期刊文献+
共找到11,132篇文章
< 1 2 250 >
每页显示 20 50 100
Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things
1
作者 Zhaobin Li Xiantao Liu +1 位作者 Nan Zhang Zhanzhen Wei 《Computers, Materials & Continua》 SCIE EI 2024年第9期3835-3854,共20页
The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during informati... The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance. 展开更多
关键词 IIoT blockchain CERTIFICATELESS cross-domain authentication
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
2
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
3
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
下载PDF
Integrated analysis of plasma rotation effect on HL-3 hybrid scenario
4
作者 薛淼 郑国尧 +5 位作者 薛雷 李佳鲜 王硕 杜海龙 朱毅仁 周月 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期329-336,共8页
The hybrid scenario,which has good confinement and moderate MHD instabilities,is a proposed operation scenario for international thermonuclear experimental reactor(ITER).In this work,the effect of plasma rotation on t... The hybrid scenario,which has good confinement and moderate MHD instabilities,is a proposed operation scenario for international thermonuclear experimental reactor(ITER).In this work,the effect of plasma rotation on the HL-3 hybrid scenario is analyzed with the integrated modeling framework OMFIT.The results show that toroidal rotation has no obvious effect on confinement with a high line averaged density of n_(bar)~(7)×10^(19)m^(-3).In this case,the ion temperature only changes from 4.7 keV to 4.4 keV with the rotation decreasing from 10^(5) rad/s to 10^(3) rad/s,which means that the turbulent heat transport is not dominant.While in the scenarios characterized by lower densities,such as n_(bar)~4×10^(19)m^(-3),turbulent transport becomes dominant in determining heat transport.The ion temperature rises from 3.8 keV to 6.1 keV in the core as the rotation velocity increases from 10^(3) rad/s to 10^(5) rad/s.Despite the ion temperature rising,the rotation velocity does not obviously affect electron temperature or density.Additionally,it is noteworthy that the variation in rotation velocity does not significantly affect the global confinement of plasma in scenarios with low density or with high density. 展开更多
关键词 HL-3 hybrid scenario toroidal rotation integrated modeling
下载PDF
Freeze-thaw cycles and associated geomorphology in a post-glacial environment:current glacial,paraglacial,periglacial and proglacial scenarios at Pico de Orizaba volcano,Mexico
5
作者 Víctor SOTO Carlos M.WELSH R. +1 位作者 Kenji YOSHIKAWA Hugo DELGADO GRANADOS 《Journal of Mountain Science》 SCIE CSCD 2024年第6期1954-1977,共24页
The glacial history of Pico de Orizaba indicates that during the Last Glacial Maximum,its icecap covered up to~3000 m asl;due to the air temperature increasing,its main glacier has retreated to 5050 m asl.The retracti... The glacial history of Pico de Orizaba indicates that during the Last Glacial Maximum,its icecap covered up to~3000 m asl;due to the air temperature increasing,its main glacier has retreated to 5050 m asl.The retraction of the glacier has left behind an intense climatic instability that causes a high frequency of freeze-thaw cycles of great intensity;the resulting geomorphological processes are represented by the fragmentation of the bedrock that occupies the upper parts of the mountain.There is a notable lack of studies regarding the fragmentation and erosion occurring in tropical high mountains,and the associated geomorphological risks;for this reason,as a first stage of future continuous research,this study analyzes the freezing and thawing cycles that occur above 4000 m asl,through continuous monitoring of surface ground temperature.The results allow us to identify and characterize four zones:glacial,paraglacial,periglacial and proglacial.It was found that the paraglacial zone presents an intense drop of temperature,of up to~9℃ in only sixty minutes.The rock fatigue and intense freeze-thaw cycles that occur in this area are responsible for the high rate of rock disintegration and represent the main factor of the constant slope dynamics that occur at the site.This activity decreases,both in frequency and intensity,according to the distance to the glacier,which is where the temperature presents a certain degree of stability,until reaching the proglacial zone,where cycles are almost non-existent,and therefore there is no gelifraction activity.The geomorphological processes have resulted in significant alterations to the mountain slopes,which can have severe consequences in terms of risk and water. 展开更多
关键词 FREEZE-THAW Gelifraction Mountain mechanical erosion Periglacial geomorphology Postglacial scenarios
下载PDF
Abnormal Action Detection Based on Parameter-Efficient Transfer Learning in Laboratory Scenarios
6
作者 Changyu Liu Hao Huang +2 位作者 Guogang Huang Chunyin Wu Yingqi Liang 《Computers, Materials & Continua》 SCIE EI 2024年第9期4219-4242,共24页
Laboratory safety is a critical area of broad societal concern,particularly in the detection of abnormal actions.To enhance the efficiency and accuracy of detecting such actions,this paper introduces a novel method ca... Laboratory safety is a critical area of broad societal concern,particularly in the detection of abnormal actions.To enhance the efficiency and accuracy of detecting such actions,this paper introduces a novel method called TubeRAPT(Tubelet Transformer based onAdapter and Prefix TrainingModule).Thismethod primarily comprises three key components:the TubeR network,an adaptive clustering attention mechanism,and a prefix training module.These components work in synergy to address the challenge of knowledge preservation in models pretrained on large datasets while maintaining training efficiency.The TubeR network serves as the backbone for spatio-temporal feature extraction,while the adaptive clustering attention mechanism refines the focus on relevant information.The prefix training module facilitates efficient fine-tuning and knowledge transfer.Experimental results demonstrate the effectiveness of TubeRAPT,achieving a 68.44%mean Average Precision(mAP)on the CLA(Crazy LabActivity)small-scale dataset,marking a significant improvement of 1.53%over the previous TubeR method.This research not only showcases the potential applications of TubeRAPT in the field of abnormal action detection but also offers innovative ideas and technical support for the future development of laboratory safety monitoring technologies.The proposed method has implications for improving safety management systems in various laboratory environments,potentially reducing accidents and enhancing overall workplace safety. 展开更多
关键词 Parameter-efficient transfer learning laboratory scenarios TubeRAPT abnormal action detection
下载PDF
Gyrokinetic simulations of the kinetic electron effects on the electrostatic instabilities on the ITER baseline scenario
7
作者 Debing ZHANG Pengfei ZHAO +2 位作者 Yingfeng XU Lei YE Xianmei ZHANG 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第9期109-124,共16页
The linear and nonlinear simulations are carried out using the gyrokinetic code NLT for the electrostatic instabilities in the core region of a deuterium plasma based on the International Thermonuclear Experimental Re... The linear and nonlinear simulations are carried out using the gyrokinetic code NLT for the electrostatic instabilities in the core region of a deuterium plasma based on the International Thermonuclear Experimental Reactor(ITER)baseline scenario.The kinetic electron effects on the linear frequency and nonlinear transport are studied by adopting the adiabatic electron model and the fully drift-kinetic electron model in the NLT code,respectively.The linear simulations focus on the dependence of linear frequency on the plasma parameters,such as the ion and electron temperature gradientsκ_(Ti,e)≡R=L_(Ti,e),the density gradientκ_(n)≡R/L_(n)and the ion-electron temperature ratioτ=T_(e)=T_(i).Here,is the major radius,and T_(e)and T_(i)denote the electron and ion temperatures,respectively.L_(A)=-(δ_(r)lnA)^(-1)is the gradient scale length,with denoting the density,the ion and electron temperatures,respectively.In the kinetic electron model,the ion temperature gradient(ITG)instability and the trapped electron mode(TEM)dominate in the small and large k_(θ)region,respectively,wherek_(θ)is the poloidal wavenumber.The TEMdominant region becomes wider by increasing(decreasing)κ_(T_(e))(κ_(T_(i)))or by decreasingκ_(n).For the nominal parameters of the ITER baseline scenario,the maximum growth rate of dominant ITG instability in the kinetic electron model is about three times larger than that in the adiabatic electron model.The normalized linear frequency depends on the value ofτ,rather than the value of T_(e)or T_(i),in both the adiabatic and kinetic electron models.The nonlinear simulation results show that the ion heat diffusivity in the kinetic electron model is quite a lot larger than that in the adiabatic electron model,the radial structure is finer and the time oscillation is more rapid.In addition,the magnitude of the fluctuated potential at the saturated stage peaks in the ITGdominated region,and contributions from the TEM(dominating in the higher k_(θ)region)to the nonlinear transport can be neglected.In the adiabatic electron model,the zonal radial electric field is found to be mainly driven by the turbulent energy flux,and the contribution of turbulent poloidal Reynolds stress is quite small due to the toroidal shielding effect.However,in the kinetic electron model,the turbulent energy flux is not strong enough to drive the zonal radial electric field in the nonlinear saturated stage.The kinetic electron effects on the mechanism of the turbulence-driven zonal radial electric field should be further investigated. 展开更多
关键词 ITER baseline scenario gyrokinetic simulation kinetic electron effects electrostatic instability
下载PDF
Research on Anthropomorphic Obstacle Avoidance Trajectory Planning for Adaptive Driving Scenarios Based on Inverse Reinforcement Learning Theory
8
作者 Jian Wu Yang Yan +1 位作者 Yulong Liu Yahui Liu 《Engineering》 SCIE EI CAS CSCD 2024年第2期133-145,共13页
The forward design of trajectory planning strategies requires preset trajectory optimization functions,resulting in poor adaptability of the strategy and an inability to accurately generate obstacle avoidance trajecto... The forward design of trajectory planning strategies requires preset trajectory optimization functions,resulting in poor adaptability of the strategy and an inability to accurately generate obstacle avoidance trajectories that conform to real driver behavior habits.In addition,owing to the strong time-varying dynamic characteristics of obstacle avoidance scenarios,it is necessary to design numerous trajectory optimization functions and adjust the corresponding parameters.Therefore,an anthropomorphic obstacle-avoidance trajectory planning strategy for adaptive driving scenarios is proposed.First,numerous expert-demonstrated trajectories are extracted from the HighD natural driving dataset.Subsequently,a trajectory expectation feature-matching algorithm is proposed that uses maximum entropy inverse reinforcement learning theory to learn the extracted expert-demonstrated trajectories and achieve automatic acquisition of the optimization function of the expert-demonstrated trajectory.Furthermore,a mapping model is constructed by combining the key driving scenario information that affects vehicle obstacle avoidance with the weight of the optimization function,and an anthropomorphic obstacle avoidance trajectory planning strategy for adaptive driving scenarios is proposed.Finally,the proposed strategy is verified based on real driving scenarios.The results show that the strategy can adjust the weight distribution of the trajectory optimization function in real time according to the“emergency degree”of obstacle avoidance and the state of the vehicle.Moreover,this strategy can generate anthropomorphic trajectories that are similar to expert-demonstrated trajectories,effectively improving the adaptability and acceptability of trajectories in driving scenarios. 展开更多
关键词 Obstacle avoidance trajectory planning Inverse reinforcement theory Anthropomorphic Adaptive driving scenarios
下载PDF
Artificial Intelligence Based Multi-Scenario mmWave Channel Modeling for Intelligent High-Speed Train Communications
9
作者 Zhang Mengjiao Liu Yu +4 位作者 Huang Jie He Ruisi Zhang Jingfan Yu Chongyang Wang Chengxiang 《China Communications》 SCIE CSCD 2024年第3期260-272,共13页
A large amount of mobile data from growing high-speed train(HST)users makes intelligent HST communications enter the era of big data.The corresponding artificial intelligence(AI)based HST channel modeling becomes a tr... A large amount of mobile data from growing high-speed train(HST)users makes intelligent HST communications enter the era of big data.The corresponding artificial intelligence(AI)based HST channel modeling becomes a trend.This paper provides AI based channel characteristic prediction and scenario classification model for millimeter wave(mmWave)HST communications.Firstly,the ray tracing method verified by measurement data is applied to reconstruct four representative HST scenarios.By setting the positions of transmitter(Tx),receiver(Rx),and other parameters,the multi-scenarios wireless channel big data is acquired.Then,based on the obtained channel database,radial basis function neural network(RBF-NN)and back propagation neural network(BP-NN)are trained for channel characteristic prediction and scenario classification.Finally,the channel characteristic prediction and scenario classification capabilities of the network are evaluated by calculating the root mean square error(RMSE).The results show that RBF-NN can generally achieve better performance than BP-NN,and is more applicable to prediction of HST scenarios. 展开更多
关键词 artificial intelligence channel characteristic prediction HST channel millimeter wave scenario classification
下载PDF
Physical-Layer Secret Key Generation for Dual-Task Scenarios
10
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
Improved Unit Commitment with Accurate Dynamic Scenarios Clustering Based on Multi-Parametric Programming and Benders Decomposition
11
作者 Zhang Zhi Haiyu Huang +6 位作者 Wei Xiong Yijia Zhou Mingyu Yan Shaolian Xia Baofeng Jiang Renbin Su Xichen Tian 《Energy Engineering》 EI 2024年第6期1557-1576,共20页
Stochastic unit commitment is one of the most powerful methods to address uncertainty. However, the existingscenario clustering technique for stochastic unit commitment cannot accurately select representative scenario... Stochastic unit commitment is one of the most powerful methods to address uncertainty. However, the existingscenario clustering technique for stochastic unit commitment cannot accurately select representative scenarios,which threatens the robustness of stochastic unit commitment and hinders its application. This paper providesa stochastic unit commitment with dynamic scenario clustering based on multi-parametric programming andBenders decomposition. The stochastic unit commitment is solved via the Benders decomposition, which decouplesthe primal problem into the master problem and two types of subproblems. In the master problem, the committedgenerator is determined, while the feasibility and optimality of generator output are checked in these twosubproblems. Scenarios are dynamically clustered during the subproblem solution process through the multiparametric programming with respect to the solution of the master problem. In other words, multiple scenariosare clustered into several representative scenarios after the subproblem is solved, and the Benders cut obtainedby the representative scenario is generated for the master problem. Different from the conventional stochasticunit commitment, the proposed approach integrates scenario clustering into the Benders decomposition solutionprocess. Such a clustering approach could accurately cluster representative scenarios that have impacts on theunit commitment. The proposed method is tested on a 6-bus system and the modified IEEE 118-bus system.Numerical results illustrate the effectiveness of the proposed method in clustering scenarios. Compared withthe conventional clustering method, the proposed method can accurately select representative scenarios whilemitigating computational burden, thus guaranteeing the robustness of unit commitment. 展开更多
关键词 Stochastic programming unit commitment scenarios clustering Benders decomposition multi-parametric programming
下载PDF
Application of Patient Simulators Combined with Internet plus Scenario Simulation Teaching Models on Intravenous Infusion Nursing Education in China
12
作者 Ying Wu Yun Chen +5 位作者 Liuyan Zhang Guohua Huang Jinai He Yutong Li Yuzhen Renqing Zhijuan Zhan 《Journal of Biosciences and Medicines》 2024年第1期64-71,共8页
Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence... Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence for the implementation of advanced teaching models in future nursing education. Methods: Enrolled 60 nurses who took the IV infusion therapy training program in our hospital from January 2022 to December 2023 for research. 30 nurses who were trained in traditional teaching models from January to December 2022 were selected as the control group, and 30 nurses who were trained with simulation-based teaching models with methods including simulated patients, internet, online meetings which can be replayed and scenario simulation, etc. from January to December 2023 were selected as the experimental group. Evaluated the learning outcomes based on the Competency Inventory for Nursing Students (CINS), Problem-Solving Inventory (PSI), comprehensive learning ability, scientific research ability, and proficiency in the theoretical knowledge and practical skills of IV infusion therapy. Nursing quality, the incidence of IV infusion therapy complications and nurse satisfaction with different teaching models were also measured. Results: The scientific research ability, PSI scores, CINS scores, and comprehensive learning ability of the experimental group were better than those of the control group (P 0.05), and their assessment results of practical skills, nursing quality of IV infusion therapy during training, and satisfaction with teaching models were all better than those of the control group with statistical significance (P < 0.05). The incidence of IV infusion therapy complications in the experimental group was lower than that in the control group, indicating statistical significance (P < 0.05). Conclusions: Teaching models based on patient simulators combined with Internet Plus scenario simulation enable nursing students to learn more directly and practice at any time and in any place, and can improve their proficiency in IV infusion theoretical knowledge and skills (e.g. PICC catheterization), core competencies, problem-solving ability, comprehensive learning ability, scientific research ability and the ability to deal with complicated cases. Also, it helps provide high-quality nursing education, improve the nursing quality of IV therapy, reduce the incidence of related complications, and ensure the safety of patients with IV therapy. 展开更多
关键词 Specialty of Intravenous Infusion Therapy Nursing Education Patient Simulators Internet Plus scenario Simulation Teaching Model
下载PDF
Application of Feature, Event, and Process Methods to Leakage Scenario Development for Offshore CO_(2) Geological Storage
13
作者 Qiang Liu Yanzun Li +2 位作者 Meng Jing Qi Li Guizhen Liu 《哈尔滨工程大学学报(英文版)》 CSCD 2024年第3期608-616,共9页
Offshore carbon dioxide(CO_(2)) geological storage(OCGS) represents a significant strategy for addressing climate change by curtailing greenhouse gas emissions. Nonetheless, the risk of CO_(2) leakage poses a substant... Offshore carbon dioxide(CO_(2)) geological storage(OCGS) represents a significant strategy for addressing climate change by curtailing greenhouse gas emissions. Nonetheless, the risk of CO_(2) leakage poses a substantial concern associated with this technology. This study introduces an innovative approach for establishing OCGS leakage scenarios, involving four pivotal stages, namely, interactive matrix establishment, risk matrix evaluation, cause–effect analysis, and scenario development, which has been implemented in the Pearl River Estuary Basin in China. The initial phase encompassed the establishment of an interaction matrix for OCGS systems based on features, events, and processes. Subsequent risk matrix evaluation and cause–effect analysis identified key system components, specifically CO_(2) injection and faults/features. Building upon this analysis, two leakage risk scenarios were successfully developed, accompanied by the corresponding mitigation measures. In addition, this study introduces the application of scenario development to risk assessment, including scenario numerical simulation and quantitative assessment. Overall, this research positively contributes to the sustainable development and safe operation of OCGS projects and holds potential for further refinement and broader application to diverse geographical environments and project requirements. This comprehensive study provides valuable insights into the establishment of OCGS leakage scenarios and demonstrates their practical application to risk assessment, laying the foundation for promoting the sustainable development and safe operation of ocean CO_(2) geological storage projects while proposing possibilities for future improvements and broader applications to different contexts. 展开更多
关键词 Offshore CO_(2)geological storage Features events and processes scenario development Interaction matrix Risk matrix assessment
下载PDF
Analysis of factors influencing carbon emissions in the Yangtze River Delta region and projections of carbon peak scenarios
14
作者 SHI Xiong-tian WU Feng-qing +1 位作者 CHEN Yang DAI Li-li 《Ecological Economy》 2024年第1期2-24,共23页
Based on the supply-side perspective,the improved STIRPAT model is applied to reveal the mechanisms of supply-side factors such as human,capital,technology,industrial synergy,institutions and economic growth on carbon... Based on the supply-side perspective,the improved STIRPAT model is applied to reveal the mechanisms of supply-side factors such as human,capital,technology,industrial synergy,institutions and economic growth on carbon emissions in the Yangtze River Delta(YRD)through path analysis,and to forecast carbon emissions in the YRD from the baseline scenario,factor regulation scenario and integrated scenario to reach the peak.The results show that:(1)Jiangsu's high carbon emission pattern is the main reason for the YRD hindering the synergistic regulation of carbon emissions.(2)Human factors,institutional factors and economic growth factors can all contribute to carbon emissions in the YRD region,while technological and industrial factors can generally suppress carbon emissions in the YRD region.(3)Under the capital regulation scenario,the YRD region has the highest level of carbon emission synergy,with Jiangsu reaching its peak five years earlier.Under the balanced regulation scenario,the YRD region as a whole,Jiangsu,Zhejiang and Anhui reach the peak as scheduled. 展开更多
关键词 Yangtze River Delta carbon peaking scenario forecasting STIRPAT model
下载PDF
Research on Demand Response Potential of Adjustable Loads in Demand Response Scenarios
15
作者 Zhishuo Zhang Xinhui Du +3 位作者 Yaoke Shang Jingshu Zhang Wei Zhao Jia Su 《Energy Engineering》 EI 2024年第6期1577-1605,共29页
To address the issues of limited demand response data,low generalization of demand response potential evaluation,and poor demand response effect,the article proposes a demand response potential feature extraction and ... To address the issues of limited demand response data,low generalization of demand response potential evaluation,and poor demand response effect,the article proposes a demand response potential feature extraction and prediction model based on data mining and a demand response potential assessment model for adjustable loads in demand response scenarios based on subjective and objective weight analysis.Firstly,based on the demand response process and demand response behavior,obtain demand response characteristics that characterize the process and behavior.Secondly,establish a feature extraction and prediction model based on data mining,including similar day clustering,time series decomposition,redundancy processing,and data prediction.The predicted values of each demand response feature on the response day are obtained.Thirdly,the predicted data of various characteristics on the response day are used as demand response potential evaluation indicators to represent different demand response scenarios and adjustable loads,and a demand response potential evaluation model based on subjective and objective weight allocation is established to calculate the demand response potential of different adjustable loads in different demand response scenarios.Finally,the effectiveness of the method proposed in the article is verified through examples,providing a reference for load aggregators to formulate demand response schemes. 展开更多
关键词 Demand response potential demand response scenarios data mining adjustable load evaluation system subjective and objective weight allocation
下载PDF
Historical Changes and Multi-scenario Prediction of Land Use and Terrestrial Ecosystem Carbon Storage in China
16
作者 AN Yue TAN Xuelan +2 位作者 REN Hui LI Yinqi ZHOU Zhou 《Chinese Geographical Science》 SCIE CSCD 2024年第3期487-503,共17页
Terrestrial carbon storage(CS)plays a crucial role in achieving carbon balance and mitigating global climate change.This study employs the Shared Socioeconomic Pathways and Representative Concentration Pathways(SSPs-R... Terrestrial carbon storage(CS)plays a crucial role in achieving carbon balance and mitigating global climate change.This study employs the Shared Socioeconomic Pathways and Representative Concentration Pathways(SSPs-RCPs)published by the Intergovernmental Panel on Climate Change(IPCC)and incorporates the Policy Control Scenario(PCS)regulated by China’s land management policies.The Future Land Use Simulation(FLUS)model is employed to generate a 1 km resolution land use/cover change(LUCC)dataset for China in 2030 and 2060.Based on the carbon density dataset of China’s terrestrial ecosystems,the study analyses CS changes and their relationship with land use changes spanning from 1990 to 2060.The findings indicate that the quantitative changes in land use in China from 1990 to 2020 are characterised by a reduction in the area proportion of cropland and grassland,along with an increase in the impervious surface and forest area.This changing trend is projected to continue under the PCS from 2020 to 2060.Under the SSPs-RCPs scenario,the proportion of cropland and impervious surface predominantly increases,while the proportions of forest and grassland continuously decrease.Carbon loss in China’s carbon storage from 1990 to 2020 amounted to 0.53×10^(12)kg,primarily due to the reduced area of cropland and grassland.In the SSPs-RCPs scenario,more significant carbon loss occurs,reaching a peak of8.07×10^(12)kg in the SSP4-RCP3.4 scenario.Carbon loss is mainly concentrated in the southeastern coastal area and the Beijing-TianjinHebei(BTH)region of China,with urbanisation and deforestation identified as the primary drivers.In the future,it is advisable to enhance the protection of forests and grassland while stabilising cropland areas and improving the intensity of urban land.These research findings offer valuable data support for China’s land management policy,land space optimisation,and the achievement of dual-carbon targets. 展开更多
关键词 land use change Future Land Use Simulation(FLUS)model carbon storage carbon density dataset land use scenario China
下载PDF
Multi-scenario Simulation of the Impact of Land Use Change on the Ecosystem Service Value in the Suzhou-Wuxi-Changzhou Metropolitan Area,China
17
作者 WANG Bin HU Chunguang ZHANG Yushuo 《Chinese Geographical Science》 SCIE CSCD 2024年第1期79-92,共14页
As the most economically developed metropolitan area in China’s Yangtze River Delta,the rapid changing land use patterns of Suzhou-Wuxi-Changzhou(Su-Xi-Chang) metropolitan area have profound impacts on the ecosystem ... As the most economically developed metropolitan area in China’s Yangtze River Delta,the rapid changing land use patterns of Suzhou-Wuxi-Changzhou(Su-Xi-Chang) metropolitan area have profound impacts on the ecosystem service value(ESV).Based on the patterns of land use change and the ESV change in Su-Xi-Chang metropolitan area from 2000 to 2020,we set up four scenarios:natural development scenario,urban development scenario,arable land protection scenario and ecological protection scenario,and simulated the impact of land use changes on the ESV in these scenarios.The results showed that:1) the area of built-up land in the Su-XiChang metropolitan area increased significantly from 2000 to 2020,and the area of other types of land decreased.Arable land underwent the highest transfer-out area,and was primarily converted into built-up land.The total ESV of Su-Xi-Chang metropolitan area increased initially then declined from 2000–2020,and the value of almost all individual ecosystem services decreased.2) Population density,GDP per area,night lighting intensity,and road network density can negatively impact the ESV.3) The total ESV loss under the natural development and urban development scenarios was high,and the expansion of the built-up land and the drastic shrinkage of the arable land contributed to the ESV decline under both scenarios.The total ESV under arable land protection and ecological protection scenarios increases,and therefore these scenarios are suitable for future land use optimization in Su-Xi-Chang.This study could provide a certain reference for land use planning and allocation,and offer guidance for the rational allocation of land resources. 展开更多
关键词 multiple scenarios land use simulation ecosystem service value(ESV) Patch-Generating Land Use Simulation(PLUS)model Suzhou-Wuxi-Changzhou(Su-Xi-Chang)metropolitan area
下载PDF
Multi-scenario Simulation and Spatial-temporal Analysis of LUCC in China's Coastal Zone Based on Coupled SD-FLUS Model
18
作者 HOU Xiyong SONG Baiyuan +2 位作者 ZHANG Xueying WANG Xiaoli LI Dong 《Chinese Geographical Science》 SCIE CSCD 2024年第4期579-598,共20页
Increased human activities in China's coastal zone have resulted in the depletion of ecological land resources.Thus,conducting current and future multi-scenario simulation research on land use and land cover chang... Increased human activities in China's coastal zone have resulted in the depletion of ecological land resources.Thus,conducting current and future multi-scenario simulation research on land use and land cover change(LUCC)is crucial for guiding the healthy and sustainable development of coastal zones.System dynamic(SD)-future land use simulation(FLUS)model,a coupled simulation model,was developed to analyze land use dynamics in China's coastal zone.This model encompasses five scenarios,namely,SSP1-RCP2.6(A),SSP2-RCP4.5(B),SSP3-RCP4.5(C),SSP4-RCP4.5(D),and SSP5-RCP8.5(E).The SD model simulates land use demand on an annual basis up to the year 2100.Subsequently,the FLUS model determines the spatial distribution of land use for the near term(2035),medium term(2050),and long term(2100).Results reveal a slowing trend in land use changes in China's coastal zone from 2000–2020.Among these changes,the expansion rate of construction land was the highest and exhibited an annual decrease.By 2100,land use predictions exhibit high accuracy,and notable differences are observed in trends across scenarios.In summary,the expansion of production,living,and ecological spaces toward the sea remains prominent.Scenario A emphasizes reduced land resource dependence,benefiting ecological land protection.Scenario B witnesses an intensified expansion of artificial wetlands.Scenario C sees substantial land needs for living and production,while Scenario D shows coastal forest and grassland shrinkage.Lastly,in Scenario E,the conflict between humans and land intensifies.This study presents pertinent recommendations for the future development,utilization,and management of coastal areas in China.The research contributes valuable scientific support for informed,long-term strategic decision making within coastal regions. 展开更多
关键词 land use and land cover change(LUCC) multi-scenario simulation system dynamic-future land use simulation(SD-FLUS)model SSP-RCP scenarios model coupling China's coastal zone
下载PDF
Radio Communication Scenarios in 5G-Railways 被引量:1
19
作者 Ruisi He Bo Ai +8 位作者 Zhangdui Zhong Mi Yang Chen Huang Ruifeng Chen Jianwen Ding Hang Mi Zhangfeng Ma Guiqi Sun Changzhu Liu 《China Communications》 SCIE CSCD 2023年第9期235-246,共12页
With the rapid development of railways,especially high-speed railways,there is an increasingly urgent demand for new wireless communication system for railways.Taking the mature 5G technology as an opportunity,5G-rail... With the rapid development of railways,especially high-speed railways,there is an increasingly urgent demand for new wireless communication system for railways.Taking the mature 5G technology as an opportunity,5G-railways(5G-R)have been widely regarded as a solution to meet the diversified demands of railway wireless communications.For the design,deployment and improvement of 5GR networks,radio communication scenario classification plays an important role,affecting channel modeling and system performance evaluation.In this paper,a standardized radio communication scenario classification,including 18 scenarios,is proposed for 5GR.This paper analyzes the differences of 5G-R scenarios compared with the traditional cellular networks and GSM-railways,according to 5G-R requirements and the unique physical environment and propagation characteristics.The proposed standardized scenario classification helps deepen the research of 5G-R and promote the development and application of the existing advanced technologies in railways. 展开更多
关键词 5G-R scenario classification smart rail-ways
下载PDF
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management 被引量:1
20
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部