期刊文献+
共找到767篇文章
< 1 2 39 >
每页显示 20 50 100
Low-Reynolds-Number Performance of Micro Radial-Flow Turbines at High Altitudes
1
作者 Yanzhao Yang Kai Yang +10 位作者 Junwei Zhang Fengsuo Jiang Sheng Xu Lei Chen Jun Bai Luyi Lu Hua Ji Zhihao Jing Senhao Wang Jingjing Zheng Haifeng Zhai 《Fluid Dynamics & Materials Processing》 2026年第1期66-85,共20页
The low-pressure and low-density conditions encountered at high altitudes significantly reduce the operating Reynolds number of micro radial-flow turbines,frequently bringing it below the self-similarity critical thre... The low-pressure and low-density conditions encountered at high altitudes significantly reduce the operating Reynolds number of micro radial-flow turbines,frequently bringing it below the self-similarity critical threshold of 3.5×10^(4).This departure undermines the applicability of conventional similarity-based design approaches.In this study,micro radial-flow turbines with rotor diameters below 50 mm are investigated through a combined approach integrating high-fidelity numerical simulations with experimental validation,aiming to elucidate the mechanisms by which low Reynolds numbers influence aerodynamic and thermodynamic performance.The results demonstrate that decreasing Reynolds number leads to boundary-layer thickening on blade surfaces,enhanced flow separation on the suction side,and increased secondary-flow losses within the blade passages.These effects jointly produce a pronounced and non-linear deterioration of turbine efficiency.Geometric scaling analysis further indicates that efficiency losses intensify with decreasing turbine size,and become particularly severe at low rotational speeds and high expansion ratios.Detailed flow-field analyses reveal a direct link between the degradation of blade loading distribution and the amplification of transverse pressure gradients under low-Reynolds-number conditions,providing physical insight into the observed performance decline. 展开更多
关键词 High altitude low Reynolds number radial-flow turbine aerodynamic performance experimental verification
在线阅读 下载PDF
Lexical-Prior-Free Planning:A Symbol-Agnostic Pipeline that Enables LLMs and LRMs to Plan under Obfuscated Interfaces
2
作者 Zhendong Du Hanliu Wang Kenji Hashimoto 《Computers, Materials & Continua》 2026年第4期416-451,共36页
Planning in lexical-prior-free environments presents a fundamental challenge for evaluating whether large language models(LLMs)possess genuine structural reasoning capabilities beyond lexical memorization.When predica... Planning in lexical-prior-free environments presents a fundamental challenge for evaluating whether large language models(LLMs)possess genuine structural reasoning capabilities beyond lexical memorization.When predicates and action names are replaced with semantically irrelevant random symbols while preserving logical structures,existing direct generation approaches exhibit severe performance degradation.This paper proposes a symbol-agnostic closed-loop planning pipeline that enables models to construct executable plans through systematic validation and iterative refinement.The system implements a complete generate-verify-repair cycle through six core processing components:semantic comprehension extracts structural constraints,language planner generates text plans,symbol translator performs structure-preserving mapping,consistency checker conducts static screening,Stanford Research Institute Problem Solver(STRIPS)simulator executes step-by-step validation,and VAL(Validator)provides semantic verification.A repair controller orchestrates four targeted strategies addressing typical failure patterns including first-step precondition errors andmid-segment statemaintenance issues.Comprehensive evaluation on PlanBench Mystery Blocksworld demonstrates substantial improvements over baseline approaches across both language models and reasoning models.Ablation studies confirm that each architectural component contributes non-redundantly to overall effectiveness,with targeted repair providing the largest impact,followed by deep constraint extraction and stepwise validation,demonstrating that superior performance emerges from synergistic integration of these mechanisms rather than any single dominant factor.Analysis reveals distinct failure patterns betweenmodel types—languagemodels struggle with local precondition satisfaction while reasoning models face global goal achievement challenges—yet the validation-driven mechanism successfully addresses these diverse weaknesses.A particularly noteworthy finding is the convergence of final success rates across models with varying intrinsic capabilities,suggesting that systematic validation and repair mechanisms play a more decisive role than raw model capacity in lexical-prior-free scenarios.This work establishes a rigorous evaluation framework incorporating statistical significance testing and mechanistic failure analysis,providingmethodological contributions for fair assessment and practical insights into building reliable planning systems under extreme constraint conditions. 展开更多
关键词 LLM planning PDDL symbol obfuscation lexical-prior-free evaluation closed-loop verification validation-driven repair structural reasoning mystery domain
在线阅读 下载PDF
Deep Learning-Based Toolkit Inspection:Object Detection and Segmentation in Assembly Lines
3
作者 Arvind Mukundan Riya Karmakar +1 位作者 Devansh Gupta Hsiang-Chen Wang 《Computers, Materials & Continua》 2026年第1期1255-1277,共23页
Modern manufacturing processes have become more reliant on automation because of the accelerated transition from Industry 3.0 to Industry 4.0.Manual inspection of products on assembly lines remains inefficient,prone t... Modern manufacturing processes have become more reliant on automation because of the accelerated transition from Industry 3.0 to Industry 4.0.Manual inspection of products on assembly lines remains inefficient,prone to errors and lacks consistency,emphasizing the need for a reliable and automated inspection system.Leveraging both object detection and image segmentation approaches,this research proposes a vision-based solution for the detection of various kinds of tools in the toolkit using deep learning(DL)models.Two Intel RealSense D455f depth cameras were arranged in a top down configuration to capture both RGB and depth images of the toolkits.After applying multiple constraints and enhancing them through preprocessing and augmentation,a dataset consisting of 3300 annotated RGB-D photos was generated.Several DL models were selected through a comprehensive assessment of mean Average Precision(mAP),precision-recall equilibrium,inference latency(target≥30 FPS),and computational burden,resulting in a preference for YOLO and Region-based Convolutional Neural Networks(R-CNN)variants over ViT-based models due to the latter’s increased latency and resource requirements.YOLOV5,YOLOV8,YOLOV11,Faster R-CNN,and Mask R-CNN were trained on the annotated dataset and evaluated using key performance metrics(Recall,Accuracy,F1-score,and Precision).YOLOV11 demonstrated balanced excellence with 93.0%precision,89.9%recall,and a 90.6%F1-score in object detection,as well as 96.9%precision,95.3%recall,and a 96.5%F1-score in instance segmentation with an average inference time of 25 ms per frame(≈40 FPS),demonstrating real-time performance.Leveraging these results,a YOLOV11-based windows application was successfully deployed in a real-time assembly line environment,where it accurately processed live video streams to detect and segment tools within toolkits,demonstrating its practical effectiveness in industrial automation.The application is capable of precisely measuring socket dimensions by utilising edge detection techniques on YOLOv11 segmentation masks,in addition to detection and segmentation.This makes it possible to do specification-level quality control right on the assembly line,which improves the ability to examine things in real time.The implementation is a big step forward for intelligent manufacturing in the Industry 4.0 paradigm.It provides a scalable,efficient,and accurate way to do automated inspection and dimensional verification activities. 展开更多
关键词 Tool detection image segmentation object detection assembly line automation Industry 4.0 Intel RealSense deep learning toolkit verification RGB-D imaging quality assurance
在线阅读 下载PDF
Establishment and verification of anthropogenic speciated VOCs emission inventory of Central China 被引量:3
4
作者 Xuan Lu Dong Zhang +9 位作者 Lanxin Wang Shefang Wang Xinran Zhang Yali Liu Keying Chen Xinshuai Song Shasha Yin Ruiqin Zhang Shanshan Wang Minghao Yuan 《Journal of Environmental Sciences》 2025年第3期406-418,共13页
Improving the accuracy of anthropogenic volatile organic compounds(VOCs)emission inventory is crucial for reducing atmospheric pollution and formulating control policy of air pollution.In this study,an anthropogenic s... Improving the accuracy of anthropogenic volatile organic compounds(VOCs)emission inventory is crucial for reducing atmospheric pollution and formulating control policy of air pollution.In this study,an anthropogenic speciated VOCs emission inventory was established for Central China represented by Henan Province at a 3 km×3 km spatial resolution based on the emission factormethod.The 2019 VOCs emission in Henan Provincewas 1003.5 Gg,while industrial process source(33.7%)was the highest emission source,Zhengzhou(17.9%)was the city with highest emission and April and August were the months with the more emissions.High VOCs emission regions were concentrated in downtown areas and industrial parks.Alkanes and aromatic hydrocarbons were the main VOCs contribution groups.The species composition,source contribution and spatial distribution were verified and evaluated through tracer ratio method(TR),Positive Matrix Factorization Model(PMF)and remote sensing inversion(RSI).Results show that both the emission results by emission inventory(EI)(15.7 Gg)and by TRmethod(13.6 Gg)and source contribution by EI and PMF are familiar.The spatial distribution of HCHO primary emission based on RSI is basically consistent with that of HCHO emission based on EI with a R-value of 0.73.The verification results show that the VOCs emission inventory and speciated emission inventory established in this study are relatively reliable. 展开更多
关键词 VOCs verification Species composition Tracer ratio PMF Remote sensing inversion
原文传递
Enhanced Kinship Verification through Ear Images:A Comparative Study of CNNs,Attention Mechanisms,and MLP Mixer Models 被引量:1
5
作者 Thien-Tan Cao Huu-Thanh Duong +3 位作者 Viet-Tuan Le Hau Nguyen Trung Vinh Truong Hoang Kiet Tran-Trung 《Computers, Materials & Continua》 2025年第6期4373-4391,共19页
Kinship verification is a key biometric recognition task that determines biological relationships based on physical features.Traditional methods predominantly use facial recognition,leveraging established techniques a... Kinship verification is a key biometric recognition task that determines biological relationships based on physical features.Traditional methods predominantly use facial recognition,leveraging established techniques and extensive datasets.However,recent research has highlighted ear recognition as a promising alternative,offering advantages in robustness against variations in facial expressions,aging,and occlusions.Despite its potential,a significant challenge in ear-based kinship verification is the lack of large-scale datasets necessary for training deep learning models effectively.To address this challenge,we introduce the EarKinshipVN dataset,a novel and extensive collection of ear images designed specifically for kinship verification.This dataset consists of 4876 high-resolution color images from 157 multiracial families across different regions,forming 73,220 kinship pairs.EarKinshipVN,a diverse and large-scale dataset,advances kinship verification research using ear features.Furthermore,we propose the Mixer Attention Inception(MAI)model,an improved architecture that enhances feature extraction and classification accuracy.The MAI model fuses Inceptionv4 and MLP Mixer,integrating four attention mechanisms to enhance spatial and channel-wise feature representation.Experimental results demonstrate that MAI significantly outperforms traditional backbone architectures.It achieves an accuracy of 98.71%,surpassing Vision Transformer models while reducing computational complexity by up to 95%in parameter usage.These findings suggest that ear-based kinship verification,combined with an optimized deep learning model and a comprehensive dataset,holds significant promise for biometric applications. 展开更多
关键词 Biometric analytics ear kin Inceptionv4 kinship verification KIN ear images
在线阅读 下载PDF
Research on multi-scale simulation and dynamic verification of high dynamic MEMS components in additive manufacturing 被引量:1
6
作者 Sining Lv Hengzhen Feng +2 位作者 Wenzhong Lou Chuan Xiao Shiyi Li 《Defence Technology(防务技术)》 2025年第5期275-291,共17页
Metal Additive Manufacturing(MAM) technology has become an important means of rapid prototyping precision manufacturing of special high dynamic heterogeneous complex parts. In response to the micromechanical defects s... Metal Additive Manufacturing(MAM) technology has become an important means of rapid prototyping precision manufacturing of special high dynamic heterogeneous complex parts. In response to the micromechanical defects such as porosity issues, significant deformation, surface cracks, and challenging control of surface morphology encountered during the selective laser melting(SLM) additive manufacturing(AM) process of specialized Micro Electromechanical System(MEMS) components, multiparameter optimization and micro powder melt pool/macro-scale mechanical properties control simulation of specialized components are conducted. The optimal parameters obtained through highprecision preparation and machining of components and static/high dynamic verification are: laser power of 110 W, laser speed of 600 mm/s, laser diameter of 75 μm, and scanning spacing of 50 μm. The density of the subordinate components under this reference can reach 99.15%, the surface hardness can reach 51.9 HRA, the yield strength can reach 550 MPa, the maximum machining error of the components is 4.73%, and the average surface roughness is 0.45 μm. Through dynamic hammering and high dynamic firing verification, SLM components meet the requirements for overload resistance. The results have proven that MEM technology can provide a new means for the processing of MEMS components applied in high dynamic environments. The parameters obtained in the conclusion can provide a design basis for the additive preparation of MEMS components. 展开更多
关键词 Additive manufacturing High dynamic MEMS components Multiscale control Process optimization High dynamic verification
在线阅读 下载PDF
C-BIVM:A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities
7
作者 Radhika Kumari Kiranbir Kaur +4 位作者 Ahmad Almogren Ayman Altameem Salil Bharany Yazeed Yasin Ghadi Ateeq Ur Rehman 《Computers, Materials & Continua》 2025年第9期5509-5525,共17页
The exponential growth of the Internet of Things(IoT)has revolutionized various domains such as healthcare,smart cities,and agriculture,generating vast volumes of data that require secure processing and storage in clo... The exponential growth of the Internet of Things(IoT)has revolutionized various domains such as healthcare,smart cities,and agriculture,generating vast volumes of data that require secure processing and storage in cloud environments.However,reliance on cloud infrastructure raises critical security challenges,particularly regarding data integrity.While existing cryptographic methods provide robust integrity verification,they impose significant computational and energy overheads on resource-constrained IoT devices,limiting their applicability in large-scale,real-time scenarios.To address these challenges,we propose the Cognitive-Based Integrity Verification Model(C-BIVM),which leverages Belief-Desire-Intention(BDI)cognitive intelligence and algebraic signatures to enable lightweight,efficient,and scalable data integrity verification.The model incorporates batch auditing,reducing resource consumption in large-scale IoT environments by approximately 35%,while achieving an accuracy of over 99.2%in detecting data corruption.C-BIVM dynamically adapts integrity checks based on real-time conditions,optimizing resource utilization by minimizing redundant operations by more than 30%.Furthermore,blind verification techniques safeguard sensitive IoT data,ensuring privacy compliance by preventing unauthorized access during integrity checks.Extensive experimental evaluations demonstrate that C-BIVM reduces computation time for integrity checks by up to 40%compared to traditional bilinear pairing-based methods,making it particularly suitable for IoT-driven applications in smart cities,healthcare,and beyond.These results underscore the effectiveness of C-BIVM in delivering a secure,scalable,and resource-efficient solution tailored to the evolving needs of IoT ecosystems. 展开更多
关键词 Internet of Things(IoT) smart cities data integrity verification BDI cognitive intelligence algebraic signatures batch auditing resource-constrained devices blind verification
在线阅读 下载PDF
Program Derivation and Mechanized Verification of Edit Distance Algorithm
8
作者 YOU Zhen ZHANG Chen +1 位作者 SUN Huan ZUO Zhengkang 《Wuhan University Journal of Natural Sciences》 2025年第6期576-588,共13页
Edit distance is an algorithm to measure the difference between two strings,usually represented as the minimum number of editing operations required to transform one string into another.The edit distance algorithm inv... Edit distance is an algorithm to measure the difference between two strings,usually represented as the minimum number of editing operations required to transform one string into another.The edit distance algorithm involves complex dependencies and constraints,making state management and verification work tedious.This paper proposes a derivation and verification method that avoids directly handling dependencies and constraints by proving the equivalence between the edit distance algorithm and existing functional modeling.First,the derivation process of edit distance algorithm mainly includes 1)describing problem specifications,2)inductively deducing recursive relations,3)formally constructing loop invariants using the optimization theory(memorization technology and optimal decision table)and properties(optimal substructure property and subproblems overlapping property)of the edit distance algorithm,4)generating the Minimalistic Imperative Programming Language(IMP)code based on the recursive relations.Second,the problem specification,loop invariants,and generated IMP code are input into Verification Condition Generator(VCG),which automatically generate five verification conditions,and then the correctness of edit distance algorithm is verified in the Isabelle/HOL theorem prover.The method utilizes formal technologies and theorem prover to complete the derivation and verification of the edit distance algorithm,and it can be applied to linear and nonlinear dynamic programming problems. 展开更多
关键词 Isabelle/HOL mechanized verification edit distance Verification Condition Generator(VCG)
原文传递
HashTrie Functional Framework and Its Application in Chinese-English Pattern Matching
9
作者 ZUO Zhengkang ZHOU Chao +1 位作者 ZENG Zhicheng WANG Changjing 《Wuhan University Journal of Natural Sciences》 2025年第2期184-194,共11页
Most existing multi-pattern matching algorithms are designed for single English texts leading to issues such as missed matches and space expansion when applied to Chinese-English mixed-text environments.The Hash Trie-... Most existing multi-pattern matching algorithms are designed for single English texts leading to issues such as missed matches and space expansion when applied to Chinese-English mixed-text environments.The Hash Trie-based matching machine demonstrates strong compatibility with both Chinese and English,ensuring high accuracy in text processing and subtree positioning.In this study,a novel functional framework based on the HashTrie structure is proposed and mechanically verified using Isabelle/HOL.This framework is applied to design Functional Multi-Pattern Matching(FMPM),the first functional multi-pattern matching algorithm for Chinese-English mixed texts.FMPM constructs the HashTrie matching machine using character codes and threads the machine according to the associations between pattern strings.The experimental results show that as the stored string information increases,the proposed algorithm demonstrates more significant optimization in retrieval efficiency.FMPM simplifies the implementation of the Threaded Hash Trie(THT)for Chinese-English mixed texts,effectively reducing the uncertainties in the transition from the algorithm description to code implementation.FMPM addresses the problem of space explosion Chinese-English mixed texts and avoids issues such as bound variable iteration errors.The functional framework of the HashTrie structure serves as a reference for the formal verification of future HashTrie-based algorithms. 展开更多
关键词 multi-pattern matching Chinese-English mixed HashTrie FUNCTIONAL mechanized verification
原文传递
Semantic Knowledge Based Reinforcement Learning Formalism for Smart Learning Environments
10
作者 Taimoor Hassan Ibrar Hussain +3 位作者 Hafiz Mahfooz Ul Haque Hamid Turab Mirza Muhammad Nadeem Ali Byung-Seo Kim 《Computers, Materials & Continua》 2025年第10期2071-2094,共24页
Smart learning environments have been considered as vital sources and essential needs in modern digital education systems.With the rapid proliferation of smart and assistive technologies,smart learning processes have ... Smart learning environments have been considered as vital sources and essential needs in modern digital education systems.With the rapid proliferation of smart and assistive technologies,smart learning processes have become quite convenient,comfortable,and financially affordable.This shift has led to the emergence of pervasive computing environments,where user’s intelligent behavior is supported by smart gadgets;however,it is becoming more challenging due to inconsistent behavior of Artificial intelligence(AI)assistive technologies in terms of networking issues,slow user responses to technologies and limited computational resources.This paper presents a context-aware predictive reasoning based formalism for smart learning environments that facilitates students in managing their academic as well as extra-curricular activities autonomously with limited human intervention.This system consists of a three-tier architecture including the acquisition of the contextualized information from the environment autonomously,modeling the system using Web Ontology Rule Language(OWL 2 RL)and Semantic Web Rule Language(SWRL),and perform reasoning to infer the desired goals whenever and wherever needed.For contextual reasoning,we develop a non-monotonic reasoning based formalism to reason with contextual information using rule-based reasoning.The focus is on distributed problem solving,where context-aware agents exchange information using rule-based reasoning and specify constraints to accomplish desired goals.To formally model-check and simulate the system behavior,we model the case study of a smart learning environment in the UPPAAL model checker and verify the desired properties in the model,such as safety,liveness and robust properties to reflect the overall correctness behavior of the system with achieving the minimum analysis time of 0.002 s and 34,712 KB memory utilization. 展开更多
关键词 CONTEXT-AWARENESS reinforcement learning multi-agent systems non-monotonic reasoning formal verification
在线阅读 下载PDF
Design and Ground Verification for Vision-Based Relative Navigation Systems of Microsatellites
11
作者 DU Ronghua LIAO Wenhe ZHANG Xiang 《Transactions of Nanjing University of Aeronautics and Astronautics》 2025年第1期37-55,共19页
This paper presents the design and ground verification for vision-based relative navigation systems of microsatellites,which offers a comprehensive hardware design solution and a robust experimental verification metho... This paper presents the design and ground verification for vision-based relative navigation systems of microsatellites,which offers a comprehensive hardware design solution and a robust experimental verification methodology for practical implementation of vision-based navigation technology on the microsatellite platform.Firstly,a low power consumption,light weight,and high performance vision-based relative navigation optical sensor is designed.Subsequently,a set of ground verification system is designed for the hardware-in-the-loop testing of the vision-based relative navigation systems.Finally,the designed vision-based relative navigation optical sensor and the proposed angles-only navigation algorithms are tested on the ground verification system.The results verify that the optical simulator after geometrical calibration can meet the requirements of the hardware-in-the-loop testing of vision-based relative navigation systems.Based on experimental results,the relative position accuracy of the angles-only navigation filter at terminal time is increased by 25.5%,and the relative speed accuracy is increased by 31.3% compared with those of optical simulator before geometrical calibration. 展开更多
关键词 microsatellites vision-based relative navigation optical simulator ground verification angles-only navigation
在线阅读 下载PDF
Application of Seismic Frequency Resonance Technology for Karst Detection at Qingshuitang Wollastonite Mining Area of Hezhou,South China
12
作者 Xiaoli Gou Shehong Li +8 位作者 He Yu Xuhong Zhou Hui Zhou Guang He Shangsong Han Chunmei Li Wenjiang Luo Zhiying Mu Mingyu Lu 《Journal of Environmental & Earth Sciences》 2025年第6期426-438,共13页
Karst caves are among the most common and critical geological hazards in karst regions.Due to their marked differences in physical properties compared to the surrounding rock,they can be detected using various geophys... Karst caves are among the most common and critical geological hazards in karst regions.Due to their marked differences in physical properties compared to the surrounding rock,they can be detected using various geophysical techniques.Karsts have developed on the surface of the Qingshuitang Wollastonite Mining Area in Huangtian Town,Hezhou City,Guangxi Province.In line with mine safety production requirements,a professional assessment of the potential development of karst caves must be conducted within 150 m of the mining area’s surface.Following an on-site investiga-tion and comparison with traditional geophysical methods,seismic frequency resonance technology(Seismic FRT)was selected for detection due to its convenience,flexibility,cost-effectiveness,and rapid data acquisition capabilities.Contour maps of the apparent wave impedance and geological profiles along the survey lines were obtained through data collection and processing.In combination with surface karst and mining geology,32 karst caves(hidden danger points)and 15 karst development zones were identified.Drilling verification was conducted at the A428 and B122 anomalous points on the A1# and B1# survey lines.The verification results were consistent with the inferred depths and maximum apparent wave impedance anomalies,confirming that Seismic FRT is a feasible and effective method for detecting hid-den karst development areas in mines. 展开更多
关键词 KARST Seismic Frequency Resonance Technology Abnormal Wave Impedance Drilling Verification Hezhou
在线阅读 下载PDF
Optimization of the Working Cycle Parameters of a Syngas Piston Engine Based on Mathematical Modeling
13
作者 Leonid Plotnikov Danil Davydov +1 位作者 Dmitry Krasilnikov Alexander Ryzhkov 《Energy Engineering》 2025年第11期4621-4633,共13页
Improving the specific,technical,economic,and environmental characteristics of piston engines(ICE)operating on alternative gaseous fuels is a pressing task for the energy and mechanical engineering industries.The aim ... Improving the specific,technical,economic,and environmental characteristics of piston engines(ICE)operating on alternative gaseous fuels is a pressing task for the energy and mechanical engineering industries.The aim of the study was to optimize the parameters of the ICE working cycle after replacing the base fuel(propane-butane blend)with syngas from wood sawdust to improve its technical and economic performance based on mathematical modeling.The modeling results were verified through experimental studies(differences for key parameters did not exceed 4.0%).The object of the study was an electric generator based on a single-cylinder spark ignition engine with a power of 1 kW.The article describes the main approaches to creating a mathematical model of the engine working cycle,a test bench for modeling verification,physicochemical properties of the base fuel(propane-butane blend),and laboratory syngas.It was shown that replacing the fuel from a propane-butane blend to laboratory syngas caused a decrease in engine efficiency to 33%(the efficiency of the base ICE was 0.179 vs.the efficiency of 0.119 for the converted ICE for the 0.59 kW power mode).Engine efficiency was chosen as the key criterion for optimizing the working cycle.As a result of optimization,the efficiency of the converted syngas engine was 6.1%higher than that of the base engine running on the propane-butane blend,and the power drop did not exceed 8.0%.Thus,careful fine-tuning of the working cycle parameters allows increasing the technical and economic characteristics of the syngas engine to the level of ICEs running on traditional types of fuel. 展开更多
关键词 Electric generator piston engine technical and economic characteristics propane-butane blend SYNGAS OPTIMIZATION mathematical modeling verification
在线阅读 下载PDF
The miR164a targets CsNAC1 to negatively regulate the cold tolerance of tea plants(Camellia sinensis)
14
作者 Siya Li Lu Cao +3 位作者 Ziwen Zhou Yaohua Cheng Xianchen Zhang Yeyun Li 《Journal of Integrative Agriculture》 2025年第8期3073-3086,共14页
Cold stress widely impairs the quality and yield of tea plants. The miR164 family and its target NAC transcription factor have been identified as crucial regulators in response to cold stress. However, the role of miR... Cold stress widely impairs the quality and yield of tea plants. The miR164 family and its target NAC transcription factor have been identified as crucial regulators in response to cold stress. However, the role of miR164 and CsNAC in cold tolerance in tea plants was little understood. In our study, the expression level of CsMIR164a was significantly reduced under cold stress and significantly and negatively correlated with that of CsNAC1.5' RACE and GUS histochemical assays showed that CsNAC1 was cleaved by CsMIR164a. The CsMIR164a-silenced tea leaves promoted the expression levels of CsNAC1 and CsCBFs and exhibited greater cold tolerance. Also, the overexpression of CsNAC1 enhanced cold tolerance in transgenic Arabidopsis plants by promoting the expression levels of AtCBFs. In contrast, the heterologous overexpression of CsMIR164a in Arabidopsis decreased the expression level of AtNACs and AtCBFs and thus impaired cold tolerance. Additionally, silencing of CsNAC1 impaired the expression levels of CsCBFs, resulting in greater cold sensitivity in tea leaves. Our present study demonstrated that the miR164a-CsNAC1 module may play a negative role in the cold tolerance of tea plants via the CsCBF-dependent pathway. 展开更多
关键词 tea plants cold stress MIRNAS NAC transcription factor functional verification
在线阅读 下载PDF
Verification and Validation for Large Eddy Simulation of Cavitating Flow Around a Projectile Near the Free Surface
15
作者 Linfeng Deng Yun Long +1 位作者 Huaiyu Cheng Bin Ji 《哈尔滨工程大学学报(英文版)》 2025年第4期659-681,共23页
Verification and validation(V&V)is a helpful tool for evaluating simulation errors,but its application in unsteady cavitating flow remains a challenging issue due to the difficulty in meeting the requirement of an... Verification and validation(V&V)is a helpful tool for evaluating simulation errors,but its application in unsteady cavitating flow remains a challenging issue due to the difficulty in meeting the requirement of an asymptotic range.Hence,a new V&V approach for large eddy simulation(LES)is proposed.This approach offers a viable solution for the error estimation of simulation data that are unable to satisfy the asymptotic range.The simulation errors of cavitating flow around a projectile near the free surface are assessed using the new V&V method.The evident error values are primarily dispersed around the cavity region and free surface.The increasingly intense cavitating flow increases the error magnitudes.In addition,the modeling error magnitudes of the Dynamic Smagorinsky-Lilly model are substantially smaller than that of the Smagorinsky-Lilly model.The present V&V method can capture the decrease in the modeling errors due to model enhancements,further exhibiting its applicability in cavitating flow simulations.Moreover,the monitoring points where the simulation data are beyond the asymptotic range are primarily dispersed near the cavity region,and the number of such points grows as the cavitating flow intensifies.The simulation outcomes also suggest that the re-entrant jet and shedding cavity collapse are the chief sources of vorticity motions,which remarkably affect the simulation accuracy.The results of this study provide a valuable reference for V&V research. 展开更多
关键词 Cavitating flow Free surface Verification and validation Error analyses Asymptotic range
在线阅读 下载PDF
Toward next-generation networks:A blockchain-based approach for core network architecture and roaming identity verification
16
作者 Yi Gong Boyuan Yu +4 位作者 Lei Yang Fanke Meng Lei Liu Xinjue Hu Zhan Xu 《Digital Communications and Networks》 2025年第2期326-336,共11页
With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN ... With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN and data security by proposing a novel framework based on blockchain technology that is specifically designed for communication networks.Traditional centralized network architectures are vulnerable to Distributed Denial of Service(DDoS)attacks,particularly in roaming scenarios where there is also a risk of private data leakage,which imposes significant operational demands.To address these issues,we introduce the Blockchain-Enhanced Core Network Architecture(BECNA)and the Secure Decentralized Identity Authentication Scheme(SDIDAS).The BECNA utilizes blockchain technology to decentralize data storage,enhancing network security,stability,and reliability by mitigating Single Points of Failure(SPoF).The SDIDAS utilizes Decentralized Identity(DID)technology to secure user identity data and streamline authentication in roaming scenarios,significantly reducing the risk of data breaches during cross-network transmissions.Our framework employs Ethereum,free5GC,Wireshark,and UERANSIM tools to create a robust,tamper-evident system model.A comprehensive security analysis confirms substantial improvements in user privacy and network security.Simulation results indicate that our approach enhances communication CNs security and reliability,while also ensuring data security. 展开更多
关键词 Blockchain Core network Privacy data protection Decentralized identity Roaming identity verification
在线阅读 下载PDF
Contextual design and real-time verification for agile casting design
17
作者 Dong Xiang Chu-hao Zhou +3 位作者 Xuan-pu Dong Shu-ren Guo Yan-song Ding Hua-tang Cao 《China Foundry》 2025年第2期231-238,共8页
In the foundry industries,process design has traditionally relied on manuals and complex theoretical calculations.With the advent of 3D design in casting,computer-aided design(CAD)has been applied to integrate the fea... In the foundry industries,process design has traditionally relied on manuals and complex theoretical calculations.With the advent of 3D design in casting,computer-aided design(CAD)has been applied to integrate the features of casting process,thereby expanding the scope of design options.These technologies use parametric model design techniques for rapid component creation and use databases to access standard process parameters and design specifications.However,3D models are currently still created through inputting or calling parameters,which requires numerous verifications through calculations to ensure the design rationality.This process may be significantly slowed down due to repetitive modifications and extended design time.As a result,there are increasingly urgent demands for a real-time verification mechanism to address this issue.Therefore,this study proposed a novel closed-loop model and software development method that integrated contextual design with real-time verification,dynamically verifying relevant rules for designing 3D casting components.Additionally,the study analyzed three typical closed-loop scenarios of agile design in an independent developed intelligent casting process system.It is believed that foundry industries can potentially benefit from favorably reduced design cycles to yield an enhanced competitive product market. 展开更多
关键词 agile design context-design casting process design real-time verification smart manufacturing
在线阅读 下载PDF
Preserving the Peaceful Use of Celestial Bodies:Prohibitions and Permissions
18
作者 Moamen Mohamed Sayed Mrisho Mlinga Idrisa LI Shouping 《Aerospace China》 2025年第2期39-46,共8页
The Outer Space Treaty(OST)remains a cornerstone of international space law,enshrining the principle of peaceful use for celestial bodies.However,ambiguities in its provisions,particularly regarding military activitie... The Outer Space Treaty(OST)remains a cornerstone of international space law,enshrining the principle of peaceful use for celestial bodies.However,ambiguities in its provisions,particularly regarding military activities and dual-use technologies,pose significant challenges in the 21st century.This paper examines the treaty’s limitations in addressing modern space militarization,commercial-military convergence,and resource exploitation.It critiques the lack of robust verification mechanisms and proposes clarifications to ensure sustainable and cooperative space exploration.The analysis highlights the urgent need for updated legal frameworks to govern private actors and emerging technologies while preserving the OST’s foundational principles.The paper evaluates recent policy initiatives to enhance space weapons regulations,including the Russo-Chinese treaty proposal to ban space-based weapons and the EU’s International Code of Conduct for Space.It concludes existing provisions indicate a reluctance to limit nuclear weapons in space,but are a milestone in regulating the arms race’s expansion.However,ambiguities persist regarding prohibited activities. 展开更多
关键词 Outer Space Treaty peaceful use space militarization dual-use technologies verification mechanisms
在线阅读 下载PDF
A new predictive based secure geographic routing strategy for UAV network under location spoofing attack
19
作者 Zihao ZHOU Jie TANG +3 位作者 Zhutian YANG Junyuan FAN Xiaokai SONG Kai Kit WONG 《Chinese Journal of Aeronautics》 2025年第10期47-58,共12页
Unmanned aerial vehicle(UAV)swarm network consisting of a collection of micro UAVs can be used for many applications.It is well established that packet routing is a fundamental problem to achieve UAV collaboration.How... Unmanned aerial vehicle(UAV)swarm network consisting of a collection of micro UAVs can be used for many applications.It is well established that packet routing is a fundamental problem to achieve UAV collaboration.However,the highly dynamic nature of UAVs,frequently changing network topologies and security issues,poses significant challenges to packet forwarding in UAV networks.The existing topology-based routing protocols are not well suited in UAV network due to their high controlling overhead or excessive end-to-end delay.Geographic routing is regarded as a promising solution,as it only requires local information.In order to enhance the accuracy and security of geographic routing in highly dynamic UAV network,in this paper,we propose a new predictive geographic(PGeo)routing strategy with location verification.First,a detection mechanism is adopted to recognize malicious UAVs falsifying their location.Then,an accurate average service time of a packet in the medium access control(MAC)layer is derived to assist location prediction.The proposed delay model can provide a theoretical basis for future work,and our simulation results reveal that PGeo outstrips the existing geographic routing protocols in terms of packet delivery ratio in the presence of location spoofing behavior. 展开更多
关键词 Unmanned aerial vehicle Secure communication Geographic routing Location spoofing Delay estimation Location prediction Location verification
原文传递
Speeches at the sub-forum on metrology technology
20
《China Standardization》 2025年第6期51-59,共9页
At present,AI is reshaping the global industrial landscape at an unprecedented depth.As the cornerstone suppor ting technological innovation and industrial development,metrology is radiating new vitality in the AI era... At present,AI is reshaping the global industrial landscape at an unprecedented depth.As the cornerstone suppor ting technological innovation and industrial development,metrology is radiating new vitality in the AI era.It is not only a verification scale for algorithm accuracy and a trust anchor for sensing systems,but also a strategic link for China and ASEAN to deepen industrial collaboration.Metrology runs through the entire innovation chain of AI,providing verifiable and reproducible scientific basis for technological innovation and industrial development. 展开更多
关键词 verification scale technological innovation industrial developmentmetrology trust anchor algorithm accuracy METROLOGY deepen industrial collaborationmetrology sensing systemsbut
原文传递
上一页 1 2 39 下一页 到第
使用帮助 返回顶部