期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
CFETR集成设计平台的核热耦合模块开发
1
作者 徐兵兵 徐坤 +3 位作者 叶民友 毛世峰 雷明准 彭学兵 《核技术》 CAS CSCD 北大核心 2018年第1期63-69,共7页
正在研发的中国聚变工程实验堆(China Fusion Engineering Test Reactor,CFETR)集成设计平台包括物理设计平台和工程设计平台,工程设计平台采用模块化方式,包括磁体、真空室、偏滤器、中子学等模块。模块设计中涉及用计算流体动力学(Com... 正在研发的中国聚变工程实验堆(China Fusion Engineering Test Reactor,CFETR)集成设计平台包括物理设计平台和工程设计平台,工程设计平台采用模块化方式,包括磁体、真空室、偏滤器、中子学等模块。模块设计中涉及用计算流体动力学(Computational Fluid Dynamics,CFD)软件来对堆内部件开展热工水力分析,CFD的热源项包括中子学计算产生的核热,而中子学分析软件(如Monte Carlo N particle transport code,MCNP)核热输出结果文件存在CFD软件无法直接读取等问题。因此,基于网格-网格插值和点-点插值法,开发了中子学与CFD核热耦合模块,提供两种途径实现高精度的三维核热耦合。使用CFX软件,以CFETR的一种氦冷陶瓷包层(Helium Cooled Ceramic Breeder blanket,HCCB)中增殖单元模块为对象,进行了热工水力分析,计算结果表明了核热耦合模块功能的可靠性。 展开更多
关键词 中国聚变工程实验堆集成设计平台 热耦合模块 MCNP CFX 氦冷陶瓷包层
下载PDF
核电厂核级电源模块返修质量提升研究
2
作者 朱桂霞 《电子技术与软件工程》 2021年第6期212-213,共2页
本文以核电厂核级电源模块A为例,从FMEA分析、易损元器件和修后功能测试五方面进行研究,并给出数据对比,以说明研究的意义及必要性。
关键词 级电源模块 FMEA 易损元器件清单 修后功能测试
下载PDF
基于注意力机制轻量化模型的植物病害识别方法
3
作者 苏航 陈旭昊 +3 位作者 寿德荣 张朝阳 许彪 孙丙宇 《江苏农业学报》 CSCD 北大核心 2024年第8期1389-1399,共11页
针对现有植物病害识别模型存在响应速度慢、参数量多、计算机内存资源消耗大等问题,本研究提出了一种轻量化神经网络模型,该模型由特征提取层、特征增强层和分类器组成。为了减小模型大小并提高网络响应速度,在特征提取层中使用深度可... 针对现有植物病害识别模型存在响应速度慢、参数量多、计算机内存资源消耗大等问题,本研究提出了一种轻量化神经网络模型,该模型由特征提取层、特征增强层和分类器组成。为了减小模型大小并提高网络响应速度,在特征提取层中使用深度可分离卷积进行特征提取。为了防止网络传播过程中的梯度消失并增强病害像素特征融合,在特征提取层中引入了大卷积核倒置残差结构(IRBCKS)模块。此外,在特征增强层集成了轻量级卷积块注意力模块(CBAM)注意力机制,以捕捉植物病害相关图像中像素之间的关系,增强关键信息的提取。最后,采用剪枝技术剔除模型中冗余特征信息,从而再次减少模型参数量,形成最终的轻量级网络模型Cut-MobileNet。为验证该模型的先进性,将其与轻量化模型(MobileNet V2、SqueezeNet、GoogLeNet)和非轻量化模型(Vision Transformer、AlexNet)进行性能对比,研究结果表明,Cut-MobileNet在浮点运算量、准确率、单张图片推理时间、参数量、F1值和模型大小等性能指标上都取得了较优的效果。 展开更多
关键词 模型剪枝 卷积块注意力模块(CBAM)注意力机制 大卷积倒置残差结构(IRBCKS)模块 植物病害 轻量化网络
下载PDF
基于空洞卷积与动态多核融合池化的裂缝检测 被引量:3
4
作者 杨秋媛 李宁 +2 位作者 石林 庄丽华 徐守坤 《计算机工程与设计》 北大核心 2022年第12期3529-3537,共9页
针对现有裂缝检测方法在裂缝拓扑结构复杂、前后景像素不协调情况下产生的检测精度低的问题,提出一种基于空洞卷积和动态多核融合池化的裂缝检测方法。采用编、解码结构,编码器阶段插入空洞卷积,能够更大限度保留裂缝的细节与结构信息;... 针对现有裂缝检测方法在裂缝拓扑结构复杂、前后景像素不协调情况下产生的检测精度低的问题,提出一种基于空洞卷积和动态多核融合池化的裂缝检测方法。采用编、解码结构,编码器阶段插入空洞卷积,能够更大限度保留裂缝的细节与结构信息;解码器阶段引入动态多核融合池化模块,以更高效获得不同尺寸的裂缝信息。在自制数据集与公共数据集CRACK500上分别进行实验,并与其它算法进行比较,实验结果表明,该算法能更加精细化分割出细小的裂缝,有效提高裂缝检测精度。 展开更多
关键词 图像分割 裂缝检测 编解码网络结构 空洞卷积 动态多融合池化模块
下载PDF
大型固定生产平台修井模块研究设计
5
作者 李孟杰 洪学福 《中国造船》 EI CSCD 北大核心 2003年第z1期180-184,共5页
在海上边际油田开发中,应用固定式多井数采修一体化综合平台开发油气资源比较集中的大区块,将产生较好的经济效益.本文从总体设计的基本原则、主要功能、主要技术参数、总体布置、有限元计算等方面介绍了埕岛西A区生产平台修井模块的研... 在海上边际油田开发中,应用固定式多井数采修一体化综合平台开发油气资源比较集中的大区块,将产生较好的经济效益.本文从总体设计的基本原则、主要功能、主要技术参数、总体布置、有限元计算等方面介绍了埕岛西A区生产平台修井模块的研究设计. 展开更多
关键词 大型型固定生产平台 修井模块 总体设计 强度校
下载PDF
基于MDM-ResNet的脑肿瘤分类方法 被引量:5
6
作者 夏景明 邢露萍 +1 位作者 谈玲 宣大伟 《南京信息工程大学学报(自然科学版)》 CAS 北大核心 2022年第2期212-219,共8页
脑肿瘤是世界上最致命的癌症之一.由于脑肿瘤的多样性,其图像分类成为了当代研究的热点.近年来,深度神经网络(DNN)常用于医学图像分类,但随着深度的增加网络会出现梯度消失和过拟合的问题,而残差网络(ResNet)通过引入恒等映射可以缓解... 脑肿瘤是世界上最致命的癌症之一.由于脑肿瘤的多样性,其图像分类成为了当代研究的热点.近年来,深度神经网络(DNN)常用于医学图像分类,但随着深度的增加网络会出现梯度消失和过拟合的问题,而残差网络(ResNet)通过引入恒等映射可以缓解这些问题.因此,本文基于ResNet提出了一种MDM-ResNet网络,该网络由多尺寸卷积核模块(Multi-size convolution kernel module)、双通道池化层(Dual-channel pooling layer)和多深度融合残差块(Multi-depth fusion residual block)组成.本文实验在Figshare数据集上展开,采用数据增强操作对图像进行预处理,并利用5倍交叉验证方法对网络性能进行评估.最终实验结果表明MDM-ResNet能够对脑膜瘤(Meningioma)、胶质瘤(Glioma)和垂体瘤(Pituitary tumor)进行有效分类. 展开更多
关键词 脑肿瘤 深度神经网络(DNN) 残差网络(ResNet) 多尺寸卷积核模块 双通道池化层 多深度融合残差块
下载PDF
设计SOC所必备的技术
7
作者 梁合庆 《电子产品世界》 1999年第9期63-64,共2页
关键词 ASIC SOC 片上系统 IP核模块 设计
下载PDF
基于网络处理器的IPV4/V6双栈路由器慢通道数据处理的设计与实现
8
作者 侯成杰 王江林 张宏科 《电信快报》 2005年第12期50-52,共3页
文章主要是在深入研究IPV6协议规范和网络处理器基本原理的基础上,提出了一种基于IXP2400网络处理器的支持IPV4/V6双协议栈路由器慢通道数据处理的设计和实现方案。
关键词 IPV6 网络处理器 微引擎 核模块
下载PDF
Extracting and evaluating method of web dense cores 被引量:1
9
作者 杨楠 高洁 +1 位作者 薛鸿鹄 刘秀德 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期276-280,共5页
This paper focuses on some key problems in web community discovery and link analysis.Based on the topic-oriented technology,the characteristics of a bipartite graph are studied.An Х bipartite core set is introduced t... This paper focuses on some key problems in web community discovery and link analysis.Based on the topic-oriented technology,the characteristics of a bipartite graph are studied.An Х bipartite core set is introduced to more clearly define extracting ways.By scanning the topic subgraph to construct Х bipartite graph and then prune the graph with i and j ,an Х bipartite core set,which is also the minimum element of a community,can be found.Finally,a hierarchical clustering algorithm is applied to many Х bipartite core sets and the dendrogram of the community inner construction is obtained.The correctness of the constructing and pruning method is proved and the algorithm is designed.The typical datasets in the experiment are prepared according to the way in HITS(hyperlink-induced topic search).Ten topics and four search engines are chosen and the returned results are integrated.The modularity,which is a measure of the strength of the community structure in the social network,is used to validate the efficiency of the proposed method.The experimental results show that the proposed algorithm is effective and efficient. 展开更多
关键词 dense cores link analysis hierarchical clustering modularity measure
下载PDF
A Multidisciplinary Method for Evaluating Ship Stability 被引量:3
10
作者 Francesca Calabrese Luisa Mancarella +1 位作者 Alessandro Antonio Zizzari Angelo Corallo 《Journal of Shipping and Ocean Engineering》 2012年第6期321-326,共6页
The aim of this paper is to present the main results arisen from the joint efforts of the public-private partnership in being between CCII (Centro Cultura Innovativa d'Impresa) of University of Salento and Apphia s... The aim of this paper is to present the main results arisen from the joint efforts of the public-private partnership in being between CCII (Centro Cultura Innovativa d'Impresa) of University of Salento and Apphia s.r.l.. This paper will focus on the results of the core of the OBSS (on board stability system) module that, starting from the exact 3D geometry of a ship hull, described by a discrete model in a standard format, the distribution of all weights onboard and the data acquired by the system, calculates ship floating conditions (in draught, heel and trim). The proposed approach is based on geometry meshes represented by an universally accepted file format (named OBJ) first developed by Wavefront Technologies. Demonstration of the validity of the results is done by the authors using as hull model a simple rectangular box. 展开更多
关键词 ALGORITHMS computer applications EQUILIBRIUM ship floating conditions marine applications stability systems.
下载PDF
OPKH: A Lightweight Online Approach to Protecting Kernel Hooks in Kernel Modules
11
作者 田东海 李轩涯 +1 位作者 胡昌振 闫怀志 《China Communications》 SCIE CSCD 2013年第11期15-23,共9页
Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in t... Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead. 展开更多
关键词 kernel hook virtualization tech-nology online patching
下载PDF
A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules
12
作者 Donghai Tian Xiaoqi Jia +2 位作者 Junhua Chen Changzhen Hu Jingfeng Xue 《China Communications》 SCIE CSCD 2016年第11期143-152,共10页
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing met... Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for kernel heap protection. Moreover,all these kernel protection methods need modifying the existing OS kernel so that they may not be adopted in practice. To address this problem,we propose a lightweight virtualization-based solution that can protect the kernel heap buffers allocated for the target kernel modules. The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kernel module,and then add one secure canary word to the end of the allocated buffer. After that,a monitor process is launched to check the integrity of the canaries. The evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost. 展开更多
关键词 kernel heap overflow virtualization technology kernel module
全文增补中
New Process of Cold Fusion
13
作者 C.P.L. Karl yon THULE 《Journal of Energy and Power Engineering》 2013年第11期2115-2118,共4页
The author's process of cold fusion, was announced to International Conference on Emerging Nuclear Energy Systems in 2007, then exposed to International Conference on Emerging Nuclear Energy Systems in 2009, and has ... The author's process of cold fusion, was announced to International Conference on Emerging Nuclear Energy Systems in 2007, then exposed to International Conference on Emerging Nuclear Energy Systems in 2009, and has been applied since June, 2007 in a non-member border country of the European Union, for safety reasons, the product, of a large module of 300 cm x 40 cm, using energy of mass of 600 megawatts per hour, and unique waste, 300 cubic meters of pure water a day, instantly drinkable. The presentation which the author shall make, will contain, if it is possible, several demonstrations of a portable module, producing one megawatt per hour, and in waste one cubic meter of water per day: the authors are able to stop the module at any time. The civil applications of this process, the author developed in the articles published on the site of the European Scientific Parliament 2010, and diverse modules were the object of a protocol signed by large Asian country. 展开更多
关键词 Cold fusion ENERGY WATER POWER European Scientific Parliament.
下载PDF
New Process of Cold Fusion
14
作者 C.P.L. Karl von Thule Elena Dvoryashina 《Journal of Energy and Power Engineering》 2017年第10期643-645,共3页
The author's Process of Cold Fusion firstly was announced at the International Conference on Emerging Nuclear Energy Systems in 2007, after that it was presented at the International Conference on Emerging Nuclear En... The author's Process of Cold Fusion firstly was announced at the International Conference on Emerging Nuclear Energy Systems in 2007, after that it was presented at the International Conference on Emerging Nuclear Energy Systems in 2009. The product has already been applied since June, 2007. It was developed as a large Module of 300 cm x 40 cm, producing energy at 600 megawatts per hour, with unique waste of about 300 cubic meters of pure drinkable instant water a day. There is also a Portable Module, producing about 1 megawatt per hour, having in waste about 1 cubic meter of pure drinkable instant water a day. The important details: (1) we have the ability to stop the Module at any time; (2) the civil applications of this process is mentioned at the articles, published on the website of the European Scientific Parliament in the year of 2010; (3) the diverse modules became the object of special protocols, signed with a number of countries all over the world. 展开更多
关键词 Nuclear energy for humanity useful electricity HEAT pure instant water.
下载PDF
Topological origin of global attractors in gene regulatory networks
15
作者 ZHANG YunJun OUYANG Qi GENG Zhi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第2期101-108,共8页
Fixed-point attractors with global stability manifest themselves in a number of gene regulatory networks. This property indicates the stability of regulatory networks against small state perturbations and is closely r... Fixed-point attractors with global stability manifest themselves in a number of gene regulatory networks. This property indicates the stability of regulatory networks against small state perturbations and is closely related to other complex dynamics. In this paper, we aim to reveal the core modules in regulatory networks that determine their global attractors and the relationship between these core modules and other motifs. This work has been done via three steps. Firstly, inspired by the signal transmission in the regulation process, we extract the model of chain-like network from regulation networks. We propose a module of "ideal transmission chain(ITC)", which is proved sufficient and necessary(under certain condition) to form a global fixed-point in the context of chain-like network. Secondly, by examining two well-studied regulatory networks(i.e., the cell-cycle regulatory networks of Budding yeast and Fission yeast), we identify the ideal modules in true regulation networks and demonstrate that the modules have a superior contribution to network stability(quantified by the relative size of the biggest attraction basin). Thirdly, in these two regulation networks, we find that the double negative feedback loops, which are the key motifs of forming bistability in regulation, are connected to these core modules with high network stability. These results have shed new light on the connection between the topological feature and the dynamic property of regulatory networks. 展开更多
关键词 Boolean model BISTABILITY network module ROBUSTNESS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部