In 2021,Cempaka,a tiny tropical cyclone,made landfall in China.As the TC intensified prior to landfall,the tropical cyclone size measured with precipitation decreased significantly.A numerical simulation was conducted...In 2021,Cempaka,a tiny tropical cyclone,made landfall in China.As the TC intensified prior to landfall,the tropical cyclone size measured with precipitation decreased significantly.A numerical simulation was conducted to examine the possible processes modulating the storm size.Azimuthally mean potential vorticity(PV)was found to decrease mainly in the middle to upper troposphere between 50-and 80-km radii.The PV budget results indicate that the advection and generation of mean PV associated with asymmetric processes,rather than the symmetric processes,primarily contributed to the decrease in mean PV.These asymmetric processes leading to a negative PV tendency were likely associated with inactive outer rainbands.In contrast,the tangential winds simultaneously expanded radially outward,possibly related to inner-core diabatic heating.The findings here emphasize the importance of outer rainband activity in tropical cyclone size change.展开更多
In this study,we explore some of the best proximity point results for generalized proximal contractions in the setting of double-controlled metric-type spaces.A non-trivial example is given to elucidate our analysis,a...In this study,we explore some of the best proximity point results for generalized proximal contractions in the setting of double-controlled metric-type spaces.A non-trivial example is given to elucidate our analysis,and some novel results are derived.The discovered results generalize previously known results in the context of a double controlled metric type space environment.This article’s proximity point results are the first of their kind in the realm of controlled metric spaces.To build on the results achieved in this article,we present an application demonstrating the usability of the given results.展开更多
AIM:To evaluate the efficacy and safety of combining posterior scleral contraction(PSC)with intravitreal perfluoropropane(C_(3)F_(8))injection in high myopia with macular hole retinal detachment(MHRD).METHODS:A total ...AIM:To evaluate the efficacy and safety of combining posterior scleral contraction(PSC)with intravitreal perfluoropropane(C_(3)F_(8))injection in high myopia with macular hole retinal detachment(MHRD).METHODS:A total of 22 participants(22 eyes)with high myopia[axial length(AL)≥26.5 mm]and MHRD who underwent PSC combined with intravitreal C_(3)F_(8)injection,with at least 6mo of follow-up were retrospectively recruited.Outcome measures included best-corrected visual acuity(BCVA),AL,optical coherence tomography(OCT)findings,and adverse events.Retinal recovery was categorized as type Ⅰ(macular hole bridging with retinal reattachment)or type Ⅱ(reattachment without hole bridging).RESULTS:The mean age of participants was 62.1±8.8y and mean follow-up duration was 9.18±4.21mo.Complete retinal reattachment was observed in 11 eyes(50%)at postoperative day 1,19 eyes(86.3%)at week 1,and all 22 eyes at month 1.Ten eyes(45.5%)achieved type Ⅰ recovery and 12 eyes(54.5%)achieved type Ⅱ.Mean BCVA improved from 1.68±0.84 logMAR before surgery to 1.21±0.65 logMAR after surgery(P<0.001),and AL was significantly reduced compared to baseline(29.07±2.05 vs 30.8±2.2 mm;P<0.001).No serious complications were reported.CONCLUSION:PSC combined with intravitreal C_(3)F_(8)injection is a safe and effective treatment for MHRD in highly myopic eyes,especially for retinal detachment limited within the vascular arcade.展开更多
In this manuscript,the notion of a hesitant fuzzy soft fixed point is introduced.Using this notion and the concept of Suzuki-type(μ,ν)-weak contraction for hesitant fuzzy soft set valued-mapping,some fixed point res...In this manuscript,the notion of a hesitant fuzzy soft fixed point is introduced.Using this notion and the concept of Suzuki-type(μ,ν)-weak contraction for hesitant fuzzy soft set valued-mapping,some fixed point results are established in the framework of metric spaces.Based on the presented work,some examples reflecting decision-making problems related to real life are also solved.The suggested method’s flexibility and efficacy compared to conventional techniques are demonstrated in decision-making situations involving uncertainty,such as choosing the best options in multi-criteria settings.We noted that the presented work combines and generalizes two major concepts,the idea of soft sets and hesitant fuzzy set-valued mapping from the existing literature.展开更多
The conventional selective template etching method to fabricate yolk-shell microwave absorbers is inconvenient and inefficient,so the thermally-driven contraction strategy was used to prepare asymmetric yolk-shell MnS...The conventional selective template etching method to fabricate yolk-shell microwave absorbers is inconvenient and inefficient,so the thermally-driven contraction strategy was used to prepare asymmetric yolk-shell MnSe@C microsphere microwave absorbers via self-template directed transformation.The self-templated oriented transformation enables compositional customization and enhances the template utilization.The confinement effect of the carbon shell is crucial for realizing the thermally-driven contraction strategy and contributes to the strong conduction loss to MnSe@C.On the other hand,the enhanced polarization loss benefits from the abundant heterogeneous interfaces and defects in the asymmetric yolk-shell MnSe@C microspheres.The rich cavities in the yolk-shell structure not only facilitate optimal impedance matching,but also promote the enhancement of multiple reflection loss(RL).As a result,the asymmetric yolk-shell MnSe@C microspheres obtain excellent microwave absorption perfor-mance,the minimum RL(RL_(min))and the maximum effective absorption bandwidth(EAB)reaching-54.4 dB and 5.1 GHz,respectively,at a thickness of 1.9 mm.The successful obtainment of the asymmetric yolk-shell MnSe@C microspheres paves the way for the convenient synthesis of the yolk-shell transitionmetal selenides(TMSs)microwave absorbers.展开更多
This article improves and advances the results achieved by Vishal and Naveen,leveraging the use of Lebesgue integrable functions.Going beyond,we investigate fixed point theorems associated with a concept introduced by...This article improves and advances the results achieved by Vishal and Naveen,leveraging the use of Lebesgue integrable functions.Going beyond,we investigate fixed point theorems associated with a concept introduced by Ovidiu Popescu.Our research not only bolsters the theoretical framework but also unveils practical applications in the domain of Lebesgue integrals as in Example 3.6.Furthermore,our contribution enhances the understanding of fixed point theorems in metric spaces and introduces novel perspectives in the study of generalizedα-Geraghty contractive mappings on Lebesgue integrals.展开更多
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor...This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.展开更多
Twelve novel transition-rare-earth metal clusters,formulated as [Ni_(18)Pr_(14)(μ_(3)OH)_(14)(dmpa)_(10)(mmt)_(10)(SO_(4))_(4)(CH_(3)COO)_(16)]·9CH_(3)OH·5H_(2)O(1,H_(3)dmpa=dimethylolpropionic acid,and Hmm...Twelve novel transition-rare-earth metal clusters,formulated as [Ni_(18)Pr_(14)(μ_(3)OH)_(14)(dmpa)_(10)(mmt)_(10)(SO_(4))_(4)(CH_(3)COO)_(16)]·9CH_(3)OH·5H_(2)O(1,H_(3)dmpa=dimethylolpropionic acid,and Hmmt=2-me rcapto-5-methyl-1,3,4-thiadiazole) [Ni_(36)RE_(102)(OH)_(138)(mmt)_(18)(Hdmpa)_(30)(H_(2)dmpa)_(12)(CH_(3)COO)_(72)(NO_(3))_(36)(SO_(4))_(18)(H_(2)O)_(30)]·Br_(6)(RE=Nd(2),Sm(3),Eu(4) and Gd(5))[Ni_(12)RE_(10)(μ_(3)-OH)_(10)(dmpa)_(8)(mmt)_(8)(S(_(4))2(CH_(3)COO)_(8)(H_(2)O)_(4)]·8CH_(3)OH·7H_(2)O(RE = Tb(6),Dy(7),Ho(8),Er(9) and Y(10)) [Ni_(8)Pr_(8)(μ_(3)-OH)_(8)(mmt)_(8)(Hdpga)_(16)(CH3COO)_(8)]·8CH_(3)OH(11,H_(2)dpga=diphe nyl-glycolic acid),and [Ni_(16)Tb_(6)(μ_(3)-OH)_(24)(mmt)_(8)(Hdpga)_(4)(dpga)_(4)(CH_(3)COO)_(2)(NO_(3))_(4)(H_(2)O)_(2)]·12CH_(3)OH·5H_(2)O(12),were synthesized solvothermally by using different ligand combinations and rare earth nitrates.X-ray crystal structure analyses reveal that complexes 1 and 12 possess sandwich-like structure.Compounds 2-5 are isostructural and feature a hexagonal structure,shaped like a "Star of David".Isostructural 6-10 present ring-like structure,as well as the cluster 11.The structural variations of these complexes can be attributed to the effect of lanthanide contraction.Moreover,the template effect of SO_(4)^(2-) anion derived from the slow decomposition of Hmmt ligand also plays a significant role in the formation of cluster skeletons.The insitu mechanism for the generation of sulfate anion is briefly discussed.Meanwhile,the magnetic properties of complexes 2-11 were studied which show typical antiferromagnetic interactions.展开更多
In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on...In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on the electron radius under motion, incorporating the effects of length contraction. The findings suggest that the radius is subject to Lorentz contraction, which has interesting implications for relativistic effects at the subatomic level.展开更多
The limitation of traditional layout system and the continuous contraction of villages and towns have brought challenges to the layout of public service facilities.It is an imperative task against this background to i...The limitation of traditional layout system and the continuous contraction of villages and towns have brought challenges to the layout of public service facilities.It is an imperative task against this background to integrate space resources and allocate public service facilities scientifically and reasonably.This paper took the system and method of rural public service facility allocation from the perspective of smart contraction as the theoretic support,and Zixi County in Jiangxi Province for example,built the four-level life circle of“county-fundamental-basic-routine”based on the influence factors of facility allocation,village and town contraction strength,rural comprehensive assessment results,residents’trip willingness and demands on public service facilities,finally proposed the suggestions for optimizing the allocation of village and town public service facilities.展开更多
Background and aims:Idiopathic premature ventricular contractions(PVCs)may cause subtle changes in left atrium(LA)structure and function.Here,we investigated whether serum sodium,body mass index(BMI),N-terminal pro-B-...Background and aims:Idiopathic premature ventricular contractions(PVCs)may cause subtle changes in left atrium(LA)structure and function.Here,we investigated whether serum sodium,body mass index(BMI),N-terminal pro-B-type natriuretic peptide(NT-proBNP)and other characteristics might be associated with LA in these patients.Methods:A total of 268 consecutive patients diagnosed with idiopathic PVCs were retrospectively analyzed.We assessed associations of enlarged LA and with the clinical features obtained from 24-hour Holter monitoring,electro-cardiography and serum data in patients with PVCs.Results:Patients with an enlarged LA(n=101),compared with a normal LA(n=167),had significantly lower serum sodium(140.9±3.0 mmol/L vs 141.7±2.8 mmol/L;P=0.022),higher BMI(24.5±2.7 kg/m2 vs 21.7±2.5 kg/m2;P<0.001),higher NT-proBNP[99.3(193.6)pg/mL vs 77.8(68.8)pg/mL;P<0.001]and lower average heart rates(73.0±8.0 bpm vs 75.3±7.6 bpm;P=0.019).No significant differences were observed in P-wave dispersion,QRS duration,PVC coupling interval,pleomorphism,circadian rhythm,non-sustained ventricular tachycardia,serum potassium,serum magnesium,hypersensitive C-reactive protein,low-density lipoprotein cholesterol,symptoms and PVC duration.Conclusions:Beyond the burden of PVCs,attributes such as serum sodium,BMI,NT-proBNP and average heart beats may potentially correlate with LA enlargement in individuals with idiopathic PVCs.展开更多
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont...Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart contracts for personal financial gain, which undermines the integrity of the Ethereum blockchain. This paper proposes a computer program called SADA (Static and Dynamic Analyzer), a novel approach to smart contract vulnerability detection using multiple Large Language Model (LLM) agents to analyze and flag suspicious Solidity code for Ethereum smart contracts. SADA not only improves upon existing vulnerability detection methods but also paves the way for more secure smart contract development practices in the rapidly evolving blockchain ecosystem.展开更多
Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained envi...Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical.展开更多
This article explores the characteristics of data resources from the perspective of production factors,analyzes the demand for trustworthy circulation technology,designs a fusion architecture and related solutions,inc...This article explores the characteristics of data resources from the perspective of production factors,analyzes the demand for trustworthy circulation technology,designs a fusion architecture and related solutions,including multi-party data intersection calculation,distributed machine learning,etc.It also compares performance differences,conducts formal verification,points out the value and limitations of architecture innovation,and looks forward to future opportunities.展开更多
Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,...Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,as such errors can be exploited to compromise blockchain security.Existing vulnerability detection methods often rely on fixed rules or target specific vulnerabilities,limiting their scalability and adaptability to diverse smart contract scenarios.Furthermore,natural language processing approaches for source code analysis frequently fail to capture program flow,which is essential for identifying structural vulnerabilities.To address these limitations,we propose a novel model that integrates textual and structural information for smart contract vulnerability detection.Our approach employs the CodeBERT NLP model for textual analysis,augmented with structural insights derived from control flow graphs created using the abstract syntax tree and opcode of smart contracts.Each graph node is embedded using Sent2Vec,and centrality analysis is applied to highlight critical paths and nodes within the code.The extracted features are normalized and combined into a prompt for a large language model to detect vulnerabilities effectivel.Experimental results demonstrate the superiority of our model,achieving an accuracy of 86.70%,a recall of 84.87%,a precision of 85.24%,and an F1-score of 84.46%.These outcomes surpass existing methods,including CodeBERT alone(accuracy:81.26%,F1-score:79.84%)and CodeBERT combined with abstract syntax tree analysis(accuracy:83.48%,F1-score:79.65%).The findings underscore the effectiveness of incorporating graph structural information alongside text-based analysis,offering improved scalability and performance in detecting diverse vulnerabilities.展开更多
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attack...Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attacks on smart contracts often cause huge economic losses.Since it is difficult to repair and update smart contracts,it is necessary to find the vulnerabilities before they are deployed.However,code analysis,which requires traversal paths,and learning methods,which require many features to be trained,are too time-consuming to detect large-scale on-chain contracts.Learning-based methods will obtain detection models from a feature space compared to code analysis methods such as symbol execution.But the existing features lack the interpretability of the detection results and training model,even worse,the large-scale feature space also affects the efficiency of detection.This paper focuses on improving the detection efficiency by reducing the dimension of the features,combined with expert knowledge.In this paper,a feature extraction model Block-gram is proposed to form low-dimensional knowledge-based features from bytecode.First,the metadata is separated and the runtime code is converted into a sequence of opcodes,which are divided into segments based on some instructions(jumps,etc.).Then,scalable Block-gram features,including 4-dimensional block features and 8-dimensional attribute features,are mined for the learning-based model training.Finally,feature contributions are calculated from SHAP values to measure the relationship between our features and the results of the detection model.In addition,six types of vulnerability labels are made on a dataset containing 33,885 contracts,and these knowledge-based features are evaluated using seven state-of-the-art learning algorithms,which show that the average detection latency speeds up 25×to 650×,compared with the features extracted by N-gram,and also can enhance the interpretability of the detection model.展开更多
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,com...The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,complex functions such as matrix operations are difficult to implement on Ethereum Virtual Machine(EVM)-based smart contract platforms due to their distributed security environment limitations.Existing off-chain methods often result in a significant reduction in contract execution efficiency,thus a platform software development kit interface implementation method has become a feasible way to reduce overheads,but this method cannot verify operation correctness and may leak sensitive user data.To solve the above problems,we propose a verifiable EVM-based smart contract cross-language implementation scheme for complex operations,especially matrix operations,which can guarantee operation correctness and user privacy while ensuring computational efficiency.In this scheme,a verifiable interaction process is designed to verify the computation process and results,and a matrix blinding technology is introduced to protect sensitive user data in the calculation process.The security analysis and performance tests show that the proposed scheme can satisfy the correctness and privacy of the cross-language implementation of smart contracts at a small additional efficiency cost.展开更多
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide ...With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide strong security guarantees for IoT.However,at the same time,smart contracts themselves face numerous security challenges,among which reentrancy vulnerabilities are particularly prominent.Existing detection tools for reentrancy vulnerabilities often suffer from high false positive and false negative rates due to their reliance on identifying patterns related to specific transfer functions.To address these limitations,this paper proposes a novel detection method that combines pattern matching with deep learning.Specifically,we carefully identify and define three common patterns of reentrancy vulnerabilities in smart contracts.Then,we extract key vulnerability features based on these patterns.Furthermore,we employ a Graph Attention Neural Network to extract graph embedding features from the contract graph,capturing the complex relationships between different components of the contract.Finally,we use an attention mechanism to fuse these two sets of feature information,enhancing the weights of effective information and suppressing irrelevant information,thereby significantly improving the accuracy and robustness of vulnerability detection.Experimental results demonstrate that our proposed method outperforms existing state-ofthe-art techniques,achieving a 3.88%improvement in accuracy compared to the latest vulnerability detection model AME(Attentive Multi-Encoder Network).This indicates that our method effectively reduces false positives and false negatives,significantly enhancing the security and reliability of smart contracts in the evolving IoT ecosystem.展开更多
With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, i...With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD (LSTM-Transformer smart Ponzi schemes detection), which is a Ponzi scheme detection method that combines Long Short-Term Memory (LSTM) and Transformer considering the time-series transaction information of smart contracts as well as the global information. Based on the verified smart contract addresses, account features, and code features are extracted to construct a feature dataset, and the SMOTE-Tomek algorithm is used to deal with the imbalanced data classification problem. By comparing our method with the other four typical detection methods in the experiment, the LT-SPSD method shows significant performance improvement in precision, recall, and F1-score. The results of the experiment confirm the efficacy of the model, which has some application value in Ethereum Ponzi scheme smart contract detection.展开更多
A class B of complex functions is introduced and several existence theorems of unique(common) fixed points for mappings satisfying a B-implicit contraction are presented.Moreover, the existence results of common fixed...A class B of complex functions is introduced and several existence theorems of unique(common) fixed points for mappings satisfying a B-implicit contraction are presented.Moreover, the existence results of common fixed points for two mappings on a nonempty set with two complex valued metrics are provided. Our outcomes generalize and improve some known results, especially, for instance, Banach contraction principle, Chatterjea-type fixed point theorem and the corresponding fixed point theorems.展开更多
基金jointly supported by the National Natural Science Foundation of China[grant numbers U2342202 and 42175005]the Qing Lan Project[grant number R2023Q06]。
文摘In 2021,Cempaka,a tiny tropical cyclone,made landfall in China.As the TC intensified prior to landfall,the tropical cyclone size measured with precipitation decreased significantly.A numerical simulation was conducted to examine the possible processes modulating the storm size.Azimuthally mean potential vorticity(PV)was found to decrease mainly in the middle to upper troposphere between 50-and 80-km radii.The PV budget results indicate that the advection and generation of mean PV associated with asymmetric processes,rather than the symmetric processes,primarily contributed to the decrease in mean PV.These asymmetric processes leading to a negative PV tendency were likely associated with inactive outer rainbands.In contrast,the tangential winds simultaneously expanded radially outward,possibly related to inner-core diabatic heating.The findings here emphasize the importance of outer rainband activity in tropical cyclone size change.
文摘In this study,we explore some of the best proximity point results for generalized proximal contractions in the setting of double-controlled metric-type spaces.A non-trivial example is given to elucidate our analysis,and some novel results are derived.The discovered results generalize previously known results in the context of a double controlled metric type space environment.This article’s proximity point results are the first of their kind in the realm of controlled metric spaces.To build on the results achieved in this article,we present an application demonstrating the usability of the given results.
文摘AIM:To evaluate the efficacy and safety of combining posterior scleral contraction(PSC)with intravitreal perfluoropropane(C_(3)F_(8))injection in high myopia with macular hole retinal detachment(MHRD).METHODS:A total of 22 participants(22 eyes)with high myopia[axial length(AL)≥26.5 mm]and MHRD who underwent PSC combined with intravitreal C_(3)F_(8)injection,with at least 6mo of follow-up were retrospectively recruited.Outcome measures included best-corrected visual acuity(BCVA),AL,optical coherence tomography(OCT)findings,and adverse events.Retinal recovery was categorized as type Ⅰ(macular hole bridging with retinal reattachment)or type Ⅱ(reattachment without hole bridging).RESULTS:The mean age of participants was 62.1±8.8y and mean follow-up duration was 9.18±4.21mo.Complete retinal reattachment was observed in 11 eyes(50%)at postoperative day 1,19 eyes(86.3%)at week 1,and all 22 eyes at month 1.Ten eyes(45.5%)achieved type Ⅰ recovery and 12 eyes(54.5%)achieved type Ⅱ.Mean BCVA improved from 1.68±0.84 logMAR before surgery to 1.21±0.65 logMAR after surgery(P<0.001),and AL was significantly reduced compared to baseline(29.07±2.05 vs 30.8±2.2 mm;P<0.001).No serious complications were reported.CONCLUSION:PSC combined with intravitreal C_(3)F_(8)injection is a safe and effective treatment for MHRD in highly myopic eyes,especially for retinal detachment limited within the vascular arcade.
基金funded by National Science,Research and Innovation Fund(NSRF)King Mongkut's University of Technology North Bangkok with Contract No.KMUTNB-FF-68-B-46.
文摘In this manuscript,the notion of a hesitant fuzzy soft fixed point is introduced.Using this notion and the concept of Suzuki-type(μ,ν)-weak contraction for hesitant fuzzy soft set valued-mapping,some fixed point results are established in the framework of metric spaces.Based on the presented work,some examples reflecting decision-making problems related to real life are also solved.The suggested method’s flexibility and efficacy compared to conventional techniques are demonstrated in decision-making situations involving uncertainty,such as choosing the best options in multi-criteria settings.We noted that the presented work combines and generalizes two major concepts,the idea of soft sets and hesitant fuzzy set-valued mapping from the existing literature.
基金supported by the National Natural Science Foundation of China(Nos.52071053,U1704253,52103334)the Fundamental Research Funds for the Central Universities(No.DUT20GF111)the Fundamental Research Funds of Shaanxi Key Laboratory of Artificially-Structured Functional Materials and Devices(No.AFMD-KFJJ-21102).
文摘The conventional selective template etching method to fabricate yolk-shell microwave absorbers is inconvenient and inefficient,so the thermally-driven contraction strategy was used to prepare asymmetric yolk-shell MnSe@C microsphere microwave absorbers via self-template directed transformation.The self-templated oriented transformation enables compositional customization and enhances the template utilization.The confinement effect of the carbon shell is crucial for realizing the thermally-driven contraction strategy and contributes to the strong conduction loss to MnSe@C.On the other hand,the enhanced polarization loss benefits from the abundant heterogeneous interfaces and defects in the asymmetric yolk-shell MnSe@C microspheres.The rich cavities in the yolk-shell structure not only facilitate optimal impedance matching,but also promote the enhancement of multiple reflection loss(RL).As a result,the asymmetric yolk-shell MnSe@C microspheres obtain excellent microwave absorption perfor-mance,the minimum RL(RL_(min))and the maximum effective absorption bandwidth(EAB)reaching-54.4 dB and 5.1 GHz,respectively,at a thickness of 1.9 mm.The successful obtainment of the asymmetric yolk-shell MnSe@C microspheres paves the way for the convenient synthesis of the yolk-shell transitionmetal selenides(TMSs)microwave absorbers.
文摘This article improves and advances the results achieved by Vishal and Naveen,leveraging the use of Lebesgue integrable functions.Going beyond,we investigate fixed point theorems associated with a concept introduced by Ovidiu Popescu.Our research not only bolsters the theoretical framework but also unveils practical applications in the domain of Lebesgue integrals as in Example 3.6.Furthermore,our contribution enhances the understanding of fixed point theorems in metric spaces and introduces novel perspectives in the study of generalizedα-Geraghty contractive mappings on Lebesgue integrals.
基金Project supported by the National Natural Science Foundation of China(Grant No.62363005)the Jiangxi Provincial Natural Science Foundation(Grant Nos.20161BAB212032 and 20232BAB202034)the Science and Technology Research Project of Jiangxi Provincial Department of Education(Grant Nos.GJJ202602 and GJJ202601)。
文摘This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.
基金Project supported by the National Natural Science Foundation of China (21971203)Support Plan of Shaanxi Province for Young Topnotch TalentFundamental Research Funds for Central Universities。
文摘Twelve novel transition-rare-earth metal clusters,formulated as [Ni_(18)Pr_(14)(μ_(3)OH)_(14)(dmpa)_(10)(mmt)_(10)(SO_(4))_(4)(CH_(3)COO)_(16)]·9CH_(3)OH·5H_(2)O(1,H_(3)dmpa=dimethylolpropionic acid,and Hmmt=2-me rcapto-5-methyl-1,3,4-thiadiazole) [Ni_(36)RE_(102)(OH)_(138)(mmt)_(18)(Hdmpa)_(30)(H_(2)dmpa)_(12)(CH_(3)COO)_(72)(NO_(3))_(36)(SO_(4))_(18)(H_(2)O)_(30)]·Br_(6)(RE=Nd(2),Sm(3),Eu(4) and Gd(5))[Ni_(12)RE_(10)(μ_(3)-OH)_(10)(dmpa)_(8)(mmt)_(8)(S(_(4))2(CH_(3)COO)_(8)(H_(2)O)_(4)]·8CH_(3)OH·7H_(2)O(RE = Tb(6),Dy(7),Ho(8),Er(9) and Y(10)) [Ni_(8)Pr_(8)(μ_(3)-OH)_(8)(mmt)_(8)(Hdpga)_(16)(CH3COO)_(8)]·8CH_(3)OH(11,H_(2)dpga=diphe nyl-glycolic acid),and [Ni_(16)Tb_(6)(μ_(3)-OH)_(24)(mmt)_(8)(Hdpga)_(4)(dpga)_(4)(CH_(3)COO)_(2)(NO_(3))_(4)(H_(2)O)_(2)]·12CH_(3)OH·5H_(2)O(12),were synthesized solvothermally by using different ligand combinations and rare earth nitrates.X-ray crystal structure analyses reveal that complexes 1 and 12 possess sandwich-like structure.Compounds 2-5 are isostructural and feature a hexagonal structure,shaped like a "Star of David".Isostructural 6-10 present ring-like structure,as well as the cluster 11.The structural variations of these complexes can be attributed to the effect of lanthanide contraction.Moreover,the template effect of SO_(4)^(2-) anion derived from the slow decomposition of Hmmt ligand also plays a significant role in the formation of cluster skeletons.The insitu mechanism for the generation of sulfate anion is briefly discussed.Meanwhile,the magnetic properties of complexes 2-11 were studied which show typical antiferromagnetic interactions.
文摘In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on the electron radius under motion, incorporating the effects of length contraction. The findings suggest that the radius is subject to Lorentz contraction, which has interesting implications for relativistic effects at the subatomic level.
文摘The limitation of traditional layout system and the continuous contraction of villages and towns have brought challenges to the layout of public service facilities.It is an imperative task against this background to integrate space resources and allocate public service facilities scientifically and reasonably.This paper took the system and method of rural public service facility allocation from the perspective of smart contraction as the theoretic support,and Zixi County in Jiangxi Province for example,built the four-level life circle of“county-fundamental-basic-routine”based on the influence factors of facility allocation,village and town contraction strength,rural comprehensive assessment results,residents’trip willingness and demands on public service facilities,finally proposed the suggestions for optimizing the allocation of village and town public service facilities.
文摘Background and aims:Idiopathic premature ventricular contractions(PVCs)may cause subtle changes in left atrium(LA)structure and function.Here,we investigated whether serum sodium,body mass index(BMI),N-terminal pro-B-type natriuretic peptide(NT-proBNP)and other characteristics might be associated with LA in these patients.Methods:A total of 268 consecutive patients diagnosed with idiopathic PVCs were retrospectively analyzed.We assessed associations of enlarged LA and with the clinical features obtained from 24-hour Holter monitoring,electro-cardiography and serum data in patients with PVCs.Results:Patients with an enlarged LA(n=101),compared with a normal LA(n=167),had significantly lower serum sodium(140.9±3.0 mmol/L vs 141.7±2.8 mmol/L;P=0.022),higher BMI(24.5±2.7 kg/m2 vs 21.7±2.5 kg/m2;P<0.001),higher NT-proBNP[99.3(193.6)pg/mL vs 77.8(68.8)pg/mL;P<0.001]and lower average heart rates(73.0±8.0 bpm vs 75.3±7.6 bpm;P=0.019).No significant differences were observed in P-wave dispersion,QRS duration,PVC coupling interval,pleomorphism,circadian rhythm,non-sustained ventricular tachycardia,serum potassium,serum magnesium,hypersensitive C-reactive protein,low-density lipoprotein cholesterol,symptoms and PVC duration.Conclusions:Beyond the burden of PVCs,attributes such as serum sodium,BMI,NT-proBNP and average heart beats may potentially correlate with LA enlargement in individuals with idiopathic PVCs.
文摘Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart contracts for personal financial gain, which undermines the integrity of the Ethereum blockchain. This paper proposes a computer program called SADA (Static and Dynamic Analyzer), a novel approach to smart contract vulnerability detection using multiple Large Language Model (LLM) agents to analyze and flag suspicious Solidity code for Ethereum smart contracts. SADA not only improves upon existing vulnerability detection methods but also paves the way for more secure smart contract development practices in the rapidly evolving blockchain ecosystem.
基金supported by National Natural Science Foundation of China.
文摘Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical.
文摘This article explores the characteristics of data resources from the perspective of production factors,analyzes the demand for trustworthy circulation technology,designs a fusion architecture and related solutions,including multi-party data intersection calculation,distributed machine learning,etc.It also compares performance differences,conducts formal verification,points out the value and limitations of architecture innovation,and looks forward to future opportunities.
基金supported by the Seoul Business Agency(SBA),funded by the Seoul Metropolitan Government,through the Seoul R&BD Program(FB240022)by the Korea Institute for Advancement of Technology(KIAT),funded by the Korea Government(MOTIE)(RS-2024-00406796)+1 种基金through the HRD Program for Industrial Innovationby the Excellent Researcher Support Project of Kwangwoon University in 2024.
文摘Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,as such errors can be exploited to compromise blockchain security.Existing vulnerability detection methods often rely on fixed rules or target specific vulnerabilities,limiting their scalability and adaptability to diverse smart contract scenarios.Furthermore,natural language processing approaches for source code analysis frequently fail to capture program flow,which is essential for identifying structural vulnerabilities.To address these limitations,we propose a novel model that integrates textual and structural information for smart contract vulnerability detection.Our approach employs the CodeBERT NLP model for textual analysis,augmented with structural insights derived from control flow graphs created using the abstract syntax tree and opcode of smart contracts.Each graph node is embedded using Sent2Vec,and centrality analysis is applied to highlight critical paths and nodes within the code.The extracted features are normalized and combined into a prompt for a large language model to detect vulnerabilities effectivel.Experimental results demonstrate the superiority of our model,achieving an accuracy of 86.70%,a recall of 84.87%,a precision of 85.24%,and an F1-score of 84.46%.These outcomes surpass existing methods,including CodeBERT alone(accuracy:81.26%,F1-score:79.84%)and CodeBERT combined with abstract syntax tree analysis(accuracy:83.48%,F1-score:79.65%).The findings underscore the effectiveness of incorporating graph structural information alongside text-based analysis,offering improved scalability and performance in detecting diverse vulnerabilities.
基金partially supported by the National Natural Science Foundation (62272248)the Open Project Fund of State Key Laboratory of Computer Architecture,Institute of Computing Technology,Chinese Academy of Sciences (CARCHA202108,CARCH201905)+1 种基金the Natural Science Foundation of Tianjin (20JCZDJC00610)Sponsored by Zhejiang Lab (2021KF0AB04)。
文摘Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attacks on smart contracts often cause huge economic losses.Since it is difficult to repair and update smart contracts,it is necessary to find the vulnerabilities before they are deployed.However,code analysis,which requires traversal paths,and learning methods,which require many features to be trained,are too time-consuming to detect large-scale on-chain contracts.Learning-based methods will obtain detection models from a feature space compared to code analysis methods such as symbol execution.But the existing features lack the interpretability of the detection results and training model,even worse,the large-scale feature space also affects the efficiency of detection.This paper focuses on improving the detection efficiency by reducing the dimension of the features,combined with expert knowledge.In this paper,a feature extraction model Block-gram is proposed to form low-dimensional knowledge-based features from bytecode.First,the metadata is separated and the runtime code is converted into a sequence of opcodes,which are divided into segments based on some instructions(jumps,etc.).Then,scalable Block-gram features,including 4-dimensional block features and 8-dimensional attribute features,are mined for the learning-based model training.Finally,feature contributions are calculated from SHAP values to measure the relationship between our features and the results of the detection model.In addition,six types of vulnerability labels are made on a dataset containing 33,885 contracts,and these knowledge-based features are evaluated using seven state-of-the-art learning algorithms,which show that the average detection latency speeds up 25×to 650×,compared with the features extracted by N-gram,and also can enhance the interpretability of the detection model.
基金supported in part by the National Natural Science Foundation of China under Grant 62272007,U23B2002in part by the Excellent Young Talents Project of the Beijing Municipal University Teacher Team Construction Support Plan under Grant BPHR202203031+1 种基金in part by the Yunnan Key Laboratory of Blockchain Application Technology under Grant 2021105AG070005(YNB202102)in part by the Open Topics of Key Laboratory of Blockchain Technology and Data Security,The Ministry of Industry and Information Technology of the People’s Republic of China under Grant 20243222。
文摘The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,complex functions such as matrix operations are difficult to implement on Ethereum Virtual Machine(EVM)-based smart contract platforms due to their distributed security environment limitations.Existing off-chain methods often result in a significant reduction in contract execution efficiency,thus a platform software development kit interface implementation method has become a feasible way to reduce overheads,but this method cannot verify operation correctness and may leak sensitive user data.To solve the above problems,we propose a verifiable EVM-based smart contract cross-language implementation scheme for complex operations,especially matrix operations,which can guarantee operation correctness and user privacy while ensuring computational efficiency.In this scheme,a verifiable interaction process is designed to verify the computation process and results,and a matrix blinding technology is introduced to protect sensitive user data in the calculation process.The security analysis and performance tests show that the proposed scheme can satisfy the correctness and privacy of the cross-language implementation of smart contracts at a small additional efficiency cost.
基金supported by theHigher Education Research Project of Jilin Province:JGJX24C118the National Defense Basic Scientific Research Program of China(No.JCKY2023602C026).
文摘With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide strong security guarantees for IoT.However,at the same time,smart contracts themselves face numerous security challenges,among which reentrancy vulnerabilities are particularly prominent.Existing detection tools for reentrancy vulnerabilities often suffer from high false positive and false negative rates due to their reliance on identifying patterns related to specific transfer functions.To address these limitations,this paper proposes a novel detection method that combines pattern matching with deep learning.Specifically,we carefully identify and define three common patterns of reentrancy vulnerabilities in smart contracts.Then,we extract key vulnerability features based on these patterns.Furthermore,we employ a Graph Attention Neural Network to extract graph embedding features from the contract graph,capturing the complex relationships between different components of the contract.Finally,we use an attention mechanism to fuse these two sets of feature information,enhancing the weights of effective information and suppressing irrelevant information,thereby significantly improving the accuracy and robustness of vulnerability detection.Experimental results demonstrate that our proposed method outperforms existing state-ofthe-art techniques,achieving a 3.88%improvement in accuracy compared to the latest vulnerability detection model AME(Attentive Multi-Encoder Network).This indicates that our method effectively reduces false positives and false negatives,significantly enhancing the security and reliability of smart contracts in the evolving IoT ecosystem.
基金This work was granted by Qin Xin Talents Cultivation Program(No.QXTCP C202115)Beijing Information Science and Technology University+1 种基金the Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Fund(No.GJJ-23)National Social Science Foundation,China(No.21BTQ079).
文摘With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD (LSTM-Transformer smart Ponzi schemes detection), which is a Ponzi scheme detection method that combines Long Short-Term Memory (LSTM) and Transformer considering the time-series transaction information of smart contracts as well as the global information. Based on the verified smart contract addresses, account features, and code features are extracted to construct a feature dataset, and the SMOTE-Tomek algorithm is used to deal with the imbalanced data classification problem. By comparing our method with the other four typical detection methods in the experiment, the LT-SPSD method shows significant performance improvement in precision, recall, and F1-score. The results of the experiment confirm the efficacy of the model, which has some application value in Ethereum Ponzi scheme smart contract detection.
文摘A class B of complex functions is introduced and several existence theorems of unique(common) fixed points for mappings satisfying a B-implicit contraction are presented.Moreover, the existence results of common fixed points for two mappings on a nonempty set with two complex valued metrics are provided. Our outcomes generalize and improve some known results, especially, for instance, Banach contraction principle, Chatterjea-type fixed point theorem and the corresponding fixed point theorems.