期刊文献+
共找到5,365篇文章
< 1 2 250 >
每页显示 20 50 100
A fast-running engineering tool for assessing structural vulnerability to blast loading
1
作者 Carlo Crispino Salvatore Annunziata +2 位作者 Alberto Contini Luca Lomazzi Andrea Manes 《Defence Technology(防务技术)》 2025年第4期244-254,共11页
Assessing the vulnerability of a platform is crucial in its design.In fact,the results obtained from vulnerability analyses provide valuable information,leading to precise design choices or corrective solutions that e... Assessing the vulnerability of a platform is crucial in its design.In fact,the results obtained from vulnerability analyses provide valuable information,leading to precise design choices or corrective solutions that enhance the platform's chances of surviving different scenarios.Such scenarios can involve various types of threats that can affect the platform's survivability.Among such,blast waves impacting the platform's structure represent critical conditions that have not yet been studied in detail.That is,frameworks for vulnerability assessment that can deal with blast loading have not been presented yet.In this context,this work presents a fast-running engineering tool that can quantify the risk that a structure fails when it is subjected to blast loading from the detonation of high explosive-driven threats detonating at various distances from the structure itself.The tool has been implemented in an in-house software that calculates vulnerability to various impacting objects,and its capabilities have been shown through a simplified,yet realistic,case study.The novelty of this research lies in the development of an integrated computational environment capable of calculating the platform's vulnerability to blast waves,without the need for running expensive finite element simulations.In fact,the proposed tool is fully based on analytical models integrated with a probabilistic approach for vulnerability calculation. 展开更多
关键词 vulnerABILITY Blast loading Probabilistic assessment Analytical models Fast-running engineering tool
在线阅读 下载PDF
Multi-dimensional scattering properties diagnosis system of scale aircraft model in an anechoic chamber 被引量:1
2
作者 Chufeng Hu Zhou Zhou +1 位作者 Nanjing Li Kun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第4期588-595,共8页
Aiming at the concept of "diagnosis", a simple and effective broadband radar cross section (RCS) measurement system is constructed, and some multi-dimensional scattering properties diagnosis techniques are present... Aiming at the concept of "diagnosis", a simple and effective broadband radar cross section (RCS) measurement system is constructed, and some multi-dimensional scattering properties diagnosis techniques are presented based on the system. Firstly, a stepped-frequency signal is employed to achieve high range resolution, combining with a variety of signal processing tech- niques. Secondly, cross-range resolution is gained with a rotating table, and the high-resolution two-dimensional (2-D) imaging of the scale model is obtained by the microwave imaging theory. Finally, two receiving antennas with a small distance in altitude are used, and the three-dimensional (3-D) height distribution of scattering points on the scale model is extracted from the phase of images. Some typical bodies and a scale aircraft model are diagnosed in an anechoic chamber. The experimental results show that, after scaling with a metal sphere, the accurate one- dimensional (l-D) RCS pattern of the model is obtained, and it has a large dynamic range. When the bandwidth of the transmitting signal is 4 GHz, the resolution of the 2-D image can reach to 0.037 5 m. The 3-D height distribution of scattering points is given by interferometric measurement. This paper provides a feasible way to obtain high-precision scattering properties parameters of the scale aircraft model in a conventional rectangular anechoic chamber. 展开更多
关键词 DIAGNOSIS STEPPED-FREQUENCY multi-dimension anechoic chamber.
在线阅读 下载PDF
Multi-dimensional blind separation method for STBC systems 被引量:3
3
作者 Minggang Luo Liping Li +1 位作者 Guobing Qian Huaguo Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第6期912-918,共7页
Intercepted signal blind separation is a research topic with high importance for both military and civilian communication systems. A blind separation method for space-time block code (STBC) systems is proposed by us... Intercepted signal blind separation is a research topic with high importance for both military and civilian communication systems. A blind separation method for space-time block code (STBC) systems is proposed by using the ordinary independent component analysis (ICA). This method cannot work when specific complex modulations are employed since the assumption of mutual independence cannot be satisfied. The analysis shows that source signals, which are group-wise independent and use multi-dimensional ICA (MICA) instead of ordinary ICA, can be applied in this case. Utilizing the block-diagonal structure of the cumulant matrices, the JADE algorithm is generalized to the multidimensional case to separate the received data into mutually independent groups. Compared with ordinary ICA algorithms, the proposed method does not introduce additional ambiguities. Simulations show that the proposed method overcomes the drawback and achieves a better performance without utilizing coding information than channel estimation based algorithms. 展开更多
关键词 multiple input multiple output (MIMO) space-time block code (STBC) multi-dimensional independent component analysis (MICA) blind separation
在线阅读 下载PDF
Visualization analysis of the capability of weapon system of systems for multi-dimensional indicators 被引量:1
4
作者 Jianfei Ding Guangya Si +2 位作者 Guoqiang Yang Yang Liu Xiao Liu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2017年第2期292-300,共9页
In the field of weapon system of systems (WSOS) simulation, various indicators are widely used to describe the capability of WSOS, but it is always difficult to describe the comprehensive capability of WSOS quickly an... In the field of weapon system of systems (WSOS) simulation, various indicators are widely used to describe the capability of WSOS, but it is always difficult to describe the comprehensive capability of WSOS quickly and intuitively by visualization of multi-dimensional indicators. A method of machine learning and visualization is proposed, which can display and analyze the capabilities of different WSOS in a two-dimensional plane. The analysis and comparison of the comprehensive capability of different components of WSOS is realized by the method, which consists of six parts: multiple simulations, key indicators mining, three spatial distance calculation, fusion project calculation, calculation of individual capability density, and calculation of multiple capability ranges overlay. Binding a simulation experiment, the collaborative analysis of six indicators and 100 possible kinds of red WSOS are achieved. The experimental results show that this method can effectively improve the quality and speed of capabilities analysis, reveal a large number of potential information, and provide a visual support for the qualitative and quantitative analysis model. 展开更多
关键词 weapon system of systems (WSOS) comprehensive capability visualization of multi-dimensional indicators machine learning
在线阅读 下载PDF
Multi-dimensional ambiguity function for subarray-based space-time coding radar
5
作者 LAN Lan LIAO Guisheng +1 位作者 XU Jingwei WANG Hanbing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第5期886-896,共11页
Space-time coding radar has been recently proposed and investigated.It is a radar framework which can perform transmit beamforming at the receiver.However,the range resolution decreases when the number of the transmit... Space-time coding radar has been recently proposed and investigated.It is a radar framework which can perform transmit beamforming at the receiver.However,the range resolution decreases when the number of the transmit element increases.A subarray-based space-time coding(sub-STC)radar is explored to alleviate the range resolution reduction.For the proposed radar configuration,an identical waveform is transmitted and it introduces a small time offset in different subarrays.The multidimensional ambiguity function of sub-STC radar is defined by considering resolutions in multiple domains including the range,Doppler,angle and probing direction.Analyses on properties of the multi-dimensional ambiguity function of the sub-STC radar with regard to the spatial coverage,resolution performance and low sidelobes are also given.Results reveal that the range resolution and low sidelobes performance are improved with the proposed approach. 展开更多
关键词 SPACE-TIME coding RADAR multi-dimensional AMBIGUITY function range resolution wide spatial coverage SUBARRAY SIDELOBE
在线阅读 下载PDF
Nonlinear analysis of pounding between decks of multi-span bridge subjected to multi-support and multi-dimensional earthquake excitation
6
作者 张海 焦莉 林君南 《Journal of Central South University》 SCIE EI CAS 2013年第9期2546-2554,共9页
The nonlinear analysis of pounding between bridge deck segments subjected to multi-support excitations and multi-dimensional earthquake motion was performed.A novel bottom rigid element(BRE)method of the current displ... The nonlinear analysis of pounding between bridge deck segments subjected to multi-support excitations and multi-dimensional earthquake motion was performed.A novel bottom rigid element(BRE)method of the current displacement input model for structural seismic analysis under the multi-support excitations was used to calculate structural dynamic response.In the analysis,pounding between adjacent deck segments was considered.The seismic response of a multi-span bridge subjected to the multi-support excitation,considering not only the traveling-wave effect and partial coherence effect,but also the seismic non-stationary characteristics of multi-support earthquake motion,was simulated using finite element method(FEM).Meanwhile,the seismic response of the bridge under uniform earthquake was also analyzed.Finally,comparative analysis was conducted and some calculation results were shown for pounding effect,under multi-dimensional and multi-support earthquake motion,when performing seismic response analysis of multi-span bridge.Compared with the case of uniform/multi-support/multi-support and multi-dimensional earthquake input,the maximum values of pounding force in the case of multi-support and multi-dimensional earthquake input increase by about 5 8 times;the absolute value of bottom moment and shear force of piers increase by about50%600%and 23.1%900%,respectively.A conclusion can be given that it is very necessary to consider the pounding effect under multi-dimensional and multi-support earthquake motion while performing seismic response analysis of multi-span bridge. 展开更多
关键词 POUNDING bridge bottom rigid method (BRE) multi-dimensional and multi-support earthquake motion
在线阅读 下载PDF
Outlier detection based on multi-dimensional clustering and local density
7
作者 SHOU Zhao-yu LI Meng-ya LI Si-min 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第6期1299-1306,共8页
Outlier detection is an important task in data mining. In fact, it is difficult to find the clustering centers in some sophisticated multidimensional datasets and to measure the deviation degree of each potential outl... Outlier detection is an important task in data mining. In fact, it is difficult to find the clustering centers in some sophisticated multidimensional datasets and to measure the deviation degree of each potential outlier. In this work, an effective outlier detection method based on multi-dimensional clustering and local density(ODBMCLD) is proposed. ODBMCLD firstly identifies the center objects by the local density peak of data objects, and clusters the whole dataset based on the center objects. Then, outlier objects belonging to different clusters will be marked as candidates of abnormal data. Finally, the top N points among these abnormal candidates are chosen as final anomaly objects with high outlier factors. The feasibility and effectiveness of the method are verified by experiments. 展开更多
关键词 data MINING OUTLIER DETECTION OUTLIER DETECTION method based on multi-dimensional CLUSTERING and local density (ODBMCLD) algorithm deviation DEGREE
在线阅读 下载PDF
Topological optimization of ballistic protective structures through genetic algorithms in a vulnerability-driven environment
8
作者 Salvatore Annunziata Luca Lomazzi +1 位作者 Marco Giglio Andrea Manes 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第10期125-137,共13页
Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulne... Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulnerability is to introduce protective structures to intercept and possibly stop threats.However,this type of solution can lead to a significant increase in weight,affecting the performance of the aircraft.For this reason,it is crucial to study possible solutions that allow reducing the vulnerability of the aircraft while containing the increase in structural weight.One possible strategy is to optimize the topology of protective solutions to find the optimal balance between vulnerability and the weight of the added structures.Among the many optimization techniques available in the literature for this purpose,multiobjective genetic algorithms stand out as promising tools.In this context,this work proposes the use of a in-house software for vulnerability calculation to guide the process of topology optimization through multi-objective genetic algorithms,aiming to simultaneously minimize the weight of protective structures and vulnerability.In addition to the use of the in-house software,which itself represents a novelty in the field of topology optimization of structures,the method incorporates a custom mutation function within the genetic algorithm,specifically developed using a graph-based approach to ensure the continuity of the generated structures.The tool developed for this work is capable of generating protections with optimized layouts considering two different types of impacting objects,namely bullets and fragments from detonating objects.The software outputs a set of non-dominated solutions describing different topologies that the user can choose from. 展开更多
关键词 Topological optimization Protective structure Genetic algorithm SURVIVABILITY vulnerABILITY
在线阅读 下载PDF
Vulnerability assessment of UAV engine to laser based on improved shotline method
9
作者 Le Liu Chengyang Xu +3 位作者 Changbin Zheng Sheng Cai Chunrui Wang Jin Guo 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期588-600,共13页
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v... Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser. 展开更多
关键词 Laser weapon Laser damage vulnerABILITY UAV ENGINE Killing probability
在线阅读 下载PDF
Multi-dimension and multi-modal rolling mill vibration prediction model based on multi-level network fusion
10
作者 CHEN Shu-zong LIU Yun-xiao +3 位作者 WANG Yun-long QIAN Cheng HUA Chang-chun SUN Jie 《Journal of Central South University》 SCIE EI CAS CSCD 2024年第9期3329-3348,共20页
Mill vibration is a common problem in rolling production,which directly affects the thickness accuracy of the strip and may even lead to strip fracture accidents in serious cases.The existing vibration prediction mode... Mill vibration is a common problem in rolling production,which directly affects the thickness accuracy of the strip and may even lead to strip fracture accidents in serious cases.The existing vibration prediction models do not consider the features contained in the data,resulting in limited improvement of model accuracy.To address these challenges,this paper proposes a multi-dimensional multi-modal cold rolling vibration time series prediction model(MDMMVPM)based on the deep fusion of multi-level networks.In the model,the long-term and short-term modal features of multi-dimensional data are considered,and the appropriate prediction algorithms are selected for different data features.Based on the established prediction model,the effects of tension and rolling force on mill vibration are analyzed.Taking the 5th stand of a cold mill in a steel mill as the research object,the innovative model is applied to predict the mill vibration for the first time.The experimental results show that the correlation coefficient(R^(2))of the model proposed in this paper is 92.5%,and the root-mean-square error(RMSE)is 0.0011,which significantly improves the modeling accuracy compared with the existing models.The proposed model is also suitable for the hot rolling process,which provides a new method for the prediction of strip rolling vibration. 展开更多
关键词 rolling mill vibration multi-dimension data multi-modal data convolutional neural network time series prediction
在线阅读 下载PDF
基于模糊测试的Java反序列化漏洞挖掘 被引量:1
11
作者 王鹃 张勃显 +3 位作者 张志杰 谢海宁 付金涛 王洋 《信息网络安全》 北大核心 2025年第1期1-12,共12页
随着反序列化技术在Java Web应用开发中的广泛应用,针对Java反序列化机制的攻击也日益增多,已严重威胁Java Web应用的安全性。当前主流的黑名单防范机制无法有效防御未知的反序列化漏洞利用,而现有的Java反序列化漏洞挖掘工具大多依赖... 随着反序列化技术在Java Web应用开发中的广泛应用,针对Java反序列化机制的攻击也日益增多,已严重威胁Java Web应用的安全性。当前主流的黑名单防范机制无法有效防御未知的反序列化漏洞利用,而现有的Java反序列化漏洞挖掘工具大多依赖静态分析方法,检测精确度较低。文章提出一种基于模糊测试的Java反序列化漏洞挖掘工具DSM-Fuzz,该工具首先通过对字节码进行双向追踪污点分析,提取所有可能与反序列化相关的函数调用链。然后,利用基于TrustRank算法的函数权值分配策略,评估函数与反序列化调用链的关联性,并根据相关性权值对模糊测试种子分配能量。为进一步优化测试用例的语法结构和语义特征,文章设计并实现了一种基于反序列化特征的种子变异算法。该算法利用反序列化的Java对象内部特征优化种子变异过程,并引导模糊测试策略对反序列化漏洞调用链进行路径突破。实验结果表明,DSM-Fuzz在漏洞相关代码覆盖量方面较其他工具提高了约90%。此外,该工具还在多个主流Java库中成功检测出50%的已知反序列化漏洞,检测精确度显著优于其他漏洞检测工具。因此,DSM-Fuzz可有效辅助Java反序列化漏洞的检测和防护。 展开更多
关键词 Java反序列化漏洞 模糊测试 污点分析 漏洞挖掘 程序调用图
在线阅读 下载PDF
基于回声状态网络的智能合约漏洞检测方法 被引量:1
12
作者 刘春霞 徐晗颖 +2 位作者 高改梅 党伟超 李子路 《计算机应用》 北大核心 2025年第1期153-161,共9页
区块链平台上的智能合约是为链上各方提供安全可信赖服务的去中心化应用程序,而智能合约漏洞检测能确保智能合约的安全性。然而,现有的智能合约漏洞检测方法在样本数量不均衡和语义信息挖掘不全面时,会出现特征学习不足和漏洞检测准确... 区块链平台上的智能合约是为链上各方提供安全可信赖服务的去中心化应用程序,而智能合约漏洞检测能确保智能合约的安全性。然而,现有的智能合约漏洞检测方法在样本数量不均衡和语义信息挖掘不全面时,会出现特征学习不足和漏洞检测准确率低的问题,而且,这些方法无法对新的合约漏洞进行检测。针对上述问题,提出一种基于回声状态网络(ESN)的智能合约漏洞检测方法。首先,根据合约图,对不同语义、语法边进行学习,并利用Skip-Gram模型训练得到特征向量;其次,结合ESN和迁移学习,实现对新合约漏洞的迁移扩展,以提高漏洞检测率;最后,在Etherscan平台搜集的智能合约数据集上进行实验。实验结果表明,所提方法的准确率、精确率、召回率和F1分数分别达到了94.30%、97.54%、91.68%和94.52%,与双向长短时记忆(BLSTM)网络、自注意力机制的双向长短时记忆(BLSTM-ATT)相比,所提方法的准确率分别提高了5.93和11.75个百分点,漏洞检测性能更优。消融实验也进一步验证了ESN对智能合约漏洞检测的有效性。 展开更多
关键词 漏洞检测 智能合约 回声状态网络 迁移学习 区块链
在线阅读 下载PDF
复杂网络视角下世界粮食贸易网络脆弱性研究 被引量:1
13
作者 韩建军 崔欣苗 +2 位作者 侯婧祎 程玉 张佳豪 《粮油食品科技》 北大核心 2025年第2期198-205,共8页
为探究世界粮食贸易网络的脆弱性,为国际粮食贸易市场做出合理预判提供参考,基于1990—2020年的世界粮食贸易数据,结合复杂网络理论与脆弱性理论,从模体的角度探究世界粮食贸易网络局部结构脆弱性变化情况,并模拟世界粮食贸易网络在随... 为探究世界粮食贸易网络的脆弱性,为国际粮食贸易市场做出合理预判提供参考,基于1990—2020年的世界粮食贸易数据,结合复杂网络理论与脆弱性理论,从模体的角度探究世界粮食贸易网络局部结构脆弱性变化情况,并模拟世界粮食贸易网络在随机攻击和蓄意攻击模式下的失效过程,将网络中的节点分级。结果表明:世界粮食贸易网络的局部结构中,V型结构占比较高,网络的稳定性较弱,但这种现象有减缓趋势;对比真实网络与随机网络,真实网络的结构更加稳定且贸易关系更复杂;世界粮食贸易网络在面对随机攻击时具有良好的强韧性,面对蓄意攻击时表现出较强的脆弱性,蓄意攻击对网络的破坏力远大于随机攻击;在蓄意攻击模式下,世界粮食贸易网络的节点根据失效过程可以分为三个层级,其中第一层级节点对网络稳定性影响最大。 展开更多
关键词 粮食安全 世界粮食贸易 复杂网络 脆弱性 格局与趋势
在线阅读 下载PDF
论“数字弱势群体”及其权益体系 被引量:4
14
作者 宋保振 《山东师范大学学报(社会科学版)》 北大核心 2025年第1期107-120,共14页
在中国式现代化和数字中国建设双重背景下,如何有效保障“数字弱势群体”权益,日渐成为社会共识。就如何界定“数字弱势群体”及其权益,一直缺乏系统学术研究和规范法律定位,这也是制约“数字弱势群体”权益保障实效的“元问题”。“数... 在中国式现代化和数字中国建设双重背景下,如何有效保障“数字弱势群体”权益,日渐成为社会共识。就如何界定“数字弱势群体”及其权益,一直缺乏系统学术研究和规范法律定位,这也是制约“数字弱势群体”权益保障实效的“元问题”。“数字弱势群体”之产生,源于生产方式的数字化调整和生活方式的数字化重构,是人们生活所受到的数字社会变革的深层影响。“数字弱势群体”之内涵,兼具客观方面的社会分化、数字技术和主观方面的数字素养、数字融入双重要素,其外延区别于“传统弱势群体”“信息弱势群体”和“少数边缘群体”。“数字弱势群体”权益应避免与一般性的公民权益混淆,它主要指向维持公民数字化生活“最低水准”的社会权,具体包括信息平等权、信息自由权、信息安全权和特殊保护权。 展开更多
关键词 “数字弱势群体” 数字鸿沟 数字人权 共同富裕 算法
在线阅读 下载PDF
人工智能赋能教学的伦理审视 被引量:2
15
作者 胡金木 张珺 《课程.教材.教法》 北大核心 2025年第2期64-71,共8页
人工智能寄予教学未来转型的期待,为个性化学习、精准化教学、虚拟仿真教学环境等提供了可能。然而,人工智能也带来了主体性伦理隐忧,如过度依赖“思维机器”导致的认知能力退化、一味适应机器引发的反主体性危机与数字控制、沉湎于虚... 人工智能寄予教学未来转型的期待,为个性化学习、精准化教学、虚拟仿真教学环境等提供了可能。然而,人工智能也带来了主体性伦理隐忧,如过度依赖“思维机器”导致的认知能力退化、一味适应机器引发的反主体性危机与数字控制、沉湎于虚拟现实导致人与人之间情感淡漠等。面对隐忧,我们应该审视人、技术与教学之间的关系,警惕教学的技术增强对人的主体性的伤害。教学中的脆弱、不确定与风险蕴含着生命成长的美丽可能,接受风险不仅是对教育本质的承认,更意味着选择“非力量”技术,守护“弱性教育”。人工智能赋能教学过程中应当被谨慎而合理地应用,以确保其增强而非替代传统教学过程,促进师生、生生间的社会融合和情感联结,同时教师应对智能技术使用作出教育性判断,培养学生的主体性与批判性思维,确保教与学过程的教育性、安全性与公正性。 展开更多
关键词 人工智能 教学伦理 伦理隐忧 美丽风险 弱性教育
在线阅读 下载PDF
数字金融使用能缓解城乡家庭金融脆弱性吗 被引量:5
16
作者 温涛 刘亭廷 《金融经济学研究》 北大核心 2025年第1期39-59,共21页
利用中国家庭金融调查(CHFS)数据,分析数字金融使用与城乡家庭金融脆弱性之间的关系。实证结果表明,数字金融使用能缓解家庭金融脆弱性,且对农村家庭的缓解效果更强。进一步分析发现,家庭对数字金融的使用能通过优化资产配置和放松流动... 利用中国家庭金融调查(CHFS)数据,分析数字金融使用与城乡家庭金融脆弱性之间的关系。实证结果表明,数字金融使用能缓解家庭金融脆弱性,且对农村家庭的缓解效果更强。进一步分析发现,家庭对数字金融的使用能通过优化资产配置和放松流动性约束,增加家庭资产组合的多样性,加强家庭在面临意外冲击时平滑经济损失的能力,从而缓解家庭金融脆弱性。此外,数字金融使用缓解城乡家庭金融脆弱性的效果随着金融素养水平的提升逐渐减弱,且对“长尾群体”的家庭金融脆弱性的影响更大,体现了数字金融的普惠性。基于此,建议积极创新金融产品与服务,推进数字金融的深度发展,提高农村家庭等“长尾人群”的数字金融使用水平,使家庭享受“数字金融红利”,加强自身风险抵御能力,有效降低家庭金融脆弱性。 展开更多
关键词 城乡家庭金融脆弱性 数字金融使用 资产配置 流动性约束 金融素养
在线阅读 下载PDF
长江经济带城市生态环境脆弱性及驱动因素研究 被引量:1
17
作者 吴和成 王杰 李犟 《人民长江》 北大核心 2025年第4期17-24,共8页
厘清生态环境脆弱性时空分异及驱动因素,对于生态环境精准治理具有重要意义。以长江经济带沿线40个城市为样本,利用2012~2022年的统计数据,基于“暴露度-敏感性-适应力”理论框架,设计长江经济带城市生态环境脆弱性描述指标,采用“逐层... 厘清生态环境脆弱性时空分异及驱动因素,对于生态环境精准治理具有重要意义。以长江经济带沿线40个城市为样本,利用2012~2022年的统计数据,基于“暴露度-敏感性-适应力”理论框架,设计长江经济带城市生态环境脆弱性描述指标,采用“逐层纵横向”拉开档次法测度长江经济带城市生态环境脆弱性,运用莫兰指数法、Kriging插值法和地理探测器分析脆弱性时空分异特征及驱动因素。研究表明:①样本城市生态环境脆弱性总体呈明显改善态势,轻度和中度脆弱性城市数占比由45%上升至70%左右;脆弱性高度和重度城市数占比由55%左右下降至30%左右;高度和重度脆弱性城市主要在长江上、下游地区的对应城市,但以下游城市为主,这些城市脆弱性状态较为稳定且未见明显改善。②长江经济带沿江城市的生态环境脆弱性呈空间相关性,表现在城市生态环境脆弱性呈现空间聚集现象,邻近城市生态环境脆弱性具一定相似性特点。③经济发展水平、城镇化水平和科学技术投入是驱动生态环境脆弱性时空演化格局的核心因子,并且城镇化水平对生态环境脆弱性的影响力有所增强。研究成果可为长江经济带城市生态环境保护和可持续发展政策设计提供参考。 展开更多
关键词 生态环境脆弱性 空间分异 驱动因素 长江经济带
在线阅读 下载PDF
基于BP神经网络的家具供应链脆弱性评价
18
作者 屈俊林 庞燕 王忠伟 《中南林业科技大学学报》 北大核心 2025年第3期158-166,共9页
【目的】对家具供应链脆弱性进行评价研究,以期从供应链脆弱性的角度为家具供应链风险管理决策提供参考依据。【方法】结合新时代背景下家具供应链发展新特征,对家具供应链各环节脆弱性进行分解,运用德尔菲法筛选家具供应链脆弱性因素,... 【目的】对家具供应链脆弱性进行评价研究,以期从供应链脆弱性的角度为家具供应链风险管理决策提供参考依据。【方法】结合新时代背景下家具供应链发展新特征,对家具供应链各环节脆弱性进行分解,运用德尔菲法筛选家具供应链脆弱性因素,利用SPSS软件进行信度和效度分析,构建包括数字化供应链成熟度在内的家具供应链脆弱性评价指标体系。利用BP神经网络在风险评价方面的优势,结合置换特征重要性算法,运用Python进行仿真训练,构建基于BP神经网络的家具供应链脆弱性评价模型。【结果】1)构建了由3个一级指标、9个二级指标和24个三级指标构成的家具供应链脆弱性评价指标体系;2)采用置换特征重要性算法计算家具供应链脆弱性评价指标权重,根据权重对评价指标进行了排序发现,市场需求预测、供应链信息协同、供应链决策水平、产业结构调整和产品竞争力这5项指标对家具企业供应链脆弱性预测值具有较大的正向显著性;3)通过迭代和训练发现,基于BP神经网络的家具供应链脆弱性评价模型对61组训练集数据的分类预测准确率为100%,最大相对误差为0.002 256%;对20组测试样本数据的分类预测准确率为95%,最大相对误差为0.5%。【结论】基于BP神经网络的家具供应链脆弱性评价模型有良好的非线性映射和学习能力,拥有较强的分类预测功能,能全面有效地对家具供应链脆弱性进行评价。 展开更多
关键词 家具 供应链 脆弱性 BP神经网络 评价
在线阅读 下载PDF
含分布式电源配电网的脆弱性研究
19
作者 都成刚 葛景 +3 位作者 阿敏夫 樊海龙 齐军 李博通 《电网与清洁能源》 北大核心 2025年第7期102-106,共5页
分布式电源的接入必然影响配电网脆弱性,针对输电网的脆弱性评估的现有方法不再适用。考虑配电网网络拓扑、阻抗参数的特殊性和分布式电源的输出特性,建立了配电网中线路和分布式电源的等值导纳模型;结合复杂网络理论与配电网运行实际,... 分布式电源的接入必然影响配电网脆弱性,针对输电网的脆弱性评估的现有方法不再适用。考虑配电网网络拓扑、阻抗参数的特殊性和分布式电源的输出特性,建立了配电网中线路和分布式电源的等值导纳模型;结合复杂网络理论与配电网运行实际,提出了用于评估含分布式电源配电网中节点脆弱性的指标;在IEEE标准算例中对节点脆弱性进行对比分析,并用网络失负荷率验证了所提指标的有效性。 展开更多
关键词 分布式电源 配电网 脆弱性
在线阅读 下载PDF
基于重映射矩阵的Rowhammer漏洞防御方法研究
20
作者 王建新 许弘可 +1 位作者 肖超恩 张磊 《信息网络安全》 北大核心 2025年第5期758-766,共9页
针对国产高级精简指令集(ARM)架构计算机中动态随机存取内存(DRAM)存在Rowhammer漏洞的问题,文章首先介绍了重映射矩阵,并结合重映射矩阵分析了Rowhammer漏洞产生原因;然后,提出一种基于重映射矩阵的Rowhammer漏洞防御方法,该方法通过... 针对国产高级精简指令集(ARM)架构计算机中动态随机存取内存(DRAM)存在Rowhammer漏洞的问题,文章首先介绍了重映射矩阵,并结合重映射矩阵分析了Rowhammer漏洞产生原因;然后,提出一种基于重映射矩阵的Rowhammer漏洞防御方法,该方法通过物理地址重映射和禁用pagemap接口相结合的方法防御Rowhammer攻击;最后通过改变DRAM中行解码器和列选择器实现重映射矩阵,并在国产ARM架构计算机平台和XilinxZynq7000系列芯片上对该方法进行功能测试,同时通过搭建Vivado集成开发环境对该方法进行安全性分析和性能分析。功能测试结果表明,该方法能够有效抵御Rowhammer攻击。安全性分析结果表明,与未采取防御措施相比,Rowhammer漏洞发生率下降了98.6%。性能分析结果表明,引入该防御方法后得到的解码器延迟为0.783 ns,资源占用率约为0.002%,延迟和资源占用率极低,对国产ARM架构计算机的性能影响微乎其微。 展开更多
关键词 Rowhammer漏洞 国产ARM架构计算机 DRAM 重映射矩阵
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部