期刊文献+
共找到390,386篇文章
< 1 2 250 >
每页显示 20 50 100
Hidden Concerns and Countermeasures for China’s Green Energy Mineral Resource Supply Security
1
作者 Fang Ruirui Liu Guizhou +3 位作者 Dou Lirong Hu Ning Xia Xiaodi Feng Lianyong 《China Oil & Gas》 2025年第5期47-52,共6页
Achieving the dual carbon goal through energy transition has become a global consensus.The increasingly recognized of mineral resources is increasingly recognized due to their role in determining the pace of energy tr... Achieving the dual carbon goal through energy transition has become a global consensus.The increasingly recognized of mineral resources is increasingly recognized due to their role in determining the pace of energy transition.China has a leading capacity in the production and processing of certain minerals.However,because the major sources are abroad,China still faces certain disadvantages in acquiring upstream resources.In response to the complex international situation and high consumption demand。 展开更多
关键词 mineral resources dual carbon goal COUNTERMEASURES Chinas green energy mineral resource supply security achieving dual carbon goal energy transition hidden concerns
在线阅读 下载PDF
Sustainable development at the crossroads: Geopolitical risks, natural resource scarcity, and renewable energy in energy security transitions
2
作者 Jinjun Zhang Xiao-feng Liu 《Geoscience Frontiers》 2025年第5期485-498,共14页
Energy security is a crucial aspect of modern societies,as it directly impacts the availability,accessibility,and reliability of energy sources.The reliance on natural resources and geopolitical factors in shaping ene... Energy security is a crucial aspect of modern societies,as it directly impacts the availability,accessibility,and reliability of energy sources.The reliance on natural resources and geopolitical factors in shaping energy security has gained significant attention in recent years.Natural resources and geopolitical risk are examined in 38 countries at risk of geopolitical conflict between 1990 and 2021 by examining CO_(2) emissions,renewable energy consumption,and foreign direct investment as controlling variables.The long-run analysis conducted in this study focused on slope heterogeneity,Westerlund cointegration,and dynamic panel data estimation.The findings indicated that the energy security index is positively associated with various determinants,including natural resources,geopolitical risk,CO_(2) emissions,and renewable energy consumption.However,foreign direct investment was found to be negatively associated with the energy security index among the selected 38 geopolitical risk countries.The role of natural resources and geopolitical risk in energy security cannot be overlooked.Natural resources provide the raw materials for generating electricity and powering our societies,while geopolitical risks can disrupt energy supply chains and threaten stability.Achieving sustainable energy security requires a comprehensive approach that addresses both aspects of energy provision.Transitioning to renewable energy sources,improving energy efficiency,diversifying energy supplies,promoting international cooperation,and conserving natural resources are essential steps towards a more sustainable and resilient energy future. 展开更多
关键词 Energy security risk Natural resource management Renewable energy transition CO_(2)emissions Sustainable investment resource-dependent economies
在线阅读 下载PDF
国家安全情报研究核心著者群体画像与研究洞察——基于Intelligence and National Security期刊的分析
3
作者 胡雅萍 肖咏歌 《科技情报研究》 2026年第1期12-22,共11页
[目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and Natio... [目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and National Security期刊中筛选出核心著者,运用履历分析法将国外核心著者履历划分为学科背景、研究方向、科研成果和工作经历4个核心类属进行比较分析,采用LDA主题模型对发文进行主题挖掘,系统识别出情报研究者关注的核心议题。[结果/结论]核心著者群体呈现显著的男性主导、中老年资深学者为主、机构高度集中、学科背景偏重传统人文社科的特征;安全情报研究面临跨学科深度融合不足、学界与实践存在隔阂、技术伦理与法律探讨滞后等问题。 展开更多
关键词 履历分析 核心著者 情报研究 LDA主题挖掘 国家安全情报 群体画像
在线阅读 下载PDF
Protection path and security-metric-based resource allocation algorithm in quantum key distribution optical networks
4
作者 Li Liu Shengtong Zhai +1 位作者 Yao Pu Xu Zhang 《Chinese Physics B》 2025年第9期73-83,共11页
Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problem... Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks. 展开更多
关键词 quantum key distribution(QKD) optical network security metric protection path
原文传递
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
5
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Design and implementation of a computer endpoint security baseline verification system based on MLPS 2.0
6
作者 Fan Miao YaQiong Xu +3 位作者 ZiYang Wan YingJie Zhuang Yang Li JiaPeng Ren 《Railway Sciences》 2026年第1期136-152,共17页
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr... Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework. 展开更多
关键词 Windows security baseline Endpoint security Baseline inspection Xinchuang system security baseline
在线阅读 下载PDF
Pathways to improved food and nutrition security:The role of farm production diversity in household dietary outcomes in rural areas of Pakistan
7
作者 Muhammad Waseem Erbao Cao +2 位作者 Ihsan Jamil Bushra Mughal Mi Yu 《Journal of Integrative Agriculture》 2026年第1期377-389,共13页
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)... Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives. 展开更多
关键词 food security nutrition security FPD HHDS smallholder farmers
在线阅读 下载PDF
MWaOA:A Bio-Inspired Metaheuristic Algorithm for Resource Allocation in Internet of Things
8
作者 Rekha Phadke Abdul Lateef Haroon Phulara Shaik +3 位作者 Dayanidhi Mohapatra Doaa Sami Khafaga Eman Abdullah Aldakheel N.Sathyanarayana 《Computers, Materials & Continua》 2026年第2期1285-1310,共26页
Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart ... Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices.Furthermore,the IoT plays a key role in multiple domains,including industrial automation,smart homes,and intelligent transportation systems.However,an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness.To address these issue,this research proposes a Modified Walrus Optimization Algorithm(MWaOA)for effective resource management in smart IoT systems.In the proposed MWaOA,a crowding process is incorporated to maintain diversity and avoid premature convergence thereby enhancing the global search capability.During resource allocation,the MWaOA prevents early convergence,which aids in achieving a better balance between the exploration and exploitation phases during optimization.Empirical evaluations show that the MWaOA reduces energy consumption by approximately 4% to 34%and minimizes the response time by 6% to 33% across different service arrival rates.Compared to traditional optimization algorithms,MWaOA reduces energy consumption by 5% to 30%and minimizes the response time by 4% to 28% across different simulation epochs.The proposed MWaOA provides adaptive and robust resource allocation,thereby minimizing transmission cost while considering network constraints and real-time performance parameters. 展开更多
关键词 Delay GATEWAY internet of things resource allocation resource management walrus optimization algorithm
在线阅读 下载PDF
A Nexus for East Africa--China-supported projects help East Africans to boost energy, water and food security
9
作者 RICHARD WETAYA 《ChinAfrica》 2026年第1期44-45,共2页
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B... Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years. 展开更多
关键词 water security solar technology NEXUS irish potatoes East Africa energy security China supported projects agrivoltaics technologya
原文传递
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
10
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
Flexible resource allocation for power systems to maximize diversified values in resilience,carbon reduction and renewable energy consumption
11
作者 Zhaohong Bie Yiheng Bian Chenxing Yang 《iEnergy》 2026年第1期43-54,共12页
The energy transition inspired by carbon neutrality targets and the increasing threat of extreme events raise multi-objective development requirements for power systems.This paper proposes a multi-objective resource a... The energy transition inspired by carbon neutrality targets and the increasing threat of extreme events raise multi-objective development requirements for power systems.This paper proposes a multi-objective resource allocation model to determine the type,number and location of flexible resources to increase the values of resilience,carbon reduction and renewable energy consumption.To evaluate the values of resilience,a restoration model for transmission systems is established that considers the coordination of fossil-fuel generators,energy storage systems(ESSs)and renewable energy generators in building restoration paths.The collaborative power-carbon-tradable green certificate(TGC)market model is then applied to evaluate the resource values in terms of carbon reduction and renewable energy consumption.Finally,the model is formulated as a mixed-integer linear programming(MILP)with a nonconvex feasible domain,and the normalized normal constraint(NNC)method is applied to obtain approximate Pareto frontiers for decision makers.Case studies validate the effectiveness of the proposed model in improving multi-factor values and analyze the impact of resource regulation capacity on values of restoration and carbon reduction. 展开更多
关键词 Multi-objective planning Power system Carbon reduction RESILIENCE Flexible resource
在线阅读 下载PDF
Research on the Optimal Allocation of Community Elderly Care Service Resources Based on Big Data Technology
12
作者 Shuying Li 《Journal of Clinical and Nursing Research》 2026年第1期241-246,共6页
With the accelerating aging process of China’s population,the demand for community elderly care services has shown diversified and personalized characteristics.However,problems such as insufficient total care service... With the accelerating aging process of China’s population,the demand for community elderly care services has shown diversified and personalized characteristics.However,problems such as insufficient total care service resources,uneven distribution,and prominent supply-demand contradictions have seriously affected service quality.Big data technology,with core advantages including data collection,analysis and mining,and accurate prediction,provides a new solution for the allocation of community elderly care service resources.This paper systematically studies the application value of big data technology in the allocation of community elderly care service resources from three aspects:resource allocation efficiency,service accuracy,and management intelligence.Combined with practical needs,it proposes optimal allocation strategies such as building a big data analysis platform and accurately grasping the elderly’s care needs,striving to provide operable path references for the construction of community elderly care service systems,promoting the early realization of the elderly care service goal of“adequate support and proper care for the elderly”,and boosting the high-quality development of China’s elderly care service industry. 展开更多
关键词 Big data technology COMMUNITY Elderly care Service resources
在线阅读 下载PDF
Design of a Patrol and Security Robot with Semantic Mapping and Obstacle Avoidance System Using RGB-D Camera and LiDAR
13
作者 Shu-Yin Chiang Shin-En Huang 《Computers, Materials & Continua》 2026年第4期1735-1753,共19页
This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obsta... This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments. 展开更多
关键词 RGB-D semantic mapping object recognition obstacle avoidance security robot
在线阅读 下载PDF
Robust UAV-Assisted Jamming Secure Performance Improvement for Cognitive UAV Networks:Joint Resource Allocation and Trajectory Design
14
作者 Sun Ruomei Wu Yuhang +2 位作者 Tao Zhenhui Zhou Fuhui Wu Qihui 《China Communications》 2026年第2期137-149,共13页
Cognitive unmanned aerial vehicle(UAV)is promising to tackle the spectrum scarcity problem faced by UAV communications.However,the secure information transmission is challenging due to the open nature of the spectrum ... Cognitive unmanned aerial vehicle(UAV)is promising to tackle the spectrum scarcity problem faced by UAV communications.However,the secure information transmission is challenging due to the open nature of the spectrum sharing.In order to tackle this issue,a cognitive UAV network with cooperative jamming is studied in this paper.A robust resource allocation and trajectory joint optimization problem is formulated by considering the practical case that the channel state information(CSI)cannot be accurately obtained.An iterative algorithm is proposed to address this challenging non-convex problem.Simulation results demonstrate that the worst case robust resource allocation design can realize the secure communications even under the imperfect CSI.Moreover,compared with other benchmark schemes,the proposed scheme can achieve secure performance improvement. 展开更多
关键词 cognitive radio physical layer security robust design UAV communications
在线阅读 下载PDF
Occurrence modes and comprehensive utilization of critical metal resources associated with coal:A review
15
作者 Qin Zhang Wei Cheng +6 位作者 Tiebin Zhang Hongbo Liu Jiwei Yuan Aoao Chen Tingshun Wang Qian Liu Jianghe Wang 《International Journal of Mining Science and Technology》 2026年第2期277-293,共17页
Coal serves not only as a crucial energy resource but also as a significant reservoir of critical metal elements,including Lithium(Li),Gallium(Ga),Germanium(Ge),and rare earth elements(REE).This paper provides a syste... Coal serves not only as a crucial energy resource but also as a significant reservoir of critical metal elements,including Lithium(Li),Gallium(Ga),Germanium(Ge),and rare earth elements(REE).This paper provides a systematic review of the enrichment characteristics,occurrence modes,and comprehensive utilization potential of these critical metals in coal.Globally,the distribution of these metal resources exhibits significant regional heterogeneity.While the concentration in most coals falls below industrial cut-off grades,anomalous enrichment in specific coal basins results in Li,Ga,Ge,and REE concentrations far exceeding global averages,highlighting their considerable potential as unconventional metal deposits.The occurrence modes of these metals are diverse:Li is primarily hosted in mineral phases;Ga exists in inorganic,organic,and complex forms;Ge shows a strong association with organic matter;and REE are mainly present in adsorbed/isomorphic forms within clay minerals,while also displaying organic affinity.Direct extraction of metals from raw coal is often cost-prohibitive;effective recovery is therefore more feasible when integrated with coal processing.Metals are further enriched in solid wastes such as coal gangue,fly ash,and bottom ash,from which recovery is more economically and technically viable.Current comprehensive utilization primarily employs integrated mineral processing-hydrometallurgy approaches.Future research should focus on elucidating the precise occurrence forms of metals in coal and solid wastes,optimizing pre-treatment methods,and selecting effective activators and leachants.Advancing the synergistic extraction and green recovery of multiple associated resources from coal and its by-products is essential for achieving high-value,comprehensive utilization of coal-based resources. 展开更多
关键词 Coal-associated resources Lithium GALLIUM GERMANIUM Rare carth elements Extraction and separation
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
16
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Research on Vehicle Joint Radar Communication Resource Optimization Method Based on GNN-DRL
17
作者 Zeyu Chen Jian Sun +1 位作者 Zhengda Huan Ziyi Zhang 《Computers, Materials & Continua》 2026年第2期1430-1446,共17页
To address the issues of poor adaptability in resource allocation and low multi-agent cooperation efficiency in Joint Radar and Communication(JRC)systems under dynamic environments,an intelligent optimization framewor... To address the issues of poor adaptability in resource allocation and low multi-agent cooperation efficiency in Joint Radar and Communication(JRC)systems under dynamic environments,an intelligent optimization framework integrating Deep Reinforcement Learning(DRL)and Graph Neural Network(GNN)is proposed.This framework models resource allocation as a Partially Observable Markov Game(POMG),designs a weighted reward function to balance radar and communication efficiencies,adopts the Multi-Agent Proximal Policy Optimization(MAPPO)framework,and integrates Graph Convolutional Networks(GCN)and Graph Sample and Aggregate(Graph-SAGE)to optimize information interaction.Simulations show that,compared with traditional methods and pure DRL methods,the proposed framework achieves improvements in performance metrics such as communication success rate,Average Age of Information(AoI),and policy convergence speed,effectively enabling resource management in complex environments.Moreover,the proposed GNN-DRL-based intelligent optimization framework obtains significantly better performance for resource management in multi-agent JRC systems than traditional methods and pure DRL methods. 展开更多
关键词 Graph neural network joint radar and communication resource allocation multi-agent collaboration
在线阅读 下载PDF
Dynamic Resource Allocation for Multi-Priority Requests Based on Deep Reinforcement Learning in Elastic Optical Network
18
作者 Zhou Yang Yang Xin +1 位作者 Sun Qiang Yang Zhuojia 《China Communications》 2026年第2期312-327,共16页
As the types of traffic requests increase,the elastic optical network(EON)is considered as a promising architecture to carry multiple types of traffic requests simultaneously,including immediate reservation(IR)and adv... As the types of traffic requests increase,the elastic optical network(EON)is considered as a promising architecture to carry multiple types of traffic requests simultaneously,including immediate reservation(IR)and advance reservation(AR).Various resource allocation schemes for IR/AR requests have been designed in EON to reduce bandwidth blocking probability(BBP).However,these schemes do not consider different transmission requirements of IR requests and cannot maintain a low BBP for high-priority requests.In this paper,multi-priority is considered in the hybrid IR/AR request scenario.We modify the asynchronous advantage actor critic(A3C)model and propose an A3C-assisted priority resource allocation(APRA)algorithm.The APRA integrates priority and transmission quality of IR requests to design the A3C reward function,then dynamically allocates dedicated resources for different IR requests according to the time-varying requirements.By maximizing the reward,the transmission quality of IR requests can be matched with the priority,and lower BBP for high-priority IR requests can be ensured.Simulation results show that the APRA reduces the BBP of high-priority IR requests from 0.0341 to0.0138,and the overall network operation gain is improved by 883 compared to the scheme without considering the priority. 展开更多
关键词 deep reinforcement learning dynamic resource allocation elastic optical network multipriority requests
在线阅读 下载PDF
Turning Black Waste into a Green Resource
19
作者 LIU JING 《China Today》 2026年第1期68-70,共3页
To deal with a polluted by-product of coal production,central China’s Shanxi Province has explored a governance path that addresses both the symptoms and root causes.
关键词 black waste green resource polluted product shanxi province coal production governance path
在线阅读 下载PDF
Water resources and sustainable management in Tajikistan under global change
20
作者 CHEN Yaning FANG Gonghuan +5 位作者 LI Zhi ZHANG Xueqi LI Weihong Nekruz GULAHMADOV Farhod NASRULLOEV Aminjon GULAKHMADOV 《Regional Sustainability》 2026年第1期1-10,共10页
As a major source of freshwater in Central Asia,Tajikistan is endowed with abundant glaciers and water resources.However,the country faces multiple challenges,including accelerated glacier retreat,complex inter-govern... As a major source of freshwater in Central Asia,Tajikistan is endowed with abundant glaciers and water resources.However,the country faces multiple challenges,including accelerated glacier retreat,complex inter-government water resource management,and inefficient water use.Existing research has predominantly focused on individual hydrological processes,such as glacier retreat,snow cover change,or transboundary water issues,but it has yet to fully capture the overall complexity of water system.Tajikistan’s water system functions as an integrated whole from mountain runoff to downstream supply,but a comprehensive study of its water resource has yet to be conducted.To address this research gap,this study systematically examined the status,challenges,and sustainable management strategies of Tajikistan’s water resources based on a literature review,remote sensing data analysis,and case studies.Despite Tajikistan’s relative abundance of water resources,global warming is accelerating glacier melting and altering the hydrological cycles,which have resulted in unstable runoff patterns and heightened risks of extreme events.In Tajikistan,outdated infrastructure and poor management are primary causes of low water-use efficiency in the agricultural sector,which accounts for 85.00%of the total water withdrawals.At the governance level,Tajikistan faces challenges in balancing the water-energy-food nexus and transboundary water resource issues.To address these issues,this study proposes core paths for Tajikistan to achieve sustainable water resource management,such as accelerating technological innovation,promoting water-saving agricultural technologies,improving water resource utilization efficiency,and establishing a community participation-based comprehensive management framework.Additionally,strengthening cross-border cooperation and improving real-time monitoring systems have been identified as critical steps to advance sustainable water resource utilization and evidence-based decision-making in Tajikistan and across Central Asia. 展开更多
关键词 Climate change Glacial retreat Cross-border cooperation Water resource management TAJIKISTAN Central Asia
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部