期刊文献+
共找到6,236篇文章
< 1 2 250 >
每页显示 20 50 100
Mitigation strategies for blasting-induced cracks and vibrations in twin-arch tunnel structures 被引量:2
1
作者 Xianshun Zhou Jin Chen +4 位作者 Xuemin Zhang Kai Zhu Yanyong Zhang Jianbo Fei Muhammad Irslan Khalid 《Defence Technology(防务技术)》 2025年第7期242-259,共18页
Due to space constraints in mountainous areas,twin tunnels are sometimes constructed very close to each other or even overlap.This proximity challenges the structural stability of tunnels built with the drill-and-blas... Due to space constraints in mountainous areas,twin tunnels are sometimes constructed very close to each other or even overlap.This proximity challenges the structural stability of tunnels built with the drill-and-blast method,as the short propagation distance amplifies blasting vibrations.A case of blasting damage is reported in this paper,where concrete cracks crossed construction joints in the twin-arch lining.To identify the causes of these cracks and develop effective vibration mitigation measures,field monitoring and numerical analysis were conducted.Specifically,a restart method was used to simulate the second peak particle velocity(PPV)of MS3 delays occurring 50 ms after the MS1 delays.The study found that the dynamic tensile stress in the tunnel induced by the blast wave has a linear relationship with the of the product of the concrete wave impedance and the PPV.A blast vibration velocity exceeding 23.3 cm/s resulted in tensile stress in the lining surpassing the ultimate tensile strength of C30 concrete,leading to tensile cracking on the blast-facing arch of the constructed tunnel.To control excessive vi-bration velocity,a mitigation trench was implemented to reduce blast wave impact.The trench,approximately 15 m in length,50 cm in width,and 450 cm in height,effectively lowered vibration ve-locities,achieving an average reduction rate of 52%according to numerical analysis.A key innovation of this study is the on-site implementation and validation of the trench's effectiveness in mitigating vi-brations.A feasible trench construction configuration was proposed to overcome the limitations of a single trench in fully controlling vibrations.To further enhance protection,zoned blasting and an auxiliary rock pillar,80 cm in width,were incorporated to reinforce the mid-wall.This study introduces novel strategies for vibration protection in tunnel blasting,offering innovative solutions to address blasting-induced vibrations and effectively minimize their impact,thereby enhancing safety and struc-tural stability. 展开更多
关键词 Twin-arch tunnel Drill-and-blast Blasting vibration mitigation LS-DYNA Restart method
在线阅读 下载PDF
A Hybrid Machine Learning and Blockchain Framework for IoT DDoS Mitigation
2
作者 Singamaneni Krishnapriya Sukhvinder Singh 《Computer Modeling in Engineering & Sciences》 2025年第8期1849-1881,共33页
The explosive expansion of the Internet of Things(IoT)systems has increased the imperative to have strong and robust solutions to cyber Security,especially to curtail Distributed Denial of Service(DDoS)attacks,which c... The explosive expansion of the Internet of Things(IoT)systems has increased the imperative to have strong and robust solutions to cyber Security,especially to curtail Distributed Denial of Service(DDoS)attacks,which can cripple critical infrastructure.The proposed framework presented in the current paper is a new hybrid scheme that induces deep learning-based traffic classification and blockchain-enabledmitigation tomake intelligent,decentralized,and real-time DDoS countermeasures in an IoT network.The proposed model fuses the extracted deep features with statistical features and trains them by using traditional machine-learning algorithms,which makes them more accurate in detection than statistical features alone,based on the Convolutional Neural Network(CNN)architecture,which can extract deep features.A permissioned blockchain will be included to record the threat cases immutably and automatically execute mitigation measures through smart contracts to provide transparency and resilience.When tested on two test sets,BoT-IoT and IoT-23,the framework obtains a maximum F1-score at 97.5 percent and only a 1.8 percent false positive rate,which compares favorably to other solutions regarding effectiveness and the amount of time required to respond.Our findings support the feasibility of our method as an extensible and secure paradigm of nextgeneration IoT security,which has constrictive utility in mission-critical or resource-constrained settings.The work is a substantial milestone in autonomous and trustful mitigation against DDoS attacks through intelligent learning and decentralized enforcement. 展开更多
关键词 IoT security DDoS mitigation machine learning CNN random forest blockchain smart contracts cyberattack detection
在线阅读 下载PDF
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
3
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
Quantum error mitigation based on the Z-mixed-expression of the amplitude damping channel
4
作者 Ting Li Hangming Zhang +1 位作者 Lingling Zheng Fei Li 《Chinese Physics B》 2025年第12期325-332,共8页
In the field of quantum error mitigation,most current research separately addresses quantum gate noise mitigation and measurement noise mitigation.However,due to the typically high complexity of measurement noise miti... In the field of quantum error mitigation,most current research separately addresses quantum gate noise mitigation and measurement noise mitigation.However,due to the typically high complexity of measurement noise mitigation methods,such as those based on estimating response matrices,the overall complexity of noise mitigation schemes increases when combining measurement noise mitigation with other quantum gate noise mitigation approaches.This paper proposes a low-complexity quantum error mitigation scheme that jointly mitigates quantum gate and measurement noise,specifically when measurement noise manifests as an amplitude damping channel.The proposed scheme requires estimating only three parameters to jointly mitigate both types of noise,whereas the zero-noise extrapolation method enhanced by response matrix estimation requires estimating at least six parameters under the same conditions. 展开更多
关键词 quantum error mitigation measurement error mitigation amplitude damping channel low-complexity
原文传递
Dual-Channel Attention Deep Bidirectional Long Short Term Memory for Enhanced Malware Detection and Risk Mitigation
5
作者 Madini O.Alassafi Syed Hamid Hasan 《Computer Modeling in Engineering & Sciences》 2025年第8期2627-2645,共19页
Over the past few years,Malware attacks have become more and more widespread,posing threats to digital assets throughout the world.Although numerous methods have been developed to detect malicious attacks,these malwar... Over the past few years,Malware attacks have become more and more widespread,posing threats to digital assets throughout the world.Although numerous methods have been developed to detect malicious attacks,these malware detection techniques need to be more efficient in detecting new and progressively sophisticated variants of malware.Therefore,the development of more advanced and accurate techniques is necessary for malware detection.This paper introduces a comprehensive Dual-Channel Attention Deep Bidirectional Long Short-Term Memory(DCADBiLSTM)model for malware detection and riskmitigation.The Dual Channel Attention(DCA)mechanism improves themodel’s capability to concentrate on the features that aremost appropriate in the input data,which reduces the false favourable rates.The Bidirectional Long,Short-Term Memory framework helps capture crucial interdependence from past and future circumstances,which is essential for enhancing the model’s understanding of malware behaviour.As soon as malware is detected,the risk mitigation phase is implemented,which evaluates the severity of each threat and helps mitigate threats earlier.The outcomes of the method demonstrate better accuracy of 98.96%,which outperforms traditional models.It indicates the method detects and mitigates several kinds of malware threats,thereby providing a proactive defence mechanism against the emerging challenges in cybersecurity. 展开更多
关键词 CYBERSECURITY risk mitigation malware detection bidirectional long short-termmemory dual-channel attention
在线阅读 下载PDF
Risk Mitigation Effectiveness of Foreign Well-Known Trademark Protection During Supply Chain Fluctuations
6
作者 LI Yinge 《Chinese Business Review》 2025年第1期9-20,共12页
The global supply chain turbulence has increased the difficulty of protecting foreign well-known trademarks.Although there are many studies on cross-border trademark rights protection in academia,there is relatively l... The global supply chain turbulence has increased the difficulty of protecting foreign well-known trademarks.Although there are many studies on cross-border trademark rights protection in academia,there is relatively little research on its risk mitigation effectiveness in the context of supply chain fluctuations.Based on case studies of commercial law and data statistics,the study explores the relationship between protection efficiency and market response through legal applicability.Due to the long litigation cycle and uneven law enforcement,there are differences in market regulation,weakening the protection of well-known trademarks and exacerbating supply chain uncertainty.Strengthening international legal framework cooperation and promoting law enforcement linkage can enhance protection effectiveness.In theory,enriching the theory of cross-border trademark protection and expanding research on brand rights protection in the context of global supply chains.In practice,it helps enterprises adjust their trademark layout,avoid legal risks,and improve market competitiveness.Due to the complexity of the legal environment and limitations in data acquisition,future research will strengthen data analysis,promote international cooperation in intelligent supervision,and build a more efficient cross-border well-known trademark protection mechanism. 展开更多
关键词 supply chain resilience famous trademark risk mitigation economic fluctuations intellectual property
在线阅读 下载PDF
The Effectiveness of Official Development Assistance to Indonesia Climate Mitigation
7
作者 Raeni Oktavia HyeMin Park 《Journal of Environmental & Earth Sciences》 2025年第3期151-165,共15页
This research investigates the effectiveness of climate-related development aid in Indonesia’s climate mitigation.Specific objectives include assessing the contribution of official development assistance(ODA)to reduc... This research investigates the effectiveness of climate-related development aid in Indonesia’s climate mitigation.Specific objectives include assessing the contribution of official development assistance(ODA)to reducing CO_(2) emissions and evaluating the implementation of the Busan Principles of aid effectiveness to achieve Indonesia’s mitigation priorities and targets.We utilize a new primary dataset based on interviews with the most knowledgeable stakeholders of ODA on climate change mitigation.Additionally,we use secondary data from the annual Rio Marker and the Common Reporting Standard data of the Organization for Economic Co-operation and Development.The results show a significant correlation between climate-related development aid and CO_(2) emission reduction in Indonesia.Additionally,the implementation of the Busan Principles enhances aid management by fostering project ownership and increasing the involvement of civil society and private sector.The study has implications for devising an effective climate change mitigation strategy for Indonesia.It is suggested that the government of Indonesia exercise greater flexibility and dynamism in engaging with development partners. 展开更多
关键词 Climate mitigation Official Development Assistance Aid Effectiveness Busan Principles Indonesia
在线阅读 下载PDF
Enhancing rectal cancer liver metastasis prediction:Magnetic resonance imaging-based radiomics,bias mitigation,and regulatory considerations
8
作者 Yuwei Zhang 《World Journal of Gastrointestinal Oncology》 2025年第2期318-321,共4页
In this article,we comment on the article by Long et al published in the recent issue of the World Journal of Gastrointestinal Oncology.Rectal cancer patients are at risk for developing metachronous liver metastasis(M... In this article,we comment on the article by Long et al published in the recent issue of the World Journal of Gastrointestinal Oncology.Rectal cancer patients are at risk for developing metachronous liver metastasis(MLM),yet early prediction remains challenging due to variations in tumor heterogeneity and the limitations of traditional diagnostic methods.Therefore,there is an urgent need for noninvasive techniques to improve patient outcomes.Long et al’s study introduces an innovative magnetic resonance imaging(MRI)-based radiomics model that integrates high-throughput imaging data with clinical variables to predict MLM.The study employed a 7:3 split to generate training and validation datasets.The MLM prediction model was constructed using the training set and subsequently validated on the validation set using area under the curve(AUC)and dollar-cost averaging metrics to assess performance,robustness,and generalizability.By employing advanced algorithms,the model provides a non-invasive solution to assess tumor heterogeneity for better metastasis prediction,enabling early intervention and personalized treatment planning.However,variations in MRI parameters,such as differences in scanning resolutions and protocols across facilities,patient heterogeneity(e.g.,age,comorbidities),and external factors like carcinoembryonic antigen levels introduce biases.Additionally,confounding factors such as diagnostic staging methods and patient comorbidities require further validation and adjustment to ensure accuracy and generalizability.With evolving Food and Drug Administration regulations on machine learning models in healthcare,compliance and careful consideration of these regulatory requirements are essential to ensuring safe and effective implementation of this approach in clinical practice.In the future,clinicians may be able to utilize datadriven,patient-centric artificial intelligence(AI)-enhanced imaging tools integrated with clinical data,which would help improve early detection of MLM and optimize personalized treatment strategies.Combining radiomics,genomics,histological data,and demographic information can significantly enhance the accuracy and precision of predictive models. 展开更多
关键词 Metachronous liver metastasis Radiomics Machine learning Rectal cancer Magnetic resonance imaging variability Bias mitigation Food and Drug Administration regulations Predictive modeling
暂未订购
Disruption prediction and mitigation strategies in the EHL-2 spherical torus
9
作者 Jianqing CAI Yunfeng LIANG +6 位作者 Zhongyong CHEN Wei ZHENG Di HU Lei XUE Zhifang LIN Xiang GU the EHL-2 Team 《Plasma Science and Technology》 2025年第2期143-152,共10页
EHL-2 is a compact,high-field spherical tokamak designed to explore the potential of an advanced p-11B nuclear fusion reactor.Due to its high plasma current and thermal energy,it is crucial to mitigate the impact asso... EHL-2 is a compact,high-field spherical tokamak designed to explore the potential of an advanced p-11B nuclear fusion reactor.Due to its high plasma current and thermal energy,it is crucial to mitigate the impact associated with disruptions to ensure the safe operation of EHL-2.This paper evaluates the performance requirements of the disruption prediction system on EHL-2,with a particular focus on applying generalizable knowledge transfer from existing devices to future ones.Furthermore,the key characteristics of disruption mitigation strategies are analyzed,and their overall mitigation performance on EHL-2 is assessed.This insight provides valuable guidance for optimizing the engineering design of EHL-2 and identifying its optimal operational regime. 展开更多
关键词 spherical tokamak EHL-2 disruption mitigation disruption prediction neural network
在线阅读 下载PDF
Robust spoofing detection and mitigation in GNSS using iterative refinement and adaptive filtering
10
作者 Xiaoqin JIN Xiaoyu ZHANG +2 位作者 Shihui XU Shoupeng LI Shuaiyong ZHENG 《Chinese Journal of Aeronautics》 2025年第8期52-64,共13页
Global Navigation Satellite Systems(GNSSs)face significant security threats from spoofing attacks.Typical anti-spoofing methods rely on estimating the delays between spoofing and authentic signals using multicorrelato... Global Navigation Satellite Systems(GNSSs)face significant security threats from spoofing attacks.Typical anti-spoofing methods rely on estimating the delays between spoofing and authentic signals using multicorrelator outputs.However,the accuracy of the delay estimation is limited by the spacing of the correlators.To address this,an innovative anti-spoofing method is introduced,which incorporates distinct coarse and refined stages for more accurate spoofing estimation.By leveraging the coarse delay estimates obtained through maximum likelihood estimation,the proposed method establishes the Windowed Sum of the Relative Delay(WSRD)statistics to detect the presence of spoofing signals.The iterative strategy is then employed to enhance the precision of the delay estimation.To further adapt to variations in the observation noise caused by spoofing intrusions and restore precise position,velocity,and timing solutions,an adaptive extended Kalman filter is proposed.This comprehensive framework offers detection,mitigation,and recovery against spoofing attacks.Experimental validation using datasets from the Texas Spoofing Test Battery(TEXBAT)demonstrates the effectiveness of the proposed anti-spoofing method.With 41 correlators,the method achieves a detection rate exceeding 90%at a false alarm rate of 10-5,with position or time errors below 15 m.Notably,this refined anti-spoofing approach shows robust detection and mitigation capabilities,requiring only a single antenna without the need for additional external sensors.These advancements can significantly contribute to the development of GNSS anti-spoofing measures. 展开更多
关键词 Global Navigation Satellite System(GNSS) Spoofing detection Spoofing mitigation Multicorrelator Adaptive filters
原文传递
Unraveling the risk perception paradox:How benefits,self-efficacy,and social networks drive farmers'landslide mitigation efforts in Gansu,China
11
作者 WANG Jue WANG Yanping WANG Rui 《Journal of Mountain Science》 2025年第2期747-762,共16页
Public participation is crucial in mitigating disasters.Stemming from the ongoing debate on benefit-and risk-driven approaches to landslide mitigation,this study seeks to uncover the factors and underlying mechanisms ... Public participation is crucial in mitigating disasters.Stemming from the ongoing debate on benefit-and risk-driven approaches to landslide mitigation,this study seeks to uncover the factors and underlying mechanisms that affect farmers'willingness to participate in landslide prevention and mitigation(WPLPM).Conducted in Heifangtai,Gansu Province,China,renowned as the"landslide natural laboratory",this research employs multiple linear regression analysis on data from 399 questionnaires to pinpoint the key determinants of farmers'WPLPM.The findings reveal:(1)the"risk perception paradox"exists—farmers have high-risk perception but low WPLPM;(2)the impact of risk perception on WPLPM is tempered by self-efficacy related to fund,learning ability,and operation ability,offering an insight into the"risk perception paradox";and(3)There are significant positive influences of farmers'benefit perception,social network,and perceived responsibility on their WPLPM.Based on these insights,the study offers targeted policy recommendations. 展开更多
关键词 Landslide mitigation WILLINGNESS Benefit and risk perception SELF-EFFICACY
原文传递
Long-term monitoring of active large-scale landslides for non-structural risk mitigation-integrated sensors and web-based platform
12
作者 CATELAN Filippo Tommaso BOSSI Giulia +8 位作者 SCHENATO Luca TONDO Melissa CRITELLI Vincenzo MULAS Marco CICCARESE Giuseppe CORSINI Alessandro TONIDANDEL David MAIR Volkmar MARCATO Gianluca 《Journal of Mountain Science》 2025年第1期1-15,共15页
Large-scale deep-seated landslides pose a significant threat to human life and infrastructure.Therefore,closely monitoring these landslides is crucial for assessing and mitigating their associated risks.In this paper,... Large-scale deep-seated landslides pose a significant threat to human life and infrastructure.Therefore,closely monitoring these landslides is crucial for assessing and mitigating their associated risks.In this paper,the authors introduce the So Lo Mon framework,a comprehensive monitoring system developed for three large-scale landslides in the Autonomous Province of Bolzano,Italy.A web-based platform integrates various monitoring data(GNSS,topographic data,in-place inclinometer),providing a user-friendly interface for visualizing and analyzing the collected data.This facilitates the identification of trends and patterns in landslide behaviour,enabling the triggering of warnings and the implementation of appropriate mitigation measures.The So Lo Mon platform has proven to be an invaluable tool for managing the risks associated with large-scale landslides through non-structural measures and driving countermeasure works design.It serves as a centralized data repository,offering visualization and analysis tools.This information empowers decisionmakers to make informed choices regarding risk mitigation,ultimately ensuring the safety of communities and infrastructures. 展开更多
关键词 Web-based platform South Tyrol landslides Long term monitoring Risk mitigation
原文传递
Carbon Footprint Drivers in China’s Municipal Wastewater Treatment Plants and Mitigation Opportunities through Electricity and Chemical Efficiency
13
作者 Shen Qu Yuchen Hu +5 位作者 Renke Wei Ke Yu Zhouyi Liu Qi Zhou Chenchen Wang Lujing Zhang 《Engineering》 2025年第7期106-116,共11页
Reducing greenhouse gas(GHG)emissions to address climate change is a global consensus,and municipal wastewater treatment plants(MWWTPs)should lead the way in low-carbon sustainable development.However,achieving efflue... Reducing greenhouse gas(GHG)emissions to address climate change is a global consensus,and municipal wastewater treatment plants(MWWTPs)should lead the way in low-carbon sustainable development.However,achieving effluent discharge standards often requires considerable energy and chemical consumption during operation,resulting in significant carbon footprints.In this study,GHG emissions are systematically accounted for,and the driving factors of carbon footprint growth in China’s MWWTPs are explored.In 2020,a total of 41.9 million tonnes(Mt)of carbon dioxide equivalent(CO_(2)-eq)were released by the sector,with nearly two-thirds being indirect emissions resulting from energy and material usage.The intensity of electricity,carbon source,and phosphorus removing agent consumption increasingly influence carbon footprint growth over time.Through statistical inference,benchmarks for electricity and chemical consumption intensity are established across all MWWTPs under various operational conditions,and the potential for mitigation through more efficient energy and material utilization is calculated.The results suggest that many MWWTPs offer significant opportunities for emission reduction.Consequently,empirical decarbonization measures,including intelligent device control,optimization of aeration equipment,energy recovery initiatives,and other enhancements to improve operational and carbon efficiency,are recommended. 展开更多
关键词 Municipal wastewater treatment plants Carbon footprint Driving Factors mitigation opportunities
在线阅读 下载PDF
Resident Perceptions of Nature-Based Solutions for Flood Mitigation in Phnom Penh,Cambodia
14
作者 Sophanith So Reach Rim HyeMin Park 《Journal of Environmental & Earth Sciences》 2025年第3期240-252,共13页
Nature-based solutions(NBS)involve the sustainable maintenance,management,and restoration of natural or modified ecosystems.Flooding is a major problem in Phnom Penh,Cambodia,and has significant social and economic ra... Nature-based solutions(NBS)involve the sustainable maintenance,management,and restoration of natural or modified ecosystems.Flooding is a major problem in Phnom Penh,Cambodia,and has significant social and economic ramifications.This study tries to suggest creative solutions that support human welfare and biodiversity while simultaneously resolving social problems by adopting NBS.An online survey using convenience and snowball sampling was conducted to assess the openness of Phnom Penh residents to adopting NBS for flood mitigation in their homes or buildings.The survey investigated perceptions of NBS effectiveness based on previous knowledge and flood risk perception.Results revealed a strong correlation between perceived efficacy and willingness to adopt NBS.Specifically,flood risk perception and prior knowledge significantly influenced the perceived effectiveness of NBS.Key findings indicate that high installation and maintenance costs,lack of awareness,limited space,cultural factors,and perceived ineffectiveness are primary barriers to NBS adoption.Additionally,specific regional factors contribute to reluctance in certain areas of Phnom Penh.To overcome these barriers,the study recommends that the Cambodian government and other stakeholders invest in public education campaigns to raise awareness about the benefits of NBS.Financial incentives and subsidies should be provided to reduce the economic burden on residents.Furthermore,integrating NBS into urban planning and infrastructure development is crucial to enhance community resilience against floods. 展开更多
关键词 Nature-Based Solutions Pluvial Flood Flood mitigation
在线阅读 下载PDF
基于生命周期评价的城市污水处理碳足迹分析与评价
15
作者 李成杰 黄森 +4 位作者 陈保光 赵爱平 郭晓明 姜凤成 王明仕 《河南理工大学学报(自然科学版)》 北大核心 2026年第1期40-48,共9页
目的针对现有污水处理碳足迹研究中忽略污水中化石源有机碳经活性污泥法生物处理产生的CO_(2)排放和缺乏减碳路径全生命周期综合评估的问题,进行生命周期评价的城市污水处理碳足迹分析与评价研究。方法构建碳足迹核算模型,识别典型A/A/O... 目的针对现有污水处理碳足迹研究中忽略污水中化石源有机碳经活性污泥法生物处理产生的CO_(2)排放和缺乏减碳路径全生命周期综合评估的问题,进行生命周期评价的城市污水处理碳足迹分析与评价研究。方法构建碳足迹核算模型,识别典型A/A/O(厌氧/缺氧/好氧)工艺污水处理厂全流程关键碳排放环节,提出系统性减排路径,并以典型污水处理厂为例,采用生命周期评价法,建立初级处理、生化处理、深度处理和污泥处理4个单元过程,运用eFootprint软件,参照CLCD、Ecoinvent数据库中数据,核算碳足迹。创新性纳入污水中化石源有机碳经活性污泥法生物处理产生的CO_(2)的核算,基于一年实际运行数据,通过敏感性分析识别关键影响因子。结果全厂碳足迹为5.11×10^(-1)kgCO_(2)e/m^(3)。该污水处理厂4个单元过程的碳足迹排序为:生化处理>污泥处理>深度处理>初级处理,其中生化处理和污泥处理合计占比73%,是主要碳排放单元。从清单类型看,碳足迹占比排序为电耗>物耗>污染物排放>直接排放,电耗和物耗为核心影响因素,间接排放合计占比82%。结论构建的碳足迹核算模型纳入了化石源CO_(2)排放,明确了生化处理和污泥处理为关键减排单元,电耗和物耗为核心管控对象。据此提出短期通过设备能效提升、运行优化和低成本材料替代,长期通过工艺升级、智能控制和能源结构优化的短长期协同减排方案,为污水处理厂碳减排提供可操作路径。 展开更多
关键词 生命周期评价 污水处理 碳足迹 碳排放 减碳路径 单元过程分析
在线阅读 下载PDF
Hybrid particle filtering algorithm for GPS multipath mitigation 被引量:2
16
作者 郑南山 蔡良师 +1 位作者 卞和方 林聪 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2014年第5期1554-1561,共8页
An altemative algorithm for mitigating GPS multipath was presented by integrating unscented Kalman filter (UKF) and wavelet transform with particle filter. Within consideration of particle degeneracy, UKF was taken ... An altemative algorithm for mitigating GPS multipath was presented by integrating unscented Kalman filter (UKF) and wavelet transform with particle filter. Within consideration of particle degeneracy, UKF was taken for drawing particle. To remove the noise from raw data and data processing error, adaptive wavelet filtering with threshold was adopted while data preprocessing and drawing particle. Three algorithms, named EKF-PF, UKF-PF and WM-UKF-PF, were performed for comparison. The proposed WM-UKF-PF algorithm gives better error minimization, and significantly improves performance of multipath mitigation in terms of SNR and coefficient even though it has computation complexity. It is of significance for high-accuracy positioning and non-stationary deformation analysis. 展开更多
关键词 particle filtering wavelet transformation global positioning system (GPS) multipath mitigation
在线阅读 下载PDF
GPS short-delay multipath estimation and mitigation based on least square method 被引量:6
17
作者 Zhang Shengkang~(1,2),Wang Hongbo~(1,2),Yang Jun~(1,2) & He Leiming~(1,2) 1.Beijing Inst.of Radio Metrology and Measurement,Beijing 100854,P.R.China 2.National Key Laboratory of Metrology and Calibration Technology,Beijing 100854,P.R.China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期954-961,共8页
The GPS multipath signal model is presented, which indicates that the coherent DLL outputs in multipath environment are the convolution between the ideal DLL outputs and the channel responses. So the channel responses... The GPS multipath signal model is presented, which indicates that the coherent DLL outputs in multipath environment are the convolution between the ideal DLL outputs and the channel responses. So the channel responses can be estimated by a least square method using the observed curve of the DLL discriminator. In terms of the estimated multipath channels, two multipath mitigation methods are discussed, which are equalization filtering and multipath subtracting, respectively. It is shown, by computer simulation, that the least square method has a good performance in channels estimation and the multipath errors can be mitigated almost completely by either of the methods. However, the multipath subtracting method has relative small remnant errors than equalization filtering. 展开更多
关键词 global positioning system short-delay least square method multipath mitigation.
在线阅读 下载PDF
Analysis of Drought Changes and Drought Mitigation in Xiji County of Ningxia
18
作者 孙俊 张学艺 +2 位作者 李剑萍 齐旭峰 魏广泱 《Agricultural Science & Technology》 CAS 2011年第11期1682-1686,共5页
[Objective] The aim was to study the characteristics of the changes of extreme weather climate incidents such as severe drought in northwest and rainstorm in Xiji County of Ningxia. [Method] Precipitation anomaly perc... [Objective] The aim was to study the characteristics of the changes of extreme weather climate incidents such as severe drought in northwest and rainstorm in Xiji County of Ningxia. [Method] Precipitation anomaly percentage was applied to divide drought level and for statistics analysis. Seasonal index, linear tendency, and 5-years gliding average were used to reflect the trend of drought changes. The circulation wave of temporal sequence used polynomial expression to simulate the interannual variation scale. The positive part of the polynomial expression used bar chart to simulate interannual variation scale. [Result] The index of drought season from November to June was large. The general trend of annual drought was increasing. The drought of interannual scale was most serious around 1977, about 15 and 20 years. The drought in recent years went up. The general situation of drought, interannual scale and changes of interannual scales from March to May and from September to October were discussed. Based on the weather at 500 hPa, the first rain in Xiji and the drought-turning-into-rain situation were classified. [Conclusion]These may provide reference value to the prevention and mitigation of drought. 展开更多
关键词 Drought in Xiji of Ningxia Development tendency Different scales Drought mitigation situation
在线阅读 下载PDF
IDMA based MAI mitigation scheme with low complexity and low latency
19
作者 Zuoliang Yin Xingpeng Mao +1 位作者 Jun Cai Naitong Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第6期791-801,共11页
High complexity and high latency are key problems for multiuser detection (MUD) to be applied to a mobile station in cellular networks. To tackle these problems, an interleave division multiple access (IDMA) based... High complexity and high latency are key problems for multiuser detection (MUD) to be applied to a mobile station in cellular networks. To tackle these problems, an interleave division multiple access (IDMA) based multiple access scheme, grouped spread IDMA (GSIDMA), is proposed. In a GSIDMA system, lower complexity and latency for mobile stations can be achieved by appropriately dividing active users into different groups. The system model of GSIDMA is constructed and followed by analysing on its system capacity, complexity and latency, and bit error rate (BER) performance. The extrinsic information transfer (EXIT) chart is used to analyze the convergence behavior of the iteration process. The grouping method and interleavers-reuse issue for GSIDMA are also discussed preliminarily. The analyses and simulation results indicate that the complexity and latency of the proposed scheme are much lower than those of IDMA, whereas its BER performance is close to the latter. The properties of low complexity and low latency make it more feasible for the practical implementation. 展开更多
关键词 grouped spread interleave division multiple access(GSIDMA) iterative multiuser detector (IMUD) low complexity lowlatency multiple access interference (MAI) mitigation.
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部