介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及...介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。展开更多
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom...Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency.展开更多
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv...Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance.展开更多
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin...As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results.展开更多
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug...Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.展开更多
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ...The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ.展开更多
Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite cons...Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness.展开更多
It is an important topic to improve the redundancy of optimized configuration to resist the local failure in topology optimization of continuum structures.Such a fail-safe topology optimization problem has been solved...It is an important topic to improve the redundancy of optimized configuration to resist the local failure in topology optimization of continuum structures.Such a fail-safe topology optimization problem has been solved effectively in the ficld of statics.In this paper,the fail-safe topology optimization problem is extended to the field of frequency topology optimization.Based on the independent continuous mapping(ICM)method,the model of fail-safe topology optimization is established with the objective of minimal weight integrating with the discrete condition of topological variables and the constraint of the fundamental frequency.The fail-safe optimization model established above is substituted by a sequence of subproblems in the form of the quadratic program with exact second-order information and solved efficiently by the dual sequence quadratic programming(DSQP)algorithm.The numerical result reveals that the optimized fail-safe structure has more complex configuration and preserved materials than the structure obtained from the traditional frequency topology optimization,which means that the optimized fail-safe structure has higher redundancy.Moreover,the optimized fail-safe structure guarantees that the natural frequency meets the constraint of fundamental frequency when the local failure ocurs,which can avoid the structural frequency to be sensitive to local failure.The fail-safe optimirzation topology model is proved effective and feasible by four numerical examples.展开更多
In Xenopus, injection of S-adenosylmethionine decarboxylase (SAMDC) mRNA into fertilized eggs or 2-cell stage embryos induces massive cell dissociation and embryo-lysis at the early gastrula stage due toactivation of ...In Xenopus, injection of S-adenosylmethionine decarboxylase (SAMDC) mRNA into fertilized eggs or 2-cell stage embryos induces massive cell dissociation and embryo-lysis at the early gastrula stage due toactivation of the maternal program of apoptosis. We injected SAMDC mRNA into only one of the animalside blastomeres of embryos at different stages of cleavage, and examined the timing of the onset of theapoptotic reaction. In the injection at 4-and 8-cell stages, a considerable number of embryos developed intotadpoles and in the injection at 16-and 32-cell stages, all the embryos became tadpoles, although tadpolesobtained were sometimes abnormal. However, using GFP as a lineage tracer, we found that descendant cellsof the blastomere injected with SAMDC mRNA at 8-to 32-cell stages are confined within the blastocoel atthe early gastrula stage and undergo apoptotic cell death within the blastocoel, in spite of the continued development of the injected embryos. These results indicate that cells overexpressed with SAMDC undergo apoptotic cell death consistently at the early gastrula stage, irrespective of the timing of the mRNA injection.We assume that apoptosis is executed in Xenopus early gastrulae as a 'fall-safe' mechanism to eliminate physiologically-severely damaged cells to save the rest of the embryo.展开更多
This paper proposes an effective reliability design optimizationmethod for fail-safe topology optimization(FSTO)considering uncertainty based on the moving morphable bars method to establish the ideal balance between ...This paper proposes an effective reliability design optimizationmethod for fail-safe topology optimization(FSTO)considering uncertainty based on the moving morphable bars method to establish the ideal balance between cost and robustness,reliability and structural safety.To this end,a performancemeasure approach(PMA)-based doubleloop optimization algorithmis developed tominimize the relative volume percentage while achieving the reliability criterion.To ensure the compliance value of the worst failure case can better approximate the quantified design requirement,a p-norm constraint approach with correction parameter is introduced.Finally,the significance of accounting for uncertainty in the fail-safe design is illustrated by contrasting the findings of the proposed reliabilitybased topology optimization(RBTO)method with those of the deterministic design method in three typical examples.Monte Carlo simulation shows that the relative error of the reliability index of the optimized structure does not exceed 3%.展开更多
Traditional topology optimization methods may lead to a great reduction in the redundancy of the optimized structure due to unexpected material removal at the critical components.The local failure in critical componen...Traditional topology optimization methods may lead to a great reduction in the redundancy of the optimized structure due to unexpected material removal at the critical components.The local failure in critical components can instantly cause the overall failure in the structure.More and more scholars have taken the fail-safe design into consideration when conducting topology optimization.A lot of good designs have been obtained in their research,though limited regarding minimizing structural compliance(maximizing stiffness)with given amount of material.In terms of practical engineering applications considering fail-safe design,it is more meaningful to seek for the lightweight structure with enough stiffness to resist various component failures and/or to meet multiple design requirements,than the stiffest structure only.Thus,this paper presents a fail-safe topology optimization model for minimizing structural weight with respect to stress and displacement constraints.The optimization problem is solved by utilizing the independent continuous mapping(ICM)method combined with the dual sequence quadratic programming(DSQP)algorithm.Special treatments are applied to the constraints,including converting local stress constraints into a global structural strain energy constraint and expressing the displacement constraint explicitly with approximations.All of the constraints are nondimensionalized to avoid numerical instability caused by great differences in constraint magnitudes.The optimized results exhibit more complex topological configurations and higher redundancy to resist local failures than the traditional optimization designs.This paper also shows how to find the worst failure region,which can be a good reference for designers in engineering.展开更多
Fail-safe topology optimization is valuable for ensuring that optimized structures remain operable even under damaged conditions.By selectively removing material stiffness in patches with a fixed shape,the complex phe...Fail-safe topology optimization is valuable for ensuring that optimized structures remain operable even under damaged conditions.By selectively removing material stiffness in patches with a fixed shape,the complex phenomenon of local failure is modeled in fail-safe topology optimization.In this work,we first conduct a comprehensive study to explore the impact of patch size,shape,and distribution on the robustness of fail-safe designs.The findings suggest that larger sizes and finer distribution of material patches can yield more robust fail-safe structures.However,a finer patch distribution can significantly increase computational costs,particularly for 3D structures.To keep computational efforts tractable,an efficient fail-safe topology optimization approach is established based on the framework of multi-resolution topology optimization(MTOP).Within the MTOP framework,the extended finite element method is introduced to establish a decoupling connection between the analysis mesh and the topology description model.Numerical examples demonstrate that the developed methodology is 2 times faster for 2D problems and over 25 times faster for 3D problems than traditional fail-safe topology optimization while maintaining similar levels of robustness.展开更多
In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab C...In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab Computers,Materials&Continua,2023,Vol.77,No.2,pp.2031–2047.DOI:10.32604/cmc.2023.043687,URL:https://www.techscience.com/cmc/v77n2/54831,there was an error regarding the affiliation for the author Hafiz Tayyab Rauf.Instead of“Centre for Smart Systems,AI and Cybersecurity,Staffordshire University,Stoke-on-Trent,ST42DE,UK”,the affiliation should be“Independent Researcher,Bradford,BD80HS,UK”.展开更多
A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can ...A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition.In the coding number detection stage,Differentiable Binarization Network is used as the backbone network,combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect.In terms of text recognition,using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate the problem of coding recognition errors caused by image color distortion due to variations in lighting and background noise.In addition,model pruning and quantization are used to reduce the number ofmodel parameters to meet deployment requirements in resource-constrained environments.A comparative experiment was conducted using the dataset of tank bottom spray code numbers collected on-site,and a transfer experiment was conducted using the dataset of packaging box production date.The experimental results show that the algorithm proposed in this study can effectively locate the coding of cans at different positions on the roller conveyor,and can accurately identify the coding numbers at high production line speeds.The Hmean value of the coding number detection is 97.32%,and the accuracy of the coding number recognition is 98.21%.This verifies that the algorithm proposed in this paper has high accuracy in coding number detection and recognition.展开更多
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation...The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control.展开更多
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d...Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented.展开更多
文摘介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。
基金supported by National Natural Science Foundation of China(No.62301008)China Postdoctoral Science Foundation(No.2022M720272)New Cornerstone Science Foundation through the XPLORER PRIZE。
文摘Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency.
基金supported by National Natural Science Foundation of China(No.61801327).
文摘Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance.
文摘As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results.
基金supported by Key Laboratory of Cyberspace Security,Ministry of Education,China。
文摘Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.
基金the National Key R&D Program of China(No.2024YFE0110001)the National Natural Science Foundation of China(U1932219)the Mobility Programme endorsed by the Joint Committee of the Sino-German Center(M0728)。
文摘The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ.
文摘Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness.
基金the National Natural Science Foundation of China(Grant 11872080).
文摘It is an important topic to improve the redundancy of optimized configuration to resist the local failure in topology optimization of continuum structures.Such a fail-safe topology optimization problem has been solved effectively in the ficld of statics.In this paper,the fail-safe topology optimization problem is extended to the field of frequency topology optimization.Based on the independent continuous mapping(ICM)method,the model of fail-safe topology optimization is established with the objective of minimal weight integrating with the discrete condition of topological variables and the constraint of the fundamental frequency.The fail-safe optimization model established above is substituted by a sequence of subproblems in the form of the quadratic program with exact second-order information and solved efficiently by the dual sequence quadratic programming(DSQP)algorithm.The numerical result reveals that the optimized fail-safe structure has more complex configuration and preserved materials than the structure obtained from the traditional frequency topology optimization,which means that the optimized fail-safe structure has higher redundancy.Moreover,the optimized fail-safe structure guarantees that the natural frequency meets the constraint of fundamental frequency when the local failure ocurs,which can avoid the structural frequency to be sensitive to local failure.The fail-safe optimirzation topology model is proved effective and feasible by four numerical examples.
文摘In Xenopus, injection of S-adenosylmethionine decarboxylase (SAMDC) mRNA into fertilized eggs or 2-cell stage embryos induces massive cell dissociation and embryo-lysis at the early gastrula stage due toactivation of the maternal program of apoptosis. We injected SAMDC mRNA into only one of the animalside blastomeres of embryos at different stages of cleavage, and examined the timing of the onset of theapoptotic reaction. In the injection at 4-and 8-cell stages, a considerable number of embryos developed intotadpoles and in the injection at 16-and 32-cell stages, all the embryos became tadpoles, although tadpolesobtained were sometimes abnormal. However, using GFP as a lineage tracer, we found that descendant cellsof the blastomere injected with SAMDC mRNA at 8-to 32-cell stages are confined within the blastocoel atthe early gastrula stage and undergo apoptotic cell death within the blastocoel, in spite of the continued development of the injected embryos. These results indicate that cells overexpressed with SAMDC undergo apoptotic cell death consistently at the early gastrula stage, irrespective of the timing of the mRNA injection.We assume that apoptosis is executed in Xenopus early gastrulae as a 'fall-safe' mechanism to eliminate physiologically-severely damaged cells to save the rest of the embryo.
基金supported by the National Natural Science Foundation of China(Grant No.12172114)Natural Science Foundation of Anhui Province(Grant No.2008085QA21)+1 种基金Fundamental Research Funds for the Central Universities(Grant No.JZ2022HGTB0291)China Postdoctoral Science Foundation(Grant No.2022M712358).
文摘This paper proposes an effective reliability design optimizationmethod for fail-safe topology optimization(FSTO)considering uncertainty based on the moving morphable bars method to establish the ideal balance between cost and robustness,reliability and structural safety.To this end,a performancemeasure approach(PMA)-based doubleloop optimization algorithmis developed tominimize the relative volume percentage while achieving the reliability criterion.To ensure the compliance value of the worst failure case can better approximate the quantified design requirement,a p-norm constraint approach with correction parameter is introduced.Finally,the significance of accounting for uncertainty in the fail-safe design is illustrated by contrasting the findings of the proposed reliabilitybased topology optimization(RBTO)method with those of the deterministic design method in three typical examples.Monte Carlo simulation shows that the relative error of the reliability index of the optimized structure does not exceed 3%.
基金This work showed in this paper has been supported by the National Natural Science Foundation of China(Grant 11872080).
文摘Traditional topology optimization methods may lead to a great reduction in the redundancy of the optimized structure due to unexpected material removal at the critical components.The local failure in critical components can instantly cause the overall failure in the structure.More and more scholars have taken the fail-safe design into consideration when conducting topology optimization.A lot of good designs have been obtained in their research,though limited regarding minimizing structural compliance(maximizing stiffness)with given amount of material.In terms of practical engineering applications considering fail-safe design,it is more meaningful to seek for the lightweight structure with enough stiffness to resist various component failures and/or to meet multiple design requirements,than the stiffest structure only.Thus,this paper presents a fail-safe topology optimization model for minimizing structural weight with respect to stress and displacement constraints.The optimization problem is solved by utilizing the independent continuous mapping(ICM)method combined with the dual sequence quadratic programming(DSQP)algorithm.Special treatments are applied to the constraints,including converting local stress constraints into a global structural strain energy constraint and expressing the displacement constraint explicitly with approximations.All of the constraints are nondimensionalized to avoid numerical instability caused by great differences in constraint magnitudes.The optimized results exhibit more complex topological configurations and higher redundancy to resist local failures than the traditional optimization designs.This paper also shows how to find the worst failure region,which can be a good reference for designers in engineering.
基金financially supported by the National Natural Science Foundation of China(Grant Nos.12172095,11832009,and 12302008)the Natural Science Foundation of Guangdong Province(Grant No.2023A1515011770)Guangzhou Science and Technology Planning Project(Grant Nos.202201010570,202201020239,202201020193,and 202201010399)。
文摘Fail-safe topology optimization is valuable for ensuring that optimized structures remain operable even under damaged conditions.By selectively removing material stiffness in patches with a fixed shape,the complex phenomenon of local failure is modeled in fail-safe topology optimization.In this work,we first conduct a comprehensive study to explore the impact of patch size,shape,and distribution on the robustness of fail-safe designs.The findings suggest that larger sizes and finer distribution of material patches can yield more robust fail-safe structures.However,a finer patch distribution can significantly increase computational costs,particularly for 3D structures.To keep computational efforts tractable,an efficient fail-safe topology optimization approach is established based on the framework of multi-resolution topology optimization(MTOP).Within the MTOP framework,the extended finite element method is introduced to establish a decoupling connection between the analysis mesh and the topology description model.Numerical examples demonstrate that the developed methodology is 2 times faster for 2D problems and over 25 times faster for 3D problems than traditional fail-safe topology optimization while maintaining similar levels of robustness.
文摘In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab Computers,Materials&Continua,2023,Vol.77,No.2,pp.2031–2047.DOI:10.32604/cmc.2023.043687,URL:https://www.techscience.com/cmc/v77n2/54831,there was an error regarding the affiliation for the author Hafiz Tayyab Rauf.Instead of“Centre for Smart Systems,AI and Cybersecurity,Staffordshire University,Stoke-on-Trent,ST42DE,UK”,the affiliation should be“Independent Researcher,Bradford,BD80HS,UK”.
文摘A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition.In the coding number detection stage,Differentiable Binarization Network is used as the backbone network,combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect.In terms of text recognition,using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate the problem of coding recognition errors caused by image color distortion due to variations in lighting and background noise.In addition,model pruning and quantization are used to reduce the number ofmodel parameters to meet deployment requirements in resource-constrained environments.A comparative experiment was conducted using the dataset of tank bottom spray code numbers collected on-site,and a transfer experiment was conducted using the dataset of packaging box production date.The experimental results show that the algorithm proposed in this study can effectively locate the coding of cans at different positions on the roller conveyor,and can accurately identify the coding numbers at high production line speeds.The Hmean value of the coding number detection is 97.32%,and the accuracy of the coding number recognition is 98.21%.This verifies that the algorithm proposed in this paper has high accuracy in coding number detection and recognition.
文摘The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control.
基金Supported in part by the National Key R&D Program of China(No.2020YFA0712300)NSFC(No.61872353)。
文摘Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented.