期刊文献+
共找到21,393篇文章
< 1 2 250 >
每页显示 20 50 100
Mitigation strategies for blasting-induced cracks and vibrations in twin-arch tunnel structures 被引量:1
1
作者 Xianshun Zhou Jin Chen +4 位作者 Xuemin Zhang Kai Zhu Yanyong Zhang Jianbo Fei Muhammad Irslan Khalid 《Defence Technology(防务技术)》 2025年第7期242-259,共18页
Due to space constraints in mountainous areas,twin tunnels are sometimes constructed very close to each other or even overlap.This proximity challenges the structural stability of tunnels built with the drill-and-blas... Due to space constraints in mountainous areas,twin tunnels are sometimes constructed very close to each other or even overlap.This proximity challenges the structural stability of tunnels built with the drill-and-blast method,as the short propagation distance amplifies blasting vibrations.A case of blasting damage is reported in this paper,where concrete cracks crossed construction joints in the twin-arch lining.To identify the causes of these cracks and develop effective vibration mitigation measures,field monitoring and numerical analysis were conducted.Specifically,a restart method was used to simulate the second peak particle velocity(PPV)of MS3 delays occurring 50 ms after the MS1 delays.The study found that the dynamic tensile stress in the tunnel induced by the blast wave has a linear relationship with the of the product of the concrete wave impedance and the PPV.A blast vibration velocity exceeding 23.3 cm/s resulted in tensile stress in the lining surpassing the ultimate tensile strength of C30 concrete,leading to tensile cracking on the blast-facing arch of the constructed tunnel.To control excessive vi-bration velocity,a mitigation trench was implemented to reduce blast wave impact.The trench,approximately 15 m in length,50 cm in width,and 450 cm in height,effectively lowered vibration ve-locities,achieving an average reduction rate of 52%according to numerical analysis.A key innovation of this study is the on-site implementation and validation of the trench's effectiveness in mitigating vi-brations.A feasible trench construction configuration was proposed to overcome the limitations of a single trench in fully controlling vibrations.To further enhance protection,zoned blasting and an auxiliary rock pillar,80 cm in width,were incorporated to reinforce the mid-wall.This study introduces novel strategies for vibration protection in tunnel blasting,offering innovative solutions to address blasting-induced vibrations and effectively minimize their impact,thereby enhancing safety and struc-tural stability. 展开更多
关键词 Twin-arch tunnel Drill-and-blast Blasting vibration mitigation LS-DYNA Restart method
在线阅读 下载PDF
Brain-derived neurotrophic factor signaling in the neuromuscular junction during developmental axonal competition and synapse elimination
2
作者 Josep Tomàs Víctor Cilleros-Mañé +7 位作者 Laia Just-Borràs Marta Balanyà-Segura Aleksandra Polishchuk Laura Nadal Marta Tomàs Carolina Silvera-Simón Manel M.Santafé Maria A.Lanuza 《Neural Regeneration Research》 SCIE CAS 2025年第2期394-401,共8页
During the development of the nervous system,there is an overproduction of neurons and synapses.Hebbian competition between neighboring nerve endings and synapses performing different activity levels leads to their el... During the development of the nervous system,there is an overproduction of neurons and synapses.Hebbian competition between neighboring nerve endings and synapses performing different activity levels leads to their elimination or strengthening.We have extensively studied the involvement of the brain-derived neurotrophic factor-Tropomyosin-related kinase B receptor neurotrophic retrograde pathway,at the neuromuscular junction,in the axonal development and synapse elimination process versus the synapse consolidation.The purpose of this review is to describe the neurotrophic influence on developmental synapse elimination,in relation to other molecular pathways that we and others have found to regulate this process.In particular,we summarize our published results based on transmitter release analysis and axonal counts to show the different involvement of the presynaptic acetylcholine muscarinic autoreceptors,coupled to downstream serine-threonine protein kinases A and C(PKA and PKC)and voltage-gated calcium channels,at different nerve endings in developmental competition.The dynamic changes that occur simultaneously in several nerve terminals and synapses converge across a postsynaptic site,influence each other,and require careful studies to individualize the mechanisms of specific endings.We describe an activity-dependent balance(related to the extent of transmitter release)between the presynaptic muscarinic subtypes and the neurotrophin-mediated TrkB/p75NTR pathways that can influence the timing and fate of the competitive interactions between the different axon terminals.The downstream displacement of the PKA/PKC activity ratio to lower values,both in competing nerve terminals and at postsynaptic sites,plays a relevant role in controlling the elimination of supernumerary synapses.Finally,calcium entry through L-and P/Q-subtypes of voltage-gated calcium channels(both channels are present,together with the N-type channel in developing nerve terminals)contributes to reduce transmitter release and promote withdrawal of the most unfavorable nerve terminals during elimination(the weakest in acetylcholine release and those that have already become silent).The main findings contribute to a better understanding of punishment-rewarding interactions between nerve endings during development.Identifying the molecular targets and signaling pathways that allow synapse consolidation or withdrawal of synapses in different situations is important for potential therapies in neurodegenerative diseases. 展开更多
关键词 acetylcholine release adenosine receptors axonal competition brain-derived neurotrophic factor calcium channels motor end-plate muscarinic acetylcholine receptors postnatal synapse elimination serine kinases tropomyosin-related kinase receptorB
暂未订购
Progress toward cervical cancer elimination:global disparities and China's contributions
3
作者 Partha Basu 《Cancer Biology & Medicine》 2025年第9期991-996,共6页
Introduction Progress toward the global elimination of cervical cancer as a public health concern remains slow and highly uneven across countries.High-income nations such as Australia and FinlandDboth of which have ac... Introduction Progress toward the global elimination of cervical cancer as a public health concern remains slow and highly uneven across countries.High-income nations such as Australia and FinlandDboth of which have achieved high human papillomavirus(HPV)vaccination coverage and implemented quality-assured cervical cancer screening programs-have successfully decreased the incidence rates to below 8 cases per 100,000 women~1.These countries are on track to reach the elimination threshold of fewer than 4 cases per 100,000 women within the next few years,as defined by the World Health Organization(WHO). 展开更多
关键词 HPV vaccination screening programs elimination threshold high income nations elimination global disparities AUSTRALIA cervical cancer
暂未订购
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
4
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
Resident Perceptions of Nature-Based Solutions for Flood Mitigation in Phnom Penh,Cambodia
5
作者 Sophanith So Reach Rim HyeMin Park 《Journal of Environmental & Earth Sciences》 2025年第3期240-252,共13页
Nature-based solutions(NBS)involve the sustainable maintenance,management,and restoration of natural or modified ecosystems.Flooding is a major problem in Phnom Penh,Cambodia,and has significant social and economic ra... Nature-based solutions(NBS)involve the sustainable maintenance,management,and restoration of natural or modified ecosystems.Flooding is a major problem in Phnom Penh,Cambodia,and has significant social and economic ramifications.This study tries to suggest creative solutions that support human welfare and biodiversity while simultaneously resolving social problems by adopting NBS.An online survey using convenience and snowball sampling was conducted to assess the openness of Phnom Penh residents to adopting NBS for flood mitigation in their homes or buildings.The survey investigated perceptions of NBS effectiveness based on previous knowledge and flood risk perception.Results revealed a strong correlation between perceived efficacy and willingness to adopt NBS.Specifically,flood risk perception and prior knowledge significantly influenced the perceived effectiveness of NBS.Key findings indicate that high installation and maintenance costs,lack of awareness,limited space,cultural factors,and perceived ineffectiveness are primary barriers to NBS adoption.Additionally,specific regional factors contribute to reluctance in certain areas of Phnom Penh.To overcome these barriers,the study recommends that the Cambodian government and other stakeholders invest in public education campaigns to raise awareness about the benefits of NBS.Financial incentives and subsidies should be provided to reduce the economic burden on residents.Furthermore,integrating NBS into urban planning and infrastructure development is crucial to enhance community resilience against floods. 展开更多
关键词 Nature-Based Solutions Pluvial Flood Flood mitigation
在线阅读 下载PDF
Unraveling the risk perception paradox:How benefits,self-efficacy,and social networks drive farmers'landslide mitigation efforts in Gansu,China
6
作者 WANG Jue WANG Yanping WANG Rui 《Journal of Mountain Science》 2025年第2期747-762,共16页
Public participation is crucial in mitigating disasters.Stemming from the ongoing debate on benefit-and risk-driven approaches to landslide mitigation,this study seeks to uncover the factors and underlying mechanisms ... Public participation is crucial in mitigating disasters.Stemming from the ongoing debate on benefit-and risk-driven approaches to landslide mitigation,this study seeks to uncover the factors and underlying mechanisms that affect farmers'willingness to participate in landslide prevention and mitigation(WPLPM).Conducted in Heifangtai,Gansu Province,China,renowned as the"landslide natural laboratory",this research employs multiple linear regression analysis on data from 399 questionnaires to pinpoint the key determinants of farmers'WPLPM.The findings reveal:(1)the"risk perception paradox"exists—farmers have high-risk perception but low WPLPM;(2)the impact of risk perception on WPLPM is tempered by self-efficacy related to fund,learning ability,and operation ability,offering an insight into the"risk perception paradox";and(3)There are significant positive influences of farmers'benefit perception,social network,and perceived responsibility on their WPLPM.Based on these insights,the study offers targeted policy recommendations. 展开更多
关键词 Landslide mitigation WILLINGNESS Benefit and risk perception SELF-EFFICACY
原文传递
Dual-Channel Attention Deep Bidirectional Long Short Term Memory for Enhanced Malware Detection and Risk Mitigation
7
作者 Madini O.Alassafi Syed Hamid Hasan 《Computer Modeling in Engineering & Sciences》 2025年第8期2627-2645,共19页
Over the past few years,Malware attacks have become more and more widespread,posing threats to digital assets throughout the world.Although numerous methods have been developed to detect malicious attacks,these malwar... Over the past few years,Malware attacks have become more and more widespread,posing threats to digital assets throughout the world.Although numerous methods have been developed to detect malicious attacks,these malware detection techniques need to be more efficient in detecting new and progressively sophisticated variants of malware.Therefore,the development of more advanced and accurate techniques is necessary for malware detection.This paper introduces a comprehensive Dual-Channel Attention Deep Bidirectional Long Short-Term Memory(DCADBiLSTM)model for malware detection and riskmitigation.The Dual Channel Attention(DCA)mechanism improves themodel’s capability to concentrate on the features that aremost appropriate in the input data,which reduces the false favourable rates.The Bidirectional Long,Short-Term Memory framework helps capture crucial interdependence from past and future circumstances,which is essential for enhancing the model’s understanding of malware behaviour.As soon as malware is detected,the risk mitigation phase is implemented,which evaluates the severity of each threat and helps mitigate threats earlier.The outcomes of the method demonstrate better accuracy of 98.96%,which outperforms traditional models.It indicates the method detects and mitigates several kinds of malware threats,thereby providing a proactive defence mechanism against the emerging challenges in cybersecurity. 展开更多
关键词 CYBERSECURITY risk mitigation malware detection bidirectional long short-termmemory dual-channel attention
在线阅读 下载PDF
Three-dimensional internal multiple elimination in complex structures using Marchenko autofocusing theory
8
作者 Pei-Nan Bao Ying Shi +2 位作者 Xin-Min Shang Hong-Xian Liang Wei-Hong Wang 《Petroleum Science》 2025年第1期222-233,共12页
Internal multiples are commonly present in seismic data due to variations in velocity or density of subsurface media.They can reduce the signal-to-noise ratio of seismic data and degrade the quality of the image.With ... Internal multiples are commonly present in seismic data due to variations in velocity or density of subsurface media.They can reduce the signal-to-noise ratio of seismic data and degrade the quality of the image.With the development of seismic exploration into deep and ultradeep events,especially those from complex targets in the western region of China,the internal multiple eliminations become increasingly challenging.Currently,three-dimensional(3D)seismic data are primarily used for oil and gas target recognition and drilling.Effectively eliminating internal multiples in 3D seismic data of complex structures and mitigating their adverse effects is crucial for enhancing the success rate of drilling.In this study,we propose an internal multiple prediction algorithm for 3D seismic data in complex structures using the Marchenko autofocusing theory.This method can predict the accurate internal multiples of time difference without an accurate velocity model and the implementation process mainly consists of several steps.Firstly,simulating direct waves with a 3D macroscopic velocity model.Secondly,using direct waves and 3D full seismic acquisition records to obtain the upgoing and down-going Green's functions between the virtual source point and surface.Thirdly,constructing internal multiples of the relevant layers by upgoing and downgoing Green's functions.Finally,utilizing the adaptive matching subtraction method to remove predicted internal multiples from the original data to obtain seismic records without multiples.Compared with the two-dimensional(2D)Marchenko algo-rithm,the performance of the 3D Marchenko algorithm for internal multiple prediction has been significantly enhanced,resulting in higher computational accuracy.Numerical simulation test results indicate that our proposed method can effectively eliminate internal multiples in 3D seismic data,thereby exhibiting important theoretical and industrial application value. 展开更多
关键词 Marchenko Internal multiple elimination Autofocusing Three-dimensional seismic data
原文传递
The Effectiveness of Official Development Assistance to Indonesia Climate Mitigation
9
作者 Raeni Oktavia HyeMin Park 《Journal of Environmental & Earth Sciences》 2025年第3期151-165,共15页
This research investigates the effectiveness of climate-related development aid in Indonesia’s climate mitigation.Specific objectives include assessing the contribution of official development assistance(ODA)to reduc... This research investigates the effectiveness of climate-related development aid in Indonesia’s climate mitigation.Specific objectives include assessing the contribution of official development assistance(ODA)to reducing CO_(2) emissions and evaluating the implementation of the Busan Principles of aid effectiveness to achieve Indonesia’s mitigation priorities and targets.We utilize a new primary dataset based on interviews with the most knowledgeable stakeholders of ODA on climate change mitigation.Additionally,we use secondary data from the annual Rio Marker and the Common Reporting Standard data of the Organization for Economic Co-operation and Development.The results show a significant correlation between climate-related development aid and CO_(2) emission reduction in Indonesia.Additionally,the implementation of the Busan Principles enhances aid management by fostering project ownership and increasing the involvement of civil society and private sector.The study has implications for devising an effective climate change mitigation strategy for Indonesia.It is suggested that the government of Indonesia exercise greater flexibility and dynamism in engaging with development partners. 展开更多
关键词 Climate mitigation Official Development Assistance Aid Effectiveness Busan Principles Indonesia
在线阅读 下载PDF
Risk Mitigation Effectiveness of Foreign Well-Known Trademark Protection During Supply Chain Fluctuations
10
作者 LI Yinge 《Chinese Business Review》 2025年第1期9-20,共12页
The global supply chain turbulence has increased the difficulty of protecting foreign well-known trademarks.Although there are many studies on cross-border trademark rights protection in academia,there is relatively l... The global supply chain turbulence has increased the difficulty of protecting foreign well-known trademarks.Although there are many studies on cross-border trademark rights protection in academia,there is relatively little research on its risk mitigation effectiveness in the context of supply chain fluctuations.Based on case studies of commercial law and data statistics,the study explores the relationship between protection efficiency and market response through legal applicability.Due to the long litigation cycle and uneven law enforcement,there are differences in market regulation,weakening the protection of well-known trademarks and exacerbating supply chain uncertainty.Strengthening international legal framework cooperation and promoting law enforcement linkage can enhance protection effectiveness.In theory,enriching the theory of cross-border trademark protection and expanding research on brand rights protection in the context of global supply chains.In practice,it helps enterprises adjust their trademark layout,avoid legal risks,and improve market competitiveness.Due to the complexity of the legal environment and limitations in data acquisition,future research will strengthen data analysis,promote international cooperation in intelligent supervision,and build a more efficient cross-border well-known trademark protection mechanism. 展开更多
关键词 supply chain resilience famous trademark risk mitigation economic fluctuations intellectual property
在线阅读 下载PDF
Long-term monitoring of active large-scale landslides for non-structural risk mitigation-integrated sensors and web-based platform
11
作者 CATELAN Filippo Tommaso BOSSI Giulia +8 位作者 SCHENATO Luca TONDO Melissa CRITELLI Vincenzo MULAS Marco CICCARESE Giuseppe CORSINI Alessandro TONIDANDEL David MAIR Volkmar MARCATO Gianluca 《Journal of Mountain Science》 2025年第1期1-15,共15页
Large-scale deep-seated landslides pose a significant threat to human life and infrastructure.Therefore,closely monitoring these landslides is crucial for assessing and mitigating their associated risks.In this paper,... Large-scale deep-seated landslides pose a significant threat to human life and infrastructure.Therefore,closely monitoring these landslides is crucial for assessing and mitigating their associated risks.In this paper,the authors introduce the So Lo Mon framework,a comprehensive monitoring system developed for three large-scale landslides in the Autonomous Province of Bolzano,Italy.A web-based platform integrates various monitoring data(GNSS,topographic data,in-place inclinometer),providing a user-friendly interface for visualizing and analyzing the collected data.This facilitates the identification of trends and patterns in landslide behaviour,enabling the triggering of warnings and the implementation of appropriate mitigation measures.The So Lo Mon platform has proven to be an invaluable tool for managing the risks associated with large-scale landslides through non-structural measures and driving countermeasure works design.It serves as a centralized data repository,offering visualization and analysis tools.This information empowers decisionmakers to make informed choices regarding risk mitigation,ultimately ensuring the safety of communities and infrastructures. 展开更多
关键词 Web-based platform South Tyrol landslides Long term monitoring Risk mitigation
原文传递
Carbon Footprint Drivers in China’s Municipal Wastewater Treatment Plants and Mitigation Opportunities through Electricity and Chemical Efficiency
12
作者 Shen Qu Yuchen Hu +5 位作者 Renke Wei Ke Yu Zhouyi Liu Qi Zhou Chenchen Wang Lujing Zhang 《Engineering》 2025年第7期106-116,共11页
Reducing greenhouse gas(GHG)emissions to address climate change is a global consensus,and municipal wastewater treatment plants(MWWTPs)should lead the way in low-carbon sustainable development.However,achieving efflue... Reducing greenhouse gas(GHG)emissions to address climate change is a global consensus,and municipal wastewater treatment plants(MWWTPs)should lead the way in low-carbon sustainable development.However,achieving effluent discharge standards often requires considerable energy and chemical consumption during operation,resulting in significant carbon footprints.In this study,GHG emissions are systematically accounted for,and the driving factors of carbon footprint growth in China’s MWWTPs are explored.In 2020,a total of 41.9 million tonnes(Mt)of carbon dioxide equivalent(CO_(2)-eq)were released by the sector,with nearly two-thirds being indirect emissions resulting from energy and material usage.The intensity of electricity,carbon source,and phosphorus removing agent consumption increasingly influence carbon footprint growth over time.Through statistical inference,benchmarks for electricity and chemical consumption intensity are established across all MWWTPs under various operational conditions,and the potential for mitigation through more efficient energy and material utilization is calculated.The results suggest that many MWWTPs offer significant opportunities for emission reduction.Consequently,empirical decarbonization measures,including intelligent device control,optimization of aeration equipment,energy recovery initiatives,and other enhancements to improve operational and carbon efficiency,are recommended. 展开更多
关键词 Municipal wastewater treatment plants Carbon footprint Driving Factors mitigation opportunities
在线阅读 下载PDF
Disruption prediction and mitigation strategies in the EHL-2 spherical torus
13
作者 Jianqing CAI Yunfeng LIANG +6 位作者 Zhongyong CHEN Wei ZHENG Di HU Lei XUE Zhifang LIN Xiang GU the EHL-2 Team 《Plasma Science and Technology》 2025年第2期143-152,共10页
EHL-2 is a compact,high-field spherical tokamak designed to explore the potential of an advanced p-11B nuclear fusion reactor.Due to its high plasma current and thermal energy,it is crucial to mitigate the impact asso... EHL-2 is a compact,high-field spherical tokamak designed to explore the potential of an advanced p-11B nuclear fusion reactor.Due to its high plasma current and thermal energy,it is crucial to mitigate the impact associated with disruptions to ensure the safe operation of EHL-2.This paper evaluates the performance requirements of the disruption prediction system on EHL-2,with a particular focus on applying generalizable knowledge transfer from existing devices to future ones.Furthermore,the key characteristics of disruption mitigation strategies are analyzed,and their overall mitigation performance on EHL-2 is assessed.This insight provides valuable guidance for optimizing the engineering design of EHL-2 and identifying its optimal operational regime. 展开更多
关键词 spherical tokamak EHL-2 disruption mitigation disruption prediction neural network
在线阅读 下载PDF
Modeling cervical cancer elimination:a pathway to inform policy decisions
14
作者 Panliang Zhong Li Zhang Fanghui Zhao 《Cancer Biology & Medicine》 2025年第9期1002-1009,共8页
In May 2018,the Director-General of the World Health Organization(WHO)called for global action to eliminate cervical cancer~1.This call marked the beginning of an ambitious international effort to scale up 3 key strat... In May 2018,the Director-General of the World Health Organization(WHO)called for global action to eliminate cervical cancer~1.This call marked the beginning of an ambitious international effort to scale up 3 key strategies:human papillomavirus(HPV)vaccination,cervical cancer screening,and treatment of precancerous lesions and cancer.Subsequently,the WHO and its partners developed a global strategy to accelerate the reduction of cervical cancer incidence,with an ultimate goal of achieving elimination within the next century.This Global Strategy represents a formal international commitment and is anchored in the 90-70-90 targets to be achieved by 2030.In parallel,several countries have also set national commitments,such as Sweden's pledge to achieve elimination by 2027 and Australia's target of achieving elimination by 2035. 展开更多
关键词 TARGETS TREATMENT policy decisions precancerous lesions cervical cancer screening global strategy cervical cancer elimination
暂未订购
Quantifying and categorizing development paths of poverty-elimination counties in China:Based on the perspective of population-land-industry
15
作者 Qianxi Zhang Zhi Cao +1 位作者 Sixin Su Xuanchang Zhang 《Geography and Sustainability》 2025年第2期44-56,共13页
China has achieved the poverty reduction goal of the United Nations 2030 Agenda for Sustainable Development 10 years ahead of schedule,contributing significantly to global poverty reduction.Despite extended efforts in... China has achieved the poverty reduction goal of the United Nations 2030 Agenda for Sustainable Development 10 years ahead of schedule,contributing significantly to global poverty reduction.Despite extended efforts in poverty elimination,there is a lack of quantitative studies categorizing and comparing poverty-elimination counties(PECs)based on their processes.This study proposes an innovative framework for analyzing PECs’development paths from the perspective of population-land-industry(PLI).We quantify the PLI matching degree of PECs in China during the critical phase of the battle against poverty through a multivariate matching model,classify PECs via K-means clustering according to the consistency in PLI matching degree evolution,and summarize the typical development patterns of PECs.Results indicate that the PLI matching degree of PECs in China increased substantially from 2015 to 2020,particularly in eastern areas,while the western region,including the Qinghai-Xizang Plateau and southwestern Xinjiang,shows untapped potential for improvement.Five types of PECs are identified,with the majority(30.1%)showing sustained moderate PLI matching and a minority(9.6%)experiencing long-term PLI mismatch.Industry is the shortfall of various PECs,and effective strategies to facilitate all types of PECs include the development of emerging businesses and the expansion of secondary and tertiary industries.Additionally,enriching rural labor force and increasing farmland use efficiency are essential for optimal PLI matching and positive interaction,ultimately ensuring poverty elimination and sustainable development. 展开更多
关键词 Poverty elimination Multivariate matching model Spatial pattern Sustainable development patterns Sustainable Development Goals
在线阅读 下载PDF
A Hybrid Machine Learning and Blockchain Framework for IoT DDoS Mitigation
16
作者 Singamaneni Krishnapriya Sukhvinder Singh 《Computer Modeling in Engineering & Sciences》 2025年第8期1849-1881,共33页
The explosive expansion of the Internet of Things(IoT)systems has increased the imperative to have strong and robust solutions to cyber Security,especially to curtail Distributed Denial of Service(DDoS)attacks,which c... The explosive expansion of the Internet of Things(IoT)systems has increased the imperative to have strong and robust solutions to cyber Security,especially to curtail Distributed Denial of Service(DDoS)attacks,which can cripple critical infrastructure.The proposed framework presented in the current paper is a new hybrid scheme that induces deep learning-based traffic classification and blockchain-enabledmitigation tomake intelligent,decentralized,and real-time DDoS countermeasures in an IoT network.The proposed model fuses the extracted deep features with statistical features and trains them by using traditional machine-learning algorithms,which makes them more accurate in detection than statistical features alone,based on the Convolutional Neural Network(CNN)architecture,which can extract deep features.A permissioned blockchain will be included to record the threat cases immutably and automatically execute mitigation measures through smart contracts to provide transparency and resilience.When tested on two test sets,BoT-IoT and IoT-23,the framework obtains a maximum F1-score at 97.5 percent and only a 1.8 percent false positive rate,which compares favorably to other solutions regarding effectiveness and the amount of time required to respond.Our findings support the feasibility of our method as an extensible and secure paradigm of nextgeneration IoT security,which has constrictive utility in mission-critical or resource-constrained settings.The work is a substantial milestone in autonomous and trustful mitigation against DDoS attacks through intelligent learning and decentralized enforcement. 展开更多
关键词 IoT security DDoS mitigation machine learning CNN random forest blockchain smart contracts cyberattack detection
在线阅读 下载PDF
Research on the Framework of Bias Detection and Elimination in Artificial Intelligence Algorithms
17
作者 Haoxuan Lyu 《Sino-US English Teaching》 2025年第5期183-187,共5页
The excessive use of artificial intelligence(AI)algorithms has caused the problem of errors in AI algorithms,which has challenged the fairness of decision-making,and has intensified people’s inequality.Therefore,it i... The excessive use of artificial intelligence(AI)algorithms has caused the problem of errors in AI algorithms,which has challenged the fairness of decision-making,and has intensified people’s inequality.Therefore,it is necessary to conduct in-depth research and propose corresponding error detection and error elimination methods.This paper first proposes the root causes and threats of bias in AI algorithms,then summarizes the existing bias detection and error elimination methods,and proposes a bias processing framework in three-level dimensions of data,models,and conclusions,aiming to provide a framework for a comprehensive solution to errors in algorithms.At the same time,it also summarizes the problems and challenges in existing research and makes a prospect for future research trends.It is hoped that it will be helpful for us to build fairer AI. 展开更多
关键词 artificial intelligence(AI) algorithm bias bias detection bias elimination FAIRNESS framework research
在线阅读 下载PDF
Robust spoofing detection and mitigation in GNSS using iterative refinement and adaptive filtering
18
作者 Xiaoqin JIN Xiaoyu ZHANG +2 位作者 Shihui XU Shoupeng LI Shuaiyong ZHENG 《Chinese Journal of Aeronautics》 2025年第8期52-64,共13页
Global Navigation Satellite Systems(GNSSs)face significant security threats from spoofing attacks.Typical anti-spoofing methods rely on estimating the delays between spoofing and authentic signals using multicorrelato... Global Navigation Satellite Systems(GNSSs)face significant security threats from spoofing attacks.Typical anti-spoofing methods rely on estimating the delays between spoofing and authentic signals using multicorrelator outputs.However,the accuracy of the delay estimation is limited by the spacing of the correlators.To address this,an innovative anti-spoofing method is introduced,which incorporates distinct coarse and refined stages for more accurate spoofing estimation.By leveraging the coarse delay estimates obtained through maximum likelihood estimation,the proposed method establishes the Windowed Sum of the Relative Delay(WSRD)statistics to detect the presence of spoofing signals.The iterative strategy is then employed to enhance the precision of the delay estimation.To further adapt to variations in the observation noise caused by spoofing intrusions and restore precise position,velocity,and timing solutions,an adaptive extended Kalman filter is proposed.This comprehensive framework offers detection,mitigation,and recovery against spoofing attacks.Experimental validation using datasets from the Texas Spoofing Test Battery(TEXBAT)demonstrates the effectiveness of the proposed anti-spoofing method.With 41 correlators,the method achieves a detection rate exceeding 90%at a false alarm rate of 10-5,with position or time errors below 15 m.Notably,this refined anti-spoofing approach shows robust detection and mitigation capabilities,requiring only a single antenna without the need for additional external sensors.These advancements can significantly contribute to the development of GNSS anti-spoofing measures. 展开更多
关键词 Global Navigation Satellite System(GNSS) Spoofing detection Spoofing mitigation Multicorrelator Adaptive filters
原文传递
Internal-multiple-elimination with application to migration using two-way wave equation depth-extrapolation scheme
19
作者 Jia-Chun You Gu-Lan Zhang +2 位作者 Xing-Guo Huang Xiang-Wen Li Jun-Xing Cao 《Petroleum Science》 2025年第1期178-192,共15页
Internal multiple interference,affecting both seismic data processing and interpretation,has been observed for long time.Although great progress has been achieved in developing a variety of internal-multiple-eliminati... Internal multiple interference,affecting both seismic data processing and interpretation,has been observed for long time.Although great progress has been achieved in developing a variety of internal-multiple-elimination(IME)methods,how to increase accuracy and reduce cost of IME still poses a significant challenge.A new method is proposed to effectively and efficiently eliminate internal multi-ples,along with its application in internal-multiple-eliminated-migration(IMEM),addressing this issue.This method stems from two-way wave equation depth-extrapolation scheme and associated up/down wavefield separation,which can accomplish depth-extrapolation of both up-going and down-going wavefields simultaneously,and complete internal-multiple-elimination processing,adaptively and effi-ciently.The proposed method has several features:(1)input data is same as that for conventional migration:source signature(used for migration only),macro velocity model,and receiver data,without additional requirements for source/receiver sampling;(2)method is efficient,without need of iterative calculations(which are typically needed for most of IME algorithms);and(3)method is cost effective:IME is completed in the same depth-extrapolation scheme of IMEM,without need of a separate pro-cessing and additional cost.Several synthesized data models are used to test the proposed method:one-dimensional model,horizontal layered model,multi-layer model with one curved layer,and SEG/EAGE Salt model.Additionally,we perform a sensitivity analysis of velocity using smoothed models.This analysis reveals that although the accuracy of velocity measurements impacts our proposed method,it significantly reduces internal multiple false imaging compared to traditional RTM techniques.When applied to actual seismic data from a carbonate reservoir zone,our method demonstrates superior clarity in imaging results,even in the presence of high-velocity carbonate formations,outperforming conven-tional migration methods in deep strata. 展开更多
关键词 Internal multiple elimination Two-way wave equation depth-extrapolation scheme Up/down wavefield separation MIGRATION
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部