期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Investigation of the ^(121)Sb(α,γ)^(125)I reaction cross-section calculations at astrophysical energies
1
作者 M.Eroğlu C.Yalcın R.T.Güray 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2023年第11期85-92,共8页
Proton-rich nuclei are synthesized via photodisintegration and reverse reactions.To examine this mechanism and reproduce the observed p-nucleus abundances,it is crucial to know the reaction rates and thereby the react... Proton-rich nuclei are synthesized via photodisintegration and reverse reactions.To examine this mechanism and reproduce the observed p-nucleus abundances,it is crucial to know the reaction rates and thereby the reaction cross sections of many isotopes.Given that the number of experiments on the reactions in astrophysical energy regions is very rare,the reaction cross sections are determined by theoretical methods whose accuracy should be tested.In this study,given that ^(121)Sb is a stable seed isotope located in the region of medium-mass p-nuclei,we investigated the cross sections and reaction rates of the ^(121)Sb(α,γ)^(125)I reaction using the TALYS computer code with 432 different combinations of input parameters(OMP,LDM,and SFM).The optimal model combinations were determined using the threshold logic unit method.The theoretical reaction cross-sectional results were compared with the experimental results reported in the literature.The reaction rates were determined using the two input parameter sets most compatible with the measurements,and they were compared with the reaction rate databases:STARLIB and REACLIB. 展开更多
关键词 Cross section Astrophysical S-factor Astrophysical reaction rate p-process nucleosynthesis Threshold logic unit method
下载PDF
A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY 被引量:13
2
作者 Zhao Dongmei Wang Changguang Ma Jianfeng 《Journal of Electronics(China)》 2007年第3期428-432,共5页
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ... The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 展开更多
关键词 Wireless network Risk assessment Analytic Hierarchy Process (AHP) method Fuzzy logical method
下载PDF
Research on the logic monitoring method for the cloud computing based safety computer 被引量:1
3
作者 Yaran Yang Lianchuan Ma +2 位作者 Tao Tang Huan Ding Zhen Liu 《Transportation Safety and Environment》 EI 2023年第2期79-87,共9页
With the development of railway construction in China,the computing demand of the train control system is increasing day by day.The application of cloud computing technology on the rail transit signal system has becom... With the development of railway construction in China,the computing demand of the train control system is increasing day by day.The application of cloud computing technology on the rail transit signal system has become a research hotspot in recent years.How to improve the safety and availability of the safety computer platform in the cloud computing environment is the key problem when applying cloud computing to the train operation control system.Since the cloud platform is in an open network environment,fac-ing many security vulnerabilities and malicious network attacks,it is necessary to monitor the operation of computer programmes through edge safety nodes.Firstly,this paper encrypts the logical monitoring method,and then proposes a secure computer de fence model based on the dynamic heterogeneous redundancy structure.Then the continuous time Markov chain(CTMC)is used to quantitatively solve the stable probability of the system,and the influence of different logical monitoring methods on the anti-attack performance of the system is analysed.Finally,the experiment proves that the dynamic heterogeneous redundancy structure composed of encryption logic monitoring can guarantee the safe and stable operation of the safety computer more effectively. 展开更多
关键词 safety computer logical monitoring method continuous time Markov modelling(CTMC) cloud computing anti-aggression analysis
原文传递
Research on anti-attack performance of a private cloud safety computer based on the Markov-Percopy dynamic heterogeneous redundancy structure
4
作者 Jiakun Wen Zhen Liu Huan Ding 《Transportation Safety and Environment》 EI 2023年第4期107-116,共10页
With the increasing computing demand of train operation control systems,the application of cloud computing technology on safety computer platforms of train control system has become a research hotspot in recent years.... With the increasing computing demand of train operation control systems,the application of cloud computing technology on safety computer platforms of train control system has become a research hotspot in recent years.How to improve the safety and availability of private cloud safety computers is the key problem when applying cloud computing to train operation control systems.Because the cloud computing platform is in an open network environment,it can face many security loopholes and malicious network at-tacks.Therefore,it is necessary to change the existing safety computer platform structure to improve the attack resistance of the private cloud safety computer platform,thereby enhancing its safety and reliability.Firstly,a private cloud safety computer platform architecture based on dynamic heterogeneous redundant(DHR)structure is proposed,and a dynamic migration mechanism for heterogeneous executives is designed.Then,a generalized stochastic Petri net(GSPN)model of a private cloud safety computer platform based on DHR is established,and its steady-state probability is solved by using its isomorphism with the continuous-time Markov model(CTMC)to analyse the impact of different system structures and executive migration mechanisms on the system's anti-attack performance.Finally,through experimental verifcation,the system structure proposed in this paper can improve the anti-attack capability of the private cloud safety computer platform,thereby improving its safety and reliability. 展开更多
关键词 Safety computer logical monitoring method continuous time Markov modelling cloud computing anti-attack analysis
原文传递
A REVIEW AND PROSPECT OF READABLE MACHINE PROOFS FOR GEOMETRY THEOREMS 被引量:3
5
作者 Jianguo JIANG Jingzhong ZHANG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第4期802-820,共19页
After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable ... After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable machine proofs for geometry theorems which include search methods, coordinate-free methods, and formal logic methods. Some critical issues about these approaches are also discussed. Furthermore, the authors propose three further research directions for the readable machine proofs for geometry theorems, including geometry inequalities, intelligent geometry softwares and machine learning. 展开更多
关键词 Automated geometry reasoning coordinate-free method formal logic method geometric inequality intelligent geometry software machine learning mechanical theorem proving readable machine proof search method.
原文传递
Analysis and optimal synthesis of single loop spatial mechanisms 被引量:2
6
作者 Med Amine LARIBI Lotfi ROMDHANE Sad ZEGHLOUL 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2011年第9期665-679,共15页
In this work, a systematic approach is presented to obtain the input-output equations of a single loop 4-bar spatial mechanisms. The dialytic method along with Denavit-Hartenberg parameters can be used to obtain these... In this work, a systematic approach is presented to obtain the input-output equations of a single loop 4-bar spatial mechanisms. The dialytic method along with Denavit-Hartenberg parameters can be used to obtain these equations efficiently. A genetic algorithm (GA) has been used to solve the problem of spatial mechanisms synthesis. Two types of mechanisms, e.g., RSCR and RSPC (R: revolute; S: spherical; C: cylindrical; P: prismatic), have illustrated the application of the GA to solve the problem of function generation and path generation. In some cases, the GA method becomes trapped in a local minimum. A combined GA-fuzzy logic (GA-FL) method is then used to improve the final result. The results show that GAs, combined with an adequate description of the mechanism, are well suited for spatial mechanism synthesis problems and have neither difficulties inherent to the choice of the initial feasible guess, nor a problem of convergence, as it is the case for deterministic methods. 展开更多
关键词 Spatial mechanisms Genetic algorithm-fuzzy logic (GA-FL) method Denevit-Hartenberg parameters Mechanism synthesis
原文传递
Fuzzy-Based Dynamic Distributed Queue Scheduling for Packet Switched Networks
7
作者 Chollette C.Chude-Olisah Uche A.K.Chude-Okonkwo +1 位作者 Kamalrulnizam A.Bakar Ghazali Sulong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第2期357-365,共9页
Addressing the problem of queue scheduling for the packet-switched system is a vital aspect of congestion control. In this paper, the fuzzy logic based decision method is adopted for queue scheduling in order to enfor... Addressing the problem of queue scheduling for the packet-switched system is a vital aspect of congestion control. In this paper, the fuzzy logic based decision method is adopted for queue scheduling in order to enforce some level of control for traffic of different quality of service requirements using predetermined values. The fuzzy scheduler proposed in this paper takes into account the dynamic nature of the Internet traffic with respect to its time-varying packet arrival process that affects the network states and performance. Three queues are defined, viz low, medium and high priority queues. The choice of prioritizing packets influences how queues are served. The fuzzy scheduler not only utilizes queue priority in the queue scheduling scheme, but also considers packet drop susceptibility and queue limit. Through simulation it is shown that the fuzzy scheduler is more appropriate for the dynamic nature of Internet traffic in a packet-switched system as compared with some existing queue scheduling methods. Results show that the scheduling strategy of the proposed fuzzy scheduler reduces packet drop, provides good link utilization and minimizes queue delay as compared with the priority queuing (PQ), first-in-first-out (FIFO), and weighted fair queuing (WFQ). 展开更多
关键词 fuzzy logic based decision method PRIORITY queue limit queue scheduling
原文传递
A Goal-Type Driven Method of Solving Horn Logic with Equality
8
作者 胡运发 《Journal of Computer Science & Technology》 SCIE EI CSCD 1990年第3期250-258,共9页
A new method of solving Horn logic with equality,the goal-type driven method,is presented, which considers explicitly the unification operator as a goal and merged it into the resolution process. The method has the fo... A new method of solving Horn logic with equality,the goal-type driven method,is presented, which considers explicitly the unification operator as a goal and merged it into the resolution process. The method has the following advantages.The resolution and the unification have been integrated in a uniform way.The architectures of the inference engines based on Horn logic with equality are simplified. Any techniques of exploiting AND/ OR parallelism to solve goals can also be applied to unification at the same time.The method can be used to integrate the styles of functional language and logic lan- guage by a uniform framework.It can also deal with infinite data structures. 展开更多
关键词 A Goal-Type Driven Method of Solving Horn Logic with Equality
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部