期刊文献+
共找到61,086篇文章
< 1 2 250 >
每页显示 20 50 100
Optimizing crop yields while minimizing environmental impact through deep placement of nitrogen fertilizer
1
作者 Lingxiao Zhu Hongchun Sun +8 位作者 Liantao Liu Ke Zhang Yongjiang Zhang Anchang Li Zhiying Bai Guiyan Wang Xiaoqing Liu Hezhong Dong Cundong Li 《Journal of Integrative Agriculture》 2025年第1期36-60,共25页
Nitrogen(N)serves as an essential nutrient for yield formation across diverse crop types.However,agricultural production encounters numerous challenges,notably high N fertilizer rates coupled with low N use efficiency... Nitrogen(N)serves as an essential nutrient for yield formation across diverse crop types.However,agricultural production encounters numerous challenges,notably high N fertilizer rates coupled with low N use efficiency and serious environmental pollution.Deep placement of nitrogen fertilizer(DPNF)is an agronomic measure that shows promise in addressing these issues.This review aims to offer a comprehensive understanding of DPNF,beginning with a succinct overview of its development and methodologies for implementation.Subsequently,the optimal fertilization depth and influencing factors for different crops are analyzed and discussed.Additionally,it investigates the regulation and mechanism underlying the DPNF on crop development,yield,N use efficiency and greenhouse gas emissions.Finally,the review delineates the limitations and challenges of this technology and provides suggestions for its improvement and application.This review provides valuable insight and reference for the promotion and adoption of DPNF in agricultural practice. 展开更多
关键词 deep placement of N fertilizer optimal fertilization depth YIELD N use efficiency greenhouse gas emissions
下载PDF
A new free-hand pedicle screw placement technique with reference to the supraspinal ligament 被引量:7
2
作者 Juming Li Hong Zhao +7 位作者 Hao Xie Lipeng Yu Jifu Wei Min Zong Feng Chen Ziqiang Zhu Ning Zhang Xiaojian Cao 《The Journal of Biomedical Research》 CAS 2014年第1期64-70,共7页
We sought to compare the safety and accuracy of a new free-hand pedicle screw placement technique to that of the conventional technique. One hundred fifty-three consecutive adult patients with simple fracture in the t... We sought to compare the safety and accuracy of a new free-hand pedicle screw placement technique to that of the conventional technique. One hundred fifty-three consecutive adult patients with simple fracture in the tho- racic or/and lumbar spine were alternately assigned to either the new free-hand or the conventional group. In the new free-hand technique group, preoperative computerized tomography (CT) images were used to calculate the targeted medial-lateral angle of each pedicle trajectory and the pedicle screw was inserted perpendicular to the corresponding supraspinal ligament. In the conventional technique group, the medial-lateral and cranial-caudal angle of each pedicle trajectory was determined by intraoperatively under fluoroscopic guidance. The accuracy rate of pedicle screw placement, the time of intraoperative fluoroscopy, the operating time and the amount of blood loss during operation were respectively compared. All screws were analyzed by using intraoperative ra- diographs, intraoperative triggered electromyography (EMG) monitoring data, postoperative CT data and clinical outcomes. The accuracy rate of pedicle screw placement in the new free-hand technique group and the conven- tional technique group was 96.3% and 94.2% (P 〈 0.05), respectively. The intraoperative fluoroscopy time of the new technique group was less than that of the conventional technique group (5.37 seconds vs. 8.79 seconds, P 〈 0.05). However, there was no statistical difference in the operating time and the amount of blood loss during op- eration (P 〉 0.05). Pedicle screw placement with the free-hand technique which keeps the screw perpendicular to the supraspinal ligament is an accurate, reliable and safe technique to treat simple fracture in the thoracic or lum- bar spine. 展开更多
关键词 spine fracture pedicle screw placement radiation exposure supraspinal ligament anatomy reference
下载PDF
Using the Cooperative Game for Service Placement of Virtual Network Functions 被引量:1
3
作者 XIONG Gang HU Yuxiang +1 位作者 WANG Weiming WANG Lingqiang 《China Communications》 SCIE CSCD 2016年第S1期146-157,共12页
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middl... To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function entities.Due to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation fairness.Then a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances placement.Finally, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms. 展开更多
关键词 Middlebox game theory network FUNCTION VIRTUALIZATION SOFTWARE defined NETWORKING
下载PDF
Distributed Middlebox Placement Based on Potential Game
4
作者 Yongwen Li Zhiyi Qu 《International Journal of Communications, Network and System Sciences》 2017年第5期264-273,共10页
In this paper, we analyse the deployment of middlebox. For a given network information and policy requirements, an attempt is made to determine the optimal location of middlebox to achieve the best performance. In ter... In this paper, we analyse the deployment of middlebox. For a given network information and policy requirements, an attempt is made to determine the optimal location of middlebox to achieve the best performance. In terms of the end-to-end delay as a performance optimization index, a distributed middlebox placement algorithm based on potential game is proposed. Through extensive simulations, it demonstrates that the proposed algorithm achieves the near-optimal solution, and the end-to-end delay decreases significantly. 展开更多
关键词 Middlebox placement Performance Optimization POTENTIAL game MATCHING GRAPH DISTRIBUTED Algorithm
下载PDF
Cooperative Anti-Jamming and Interference Mitigation for UAV Networks: A Local Altruistic Game Approach 被引量:2
5
作者 Yueyue Su Nan Qi +2 位作者 Zanqi Huang Rugui Yao Luliang Jia 《China Communications》 SCIE CSCD 2024年第2期183-196,共14页
To improve the anti-jamming and interference mitigation ability of the UAV-aided communication systems, this paper investigates the channel selection optimization problem in face of both internal mutual interference a... To improve the anti-jamming and interference mitigation ability of the UAV-aided communication systems, this paper investigates the channel selection optimization problem in face of both internal mutual interference and external malicious jamming. A cooperative anti-jamming and interference mitigation method based on local altruistic is proposed to optimize UAVs’ channel selection. Specifically, a Stackelberg game is modeled to formulate the confrontation relationship between UAVs and the jammer. A local altruistic game is modeled with each UAV considering the utilities of both itself and other UAVs. A distributed cooperative anti-jamming and interference mitigation algorithm is proposed to obtain the Stackelberg equilibrium. Finally, the convergence of the proposed algorithm and the impact of the transmission power on the system loss value are analyzed, and the anti-jamming performance of the proposed algorithm can be improved by around 64% compared with the existing algorithms. 展开更多
关键词 channel selection cooperative antijamming and interference mitigation local altruistic game Stackelberg game unmanned aerial vehicle(UAV)
下载PDF
Equilibrium Strategy of the Pursuit-Evasion Game in Three-Dimensional Space 被引量:1
6
作者 Nuo Chen Linjing Li Wenji Mao 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期446-458,共13页
The pursuit-evasion game models the strategic interaction among players, attracting attention in many realistic scenarios, such as missile guidance, unmanned aerial vehicles, and target defense. Existing studies mainl... The pursuit-evasion game models the strategic interaction among players, attracting attention in many realistic scenarios, such as missile guidance, unmanned aerial vehicles, and target defense. Existing studies mainly concentrate on the cooperative pursuit of multiple players in two-dimensional pursuit-evasion games. However, these approaches can hardly be applied to practical situations where players usually move in three-dimensional space with a three-degree-of-freedom control. In this paper,we make the first attempt to investigate the equilibrium strategy of the realistic pursuit-evasion game, in which the pursuer follows a three-degree-of-freedom control, and the evader moves freely. First, we describe the pursuer's three-degree-of-freedom control and the evader's relative coordinate. We then rigorously derive the equilibrium strategy by solving the retrogressive path equation according to the Hamilton-Jacobi-Bellman-Isaacs(HJBI) method, which divides the pursuit-evasion process into the navigation and acceleration phases. Besides, we analyze the maximum allowable speed for the pursuer to capture the evader successfully and provide the strategy with which the evader can escape when the pursuer's speed exceeds the threshold. We further conduct comparison tests with various unilateral deviations to verify that the proposed strategy forms a Nash equilibrium. 展开更多
关键词 Differential game equilibrium strategy pursuit-evasion game threedegree-of-freedom control
下载PDF
A game-theoretic approach for federated learning:A trade-off among privacy,accuracy and energy 被引量:2
7
作者 Lihua Yin Sixin Lin +3 位作者 Zhe Sun Ran Li Yuanyuan He Zhiqiang Hao 《Digital Communications and Networks》 SCIE CSCD 2024年第2期389-403,共15页
Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also ... Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also cause privacy leakage and energy consumption.How to optimize the energy consumption in distributed communication systems,while ensuring the privacy of users and model accuracy,has become an urgent challenge.In this paper,we define the FL as a 3-layer architecture including users,agents and server.In order to find a balance among model training accuracy,privacy-preserving effect,and energy consumption,we design the training process of FL as game models.We use an extensive game tree to analyze the key elements that influence the players’decisions in the single game,and then find the incentive mechanism that meet the social norms through the repeated game.The experimental results show that the Nash equilibrium we obtained satisfies the laws of reality,and the proposed incentive mechanism can also promote users to submit high-quality data in FL.Following the multiple rounds of play,the incentive mechanism can help all players find the optimal strategies for energy,privacy,and accuracy of FL in distributed communication systems. 展开更多
关键词 Federated learning Privacy preservation Energy optimization game theory Distributed communication systems
下载PDF
Characteristics of proppant transport and placement within rough hydraulic fractures 被引量:1
8
作者 HUANG Hai ZHENG Yong +5 位作者 WANG Yi WANG Haizhu NI Jun WANG Bin YANG Bing ZHANG Wentong 《Petroleum Exploration and Development》 SCIE 2024年第2期453-463,共11页
A three-dimensional reconstruction of rough fracture surfaces of hydraulically fractured rock outcrops is carried out by casting process,a large-scale experimental setup for visualizing rough fractures is built to per... A three-dimensional reconstruction of rough fracture surfaces of hydraulically fractured rock outcrops is carried out by casting process,a large-scale experimental setup for visualizing rough fractures is built to perform proppant transport experiments.The typical characteristics of proppant transport and placement in rough fractures and its intrinsic mechanisms are investigated,and the influences of fracture inclination,fracture width and fracturing fluid viscosity on proppant transport and placement in rough fractures are analyzed.The results show that the rough fractures cause variations in the shape of the flow channel and the fluid flow pattern,resulting in the bridging buildup during proppant transport to form unfilled zone,the emergence of multiple complex flow patterns such as channeling,reverse flow and bypassing of sand-carrying fluid,and the influence on the stability of the sand dune.The proppant has a higher placement rate in inclined rough fractures,with a maximum increase of 22.16 percentage points in the experiments compared to vertical fractures,but exhibits poor stability of the sand dune.Reduced fracture width aggravates the bridging of proppant and induces higher pumping pressure.Increasing the viscosity of the fracturing fluid can weaken the proppant bridging phenomenon caused by the rough fractures. 展开更多
关键词 reservoir fracturing rough fracture PROPPANT transport and placement characteristics bridging buildup
下载PDF
A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet 被引量:1
9
作者 Song Deng Yiming Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第6期3679-3697,共19页
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf... Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources. 展开更多
关键词 Energy Internet Intrusion tolerance game theory racial competition adaptive intrusion response
下载PDF
Hybrid Approach for Cost Efficient Application Placement in Fog-Cloud Computing Environments
10
作者 Abdulelah Alwabel Chinmaya Kumar Swain 《Computers, Materials & Continua》 SCIE EI 2024年第6期4127-4148,共22页
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.How... Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.However,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud computing.An approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing costs.This approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of applications.In this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing cost.We consider four cost-types for application deployment:Computation,communication,energy consumption,and violations.The proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the system.An extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art approaches.The results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost. 展开更多
关键词 placement mechanism application module placement fog computing cloud computing genetic algorithm flamingo search algorithm
下载PDF
Analytical game strategies for active UAV defense considering response delays
11
作者 Xiaopeng Gong Wanchun Chen +3 位作者 Wengui Lei Jinyang Wang Zhongyuan Chen Yunyun Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第12期191-210,共20页
In the realm of aerial warfare,the protection of Unmanned Aerial Vehicles(UAVs) against adversarial threats is crucial.In order to balance the impact of response delays and the demand for onboard applications,this pap... In the realm of aerial warfare,the protection of Unmanned Aerial Vehicles(UAVs) against adversarial threats is crucial.In order to balance the impact of response delays and the demand for onboard applications,this paper derives three analytical game strategies for the active defense of UAVs from differential game theory,accommodating the first-order dynamic delays.The targeted UAV executes evasive maneuvers and launches a defending missile to intercept the attacking missile,which constitutes a UAVMissile-Defender(UMD) three-body game problem.We explore two distinct operational paradigms:the first involves the UAV and the defender working collaboratively to intercept the incoming threat,while the second prioritizes UAV self-preservation,with independent maneuvering away from potentially sacrificial engagements.Starting with model linearization and order reduction,the Collaborative Interception Strategy(CIS) is first derived via a linear quadratic differential game formulation.Building upon CIS,we further explore two distinct strategies:the Informed Defender Interception Strategy(IDIS),which utilizes UAV maneuvering information,and the Unassisted Defender Interception Strategy(UDIS),which does not rely on UAV maneuvering information.Additionally,we investigate the conditions for the existence of saddle point solutions and their relationship with vehicle maneuverability and response agility.The simulations demonstrate the effectiveness and advantages of the proposed strategies. 展开更多
关键词 Active defense Unmanned aerial vehicles(UAVs) Three-body game Differential game Analytical game strategy Response delays
下载PDF
Ready,set,go:Medical preparations for the Paris 2024 Paralympic Games
12
作者 Carolette Snyders Wayne Derman Martin Schwellnus 《Journal of Sport and Health Science》 SCIE CAS CSCD 2024年第6期726-727,共2页
1.Introduction In August 2024,over 4400 Paralympic athletes will gather in Paris for the Paralympic Summer Games—the pinnacle of every Paralympian’s(Para athletes competing at the Paralympic Games)career to showcase... 1.Introduction In August 2024,over 4400 Paralympic athletes will gather in Paris for the Paralympic Summer Games—the pinnacle of every Paralympian’s(Para athletes competing at the Paralympic Games)career to showcase their ability and skills.Their training,preparation,and effort in the years leading up to the Games are unparalleled.To achieve success,Paralympians specifically rely on a medical support team to achieve their goals.So,what is required of the medical support team to prepare Paralympians to get ready,set,and go to Paris 2024? 展开更多
关键词 PARIS gameS ATHLETES
下载PDF
Problematic Use of Video Games in Schools in Northern Benin (2023)
13
作者 Ireti Nethania Elie Ataigba David Sinet Koivogui +6 位作者 Damega Wenkourama Marcos Tohou Eurydice Elvire Djossou Anselme Djidonou Francis Tognon Tchegnonsi Prosper Gandaho Josiane Ezin Houngbe 《Open Journal of Psychiatry》 2024年第2期120-141,共22页
Objective: To study the problematic use of video games among secondary school students in the city of Parakou in 2023. Methods: Descriptive cross-sectional study conducted in the commune of Parakou from December 2022 ... Objective: To study the problematic use of video games among secondary school students in the city of Parakou in 2023. Methods: Descriptive cross-sectional study conducted in the commune of Parakou from December 2022 to July 2023. The study population consisted of students regularly enrolled in public and private secondary schools in the city of Parakou for the 2022-2023 academic year. A two-stage non-proportional stratified sampling technique combined with simple random sampling was adopted. The Problem Video Game Playing (PVP) scale was used to assess problem gambling in the study population, while anxiety and depression were assessed using the Hospital Anxiety and Depression Scale (HADS). Results: A total of 1030 students were included. The mean age of the pupils surveyed was 15.06 ± 2.68 years, with extremes of 10 and 28 years. The [13 - 18] age group was the most represented, with a proportion of 59.6% (614) in the general population. Females predominated, at 52.8% (544), with a sex ratio of 0.89. The prevalence of problematic video game use was 24.9%, measured using the Video Game Playing scale. Associated factors were male gender (p = 0.005), pocket money under 10,000 cfa (p = 0.001) and between 20,000 - 90,000 cfa (p = 0.030), addictive family behavior (p < 0.001), monogamous family (p = 0.023), good relationship with father (p = 0.020), organization of video game competitions (p = 0.001) and definite anxiety (p Conclusion: Substance-free addiction is struggling to attract the attention it deserves, as it did in its infancy everywhere else. This study complements existing data and serves as a reminder of the need to focus on this group of addictions, whose problematic use of video games remains the most frequent due to its accessibility and social tolerance. Preventive action combined with curative measures remains the most effective means of combating the problem at national level. 展开更多
关键词 Gaming Problem Video games BENIN 2023
下载PDF
Effective Controller Placement in Software-Defined Internet-of-Things Leveraging Deep Q-Learning (DQL)
14
作者 Jehad Ali Mohammed J.F.Alenazi 《Computers, Materials & Continua》 SCIE EI 2024年第12期4015-4032,共18页
The controller is a main component in the Software-Defined Networking(SDN)framework,which plays a significant role in enabling programmability and orchestration for 5G and next-generation networks.In SDN,frequent comm... The controller is a main component in the Software-Defined Networking(SDN)framework,which plays a significant role in enabling programmability and orchestration for 5G and next-generation networks.In SDN,frequent communication occurs between network switches and the controller,which manages and directs traffic flows.If the controller is not strategically placed within the network,this communication can experience increased delays,negatively affecting network performance.Specifically,an improperly placed controller can lead to higher end-to-end(E2E)delay,as switches must traverse more hops or encounter greater propagation delays when communicating with the controller.This paper introduces a novel approach using Deep Q-Learning(DQL)to dynamically place controllers in Software-Defined Internet of Things(SD-IoT)environments,with the goal of minimizing E2E delay between switches and controllers.E2E delay,a crucial metric for network performance,is influenced by two key factors:hop count,which measures the number of network nodes data must traverse,and propagation delay,which accounts for the physical distance between nodes.Our approach models the controller placement problem as a Markov Decision Process(MDP).In this model,the network configuration at any given time is represented as a“state,”while“actions”correspond to potential decisions regarding the placement of controllers or the reassignment of switches to controllers.Using a Deep Q-Network(DQN)to approximate the Q-function,the system learns the optimal controller placement by maximizing the cumulative reward,which is defined as the negative of the E2E delay.Essentially,the lower the delay,the higher the reward the system receives,enabling it to continuously improve its controller placement strategy.The experimental results show that our DQL-based method significantly reduces E2E delay when compared to traditional benchmark placement strategies.By dynamically learning from the network’s real-time conditions,the proposed method ensures that controller placement remains efficient and responsive,reducing communication delays and enhancing overall network performance. 展开更多
关键词 Software-defined networking deep Q-learning controller placement quality of service
下载PDF
Layered Coded Cache Placement and Cooperative Delivery with Sharing Links in Satellite-Terrestrial Integrated Networks
15
作者 Gu Shushi Chen Zihan +2 位作者 Wu Yaonan Zhang Qinyu Wang Ye 《China Communications》 SCIE CSCD 2024年第3期217-229,共13页
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver... Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances. 展开更多
关键词 coded content placement cooperative delivery energy efficiency sharing links STINs
下载PDF
Analysis and Verification on Buckling Mechanism of Spatial Tow Steering in Automated Fiber Placement
16
作者 Minghui Yi Fei Liu +3 位作者 Baoning Chang Yingdan Zhu Xilun Ding Wuxiang Zhang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第5期424-438,共15页
Automated fiber placement(AFP)enables the efficient and precise fabrication of complex-shaped aerospace composite structures with lightweight and high-performance properties.However,due to the excessive compression on... Automated fiber placement(AFP)enables the efficient and precise fabrication of complex-shaped aerospace composite structures with lightweight and high-performance properties.However,due to the excessive compression on the inner edge of the tow placed along the curved trajectory,the resulting defects represented by buckling and wrinkles in spatial tow steering can induce poor manufacturing accuracy and quality degradation of products.In this paper,a theoretical model of tow buckling based on the first-order shear deformation laminate theory,linear elastic adhesion interface and Hertz compaction contact theory is proposed to analyze the formation mechanism of the wrinkles and predict the formation of defects by solving the critical radius of the trajectory,and finite element analysis involving the cohesive zone modeling(CZM)is innovated to simulate the local buckling state of the steered tow in AFP.Additionally,numerical parametric studies and experimental results indicate that mechanical properties and geometric parameters of the prepreg,the curvature of the placement trajectory and critical process parameters have a significant impact on buckling formation,and optimization of process parameters can achieve effective suppression of placement defects.This research proposes a theoretical modeling method for tow buckling,and conducts in-depth research on defect formation and suppression methods based on finite element simulation and placement experiments. 展开更多
关键词 Automated fiber placement Spatial tow steering Buckling mechanism Process optimization
下载PDF
A Value for Games Defined on Graphs
17
作者 Néstor Bravo 《Applied Mathematics》 2024年第5期331-348,共18页
Given a graph g=( V,A ) , we define a space of subgraphs M with the binary operation of union and the unique decomposition property into blocks. This space allows us to discuss a notion of minimal subgraphs (minimal c... Given a graph g=( V,A ) , we define a space of subgraphs M with the binary operation of union and the unique decomposition property into blocks. This space allows us to discuss a notion of minimal subgraphs (minimal coalitions) that are of interest for the game. Additionally, a partition of the game is defined in terms of the gain of each block, and subsequently, a solution to the game is defined based on distributing to each player (node and edge) present in each block a payment proportional to their contribution to the coalition. 展开更多
关键词 Graph Theory Values for Graphs Cooperation games Potential Function
下载PDF
Game theory attack pricing for mining pools in blockchain-based IoT
18
作者 Yourong Chen Hao Chen +3 位作者 Zhenyu Xiong Banteng Liu Zhangquan Wang Meng Han 《Digital Communications and Networks》 SCIE CSCD 2024年第4期973-988,共16页
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t... The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP. 展开更多
关键词 game theory Blockchain PoW Mining pool Employment attack
下载PDF
Efficient placement technology of proppants based on structural stabilizers
19
作者 GUO Jianchun REN Shan +3 位作者 ZHANG Shaobin DIAO Su LU Yang ZHANG Tao 《Petroleum Exploration and Development》 SCIE 2024年第3期706-714,共9页
Fiber is highly escapable in conventional slickwater,making it difficult to form fiber-proppant agglomerate with proppant and exhibit limited effectiveness.To solve these problems,a novel structure stabilizer(SS)is de... Fiber is highly escapable in conventional slickwater,making it difficult to form fiber-proppant agglomerate with proppant and exhibit limited effectiveness.To solve these problems,a novel structure stabilizer(SS)is developed.Through microscopic structural observations and performance evaluations in indoor experiments,the mechanism of proppant placement under the action of the SS and the effects of the SS on proppant placement dimensions and fracture conductivity were elucidated.The SS facilitates the formation of robust fiber-proppant agglomerates by polymer,fiber,and quartz sand.Compared to bare proppants,these agglomerates exhibit reduced density,increased volume,and enlarged contact area with the fluid during settlement,leading to heightened buoyancy and drag forces,ultimately resulting in slower settling velocities and enhanced transportability into deeper regions of the fracture.Co-injecting the fiber and the SS alongside the proppant into the reservoir effectively reduces the fiber escape rate,increases the proppant volume in the slickwater,and boosts the proppant placement height,conveyance distance and fracture conductivity,while also decreasing the proppant backflow.Experimental results indicate an optimal SS mass fraction of 0.3%.The application of this SS in over 80 wells targeting tight gas,shale oil,and shale gas reservoirs has substantiated its strong adaptability and general suitability for meeting the production enhancement,cost reduction,and sand control requirements of such wells. 展开更多
关键词 hydraulic fracturing PROPPANT structure stabilizer placement mechanism CONDUCTIVITY proppant backflow rate
下载PDF
A Blockchain-Based Game Approach to Multi-Microgrid Energy Dispatch
20
作者 Zhikang Wang Chengxuan Wang +2 位作者 Wendi Wu Cheng Sun Zhengtian Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期845-863,共19页
As the current global environment is deteriorating,distributed renewable energy is gradually becoming an important member of the energy internet.Blockchain,as a decentralized distributed ledger with decentralization,t... As the current global environment is deteriorating,distributed renewable energy is gradually becoming an important member of the energy internet.Blockchain,as a decentralized distributed ledger with decentralization,traceability and tamper-proof features,is an importantway to achieve efficient consumption andmulti-party supply of new energy.In this article,we establish a blockchain-based mathematical model of multiple microgrids and microgrid aggregators’revenue,consider the degree of microgrid users’preference for electricity thus increasing users’reliance on the blockchainmarket,and apply the one-master-multiple-slave Stackelberg game theory to solve the energy dispatching strategy when each market entity pursues the maximum revenue.The simulation results show that the blockchain-based dynamic game of the multi-microgrid market can effectively increase the revenue of both microgrids and aggregators and improve the utilization of renewable energy. 展开更多
关键词 Multi-microgrid blockchain stackelberg game energy scheduling
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部