期刊文献+
共找到25,415篇文章
< 1 2 250 >
每页显示 20 50 100
美国CLOUD法案数据跨境执法中的安全风险与中国的应对 被引量:2
1
作者 廖明月 王佳宜 杨映雪 《图书馆论坛》 北大核心 2025年第1期128-137,共10页
数据是数字经济时代重要的国家战略资源,数据跨境流动亦是其中的重要一环。囿于犯罪活动呈现数字化和跨境化态势,数据跨境执法成为打击网络犯罪的重要手段,但基于执法目的的数据出境对数据存储国的影响重大。美国凭借“数据自由”话语... 数据是数字经济时代重要的国家战略资源,数据跨境流动亦是其中的重要一环。囿于犯罪活动呈现数字化和跨境化态势,数据跨境执法成为打击网络犯罪的重要手段,但基于执法目的的数据出境对数据存储国的影响重大。美国凭借“数据自由”话语体系通过CLOUD法案推出以“数据控制者标准”为核心的数据管辖模式,进而依托网络服务提供者实施“长臂管辖”,使得我国数据被动出境和被调取而引发的国家数据安全风险大幅提升。我国应将数据主权作为数据跨境流动的法理基础,探索控制数据安全风险的制度工具,包括基于国家主权调适“数据控制者”标准模式,完善数据跨境调取安全规则和审查机制,以阻断法限制单边数据跨境执法,对美国的相关“长臂管辖”进行有效制衡。 展开更多
关键词 数据跨境执法 安全风险 数据主权 cloud法案
在线阅读 下载PDF
BDMFuse:Multi-scale network fusion for infrared and visible images based on base and detail features
2
作者 SI Hai-Ping ZHAO Wen-Rui +4 位作者 LI Ting-Ting LI Fei-Tao Fernando Bacao SUN Chang-Xia LI Yan-Ling 《红外与毫米波学报》 北大核心 2025年第2期289-298,共10页
The fusion of infrared and visible images should emphasize the salient targets in the infrared image while preserving the textural details of the visible images.To meet these requirements,an autoencoder-based method f... The fusion of infrared and visible images should emphasize the salient targets in the infrared image while preserving the textural details of the visible images.To meet these requirements,an autoencoder-based method for infrared and visible image fusion is proposed.The encoder designed according to the optimization objective consists of a base encoder and a detail encoder,which is used to extract low-frequency and high-frequency information from the image.This extraction may lead to some information not being captured,so a compensation encoder is proposed to supplement the missing information.Multi-scale decomposition is also employed to extract image features more comprehensively.The decoder combines low-frequency,high-frequency and supplementary information to obtain multi-scale features.Subsequently,the attention strategy and fusion module are introduced to perform multi-scale fusion for image reconstruction.Experimental results on three datasets show that the fused images generated by this network effectively retain salient targets while being more consistent with human visual perception. 展开更多
关键词 infrared image visible image image fusion encoder-decoder multi-scale features
在线阅读 下载PDF
An Algorithm for Cloud-based Web Service Combination Optimization Through Plant Growth Simulation
3
作者 Li Qiang Qin Huawei +1 位作者 Qiao Bingqin Wu Ruifang 《系统仿真学报》 北大核心 2025年第2期462-473,共12页
In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-base... In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-based web services and the constraints of system resources.Then,a light-induced plant growth simulation algorithm was established.The performance of the algorithm was compared through several plant types,and the best plant model was selected as the setting for the system.Experimental results show that when the number of test cloud-based web services reaches 2048,the model being 2.14 times faster than PSO,2.8 times faster than the ant colony algorithm,2.9 times faster than the bee colony algorithm,and a remarkable 8.38 times faster than the genetic algorithm. 展开更多
关键词 cloud-based service scheduling algorithm resource constraint load optimization cloud computing plant growth simulation algorithm
在线阅读 下载PDF
A multi-parametric path planning framework utilizing airspace visibility graphs for urban battlefield environments
4
作者 Sidao Chen Xuejun Zhang +1 位作者 Zuyao Zhang Jianxiang Ma 《Defence Technology(防务技术)》 2025年第9期112-126,共15页
Urban combat environments pose complex and variable challenges for UAV path planning due to multidimensional factors,such as static and dynamic obstructions as well as risks of exposure to enemy detection,which threat... Urban combat environments pose complex and variable challenges for UAV path planning due to multidimensional factors,such as static and dynamic obstructions as well as risks of exposure to enemy detection,which threaten flight safety and mission success.Traditional path planning methods typically depend solely on the distribution of static obstacles to generate collision-free paths,without accounting for constraints imposed by enemy detection and strike capabilities.Such a simplified approach can yield safety-compromising routes in highly complex urban airspace.To address these limitations,this study proposes a multi-parameter path planning method based on reachable airspace visibility graphs,which integrates UAV performance constraints,environmental limitations,and exposure risks.An innovative heuristic algorithm is developed to balance operational safety and efficiency by both exposure risks and path length.In the case study set in a typical mixed-use urban area,analysis of airspace visibility graphs reveals significant variations in exposure risk at different regions and altitudes due to building encroachments.Path optimization results indicate that the method can effectively generate covert and efficient flight paths by dynamically adjusting the exposure index,which represents the likelihood of enemy detection,and the path length,which corresponds to mission execution time. 展开更多
关键词 UAV Path planning Urban battlefield environment Airspace visibility graph ISOVIST
在线阅读 下载PDF
Link-16 anti-jamming performance evaluation based on grey relational analysis and cloud model
5
作者 NING Xiaoyan WANG Ying +1 位作者 WANG Zhenduo SUN Zhiguo 《Journal of Systems Engineering and Electronics》 2025年第1期62-72,共11页
Anti-jamming performance evaluation has recently received significant attention. For Link-16, the anti-jamming performance evaluation and selection of the optimal anti-jamming technologies are urgent problems to be so... Anti-jamming performance evaluation has recently received significant attention. For Link-16, the anti-jamming performance evaluation and selection of the optimal anti-jamming technologies are urgent problems to be solved. A comprehensive evaluation method is proposed, which combines grey relational analysis (GRA) and cloud model, to evaluate the anti-jamming performances of Link-16. Firstly, on the basis of establishing the anti-jamming performance evaluation indicator system of Link-16, the linear combination of analytic hierarchy process(AHP) and entropy weight method (EWM) are used to calculate the combined weight. Secondly, the qualitative and quantitative concept transformation model, i.e., the cloud model, is introduced to evaluate the anti-jamming abilities of Link-16 under each jamming scheme. In addition, GRA calculates the correlation degree between evaluation indicators and the anti-jamming performance of Link-16, and assesses the best anti-jamming technology. Finally, simulation results prove that the proposed evaluation model can achieve the objective of feasible and practical evaluation, which opens up a novel way for the research of anti-jamming performance evaluations of Link-16. 展开更多
关键词 LINK-16 ANTI-JAMMING grey relational analysis(GRA) cloud model combination weights
在线阅读 下载PDF
Control model for burning-bubble clouds formed by confined meltcast explosives under thermal stimulation
6
作者 Zhi Li Zhuoping Duan +4 位作者 Zhiling Bai Jixuan Jiao Liji Xu Liansheng Zhang Fenglei Huang 《Defence Technology(防务技术)》 2025年第6期268-283,共16页
DNAN-based insensitive melt-cast explosives have been widely utilized in insensitive munition in recent years. When constrained DNAN-based melt-cast explosives are ignited under thermal stimulation, the base explosive... DNAN-based insensitive melt-cast explosives have been widely utilized in insensitive munition in recent years. When constrained DNAN-based melt-cast explosives are ignited under thermal stimulation, the base explosive exists in a molten liquid state, where high-temperature gases expand and react in the form of bubble clouds within the liquid explosive;this process is distinctly different from the dynamic crack propagation process observed in the case of solid explosives. In this study, a control model for the reaction evolution of burning-bubble clouds was established to describe the reaction process and quantify the reaction violence of DNAN-based melt-cast explosives, considering the size distribution and activation mechanism of the burning-bubble clouds. The feasibility of the model was verified through experimental results. The results revealed that under geometrically similar conditions, with identical confinement strength and aspect ratio, larger charge structures led to extended initial gas flow and surface burning processes, resulting in greater reaction equivalence and violence at the casing fracture.Under constant charge volume and size, a stronger casing confinement accelerated self-enhanced burning, increasing the internal pressure, reaction degree, and reaction violence. Under a constant casing thickness and radius, higher aspect ratios led to a greater reaction violence at the casing fracture.Moreover, under a constant charge volume and casing thickness, higher aspect ratios resulted in a higher internal pressure, increased reaction degree, and greater reaction violence at the casing fracture. Further,larger ullage volumes extended the reaction evolution time and increased the reaction violence under constant casing dimensions. Through a matching design of the opening threshold of the pressure relief holes and the relief structure area, a stable burning reaction could be maintained until completion,thereby achieving a control of the reaction violence. The proposed model could effectively reflect the effects of the intrinsic burning rate, casing confinement strength, charge size, ullage volume, and pressure relief structure on the reaction evolution process and reaction violence, providing a theoretical method for the thermal safety design and reaction violence evaluation of melt-cast explosives. 展开更多
关键词 Melt-cast explosives Non-shock-initiated reaction Self-sustaining enhanced combustion Burning-bubble cloud model Pressure relief area Reaction violence
在线阅读 下载PDF
MatCloud-QE:基于云原生理念的高通量第一性原理计算程序包 被引量:1
7
作者 杨小渝 郝德博 +3 位作者 舒城 许立芳 梁亚男 马新杰 《中国材料进展》 CAS CSCD 北大核心 2024年第11期1007-1015,共9页
国内开展第一性原理计算总是局限于某一两个商业软件,不仅需要软件使用许可,而且还需要下载、安装到本地,再通过人工部署到高性能计算集群才能开展使用,极大地限制了科研人员开展第一性原理计算。为了解决这个问题,作者团队基于Quantum ... 国内开展第一性原理计算总是局限于某一两个商业软件,不仅需要软件使用许可,而且还需要下载、安装到本地,再通过人工部署到高性能计算集群才能开展使用,极大地限制了科研人员开展第一性原理计算。为了解决这个问题,作者团队基于Quantum ESPRESSO第一性原理计算内核,进一步开发了高通量第一性原理计算加速算法、参数智能推荐算法、输入结构统一算法、自动后处理引擎、组件化引擎、图形化引擎、更多物性计算功能以及MatCloud+接口等算法程序,形成了具有云原生特点的第一性原理计算程序包:MatCloud-QE;进一步通过接入MatCloud+材料云,使用户仅通过浏览器就可在线开展第一性原理计算和数据自动化采集和管理,极大地方便了用户开展第一性原理计算以及高通量计算筛选,且无需软件使用许可。以面向太阳能电池应用的无机钙钛矿Rb_(1-x)Cs_(x)PbI3的材料特性的第一性原理计算为例,说明通过MatCloud+材料云平台使用MatCloud-QE第一性原理计算程序包可进行能隙、态密度和光学性质的计算,计算结果不仅和文献报道结果相符,且整个计算过程减少人工干预次数可达90%以上,极大地提高了效率。目前,MatCloud-QE第一性原理计算程序包深度集成在MatCloud+材料云平台,用户通过云端才能使用,该模式为用户提供了丰富的计算资源和一站式第一性原理计算服务。 展开更多
关键词 Matcloud-QE第一性原理计算程序包 Matcloud+材料云 第一性原理计算 高通量材料计算 云原生
在线阅读 下载PDF
CT-CloudDetect:用于遥感卫星云检测的混合模型
8
作者 方巍 陶恩屹 《遥感信息》 CSCD 北大核心 2024年第5期1-11,共11页
云检测是在遥感卫星云图中检测云的任务。近年来,人们提出了基于深度学习的云检测方法,并取得了良好的性能。然而,现有的基于深度学习的云检测模型大多还是基于卷积神经网络(convolutional neural network,CNN),由于卷积运算的固有局部... 云检测是在遥感卫星云图中检测云的任务。近年来,人们提出了基于深度学习的云检测方法,并取得了良好的性能。然而,现有的基于深度学习的云检测模型大多还是基于卷积神经网络(convolutional neural network,CNN),由于卷积运算的固有局部性,难以捕获长距离依赖关系。针对上述问题,文章提出一个基于CNN和ViT(Vision Transformer)的混合型云检测模型,并提出一种基于CNN和ViT的编码器,使网络具备捕捉局部和全局信息的能力。为了更好地融合语义和尺度不一致的特征,提出了一个双尺度注意力融合模块,通过注意力机制有选择地融合特征。此外,提出了轻量级路由解码器,该解码器通过路由结构降低模型复杂度。在3个公开云检测数据集上对模型进行了评估。大量实验表明,所提出的模型具有比现有模型更好的性能。 展开更多
关键词 深度学习 卷积神经网络 空间Vision Transformer 混合模型 云检测
在线阅读 下载PDF
Cloud edge integrated security architecture of new cloud manufacturing system 被引量:1
9
作者 ZHAO Longbo LI Bohu YUAN Haitao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1177-1189,共13页
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre... With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations. 展开更多
关键词 new cloud manufacturing system(NCMS) integrated cloud-edge-terminal security system architecture zero trust
在线阅读 下载PDF
基于CloudSim的电力系统计算云原生模型与仿真方法 被引量:3
10
作者 陈元榉 刘媛媛 +3 位作者 张延旭 蔡煜 胡春潮 蔡泽祥 《电力自动化设备》 EI CSCD 北大核心 2024年第9期189-196,204,共9页
分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,... 分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,分析电力云任务调配时的资源供需平衡问题。建立基于微服务的电力云任务模型,分析微服务的处理时序逻辑及其层级关系并生成微服务队列。据此提出微服务的动态调配模型,采用微服务-容器映射策略与实体动态整合策略,实现微服务在实体间的动态映射。利用CloudSim进行仿真分析,结果证明所提方法可行且有效,可为电力云计算的资源配置、任务调度等提供基本的仿真工具与方法。 展开更多
关键词 电力系统 cloudSim 云原生建模 电力系统计算架构 动态调配 时序逻辑 微服务队列
在线阅读 下载PDF
基于PointCloudTransformer和优化集成学习的三维点云分类 被引量:1
11
作者 于喜俊 段勇 《电子测量与仪器学报》 CSCD 北大核心 2024年第6期143-153,共11页
针对三维点云的不规则性和无序性所导致的难于提取特征并进行分类的问题,提出了一种融合深度学习和集成学习的三维点云分类方法。首先,训练深度学习点云分类网络PointCloudTransformer,并使用主干网络提取点云特征,进而训练基分类器,获... 针对三维点云的不规则性和无序性所导致的难于提取特征并进行分类的问题,提出了一种融合深度学习和集成学习的三维点云分类方法。首先,训练深度学习点云分类网络PointCloudTransformer,并使用主干网络提取点云特征,进而训练基分类器,获得基分类器集合;然后,针对集成学习算法设计基分类器选择模型,模型的优化目标为基分类器组合的差异性和平均总体精度。为了降低集成规模,本文基于增强后的白鲸优化算法提出了二元多目标白鲸优化算法,并使用该算法优化基分类器选择模型,获得集成剪枝方案集合;最后,采用多数投票法集成每个基分类器组合在测试集点云特征上的分类结果,获得最优基分类器组合,从而构建基于多目标优化剪枝的集成学习点云分类模型。在点云分类数据集上的实验结果表明,本文方法使用了更小的集成规模,获得了更高的集成精度,能够对多类别三维点云进行准确分类。 展开更多
关键词 三维点云分类 深度学习 集成学习 白鲸优化算法 多目标优化
在线阅读 下载PDF
Cloud control for IIoT in a cloud-edge environment 被引量:1
12
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial Internet of Things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
在线阅读 下载PDF
A cloud model target damage effectiveness assessment algorithm based on spatio-temporal sequence finite multilayer fragments dispersion
13
作者 Hanshan Li Xiaoqian Zhang Junchai Gao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第10期48-64,共17页
To solve the problem of target damage assessment when fragments attack target under uncertain projectile and target intersection in an air defense intercept,this paper proposes a method for calculating target damage p... To solve the problem of target damage assessment when fragments attack target under uncertain projectile and target intersection in an air defense intercept,this paper proposes a method for calculating target damage probability leveraging spatio-temporal finite multilayer fragments distribution and the target damage assessment algorithm based on cloud model theory.Drawing on the spatial dispersion characteristics of fragments of projectile proximity explosion,we divide into a finite number of fragments distribution planes based on the time series in space,set up a fragment layer dispersion model grounded in the time series and intersection criterion for determining the effective penetration of each layer of fragments into the target.Building on the precondition that the multilayer fragments of the time series effectively assail the target,we also establish the damage criterion of the perforation and penetration damage and deduce the damage probability calculation model.Taking the damage probability of the fragment layer in the spatio-temporal sequence to the target as the input state variable,we introduce cloud model theory to research the target damage assessment method.Combining the equivalent simulation experiment,the scientific and rational nature of the proposed method were validated through quantitative calculations and comparative analysis. 展开更多
关键词 Target damage cloud model Fragments dispersion Effectiveness assessment Spatio-temporal sequence
在线阅读 下载PDF
Cloudless-Training:基于serverless的高效跨地域分布式ML训练框架
14
作者 谭文婷 吕存驰 +1 位作者 史骁 赵晓芳 《高技术通讯》 CAS 北大核心 2024年第3期219-232,共14页
跨地域分布式机器学习(ML)训练能够联合多区域的云资源协作训练,可满足许多新兴ML场景(比如大型模型训练、联邦学习)的训练需求。但其训练效率仍受2方面挑战的制约。首先,多区域云资源缺乏有效的弹性调度,这会影响训练的资源利用率和性... 跨地域分布式机器学习(ML)训练能够联合多区域的云资源协作训练,可满足许多新兴ML场景(比如大型模型训练、联邦学习)的训练需求。但其训练效率仍受2方面挑战的制约。首先,多区域云资源缺乏有效的弹性调度,这会影响训练的资源利用率和性能;其次,模型跨地域同步需要在广域网(WAN)上高频通信,受WAN的低带宽和高波动的影响,会产生巨大通信开销。本文提出Cloudless-Training,从3个方面实现高效的跨地域分布式ML训练。首先,它基于serverless计算模式实现,使用控制层和训练执行层的2层架构,支持多云区域的弹性调度和通信。其次,它提供一种弹性调度策略,根据可用云资源的异构性和训练数据集的分布自适应地部署训练工作流。最后,它提供了2种高效的跨云同步策略,包括基于梯度累积的异步随机梯度下降(ASGD-GA)和跨云参数服务器(PS)间的模型平均(MA)。Cloudless-Training是基于OpenFaaS实现的,并被部署在腾讯云上评估,实验结果表明Cloudless-Training可显著地提高跨地域分布式ML训练的资源利用率(训练成本降低了9.2%~24.0%)和同步效率(训练速度最多比基线快1.7倍),并能保证模型的收敛精度。 展开更多
关键词 跨地域分布式机器学习(ML)训练 跨云ML训练 分布式训练框架 serverless 跨云模型同步
在线阅读 下载PDF
Research on BIM Model Reshaping Method Based on 3D Point Cloud Recognition
15
作者 SHI Jin-yu YU Xian-feng +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第4期125-135,共11页
In view of the limitations of traditional measurement methods in the field of building information,such as complex operation,low timeliness and poor accuracy,a new way of combining three-dimensional scanning technolog... In view of the limitations of traditional measurement methods in the field of building information,such as complex operation,low timeliness and poor accuracy,a new way of combining three-dimensional scanning technology and BIM(Building Information Modeling)model was discussed.Focused on the efficient acquisition of building geometric information using the fast-developing 3D point cloud technology,an improved deep learning-based 3D point cloud recognition method was proposed.The method optimised the network structure based on RandLA-Net to adapt to the large-scale point cloud processing requirements,while the semantic and instance features of the point cloud were integrated to significantly improve the recognition accuracy and provide a precise basis for BIM model remodeling.In addition,a visual BIM model generation system was developed,which systematically transformed the point cloud recognition results into BIM component parameters,automatically constructed BIM models,and promoted the open sharing and secondary development of models.The research results not only effectively promote the automation process of converting 3D point cloud data to refined BIM models,but also provide important technical support for promoting building informatisation and accelerating the construction of smart cities,showing a wide range of application potential and practical value. 展开更多
关键词 3D point cloud RandLA-Net network BIM model OSG engine
在线阅读 下载PDF
Study on damage mechanism and damage distribution of the rear plate under impact of debris cloud
16
作者 Chenyang Wu Xiaowei Chen Qiguang He 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第5期151-167,共17页
The debris cloud generated by the hypervelocity impact(HVI)of orbiting space debris directly threatens the spacecraft.A full understanding of the damage mechanism of rear plate is useful for the optimal design of prot... The debris cloud generated by the hypervelocity impact(HVI)of orbiting space debris directly threatens the spacecraft.A full understanding of the damage mechanism of rear plate is useful for the optimal design of protective structures.In this study,the hypervelocity yaw impact of a cylindrical aluminum projectile on a double-layer aluminum plate is simulated by the FE-SPH adaptive method,and the damage process of the rear plate under the impact of the debris cloud is analyzed based on the debris cloud structure.The damage process can be divided into the main impact stage of the debris cloud and the structural response of the rear plate.The main impact stage lasts a short time and is the basis of the rear plate damage.In the stage of structure response,the continuous deformation and inertial motion of the rear plate dominate the perforation of the rear plate.We further analyze the damage mechanism and damage distribution characteristics of the rear plate in detail.Moreover,the connection between velocity space and position space of the debris cloud is established,which promotes the general analysis of the damage law of debris cloud.Based on the relationship,the features of typical damage areas are identified by the localized fine analysis.Both the cumulative effect and structural response cause the perforation of rear plate;in the non-perforated area,cratering by the impact of hazardous fragments is the main damage mode of the rear plate. 展开更多
关键词 Damage of rear plate Debris cloud Secondary impact Hypervelocity yaw impact FE-SPH adaptive method
在线阅读 下载PDF
Cloud-based predictive adaptive cruise control considering preceding vehicle and slope information
17
作者 GAO Bolin WANG Luyao +6 位作者 LI Shuyan WAN Keke WANG Xuepeng ZHANG Jin WANG Chen LIU Yanbin ZHONG Wei 《Journal of Systems Engineering and Electronics》 CSCD 2024年第6期1542-1562,共21页
With the advantage of exceptional long-range traffic perception capabilities and data fusion computational prowess,the cloud control system(CCS)has exhibited formidable poten-tial in the realm of connected assisted dr... With the advantage of exceptional long-range traffic perception capabilities and data fusion computational prowess,the cloud control system(CCS)has exhibited formidable poten-tial in the realm of connected assisted driving,such as the adap-tive cruise control(ACC).Based on the CCS architecture,this paper proposes a cloud-based predictive ACC(PACC)strategy,which fully considers the road slope information and the preced-ing vehicle status.In the cloud,based on the dynamic program-ming(DP),the long-term economic speed planning is carried out by using the slope information.At the vehicle side,the real-time fusion planning of the economic speed and the preceding vehi-cle state is realized based on the model predictive control(MPC),taking into account the safety and economy of driving.In order to ensure the safety and stability of the vehicle-cloud cooperative control system,an event-triggered cruise mode switching method is proposed based on the state of each sub-system of the vehicle-cloud-network-map.Simulation results indicate that the PACC system can still ensure stable cruising under delays and some complex conditions.Moreover,under normal conditions,compared to the ACC system,the PACC sys-tem can further improve economy while ensuring safety and improve the overall energy efficiency of the vehicle,thus achiev-ing fuel savings of 3%to 8%. 展开更多
关键词 predictive adaptive cruise control(PACC) cloud control system(CCS) economic driving
在线阅读 下载PDF
紫外可见光谱结合化学模式识别对紫苏油的真伪鉴别 被引量:3
18
作者 卞希慧 刘雨 +2 位作者 王瑶 张强 张妍 《分析测试学报》 北大核心 2025年第2期229-237,共9页
作为高经济价值且昂贵的非常规植物油,紫苏油易被低价食用油掺假。由于食用油的匀质性及其组成的复杂性,传统鉴别方法难以快速准确地鉴别紫苏油的真伪。该文探索了紫外可见光谱结合化学模式识别对紫苏油真伪鉴别的可行性。首先购买了40... 作为高经济价值且昂贵的非常规植物油,紫苏油易被低价食用油掺假。由于食用油的匀质性及其组成的复杂性,传统鉴别方法难以快速准确地鉴别紫苏油的真伪。该文探索了紫外可见光谱结合化学模式识别对紫苏油真伪鉴别的可行性。首先购买了40个纯紫苏油样品,并将大豆油、棕榈油分别按一定的比例加入到纯紫苏油中配制了51个二元掺伪和63个三元掺伪紫苏油样品。根据鉴别目的,从154个总样品中获得两个数据集,一个是由40个纯紫苏油和114个掺伪紫苏油构成的真伪紫苏油二分类数据集;另一个是由40个纯紫苏油、51个二元掺伪和63个三元掺伪紫苏油构成的真伪紫苏油三分类数据集。然后采用主成分分析(PCA)、簇类独立软模式(SIMCA)、偏最小二乘-判别分析(PLS-DA)和极限学习机(ELM)4种方法,依次对以上两个数据集进行分类。使用混淆矩阵可视化分类结果,并用准确率、精确率、召回率、F1分数对模型性能进行评价。结果表明,对于真伪紫苏油二分类和三分类数据集,PLS-DA均为最佳模型,预测准确率分别为98.04%和100%。因此,紫外可见光谱结合化学模式识别可以实现真伪紫苏油的快速准确鉴别。 展开更多
关键词 紫苏油 紫外可见光谱 化学模式识别 真伪鉴别
在线阅读 下载PDF
基于时间卷积和长短期记忆网络的短期云资源预测模型 被引量:1
19
作者 陈基漓 李海军 谢晓兰 《科学技术与工程》 北大核心 2025年第7期2856-2864,共9页
随着容器云技术的不断深入发展,通过预测分析云资源请求的整体趋势及高峰期,对于容器云资源的高效利用和合理分配具有重要意义。利用深度学习技术进行负载预测已经成为解决容器云资源利用率不平衡的关键技术。针对目前负载预测的单一模... 随着容器云技术的不断深入发展,通过预测分析云资源请求的整体趋势及高峰期,对于容器云资源的高效利用和合理分配具有重要意义。利用深度学习技术进行负载预测已经成为解决容器云资源利用率不平衡的关键技术。针对目前负载预测的单一模型和组合模型所存在的预测精度低以及捕获序列特征不充分问题,提出基于时间卷积和长短期记忆网络(temporal convolutional network-long short-term memory, TCN-LSTM)的短期云资源组合预测模型,组合模型中的空洞卷积在不减少特征尺寸的情况下增加感受野获取更长久的时间序列特征,其中残差网络可以跨层传递信息以加快网络的收敛,所获取的时间序列特征可有效提高LSTM的预测精度。利用阿里巴巴公开数据集的进行预测,实验表明所提出的模型与单一的预测模型以及其他组合模型进行对比分析,误差指标-平均绝对误差(mean absolute error, MAE)降低8%~13.7%,均方根误差(root mean squared error, RMSE)降低9.8%~13.1%,证明所提模型的有效性。 展开更多
关键词 容器云 云资源预测 时间卷积网络(TCN) 长短期记忆网络(LSTM)
在线阅读 下载PDF
GaussDB:智能云原生分布式数据库 被引量:1
20
作者 李国良 王磊 +7 位作者 张金玉 王江 任阳 张琼 申宇 董亚辉 宋涛 乔典 《电子学报》 北大核心 2025年第4期1103-1122,共20页
在互联网技术飞速发展,传统企业面临数字化转型的大背景下,作为数字时代数据基础设施,数据库面临大数据量、高可用、在线弹性伸缩、智能化、安全防护等方面的巨大挑战.为了应对诸多挑战,GaussDB应运而生,GaussDB提出分布式数据库的分布... 在互联网技术飞速发展,传统企业面临数字化转型的大背景下,作为数字时代数据基础设施,数据库面临大数据量、高可用、在线弹性伸缩、智能化、安全防护等方面的巨大挑战.为了应对诸多挑战,GaussDB应运而生,GaussDB提出分布式数据库的分布式查询优化技术提升了数据查询性能,提出分布式数据库的高可用容灾技术提升了企业数据的可用性和可靠性,提出分布式数据库的云原生计算存储分离和弹性伸缩技术提高了对存储等资源的利用率,提出分布式数据库的自治管理技术增强了数据库的智能管理,提出分布式数据库的全方位安全防护技术提高了数据的安全保护能力. GaussDB能支撑关键基础行业核心场景的数字化转型. 展开更多
关键词 数据库 高可用 云原生 分布式 智能化 安全
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部