期刊文献+
共找到2,762篇文章
< 1 2 139 >
每页显示 20 50 100
基于VR看房及网络大数据的住宅活荷载建模
1
作者 陈隽 窦凯 +2 位作者 徐迟 吴文瀚 李杰 《同济大学学报(自然科学版)》 EI CAS CSCD 北大核心 2024年第10期1492-1500,共9页
活荷载取值是建筑结构可靠性设计的基础,样本采集又是荷载建模的关键。针对传统的抽样采集、入户称重的研究方式存在的入户难、称重难、效率低和样本少等问题,提出了基于网络房产中介平台开放的全景虚拟(virtual reality,VR)看房方式及... 活荷载取值是建筑结构可靠性设计的基础,样本采集又是荷载建模的关键。针对传统的抽样采集、入户称重的研究方式存在的入户难、称重难、效率低和样本少等问题,提出了基于网络房产中介平台开放的全景虚拟(virtual reality,VR)看房方式及网络大数据研究住宅持久性活荷载的方式。首先,利用VR看房获得房间尺寸、室内物品类型及数量等数据,再通过网络爬虫从互联网大数据资源中获得物品重量,实现非称重方式的活荷载调查。采用该方法调查了9座城市的4676个住宅房间样本(总面积近75000m2),通过数据统计分析与荷载组合得到了住宅活荷载标准值,并与现行规范建议值进行了对比。结果表明,任意时点持久性活荷载标准差显著增大,不同城市活荷载变动时间均值不同且整体呈现下降趋势。VR系统结合网络大数据可以实现高效、便捷的住宅活荷载调查,形成一种全新的活荷载研究方式。 展开更多
关键词 活荷载 VR(virtual reality)看房 大数据 荷载规范 结构工程
下载PDF
Mental health in the virtual world:Challenges and opportunities in the metaverse era 被引量:2
2
作者 Yolanda López del Hoyo Matilde Elices Javier Garcia-Campayo 《World Journal of Clinical Cases》 SCIE 2024年第17期2939-2945,共7页
Current rates of mental illness are worrisome.Mental illness mainly affects females and younger age groups.The use of the internet to deliver mental health care has been growing since 2020 and includes the implementat... Current rates of mental illness are worrisome.Mental illness mainly affects females and younger age groups.The use of the internet to deliver mental health care has been growing since 2020 and includes the implementation of novel mental health treatments using virtual reality,augmented reality,and artificial intelligence.A new three dimensional digital environment,known as the metaverse,has emerged as the next version of the Internet.Artificial intelligence,augmented reality,and virtual reality will create fully immersive,experiential,and interactive online environments in the metaverse.People will use a unique avatar to do anything they do in their“real”lives,including seeking and receiving mental health care.In this opinion review,we reflect on how the metaverse could reshape how we deliver mental health treatment,its opportunities,and its challenges. 展开更多
关键词 Metaverse Virtual world Artificial intelligence Mental health Virtual reality Augmented reality TECHNOLOGY
下载PDF
Virtual reality for preoperative patient education: Impact on satisfaction, usability, and burnout from the perspective of new nurses 被引量:2
3
作者 Jiyoung Kim Donghyun Kim +1 位作者 Sang-Ha Oh Hyeokjae Kwon 《World Journal of Clinical Cases》 SCIE 2024年第28期6204-6216,共13页
BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential... BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential benefits,there are studies on patient satisfaction but there is limited information on the usability of virtual reality(VR)technology for new nurses in giving preoperative education to patients.AIM To investigate the impact on satisfaction,usability,and burnout of a system using VR technology in preoperative patient education.METHODS The study involved 20 nurses from the plastic surgery ward and 80 patients admitted between April and May 2019.Each nurse taught four patients:Two using traditional verbal education and two using virtual reality.The System Usability Scale,After-Scenario Questionnaire,and Maslach Burnout Inventory(MBI)were employed to evaluate the impact of these education methods.RESULTS The VR education groups showed a statistically higher satisfaction than the traditional verbal education groups.Among the three subscales of the MBI,emotional exhaustion and personal accomplishment improved statistically significantly.VR was also better in terms of usability.CONCLUSION This study suggests VR enhances usability and reduces burnout in nurses,but further research is needed to assess its impact on depersonalization and objective measures like stress and heart rate. 展开更多
关键词 Virtual reality Preoperative care Patient education BURNOUT USABILITY SATISFACTION Prospective studies
下载PDF
Spatial Heterogeneity of Embedded Water Consumption from the Perspective of Virtual Water Surplus and Deficit in the Yellow River Basin,China
4
作者 MA Weijing LI Xiangjie +1 位作者 KOU Jingwen LI Chengyi 《Chinese Geographical Science》 SCIE CSCD 2024年第2期311-326,共16页
Virtual water trade(VWT)provides a new perspective for alleviating water crisis and has thus attracted widespread attention.However,the heterogeneity of virtual water trade inside and outside the river basin and its i... Virtual water trade(VWT)provides a new perspective for alleviating water crisis and has thus attracted widespread attention.However,the heterogeneity of virtual water trade inside and outside the river basin and its influencing factors remains further study.In this study,for better investigating the pattern and heterogeneity of virtual water trade inside and outside provincial regions along the Yellow River Basin in 2015 using the input-output model(MRIO),we proposed two new concepts,i.e.,virtual water surplus and virtual water deficit,and then used the Logarithmic Mean Divisia Index(LMDI)model to identify the inherent mechanism of the imbalance of virtual water trade between provincial regions along the Yellow River Basin and the other four regions in China.The results show that:1)in provincial regions along the Yellow River Basin,the less developed the economy was,the larger the contribution of the agricultural sector in virtual water trade,while the smaller the contribution of the industrial sector.2)Due to the large output of agricultural products,the upstream and midstream provincial regions of the Yellow River Basin had a virtual water surplus,with a net outflow of virtual water of 2.7×10^(8) m^(3) and 0.9×10^(8) m^(3),respectively.3)provincial regions along the Yellow River Basin were in a virtual water deficit with the rest of China,and the decisive factor was the active degree of trade with the outside.This study would be beneficial to illuminate the trade-related water use issues in provincial regions along the Yellow River Basin,which has farreaching practical signific-ance for alleviating water scarcity. 展开更多
关键词 virtual water trade(VWT) input-output model(MRIO) virtual water surplus virtual water deficit Yellow River Basin China
下载PDF
Wear dependent virtual flow rate sensor for progressing cavity pumps with deformable stator
5
作者 Jens Müller Sebastian Leonow +2 位作者 Johannes Schulz Christian Hansen Martin Monnigmann 《Petroleum Science》 SCIE EI CAS CSCD 2024年第2期1346-1353,共8页
This contribution presents a novel wear dependent virtual flow rate sensor for single stage single lobe progressing cavity pumps. We study the wear-induced material loss of the pump components and the impact of this m... This contribution presents a novel wear dependent virtual flow rate sensor for single stage single lobe progressing cavity pumps. We study the wear-induced material loss of the pump components and the impact of this material loss on the volumetric efficiency. The results are combined with an established backflow model to implement a backflow calculation procedure that is adaptive to wear. We use a laboratory test setup with a highly abrasive fluid and operate a pump from new to worn condition to validate our approach. The obtained measurement data show that the presented virtual sensor is capable of calculating the flow rate of a pump being subject to wear during its regular operation. 展开更多
关键词 BACKFLOW Progressing cavity pump Virtual sensor WEAR
下载PDF
Optical Microsphere Nano-Imaging:Progress and Challenges
6
作者 Guangxing Wu Minghui Hong 《Engineering》 SCIE EI CAS CSCD 2024年第5期102-123,共22页
The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a mul... The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a multitude of nanoscale applications.Over the past decade,the optical microsphere nanoimaging technique has been demonstrated to be a cost-effective solution for overcoming the diffraction limit and has achieved an imaging resolution of up to about k6k8 in a real-time and label-free manner,making it highly competitive among numerous super-resolution imaging technologies.In this review,we summarize the underlying nano-imaging mechanisms of the microsphere nanoscope and key advancements aimed at imaging performance enhancement:first,to change the working environment or modify the peripheral hardware of a single microsphere nanoscope at the system level;second,to compose the microsphere compound lens;and third,to engineer the geometry or ingredients of microspheres.We also analyze challenges yet to be overcome in optical microsphere nano-imaging,followed by an outlook of this technique. 展开更多
关键词 MICROSPHERE Nano-imaging Virtual imaging Microsphere compound lens Engineered microsphere
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
7
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Assistive Robotics for Upper Limb Physical Rehabilitation:A Systematic Review and Future Prospects
8
作者 Andrés Guatibonza Leonardo Solaque +1 位作者 Alexandra Velasco Lina Peñuela 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第4期50-73,共24页
Physical assistive robotics are oriented to support and improve functional capacities of people.In physical rehabilitation,robots are indeed useful for functional recovery of affected limb.However,there are still open... Physical assistive robotics are oriented to support and improve functional capacities of people.In physical rehabilitation,robots are indeed useful for functional recovery of affected limb.However,there are still open questions related to technological aspects.This work presents a systematic review of upper limb rehabilitation robotics in order to analyze and establish technological challenges and future directions in this area.A bibliometric analysis was performed for the systematic literature review.Literature from the last six years,conducted between August 2020 and May 2021,was reviewed.The methodology for the literature search and a bibliometric analysis of the metadata are presented.After a preliminary search resulted in 820 articles,a total of 66 articles were included.A concurrency network and bibliographic analysis were provided.And an analysis of occurrences,taxonomy,and rehabilitation robotics reported in the literature is presented.This review aims to provide to the scientific community an overview of the state of the art in assistive robotics for upper limb physical rehabilitation.The literature analysis allows access to a gap of unexplored options to define the technological prospects applied to upper limb physical rehabilitation robotics. 展开更多
关键词 Upper limb REHABILITATION Assistive robotics Human-machine interaction Robotic systems Virtual reality Rehabilitation monitoring
下载PDF
Bipartite consensus problems of Lurie multi-agent systems over signed graphs: A contraction approach
9
作者 张晓娇 吴祥 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期137-145,共9页
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor... This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results. 展开更多
关键词 contraction theory virtual system bipartite consensus Lurie multi-agent systems
下载PDF
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
10
作者 Nader Abdel Karim Osama A.Khashan +4 位作者 Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2023-2045,共23页
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i... As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads. 展开更多
关键词 Cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm
下载PDF
用于重建物理和虚拟抓取的可重构数据手套
11
作者 Hangxin Liu Zeyu Zhang +5 位作者 Ziyuan Jiao Zhenliang Zhang Minchen Li Chenfanfu Jiang Yixin Zhu Song-Chun Zhu 《Engineering》 SCIE EI CAS CSCD 2024年第1期202-216,共15页
In this work,we present a reconfigurable data glove design to capture different modes of human hand-object interactions,which are critical in training embodied artificial intelligence(AI)agents for fine manipulation t... In this work,we present a reconfigurable data glove design to capture different modes of human hand-object interactions,which are critical in training embodied artificial intelligence(AI)agents for fine manipulation tasks.To achieve various downstream tasks with distinct features,our reconfigurable data glove operates in three modes sharing a unified backbone design that reconstructs hand gestures in real time.In the tactile-sensing mode,the glove system aggregates manipulation force via customized force sensors made from a soft and thin piezoresistive material;this design minimizes interference during complex hand movements.The virtual reality(VR)mode enables real-time interaction in a physically plausible fashion:A caging-based approach is devised to determine stable grasps by detecting collision events.Leveraging a state-of-the-art finite element method,the simulation mode collects data on fine-grained four-dimensionalmanipulation events comprising hand and object motions in three-dimensional space and how the object's physical properties(e.g.,stress and energy)change in accordance with manipulation over time.Notably,the glove system presented here is the first to use high-fidelity simulation to investigate the unobservable physical and causal factors behind manipulation actions.In a series of experiments,we characterize our data glove in terms of individual sensors and the overall system.More specifically,we evaluate the system's three modes by①recording hand gestures and associated forces,②improving manipulation fluency in VR,and③producing realistic simulation effects of various tool uses,respectively.Based on these three modes,our reconfigurable data glove collects and reconstructs fine-grained human grasp data in both physical and virtual environments,thereby opening up new avenues for the learning of manipulation skills for embodied AI agents. 展开更多
关键词 Data glove Tactile sensing Virtual reality Physics-based simulation
下载PDF
Virtual screening and directional preparation of xanthine oxidase inhibitory peptides derived from hemp seed protein
12
作者 Xiaoni Huang Jiajun Liao +2 位作者 Ping Shi Xiaodong Pei Chenghua Wang 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第6期3652-3660,共9页
The traditional nutritional and medical hemp(Cannabis sativa L.)seed protein were explored for the discovery and directional preparation of new xanthine oxidase inhibitory(XOI)peptides by structure-based virtual scree... The traditional nutritional and medical hemp(Cannabis sativa L.)seed protein were explored for the discovery and directional preparation of new xanthine oxidase inhibitory(XOI)peptides by structure-based virtual screening,compound synthesis,in vitro bioassay and proteolysis.Six subtypes of hemp seed edestin and albumin were in silico hydrolyzed by 29 proteases,and 192 encrypted bioactive peptides were screened out.Six peptides showed to be XOI peptides,of which four(about 67%)were released by elastase hydrolysis.The peptide DDNPRRFY displayed the highest XOI activity(IC50=(2.10±0.06)mg/mL),acting as a mixed inhibitor.The pancreatic elastase directionally prepared XOI hemp seed protein hydrolysates,from which 6 high-abundance XOI peptides encrypted 3 virtually-screened ones including the DDNPRRFY.The novel outstanding hemp seed protein-derived XOI peptides and their virtual screening and directed preparation methods provide a promising and applicable approach to conveniently and efficiently explore food-derived bioactive peptides. 展开更多
关键词 Hemp seed protein Anti-gout Bioactive peptide Virtual screening PROTEOLYSIS
下载PDF
Abnormal State Detection in Lithium-ion Battery Using Dynamic Frequency Memory and Correlation Attention LSTM Autoencoder
13
作者 Haoyi Zhong Yongjiang Zhao Chang Gyoon Lim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1757-1781,共25页
This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery(LiB)time series data.As the energy sector increasingly focuses on integrating distributed energy resources,Virtual Power Plants(... This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery(LiB)time series data.As the energy sector increasingly focuses on integrating distributed energy resources,Virtual Power Plants(VPP)have become a vital new framework for energy management.LiBs are key in this context,owing to their high-efficiency energy storage capabilities essential for VPP operations.However,LiBs are prone to various abnormal states like overcharging,over-discharging,and internal short circuits,which impede power transmission efficiency.Traditional methods for detecting such abnormalities in LiB are too broad and lack precision for the dynamic and irregular nature of LiB data.In response,we introduce an innovative method:a Long Short-Term Memory(LSTM)autoencoder based on Dynamic Frequency Memory and Correlation Attention(DFMCA-LSTM-AE).This unsupervised,end-to-end approach is specifically designed for dynamically monitoring abnormal states in LiB data.The method starts with a Dynamic Frequency Fourier Transform module,which dynamically captures the frequency characteristics of time series data across three scales,incorporating a memory mechanism to reduce overgeneralization of abnormal frequencies.This is followed by integrating LSTM into both the encoder and decoder,enabling the model to effectively encode and decode the temporal relationships in the time series.Empirical tests on a real-world LiB dataset demonstrate that DFMCA-LSTM-AE outperforms existing models,achieving an average Area Under the Curve(AUC)of 90.73%and an F1 score of 83.83%.These results mark significant improvements over existing models,ranging from 2.4%–45.3%for AUC and 1.6%–28.9%for F1 score,showcasing the model’s enhanced accuracy and reliability in detecting abnormal states in LiB data. 展开更多
关键词 Lithium-ion battery abnormal state detection autoencoder virtual power plants LSTM
下载PDF
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
14
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 Network application network function virtualization machine learning SECURITY 5G
下载PDF
A virtual thermometer for ultrahigh-temperature-pressure experiments in a large-volume press
15
作者 Bingtao Feng Longjian Xie +8 位作者 Xuyuan Hou Shucheng Liu Luyao Chen Xinyu Zhao Chenyi Li Qiang Zhou Kuo Hu Zhaodong Liu Bingbing Liu 《Matter and Radiation at Extremes》 SCIE EI CSCD 2024年第4期98-110,共13页
Ultrahigh-temperature-pressure experiments are crucial for understanding the physical and chemical properties of matter.The recent development of boron-doped diamond(BDD)heaters has made such melting experiments possi... Ultrahigh-temperature-pressure experiments are crucial for understanding the physical and chemical properties of matter.The recent development of boron-doped diamond(BDD)heaters has made such melting experiments possible in large-volume presses.However,estimates of temperatures above 2600 K and of the temperature distributions inside BDD heaters are not well constrained,owing to the lack of a suitable thermometer.Here,we establish a three-dimensional finite element model as a virtual thermometer to estimate the temperature and temperature field above 2600 K.The advantage of this virtual thermometer over those proposed in previous studies is that it considers both alternating and direct current heating modes,the actual sizes of cell assemblies after compression,the effects of the electrode,thermocouple and anvil,and the heat dissipation by the pressure-transmitting medium.The virtual thermometer reproduces the power-temperature relationships of ultrahigh-temperature-pressure experiments below 2600 K at press loads of 2.8-7.9 MN(~19 to 28 GPa)within experimental uncertainties.The temperatures above 2600 K predicted by our virtual thermometer are within the uncertainty of those extrapolated from power-temperature relationships below 2600 K.Furthermore,our model shows that the temperature distribution inside a BDD heater(19-26 K/mm along the radial direction and<83 K/mm along the longitudinal direction)is more homogeneous than those inside conventional heaters such as graphite or LaCrO_(3) heaters(100-200 K/mm).Our study thus provides a reliable virtual thermometer for ultrahigh-temperature experiments using BDD heaters in Earth and material sciences. 展开更多
关键词 VIRTUAL ultrahigh SIZES
下载PDF
Proposal for a realtime Einstein-synchronization-defined satellite virtual clock
16
作者 严晨皓 汤雪逸 +4 位作者 王时光 孟李皎悦 孙海媛 何奕彬 王力军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期268-276,共9页
Realization of high performance satellite onboard clock is vital for various positioning, navigation, and timing applications. For further improvement of the synchronization-based satellite time and frequency referenc... Realization of high performance satellite onboard clock is vital for various positioning, navigation, and timing applications. For further improvement of the synchronization-based satellite time and frequency references, we propose a geosynchronous(GEO) satellite virtual clock concept based on ground–satellite synchronization and present a beacon transponder structure for its implementation(scheduled for launch in 2025), which does not require atomic clocks to be mounted on the satellite. Its high performance relies only on minor modifications to the existing transponder structure of GEO satellites. We carefully model the carrier phase link and analyze the factors causing link asymmetry within the special relativity. Considering that performance of such synchronization-based satellite clocks is primarily limited by the link's random phase noise, which cannot be adequately modeled, we design a closed-loop experiment based on commercial GEO satellites for pre-evaluation. This experiment aims at extracting the zero-means random part of the ground-satellite Ku-band carrier phase via a feedback loop. Ultimately, we obtain a 1σ value of 0.633 ps(two-way link), following the Gaussian distribution. From this result, we conclude that the proposed real-time Einstein-synchronization-defined satellite virtual clock can achieve picosecond-level replication of onboard time and frequency. 展开更多
关键词 Einstein synchronization satellite virtual clock geosynchronous satellite carrier phase
下载PDF
An intelligent control method based on artificial neural network for numerical flight simulation of the basic finner projectile with pitching maneuver
17
作者 Yiming Liang Guangning Li +3 位作者 Min Xu Junmin Zhao Feng Hao Hongbo Shi 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期663-674,共12页
In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a... In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a good application prospect.Firstly,a numerical virtual flight simulation model based on overlapping dynamic mesh technology is constructed.In order to verify the accuracy of the dynamic grid technology and the calculation of unsteady flow,a numerical simulation of the basic finner projectile without control is carried out.The simulation results are in good agreement with the experiment data which shows that the algorithm used in this paper can also be used in the design and evaluation of the intelligent controller in the numerical virtual flight simulation.Secondly,combined with the real-time control requirements of aerodynamic,attitude and displacement parameters of the projectile during the flight process,the numerical simulations of the basic finner projectile’s pitch channel are carried out under the traditional PID(Proportional-Integral-Derivative)control strategy and the intelligent PID control strategy respectively.The intelligent PID controller based on BP(Back Propagation)neural network can realize online learning and self-optimization of control parameters according to the acquired real-time flight parameters.Compared with the traditional PID controller,the concerned control variable overshoot,rise time,transition time and steady state error and other performance indicators have been greatly improved,and the higher the learning efficiency or the inertia coefficient,the faster the system,the larger the overshoot,and the smaller the stability error.The intelligent control method applying on numerical virtual flight is capable of solving the complicated unsteady motion and flow with the intelligent PID control strategy and has a strong promotion to engineering application. 展开更多
关键词 Numerical virtual flight Intelligent control BP neural network PID Moving chimera grid
下载PDF
Special Vehicle Target Detection and Tracking Based on Virtual Simulation Environment and YOLOv5-Block+DeepSort Algorithm
18
作者 Mingyuan Zhai Hanquan Zhang +3 位作者 Le Wang Dong Xiao Zhengmin Gu Zhenni Li 《Computers, Materials & Continua》 SCIE EI 2024年第11期3241-3260,共20页
In the process of dense vehicles traveling fast,there will be mutual occlusion between vehicles,which will lead to the problem of deterioration of the tracking effect of different vehicles,so this paper proposes a res... In the process of dense vehicles traveling fast,there will be mutual occlusion between vehicles,which will lead to the problem of deterioration of the tracking effect of different vehicles,so this paper proposes a research method of virtual simulation video vehicle target tracking based on you only look once(YOLO)v5s and deep simple online and realtime tracking(DeepSort).Given that the DeepSort algorithm is currently the most effective tracking method,this paper merges the YOLOv5 algorithm with the DeepSort algorithm.Then it adds the efficient channel attention networks(ECA-Net)focusing mechanism at the back for the cross-stage partial bottleneck with 3 convolutions(C3)modules about the YOLOv5 backbone network and before the up-sampling of the Neck feature pyramid.The YOLOv5 algorithm adopts expected intersection over union(EIOU)instead of complete intersection over union(CIOU)as the loss function of the target frame regression.The improved YOLOv5 algorithm is named YOLOv5-Block.The experimental results show that in the special vehicle target detection(TD)and tracking in the virtual simulation environment,The YOLOv5-Block algorithm has an average accuracy(AP)of 99.5%,which significantly improves the target recognition correctness for typical occlusion cases,and is 1.48 times better than the baseline algorithm.After the virtual simulation video sequence test,multiple objects tracking accuracy(MOTA)and various objects tracking precision(MOTP)improved by 10.7 and 1.75 percentage points,respectively,and the number of vehicle target identity document(ID)switches decreased.Compared with recent mainstream vehicle detection and tracking models,the YOLOv5-Block+Deepsort algorithm can accurately and continuously complete the detection and tracking tasks of special vehicle targets in different scenes. 展开更多
关键词 YOLOv5 DeepSort virtual simulation attention mechanism
下载PDF
A Tri-mode of Mock-Walker Cells
19
作者 Han QIN Ji NIE Zhiyong MENG 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第4期671-679,共9页
This work uses cloud-resolving simulations to study mock-Walker cells driven by a specified sea surface temperature(SST).The associated precipitation in the mock-Walker cells exhibits three different modes,including a... This work uses cloud-resolving simulations to study mock-Walker cells driven by a specified sea surface temperature(SST).The associated precipitation in the mock-Walker cells exhibits three different modes,including a single peak of precipitation over the SST maximum(mode 1),symmetric double peaks of precipitation straddling the SST maximum(mode 2),and a single peak of precipitation on one side of the SST maximum(mode 3).The three modes are caused by three distinct convective activity center migration traits.Analyses indicate that the virtual effect of water vapor plays an important role in differentiating the three modes.When the SST gradient is large,the virtual effect may be strong enough to overcome the temperature effect,generating a low-level low-pressure anomaly below the ascending branch of the Walker cell off the center.The results here highlight the importance of the virtual effect of water vapor and its interaction with convection and large-scale circulation in the Walker circulation. 展开更多
关键词 Walker circulation cloud-resolving simulation virtual effect
下载PDF
A hierarchical blockchain-enabled security-threat assessment architecture for IoV
20
作者 Yuanni Liu Ling Pan Shanzhi Chen 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1035-1047,共13页
In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish ... In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish security-threat assessment architectures to evaluate risks of traffic elements by managing and sharing securitythreat information.Unfortunately,most assessment architectures process data in a centralized manner,causing delays in query services.To address this issue,in this paper,a Hierarchical Blockchain-enabled Security threat Assessment Architecture(HBSAA)is proposed,utilizing edge chains and global chains to share data.In addition,data virtualization technology is introduced to manage multi-source heterogeneous data,and a metadata association model based on attribute graph is designed to deal with complex data relationships.In order to provide high-speed query service,the ant colony optimization of key nodes is designed,and the HBSAA prototype is also developed and the performance is tested.Experimental results on the large-scale vulnerabilities data gathered from NVD demonstrate that the HBSAA not only shields data heterogeneity,but also reduces service response time. 展开更多
关键词 Internet of vehicles Blockchain Edge computing Data virtualization Data service composition
下载PDF
上一页 1 2 139 下一页 到第
使用帮助 返回顶部