期刊文献+
共找到11,890篇文章
< 1 2 250 >
每页显示 20 50 100
Superconductivity and band topology of double-layer honeycomb structure M_(2)N_(2)(M=Nb,Ta)
1
作者 Jin-Han Tan Na Jiao +2 位作者 Meng-Meng Zheng Ping Zhang Hong-Yan Lu 《Chinese Physics B》 2025年第9期581-587,共7页
Two-dimensional double-layer honeycomb(DLHC)materials are known for their diverse physical properties,but superconductivity has been a notably absent characteristic in this structure.We address this gap by investigati... Two-dimensional double-layer honeycomb(DLHC)materials are known for their diverse physical properties,but superconductivity has been a notably absent characteristic in this structure.We address this gap by investigating M_(2)N_(2)(M=Nb,Ta)with DLHC structure using first-principles calculations.Our results show that M_(2)N_(2)are stable and metallic,exhibiting superconducting behavior.Specifically,Nb_(2)N_(2)and Ta_(2)N_(2)display superconducting transition temperatures of 6.8 K and 8.8 K,respectively.Their electron-phonon coupling is predominantly driven by the coupling between metal d-orbitals and low-frequency metal-dominated vibration modes.Interestingly,two compounds also exhibit non-trivial band topology.Thus,M_(2)N_(2)are promising platforms for studying the interplay between topology and superconductivity and fill the gap in superconductivity research for DLHC materials. 展开更多
关键词 first-principles calculations phonon-mediated superconductivity double-layer honeycomb structure band topology
原文传递
A Blockchain-Based Hybrid Framework for Secure and Scalable Electronic Health Record Management in In-Patient Follow-Up Tracking
2
作者 Ahsan Habib Siam Md.Ehsanul Haque +3 位作者 Fahmid Al Farid Anindita Sutradhar Jia Uddin Sarina Mansor 《Computers, Materials & Continua》 2026年第3期798-822,共25页
As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim... As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems. 展开更多
关键词 Electronic health records blockchain data security user access control QR code blockchain in healthcare medical data privacy
在线阅读 下载PDF
Blockchain-Enabled Trusted Virtual Network Embedding in Intelligent Cyber-Physical Systems
3
作者 Zhu Hailong Huang Tao +2 位作者 Zhang Yi Chen Ning Zhang Peiying 《China Communications》 2026年第1期175-188,共14页
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further... With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate. 展开更多
关键词 blockchain cyber-physical system trusted embedding virtual network
在线阅读 下载PDF
Optimizing Resource Allocation in Blockchain Networks Using Neural Genetic Algorithm
4
作者 Malvinder Singh Bali Weiwei Jiang +2 位作者 Saurav Verma Kanwalpreet Kour Ashwini Rao 《Computers, Materials & Continua》 2026年第2期1580-1598,共19页
In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,t... In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,the optimization of blockchain networks remains a critical challenge due to persistent issues such as latency,scalability,and energy consumption.This study proposes an innovative approach to Blockchain network optimization,drawing inspiration from principles of biological evolution and natural selection through evolutionary algorithms.Specifically,we explore the application of genetic algorithms,particle swarm optimization,and related evolutionary techniques to enhance the performance of blockchain networks.The proposed methodologies aim to optimize consensus mechanisms,improve transaction throughput,and reduce resource consumption.Through extensive simulations and real-world experiments,our findings demonstrate significant improvements in network efficiency,scalability,and stability.This research offers a thorough analysis of existing optimization techniques,introduces novel strategies,and assesses their efficacy based on empirical outputs. 展开更多
关键词 blockchain technology energy efficiency environmental impact evolutionary algorithms optimization
在线阅读 下载PDF
An Improved Blockchain-Based Cloud Auditing Scheme Using Dynamic Aggregate Signatures
5
作者 Haibo Lei Xu An Wang +4 位作者 Wenhao Liu Lingling Wu Chao Zhang Weiwei Jiang Xiao Zou 《Computers, Materials & Continua》 2026年第2期1599-1629,共31页
With the rapid expansion of the Internet of Things(IoT),user data has experienced exponential growth,leading to increasing concerns about the security and integrity of data stored in the cloud.Traditional schemes rely... With the rapid expansion of the Internet of Things(IoT),user data has experienced exponential growth,leading to increasing concerns about the security and integrity of data stored in the cloud.Traditional schemes relying on untrusted third-party auditors suffer from both security and efficiency issues,while existing decentralized blockchain-based auditing solutions still face shortcomings in correctness and security.This paper proposes an improved blockchain-based cloud auditing scheme,with the following core contributions:Identifying critical logical contradictions in the original scheme,thereby establishing the foundation for the correctness of cloud auditing;Designing an enhanced mechanism that integrates multiple hashing with dynamic aggregate signatures,binding encrypted blocks through bilinear pairings and BLS signatures,and improving the scheme by setting parameters based on the Computational Diffie-Hellman(CDH)problem,significantly strengthening data integrity protection and anti-forgery capabilities;Introducing a random challenge mechanism and dynamic parameter adjustment strategy,effectively resisting various attacks such as forgery,tampering,and deletion,significantly improving the detection probability of malicious Cloud Service Providers(CSPs),and significantly reducing the proof generation overhead for CSPswhilemaintaining the same computational cost forDataOwners.Theoretical analysis and performance evaluation experiments demonstrate that the proposed scheme achieves significant improvements in both security and efficiency.Finally,the paper explores potential applications of the Enhanced Security Scheme in fields such as healthcare,drone swarms,and government office attendance systems,providing an effective approach for building secure,efficient,and decentralized cloud auditing systems. 展开更多
关键词 Cloud auditing cloud storage blockchain data integrity BLS signatures
在线阅读 下载PDF
Overcoming Dynamic Connectivity in Internet of Vehicles:A DAG Lattice Blockchain with Reputation-Based Incentive
6
作者 Xiaodong Zhang Wenhan Hou +2 位作者 Juanjuan Wang Leixiao Li Pengfei Yue 《Computers, Materials & Continua》 2026年第2期1803-1822,共20页
Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic ... Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic Graph(DAG)structure often suffer from performance limitations.The DAG lattice structure is a novel blockchain model in which each node maintains its own account chain,and only the node itself is allowed to update it.This feature makes the DAG lattice structure particularly suitable for addressing the challenges in dynamically connected IoV environment.In this paper,we propose a blockchain architecture based on the DAG lattice structure,specifically designed for dynamically connected IoV.In the proposed system,nodes must obtain authorization from a trusted authority before joining,forming a permissioned blockchain.Each node is assigned an individual account chain,allowing vehicles with limited storage capacity to participate in the blockchain by storing transactions only from nearby vehicles’account chains.Every transmitted message is treated as a transaction and added to the blockchain,enablingmore efficient data transmission in a dynamic network environment.Areputation-based incentivemechanism is introduced to encourage nodes to behave normally.Experimental results demonstrate that the proposed architecture achieves better performance compared with traditional single-chain and DAG-based approaches in terms of average transmission delay and storage cost. 展开更多
关键词 blockchain Internet of vehicles dynamic connectivity DAG lattice INCENTIVE
在线阅读 下载PDF
Blockchain and Smart Contracts with Barzilai-Borwein Intelligence for Industrial Cyber-Physical System
7
作者 Gowrishankar Jayaraman Ashok Kumar Munnangi +2 位作者 Ramesh Sekaran Arunkumar Gopu Manikandan Ramachandran 《Computers, Materials & Continua》 2026年第3期916-935,共20页
Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring ... Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring the security of Industrial Control Production Systems(ICPSs)has become a critical challenge.These systems are highly vulnerable to attacks such as denial-of-service(DoS),eclipse,and Sybil attacks,which can significantly disrupt industrial operations.This work proposes an effective protection strategy using an Artificial Intelligence(AI)-enabled Smart Contract(SC)framework combined with the Heterogeneous Barzilai-Borwein Support Vector(HBBSV)method for industrial-based CPS environments.The approach reduces run time and minimizes the probability of attacks.Initially,secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain(BC)integrated within a BC network.The SC executes the HBBSV strategy to verify the security consensus.The Barzilai-Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions.When a component remains within these conditions,no security breach occurs.Conversely,if a component does not satisfy the condition boundaries,a security lapse is detected,and those components are isolated.The HBBSV method thus strengthens protection against DoS,eclipse,and Sybil attacks.Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques. 展开更多
关键词 Industrial CPS security artificial intelligence blockchain smart contract heterogeneous
在线阅读 下载PDF
HATLedger:An Approach to Hybrid Account and Transaction Partitioning for Sharded Permissioned Blockchains
8
作者 Shuai Zhao Zhiwei Zhang +2 位作者 Junkai Wang Ye Yuan Guoren Wang 《Computers, Materials & Continua》 2026年第3期1589-1607,共19页
With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates... With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability. 展开更多
关键词 Sharded blockchain account partitioning cross-shard transaction rate load imbalance
在线阅读 下载PDF
A Blockchain-Based Efficient Verification Scheme for Context Semantic-Aware Ciphertext Retrieval
9
作者 Haochen Bao Lingyun Yuan +2 位作者 Tianyu Xie Han Chen Hui Dai 《Computers, Materials & Continua》 2026年第1期550-579,共30页
In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic q... In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic queries.Additionally,they typically rely on honest but curious cloud servers,which introduces the risk of repudiation.Furthermore,the combined operations of search and verification increase system load,thereby reducing performance.Traditional verification mechanisms,which rely on complex hash constructions,suffer from low verification efficiency.To address these challenges,this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification.Building on existing single and multi-keyword search methods,the scheme uses vector models to semantically train the dataset,enabling it to retain semantic information and achieve context-aware encrypted retrieval,significantly improving search accuracy.Additionally,a blockchain-based updatable master-slave chain storage model is designed,where the master chain stores encrypted keyword indexes and the slave chain stores verification information generated by zero-knowledge proofs,thus balancing system load while improving search and verification efficiency.Finally,an improved non-interactive zero-knowledge proof mechanism is introduced,reducing the computational complexity of verification and ensuring efficient validation of search results.Experimental results demonstrate that the proposed scheme offers stronger security,balanced overhead,and higher search verification efficiency. 展开更多
关键词 Searchable encryption blockchain context semantic awareness zero-knowledge proof
在线阅读 下载PDF
ISTIRDA:An Efficient Data Availability Sampling Scheme for Lightweight Nodes in Blockchain
10
作者 Jiaxi Wang Wenbo Sun +3 位作者 Ziyuan Zhou Shihua Wu Jiang Xu Shan Ji 《Computers, Materials & Continua》 2026年第4期685-700,共16页
Lightweight nodes are crucial for blockchain scalability,but verifying the availability of complete block data puts significant strain on bandwidth and latency.Existing data availability sampling(DAS)schemes either re... Lightweight nodes are crucial for blockchain scalability,but verifying the availability of complete block data puts significant strain on bandwidth and latency.Existing data availability sampling(DAS)schemes either require trusted setups or suffer from high communication overhead and low verification efficiency.This paper presents ISTIRDA,a DAS scheme that lets light clients certify availability by sampling small random codeword symbols.Built on ISTIR,an improved Reed–Solomon interactive oracle proof of proximity,ISTIRDA combines adaptive folding with dynamic code rate adjustment to preserve soundness while lowering communication.This paper formalizes opening consistency and prove security with bounded error in the random oracle model,giving polylogarithmic verifier queries and no trusted setup.In a prototype compared with FRIDA under equal soundness,ISTIRDA reduces communication by 40.65%to 80%.For data larger than 16 MB,ISTIRDA verifies faster and the advantage widens;at 128 MB,proofs are about 60%smaller and verification time is roughly 25%shorter,while prover overhead remains modest.In peer-to-peer emulation under injected latency and loss,ISTIRDA reaches confidence more quickly and is less sensitive to packet loss and load.These results indicate that ISTIRDA is a scalable and provably secure DAS scheme suitable for high-throughput,large-block public blockchains,substantially easing bandwidth and latency pressure on lightweight nodes. 展开更多
关键词 blockchain scalability data availability sampling lightweight nodes
在线阅读 下载PDF
A Comprehensive Survey on Blockchain-Enabled Techniques and Federated Learning for Secure 5G/6G Networks:Challenges,Opportunities,and Future Directions
11
作者 Muhammad Asim Abdelhamied A.Ateya +4 位作者 Mudasir Ahmad Wani Gauhar Ali Mohammed ElAffendi Ahmed A.Abd El-Latif Reshma Siyal 《Computers, Materials & Continua》 2026年第3期117-161,共45页
The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significa... The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significant security challenges,including impersonation threats,data manipulation,distributed denial of service(DDoS)attacks,and privacy breaches.Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks.This survey provides a comprehensive review of how Federated Learning(FL),Blockchain,and Digital Twin(DT)technologies can collectively enhance the security of 5G and 6G systems.Blockchain offers decentralized,immutable,and transparent mechanisms for securing network transactions,while FL enables privacy-preserving collaborative learning without sharing raw data.Digital Twins create virtual replicas of network components,enabling real-time monitoring,anomaly detection,and predictive threat analysis.The survey examines major security issues in emerging wireless architectures and analyzes recent advancements that integrate FL,Blockchain,and DT to mitigate these threats.Additionally,it presents practical use cases,synthesizes key lessons learned,and identifies ongoing research challenges.Finally,the survey outlines future research directions to support the development of scalable,intelligent,and robust security frameworks for next-generation wireless networks. 展开更多
关键词 5G/6G blockchain federated learning edge computing security
在线阅读 下载PDF
Secured-FL:Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models
12
作者 Bello Musa Yakubu Nor Shahida Mohd Jamail +1 位作者 Rabia Latif Seemab Latif 《Computers, Materials & Continua》 2026年第3期734-757,共24页
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr... Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments. 展开更多
关键词 Federated learning(FL) blockchain FL based privacy model defense FL model security ethereum smart contract
在线阅读 下载PDF
Blockchain-Assisted Improved Cryptographic Privacy-Preserving FL Model with Consensus Algorithm for ORAN
13
作者 Raghavendra Kulkarni Venkata Satya Suresh kumar Kondeti +1 位作者 Binu Sudhakaran Pillai Surendran Rajendran 《Computers, Materials & Continua》 2026年第1期1862-1884,共23页
The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)... The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)and artificial intelligence(AI)techniques,have become standard practice.The need for Federated Learning(FL)for ML model training in ORAN environments is heightened by the modularised structure of the ORAN architecture and the shortcomings of conventional ML techniques.However,the traditional plaintext model update sharing of FL in multi-BS contexts is susceptible to privacy violations such as deep-leakage gradient assaults and inference.Therefore,this research presents a novel blockchain-assisted improved cryptographic privacy-preserving federated learning(BICPPFL)model,with the help of ORAN,to safely carry out federated learning and protect privacy.This model improves on the conventional masking technique for sharing model parameters by adding new characteristics.These features include the choice of distributed aggregators,validation for final model aggregation,and individual validation for BSs.To manage the security and privacy of FL processes,a combined homomorphic proxy-reencryption(HPReE)and lattice-cryptographic method(HPReEL)has been used.The upgraded delegated proof of stake(Up-DPoS)consensus protocol,which will provide quick validation of model exchanges and protect against malicious attacks,is employed for effective consensus across blockchain nodes.Without sacrificing performance metrics,the BICPPFL model strengthens privacy and adds security layers while facilitating the transfer of sensitive data across several BSs.The framework is deployed on top of a Hyperledger Fabric blockchain to evaluate its effectiveness.The experimental findings prove the reliability and privacy-preserving capability of the BICPPFL model. 展开更多
关键词 Open radio access network homomorphic proxy-re-encryption lattice-cryptography hyperledger fabric blockchain technology upgraded delegated proof of stake federated learning
在线阅读 下载PDF
Double-layer model updating for steel-concrete composite beam cable-stayed bridge based on GPS 被引量:1
14
作者 刘云 钱振东 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期80-84,共5页
In order to establish the relationship between the measured dynamic response and the health status of long-span bridges, a double-layer model updating method for steel-concrete composite beam cable-stayed bridges is p... In order to establish the relationship between the measured dynamic response and the health status of long-span bridges, a double-layer model updating method for steel-concrete composite beam cable-stayed bridges is proposed. Measured frequencies are selected as the first-layer reference data, and the mass of the bridge deck, the grid density, the modulus of concrete and the ballast on the side span are modified by using a manual tuning technique. Measured global positioning system (GPS) data is selected as the second-layer reference data, and the degradation of the integral structure stiffness EI of the whole bridge is taken into account for the second-layer model updating by using the finite element iteration algorithm. The Nanpu Bridge in Shanghai is taken as a case to verify the applicability of the proposed model updating method. After the first-layer model updating, the standard deviation of modal frequencies is smaller than 7%. After the second-layer model updating, the error of the deflection of the mid-span is smaller than 10%. The integral structure stiffness of the whole bridge decreases about 20%. The research results show a good agreement between the calculated response and the measured response. 展开更多
关键词 steel-concrete composite beam GPS dynamic respond double-layer model updating
在线阅读 下载PDF
Computation of the Fatigue Life of Road Wheel with Double-Layer Rubber Flange
15
作者 郑慕侨 孙逢春 +1 位作者 蒋轩 张军 《Journal of Beijing Institute of Technology》 EI CAS 2001年第2期169-174,共6页
In order to increase the fatigue life (FL) of road wheels (RW), a kind of double layer rubber flange (DLRF) is put forward. It consists of two layers of rubber, where metal wires are laid in the inner layer and the ou... In order to increase the fatigue life (FL) of road wheels (RW), a kind of double layer rubber flange (DLRF) is put forward. It consists of two layers of rubber, where metal wires are laid in the inner layer and the outer layer has no inlaid metal wires. Stress, strain and temperature field of DLRF were calculated with ANSYS finite element analysis (FEA) software, FL of DLRF RW was also computed with fracture mechanics fatigue theory. The results of computation indicate that the heat generated in RW's rubber flange (RF) can be reduced by the use of DLRF, and the FL of RW can be increased without affecting the mechanical intensity of RW. 展开更多
关键词 double-layer rubber flange road wheel finite element analysis fatigue life
在线阅读 下载PDF
Double-layered osmotic pump controlled release tablets of actarit: In vitro and in vivo evaluation 被引量:9
16
作者 Yuenan Li Hao Pan +6 位作者 Hongliang Duan Jianting Chen Zhihong Zhu Jingxin Fan Pingfei Li Xinggang Yang Weisan Pan 《Asian Journal of Pharmaceutical Sciences》 SCIE CAS 2019年第3期340-348,共9页
The aim of the study was to develop actarit double-layered osmotic pump tablets to overcome the weak points of actarit common tablets, such as short half-life and large plasma concentration fluctuations. Single factor... The aim of the study was to develop actarit double-layered osmotic pump tablets to overcome the weak points of actarit common tablets, such as short half-life and large plasma concentration fluctuations. Single factor experiment and orthogonal test were applied to optimize the formulation;the pharmacokinetic study was performed in beagle dogs adopting actarit common tablets as reference tablets. The optimal formulation was as follows: drug layer: 150 mg actarit, 240 mg PEO-N80, 50 mg NaCl;push layer: 140 mg PEO-WSR303, 20 mg NaCl;coating solution: 30 g cellulose acetate and 6 g PEG 4000 in 1000 ml 94% acetone solution, 60 mg coating weight gain. The pharmacokinetic study showed that T max was prolonged by the contrast of commercial common tablets with constant drug release rate, but the bioavailability was equivalent. And a good in vivo –in vitro correlation of the actarit osmotic pump tablets was also established. The designed actarit osmotic pump tablets can be applied for rheumatoid arthritis, proposing a promising replacement for the marked common products. 展开更多
关键词 Actarit double-layered OSMOTIC pump TABLET PHARMACOKINETICS In vivo –in VITRO correlation
暂未订购
Double-layered covered stent for the treatment of malignant oesophageal obstructions: Systematic review and meta-analysis 被引量:2
17
作者 Zeiad Hussain Athanasios Diamantopoulos +1 位作者 Miltiadis Krokidis Konstantinos Katsanos 《World Journal of Gastroenterology》 SCIE CAS 2016年第34期7841-7850,共10页
AIM To investigate the efficacy of double-layered covered stent in the treatment of malignant oesophageal obstructions.METHODS A systematic review and meta-analysis was performed following the PRISMA process. Pub Med(... AIM To investigate the efficacy of double-layered covered stent in the treatment of malignant oesophageal obstructions.METHODS A systematic review and meta-analysis was performed following the PRISMA process. Pub Med(Medline),EMBASE(Excerpta Medical Database),AMED(Allied and Complementary medicine Database),Scopus and online content,were searched for studies reporting on the Ni Ti-S polyurethane-covered double oesophageal stent for the treatment of malignant dysphagia. Weighted pooled outcomes were synthesized with a random effects model to account for clinical heterogeneity. All studies reporting the outcome of palliative management of dysphagia due to histologically confirmed malignant oesophageal obstruction using double-layered covered nitinol stent were included. The level of statistical significance was set at α = 0.05.RESULTS Six clinical studies comprising 250 patients in total were identified. Pooled technical success of stent insertion was 97.2%(95%CI: 94.8%-98.9%; I2 = 5.8%). Pooled complication rate was 27.6%(95%CI: 20.7%-35.2%; I2 = 41.9%). Weighted improvement of dysphagia on a scale of 0-5 scoring system was-2.00 [95%CI:-2.29%-(-1.72%); I2 = 87%]. Distal stent migration was documented in 10 out of the 250 cases examined.Pooled stent migration rate was 4.7%(95%CI: 2.5%-7.7%; I2 = 0%). Finally,tumour overgrowth was reported in 34 out of the 250 cases with pooled rate of tumour overgrowth of 11.2%(95%CI: 3.7%-22.1%; I2 = 82.2%). No funnel plot asymmetry to suggest publication bias(bias = 0.39,P = 0.78). In the sensitivity analysis all results were largely similar between the fixed and random effects models.CONCLUSION The double-layered nitinol stent provides immediate relief of malignant dysphagia with low rates of stent migration and tumour 展开更多
关键词 double-layered covered STENT MALIGNANT OESOPHAGEAL OBSTRUCTIONS Dysphagia double-layered nitinol STENT
暂未订购
One-dimensional consolidation of double-layered soil with non-Darcian flow described by exponent and threshold gradient 被引量:10
18
作者 李传勋 谢康和 +1 位作者 胡安峰 胡白香 《Journal of Central South University》 SCIE EI CAS 2012年第2期562-571,共10页
Based on non-Darcian flow law described by exponent and threshold gradient within a double-layered soil, the classic theory of one-dimensional consolidation of double-layered soil was modified to consider the change o... Based on non-Darcian flow law described by exponent and threshold gradient within a double-layered soil, the classic theory of one-dimensional consolidation of double-layered soil was modified to consider the change of vertical total stress with depth and time together. Because of the complexity of governing equations, the numerical solutions were obtained in detail by finite difference method. Then, the numerical solutions were compared with the analytical solutions in condition that non-Darcian flow law was degenerated to Dary's law, and the comparison results show that numerical solutions are reliable. Finally, consolidation behavior of double-layered soil with different parameters was analyzed, and the results show that the consolidation rate of double-layered soil decreases with increasing the value of exponent and threshold of non-Darcian flow, and the exponent and threshold gradient of the first soil layer greatly influence the consolidation rate of double-layered soil. The larger the ratio of the equivalent water head of external load to the total thickness of double-layered soil, the larger the rate of the consolidation, and the similitude relationship in classical consolidation theory of double-layered soil is not satisfied. The other consolidation behavior of double-layered soil with non-Darcian flow is the same as that with Darcy's law. 展开更多
关键词 one-dimensional consolidation double-layered soil non-Darcian flow depth dependent vertical total stress timedependent loading
在线阅读 下载PDF
Numerical investigation of velocity distribution of turbulent flow through vertically double-layered vegetation 被引量:5
19
作者 Naveed Anjum Norio Tanaka 《Water Science and Engineering》 EI CAS CSCD 2019年第4期319-329,共11页
The velocity structures of flow through vertically double-layered vegetation(VDLV)as well as single-layered rigid vegetation(SLV)were investigated computationally with a three-dimensional(3D)Reynolds stress turbulence... The velocity structures of flow through vertically double-layered vegetation(VDLV)as well as single-layered rigid vegetation(SLV)were investigated computationally with a three-dimensional(3D)Reynolds stress turbulence model,using the computational fluid dynamics(CFD)code FLUENT.The detailed velocity distribution was explored with a varying initial Froude number(Fr),with consideration of the steady subcritical flow conditions of an inland tsunami.In VDLV flows,the numerical model successfully captured the inflection point in the profiles of mean streamwise velocities in the mixing-layer region around the top of short submerged vegetation.An upward and downward movement of flow occurred at the positions located just behind the tall and short vegetation,respectively.Overall,higher streamwise velocities were observed in the upper vegetation layer due to high porosity,with Pr=98%(sparse vegetation,where Pr is the porosity),as compared to those in the lower vegetation layer,which had comparatively low porosity,with Pr=91%(dense vegetation).A rising trend of velocities was found as the flow passed through the vegetation region,followed by a clear sawtooth distribution,as compared to the regions just upstream and downstream of vegetation where the flow was almost uniform.In VDLV flows,a rising trend in the flow resistance was observed with the increase in the initial Froude number,i.e.,Fr?0.67,0.70,and 0.73.However,the flow resistance in the case of SLV was relatively very low.The numerical results also show the flow structures within the vicinity of short and tall vegetation,which are difficult to attain through experimental measurements. 展开更多
关键词 Vertically double-layered vegetation Single-layered rigid vegetation Numerical modeling FLUENT Velocity distribution Turbulent flow
在线阅读 下载PDF
Analysis of one-dimensional rheological consolidation of double-layered soil with fractional derivative Merchant model and non-Darcian flow described by non-Newtonian index 被引量:5
20
作者 CUI Peng-lu LIU Zhong-yu +1 位作者 ZHANG Jia-chao FAN Zhi-cheng 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第1期284-296,共13页
To further investigate the one-dimensional(1D)rheological consolidation mechanism of double-layered soil,the fractional derivative Merchant model(FDMM)and the non-Darcian flow model with the non-Newtonian index are re... To further investigate the one-dimensional(1D)rheological consolidation mechanism of double-layered soil,the fractional derivative Merchant model(FDMM)and the non-Darcian flow model with the non-Newtonian index are respectively introduced to describe the deformation of viscoelastic soil and the flow of pore water in the process of consolidation.Accordingly,an 1D rheological consolidation equation of double-layered soil is obtained,and its numerical analysis is performed by the implicit finite difference method.In order to verify its validity,the numerical solutions by the present method for some simplified cases are compared with the results in the related literature.Then,the influence of the revelent parameters on the rheological consolidation of double-layered soil are investigated.Numerical results indicate that the parameters of non-Darcian flow and FDMM of the first soil layer greatly influence the consolidation rate of double-layered soil.As the decrease of relative compressibility or the increase of relative permeability between the lower soil and the upper soil,the dissipation rate of excess pore water pressure and the settlement rate of the ground will be accelerated.Increasing the relative thickness of soil layer with high permeability or low compressibility will also accelerate the consolidation rate of double-layered soil. 展开更多
关键词 double-layered soil rheological consolidation fractional derivative non-Darcian flow non-Newtonian index finite difference method viscoelasticity
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部