期刊文献+
共找到19,559篇文章
< 1 2 250 >
每页显示 20 50 100
Guest Editorial:Special issue on advances in representation learning for computer vision
1
作者 Andrew Beng Jin Teoh Thian Song Ong +1 位作者 Kian Ming Lim Chin Poo Lee 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期1-3,共3页
Deep learning has been a catalyst for a transformative revo-lution in machine learning and computer vision in the past decade.Within these research domains,methods grounded in deep learning have exhibited exceptional ... Deep learning has been a catalyst for a transformative revo-lution in machine learning and computer vision in the past decade.Within these research domains,methods grounded in deep learning have exhibited exceptional performance across a spectrum of tasks.The success of deep learning methods can be attributed to their capability to derive potent representations from data,integral for a myriad of downstream applications.These representations encapsulate the intrinsic structure,fea-tures,or latent variables characterising the underlying statistics of visual data.Despite these achievements,the challenge per-sists in effectively conducting representation learning of visual data with deep models,particularly when confronted with vast and noisy datasets.This special issue is a dedicated platform for researchers worldwide to disseminate their latest,high-quality articles,aiming to enhance readers'comprehension of the principles,limitations,and diverse applications of repre-sentation learning in computer vision. 展开更多
关键词 SPITE computer representation
下载PDF
IndRT-GCNets: Knowledge Reasoning with Independent Recurrent Temporal Graph Convolutional Representations
2
作者 Yajing Ma Gulila Altenbek Yingxia Yu 《Computers, Materials & Continua》 SCIE EI 2024年第1期695-712,共18页
Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events,we propose an Independent Recurr... Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events,we propose an Independent Recurrent Temporal Graph Convolution Networks(IndRT-GCNets)framework to efficiently and accurately capture event attribute information.The framework models the knowledge graph sequences to learn the evolutionary represen-tations of entities and relations within each period.Firstly,by utilizing the temporal graph convolution module in the evolutionary representation unit,the framework captures the structural dependency relationships within the knowledge graph in each period.Meanwhile,to achieve better event representation and establish effective correlations,an independent recurrent neural network is employed to implement auto-regressive modeling.Furthermore,static attributes of entities in the entity-relation events are constrained andmerged using a static graph constraint to obtain optimal entity representations.Finally,the evolution of entity and relation representations is utilized to predict events in the next subsequent step.On multiple real-world datasets such as Freebase13(FB13),Freebase 15k(FB15K),WordNet11(WN11),WordNet18(WN18),FB15K-237,WN18RR,YAGO3-10,and Nell-995,the results of multiple evaluation indicators show that our proposed IndRT-GCNets framework outperforms most existing models on knowledge reasoning tasks,which validates the effectiveness and robustness. 展开更多
关键词 Knowledge reasoning entity and relation representation structural dependency relationship evolutionary representation temporal graph convolution
下载PDF
C-CORE:Clustering by Code Representation to Prioritize Test Cases in Compiler Testing
3
作者 Wei Zhou Xincong Jiang Chuan Qin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2069-2093,共25页
Edge devices,due to their limited computational and storage resources,often require the use of compilers for program optimization.Therefore,ensuring the security and reliability of these compilers is of paramount impo... Edge devices,due to their limited computational and storage resources,often require the use of compilers for program optimization.Therefore,ensuring the security and reliability of these compilers is of paramount importance in the emerging field of edge AI.One widely used testing method for this purpose is fuzz testing,which detects bugs by inputting random test cases into the target program.However,this process consumes significant time and resources.To improve the efficiency of compiler fuzz testing,it is common practice to utilize test case prioritization techniques.Some researchers use machine learning to predict the code coverage of test cases,aiming to maximize the test capability for the target compiler by increasing the overall predicted coverage of the test cases.Nevertheless,these methods can only forecast the code coverage of the compiler at a specific optimization level,potentially missing many optimization-related bugs.In this paper,we introduce C-CORE(short for Clustering by Code Representation),the first framework to prioritize test cases according to their code representations,which are derived directly from the source codes.This approach avoids being limited to specific compiler states and extends to a broader range of compiler bugs.Specifically,we first train a scaled pre-trained programming language model to capture as many common features as possible from the test cases generated by a fuzzer.Using this pre-trained model,we then train two downstream models:one for predicting the likelihood of triggering a bug and another for identifying code representations associated with bugs.Subsequently,we cluster the test cases according to their code representations and select the highest-scoring test case from each cluster as the high-quality test case.This reduction in redundant testing cases leads to time savings.Comprehensive evaluation results reveal that code representations are better at distinguishing test capabilities,and C-CORE significantly enhances testing efficiency.Across four datasets,C-CORE increases the average of the percentage of faults detected(APFD)value by 0.16 to 0.31 and reduces test time by over 50% in 46% of cases.When compared to the best results from approaches using predicted code coverage,C-CORE improves the APFD value by 1.1% to 12.3% and achieves an overall time-saving of 159.1%. 展开更多
关键词 Compiler testing test case prioritization code representation
下载PDF
Sparse representation scheme with enhanced medium pixel intensity for face recognition
4
作者 Xuexue Zhang Yongjun Zhang +3 位作者 Zewei Wang Wei Long Weihao Gao Bob Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期116-127,共12页
Sparse representation is an effective data classification algorithm that depends on the known training samples to categorise the test sample.It has been widely used in various image classification tasks.Sparseness in ... Sparse representation is an effective data classification algorithm that depends on the known training samples to categorise the test sample.It has been widely used in various image classification tasks.Sparseness in sparse representation means that only a few of instances selected from all training samples can effectively convey the essential class-specific information of the test sample,which is very important for classification.For deformable images such as human faces,pixels at the same location of different images of the same subject usually have different intensities.Therefore,extracting features and correctly classifying such deformable objects is very hard.Moreover,the lighting,attitude and occlusion cause more difficulty.Considering the problems and challenges listed above,a novel image representation and classification algorithm is proposed.First,the authors’algorithm generates virtual samples by a non-linear variation method.This method can effectively extract the low-frequency information of space-domain features of the original image,which is very useful for representing deformable objects.The combination of the original and virtual samples is more beneficial to improve the clas-sification performance and robustness of the algorithm.Thereby,the authors’algorithm calculates the expression coefficients of the original and virtual samples separately using the sparse representation principle and obtains the final score by a designed efficient score fusion scheme.The weighting coefficients in the score fusion scheme are set entirely automatically.Finally,the algorithm classifies the samples based on the final scores.The experimental results show that our method performs better classification than conventional sparse representation algorithms. 展开更多
关键词 computer vision face recognition image classification image representation
下载PDF
HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning
5
作者 Zhihui Song Jinchen Xu +1 位作者 Kewei Li Zheng Shan 《Computers, Materials & Continua》 SCIE EI 2024年第6期4573-4601,共29页
Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representation... Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representations.However,due to limitations in code representation and neural network design,the validity and practicality of the model still need to be improved.Additionally,due to differences in programming languages,most methods lack cross-language detection generality.To address these issues,in this paper,we analyze the shortcomings of previous code representations and neural networks.We propose a novel hierarchical code representation that combines Concrete Syntax Trees(CST)with Program Dependence Graphs(PDG).Furthermore,we introduce a Tree-Graph-Gated-Attention(TGGA)network based on gated recurrent units and attention mechanisms to build a Hierarchical Code Representation learning-based Vulnerability Detection(HCRVD)system.This system enables cross-language vulnerability detection at the function-level.The experiments show that HCRVD surpasses many competitors in vulnerability detection capabilities.It benefits from the hierarchical code representation learning method,and outperforms baseline in cross-language vulnerability detection by 9.772%and 11.819%in the C/C++and Java datasets,respectively.Moreover,HCRVD has certain ability to detect vulnerabilities in unknown programming languages and is useful in real open-source projects.HCRVD shows good validity,generality and practicality. 展开更多
关键词 Vulnerability detection deep learning CST-PDG code representation tree-graph-gated-attention network CROSS-LANGUAGE
下载PDF
A multi-scale second-order autoregressive recursive filter approach for the sea ice concentration analysis
6
作者 Lu Yang Xuefeng Zhang 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2024年第3期115-126,共12页
To effectively extract multi-scale information from observation data and improve computational efficiency,a multi-scale second-order autoregressive recursive filter(MSRF)method is designed.The second-order autoregress... To effectively extract multi-scale information from observation data and improve computational efficiency,a multi-scale second-order autoregressive recursive filter(MSRF)method is designed.The second-order autoregressive filter used in this study has been attempted to replace the traditional first-order recursive filter used in spatial multi-scale recursive filter(SMRF)method.The experimental results indicate that the MSRF scheme successfully extracts various scale information resolved by observations.Moreover,compared with the SMRF scheme,the MSRF scheme improves computational accuracy and efficiency to some extent.The MSRF scheme can not only propagate to a longer distance without the attenuation of innovation,but also reduce the mean absolute deviation between the reconstructed sea ice concentration results and observations reduced by about 3.2%compared to the SMRF scheme.On the other hand,compared with traditional first-order recursive filters using in the SMRF scheme that multiple filters are executed,the MSRF scheme only needs to perform two filter processes in one iteration,greatly improving filtering efficiency.In the two-dimensional experiment of sea ice concentration,the calculation time of the MSRF scheme is only 1/7 of that of SMRF scheme.This means that the MSRF scheme can achieve better performance with less computational cost,which is of great significance for further application in real-time ocean or sea ice data assimilation systems in the future. 展开更多
关键词 second-order auto-regressive filter multi-scale recursive filter sea ice concentration three-dimensional variational data assimilation
下载PDF
Systematic Method for Constructing Lewis Representations
7
作者 Lahbib Abbas Lahcen Bih +3 位作者 Khalid Yamni Abderrahim Elyahyaouy Abdelmalik El Attaoui Zahra Ramzi 《Open Journal of Inorganic Chemistry》 2024年第1期1-18,共18页
The systematic method for constructing Lewis representations is a method for representing chemical bonds between atoms in a molecule. It uses symbols to represent the valence electrons of the atoms involved in the bon... The systematic method for constructing Lewis representations is a method for representing chemical bonds between atoms in a molecule. It uses symbols to represent the valence electrons of the atoms involved in the bond. Using a number of rules in a defined order, it is often better suited to complicated cases than the Lewis representation of atoms. This method allows us to determine the formal charge and oxidation number of each atom in the edifice more efficiently than other methods. 展开更多
关键词 Systematic Method Lewis representation Chemical Bond Formal Charge Oxidation Number
下载PDF
THE SPARSE REPRESENTATION RELATED WITH FRACTIONAL HEAT EQUATIONS
8
作者 曲伟 钱涛 +1 位作者 梁应德 李澎涛 《Acta Mathematica Scientia》 SCIE CSCD 2024年第2期567-582,共16页
This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli an... This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli and Silvestre(generalized Poisson equation).As a first step,the method expands the initial data function into a sparse series of the fundamental solutions with fast convergence,and,as a second step,makes use of the semigroup or the reproducing kernel property of each of the expanding entries.Experiments show the effectiveness and efficiency of the proposed series solutions. 展开更多
关键词 reproducing kernel Hilbert space DICTIONARY sparse representation approximation to the identity fractional heat equations
下载PDF
Examining Zhang Peiji’s Translation of Beiying:A Study on the Representation of Zhu Ziqing’s Linguistic Style
9
作者 Chen Liang Kou Zeyu Lu Silin 《Contemporary Social Sciences》 2024年第4期143-155,共13页
Based on Yan Fu’s translation norms of“faithfulness,expressiveness,and elegance”and Liu Miqing’s concept of aesthetic representation in translation,the present study employed a combined method of qualitative and q... Based on Yan Fu’s translation norms of“faithfulness,expressiveness,and elegance”and Liu Miqing’s concept of aesthetic representation in translation,the present study employed a combined method of qualitative and quantitative analysis to investigate the linguistic styles employed by Zhu Ziqing in his renowned prose Beiying.Then,using relevant corpora and self-designed Python software,we investigated whether Zhang Peiji,as a translator,has successfully reproduced the simplistic,emotional,and realistic linguistic characteristics in Zhu Ziqing’s prose from the perspectives of“faithfulness,expressiveness,and elegance.”The findings of the research indicate that by employing a dynamic imitative translation approach,Zhang Peiji has successfully enhanced the linguistic aesthetic qualities of the source text,striving to reflect the distinctive linguistic style of Zhu Ziqing. 展开更多
关键词 Beiying Zhu Ziqing representation of linguistic style
下载PDF
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
10
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Wigner function of optical cumulant operator and its dissipation in thermo-entangled state representation
11
作者 张科 李兰兰 范洪义 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期205-210,共6页
To conveniently calculate the Wigner function of the optical cumulant operator and its dissipation evolution in a thermal environment, in this paper, the thermo-entangled state representation is introduced to derive t... To conveniently calculate the Wigner function of the optical cumulant operator and its dissipation evolution in a thermal environment, in this paper, the thermo-entangled state representation is introduced to derive the general evolution formula of the Wigner function, and its relation to Weyl correspondence is also discussed. The method of integration within the ordered product of operators is essential to our discussion. 展开更多
关键词 Wigner function optical cumulant operator dissipation evolution thermo-entangled state representation integration within ordered product of operators
下载PDF
Localization in modified polar representation: hybrid measurements and closed-form solution
12
作者 CONG Xunchao SUN Yimao +2 位作者 YANG Yanbing ZHANG Lei CHEN Liangyin 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第3期575-588,共14页
Classical localization methods use Cartesian or Polar coordinates, which require a priori range information to determine whether to estimate position or to only find bearings. The modified polar representation (MPR) u... Classical localization methods use Cartesian or Polar coordinates, which require a priori range information to determine whether to estimate position or to only find bearings. The modified polar representation (MPR) unifies near-field and farfield models, alleviating the thresholding effect. Current localization methods in MPR based on the angle of arrival (AOA) and time difference of arrival (TDOA) measurements resort to semidefinite relaxation (SDR) and Gauss-Newton iteration, which are computationally complex and face the possible diverge problem. This paper formulates a pseudo linear equation between the measurements and the unknown MPR position,which leads to a closed-form solution for the hybrid TDOA-AOA localization problem, namely hybrid constrained optimization(HCO). HCO attains Cramér-Rao bound (CRB)-level accuracy for mild Gaussian noise. Compared with the existing closed-form solutions for the hybrid TDOA-AOA case, HCO provides comparable performance to the hybrid generalized trust region subproblem (HGTRS) solution and is better than the hybrid successive unconstrained minimization (HSUM) solution in large noise region. Its computational complexity is lower than that of HGTRS. Simulations validate the performance of HCO achieves the CRB that the maximum likelihood estimator (MLE) attains if the noise is small, but the MLE deviates from CRB earlier. 展开更多
关键词 LOCALIZATION modified polar representation time difference of arrival(TDOA) angle of arrival(AOA) closed-form solution
下载PDF
Closing the Gap: Boosting Women’s Representation in Cybersecurity Leadership
13
作者 Yasser Asiry 《Journal of Information Security》 2024年第1期15-23,共9页
The research consistently highlights the gender disparity in cybersecurity leadership roles, necessitating targeted interventions. Biased recruitment practices, limited STEM education opportunities for girls, and work... The research consistently highlights the gender disparity in cybersecurity leadership roles, necessitating targeted interventions. Biased recruitment practices, limited STEM education opportunities for girls, and workplace culture contribute to this gap. Proposed solutions include addressing biased recruitment through gender-neutral language and blind processes, promoting STEM education for girls to increase qualified female candidates, and fostering inclusive workplace cultures with mentorship and sponsorship programs. Gender parity is crucial for the industry’s success, as embracing diversity enables the cybersecurity sector to leverage various perspectives, drive innovation, and effectively combat cyber threats. Achieving this balance is not just about fairness but also a strategic imperative. By embracing concerted efforts towards gender parity, we can create a more resilient and impactful cybersecurity landscape, benefiting industry and society. 展开更多
关键词 CYBERSECURITY Workforce LEADERSHIP GENDER GAP Women representation
下载PDF
GNN Representation Learning and Multi-Objective Variable Neighborhood Search Algorithm for Wind Farm Layout Optimization
14
作者 Yingchao Li JianbinWang HaibinWang 《Energy Engineering》 EI 2024年第4期1049-1065,共17页
With the increasing demand for electrical services,wind farm layout optimization has been one of the biggest challenges that we have to deal with.Despite the promising performance of the heuristic algorithm on the rou... With the increasing demand for electrical services,wind farm layout optimization has been one of the biggest challenges that we have to deal with.Despite the promising performance of the heuristic algorithm on the route network design problem,the expressive capability and search performance of the algorithm on multi-objective problems remain unexplored.In this paper,the wind farm layout optimization problem is defined.Then,a multi-objective algorithm based on Graph Neural Network(GNN)and Variable Neighborhood Search(VNS)algorithm is proposed.GNN provides the basis representations for the following search algorithm so that the expressiveness and search accuracy of the algorithm can be improved.The multi-objective VNS algorithm is put forward by combining it with the multi-objective optimization algorithm to solve the problem with multiple objectives.The proposed algorithm is applied to the 18-node simulation example to evaluate the feasibility and practicality of the developed optimization strategy.The experiment on the simulation example shows that the proposed algorithm yields a reduction of 6.1% in Point of Common Coupling(PCC)over the current state-of-the-art algorithm,which means that the proposed algorithm designs a layout that improves the quality of the power supply by 6.1%at the same cost.The ablation experiments show that the proposed algorithm improves the power quality by more than 8.6% and 7.8% compared to both the original VNS algorithm and the multi-objective VNS algorithm. 展开更多
关键词 GNN representation learning variable neighborhood search multi-objective optimization wind farm layout point of common coupling
下载PDF
The Convergence Rate of Fréchet Distribution under the Second-Order Regular Variation Condition
15
作者 Xilai Dai 《Journal of Applied Mathematics and Physics》 2024年第5期1597-1605,共9页
In this article we consider the asymptotic behavior of extreme distribution with the extreme value index γ>0 . The rates of uniform convergence for Fréchet distribution are constructed under the second-order ... In this article we consider the asymptotic behavior of extreme distribution with the extreme value index γ>0 . The rates of uniform convergence for Fréchet distribution are constructed under the second-order regular variation condition. 展开更多
关键词 Convergence Rate second-order Regular Variation Condition Fréchet Distribution Extreme Value Index
下载PDF
An elementary proof for the representation theorem of analytic isotropic tensor functions of a second-order tensor
16
作者 Tianbo WANG Dinglin YANG +1 位作者 Chen LI Diwei SHI 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2021年第5期747-754,共8页
Based on the Cayley-Hamilton theorem and fixed-point method,we provide an elementary proof for the representation theorem of analytic isotropic tensor functions of a second-order tensor in a three-dimensional(3D)inner... Based on the Cayley-Hamilton theorem and fixed-point method,we provide an elementary proof for the representation theorem of analytic isotropic tensor functions of a second-order tensor in a three-dimensional(3D)inner-product space,which avoids introducing the generating function and Taylor series expansion.The proof is also extended to any finite-dimensional inner-product space. 展开更多
关键词 representation theorem analytic tensor function fixed-point method
下载PDF
Application of improved virtual sample and sparse representation in face recognition 被引量:1
17
作者 Yongjun Zhang Zewei Wang +4 位作者 Xuexue Zhang Zhongwei Cui Bob Zhang Jinrong Cui Lamin LJanneh 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1391-1402,共12页
Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face ... Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face recognition,differences in expression,angle,posture,and lighting conditions have become key factors that affect recognition accuracy.Essentially,there may be significant differences between different image samples of the same face,which makes image classification very difficult.Therefore,how to build a robust virtual image representation becomes a vital issue.To solve the above problems,this paper proposes a novel image classification algorithm.First,to better retain the global features and contour information of the original sample,the algorithm uses an improved non‐linear image representation method to highlight the low‐intensity and high‐intensity pixels of the original training sample,thus generating a virtual sample.Second,by the principle of sparse representation,the linear expression coefficients of the original sample and the virtual sample can be calculated,respectively.After obtaining these two types of coefficients,calculate the distances between the original sample and the test sample and the distance between the virtual sample and the test sample.These two distances are converted into distance scores.Finally,a simple and effective weight fusion scheme is adopted to fuse the classification scores of the original image and the virtual image.The fused score will determine the final classification result.The experimental results show that the proposed method outperforms other typical sparse representation classification methods. 展开更多
关键词 representation SAMPLE IMAGE
下载PDF
Research on the influence of quadrupole deformation and continuum effects on the exotic properties of 15,17,19B with the complex momentum representation method 被引量:1
18
作者 Xue‑Neng Cao Xian‑Xian Zhou +1 位作者 Ming Fu Xin‑Xing Shi 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2023年第2期98-108,共11页
The properties of exotic nuclei are the focus of the present research.Two-neutron halo structures of neutron-rich17,19B were experimentally confirmed.We studied the formation mechanism of halo phenomena in17,19B using... The properties of exotic nuclei are the focus of the present research.Two-neutron halo structures of neutron-rich17,19B were experimentally confirmed.We studied the formation mechanism of halo phenomena in17,19B using the complex momentum representation method applied to deformation and continuum coupling.By examining the evolution of the weakly bound and resonant levels near the Fermi surface,s–d orbital reversals and certain prolate deformations were observed.In addition,by analyzing the evolution of the occupation probabilities and density distributions occupied by valence neutrons,we found that the ground state of15B did not exhibit a halo and the ground states of17B and19B exhibited halos at 0.6≤β2≤0.7 and0.3≤β2≤0.7,respectively.The low-l components in the valence levels that are weakly bound or embedded in the continuous spectrum lead to halo formation. 展开更多
关键词 Quadrupole deformation Resonant states Complex momentum representation HALO
下载PDF
Closed-form steady-state solutions for forced vibration of second-order axially moving systems
19
作者 Jingming FAN Bo CHEN Yinghui LI 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2023年第10期1701-1720,共20页
Second-order axially moving systems are common models in the field of dynamics, such as axially moving strings, cables, and belts. In the traditional research work, it is difficult to obtain closed-form solutions for ... Second-order axially moving systems are common models in the field of dynamics, such as axially moving strings, cables, and belts. In the traditional research work, it is difficult to obtain closed-form solutions for the forced vibration when the damping effect and the coupling effect of multiple second-order models are considered.In this paper, Green's function method based on the Laplace transform is used to obtain closed-form solutions for the forced vibration of second-order axially moving systems. By taking the axially moving damping string system and multi-string system connected by springs as examples, the detailed solution methods and the analytical Green's functions of these second-order systems are given. The mode functions and frequency equations are also obtained by the obtained Green's functions. The reliability and convenience of the results are verified by several examples. This paper provides a systematic analytical method for the dynamic analysis of second-order axially moving systems, and the obtained Green's functions are applicable to different second-order systems rather than just string systems. In addition, the work of this paper also has positive significance for the study on the forced vibration of high-order systems. 展开更多
关键词 Green's function axially moving system closed-form solution second-order model forced vibration Laplace transform
下载PDF
The complex momentum representation approach and its application to low‑lying resonances in 17 O and^(29,31)F
20
作者 Si‑Zhe Xu Shi‑Sheng Zhang +1 位作者 Xiao‑Qian Jiang Michael Scott Smith 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2023年第1期43-50,共8页
Approaches for predicting low-lying resonances,uniformly treating bound,and resonant levels have been a long-standing goal in nuclear theory.Accordingly,we explored the viability of the complex momentum representation... Approaches for predicting low-lying resonances,uniformly treating bound,and resonant levels have been a long-standing goal in nuclear theory.Accordingly,we explored the viability of the complex momentum representation(CMR)approach coupled with new potentials.We focus on predicting the energy of the low-lying 2p_(3∕2)resonance in 17 O,which is critical for s-process nucleosynthesis and missing in previous theoretical research.Using a Woods-Saxon potential based on the Koning-Delaroche optical model and constrained by the experimental one-neutron separation energy,we successfully predicted the resonant energy of this level for the first time.Our predictions of the bound levels and 1d_(3∕2)resonance agree well with the measurement results.Additionally,we utilize this approach to study the near-threshold resonances that play a role when forming a two-neutron halo in^(29,31)F.We found that the CMR-based predictions of the bound-level energies and unbound 1f7∕2 level agree well with the results obtained using the scattering phase shift method.Subsequently,we successfully found a solution for the 2p_(3∕2)resonance with energy just above the threshold,which is decisive for halo formation. 展开更多
关键词 Neutron capture Low-lying resonance Complex momentum representation Resonance energy
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部