期刊文献+
共找到21,758篇文章
< 1 2 250 >
每页显示 20 50 100
Analysis of the Impact of Big Data Technology on Environmental Pollution Control Audit
1
作者 Xianrui Yang Jinyu Liu 《Proceedings of Business and Economic Studies》 2024年第3期22-27,共6页
As China strives towards the second centenary goal,increasing attention is being paid to environmental pollution and other related issues.Concurrently,with the rapid development of big data technology,many big data so... As China strives towards the second centenary goal,increasing attention is being paid to environmental pollution and other related issues.Concurrently,with the rapid development of big data technology,many big data solutions have been applied to environmental pollution control audits,exerting a significant impact.This paper presents the current situation of environmental pollution audits,summarizing the application of big data from the perspectives of both domestic and international research.In terms of data collection and data analysis for environmental pollution audits,cloud platform technology,and visualization technology are selected based on multiple data sources.The impact in the field of environmental pollution control audits is further analyzed.It is found that the environmental pollution audit cloud platform is not yet perfect,the technical skills of audit personnel are insufficient,and some technologies are not mature.Relevant suggestions are put forward to provide a reference for the future development of big data technology and its integration with environmental pollution control audits. 展开更多
关键词 Big data technology Environmental pollution control AUDIT
下载PDF
Understanding the Importance of Effective Third-Party Risk Management on Data Governance
2
作者 Marios E.Menexiadis Michail Ch.Xanthopoulos 《Management Studies》 2023年第6期307-311,共5页
With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaboratio... With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaborations offer numerous benefits,they also introduce a range of risks that organizations must carefully mitigate.If the obligation to meet the regulatory requirements is added to the equation,mitigating the third-party risk related to data governance,becomes one of the biggest challenges. 展开更多
关键词 third-party risk data governance data breach internal control system risk mitigation
下载PDF
Data-driven modeling on anisotropic mechanical behavior of brain tissue with internal pressure
3
作者 Zhiyuan Tang Yu Wang +3 位作者 Khalil I.Elkhodary Zefeng Yu Shan Tang Dan Peng 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期55-65,共11页
Brain tissue is one of the softest parts of the human body,composed of white matter and grey matter.The mechanical behavior of the brain tissue plays an essential role in regulating brain morphology and brain function... Brain tissue is one of the softest parts of the human body,composed of white matter and grey matter.The mechanical behavior of the brain tissue plays an essential role in regulating brain morphology and brain function.Besides,traumatic brain injury(TBI)and various brain diseases are also greatly influenced by the brain's mechanical properties.Whether white matter or grey matter,brain tissue contains multiscale structures composed of neurons,glial cells,fibers,blood vessels,etc.,each with different mechanical properties.As such,brain tissue exhibits complex mechanical behavior,usually with strong nonlinearity,heterogeneity,and directional dependence.Building a constitutive law for multiscale brain tissue using traditional function-based approaches can be very challenging.Instead,this paper proposes a data-driven approach to establish the desired mechanical model of brain tissue.We focus on blood vessels with internal pressure embedded in a white or grey matter matrix material to demonstrate our approach.The matrix is described by an isotropic or anisotropic nonlinear elastic model.A representative unit cell(RUC)with blood vessels is built,which is used to generate the stress-strain data under different internal blood pressure and various proportional displacement loading paths.The generated stress-strain data is then used to train a mechanical law using artificial neural networks to predict the macroscopic mechanical response of brain tissue under different internal pressures.Finally,the trained material model is implemented into finite element software to predict the mechanical behavior of a whole brain under intracranial pressure and distributed body forces.Compared with a direct numerical simulation that employs a reference material model,our proposed approach greatly reduces the computational cost and improves modeling efficiency.The predictions made by our trained model demonstrate sufficient accuracy.Specifically,we find that the level of internal blood pressure can greatly influence stress distribution and determine the possible related damage behaviors. 展开更多
关键词 data driven Constitutive law ANISOTROPY Brain tissue Internal pressure
下载PDF
Development and Application of a Power Law Constitutive Model for Eddy Current Dampers
4
作者 Longteng Liang Zhouquan Feng +2 位作者 Hongyi Zhang Zhengqing Chen Changzhao Qian 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2403-2419,共17页
Eddy current dampers (ECDs) have emerged as highly desirable solutions for vibration control due to theirexceptional damping performance and durability. However, the existing constitutive models present challenges tot... Eddy current dampers (ECDs) have emerged as highly desirable solutions for vibration control due to theirexceptional damping performance and durability. However, the existing constitutive models present challenges tothe widespread implementation of ECD technology, and there is limited availability of finite element analysis (FEA)software capable of accurately modeling the behavior of ECDs. This study addresses these issues by developing anewconstitutivemodel that is both easily understandable and user-friendly for FEAsoftware. By utilizing numericalresults obtained from electromagnetic FEA, a novel power law constitutive model is proposed to capture thenonlinear behavior of ECDs. The effectiveness of the power law constitutive model is validated throughmechanicalproperty tests and numerical seismic analysis. Furthermore, a detailed description of the application process ofthe power law constitutive model in ANSYS FEA software is provided. To facilitate the preliminary design ofECDs, an analytical derivation of energy dissipation and parameter optimization for ECDs under harmonicmotionis performed. The results demonstrate that the power law constitutive model serves as a viable alternative forconducting dynamic analysis using FEA and optimizing parameters for ECDs. 展开更多
关键词 Eddy current damper constitutive model finite element analysis vibration control power law constitutive model
下载PDF
Cooperative game theory-based steering law design of a CMG system
5
作者 HUA Bing NI Rui +2 位作者 ZHENG Mohong WU Yunhua CHEN Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第1期185-196,共12页
Spacecraft require a large-angle manoeuvre when performing agile manoeuvring tasks, therefore a control moment gyroscope(CMG) is employed to provide a strong moment.However, the control of the CMG system easily falls ... Spacecraft require a large-angle manoeuvre when performing agile manoeuvring tasks, therefore a control moment gyroscope(CMG) is employed to provide a strong moment.However, the control of the CMG system easily falls into singularity, which renders the actuator unable to output the required moment. To solve the singularity problem of CMGs, the control law design of a CMG system based on a cooperative game is proposed. First, the cooperative game model is constructed according to the quadratic programming problem, and the cooperative strategy is constructed. When the strategy falls into singularity, the weighting coefficient is introduced to carry out the strategy game to achieve the optimal strategy. In theory, it is proven that the cooperative game manipulation law of the CMG system converges, the sum of the CMG frame angular velocities is minimized, the energy consumption is small, and there is no output torque error. Then, the CMG group system is simulated.When the CMG system is near the singular point, it can quickly escape the singularity. When the CMG system falls into the singularity, it can also escape the singularity. Considering the optimization of angular momentum and energy consumption, the feasibility of the CMG system steering law based on a cooperative game is proven. 展开更多
关键词 control moment gyroscopes(CMG) cooperative game theory steering laws
下载PDF
Deployment Strategy for Multiple Controllers Based on the Aviation On-Board Software-Defined Data Link Network
6
作者 Yuting Zhu Yanfang Fu +3 位作者 Yang Ce Pan Deng Jianpeng Zhu Huankun Su 《Computers, Materials & Continua》 SCIE EI 2023年第12期3867-3894,共28页
In light of the escalating demand and intricacy of services in contemporary terrestrial,maritime,and aerial combat operations,there is a compelling need for enhanced service quality and efficiency in airborne cluster ... In light of the escalating demand and intricacy of services in contemporary terrestrial,maritime,and aerial combat operations,there is a compelling need for enhanced service quality and efficiency in airborne cluster communication networks.Software-Defined Networking(SDN)proffers a viable solution for the multifaceted task of cooperative communication transmission and management across different operational domains within complex combat contexts,due to its intrinsic ability to flexibly allocate and centrally administer network resources.This study pivots around the optimization of SDN controller deployment within airborne data link clusters.A collaborative multi-controller architecture predicated on airborne data link clusters is thus proposed.Within this architectural framework,the controller deployment issue is reframed as a two-fold problem:subdomain partition-ing and central interaction node selection.We advocate a subdomain segmentation approach grounded in node value ranking(NDVR)and a central interaction node selection methodology predicated on an enhanced Artificial Fish Swarm Algorithm(AFSA).The advanced NDVR-AFSA(Node value ranking-Improved artificial fish swarm algorithm)algorithm makes use of a chaos algorithm for population initialization,boosting population diversity and circumventing premature algorithm convergence.By the integration of adaptive strategies and incorporation of the genetic algorithm’s crossover and mutation operations,the algorithm’s search range adaptability is enhanced,thereby increasing the possibility of obtaining globally optimal solutions,while concurrently augmenting cluster reliability.The simulation results verify the advantages of the NDVR-IAFSA algorithm,achieve a better load balancing effect,improve the reliability of aviation data link cluster,and significantly reduce the average propagation delay and disconnection rate,respectively,by 12.8%and 11.7%.This shows that the optimization scheme has important significance in practical application,and can meet the high requirements of modern sea,land,and air operations to aviation airborne communication networks. 展开更多
关键词 Aviation cluster software defined network controller deployment Airborne network data link
下载PDF
The Construction and Implementation Path of the Audit System for Quality Control in the Big Data Era
7
作者 Wenjun Zou 《Proceedings of Business and Economic Studies》 2023年第6期111-115,共5页
In the era of big data,the construction and implementation of a quality control audit system are particularly crucial.This article delves into the impact of big data technology on quality control auditing,establishes ... In the era of big data,the construction and implementation of a quality control audit system are particularly crucial.This article delves into the impact of big data technology on quality control auditing,establishes a quality control auditing system in the big data era,and elucidates the pathway to realizing this system.Through the application of big data technology to quality control audits,there is an enhancement in audit efficiency,the attainment of more accurate risk assessment,and the provision of robust support for the sustainable development of enterprises. 展开更多
关键词 Big data Quality control Audit system
下载PDF
Research on Influencing Factors and Countermeasures of Risk Control of State-Owned Enterprises under the Background of Big Data
8
作者 Fengyan Wang Ziyu Hou +1 位作者 Ronaldo Juanatas Jasmin Niguidula 《Proceedings of Business and Economic Studies》 2023年第6期128-133,共6页
This study explores the risk control and response strategies of state-owned enterprises in the context of big data.Global economic uncertainty poses new challenges to state-owned enterprises,necessitating innovative r... This study explores the risk control and response strategies of state-owned enterprises in the context of big data.Global economic uncertainty poses new challenges to state-owned enterprises,necessitating innovative risk management approaches.This article proposes response strategies from four key aspects:establishing a proactive risk management culture,building a foundation in technology and data,conducting big data-driven risk analysis,and implementing predictive analysis and real-time monitoring.State-owned enterprises can foster a proactive risk management culture by cultivating employee risk awareness,demonstrating leadership,and establishing transparency and open communication.Additionally,data integration and analysis,leveraging the latest technology,are crucial factors that can help companies better identify risks and opportunities. 展开更多
关键词 State-owned enterprises Risk management Big data Risk control
下载PDF
ESTIMATION FOR THE AYMPTOTIC VARIANCE OF PARAMETRIC ESTIMATES IN PARTIAL LINEAR MODEL WITH CENSORED DATA 被引量:2
9
作者 秦更生 蔡雷 《Acta Mathematica Scientia》 SCIE CSCD 1996年第2期192-208,共17页
Consider tile partial linear model Y=Xβ+ g(T) + e. Wilers Y is at risk of being censored from the right, g is an unknown smoothing function on [0,1], β is a 1-dimensional parameter to be estimated and e is an unobse... Consider tile partial linear model Y=Xβ+ g(T) + e. Wilers Y is at risk of being censored from the right, g is an unknown smoothing function on [0,1], β is a 1-dimensional parameter to be estimated and e is an unobserved error. In Ref[1,2], it wes proved that the estimator for the asymptotic variance of βn(βn) is consistent. In this paper, we establish the limit distribution and the law of the iterated logarithm for,En, and obtain the convergest rates for En and the strong uniform convergent rates for gn(gn). 展开更多
关键词 partial linear model Censored data Kernel method Asymptotic normality Thc law of the iterated logarithm.
下载PDF
Data-Driven Model Identification and Control of the Inertial Systems
10
作者 Irina Cojuhari 《Intelligent Control and Automation》 2023年第1期1-18,共18页
In the synthesis of the control algorithm for complex systems, we are often faced with imprecise or unknown mathematical models of the dynamical systems, or even with problems in finding a mathematical model of the sy... In the synthesis of the control algorithm for complex systems, we are often faced with imprecise or unknown mathematical models of the dynamical systems, or even with problems in finding a mathematical model of the system in the open loop. To tackle these difficulties, an approach of data-driven model identification and control algorithm design based on the maximum stability degree criterion is proposed in this paper. The data-driven model identification procedure supposes the finding of the mathematical model of the system based on the undamped transient response of the closed-loop system. The system is approximated with the inertial model, where the coefficients are calculated based on the values of the critical transfer coefficient, oscillation amplitude and period of the underdamped response of the closed-loop system. The data driven control design supposes that the tuning parameters of the controller are calculated based on the parameters obtained from the previous step of system identification and there are presented the expressions for the calculation of the tuning parameters. The obtained results of data-driven model identification and algorithm for synthesis the controller were verified by computer simulation. 展开更多
关键词 data-Driven Model Identification Controller Tuning Undamped Transient Response Closed-Loop System Identification PID Controller
下载PDF
Study on Growth Laws of Marine Science and Technology Talents Based on the Perspective of Big Data
11
作者 Qu Qunzhen Zhu Wenjun 《Meteorological and Environmental Research》 CAS 2019年第6期54-56,共3页
Based on the perspective of big data,the growth characteristics of marine science and technology talents were analyzed,and the growth of marine science and technology talents was divided into five periods:study period... Based on the perspective of big data,the growth characteristics of marine science and technology talents were analyzed,and the growth of marine science and technology talents was divided into five periods:study period,adaptation period,growth period,promotion period and stability period.Moreover,some suggestions for the training of marine science and technology talents were proposed from the aspects of students,families,schools and society. 展开更多
关键词 BIG data MARINE SCIENCE and technology talents GROWTH lawS
下载PDF
On the Combination of “The Textual Research on Historical Documents” and “The Comparative Study of Historical Data” —— and a Discussion on “The Law of Quan-ma and Gui-mei” in Chinese Language Studies
12
作者 Lu Guoyao 《宏观语言学》 2007年第1期46-59,共14页
In Chinese language studies, both “The Textual Research on Historical Documents” and “The Comparative Study of Historical Data” are traditional in methodology and they both deserve being treasured, passed on, and ... In Chinese language studies, both “The Textual Research on Historical Documents” and “The Comparative Study of Historical Data” are traditional in methodology and they both deserve being treasured, passed on, and further developed. It will certainly do harm to the development of academic research if any of the two methods is given unreasonable priority. The author claims that the best or one of the best methodologies of the historical study of Chinese language is the combination of the two, hence a new interpretation of “The Double-proof Method”. Meanwhile, this essay is also an attempt to put forward “The Law of Quan-ma and Gui-mei” in Chinese language studies, in which the author believes that it is not advisable to either treat Gui-mei as Quan-ma or vice versa in linguistic research. It is crucial for us to respect always the language facts first, which is considered the very soul of linguistics. 展开更多
关键词 the history of Chinese language methodology the Textual Research on HISTORICAL Documents the Comparative Study of HISTORICAL data Double-proof method the law of Quan-ma and Gui-mei
下载PDF
Information Privacy, Data Surveillance and Security——How Australian Privacy Law Fully Plays Its Role in the Age of Big Data
13
作者 Jiexin Zang 《Journal of Educational Theory and Management》 2019年第1期22-30,共9页
Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With th... Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With the development of information technology, especially the internet, knowledge and information are dealt by internet users in conscious or unconscious way, and personal information has been rapidly and quickly distributed and disseminated all over the world. Personal data can be collected by hackers or interlinks from the website, internet not only provides people an era with internet links, but also an age with information collections, a big data age. With the background of big data, this essay tries to put forward the correlative relationship between the protection of information privacy and the privacy law in Australia. It ??rst has an overview of the concepts of information privacy and data surveillance under the background of big data, then highlights the importance of data security in the age of big data;with a literature review on the development of Australian privacy acts, it further claims that privacy acts or regulations by the federal or states provided strong support for the protection of personal data. Then relationship between the protection information privacy and the need of judicial guarantee is further studied for thorough methods or regimes in data protection. With these points studied, this essay aims to highlight the importance of data protection and information privacy. On the other hand, it aims to provide awareness for readers the vital role privacy laws can play in the protection of people’s personal information and emphases the importance of a continuous evolution for privacy law system in the age of big data. 展开更多
关键词 A big data age the protection of information PRIVACY the PRIVACY law in AUSTRALIA
下载PDF
Based on data mining,the drug law of clinical treatment of chronic urticaria
14
作者 Hai-Ping Duan Ming-Kai Wang +2 位作者 Hai-Die Liu Yu-Rong Zhao Li-Feng Wang 《Medical Data Mining》 2021年第1期38-47,共10页
Background:Based on clinical data mining,we introduce the medication rule and clinical application of Professor Wang Lifen in the treatment of chronic urticaria,as the reference of clinical treatment of chronic urtica... Background:Based on clinical data mining,we introduce the medication rule and clinical application of Professor Wang Lifen in the treatment of chronic urticaria,as the reference of clinical treatment of chronic urticaria.Methods:we collected 110 traditional Chinese medicine prescriptions for the treatment of chronic urticaria,and found out tastes,functions and channel tropism of Chinese medicine.After collecting and sorting,we inputted the data into excel 2010 software and established drug electronic database.We calculated the frequency of tastes,functions and channel tropism using the Spss 20.0 and analyzed the potential relationship between the drugs using Weka 3.8.We used Cytoscape 3.6.1 to draw the related network and combine it into a new prescription.Then the clinical data of prescriptions were statistically analyzed.Results:The statistical analysis showed that the high-frequency drugs for the treatment of the disease were Gancao(Glycyrrhizae radix et rhizoma),Huangqin(Radix scutellariae),Desmopeel,Jingjie(Herba schizonepetae),parsnip,etc.,accounting for more than 69.50%of the total frequency.Moreover,the combination and drug pairs with the strongest and most commonly used high-frequency drugs were found.From the point of medicinal properties of these drugs in the treatment of chronic urticaria,the main drugs are cold,followed by warm and smooth,accounting for 70.75%of the total frequency.From the perspective of the efficacy of these drugs in the treatment of chronic urticaria,heat-clearing drugs are the main ones,followed by relieving drugs and Tonic drugs,accounting for 68.25%of the total frequency.From the perspective of medicine taste,sweet taste is the most important,followed by bitter and pungent taste,accounting for 68.00%of the total frequency.From the perspective of drugs channel tropism,the meridian of spleen is the most important,followed by the meridian of lung,liver,heart,stomach,etc.,accounting for 71.62%of the total frequency.Conclusion:According to the data mining results,traditional Chinese medicine treatment of chronic urticaria is mainly based on dispelling wind,clearing heat and removing dampness,cooling blood and detoxifying,supplemented by nourishing blood and nourishing deficiency.This data mining conforms to the law and principle of traditional Chinese medicine treatment of chronic urticaria,which has certain reference and enlightenment significance for clinical treatment of chronic urticaria. 展开更多
关键词 Chronic urticaria data mining Traditional Chinese medicine TREATMENT Drug law
下载PDF
Kinematic Control of Serial Manipulators Under False Data Injection Attack 被引量:2
15
作者 Yinyan Zhang Shuai Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期1009-1019,共11页
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ... With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations. 展开更多
关键词 Cyber-physical systems false data injection attack MANIPULATORS remote kinematic control
下载PDF
Evaluation of Two Momentum Control Variable Schemes and Their Impact on the Variational Assimilation of Radar Wind Data:Case Study of a Squall Line 被引量:10
16
作者 Xin LI Mingjian ZENG +3 位作者 Yuan WANG Wenlan WANG Haiying WU Haixia MEI 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2016年第10期1143-1157,共15页
Different choices of control variables in variational assimilation can bring about different influences on the analyzed atmospheric state. Based on the WRF model's three-dimensional variational assimilation system, t... Different choices of control variables in variational assimilation can bring about different influences on the analyzed atmospheric state. Based on the WRF model's three-dimensional variational assimilation system, this study compares the be- havior of two momentum control variable options-streamfunction velocity potential (ψ-χ) and horizontal wind components (U-V)-in radar wind data assimilation for a squall line case that occurred in Jiangsu Province on 24 August 2014. The wind increment from the single observation test shows that the ψ-χ control variable scheme produces negative increments in the neighborhood around the observation point because streamfunction and velocity potential preserve integrals of velocity. On the contrary, the U-V control variable scheme objectively reflects the information of the observation itself. Furthermore, radial velocity data from 17 Doppler radars in eastern China are assimilated. As compared to the impact of conventional observation, the assimilation of radar radial velocity based on the U-V control variable scheme significantly improves the mesoscale dynamic field in the initial condition. The enhanced low-level jet stream, water vapor convergence and low-level wind shear result in better squall line forecasting. However, the ψ-χ control variable scheme generates a discontinuous wind field and unrealistic convergence/divergence in the analyzed field, which lead to a degraded precipitation forecast. 展开更多
关键词 three-dimensional variational assimilation momentum control variable Doppler radar data squall line
下载PDF
Novel method for the evaluation of data quality based on fuzzy control 被引量:1
17
作者 Ban Xiaojuan Ning Shurong +1 位作者 Xu Zhaolin Cheng Peng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期606-610,共5页
One of the goals of data collection is preparing for decision-making, so high quality requirement must be satisfied. Rational evaluation of data quality is an effective way to identify data problem in time, and the qu... One of the goals of data collection is preparing for decision-making, so high quality requirement must be satisfied. Rational evaluation of data quality is an effective way to identify data problem in time, and the quality of data after this evaluation is satisfactory with the requirement of decision maker. A fuzzy neural network based research method of data quality evaluation is proposed. First, the criteria for the evaluation of data quality are selected to construct the fuzzy sets of evaluating grades, and then by using the learning ability of NN, the objective evaluation of membership is carried out, which can be used for the effective evaluation of data quality. This research has been used in the platform of 'data report of national compulsory education outlay guarantee' from the Chinese Ministry of Education. This method can be used for the effective evaluation of data quality worldwide, and the data quality situation can be found out more completely, objectively, and in better time by using the method. 展开更多
关键词 data quality evaluation system fuzzy control theory neural network.
下载PDF
Bayesian estimation of a power law process with incomplete data 被引量:2
18
作者 HU Junming HUANG Hongzhong LI Yanfeng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第1期243-251,共9页
Due to the simplicity and flexibility of the power law process,it is widely used to model the failures of repairable systems.Although statistical inference on the parameters of the power law process has been well deve... Due to the simplicity and flexibility of the power law process,it is widely used to model the failures of repairable systems.Although statistical inference on the parameters of the power law process has been well developed,numerous studies largely depend on complete failure data.A few methods on incomplete data are reported to process such data,but they are limited to their specific cases,especially to that where missing data occur at the early stage of the failures.No framework to handle generic scenarios is available.To overcome this problem,from the point of view of order statistics,the statistical inference of the power law process with incomplete data is established in this paper.The theoretical derivation is carried out and the case studies demonstrate and verify the proposed method.Order statistics offer an alternative to the statistical inference of the power law process with incomplete data as they can reformulate current studies on the left censored failure data and interval censored data in a unified framework.The results show that the proposed method has more flexibility and more applicability. 展开更多
关键词 incomplete data power law process Bayesian inference order statistics repairable system
下载PDF
Achieving Fine-Grained and Flexible Access Control on Blockchain-Based Data Sharing for the Internet of Things 被引量:2
19
作者 Ruimiao Wang Xiaodong Wang +2 位作者 Wenti Yang Shuai Yuan Zhitao Guan 《China Communications》 SCIE CSCD 2022年第6期22-34,共13页
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upo... The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency. 展开更多
关键词 blockchain access control smart contract MULTI-SIGNATURE chameleon-hash data sharing Internet of Things
下载PDF
The development of data acquisition and control system for extraction power supply of prototype RF ion source 被引量:1
20
作者 Meichu HUANG Chundong HU +4 位作者 Yuanzhe ZHAO Caichao JIANG Yahong XIE Shiyong CHEN Qinglong CUI 《Plasma Science and Technology》 SCIE EI CAS CSCD 2018年第8期104-111,共8页
A 16 kV/20 A power supply was developed for the extraction grid of prototype radio frequency(RF) ion source of neutral beam injector. To acquire the state signals of extraction grid power supply(EGPS) and control ... A 16 kV/20 A power supply was developed for the extraction grid of prototype radio frequency(RF) ion source of neutral beam injector. To acquire the state signals of extraction grid power supply(EGPS) and control the operation of the EGPS, a data acquisition and control system has been developed. This system mainly consists of interlock protection circuit board, photoelectric conversion circuit, optical fibers, industrial compact peripheral component interconnect(CPCI) computer and host computer. The human machine interface of host computer delivers commands and data to program of the CPCI computer, as well as offers a convenient client for setting parameters and displaying EGPS status. The CPCI computer acquires the status of the power supply. The system can turn-off the EGPS quickly when the faults of EGPS occur. The system has been applied to the EGPS of prototype RF ion source. Test results show that the data acquisition and control system for the EGPS can meet the requirements of the operation of prototype RF ion source. 展开更多
关键词 RF ion source data acquisition control system TCP/IP protocol beam extraction
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部