期刊文献+
共找到307篇文章
< 1 2 16 >
每页显示 20 50 100
Directed Proxy Signature in the Standard Model 被引量:1
1
作者 明洋 王育民 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第6期663-671,共9页
A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or ... A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver's privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption. 展开更多
关键词 directed signature proxy signature bilinear pairings standard model
原文传递
A population-feedback control based algorithm for well trajectory optimization using proxy model 被引量:1
2
作者 Javad Kasravi Mohammad Amin Safarzadeh Abdonabi Hashemi 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2017年第2期281-290,共10页
Wellbore instability is one of the concerns in the field of drilling engineering.This phenomenon is affected by several factors such as azimuth,inclination angle,in-situ stress,mud weight,and rock strength parameters.... Wellbore instability is one of the concerns in the field of drilling engineering.This phenomenon is affected by several factors such as azimuth,inclination angle,in-situ stress,mud weight,and rock strength parameters.Among these factors,azimuth,inclination angle,and mud weight are controllable.The objective of this paper is to introduce a new procedure based on elastoplastic theory in wellbore stability solution to determine the optimum well trajectory and global minimum mud pressure required(GMMPR).Genetic algorithm(GA) was applied as a main optimization engine that employs proportional feedback controller to obtain the minimum mud pressure required(MMPR).The feedback function repeatedly calculated and updated the error between the simulated and set point of normalized yielded zone area(NYZA).To reduce computation expenses,an artificial neural network(ANN) was used as a proxy(surrogate model) to approximate the behavior of the actual wellbore model.The methodology was applied to a directional well in southwestern Iranian oilfield.The results demonstrated that the error between the predicted GMMPR and practical safe mud pressure was 4%for elastoplastic method,and 22%for conventional elastic solution. 展开更多
关键词 Elastoplastic theory Normalized yielded zone area(NYZA) OPTIMIZATION Well trajectory Proportional feedback controller proxy model
在线阅读 下载PDF
A reference model for database security proxy 被引量:1
3
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
在线阅读 下载PDF
Applications of smart proxies for subsurface modeling 被引量:2
4
作者 SHAHKARAMI Alireza MOHAGHEGH Shahab 《Petroleum Exploration and Development》 2020年第2期400-412,共13页
Using artificial intelligence(AI) and machine learning(ML) techniques, we developed and validated the smart proxy models for history matching of reservoir simulation, sensitivity analysis, and uncertainty assessment b... Using artificial intelligence(AI) and machine learning(ML) techniques, we developed and validated the smart proxy models for history matching of reservoir simulation, sensitivity analysis, and uncertainty assessment by artificial neural network(ANN). The smart proxy models were applied on two cases, the first case study investigated the application of a proxy model for calibrating a reservoir simulation model based on historical data and predicting well production while the second case study investigated the application of an ANN-based proxy model for fast-track modeling of CO2 enhanced oil recovery, aiming at the prediction of the reservoir pressure and phase saturation distribution at injection stage and post-injection stage. The prediction effects for both cases are promising. While a single run of basic numerical simulation model takes hours to days, the smart proxy model runs in a matter of seconds, saving 98.9% of calculating time. The results of these case studies demonstrate the advantage of the proposed workflow for addressing the high run-time, computational time and computational cost of numerical simulation models. In addition, these proxy models predict the outputs of reservoir simulation models with high accuracy. 展开更多
关键词 smart proxy modeling reservoir simulation machine learning artificial neural network history matching sensitivity analysis optimization technology CO2 EOR
在线阅读 下载PDF
Current Networks of Long Proxies for Building Reconstruction Models of the Atlantic Multidecadal Oscillation
5
作者 Markus Lindholm Risto Jalkanen Maxim G. Ogurtsov 《Atmospheric and Climate Sciences》 2016年第3期367-374,共8页
Currently available proxies were studied as networks for building reconstruction models of the Atlantic Multidecadal Oscillation (AMO). Only proxies that would double the current record length (backwards in time from ... Currently available proxies were studied as networks for building reconstruction models of the Atlantic Multidecadal Oscillation (AMO). Only proxies that would double the current record length (backwards in time from AD 1564) were included. We present two proxy networks and corresponding reconstruction (transfer) models, one for tree-growth based proxies only and another for multiproxies. Both of them show a useful match in timing as well as amplitude with the AMO. These model structures demonstrated reasonable model performance (overall r<sup>2</sup> = 0.45 - 0.36). The time stability of proxy-AMO relationships was also validated. The new models produced acceptable results in cross-calibration-verification (reduction of error and coefficient of efficiency statistics in 1856-1921 and 1922-1990 vary between 0.41 and 0.21). The spatial distribution of these data series indicate that proxies respond to an AMO-like climatic oscillation over much of the Northern Hemisphere. 展开更多
关键词 PROXIES Atlantic Multidecadal Oscillation Tree Growth Climate Change Transfer models
在线阅读 下载PDF
基于Proxy-agent的网络智能管理模型
6
作者 赵阳 刘治国 王光兴 《小型微型计算机系统》 CSCD 北大核心 2002年第3期274-277,共4页
现代企业网络的复杂和异构化迫切需要有效的计算机网络管理工具 .本文分析了 ISO及 IETF的网络管理信息模型 ,将被管对象按时间要求和变化频率进行分类处理 ,提出了一种基于 Proxy- agent的可扩展的、灵活的新型网管结构模型 ,并且基于... 现代企业网络的复杂和异构化迫切需要有效的计算机网络管理工具 .本文分析了 ISO及 IETF的网络管理信息模型 ,将被管对象按时间要求和变化频率进行分类处理 ,提出了一种基于 Proxy- agent的可扩展的、灵活的新型网管结构模型 ,并且基于这种模型 。 展开更多
关键词 企业网络 网络智能管理模型 计算机网络 proxy-agent
在线阅读 下载PDF
货币政策的不确定性、宏观经济波动与银行系统金融风险——基于政策不确定性指标不同测度和Proxy-SVAR实证方法的研究 被引量:1
7
作者 陆前进 李欣 李晓康 《上海经济研究》 CSSCI 北大核心 2024年第12期101-116,共16页
建立了一个中等规模的结构向量自回归模型,系统探讨了货币政策不确定性对宏观经济波动与银行系统金融风险的影响。首先,比较现阶段我国主流货币政策不确定性及经济政策不确定性代理指标,发现Huang&Luk (2020)所测度MPU与EPU并不能... 建立了一个中等规模的结构向量自回归模型,系统探讨了货币政策不确定性对宏观经济波动与银行系统金融风险的影响。首先,比较现阶段我国主流货币政策不确定性及经济政策不确定性代理指标,发现Huang&Luk (2020)所测度MPU与EPU并不能对我国宏观经济波动做出较好解释。比较而言,Baker et al.(2016)与Davis et al.(2019)的EPU对我国宏观经济波动影响更符合预期,EPU的影响类似于紧缩性供给冲击,导致产出、固定资产投资以及社会零售消费降低,通货膨胀上升。特别是在EPU_Davis指标存在意外正向冲击时,可能导致银行系统金融风险上升。其次,利用条件波动率思想,重新估计货币政策不确定性(MPU_Volatility),发现无论是简约形式或结构形式估计,所获得MPU_Volatility在波动趋势上大体一致,且MPU_Volatility与EPU_Baker及EPU_Davis对宏观经济作用效果存在较大一致,其中MPU_Volatility与EPU_Davis对银行系统金融风险影响一致。最后,进一步将叙事性EPU_Davis指标与MPU_Volatility结合使用,选用Proxy SVAR对货币政策不确定性结构冲击进行识别,这保证了即使存在测量误差情况下,估计偏误也会大幅降低。实证发现MPU对宏观经济变量造成不利影响,导致银行系统金融风险上升并持续较长时间。脉冲响应结果与EPU_Davis及MPU_Volatility结果相似,这一定程度上支持之前结论的稳健。 展开更多
关键词 货币政策不确定性 银行系统金融风险 虚拟变量结构向量自回归 结构冲击识别 测量误差
原文传递
A Proxy Blind Signature Scheme and an Off-Line Electronic Cash Scheme 被引量:4
8
作者 LIU Jianwei LIU Jianhua QIU Xiufeng 《Wuhan University Journal of Natural Sciences》 CAS 2013年第2期117-125,共9页
To support withdrawing and storing money from all levels of the bank for the customers in the real world, in this paper, we propose a proxy blind signature scheme and an off-line e-cash scheme based on the new proxy b... To support withdrawing and storing money from all levels of the bank for the customers in the real world, in this paper, we propose a proxy blind signature scheme and an off-line e-cash scheme based on the new proxy blind signature scheme. The pro- posed proxy blind signature is proven secure in the random oracle model under chosen-target computational Diffie-Hellman assump- tions, and the e-cash scheme can satisfy the security requirements of unforgeability, anonymity, and traceability. 展开更多
关键词 off-line electronic cash proxy blind signature ran-dom oracle model electronic commerce
原文传递
Identity-Based Proxy Verifiably Encrypted Signature Scheme 被引量:2
9
作者 Liu Jianhua Liu Jianwei Qiu Xiufeng 《China Communications》 SCIE CSCD 2012年第11期137-149,共13页
A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages o... A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages of a proxy signature and a VES in order to delegate the signing capability of the VES of an entity called the original signer to another entity, called the proxy signer. In this IPVES scheme, the original signer delegates his/her signing capability to the proxy signer. The proxy signer issues a signature by using a proxy signing key, encrypts the signature under a designated public key, and subsequently convinces a verifier that the resulting ciphertext contains such a signature. We prove that the proposed IPVES scheme is secure in a random oracle model under the computational Diffie-Hellman assumption. 展开更多
关键词 digital signature proxy signature random oracle model information security
在线阅读 下载PDF
A Proxy Signature Scheme as Secure as Decisional Diffie-Hellman Problem 被引量:1
10
作者 LURong-xing CAOZhen-fu 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期186-190,共5页
Based on decisional Difiie-Hcllman problem, we propose a simpleproxy-protected signature scheme In the random oracle model, we also carry out the strict securityproof for the proposed scheme. The security of the propo... Based on decisional Difiie-Hcllman problem, we propose a simpleproxy-protected signature scheme In the random oracle model, we also carry out the strict securityproof for the proposed scheme. The security of the proposed scheme is not loosely related to thediscrete logarithm assumption hut tightly related to the decisional Diffie-Hellman assumption in therandom oracle model. 展开更多
关键词 proxy signature decisional Diffie-Heliman problem random oracle model
在线阅读 下载PDF
基于Proxy的无线网安全模型研究
11
作者 王维 王彬 王汝传 《无线通信技术》 2004年第4期24-27,共4页
无线局域网技术和其它技术相比尽管有很多优点 ,但是仍然没有被广泛应用 ,最主要的一个原因就是它不能提供足够的安全性。通过无线网传输的数据很可能面临被泄密的危险。本文提供了一种基于 Proxy的无线网安全模型 ,首先分析了无线网被... 无线局域网技术和其它技术相比尽管有很多优点 ,但是仍然没有被广泛应用 ,最主要的一个原因就是它不能提供足够的安全性。通过无线网传输的数据很可能面临被泄密的危险。本文提供了一种基于 Proxy的无线网安全模型 ,首先分析了无线网被攻击的方式 ,然后给出了一些常见的解决无线网安全的技术 ,最后提出了基于 展开更多
关键词 无线网 安全模型 攻击 泄密 无线局域网技术 数据 传输 优点 安全性 危险
原文传递
Identity-Based Key-Insulated Proxy Signature Without Random Oracles
12
作者 陈剑洪 龙宇 +1 位作者 陈克非 王永涛 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期557-566,共10页
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ... In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are kept perfectly secure. However, due to viruses, worms or other break-ins allowed by operating-system holes, key exposure seems inevitable. To minimize the damage caused by key exposure in IBPS, we propose an identity-based key-insulated proxy signature (IBKIPS) scheme in the standard model, i.e. without random oracles. 展开更多
关键词 KEY-INSULATED proxy signature IDENTITY-BASED standard model
原文传递
Secure Proxy Re-Encryption from CBE to IBE
13
作者 CHEN Yan ZHANG Futai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期657-661,共5页
In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. Th... In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. The scheme is non-interactive, unidirectional and collude "safe". Furthermore, it is compatible with current IBE (identity-based encryption) deployments. The scheme has chosen ciphertext security in the random oracle model assuming the hardness of the Decisional Bilinear Diffie-Hellman problem. 展开更多
关键词 proxy re-encryption traditional public key encryption identity-based public key encryption Decisional Bilinear Diffie-Hellman problem random oracle model
原文传递
Provably Secure Short Proxy Signature Scheme from Bilinear Maps
14
作者 胡国政 洪帆 《Journal of Southwest Jiaotong University(English Edition)》 2009年第3期199-206,共8页
An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two shor... An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two short secure signature schemes. One is used for delegating the signing rights and computing the standard signature; the other is used for computing proxy signature. Finally, a security proof of the proposed proxy signature scheme is showed by reducing tightly the security of the proposed proxy signature scheme to the security of the two basic signature schemes. The proposed proxy signature scheme has the shortest ordinary signatures and proxy signatures. Moreover, the proxy signature generation needs no pairing operation and verification needs just two pairing operation. 展开更多
关键词 Security model Provable security proxy signature Bilinear maps
在线阅读 下载PDF
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
15
作者 Caifen Wang Bin Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1857-1878,共22页
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing.One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results.Linearly homomorphic proxy signature(LHPS)is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right.Blockchain has the characteristics of tamper-proof and traceability,and is a new technology to solve data security.However,as far as we know,constructions of LHPS have been few and far between.In addition,the existing LHPS scheme does not focus on homomorphic unforgeability and does not use blockchain technology.Herein,we improve the security model of the LHPS scheme,and the usual existential forgery and homomorphic existential forgery of two types of adversaries are considered.Under the new model,we present a blockchain-based LHPS scheme.The security analysis shows that under the adaptive chosen message attack,the unforgeability of the proposed scheme can be reduced to the CDH hard assumption,while achieving the usual and homomorphic existential unforgeability.Moreover,comparedwith the previous LHPS scheme,the performance analysis shows that our scheme has the same key size and comparable computational overhead,but has higher security. 展开更多
关键词 Homomorphic signature proxy signature security model provable security UNFORGEABILITY
在线阅读 下载PDF
MDCHeS: Model-Driven Dynamic Composition of Heterogeneous Service
16
作者 S. Farokhi A. Ghaffari +1 位作者 H. Haghighi F. Shams 《International Journal of Communications, Network and System Sciences》 2012年第9期644-660,共17页
Web Service Composition provides an opportunity for enterprises to increase the ability to adapt themselves to frequent changes in users' requirements by integrating existing services. Our research has focused on ... Web Service Composition provides an opportunity for enterprises to increase the ability to adapt themselves to frequent changes in users' requirements by integrating existing services. Our research has focused on proposing a framework to support dynamic composition and to use both SOAP-based and RESTful Web services simultaneously in composite services. In this paper a framework called "Model-driven Dynamic Composition of Heterogeneous Service" (MDCHeS) is introduced. It is elaborated in three different ways;each represents a particular view of the framework: data view, which consists of a Meta model and composition elements as well their relationships;process view, which introduces composition phases and used models in each phase;and component view, which shows an abstract view of the components and their interactions. In order to increase the dynamicity of MDCHeS framework, Model Driven Architecture and proxy based ideas are used. 展开更多
关键词 SERVICE-ORIENTED ARCHITECTURE WEB SERVICE Composition RESTFUL WEB SERVICE SOAP-Based WEB SERVICE model Driven ARCHITECTURE proxy SERVICE
在线阅读 下载PDF
Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
17
作者 Yanan Chen Ting Yao +1 位作者 Haiping Ren Zehao Gan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第6期1497-1513,共17页
The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature ne... The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature needs to be converted into a re-signature that can be verified by the new organization.Proxy re-signature(PRS)can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data.Unfortunately,the existing PRS schemes cannot realize forward and backward security.Therefore,this paper proposes the first PRS scheme that can provide key-insulated property,which can guarantee both the forward and backward security of the key.Although the leakage of the private key occurs at a certain moment,the forward and backward key will not be attacked.Thus,the purpose of key insulation is implemented.What’s more,it can update different corresponding private keys in infinite time periods without changing the identity information of the user as the public key.Besides,the unforgeability of our scheme is proved based on the extended Computational Diffie-Hellman assumption in the random oracle model.Finally,the experimental simulation demonstrates that our scheme is feasible and in possession of promising properties. 展开更多
关键词 proxy re-signature key insulation electronic medical record(EHR) random oracle model
在线阅读 下载PDF
基于混合物理数据驱动的油藏地质体CO_(2)利用与封存代理模型研究 被引量:3
18
作者 芮振华 邓海洋 胡婷 《钻采工艺》 北大核心 2025年第1期190-198,共9页
在全球能源转型与能源需求持续增长的背景下,碳捕获、利用和封存(CCUS)已成为极具前景的研究方向。CO_(2)利用与封存协同优化通常依赖大量的组分正演模拟,但三维高分辨率模型计算成本高昂,限制其广泛应用。基于混合物理数据驱动的GPSNe... 在全球能源转型与能源需求持续增长的背景下,碳捕获、利用和封存(CCUS)已成为极具前景的研究方向。CO_(2)利用与封存协同优化通常依赖大量的组分正演模拟,但三维高分辨率模型计算成本高昂,限制其广泛应用。基于混合物理数据驱动的GPSNet模型以其高效的计算效率已成为一种理想的代理模型,然而现有的GPSNet模型难以准确捕获复杂的相行为和组分间的相互作用,为此,文章提出了一种新型专用于组分模拟的comp-GPSNet模型,通过标准失配最小化方法和基于伴随的梯度优化算法对comp-GPSNet模型进行训练,以拟合从高分辨率模拟中获取的井响应数据。将训练后的模型应用到PUNQ-S3油藏中,全面评估复杂条件下comp-GPSNet模型的预测能力,结果表明,comp-GPSNet模型在单井和区块范围内均表现出良好的预测精度,CO_(2)利用率和封存率的预测误差分别为0.16%和3.13%。该模型为CO_(2)利用与封存协同优化提供了一个稳健的代理框架,以推动油田数字化与智能化发展。 展开更多
关键词 CCUS comp-GPSNet 混合物理数据驱动 代理模型 组分模拟
在线阅读 下载PDF
巡飞弹载光电风冷散热系统参数化优化方法研究 被引量:1
19
作者 李智 朱镭 +3 位作者 刘虎 李佳佳 张衡 张桂玮 《应用光学》 北大核心 2025年第3期563-570,共8页
随着巡飞弹武器系统的发展,巡飞弹载光电载荷小型化、多功能、高集成度要求越来越高,伴随而来的散热问题也日益突出。为了解决巡飞弹载光电系统散热性能差的问题,建立了一种基于参数化建模的风冷散热系统优化设计方法。首先确定风冷散... 随着巡飞弹武器系统的发展,巡飞弹载光电载荷小型化、多功能、高集成度要求越来越高,伴随而来的散热问题也日益突出。为了解决巡飞弹载光电系统散热性能差的问题,建立了一种基于参数化建模的风冷散热系统优化设计方法。首先确定风冷散热系统的可设计参数,然后基于拉丁超立方采样方法选取多组样本点,并通过ICEPAK仿真计算得到每个样本点对应输入参数的输出响应,进而建立风冷散热器Kriging代理模型;之后基于代理模型,通过ASA(adaptive simulation annealing)自适应模拟退火算法对风冷散热器进行优化设计;最后将优化结果代入热仿真模型,验证其准确性。以某小型巡飞弹载光电系统为例,对经验设计下的风冷散热器进行热仿真分析,以热源芯片温度最小化为目标进行优化。仿真结果表明:优化后的风冷散热器相比经验设计,可使热源温升降低28.5%,有效提高了巡飞弹载光电系统的散热水平,满足系统设计要求。 展开更多
关键词 巡飞弹载光电系统 风冷散热器 参数化 Kriging代理模型 优化设计
在线阅读 下载PDF
考虑流阻-过滤-承载性能的下管座结构优化研究
20
作者 张博 袁攀 +7 位作者 肖忠 光宏昊 柴振鸿 段鑫 辛勇 朱发文 孙坤 李宝童 《核动力工程》 北大核心 2025年第1期225-231,共7页
为实现燃料组件下管座的冷却剂压降、异物过滤和结构承载等多种性能的综合提升,本研究提出了一种多目标优化方法。该方法以冷却剂压降和异物过滤效率为目标,优化下管座的关键尺寸参数,并以六边形下管座为例开展了尺寸优化研究。结果表明... 为实现燃料组件下管座的冷却剂压降、异物过滤和结构承载等多种性能的综合提升,本研究提出了一种多目标优化方法。该方法以冷却剂压降和异物过滤效率为目标,优化下管座的关键尺寸参数,并以六边形下管座为例开展了尺寸优化研究。结果表明,采用该方法下管座的冷却剂压降和异物过滤的优化幅度分别达到12.5%和6.3%,并且优化后的最大应力同步降低14.0%,性能提升效果显著。本研究建立的多目标优化方法具有通用性,能够适用于其他类型下管座的结构优化以提升其综合性能。 展开更多
关键词 下管座 多目标优化 压降 异物过滤 代理模型 粒子群优化
原文传递
上一页 1 2 16 下一页 到第
使用帮助 返回顶部