期刊文献+
共找到519,502篇文章
< 1 2 250 >
每页显示 20 50 100
Application of Key Technologies in Green School Buildings: Taking Sino-German Future City Primary School as an Example
1
作者 Yang Liu Dong Huang +2 位作者 Chunhua Yang Jian Zhou Yunda Tang 《Journal of World Architecture》 2024年第3期36-42,共7页
Green building is a manifestation of the response to the national“dual carbon”strategy.With the large-scale promotion of green buildings,the country has successively issued multiple evaluation standards for green bu... Green building is a manifestation of the response to the national“dual carbon”strategy.With the large-scale promotion of green buildings,the country has successively issued multiple evaluation standards for green buildings.Schools are places for preaching,teaching,and solving doubts,and the campus environment plays an important role in improving students’learning efficiency and promoting their physical and mental health.This article is based on the“Green Building Evaluation Standards”GB/T 50378-2019,analyzing and exploring the integration and application of key technologies in green schools,providing reference for green building designers. 展开更多
关键词 Green buildings Energy conservation and environmental protection key technologies High-quality buildings
下载PDF
Dual carbon goal and agriculture in China:Exploring key factors influencing farmers’behavior in adopting low carbon technologies
2
作者 Jinpeng Zou Lulin Shen +2 位作者 Fang Wang Hong Tang Ziyang Zhou 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第9期3215-3233,共19页
Identifying the factors influencing farmers’adoption of low-carbon technologies(FA)and understanding their impacts are essential for shaping effective agricultural policies amied at emission reduction and carbon sequ... Identifying the factors influencing farmers’adoption of low-carbon technologies(FA)and understanding their impacts are essential for shaping effective agricultural policies amied at emission reduction and carbon sequestration in China.This study employs a meta-analysis of 122 empirical studies,delves into 23 driving factors affecting FA and addresses the inconsistencies present in the existing literature.We systematically examine the effect size,source of heterogeneity,and time-accumulation effect of the driving factors on FA.We find that significant heterogeneity in the factors influencing FA,except for farming experience,sources of heterogeneity from the survey zone,methodology model,technological attributes,report source,financial support,and the sampling year.Additionally,age,farming experience,and adoption cost negatively correlate with FA.In contrast,educational level,health status,technical training,economic and welfare cognition,land contract,soil quality,terrain,information accessibility,demonstration,government promotion,government regulation,government support,agricultural cooperatives member,peer effect,and agricultural income ratio demonstrate a positive correlation.Especially,demonstration and age show a particularly strong correlation.Finally,the effect of demonstration,age,economic and welfare cognition,farming experience,land contract,soil quality,information accessibility,government promotion,and support,as well as agricultural cooperative membership and peer effects on FA,are generally stable but exhibit varying degrees of attenuation over time.The effect of village cadre,family income,farm scale,gender,health status,technical training,and off-farm work on FA show notable temporal shifts and maintain a weak correlation with FA.This study contributes to shaping China’s current low-carbon agriculture policies across various regions.It encourages policymakers to comprehensively consider the stability of key factors,other potential factors,technological attributes,rural socio-economic context,and their interrelations. 展开更多
关键词 FARMERS influencing factors low-carbon technology adoption META-ANALYSIS
下载PDF
Technical development of operational in-situ marine monitoring and research on its key generic technologies in China 被引量:1
3
作者 Yunzhou Li Juncheng Wang 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2023年第10期117-126,共10页
In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications su... In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications such as forecast of marine environment,prevention and mitigation of disaster,exploitation of marine resources,marine environmental protection,and management of transportation safety.In this paper,we summarise the composition,development courses,and present operational status of three systems of operational in-situ marine monitoring,namely coastal marine automated network station,ocean data buoy and voluntary observing ship measuring and reporting system.Additionally,we discuss the technical development in these in-situ systems and achievements in the key generic technologies along with future development trends. 展开更多
关键词 marine observation technology operational in-situ marine monitoring C-MAN station ocean data buoy VOS measuring and reporting system achievements in the key technologies development trend
下载PDF
Key technologies and applications of intelligent dispatching command for high-speed railway in China 被引量:1
4
作者 Shuxin Ding Tao Zhang +2 位作者 Kai Sheng Yuanyuan Chen Zhiming Yuan 《Railway Sciences》 2023年第3期336-346,共11页
Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new... Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods. 展开更多
关键词 High-speed railway Intelligent dispatching command Intelligent centralized traffic control key technologies and application
下载PDF
Exploration on Key Technologies and Practical Paths for Carbon Emission Reduction in Food System
5
作者 Zhenzhong BAI Yunhao LU Hongling WANG 《Agricultural Biotechnology》 CAS 2023年第2期96-104,共9页
On the basis of existing research,carbon emission reduction technologies in production,processing,packaging,transportation and storage of the food system were summarized,and their application effects were analyzed.In ... On the basis of existing research,carbon emission reduction technologies in production,processing,packaging,transportation and storage of the food system were summarized,and their application effects were analyzed.In view of the inherent inadequacy of carbon emission reduction technologies in Chinese food system,starting from carbon labeling technologies and ESG system of the food industry,the unsoundness of the carbon emission reduction evaluation system and the high cost of related technology promotion,countermeasures such as strengthening top-level design,encouraging and supporting the development of new carbon emission reduction technologies,and improving carbon emission reduction technology subsidies were proposed by drawing on domestic and international experiences. 展开更多
关键词 Food system Carbon emission reduction key technology Practice path
下载PDF
International experience of carbon neutrality and prospects of key technologies:Lessons for China 被引量:6
6
作者 Zheng-Meng Hou Ying Xiong +9 位作者 Jia-Shun Luo Yan-Li Fang Muhammad Haris Qian-Jun Chen Ye Yue Lin Wu Qi-Chen Wang Liang-Chao Huang Yi-Lin Guo Ya-Chen Xie 《Petroleum Science》 SCIE EI CAS CSCD 2023年第2期893-909,共17页
Carbon neutrality(or climate neutrality)has been a global consensus,and international experience exchange is essential.Given the differences in the degree of social development,resource endowment and technological lev... Carbon neutrality(or climate neutrality)has been a global consensus,and international experience exchange is essential.Given the differences in the degree of social development,resource endowment and technological level,each country should build a carbon-neutral plan based on its national conditions.Compared with other major developed countries(e.g.,Germany,the United States and Japan),China's carbon neutrality has much bigger challenges,including a heavy and time-pressured carbon reduction task and the current energy structure that is over-dependent on fossil fuels.Here we provide a comprehensive review of the status and prospects of the key technologies for low-carbon,near-zero carbon,and negative carbon emissions.Technological innovations associated with coal,oil-gas and hydrogen industries and their future potential in reducing carbon emissions are particularly explained and assessed.Based on integrated analysis of international experience from the world's major developed countries,in-depth knowledge of the current and future technologies,and China's energy and ecological resources potential,five lessons for the implementation of China's carbon neutrality are proposed:(1)transformation of energy production pattern from a coal-dominated pattern to a diversified renewable energy pattern;(2)renewable power-to-X and large-scale underground energy storage;(3)integration of green hydrogen production,storage,transport and utilization;(4)construction of clean energy systems based on smart sector coupling(ENSYSCO);(5)improvement of ecosystem carbon sinks both in nationwide forest land and potential desert in Northwest China.This paper provides an international perspective for a better understanding of the challenges and opportunities of carbon neutrality in China,and can serve as a theoretical foundation for medium-long term carbon neutral policy formulation. 展开更多
关键词 International experience Carbon reduction technologies Carbon neutrality Energy transition Underground energy storage Carbon capture utilization and storage(CCUS)
下载PDF
Preface to Special Issue on Advanced Optoelectronic and Electronic Devices toward Future Displays--Celebration of the 10th anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies at HKUST
7
作者 Hoi-Sing Kwok Zhiyong Fan 《Journal of Semiconductors》 EI CAS CSCD 2023年第9期1-2,共2页
This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT w... This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT was the Center for Display Research(CDR)which was started in 1995.Thus display research has a long history at HKUST. 展开更多
关键词 ADO key UST
下载PDF
A new quantum key distribution resource allocation and routing optimization scheme
8
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
A Review of the Research on the Influencing Factors of Enterprise Key Core Technology Breakthrough
9
作者 Liangcan Liu Yuexian Zou 《Proceedings of Business and Economic Studies》 2024年第4期125-129,共5页
The breakthrough of key core technology is a theoretical and practical strategic issue to realize the rise of the country.This paper analyzes the concept of key core technology and its breakthrough and analyzes its ch... The breakthrough of key core technology is a theoretical and practical strategic issue to realize the rise of the country.This paper analyzes the concept of key core technology and its breakthrough and analyzes its characteristics.Based on the perspective of participants,this paper summarizes the influencing factors of key core technology breakthroughs in enterprises:internal and external enterprises,universities and scientific research institutions,and government.This paper expands the relevant research on key core technology breakthroughs and provides inspiration for enterprises to carry out key core technology research and breakthrough practices. 展开更多
关键词 key core technology breakthrough Concept discrimination Technical features Influencing factors
下载PDF
Security analysis of satellite-to-ground reference-frame-independent quantum key distribution with beam wandering
10
作者 周淳 赵燕美 +11 位作者 杨晓亮 陆宜飞 周雨 姜晓磊 汪海涛 汪洋 李家骥 江木生 汪翔 张海龙 李宏伟 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期192-201,共10页
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance... The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks. 展开更多
关键词 quantum key distribution satellite-to-ground beam wandering
下载PDF
Reference-frame-independent quantum key distribution with two-way classical communication
11
作者 Chun Zhou Hai-Tao Wang +9 位作者 Yi-Fei Lu Xiao-Lei Jiang Yan-Mei Zhao Yu Zhou Yang Wang Jia-Ji Li Yan-Yang Zhou Xiang Wang Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期146-152,共7页
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In... The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest. 展开更多
关键词 quantum key distribution reference-frame-independent two-way classical communication
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
12
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
13
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
14
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 key nodes dynamic model industrial control network SIMULATION
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
15
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Physical-Layer Secret Key Generation for Dual-Task Scenarios
16
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
Elucidation of potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa
17
作者 Mingming Li Qiujin Zhu +4 位作者 Chao Qu Xiaohui Gong Yunhan Zhang Xin Zhang Shouwei Wang 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第4期2152-2160,共9页
Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.T... Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal. 展开更多
关键词 Dry-cured pork coppa Endogenous proteases PROTEOLYSIS key taste-active amino acids Volatile compounds
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
18
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
Coupling effect on the thermal hazard assessment of hazardous chemical materials via calorimetric technologies and simulation approaches
19
作者 Yabei Xu Jiankun Shao +2 位作者 Wei Wang Shengliang Xu Dongping Chen 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期644-654,共11页
The coupling effect of heat absorption and release exists in the thermal decomposition of a few chemical materials.However,the impact of the above coupling on thermal hazard assessment is not considered in the literat... The coupling effect of heat absorption and release exists in the thermal decomposition of a few chemical materials.However,the impact of the above coupling on thermal hazard assessment is not considered in the literature studies.In this work,nitroguanidine(NQ)and 1,3,5-trinitro-1,3,5-triazine(RDX)are selected as representative materials to explore the influence of the coupling effect on the thermal hazard assessment of chemical materials.The linear heating experiments of NQ and RDX are carried out by a microcalorimeter and synchronous thermal analyser.The thermal decomposition curves are decoupled by advanced thermokinetics software.The thermal decomposition and kinetic parameters before and after decoupling are calculated.The results of TG experiment show that both NQ and RDX began to lose mass during the endothermic stage.The endothermic melting and exothermic decomposition of NQ and RDX are coupled within this stage.The coupling effect has different degrees of influence on its initial decomposition temperature and safety parameters.Compared with the parameters in the coupling state,the initial decomposition temperature and adiabatic induction period after decoupling decrease.The self-accelerating decomposition temperature increases,and internal thermal runaway time decreases.In the thermal hazard assessment of chemical materials with coupling effects,the calculated parameters after decoupling should be taken as an important safety index。 展开更多
关键词 Calorimetric technologies KINETICS Thermal hazard Phase transformation Thermal decomposition
下载PDF
Enabling Technologies for Autonomous Robotic Systems in Manufacturing
20
作者 ERDŐS Gábor ABAI Kristóf +17 位作者 BEREGI Richárd CSEMPESZ János CSERTEG Tamás GODÓGábor HAJÓS Mátyás HÁY Borbála HORVÁTH Dániel HORVÁTH Gergely JUNIKIÁdám KEMÉNY Zsolt KOVÁCS András NACSA János PANITI Imre PEDONE Gianfranco TAKÁCS Emma TIPARY Bence ZAHORÁN László VÁNCZA József 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2024年第4期403-431,共29页
Research of autonomous manufacturing systems is motivated both by the new technical possibilities of cyber-physical systems and by the practical needs of the industry.Autonomous operation in semi-structured industrial... Research of autonomous manufacturing systems is motivated both by the new technical possibilities of cyber-physical systems and by the practical needs of the industry.Autonomous operation in semi-structured industrial environments can now be supported by advanced sensor technologies,digital twins,artificial intelligence and novel communication techniques.These enable real-time monitoring of production processes,situation recognition and prediction,automated and adaptive(re)planning,teamwork and performance improvement by learning.This paper summarizes the main requirements towards autonomous industrial robotics and suggests a generic workflow for realizing such systems.Application case studies will be presented from recent practice at HUN-REN SZTAKI in a broad range of domains such as assembly,welding,grinding,picking and placing,and machining.The various solutions have in common that they use a generic digital twin concept as their core.After making general recommendations for realizing autonomous robotic solutions in the industry,open issues for future research will be discussed. 展开更多
关键词 industrial robotics AUTONOMY digital twin enabling technology
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部