期刊文献+
共找到93,628篇文章
< 1 2 250 >
每页显示 20 50 100
FedCLCC:A personalized federated learning algorithm for edge cloud collaboration based on contrastive learning and conditional computing
1
作者 Kangning Yin Xinhui Ji +1 位作者 Yan Wang Zhiguo Wang 《Defence Technology(防务技术)》 2025年第1期80-93,共14页
Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure ... Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenges in edge environments.However,the diversity of clients in edge cloud computing presents significant challenges for FL.Personalized federated learning(pFL)received considerable attention in recent years.One example of pFL involves exploiting the global and local information in the local model.Current pFL algorithms experience limitations such as slow convergence speed,catastrophic forgetting,and poor performance in complex tasks,which still have significant shortcomings compared to the centralized learning.To achieve high pFL performance,we propose FedCLCC:Federated Contrastive Learning and Conditional Computing.The core of FedCLCC is the use of contrastive learning and conditional computing.Contrastive learning determines the feature representation similarity to adjust the local model.Conditional computing separates the global and local information and feeds it to their corresponding heads for global and local handling.Our comprehensive experiments demonstrate that FedCLCC outperforms other state-of-the-art FL algorithms. 展开更多
关键词 Federated learning Statistical heterogeneity Personalized model Conditional computing Contrastive learning
在线阅读 下载PDF
Task scheduling and virtual machine allocation policy in cloud computing environment 被引量:3
2
作者 Xiong Fu Yeliang Cang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第4期847-856,共10页
Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time o... Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time of data intensive tasks. How- ever, most of the current resource allocation policies focus only on network conditions and physical hosts. And the computing power of VMs is largely ignored. This paper proposes a comprehensive resource allocation policy which consists of a data intensive task scheduling algorithm that takes account of computing power of VMs and a VM allocation policy that considers bandwidth between storage nodes and hosts. The VM allocation policy includes VM placement and VM migration algorithms. Related simulations show that the proposed algorithms can greatly reduce the task comple- tion time and keep good load balance of physical hosts at the same time. 展开更多
关键词 cloud computing resource allocation task scheduling virtual machine (VM) allocation.
在线阅读 下载PDF
Energy efficient virtual machine migration approach with SLA conservation in cloud computing 被引量:4
3
作者 GARG Vaneet JINDAL Balkrishan 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第3期760-770,共11页
In the age of online workload explosion,cloud users are increasing exponentialy.Therefore,large scale data centers are required in cloud environment that leads to high energy consumption.Hence,optimal resource utiliza... In the age of online workload explosion,cloud users are increasing exponentialy.Therefore,large scale data centers are required in cloud environment that leads to high energy consumption.Hence,optimal resource utilization is essential to improve energy efficiency of cloud data center.Although,most of the existing literature focuses on virtual machine(VM)consolidation for increasing energy efficiency at the cost of service level agreement degradation.In order to improve the existing approaches,load aware three-gear THReshold(LATHR)as well as modified best fit decreasing(MBFD)algorithm is proposed for minimizing total energy consumption while improving the quality of service in terms of SLA.It offers promising results under dynamic workload and variable number of VMs(1-290)allocated on individual host.The outcomes of the proposed work are measured in terms of SLA,energy consumption,instruction energy ratio(IER)and the number of migrations against the varied numbers of VMs.From experimental results it has been concluded that the proposed technique reduced the SLA violations(55%,26%and 39%)and energy consumption(17%,12%and 6%)as compared to median absolute deviation(MAD),inter quartile range(IQR)and double threshold(THR)overload detection policies,respectively. 展开更多
关键词 cloud computing energy efficiency three-gear threshold resource allocation service level agreement
在线阅读 下载PDF
Low-cost cloud computing solution for geo-information processing 被引量:3
4
作者 高培超 刘钊 +1 位作者 谢美慧 田琨 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3217-3224,共8页
Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/rem... Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/remote sensing(GIS/RS) researchers rent more public clouds or establish more private clouds.However,a large proportion of these clouds are found to be underutilized,since users do not deal with big data every day.The low usage of cloud resources violates the original intention of cloud computing,which is to save resources by improving usage.In this work,a low-cost cloud computing solution was proposed for geo-information processing,especially for temporary processing tasks.The proposed solution adopted a hosted architecture and can be realized based on ordinary computers in a common GIS/RS laboratory.The usefulness and effectiveness of the proposed solution was demonstrated by using big data simplification as a case study.Compared to commercial public clouds and dedicated private clouds,the proposed solution is more low-cost and resource-saving,and is more suitable for GIS/RS applications. 展开更多
关键词 cloud computing geo-information processing geo-processing
在线阅读 下载PDF
SATVPC:Secure-agent-based trustworthy virtual private cloud model in open computing environments 被引量:2
5
作者 徐小龙 涂群 +2 位作者 BESSIS Nik 杨庚 王新珩 《Journal of Central South University》 SCIE EI CAS 2014年第8期3186-3196,共11页
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft... Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally. 展开更多
关键词 cloud computing trustworthy computing VIRTUALIZATION agent
在线阅读 下载PDF
Resource pre-allocation algorithms for low-energy task scheduling of cloud computing 被引量:4
6
作者 Xiaolong Xu Lingling Cao Xinheng Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第2期457-469,共13页
In order to lower the power consumption and improve the coefficient of resource utilization of current cloud computing systems, this paper proposes two resource pre-allocation algorithms based on the "shut down the r... In order to lower the power consumption and improve the coefficient of resource utilization of current cloud computing systems, this paper proposes two resource pre-allocation algorithms based on the "shut down the redundant, turn on the demanded" strategy here. Firstly, a green cloud computing model is presented, abstracting the task scheduling problem to the virtual machine deployment issue with the virtualization technology. Secondly, the future workloads of system need to be predicted: a cubic exponential smoothing algorithm based on the conservative control(CESCC) strategy is proposed, combining with the current state and resource distribution of system, in order to calculate the demand of resources for the next period of task requests. Then, a multi-objective constrained optimization model of power consumption and a low-energy resource allocation algorithm based on probabilistic matching(RA-PM) are proposed. In order to reduce the power consumption further, the resource allocation algorithm based on the improved simulated annealing(RA-ISA) is designed with the improved simulated annealing algorithm. Experimental results show that the prediction and conservative control strategy make resource pre-allocation catch up with demands, and improve the efficiency of real-time response and the stability of the system. Both RA-PM and RA-ISA can activate fewer hosts, achieve better load balance among the set of high applicable hosts, maximize the utilization of resources, and greatly reduce the power consumption of cloud computing systems. 展开更多
关键词 green cloud computing power consumption prediction resource allocation probabilistic matching simulated annealing
在线阅读 下载PDF
A novel virtual machine deployment algorithm with energy efficiency in cloud computing 被引量:12
7
作者 周舟 胡志刚 +1 位作者 宋铁 于俊洋 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第3期974-983,共10页
In order to improve the energy efficiency of large-scale data centers, a virtual machine(VM) deployment algorithm called three-threshold energy saving algorithm(TESA), which is based on the linear relation between the... In order to improve the energy efficiency of large-scale data centers, a virtual machine(VM) deployment algorithm called three-threshold energy saving algorithm(TESA), which is based on the linear relation between the energy consumption and(processor) resource utilization, is proposed. In TESA, according to load, hosts in data centers are divided into four classes, that is,host with light load, host with proper load, host with middle load and host with heavy load. By defining TESA, VMs on lightly loaded host or VMs on heavily loaded host are migrated to another host with proper load; VMs on properly loaded host or VMs on middling loaded host are kept constant. Then, based on the TESA, five kinds of VM selection policies(minimization of migrations policy based on TESA(MIMT), maximization of migrations policy based on TESA(MAMT), highest potential growth policy based on TESA(HPGT), lowest potential growth policy based on TESA(LPGT) and random choice policy based on TESA(RCT)) are presented, and MIMT is chosen as the representative policy through experimental comparison. Finally, five research directions are put forward on future energy management. The results of simulation indicate that, as compared with single threshold(ST) algorithm and minimization of migrations(MM) algorithm, MIMT significantly improves the energy efficiency in data centers. 展开更多
关键词 cloud computing energy efficiency three-threshold virtual machine(VM) selection policy energy management
在线阅读 下载PDF
美国CLOUD法案数据跨境执法中的安全风险与中国的应对 被引量:1
8
作者 廖明月 王佳宜 杨映雪 《图书馆论坛》 北大核心 2025年第1期128-137,共10页
数据是数字经济时代重要的国家战略资源,数据跨境流动亦是其中的重要一环。囿于犯罪活动呈现数字化和跨境化态势,数据跨境执法成为打击网络犯罪的重要手段,但基于执法目的的数据出境对数据存储国的影响重大。美国凭借“数据自由”话语... 数据是数字经济时代重要的国家战略资源,数据跨境流动亦是其中的重要一环。囿于犯罪活动呈现数字化和跨境化态势,数据跨境执法成为打击网络犯罪的重要手段,但基于执法目的的数据出境对数据存储国的影响重大。美国凭借“数据自由”话语体系通过CLOUD法案推出以“数据控制者标准”为核心的数据管辖模式,进而依托网络服务提供者实施“长臂管辖”,使得我国数据被动出境和被调取而引发的国家数据安全风险大幅提升。我国应将数据主权作为数据跨境流动的法理基础,探索控制数据安全风险的制度工具,包括基于国家主权调适“数据控制者”标准模式,完善数据跨境调取安全规则和审查机制,以阻断法限制单边数据跨境执法,对美国的相关“长臂管辖”进行有效制衡。 展开更多
关键词 数据跨境执法 安全风险 数据主权 cloud法案
在线阅读 下载PDF
Power Grid Islands Service Restoration Based on Cloud Computing 被引量:14
9
作者 ZHANG Hao HE Jinghan +2 位作者 YIN Hang BO Zhiqian B Kirby 《中国电机工程学报》 EI CSCD 北大核心 2011年第34期I0007-I0007,9,共1页
提出了一种基于云计算思想的电网恢复重构方法,利用网络中大量的分布式计算资源加速求取孤岛间网络恢复重构的最优解。利用电力系统分层分布式体系结构将含有多个微网的复杂配电网络视为不同的子云计算区,每个子云计算区根据自身情况将... 提出了一种基于云计算思想的电网恢复重构方法,利用网络中大量的分布式计算资源加速求取孤岛间网络恢复重构的最优解。利用电力系统分层分布式体系结构将含有多个微网的复杂配电网络视为不同的子云计算区,每个子云计算区根据自身情况将重构的服务请求分解为多个可独立处理的计算块并提交分布的计算节点进行并行处理和结果取优。相关联子云计算区之间可通信以协调不同区域间的负荷转供,最终实现故障恢复重构的目标。算例分析结果验证了该方法的有效性。 展开更多
关键词 英文摘要 内容介绍 编辑工作 期刊
在线阅读 下载PDF
A Meta-Modeling Service Paradigm for Cloud Computing and Its Implementation
10
作者 Jia Hangsheng1,Cheng Fei1,Tang Xiaoting2 (1. School of Management,Hefei University of Technology,Hefei 230009,China 2. School of Management,University of Science and Technology of China,Hefei 230026,China) 《电信科学》 北大核心 2010年第S1期89-94,共6页
It is argued in this article to shed light on service supply chain issues associated with cloud computing by examining several interrelated questions:service supply chain architecture from service perspective; basic c... It is argued in this article to shed light on service supply chain issues associated with cloud computing by examining several interrelated questions:service supply chain architecture from service perspective; basic clouds of service supply chain and development of managerial insights into these clouds. In particular,to demonstrate how those services can be utilized and the processes involved in their utilization,a hypothetical meta-modeling service of cloud computing can be given. Moreover,the paper defines the architecture of cloud managed for SV or ISP in infrastructure of cloud computing in service supply chain:IT services,business services,business processes,which creates atomic and composite software services that are used to perform business processes with business service choreographies. 展开更多
关键词 SERVICE supply chain SERVICE VENDOR integration SERVICE PROVIDER cloud computing coordination
在线阅读 下载PDF
Dynamic access task scheduling of LEO constellation based on space-based distributed computing
11
作者 LIU Wei JIN Yifeng +2 位作者 ZHANG Lei GAO Zihe TAO Ying 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期842-854,共13页
A dynamic multi-beam resource allocation algorithm for large low Earth orbit(LEO)constellation based on on-board distributed computing is proposed in this paper.The allocation is a combinatorial optimization process u... A dynamic multi-beam resource allocation algorithm for large low Earth orbit(LEO)constellation based on on-board distributed computing is proposed in this paper.The allocation is a combinatorial optimization process under a series of complex constraints,which is important for enhancing the matching between resources and requirements.A complex algorithm is not available because that the LEO on-board resources is limi-ted.The proposed genetic algorithm(GA)based on two-dimen-sional individual model and uncorrelated single paternal inheri-tance method is designed to support distributed computation to enhance the feasibility of on-board application.A distributed system composed of eight embedded devices is built to verify the algorithm.A typical scenario is built in the system to evalu-ate the resource allocation process,algorithm mathematical model,trigger strategy,and distributed computation architec-ture.According to the simulation and measurement results,the proposed algorithm can provide an allocation result for more than 1500 tasks in 14 s and the success rate is more than 91%in a typical scene.The response time is decreased by 40%com-pared with the conditional GA. 展开更多
关键词 beam resource allocation distributed computing low Earth obbit(LEO)constellation spacecraft access task scheduling
在线阅读 下载PDF
Real-Time Monitoring Method for Cow Rumination Behavior Based on Edge Computing and Improved MobileNet v3
12
作者 ZHANG Yu LI Xiangting +4 位作者 SUN Yalin XUE Aidi ZHANG Yi JIANG Hailong SHEN Weizheng 《智慧农业(中英文)》 CSCD 2024年第4期29-41,共13页
[Objective]Real-time monitoring of cow ruminant behavior is of paramount importance for promptly obtaining relevant information about cow health and predicting cow diseases.Currently,various strategies have been propo... [Objective]Real-time monitoring of cow ruminant behavior is of paramount importance for promptly obtaining relevant information about cow health and predicting cow diseases.Currently,various strategies have been proposed for monitoring cow ruminant behavior,including video surveillance,sound recognition,and sensor monitoring methods.How‐ever,the application of edge device gives rise to the issue of inadequate real-time performance.To reduce the volume of data transmission and cloud computing workload while achieving real-time monitoring of dairy cow rumination behavior,a real-time monitoring method was proposed for cow ruminant behavior based on edge computing.[Methods]Autono‐mously designed edge devices were utilized to collect and process six-axis acceleration signals from cows in real-time.Based on these six-axis data,two distinct strategies,federated edge intelligence and split edge intelligence,were investigat‐ed for the real-time recognition of cow ruminant behavior.Focused on the real-time recognition method for cow ruminant behavior leveraging federated edge intelligence,the CA-MobileNet v3 network was proposed by enhancing the MobileNet v3 network with a collaborative attention mechanism.Additionally,a federated edge intelligence model was designed uti‐lizing the CA-MobileNet v3 network and the FedAvg federated aggregation algorithm.In the study on split edge intelli‐gence,a split edge intelligence model named MobileNet-LSTM was designed by integrating the MobileNet v3 network with a fusion collaborative attention mechanism and the Bi-LSTM network.[Results and Discussions]Through compara‐tive experiments with MobileNet v3 and MobileNet-LSTM,the federated edge intelligence model based on CA-Mo‐bileNet v3 achieved an average Precision rate,Recall rate,F1-Score,Specificity,and Accuracy of 97.1%,97.9%,97.5%,98.3%,and 98.2%,respectively,yielding the best recognition performance.[Conclusions]It is provided a real-time and effective method for monitoring cow ruminant behavior,and the proposed federated edge intelligence model can be ap‐plied in practical settings. 展开更多
关键词 cow rumination behavior real-time monitoring edge computing improved MobileNet v3 edge intelligence model Bi-LSTM
在线阅读 下载PDF
An Algorithm for Cloud-based Web Service Combination Optimization Through Plant Growth Simulation
13
作者 Li Qiang Qin Huawei +1 位作者 Qiao Bingqin Wu Ruifang 《系统仿真学报》 北大核心 2025年第2期462-473,共12页
In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-base... In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-based web services and the constraints of system resources.Then,a light-induced plant growth simulation algorithm was established.The performance of the algorithm was compared through several plant types,and the best plant model was selected as the setting for the system.Experimental results show that when the number of test cloud-based web services reaches 2048,the model being 2.14 times faster than PSO,2.8 times faster than the ant colony algorithm,2.9 times faster than the bee colony algorithm,and a remarkable 8.38 times faster than the genetic algorithm. 展开更多
关键词 cloud-based service scheduling algorithm resource constraint load optimization cloud computing plant growth simulation algorithm
在线阅读 下载PDF
Mobile-agent-based energy-efficient scheduling with dynamic channel acquisition in mobile cloud computing
14
作者 Xing Liu Chaowei Yuan +1 位作者 Zhen Yang Zengping Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第3期712-720,共9页
Mobile cloud computing(MCC) combines mobile Internet and cloud computing to improve the performance of mobile applications. However, MCC faces the problem of energy efficiency because of randomly varying channels. A... Mobile cloud computing(MCC) combines mobile Internet and cloud computing to improve the performance of mobile applications. However, MCC faces the problem of energy efficiency because of randomly varying channels. A scheduling algorithm is proposed by introducing the Lyapunov optimization, which can dynamically choose users to transmit data based on queue backlog and channel statistics. The Lyapunov analysis shows that the proposed scheduling algorithm can make a tradeoff between queue backlog and energy consumption in the channel-aware mobile cloud computing system. The simulation results verify the effectiveness of the proposed algorithm. 展开更多
关键词 mobile cloud computing mobile Internet queueing energy efficiency Lyapunov optimization
在线阅读 下载PDF
Current Cloud Computing Security Concerns from Consumer Perspective
15
作者 Hafiz Gulfam Ahmad Zeeshan Ahmad 《机床与液压》 北大核心 2013年第24期1-5,共5页
In recent years cloud computing is the subject of extensive research in the emerging field of information technology and has become a promising business.The reason behind this widespread interest is its abilityto incr... In recent years cloud computing is the subject of extensive research in the emerging field of information technology and has become a promising business.The reason behind this widespread interest is its abilityto increase the capacity and capability of enterprises,having no investment for new infrastructure,no software license requirement and no need of any training.Security concern is the main limitation factor in the growth of this new born technology.The security responsibilities of both,the provider and the consumer greatly differ between cloud service models.In this paper we discuss a variety of security risks,authentication issues,trust,and legal regularity in cloud environment with consumer perspective.Early research focused only on technical and business consequences of cloud computing and ignored consumer perspective.Therefore,this paper discusses the consumer security and privacy preferences. 展开更多
关键词 云计算 电子商务 信息化建设 供应商
在线阅读 下载PDF
Link-16 anti-jamming performance evaluation based on grey relational analysis and cloud model
16
作者 NING Xiaoyan WANG Ying +1 位作者 WANG Zhenduo SUN Zhiguo 《Journal of Systems Engineering and Electronics》 2025年第1期62-72,共11页
Anti-jamming performance evaluation has recently received significant attention. For Link-16, the anti-jamming performance evaluation and selection of the optimal anti-jamming technologies are urgent problems to be so... Anti-jamming performance evaluation has recently received significant attention. For Link-16, the anti-jamming performance evaluation and selection of the optimal anti-jamming technologies are urgent problems to be solved. A comprehensive evaluation method is proposed, which combines grey relational analysis (GRA) and cloud model, to evaluate the anti-jamming performances of Link-16. Firstly, on the basis of establishing the anti-jamming performance evaluation indicator system of Link-16, the linear combination of analytic hierarchy process(AHP) and entropy weight method (EWM) are used to calculate the combined weight. Secondly, the qualitative and quantitative concept transformation model, i.e., the cloud model, is introduced to evaluate the anti-jamming abilities of Link-16 under each jamming scheme. In addition, GRA calculates the correlation degree between evaluation indicators and the anti-jamming performance of Link-16, and assesses the best anti-jamming technology. Finally, simulation results prove that the proposed evaluation model can achieve the objective of feasible and practical evaluation, which opens up a novel way for the research of anti-jamming performance evaluations of Link-16. 展开更多
关键词 LINK-16 ANTI-JAMMING grey relational analysis(GRA) cloud model combination weights
在线阅读 下载PDF
Control model for burning-bubble clouds formed by confined meltcast explosives under thermal stimulation
17
作者 Zhi Li Zhuoping Duan +4 位作者 Zhiling Bai Jixuan Jiao Liji Xu Liansheng Zhang Fenglei Huang 《Defence Technology(防务技术)》 2025年第6期268-283,共16页
DNAN-based insensitive melt-cast explosives have been widely utilized in insensitive munition in recent years. When constrained DNAN-based melt-cast explosives are ignited under thermal stimulation, the base explosive... DNAN-based insensitive melt-cast explosives have been widely utilized in insensitive munition in recent years. When constrained DNAN-based melt-cast explosives are ignited under thermal stimulation, the base explosive exists in a molten liquid state, where high-temperature gases expand and react in the form of bubble clouds within the liquid explosive;this process is distinctly different from the dynamic crack propagation process observed in the case of solid explosives. In this study, a control model for the reaction evolution of burning-bubble clouds was established to describe the reaction process and quantify the reaction violence of DNAN-based melt-cast explosives, considering the size distribution and activation mechanism of the burning-bubble clouds. The feasibility of the model was verified through experimental results. The results revealed that under geometrically similar conditions, with identical confinement strength and aspect ratio, larger charge structures led to extended initial gas flow and surface burning processes, resulting in greater reaction equivalence and violence at the casing fracture.Under constant charge volume and size, a stronger casing confinement accelerated self-enhanced burning, increasing the internal pressure, reaction degree, and reaction violence. Under a constant casing thickness and radius, higher aspect ratios led to a greater reaction violence at the casing fracture.Moreover, under a constant charge volume and casing thickness, higher aspect ratios resulted in a higher internal pressure, increased reaction degree, and greater reaction violence at the casing fracture. Further,larger ullage volumes extended the reaction evolution time and increased the reaction violence under constant casing dimensions. Through a matching design of the opening threshold of the pressure relief holes and the relief structure area, a stable burning reaction could be maintained until completion,thereby achieving a control of the reaction violence. The proposed model could effectively reflect the effects of the intrinsic burning rate, casing confinement strength, charge size, ullage volume, and pressure relief structure on the reaction evolution process and reaction violence, providing a theoretical method for the thermal safety design and reaction violence evaluation of melt-cast explosives. 展开更多
关键词 Melt-cast explosives Non-shock-initiated reaction Self-sustaining enhanced combustion Burning-bubble cloud model Pressure relief area Reaction violence
在线阅读 下载PDF
面向智算网络的SCLOUD+后量子密钥封装适配与BW格优化研究
18
作者 潘洁 郗卓宁 +5 位作者 赵占军 卜忠贵 侯慧芳 叶兰 陈曦 薛曌 《电信科学》 北大核心 2025年第7期176-186,共11页
现有主流后量子密钥封装机制,如基于模块格的密钥封装机制(module-lattice-based key encapsulation mechanism,ML-KEM),依赖于结构化格的模上容错学习(module learning with errors,Module-LWE)问题,其代数结构可能导致归约漏洞。聚焦... 现有主流后量子密钥封装机制,如基于模块格的密钥封装机制(module-lattice-based key encapsulation mechanism,ML-KEM),依赖于结构化格的模上容错学习(module learning with errors,Module-LWE)问题,其代数结构可能导致归约漏洞。聚焦于非结构化LWE框架下的SCLOUD+方案,其基于巴恩斯-沃尔(Barnes-Wall,BW)格的递归构造特性,通过高维格编码增益实现公钥与密文尺寸的显著压缩。基于该方案提出一种面向BW格的维度特化全展开递归消除技术,通过编译期常量优化、分层硬编码策略及单指令多数据(single-instruction multiple-data,SIMD)友好内存布局,将BW格在128维场景下的解码时钟周期从147 798降至30 107,为SCLOUD+后量子密钥封装机制提供了核心支撑。此研究为智算网络提供了一种兼顾高效性与抗量子安全性的轻量级密钥封装机制(key encapsulation mechanism,KEM)范式,为分布式联邦学习等低时延应用场景奠定了关键技术基础。 展开更多
关键词 智算网络 巴恩斯-沃尔格 有界距离解码 后量子密码 密钥封装
在线阅读 下载PDF
MatCloud-QE:基于云原生理念的高通量第一性原理计算程序包 被引量:1
19
作者 杨小渝 郝德博 +3 位作者 舒城 许立芳 梁亚男 马新杰 《中国材料进展》 CAS CSCD 北大核心 2024年第11期1007-1015,共9页
国内开展第一性原理计算总是局限于某一两个商业软件,不仅需要软件使用许可,而且还需要下载、安装到本地,再通过人工部署到高性能计算集群才能开展使用,极大地限制了科研人员开展第一性原理计算。为了解决这个问题,作者团队基于Quantum ... 国内开展第一性原理计算总是局限于某一两个商业软件,不仅需要软件使用许可,而且还需要下载、安装到本地,再通过人工部署到高性能计算集群才能开展使用,极大地限制了科研人员开展第一性原理计算。为了解决这个问题,作者团队基于Quantum ESPRESSO第一性原理计算内核,进一步开发了高通量第一性原理计算加速算法、参数智能推荐算法、输入结构统一算法、自动后处理引擎、组件化引擎、图形化引擎、更多物性计算功能以及MatCloud+接口等算法程序,形成了具有云原生特点的第一性原理计算程序包:MatCloud-QE;进一步通过接入MatCloud+材料云,使用户仅通过浏览器就可在线开展第一性原理计算和数据自动化采集和管理,极大地方便了用户开展第一性原理计算以及高通量计算筛选,且无需软件使用许可。以面向太阳能电池应用的无机钙钛矿Rb_(1-x)Cs_(x)PbI3的材料特性的第一性原理计算为例,说明通过MatCloud+材料云平台使用MatCloud-QE第一性原理计算程序包可进行能隙、态密度和光学性质的计算,计算结果不仅和文献报道结果相符,且整个计算过程减少人工干预次数可达90%以上,极大地提高了效率。目前,MatCloud-QE第一性原理计算程序包深度集成在MatCloud+材料云平台,用户通过云端才能使用,该模式为用户提供了丰富的计算资源和一站式第一性原理计算服务。 展开更多
关键词 Matcloud-QE第一性原理计算程序包 Matcloud+材料云 第一性原理计算 高通量材料计算 云原生
在线阅读 下载PDF
New multi-DSP parallel computing architecture for real-time image processing 被引量:4
20
作者 Hu Junhong Zhang Tianxu Jiang Haoyang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期883-889,共7页
The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is present... The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment. 展开更多
关键词 parallel computing image processing REAL-TIME computer architecture
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部