期刊文献+
共找到5,379篇文章
< 1 2 250 >
每页显示 20 50 100
Features of a rare advection-radiation fog event 被引量:9
1
作者 PU MeiJuan ZHANG GuoZheng +1 位作者 YAN WenLian LI ZiHua 《Science China Earth Sciences》 SCIE EI CAS 2008年第7期1044-1052,共9页
To investigate effects of atmospheric pollutants on fog nature, a comprehensive in situ observation project was implemented in the northern suburb of Nanjing, in December of 2006. For December 24-27 there occurred a h... To investigate effects of atmospheric pollutants on fog nature, a comprehensive in situ observation project was implemented in the northern suburb of Nanjing, in December of 2006. For December 24-27 there occurred a heavy fog lasting 4 d in succession. This event is of rare characteristics, namely long persistence, high concentration, tall fog top, acid fog water and explosive growth. Detailed analysis along with the causes of the fog was presented. The evidence suggests that the fog was generated by nighttime radiative cooling, maintained and developed under effects of warm, wet advection. As a result, it is an advection-radiation fog event. 展开更多
关键词 NANJING advection-radiation fog STRONG HEAVY fog acid fog EXPLOSIVE growth
原文传递
LCD面板C/FOG工艺制造虚拟计量方法研究
2
作者 刘暾东 黄智斌 +2 位作者 高凤强 郑鹏 谢玉练 《仪器仪表学报》 EI CAS CSCD 北大核心 2024年第1期16-25,共10页
针对液晶显示器(LCD)面板的“Chip/FPC on Glass”(C/FOG)工艺生产制造过程中存在的计量延迟大、生产异常无法提前预测的问题,本文提出一种基于神经网络的C/FOG工艺生产制造虚拟计量方法。该方法利用生产机台上的传感器采集生产过程中... 针对液晶显示器(LCD)面板的“Chip/FPC on Glass”(C/FOG)工艺生产制造过程中存在的计量延迟大、生产异常无法提前预测的问题,本文提出一种基于神经网络的C/FOG工艺生产制造虚拟计量方法。该方法利用生产机台上的传感器采集生产过程中的过程状态数据,构建基于多尺度一维卷积及通道注意力模型(MS1DC-CA)的虚拟计量模型。通过多个尺度的卷积核提取不同尺度范围内的状态数据特征。在对含有缺失值的原始数据预处理中,提出了基于粒子群算法改进的K近邻填补方法(PSO-KNN Imputation)进行缺失值填充,保留特征的同时,减少因填充值引入的干扰。最后在实际生产采集的数据上进行实验对比分析,实际不良率主要集中在0.1%~0.5%,该虚拟计量模型的拟合均方误差为0.397 7‱,低于其他现有拟合模型,在平均绝对误差、对称平均绝对百分比误差和拟合优度3种评价指标下也均优于其他现有的拟合模型,具有良好的预测性能。 展开更多
关键词 C/fog工艺 虚拟计量 缺失值填充 多尺度一维卷积 通道注意力
下载PDF
Influences of tree characters on throughfall and stemflow from rainfall and fog in Popa Mountain Park, Myanmar
3
作者 Yadanar Zaw Hiroki Oue 《Journal of Forestry Research》 SCIE EI CAS CSCD 2024年第6期210-219,共10页
Available water for communities is insufficient in the central part of Myanmar due to limited rainfall and surface water resources.Over the last two decades,affores-tation and reforestation projects have been implemen... Available water for communities is insufficient in the central part of Myanmar due to limited rainfall and surface water resources.Over the last two decades,affores-tation and reforestation projects have been implemented in this region to provide sufficient water to local communities,expecting forested areas to store more rainwater than other land uses.However,there has been no research and very limited information on rainfall partitioning into throughfall(TF)and stemflow(SF),particularly concerning tree char-acters.Gross rainfall,TF under different canopy types,and SF of different tree types were measured in 2019.TF and SF were frequently observed even without rain but under foggy conditions.Therefore,both were partitioned into TF and SF from rainfall and fog individually.Sparser canopies resulted in larger TF from rainfall than denser canopies.However,a denser canopy delivered larger TF from fog than a sparser one.TF rates from rainfall in sparser and denser canopies were 54.5%and 51.5%,respectively,while those from fog were 15.2%and 27.2%,respectively.As a result,total TF rate in the denser canopy(70.7%)was significantly larger than that from the sparser one(64.3%).Short trees with small crown projection area and smooth bark(Type I)resulted in larger SF from rainfall than taller trees with large crown projection area and rough bark(Type II).How-ever,Type II trees resulted in larger SF from fog.SF rates by rainfall from Type I and II trees were 17.5%and 12.2%,respectively,while those by fog were 22.2%and 39.5%,respectively.No significant total SF rates were found for Type I(22.5%)and II trees(20.1%).A denser canopy results in larger TF,and Type I trees result in larger SF.In an area where foggy conditions occur frequently and for a lengthy period,however,Type II trees will result in larger SF.These three tree characters(dense canopies,short trees with small crown projection area and smooth bark,and tall trees with large crown projection area and rough bark)should be con-sidered for afforestation and reforestation projects in the Popa Mountain Park to enhance net water input by forests. 展开更多
关键词 Gross rainfall fog interception THROUGHFALL STEMFLOW
下载PDF
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT:A federated learning approach
4
作者 Mohamed Abdel-Basset Hossam Hawash +2 位作者 Nour Moustafa Imran Razzak Mohamed Abd Elfattah 《Digital Communications and Networks》 SCIE CSCD 2024年第2期404-415,共12页
With the prevalence of the Internet of Things(IoT)systems,smart cities comprise complex networks,including sensors,actuators,appliances,and cyber services.The complexity and heterogeneity of smart cities have become v... With the prevalence of the Internet of Things(IoT)systems,smart cities comprise complex networks,including sensors,actuators,appliances,and cyber services.The complexity and heterogeneity of smart cities have become vulnerable to sophisticated cyber-attacks,especially privacy-related attacks such as inference and data poisoning ones.Federated Learning(FL)has been regarded as a hopeful method to enable distributed learning with privacypreserved intelligence in IoT applications.Even though the significance of developing privacy-preserving FL has drawn as a great research interest,the current research only concentrates on FL with independent identically distributed(i.i.d)data and few studies have addressed the non-i.i.d setting.FL is known to be vulnerable to Generative Adversarial Network(GAN)attacks,where an adversary can presume to act as a contributor participating in the training process to acquire the private data of other contributors.This paper proposes an innovative Privacy Protection-based Federated Deep Learning(PP-FDL)framework,which accomplishes data protection against privacy-related GAN attacks,along with high classification rates from non-i.i.d data.PP-FDL is designed to enable fog nodes to cooperate to train the FDL model in a way that ensures contributors have no access to the data of each other,where class probabilities are protected utilizing a private identifier generated for each class.The PP-FDL framework is evaluated for image classification using simple convolutional networks which are trained using MNIST and CIFAR-10 datasets.The empirical results have revealed that PF-DFL can achieve data protection and the framework outperforms the other three state-of-the-art models with 3%–8%as accuracy improvements. 展开更多
关键词 Privacy preservation Federated learning Deep learning fog computing Smart cities
下载PDF
A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing
5
作者 Hawazen Alzahrani Tarek Sheltami +2 位作者 Abdulaziz Barnawi Muhammad Imam Ansar Yaser 《Computers, Materials & Continua》 SCIE EI 2024年第9期4703-4728,共26页
The Internet of Things(IoT)links various devices to digital services and significantly improves the quality of our lives.However,as IoT connectivity is growing rapidly,so do the risks of network vulnerabilities and th... The Internet of Things(IoT)links various devices to digital services and significantly improves the quality of our lives.However,as IoT connectivity is growing rapidly,so do the risks of network vulnerabilities and threats.Many interesting Intrusion Detection Systems(IDSs)are presented based on machine learning(ML)techniques to overcome this problem.Given the resource limitations of fog computing environments,a lightweight IDS is essential.This paper introduces a hybrid deep learning(DL)method that combines convolutional neural networks(CNN)and long short-term memory(LSTM)to build an energy-aware,anomaly-based IDS.We test this system on a recent dataset,focusing on reducing overhead while maintaining high accuracy and a low false alarm rate.We compare CICIoT2023,KDD-99 and NSL-KDD datasets to evaluate the performance of the proposed IDS model based on key metrics,including latency,energy consumption,false alarm rate and detection rate metrics.Our findings show an accuracy rate over 92%and a false alarm rate below 0.38%.These results demonstrate that our system provides strong security without excessive resource use.The practicality of deploying IDS with limited resources is demonstrated by the successful implementation of IDS functionality on a Raspberry Pi acting as a Fog node.The proposed lightweight model,with a maximum power consumption of 6.12 W,demonstrates its potential to operate effectively on energy-limited devices such as low-power fog nodes or edge devices.We prioritize energy efficiency whilemaintaining high accuracy,distinguishing our scheme fromexisting approaches.Extensive experiments demonstrate a significant reduction in false positives,ensuring accurate identification of genuine security threats while minimizing unnecessary alerts. 展开更多
关键词 Intrusion detection fog computing CNN LSTM energy consumption
下载PDF
Joint Optimization of Energy Consumption and Network Latency in Blockchain-Enabled Fog Computing Networks
6
作者 Huang Xiaoge Yin Hongbo +3 位作者 Cao Bin Wang Yongsheng Chen Qianbin Zhang Jie 《China Communications》 SCIE CSCD 2024年第4期104-119,共16页
Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap... Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature. 展开更多
关键词 blockchain energy consumption fog computing network Internet of Things LATENCY
下载PDF
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
7
作者 Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita 《Digital Communications and Networks》 SCIE CSCD 2024年第4期989-1000,共12页
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur... The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment. 展开更多
关键词 Internet of things AUTHENTICATION Post-quantum cryptography Lattice-based cryptography Cloud computing fog computing FAIL-SAFE
下载PDF
Target Detection Algorithm in Foggy Scenes Based on Dual Subnets
8
作者 Yuecheng Yu Liming Cai +3 位作者 Anqi Ning Jinlong Shi Xudong Chen Shixin Huang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1915-1931,共17页
Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the ima... Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the image by the universal detection network.Thus,a dual subnet based on multi-task collaborative training(DSMCT)is proposed in this paper.Firstly,in the training phase,the Gated Context Aggregation Network(GCANet)is used as the supervisory network of YOLOX to promote the extraction of clean information in foggy scenes.In the test phase,only the YOLOX branch needs to be activated to ensure the detection speed of the model.Secondly,the deformable convolution module is used to improve GCANet to enhance the model’s ability to capture details of non-homogeneous fog.Finally,the Coordinate Attention mechanism is introduced into the Vision Transformer and the backbone network of YOLOX is redesigned.In this way,the feature extraction ability of the network for deep-level information can be enhanced.The experimental results on artificial fog data set FOG_VOC and real fog data set RTTS show that the map value of DSMCT reached 86.56%and 62.39%,respectively,which was 2.27%and 4.41%higher than the current most advanced detection model.The DSMCT network has high practicality and effectiveness for target detection in real foggy scenes. 展开更多
关键词 Target detection fog target detection YOLOX twin network multi-task learning
下载PDF
Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance
9
作者 Linghong Kuang Wenlong Shi Jing Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第8期3193-3219,共27页
The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers.Howe... The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers.However,with the advancement of information and communication technology,new security and privacy challenges have emerged for AMI.To address these challenges and enhance the security and privacy of user data in the smart grid,a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance(HPPM-AMICFA)is proposed in this paper.The proposed model integrates cloud and fog computing with hierarchical threshold encryption,offering a flexible and efficient privacy protection solution that significantly enhances data security in the smart grid.The methodology involves setting user protection levels by processing missing data and utilizing fuzzy comprehensive analysis to evaluate user importance,thereby assigning appropriate protection levels.Furthermore,a hierarchical threshold encryption algorithm is developed to provide differentiated protection strategies for fog nodes based on user IDs,ensuring secure aggregation and encryption of user data.Experimental results demonstrate that HPPM-AMICFA effectively resists various attack strategies while minimizing time costs,thereby safeguarding user data in the smart grid. 展开更多
关键词 AMI cloud and fog assistance fuzzy comprehensive analysis hierarchical threshold encryption
下载PDF
Enhanced Hybrid Equilibrium Strategy in Fog-Cloud Computing Networks with Optimal Task Scheduling
10
作者 Muchang Rao Hang Qin 《Computers, Materials & Continua》 SCIE EI 2024年第5期2647-2672,共26页
More devices in the Intelligent Internet of Things(AIoT)result in an increased number of tasks that require low latency and real-time responsiveness,leading to an increased demand for computational resources.Cloud com... More devices in the Intelligent Internet of Things(AIoT)result in an increased number of tasks that require low latency and real-time responsiveness,leading to an increased demand for computational resources.Cloud computing’s low-latency performance issues in AIoT scenarios have led researchers to explore fog computing as a complementary extension.However,the effective allocation of resources for task execution within fog environments,characterized by limitations and heterogeneity in computational resources,remains a formidable challenge.To tackle this challenge,in this study,we integrate fog computing and cloud computing.We begin by establishing a fog-cloud environment framework,followed by the formulation of a mathematical model for task scheduling.Lastly,we introduce an enhanced hybrid Equilibrium Optimizer(EHEO)tailored for AIoT task scheduling.The overarching objective is to decrease both the makespan and energy consumption of the fog-cloud system while accounting for task deadlines.The proposed EHEO method undergoes a thorough evaluation against multiple benchmark algorithms,encompassing metrics likemakespan,total energy consumption,success rate,and average waiting time.Comprehensive experimental results unequivocally demonstrate the superior performance of EHEO across all assessed metrics.Notably,in the most favorable conditions,EHEO significantly diminishes both the makespan and energy consumption by approximately 50%and 35.5%,respectively,compared to the secondbest performing approach,which affirms its efficacy in advancing the efficiency of AIoT task scheduling within fog-cloud networks. 展开更多
关键词 Artificial intelligence of things fog computing task scheduling equilibrium optimizer differential evaluation algorithm local search
下载PDF
Hybrid Approach for Cost Efficient Application Placement in Fog-Cloud Computing Environments
11
作者 Abdulelah Alwabel Chinmaya Kumar Swain 《Computers, Materials & Continua》 SCIE EI 2024年第6期4127-4148,共22页
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.How... Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.However,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud computing.An approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing costs.This approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of applications.In this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing cost.We consider four cost-types for application deployment:Computation,communication,energy consumption,and violations.The proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the system.An extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art approaches.The results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost. 展开更多
关键词 Placement mechanism application module placement fog computing cloud computing genetic algorithm flamingo search algorithm
下载PDF
Fitness Sharing Chaotic Particle Swarm Optimization (FSCPSO): A Metaheuristic Approach for Allocating Dynamic Virtual Machine (VM) in Fog Computing Architecture
12
作者 Prasanna Kumar Kannughatta Ranganna Siddesh Gaddadevara Matt +2 位作者 Chin-Ling Chen Ananda Babu Jayachandra Yong-Yuan Deng 《Computers, Materials & Continua》 SCIE EI 2024年第8期2557-2578,共22页
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications... In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications.Therefore,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing environments.Effective task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog nodes.This process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource bottlenecks.In this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local exploitation.This balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization algorithms.The FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response time.In relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks. 展开更多
关键词 fog computing fractional selectivity approach particle swarm optimization algorithm task scheduling virtual machine allocation
下载PDF
YOLO-FOG雾天目标检测算法
13
作者 谷芳 朱凯 《装备机械》 2024年第2期1-4,30,共5页
雾天条件下,图像质量较低,导致目标检测存在难度。传统的YOLOv5s算法可以在雾天环境中进行检测,但是检测速度慢。对此,提出一种名为YOLO-FOG的雾天目标检测算法,可以提高雾天环境中的检测速度。这一算法在主干网络部分使用RepVGG结构,... 雾天条件下,图像质量较低,导致目标检测存在难度。传统的YOLOv5s算法可以在雾天环境中进行检测,但是检测速度慢。对此,提出一种名为YOLO-FOG的雾天目标检测算法,可以提高雾天环境中的检测速度。这一算法在主干网络部分使用RepVGG结构,减小计算量,提高特征表示能力,加快推理速度,以提高检测的实时性。试验结果表明,针对RTTS数据集,自行车、公共汽车、汽车、摩托车、行人五类目标的平均精度依次可以达到81.72%、79.99%、89.24%、73.46%、83.34%,并且识别时间仅为每张0.065 s。YOLO-FOG雾天目标检测算法兼顾准确性和实时性,具有良好的应用前景。 展开更多
关键词 目标 检测 算法
下载PDF
Monitoring Sea Fog over the Yellow Sea and Bohai Bay Based on Deep Convolutional Neural Network
14
作者 HUANG Bin GAO Shi-bo +2 位作者 YU Run-ling ZHAO Wei ZHOU Guan-bo 《Journal of Tropical Meteorology》 SCIE 2024年第3期223-229,共7页
In this paper,we utilized the deep convolutional neural network D-LinkNet,a model for semantic segmentation,to analyze the Himawari-8 satellite data captured from 16 channels at a spatial resolution of 0.5 km,with a f... In this paper,we utilized the deep convolutional neural network D-LinkNet,a model for semantic segmentation,to analyze the Himawari-8 satellite data captured from 16 channels at a spatial resolution of 0.5 km,with a focus on the area over the Yellow Sea and the Bohai Sea(32°-42°N,117°-127°E).The objective was to develop an algorithm for fusing and segmenting multi-channel images from geostationary meteorological satellites,specifically for monitoring sea fog in this region.Firstly,the extreme gradient boosting algorithm was adopted to evaluate the data from the 16 channels of the Himawari-8 satellite for sea fog detection,and we found that the top three channels in order of importance were channels 3,4,and 14,which were fused into false color daytime images,while channels 7,13,and 15 were fused into false color nighttime images.Secondly,the simple linear iterative super-pixel clustering algorithm was used for the pixel-level segmentation of false color images,and based on super-pixel blocks,manual sea-fog annotation was performed to obtain fine-grained annotation labels.The deep convolutional neural network D-LinkNet was built on the ResNet backbone and the dilated convolutional layers with direct connections were added in the central part to form a string-and-combine structure with five branches having different depths and receptive fields.Results show that the accuracy rate of fog area(proportion of detected real fog to detected fog)was 66.5%,the recognition rate of fog zone(proportion of detected real fog to real fog or cloud cover)was 51.9%,and the detection accuracy rate(proportion of samples detected correctly to total samples)was 93.2%. 展开更多
关键词 deep convolutional neural network satellite images sea fog detection multi-channel image fusion
下载PDF
FOG Bonding 电阻降低方案及机理探究
15
作者 韩鑫 王晓杰 +3 位作者 唐乌力吉白尔 谢建云 薛海林 闫亮 《中国科技纵横》 2024年第5期113-115,共3页
近年来,中小尺寸产品客户端上线TP问题频发,其中有一类TP不良由FOG Bonding电阻异常偏大导致,但二次因未知。FOG堆叠结构为PNL+ACF(异方性导电胶)+FPC,但PNL、FPC为走线电阻,本身电阻较小(<1Ω),故不考虑此影响。基于此,重点研究FOG ... 近年来,中小尺寸产品客户端上线TP问题频发,其中有一类TP不良由FOG Bonding电阻异常偏大导致,但二次因未知。FOG堆叠结构为PNL+ACF(异方性导电胶)+FPC,但PNL、FPC为走线电阻,本身电阻较小(<1Ω),故不考虑此影响。基于此,重点研究FOG Bonding接触电阻。首先建立机理模型并进行探究,然后通过调整FOG Bonding参数,使ACF导电粒子的爆破状态和胶体的固化状态达到最优,最终降低电阻。 展开更多
关键词 fog Bonding 接触电阻 ACF爆破 ACF固化
下载PDF
Production of Artificial Fog in the PAVIN Fog and Rain Platform: In Search of Big Droplets Fog
16
作者 Pierre Duthon Mickaël Ferreira Fernandes Sébastien Liandrat 《Atmospheric and Climate Sciences》 2024年第1期42-61,共20页
In fog, visibility is reduced. This reduction in visibility is measured by the meteorological optical range (MOR), which is important for studying human perception and various sensors in foggy conditions. The Cerema P... In fog, visibility is reduced. This reduction in visibility is measured by the meteorological optical range (MOR), which is important for studying human perception and various sensors in foggy conditions. The Cerema PAVIN Fog & Rain platform is capable of producing calibrated fog in order to better analyses it and understand its consequences. The problem is that the droplets produced by the platform are not large enough to resemble real fog. This can have a major impact on measurements since the interaction between electromagnetic waves and fog depends on the wavelength and diameter of the droplets. To remedy this, Cerema is building a new platform with new equipment capable of generating fog. This study analyses different nozzles and associated usage parameters such as the type of water used and the pressure used. The aim is to select the best nozzle with the associated parameters for producing large-diameter droplets and therefore more realistic fog. 展开更多
关键词 fog Physical Simulation Droplets Size Distribution Meteorological Optical Range
下载PDF
Synthetic analysis of meteorological elements for the sea fogs occurred in northwest the Yellow Sea under low pressure control and comparison with sea fogs occurred under high pressure control in summer
17
作者 WANG Kaiyue MA Zheng +3 位作者 MIAO Qingsheng ZHAO Binru ZHANG Zengjian LI Cheng 《Marine Science Bulletin》 2024年第1期1-18,共18页
Based on the principle of transient perturbation analysis,in this paper,a method to objectively determine the weather pattern formed by sea fog is provided.On the basis of the classification results,the circulation si... Based on the principle of transient perturbation analysis,in this paper,a method to objectively determine the weather pattern formed by sea fog is provided.On the basis of the classification results,the circulation situation,divergence and vertical velocity field,and the vertical profile of temperature and humidity are synthesized and analyzed.The basic characteristics of the circulation and physical field of sea fog under low pressure control(L type sea fog)are obtained,and the results are compared with the sea fog under the control of high pressure(H type sea fog):a)L type sea fogs potential height anomaly disturbance is mainly manifested in the low layer,and its average value is-65.66 gpm,gradually weakening upward;b)L type sea fogs inversion structure is weaker than H type sea fogs when it occurs,the fog layer is thicker and the high relative humidity level is high over the fog layer,while the H type sea fogs fog layer has a relatively obvious dry layer;c)L sea fog has three layers of structure at the vertical direction.The first layer 1000-950 hPa is convergence accompanied by weak rise and subsidence,the second layer 950-850 hPa is divergence accompanied by weak subsidence,and the third layer 850 to 500hPa is gradually strengthened.While there are two layer structures of the H type sea fog.1000 hPa is divergence accompanied by weak rising and sinking movement,950-500 hPa is a uniform subsidence movement.d)Probability density statistical analysis further quantified the vertical movement of L and H type sea fog and the distribution of relative humidity in each layer.These conclusions provide an important reference for forecasting the sea fog in the northwest of the Yellow Sea under the condition of low pressure circulation in summer. 展开更多
关键词 sea fog under the low pressure control sea fog under the high pressure control northwest of the Yellow Sea synthetic analysis transient method
下载PDF
Examining the Experiences and Challenges of Haze-Fog Governance in China
18
作者 Renrui Wang 《Journal of Geoscience and Environment Protection》 2024年第4期45-58,共14页
With the rapid development of industrialisation and urbanisation, China is facing the challenge of severe HF (Haze-Fog) pollution. This essay compares the advantages and disadvantages of China’s HF management and sum... With the rapid development of industrialisation and urbanisation, China is facing the challenge of severe HF (Haze-Fog) pollution. This essay compares the advantages and disadvantages of China’s HF management and summarizes the important lessons China can teach the rest of the world about applying this tactic. China’s capabilities in the digital economy, National Innovation Demonstration Zones, and urban innovation systems are examined in this article, along with its shortcomings in information mechanisms and pollution sources. This essay also summarizes China’s achievements, particularly regarding local autonomy. The essay goes on to say, however, that China is probably going to be under more pressure to manage HF in the future, both in terms of long-term solutions and the economy. 展开更多
关键词 Haze-fog Control Digital Economy National Innovation Demonstration Zones Local Autonomy
下载PDF
Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map 被引量:1
19
作者 K.Priyadarsini Arun Kumar Sivaraman +1 位作者 Abdul Quadir Md Areej Malibari 《Computers, Materials & Continua》 SCIE EI 2023年第3期6703-6717,共15页
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of data.The major concerns in this domain are security and privacy.Therefore,attaining a reliable level of... With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of data.The major concerns in this domain are security and privacy.Therefore,attaining a reliable level of confidentiality in the fog computing environment is a pivotal task.Among different types of data stored in the fog,the 3D point and mesh fog data are increasingly popular in recent days,due to the growth of 3D modelling and 3D printing technologies.Hence,in this research,we propose a novel scheme for preserving the privacy of 3D point and mesh fog data.Chaotic Cat mapbased data encryption is a recently trending research area due to its unique properties like pseudo-randomness,deterministic nature,sensitivity to initial conditions,ergodicity,etc.To boost encryption efficiency significantly,in this work,we propose a novel Chaotic Cat map.The sequence generated by this map is used to transform the coordinates of the fog data.The improved range of the proposed map is depicted using bifurcation analysis.The quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate entropy.We also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical attack.The experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature. 展开更多
关键词 Chaotic cat map fog computing ENCRYPTION 3D point fog 3D mesh
下载PDF
Blockchain-Enabled Secure and Privacy-Preserving Data Aggregation for Fog-Based ITS 被引量:1
20
作者 Siguang Chen Li Yang +1 位作者 Yanhang Shi Qian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第5期3781-3796,共16页
As an essential component of intelligent transportation systems(ITS),electric vehicles(EVs)can store massive amounts of electric power in their batteries and send power back to a charging station(CS)at peak hours to b... As an essential component of intelligent transportation systems(ITS),electric vehicles(EVs)can store massive amounts of electric power in their batteries and send power back to a charging station(CS)at peak hours to balance the power supply and generate profits.However,when the system collects the corresponding power data,several severe security and privacy issues are encountered.The identity and private injection data may be maliciously intercepted by network attackers and be tampered with to damage the services of ITS and smart grids.Existing approaches requiring high computational overhead render them unsuitable for the resource-constrained Internet of Things(IoT)environment.To address above problems,this paper proposes a blockchain-enabled secure and privacy-preserving data aggregation scheme for fog-based ITS.First,a fog computing and blockchain co-aware aggregation framework of power injection data is designed,which provides strong support for ITS to achieve secure and efficient power injection.Second,Paillier homomorphic encryption,the batch aggregation signature mechanism and a Bloom filter are effectively integrated with efficient aggregation of power injection data with security and privacy guarantees.In addition,the fine-grained homomorphic aggregation is designed for power injection data generated by all EVs,which provides solid data support for accurate power dispatching and supply management in ITS.Experiments show that the total computational cost is significantly reduced in the proposed scheme while providing security and privacy guarantees.The proposed scheme is more suitable for ITS with latency-sensitive applications and is also adapted to deploying devices with limited resources. 展开更多
关键词 Blockchain fog computing security PRIVACY-PRESERVING ITS
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部