期刊文献+
共找到1,634篇文章
< 1 2 82 >
每页显示 20 50 100
A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges
1
作者 Muhammad Muntasir Yakubu Mohd Fadzil B Hassan +5 位作者 Kamaluddeen Usman Danyaro Aisha Zahid Junejo Muhammed Siraj Saidu Yahaya Shamsuddeen Adamu Kamal Abdulsalam 《Computer Systems Science & Engineering》 2024年第6期1437-1481,共45页
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is t... This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is to comprehensively investigate prominent mechanisms’security features and vulnerabilities,emphasizing their security considerations,applications,challenges,and future directions.The existing literature offers valuable insights into various consensus mechanisms’strengths,limitations,and security vulnerabilities and their real-world applications.However,there remains a gap in synthesizing and analyzing this knowledge systematically.Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’security and vulnerabilities comprehensively.The study adheres to Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)guidelines and computer science standards and reviewed 3749 research papers from 2016 to 2024,excluding grey literature,resulting in 290 articles for descriptive analysis.The research highlights an increased focus on blockchain consensus security,energy efficiency,and hybrid mechanisms within 60%of research papers post-2019,identifying gaps in scalability,privacy,and interoperability for future exploration.By synthesizing the existing research and identifying the key trends,this SLR contributes to advancing the understanding of blockchain consensus mechanisms’security and guiding future research and structured innovation in blockchain systems and applications. 展开更多
关键词 Blockchain consensus mechanisms supply chain management proof of work(PoW) proof of stake(PoS) practical byzantine fault tolerance(PBFT)
下载PDF
Existence of 3-round zero-knowledge proof systems for NP 被引量:2
2
作者 LI HongDat LI Bao 《Science in China(Series F)》 2008年第3期273-282,共10页
This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new intera... This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new interactive proof model, we construct a 3-round zero-knowledge proof system for graph 3-coloring under standard assumptions. Our protocol is a non-black-box zero-knowledge proof because we adopt a special strategy to prove the zero-knowledge property. Consequently, our construction shows the existence of 3-round non-black-box zero-knowledge proof for all languages in NP under the DDH assumption. 展开更多
关键词 interactive proof zero-knowledge proof non-black-box simulation DDH assumption
原文传递
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes 被引量:1
3
作者 Qi-Qi Lai Bo Yang +3 位作者 Yong Yu Zhe Xia Yan-Wei Zhou Yuan Chen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第6期1243-1260,共18页
Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the relat... Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage. 展开更多
关键词 public-key ENCRYPTION IDENTITY-BASED HASH proof system lattice updatable leakage-resilience
原文传递
Privacy-preserving Distributed Location Proof Generating System 被引量:3
4
作者 LIU Mengjun LIU Shubo +3 位作者 ZHANG Rui Li Yongkai WANG Jun CAO Hui 《China Communications》 SCIE CSCD 2016年第3期203-218,共16页
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr... The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results. 展开更多
关键词 computer software and theory location proof secret-sharing location privacy
下载PDF
Memorizable Interactive Proof and Zero-Knowledge Proof Systems
5
作者 NingChen Jia-WeiRong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期936-941,共6页
Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have... Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have been designed and applied in practice. In this paper, a simple memorizable zero-knowledge protocol is proposed for graph non-isomorphism problem, based on the memorizable interactive proof system, which is extended from the original definition of interactive proof and is more applicable in reality. Keywords interactive proof - zero-knowledge proof - memorizable interactive proof - memorizable zero-knowledge proof This work was supported by the ministry of Science and Technology of China (Grant No.2001CCA03000), and the National Natural Science Foundation of China (Grant No.60273045).Ning Chen received his B.S. degree from Fudan University in 2001. Now he is a master candidate of Department of Computer Science, Fudan University. His research interests include computational complexity, computational cryptography, algorithm design and analysis.Jia-Wei Rong received her B.S. degree from Fudan University in 2002. Now she is a master candidate of Department of Computer Science, Fudan University. Her research interests include computational cryptography, machine learning, artificial intelligence. 展开更多
关键词 interactive proof zero-knowledge proof memorizable interactive proof memorizable zero-knowledge proof
原文传递
A novel explosion-proof walking system: Twin dual-motor drive tracked units for coal mine rescue robots 被引量:2
6
作者 李雨潭 朱华 +1 位作者 李猛钢 李鹏 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第10期2570-2577,共8页
A new explosion-proof walking system was designed for the coal mine rescue robot(CMRR) by optimizing the mechanical structure and control algorithm. The mechanical structure innovation lies mainly in the dual-motor dr... A new explosion-proof walking system was designed for the coal mine rescue robot(CMRR) by optimizing the mechanical structure and control algorithm. The mechanical structure innovation lies mainly in the dual-motor drive tracked unit used, which showed high dynamic performance compared with the conventional tracked unit. The control algorithm, developed based on decision trees and neural networking, facilitates autonomous switching between "Velocity-driven Mode" and "Torquedriven Mode". To verify the feasibility and effectiveness of the control strategy, we built a self-designed test platform and used it to debug the control program; we then made a robot prototype and conducted further experiments on single-step, ramp, and rubble terrains. The results show that the proposed walking system has excellent dynamic performance and the control strategy is very efficient, suggesting that a robot with this type of explosion-proof walking system can be successfully applied in Chinese coal mines. 展开更多
关键词 coal mine rescue robot tracked walking system EXPLOSION-proof control strategy
下载PDF
Analysis of color difference in digital proofing based on color management system
7
作者 LIN Mao-hai ZHOU Shi-sheng 《通讯和计算机(中英文版)》 2009年第10期32-36,共5页
关键词 色彩管理系统 差异分析 数字打样 爱普生STYLUS 颜色再现 分光光度计 基础 彩色
下载PDF
Analyzing Effect of Demand Rate on Safety of Systems with Periodic Proof-tests 被引量:1
8
作者 Manoj Kumar A.K.Verma A.Srividya 《International Journal of Automation and computing》 EI 2007年第4期335-341,共7页
Quantitative safety assessment of safety systems plays an important role in decision making at all stages of system lifecycle, i.e., design, deployment and phase out. Most safety assessment methods consider only syste... Quantitative safety assessment of safety systems plays an important role in decision making at all stages of system lifecycle, i.e., design, deployment and phase out. Most safety assessment methods consider only system parameters, such as configuration, hazard rate, coverage, repair rate, etc. along with periodic proof-tests (or inspection). Not considering demand rate will give a pessimistic safety estimate for an application with low demand rate such as nuclear power plants, chemical plants, etc. In this paper, a basic model of IEC 61508 is used. The basic model is extended to incorporate process demand and behavior of electronic- and/or computer-based system following diagnosis or proof-test. A new safety index, probability of failure on actual demand (PFAD) based on extended model and demand rate is proposed. Periodic proof-test makes the model semi-Markovian, so a piece-wise continuous time Markov chain (CTMC) based method is used to derive mean state probabilities of elementary or aggregated state. Method to determine probability of failure on demand (PFD) (IEC 61508) and PFAD based on these state probabilities are described. In example, safety indices of PFD and PFAD are compared. 展开更多
关键词 Probability of failure on demand fail safe Markov model continuous time Markov chain IEC 61508 diagnosis REPAIR proof-test DEMAND safety system.
下载PDF
A Leaking-Proof Theranostic Nanoplatform for Tumor-Targeted and Dual-Modality Imaging-Guided Photodynamic Therapy
9
作者 Duo Jin Yang Zhu +8 位作者 Manman Liu Wenxin Yu Jiaji Yu Xinwei Zheng Lulu Wang Yun Wu Kaiju Wei Junjie Cheng Yangzhong Liu 《Biomedical Engineering Frontiers》 CAS 2023年第1期187-196,共10页
Objective:A protein-based leaking-proof theranostic nanoplatform for dual-modality imaging-guided tumor photodynamic therapy(PDT)has been designed.Impact Statement:A site-specific conjugation of chlorin e6(Ce6)to ferr... Objective:A protein-based leaking-proof theranostic nanoplatform for dual-modality imaging-guided tumor photodynamic therapy(PDT)has been designed.Impact Statement:A site-specific conjugation of chlorin e6(Ce6)to ferrimagnetic ferritin(MFtn-Ce6)has been constructed to address the challenge of unexpected leakage that often occurs during small-molecule drug delivery.Introduction:PDT is one of the most promising approaches for tumor treatment,while a delivery system is typically required for hydrophobic photosensitizers.However,the nonspecific distribution and leakage of photosensitizers could lead to insufficient drug accumulation in tumor sites.Methods:An engineered ferritin was generated for site-specific conjugation of Ce6 to obtain a leaking-proof delivery system,and a ferrimagnetic core was biomineralized in the cavity of ferritin,resulting in a fluorescent ferrimagnetic ferritin nanoplatform(MFtn-Ce6).The distribution and tumor targeting of MFtn-Ce6 can be detected by magnetic resonance imaging(MRI)and fluorescence imaging(FLI).Results:MFtn-Ce6 showed effective dual-modality MRI and FLI.A prolonged in vivo circulation and increased tumor accumulation and retention of photosensitizer was observed.The time-dependent distribution of MFtn-Ce6 can be precisely tracked in real time to find the optimal time window for PDT treatment.The colocalization of ferritin and the iron oxide core confirms the high stability of the nanoplatform in vivo.The results showed that mice treated with MFtn-Ce6 exhibited marked tumor-suppressive activity after laser irradiation.Conclusion:The ferritin-based leaking-proof nanoplatform can be used for the efficient delivery of the photosensitizer to achieve an enhanced therapeutic effect.This method established a general approach for the dual-modality imagingguided tumor delivery of PDT agents. 展开更多
关键词 proof distribution RETENTION
下载PDF
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
10
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
下载PDF
A Comparative Analysis of the New -3(-n) - 1 Remer Conjecture and a Proof of the 3n + 1 Collatz Conjecture
11
作者 Mike Remer 《Journal of Applied Mathematics and Physics》 2023年第8期2216-2220,共5页
This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An... This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An overview of both conjectures and their respective iterative processes will be presented. Showcasing their unique properties and behavior to each other. Through a detailed comparison, we highlight the similarities and differences between these two conjectures and discuss their significance in the field of mathematics. And how they prove each other to be true. 展开更多
关键词 -3(-n) - 1 Remer Conjecture 3n + 1 Collatz Conjecture Comparative Analysis proof Natural Numbers Integer Sequences Factorial Processes Par-tial Differential Equations Bounded Values Collatz Conjecture Collatz Algo-rithm Collatz Operator Collatz Compliance And Mathematical Conjectures
下载PDF
A Proof of Brouwer’s Fixed Point Theorem Using Sperner’s Lemma
12
作者 Cassie Lu 《数学计算(中英文版)》 2023年第2期1-6,共6页
This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the correspo... This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the corresponding case under the Sperner’s Labeling and apply the Sperner’s Lemma to solve the question. 展开更多
关键词 Brouwer’s Fixed Point Theorem Sperner’s Lemma proof
下载PDF
人工智能时代证明标准客观化的负效应及其克服
13
作者 徐阳 魏溢男 《齐鲁学刊》 CSSCI 北大核心 2024年第1期82-96,共15页
在人工智能时代,算法技术驱动下的统一证据标准和逻辑经验法则的可算性虽然在一定程度上可以增强证明标准的可操作性,减少司法随意性,却显性地压缩了主观要素的适用空间,将证明标准引入更深层次的客观化,产生事实认定受到客观化规则侵... 在人工智能时代,算法技术驱动下的统一证据标准和逻辑经验法则的可算性虽然在一定程度上可以增强证明标准的可操作性,减少司法随意性,却显性地压缩了主观要素的适用空间,将证明标准引入更深层次的客观化,产生事实认定受到客观化规则侵蚀、陷入证据法定主义窠臼的负效应。在证明标准强调主客观融合的背景下,应当秉持证据裁量的基本立场,用证据裁量能动主义克服证明标准客观化的缺憾。客观化的证明标准只是底线的证明标准,是主观结论形成的基础,应当由事实认定者运用自由心证作最终的审查和判断。未来应通过制度建构纾解证明标准客观化产生的负效应,建立客观化证明标准的技术指南开示与异议机制,以期实现人工智能在刑事证明领域的良好应用,促进司法现代化和司法进步。 展开更多
关键词 证明标准客观化 智能辅助系统 统一证据标准 自由心证
下载PDF
变压器电弧故障防爆燃技术现状与发展趋势
14
作者 周远翔 李宇航 +3 位作者 赵义焜 滕陈源 卢理成 李鹏 《高电压技术》 EI CAS CSCD 北大核心 2024年第10期4273-4296,共24页
变压器是输电系统中最重要的设备之一,变压器油箱内电弧放电引起的压力上升极易导致油箱爆炸甚至引发大规模火灾事故,严重威胁电力系统的安全运行。为此从变压器状态监测、状态评价等方面总结了变压器故障预警技术的发展,介绍了变压器... 变压器是输电系统中最重要的设备之一,变压器油箱内电弧放电引起的压力上升极易导致油箱爆炸甚至引发大规模火灾事故,严重威胁电力系统的安全运行。为此从变压器状态监测、状态评价等方面总结了变压器故障预警技术的发展,介绍了变压器电弧故障快速清除的策略,从变压器电弧故障压力特征研究、变压器油箱优化设计、压力释放技术等方面阐述了变压器本体防爆技术的发展,并简要介绍了变压器火灾消防技术。另外,对比分析了现有变压器防爆燃技术的优势与不足,提出从预警、清除、防爆、消防等4个层级建立全面立体的变压器电弧故障爆燃防御体系,为变压器电弧防爆燃技术发展、保障输电系统安全可靠运行提供完整的思路。 展开更多
关键词 变压器 电弧故障 爆燃 立体防御体系 快速清除技术 压力特性 防爆设计 消防系统
下载PDF
水仓防隔水煤柱安全评价及注浆加固治理研究
15
作者 黄欢 杨茂林 +2 位作者 许峰 陈永亮 党亚堃 《中国煤炭》 北大核心 2024年第4期57-62,共6页
某煤矿水仓的砌碹巷道在开采的扰动、防隔水煤柱宽度留设不足、砌碹壁后充填不密实等情况下,使得周边采空区水渗漏至水仓,极大影响了水仓的安全稳定。为进一步加强水仓煤柱的稳定性,运用地面钻孔及井下钻孔相结合的方法进行注浆加固。... 某煤矿水仓的砌碹巷道在开采的扰动、防隔水煤柱宽度留设不足、砌碹壁后充填不密实等情况下,使得周边采空区水渗漏至水仓,极大影响了水仓的安全稳定。为进一步加强水仓煤柱的稳定性,运用地面钻孔及井下钻孔相结合的方法进行注浆加固。采用地面钻孔注浆充填井下硐室,硐室充填沙子245~328 m^(3)、水泥487~650 t,充填材料体积远远大于硐室体积220 m^(3),有效增加了煤柱厚度;利用井下钻孔在砌碹处进行水泥注浆与水化学注浆,使得砌碹裂缝处涌水量由15 m^(3)/h降至为零,砌碹壁后空隙充填效果良好。通过对煤柱及砌碹壁后空隙的注浆充填,有效提高了水仓防隔水煤柱的稳定性。 展开更多
关键词 水仓 排水系统 防隔水煤柱 采空区水 注浆
下载PDF
基于字合成运算的标签组群组共存证明协议
16
作者 黄源 彭迪 《计算机应用与软件》 北大核心 2024年第1期315-321,327,共8页
针对现有的大多数证明协议无法同时证明多标签同时存在缺陷,提出一种具有可扩展性的电子标签组证明协议。协议采用按位运算设计实现的字合成运算对信息加密,字合成运算可使得协议达到超轻量级计算;同时字合成运算实现中巧妙运用参数自... 针对现有的大多数证明协议无法同时证明多标签同时存在缺陷,提出一种具有可扩展性的电子标签组证明协议。协议采用按位运算设计实现的字合成运算对信息加密,字合成运算可使得协议达到超轻量级计算;同时字合成运算实现中巧妙运用参数自身具备的汉明重量,可减少参量引入;协议基于先验证再响应机制,可抵抗假冒攻击等。对协议进行不同角度分析,表明协议能够提供较高的安全性能,同时能够适用于现有低成本被动式电子标签系统中。 展开更多
关键词 物联网 射频识别系统 标签组 群组证明协议 可扩展性 字合成运算
下载PDF
基于区块链和代理重加密的医疗物联网数据安全管理系统 被引量:2
17
作者 柏松 王晓勇 胡胜利 《中国计量大学学报》 2024年第1期80-88,共9页
目的:基于可扩展区块链网络和代理重加密机制,建立医疗IoT数据管理系统,以保障物联网(IoT)智能医疗系统的数据传输安全。方法:将物联网与区块链相结合,通过分布式架构提高远程监测数据的安全性和隐私性。在物联网设备的注册和验证阶段,... 目的:基于可扩展区块链网络和代理重加密机制,建立医疗IoT数据管理系统,以保障物联网(IoT)智能医疗系统的数据传输安全。方法:将物联网与区块链相结合,通过分布式架构提高远程监测数据的安全性和隐私性。在物联网设备的注册和验证阶段,采用零知识证明(ZKP)方法确保数据的完整性。将代理重加密技术与区块链相结合以存储哈希数据,确保系统的安全性,并通过智能合约的设计实现了访问控制。为实现区块链的可扩展性,使用基于星际文件系统(IPFS)的离线数据库来存储数据。此外,为提高数据存储效率,提出了改进工作量证明(PoW)共识机制。结果:所建立的系统可有效抵御各种类型的攻击。IoT节点数量为40个时,系统总注册时间小于100 s,不同事务数量下的区块创建和访问时间均小于200 s。当事务数量为25个时,所提改进PoW算法的交易挖掘时间为0.001 s,优于原PoW算法的0.0024 s。结论:基于区块链和代理重加密技术的数据管理系统,能够确保医疗数据的机密性、完整性和隐私性,且效率优于传统的区块链方法,有助于提高IoT背景下医疗数据的安全管理。 展开更多
关键词 医疗物联网 区块链 数据安全 星际文件系统 工作量证明 代理重加密
下载PDF
智慧矿山系统工程及关键技术研究与实践 被引量:18
18
作者 王国法 庞义辉 +10 位作者 任怀伟 战凯 杜明 张勇 程健 杜毅博 张建中 巩师鑫 王丹丹 孟令宇 孟积渐 《煤炭学报》 EI CAS CSCD 北大核心 2024年第1期181-202,共22页
针对智慧矿山复杂巨系统建设过程中存在的问题,提出了智慧矿山建设的总体技术架构,并分别从智慧矿山系统模型构建、地下空间重构与模型动态更新、机器视觉测量技术、瓦斯环境射频防爆测试方法、矿山安全闭环管控体系、智慧矿山标准体系... 针对智慧矿山复杂巨系统建设过程中存在的问题,提出了智慧矿山建设的总体技术架构,并分别从智慧矿山系统模型构建、地下空间重构与模型动态更新、机器视觉测量技术、瓦斯环境射频防爆测试方法、矿山安全闭环管控体系、智慧矿山标准体系等方面进行了详细阐述。将智慧矿山分为信息感知支撑层、边缘计算层、云数据中心、多型网络、矿山智能生产管控平台、矿山智能生产系统、智慧矿山运维管理系统,构建了基于多系统深度融合的智慧矿山技术架构。基于智慧矿山知识图谱及信息抽取技术,构建了以数据创新为驱动、通信网络为基础、数据算力为核心的智慧矿山系统模型。构建了以机器视觉感知信息为主、其他感知信息为辅的矿山井下三维视觉空间模型,提出了矿山井下场景三维视觉与空间重建框架,实现了矿山井下三维空间重构与动态更新。开发了基于机器视觉技术的井下设备位姿与煤岩界面识别算法,实现了对井下综采装备群及煤岩分界面的同时空测量。探讨了井下瓦斯环境下现行防爆标准对5G基站功率的限制及存在的不足,设计开发了射频电磁能防爆专用试验装置,为提升井下5G基站功率阈值提供了方法借鉴。提出了融合灾害信息全面感知、防控方案自主决策、防控装备协同控制的矿井灾害闭环管控系统技术架构,实现井下灾害的超前预测预警与协同防控。构建了智能化煤矿标准体系框架,剖析了我国煤矿与金属矿山智能化建设典型案例,提出了智慧矿山建设发展趋势及建议。 展开更多
关键词 智慧矿山 系统工程 机器视觉 射频电磁能防爆 安全闭环管控 标准体系
下载PDF
基于双区块链的产品溯源系统研究与实现 被引量:1
19
作者 韩妍妍 魏万奇 +1 位作者 窦凯丽 张齐 《郑州大学学报(工学版)》 北大核心 2024年第1期54-63,共10页
现有区块链溯源系统由于区块信息存储容量有限,多采用区块链与云存储相结合的方式,并没有从根本上解决区块链溯源信息存储和数据泄露的问题。针对此问题构建双区块链模式:查询链完成溯源信息的上传,实现溯源系统的基本功能;存储链结合... 现有区块链溯源系统由于区块信息存储容量有限,多采用区块链与云存储相结合的方式,并没有从根本上解决区块链溯源信息存储和数据泄露的问题。针对此问题构建双区块链模式:查询链完成溯源信息的上传,实现溯源系统的基本功能;存储链结合星际文件系统保障数据完整安全。在此基础上,利用改进后的容量证明共识算法保证底层的安全性,在减少能源消耗的同时满足区块链溯源系统的应用需求。测试结果表明:系统上传平均速度可达80.66 M/s,下载平均速度可达90.75 M/s,具有良好的上传和下载性能。区块链每秒交易量达到125.88笔,单次交易承载量可以满足溯源系统的区块交易需求。 展开更多
关键词 双区块链 容量证明 星际文件系统 溯源系统 数据可靠存储
下载PDF
Thermally Conductive and UV-EMI Shielding Electronic Textiles for Unrestricted and Multifaceted Health Monitoring 被引量:1
20
作者 Yidong Peng Jiancheng Dong +8 位作者 Jiayan Long Yuxi Zhang Xinwei Tang Xi Lin Haoran Liu Tuoqi Liu Wei Fan Tianxi Liu Yunpeng Huang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第10期149-162,共14页
Skin-attachable electronics have garnered considerable research attention in health monitoring and artificial intelligence domains,whereas susceptibility to elec-tromagnetic interference(EMI),heat accumulation issues,... Skin-attachable electronics have garnered considerable research attention in health monitoring and artificial intelligence domains,whereas susceptibility to elec-tromagnetic interference(EMI),heat accumulation issues,and ultraviolet(UV)-induced aging problems pose significant constraints on their potential applications.Here,an ultra-elas-tic,highly breathable,and thermal-comfortable epidermal sensor with exceptional UV-EMI shielding performance and remarkable thermal conductivity is developed for high-fidelity monitoring of multiple human electrophysiological signals.Via filling the elastomeric microfibers with thermally conductive boron nitride nanoparticles and bridging the insulating fiber interfaces by plating Ag nanoparticles(NPs),an interwoven thermal con-ducting fiber network(0.72 W m^(-1) K^(-1))is constructed benefiting from the seamless thermal interfaces,facilitating unimpeded heat dissipation for comfort skin wearing.More excitingly,the elastomeric fiber substrates simultaneously achieve outstanding UV protection(UPF=143.1)and EMI shielding(SET>65,X-band)capabilities owing to the high electrical conductivity and surface plasmon resonance of Ag NPs.Furthermore,an electronic textile prepared by printing liquid metal on the UV-EMI shielding and thermally conductive nonwoven textile is finally utilized as an advanced epidermal sensor,which succeeds in monitoring different electrophysiological signals under vigorous electromagnetic interference.This research paves the way for developing protective and environmentally adaptive epidermal electronics for next-generation health regulation. 展开更多
关键词 Skin electronics Thermal regulating textiles Electromagnetic interference shielding Ultraviolet proof Health monitoring
下载PDF
上一页 1 2 82 下一页 到第
使用帮助 返回顶部