期刊文献+
共找到121,746篇文章
< 1 2 250 >
每页显示 20 50 100
Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers(DID)
1
作者 Iuon-Chang Lin I-Ling Yeh +2 位作者 Ching-Chun Chang Jui-Chuan Liu Chin-Chen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期809-822,共14页
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi... Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability. 展开更多
关键词 Self-sovereign identity decentralized identifier blockchain
下载PDF
基于DID的跨链身份认证研究综述 被引量:1
2
作者 白伊瑞 田宁 +3 位作者 雷虹 刘雪峰 芦翔 周勇 《计算机科学与探索》 CSCD 北大核心 2024年第3期597-611,共15页
随着元宇宙和Web3.0等概念的出现,区块链在很多领域中发挥了非常重要的作用,跨链技术是实现链间互联互通和价值转移的重要技术手段。现阶段,公证人和侧链等传统的跨链技术存在信任问题,同时,跨链身份认证领域中存在各链身份不统一以及... 随着元宇宙和Web3.0等概念的出现,区块链在很多领域中发挥了非常重要的作用,跨链技术是实现链间互联互通和价值转移的重要技术手段。现阶段,公证人和侧链等传统的跨链技术存在信任问题,同时,跨链身份认证领域中存在各链身份不统一以及身份不掌握在用户自己手中的问题。首先,系统地总结了数字身份和跨链技术的发展历程、技术方案,并对四种数字身份模型和九个主流跨链项目进行分析比较;其次,通过梳理分析近年来跨链身份认证的主要研究成果,设计了跨链身份认证通用模型,并总结出现有方案存在的缺点;然后,重点研究了基于DID的跨链身份认证实现方案,对不同方案进行了技术特点及优缺点分析;在此基础上,总结并设计了三种基于DID的跨链身份认证模型,对主要实现步骤进行了功能描述,并分析其优点、局限性和效率;最后,针对当前基于DID的跨链身份认证模型的不足,讨论了其发展难点并给出了五个未来可发展的研究方向。 展开更多
关键词 分布式数字身份 区块链 跨链 身份认证
下载PDF
Two-Staged Method for Ice Channel Identification Based on Image Segmentation and Corner Point Regression 被引量:1
3
作者 DONG Wen-bo ZHOU Li +2 位作者 DING Shi-feng WANG Ai-ming CAI Jin-yan 《China Ocean Engineering》 SCIE EI CSCD 2024年第2期313-325,共13页
Identification of the ice channel is the basic technology for developing intelligent ships in ice-covered waters,which is important to ensure the safety and economy of navigation.In the Arctic,merchant ships with low ... Identification of the ice channel is the basic technology for developing intelligent ships in ice-covered waters,which is important to ensure the safety and economy of navigation.In the Arctic,merchant ships with low ice class often navigate in channels opened up by icebreakers.Navigation in the ice channel often depends on good maneuverability skills and abundant experience from the captain to a large extent.The ship may get stuck if steered into ice fields off the channel.Under this circumstance,it is very important to study how to identify the boundary lines of ice channels with a reliable method.In this paper,a two-staged ice channel identification method is developed based on image segmentation and corner point regression.The first stage employs the image segmentation method to extract channel regions.In the second stage,an intelligent corner regression network is proposed to extract the channel boundary lines from the channel region.A non-intelligent angle-based filtering and clustering method is proposed and compared with corner point regression network.The training and evaluation of the segmentation method and corner regression network are carried out on the synthetic and real ice channel dataset.The evaluation results show that the accuracy of the method using the corner point regression network in the second stage is achieved as high as 73.33%on the synthetic ice channel dataset and 70.66%on the real ice channel dataset,and the processing speed can reach up to 14.58frames per second. 展开更多
关键词 ice channel ship navigation identification image segmentation corner point regression
下载PDF
On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks
4
作者 Jinyu Chen Long Shi +2 位作者 Qisheng Huang Taotao Wang Daojing He 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1755-1773,共19页
In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughp... In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughput and fault tolerance.However,PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism.As a result,traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network.To address these issues,we propose a novel decentralized reputation management mechanism for permissioned blockchain networks to enhance security,promote liveness,and mitigate centralization while retaining the same throughput as traditional PoA.This paper aims to design an off-chain reputation evaluation and an on-chain reputation-aided consensus.First,we evaluate the nodes’reputation in the context of the blockchain networks and make the reputation globally verifiable through smart contracts.Second,building upon traditional PoA,we propose a reputation-aided PoA(rPoA)consensus to enhance securitywithout sacrificing throughput.In particular,rPoA can incentivize nodes to autonomously form committees based on reputation authority,which prevents block generation from being tracked through the randomness of reputation variation.Moreover,we develop a reputation-aided fork-choice rule for rPoA to promote the network’s liveness.Finally,experimental results show that the proposed rPoA achieves higher security performance while retaining transaction throughput compared to traditional PoA. 展开更多
关键词 Blockchain reputation management POA THROUGHPUT SECURITY DECENTRALIZATION
下载PDF
Pollution source identification methods and remediation technologies of groundwater: A review
5
作者 Ya-ci Liu Yu-hong Fei +2 位作者 Ya-song Li Xi-lin Bao Peng-wei Zhang 《China Geology》 CAS CSCD 2024年第1期125-137,共13页
Groundwater is an important source of drinking water.Groundwater pollution severely endangers drinking water safety and sustainable social development.In the case of groundwater pollution,the top priority is to identi... Groundwater is an important source of drinking water.Groundwater pollution severely endangers drinking water safety and sustainable social development.In the case of groundwater pollution,the top priority is to identify pollution sources,and accurate information on pollution sources is the premise of efficient remediation.Then,an appropriate pollution remediation scheme should be developed according to information on pollution sources,site conditions,and economic costs.The methods for identifying pollution sources mainly include geophysical exploration,geochemistry,isotopic tracing,and numerical modeling.Among these identification methods,only the numerical modeling can recognize various information on pollution sources,while other methods can only identify a certain aspect of pollution sources.The remediation technologies of groundwater can be divided into in-situ and ex-situ remediation technologies according to the remediation location.The in-situ remediation technologies enjoy low costs and a wide remediation range,but their remediation performance is prone to be affected by environmental conditions and cause secondary pollution.The ex-situ remediation technologies boast high remediation efficiency,high processing capacity,and high treatment concentration but suffer high costs.Different methods for pollution source identification and remediation technologies are applicable to different conditions.To achieve the expected identification and remediation results,it is feasible to combine several methods and technologies according to the actual hydrogeological conditions of contaminated sites and the nature of pollutants.Additionally,detailed knowledge about the hydrogeological conditions and stratigraphic structure of the contaminated site is the basis of all work regardless of the adopted identification methods or remediation technologies. 展开更多
关键词 Groundwater pollution identification of pollution sources Geophysical exploration identification Geochemistry identification Isotopic tracing Numerical modeling Remediation technology Hydrogeological conditions Hydrogeological survey engineering
下载PDF
Attention Markets of Blockchain-Based Decentralized Autonomous Organizations
6
作者 Juanjuan Li Rui Qin +3 位作者 Sangtian Guan Wenwen Ding Fei Lin Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1370-1380,共11页
The attention is a scarce resource in decentralized autonomous organizations(DAOs),as their self-governance relies heavily on the attention-intensive decision-making process of“proposal and voting”.To prevent the ne... The attention is a scarce resource in decentralized autonomous organizations(DAOs),as their self-governance relies heavily on the attention-intensive decision-making process of“proposal and voting”.To prevent the negative effects of pro-posers’attention-capturing strategies that contribute to the“tragedy of the commons”and ensure an efficient distribution of attention among multiple proposals,it is necessary to establish a market-driven allocation scheme for DAOs’attention.First,the Harberger tax-based attention markets are designed to facilitate its allocation via continuous and automated trading,where the individualized Harberger tax rate(HTR)determined by the pro-posers’reputation is adopted.Then,the Stackelberg game model is formulated in these markets,casting attention to owners in the role of leaders and other competitive proposers as followers.Its equilibrium trading strategies are also discussed to unravel the intricate dynamics of attention pricing.Moreover,utilizing the single-round Stackelberg game as an illustrative example,the existence of Nash equilibrium trading strategies is demonstrated.Finally,the impact of individualized HTR on trading strategies is investigated,and results suggest that it has a negative correlation with leaders’self-accessed prices and ownership duration,but its effect on their revenues varies under different conditions.This study is expected to provide valuable insights into leveraging attention resources to improve DAOs’governance and decision-making process. 展开更多
关键词 ATTENTION decentralized autonomous organizations Harberger tax Stackelberg game.
下载PDF
Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems
7
作者 Siwan Noh Kyung-Hyune Rhee 《Computers, Materials & Continua》 SCIE EI 2024年第6期3805-3826,共22页
In Decentralized Machine Learning(DML)systems,system participants contribute their resources to assist others in developing machine learning solutions.Identifying malicious contributions in DML systems is challenging,... In Decentralized Machine Learning(DML)systems,system participants contribute their resources to assist others in developing machine learning solutions.Identifying malicious contributions in DML systems is challenging,which has led to the exploration of blockchain technology.Blockchain leverages its transparency and immutability to record the provenance and reliability of training data.However,storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs.Additionally,current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data.However,less attention has been paid to the scenario where malicious requesters intentionally manipulate test data during evaluation to gain an unfair advantage.This paper proposes a transparent and accountable training data sharing method that securely shares data among potentially malicious system participants.First,we introduce a blockchain-based DML system architecture that supports secure training data sharing through the IPFS network.Second,we design a blockchain smart contract to transparently split training datasets into training and test datasets,respectively,without involving system participants.Under the system,transparent and accountable training data sharing can be achieved with attribute-based proxy re-encryption.We demonstrate the security analysis for the system,and conduct experiments on the Ethereum and IPFS platforms to show the feasibility and practicality of the system. 展开更多
关键词 decentralized machine learning data accountability dataset sharing
下载PDF
Decentralized Optimal Control and Stabilization of Interconnected Systems With Asymmetric Information
8
作者 Na Wang Xiao Liang +1 位作者 Hongdan Li Xiao Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第3期698-707,共10页
The paper addresses the decentralized optimal control and stabilization problems for interconnected systems subject to asymmetric information.Compared with previous work,a closed-loop optimal solution to the control p... The paper addresses the decentralized optimal control and stabilization problems for interconnected systems subject to asymmetric information.Compared with previous work,a closed-loop optimal solution to the control problem and sufficient and necessary conditions for the stabilization problem of the interconnected systems are given for the first time.The main challenge lies in three aspects:Firstly,the asymmetric information results in coupling between control and estimation and failure of the separation principle.Secondly,two extra unknown variables are generated by asymmetric information(different information filtration)when solving forward-backward stochastic difference equations.Thirdly,the existence of additive noise makes the study of mean-square boundedness an obstacle.The adopted technique is proving and assuming the linear form of controllers and establishing the equivalence between the two systems with and without additive noise.A dual-motor parallel drive system is presented to demonstrate the validity of the proposed algorithm. 展开更多
关键词 Asymmetric information decentralized control forwardbackward stochastic difference equations interconnected system stalibization
下载PDF
Quaternion-Based Adaptive Trajectory Tracking Control of a Rotor-Missile with Unknown Parameters Identification
9
作者 Jie Zhao Zhongjiao Shi +1 位作者 Yuchen Wang Wei Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期375-386,共12页
This paper investigates the adaptive trajectory tracking control problem and the unknown parameter identification problem of a class of rotor-missiles with parametric system uncertainties.First,considering the uncerta... This paper investigates the adaptive trajectory tracking control problem and the unknown parameter identification problem of a class of rotor-missiles with parametric system uncertainties.First,considering the uncertainty of structural and aerodynamic parameters,the six-degree-of-freedom(6Do F) nonlinear equations describing the position and attitude dynamics of the rotor-missile are established,respectively,in the inertial and body-fixed reference frames.Next,a hierarchical adaptive trajectory tracking controller that can guarantee closed-loop stability is proposed according to the cascade characteristics of the 6Do F dynamics.Then,a memory-augmented update rule of unknown parameters is proposed by integrating all historical data of the regression matrix.As long as the finitely excited condition is satisfied,the precise identification of unknown parameters can be achieved.Finally,the validity of the proposed trajectory tracking controller and the parameter identification method is proved through Lyapunov stability theory and numerical simulations. 展开更多
关键词 Rotor-missile Adaptive control Parameter identification Quaternion control
下载PDF
Molecular Identification of Mycobacterium Strains Responsible of Bovine Tuberculosis Cases in Bobo-Dioulasso Slaughterhouse, Burkina Faso
10
作者 Mariétou Konate Aminata Fofana# +2 位作者 Yacouba Kouadima Aboubacar Sidiki Ouattara Adama Sanou 《Advances in Microbiology》 CAS 2024年第2期105-114,共10页
Bovine tuberculosis (bTB) is an endemic zoonosis significantly affects animal health in Burkina Faso. The primary causative agent is Mycobacterium tuberculosis (M. tuberculosis) complex, mainly M. bovis. Cattle are co... Bovine tuberculosis (bTB) is an endemic zoonosis significantly affects animal health in Burkina Faso. The primary causative agent is Mycobacterium tuberculosis (M. tuberculosis) complex, mainly M. bovis. Cattle are considered as natural reservoir of M. bovis. However, in Burkina Faso, the circulation of these strains remains poorly understood and documented. This study aimed to identify and characterize Mycobacterium strains from suspected carcasses during routine meat inspection at Bobo-Dioulasso refrigerated slaughterhouse. A prospective cross-sectional study was conducted from January 2021 to December 2022 on cases of seizures linked to suspected bovine tuberculosis. Microbiological and molecular analyzes were used for mycobacterial strain isolation and characterization. Out of 50 samples, 24% tested positive by microscopy and 12% by culture. Molecular analysis identified 6 strains of Mycobacteria, exclusively Mycobacterium bovis specifically the subspecies bovis (Mycobacterium bovis subsp bovis). In conclusion, M. bovis subsp bovis is the primary agent responsible for bovine tuberculosis in Bobo-Dioulasso. Continuous monitoring of mycobacterial strains is therefore necessary for the effective control of this pathology in the local cattle population. 展开更多
关键词 Bovine Tuberculosis Mycobacterium bovis Molecular identification Cattle Population Burkina Faso
下载PDF
Fluid identification and tight oil layer classification for the southwestern Mahu Sag,Junggar Basin using NMR logging-based spectrum decomposition
11
作者 Wenbiao Huang Yibing Guo +4 位作者 Jun Qin Zhongchen Ba Zongbin Zhang Luning Bai Heng Li 《Energy Geoscience》 EI 2024年第2期62-69,共8页
The intricate distribution of oil and water in tight rocks makes pinpointing oil layers challenging.While conventional identification methods offer potential solutions,their limited accuracy precludes them from being ... The intricate distribution of oil and water in tight rocks makes pinpointing oil layers challenging.While conventional identification methods offer potential solutions,their limited accuracy precludes them from being effective in their applications to unconventional reservoirs.This study employed nuclear magnetic resonance(NMR)spectrum decomposition to dissect the NMR T_(2)spectrum into multiple subspectra.Furthermore,it employed laboratory NMR experiments to ascertain the fluid properties of these sub-spectra,aiming to enhance identification accuracy.The findings indicate that fluids of distinct properties overlap in the T_(2)spectra,with bound water,movable water,bound oil,and movable oil appearing sequentially from the low-value zone to the high-value zone.Consequently,an oil layer classification scheme was proposed,which considers the physical properties of reservoirs,oil-bearing capacity,and the characteristics of both mobility and the oil-water two-phase flow.When applied to tight oil layer identification,the scheme's outcomes align closely with actual test results.A horizontal well,deployed based on these findings,has produced high-yield industrial oil flow,underscoring the precision and dependability of this new approach. 展开更多
关键词 Nuclear magnetic resonance Fluid identification Oil layer identification NMR T_(2)spectrum decomposition Normal distribution simulation
下载PDF
Research on Risk Identification and Industrial Governance of Digital Education Products Based on Data Annotation Technology
12
作者 Tong Lili Zeng Jia +1 位作者 Di Ying Wang Nan 《China Communications》 SCIE CSCD 2024年第3期273-282,共10页
The social transformation brought aboutby digital technology is deeply impacting various industries.Digital education products, with core technologiessuch as 5G, AI, IoT (Internet of Things),etc., are continuously pen... The social transformation brought aboutby digital technology is deeply impacting various industries.Digital education products, with core technologiessuch as 5G, AI, IoT (Internet of Things),etc., are continuously penetrating areas such as teaching,management, and evaluation. Apps, miniprograms,and emerging large-scale models are providingexcellent knowledge performance and flexiblecross-media output. However, they also exposerisks such as content discrimination and algorithmcommercialization. This paper conducts anevidence-based analysis of digital education productrisks from four dimensions: “digital resourcesinformationdissemination-algorithm design-cognitiveassessment”. It breaks through corresponding identificationtechnologies and, relying on the diverse characteristicsof governance systems, explores governancestrategies for digital education products from the threedomains of “regulators-developers-users”. 展开更多
关键词 digital education products industry governance risk identification
下载PDF
Anomaly-Resistant Decentralized State Estimation Under Minimum Error Entropy With Fiducial Points for Wide-Area Power Systems
13
作者 Bogang Qu Zidong Wang +2 位作者 Bo Shen Hongli Dong Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期74-87,共14页
This paper investigates the anomaly-resistant decentralized state estimation(SE) problem for a class of wide-area power systems which are divided into several non-overlapping areas connected through transmission lines... This paper investigates the anomaly-resistant decentralized state estimation(SE) problem for a class of wide-area power systems which are divided into several non-overlapping areas connected through transmission lines. Two classes of measurements(i.e., local measurements and edge measurements) are obtained, respectively, from the individual area and the transmission lines. A decentralized state estimator, whose performance is resistant against measurement with anomalies, is designed based on the minimum error entropy with fiducial points(MEEF) criterion. Specifically, 1) An augmented model, which incorporates the local prediction and local measurement, is developed by resorting to the unscented transformation approach and the statistical linearization approach;2) Using the augmented model, an MEEF-based cost function is designed that reflects the local prediction errors of the state and the measurement;and 3) The local estimate is first obtained by minimizing the MEEF-based cost function through a fixed-point iteration and then updated by using the edge measuring information. Finally, simulation experiments with three scenarios are carried out on the IEEE 14-bus system to illustrate the validity of the proposed anomaly-resistant decentralized SE scheme. 展开更多
关键词 decentralized state estimation(SE) measurements with anomalies minimum error entropy unscented Kalman filter wide-area power systems
下载PDF
A real-time intelligent lithology identification method based on a dynamic felling strategy weighted random forest algorithm
14
作者 Tie Yan Rui Xu +2 位作者 Shi-Hui Sun Zhao-Kai Hou Jin-Yu Feng 《Petroleum Science》 SCIE EI CAS CSCD 2024年第2期1135-1148,共14页
Real-time intelligent lithology identification while drilling is vital to realizing downhole closed-loop drilling. The complex and changeable geological environment in the drilling makes lithology identification face ... Real-time intelligent lithology identification while drilling is vital to realizing downhole closed-loop drilling. The complex and changeable geological environment in the drilling makes lithology identification face many challenges. This paper studies the problems of difficult feature information extraction,low precision of thin-layer identification and limited applicability of the model in intelligent lithologic identification. The author tries to improve the comprehensive performance of the lithology identification model from three aspects: data feature extraction, class balance, and model design. A new real-time intelligent lithology identification model of dynamic felling strategy weighted random forest algorithm(DFW-RF) is proposed. According to the feature selection results, gamma ray and 2 MHz phase resistivity are the logging while drilling(LWD) parameters that significantly influence lithology identification. The comprehensive performance of the DFW-RF lithology identification model has been verified in the application of 3 wells in different areas. By comparing the prediction results of five typical lithology identification algorithms, the DFW-RF model has a higher lithology identification accuracy rate and F1 score. This model improves the identification accuracy of thin-layer lithology and is effective and feasible in different geological environments. The DFW-RF model plays a truly efficient role in the realtime intelligent identification of lithologic information in closed-loop drilling and has greater applicability, which is worthy of being widely used in logging interpretation. 展开更多
关键词 Intelligent drilling Closed-loop drilling Lithology identification Random forest algorithm Feature extraction
下载PDF
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches
15
作者 Jungpil Shin Md.AlMehedi Hasan +2 位作者 Md.Maniruzzaman Taiki Watanabe Issei Jozume 《Computers, Materials & Continua》 SCIE EI 2024年第4期1205-1222,共18页
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f... Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security. 展开更多
关键词 Person identification leap motion hand gesture random forest support vector machine
下载PDF
A Transient-Pressure-Based Numerical Approach for Interlayer Identification in Sand Reservoirs
16
作者 Hao Luo Haibo Deng +4 位作者 Honglin Xiao Shaoyang Geng Fu Hou Gang Luo Yaqi Li 《Fluid Dynamics & Materials Processing》 EI 2024年第3期641-659,共19页
Almost all sandstone reservoirs contain interlayers. The identification and characterization of these interlayers iscritical for minimizing the uncertainty associated with oilfield development and improving oil and ga... Almost all sandstone reservoirs contain interlayers. The identification and characterization of these interlayers iscritical for minimizing the uncertainty associated with oilfield development and improving oil and gas recovery.Identifying interlayers outside wells using identification methods based on logging data and machine learning isdifficult and seismic-based identification techniques are expensive. Herein, a numerical model based on seepageand well-testing theories is introduced to identify interlayers using transient pressure data. The proposed modelrelies on the open-source MATLAB Reservoir Simulation Toolbox. The effects of the interlayer thickness, position,and width on the pressure response are thoroughly investigated. A procedure for inverting interlayer parametersin the reservoir using the bottom-hole pressure is also proposed. This method uses only transient pressuredata during well testing and can effectively identify the interlayer distribution near the wellbore at an extremelylow cost. The reliability of the model is verified using effective oilfield examples. 展开更多
关键词 Sand reservoir interlayer identification transient pressure analysis numerical well test
下载PDF
Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification
17
作者 Qinyue Wu Hui Xu Mengran Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4091-4107,共17页
Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexi... Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification. 展开更多
关键词 Network security network traffic identification data analytics feature selection dung beetle optimizer
下载PDF
Application of Next Generation Sequencing for Rapid Identification of Lactic Acid Bacteria
18
作者 Xiaxia HOU Yunxia WANG +2 位作者 Shuhuan ZHAO Hongbing JIA Cuizhi LI 《Asian Agricultural Research》 2024年第4期27-32,共6页
The rapid identification of lactic acid bacteria,which are essential microorganisms in the food industry,is of great significance for industrial applications.The identification of lactic acid bacteria traditionally re... The rapid identification of lactic acid bacteria,which are essential microorganisms in the food industry,is of great significance for industrial applications.The identification of lactic acid bacteria traditionally relies on the isolation and identification of pure colonies.While this method is well-established and widely used,it is not without limitations.The subjective judgment inherent in the isolation and purification process introduces potential for error,and the incomplete nature of the isolation process can result in the loss of valuable information.The advent of next generation sequencing has provided a novel approach to the rapid identification of lactic acid bacteria.This technology offers several advantages,including rapidity,accuracy,high throughput,and low cost.Next generation sequencing represents a significant advancement in the field of DNA sequencing.Its ability to rapidly and accurately identify lactic acid bacteria strains in samples with insufficient information or in the presence of multiple lactic acid bacteria sets it apart as a valuable tool.The application of this technology not only circumvents the potential errors inherent in the traditional method but also provides a robust foundation for the expeditious identification of lactic acid bacteria strains and the authentication of bacterial powder in industrial applications.This paper commences with an overview of traditional and molecular biology methods for the identification of lactic acid bacteria.While each method has its own advantages,they are not without limitations in practical application.Subsequently,the paper provides an introduction of the principle,process,advantages,and disadvantages of next generation sequencing,and also details its application in strain identification and rapid identification of lactic acid bacteria.The objective of this study is to provide a comprehensive and reliable basis for the rapid identification of industrial lactic acid bacteria strains and the authenticity identification of bacterial powder. 展开更多
关键词 LACTIC ACID BACTERIA RAPID identification NEXT generation SEQUENCING
下载PDF
Understanding the Global Identification with China’s Stories: A Cross-Cultural Perspective
19
作者 Fu Chun Deng Da 《Contemporary Social Sciences》 2024年第1期46-57,共12页
Cross-cultural storytelling is a primary way for humankind to seek mutual recognition of value orientations between cultures,which facilitates the ability to jointly address the problems of human existence in the cont... Cross-cultural storytelling is a primary way for humankind to seek mutual recognition of value orientations between cultures,which facilitates the ability to jointly address the problems of human existence in the context of globalization.In this study,we conducted an interview survey of 6,130 respondents who were college students or graduates from 107 countries.The results show that there were a number of cross-cultural values embodied in China’s stories seen by the respondents as part of a common vision for the future of humankind and widely identified guidance on collaborative responses to global challenges.These cross-cultural values are common prosperity,ecological harmony,individual-collective integration,the urgency of global peace,as well as respect for multicultural and indigenous development paths. 展开更多
关键词 China’s stories global identification cross-cultural communication
下载PDF
Identification of Lubricating Oil Additives Using XGBoost and Ant Colony Optimization Algorithms
20
作者 Xia Yanqiu Cui Jinwei +2 位作者 Xie Peiyuan Zou Shaode Feng Xin 《China Petroleum Processing & Petrochemical Technology》 SCIE CAS CSCD 2024年第2期158-167,共10页
To address the problem of identifying multiple types of additives in lubricating oil,a method based on midinfrared spectral band selection using the eXtreme Gradient Boosting(XGBoost)algorithm combined with the ant co... To address the problem of identifying multiple types of additives in lubricating oil,a method based on midinfrared spectral band selection using the eXtreme Gradient Boosting(XGBoost)algorithm combined with the ant colony optimization(ACO)algorithm is proposed.The XGBoost algorithm was used to train and test three additives,T534(alkyl diphenylamine),T308(isooctyl acid thiophospholipid octadecylamine),and T306(trimethylphenol phosphate),separately,in order to screen for the optimal combination of spectral bands for each additive.The ACO algorithm was used to optimize the parameters of the XGBoost algorithm to improve the identification accuracy.During this process,the support vector machine(SVM)and hybrid bat algorithms(HBA)were included as a comparison,generating four models:ACO-XGBoost,ACO-SVM,HBA-XGboost,and HBA-SVM.The results showed that all four models could identify the three additives efficiently,with the ACO-XGBoost model achieving 100%recognition of all three additives.In addition,the generalizability of the ACO-XGBoost model was further demonstrated by predicting a lubricating oil containing the three additives prepared in our laboratory and a collected sample of commercial oil currently in use。 展开更多
关键词 lubricant oil additives fourier transform infrared spectroscopy type identification ACO-XGBoost combinatorial algorithm
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部