期刊文献+
共找到13,487篇文章
< 1 2 250 >
每页显示 20 50 100
HATLedger:An Approach to Hybrid Account and Transaction Partitioning for Sharded Permissioned Blockchains
1
作者 Shuai Zhao Zhiwei Zhang +2 位作者 Junkai Wang Ye Yuan Guoren Wang 《Computers, Materials & Continua》 2026年第3期1589-1607,共19页
With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates... With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability. 展开更多
关键词 Sharded blockchain account partitioning cross-shard transaction rate load imbalance
在线阅读 下载PDF
Bearing capacity prediction of open caissons in two-layered clays using five tree-based machine learning algorithms 被引量:2
2
作者 Rungroad Suppakul Kongtawan Sangjinda +3 位作者 Wittaya Jitchaijaroen Natakorn Phuksuksakul Suraparb Keawsawasvong Peem Nuaklong 《Intelligent Geoengineering》 2025年第2期55-65,共11页
Open caissons are widely used in foundation engineering because of their load-bearing efficiency and adaptability in diverse soil conditions.However,accurately predicting their undrained bearing capacity in layered so... Open caissons are widely used in foundation engineering because of their load-bearing efficiency and adaptability in diverse soil conditions.However,accurately predicting their undrained bearing capacity in layered soils remains a complex challenge.This study presents a novel application of five ensemble machine(ML)algorithms-random forest(RF),gradient boosting machine(GBM),extreme gradient boosting(XGBoost),adaptive boosting(AdaBoost),and categorical boosting(CatBoost)-to predict the undrained bearing capacity factor(Nc)of circular open caissons embedded in two-layered clay on the basis of results from finite element limit analysis(FELA).The input dataset consists of 1188 numerical simulations using the Tresca failure criterion,varying in geometrical and soil parameters.The FELA was performed via OptumG2 software with adaptive meshing techniques and verified against existing benchmark studies.The ML models were trained on 70% of the dataset and tested on the remaining 30%.Their performance was evaluated using six statistical metrics:coefficient of determination(R²),mean absolute error(MAE),root mean squared error(RMSE),index of scatter(IOS),RMSE-to-standard deviation ratio(RSR),and variance explained factor(VAF).The results indicate that all the models achieved high accuracy,with R²values exceeding 97.6%and RMSE values below 0.02.Among them,AdaBoost and CatBoost consistently outperformed the other methods across both the training and testing datasets,demonstrating superior generalizability and robustness.The proposed ML framework offers an efficient,accurate,and data-driven alternative to traditional methods for estimating caisson capacity in stratified soils.This approach can aid in reducing computational costs while improving reliability in the early stages of foundation design. 展开更多
关键词 two-layered clay Open caisson Tree-based algorithms FELA Machine learning
在线阅读 下载PDF
Land transaction trajectories of China's overseas industrial parks in developing countries:Evidence from Southeast Asia 被引量:1
3
作者 LI Dongxue HU Qiao 《Journal of Geographical Sciences》 2025年第6期1286-1310,共25页
Foreign-funded overseas industrial parks(OIPs)are crucial for attracting foreign investment and promoting globalization in developing countries.However,large-scale land acquisition for these parks generates conflicts ... Foreign-funded overseas industrial parks(OIPs)are crucial for attracting foreign investment and promoting globalization in developing countries.However,large-scale land acquisition for these parks generates conflicts between developers and local stakeholders,increasing development costs.A qualitative multicase study was conducted in this study to analyze the land transaction trajectories of China's OIPs.Four OIPs were selected to reveal the underlying mechanisms from the perspectives of institutional arrangements,governance mechanisms,and enterprise heterogeneity.The findings indicate that in host countries with insufficient institutional development,local governments are more inclined to directly engage in OIP land acquisition.High-level intergovernmental mechanisms facilitate land acquisition processes,although their efficacy depends largely on administrative power allocation across parks in host countries.The results also indicate that enterprise characteristics significantly influence land acquisition,where microscale private enterprises lacking political connections often employ low-cost,bottom-up strategies by leveraging international experience.In summary,policy-makers in developing countries should prioritize enhancing OIP governance to mitigate transaction costs,promote diversified land supply,and optimize land allocation.By depicting China's OIP land acquisition processes,this study deepens the academic understanding of OIP governance in developing countries and related international land transactions,offering practical OIP management insights for governments in both host and parent countries. 展开更多
关键词 land transaction trajectories institutional arrangements governance mechanisms enterprise heterogeneity overseas industrial parks developing countries
原文传递
Mitigating Blockchain Extractable Value threats by Distributed Transaction Sequencing Strategy
4
作者 Xiongfei Zhao Hou-Wan Long +2 位作者 Zhengzhe Li Jiangchuan Liu Yain-Whar Si 《Digital Communications and Networks》 2025年第5期1394-1409,共16页
The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as... The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as Transaction Order Dependence(TOD),Blockchain Extractable Value(BEV),and Transaction Importance Diversity(TID),which collectively undermine the fairness and security of DeFi systems.BEV-related activities,including sandwich attacks,liquidations,transaction replay etc.have emerged as significant threats,collectively generating$540.54 million in losses over 32 months across 11,289 addresses,involving 49,691 cryptocurrencies and 60,830 on-chain markets.These attacks exploit transaction mechanics to manipulate asset prices and extract value at the expense of other participants,with sandwich attacks being particularly impactful.Additionally,the growing adoption of blockchain in traditional finance highlights the challenge of TID,wherein high transaction volumes can strain systems and compromise time-sensitive operations.To address these pressing issues,we propose a novel Distributed Transaction Sequencing Strategy(DTSS)that integrates forking mechanisms with an Analytic Hierarchy Process(AHP)to enforce fair and transparent transaction ordering in a decentralized manner.Our approach is further enhanced by an optimization framework and the introduction of a Normalized Allocation Disparity Metric(NADM)that ensures optimal parameter selection for transaction prioritization.Experimental evaluations demonstrated that the DTSS effectively mitigated BEV risks,enhanced transaction fairness,and significantly improved the security and transparency of DeFi ecosystems. 展开更多
关键词 Blockchain transaction ordering Blockchain extractable value Distributed transaction sequencing strategy
在线阅读 下载PDF
Pitch Motion Analysis of a Submerged Cylindrical Structure in a Two-layer Fluid
5
作者 Champak Kr.Neog Mohammad Hassan 《哈尔滨工程大学学报(英文版)》 2025年第5期984-997,共14页
This study investigates the effects of radiation force due to the rotational pitch motion of a wave energy device,which comprises a coaxial bottom-mounted cylindrical caisson in a two-layer fluid,along with a submerge... This study investigates the effects of radiation force due to the rotational pitch motion of a wave energy device,which comprises a coaxial bottom-mounted cylindrical caisson in a two-layer fluid,along with a submerged cylindrical buoy.The system is modeled as a two-layer fluid with infinite horizontal extent and finite depth.The radiation problem is analyzed in the context of linear water waves.The fluid domain is divided into outer and inner zones,and mathematical solutions for the pitch radiating potential are derived for the corresponding boundary valve problem in these zones using the separation of variables approach.Using the matching eigenfunction expansion method,the unknown coefficients in the analytical expression of the radiation potentials are evaluated.The resulting radiation potential is then used to compute the added mass and damping coefficients.Several numerical results for the added mass and damping coefficients are investigated for numerous parameters,particularly the effects of the cylinder radius,the draft of the submerged cylinder,and the density proportion between the two fluid layers across different frequency ranges.The major findings are presented and discussed. 展开更多
关键词 Pitch radiation Eigenfunction expansion two-layer Hydrodynamic coefficients Submerged cylinder Bottom-mounted cylinder
在线阅读 下载PDF
Peer-to-peer transaction with voltage management strategy in distribution network considering trading risk
6
作者 Lei Dong Kuang Zhang +3 位作者 Shiming Zhang Tao Zhang Ye Li Ji Qiao 《Global Energy Interconnection》 2025年第4期685-699,共15页
P2P trading is driving the decentralization of the electricity market,the autonomy and privacy requirements of prosumers may intro-duce safety risks such as voltage violations.Existing security management methods base... P2P trading is driving the decentralization of the electricity market,the autonomy and privacy requirements of prosumers may intro-duce safety risks such as voltage violations.Existing security management methods based on price guidance may face unsolvable situa-tions in trading scenarios and have difficulty assessing the impact of P2P transactions on voltage security.To this end,this paper proposes a novel distribution system operator(DSO)-prosumers bi-level optimization framework incorporating the dynamic operating envelope(DOE)and risk coefficient-based network usage charge(RC-NUC).In the upper-level,the DOE is employed for dynamic voltage man-agement to prevent violations while the RC-NUC further guides prosumers to engage in grid-friendly transactions.The lower-level decen-tralized market enables prosumers to optimize trading decisions autonomously.Only price signals and energy quantities are exchanged between the two levels,ensuring the privacy of both parties.Additionally,an alternating direction method of multipliers(ADMM)with adaptive penalty factor is introduced to improve computational efficiency.Case studies on a modified IEEE 33-bus system demonstrate that the proposed method reduces voltage violation risks by 18.31%and enhances trading efficiency by 32.3%.These results highlight the feasibility and effectiveness of the approach in advancing secure and efficient distributed energy transactions. 展开更多
关键词 P2P transaction DOE RC-NUC Distribution network Distributed algorithm
在线阅读 下载PDF
HNND:Hybrid Neural Network Detection for Blockchain Abnormal Transaction Behaviors
7
作者 Jiling Wan Lifeng Cao +2 位作者 Jinlong Bai Jinhui Li Xuehui Du 《Computers, Materials & Continua》 2025年第6期4775-4794,共20页
Blockchain platform swith the unique characteristics of anonymity,decentralization,and transparency of their transactions,which are faced with abnormal activities such as money laundering,phishing scams,and fraudulent... Blockchain platform swith the unique characteristics of anonymity,decentralization,and transparency of their transactions,which are faced with abnormal activities such as money laundering,phishing scams,and fraudulent behavior,posing a serious threat to account asset security.For these potential security risks,this paper proposes a hybrid neural network detection method(HNND)that learns multiple types of account features and enhances fusion information among them to effectively detect abnormal transaction behaviors in the blockchain.In HNND,the Temporal Transaction Graph Attention Network(T2GAT)is first designed to learn biased aggregation representation of multi-attribute transactions among nodes,which can capture key temporal information from node neighborhood transactions.Then,the Graph Convolutional Network(GCN)is adopted which captures abstract structural features of the transaction network.Further,the Stacked Denoising Autoencode(SDA)is developed to achieve adaptive fusion of thses features from different modules.Moreover,the SDA enhances robustness and generalization ability of node representation,leading to higher binary classification accuracy in detecting abnormal behaviors of blockchain accounts.Evaluations on a real-world abnormal transaction dataset demonstrate great advantages of the proposed HNND method over other compared methods. 展开更多
关键词 Blockchain security abnormal transaction detection network representation learning hybrid neural network
在线阅读 下载PDF
Digital Transformation Drives the Upgrade of Corporate Accounting Functions:The Transformation Path from Transactional to Value Management-Oriented
8
作者 Hang Guo 《Proceedings of Business and Economic Studies》 2025年第6期114-120,共7页
The global wave of digitalization has accelerated the process of corporate digital transformation,placing higher demands on financial and accounting management.Since then,accounting work has shifted from the tradition... The global wave of digitalization has accelerated the process of corporate digital transformation,placing higher demands on financial and accounting management.Since then,accounting work has shifted from the traditional transactional model to a modern value management-oriented model,leading to a transformation of accounting functions.As corporate managers,they must advance their work proactively,empower the modernization and innovation of financial accounting with digital technology,and transition to management accounting to ensure enterprises keep pace with the times.Therefore,this paper explores the current status of corporate financial and accounting work amid the digital wave,identifies the challenges in the transformation of accounting from transactional to value management-oriented,and finally proposes several feasible and effective improvement strategies,aiming to provide more references for relevant practitioners. 展开更多
关键词 Accounting functions DIGITALIZATION Enterprises transactional(accounting) Value management-oriented(accounting)
在线阅读 下载PDF
A Two-Layer Network Intrusion Detection Method Incorporating LSTM and Stacking Ensemble Learning
9
作者 Jun Wang Chaoren Ge +4 位作者 Yihong Li Huimin Zhao Qiang Fu Kerang Cao Hoekyung Jung 《Computers, Materials & Continua》 2025年第6期5129-5153,共25页
Network Intrusion Detection System(NIDS)detection of minority class attacks is always a difficult task when dealing with attacks in complex network environments.To improve the detection capability of minority-class at... Network Intrusion Detection System(NIDS)detection of minority class attacks is always a difficult task when dealing with attacks in complex network environments.To improve the detection capability of minority-class attacks,this study proposes an intrusion detection method based on a two-layer structure.The first layer employs a CNN-BiLSTM model incorporating an attention mechanism to classify network traffic into normal traffic,majority class attacks,and merged minority class attacks.The second layer further segments the minority class attacks through Stacking ensemble learning.The datasets are selected from the generic network dataset CIC-IDS2017,NSL-KDD,and the industrial network dataset Mississippi Gas Pipeline dataset to enhance the generalization and practical applicability of the model.Experimental results show that the proposed model achieves an overall detection accuracy of 99%,99%,and 95%on the CIC-IDS2017,NSL-KDD,and industrial network datasets,respectively.It also significantly outperforms traditional methods in terms of detection accuracy and recall rate for minority class attacks.Compared with the single-layer deep learning model,the two-layer structure effectively reduces the false alarm rate while improving the minority-class attack detection performance.The research in this paper not only improves the adaptability of NIDS to complex network environments but also provides a new solution for minority-class attack detection in industrial network security. 展开更多
关键词 two-layer architecture minority class attack stacking ensemble learning network intrusion detection
在线阅读 下载PDF
A Hybrid Feature Selection and Clustering-Based Ensemble Learning Approach for Real-Time Fraud Detection in Financial Transactions
10
作者 Naif Almusallam Junaid Qayyum 《Computers, Materials & Continua》 2025年第11期3653-3687,共35页
This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction m... This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction monitoring systems.The framework is structured into three core layers:(1)feature selection using Recursive Feature Elimination(RFE),Principal Component Analysis(PCA),and Mutual Information(MI)to reduce dimensionality and enhance input relevance;(2)anomaly detection through unsupervised clustering using K-Means,Density-Based Spatial Clustering(DBSCAN),and Hierarchical Clustering to flag suspicious patterns in unlabeled data;and(3)final classification using a voting-based hybrid ensemble of Support Vector Machine(SVM),Random Forest(RF),and Gradient Boosting Classifier(GBC).The experimental evaluation is conducted on a synthetically generated dataset comprising one million financial transactions,with 5% labelled as fraudulent,simulating realistic fraud rates and behavioural features,including transaction time,origin,amount,and geo-location.The proposed model demonstrated a significant improvement over baseline classifiers,achieving an accuracy of 99%,a precision of 99%,a recall of 97%,and an F1-score of 99%.Compared to individual models,it yielded a 9% gain in overall detection accuracy.It reduced the false positive rate to below 3.5%,thereby minimising the operational costs associated with manually reviewing false alerts.The model’s interpretability is enhanced by the integration of Shapley Additive Explanations(SHAP)values for feature importance,supporting transparency and regulatory auditability.These results affirm the practical relevance of the proposed system for deployment in real-time fraud detection scenarios such as credit card transactions,mobile banking,and cross-border payments.The study also highlights future directions,including the deployment of lightweight models and the integration of multimodal data for scalable fraud analytics. 展开更多
关键词 Fraud detection financial transactions economic impact feature selection CLUSTERING ensemble learning
在线阅读 下载PDF
A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE
11
作者 Hongliang Tian Zuoqing Li 《Computers, Materials & Continua》 2025年第3期3983-4002,共20页
Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection sche... Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption(FHE)is proposed.In the proposed scheme,the functional relationship is established by Box-Muller,Discrete Gaussian Distribution Function(DGDF)and Uniform Random Distribution Func-tion(URDF)are used to improve the security and efficiency of key generation.Subsequently,the data preprocessing function is introduced to perform cleaning,deduplication,and normalization operations on the transaction data of multi-key signature,and it is classified into interactive data and asset data,so as to perform different homomorphic operations in the FHE encryption stage.Ultimately,in the FHE encryption stage,homomorphic multiplication and homomorphic addition are used targeted for the interactive data and asset data,thereby reducing the computational complexity and enhancing the FHE encryption efficiency.The significance of the proposed scheme is proved by experimental results:Firstly,the multi-key generation function and its specific sampling method and transformation ensure the security and efficiency of key generation.Data preprocessing can also accelerate the FHE encryption process by eliminating invalid data and redundancy,so the FHE encryption efficiency is significantly improved.Secondly,the FHE encryption method based on discrete logarithm problem enhances the security of transaction data and can effectively resist multiple attacks.In addition,the preprocessed data also has good performance in capacity storage.The proposed scheme has significant impacts on key indicators such as encryption efficiency and security,it provides a new reference for blockchain cross-chain transaction protection technology and has an important impact on the security improvement of various cross-chain transaction data. 展开更多
关键词 Blockchain cross-chain transactions fully homomorphic encryption(FHE)
在线阅读 下载PDF
A Transactional-Behavior-Based Hierarchical Gated Network for Credit Card Fraud Detection
12
作者 Yu Xie MengChu Zhou +3 位作者 Guanjun Liu Lifei Wei Honghao Zhu Pasquale De Meo 《IEEE/CAA Journal of Automatica Sinica》 2025年第7期1489-1503,共15页
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system,as well as to enforce customer confidence in digital payment systems.Historically,credit ca... The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system,as well as to enforce customer confidence in digital payment systems.Historically,credit card companies have used rulebased approaches to detect fraudulent transactions,but these have proven inadequate due to the complexity of fraud strategies and have been replaced by much more powerful solutions based on machine learning or deep learning algorithms.Despite significant progress,the current approaches to fraud detection suffer from a number of limitations:for example,it is unclear whether some transaction features are more effective than others in discriminating fraudulent transactions,and they often neglect possible correlations among transactions,even though they could reveal illicit behaviour.In this paper,we propose a novel credit card fraud detection(CCFD)method based on a transaction behaviour-based hierarchical gated network.First,we introduce a feature-oriented extraction module capable of identifying key features from original transactions,and such analysis is effective in revealing the behavioural characteristics of fraudsters.Second,we design a transaction-oriented extraction module capable of capturing the correlation between users’historical and current transactional behaviour.Such information is crucial for revealing users’sequential behaviour patterns.Our approach,called transactional-behaviour-based hierarchical gated network model(TbHGN),extracts two types of new transactional features,which are then combined in a feature interaction module to learn the final transactional representations used for CCFD.We have conducted extensive experiments on a real-world credit card transaction dataset with an increase in average F1 between 1.42%and 6.53%and an improvement in average AUC between 0.63%and 2.78%over the state of the art. 展开更多
关键词 Credit card fraud detection(CCFD) feature extraction gated recurrent network transactional behavior
在线阅读 下载PDF
Early cancer diagnosis via interpretable two-layer machine learning of plasma extracellular vesicle long RNA
13
作者 Shi-Cai Liu Han Zhang 《World Journal of Gastrointestinal Oncology》 2025年第11期254-277,共24页
BACKGROUND The early diagnosis rate of pancreatic ductal adenocarcinoma(PDAC)is low and the prognosis is poor.It is important to develop an interpretable noninvasive early diagnostic model in clinical practice.AIM To ... BACKGROUND The early diagnosis rate of pancreatic ductal adenocarcinoma(PDAC)is low and the prognosis is poor.It is important to develop an interpretable noninvasive early diagnostic model in clinical practice.AIM To develop an interpretable noninvasive early diagnostic model for PDAC using plasma extracellular vesicle long RNA(EvlRNA).METHODS The diagnostic model was constructed based on plasma EvlRNA data.During the process of establishing the model,EvlRNA-index was introduced,and four algorithms were adopted to calculate EvlRNA-index.After the model was successfully constructed,performance evaluation was conducted.A series of bioinformatics methods were adopted to explore the potential mechanism of EvlRNA-index as the input feature of the model.And the relationship between key characteristics and PDAC were explored at the single-cell level.RESULTS A novel interpretable machine learning framework was developed based on plasma EvlRNA.In this framework,a two-layer classifier was established.A new concept was proposed:EvlRNA-index.Based on EvlRNA-index,a cancer diagnostic model was established,and a good diagnostic effect was achieved.The accuracy of PDACandCPvsHealth-Probabilistic PCA Index-SVM(PDAC and chronic pancreatitis vs health-probabilistic principal component analysis index-support vector machine)(1-18)was 91.51%,with Mathew’s correlation coefficient 0.7760 and area under the curve 0.9560.In the second layer of the model,the accuracy of PDACvsCP-Probabilistic PCA Index-RF(PDAC vs chronic pancreatitis-probabilistic principal component analysis index-random forest)(2-17)was 93.83%,with Mathew’s correlation coefficient 0.8422 and area under the curve 0.9698.Forty-nine PDAC-related genes were identified,among which 16 were known,inferring that the remaining ones were also PDAC-related genes.CONCLUSION An interpretable two-layer machine learning framework was proposed for early diagnosis and prediction of PDAC based on plasma EvlRNA,providing new insights into the clinical value of EvlRNA. 展开更多
关键词 Pancreatic ductal adenocarcinoma Extracellular vesicle long RNA Noninvasive early diagnosis Interpretable machine learning two-layer classifier
暂未订购
A Two-Layer UAV Cooperative Computing Offloading Strategy Based on Deep Reinforcement Learning
14
作者 Zhang Jianfei Wang Zhen +1 位作者 Hu Yun Chang Zheng 《China Communications》 2025年第10期251-268,共18页
In the wake of major natural disasters or human-made disasters,the communication infrastruc-ture within disaster-stricken areas is frequently dam-aged.Unmanned aerial vehicles(UAVs),thanks to their merits such as rapi... In the wake of major natural disasters or human-made disasters,the communication infrastruc-ture within disaster-stricken areas is frequently dam-aged.Unmanned aerial vehicles(UAVs),thanks to their merits such as rapid deployment and high mobil-ity,are commonly regarded as an ideal option for con-structing temporary communication networks.Con-sidering the limited computing capability and battery power of UAVs,this paper proposes a two-layer UAV cooperative computing offloading strategy for emer-gency disaster relief scenarios.The multi-agent twin delayed deep deterministic policy gradient(MATD3)algorithm integrated with prioritized experience replay(PER)is utilized to jointly optimize the scheduling strategies of UAVs,task offloading ratios,and their mobility,aiming to diminish the energy consumption and delay of the system to the minimum.In order to address the aforementioned non-convex optimiza-tion issue,a Markov decision process(MDP)has been established.The results of simulation experiments demonstrate that,compared with the other four base-line algorithms,the algorithm introduced in this paper exhibits better convergence performance,verifying its feasibility and efficacy. 展开更多
关键词 cooperative computational offloading deep reinforcement learning mobile edge computing prioritized experience replay two-layer unmanned aerial vehicles
在线阅读 下载PDF
Joint inversion of gravity and magnetic data for a two-layer model 被引量:2
15
作者 江凡 吴健生 王家林 《Applied Geophysics》 SCIE CSCD 2008年第4期331-339,共9页
Based on the synchronous joint gravity and magnetic inversion of single interface by Pilkington and the need of revealing Cenozoic and crystalline basement thickness in the new round of oil-gas exploration, we propose... Based on the synchronous joint gravity and magnetic inversion of single interface by Pilkington and the need of revealing Cenozoic and crystalline basement thickness in the new round of oil-gas exploration, we propose a joint gravity and magnetic inversion methodfor two-layer models by concentrating on the relationship between the change of thicknessI and position of the middle layer and anomaly and discuss the effects of the key parameters. Model tests and application to field data show the validity of this method. 展开更多
关键词 two-layer model joint inversion of gravity and magnetic data Cenozoic andcrystalline basement
在线阅读 下载PDF
Transaction在PAR平台中的实现方法及应用研究 被引量:4
16
作者 朱小征 薛锦云 徐华珍 《计算机与数字工程》 2015年第10期1884-1890,共7页
随着电子商务和金融软件应用日益广泛,提高这类软件系统的可靠性和安全性就显得特别重要。虽然能够提高这类软件可靠性的事务处理技术早在数据库管理系统中普遍使用,近几年在Java软件开发环境中也新增了事务处理接口JTA,但是在基于模型... 随着电子商务和金融软件应用日益广泛,提高这类软件系统的可靠性和安全性就显得特别重要。虽然能够提高这类软件可靠性的事务处理技术早在数据库管理系统中普遍使用,近几年在Java软件开发环境中也新增了事务处理接口JTA,但是在基于模型驱动架构设计的建模语言中嵌入事务处理机制的成功案例尚不多见。论文在已有体现模型驱动软件架构思想的PAR方法和PAR平台中,融入抽象事务处理机制,并使用融入了事务处理机制的PAR平台及其建模语言开发了具有事务处理功能的金融软件模型,通过PAR平台的模型自动转换工具生成了Java和SQL程序。实验证明融入了事务处理机制的PAR方法和PAR平台具有建模简单、实用,软件开发效率高,便于形式化推导和证明等特点。 展开更多
关键词 事务处理 异常处理 PAR平台 模型驱动的软件架构
在线阅读 下载PDF
A Semantics-based Cooperative Transaction Model
17
作者 申石磊 刘先省 《Chinese Quarterly Journal of Mathematics》 CSCD 2002年第1期52-57,共6页
In CSCW system, there are many long-time, cooperative, interactive transactions. Traditional transaction model and advanced transaction model do not effectively support transaction processing in CSCW system. In this p... In CSCW system, there are many long-time, cooperative, interactive transactions. Traditional transaction model and advanced transaction model do not effectively support transaction processing in CSCW system. In this paper, a semantics-based cooperative transaction model(SCTM) is put forward. This model is based on the semantics information of cooperative process and data objects, and can satisfy the demands of transaction processing in CSCW system. 展开更多
关键词 transaction sub-transaction cooperative transaction
在线阅读 下载PDF
Effective Moduli of Two-Layered Spherical Inclusions Reinforced Composites
18
作者 胡更开 《Journal of Beijing Institute of Technology》 EI CAS 1997年第1期59-66,共8页
A model is proposed to evaluate the,effective modufi of a composite reinforced by two-layered spherical inclusions.This model is based on the localisation problem of a two- layered spherical inclusion embedded in an i... A model is proposed to evaluate the,effective modufi of a composite reinforced by two-layered spherical inclusions.This model is based on the localisation problem of a two- layered spherical inclusion embedded in an infinite matrix.The interations of the reinforced phases are taken into account by using the average matrix stress concept.When the external layer vanishes,the proposed model reduces to the classical Mori-Tanaka's model for spherical inclusions.Theoretical results for the composite of polyester matrix filled by hollow glass spheres and voids show excellent agreement with experimental results. 展开更多
关键词 two-layered spherical inclusion effective moduli COMPOSITE MICROMECHANICS
在线阅读 下载PDF
基于Transaction模式的SoC软硬件协同验证策略 被引量:1
19
作者 魏小义 李平 +1 位作者 廖永波 贾宇明 《陕西理工学院学报(自然科学版)》 2006年第2期42-45,共4页
SoC的验证越来越成为集成电路发展的突出问题,而传统的信号级别的验证方法由于工作量巨大,已经很难满足系统的要求。研究了基于Transaction模式的验证方法,并通过开发的验证平台,用实验进行了验证。该方法在Transaction级别上实现对系... SoC的验证越来越成为集成电路发展的突出问题,而传统的信号级别的验证方法由于工作量巨大,已经很难满足系统的要求。研究了基于Transaction模式的验证方法,并通过开发的验证平台,用实验进行了验证。该方法在Transaction级别上实现对系统的验证,提高了验证速度,可以缩短设计周期,降低设计成本。 展开更多
关键词 transaction模式 SOC SYSTEMC 验证
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部