期刊文献+
共找到153,983篇文章
< 1 2 250 >
每页显示 20 50 100
衡水市中小食品企业质量管理实践研究——基于PLS-SEM模型的实证分析
1
作者 朱冰清 王岩 +2 位作者 吴荣荣 王青华 张跃 《衡水学院学报》 2026年第1期60-69,共10页
随着食品质量与安全在全球范围内日益受到重视,中小食品企业面临着提高自身运营绩效和产品质量的双重挑战。研究旨在探究衡水市中小食品企业质量管理实践的关键成功因素,以及这些因素对企业运营绩效的影响。通过结构方程模型和偏最小二... 随着食品质量与安全在全球范围内日益受到重视,中小食品企业面临着提高自身运营绩效和产品质量的双重挑战。研究旨在探究衡水市中小食品企业质量管理实践的关键成功因素,以及这些因素对企业运营绩效的影响。通过结构方程模型和偏最小二乘算法(PLS-SEM)分析相关数据,研究重点关注了六个主要维度,分别为领导力、教育与培训、员工参与、客户导向、过程管理和供应商管理。结果表明,这些因素对提升中小食品企业的运营绩效具有显著的正面影响。 展开更多
关键词 质量管理 成功因素 中小食品企业 运营绩效 pls-SEM分析
在线阅读 下载PDF
国家安全情报研究核心著者群体画像与研究洞察——基于Intelligence and National Security期刊的分析
2
作者 胡雅萍 肖咏歌 《科技情报研究》 2026年第1期12-22,共11页
[目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and Natio... [目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and National Security期刊中筛选出核心著者,运用履历分析法将国外核心著者履历划分为学科背景、研究方向、科研成果和工作经历4个核心类属进行比较分析,采用LDA主题模型对发文进行主题挖掘,系统识别出情报研究者关注的核心议题。[结果/结论]核心著者群体呈现显著的男性主导、中老年资深学者为主、机构高度集中、学科背景偏重传统人文社科的特征;安全情报研究面临跨学科深度融合不足、学界与实践存在隔阂、技术伦理与法律探讨滞后等问题。 展开更多
关键词 履历分析 核心著者 情报研究 LDA主题挖掘 国家安全情报 群体画像
在线阅读 下载PDF
Design and implementation of a computer endpoint security baseline verification system based on MLPS 2.0
3
作者 Fan Miao YaQiong Xu +3 位作者 ZiYang Wan YingJie Zhuang Yang Li JiaPeng Ren 《Railway Sciences》 2026年第1期136-152,共17页
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr... Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework. 展开更多
关键词 Windows security baseline Endpoint security Baseline inspection Xinchuang system security baseline
在线阅读 下载PDF
Pathways to improved food and nutrition security:The role of farm production diversity in household dietary outcomes in rural areas of Pakistan
4
作者 Muhammad Waseem Erbao Cao +2 位作者 Ihsan Jamil Bushra Mughal Mi Yu 《Journal of Integrative Agriculture》 2026年第1期377-389,共13页
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)... Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives. 展开更多
关键词 food security nutrition security FPD HHDS smallholder farmers
在线阅读 下载PDF
基于LIF与PLS-DA的高品质食用油掺伪鉴别
5
作者 崔耀耀 金源 +5 位作者 姜海洋 吴邵哲 崔灿 吴焓冰 李金怡 苑媛媛 《河北科技大学学报》 北大核心 2026年第1期29-39,共11页
为了快速识别市场中的劣质食用油,提出了一种结合激光诱导荧光(laser-induced fluorescence,LIF)技术与偏最小二乘判别分析(partial least squares-discriminant analysis,PLS-DA)的高品质食用油掺伪鉴别方法。首先利用实验室搭建的LIF... 为了快速识别市场中的劣质食用油,提出了一种结合激光诱导荧光(laser-induced fluorescence,LIF)技术与偏最小二乘判别分析(partial least squares-discriminant analysis,PLS-DA)的高品质食用油掺伪鉴别方法。首先利用实验室搭建的LIF系统采集了橄榄油、芝麻油和花生油及其掺伪样本的荧光光谱数据;然后基于PLS-DA方法分别为橄榄油、芝麻油和花生油构建了掺伪鉴别模型;最后通过预测集对模型性能进行了评估。结果表明,PLS-DA模型能够准确捕捉掺伪样本与真实样本荧光光谱之间的差异性特征,在实验所得数据验证下,达到了100%的分类准确率。该方法可实现对掺伪食用油的高精度鉴别,为食品安全监管提供了科学的鉴别手段。 展开更多
关键词 光谱学 食用油掺伪 激光诱导荧光 偏最小二乘判别分析 食品安全
在线阅读 下载PDF
A Nexus for East Africa--China-supported projects help East Africans to boost energy, water and food security
6
作者 RICHARD WETAYA 《ChinAfrica》 2026年第1期44-45,共2页
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B... Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years. 展开更多
关键词 water security solar technology NEXUS irish potatoes East Africa energy security China supported projects agrivoltaics technologya
原文传递
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
7
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
Design of a Patrol and Security Robot with Semantic Mapping and Obstacle Avoidance System Using RGB-D Camera and LiDAR
8
作者 Shu-Yin Chiang Shin-En Huang 《Computers, Materials & Continua》 2026年第4期1735-1753,共19页
This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obsta... This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments. 展开更多
关键词 RGB-D semantic mapping object recognition obstacle avoidance security robot
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
9
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction
10
作者 Abeer Alnuaim 《Computers, Materials & Continua》 2026年第1期711-743,共33页
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)... The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments. 展开更多
关键词 Anomaly detection smart cities Internet of Things(IoT) HCI CNN LSTM random forest intelligent secure solutions
在线阅读 下载PDF
基于PLS-SEM的渭河流域径流演变效应解耦 被引量:1
11
作者 江善虎 江宏 +2 位作者 朱永卫 崔豪 任立良 《水资源保护》 北大核心 2025年第5期223-230,共8页
为定量解耦气候变化、人类活动与植被动态等多因素对流域水循环演变的影响,构建了渭河流域水循环多要素影响解耦框架;利用偏最小二乘结构方程模型(PLS-SEM)、Pearson相关分析与趋势分析法,解耦了1982—2020年渭河流域气候变化、人类活... 为定量解耦气候变化、人类活动与植被动态等多因素对流域水循环演变的影响,构建了渭河流域水循环多要素影响解耦框架;利用偏最小二乘结构方程模型(PLS-SEM)、Pearson相关分析与趋势分析法,解耦了1982—2020年渭河流域气候变化、人类活动、植被动态对渭河流域径流变化的直接和间接效应。结果表明:1982—2001年渭河流域气候变化与人类活动对径流影响的综合效应呈现均衡态势,气候变化和人类活动对径流的综合效应值分别为0.313、-0.315;2002—2020年人类活动的综合效应值(-0.667)显著超越气候变化(0.319),成为流域径流演变的主导驱动因素;1982—2001年径流减少的机制特征为降水主导、多因子协同,降水减少的直接效应与气温升高、植被恢复及人类活动的综合效应共同主导径流衰减过程;2002—2020年径流增加的机制特征为降水主控、工程消减,降水显著增加是导致径流增加的主导因素,而工程调控的直接效应抑制了径流增加的趋势,导致径流仅呈现微弱的恢复态势。 展开更多
关键词 气候变化 人类活动 植被动态 径流演变 pls-SEM 渭河流域
在线阅读 下载PDF
我国专业学位研究生教育协同育人影响因素分析——基于PLS-SEM模型 被引量:3
12
作者 张丽华 宁梦妍 王一然 《教育理论与实践》 北大核心 2025年第3期19-23,共5页
专业学位研究生教育是培养高层次应用型人才的重要途径。全面深化协同育人机制是促进专业学位研究生教育从有质量地发展到高质量发展的关键点和突破口。从高校、企业、政府三个利益相关主体出发,通过PLS-SEM模型分析我国专业学位研究生... 专业学位研究生教育是培养高层次应用型人才的重要途径。全面深化协同育人机制是促进专业学位研究生教育从有质量地发展到高质量发展的关键点和突破口。从高校、企业、政府三个利益相关主体出发,通过PLS-SEM模型分析我国专业学位研究生教育协同育人影响因素的研究结果表明:高等学校发表科技成果、政府对境内企业R&D支出以及企业科研人员占比对协同育人产生显著影响。为了更好地促进我国专业学位研究生教育协同育人的发展,应建立高校赋能新质生产力的协同育人机制、多主体共建数字化协同育人平台并发挥资源集聚效应提升协同育人成效。 展开更多
关键词 专业学位研究生教育 协同育人 pls-SEM模型 高校 企业 政府
在线阅读 下载PDF
创业学习对大学生创业意愿的影响机制研究——基于PLS-SEM模型的分析
13
作者 徐园园 《安徽职业技术学院学报》 2025年第1期89-96,共8页
创业意愿是潜在创业者是否付诸实际创业行动的关键决定因素,在创业研究领域备受关注。本研究基于社会认知理论,选取安徽省500名大学生作为调查样本,采用问卷调查法收集数据,借助统计分析软件,运用结构方程模型(SEM)探究创业学习对创业... 创业意愿是潜在创业者是否付诸实际创业行动的关键决定因素,在创业研究领域备受关注。本研究基于社会认知理论,选取安徽省500名大学生作为调查样本,采用问卷调查法收集数据,借助统计分析软件,运用结构方程模型(SEM)探究创业学习对创业意愿的内在作用机制。研究结果显示,创业学习对创业意愿及创业自我效能感均有显著正向影响;创业自我效能感对创业意愿有显著正向作用,且在创业学习与创业意愿间起部分中介效应。基于研究结论,本文提出了相应的对策建议。 展开更多
关键词 创业学习 创业意愿 创业自我效能感 pls-SEM模型
在线阅读 下载PDF
前后端分离环境下Spring Security权限系统构建与实现
14
作者 何立富 《电脑编程技巧与维护》 2025年第10期3-7,共5页
通过引入JWT认证机制,解决了前后端分离架构下Spring Security在跨域、兼容性及分布式部署中的认证和授权难题,构建了一套动态权限管理系统,实现了用户身份的精准识别与验证。在系统架构设计层面,通过自定义登录接口、缓存技术、拦截器... 通过引入JWT认证机制,解决了前后端分离架构下Spring Security在跨域、兼容性及分布式部署中的认证和授权难题,构建了一套动态权限管理系统,实现了用户身份的精准识别与验证。在系统架构设计层面,通过自定义登录接口、缓存技术、拦截器及自定义表达式逻辑权限控制等规划,有效提升了系统的性能、安全性与灵活性。基于角色的访问控制权限(RBAC)的功能设计,借助可视化配置界面进一步增强了系统的易操作性。经测试验证,该系统具备高度的稳定性与有效性,能够精准地控制访问权限,为相关应用系统的权限管理提供了切实可靠的解决方案。 展开更多
关键词 Spring security工具 前后端分离架构 动态化权限管理 JWT标准 基于角色的访问控制权限
在线阅读 下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:3
15
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet Protocol security Virtual Private Network Video Conferencing Voice over Internet Protocol JITTER End to End Delay
在线阅读 下载PDF
基于KECA-PLS的风电机组健康状态评估 被引量:2
16
作者 马亮 任超 +1 位作者 刘月文 郝增孝 《计算机测量与控制》 2025年第5期351-360,共10页
针对风电机组整机性能退化趋势的及时准确预测需求,提出了一种结合核熵主成分分析与偏最小二乘法(KECA-PLS)的健康评估算法;该研究采用前置局部异常因子算法(LOF)对数据预处理,并通过高斯混合模型(GMM)对风电场数据集进行分类聚类,分类... 针对风电机组整机性能退化趋势的及时准确预测需求,提出了一种结合核熵主成分分析与偏最小二乘法(KECA-PLS)的健康评估算法;该研究采用前置局部异常因子算法(LOF)对数据预处理,并通过高斯混合模型(GMM)对风电场数据集进行分类聚类,分类标签指导后续分析;利用核熵成分分析(KECA)对数据实施降维处理并提取关键特征,结合SPE统计量监控风电机组运行状态;考虑到SCADA数据的非平稳与非线性特性,将PLS算法融入核熵框架以进行故障预测,依据预测残差动态设定报警阈值,确保故障的早期警示;算法应用模糊评判机制并生成风电机组退化状态的雷达图,直观展示了故障演进态势;该算法在某风电场的实际运营数据上的实施验证,证明了其有效评估风电机组即时健康状况的能力,以及清晰展示故障演变过程的可视化效果。 展开更多
关键词 偏最小二乘法(pls) 状态监测 健康评估 风电机组 可视化
在线阅读 下载PDF
XRD结合PLS测定复合含能材料中CL-20的晶型含量
17
作者 周利园 王德祥 +3 位作者 张天龙 刘国权 李华 汤宏胜 《火炸药学报》 北大核心 2025年第8期756-762,I0003,共8页
为了解决复合含能材料中CL-20晶型定量分析问题,提出了一种基于X射线衍射(XRD)结合偏最小二乘(PLS)的定量分析方法;制备了不同晶型CL-20与DA基药混合的复合含能材料样品,采集了XRD谱图,并结合多种数据预处理(MSC、SNV、D1st、D2nd、WT)... 为了解决复合含能材料中CL-20晶型定量分析问题,提出了一种基于X射线衍射(XRD)结合偏最小二乘(PLS)的定量分析方法;制备了不同晶型CL-20与DA基药混合的复合含能材料样品,采集了XRD谱图,并结合多种数据预处理(MSC、SNV、D1st、D2nd、WT)和变量选择方法(SIPLS、BIPLS、CARS)对模型性能进行优化。结果表明,MSC-CARS-PLS模型对ε-CL-20和CL-20总含量的预测性能最优,其决定系数(R_(p)^(2))分别为0.9862和0.9759,对应的均方根误差(RMSE_(p))分别为0.5901和0.5276;将该模型应用于实际生产的复合含能材料样品中,预测结果与参考值高度一致,验证了其在CL-20晶型定量分析中的准确性与实用性;说明此方法是一种快速、准确的CL-20晶型定量分析方法。 展开更多
关键词 分析化学 偏最小二乘 pls X射线衍射 定量分析 CL-20 变量选择
在线阅读 下载PDF
基于PLS模型的镉与微塑料复合污染对冬小麦植株生理和土壤理化性质影响 被引量:4
18
作者 陈悦 程海宽 +2 位作者 陈富鹏 丰晨晨 林迪 《环境科学》 北大核心 2025年第3期1815-1830,共16页
探究重金属、微塑料及二者复合污染对冬小麦生长、生理生态及土壤理化性质影响效应,确定关键影响因子,为重金属和微塑料污染生理机制阐释以及污染土壤的生态修复提供理论基础.采用室内土壤盆栽试验,以冬小麦(Triticum aestivum L.)为研... 探究重金属、微塑料及二者复合污染对冬小麦生长、生理生态及土壤理化性质影响效应,确定关键影响因子,为重金属和微塑料污染生理机制阐释以及污染土壤的生态修复提供理论基础.采用室内土壤盆栽试验,以冬小麦(Triticum aestivum L.)为研究对象,开展土壤重金属镉(Cd)(0 mg·kg^(-1)和5 mg·kg^(-1))与不同粒径(10μm和500μm)和质量分数(0、0.5%、1.0%、5.0%)聚丙烯微塑料(PP-MPs)单一及复合污染对冬小麦生长发育、光合生理、抗氧化酶活性、叶片解剖结构、冠层温度、土壤养分及土壤酶活性影响效应研究.同时利用偏最小二乘(PLS)回归模型定量分析各理化特性与冬小麦生长指标间关系,确定关键主控因子.结果表明,小粒径PP-MPs单一及其与Cd复合污染条件下,冬小麦株高显著降低了10.3%~59.9%,叶面积显著降低了5.8%~94.2%,总生物量显著降低了20.0%~84.0%.另外,二者污染条件下,小麦叶片光合效率、叶绿素含量等光合特性明显受到抑制.随两者污染胁迫程度增加,小麦植株群体冠层温度升高,叶片厚度降低;与CK相比,叶片超氧化物歧化酶(SOD)、过氧化物酶(POD)和过氧化氢酶(CAT)分别提高了13.4%~99.0%、45.5%~122.7%和2.8%~89.2%,且两者间交互效应达极显著水平(P<0.01).此外,Cd与PPMPs胁迫后略微增加了土壤有机质、碱解氮、速效磷和速效钾等养分含量,显著提高了土壤脲酶、酸性磷酸酶和脱氢酶活性.与单一污染因素相比,Cd与PP-MPs复合污染对冬小麦各指标影响均呈协同抑制效应,且10μm小粒径抑制效应明显强于500μm大粒径. PLS模型结果显示,土壤酸性磷酸酶为Cd与10μm小粒径PP-MPs复合污染胁迫下影响冬小麦生长发育指标变化的关键主控因子,土壤速效磷则为500μm大粒径PP-MPs关键影响因子.研究结果对于评估土壤-植株系统中重金属Cd与MPs复合污染的生态效应提供参考借鉴. 展开更多
关键词 冬小麦 镉(CD) 微塑料(MPs) 复合污染 生理特性 偏最小二乘(pls)回归模型
原文传递
教师数字化教学能力影响因素实证研究——基于PLS-SEM和fsQCA方法 被引量:11
19
作者 周欣 王耀斌 贺相春 《现代教育技术》 2025年第3期66-76,共11页
数字化教学能力是教育数字化转型时期教师必备的关键能力,深入探究并分析教师数字化教学能力的影响因素,是教育管理者和教师应对技术挑战、提升教学质量、培养创新人才的关键环节。基于此,文章依托统一接受和使用技术(Unified Theory of... 数字化教学能力是教育数字化转型时期教师必备的关键能力,深入探究并分析教师数字化教学能力的影响因素,是教育管理者和教师应对技术挑战、提升教学质量、培养创新人才的关键环节。基于此,文章依托统一接受和使用技术(Unified Theory of Acceptance and Use of Technology,UTAUT)模型,采用偏最小二乘结构方程模型(Partial Least Squares Structural Equation Modeling,PLS-SEM)和模糊集定性比较分析(Fuzzy-Set Qualitative Comparative Analysis,fsQCA)方法,对教师数字化教学能力的影响因素及其组合效应进行了实证分析。其中,PLS-SEM分析结果表明,绩效期望、努力期望、社群影响、便利条件和自我效能感对教师数字化教学意愿有显著的正向影响,并进一步正向影响教师的数字化教学能力;教师的自我效能感对数字化教学能力有显著的直接影响,且影响效应最强。而fs QCA分析结果显示,存在四条激发教师数字化教学能力的路径,在这些路径中数字化教学意愿和自我效能感是两个重要的前因变量,这弥补了结构方程模型分析的相对不足。文章通过研究,旨在为教育数字化转型时期教师数字化教学能力的提升提供实证依据。 展开更多
关键词 数字化教学能力 技术统一接受理论 偏最小二乘结构方程模型 模糊集定性比较分析
在线阅读 下载PDF
一种新型水稻穗叶类病斑突变体pls1的基因克隆和功能分析
20
作者 韩沛洁 李飞 +4 位作者 叶春 盛怡乐 孙红正 李俊周 杜彦修 《植物遗传资源学报》 北大核心 2025年第8期1574-1586,共13页
水稻类病斑突变体在研究水稻细胞程序性死亡和广谱抗病性中具有重要作用,已报道的水稻类病斑主要发生在叶片上,少量发生在颖壳上。本研究中首次报道了水稻的一种穗叶类病斑突变体pls1(Panicle and leaf spot 1),其从三叶期叶片开始出现... 水稻类病斑突变体在研究水稻细胞程序性死亡和广谱抗病性中具有重要作用,已报道的水稻类病斑主要发生在叶片上,少量发生在颖壳上。本研究中首次报道了水稻的一种穗叶类病斑突变体pls1(Panicle and leaf spot 1),其从三叶期叶片开始出现红褐色斑点,随生育进程扩大,并扩展到其他器官。与以往报道的水稻类病斑突变体不同的是,pls1抽穗后稻穗枝梗和颖壳逐渐产生红褐色病斑,成熟期稻穗干枯,严重影响产量,是一种新类型的水稻类病斑。结合图位克隆和全基因组重测序发现pls1突变体产生了173403 bp的大片段缺失,导致7个基因缺失和1个基因启动子缺失。这8个基因中4个编码醇溶蛋白,另外3个在叶片和穗部表达量较低,只有Os12g0268000在叶片和稻穗中较其他器官有较高的表达量,推测PLS1为Os12g0268000,基因功能注释显示其编码色胺5-羟化酶。pls1突变体叶片中活性氧、过氧化氢、超氧阴离子过量积累,抗氧系统相关酶氧化物歧化酶、抗坏血酸过氧化物酶、过氧化氢酶和谷胱甘肽还原酶活性提高,发生细胞程序性死亡和叶绿体降解,降低光合能力。褪黑素在植物耐盐性中起重要作用。进一步的功能分析发现,缺失PLS1会抑制水稻中褪黑素合成相关酶基因OsTDC1、OsTDC3、OsSNAT1、OsASMT1和OsCOMT的表达,进而导致pls1突变体的耐盐性下降。综上,穗叶类病斑突变体pls1是一种新类型的水稻类病斑突变体,将为水稻类病斑研究提供新的种质材料;耐盐性的分析揭示了色胺5-羟化酶的新功能,为研究其在细胞程序性死亡和耐盐性中的机制提供了新视角。 展开更多
关键词 水稻 穗叶类病斑 pls1 褪黑色素 耐盐性
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部