In this paper,a new technique is introduced to construct higher-order iterative methods for solving nonlinear systems.The order of convergence of some iterative methods can be improved by three at the cost of introduc...In this paper,a new technique is introduced to construct higher-order iterative methods for solving nonlinear systems.The order of convergence of some iterative methods can be improved by three at the cost of introducing only one additional evaluation of the function in each step.Furthermore,some new efficient methods with a higher-order of convergence are obtained by using only a single matrix inversion in each iteration.Analyses of convergence properties and computational efficiency of these new methods are made and testified by several numerical problems.By comparison,the new schemes are more efficient than the corresponding existing ones,particularly for large problem sizes.展开更多
DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity,capable of crippling critical infrastructures and disrupting services globally.As networks continue to expand and threats become m...DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity,capable of crippling critical infrastructures and disrupting services globally.As networks continue to expand and threats become more sophisticated,there is an urgent need for Intrusion Detection Systems(IDS)capable of handling these challenges effectively.Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics.This paper presents a novel approach for detecting unknown Distributed Denial of Service(DDoS)attacks by integrating Sliced Iterative Normalizing Flows(SINF)into IDS.SINF utilizes the Sliced Wasserstein distance to repeatedly modify probability distributions,enabling better management of high-dimensional data when there are only a few samples available.The unique architecture of SINF ensures efficient density estimation and robust sample generation,enabling IDS to adapt dynamically to emerging threats without relying heavily on predefined signatures or extensive retraining.By incorporating Open-Set Recognition(OSR)techniques,this method improves the system’s ability to detect both known and unknown attacks while maintaining high detection performance.The experimental evaluation on CICIDS2017 and CICDDoS2019 datasets demonstrates that the proposed system achieves an accuracy of 99.85%for known attacks and an F1 score of 99.99%after incremental learning for unknown attacks.The results clearly demonstrate the system’s strong generalization capability across unseen attacks while maintaining the computational efficiency required for real-world deployment.展开更多
In this paper,we consider the maximal positive definite solution of the nonlinear matrix equation.By using the idea of Algorithm 2.1 in ZHANG(2013),a new inversion-free method with a stepsize parameter is proposed to ...In this paper,we consider the maximal positive definite solution of the nonlinear matrix equation.By using the idea of Algorithm 2.1 in ZHANG(2013),a new inversion-free method with a stepsize parameter is proposed to obtain the maximal positive definite solution of nonlinear matrix equation X+A^(*)X|^(-α)A=Q with the case 0<α≤1.Based on this method,a new iterative algorithm is developed,and its convergence proof is given.Finally,two numerical examples are provided to show the effectiveness of the proposed method.展开更多
Currently,the number of patients with myopia is increasing rapidly across the globe.Traditional Chinese medicine(TCM),with its long history and rich experience,has shown promise in effectively managing and treating th...Currently,the number of patients with myopia is increasing rapidly across the globe.Traditional Chinese medicine(TCM),with its long history and rich experience,has shown promise in effectively managing and treating this condition.Nevertheless,considering the vast amount of research that is currently being conducted,focusing on the utilization of TCM in the management of myopia,there is an urgent requirement for a thorough and comprehensive review.The review would serve to clarify the practical applications of TCM within this specific field,and it would also aim to elucidate the underlying mechanisms that are at play,providing a deeper understanding of how TCM principles can be effectively integrated into modern medical practices.Here,some modern medical pathogenesis of myopia and appropriate TCM techniques studies are summarized in the prevention and treatment of myopia.Further,we discussed the potential mechanisms and the future research directions of TCM against myopia.Identifying these mechanisms is crucial for understanding how TCM can be effectively utilized in this context.The combination of various TCM methods or the combination of traditional Chinese and Western medicine is of great significance for the prevention and control of myopia in the future.展开更多
Due to the digital transformation tendency among cultural institutions and the substantial influence of the social media platform,the demands of visual communication keep increasing for promoting traditional cultural ...Due to the digital transformation tendency among cultural institutions and the substantial influence of the social media platform,the demands of visual communication keep increasing for promoting traditional cultural artifacts online.As an effective medium,posters serve to attract public attention and facilitate broader engagement with cultural artifacts.However,existing poster generation methods mainly rely on fixed templates and manual design,which limits their scalability and adaptability to the diverse visual and semantic features of the artifacts.Therefore,we propose CAPGen,an automated aesthetic Cultural Artifacts Poster Generation framework built on a Multimodal Large Language Model(MLLM)with integrated iterative optimization.During our research,we collaborated with designers to define principles of graphic design for cultural artifact posters,to guide the MLLM in generating layout parameters.Later,we generated these parameters into posters.Finally,we refined the posters using an MLLM integrated with a multi-round iterative optimization mechanism.Qualitative results show that CAPGen consistently outperforms baseline methods in both visual quality and aesthetic performance.Furthermore,ablation studies indicate that the prompt,iterative optimization mechanism,and design principles significantly enhance the effectiveness of poster generation.展开更多
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp...With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.展开更多
Synaptic pruning is a crucial process in synaptic refinement,eliminating unstable synaptic connections in neural circuits.This process is triggered and regulated primarily by spontaneous neural activity and experience...Synaptic pruning is a crucial process in synaptic refinement,eliminating unstable synaptic connections in neural circuits.This process is triggered and regulated primarily by spontaneous neural activity and experience-dependent mechanisms.The pruning process involves multiple molecular signals and a series of regulatory activities governing the“eat me”and“don't eat me”states.Under physiological conditions,the interaction between glial cells and neurons results in the clearance of unnecessary synapses,maintaining normal neural circuit functionality via synaptic pruning.Alterations in genetic and environmental factors can lead to imbalanced synaptic pruning,thus promoting the occurrence and development of autism spectrum disorder,schizophrenia,Alzheimer's disease,and other neurological disorders.In this review,we investigated the molecular mechanisms responsible for synaptic pruning during neural development.We focus on how synaptic pruning can regulate neural circuits and its association with neurological disorders.Furthermore,we discuss the application of emerging optical and imaging technologies to observe synaptic structure and function,as well as their potential for clinical translation.Our aim was to enhance our understanding of synaptic pruning during neural development,including the molecular basis underlying the regulation of synaptic function and the dynamic changes in synaptic density,and to investigate the potential role of these mechanisms in the pathophysiology of neurological diseases,thus providing a theoretical foundation for the treatment of neurological disorders.展开更多
THE Nanjing Yunjin brocade,known for its stunning luster,exquisite patterns,and a wealth of shades,represents the highest level of Chinese brocade craftsmanship.It was the designated textile for the imperial courts of...THE Nanjing Yunjin brocade,known for its stunning luster,exquisite patterns,and a wealth of shades,represents the highest level of Chinese brocade craftsmanship.It was the designated textile for the imperial courts of the Yuan(1206-1368),Ming(1368-1644),and Qing(1616-1911)dynasties,and is still highly regarded to this day.展开更多
Mining operation, especially underground coal mining, always has the remarkable risks of ground control. Passive seismic velocity tomography based on simultaneous iterative reconstructive technique (SIRT) inversion ...Mining operation, especially underground coal mining, always has the remarkable risks of ground control. Passive seismic velocity tomography based on simultaneous iterative reconstructive technique (SIRT) inversion is used to deduce the stress redistribution around the longwall mining panel. The mining-induced microseismic events were recorded by mounting an array of receivers on the surface, above the active panel. After processing and filtering the seismic data, the three-dimensional tomography images of the p-wave velocity variations by SIRT passive seismic velocity tomography were provided. To display the velocity changes on coal seam level and subsequently to infer the stress redistribution, these three-dimensional tomograms into the coal seam level were sliced. In addition, the boundary element method (BEM) was used to simulate the stress redistribution. The results show that the inferred stresses from the passive seismic tomograms are conformed to numerical models and theoretical concept of the stress redistribution around the longwall panel. In velocity tomograms, the main zones of the stress redistribution arotmd the panel, including front and side abutment pressures, and gob stress are obvious and also the movement of stress zones along the face advancement is evident. Moreover, the effect of the advance rate of the face on the stress redistribution is demonstrated in tomography images. The research result proves that the SIRT passive seismic velocity tomography has an ultimate potential for monitoring the changes of stress redistribution around the longwall mining panel continuously and subsequently to improve safety of mining operations.展开更多
In this paper, to investigate the influence of soil inhomogeneity on the bending of circular thinplates on elastic foundations, the static problem of circular thin plates on Gibson elasticfoundation is solved using an...In this paper, to investigate the influence of soil inhomogeneity on the bending of circular thinplates on elastic foundations, the static problem of circular thin plates on Gibson elasticfoundation is solved using an iterative method based on the modified Vlasov model. On the basisof the principle of minimum potential energy, the governing differential equations and boundaryconditions for circular thin plates on modified Vlasov foundation considering the characteristics ofGibson soil are derived. The equations for the attenuation parameter in bending problem are alsoobtained, and the issue of unknown parameters being difficult to determine is solved using theiterative method. Numerical examples are analyzed and the results are in good agreement withthose form other literatures. It proves that the method is practical and accurate. Theinhomogeneity of modified Vlasov foundations has some influence on the deformation andinternal force behavior of circular thin plates. The effects of various parameters on the bending ofcircular plates and characteristic parameters of the foundation are discussed. The modified modelfurther enriches and develops the elastic foundations. Relevant conclusions that are meaningful toengineering practice are drawn.展开更多
Iterative feedback tuning is an attractive method for industry as it is a model free approach using experiments conducted on the plant to tune controller parameters. Classically Gauss-Newton iterative methods are used...Iterative feedback tuning is an attractive method for industry as it is a model free approach using experiments conducted on the plant to tune controller parameters. Classically Gauss-Newton iterative methods are used in IFT to update the controller parameters in the negative gradient direction of a specified design criterion function. Levenburg-Marquardt and Trust-Region strategies offer attractive advantages to Gauss-Newton in many applications,these alternative methods are given and results from simulation presented. A discussion on the differences between line search methods and Trust-Region methods is given showing the Trust-Region search direction is more flexible. Step size selection is often the limiting factor and it is found that with unknown step size values and initial controller parameters the Trust-Region is the best selection,where as if overshoot is a concern Levenburg-Marquardt is a good choice.Gauss-Newton method provides quick convergence and a fast response time however it shows more dependence on the step size.展开更多
Purpose: To evaluate the quality of three-dimensional (3D) CT angiography images of the abdominal viscera with small focal spot, low tube voltage, and iterative model reconstruction technique (IMR). Materials and Meth...Purpose: To evaluate the quality of three-dimensional (3D) CT angiography images of the abdominal viscera with small focal spot, low tube voltage, and iterative model reconstruction technique (IMR). Materials and Methods: Seven patients with suspected disease of the pancreatobiliary system had undergone CT with high-quality CTA protocol in the present study. There were 5 men and 2 women, ranging in age from 52 to 80 years (mean: 64 years). Results: Depiction of abdominal small artery, small portal vein was possible in all cases. In two cases that we were able to compare, it was superior to standard CTA in small vascular depiction in CTA made clearly in high quality protocol. Conclusions: Although the use of small focal spot, low tube voltage, and IMR can produce higher-quality images of abdominal vessels than standard CTA, this improvement is not significant at elevated radiation doses.展开更多
This study develops an optimized finite difference iterative (OFDI) scheme for the two-dimensional (2D) viscoelastic wave equation. The OFDI scheme is obtained using a proper orthogonal decomposition (POD) metho...This study develops an optimized finite difference iterative (OFDI) scheme for the two-dimensional (2D) viscoelastic wave equation. The OFDI scheme is obtained using a proper orthogonal decomposition (POD) method. It has sufficiently high accuracy with very few unknowns for the 2D viscoelastic wave equation. Existence, stability, and convergence of the OFDI solutions are analyzed. Numerical simulations verify efficiency and feasibility of the proposed scheme.展开更多
The objective of this paper is to develop monotone techniques for obtaining extremal solutions of initial value problem for nonlinear neutral delay differential equations.
In this paper,the existence and uniqueness of iterative solutions to the boundary value problems for a class of first order impulsive integro-differential equations were studied. Under a new concept of upper and lower...In this paper,the existence and uniqueness of iterative solutions to the boundary value problems for a class of first order impulsive integro-differential equations were studied. Under a new concept of upper and lower solutions, a new monotone iterative technique on the boundary value problem of integro-differential equations was proposed. The existence and uniqueness of iterative solutions and the error estimation in certain interval were obtained.An example was also given to illustrate the results.展开更多
In the digital image correlation research of fatigue crack growth rate,the accuracy of the crack tip position determines the accuracy of the calculation of the stress intensity factor,thereby affecting the life predic...In the digital image correlation research of fatigue crack growth rate,the accuracy of the crack tip position determines the accuracy of the calculation of the stress intensity factor,thereby affecting the life prediction.This paper proposes a Gauss-Newton iteration method for solving the crack tip position.The conventional linear fitting method provides an iterative initial solution for this method,and the preconditioned conjugate gradient method is used to solve the ill-conditioned matrix.A noise-added artificial displacement field is used to verify the feasibility of the method,which shows that all parameters can be solved with satisfactory results.The actual stress intensity factor solution case shows that the stress intensity factor value obtained by the method in this paper is very close to the finite element result,and the relative error between the two is only−0.621%;The Williams coefficient obtained by this method can also better define the contour of the plastic zone at the crack tip,and the maximum relative error with the test plastic zone area is−11.29%.The relative error between the contour of the plastic zone defined by the conventional method and the area of the experimental plastic zone reached a maximum of 26.05%.The crack tip coordinates,stress intensity factors,and plastic zone contour changes in the loading and unloading phases are explored.The results show that the crack tip change during the loading process is faster than the change during the unloading process;the stress intensity factor during the unloading process under the same load condition is larger than that during the loading process;under the same load,the theoretical plastic zone during the unloading process is higher than that during the loading process.展开更多
This paper deals with fractional integro-differential equations involving Hadamard fractional derivatives and nonlinear boundary conditions in an ordered Banach space. The nonlinearity is allowed to be singular with r...This paper deals with fractional integro-differential equations involving Hadamard fractional derivatives and nonlinear boundary conditions in an ordered Banach space. The nonlinearity is allowed to be singular with respect to time variable. Under some monotonicity conditions and noncompactness measure conditions, we use the method of coupled lower and upper L-quasisolutions associated with the mixed monotone iterative technique to investigate the existence of extremal L-quasisolutions. A unique solution between coupled lower and upper L-quasisolutions is also obtained. An example is given to illustrate our theoretical results. The results got in this paper are new and enrich the existing related work.展开更多
Construction engineering and management(CEM)has become increasingly complicated with the increasing size of engineering projects under different construction environments,motivating the digital transformation of CEM.T...Construction engineering and management(CEM)has become increasingly complicated with the increasing size of engineering projects under different construction environments,motivating the digital transformation of CEM.To contribute to a better understanding of the state of the art of smart techniques for engineering projects,this paper provides a comprehensive review of multi-criteria decision-making(MCDM)techniques,intelligent techniques,and their applications in CEM.First,a comprehensive framework detailing smart technologies for construction projects is developed.Next,the characteristics of CEM are summarized.A bibliometric review is then conducted to investigate the keywords,journals,and clusters related to the application of smart techniques in CEM during 2000-2022.Recent advancements in intelligent techniques are also discussed under the following six topics:①big data technology;②computer vision;③speech recognition;④natural language processing;⑤machine learning;and⑥knowledge representation,understanding,and reasoning.The applications of smart techniques are then illustrated via underground space exploitation.Finally,future research directions for the sustainable development of smart construction are highlighted.展开更多
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a block...The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a blockchain-enabled manufacturing collaboration framework is proposed,with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P)collaboration.First,a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain.Second,an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants.Third,a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information.It facilitates automation of the matching process while protecting users'privacy via blockchainbased smart contracts.Finally,simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4%compared to the Bayesian game-based approach,makes all participants profitable,and achieves 90%fairness of enterprises.展开更多
Precise transverse emittance assessment in electron beams is crucial for advancing high-brightness beam injectors.As opposed to intricate methodologies that use specialized devices,quadrupole focusing strength scannin...Precise transverse emittance assessment in electron beams is crucial for advancing high-brightness beam injectors.As opposed to intricate methodologies that use specialized devices,quadrupole focusing strength scanning(Q-scanning)techniques offer notable advantages for various injectors owing to their inherent convenience and cost-effectiveness.However,their stringent approximation conditions lead to inevitable errors in practical operation,thereby limiting their widespread application.This study addressed these challenges by revisiting the analytical derivation procedure and investigating the effects of the underlying approximation conditions.Preliminary corrections were explored through a combination of data processing analysis and numerical simulations.Furthermore,based on theoretical derivations,virtual measurements using beam dynamics calculations were employed to evaluate the correction reliability.Subsequent experimental validations were performed at the Huazhong University of Science and Technology injector to verify the effectiveness of the proposed compensation method.Both the virtual and experimental results confirm the feasibility and reliability of the enhanced Q-scanning-based diagnosis for transverse emittance in typical beam injectors operating under common conditions.Through the integration of these corrections and compensations,enhanced Q-scanning-based techniques emerge as promising alternatives to traditional emittance diagnosis methods.展开更多
基金Supported by the National Natural Science Foundation of China(12061048)NSF of Jiangxi Province(20232BAB201026,20232BAB201018)。
文摘In this paper,a new technique is introduced to construct higher-order iterative methods for solving nonlinear systems.The order of convergence of some iterative methods can be improved by three at the cost of introducing only one additional evaluation of the function in each step.Furthermore,some new efficient methods with a higher-order of convergence are obtained by using only a single matrix inversion in each iteration.Analyses of convergence properties and computational efficiency of these new methods are made and testified by several numerical problems.By comparison,the new schemes are more efficient than the corresponding existing ones,particularly for large problem sizes.
基金supported by the National Science and Technology Council,Taiwan with grant numbers NSTC 112-2221-E-992-045,112-2221-E-992-057-MY3,and 112-2622-8-992-009-TD1.
文摘DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity,capable of crippling critical infrastructures and disrupting services globally.As networks continue to expand and threats become more sophisticated,there is an urgent need for Intrusion Detection Systems(IDS)capable of handling these challenges effectively.Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics.This paper presents a novel approach for detecting unknown Distributed Denial of Service(DDoS)attacks by integrating Sliced Iterative Normalizing Flows(SINF)into IDS.SINF utilizes the Sliced Wasserstein distance to repeatedly modify probability distributions,enabling better management of high-dimensional data when there are only a few samples available.The unique architecture of SINF ensures efficient density estimation and robust sample generation,enabling IDS to adapt dynamically to emerging threats without relying heavily on predefined signatures or extensive retraining.By incorporating Open-Set Recognition(OSR)techniques,this method improves the system’s ability to detect both known and unknown attacks while maintaining high detection performance.The experimental evaluation on CICIDS2017 and CICDDoS2019 datasets demonstrates that the proposed system achieves an accuracy of 99.85%for known attacks and an F1 score of 99.99%after incremental learning for unknown attacks.The results clearly demonstrate the system’s strong generalization capability across unseen attacks while maintaining the computational efficiency required for real-world deployment.
基金Supported in part by Natural Science Foundation of Guangxi(2023GXNSFAA026246)in part by the Central Government's Guide to Local Science and Technology Development Fund(GuikeZY23055044)in part by the National Natural Science Foundation of China(62363003)。
文摘In this paper,we consider the maximal positive definite solution of the nonlinear matrix equation.By using the idea of Algorithm 2.1 in ZHANG(2013),a new inversion-free method with a stepsize parameter is proposed to obtain the maximal positive definite solution of nonlinear matrix equation X+A^(*)X|^(-α)A=Q with the case 0<α≤1.Based on this method,a new iterative algorithm is developed,and its convergence proof is given.Finally,two numerical examples are provided to show the effectiveness of the proposed method.
基金supported by Healthy China initiative of Traditional Chinese Medicine(No.889042).
文摘Currently,the number of patients with myopia is increasing rapidly across the globe.Traditional Chinese medicine(TCM),with its long history and rich experience,has shown promise in effectively managing and treating this condition.Nevertheless,considering the vast amount of research that is currently being conducted,focusing on the utilization of TCM in the management of myopia,there is an urgent requirement for a thorough and comprehensive review.The review would serve to clarify the practical applications of TCM within this specific field,and it would also aim to elucidate the underlying mechanisms that are at play,providing a deeper understanding of how TCM principles can be effectively integrated into modern medical practices.Here,some modern medical pathogenesis of myopia and appropriate TCM techniques studies are summarized in the prevention and treatment of myopia.Further,we discussed the potential mechanisms and the future research directions of TCM against myopia.Identifying these mechanisms is crucial for understanding how TCM can be effectively utilized in this context.The combination of various TCM methods or the combination of traditional Chinese and Western medicine is of great significance for the prevention and control of myopia in the future.
基金supported by the National Key Research and Development Program of China(2023YFF0906502)the Postgraduate Research and Innovation Project of Hunan Province under Grant(CX20240473).
文摘Due to the digital transformation tendency among cultural institutions and the substantial influence of the social media platform,the demands of visual communication keep increasing for promoting traditional cultural artifacts online.As an effective medium,posters serve to attract public attention and facilitate broader engagement with cultural artifacts.However,existing poster generation methods mainly rely on fixed templates and manual design,which limits their scalability and adaptability to the diverse visual and semantic features of the artifacts.Therefore,we propose CAPGen,an automated aesthetic Cultural Artifacts Poster Generation framework built on a Multimodal Large Language Model(MLLM)with integrated iterative optimization.During our research,we collaborated with designers to define principles of graphic design for cultural artifact posters,to guide the MLLM in generating layout parameters.Later,we generated these parameters into posters.Finally,we refined the posters using an MLLM integrated with a multi-round iterative optimization mechanism.Qualitative results show that CAPGen consistently outperforms baseline methods in both visual quality and aesthetic performance.Furthermore,ablation studies indicate that the prompt,iterative optimization mechanism,and design principles significantly enhance the effectiveness of poster generation.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2023-00235509Development of security monitoring technology based network behavior against encrypted cyber threats in ICT convergence environment).
文摘With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.
基金supported by the National Natural Science Foundation of China,No.31760290,82160688the Key Development Areas Project of Ganzhou Science and Technology,No.2022B-SF9554(all to XL)。
文摘Synaptic pruning is a crucial process in synaptic refinement,eliminating unstable synaptic connections in neural circuits.This process is triggered and regulated primarily by spontaneous neural activity and experience-dependent mechanisms.The pruning process involves multiple molecular signals and a series of regulatory activities governing the“eat me”and“don't eat me”states.Under physiological conditions,the interaction between glial cells and neurons results in the clearance of unnecessary synapses,maintaining normal neural circuit functionality via synaptic pruning.Alterations in genetic and environmental factors can lead to imbalanced synaptic pruning,thus promoting the occurrence and development of autism spectrum disorder,schizophrenia,Alzheimer's disease,and other neurological disorders.In this review,we investigated the molecular mechanisms responsible for synaptic pruning during neural development.We focus on how synaptic pruning can regulate neural circuits and its association with neurological disorders.Furthermore,we discuss the application of emerging optical and imaging technologies to observe synaptic structure and function,as well as their potential for clinical translation.Our aim was to enhance our understanding of synaptic pruning during neural development,including the molecular basis underlying the regulation of synaptic function and the dynamic changes in synaptic density,and to investigate the potential role of these mechanisms in the pathophysiology of neurological diseases,thus providing a theoretical foundation for the treatment of neurological disorders.
文摘THE Nanjing Yunjin brocade,known for its stunning luster,exquisite patterns,and a wealth of shades,represents the highest level of Chinese brocade craftsmanship.It was the designated textile for the imperial courts of the Yuan(1206-1368),Ming(1368-1644),and Qing(1616-1911)dynasties,and is still highly regarded to this day.
文摘Mining operation, especially underground coal mining, always has the remarkable risks of ground control. Passive seismic velocity tomography based on simultaneous iterative reconstructive technique (SIRT) inversion is used to deduce the stress redistribution around the longwall mining panel. The mining-induced microseismic events were recorded by mounting an array of receivers on the surface, above the active panel. After processing and filtering the seismic data, the three-dimensional tomography images of the p-wave velocity variations by SIRT passive seismic velocity tomography were provided. To display the velocity changes on coal seam level and subsequently to infer the stress redistribution, these three-dimensional tomograms into the coal seam level were sliced. In addition, the boundary element method (BEM) was used to simulate the stress redistribution. The results show that the inferred stresses from the passive seismic tomograms are conformed to numerical models and theoretical concept of the stress redistribution around the longwall panel. In velocity tomograms, the main zones of the stress redistribution arotmd the panel, including front and side abutment pressures, and gob stress are obvious and also the movement of stress zones along the face advancement is evident. Moreover, the effect of the advance rate of the face on the stress redistribution is demonstrated in tomography images. The research result proves that the SIRT passive seismic velocity tomography has an ultimate potential for monitoring the changes of stress redistribution around the longwall mining panel continuously and subsequently to improve safety of mining operations.
基金financially supported by the National Natural Science Foundation of China (Grant 51278420)the Natural Science Foundation of Shaanxi Province (Grant 2017JM5021)
文摘In this paper, to investigate the influence of soil inhomogeneity on the bending of circular thinplates on elastic foundations, the static problem of circular thin plates on Gibson elasticfoundation is solved using an iterative method based on the modified Vlasov model. On the basisof the principle of minimum potential energy, the governing differential equations and boundaryconditions for circular thin plates on modified Vlasov foundation considering the characteristics ofGibson soil are derived. The equations for the attenuation parameter in bending problem are alsoobtained, and the issue of unknown parameters being difficult to determine is solved using theiterative method. Numerical examples are analyzed and the results are in good agreement withthose form other literatures. It proves that the method is practical and accurate. Theinhomogeneity of modified Vlasov foundations has some influence on the deformation andinternal force behavior of circular thin plates. The effects of various parameters on the bending ofcircular plates and characteristic parameters of the foundation are discussed. The modified modelfurther enriches and develops the elastic foundations. Relevant conclusions that are meaningful toengineering practice are drawn.
文摘Iterative feedback tuning is an attractive method for industry as it is a model free approach using experiments conducted on the plant to tune controller parameters. Classically Gauss-Newton iterative methods are used in IFT to update the controller parameters in the negative gradient direction of a specified design criterion function. Levenburg-Marquardt and Trust-Region strategies offer attractive advantages to Gauss-Newton in many applications,these alternative methods are given and results from simulation presented. A discussion on the differences between line search methods and Trust-Region methods is given showing the Trust-Region search direction is more flexible. Step size selection is often the limiting factor and it is found that with unknown step size values and initial controller parameters the Trust-Region is the best selection,where as if overshoot is a concern Levenburg-Marquardt is a good choice.Gauss-Newton method provides quick convergence and a fast response time however it shows more dependence on the step size.
文摘Purpose: To evaluate the quality of three-dimensional (3D) CT angiography images of the abdominal viscera with small focal spot, low tube voltage, and iterative model reconstruction technique (IMR). Materials and Methods: Seven patients with suspected disease of the pancreatobiliary system had undergone CT with high-quality CTA protocol in the present study. There were 5 men and 2 women, ranging in age from 52 to 80 years (mean: 64 years). Results: Depiction of abdominal small artery, small portal vein was possible in all cases. In two cases that we were able to compare, it was superior to standard CTA in small vascular depiction in CTA made clearly in high quality protocol. Conclusions: Although the use of small focal spot, low tube voltage, and IMR can produce higher-quality images of abdominal vessels than standard CTA, this improvement is not significant at elevated radiation doses.
基金Project supported by the National Natural Science Foundation of China(No.11671106)the Fundamental Research Funds for the Central Universities(No.2016MS33)
文摘This study develops an optimized finite difference iterative (OFDI) scheme for the two-dimensional (2D) viscoelastic wave equation. The OFDI scheme is obtained using a proper orthogonal decomposition (POD) method. It has sufficiently high accuracy with very few unknowns for the 2D viscoelastic wave equation. Existence, stability, and convergence of the OFDI solutions are analyzed. Numerical simulations verify efficiency and feasibility of the proposed scheme.
文摘The objective of this paper is to develop monotone techniques for obtaining extremal solutions of initial value problem for nonlinear neutral delay differential equations.
基金National Natural Science Foundation of China(No.11271372)Hunan Provincial National Natural Science Foundation of China(No.12JJ2004)Central South University Graduate Innovation Project,China(No.2014zzts136)
文摘In this paper,the existence and uniqueness of iterative solutions to the boundary value problems for a class of first order impulsive integro-differential equations were studied. Under a new concept of upper and lower solutions, a new monotone iterative technique on the boundary value problem of integro-differential equations was proposed. The existence and uniqueness of iterative solutions and the error estimation in certain interval were obtained.An example was also given to illustrate the results.
基金Supported by National Natural Science Foundation of China(Grant No.51675446)Independent Research Project of State Key Laboratory of Traction Power(Grant No.2019TPL-T13).
文摘In the digital image correlation research of fatigue crack growth rate,the accuracy of the crack tip position determines the accuracy of the calculation of the stress intensity factor,thereby affecting the life prediction.This paper proposes a Gauss-Newton iteration method for solving the crack tip position.The conventional linear fitting method provides an iterative initial solution for this method,and the preconditioned conjugate gradient method is used to solve the ill-conditioned matrix.A noise-added artificial displacement field is used to verify the feasibility of the method,which shows that all parameters can be solved with satisfactory results.The actual stress intensity factor solution case shows that the stress intensity factor value obtained by the method in this paper is very close to the finite element result,and the relative error between the two is only−0.621%;The Williams coefficient obtained by this method can also better define the contour of the plastic zone at the crack tip,and the maximum relative error with the test plastic zone area is−11.29%.The relative error between the contour of the plastic zone defined by the conventional method and the area of the experimental plastic zone reached a maximum of 26.05%.The crack tip coordinates,stress intensity factors,and plastic zone contour changes in the loading and unloading phases are explored.The results show that the crack tip change during the loading process is faster than the change during the unloading process;the stress intensity factor during the unloading process under the same load condition is larger than that during the loading process;under the same load,the theoretical plastic zone during the unloading process is higher than that during the loading process.
文摘This paper deals with fractional integro-differential equations involving Hadamard fractional derivatives and nonlinear boundary conditions in an ordered Banach space. The nonlinearity is allowed to be singular with respect to time variable. Under some monotonicity conditions and noncompactness measure conditions, we use the method of coupled lower and upper L-quasisolutions associated with the mixed monotone iterative technique to investigate the existence of extremal L-quasisolutions. A unique solution between coupled lower and upper L-quasisolutions is also obtained. An example is given to illustrate our theoretical results. The results got in this paper are new and enrich the existing related work.
基金funded by the project of Guangdong Provincial Basic and Applied Basic Research Fund Committee(2022A1515240073)the Pearl River Talent Recruitment Program(2019CX01G338),Guangdong Province.
文摘Construction engineering and management(CEM)has become increasingly complicated with the increasing size of engineering projects under different construction environments,motivating the digital transformation of CEM.To contribute to a better understanding of the state of the art of smart techniques for engineering projects,this paper provides a comprehensive review of multi-criteria decision-making(MCDM)techniques,intelligent techniques,and their applications in CEM.First,a comprehensive framework detailing smart technologies for construction projects is developed.Next,the characteristics of CEM are summarized.A bibliometric review is then conducted to investigate the keywords,journals,and clusters related to the application of smart techniques in CEM during 2000-2022.Recent advancements in intelligent techniques are also discussed under the following six topics:①big data technology;②computer vision;③speech recognition;④natural language processing;⑤machine learning;and⑥knowledge representation,understanding,and reasoning.The applications of smart techniques are then illustrated via underground space exploitation.Finally,future research directions for the sustainable development of smart construction are highlighted.
基金supported in part by the National Natural Science Foundation of China(62273310)the Natural Science Foundation of Zhejiang Province of China(LY22F030006,LZ24F030009)
文摘The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a blockchain-enabled manufacturing collaboration framework is proposed,with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P)collaboration.First,a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain.Second,an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants.Third,a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information.It facilitates automation of the matching process while protecting users'privacy via blockchainbased smart contracts.Finally,simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4%compared to the Bayesian game-based approach,makes all participants profitable,and achieves 90%fairness of enterprises.
基金supported by the National Natural Science Foundation of China(Nos.12341501 and 11905074)。
文摘Precise transverse emittance assessment in electron beams is crucial for advancing high-brightness beam injectors.As opposed to intricate methodologies that use specialized devices,quadrupole focusing strength scanning(Q-scanning)techniques offer notable advantages for various injectors owing to their inherent convenience and cost-effectiveness.However,their stringent approximation conditions lead to inevitable errors in practical operation,thereby limiting their widespread application.This study addressed these challenges by revisiting the analytical derivation procedure and investigating the effects of the underlying approximation conditions.Preliminary corrections were explored through a combination of data processing analysis and numerical simulations.Furthermore,based on theoretical derivations,virtual measurements using beam dynamics calculations were employed to evaluate the correction reliability.Subsequent experimental validations were performed at the Huazhong University of Science and Technology injector to verify the effectiveness of the proposed compensation method.Both the virtual and experimental results confirm the feasibility and reliability of the enhanced Q-scanning-based diagnosis for transverse emittance in typical beam injectors operating under common conditions.Through the integration of these corrections and compensations,enhanced Q-scanning-based techniques emerge as promising alternatives to traditional emittance diagnosis methods.