期刊文献+
共找到378,658篇文章
< 1 2 250 >
每页显示 20 50 100
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
1
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
下载PDF
Preliminary compact torus injection experiments on the Keda Torus eXperiment reversed field pinch
2
作者 Tao LAN Chen CHEN +20 位作者 Chijin XIAO Weixing DING Jie WU Wenzhe MAO Sen ZHANG Defeng KONG Shoubiao ZHANG Zhengwei WU Qilong DONG Yongkang ZHOU Hangqi XU Jiaren WU Zian WEI Xiaohui WEN Hai WANG Chu ZHOU Adi LIU Hong LI Jinlin XIE Wandong LIU Ge ZHUANG 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第10期56-64,共9页
A new compact torus injector(KTX-CTI)has been built for injection experiments on the Keda Torus eXperiment(KTX)reversed field pinch(RFP).The aim is to study the fundamental physics governing the compact torus(CT)centr... A new compact torus injector(KTX-CTI)has been built for injection experiments on the Keda Torus eXperiment(KTX)reversed field pinch(RFP).The aim is to study the fundamental physics governing the compact torus(CT)central fueling processes.In experiments conducted under the sole influence of a 0.1 T toroidal magnetic field,the injected CT successfully penetrated the entire toroidal magnetic field,reaching the inner wall of the KTX vacuum vessel.Upon reaching the inner wall,the CT diffused both radially outward and toroidally within the vessel at a discernible diffusion speed.Moreover,the inherent helicity within the CT induced a modest KTX plasma current of 200 A,consistent with predictions based on helicity conservation.CT injection demonstrated the capability to initiate KTX discharges at low loop voltages,suggesting its potential as a pre-ionization and current startup technique.During RFP discharges featuring CT injection,the central plasma density was found to exceed the Greenwald density limit,with more peaked density profiles,indicating the predominant confinement of CT plasma within the core region of the KTX bulk plasma. 展开更多
关键词 compact torus FUELING reversed field pinch density limit
下载PDF
A numerical survey of parameters to reach ignition condition for axial compression of a large-sized field reversed configuration
3
作者 李宜霖 廖晖 +1 位作者 周海洋 孙玄 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第5期47-55,共9页
Field reversed configuration(FRC)is widely considered as an ideal target plasma for magnetoinertial fusion.However,its confinement and stability,both proportional to the radius,will deteriorate inevitably during radia... Field reversed configuration(FRC)is widely considered as an ideal target plasma for magnetoinertial fusion.However,its confinement and stability,both proportional to the radius,will deteriorate inevitably during radial compression.Hence,we propose a new fusion approach based on axial compression of a large-sized FRC.The axial compression can be made by plasma jets or plasmoids converging onto the axial ends of the FRC.The parameter space that can reach the ignition condition while preserving the FRC's overall quality is studied using a numerical model based on different FRC confinement scalings.It is found that ignition is possible for a large FRC that can be achieved with the current FRC formation techniques if compression ratio is greater than 50.A more realistic compression is to combine axial with moderate radial compression,which is also presented and calculated in this work. 展开更多
关键词 field reversed configuration magnetized target fusion axial compression
下载PDF
Reversed charge transfer induced by nickel in Fe-Ni/Mo_(2)C@nitrogen-doped carbon nanobox for promoted reversible oxygen electrocatalysis
4
作者 Zhicheng Nie Lei Zhang +4 位作者 Qiliang Zhu Zhifan Ke Yingtang Zhou Thomas Wågberg Guangzhi Hu 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第1期202-212,I0005,共12页
The interaction between metal and support is critical in oxygen catalysis as it governs the charge transfer between these two entities,influences the electronic structures of the supported metal,affects the adsorption... The interaction between metal and support is critical in oxygen catalysis as it governs the charge transfer between these two entities,influences the electronic structures of the supported metal,affects the adsorption energies of reaction intermediates,and ultimately impacts the catalytic performance.In this study,we discovered a unique charge transfer reversal phenomenon in a metal/carbon nanohybrid system.Specifically,electrons were transferred from the metal-based species to N-doped carbon,while the carbon support reciprocally donated electrons to the metal domain upon the introduction of nickel.This led to the exceptional electrocatalytic performances of the resulting Ni-Fe/Mo_(2)C@nitrogen-doped carbon catalyst,with a half-wave potential of 0.91 V towards oxygen reduction reaction(ORR)and a low overpotential of 290 m V at 10 mA cm^(-2)towards oxygen evolution reaction(OER)under alkaline conditions.Additionally,the Fe-Ni/Mo_(2)C@carbon heterojunction catalyst demonstrated high specific capacity(794 mA h g_(Zn)~(-1))and excellent cycling stability(200 h)in a Zn-air battery.Theoretical calculations revealed that Mo_(2)C effectively inhibited charge transfer from Fe to the support,while secondary doping of Ni induced a charge transfer reversal,resulting in electron accumulation in the Fe-Ni alloy region.This local electronic structure modulation significantly reduced energy barriers in the oxygen catalysis process,enhancing the catalytic efficiency of both ORR and OER.Consequently,our findings underscore the potential of manipulating charge transfer reversal between the metal and support as a promising strategy for developing highly-active and durable bi-functional oxygen electrodes. 展开更多
关键词 Metal-support interaction Charge transfer reversal Oxygen reduction reaction Oxygen evolution reaction Zinc-air battery
下载PDF
Exceptional reversed yield strength asymmetry in a rare-earth free Mg alloy containing quasicrystal precipitates
5
作者 Qiang Yang Shuhui Lv +2 位作者 Zixiang Yan Zefeng Xie Xin Qiu 《Journal of Magnesium and Alloys》 SCIE EI CAS CSCD 2024年第2期687-699,共13页
This work reports an exceptional reversed yield strength asymmetry at room temperature for a rare-earth free magnesium alloy containing a mass of fine dispersed quasicrystal(I-phase)precipitates.Although exhibiting tr... This work reports an exceptional reversed yield strength asymmetry at room temperature for a rare-earth free magnesium alloy containing a mass of fine dispersed quasicrystal(I-phase)precipitates.Although exhibiting traditional basal texture,it owns an exceptional CYS/TYS as high as~1.17.Electron back-scattered diffraction(EBSD)and transmission electron microscopy(TEM)examinations indicate pyramidal and prismatic dislocations plus tensile twinning being activated after immediate yielding in compression while basal and non-basal dislocations in tension.I-phase particles transferred the concentrated stress by self-twinning to provide the driving force for tensile twin initiating in neighboring grains,thereby significantly increasing the critical resolved shear stress of tensile twinning to possibly the level of pyramidal slip,finally leading to the dominance of pyramidal slip plus tensile twinning in texture grains.This results in a higher contribution on yield strength by~55 MPa in compression than in tension,which reasonably agrees with the experimental yield strength difference(~38 MPa).It can be concluded that I-phase particles influence deformation modes in tension and in compression,finally result in reversed yield strength asymmetry. 展开更多
关键词 Magnesium alloy reversed yield strength asymmetry Transmission electron microscopy(TEM) TWINNING Dislocations
下载PDF
Nonlinear dynamics of the reversed shear Alfvén eigenmode in burning plasmas
6
作者 王涛 魏士朝 +3 位作者 Sergio BRIGUGLIO Gregorio VLAD Fulvio ZONCA 仇志勇 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第5期1-16,共16页
In a tokamak fusion reactor operated at steady state,the equilibrium magnetic field is likely to have reversed shear in the core region,as the noninductive bootstrap current profile generally peaks off-axis.The revers... In a tokamak fusion reactor operated at steady state,the equilibrium magnetic field is likely to have reversed shear in the core region,as the noninductive bootstrap current profile generally peaks off-axis.The reversed shear Alfvén eigenmode(RSAE)as a unique branch of the shear Alfvén wave in this equilibrium,can exist with a broad spectrum in wavenumber and frequency,and be resonantly driven unstable by energetic particles(EP).After briefly discussing the RSAE linear properties in burning plasma condition,we review several key topics of the nonlinear dynamics for the RSAE through both wave-EP resonance and wave-wave coupling channels,and illustrate their potentially important role in reactor-scale fusion plasmas.By means of simplified hybrid MHD-kinetic simulations,the RSAEs are shown to have typically broad phase space resonance structure with both circulating and trapped EP,as results of weak/vanishing magnetic shear and relatively low frequency.Through the route of wave-EP nonlinearity,the dominant saturation mechanism is mainly due to the transported resonant EP radially decoupling with the localized RSAE mode structure,and the resultant EP transport generally has a convective feature.The saturated RSAEs also undergo various nonlinear couplings with other collective oscillations.Two typical routes as parametric decay and modulational instability are studied using nonlinear gyrokinetic theory,and applied to the scenario of spontaneous excitation by a finite amplitude pump RSAE.Multiple RSAEs could naturally couple and induce the spectral energy cascade into a low frequency Alfvénic mode,which may effectively transfer the EP energy to fuel ions via collisionless Landau damping.Moreover,zero frequency zonal field structure could be spontaneously excited by modulation of the pump RSAE envelope,and may also lead to saturation of the pump RSAE by both scattering into stable domain and local distortion of the continuum structure. 展开更多
关键词 reversed shear Alfvén eigenmode energetic particle nonlinear gyrokinetic theory saturation burning plasma
下载PDF
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding
7
作者 Kai Gao Chin-Chen Chang Chia-Chen Lin 《Computer Systems Science & Engineering》 2024年第3期813-833,共21页
Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity ... Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases. 展开更多
关键词 data hiding multipredictor mechanism high-fidelity knapsack problem
下载PDF
Reversible Semi-Fragile Watermarking Technique for Integrity Control of Relational Database
8
作者 Ali Hamadou Abdoul Aziz Issaka Hassane +1 位作者 Lanciné Camara Harouna Naroua 《Engineering(科研)》 2024年第9期309-323,共15页
Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differ... Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differentiate between legal and malicious modifications. In this paper, we introduce a novel lossless semi-fragile scheme based on prediction-error expansion for content protection of relational database. In the proposed method, all attributes in a database relation are first classified according to their sensitivity to legitimate updates. Then, the watermark is embedded by expanding the prediction error of the two least significant digits of securely selected attributes. At watermark extraction, the proposed method has the ability to fully restore the original data while detecting and localizing tampering. The applicability of our method is demonstrated theoretically and experimentally. 展开更多
关键词 Semi-Fragile Watermarking Integrity Control reversIBILITY Prediction-Error Expansion
下载PDF
An Efficient EMD-Based Reversible Data Hiding Technique Using Dual Stego Images 被引量:2
9
作者 Ahmad A.Mohammad 《Computers, Materials & Continua》 SCIE EI 2023年第4期1139-1156,共18页
Exploiting modification direction(EMD)based data hiding techniques(DHTs)provide moderate data hiding capacity and high-quality stego images.The overflow problem and the cyclic nature of the extraction function essenti... Exploiting modification direction(EMD)based data hiding techniques(DHTs)provide moderate data hiding capacity and high-quality stego images.The overflow problem and the cyclic nature of the extraction function essentially hinder their application in several fields in which reversibility is necessary.Thus far,the few EMD reversible DHTs are complex and numerically demanding.This paper presents a novel EMD-based reversible DHT using dual-image.Two novel 2×4 modification lookup tables are introduced,replacing the 256×256 reference matrix used in similar techniques and eliminating the numerically demanding search step in similar techniques.In the embedding step,one of the modification tables modifies a pixel in odd columns in the first cover image and keeps its image in the second cover image intact.The other modification table modifies a pixel in even columns in the second cover image and keeps its image in the first cover image intact.This embedding strategy enables direct reversibility at almost zero computational cost.This technique embeds one 4−ary secret digit into each pixel in the first cover image and its image in the second cover image resulting in one bit per pixel(bpp)data embedding rate.The use of the 4−ary numbering system enables direct and numerically efficient conversion of the binary secret message to the 4−ary and vice versa.The advantages of the proposed algorithm are straightforward reversibility,simplicity,numerical efficiency,direct conversion of the binary secret message to 4−ary and vice versa,and elimination of the need for the 256×256 reference matrix by replacing it with two 2×4 lookup tables.Simulation results show that the embedding rate of the proposed technique is one bpp.It achieved more than 49 dB average Peak to Signal Noise Ratio(PSNR)over all test images. 展开更多
关键词 reversible data-hiding EMD-based high capacity STEGANOGRAPHY
下载PDF
基于re3data的中英科学数据仓储平台对比研究 被引量:1
10
作者 袁烨 陈媛媛 《数字图书馆论坛》 2024年第2期13-23,共11页
以re3data为数据获取源,选取中英两国406个科学数据仓储为研究对象,从分布特征、责任类型、仓储许可、技术标准及质量标准等5个方面、11个指标对两国科学数据仓储的建设情况进行对比分析,试图为我国数据仓储的可持续发展提出建议:广泛... 以re3data为数据获取源,选取中英两国406个科学数据仓储为研究对象,从分布特征、责任类型、仓储许可、技术标准及质量标准等5个方面、11个指标对两国科学数据仓储的建设情况进行对比分析,试图为我国数据仓储的可持续发展提出建议:广泛联结国内外异质机构,推进多学科领域的交流与合作,有效扩充仓储许可权限与类型,优化技术标准的应用现况,提高元数据使用的灵活性。 展开更多
关键词 科学数据 数据仓储平台 re3data 中国 英国
下载PDF
A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform
11
作者 Amishi Mahesh Kapadia P.Nithyanandam 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期537-552,共16页
Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recurs... Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform.The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload.By scrambling the cover image,Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.The hybrid combination of Integer wavelet transform and Arnold transform results to build a more efficient and secure system.The proposed method employs a set of keys to ensure that information cannot be decoded by an attacker.The experimental results show that it aids in the development of a more secure storage system and withstand few tampering attacks The suggested technique is tested on many image formats,including medical images.Various performance metrics proves that the retrieved cover image and hidden image are both intact.This System is proven to withstand rotation attack as well. 展开更多
关键词 reversible data hiding(RDH) integer wavelet transforms(IWT) arnold transform PAYLOAD embedding and extraction
下载PDF
Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy
12
作者 Chin-Feng Lee Kuo-Chung Chan 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1551-1566,共16页
Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being e... Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being easily noticed.The recipient of the image must receive the two stego-images before the secret message can be completely retrieved.Imperceptibility is one of the main advantages of data hiding technology;to increase the imperceptibility,the quality requirements of the stego-images are relatively important.A dual ste-ganographic image RDH method,called a DS-CF scheme that can achieve a bet-ter steganographic image quality using the center folding(CF)strategy.In this paper,we developed a translocation and switching strategy(TaS)to shorten the distances between the stego-pixel coordinates and the cover pixel coordinates after information being hidden.Compared with the DS-CF scheme,our proposed DS-TaS scheme can effectively improve the quality of the steganographic images at the same level of embedding capability.The experimental results show that the PSNR of our DS-TaS scheme at k=1 was 55.66 dB,which is an increase of 1.5 dB,and is 51.43 dB for k=2,46.66 dB for k=3,and 40.91 dB for k=4.In addition,the PSNR values of the stego images was increased by 1.5,0.29,0.29,and 0.19 dB,respectively.This shows that our proposed dual-image RDH method can optimize the visual quality of the stego-images and is better than many other dual-image RDH techniques. 展开更多
关键词 Information hiding reversible data hiding(RDH) dual-image RDH center folding(CF)strategy
下载PDF
Data Secure Storage Mechanism for IIoT Based on Blockchain 被引量:2
13
作者 Jin Wang Guoshu Huang +2 位作者 R.Simon Sherratt Ding Huang Jia Ni 《Computers, Materials & Continua》 SCIE EI 2024年第3期4029-4048,共20页
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT. 展开更多
关键词 Blockchain IIoT data storage cryptographic commitment
下载PDF
Hadoop-based secure storage solution for big data in cloud computing environment 被引量:1
14
作者 Shaopeng Guan Conghui Zhang +1 位作者 Yilin Wang Wenqing Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期227-236,共10页
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose... In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average. 展开更多
关键词 Big data security data encryption HADOOP Parallel encrypted storage Zookeeper
下载PDF
Defect Detection Model Using Time Series Data Augmentation and Transformation 被引量:1
15
作者 Gyu-Il Kim Hyun Yoo +1 位作者 Han-Jin Cho Kyungyong Chung 《Computers, Materials & Continua》 SCIE EI 2024年第2期1713-1730,共18页
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal depende... Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal dependence,and noise.Therefore,methodologies for data augmentation and conversion of time series data into images for analysis have been studied.This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to noise.The method of data augmentation is set as the addition of noise.It involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the model.In addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into images.It enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the data.For anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat maps.It allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies occur.The performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to images.Additionally,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training time.The proposed method can provide an important springboard for research in the field of anomaly detection using time series data.Besides,it helps solve problems such as analyzing complex patterns in data lightweight. 展开更多
关键词 Defect detection time series deep learning data augmentation data transformation
下载PDF
Enhanced prediction of anisotropic deformation behavior using machine learning with data augmentation 被引量:1
16
作者 Sujeong Byun Jinyeong Yu +3 位作者 Seho Cheon Seong Ho Lee Sung Hyuk Park Taekyung Lee 《Journal of Magnesium and Alloys》 SCIE EI CAS CSCD 2024年第1期186-196,共11页
Mg alloys possess an inherent plastic anisotropy owing to the selective activation of deformation mechanisms depending on the loading condition.This characteristic results in a diverse range of flow curves that vary w... Mg alloys possess an inherent plastic anisotropy owing to the selective activation of deformation mechanisms depending on the loading condition.This characteristic results in a diverse range of flow curves that vary with a deformation condition.This study proposes a novel approach for accurately predicting an anisotropic deformation behavior of wrought Mg alloys using machine learning(ML)with data augmentation.The developed model combines four key strategies from data science:learning the entire flow curves,generative adversarial networks(GAN),algorithm-driven hyperparameter tuning,and gated recurrent unit(GRU)architecture.The proposed model,namely GAN-aided GRU,was extensively evaluated for various predictive scenarios,such as interpolation,extrapolation,and a limited dataset size.The model exhibited significant predictability and improved generalizability for estimating the anisotropic compressive behavior of ZK60 Mg alloys under 11 annealing conditions and for three loading directions.The GAN-aided GRU results were superior to those of previous ML models and constitutive equations.The superior performance was attributed to hyperparameter optimization,GAN-based data augmentation,and the inherent predictivity of the GRU for extrapolation.As a first attempt to employ ML techniques other than artificial neural networks,this study proposes a novel perspective on predicting the anisotropic deformation behaviors of wrought Mg alloys. 展开更多
关键词 Plastic anisotropy Compression ANNEALING Machine learning data augmentation
下载PDF
Stable attenuation-compensated reverse time migration and its application to land seismic data
17
作者 Xin-Ru Mu Qiang Mao Jian-Ping Huang 《Petroleum Science》 SCIE EI CSCD 2023年第5期2784-2795,共12页
Intrinsic attenuation of the earth causes energy loss and phase distortion in seismic wave propagation.To obtain high-resolution imaging results,these negative effects must be considered during reverse time migration(... Intrinsic attenuation of the earth causes energy loss and phase distortion in seismic wave propagation.To obtain high-resolution imaging results,these negative effects must be considered during reverse time migration(RTM).We can easily implement attenuation-compensated RTM using the constant Q viscoacoustic wave equation with decoupled amplitude attenuation and phase dispersion terms.However,the nonphysical amplitude-compensation process will inevitably amplify the high-frequency noise in the wavefield in an exponential form,causing the numerical simulation to become unstable.This is due to the fact that the amplitude of the compensation grows exponentially with frequency.In order to achieve stable attenuation-compensated RTM,we modify the analytic expression of the attenuation compensation extrapolation operator and make it only compensate for amplitude loss within the effective frequency band.Based on this modified analytic formula,we then derive an explicit time-space domain attenuation compensation extrapolation operator.Finally,the implementation procedure of stable attenuation-compensated RTM is presented.In addition to being simple to implement,the newly proposed attenuation-compensated extrapolation operator is superior to the conventional low-pass filter in suppressing random noise,which will further improve the imaging resolution.We use two synthetic and one land seismic datasets to verify the stability and effectiveness of the proposed attenuationcompensated RTM in improving imaging resolution in viscous media. 展开更多
关键词 Seismic attenuation reverse time migration Stability strategy Pseudospectral method
下载PDF
Quasi-static magnetic compression of field-reversed configuration plasma:amended scalings and limits from two-dimensional MHD equilibrium
18
作者 Abba Alhaji BALA 朱平 +8 位作者 李浩龙 丁永华 刘家兴 万遂 何莹 李达 王能超 饶波 王之江 《Plasma Science and Technology》 SCIE EI CAS CSCD 2023年第2期58-67,共10页
In this work,several key scaling laws of the quasi-static magnetic compression of field reversed configuration(FRC)plasma(Spencer et al 1983 Phys.Fluids 261564)are amended from a series of two-dimensional FRC MHD equi... In this work,several key scaling laws of the quasi-static magnetic compression of field reversed configuration(FRC)plasma(Spencer et al 1983 Phys.Fluids 261564)are amended from a series of two-dimensional FRC MHD equilibriums numerically obtained using the Grad–Shafranov equation solver NIMEQ.Based on the new scaling for the elongation and the magnetic fields at the separatrix and the wall,the empirically stable limits for the compression ratio,the fusion gain,and the neutron yield are evaluated,which may serve as a more accurate estimate for the upper ceiling of performance from the magnetic compression of FRC plasma as a potential fusion energy as well as neutron source devices. 展开更多
关键词 magneto-hydrodynamic equilibrium Grad-Shafranov equation field reversed configuration NIMEQ magnetic compression
下载PDF
Reliability evaluation of IGBT power module on electric vehicle using big data 被引量:1
19
作者 Li Liu Lei Tang +5 位作者 Huaping Jiang Fanyi Wei Zonghua Li Changhong Du Qianlei Peng Guocheng Lu 《Journal of Semiconductors》 EI CAS CSCD 2024年第5期50-60,共11页
There are challenges to the reliability evaluation for insulated gate bipolar transistors(IGBT)on electric vehicles,such as junction temperature measurement,computational and storage resources.In this paper,a junction... There are challenges to the reliability evaluation for insulated gate bipolar transistors(IGBT)on electric vehicles,such as junction temperature measurement,computational and storage resources.In this paper,a junction temperature estimation approach based on neural network without additional cost is proposed and the lifetime calculation for IGBT using electric vehicle big data is performed.The direct current(DC)voltage,operation current,switching frequency,negative thermal coefficient thermistor(NTC)temperature and IGBT lifetime are inputs.And the junction temperature(T_(j))is output.With the rain flow counting method,the classified irregular temperatures are brought into the life model for the failure cycles.The fatigue accumulation method is then used to calculate the IGBT lifetime.To solve the limited computational and storage resources of electric vehicle controllers,the operation of IGBT lifetime calculation is running on a big data platform.The lifetime is then transmitted wirelessly to electric vehicles as input for neural network.Thus the junction temperature of IGBT under long-term operating conditions can be accurately estimated.A test platform of the motor controller combined with the vehicle big data server is built for the IGBT accelerated aging test.Subsequently,the IGBT lifetime predictions are derived from the junction temperature estimation by the neural network method and the thermal network method.The experiment shows that the lifetime prediction based on a neural network with big data demonstrates a higher accuracy than that of the thermal network,which improves the reliability evaluation of system. 展开更多
关键词 IGBT junction temperature neural network electric vehicles big data
下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
20
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部