a compact wide-FOV infrared imager.A cubic phase mask is inserted into the pupil plane of the infrared imager to correct the aberration.The simulated results show that,the WFC infrared imager has good imaging quality in a wide FOV of±16°.In addition,the WFC infrared imager achieves compactness with its 40 mm×40 mm×40 mm size.A fast focal ratio of 1 combined with an entrance pupil diameter of 25 mm ensures brightness.This work is of significance for designing a compact wide-FOV infrared imager. 展开更多
关键词 optical design infrared imager wavefront coding
原文传递
A Blockchain-Based Hybrid Framework for Secure and Scalable Electronic Health Record Management in In-Patient Follow-Up Tracking
13
作者 Ahsan Habib Siam Md.Ehsanul Haque +3 位作者 Fahmid Al Farid Anindita Sutradhar Jia Uddin Sarina Mansor 《Computers, Materials & Continua》 2026年第3期798-822,共25页
As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim... As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems. 展开更多
关键词 Electronic health records blockchain data security user access control QR code blockchain in healthcare medical data privacy
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
14
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Integrating Attention Mechanism with Code Structural Affinity and Execution Context Correlation for Automated Bug Repair
15
作者 Jinfeng Ji Geunseok Yang 《Computers, Materials & Continua》 2026年第3期1708-1725,共18页
Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite cons... Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness. 展开更多
关键词 Automated bug repair autoencoder algorithm buggy code analysis stack trace similarity machine learning for debugging
在线阅读 下载PDF
Wave Energy System Combined by a Heaving Box and a Perforated Flexible Membrane Wall
16
作者 Sarat Chandra Mohapatra C.Guedes Soares 《哈尔滨工程大学学报(英文版)》 2026年第1期110-121,共12页
An analytical model of a floating heaving box integrated with a vertical flexible porous membrane placed right next to the box applications to wave energy extraction and breakwater systems is developed under the reduc... An analytical model of a floating heaving box integrated with a vertical flexible porous membrane placed right next to the box applications to wave energy extraction and breakwater systems is developed under the reduced wave equation.The theoretical solutions for the heave radiating potential to the assigned physical model in the corresponding zones are attained by using the separation of variables approach along with the Fourier expansion.Applying the matching eigenfunction expansion technique and orthogonal conditions,the unknown coefficients that are involved in the radiated potentials are determined.The attained radiation potential allows the computation of hydrodynamic coefficients of the heaving buoy,Power Take-Off damping,and wave quantities.The accuracy of the analytical solution for the hydrodynamic coefficients is demonstrated for different oblique angles with varying numbers of terms in the series solution.The current analytical analysis findings are confirmed by existing published numerical boundary element method simulations.Several numerical results of the hydrodynamic coefficients,power capture,power take-off optimal damping,and transmission coefficients for numerous structural and physical aspects are conducted.It has been noted that the ideal power take-off damping increases as the angle of incidence rises,and the analysis suggests that the ability to capture waves is more effective in shallower waters compared to deeper ones. 展开更多
关键词 Analytical model Heaving buoy Flexible membrane perforated wall Boundary element method code Power take-off Power capture
在线阅读 下载PDF
生产新范式AI新浪潮——第五届AIGC开发者大会圆满落幕
17
作者 于云霞 《中国会展》 2026年第2期74-76,共3页
1月17日,ACDC 2026:第五届AIGC开发者大会在北京圆满落幕。大会正式提出:2026年将成为“Vibe Coding创作者经济”元年。这标志着继图文、视频之后,以自然语言、低代码为核心的内容生产新范式已经到来,预计将开启万亿级市场。同时,本届... 1月17日,ACDC 2026:第五届AIGC开发者大会在北京圆满落幕。大会正式提出:2026年将成为“Vibe Coding创作者经济”元年。这标志着继图文、视频之后,以自然语言、低代码为核心的内容生产新范式已经到来,预计将开启万亿级市场。同时,本届大会通过发布AIGCLINK开发者基金、芯片适配联盟等一系列覆盖资金、算力的实质性举措,系统性破解产业规模化落地瓶颈。大会的成功举办,表明我国AIGC产业的发展重点已全面转向生态构建与价值实现,正式开启以Vibe Coding为代表的全新阶段。 展开更多
关键词 AIGC开发者大会 Vibe Coding 创作者经济
在线阅读 下载PDF
Periodic codings of algebraic graph-directed IFS
18
作者 WEN Zhi Ying YANG Ya Min 《Science China Mathematics》 SCIE CSCD 2015年第1期131-142,共12页
We study the points with periodic codings of a class of graph-directed iterated function systems on with algebraic parameters (which we call algebraic GIFS). It is shown that the set of points with periodic codings ... We study the points with periodic codings of a class of graph-directed iterated function systems on with algebraic parameters (which we call algebraic GIFS). It is shown that the set of points with periodic codings is closely related to the Rauzy box. Especially for the feasible Pisot GIFS, this set is completely characterized by the Rauzy box; this result unifies and extends the previous results on the study of periodic points of classical and generalized β-transformations. 展开更多
关键词 algebraic GIFS periodic coding Rauzy box
原文传递
面向VVC的QP自适应环路滤波器
19
作者 刘鹏宇 金鹏程 《北京工业大学学报》 北大核心 2025年第10期1171-1178,共8页
现有的基于卷积神经网络(convolutional neural network,CNN)的环路滤波器倾向于将多个网络应用于不同的量化参数(quantization parameter,QP),消耗训练模型中的大量资源,并增加内存负担。针对这一问题,提出一种基于CNN的QP自适应环路... 现有的基于卷积神经网络(convolutional neural network,CNN)的环路滤波器倾向于将多个网络应用于不同的量化参数(quantization parameter,QP),消耗训练模型中的大量资源,并增加内存负担。针对这一问题,提出一种基于CNN的QP自适应环路滤波器。首先,设计一个轻量级分类网络,按照滤波难易程度将编码树单元(coding tree unit,CTU)划分为难、中、易3类;然后,构建3个融合了特征信息增强融合模块的基于CNN的滤波网络,以满足不同QP下的3类CTU滤波需求。将所提出的环路滤波器集成到多功能视频编码(versatile video coding,VVC)标准H.266/VVC的测试软件VTM 6.0中,替换原有的去块效应滤波器(deblocking filter,DBF)、样本自适应偏移(sample adaptive offset,SAO)滤波器和自适应环路滤波器。实验结果表明,该方法平均降低了3.14%的比特率差值(Bjøntegaard delta bit rate,BD-BR),与其他基于CNN的环路滤波器相比,显著提高了压缩效率,并减少了压缩伪影。 展开更多
关键词 视频编码 多功能视频编码(versatile video coding VVC)标准 环路滤波 卷积神经网络(convolutional neural network CNN) 深度学习 图像去噪
在线阅读 下载PDF
基于PFC-GBM方法的矿物组成对花岗岩单轴压缩力学特性影响 被引量:1
20
作者 张庆豪 马瑞阳 +4 位作者 林鹏 谢辉辉 王朝阳 亢金涛 娄彦飞 《山东大学学报(工学版)》 北大核心 2025年第4期93-107,共15页
为研究花岗岩内各类矿物的体积分数、矿物粒径大小、矿物粒径分布非均匀性3个因素对花岗岩抗压力学特性的影响规律,采用GBM (grain-based model)方法对花岗岩微观矿物组成建模,确定了各因素影响抗压力学特性的强弱,在裂纹演化的角度揭... 为研究花岗岩内各类矿物的体积分数、矿物粒径大小、矿物粒径分布非均匀性3个因素对花岗岩抗压力学特性的影响规律,采用GBM (grain-based model)方法对花岗岩微观矿物组成建模,确定了各因素影响抗压力学特性的强弱,在裂纹演化的角度揭示各因素影响抗压力学特性的机理。研究结果表明:各参数与花岗岩强度均有较高的相关性,花岗岩抗压强度随石英、长石体积分数及平均粒径的增长呈上升趋势,随云母体积分数与非均质因子的增加呈下降趋势;矿物体积分数对强度影响由强到弱为石英、长石、云母体积分数,粒径参数对强度影响次序为平均粒径、非均质因子;矿物体积分数与晶内3种接触占比增减的相关性较高,平均粒径主要影响晶内与晶间接触占比,非均质因子则会导致同种与异种晶间接触占比发生变化,这3种方式都能够在不同程度上改变模型破裂所消耗的能量和裂纹发育路径,进而影响单轴抗压强度。 展开更多
关键词 花岗岩 矿物组成 GBM模型 particle flow code(PFC) 抗压强度 裂纹演化
原文传递
上一页 1 2 201 下一页 到第
使用帮助 返回顶部