期刊文献+
共找到24,486篇文章
< 1 2 250 >
每页显示 20 50 100
Intelligent Parameter Decision-Making and Multi-objective Prediction for Multi-layer and Multi-pass LDED Process
1
作者 Li Yaguan Nie Zhenguo +2 位作者 Li Huilin Wang Tao Huang Qingxue 《稀有金属材料与工程》 北大核心 2026年第1期47-58,共12页
The key parameters that characterize the morphological quality of multi-layer and multi-pass metal laser deposited parts are the surface roughness and the error between the actual printing height and the theoretical m... The key parameters that characterize the morphological quality of multi-layer and multi-pass metal laser deposited parts are the surface roughness and the error between the actual printing height and the theoretical model height.The Taguchi method was employed to establish the correlations between process parameter combinations and multi-objective characterization of metal deposition morphology(height error and roughness).Results show that using the signal-to-noise ratio and grey relational analysis,the optimal parameter combination for multi-layer and multi-pass deposition is determined as follows:laser power of 800 W,powder feeding rate of 0.3 r/min,step distance of 1.6 mm,and scanning speed of 20 mm/s.Subsequently,a Genetic Bayesian-back propagation(GB-BP)network is constructed to predict multi-objective responses.Compared with the traditional back propagation network,the GB-back propagation network improves the prediction accuracy of height error and surface roughness by 43.14%and 71.43%,respectively.This network can accurately predict the multi-objective characterization of morphological quality of multi-layer and multi-pass metal deposited parts. 展开更多
关键词 multi-layer and multi-pass laser cladding Taguchi method grey relational analysis GB-BP network
原文传递
Multi-layer multi-pass friction rolling additive manufacturing of Al alloy:Toward complex large-scale high-performance components 被引量:2
2
作者 Haibin Liu Run Hou +2 位作者 Chenghao Wu Ruishan Xie Shujun Chen 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS 2025年第2期425-438,共14页
At present,the emerging solid-phase friction-based additive manufacturing technology,including friction rolling additive man-ufacturing(FRAM),can only manufacture simple single-pass components.In this study,multi-laye... At present,the emerging solid-phase friction-based additive manufacturing technology,including friction rolling additive man-ufacturing(FRAM),can only manufacture simple single-pass components.In this study,multi-layer multi-pass FRAM-deposited alumin-um alloy samples were successfully prepared using a non-shoulder tool head.The material flow behavior and microstructure of the over-lapped zone between adjacent layers and passes during multi-layer multi-pass FRAM deposition were studied using the hybrid 6061 and 5052 aluminum alloys.The results showed that a mechanical interlocking structure was formed between the adjacent layers and the adja-cent passes in the overlapped center area.Repeated friction and rolling of the tool head led to different degrees of lateral flow and plastic deformation of the materials in the overlapped zone,which made the recrystallization degree in the left and right edge zones of the over-lapped zone the highest,followed by the overlapped center zone and the non-overlapped zone.The tensile strength of the overlapped zone exceeded 90%of that of the single-pass deposition sample.It is proved that although there are uneven grooves on the surface of the over-lapping area during multi-layer and multi-pass deposition,they can be filled by the flow of materials during the deposition of the next lay-er,thus ensuring the dense microstructure and excellent mechanical properties of the overlapping area.The multi-layer multi-pass FRAM deposition overcomes the limitation of deposition width and lays the foundation for the future deposition of large-scale high-performance components. 展开更多
关键词 aluminum alloy additive manufacturing SOLID-STATE friction stir welding multi-layer multi-pass
在线阅读 下载PDF
Establishment and verification of anthropogenic speciated VOCs emission inventory of Central China 被引量:3
3
作者 Xuan Lu Dong Zhang +9 位作者 Lanxin Wang Shefang Wang Xinran Zhang Yali Liu Keying Chen Xinshuai Song Shasha Yin Ruiqin Zhang Shanshan Wang Minghao Yuan 《Journal of Environmental Sciences》 2025年第3期406-418,共13页
Improving the accuracy of anthropogenic volatile organic compounds(VOCs)emission inventory is crucial for reducing atmospheric pollution and formulating control policy of air pollution.In this study,an anthropogenic s... Improving the accuracy of anthropogenic volatile organic compounds(VOCs)emission inventory is crucial for reducing atmospheric pollution and formulating control policy of air pollution.In this study,an anthropogenic speciated VOCs emission inventory was established for Central China represented by Henan Province at a 3 km×3 km spatial resolution based on the emission factormethod.The 2019 VOCs emission in Henan Provincewas 1003.5 Gg,while industrial process source(33.7%)was the highest emission source,Zhengzhou(17.9%)was the city with highest emission and April and August were the months with the more emissions.High VOCs emission regions were concentrated in downtown areas and industrial parks.Alkanes and aromatic hydrocarbons were the main VOCs contribution groups.The species composition,source contribution and spatial distribution were verified and evaluated through tracer ratio method(TR),Positive Matrix Factorization Model(PMF)and remote sensing inversion(RSI).Results show that both the emission results by emission inventory(EI)(15.7 Gg)and by TRmethod(13.6 Gg)and source contribution by EI and PMF are familiar.The spatial distribution of HCHO primary emission based on RSI is basically consistent with that of HCHO emission based on EI with a R-value of 0.73.The verification results show that the VOCs emission inventory and speciated emission inventory established in this study are relatively reliable. 展开更多
关键词 VOCs verification Species composition Tracer ratio PMF Remote sensing inversion
原文传递
Enhanced Kinship Verification through Ear Images:A Comparative Study of CNNs,Attention Mechanisms,and MLP Mixer Models 被引量:1
4
作者 Thien-Tan Cao Huu-Thanh Duong +3 位作者 Viet-Tuan Le Hau Nguyen Trung Vinh Truong Hoang Kiet Tran-Trung 《Computers, Materials & Continua》 2025年第6期4373-4391,共19页
Kinship verification is a key biometric recognition task that determines biological relationships based on physical features.Traditional methods predominantly use facial recognition,leveraging established techniques a... Kinship verification is a key biometric recognition task that determines biological relationships based on physical features.Traditional methods predominantly use facial recognition,leveraging established techniques and extensive datasets.However,recent research has highlighted ear recognition as a promising alternative,offering advantages in robustness against variations in facial expressions,aging,and occlusions.Despite its potential,a significant challenge in ear-based kinship verification is the lack of large-scale datasets necessary for training deep learning models effectively.To address this challenge,we introduce the EarKinshipVN dataset,a novel and extensive collection of ear images designed specifically for kinship verification.This dataset consists of 4876 high-resolution color images from 157 multiracial families across different regions,forming 73,220 kinship pairs.EarKinshipVN,a diverse and large-scale dataset,advances kinship verification research using ear features.Furthermore,we propose the Mixer Attention Inception(MAI)model,an improved architecture that enhances feature extraction and classification accuracy.The MAI model fuses Inceptionv4 and MLP Mixer,integrating four attention mechanisms to enhance spatial and channel-wise feature representation.Experimental results demonstrate that MAI significantly outperforms traditional backbone architectures.It achieves an accuracy of 98.71%,surpassing Vision Transformer models while reducing computational complexity by up to 95%in parameter usage.These findings suggest that ear-based kinship verification,combined with an optimized deep learning model and a comprehensive dataset,holds significant promise for biometric applications. 展开更多
关键词 Biometric analytics ear kin Inceptionv4 kinship verification KIN ear images
在线阅读 下载PDF
Contextual design and real-time verification for agile casting design 被引量:1
5
作者 Dong Xiang Chu-hao Zhou +3 位作者 Xuan-pu Dong Shu-ren Guo Yan-song Ding Hua-tang Cao 《China Foundry》 2025年第2期231-238,共8页
In the foundry industries,process design has traditionally relied on manuals and complex theoretical calculations.With the advent of 3D design in casting,computer-aided design(CAD)has been applied to integrate the fea... In the foundry industries,process design has traditionally relied on manuals and complex theoretical calculations.With the advent of 3D design in casting,computer-aided design(CAD)has been applied to integrate the features of casting process,thereby expanding the scope of design options.These technologies use parametric model design techniques for rapid component creation and use databases to access standard process parameters and design specifications.However,3D models are currently still created through inputting or calling parameters,which requires numerous verifications through calculations to ensure the design rationality.This process may be significantly slowed down due to repetitive modifications and extended design time.As a result,there are increasingly urgent demands for a real-time verification mechanism to address this issue.Therefore,this study proposed a novel closed-loop model and software development method that integrated contextual design with real-time verification,dynamically verifying relevant rules for designing 3D casting components.Additionally,the study analyzed three typical closed-loop scenarios of agile design in an independent developed intelligent casting process system.It is believed that foundry industries can potentially benefit from favorably reduced design cycles to yield an enhanced competitive product market. 展开更多
关键词 agile design context-design casting process design real-time verification smart manufacturing
在线阅读 下载PDF
Research on multi-scale simulation and dynamic verification of high dynamic MEMS components in additive manufacturing 被引量:1
6
作者 Sining Lv Hengzhen Feng +2 位作者 Wenzhong Lou Chuan Xiao Shiyi Li 《Defence Technology(防务技术)》 2025年第5期275-291,共17页
Metal Additive Manufacturing(MAM) technology has become an important means of rapid prototyping precision manufacturing of special high dynamic heterogeneous complex parts. In response to the micromechanical defects s... Metal Additive Manufacturing(MAM) technology has become an important means of rapid prototyping precision manufacturing of special high dynamic heterogeneous complex parts. In response to the micromechanical defects such as porosity issues, significant deformation, surface cracks, and challenging control of surface morphology encountered during the selective laser melting(SLM) additive manufacturing(AM) process of specialized Micro Electromechanical System(MEMS) components, multiparameter optimization and micro powder melt pool/macro-scale mechanical properties control simulation of specialized components are conducted. The optimal parameters obtained through highprecision preparation and machining of components and static/high dynamic verification are: laser power of 110 W, laser speed of 600 mm/s, laser diameter of 75 μm, and scanning spacing of 50 μm. The density of the subordinate components under this reference can reach 99.15%, the surface hardness can reach 51.9 HRA, the yield strength can reach 550 MPa, the maximum machining error of the components is 4.73%, and the average surface roughness is 0.45 μm. Through dynamic hammering and high dynamic firing verification, SLM components meet the requirements for overload resistance. The results have proven that MEM technology can provide a new means for the processing of MEMS components applied in high dynamic environments. The parameters obtained in the conclusion can provide a design basis for the additive preparation of MEMS components. 展开更多
关键词 Additive manufacturing High dynamic MEMS components Multiscale control Process optimization High dynamic verification
在线阅读 下载PDF
Program Derivation and Mechanized Verification of Edit Distance Algorithm
7
作者 YOU Zhen ZHANG Chen +1 位作者 SUN Huan ZUO Zhengkang 《Wuhan University Journal of Natural Sciences》 2025年第6期576-588,共13页
Edit distance is an algorithm to measure the difference between two strings,usually represented as the minimum number of editing operations required to transform one string into another.The edit distance algorithm inv... Edit distance is an algorithm to measure the difference between two strings,usually represented as the minimum number of editing operations required to transform one string into another.The edit distance algorithm involves complex dependencies and constraints,making state management and verification work tedious.This paper proposes a derivation and verification method that avoids directly handling dependencies and constraints by proving the equivalence between the edit distance algorithm and existing functional modeling.First,the derivation process of edit distance algorithm mainly includes 1)describing problem specifications,2)inductively deducing recursive relations,3)formally constructing loop invariants using the optimization theory(memorization technology and optimal decision table)and properties(optimal substructure property and subproblems overlapping property)of the edit distance algorithm,4)generating the Minimalistic Imperative Programming Language(IMP)code based on the recursive relations.Second,the problem specification,loop invariants,and generated IMP code are input into Verification Condition Generator(VCG),which automatically generate five verification conditions,and then the correctness of edit distance algorithm is verified in the Isabelle/HOL theorem prover.The method utilizes formal technologies and theorem prover to complete the derivation and verification of the edit distance algorithm,and it can be applied to linear and nonlinear dynamic programming problems. 展开更多
关键词 Isabelle/HOL mechanized verification edit distance verification Condition Generator(VCG)
原文传递
C-BIVM:A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities
8
作者 Radhika Kumari Kiranbir Kaur +4 位作者 Ahmad Almogren Ayman Altameem Salil Bharany Yazeed Yasin Ghadi Ateeq Ur Rehman 《Computers, Materials & Continua》 2025年第9期5509-5525,共17页
The exponential growth of the Internet of Things(IoT)has revolutionized various domains such as healthcare,smart cities,and agriculture,generating vast volumes of data that require secure processing and storage in clo... The exponential growth of the Internet of Things(IoT)has revolutionized various domains such as healthcare,smart cities,and agriculture,generating vast volumes of data that require secure processing and storage in cloud environments.However,reliance on cloud infrastructure raises critical security challenges,particularly regarding data integrity.While existing cryptographic methods provide robust integrity verification,they impose significant computational and energy overheads on resource-constrained IoT devices,limiting their applicability in large-scale,real-time scenarios.To address these challenges,we propose the Cognitive-Based Integrity Verification Model(C-BIVM),which leverages Belief-Desire-Intention(BDI)cognitive intelligence and algebraic signatures to enable lightweight,efficient,and scalable data integrity verification.The model incorporates batch auditing,reducing resource consumption in large-scale IoT environments by approximately 35%,while achieving an accuracy of over 99.2%in detecting data corruption.C-BIVM dynamically adapts integrity checks based on real-time conditions,optimizing resource utilization by minimizing redundant operations by more than 30%.Furthermore,blind verification techniques safeguard sensitive IoT data,ensuring privacy compliance by preventing unauthorized access during integrity checks.Extensive experimental evaluations demonstrate that C-BIVM reduces computation time for integrity checks by up to 40%compared to traditional bilinear pairing-based methods,making it particularly suitable for IoT-driven applications in smart cities,healthcare,and beyond.These results underscore the effectiveness of C-BIVM in delivering a secure,scalable,and resource-efficient solution tailored to the evolving needs of IoT ecosystems. 展开更多
关键词 Internet of Things(IoT) smart cities data integrity verification BDI cognitive intelligence algebraic signatures batch auditing resource-constrained devices blind verification
在线阅读 下载PDF
Study on the Construction and Verification of CDIO Teaching Model Based on AI Virtual Scene Data Feedback
9
作者 Yanyan Wang Wenyan Qu Yuman Yuan 《Journal of Contemporary Educational Research》 2025年第10期164-173,共10页
Combining the characteristics of the course“Comprehensive Training of E-Commerce Live Streaming,”this paper embeds the CDIO(Conceive-Design-Implement-Operate)method into the live streaming training process,carries o... Combining the characteristics of the course“Comprehensive Training of E-Commerce Live Streaming,”this paper embeds the CDIO(Conceive-Design-Implement-Operate)method into the live streaming training process,carries out the virtual scene“e-commerce live streaming”course design and project-based teaching reform that integrates teaching training with learning effects,and establishes a set of cross-professional student live streaming training procedures guided by the CDIO engineering method.The training results show that the CDIO practical teaching model supported by data feedback plays an important role and significance in improving students’learning effects,and also provides some new experiences for integrating engineering thinking into the construction of new liberal arts. 展开更多
关键词 CDIO Teaching model Construction and verification
在线阅读 下载PDF
A Multi-Layer Progressive Analysis Method for Collision Energy Flow in Rail Trains
10
作者 Jingke Zhang Tao Zhu +4 位作者 Xiaorui Wang Bing Yang Shoune Xiao Guangwu Yang Yuru Li 《Chinese Journal of Mechanical Engineering》 2025年第5期425-439,共15页
The huge impact kinetic energy cannot be quickly dissipated by the energy-absorbing structure and transferred to the other vehicle through the car body structure,which will cause structural damage and threaten the liv... The huge impact kinetic energy cannot be quickly dissipated by the energy-absorbing structure and transferred to the other vehicle through the car body structure,which will cause structural damage and threaten the lives of the occupants.Therefore,it is necessary to understand the laws of energy conversion,dissipation and transfer during train collisions.This study proposes a multi-layer progressive analysis method of energy flow during train collisions,considering the characteristics of the train.In this method,the train collision system is divided into conversion,dissipation,and transfer layers from the perspective of the train,collision interface,and car body structure to analyze the energy conversion,dissipation and transfer characteristics.Taking the collision process of a rail train as an example,a train collision energy transfer path analysis model was established based on power flow theory.The results show that when the maximum mean acceleration of the vehicle meets the standard requirements,the jerk may exceed the allowable limit of the human body,and there is a risk of injury to the occupants of a secondary collision.The decay rate of the collision energy along the direction of train operation reaches 79%.As the collision progresses,the collision energy gradually converges in the structure with holes,and the structure deforms when the gathered energy is greater than the maximum energy the structure can withstand.The proposed method helps to understand the train collision energy flow law and provides theoretical support for the train crashworthiness design in the future. 展开更多
关键词 Train Cllision multi-layer Progression Energy Flow Energy Conversion Energy Dissipation Energy Transfer
在线阅读 下载PDF
Intrusion Detection Model on Network Data with Deep Adaptive Multi-Layer Attention Network(DAMLAN)
11
作者 Fatma S.Alrayes Syed Umar Amin +2 位作者 Nada Ali Hakami Mohammed K.Alzaylaee Tariq Kashmeery 《Computer Modeling in Engineering & Sciences》 2025年第7期581-614,共34页
The growing incidence of cyberattacks necessitates a robust and effective Intrusion Detection Systems(IDS)for enhanced network security.While conventional IDSs can be unsuitable for detecting different and emerging at... The growing incidence of cyberattacks necessitates a robust and effective Intrusion Detection Systems(IDS)for enhanced network security.While conventional IDSs can be unsuitable for detecting different and emerging attacks,there is a demand for better techniques to improve detection reliability.This study introduces a new method,the Deep Adaptive Multi-Layer Attention Network(DAMLAN),to boost the result of intrusion detection on network data.Due to its multi-scale attention mechanisms and graph features,DAMLAN aims to address both known and unknown intrusions.The real-world NSL-KDD dataset,a popular choice among IDS researchers,is used to assess the proposed model.There are 67,343 normal samples and 58,630 intrusion attacks in the training set,12,833 normal samples,and 9711 intrusion attacks in the test set.Thus,the proposed DAMLAN method is more effective than the standard models due to the consideration of patterns by the attention layers.The experimental performance of the proposed model demonstrates that it achieves 99.26%training accuracy and 90.68%testing accuracy,with precision reaching 98.54%on the training set and 96.64%on the testing set.The recall and F1 scores again support the model with training set values of 99.90%and 99.21%and testing set values of 86.65%and 91.37%.These results provide a strong basis for the claims made regarding the model’s potential to identify intrusion attacks and affirm its relatively strong overall performance,irrespective of type.Future work would employ more attempts to extend the scalability and applicability of DAMLAN for real-time use in intrusion detection systems. 展开更多
关键词 Intrusion detection deep adaptive networks multi-layer attention DAMLAN network security anomaly detection
在线阅读 下载PDF
Design and Ground Verification for Vision-Based Relative Navigation Systems of Microsatellites
12
作者 DU Ronghua LIAO Wenhe ZHANG Xiang 《Transactions of Nanjing University of Aeronautics and Astronautics》 2025年第1期37-55,共19页
This paper presents the design and ground verification for vision-based relative navigation systems of microsatellites,which offers a comprehensive hardware design solution and a robust experimental verification metho... This paper presents the design and ground verification for vision-based relative navigation systems of microsatellites,which offers a comprehensive hardware design solution and a robust experimental verification methodology for practical implementation of vision-based navigation technology on the microsatellite platform.Firstly,a low power consumption,light weight,and high performance vision-based relative navigation optical sensor is designed.Subsequently,a set of ground verification system is designed for the hardware-in-the-loop testing of the vision-based relative navigation systems.Finally,the designed vision-based relative navigation optical sensor and the proposed angles-only navigation algorithms are tested on the ground verification system.The results verify that the optical simulator after geometrical calibration can meet the requirements of the hardware-in-the-loop testing of vision-based relative navigation systems.Based on experimental results,the relative position accuracy of the angles-only navigation filter at terminal time is increased by 25.5%,and the relative speed accuracy is increased by 31.3% compared with those of optical simulator before geometrical calibration. 展开更多
关键词 microsatellites vision-based relative navigation optical simulator ground verification angles-only navigation
在线阅读 下载PDF
Toward next-generation networks:A blockchain-based approach for core network architecture and roaming identity verification
13
作者 Yi Gong Boyuan Yu +4 位作者 Lei Yang Fanke Meng Lei Liu Xinjue Hu Zhan Xu 《Digital Communications and Networks》 2025年第2期326-336,共11页
With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN ... With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN and data security by proposing a novel framework based on blockchain technology that is specifically designed for communication networks.Traditional centralized network architectures are vulnerable to Distributed Denial of Service(DDoS)attacks,particularly in roaming scenarios where there is also a risk of private data leakage,which imposes significant operational demands.To address these issues,we introduce the Blockchain-Enhanced Core Network Architecture(BECNA)and the Secure Decentralized Identity Authentication Scheme(SDIDAS).The BECNA utilizes blockchain technology to decentralize data storage,enhancing network security,stability,and reliability by mitigating Single Points of Failure(SPoF).The SDIDAS utilizes Decentralized Identity(DID)technology to secure user identity data and streamline authentication in roaming scenarios,significantly reducing the risk of data breaches during cross-network transmissions.Our framework employs Ethereum,free5GC,Wireshark,and UERANSIM tools to create a robust,tamper-evident system model.A comprehensive security analysis confirms substantial improvements in user privacy and network security.Simulation results indicate that our approach enhances communication CNs security and reliability,while also ensuring data security. 展开更多
关键词 Blockchain Core network Privacy data protection Decentralized identity Roaming identity verification
在线阅读 下载PDF
Verification and Validation for Large Eddy Simulation of Cavitating Flow Around a Projectile Near the Free Surface
14
作者 Linfeng Deng Yun Long +1 位作者 Huaiyu Cheng Bin Ji 《哈尔滨工程大学学报(英文版)》 2025年第4期659-681,共23页
Verification and validation(V&V)is a helpful tool for evaluating simulation errors,but its application in unsteady cavitating flow remains a challenging issue due to the difficulty in meeting the requirement of an... Verification and validation(V&V)is a helpful tool for evaluating simulation errors,but its application in unsteady cavitating flow remains a challenging issue due to the difficulty in meeting the requirement of an asymptotic range.Hence,a new V&V approach for large eddy simulation(LES)is proposed.This approach offers a viable solution for the error estimation of simulation data that are unable to satisfy the asymptotic range.The simulation errors of cavitating flow around a projectile near the free surface are assessed using the new V&V method.The evident error values are primarily dispersed around the cavity region and free surface.The increasingly intense cavitating flow increases the error magnitudes.In addition,the modeling error magnitudes of the Dynamic Smagorinsky-Lilly model are substantially smaller than that of the Smagorinsky-Lilly model.The present V&V method can capture the decrease in the modeling errors due to model enhancements,further exhibiting its applicability in cavitating flow simulations.Moreover,the monitoring points where the simulation data are beyond the asymptotic range are primarily dispersed near the cavity region,and the number of such points grows as the cavitating flow intensifies.The simulation outcomes also suggest that the re-entrant jet and shedding cavity collapse are the chief sources of vorticity motions,which remarkably affect the simulation accuracy.The results of this study provide a valuable reference for V&V research. 展开更多
关键词 Cavitating flow Free surface verification and validation Error analyses Asymptotic range
在线阅读 下载PDF
General analytical solutions for one-dimensional diffusion of degradable organic contaminant in the multi-layered media containing geomembranes
15
作者 JIANG Wen-hao GE Shang-qi LI Jiang-shan 《Journal of Central South University》 2025年第10期3895-3910,共16页
In practical engineering construction,multi-layered barriers containing geomembranes are extensively applied to retard the migration of pollutants.However,the associated analytical theory on pollutants diffusion still... In practical engineering construction,multi-layered barriers containing geomembranes are extensively applied to retard the migration of pollutants.However,the associated analytical theory on pollutants diffusion still needs to be further improved.In this work,general analytical solutions are derived for one-dimensional diffusion of degradable organic contaminant(DOC)in the multi-layered media containing geomembranes under a time-varying concentration boundary condition,where the variable substitution and separated variable approaches are employed.These analytical solutions with clear expressions can be used not only to study the diffusion behaviors of DOC in bottom and vertical composite barrier systems,but also to verify other complex numerical models.The proposed general analytical solutions are then fully validated via three comparative analyses,including comparisons with the experimental measurements,an existing analytical solution,and a finite-difference solution.Ultimately,the influences of different factors on the composite cutoff wall’s(CCW,which consists of two soil-bentonite layers and a geomembrane)service performance are investigated through a composite vertical barrier system as the application example.The findings obtained from this investigation can provide scientific guidance for the barrier performance evaluation and the engineering design of CCWs.This application example also exhibits the necessity and effectiveness of the developed analytical solutions. 展开更多
关键词 general analytical solutions degradable organic contaminant diffusion behavior multi-layered media containing geomembranes composite barrier system
在线阅读 下载PDF
Numerical Exploration on Load Transfer Characteristics and Optimization of Multi-Layer Composite Pavement Structures Based on Improved Transfer Matrix Method
16
作者 Guo-Zhi Li Hua-Ping Wang +2 位作者 Si-Kai Wang Jing-Cheng Zhou Ping Xiang 《Computer Modeling in Engineering & Sciences》 2025年第12期3165-3195,共31页
Transportation structures such as composite pavements and railway foundations typically consist of multi-layered media designed to withstand high bearing capacity.A theoretical understanding of load transfer mechanism... Transportation structures such as composite pavements and railway foundations typically consist of multi-layered media designed to withstand high bearing capacity.A theoretical understanding of load transfer mechanisms in these multi-layer composites is essential,as it offers intuitive insights into parametric influences and facilitates enhanced structural performance.This paper employs an improved transfer matrix method to address the limitations of existing theoretical approaches for analyzing multi-layer composite structures.By establishing a twodimensional composite pavement model,it investigates load transfer characteristics and validates the accuracy through finite element simulation.The proposed method offers a straightforward analytical approach for examining internal interactions between structural layers.Case studies indicate that the concrete surface layer is the main load-bearing layer for most vertical normal and shear stresses.The soil base layer reduces the overall mechanical response of the substructure,while horizontal actions increase the risk of interfacial slip and cracking.Structural optimization analysis demonstrates that increasing the thickness of the concrete surface layer,enhancing the thickness and stiffness of the soil base layer,or incorporating gradient layers can significantly mitigate these risks of interfacial slip and cracking.The findings of this study can guide the optimization design,parameter analysis,and damage prevention of multi-layer composite structures. 展开更多
关键词 multi-layer composite pavement improved theoretical analysis transfer matrix method structural optimization damage prevention
在线阅读 下载PDF
An improved model for predicting thermal contact resistance at multi-layered rock interface
17
作者 WEN Min-jie XIE Jia-hao +4 位作者 LI Li-chen TIAN Yi EL NAGGAR M.Hesham MEI Guo-xiong WU Wen-bing 《Journal of Central South University》 2025年第1期229-243,共15页
This study proposes a general imperfect thermal contact model to predict the thermal contact resistance at the interface among multi-layered composite structures.Based on the Green-Lindsay(GL)thermoelastic theory,semi... This study proposes a general imperfect thermal contact model to predict the thermal contact resistance at the interface among multi-layered composite structures.Based on the Green-Lindsay(GL)thermoelastic theory,semi analytical solutions of temperature increment and displacement of multi-layered composite structures are obtained by using the Laplace transform method,upon which the effects of thermal resistance coefficient,partition coefficient,thermal conductivity ratio and heat capacity ratio on the responses are studied.The results show that the generalized imperfect thermal contact model can realistically describe the imperfect thermal contact problem.Accordingly,it may degenerate into other thermal contact models by adjusting the thermal resistance coefficient and partition coefficient. 展开更多
关键词 multi-layered structures general thermal contact model thermal contact resistance GL thermoelastic theory Laplace transform
在线阅读 下载PDF
In vivo 3D dose distribution verification for lung cancer:from rigid-body model to porcine lung
18
作者 Yutao Zhang Kai Xie +9 位作者 Lintao Song Jiewei Lai Haiping Zheng Qianjia Huang Hao Wang Tao Lin Liugang Gao Jiawei Sun Jianrong Dai Xinye Ni 《Bio-Design and Manufacturing》 2025年第6期994-1008,I0032,共16页
This study introduces a novel concept,biological in vivo three-dimensional(3D)dose distribution verification,aimed at investigating how respiratory motion affects the efficacy of lung cancer radiotherapy,representing ... This study introduces a novel concept,biological in vivo three-dimensional(3D)dose distribution verification,aimed at investigating how respiratory motion affects the efficacy of lung cancer radiotherapy,representing an evolution from the current standard of rigid-body dose distribution verification.A 3D ex vivo biological lung motion simulation device(3D-BioLungEx)was designed to replicate human respiration.A radiotherapy plan of the patient was copied to the porcine lung,which was driven by 3D-BioLungEx to simulate various respiratory patterns that occur during treatment.To ensure anatomical consistency with the patient’s lung structure,during transmission,skin,skeleton,and organs were adjusted according to CT images of the porcine lung.The patient’s radiotherapy plan was then adapted to the porcine lung using the Monaco treatment planning system(TPS).Next,an iterative optimization and scatter inversion-based dose distribution retro-analysis algorithm(IOSI-BLDose)was developed to calculate the dose distribution during treatment.Gamma passing rates were used to quantify discrepancies between this dose distribution and that of the radiotherapy plan.When respiratory conditions were replicated,the passing rate reached up to 93.61%,while irregular breathing dropped it to 70%-90%,primarily due to amplitude changes.However,cycle variations had minimal impact.Compared to conventional rigid-body dose distribution verification,our method provides real-time biological feedback and more effectively captures motion-induced deviations.Accordingly,our biological in vivo 3D dose distribution verification has potential for improving treatment precision and enabling adaptive radiotherapy in clinical practice. 展开更多
关键词 Biological lung 3D printing Motion simulation device RADIOTHERAPY Lung cancer Dose distribution verification
暂未订购
Verification and validation of a numerical wave tank with momentum source wave generation
19
作者 Housheng Zhang Yijing Hu +1 位作者 Biao Huang Xin Zhao 《Acta Mechanica Sinica》 2025年第3期23-38,共16页
systematic verification and validation(V&V)of our previously proposed momentum source wave generation method is performed.Some settings of previous numerical wave tanks(NWTs)of regular and irregular waves have bee... systematic verification and validation(V&V)of our previously proposed momentum source wave generation method is performed.Some settings of previous numerical wave tanks(NWTs)of regular and irregular waves have been optimized.The H2-5 V&V method involving five mesh sizes with mesh refinement ratio being 1.225 is used to verify the NWT of regular waves,in which the wave height and mass conservation are mainly considered based on a Lv3(H s=0.75 m)and a Lv6(H s=5 m)regular wave.Additionally,eight different sea states are chosen to validate the wave height,mass conservation and wave frequency of regular waves.Regarding the NWT of irregular waves,five different sea states with significant wave heights ranging from 0.09 m to 12.5 m are selected to validate the statistical characteristics of irregular waves,including the profile of the wave spectrum,peak frequency and significant wave height.Results show that the verification errors for Lv3 and Lv6 regular wave on the most refined grid are−0.018 and−0.35 for wave height,respectively,and−0.14 and for−0.17 mass conservation,respectively.The uncertainty estimation analysis shows that the numerical error could be partially balanced out by the modelling error to achieve a smaller validation error by adjusting the mesh size elaborately.And the validation errors of the wave height,mass conservation and dominant frequency of regular waves under different sea states are no more than 7%,8% and 2%,respectively.For a Lv3(H_(s)=0.75 m)and a Lv6(H_(s)=5 m)regular wave,simulations are validated on the wave height in wave development section for safety factors FS≈1 and FS≈0.5-1,respectively.Regarding irregular waves,the validation errors of the significant wave height and peak frequency are both lower than 2%. 展开更多
关键词 verification and validation Wave generation Momentum source function Regular wave Irregular wave Uncertainty estimation
原文传递
Routing cost-integrated intelligent handover strategy for multi-layer LEO mega-constellation networks
20
作者 Zhenglong YIN Quan CHEN +2 位作者 Lei YANG Yong ZHAO Xiaoqian CHEN 《Chinese Journal of Aeronautics》 2025年第6期487-500,共14页
Low Earth Orbit(LEO)mega-constellation networks,exemplified by Starlink,are poised to play a pivotal role in future mobile communication networks,due to their low latency and high capacity.With the massively deployed ... Low Earth Orbit(LEO)mega-constellation networks,exemplified by Starlink,are poised to play a pivotal role in future mobile communication networks,due to their low latency and high capacity.With the massively deployed satellites,ground users now can be covered by multiple visible satellites,but also face complex handover issues with such massive high-mobility satellites in multi-layer.The end-to-end routing is also affected by the handover behavior.In this paper,we propose an intelligent handover strategy dedicated to multi-layer LEO mega-constellation networks.Firstly,an analytic model is utilized to rapidly estimate the end-to-end propagation latency as a key handover factor to construct a multi-objective optimization model.Subsequently,an intelligent handover strategy is proposed by employing the Dueling Double Deep Q Network(D3QN)-based deep reinforcement learning algorithm for single-layer constellations.Moreover,an optimal crosslayer handover scheme is proposed by predicting the latency-jitter and minimizing the cross-layer overhead.Simulation results demonstrate the superior performance of the proposed method in the multi-layer LEO mega-constellation,showcasing reductions of up to 8.2%and 59.5%in end-to-end latency and jitter respectively,when compared to the existing handover strategies. 展开更多
关键词 multi-layer LEO mega-constellation networks HANDOVER Routing cost Dueling Double Deep Q Network(D3QN)
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部