期刊文献+
共找到217,344篇文章
< 1 2 250 >
每页显示 20 50 100
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks 被引量:1
1
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
在线阅读 下载PDF
Task Scheduling for Multi-Cloud Computing Subject to Security and Reliability Constraints 被引量:8
2
作者 Qing-Hua Zhu Huan Tang +1 位作者 Jia-Jie Huang Yan Hou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期848-865,共18页
The rise of multi-cloud systems has been spurred.For safety-critical missions,it is important to guarantee their security and reliability.To address trust constraints in a heterogeneous multi-cloud environment,this wo... The rise of multi-cloud systems has been spurred.For safety-critical missions,it is important to guarantee their security and reliability.To address trust constraints in a heterogeneous multi-cloud environment,this work proposes a novel scheduling method called matching and multi-round allocation(MMA)to optimize the makespan and total cost for all submitted tasks subject to security and reliability constraints.The method is divided into two phases for task scheduling.The first phase is to find the best matching candidate resources for the tasks to meet their preferential demands including performance,security,and reliability in a multi-cloud environment;the second one iteratively performs multiple rounds of re-allocating to optimize tasks execution time and cost by minimizing the variance of the estimated completion time.The proposed algorithm,the modified cuckoo search(MCS),hybrid chaotic particle search(HCPS),modified artificial bee colony(MABC),max-min,and min-min algorithms are implemented in CloudSim to create simulations.The simulations and experimental results show that our proposed method achieves shorter makespan,lower cost,higher resource utilization,and better trade-off between time and economic cost.It is more stable and efficient. 展开更多
关键词 Multi-cloud environment multi-quality of service(QoS) reliability security task scheduling
在线阅读 下载PDF
Security-Reliability Analysis and Optimization for Cognitive Two-Way Relay Network with Energy Harvesting
3
作者 Luo Yi Zhou Lihua +3 位作者 Dong Jian Sun Yang Xu Jiahui Xi Kaixin 《China Communications》 SCIE CSCD 2024年第11期163-179,共17页
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node... This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm. 展开更多
关键词 artificial noise energy harvesting cognitive two-way relay network hardware impairments physical layer security security-reliability tradeoff self-adaptive quantum particle swarm optimization
在线阅读 下载PDF
Security Engineering of SOA Applications Via Reliability Patterns
4
作者 Luigi Coppolino Luigi Romano Valerio Vianello 《Journal of Software Engineering and Applications》 2011年第1期1-8,共8页
Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve rel... Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services. 展开更多
关键词 reliability of security SERVICES reliability PATTERNS WORKFLOW Systems SOA APPLICATIONS Web SERVICES Technology
在线阅读 下载PDF
Reliability and sensitivity analysis of loop-designed security and stability control system in interconnected power systems 被引量:6
5
作者 Shenghu Li Huimin Zhou +2 位作者 Yunsong Yan Wei Han Jianfeng Ren 《Global Energy Interconnection》 EI CAS CSCD 2022年第5期501-511,共11页
Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Fai... Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Failure of a station or channel can cause all the execution stations(EXs)to be out of control.The randomness of the controllable capacity of the EXs increases the difficulty of the reliability evaluation of the SSCS.In this study,the loop designed SSCS and reliability analysis are examined for the interconnected systems.The uncertainty analysis of the controllable capacity based on the evidence theory for the SSCS is proposed.The bidirectional and loop channels are introduced to reduce the layers and stations of the existing SSCS with tree configuration.The reliability evaluation and sensitivity analysis are proposed to quantify the controllability and vulnerable components for the SSCS in different configurations.By aiming at the randomness of the controllable capacity of the EXs,the uncertainty analysis of the controllable capacity of the SSCS based on the evidence theory is proposed to quantify the probability of the SSCS for balancing the active power deficiency of the grid. 展开更多
关键词 security and stability control system(SSCS) Loop design CONTROLLABILITY VULNERABILITY Interconnected power systems Evidence theory Uncertainty controllable capacity.
在线阅读 下载PDF
Design and implementation of a computer endpoint security baseline verification system based on MLPS 2.0
6
作者 Fan Miao YaQiong Xu +3 位作者 ZiYang Wan YingJie Zhuang Yang Li JiaPeng Ren 《Railway Sciences》 2026年第1期136-152,共17页
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr... Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework. 展开更多
关键词 Windows security baseline Endpoint security Baseline inspection Xinchuang system security baseline
在线阅读 下载PDF
Pathways to improved food and nutrition security:The role of farm production diversity in household dietary outcomes in rural areas of Pakistan
7
作者 Muhammad Waseem Erbao Cao +2 位作者 Ihsan Jamil Bushra Mughal Mi Yu 《Journal of Integrative Agriculture》 2026年第1期377-389,共13页
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)... Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives. 展开更多
关键词 food security nutrition security FPD HHDS smallholder farmers
在线阅读 下载PDF
A Nexus for East Africa--China-supported projects help East Africans to boost energy, water and food security
8
作者 RICHARD WETAYA 《ChinAfrica》 2026年第1期44-45,共2页
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B... Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years. 展开更多
关键词 water security solar technology NEXUS irish potatoes East Africa energy security China supported projects agrivoltaics technologya
原文传递
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
9
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
A condition control-based dual-reliability evaluation for structural health monitoring
10
作者 Qiuhui XU Shenfang YUAN +1 位作者 Jian CHEN Hutao JING 《Chinese Journal of Aeronautics》 2026年第1期247-262,共16页
It is well recognized that Structural Health Monitoring(SHM)reliability evaluation is a key aspect that needs to be urgently addressed to promote the wide application of SHM methods.However,the existing studies typica... It is well recognized that Structural Health Monitoring(SHM)reliability evaluation is a key aspect that needs to be urgently addressed to promote the wide application of SHM methods.However,the existing studies typically transfer the Non-Destructive Testing/Evaluation(NDT/E)reliability metrics to SHM without a systematic analysis of where these metrics originated.Seldom attentions are paid to the evaluation conditions which are very important to apply these metrics.Aimed at this issue,a new condition control-based Dual-Reliability Evaluation(Dual-RE)method for SHM is proposed.This new method is proposed based on a systematic analysis of the whole framework of reliability evaluation from instrument to NDT,and emphasis is paid to the evaluation condition control.Based on these analyses,considering the special online application scenario of SHM,the proposed Dual-RE method contains two key components:Integrated Sensor-based SHM-RE(IS-SHM-RE)and Critical Service Condition-based SHM-RE(CSC-SHM-RE).ISSHM-RE evaluates the reliability of integrated SHM sensor and system themselves under approximate repeatability conditions,while CSC-SHM-RE assesses SHM reliability under the dominant uncertainties during service,namely intermediate conditions.To demonstrate the Dual-RE,crack monitoring by using the Guided Wave-based-SHM(GW-SHM)on aircraft lug structures is taken as a case study.Both the crack detection and sizing performance are evaluated from accuracy and uncertainty. 展开更多
关键词 Crack detection and sizing Dual-reliability evaluation Evaluation condition control Guided wave-based monitoring reliability evaluation Structural health monitoring
原文传递
Paths of China’s Participation in Middle East Security Governance:From the Perspective of the Global Security Initiative
11
作者 Yu Guoqing 《Contemporary World》 2025年第5期32-38,共7页
The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by Ch... The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by China provides theoretical guidance and practical paths for China’s participation in Middle East security governance.China’s engagement in Middle East security governance not only meets the expectations of Middle East countries but also fully demonstrates its responsibility as a major country,which is of great significance for China to explore participation in global security governance and address the global security deficit. 展开更多
关键词 Middle East security Governance middle east Palestinian Israeli Conflict Major Country Responsibility security governance Global security Deficit global security initiative gsi proposed Global security Initiative
在线阅读 下载PDF
China’s Sea Lines of Communication Security: A Perspective from a Holistic Approach to National Security
12
作者 Wang Xu 《China International Studies》 2025年第4期31-68,共38页
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ... Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens. 展开更多
关键词 holistic approach economic securitythe citizen safety sea lines communication slocs security national security sea lines communication security economic security
在线阅读 下载PDF
Exploring the Reliability and Validity of AI Scoring in the Continuation Writing Task
13
作者 Jie Zhang Chunhua Ma 《Chinese Journal of Applied Linguistics》 2026年第1期133-150,161,共19页
This study examines the reliability and validity of AI-generated scoring for continuation writing tasks.By comparing GPT-4 with eight experienced human raters across 21 student responses,it evaluates AI’s consistency... This study examines the reliability and validity of AI-generated scoring for continuation writing tasks.By comparing GPT-4 with eight experienced human raters across 21 student responses,it evaluates AI’s consistency,severity,and alignment with human scoring criteria.Results show that AI exhibits high self-consistency and adapts effectively to different scoring roles(e.g.,teacher vs.highstakes rater).However,AI scores were more lenient than human raters and demonstrated divergent evaluation focuses—prioritizing narrative coherence and emotional depth,while teachers emphasized linguistic accuracy and richness of detail.The findings suggest AI’s potential as a supplementary assessment tool,offering rapid,holistic feedback,but highlight the need for further calibration to align with educational standards.Implications include exploring hybrid evaluation models that leverage the strengths of both AI and human raters to achieve more equitable,efficient,and pedagogically meaningful writing assessments. 展开更多
关键词 continuation writing AI scoring human raters reliability validity
在线阅读 下载PDF
Dynamic balance and reliability of a stochastic ecosystem with Markov switching
14
作者 Ya-Nan Sun Xin-Zhi Liu You-Ming Lei 《Chinese Physics B》 2026年第1期381-390,共10页
A stochastic predator-prey system with Markov switching is explored.We have developed a new chasing technique to efficiently solve the Fokker-Planck-Kolmogorov and backward Kolmogorov equations.Dynamic balance and rel... A stochastic predator-prey system with Markov switching is explored.We have developed a new chasing technique to efficiently solve the Fokker-Planck-Kolmogorov and backward Kolmogorov equations.Dynamic balance and reliability of the switching system are evaluated via stationary probability density function and first-passage failure theory,taking into account factors such as switching frequencies,noise intensities,and initial conditions.Results reveal that Markov switching leads to stochastic P-bifurcation,enhancing dynamic balance and reducing white-noise-induced oscillations.But frequent switching can heighten initial value dependence,harming reliability.Further,the influence of the subsystem on the switching system is not proportional to its action probabilities.Monte Carlo simulations validate the findings,offering an in-depth exploration of these dynamics. 展开更多
关键词 stochastic ecosystem Markov switching first-passage failure reliability
原文传递
Demonstration of InSnO thin-film transistors with superior uniformity and reliability utilizing SiO_(2)passivation
15
作者 Tingrui Huang Jie Cao +7 位作者 Zuoxu Yu Yuzhen Zhang Wenting Xu Xifeng Li Cong Peng Weifeng Sun Guangan Yang Wangran Wu 《Journal of Semiconductors》 2026年第2期15-21,共7页
In this work,we demonstrated the InSnO(ITO)TFTs passivated with SiO_(2)via the PECVD process compatible with large-area production for the first time.The passivated ITO TFTs with various channel thicknesses(t_(ch)=4,5... In this work,we demonstrated the InSnO(ITO)TFTs passivated with SiO_(2)via the PECVD process compatible with large-area production for the first time.The passivated ITO TFTs with various channel thicknesses(t_(ch)=4,5,6 nm)exhibit excellent electrical performance and superior uniformity.The reliability properties of ITO TFTs were evaluated in detail under positive bias stress(PBS)conditions before and after passivation.Compared to the devices without passivation,the passivated devices have only 50%threshold voltage degradation(ΔV_(th))and 50%newly generated traps due to excellent isolation of the ambient atmosphere.The negligible performance degradation of ITO TFTs with passivation during negative bias stress(NBS)and negative bias temperature stress(NBTS)verifies the outstanding immunity to the water vapor of the SiO_(2)passivation layer.Overall,the ITO TFT with the t_(ch)of 6 nm and with SiO_(2)passivation exhibits the best performance in terms of electrical properties,uniformity,and reliability,which is promising in large-area production. 展开更多
关键词 thin film transistor reliability INSNO SiO_(2)
在线阅读 下载PDF
Combined Fault Tree Analysis and Bayesian Network for Reliability Assessment of Marine Internal Combustion Engine
16
作者 Ivana Jovanović Çağlar Karatuğ +1 位作者 Maja Perčić Nikola Vladimir 《哈尔滨工程大学学报(英文版)》 2026年第1期239-258,共20页
This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for ... This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for identifying critical failure modes and their root causes,while BN introduces flexibility in probabilistic reasoning,enabling dynamic updates based on new evidence.This dual methodology overcomes the limitations of static FTA models,offering a comprehensive framework for system reliability analysis.Critical failures,including External Leakage(ELU),Failure to Start(FTS),and Overheating(OHE),were identified as key risks.By incorporating redundancy into high-risk components such as pumps and batteries,the likelihood of these failures was significantly reduced.For instance,redundant pumps reduced the probability of ELU by 31.88%,while additional batteries decreased the occurrence of FTS by 36.45%.The results underscore the practical benefits of combining FTA and BN for enhancing system reliability,particularly in maritime applications where operational safety and efficiency are critical.This research provides valuable insights for maintenance planning and highlights the importance of redundancy in critical systems,especially as the industry transitions toward more autonomous vessels. 展开更多
关键词 Fault tree analysis Bayesian network reliability REDUNDANCY Internal combustion engine
在线阅读 下载PDF
Evaluation of Deterioration Law and Reliability of Concrete after Durability Improvement Based on Wiener Theory
17
作者 SHI Hongzhuang SU Fuyun +3 位作者 QIAO Hongxia ZHANG Lei FU Yong YANG Xiaosen 《Journal of Wuhan University of Technology(Materials Science)》 2026年第1期147-161,共15页
To study the durability of concrete in harsh environments in Northwest China,concrete was prepared with various durability-improving materials such as concrete anti-erosion inhibitor(SBT-TIA),acrylate polymer(AP),supe... To study the durability of concrete in harsh environments in Northwest China,concrete was prepared with various durability-improving materials such as concrete anti-erosion inhibitor(SBT-TIA),acrylate polymer(AP),super absorbent resin(SAP).The erosion mode and internal deterioration mechanism under salt freeze-thaw cycle and dry-wet cycle were explored.The results show that the addition of enhancing materials can effectively improve the resistance of concrete to salt freezing and sulfate erosion:the relevant indexes of concrete added with X-AP and T-AP are improved after salt freeze-thaw cycles;concrete added with SBTTIA shows optimal sulfate corrosion resistance;and concrete added with AP displays the best resistance to salt freezing.Microanalysis shows that the increase in the number of cycles decreases the generation of internal hydration products and defects in concrete mixed with enhancing materials and improves the related indexes.Based on the Wiener model analysis,the reliability of concrete with different lithologies and enhancing materials is improved,which may provide a reference for the application of manufactured sand concrete and enhancing materials in Northwest China,especially for the study of the improvement effects and mechanism of enhancing materials on the performance of concrete. 展开更多
关键词 manufactured sand concrete durability enhancement enhancing materials reliability analysis
原文传递
Research on the reliability of motion accuracy for ammunition conveyor in artillery automatic loading system
18
作者 Guangsong Chen Junhua Chen +1 位作者 Jinsong Tang Yongji Liu 《Chinese Journal of Mechanical Engineering》 2026年第1期102-114,共13页
The automatic loading systems of artillery are critical for the accurate,efficient,and reliable delivery of pro-jectiles and propellants into the gun chamber.In modern artillery,the ammunition conveyor serves as the e... The automatic loading systems of artillery are critical for the accurate,efficient,and reliable delivery of pro-jectiles and propellants into the gun chamber.In modern artillery,the ammunition conveyor serves as the end effector of the automatic loading system,and its motion state significantly impacts the accuracy of projectiles.Therefore,it is of immense importance to precisely and effectively evaluate the reliability of the motion accuracy of the ammunition conveyor.This paper aims to propose a practical and efficient analysis method for evaluating the reliability of the motion accuracy of the ammunition conveyor.The proposed approach involves the use of a deep learning network to approximate the physical model and the extremum method to obtain a single cycle sequence decoupling strategy for solving the time-varying reliability issue of complex systems.Employing this strategy,the time-varying reliability of the ammunition conveyor is transformed into a static reliability problem.The proposed method includes the use of a deep feedforward neural network,second-order saddle point ap-proximation(SPA)method,extremum method,and efficient global optimization(EGO)technology.The results reveal that the reliability of the motion accuracy of the ammunition conveyor is 93.42%,with the maximum failure probability occurring at 0.21 s.These results serve as an important reference for the structural optimi-zation design of the ammunition conveyor based on reliability and the maintenance of the operational process. 展开更多
关键词 Automatic loading system Ammunition conveyor Motion accuracy reliability Second-order saddle point approximation
在线阅读 下载PDF
Transmission patterns of progressive damage and reliability analysis of reservoir-induced landslides considering local tensile failure
19
作者 Minghao Miao Huiming Tang +5 位作者 Yinlong Jiang Kun Fang Changdong Li Cheng He Peng Cao Sha Lu 《Journal of Rock Mechanics and Geotechnical Engineering》 2026年第2期913-931,共19页
Reservoir-induced landslides in China's Three Gorges Reservoir area are prone to tensile cracks due to the influenceof their own weight and fluctuationsin water levels.The presence of cracks indicates that the ten... Reservoir-induced landslides in China's Three Gorges Reservoir area are prone to tensile cracks due to the influenceof their own weight and fluctuationsin water levels.The presence of cracks indicates that the tensile stress in the area has exceeded the tensile strength of the soil,leading to local instability.To explore the impact of tensile failure behavior on the stability and failure modes of reservoir landslides,the Huangtupo Riverside Slump#1 is taken as a case study.By considering local tensile failure,potential tensile cracks are incorporated into the analysis via the limit equilibrium method and reliability theory.The reliability of landslides under different tensile failure scenarios is quantified.Strain-softening characteristics of the soil are combined to further analyze the failure transmission path of the landslide.Finally,these potential failure modes were validated through physical model tests.The results show that cracks developing at rear positions reduce the stability of the slope and increase the probability of instability.During the destruction process,retrogressive failures with multiple sliding surfaces are likely to occur.However,tensile failure at the forefront reduces the likelihood of an individual slide mass descending.Progressive failure results in both regular and skip transmission patterns.Additionally,cracks and water level changes can also lead to shifts in the positions of the most dangerous blocks.Therefore,in practical landslide analysis and prevention,it is necessary to consider local tensile damage and identify potential tensile crack locations in advance to optimize prevention measures and accurately evaluate landslide risk. 展开更多
关键词 reliability analysis Tensile failure Reservoir landslide Progressive damage Failure mode Tensile crack
在线阅读 下载PDF
Structural Reliability Analysis Based on Differential Evolution Algorithm and Hypersphere Integration
20
作者 CHEN Zhenzhong HAN Zhuo +4 位作者 WANG Peiyu PAN Qianghua LI Xiaoke GAN Xuehui CHEN Ge 《Journal of Donghua University(English Edition)》 2026年第1期118-130,共13页
In reliability analyses,the absence of a priori information on the most probable point of failure(MPP)may result in overlooking critical points,thereby leading to biased assessment outcomes.Moreover,second-order relia... In reliability analyses,the absence of a priori information on the most probable point of failure(MPP)may result in overlooking critical points,thereby leading to biased assessment outcomes.Moreover,second-order reliability methods exhibit limited accuracy in highly nonlinear scenarios.To overcome these challenges,a novel reliability analysis strategy based on a multimodal differential evolution algorithm and a hypersphere integration method is proposed.Initially,the penalty function method is employed to reformulate the MPP search problem as a conditionally constrained optimization task.Subsequently,a differential evolution algorithm incorporating a population delineation strategy is utilized to identify all MPPs.Finally,a paraboloid equation is constructed based on the curvature of the limit-state function at the MPPs,and the failure probability of the structure is calculated by using the hypersphere integration method.The localization effectiveness of the MPPs is compared through multiple numerical cases and two engineering examples,with accuracy comparisons of failure probabilities against the first-order reliability method(FORM)and the secondorder reliability method(SORM).The results indicate that the method effectively identifies existing MPPs and achieves higher solution precision. 展开更多
关键词 reliability analysis design point positioning differential evolution algorithm hypersphere integration
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部