期刊文献+
共找到507篇文章
< 1 2 26 >
每页显示 20 50 100
Model-based robustness testing for avionics-embedded software 被引量:3
1
作者 Yang Shunkun Liu Bin +1 位作者 Wang Shihai Lu Minyan 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第3期730-740,共11页
Robustness testing for safety-critical embedded software is still a challenge in its nascent stages. In this paper, we propose a practical methodology and implement an environment by employing model-based robustness t... Robustness testing for safety-critical embedded software is still a challenge in its nascent stages. In this paper, we propose a practical methodology and implement an environment by employing model-based robustness testing for embedded software systems. It is a system-level black-box testing approach in which the fault behaviors of embedded software is triggered with the aid of modelbased fault injection by the support of an executable model-driven hardware-in-loop (HIL) testing environment. The prototype implementation of the robustness testing environment based on the proposed approach is experimentally discussed and illustrated by industrial case studies based on several avionics-embedded software systems. The results show that our proposed and implemented robustness testing method and environment are effective to find more bugs, and reduce burdens of testing engineers to enhance efficiency of testing tasks, especially for testing complex embedded systems. 展开更多
关键词 embedded software HARDWARE-IN-LOOP Model-based testing Robustness testing Testing environment
原文传递
Key Technology of Embedded System Implementation for Software-based CNC System 被引量:3
2
作者 WAN Jiafu LI Di ZHANG Ping 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2010年第2期217-224,共8页
The software-based computer numerical control(CNC) system includes three types of tasks: periodic real-time tasks, aperiodic real-time tasks, and non-real-time tasks. The tasks are characterized by concurrency, hyb... The software-based computer numerical control(CNC) system includes three types of tasks: periodic real-time tasks, aperiodic real-time tasks, and non-real-time tasks. The tasks are characterized by concurrency, hybridization, and correlation, which make system implementation difficult. The conventional scheduling algorithm can not meet the demands of system implementation in the software-based CNC system completely. The uncertainty factors when running real-time tasks affect control performance by degrading manufacturing accuracy as a result of system resource and processor use restrictions. To address the technical difficulty of embedded system implementation, a novel fuzzy feedback scheduling algorithm based on output jitter of key real-time tasks for a software-based CNC system is proposed. Time characteristics, such as sampling jitter, input-output jitter, and non-schedulability are discussed, followed by quantification through simulations of the impact of time characteristics on manufacturing accuracy. On the basis of this research, the scheduler architecture is designed, and then the algorithm table is calculated. When the system resource changes, the key periodic real-time tasks meet their deadlines by means of dynamically adjusting the task period. The simulated results show that the machining precision rises by an order of magnitude for the proposed scheduler in resource-constrained software-based CNC systems. Moreover, unlike conventional feedback scheduling methods, the algorithm in this paper does not rely on the availability of task execution times and is easy to implement while incurring only a small overhead. 展开更多
关键词 software-based CNC system embedded system implementation output jitter fuzzy feedback scheduling manufacturing accuracy
在线阅读 下载PDF
The ternary Ni–Al–Co embedded-atom-method potential for γ/γ Ni-based single-crystal superalloys: Construction and application 被引量:1
3
作者 杜俊平 王崇愚 于涛 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第3期224-231,共8页
An Ni-AI-Co system embedded-atom-method potential is constructed for the γ(Ni)/γ'(Ni3A1) superalloy based on experiments and first-principles calculations. The stacking fault energies (SFEs) of the Ni(Co, A1... An Ni-AI-Co system embedded-atom-method potential is constructed for the γ(Ni)/γ'(Ni3A1) superalloy based on experiments and first-principles calculations. The stacking fault energies (SFEs) of the Ni(Co, A1) random solid solutions are calculated as a function of the concentrations of Co and A1. The calculated SFEs decrease with increasing concentrations of Co and A1, which is consistent with the experimental results. The embedding energy term in the present potential has an important influence on the SFEs of the random solid solutions. The cross-slip processes of a screw dislocation in homogenous Ni(Co) solid solutions are simulated using the present potential and the nudged elastic band method. The cross-slip activation energies increase with increasing Co concentration, which implies that the creep resistance of γ(Ni) may be improved by the addition of Co. 展开更多
关键词 interatomic interaction potential embedded-atom method Ni-based single-crystal superalloys
原文传递
Qt/Embedded和SQLite下的嵌入式知识库管理方法 被引量:2
4
作者 赵世峰 刘白林 《电脑知识与技术(过刊)》 2011年第12X期9209-9211,共3页
嵌入式平台为故障诊断专家系统提供了良好的运行环境。介绍了Qt/Embedded和SQLite在ARM-Linux平台上的运行环境的搭建技术,提出在嵌入式Linux环境下用Qt/Embedded对知识库进行管理的方法。使用Qt/Embedded的数据库驱动连接SQLite创建的... 嵌入式平台为故障诊断专家系统提供了良好的运行环境。介绍了Qt/Embedded和SQLite在ARM-Linux平台上的运行环境的搭建技术,提出在嵌入式Linux环境下用Qt/Embedded对知识库进行管理的方法。使用Qt/Embedded的数据库驱动连接SQLite创建的嵌入式知识库,构造基于Qt/Embedded数据库访问类的知识对象类来表示和访问知识。实践表明该方法具有较高的可靠性和实用性,取得了良好的效果。 展开更多
关键词 专家系统 QT/embedded SQLITE arm-linux平台 知识库管理
在线阅读 下载PDF
基于XPEmbedded的警务区SMS指挥平台的设计与实现
5
作者 陈旺 《电脑知识与技术(过刊)》 2009年第10X期8202-8204,共3页
针对检察机关警务区便携式指挥平台的研发需求,采用普通PC架构、工业手机、XPE进行嵌入式软件开发。基于BASE64编码实现信息的保密传输,编码后通过"自动分割拼接"模块突破SMS单次收发140字节的限制实现顺畅交流。实测表明,这... 针对检察机关警务区便携式指挥平台的研发需求,采用普通PC架构、工业手机、XPE进行嵌入式软件开发。基于BASE64编码实现信息的保密传输,编码后通过"自动分割拼接"模块突破SMS单次收发140字节的限制实现顺畅交流。实测表明,这是一种高效、低成本的研发方法。该方法对于实现检察机关信息化"专机专用"应用,有一定的推广价值。 展开更多
关键词 Windows XP embedded SMS base64 专用机
在线阅读 下载PDF
A new image watermarking framework based on levels-directions decomposition in contourlet representation
6
作者 M.F.Kazemi M.A.Pourmina A.H.Mazinan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第3期521-532,共12页
With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its u... With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified. 展开更多
关键词 contourlet based watermarking framework levels-directions decomposition embedding process de-embedding process peak signal-to-noise ratio structural similarity indices normal correlation bit error rate
在线阅读 下载PDF
Night Vision Object Tracking System Using Correlation Aware LSTM-Based Modified Yolo Algorithm
7
作者 R.Anandha Murugan B.Sathyabama 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期353-368,共16页
Improved picture quality is critical to the effectiveness of object recog-nition and tracking.The consistency of those photos is impacted by night-video systems because the contrast between high-profile items and diffe... Improved picture quality is critical to the effectiveness of object recog-nition and tracking.The consistency of those photos is impacted by night-video systems because the contrast between high-profile items and different atmospheric conditions,such as mist,fog,dust etc.The pictures then shift in intensity,colour,polarity and consistency.A general challenge for computer vision analyses lies in the horrid appearance of night images in arbitrary illumination and ambient envir-onments.In recent years,target recognition techniques focused on deep learning and machine learning have become standard algorithms for object detection with the exponential growth of computer performance capabilities.However,the iden-tification of objects in the night world also poses further problems because of the distorted backdrop and dim light.The Correlation aware LSTM based YOLO(You Look Only Once)classifier method for exact object recognition and deter-mining its properties under night vision was a major inspiration for this work.In order to create virtual target sets similar to daily environments,we employ night images as inputs;and to obtain high enhanced image using histogram based enhancement and iterative wienerfilter for removing the noise in the image.The process of the feature extraction and feature selection was done for electing the potential features using the Adaptive internal linear embedding(AILE)and uplift linear discriminant analysis(ULDA).The region of interest mask can be segmen-ted using the Recurrent-Phase Level set Segmentation.Finally,we use deep con-volution feature fusion and region of interest pooling to integrate the presently extremely sophisticated quicker Long short term memory based(LSTM)with YOLO method for object tracking system.A range of experimentalfindings demonstrate that our technique achieves high average accuracy with a precision of 99.7%for object detection of SSAN datasets that is considerably more than that of the other standard object detection mechanism.Our approach may therefore satisfy the true demands of night scene target detection applications.We very much believe that our method will help future research. 展开更多
关键词 Object monitoring night vision image SSAN dataset adaptive internal linear embedding uplift linear discriminant analysis recurrent-phase level set segmentation correlation aware LSTM based yolo classifier algorithm
在线阅读 下载PDF
Identity-Based Steganography in Spatial Domain
8
作者 Xuba Xu Qiankai Nie 《Journal of Computer and Communications》 2018年第3期68-77,共10页
This paper proposed an identity-based steganographic scheme, where a receiver with certain authority can recover the secret message ready for him, but cannot detect the existence of other secret messages. The proposed... This paper proposed an identity-based steganographic scheme, where a receiver with certain authority can recover the secret message ready for him, but cannot detect the existence of other secret messages. The proposed scheme created several separate covert communication channels tagged by the Fuzzy Identity-Based Encryption (FIBE) in one grayscale image. Then each channel is used to embed one secret message by using any content-aware steganographic scheme. Receivers with different attributes can extract different messages corresponded. The Experiments illustrated the feasibility of this identity-based secret message extraction. Further, the proposed scheme presents high undetectability against steganalytic attack launched by receivers without corresponded attributes. 展开更多
关键词 STEGANOGRAPHY MULTIPLE embedDING FUZZY IDENTITY-based ENCRYPTION
在线阅读 下载PDF
An Embedded Software Modeling and Process by Using Aspect-Oriented Approach
9
作者 Yong-Yi FanJiang Jong-Yih Kuo Shang-Pin Ma 《Journal of Software Engineering and Applications》 2011年第2期106-122,共17页
In recent years, mobile devices have become widespread and refined, and they have offered increased convenience in human life. For these reasons, a variety of embedded systems have been designed. Therefore, improving ... In recent years, mobile devices have become widespread and refined, and they have offered increased convenience in human life. For these reasons, a variety of embedded systems have been designed. Therefore, improving methods for developing of embedded software systematically has become an important issue. Platform-based design is one example of an embedded-system design method that can reduce the design cost via improving a design’s abstraction level. However, platform-based design lacks precise definitions for platforms and design processes. This paper provides an approach that combines the aspects and platform-based design methods for developing embedded software. The approach is built on platform-based design methodology and uses the separating of concerns (SoC) concept to define the aspects and to reduce the crosscutting concerns in embedded system modeling. For aspect issues, we use the extended UML notation with aspects to describe both the static structure and the dynamic structure of the embedded system. We used an example of a digital photo frame system to demonstrate our approach. 展开更多
关键词 Platform-based Design ASPECT-ORIENTED UNIFIED Modeling LANGUAGE embedded SOFTWARE
暂未订购
The Superconductivity in Fe-Based Family of Superconductors and Its Electronic Structure Analysis in Presence of Dopants Rh and Pd
10
作者 Ronald Columbié-Leyva Alberto López-Vivas +2 位作者 ] Ulises Miranda Ilya G. Kaplan 《Journal of Quantum Information Science》 CAS 2022年第4期111-124,共14页
The discovered in 2008 Fe-based superconductors (SC) are a paramagnetic semimetal at ambient temperature and in some cases they become superconductor upon doping. In spite of so many years since its discovery it is st... The discovered in 2008 Fe-based superconductors (SC) are a paramagnetic semimetal at ambient temperature and in some cases they become superconductor upon doping. In spite of so many years since its discovery it is still not known the mechanism that leads to superconductivity. The electronic structure study is used for determining key features of the SC mechanism in these materials. The calculations were performed using the modern suite of programs MOLPRO 2021. We performed quantum calculations of a cluster embedded in a background charge distribution that represents the infinite crystal. The Natural Population Analysis was used for determining the charge and spin distribution in the studied materials. As follows from our results, the possible mechanism for superconductivity corresponds to the RVB theory proposed by Anderson for high T<sub>c</sub> superconductivity in cuprates. 展开更多
关键词 Iron-based High-Tc Superconductors SUPERCONDUCTIVITY embeded Cluster Method Natural Bonding Orbitals Analysis
在线阅读 下载PDF
素养导向嵌入式评价系统的设计与实施 被引量:4
11
作者 杨向东 《中国考试》 北大核心 2025年第1期1-14,共14页
在素养导向的课程改革理念指导下,推进当前课程改革需要构建与课程和教学相整合的素养导向嵌入式评价系统。该系统以学生的核心素养发展为主线,以素养导向的学业成就表现进阶为参照框架,通过任务设计、评分和测量学建模等方式,整合贯穿... 在素养导向的课程改革理念指导下,推进当前课程改革需要构建与课程和教学相整合的素养导向嵌入式评价系统。该系统以学生的核心素养发展为主线,以素养导向的学业成就表现进阶为参照框架,通过任务设计、评分和测量学建模等方式,整合贯穿课程学习过程的不同评价证据,构建能够呈现学生素养发展历程的纵向测量尺度,提供有实质内容、能改进教学和学习的持续反馈信息。设计和实施素养导向嵌入式评价系统要强调教师和学生的主导地位,重视教师评价素养、评价协调机制、数字化支持平台等方面的建设工作。 展开更多
关键词 素养导向嵌入式评价系统 核心素养框架 学业成就表现进阶 教师评价素养 评价协调机制 数字化设施
在线阅读 下载PDF
嵌入、脱嵌与再嵌:社会企业嵌入社区居家养老服务的梗阻与调适 被引量:4
12
作者 刘振奋 刘晓昀 李运思 《当代经济管理》 北大核心 2025年第7期78-88,共11页
当前我国社区居家养老服务总体上呈现出“高需求-低供给”的结构性难题,社会企业凭借自身在服务能力、使命价值与运营手段方面的显著优势,成为解决社区居家养老服务供给难题的重要主体。在借鉴嵌入理论已有研究的基础上,构建了社会企业... 当前我国社区居家养老服务总体上呈现出“高需求-低供给”的结构性难题,社会企业凭借自身在服务能力、使命价值与运营手段方面的显著优势,成为解决社区居家养老服务供给难题的重要主体。在借鉴嵌入理论已有研究的基础上,构建了社会企业嵌入社区居家养老服务的分析框架,从关系嵌入、制度嵌入、能力嵌入、资源嵌入四个维度阐释社会企业何以嵌入。当前我国社会企业尚处于探索阶段,自身以及外部支持环境的众多缺陷使其在嵌入社区居家养老服务的过程中面临社会关系网络多重失衡的关系脱嵌困境、规制缺位与使命漂移的制度脱嵌困境、市场运作能力欠佳与服务水平有限的能力脱嵌困境、多元资源获取受限的资源脱嵌困境,这些脱嵌困境严重限制了社会企业应有的服务效能,社会企业的嵌入调适已经刻不容缓。针对这些脱嵌困境,社会企业应该坚持走关系再嵌、制度再嵌、能力再嵌、资源再嵌的调适性再嵌入之路,从重塑社会关系网络、完善规制与监督体系、提高市场运营与专业服务能力、整合优化资源配置四个方面着手,实现对于社区居家养老服务的良性再嵌入。 展开更多
关键词 社会企业 社区居家养老服务 脱嵌困境 嵌入调适
在线阅读 下载PDF
用于方面级情感分析的多信息融合图卷积网络
13
作者 高玮军 张玉莹 焦成寅 《计算机系统应用》 2025年第8期14-24,共11页
近年来,方面级情感分析利用图神经网络挖掘依赖句法信息逐渐成为趋势,但现有方法大多未考虑不同关系类型对内容词的影响,难以区分关键的关联词.此外,多视角信息的相互补充对捕捉情感特征起重要作用,但在过去的研究中融合机制常被忽视.... 近年来,方面级情感分析利用图神经网络挖掘依赖句法信息逐渐成为趋势,但现有方法大多未考虑不同关系类型对内容词的影响,难以区分关键的关联词.此外,多视角信息的相互补充对捕捉情感特征起重要作用,但在过去的研究中融合机制常被忽视.为解决这些问题,提出一种多源信息融合图卷积网络(multi-source information graph convolutional network,MSI-GCN)有效捕获和集成三视角信息.首先,设计了一个双通道信息提取模块SSDGCN(syntax-semantics dual graph convolutional network),由类型嵌入的句法增强图卷积网络(TES-GCN)和语义图卷积网络(SEM-GCN)组成.TES-GCN通过引入类型嵌入层,使用句法模块学习不同类型的权重来增强句法信息.SEM-GCN对自注意矩阵进行编码,捕获语义信息,并引入正交正则化来增强语义关联.其次,嵌入外部知识图表示丰富词汇特征.最后,引入局部门控-全局卷积网络,充分利用视角之间的互补性,对其进行有效融合.本文在4个公开数据集上对提出的方法进行了评估,准确率和Macro-F1值相比于基线模型均有所提升. 展开更多
关键词 方面级情感分析 多源信息融合 图卷积网络 外部知识 句法类型嵌入
在线阅读 下载PDF
渗剂中不同硅铝组成对Ti-Al-Si涂层微观组织和抗氧化性的影响 被引量:1
14
作者 朱纯清 颜建辉 《中国表面工程》 北大核心 2025年第2期313-324,共12页
TiAl基合金已广泛应用于航空航天和汽车发动机领域,然而Ti Al基合金在800℃高温环境下抗氧化性不足,制备Ti-Al-Si涂层是提高TiAl合金高温抗氧化性的一种有效方法。以五种不同比例的粉、铝粉作为渗剂,利用固体粉末包埋渗技术在TiAl合金... TiAl基合金已广泛应用于航空航天和汽车发动机领域,然而Ti Al基合金在800℃高温环境下抗氧化性不足,制备Ti-Al-Si涂层是提高TiAl合金高温抗氧化性的一种有效方法。以五种不同比例的粉、铝粉作为渗剂,利用固体粉末包埋渗技术在TiAl合金表面制备不同组成的硅铝共渗涂层,研究不同涂层在800℃高温下的抗氧化性能。结果表明:硅铝共渗制备的涂层由TiAl_(2)过渡层和TiAl_(3)外层组成,外层下方镶嵌着白色的Ti_(5)Si_(3)相。随着渗剂中Al元素含量的减少,渗层厚度减少,Ti_(5)Si_(3)相增多,过渡层厚度增加。涂层在800℃高温下为合金提供了良好的保护效果,氧化后涂层由外到内为Al_(2)O_(3)层、TiAl_(3)层以及TiAl_(2)层。随着渗剂中Al元素含量的增加,TiAl合金高温氧化增重逐渐减少,抗氧化性能得到提高,这主要得益于致密Al_(2)O_(3)氧化膜的形成。研究结果可为TiAl合金高温抗氧化涂层的制备提供支持。 展开更多
关键词 TIAL基合金 固体粉末包埋渗 铝硅共渗 抗氧化性
在线阅读 下载PDF
基于多维时频特征的新型配电系统单相接地故障定位方法 被引量:1
15
作者 鲁晓天 唐金锐 +3 位作者 尹昕 黄云辉 周克亮 袁成清 《高电压技术》 北大核心 2025年第2期903-914,I0038-I0042,共17页
新型配电系统柔性消弧装置及定位技术均需充分挖掘相电流暂态特征来实现选相、选线和故障定位。针对此问题,对新型配电系统单相接地故障相电流暂态分布特性进行分析,提出了一种基于相电流多维时频分布特征差异的新型配电系统单相接地故... 新型配电系统柔性消弧装置及定位技术均需充分挖掘相电流暂态特征来实现选相、选线和故障定位。针对此问题,对新型配电系统单相接地故障相电流暂态分布特性进行分析,提出了一种基于相电流多维时频分布特征差异的新型配电系统单相接地故障定位新方法。依据故障相电流故障暂态量与非故障相电流故障暂态量的差异性,通过灰色关联度算法完成故障选相;对各出线始端监测点以及疑似故障馈线分支监测点的相电流暂态波形进行26维多维时频特征的提取,通过经方差优化的t-分布近邻嵌入算法(variance-optimized t-distributed stochastic neighbor embedding,VTSNE)进行筛选和降维,并对处理后的特征数据进行基于密度的有噪空间聚类算法(density-based special clustering of application with noise,DBSCAN)聚类完成故障选线和故障区段定位。该方法在某绿色港口10 kV新型配电系统模型中得到验证,在不同故障初相角、不同过渡电阻等故障场景下均可准确可靠定位故障位置,对采样同步精度及采样频率要求低,易于工程实现。 展开更多
关键词 新型配电系统 故障定位 多维时频特征 t-SNE降维 DBSCAN聚类
原文传递
关系型交易模式下嵌入式分析师的信息传递作用研究——基于浑水做空安踏的案例分析
16
作者 常语萱 唐松 +1 位作者 周琦 李增泉 《南开管理评论》 北大核心 2025年第2期80-91,共12页
我国商业活动中存在大量关系型交易,导致与交易相关的专有信息很难被公开披露,给资本市场的有效运行带来挑战。本文以浑水做空安踏事件为例,探讨中国制度情境下嵌入式分析师(即与公司有密切关系的分析师)帮助企业向资本市场传递关系型... 我国商业活动中存在大量关系型交易,导致与交易相关的专有信息很难被公开披露,给资本市场的有效运行带来挑战。本文以浑水做空安踏事件为例,探讨中国制度情境下嵌入式分析师(即与公司有密切关系的分析师)帮助企业向资本市场传递关系型交易相关信息的作用。研究发现,在安踏被浑水做空后,嵌入式分析师比其他分析师更积极地发布了乐观报告,这对股票市场产生了重要影响,最终使得浑水做空没有成功。这说明嵌入式分析师对安踏的商业模式有更深刻的理解,他们通过将安踏难以直接公开披露的关系型交易信息转化为外部投资者能够解读的投资建议,促进了专有信息的传递。本文揭示了根植于中国制度情境的关系型商业模式下信息披露和传递的特殊机制,对于如何促进投资者更好地使用中介信息以及如何提高监管效率具有一定的启示。 展开更多
关键词 信息披露 信息传递 关系型交易 嵌入式分析师
在线阅读 下载PDF
融合多视角信息的朋友关系预测方法
17
作者 马志慧 陈红梅 +1 位作者 杨培忠 王丽珍 《计算机科学与探索》 北大核心 2025年第11期3023-3032,共10页
位置社会网络(LBSN)是一类融合了朋友关系和用户签到轨迹的社会网络,其广泛应用于兴趣点推荐、活动策划和朋友关系预测等任务。然而,现有的朋友关系预测方法在处理用户签到轨迹时,在空间维度上忽略了用户的兴趣点偏好和空间约束,在时间... 位置社会网络(LBSN)是一类融合了朋友关系和用户签到轨迹的社会网络,其广泛应用于兴趣点推荐、活动策划和朋友关系预测等任务。然而,现有的朋友关系预测方法在处理用户签到轨迹时,在空间维度上忽略了用户的兴趣点偏好和空间约束,在时间维度上忽略了用户兴趣点偏好的动态变化。针对上述问题,提出融合多视角信息的朋友关系预测方法(FPIMV),旨在通过捕获用户签到轨迹中的空间、时间信息以及用户间的朋友关系等多视角信息,有效学习用户对嵌入,提升朋友关系预测效果。FPIMV模型在签到位置嵌入层,提出基于兴趣点相似性和邻近度的用户对嵌入方法,该方法有效捕获了用户的兴趣点偏好和空间约束;在签到时间嵌入层,提出基于签到时间局部和全局特征的用户对嵌入方法,该方法有效捕获了用户兴趣点偏好的动态变化;在社会关系嵌入层,基于元路径学习用户对嵌入,以捕获用户间的语义关系;最后,融合上述嵌入,提高用户对嵌入质量,进而提升朋友关系预测性能。在三个LBSN数据集上的实验结果表明,FPIMV模型在朋友关系预测任务上优于基线模型。 展开更多
关键词 位置社会网络 朋友关系预测 网络嵌入 时空信息
在线阅读 下载PDF
嵌入式软件模糊测试研究综述
18
作者 孙琪明 侯刚 +2 位作者 靳文杰 黄晨 孔维强 《计算机科学》 北大核心 2025年第7期13-25,共13页
嵌入式软件目前已广泛应用于国防军工、航空航天、物联网通信等各类安全攸关系统,面临着日益严峻的安全挑战,因此,如何快速发现并修复嵌入式软件安全漏洞变得至关重要。模糊测试作为一种高效的软件测试技术,能够通过自动生成大量随机数... 嵌入式软件目前已广泛应用于国防军工、航空航天、物联网通信等各类安全攸关系统,面临着日益严峻的安全挑战,因此,如何快速发现并修复嵌入式软件安全漏洞变得至关重要。模糊测试作为一种高效的软件测试技术,能够通过自动生成大量随机数据测试软件系统的可靠性,目前已逐步应用于各类嵌入式软件的漏洞发现。文中首先介绍了模糊测试技术、嵌入式系统及其固件设备;其次,概述了嵌入式软件模糊测试的流程,分析了其与传统软件模糊测试的区别和面临的挑战;然后,系统地介绍了嵌入式软件模糊测试的研究现状和主要方法,包括直接模糊测试和基于仿真的模糊测试;最后,分析了嵌入式软件模糊测试效果提升可采用的优化方法并展望了未来可能的技术方向。 展开更多
关键词 嵌入式软件 固件设备 安全漏洞 直接模糊测试 基于仿真的模糊测试
在线阅读 下载PDF
1200 t桅杆式起重机后铰座基础研究
19
作者 任宇刚 舒凯凯 +1 位作者 蔡晓东 刘涛伟 《起重运输机械》 2025年第4期59-65,共7页
桅杆式起重机的后铰座承受巨大的上拔力,是设备与混凝土基础可靠连接的关键。文中通过分析1200 t桅杆式起重机的总体布置和铰座基础的受力,对比不同设计标准中的螺栓计算方法,探讨了该起重机后铰座预埋螺栓的工程计算方法。通过Creo和An... 桅杆式起重机的后铰座承受巨大的上拔力,是设备与混凝土基础可靠连接的关键。文中通过分析1200 t桅杆式起重机的总体布置和铰座基础的受力,对比不同设计标准中的螺栓计算方法,探讨了该起重机后铰座预埋螺栓的工程计算方法。通过Creo和Ansys的联合应用,快速计算不同刚度铰座匹配不同法兰厚度(螺栓夹持长度)的预埋螺栓,以及预埋螺栓采用不同预紧力时的螺栓群受力分布。对比研究上述不同计算模型的计算结果,发现了铰座刚度和法兰厚度(螺栓夹持长度)对预埋螺栓群受力分布的影响,并对比工程计算结果,提出采用类似工程计算方法时应注意铰座刚度与法兰厚度(螺栓夹持长度)的匹配,为类似大型铰座基础的设计提供一定的参考。 展开更多
关键词 桅杆式起重机 铰座基础 预埋螺栓 Creo ANSYS
在线阅读 下载PDF
熔盐堆三维中子输运程序组件计算模块开发及验证
20
作者 戴明 程懋松 《核动力工程》 北大核心 2025年第S1期192-199,共8页
熔盐堆三维中子输运程序ThorMOC采用非均匀谱修正方法为全堆输运计算提供少群截面,需要依赖组件或超组件计算提供多群有效宏观截面。针对具有三维复杂形状共振区的熔盐堆组件或超组件,利用ThorMOC中基于图形处理器(GPU)并行和基于特征线... 熔盐堆三维中子输运程序ThorMOC采用非均匀谱修正方法为全堆输运计算提供少群截面,需要依赖组件或超组件计算提供多群有效宏观截面。针对具有三维复杂形状共振区的熔盐堆组件或超组件,利用ThorMOC中基于图形处理器(GPU)并行和基于特征线法(MOC)的粗网综合加速(MSA)方法的准三维MOC输运求解器,实现了基于SHEM361能群结构多群数据库的嵌入式共振自屏方法(ESSM),从而在ThorMOC中支持熔盐堆组件计算。针对圆柱通道熔盐堆,划分7类组件并进行了验证分析,其中包括3个考虑上下支撑板及腔室的三维超组件,与连续能量蒙特卡罗方法结果相比,最大有效增殖因子相对偏差为-110pcm(1pcm=10^(-5))。数值计算结果表明所实现的组件计算模块可有效处理具有三维复杂形状共振区的熔盐堆组件计算。 展开更多
关键词 熔盐堆 组件计算 嵌入式共振自屏方法(ESSM) 准3D特征线法(MOC) 基于特征线法的粗网综合加速(MSA)方法
原文传递
上一页 1 2 26 下一页 到第
使用帮助 返回顶部