期刊文献+
共找到12,735篇文章
< 1 2 250 >
每页显示 20 50 100
A pure quantum secret sharing scheme based on GHZ basis measurement and quantum entanglement exchange
1
作者 Bai Liu Jun Zhang +1 位作者 Shupin Qiu Mingwu Zhang 《Chinese Physics B》 2025年第3期95-102,共8页
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure ... At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants. 展开更多
关键词 quantum secret sharing projection measurement quantum entanglement exchange THRESHOLD
在线阅读 下载PDF
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms 被引量:3
2
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
在线阅读 下载PDF
Layered Coded Cache Placement and Cooperative Delivery with Sharing Links in Satellite-Terrestrial Integrated Networks 被引量:1
3
作者 Gu Shushi Chen Zihan +2 位作者 Wu Yaonan Zhang Qinyu Wang Ye 《China Communications》 SCIE CSCD 2024年第3期217-229,共13页
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver... Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances. 展开更多
关键词 coded content placement cooperative delivery energy efficiency sharing links STINs
在线阅读 下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
4
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
在线阅读 下载PDF
A New Double Layer Multi-Secret Sharing Scheme
5
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
在线阅读 下载PDF
基于改进Theil指数和Shift-Share模型的2012—2021年中国产业偏离分析 被引量:1
6
作者 高孝伟 张颖昆 +1 位作者 李华 王苏梦 《资源与产业》 2024年第1期15-24,共10页
文章首先通过对现有文献的梳理和分析,发现针对产业偏离的测算,传统的产业偏离度E系数、Theil指数及Shift-Share模型均存在一定的缺陷,E系数和Theil指数的缺陷主要体现在计算原理方面,而Shift-Share模型的缺陷主要表现在参照系选择的合... 文章首先通过对现有文献的梳理和分析,发现针对产业偏离的测算,传统的产业偏离度E系数、Theil指数及Shift-Share模型均存在一定的缺陷,E系数和Theil指数的缺陷主要体现在计算原理方面,而Shift-Share模型的缺陷主要表现在参照系选择的合理性和数据采集的可行性方面。然后,基于现有模型的基本原理,提出了更为合理和更具可操作性的产业偏离测算方法,再采用实证研究的方法,根据2012—2021年的数据,对中国的产业偏离情况进行具体分析,得出尽管中国存在产业偏离,但产业偏离度在逐渐减小。最后,基于修正模型的计算结果,并结合当前的国际国内环境,提出如下政策建议:1)第一产业要依靠创新和科技引领,促进农村劳动力在城乡间有序转移,实现农业生产的规模化和现代化;2)第二产业要加快产业的升级换代,建立和保持独立、自主、完整的工业体系,加大在基础研究方面的投入,尽早突破美西方的技术封锁;3)第三产业的发展重点应该在金融和科教两个方面,要进一步提升香港地区、上海和北京等城市的世界金融中心地位,依靠金融创新来规避现行国际金融体系的不利约束和影响,同时要将科教兴国战略落到实处,努力探索适合中国国情的从小学到大学各阶段的教育模式。 展开更多
关键词 三次产业 偏离度 THEIL系数 Shift-Share模型 产业结构优化
在线阅读 下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
7
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
在线阅读 下载PDF
Improvement and security analysis of multi-ring discrete modulation continuous variable quantum secret sharing scheme
8
作者 姜欢窈 聂敏 +3 位作者 杨光 孙爱晶 张美玲 裴昌幸 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期189-197,共9页
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos... In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value. 展开更多
关键词 discrete modulation continuous variable quantum secret sharing scheme
在线阅读 下载PDF
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
9
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
在线阅读 下载PDF
Blockchain-Based MCS Detection Framework of Abnormal Spectrum Usage for Satellite Spectrum Sharing Scenario
10
作者 Ning Yang Heng Wang +3 位作者 Jingming Hu Bangning Zhang Daoxing Guo Yuan Liu 《China Communications》 SCIE CSCD 2024年第2期32-48,共17页
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit... In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework. 展开更多
关键词 blockchain hypothesis test mobile crowdsensing satellite communication spectrum sharing
在线阅读 下载PDF
Verifiable quantum secret sharing scheme based on orthogonal product states
11
作者 白晨明 刘璐 张素娟 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期178-187,共10页
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc... In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol. 展开更多
关键词 quantum secret sharing quantum product state threshold scheme unitary operations
在线阅读 下载PDF
Optimization dispatching strategy for an energy storage system considering its unused capacity sharing
12
作者 Hejun Yang Zhaochen Yang +2 位作者 Siyang Liu Dabo Zhang Yun Yu 《Global Energy Interconnection》 EI CSCD 2024年第5期590-602,共13页
In renewable energy systems,energy storage systems can reduce the power fluctuation of renewable energy sources and compensate for the prediction deviation.However,if the renewable energy prediction deviation is small... In renewable energy systems,energy storage systems can reduce the power fluctuation of renewable energy sources and compensate for the prediction deviation.However,if the renewable energy prediction deviation is small,the energy storage system may work in an underutilized state.To efficiently utilize a renewable-energy-sided energy storage system(RES),this study proposed an optimization dispatching strategy for an energy storage system considering its unused capacity sharing.First,this study proposed an unused capacity-sharing strategy for the RES to fully utilize the storage’s unused capacity and elevate the storage’s service efficiency.Second,RES was divided into“deviation-compensating energy storage(DES)”and“sharing energy storage(SES)”to clarify the function of RES in the operation process.Third,this study established an optimized dispatching model to achieve the lowest system operating cost wherein the unused capacity-sharing strategy could be integrated.Finally,a case study was investigated,and the results indicated that the proposed model and algorithm effectively improved the utilization of renewable-energy-side energy storage systems,thereby reducing the total operation cost and pressure on peak shaving. 展开更多
关键词 Renewable energy Energy storage system sharing energy storage Power system dispatching Peak shaving
在线阅读 下载PDF
Flexible linear clock-based distributed self-triggered active power-sharing secondary control of AC microgrids
13
作者 Yulin Chen Xing Huang +5 位作者 Guangxin Zhi Shaohua Yang Hongxun Hui Donglian Qi Yunfeng Yan Fengkai Gao 《Global Energy Interconnection》 EI CSCD 2024年第6期786-797,共12页
Traditional active power sharing in microgrids,achieved by the distributed average consensus,requires each controller to continuously trigger and communicate with each other,which is a wasteful use of the limited comp... Traditional active power sharing in microgrids,achieved by the distributed average consensus,requires each controller to continuously trigger and communicate with each other,which is a wasteful use of the limited computation and communication resources of the secondary controller.To enhance the efficiency of secondary control,we developed a novel distributed self-triggered active power-sharing control strategy by introducing the signum function and a flexible linear clock.Unlike continuous communication–based controllers,the proposed self-triggered distributed controller prompts distributed generators to perform control actions and share information with their neighbors only at specific time instants monitored by the linear clock.Therefore,this approach results in a significant reduction in both the computation and communication requirements.Moreover,this design naturally avoids Zeno behavior.Furthermore,a modified triggering condition was established to achieve further reductions in computation and communication.The simulation results confirmed that the proposed control scheme achieves distributed active power sharing with very few controller triggers,thereby substantially enhancing the efficacy of secondary control in MGs. 展开更多
关键词 Active power sharing Distributed secondary control Self-triggered mechanism AC microgrid Control efficiency
在线阅读 下载PDF
Steering the energy sharing of electrons in nonsequential double ionization with orthogonally polarized two-color field
14
作者 樊光琦 杨志杰 +4 位作者 孙烽豪 郑金梅 韩云天 黄明谦 刘情操 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期248-252,共5页
Using the semiclassical ensemble model,the dependence of relative amplitude for the recollision dynamics in nonsequential double ionization(NSDI)of neon atom driven by the orthogonally polarized two-color field(OTC)la... Using the semiclassical ensemble model,the dependence of relative amplitude for the recollision dynamics in nonsequential double ionization(NSDI)of neon atom driven by the orthogonally polarized two-color field(OTC)laser field is theoretically studied.And the dynamics in two typical collision pathways,recollision-impact-ionization(RII)and recollisionexcitation with subsequent ionization(RESI),is systematically explored.Our results reveal that the V-shaped structure in the correlated momentum distribution is mainly caused by the RII mechanism when the relative amplitude of the OTC laser field is zero,and the first ionized electrons will quickly skim through the nucleus and share few energy with the second electron.As the relative amplitude increases,the V-shaped structure gradually disappears and electrons are concentrated on the diagonal in the electron correlation spectrum,indicating that the energy sharing after electrons collision is symmetric for OTC laser fields with large relative amplitudes.Our studies show that changing the relative amplitude of the OTC laser field can efficiently control the electron–electron collisions and energy exchange efficiency in the NSDI process. 展开更多
关键词 nonsequential double ionization correlated electron–electron momentum distribution energy sharing of electrons orthogonally polarized two-color field laser field semiclassical ensemble models
在线阅读 下载PDF
重大科研基础设施建设与开放共享研究
15
作者 周琼琼 陈志辉 +3 位作者 王晋 岳琦 许东惠 杨丽 《中国科技资源导刊》 2025年第1期1-9,68,共10页
重大科研基础设施是用于探索未知世界、发现自然规律、实现技术变革的大型复杂科学设施,是发展新质生产力的物质技术基础。近年来,我国重大科研基础设施建设与开放共享取得了积极进展,并在科技创新、社会经济发展、民生福祉和国家安全... 重大科研基础设施是用于探索未知世界、发现自然规律、实现技术变革的大型复杂科学设施,是发展新质生产力的物质技术基础。近年来,我国重大科研基础设施建设与开放共享取得了积极进展,并在科技创新、社会经济发展、民生福祉和国家安全保障等方面发挥了越来越大的引领支撑作用。以纳入科研设施与仪器网络管理平台中的重大科研基础设施相关数据及案例为依托,分析重大科研基础设施建设的进展及开放共享成效,并结合科研设施管理与开放共享的特点与存在问题,提出重大科研基础设施发展的思考与展望。 展开更多
关键词 重大科研基础设施 管理机制 开放共享 利用效率 共享成效
在线阅读 下载PDF
智能网联环境下的汽车共享平台设计
16
作者 牛延强 王燕涛 乔引庄 《汽车文摘》 2025年第1期47-51,共5页
针对传统共享汽车业务发展面临重资产、重运营、收入来源单一的困境,通过分析汽车租赁市场特征,结合自动驾驶和车路协同技术发展现状,针对车辆日租市场的计划性特征,提出了智能网联车共享平台方案。通过系统梳理平台服务和角色,将其划... 针对传统共享汽车业务发展面临重资产、重运营、收入来源单一的困境,通过分析汽车租赁市场特征,结合自动驾驶和车路协同技术发展现状,针对车辆日租市场的计划性特征,提出了智能网联车共享平台方案。通过系统梳理平台服务和角色,将其划分工厂、车源用户、智慧停车场、签约驾驶员、日租和分时租赁6种服务角色,对应于车源流转、日租、分时租赁3个服务环节,基于车路协同网络和车辆跟驰技术尽可能降低车辆调度成本。该方案在突破的传统共享汽车业务困境的同时,有助于车路协同落地前期技术的推广,有利于车电分离模式的普及。 展开更多
关键词 共享汽车 车路协同 智能网联车
在线阅读 下载PDF
充气式共享智能快递包装袋设计研究
17
作者 徐娅丹 李志斌 陈榕福 《科技创新与应用》 2025年第1期124-128,共5页
为解决快递包装行业中过度包装、包装材料回收难度大、用户信息容易泄露等难题,实现快递包装可循环、轻量化、智能化的绿色发展。基于对当前快递包装问题的调研与分析,采用SCAMPER创新思维方法探索解决方案,确定以创新快递包装的结构、... 为解决快递包装行业中过度包装、包装材料回收难度大、用户信息容易泄露等难题,实现快递包装可循环、轻量化、智能化的绿色发展。基于对当前快递包装问题的调研与分析,采用SCAMPER创新思维方法探索解决方案,确定以创新快递包装的结构、材料、打包方式为突破口,整合物联网技术及软件技术,设计研究一种无需减震填充物的、可共享循环使用的智能快递包装袋。提出充气式共享智能快递包装袋解决方案。创新设计充气式包装结构与更高效的打包方式,采用可降解材料,结合物联网技术,通过移动端程序和共享快递袋收发终端完成快递袋的领取、快充气打包、寄件、快放气拆件和归还快递袋的收发快递流程,实现可共享循环使用、无填充物、智能高效和无面单的预期设想,为绿色可持续的快递包装提出一种新思路。 展开更多
关键词 充气式 共享 智能 绿色可持续 快递包装
在线阅读 下载PDF
基于主题搜索的计算机虚拟仿真实验教学资源智能共享方法
18
作者 唐洁 范辉 《无线互联科技》 2025年第2期112-115,共4页
虚拟仿真实验教学资源共享方法直接分类共享资源,未提取教学资源特征,导致共享资源利用效率较低,为此,文章提出基于主题搜索的智能共享方法。首先,构建智能数据库,整合数据并精准分类管理。设计教学资源调度模型,利用主题搜索技术实现... 虚拟仿真实验教学资源共享方法直接分类共享资源,未提取教学资源特征,导致共享资源利用效率较低,为此,文章提出基于主题搜索的智能共享方法。首先,构建智能数据库,整合数据并精准分类管理。设计教学资源调度模型,利用主题搜索技术实现资源均衡高效分配。随后,智能提取资源特征,减少冗余,提升信息密度,并构建分类体系系统化资源。最后,通过结合云计算,建立智能身份认证框架,保障数据安全共享。实验表明,基于主题搜索的计算机虚拟模拟共享可减少共享时间、提高共享效率并增强用户体验。 展开更多
关键词 主题搜索 资源共享 智能共享 数据库
在线阅读 下载PDF
世界强震动数据中心发展现状与展望
19
作者 解全才 马强 +3 位作者 钱亮 陶冬旺 王江 娄良琼 《世界地震工程》 北大核心 2025年第1期1-13,共13页
近年来,全球主要地震多发国家加大了强震动观测台网的建设,布设的数字强震仪和烈度仪等数量显著增加,获取的强震动记录迅速增长。各国或地区建立了不同的强震动数据库、例如美国的NGA数据库、CEMSD数据库、欧洲的ESM数据库、法国IPGP数... 近年来,全球主要地震多发国家加大了强震动观测台网的建设,布设的数字强震仪和烈度仪等数量显著增加,获取的强震动记录迅速增长。各国或地区建立了不同的强震动数据库、例如美国的NGA数据库、CEMSD数据库、欧洲的ESM数据库、法国IPGP数据库、意大利ITACA数据库、日本NIED数据库和新西兰GeoNet数据库等。基于第18届世界地震工程大会(18WCEE)探索世界地震数据中心专题及相关文献,详细梳理了各个国家和地区强震动数据中心的台网建设、数据处理、数据共享及数据应用方面的研究现状;通过与国外强震动数据中心的对比分析,找出我国强震动数据中心发展存在的差距,指出我国未来需要重视的工作和深入研究解决的问题。 展开更多
关键词 18届世界地震工程大会 地震数据中心 强震动数据 数据处理 数据共享
在线阅读 下载PDF
一种开关磁阻电机转矩分配优化控制策略
20
作者 李红伟 罗华林 《郑州大学学报(工学版)》 CAS 北大核心 2025年第1期126-132,共7页
针对开关磁阻电机存在转矩脉动较大的问题,通过对传统余弦型转矩分配函数进行改进,提出一种开关磁阻电机补偿型余弦转矩分配优化控制策略。根据总转矩与期望转矩的稳态偏差,引入傅里叶逼近曲线,对分配转矩进行补偿,并采用双关断角的功... 针对开关磁阻电机存在转矩脉动较大的问题,通过对传统余弦型转矩分配函数进行改进,提出一种开关磁阻电机补偿型余弦转矩分配优化控制策略。根据总转矩与期望转矩的稳态偏差,引入傅里叶逼近曲线,对分配转矩进行补偿,并采用双关断角的功率变换电路驱动控制,进行零电压续流,提高实际转矩对分配转矩的跟踪能力。为获得更好的控制性能,进一步采用遗传算法,以降低转矩脉动和铜损为目标,对控制参数进行了全局寻优。以1台四相8/6极开关磁阻电机为控制对象进行建模仿真,来验证所提策略的有效性。结果表明:与传统余弦型转矩分配控制相比,所提改进控制策略提升了电机在不同转速下的性能,转矩脉动降低最高达68.89%,均方根电流减小最高达11.74%。 展开更多
关键词 开关磁阻电机 转矩分配函数 转矩补偿 双关断角 转矩脉动
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部