期刊文献+
共找到404篇文章
< 1 2 21 >
每页显示 20 50 100
A Hybrid Simulation Test Platform for Verifying the Protection Settings of SPS
1
作者 Jianjian Li Luojiang Qian 《Energy and Power Engineering》 2017年第4期346-351,共6页
To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) ... To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) has been built, which aims to give double verification effect of design scheme and physical device. The platform consists of eMEGAsim digital simulator, signal power amplifiers and digital-analog interface equipments. With this platform, the multiple protection device of ring structure grid can be accessed to form a close-loop test system. Since eMEGAsim model-simulated faults and actual protection device actions are on real time, the tripping settings of each device as well as their coordinate performance between multiple devices can be verified in this close-loop test. 展开更多
关键词 Hybrid Simulation SHIPBOARD POWER System (SPS) PROTECTION SETTINGS Close-Loop Test verify
下载PDF
Establishment and validation of a predictive model for peripherally inserted central catheter-related thrombosis in patients with liver cancer 被引量:1
2
作者 Xiao-Fei Chen Hao-Jun Wu +3 位作者 Tang Li Jia-Bin Liu Wen-Jie Zhou Qiang Guo 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第7期2221-2231,共11页
BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombo... BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombosis is a serious complication that can lead to morbidity and mortality in this patient population.Several risk factors have been identified for the development of PICC-related thrombosis,including cancer type,stage,comorbidities,and catheter characteristics.Understanding these risk factors and developing a predictive model can help healthcare providers identify high-risk patients and implement preventive measures to reduce the incidence of thrombosis.AIM To analyze the influencing factors of PICC-related thrombosis in hospitalized patients with liver cancer,construct a predictive model,and validate it.METHODS Clinical data of hospitalized patients with liver cancer admitted from January 2020 to December 2023 were collected.Thirty-five cases of PICC-related thrombosis in hospitalized patients with liver cancer were collected,and 220 patients who underwent PICC placement during the same period but did not develop PICC-related thrombosis were randomly selected as controls.A total of 255 samples were collected and used as the training set,and 77 cases were collected as the validation set in a 7:3 ratio.General patient information,case data,catheterization data,coagulation indicators,and Autar Thrombosis Risk Assessment Scale scores were analyzed.Univariate and multivariate unconditional logistic regression analyses were performed on relevant factors,and the value of combined indicators in predicting PICC-related thrombosis in hospitalized patients with liver cancer was evaluated using receiver operating characteristic(ROC)curve analysis.RESULTS Univariate analysis showed statistically significant differences(P<0.05)in age,sex,Karnofsky performance status score(KPS),bedridden time,activities of daily living impairment,parenteral nutrition,catheter duration,distant metastasis,and bone marrow suppression between the thrombosis group and the non-thrombosis group.Other aspects had no statistically significant differences(P>0.05).Multivariate regression analysis showed that age≥60 years,KPS score≤50 points,parenteral nutrition,stage III to IV,distant metastasis,bone marrow suppression,and activities of daily living impairment were independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer(P<0.05).Catheter duration of 1-6 months and catheter duration>6 months were protective factors for PICC-related thrombosis(P<0.05).The predictive model for PICC-related thrombosis was obtained as follows:P predictive probability=[exp(Logit P)]/[1+exp(Logit P)],where Logit P=age×1.907+KPS score×2.045+parenteral nutrition×9.467+catheter duration×0.506+tumor-node-metastasis(TNM)staging×2.844+distant metastasis×2.065+bone marrow suppression×2.082+activities of daily living impairment×13.926.ROC curve analysis showed an area under the curve(AUC)of 0.827(95%CI:0.724-0.929,P<0.001),with a corresponding optimal cut-off value of 0.612,sensitivity of 0.755,and specificity of 0.857.Calibration curve analysis showed good consistency between the predicted occurrence of PICC-related thrombosis and actual occurrence(P>0.05).ROC analysis showed AUCs of 0.888 and 0.729 for the training and validation sets,respectively.CONCLUSION Age,KPS score,parenteral nutrition,TNM staging,distant metastasis,bone marrow suppression,and activities of daily living impairment are independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer,while catheter duration is a protective factor for the disease.The predictive model has an AUC of 0.827,indicating high predictive accuracy and clinical value. 展开更多
关键词 Liver cancer Peripherally inserted central catheters THROMBOSIS Model verify
下载PDF
P_(c)(4457)Interpreted as a J^(P)=1/2+State byD^(0)∧_(c)^(+)(2595)-π^(0)P_(c)(4312)Interaction
3
作者 Jin-Zi Wu Jin-Yi Pang Jia-Jun Wu 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第9期23-27,共5页
P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)... P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)andπ^(0)P_(c)(4312)since they can exchange an almost on-shell∑_(c)^(+).In this scenario,the parity of P_(c)(4457)will be positive,which is different from the candidate of the bound state of D*∑_(c).The main decay channel of P_(c)(4457)in this model is Pc(4312)π.We propose three processes∧_(b)^(0)→J/ψKapπ^(-),∧_(b)^(0)→J/ψK-pπ^(0),and∧_(b)^(0)→J/ψpπ^(-)π^(+)k^(-)to verify Pc(4457)→Pc(4312)π. 展开更多
关键词 (0 PARITY verify
下载PDF
DNATyper^(TM)21与Verifiler^(TM)Plus试剂盒对常规案件检材检验的比较
4
作者 王剑 马云龙 +4 位作者 余政梁 龚政 高馨玉 杨亮 张丽娜 《刑事技术》 2024年第3期318-322,共5页
本文通过比较DNATyper^(TM)21与Verifi ler^(TM)Plus两种STR检测试剂盒对各类案件检材的检验能力,探讨DNATyper^(TM)21试剂盒在常规案件检验中应用的可靠性。取0.03125、0.0625、0.125、0.25、0.5、1.0 ng/μL基因组标准品对两种试剂盒... 本文通过比较DNATyper^(TM)21与Verifi ler^(TM)Plus两种STR检测试剂盒对各类案件检材的检验能力,探讨DNATyper^(TM)21试剂盒在常规案件检验中应用的可靠性。取0.03125、0.0625、0.125、0.25、0.5、1.0 ng/μL基因组标准品对两种试剂盒进行灵敏度测试;应用DNATyper^(TM)21与Verifi ler^(TM)Plus试剂盒分别对1056例常规案件检材DNA进行检验;对同一样本等位基因进行一致性比较。结果表明,两种试剂盒均可以成功检测出模板浓度在0.0625 ng/μL以上的标准DNA。在检验的1056例样本中,DNATyper^(TM)21试剂盒共检出881例,检出率为83.4%;Verifi ler^(TM)Plus试剂盒检出892例,检出率为84.5%。统计学结果表明两种试剂盒检出率无统计学差异,且同一样本相同基因座得到的等位基因分型一致。综上,DNATyper^(TM)21试剂盒对各类常规检材具有良好的检验能力,可应用于日常案件检验。 展开更多
关键词 法医物证学 DNATyper^(TM)21试剂盒 Verifi ler^(TM)Plus试剂盒 比较研究 生物检材
下载PDF
A Composite Ansatz for Calculation of Dynamical Structure Factor
5
作者 张玉佩 莫崇杰 +1 位作者 张平 康炜 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第1期92-103,共12页
We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization fact... We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization factor,and the exchange-correlation kernel from time-dependent density functional theory together,verified for typical metals and semiconductors from a plasmon excitation regime to the Compton scattering regime.It has the capability to reconcile both small-angle and large-angle inelastic x-ray scattering(IXS)signals with muchimproved accuracy,which can be used as the theoretical base model,in inversely inferring electronic structures of condensed matter from IXS experimental signals directly.It may also be used to diagnose thermal parameters,such as temperature and density,of dense plasmas in x-ray Thomson scattering experiments. 展开更多
关键词 EXCITATION INVERSE verified
下载PDF
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
6
作者 Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期388-410,共23页
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u... In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security. 展开更多
关键词 Bloom Filter CRYPTOGRAPHY Essential Secret Image Sharing Verifiability
下载PDF
A New Batch Verifying Scheme for Identifying Illegal Signatures
7
作者 Adrian Atanasiu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期144-151,共8页
The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signature... The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures. In this article, we analyze the complexity of the batch verifying schemes defined by Li, Hwang and Chen in 2010, and propose a new batch verifying multiple digital signature scheme, in two variants: one for RSA - by completing the Harn's schema with an identifying illegal signatures algorithm, and the other adapted for a modified Elliptic Curve Digital Siggnature Algorithm protocol. 展开更多
关键词 digital signature batch verifying multiple signature RSA signature elliptic curve digital signature algorithm standard
原文传递
A Measuring,Reporting and Verifying System for REDD+ Activities in China
8
作者 Xue Ming Wu Shuhong Cheng Shuqiang 《Chinese Forestry Science and Technology》 2012年第3期85-85,共1页
Challenges and focus that Measureable, Reportable and Verifiable of REDD+ activities will face are analyzed base on provisions relate to MRV for REDD+ in UNFCCC.It will face the challenges of lake of messages in estim... Challenges and focus that Measureable, Reportable and Verifiable of REDD+ activities will face are analyzed base on provisions relate to MRV for REDD+ in UNFCCC.It will face the challenges of lake of messages in estimating biomass carbon storage and reference level,certification standards, the national methodology of REDD+ activities,and financial support if measurable,reportable and verifiable REDD+ activities are developed in China. Based on the results of the analysis,the different types for REDD+ activities that adapt to Chinese situation are put forward,and it was designed that the framework on Measuring,Reporting and Verifying System for REDD+ activities in China including general indicator such as objectives, implementation,contribution to sustainable development and poverty eradication,environment effectiveness,sustainability and cost-effectiveness. 展开更多
关键词 UNFCCC REDD+ MEASURING REPORTING verifyING
原文传递
A New Technique for Attention Management and Somatosensory Processing in Hypnotherapy: Mental Access/Somatosensory Access (MASSA)
9
作者 Eitan G. Abramowitz 《Open Journal of Medical Psychology》 2023年第4期192-230,共39页
The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a ... The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a Bottom-Up/Top-Down Paradigm, which complements and mutually reinforces hypnotic inductions by using imbedded suggestions. The intervention’s algorithm includes a combination of real-time stimulation through one of the following somatosensory modalities: sensorimotor activation of the palms, visual, auditory, vibration, thermal, olfaction or oropharyngeal. These modalities are accompanied by guided hypnotic dissociation and suggestions. Somatosensory stimulation amplifies patients’ engagement in the procedure, focusing their attention on a stimulus and on the hypnotic experience during the intervention. A stream of closed questions with imbedded suggestions, presented by the therapist, is designed using suggestive presuppositions, termed by the author “The Create and Verify Principle” (CVP). This principle facilitates effective pacing and helps transform patients’ sensory and mental experiences. Imbedded suggestions followed by real-time stimulation, maintain a focus on the somatosensory content, boost the hypnotic experience, and gradually combine awareness of the somatosensory stimulation experience (Bottom-Up regulation) with memory, imagination, emotions and meanings, for mental access of resources and adaptive coping (Top-Down regulation). In the first part of this article, the author briefly introduces the neurophysiological mechanism behind the suggestive, somatosensory, attention-management intervention and provides an example of a basic algorithm of the MASSA technique. The second part includes clinical samples with scripts of successfully treated patients, who experienced tension headache, psychogenic balance disorder, tinnitus. . 展开更多
关键词 ATTENTION Somatosensory Stimulation Imbedded Suggestions Create and verify Principle Mental Access/Somatosensory Access (MASSA) HYPNOSIS
下载PDF
VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems 被引量:2
10
作者 Jiale Zhang Yue Liu +3 位作者 Di Wu Shuai Lou Bing Chen Shui Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期981-989,共9页
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra... Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy. 展开更多
关键词 Federated learning Edge computing PRIVACY-PRESERVING Verifiable aggregation Homomorphic cryptosystem
下载PDF
Novel traveling quantum anonymous voting scheme via GHZ states
11
作者 赵文浩 姜敏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期97-102,共6页
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle... Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security. 展开更多
关键词 quantum anonymous voting quantum secure communication GHZ states verifiability PRIVACY
下载PDF
MaMADS1-MaNAC083 transcriptional regulatory cascade regulates ethylene biosynthesis during banana fruit ripening
12
作者 Wei Wei Ying-ying Yang +4 位作者 Chao-jie Wu Jian-fei Kuang Jian-ye Chen Wang-jin Lu Wei Shan 《Horticulture Research》 SCIE CSCD 2023年第10期101-111,共11页
The hormone ethylene is crucial in the regulation of ripening in climacteric fruit,such as bananas.The transcriptional regulation of ethylene biosynthesis throughout banana fruit ripening has received much study,but t... The hormone ethylene is crucial in the regulation of ripening in climacteric fruit,such as bananas.The transcriptional regulation of ethylene biosynthesis throughout banana fruit ripening has received much study,but the cascaded transcriptional machinery of upstream transcriptional regulators implicated in the ethylene biosynthesis pathway is still poorly understood.Here we report that ethylene biosynthesis genes,including MaACS1,MaACO1,MaACO4,MaACO5,and MaACO8,were upregulated in ripening bananas.NAC(NAM,ATAF,CUC)transcription factor,MaNAC083,a ripening and ethylene-inhibited gene,was discovered as a potential binding protein to the MaACS1 promoter by yeast one-hybrid screening.Further in vitro and in vivo experiments indicated that MaNAC083 bound directly to promoters of the five ethylene biosynthesis genes,thereby transcriptionally repressing their expression,which was further verified by transient overexpression experiments,where ethylene production was inhibited through MaNAC083-modulated transcriptional repression of ethylene biosynthesis genes in banana fruits.Strikingly,MaMADS1,a ripening-induced MADS(MCM1,AGAMOUS,DEFICIENS,SRF4)transcription factor,was found to directly repress the expression of MaNAC083,inhibiting trans-repression of MaNAC083 to ethylene biosynthesis genes,thereby attenuating MaNAC083-repressed ethylene production in bananas.These findings collectively illustrated the mechanistic basis of a MaMADS1-MaNAC083-MaACS1/MaACOs regulatory cascade controlling ethylene biosynthesis during banana fruit ripening.These findings increase our knowledge of the transcriptional regulatory mechanisms of ethylene biosynthesis at the transcriptional level and are expected to help develop molecular approaches to control ripening and improve fruit storability. 展开更多
关键词 thereby COLLECTIVE verified
下载PDF
Blind quantum computation with a client performing different single-qubit gates
13
作者 吴光阳 杨振 +3 位作者 严玉瞻 罗元茂 柏明强 莫智文 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第11期326-330,共5页
In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable univer... In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable universal quantum computation. In these two protocols, the client only needs to perform either the gate T(in the first protocol) or the gates H and X(in the second protocol). With assistance from a single server, the client can utilize his quantum capabilities to generate some single-qubit states while keeping the actual state of these qubits confidential from others. By using these single-qubit states, the verifiable universal quantum computation can be achieved. 展开更多
关键词 blind quantum computation verifiable blind quantum computation single server
下载PDF
A leap by the rise of solid-state electrolytes for Li-air batteries
14
作者 Kecheng Pan Minghui Li +5 位作者 Weicheng Wang Shuochao Xing Yaying Dou Shasha Gao Zhang Zhang Zhen Zhou 《Green Energy & Environment》 SCIE EI CAS CSCD 2023年第4期939-944,共6页
Li-air batteries have attracted extensive attention because of their ultrahigh theoretical energy density. However, the potential safety hazard of flammable organic liquid electrolytes hinders their practical applicat... Li-air batteries have attracted extensive attention because of their ultrahigh theoretical energy density. However, the potential safety hazard of flammable organic liquid electrolytes hinders their practical applications. Replacing liquid electrolytes with solidstate electrolytes(SSEs) is expected to fundamentally overcome the safety issues. In this work, we focus on the development and challenge of solid-state Li-air batteries(SSLABs). The rise of different types of SSEs, interfacial compatibility and verifiability in SSLABs are presented. The corresponding strategies and prospects of SSLABs are also proposed. In particular, combining machine learning method with experiment and in situ(or operando)techniques is imperative to accelerate the development of SSLABs. 展开更多
关键词 Solid-state Li-air batteries Solid-state electrolytes Interfacial compatibility and verifiability
下载PDF
Improved key exchange protocol for three-party based on verifier authentication 被引量:3
15
作者 柳秀梅 周福才 常桂然 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期322-324,共3页
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w... To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient. 展开更多
关键词 key exchange for three-party password-based authentication VERIFIER
下载PDF
浅析人脸识别解锁系统的现状与展望 被引量:2
16
作者 李瑞琪 《计算机光盘软件与应用》 2014年第12期33-34,共2页
作为人工智能中人脸识别的技术之一,人脸识别是对人的面部特征与信息进行采集,对显示的面部影像,首先检测在拍摄镜头中是否有人脸,若检测到人脸,则进一步的给出脸的位置、形状和各个面部器官的坐标、形状等信息。处理器提取信息后,将其... 作为人工智能中人脸识别的技术之一,人脸识别是对人的面部特征与信息进行采集,对显示的面部影像,首先检测在拍摄镜头中是否有人脸,若检测到人脸,则进一步的给出脸的位置、形状和各个面部器官的坐标、形状等信息。处理器提取信息后,将其与已知的面部特征进行对比,从而识别用户的身份。它包括人脸检测、人脸跟踪、人脸对比三项主要内容。而人脸识别解锁系统就是基于人脸识别技术的基础上,通过识别人脸来对户与设备中存储的人脸信息进行比对进而判断该用户是否能够进入系统的技术。用户通过电子设备的摄像头拍摄自己的面部影像,使设备预先记录下了本人的面部信息。然后再通过摄像头对采集的影像进行比对进而开放设备。如果登录用户的脸与"预先设定的身份认证信息"比对结果成功,那么用户就可进入并使用设备。 展开更多
关键词 人脸识别 Eye verify 解锁 眼球识别
下载PDF
A New Hybrid Numerical Scheme for Two-Dimensional Ideal MHD Equations 被引量:2
17
作者 ZHOU Yu-Fen FENG Xue-Shang 《Chinese Physics Letters》 SCIE CAS CSCD 2012年第9期101-104,共4页
We present a new hybrid numerical scheme for two-dimensional(2D)ideal magnetohydrodynamic(MHD)equations.A simple conservation element and solution element(CESE)method is used to calculate the flow variables,and the un... We present a new hybrid numerical scheme for two-dimensional(2D)ideal magnetohydrodynamic(MHD)equations.A simple conservation element and solution element(CESE)method is used to calculate the flow variables,and the unknown first-order spatial derivatives involved in the CESE method are computed with a finite volume scheme that uses the solution of the derivative Riemann problem with limited reconstruction to evaluate the numerical flux at cell interface position.To show the validation and capacity of its application to 2D MHD problems,we study several benchmark problems.Numerical results verify that the hybrid scheme not only performs well,but also can retain the solution quality even if the Courant number ranges from close to 1 to less than 0.01. 展开更多
关键词 SCHEME ELEMENT verify
下载PDF
Simultaneous Synchronization and Anti-Synchronization of Two Identical New 4D Chaotic Systems 被引量:2
18
作者 GUO Rong-Wei 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第4期15-18,共4页
We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D c... We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D chaotic systems.Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results. 展开更多
关键词 CHAOTIC verify identical
下载PDF
Automatic Compensation of Total Phase Aberrations in Digital Holographic Biological Imaging 被引量:2
19
作者 ZHANG Yi-Zhuo WANG Da-Yong +1 位作者 WANG Yun-Xin TAO Shi-Quan 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第11期131-134,共4页
Digital holographic microscopy has been a powerful metrological technique for phase-contrast imaging.However inherent phase aberrations always exist and degrade the quality of the phase-contrast images.A surface fitti... Digital holographic microscopy has been a powerful metrological technique for phase-contrast imaging.However inherent phase aberrations always exist and degrade the quality of the phase-contrast images.A surface fitting method based on an improved mathematic model is proposed,which can be used to remove the phase aberrations without any pre-knowledge of the setup or manual operation.The improved mathematic model includes not only the usual terms but also the cross terms and the high order terms to describe the phase aberrations with high accuracy.Meanwhile,a non-iterative algorithm is used to solve the parametersand thus less computational load is imposed.The proposed method is applied to the live imaging of cells.The experimental results verify its validity. 展开更多
关键词 REMOVE HOLOGRAPHIC verify
下载PDF
Feature extraction of wood-hole defects using wavelet-based ultrasonic testing 被引量:7
20
作者 Huiming Yang Lei Yu 《Journal of Forestry Research》 SCIE CAS CSCD 2017年第2期395-402,共8页
The primary bottleneck to extracting wood defects during ultrasonic testing is the accuracy of identifying the wood defects. The wavelet energy moment was used to extract defect features of artificial wood holes drill... The primary bottleneck to extracting wood defects during ultrasonic testing is the accuracy of identifying the wood defects. The wavelet energy moment was used to extract defect features of artificial wood holes drilled into 120 elm samples that differed in the number of holes to verify the validity of the method. Wavelet energy moment can reflect the distribution of energy along the time axis and the amount of energy in each frequency band,which can effectively extract the energy distribution characteristics of signals in each frequency band; therefore,wavelet energy moment can replace the wavelet frequency band energy and constitute wood defect feature vectors. A principal component analysis was used to normalize and reduce the dimension of the feature vectors. A total of 16 principal component features were then obtained, which can effectively extract the defect features of the different number of holes in the elm samples. 展开更多
关键词 wavelet defects ultrasonic extracting replace validity identifying verify processed bottleneck
下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部