学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术...学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术期刊(A+)等。展开更多
学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术...学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术期刊(A+)等。展开更多
学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术...学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术期刊(A+)等。展开更多
With the increasing use of web applications,challenges in the field of cybersecurity are becoming more complex.This paper explores the application of fine-tuned large language models(LLMs)for the automatic generation ...With the increasing use of web applications,challenges in the field of cybersecurity are becoming more complex.This paper explores the application of fine-tuned large language models(LLMs)for the automatic generation of synthetic attacks,including XSS(Cross-Site Scripting),SQL Injections,and Command Injections.A web application has been developed that allows penetration testers to quickly generate high-quality payloads without the need for in-depth knowledge of artificial intelligence.The fine-tuned language model demonstrates the capability to produce synthetic payloads that closely resemble real-world attacks.This approach not only improves the model’s precision and dependability but also serves as a practical resource for cybersecurity professionals to enhance the security of web applications.The methodology and structured implementation underscore the importance and potential of advanced language models in cybersecurity,illustrating their effectiveness in generating high-quality synthetic data for penetration testing purposes.The research results demonstrate that this approach enables the identification of vulnerabilities that traditional methods may not uncover,providing deeper insights into potential threats and enhancing overall security measures.The performance evaluation of the model indicated satisfactory results,while further hyperparameter optimization could improve accuracy and generalization capabilities.This research represents a significant step forward in improving web application security and opens new opportunities for the use of LLMs in security testing,thereby contributing to the development of more effective cybersecurity strategies.展开更多
Learning from demonstration is widely regarded as a promising paradigm for robots to acquire diverse skills.Other than the artificial learning from observation-action pairs for machines,humans can learn to imitate in ...Learning from demonstration is widely regarded as a promising paradigm for robots to acquire diverse skills.Other than the artificial learning from observation-action pairs for machines,humans can learn to imitate in a more versatile and effective manner:acquiring skills through mere“observation”.Video to Command task is widely perceived as a promising approach for task-based learning,which yet faces two key challenges:(1)High redundancy and low frame rate of fine-grained action sequences make it difficult to manipulate objects robustly and accurately.(2)Video to Command models often prioritize accuracy and richness of output commands over physical capabilities,leading to impractical or unsafe instructions for robots.This article presents a novel Video to Command framework that employs multiple data associations and physical constraints.First,we introduce an object-level appearancecontrasting multiple data association strategy to effectively associate manipulated objects in visually complex environments,capturing dynamic changes in video content.Then,we propose a multi-task Video to Command model that utilizes object-level video content changes to compile expert demonstrations into manipulation commands.Finally,a multi-task hybrid loss function is proposed to train a Video to Command model that adheres to the constraints of the physical world and manipulation tasks.Our method achieved over 10%on BLEU_N,METEOR,ROUGE_L,and CIDEr compared to the up-to-date methods.The dual-arm robot prototype was established to demonstrate the whole process of learning from an expert demonstration of multiple skills and then executing the tasks by a robot.展开更多
To build a mankind community of shared future is an important concept and initiative put forward by the Communist Party of China Central Committee(CPCCC)with Comrade Xi Jinping as the core to co-ordinate domestic situ...To build a mankind community of shared future is an important concept and initiative put forward by the Communist Party of China Central Committee(CPCCC)with Comrade Xi Jinping as the core to co-ordinate domestic situation and international situation,and is an important part of the CPCCC‘s展开更多
In a recent study published in Cell1 and two bioRxiv pre-prints,2,3 three studies investigate the structure of the endosomal Commander complex through a combination of X-ray crystal-lography,cryogenic-electron microsc...In a recent study published in Cell1 and two bioRxiv pre-prints,2,3 three studies investigate the structure of the endosomal Commander complex through a combination of X-ray crystal-lography,cryogenic-electron microscopy(Cryo-EM),Alphafold predictions and extensive site-directed mutagenesis(Fig.1a),which sheds lights on the molecular characteristics of this evolutionarily-conserved protein machinery,and enables the mapping of mutations causing X-linked intellectual disability(XILD)and Ritscher-Schinzel syndrome(RSS).When proteins enter the endosomal network,they are either transported to lysosome for degradation,or recycled to the plasma membrane or the trans-Golgi network for reuse.Multiple protein machineries are essential for the process,including Retromer,Commander,and several members of the sorting nexin(SNX)family.Commander genes are highly conserved in metazoa and can be found in almost all tissues and cells.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated...In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated estimation guidance and control nonlinear model with limited actuator deflection angle is established considering the seeker's FOV constraint.The boundary time-varying integral barrier Lyapunov function(IBLF)is employed in backstepping design to constrain the body line-of-sight(BLOS)in IEGC system to fit a circular FOV.Then,the nonlinear adaptive controller is designed to estimate the changing aerodynamic parameters.The generalized extended state observer(GESO)is designed to estimate the acceleration of the maneuvering targets and the unmatched time-varying disturbances for improving tracking accuracy.Furthermore,the command filters are used to solve the"differential expansion"problem during the backstepping design.The Lyapunov theory is used to prove the stability of the overall closed-loop IEGC system.Finally,the simulation results validate the integrated system's effectiveness,achieving high accuracy strikes against maneuvering targets.展开更多
Purpose-To optimize train operations,dispatchers currently rely on experience for quick adjustments when delays occur.However,delay predictions often involve imprecise shifts based on known delay times.Real-time and a...Purpose-To optimize train operations,dispatchers currently rely on experience for quick adjustments when delays occur.However,delay predictions often involve imprecise shifts based on known delay times.Real-time and accurate train delay predictions,facilitated by data-driven neural network models,can significantly reduce dispatcher stress and improve adjustment plans.Leveraging current train operation data,these models enable swift and precise predictions,addressing challenges posed by train delays in high-speed rail networks during unforeseen events.Design/methodology/approach-This paper proposes CBLA-net,a neural network architecture for predicting late arrival times.It combines CNN,Bi-LSTM,and attention mechanisms to extract features,handle time series data,and enhance information utilization.Trained on operational data from the Beijing-Tianjin line,it predicts the late arrival time of a target train at the next station using multidimensional input data from the target and preceding trains.Findings-This study evaluates our model’s predictive performance using two data approaches:one considering full data and another focusing only on late arrivals.Results show precise and rapid predictions.Training with full data achieves aMAEof approximately 0.54 minutes and a RMSEof 0.65 minutes,surpassing the model trained solely on delay data(MAE:is about 1.02 min,RMSE:is about 1.52 min).Despite superior overall performance with full data,the model excels at predicting delays exceeding 15 minutes when trained exclusively on late arrivals.For enhanced adaptability to real-world train operations,training with full data is recommended.Originality/value-This paper introduces a novel neural network model,CBLA-net,for predicting train delay times.It innovatively compares and analyzes the model’s performance using both full data and delay data formats.Additionally,the evaluation of the network’s predictive capabilities considers different scenarios,providing a comprehensive demonstration of the model’s predictive performance.展开更多
顶级品质的音响器材,由于其昂贵的价格与稀缺性,对于大多数人而言,平日里能够亲自接触并体验的机会实属难得。就在11月,我们来到了典雅音响花园,试听IsoTek EVO3 Super Titan 20A电源处理器,试听现场刚好搭配了Gryphon贵丰的Commander...顶级品质的音响器材,由于其昂贵的价格与稀缺性,对于大多数人而言,平日里能够亲自接触并体验的机会实属难得。就在11月,我们来到了典雅音响花园,试听IsoTek EVO3 Super Titan 20A电源处理器,试听现场刚好搭配了Gryphon贵丰的Commander指挥官、后级为Gryphon贵丰Apex单声道后级系统。展开更多
基金supported by the Ministry of Science,Technological Development and Innovation of the Republic of Serbia,and these results are parts of Grant No.451-03-66/2024-03/200132 with the University of Kragujevac-Faculty of Technical Sciences Cacak.
文摘With the increasing use of web applications,challenges in the field of cybersecurity are becoming more complex.This paper explores the application of fine-tuned large language models(LLMs)for the automatic generation of synthetic attacks,including XSS(Cross-Site Scripting),SQL Injections,and Command Injections.A web application has been developed that allows penetration testers to quickly generate high-quality payloads without the need for in-depth knowledge of artificial intelligence.The fine-tuned language model demonstrates the capability to produce synthetic payloads that closely resemble real-world attacks.This approach not only improves the model’s precision and dependability but also serves as a practical resource for cybersecurity professionals to enhance the security of web applications.The methodology and structured implementation underscore the importance and potential of advanced language models in cybersecurity,illustrating their effectiveness in generating high-quality synthetic data for penetration testing purposes.The research results demonstrate that this approach enables the identification of vulnerabilities that traditional methods may not uncover,providing deeper insights into potential threats and enhancing overall security measures.The performance evaluation of the model indicated satisfactory results,while further hyperparameter optimization could improve accuracy and generalization capabilities.This research represents a significant step forward in improving web application security and opens new opportunities for the use of LLMs in security testing,thereby contributing to the development of more effective cybersecurity strategies.
基金Supported by Zhejiang Provincial Key Research and Development Program(Grant No.2021C04015)。
文摘Learning from demonstration is widely regarded as a promising paradigm for robots to acquire diverse skills.Other than the artificial learning from observation-action pairs for machines,humans can learn to imitate in a more versatile and effective manner:acquiring skills through mere“observation”.Video to Command task is widely perceived as a promising approach for task-based learning,which yet faces two key challenges:(1)High redundancy and low frame rate of fine-grained action sequences make it difficult to manipulate objects robustly and accurately.(2)Video to Command models often prioritize accuracy and richness of output commands over physical capabilities,leading to impractical or unsafe instructions for robots.This article presents a novel Video to Command framework that employs multiple data associations and physical constraints.First,we introduce an object-level appearancecontrasting multiple data association strategy to effectively associate manipulated objects in visually complex environments,capturing dynamic changes in video content.Then,we propose a multi-task Video to Command model that utilizes object-level video content changes to compile expert demonstrations into manipulation commands.Finally,a multi-task hybrid loss function is proposed to train a Video to Command model that adheres to the constraints of the physical world and manipulation tasks.Our method achieved over 10%on BLEU_N,METEOR,ROUGE_L,and CIDEr compared to the up-to-date methods.The dual-arm robot prototype was established to demonstrate the whole process of learning from an expert demonstration of multiple skills and then executing the tasks by a robot.
文摘To build a mankind community of shared future is an important concept and initiative put forward by the Communist Party of China Central Committee(CPCCC)with Comrade Xi Jinping as the core to co-ordinate domestic situation and international situation,and is an important part of the CPCCC‘s
基金This work was supported by Natural Science Foundation of China(NSFC#32200559,#92254302)National Key Research and Development Program of China(2022YFA1105200)+1 种基金National Science Fund for Distinguished Young Scholars(#32125012)National Institutes of Health grant DK107733 to D.D.B.
文摘In a recent study published in Cell1 and two bioRxiv pre-prints,2,3 three studies investigate the structure of the endosomal Commander complex through a combination of X-ray crystal-lography,cryogenic-electron microscopy(Cryo-EM),Alphafold predictions and extensive site-directed mutagenesis(Fig.1a),which sheds lights on the molecular characteristics of this evolutionarily-conserved protein machinery,and enables the mapping of mutations causing X-linked intellectual disability(XILD)and Ritscher-Schinzel syndrome(RSS).When proteins enter the endosomal network,they are either transported to lysosome for degradation,or recycled to the plasma membrane or the trans-Golgi network for reuse.Multiple protein machineries are essential for the process,including Retromer,Commander,and several members of the sorting nexin(SNX)family.Commander genes are highly conserved in metazoa and can be found in almost all tissues and cells.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated estimation guidance and control nonlinear model with limited actuator deflection angle is established considering the seeker's FOV constraint.The boundary time-varying integral barrier Lyapunov function(IBLF)is employed in backstepping design to constrain the body line-of-sight(BLOS)in IEGC system to fit a circular FOV.Then,the nonlinear adaptive controller is designed to estimate the changing aerodynamic parameters.The generalized extended state observer(GESO)is designed to estimate the acceleration of the maneuvering targets and the unmatched time-varying disturbances for improving tracking accuracy.Furthermore,the command filters are used to solve the"differential expansion"problem during the backstepping design.The Lyapunov theory is used to prove the stability of the overall closed-loop IEGC system.Finally,the simulation results validate the integrated system's effectiveness,achieving high accuracy strikes against maneuvering targets.
基金supported in part by the National Natural Science Foundation of China under Grant 62203468in part by the Technological Research and Development Program of China State Railway Group Co.,Ltd.under Grant Q2023X011+1 种基金in part by the Young Elite Scientist Sponsorship Program by China Association for Science and Technology(CAST)under Grant 2022QNRC001in part by the Youth Talent Program Supported by China Railway Society,and in part by the Research Program of China Academy of Railway Sciences Corporation Limited under Grant 2023YJ112.
文摘Purpose-To optimize train operations,dispatchers currently rely on experience for quick adjustments when delays occur.However,delay predictions often involve imprecise shifts based on known delay times.Real-time and accurate train delay predictions,facilitated by data-driven neural network models,can significantly reduce dispatcher stress and improve adjustment plans.Leveraging current train operation data,these models enable swift and precise predictions,addressing challenges posed by train delays in high-speed rail networks during unforeseen events.Design/methodology/approach-This paper proposes CBLA-net,a neural network architecture for predicting late arrival times.It combines CNN,Bi-LSTM,and attention mechanisms to extract features,handle time series data,and enhance information utilization.Trained on operational data from the Beijing-Tianjin line,it predicts the late arrival time of a target train at the next station using multidimensional input data from the target and preceding trains.Findings-This study evaluates our model’s predictive performance using two data approaches:one considering full data and another focusing only on late arrivals.Results show precise and rapid predictions.Training with full data achieves aMAEof approximately 0.54 minutes and a RMSEof 0.65 minutes,surpassing the model trained solely on delay data(MAE:is about 1.02 min,RMSE:is about 1.52 min).Despite superior overall performance with full data,the model excels at predicting delays exceeding 15 minutes when trained exclusively on late arrivals.For enhanced adaptability to real-world train operations,training with full data is recommended.Originality/value-This paper introduces a novel neural network model,CBLA-net,for predicting train delay times.It innovatively compares and analyzes the model’s performance using both full data and delay data formats.Additionally,the evaluation of the network’s predictive capabilities considers different scenarios,providing a comprehensive demonstration of the model’s predictive performance.
文摘顶级品质的音响器材,由于其昂贵的价格与稀缺性,对于大多数人而言,平日里能够亲自接触并体验的机会实属难得。就在11月,我们来到了典雅音响花园,试听IsoTek EVO3 Super Titan 20A电源处理器,试听现场刚好搭配了Gryphon贵丰的Commander指挥官、后级为Gryphon贵丰Apex单声道后级系统。