期刊文献+
共找到3,244篇文章
< 1 2 163 >
每页显示 20 50 100
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
1
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
2
作者 Yan Cao Zhizhuang Zhou Yan Zhuang 《Computers, Materials & Continua》 2025年第7期1545-1565,共21页
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w... Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments. 展开更多
关键词 Dynamic symbolic execution opaque predicates code obfuscation
在线阅读 下载PDF
英藏“谓语”比较与英文教学中Predicate一词藏译略考
3
作者 阿努 赤列德吉 《海外英语》 2016年第3期177-178,共2页
我区实施"藏汉英三语"教育可谓喜忧参半,拉萨等城市虽取得显著成效,而偏远农牧区的藏族学生却因作为英文课堂媒介语的汉语基础薄弱,英文学习效果欠佳。因此,英藏双语的直接对比研究的缺乏,是导致农牧区英文教育处境艰难的重... 我区实施"藏汉英三语"教育可谓喜忧参半,拉萨等城市虽取得显著成效,而偏远农牧区的藏族学生却因作为英文课堂媒介语的汉语基础薄弱,英文学习效果欠佳。因此,英藏双语的直接对比研究的缺乏,是导致农牧区英文教育处境艰难的重要原因。该文以英文教学为主体,旨在通过对英藏基础句法中"Predicate"一词的直接对比和语法术语的藏译探讨,望能解决农牧区藏族学生英文教学中的理解困扰。 展开更多
关键词 英藏 谓语 比较 教学 predicate 藏译
在线阅读 下载PDF
英语谓语(Predicate)的概念功能
4
作者 桂永霞 《宜春学院学报》 2013年第4期136-138,共3页
将谓语定义为"限定成分+谓体"。谓语动词具有概念功能、人际功能和语篇功能。本文只讨论谓语动词的概念功能。谓语动词的概念功能体现在及物性系统,语态和归一度三个方面。谓语是及物性系统的三要素之一,并且及物系统的六个... 将谓语定义为"限定成分+谓体"。谓语动词具有概念功能、人际功能和语篇功能。本文只讨论谓语动词的概念功能。谓语动词的概念功能体现在及物性系统,语态和归一度三个方面。谓语是及物性系统的三要素之一,并且及物系统的六个过程是按照动词的种类来划分的;语态是由动词过程与哪一个参与者首先发生关系来决定的;归一度即肯定或否定的判断,是由谓语(限定成分)加否定副词(not)构成的。 展开更多
关键词 英语 谓语 概念功能
在线阅读 下载PDF
Theory of Approximate Reasoning in Two-Valued Predicate Logic Based on the Quasi-truth Degrees 被引量:2
5
作者 秦晓燕 刘军 +2 位作者 徐扬 陈树伟 刘熠 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期23-27,共5页
Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the ... Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the quasi-truth degrees of first-order formulae is discussed, and it is proved that there is no isolated point in the logic metric space (F, ρ ). Thus the pseudo-metric between first-order formulae is well defined to develop the study about approximate reasoning in the logic metric space (F, ρ ). Then, three different types of approximate reasoning patterns are proposed, and their equivalence under some condition is proved. This work aims at filling in the blanks of approximate reasoning in quantitative predicate logic. 展开更多
关键词 approximate reasoning PSEUDO-METRIC quasi-truth degree predicate logic
在线阅读 下载PDF
Predicate Oriented Pattern Analysis for Biomedical Knowledge Discovery 被引量:2
6
作者 Feichen Shen Hongfang Liu +2 位作者 Sunghwan Sohn David W. Larson Yugyung Lee 《Intelligent Information Management》 2016年第3期66-85,共20页
In the current biomedical data movement, numerous efforts have been made to convert and normalize a large number of traditional structured and unstructured data (e.g., EHRs, reports) to semi-structured data (e.g., RDF... In the current biomedical data movement, numerous efforts have been made to convert and normalize a large number of traditional structured and unstructured data (e.g., EHRs, reports) to semi-structured data (e.g., RDF, OWL). With the increasing number of semi-structured data coming into the biomedical community, data integration and knowledge discovery from heterogeneous domains become important research problem. In the application level, detection of related concepts among medical ontologies is an important goal of life science research. It is more crucial to figure out how different concepts are related within a single ontology or across multiple ontologies by analysing predicates in different knowledge bases. However, the world today is one of information explosion, and it is extremely difficult for biomedical researchers to find existing or potential predicates to perform linking among cross domain concepts without any support from schema pattern analysis. Therefore, there is a need for a mechanism to do predicate oriented pattern analysis to partition heterogeneous ontologies into closer small topics and do query generation to discover cross domain knowledge from each topic. In this paper, we present such a model that predicates oriented pattern analysis based on their close relationship and generates a similarity matrix. Based on this similarity matrix, we apply an innovated unsupervised learning algorithm to partition large data sets into smaller and closer topics and generate meaningful queries to fully discover knowledge over a set of interlinked data sources. We have implemented a prototype system named BmQGen and evaluate the proposed model with colorectal surgical cohort from the Mayo Clinic. 展开更多
关键词 Biomedical Knowledge Discovery Pattern Analysis predicate Query Generation
在线阅读 下载PDF
A Contrastive Analysis of Subject and Predicate in English and Chinese
7
作者 张晰 《海外英语》 2013年第15期263-264,275,共3页
Respectively belonging to different language families,English and Chinese naturally have many differences in morphology and syntax.This paper intends to give a contrastive analysis of subject and predicate in English ... Respectively belonging to different language families,English and Chinese naturally have many differences in morphology and syntax.This paper intends to give a contrastive analysis of subject and predicate in English and Chinese,focusing on differences of subject and predicate usages in the two languages,and the problems they cause for Chinese students in English learning and translation. 展开更多
关键词 ENGLISH CHINESE SUBJECT predicate DIFFERENCES
在线阅读 下载PDF
Functionality Semantics of Predicate Data Flow Diagram
8
作者 高晓雷 缪淮扣 刘玲 《Journal of Shanghai University(English Edition)》 CAS 2004年第3期309-316,共8页
SOZL (structured methodology + object-oriented methodology + Z language) is a language that attempts to integrate structured method, object-oriented method and formal method. The core of this language is predicate dat... SOZL (structured methodology + object-oriented methodology + Z language) is a language that attempts to integrate structured method, object-oriented method and formal method. The core of this language is predicate data flow diagram (PDFD). In order to eliminate the ambiguity of predicate data flow diagrams and their associated textual specifications, a formalization of the syntax and semantics of predicate data flow diagrams is necessary. In this paper we use Z notation to define an abstract syntax and the related structural constraints for the PDFD notation, and provide it with an axiomatic semantics based on the concept of data availability and functionality of predicate operation. Finally, an example is given to establish functionality consistent decomposition on hierarchical PDFD (HPDFD). 展开更多
关键词 predicate data flow diagram (PDFD) predicate operation (PO) hierarchical predicate data flow diagram (HPDFD) AVAILABILITY functionality semantics.
在线阅读 下载PDF
Application of the Constrained Predicated Nets and Interval Logic to Production Systems
9
作者 徐林 吴智铭 曹木亮 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2003年第2期74-81,共8页
A method to model and analyze the hybrid systems is presented. The time to be considered in the plant is taken as an explicit parameter through the constrained predicated net (CPN). The CPN's basic structure is a ... A method to model and analyze the hybrid systems is presented. The time to be considered in the plant is taken as an explicit parameter through the constrained predicated net (CPN). The CPN's basic structure is a Petri net with predicated transition. All components of the net are expressed by annotation which is defined on rational set Q. The analysis method for the plant is interval temporal logic represented by Petri nets. This paper combines the above two methods to synthesize the hybrid system, gives a simple and clear expression of the expected action of the studied plant. 展开更多
关键词 Temporal constrained predicated nets Temporal logic Hybrid systems Petri nets.
在线阅读 下载PDF
Applying First Order Predicate to the Semantic Query of Chinese
10
作者 高昊宇 俞勇 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第3期55-59,共5页
This paper described an approach to make inferences on Chinese information using first order predicate logic, which could be used in the semantic query of Chinese. The predicates of the method were derived from the na... This paper described an approach to make inferences on Chinese information using first order predicate logic, which could be used in the semantic query of Chinese. The predicates of the method were derived from the natural language using rule based LFT, the axiom set was generated by extracting lexicon knowledge from HowNet, and the first order predicate inferences were made through symbol connection of center words. After all these were done, the evaluation and possible improvements of the method were provided. The experiment result shows a higher precision rate than that traditional methods can reach. 展开更多
关键词 first order predicate semantic query inference engine rule circuit
在线阅读 下载PDF
A Study of Nominal Predicate Sentences Under the Framework of Cognitive Grammar
11
作者 ZOU Wen-jie GAO Wen-cheng 《Journal of Literature and Art Studies》 2023年第9期704-707,共4页
Cognitive grammar,as a linguistic theory that attaches importance to the relationship between language and thinking,provides us with a more comprehensive way to understand the structure,semantics and cognitive process... Cognitive grammar,as a linguistic theory that attaches importance to the relationship between language and thinking,provides us with a more comprehensive way to understand the structure,semantics and cognitive processing of noun predicate sentences.Therefore,under the framework of cognitive grammar,this paper tries to analyze the semantic connection and cognitive process in noun predicate sentences from the semantic perspective and the method of example theory,and discusses the motivation of the formation of this construction,so as to provide references for in-depth analysis of the cognitive laws behind noun predicate sentences. 展开更多
关键词 nominal predicate sentences cognitive grammar SEMANTICS
在线阅读 下载PDF
AGREEMENT BETWEEN THE SUBJECT AND THE PREDICATE
12
作者 孙永峰 《河北旅游职业学院学报》 2000年第1期8-9,共2页
关键词 AGREEMENT BETWEEN THE SUBJECT AND THE predicate THAN
在线阅读 下载PDF
Modified Neural Network Used for Host Utilization Predication in Cloud Computing Environment
13
作者 Arif Ullah Siti Fatimah Abdul Razak +1 位作者 Sumendra Yogarayan Md Shohel Sayeed 《Computers, Materials & Continua》 2025年第3期5185-5204,共20页
Networking,storage,and hardware are just a few of the virtual computing resources that the infrastruc-ture service model offers,depending on what the client needs.One essential aspect of cloud computing that improves ... Networking,storage,and hardware are just a few of the virtual computing resources that the infrastruc-ture service model offers,depending on what the client needs.One essential aspect of cloud computing that improves resource allocation techniques is host load prediction.This difficulty means that hardware resource allocation in cloud computing still results in hosting initialization issues,which add several minutes to response times.To solve this issue and accurately predict cloud capacity,cloud data centers use prediction algorithms.This permits dynamic cloud scalability while maintaining superior service quality.For host prediction,we therefore present a hybrid convolutional neural network long with short-term memory model in this work.First,the suggested hybrid model is input is subjected to the vector auto regression technique.The data in many variables that,prior to analysis,has been filtered to eliminate linear interdependencies.After that,the persisting data are processed and sent into the convolutional neural network layer,which gathers intricate details about the utilization of each virtual machine and central processing unit.The next step involves the use of extended short-term memory,which is suitable for representing the temporal information of irregular trends in time series components.The key to the entire process is that we used the most appropriate activation function for this type of model a scaled polynomial constant unit.Cloud systems require accurate prediction due to the increasing degrees of unpredictability in data centers.Because of this,two actual load traces were used in this study’s assessment of the performance.An example of the load trace is in the typical dispersed system.In comparison to CNN,VAR-GRU,VAR-MLP,ARIMA-LSTM,and other models,the experiment results demonstrate that our suggested approach offers state-of-the-art performance with higher accuracy in both datasets. 展开更多
关键词 Cloud computing DATACENTER virtual machine(VM) predicATION algorithm
在线阅读 下载PDF
Utility of inflammatory markers as predictors of recurrence in gastrointestinal stromal tumors:Insights from a nomogram-based approach
14
作者 Chris B Lamprecht Tyler Kashuv Brandon Lucke-Wold 《World Journal of Gastrointestinal Oncology》 2025年第9期385-390,共6页
Gastrointestinal stromal tumors(GISTs),the most prevalent mesenchymal tumors,often have poor outcomes due to high recurrence rates.However,the specific risk factors for GISTs,particularly those concerning the innate i... Gastrointestinal stromal tumors(GISTs),the most prevalent mesenchymal tumors,often have poor outcomes due to high recurrence rates.However,the specific risk factors for GISTs,particularly those concerning the innate immune-inflammatory response,remain poorly understood.This editorial highlights key prognostic factors that impact GIST progression and prognosis,while discussing the findings of a recent study that investigated the prognostic value of systemic inflammatory markers:systemic immune-inflammation index,neutrophil/lym-phocyte ratio,platelet/lymphocyte ratio,and monocyte/lymphocyte ratio,on recurrence-free survival in GIST patients.This editorial examines strategies to enhance the clinical applicability of the nomogram developed in the study,ensuring its effectiveness for robust implementation.Future directions outlined in the editorial stress the importance of integrating molecular insights,including KIT and PDGFRA mutations,tumor staging,and mitotic rates to refine predictive models.The editorial also underscores the value of multi-center studies to enhance the generalizability and clinical relevance of these approaches.By bridging inflammatory biomarkers with genetic and clinicopathologic factors,a more comprehensive understanding of GIST pathophysiology can be developed,paving the way for improved management strategies and patient outcomes.This perspective serves as a call to action for continued research into the interplay between genetic mutations,inflammatory marker modulation,and GIST progression,aiming to expand the scope of personalized oncology through a deeper understanding of GIST progression. 展开更多
关键词 Gastrointestinal stromal tumor Recurrence prediction Nomogram predicative modeling Inflammatory markers Tumor risk factors
暂未订购
多k位数阈值的谓词加密方案
15
作者 李婷 陈振华 《计算机应用与软件》 北大核心 2026年第1期338-347,共10页
现有支持比较大小的谓词加密方案没有考虑属性值的排序位置,且大多数方案没有实现更强的隐私性——属性隐藏。针对这两个问题,提出一种具有属性隐藏的多k位数阈值谓词加密方案。设计一种新的编码,将多个排序后的属性值和多个阈值的比较... 现有支持比较大小的谓词加密方案没有考虑属性值的排序位置,且大多数方案没有实现更强的隐私性——属性隐藏。针对这两个问题,提出一种具有属性隐藏的多k位数阈值谓词加密方案。设计一种新的编码,将多个排序后的属性值和多个阈值的比较大小转化为多内积问题;采用对偶向量空间上的内积加密技术,构造随机数等式实现多内积问题;构造属性盲化方法实现属性隐藏。安全性证明和性能分析表明,所提方案在标准模型下是可以抵抗选择明文攻击的,且具备较好的存储性能。 展开更多
关键词 谓词加密 k 位数阈值 比较大小 属性隐藏
在线阅读 下载PDF
术前血清CXCR4、HIF-1α水平在预测食管癌根治术后淋巴结转移中的应用价值
16
作者 田伟 侯彬 +1 位作者 豆亚伟 戴云 《胃肠病学和肝病学杂志》 2026年第2期199-202,共4页
目的 研究术前血清CXC趋化因子受体4(CXC chemokine receptor 4,CXCR4)、缺氧诱导因子-1α(hypoxia inducible factor-1α,HIF-1α)水平在预测食管癌术后淋巴转移的效果。方法 选取2018年8月至2023年8月在我院行食管癌根治术且术中行淋... 目的 研究术前血清CXC趋化因子受体4(CXC chemokine receptor 4,CXCR4)、缺氧诱导因子-1α(hypoxia inducible factor-1α,HIF-1α)水平在预测食管癌术后淋巴转移的效果。方法 选取2018年8月至2023年8月在我院行食管癌根治术且术中行淋巴结清扫的384例患者,根据3∶1的比例随机分为训练集(n=288)和验证集(n=96)。在训练集中根据术后淋巴结病理检查结果将患者分为转移组(n=132)和未转移组(n=156),比较两组患者临床资料及血清标志物的差异,通过统计学方法总结淋巴结转移的危险因素及CXCR4、HIF-1α的预测价值。结果 训练集中转移组患者的血清CXCR4、HIF-1α、CYFRA21-1、SCC-Ag水平高于未转移组,差异有统计学意义(P<0.05),血清CEA、CA199水平及其他临床资料与未转移组比较差异无统计学意义(P>0.05)。血清CXCR4、HIF-1α是食管癌根治术后淋巴结转移的危险因素(P<0.05)。血清CXCR4、HIF-1α及联合方程预测淋巴结转移的AUC分别为0.855(95%CI:0.812~0.898)、0.907(95%CI:0.874~0.940)、0.975(95%CI:0.959~0.991),联合方程的AUC高于CXCR4、HIF-1α(Z=4.951、4.231,P<0.05);验证集中联合方程预测淋巴结转移的C-指数为0.961(95%CI:0.921~0.995),预测的准确性良好。结论 术前血清CXCR4、HIF-1α可有效预测食管癌根治术后淋巴结转移的风险。 展开更多
关键词 食管癌根治术 淋巴结转移 CXC趋化因子受体4 缺氧诱导因子-1Α 预测
暂未订购
Prediction of compressive strength of cement mortars with fly ash and activated coal gangue 被引量:6
17
作者 周双喜 陈益民 张文生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第4期549-552,共4页
The pozzolanic activity of coal gangue, which is calcining at 500 to 1 000 ℃, differs distinctly. The simplex-centroid design with upper and lower bounds of component proportion is adopted to study the compressive st... The pozzolanic activity of coal gangue, which is calcining at 500 to 1 000 ℃, differs distinctly. The simplex-centroid design with upper and lower bounds of component proportion is adopted to study the compressive strength of mortars made with ternary blends of cement, activated coal gangue and fly ash. Based on the results of a minimum of seven design points, three special cubic polynomial models are used to establish the strength predicating equations at different ages for mortars. Five experimental checkpoints were also designed to verify the precision of the equations. The most frequent errors of the predicted values are within 3%. A simple and practical way is provided for determining the optimal proportion of two admixtures when they are used in concrete. 展开更多
关键词 thermal activated coal gangue simplex-centroid design predicating equation compressive strength
在线阅读 下载PDF
Joint multivariate statistical model and its applications to synthetic earthquake predic-tion 被引量:14
18
作者 韩天锡 蒋淳 +2 位作者 魏雪丽 韩梅 冯德益 《地震学报》 CSCD 北大核心 2004年第5期523-528,625,共6页
针对目前地震综合预报中的一些问题,利用近30年来迅速发展的多元统计分析中主成分分析、判别分析组成多元统计组合模型,在众多的地震预报指标(预报因子)中采用信息最大化方法,选择对中期预测信息累积贡献率大于90%地震预报指标,分... 针对目前地震综合预报中的一些问题,利用近30年来迅速发展的多元统计分析中主成分分析、判别分析组成多元统计组合模型,在众多的地震预报指标(预报因子)中采用信息最大化方法,选择对中期预测信息累积贡献率大于90%地震预报指标,分别进行相关分析、预测、检验,最终应用马氏距离判别作外推综合预报;并以华北地区(30°~42°N,108°125°E)为例进行模型的应用检验,初步研究已取得了较好的效果. 展开更多
关键词 多元统计组合模型 主成分分析 判别分析 地震综合预报
在线阅读 下载PDF
基于不同测试终点的设施菜地土壤Cd与新污染物复合污染毒性阈值及预测模型
19
作者 刘佳晓 王萌 +5 位作者 孙晓艺 俞磊 王静 周如烟 秦璐瑶 陈世宝 《中国环境科学》 北大核心 2026年第1期416-428,共13页
采用小白菜生长、赤子爱胜蚓生长和土壤微生物基质诱导呼吸(SIR)为毒性测试终点,对我国6种不同性质设施菜地土壤中Cd与四环素和吡虫啉单一及复合污染的毒性阈值(EC_(x))进行测定,并构建了污染物毒性与土壤主要影响因子间的量化关系及预... 采用小白菜生长、赤子爱胜蚓生长和土壤微生物基质诱导呼吸(SIR)为毒性测试终点,对我国6种不同性质设施菜地土壤中Cd与四环素和吡虫啉单一及复合污染的毒性阈值(EC_(x))进行测定,并构建了污染物毒性与土壤主要影响因子间的量化关系及预测模型.结果表明:不同性质设施菜地土壤中污染物对不同测试终点的毒性剂量-效应关系呈现出明显的S型曲线,以小白菜为例,Cd的毒性阈值EC_(10)为0.6~8.5,EC_(50)为4.3~14.7mg/kg;Cd与四环素复合污染的毒性阈值EC_(10)为0.1~2.2mg/kg,EC_(50)为1.2~6.9mg/kg;Cd与吡虫啉复合污染的毒性阈值EC_(10)为0.1~3.7mg/kg,EC_(50)为1.4~10.0mg/kg;污染物毒性阈值在不同测试终点间呈较大差异,如Cd和四环素毒性阈值由大到小顺序依次为小白菜>蚯蚓>微生物,复合污染条件下的毒性阈值小于单一污染;小白菜生长对土壤污染物表现出低剂量刺激效应,最大刺激效应为103%~110%;pH值是影响和预测土壤中污染物毒性阈值的主控因子,基于土壤pH值、CEC、OC含量的归趋化预测模型可有效预测设施菜地土壤中Cd与新污染物复合污染的生态风险毒性阈值. 展开更多
关键词 Cd 复合污染 剂量-效应 低剂量毒物 刺激效应
在线阅读 下载PDF
海洋环境下飞行器关键金属材料典型腐蚀失效综述
20
作者 任浩源 常汉江 +2 位作者 金晶 王艳艳 石航 《装备环境工程》 2026年第1期50-62,共13页
回顾了海洋环境下飞行器金属结构腐蚀失效分析的研究进展,涵盖了腐蚀机理、分析方法和防护技术3个方面。重点包括海洋腐蚀环境特性与飞行器易腐蚀区域分析、金属材料在海洋环境中的腐蚀规律与失效机制,以及人工智能技术在腐蚀预测、监... 回顾了海洋环境下飞行器金属结构腐蚀失效分析的研究进展,涵盖了腐蚀机理、分析方法和防护技术3个方面。重点包括海洋腐蚀环境特性与飞行器易腐蚀区域分析、金属材料在海洋环境中的腐蚀规律与失效机制,以及人工智能技术在腐蚀预测、监测与评估中的应用特点。通过广泛参考国内外相关研究,对腐蚀机理模型、分析方法和全寿命周期防护对策进行了综述,讨论了该领域当前面临的挑战与发展建议。 展开更多
关键词 海洋环境 金属材料 腐蚀失效 人工智能 防护技术 预测监测
在线阅读 下载PDF
上一页 1 2 163 下一页 到第
使用帮助 返回顶部