Artificial intelligence(AI)researchers and cheminformatics specialists strive to identify effective drug precursors while optimizing costs and accelerating development processes.Digital molecular representation plays ...Artificial intelligence(AI)researchers and cheminformatics specialists strive to identify effective drug precursors while optimizing costs and accelerating development processes.Digital molecular representation plays a crucial role in achieving this objective by making molecules machine-readable,thereby enhancing the accuracy of molecular prediction tasks and facilitating evidence-based decision making.This study presents a comprehensive review of small molecular representations and AI-driven drug discovery downstream tasks utilizing these representations.The research methodology begins with the compilation of small molecule databases,followed by an analysis of fundamental molecular representations and the models that learn these representations from initial forms,capturing patterns and salient features across extensive chemical spaces.The study then examines various drug discovery downstream tasks,including drug-target interaction(DTI)prediction,drug-target affinity(DTA)prediction,drug property(DP)prediction,and drug generation,all based on learned representations.The analysis concludes by highlighting challenges and opportunities associated with machine learning(ML)methods for molecular representation and improving downstream task performance.Additionally,the representation of small molecules and AI-based downstream tasks demonstrates significant potential in identifying traditional Chinese medicine(TCM)medicinal substances and facilitating TCM target discovery.展开更多
Let F_(1)be the virtual field consisting of one element and(Q,I)a string pair.In this paper,we study the representations of string pairs over the virtual field F_(1).It is proved that an indecomposable F_(1)-represent...Let F_(1)be the virtual field consisting of one element and(Q,I)a string pair.In this paper,we study the representations of string pairs over the virtual field F_(1).It is proved that an indecomposable F_(1)-representation is either a string representation or a band representation by using the coefficient quivers.It is worth noting that for a given band and a positive integer,there exists a unique band representation up to isomorphism.展开更多
The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce t...The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce the representation of modifiedλ-differential Lie-Yamaguti algebras.Furthermore,we establish the cohomology of a modifiedλ-differential Lie-Yamaguti algebra with coefficients in a representation.Finally,we investigate the one-parameter formal deformations and Abelian extensions of modifiedλ-differential Lie-Yamaguti algebras using the second cohomology group.展开更多
Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation va...Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation variations,and obfuscation.Recent advances in artificial intelligence—particularly natural language processing(NLP),graph representation learning(GRL),and large language models(LLMs)—have markedly improved accuracy,enabling better recognition of code variants and deeper semantic understanding.This paper presents a comprehensive review of 82 studies published between 1975 and 2025,systematically tracing the historical evolution of BCSD and analyzing the progressive incorporation of artificial intelligence(AI)techniques.Particular emphasis is placed on the role of LLMs,which have recently emerged as transformative tools in advancing semantic representation and enhancing detection performance.The review is organized around five central research questions:(1)the chronological development and milestones of BCSD;(2)the construction of AI-driven technical roadmaps that chart methodological transitions;(3)the design and implementation of general analytical workflows for binary code analysis;(4)the applicability,strengths,and limitations of LLMs in capturing semantic and structural features of binary code;and(5)the persistent challenges and promising directions for future investigation.By synthesizing insights across these dimensions,the study demonstrates how LLMs reshape the landscape of binary code analysis,offering unprecedented opportunities to improve accuracy,scalability,and adaptability in real-world scenarios.This review not only bridges a critical gap in the existing literature but also provides a forward-looking perspective,serving as a valuable reference for researchers and practitioners aiming to advance AI-powered BCSD methodologies and applications.展开更多
When the G20 was created in 1999 in the wake of the Asian financial crisis,few imagined it would one day become the nerve centre of global governance.Twenty-six years later,the G20 members,which represent 85 percent o...When the G20 was created in 1999 in the wake of the Asian financial crisis,few imagined it would one day become the nerve centre of global governance.Twenty-six years later,the G20 members,which represent 85 percent of the global GDP and two-thirds of the world population,are once again navigating a turbulent era marked by geopolitical rivalry,economic fragmentation and widening inequality.展开更多
This article revisits the concept of epistemological rupture by questioning the stark division between scientific and non-scientific thought. Drawing on the theory of representation, it contends that both forms of kno...This article revisits the concept of epistemological rupture by questioning the stark division between scientific and non-scientific thought. Drawing on the theory of representation, it contends that both forms of knowledge are socially constructed, moulded by communication, norms and group dynamics. Rather than labelling non-scientific thought as flawed or regressive, the discussion shows how decontextualization and recontextualization processes apply equally to everyday ‘natural' knowledge and formal science,exposing the social and historical contingencies shaping concepts. Consequently, rupture appears less a sudden break than a gradual threshold reached through dialectical transformations in cognition and society. Rather than conferring total superiority on science, ruptures highlight how certain discourses gain legitimacy while others become ‘non-knowledge'. The article concludes that science's dominance reflects broader power relationships and evolving modes of production and validation. By situating epistemological rupture within these processes, it illuminates how different knowledge forms coexist, evolve and sometimes conflict in stratified social fields—ultimately challenging a simplistic binary between scientific progress and supposedly primitive or natural thought. This viewpoint opens new possibilities for examining the shifting boundaries between rational explanations and the shared beliefs shaping collective reality and daily life.展开更多
十二生肖在中国流传千年,那这些生肖是怎么选出来的呢?People in China have 12 zodiac animals.Each animal represents one year in the Chinese calendar.These animals are Rat,Ox,Tiger,Rabbit,Dragon,Snake,Horse,Goat,Monkey,Roo...十二生肖在中国流传千年,那这些生肖是怎么选出来的呢?People in China have 12 zodiac animals.Each animal represents one year in the Chinese calendar.These animals are Rat,Ox,Tiger,Rabbit,Dragon,Snake,Horse,Goat,Monkey,Rooster,Dog and Pig.展开更多
The event-based vision sensor(EVS),which can generate efficient spiking data streams by exclusively detecting motion,exemplifies neuromorphic vision methodologies.Generally,its inherent lack of texture features limits...The event-based vision sensor(EVS),which can generate efficient spiking data streams by exclusively detecting motion,exemplifies neuromorphic vision methodologies.Generally,its inherent lack of texture features limits effectiveness in complex vision processing tasks,necessitating supplementary visual information.However,to date,no event-based hybrid vision solution has been developed that preserves the characteristics of complete spike data streams to support synchronous computation architectures based on spiking neural network(SNN).In this paper,we present a novel spike-based sensor with digitized pixels,which integrates the event detection structure with the pulse frequency modulation(PFM)circuit.This design enables the simultaneous output of spiking data that encodes both temporal changes and texture information.Fabricated in 180 nm process,the proposed sensor achieves a resolution of 128×128,a maximum event rate of 960 Meps,a grayscale frame rate of 117.1 kfps,and a measured power consumption of 60.1 mW,which is suited for high-speed,low-latency,edge SNNbased vision computing systems.展开更多
Coupled thermo-hydro-mechanical(THM)processes in fractured rock are playing a crucial role in geoscience and geoengineering applications.Diverse and conceptually distinct approaches have emerged over the past decades ...Coupled thermo-hydro-mechanical(THM)processes in fractured rock are playing a crucial role in geoscience and geoengineering applications.Diverse and conceptually distinct approaches have emerged over the past decades in both continuum and discontinuum perspectives leading to significant progress in their comprehending and modeling.This review paper offers an integrated perspective on existing modeling methodologies providing guidance for model selection based on the initial and boundary conditions.By comparing various models,one can better assess the uncertainties in predictions,particularly those related to the conceptual models.The review explores how these methodologies have significantlyenhanced the fundamental understanding of how fractures respond to fluid injection and production,and improved predictive capabilities pertaining to coupled processes within fractured systems.It emphasizes the importance of utilizing advanced computational technologies and thoroughly considering fundamental theories and principles established through past experimental evidence and practical experience.The selection and calibration of model parameters should be based on typical ranges and applied to the specificconditions of applications.The challenges arising from inherent heterogeneity and uncertainties,nonlinear THM coupled processes,scale dependence,and computational limitations in representing fieldscale fractures are discussed.Realizing potential advances on computational capacity calls for methodical conceptualization,mathematical modeling,selection of numerical solution strategies,implementation,and calibration to foster simulation outcomes that intricately reflectthe nuanced complexities of geological phenomena.Future research efforts should focus on innovative approaches to tackle the hurdles and advance the state-of-the-art in this critical fieldof study.展开更多
The escalating complexity and heterogeneity of modern energy systems—particularly in smart grid and distributed energy infrastructures—has intensified the need for intelligent and scalable security vulnerability cla...The escalating complexity and heterogeneity of modern energy systems—particularly in smart grid and distributed energy infrastructures—has intensified the need for intelligent and scalable security vulnerability classification.To address this challenge,we propose Vulnerability2Vec,a graph-embedding-based framework designed to enhance the automated classification of security vulnerabilities that threaten energy system resilience.Vulnerability2Vec converts Common Vulnerabilities and Exposures(CVE)text explanations to semantic graphs,where nodes represent CVE IDs and key terms(nouns,verbs,and adjectives),and edges capture co-occurrence relationships.Then,it embeds the semantic graphs to a low-dimensional vector space with random-walk sampling and skip-gram with negative sampling.It is possible to identify the latent relationships and structural patterns that traditional sparse vector methods fail to capture.Experimental results demonstrate a classification accuracy of up to 80%,significantly outperforming baseline methods.This approach offers a theoretical basis for classifying vulnerability types as structured semantic patterns in complex software systems.The proposed method models the semantic structure of vulnerabilities,providing a theoretical foundation for their classification.展开更多
Establishing and maintaining protected areas is a pivotal strategy for attaining the post-2020 biodiversity target. The conservation objectives of protected areas have shifted from a narrow emphasis on biodiversity to...Establishing and maintaining protected areas is a pivotal strategy for attaining the post-2020 biodiversity target. The conservation objectives of protected areas have shifted from a narrow emphasis on biodiversity to encompass broader considerations such as ecosystem stability, community resilience to climate change, and enhancement of human well-being. Given these multifaceted objectives, it is imperative to judiciously allocate resources to effectively conserve biodiversity by identifying strategically significant areas for conservation, particularly for mountainous areas. In this study, we evaluated the representativeness of the protected area network in the Qin ling Mountains concerning species diversity, ecosystem services, climate stability and ecological stability. The results indicate that some of the ecological indicators are spatially correlated with topographic gradient effects. The conservation priority areas predominantly lie in the northern foothills, the southeastern, and southwestern parts of the Qinling Mountain with areas concentrated at altitudes between 1,500-2,000 m and slopes between 40°-50° as hotspots. The conservation priority areas identified through the framework of inclusive conservation optimization account for 22.9 % of the Qinling Mountain. Existing protected areas comprise only 6.1 % of the Qinling Mountain and 13.18 % of the conservation priority areas. This will play an important role in achiev ing sustainable development in the region and in meeting the post-2020 biodiversity target. The framework can advance the different objectives of achieving a quadruple win and can also be extended to other regions.展开更多
Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extrac...Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extraction and model construction.Firstly,the convolutional neural network(CNN)features of the face are extracted by the trained deep learning network.Next,the steady-state and dynamic classifiers for face recognition are constructed based on the CNN features and Haar features respectively,with two-stage sparse representation introduced in the process of constructing the steady-state classifier and the feature templates with high reliability are dynamically selected as alternative templates from the sparse representation template dictionary constructed using the CNN features.Finally,the results of face recognition are given based on the classification results of the steady-state classifier and the dynamic classifier together.Based on this,the feature weights of the steady-state classifier template are adjusted in real time and the dictionary set is dynamically updated to reduce the probability of irrelevant features entering the dictionary set.The average recognition accuracy of this method is 94.45%on the CMU PIE face database and 96.58%on the AR face database,which is significantly improved compared with that of the traditional face recognition methods.展开更多
Optical singularities are topological defects of electromagnetic fields;they include phase singularity in scalar fields,polarization singularity in vector fields,and three-dimensional(3D)singularities such as optical ...Optical singularities are topological defects of electromagnetic fields;they include phase singularity in scalar fields,polarization singularity in vector fields,and three-dimensional(3D)singularities such as optical skyrmions.The exploitation of photonic microstructures to generate and manipulate optical singularities has attracted wide research interest in recent years,with many photonic microstructures having been devised to this end.Accompanying these designs,scattered phenomenological theories have been proposed to expound the working mechanisms behind individual designs.In this work,instead of focusing on a specific type of microstructure,we concentrate on the most common geometric features of these microstructures—namely,symmetries—and revisit the process of generating optical singularities in microstructures from a symmetry viewpoint.By systematically employing the projection operator technique in group theory,we develop a widely applicable theoretical scheme to explore optical singularities in microstructures with rosette(i.e.,rotational and reflection)symmetries.Our scheme agrees well with previously reported works and further reveals that the eigenmodes of a symmetric microstructure can support multiplexed phase singularities in different components,such as out-of-plane,radial,azimuthal,and left-and right-handed circular components.Based on these phase singularities,more complicated optical singularities may be synthesized,including C points,V points,L lines,Néel-and bubble-type optical skyrmions,and optical lattices,to name a few.We demonstrate that the topological invariants associated with optical singularities are protected by the symmetries of the microstructure.Lastly,based on symmetry arguments,we formulate a so-called symmetry matching condition to clarify the excitation of a specific type of optical singularity.Our work establishes a unified theoretical framework to explore optical singularities in photonic microstructures with symmetries,shedding light on the symmetry origin of multidimensional and multiplexed optical singularities and providing a symmetry perspective for exploring many singularity-related effects in optics and photonics.展开更多
Society is increasingly relying on artificially intelligent(Al)systems to facilitate,and sometimes even automate,critical systems that have huge impacts on the people these systems are designed to serve.But the unique...Society is increasingly relying on artificially intelligent(Al)systems to facilitate,and sometimes even automate,critical systems that have huge impacts on the people these systems are designed to serve.But the unique nature of Al systems opens up new challenges regarding their ethical use.For example,①unrepresentative training data can introduce sampling bias,leading to unfair outcomes;and lack of data equity can introduce systemic bias into the system.At the university level,how to provide ethics training within the limits of typical computer science(CS)programs is non-trivial,as current CS education programs already face heavy burdens from unprecedented demand.In particular,the University of Michigan is exploring ways of introducing ethics training within the CS curricula,including both stand-alone courses and integrated modules.展开更多
Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and ...Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance,and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks(CNNs).We frame skin lesion recognition as graph-based reasoning and,to ensure fair evaluation and avoid data leakage,adopt a strict lesion-level partitioning strategy.Each image is first over-segmented using SLIC(Simple Linear Iterative Clustering)to produce perceptually homogeneous superpixels.These superpixels form the nodes of a region-adjacency graph whose edges encode spatial continuity.Node attributes are 1280-dimensional embeddings extracted with a lightweight yet expressive EfficientNet-B0 backbone,providing strong representational power at modest computational cost.The resulting graphs are processed by a five-layer Graph Attention Network(GAT)that learns to weight inter-node relationships dynamically and aggregates multi-hop context before classifying lesions into seven classes with a log-softmax output.Extensive experiments on the DermaMNIST benchmark show the proposed pipeline achieves 88.35%accuracy and 98.04%AUC,outperforming contemporary CNNs,AutoML approaches,and alternative graph neural networks.An ablation study indicates EfficientNet-B0 produces superior node descriptors compared with ResNet-18 and DenseNet,and that roughly five GAT layers strike a good balance between being too shallow and over-deep while avoiding oversmoothing.The method requires no data augmentation or external metadata,making it a drop-in upgrade for clinical computer-aided diagnosis systems.展开更多
Clustering is a pivotal data analysis method for deciphering the charge transport properties of single molecules in break junction experiments.However,given the high dimensionality and variability of the data,feature ...Clustering is a pivotal data analysis method for deciphering the charge transport properties of single molecules in break junction experiments.However,given the high dimensionality and variability of the data,feature extraction remains a bottleneck in the development of efficient clustering methods.In this regard,extensive research over the past two decades has focused on feature engineering and dimensionality reduction in break junction conductance.However,extracting highly relevant features without expert knowledge remains an unresolved challenge.To address this issue,we propose a deep clustering method driven by task-oriented representation learning(CTRL)in which the clustering module serves as a guide for the representation learning(RepL)module.First,we determine an optimal autoencoder(AE)structure through a neural architecture search(NAS)to ensure efficient RepL;second,the RepL process is guided by a joint training strategy that combines AE reconstruction loss with the clustering objective.The results demonstrate that CTRL achieves excellent performance on both the generated and experimental data.Further inspection of the RepL step reveals that joint training robustly learns more compact features than the unconstrained AE or traditional dimensionality reduction methods,significantly reducing misclustering possibilities.Our method provides a general end-to-end automatic clustering solution for analyzing single-molecule break junction data.展开更多
There are all kinds of unknown and known signals in the actual electromagnetic environment,which hinders the development of practical cognitive radio applications.However,most existing signal recognition models are di...There are all kinds of unknown and known signals in the actual electromagnetic environment,which hinders the development of practical cognitive radio applications.However,most existing signal recognition models are difficult to discover unknown signals while recognizing known ones.In this paper,a compact manifold mixup feature-based open-set recognition approach(OR-CMMF)is proposed to address the above problem.First,the proposed approach utilizes the center loss to constrain decision boundaries so that it obtains the compact latent signal feature representations and extends the low-confidence feature space.Second,the latent signal feature representations are used to construct synthetic representations as substitutes for unknown categories of signals.Then,these constructed representations can occupy the extended low-confidence space.Finally,the proposed approach applies the distillation loss to adjust the decision boundaries between the known categories signals and the constructed unknown categories substitutes so that it accurately discovers unknown signals.The OR-CMMF approach outperformed other state-of-the-art open-set recognition methods in comprehensive recognition performance and running time,as demonstrated by simulation experiments on two public datasets RML2016.10a and ORACLE.展开更多
Emotion recognition under uncontrolled and noisy environments presents persistent challenges in the design of emotionally responsive systems.The current study introduces an audio-visual recognition framework designed ...Emotion recognition under uncontrolled and noisy environments presents persistent challenges in the design of emotionally responsive systems.The current study introduces an audio-visual recognition framework designed to address performance degradation caused by environmental interference,such as background noise,overlapping speech,and visual obstructions.The proposed framework employs a structured fusion approach,combining early-stage feature-level integration with decision-level coordination guided by temporal attention mechanisms.Audio data are transformed into mel-spectrogram representations,and visual data are represented as raw frame sequences.Spatial and temporal features are extracted through convolutional and transformer-based encoders,allowing the framework to capture complementary and hierarchical information fromboth sources.Across-modal attentionmodule enables selective emphasis on relevant signals while suppressing modality-specific noise.Performance is validated on a modified version of the AFEW dataset,in which controlled noise is introduced to emulate realistic conditions.The framework achieves higher classification accuracy than comparative baselines,confirming increased robustness under conditions of cross-modal disruption.This result demonstrates the suitability of the proposed method for deployment in practical emotion-aware technologies operating outside controlled environments.The study also contributes a systematic approach to fusion design and supports further exploration in the direction of resilientmultimodal emotion analysis frameworks.The source code is publicly available at https://github.com/asmoon002/AVER(accessed on 18 August 2025).展开更多
Difficulty in extracting nonlinear sparse impulse features due to variable speed conditions and redundant noise interference leads to challenges in diagnosing variable speed faults.Therefore,an improved spectral amplit...Difficulty in extracting nonlinear sparse impulse features due to variable speed conditions and redundant noise interference leads to challenges in diagnosing variable speed faults.Therefore,an improved spectral amplitude modulation(ISAM)based on sparse feature adaptive convolution(SFAC)is proposed to enhance the fault features under variable speed conditions.First,an optimal bi-damped wavelet construction method is proposed to learn signal impulse features,which selects the optimal bi-damped wavelet parameters with correlation criterion and particle swarm optimization.Second,a convolutional basis pursuit denoising model based on an optimal bi-damped wavelet is proposed for resolving sparse impulses.A model regularization parameter selection method based on weighted fault characteristic amplitude ratio assistance is proposed.Then,an ISAM method based on kurtosis threshold is proposed to further enhance the fault information of sparse signal.Finally,the type of variable speed faults is determined by order spectrum analysis.Various experimental results,such as spectral amplitude modulation and Morlet wavelet matching,verify the effectiveness and advantages of the ISAM-SFAC method.展开更多
Background Three-dimensional(3D)shape representation using mesh data is essential in various applications,such as virtual reality and simulation technologies.Current methods for extracting features from mesh edges or ...Background Three-dimensional(3D)shape representation using mesh data is essential in various applications,such as virtual reality and simulation technologies.Current methods for extracting features from mesh edges or faces struggle with complex 3D models because edge-based approaches miss global contexts and face-based methods overlook variations in adjacent areas,which affects the overall precision.To address these issues,we propose the Feature Discrimination and Context Propagation Network(FDCPNet),which is a novel approach that synergistically integrates local and global features in mesh datasets.Methods FDCPNet is composed of two modules:(1)the Feature Discrimination Module,which employs an attention mechanism to enhance the identification of key local features,and(2)the Context Propagation Module,which enriches key local features by integrating global contextual information,thereby facilitating a more detailed and comprehensive representation of crucial areas within the mesh model.Results Experiments on popular datasets validated the effectiveness of FDCPNet,showing an improvement in the classification accuracy over the baseline MeshNet.Furthermore,even with reduced mesh face numbers and limited training data,FDCPNet achieved promising results,demonstrating its robustness in scenarios of variable complexity.展开更多
基金supported by the Shenzhen Key Laboratory of Intelligent Bioinformatics(No.ZDSYS20220422103800001)the Shenzhen Science and Technology Program(No.JCYJ20230807140709020)+2 种基金National Natural Science Foundation of China(Nos.62402489,U22A2041,and 62373172)the China Postdoctoral Science Foundation(No.2023M743688)Guangdong Basic and Applied Basic Research Foundation(Nos.2024A1515011960 and 2023A1515110570)。
文摘Artificial intelligence(AI)researchers and cheminformatics specialists strive to identify effective drug precursors while optimizing costs and accelerating development processes.Digital molecular representation plays a crucial role in achieving this objective by making molecules machine-readable,thereby enhancing the accuracy of molecular prediction tasks and facilitating evidence-based decision making.This study presents a comprehensive review of small molecular representations and AI-driven drug discovery downstream tasks utilizing these representations.The research methodology begins with the compilation of small molecule databases,followed by an analysis of fundamental molecular representations and the models that learn these representations from initial forms,capturing patterns and salient features across extensive chemical spaces.The study then examines various drug discovery downstream tasks,including drug-target interaction(DTI)prediction,drug-target affinity(DTA)prediction,drug property(DP)prediction,and drug generation,all based on learned representations.The analysis concludes by highlighting challenges and opportunities associated with machine learning(ML)methods for molecular representation and improving downstream task performance.Additionally,the representation of small molecules and AI-based downstream tasks demonstrates significant potential in identifying traditional Chinese medicine(TCM)medicinal substances and facilitating TCM target discovery.
文摘Let F_(1)be the virtual field consisting of one element and(Q,I)a string pair.In this paper,we study the representations of string pairs over the virtual field F_(1).It is proved that an indecomposable F_(1)-representation is either a string representation or a band representation by using the coefficient quivers.It is worth noting that for a given band and a positive integer,there exists a unique band representation up to isomorphism.
基金National Natural Science Foundation of China(12161013)Research Projects of Guizhou University of Commerce in 2024。
文摘The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce the representation of modifiedλ-differential Lie-Yamaguti algebras.Furthermore,we establish the cohomology of a modifiedλ-differential Lie-Yamaguti algebra with coefficients in a representation.Finally,we investigate the one-parameter formal deformations and Abelian extensions of modifiedλ-differential Lie-Yamaguti algebras using the second cohomology group.
文摘Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation variations,and obfuscation.Recent advances in artificial intelligence—particularly natural language processing(NLP),graph representation learning(GRL),and large language models(LLMs)—have markedly improved accuracy,enabling better recognition of code variants and deeper semantic understanding.This paper presents a comprehensive review of 82 studies published between 1975 and 2025,systematically tracing the historical evolution of BCSD and analyzing the progressive incorporation of artificial intelligence(AI)techniques.Particular emphasis is placed on the role of LLMs,which have recently emerged as transformative tools in advancing semantic representation and enhancing detection performance.The review is organized around five central research questions:(1)the chronological development and milestones of BCSD;(2)the construction of AI-driven technical roadmaps that chart methodological transitions;(3)the design and implementation of general analytical workflows for binary code analysis;(4)the applicability,strengths,and limitations of LLMs in capturing semantic and structural features of binary code;and(5)the persistent challenges and promising directions for future investigation.By synthesizing insights across these dimensions,the study demonstrates how LLMs reshape the landscape of binary code analysis,offering unprecedented opportunities to improve accuracy,scalability,and adaptability in real-world scenarios.This review not only bridges a critical gap in the existing literature but also provides a forward-looking perspective,serving as a valuable reference for researchers and practitioners aiming to advance AI-powered BCSD methodologies and applications.
文摘When the G20 was created in 1999 in the wake of the Asian financial crisis,few imagined it would one day become the nerve centre of global governance.Twenty-six years later,the G20 members,which represent 85 percent of the global GDP and two-thirds of the world population,are once again navigating a turbulent era marked by geopolitical rivalry,economic fragmentation and widening inequality.
文摘This article revisits the concept of epistemological rupture by questioning the stark division between scientific and non-scientific thought. Drawing on the theory of representation, it contends that both forms of knowledge are socially constructed, moulded by communication, norms and group dynamics. Rather than labelling non-scientific thought as flawed or regressive, the discussion shows how decontextualization and recontextualization processes apply equally to everyday ‘natural' knowledge and formal science,exposing the social and historical contingencies shaping concepts. Consequently, rupture appears less a sudden break than a gradual threshold reached through dialectical transformations in cognition and society. Rather than conferring total superiority on science, ruptures highlight how certain discourses gain legitimacy while others become ‘non-knowledge'. The article concludes that science's dominance reflects broader power relationships and evolving modes of production and validation. By situating epistemological rupture within these processes, it illuminates how different knowledge forms coexist, evolve and sometimes conflict in stratified social fields—ultimately challenging a simplistic binary between scientific progress and supposedly primitive or natural thought. This viewpoint opens new possibilities for examining the shifting boundaries between rational explanations and the shared beliefs shaping collective reality and daily life.
文摘十二生肖在中国流传千年,那这些生肖是怎么选出来的呢?People in China have 12 zodiac animals.Each animal represents one year in the Chinese calendar.These animals are Rat,Ox,Tiger,Rabbit,Dragon,Snake,Horse,Goat,Monkey,Rooster,Dog and Pig.
基金supported in part by the National Key Research and Development Program of China(Grant No.2022YFB2804401)the National Natural Science Foundation of China(Grant Nos.62334008,62134004,62404218)+1 种基金the Beijing Natural Science Foundation(Grant No.Z220005)Chinese Academy of Sciences(Grant No.ZDBS-LY-JSC008).
文摘The event-based vision sensor(EVS),which can generate efficient spiking data streams by exclusively detecting motion,exemplifies neuromorphic vision methodologies.Generally,its inherent lack of texture features limits effectiveness in complex vision processing tasks,necessitating supplementary visual information.However,to date,no event-based hybrid vision solution has been developed that preserves the characteristics of complete spike data streams to support synchronous computation architectures based on spiking neural network(SNN).In this paper,we present a novel spike-based sensor with digitized pixels,which integrates the event detection structure with the pulse frequency modulation(PFM)circuit.This design enables the simultaneous output of spiking data that encodes both temporal changes and texture information.Fabricated in 180 nm process,the proposed sensor achieves a resolution of 128×128,a maximum event rate of 960 Meps,a grayscale frame rate of 117.1 kfps,and a measured power consumption of 60.1 mW,which is suited for high-speed,low-latency,edge SNNbased vision computing systems.
基金funding from the European Research Council(ERC)under the European Union’s Horizon 2020 Research and Innovation Program through the Starting Grant GEoREST(grant agreement No.801809)support by MICIU/AEI/10.13039/501100011033 and by"European Union Next Generation EU/PRTR"through the‘Ramón y Cajal’fellowship(reference RYC2021-032780-I)+9 种基金funding by MICIU/AEI/10.13039/501100011033 and by“ERDF,EU”through the‘HydroPoreII’project(reference PID2022-137652NBC44)support by the Institute for Korea Spent Nuclear Fuel(iKSNF)National Research Foundation of Korea(NRF)grant funded by the Korea government(Ministry of Science and ICT,MSIT)(2021M2E1A1085196)support by the Swedish Radiation Safety(SSM),Swedish Transport Administration(Trafikverket),Swedish Rock Engineering Foundation(BeFo),and Nordic Energy Research(Grant 187658)supported by the US Department of Energy(DOE),the Officeof Nuclear Energy,Spent Fuel and Waste Science and Technology Campaign,and by the US Department of Energy(DOE),the Office of Basic Energy Sciences,Chemical Sciences,Geosciences,and Biosciences Division both under Contract Number DE-AC02-05CH11231 with Lawrence Berkeley National Laboratorysupport from the US National Science Foundation(grant CMMI-2239630)funding from the European Research Council(ERC)under the European Union’s Horizon 2020 research and innovation programme(grant agreement No.101002507)the UK Natural Environment Research Council(NERC)for funding SeisGreen Project(Grant No.NE/W009293/1)which supported this workthe Royal Society UK for supporting this research through fellowship UF160443IMEDEA is an accredited"Maria de Maeztu Excellence Unit"(Grant CEX2021-001198,funded by MICIU/AEI/10.13039/501100011033).
文摘Coupled thermo-hydro-mechanical(THM)processes in fractured rock are playing a crucial role in geoscience and geoengineering applications.Diverse and conceptually distinct approaches have emerged over the past decades in both continuum and discontinuum perspectives leading to significant progress in their comprehending and modeling.This review paper offers an integrated perspective on existing modeling methodologies providing guidance for model selection based on the initial and boundary conditions.By comparing various models,one can better assess the uncertainties in predictions,particularly those related to the conceptual models.The review explores how these methodologies have significantlyenhanced the fundamental understanding of how fractures respond to fluid injection and production,and improved predictive capabilities pertaining to coupled processes within fractured systems.It emphasizes the importance of utilizing advanced computational technologies and thoroughly considering fundamental theories and principles established through past experimental evidence and practical experience.The selection and calibration of model parameters should be based on typical ranges and applied to the specificconditions of applications.The challenges arising from inherent heterogeneity and uncertainties,nonlinear THM coupled processes,scale dependence,and computational limitations in representing fieldscale fractures are discussed.Realizing potential advances on computational capacity calls for methodical conceptualization,mathematical modeling,selection of numerical solution strategies,implementation,and calibration to foster simulation outcomes that intricately reflectthe nuanced complexities of geological phenomena.Future research efforts should focus on innovative approaches to tackle the hurdles and advance the state-of-the-art in this critical fieldof study.
基金supported by the MSIT(Ministry of Science and ICT),Republic of Korea,under the Convergence Security Core Talent Training Business Support Program(IITP-2025-RS-2023-00266605,50%)in part by the Institute of Information&Communications Technology Planning&Evaluation(lITP)grant funded by the Korea government(MSIT)(RS-2025-02305436,Development of Digital Innovative Element Technologies for Rapid Prediction of Potential Complex Disasters and Continuous Disaster Prevention,30%)supported by the Chung-Ang University Graduate Research Scholar-ship in 2023(20%).
文摘The escalating complexity and heterogeneity of modern energy systems—particularly in smart grid and distributed energy infrastructures—has intensified the need for intelligent and scalable security vulnerability classification.To address this challenge,we propose Vulnerability2Vec,a graph-embedding-based framework designed to enhance the automated classification of security vulnerabilities that threaten energy system resilience.Vulnerability2Vec converts Common Vulnerabilities and Exposures(CVE)text explanations to semantic graphs,where nodes represent CVE IDs and key terms(nouns,verbs,and adjectives),and edges capture co-occurrence relationships.Then,it embeds the semantic graphs to a low-dimensional vector space with random-walk sampling and skip-gram with negative sampling.It is possible to identify the latent relationships and structural patterns that traditional sparse vector methods fail to capture.Experimental results demonstrate a classification accuracy of up to 80%,significantly outperforming baseline methods.This approach offers a theoretical basis for classifying vulnerability types as structured semantic patterns in complex software systems.The proposed method models the semantic structure of vulnerabilities,providing a theoretical foundation for their classification.
基金supported by the National Natural Science Foun-dation of China(Grant No.72349002).
文摘Establishing and maintaining protected areas is a pivotal strategy for attaining the post-2020 biodiversity target. The conservation objectives of protected areas have shifted from a narrow emphasis on biodiversity to encompass broader considerations such as ecosystem stability, community resilience to climate change, and enhancement of human well-being. Given these multifaceted objectives, it is imperative to judiciously allocate resources to effectively conserve biodiversity by identifying strategically significant areas for conservation, particularly for mountainous areas. In this study, we evaluated the representativeness of the protected area network in the Qin ling Mountains concerning species diversity, ecosystem services, climate stability and ecological stability. The results indicate that some of the ecological indicators are spatially correlated with topographic gradient effects. The conservation priority areas predominantly lie in the northern foothills, the southeastern, and southwestern parts of the Qinling Mountain with areas concentrated at altitudes between 1,500-2,000 m and slopes between 40°-50° as hotspots. The conservation priority areas identified through the framework of inclusive conservation optimization account for 22.9 % of the Qinling Mountain. Existing protected areas comprise only 6.1 % of the Qinling Mountain and 13.18 % of the conservation priority areas. This will play an important role in achiev ing sustainable development in the region and in meeting the post-2020 biodiversity target. The framework can advance the different objectives of achieving a quadruple win and can also be extended to other regions.
基金the financial support from Natural Science Foundation of Gansu Province(Nos.22JR5RA217,22JR5RA216)Lanzhou Science and Technology Program(No.2022-2-111)+1 种基金Lanzhou University of Arts and Sciences School Innovation Fund Project(No.XJ2022000103)Lanzhou College of Arts and Sciences 2023 Talent Cultivation Quality Improvement Project(No.2023-ZL-jxzz-03)。
文摘Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extraction and model construction.Firstly,the convolutional neural network(CNN)features of the face are extracted by the trained deep learning network.Next,the steady-state and dynamic classifiers for face recognition are constructed based on the CNN features and Haar features respectively,with two-stage sparse representation introduced in the process of constructing the steady-state classifier and the feature templates with high reliability are dynamically selected as alternative templates from the sparse representation template dictionary constructed using the CNN features.Finally,the results of face recognition are given based on the classification results of the steady-state classifier and the dynamic classifier together.Based on this,the feature weights of the steady-state classifier template are adjusted in real time and the dictionary set is dynamically updated to reduce the probability of irrelevant features entering the dictionary set.The average recognition accuracy of this method is 94.45%on the CMU PIE face database and 96.58%on the AR face database,which is significantly improved compared with that of the traditional face recognition methods.
基金supported by the National Natural Science Foun-dation of China(62301596 and 62288101)Shaanxi Provincial Science and Technology Innovation Team(23-CX-TD-48)+4 种基金the KU Leuven internal funds:the C1 Project(C14/19/083)the Interdisciplinary Network Project(IDN/20/014)the Small Infrastructure Grant(KA/20/019)the Research Foundation of Flanders(FWO)Project(G090017N,G088822N,and V408823N)the Danish National Research Foundation(DNRF165).
文摘Optical singularities are topological defects of electromagnetic fields;they include phase singularity in scalar fields,polarization singularity in vector fields,and three-dimensional(3D)singularities such as optical skyrmions.The exploitation of photonic microstructures to generate and manipulate optical singularities has attracted wide research interest in recent years,with many photonic microstructures having been devised to this end.Accompanying these designs,scattered phenomenological theories have been proposed to expound the working mechanisms behind individual designs.In this work,instead of focusing on a specific type of microstructure,we concentrate on the most common geometric features of these microstructures—namely,symmetries—and revisit the process of generating optical singularities in microstructures from a symmetry viewpoint.By systematically employing the projection operator technique in group theory,we develop a widely applicable theoretical scheme to explore optical singularities in microstructures with rosette(i.e.,rotational and reflection)symmetries.Our scheme agrees well with previously reported works and further reveals that the eigenmodes of a symmetric microstructure can support multiplexed phase singularities in different components,such as out-of-plane,radial,azimuthal,and left-and right-handed circular components.Based on these phase singularities,more complicated optical singularities may be synthesized,including C points,V points,L lines,Néel-and bubble-type optical skyrmions,and optical lattices,to name a few.We demonstrate that the topological invariants associated with optical singularities are protected by the symmetries of the microstructure.Lastly,based on symmetry arguments,we formulate a so-called symmetry matching condition to clarify the excitation of a specific type of optical singularity.Our work establishes a unified theoretical framework to explore optical singularities in photonic microstructures with symmetries,shedding light on the symmetry origin of multidimensional and multiplexed optical singularities and providing a symmetry perspective for exploring many singularity-related effects in optics and photonics.
文摘Society is increasingly relying on artificially intelligent(Al)systems to facilitate,and sometimes even automate,critical systems that have huge impacts on the people these systems are designed to serve.But the unique nature of Al systems opens up new challenges regarding their ethical use.For example,①unrepresentative training data can introduce sampling bias,leading to unfair outcomes;and lack of data equity can introduce systemic bias into the system.At the university level,how to provide ethics training within the limits of typical computer science(CS)programs is non-trivial,as current CS education programs already face heavy burdens from unprecedented demand.In particular,the University of Michigan is exploring ways of introducing ethics training within the CS curricula,including both stand-alone courses and integrated modules.
基金funded by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No.(DGSSR-2025-02-01296).
文摘Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance,and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks(CNNs).We frame skin lesion recognition as graph-based reasoning and,to ensure fair evaluation and avoid data leakage,adopt a strict lesion-level partitioning strategy.Each image is first over-segmented using SLIC(Simple Linear Iterative Clustering)to produce perceptually homogeneous superpixels.These superpixels form the nodes of a region-adjacency graph whose edges encode spatial continuity.Node attributes are 1280-dimensional embeddings extracted with a lightweight yet expressive EfficientNet-B0 backbone,providing strong representational power at modest computational cost.The resulting graphs are processed by a five-layer Graph Attention Network(GAT)that learns to weight inter-node relationships dynamically and aggregates multi-hop context before classifying lesions into seven classes with a log-softmax output.Extensive experiments on the DermaMNIST benchmark show the proposed pipeline achieves 88.35%accuracy and 98.04%AUC,outperforming contemporary CNNs,AutoML approaches,and alternative graph neural networks.An ablation study indicates EfficientNet-B0 produces superior node descriptors compared with ResNet-18 and DenseNet,and that roughly five GAT layers strike a good balance between being too shallow and over-deep while avoiding oversmoothing.The method requires no data augmentation or external metadata,making it a drop-in upgrade for clinical computer-aided diagnosis systems.
基金supported by Guangxi Science and Technology Program(No.GuiKeAD23026291)Guangxi Science and Technology Major Project(No.AA22068057).
文摘Clustering is a pivotal data analysis method for deciphering the charge transport properties of single molecules in break junction experiments.However,given the high dimensionality and variability of the data,feature extraction remains a bottleneck in the development of efficient clustering methods.In this regard,extensive research over the past two decades has focused on feature engineering and dimensionality reduction in break junction conductance.However,extracting highly relevant features without expert knowledge remains an unresolved challenge.To address this issue,we propose a deep clustering method driven by task-oriented representation learning(CTRL)in which the clustering module serves as a guide for the representation learning(RepL)module.First,we determine an optimal autoencoder(AE)structure through a neural architecture search(NAS)to ensure efficient RepL;second,the RepL process is guided by a joint training strategy that combines AE reconstruction loss with the clustering objective.The results demonstrate that CTRL achieves excellent performance on both the generated and experimental data.Further inspection of the RepL step reveals that joint training robustly learns more compact features than the unconstrained AE or traditional dimensionality reduction methods,significantly reducing misclustering possibilities.Our method provides a general end-to-end automatic clustering solution for analyzing single-molecule break junction data.
基金fully supported by National Natural Science Foundation of China(61871422)Natural Science Foundation of Sichuan Province(2023NSFSC1422)Central Universities of South west Minzu University(ZYN2022032)。
文摘There are all kinds of unknown and known signals in the actual electromagnetic environment,which hinders the development of practical cognitive radio applications.However,most existing signal recognition models are difficult to discover unknown signals while recognizing known ones.In this paper,a compact manifold mixup feature-based open-set recognition approach(OR-CMMF)is proposed to address the above problem.First,the proposed approach utilizes the center loss to constrain decision boundaries so that it obtains the compact latent signal feature representations and extends the low-confidence feature space.Second,the latent signal feature representations are used to construct synthetic representations as substitutes for unknown categories of signals.Then,these constructed representations can occupy the extended low-confidence space.Finally,the proposed approach applies the distillation loss to adjust the decision boundaries between the known categories signals and the constructed unknown categories substitutes so that it accurately discovers unknown signals.The OR-CMMF approach outperformed other state-of-the-art open-set recognition methods in comprehensive recognition performance and running time,as demonstrated by simulation experiments on two public datasets RML2016.10a and ORACLE.
基金funded by the Institute of Information&CommunicationsTechnology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT),grant number 2021-0-01341.
文摘Emotion recognition under uncontrolled and noisy environments presents persistent challenges in the design of emotionally responsive systems.The current study introduces an audio-visual recognition framework designed to address performance degradation caused by environmental interference,such as background noise,overlapping speech,and visual obstructions.The proposed framework employs a structured fusion approach,combining early-stage feature-level integration with decision-level coordination guided by temporal attention mechanisms.Audio data are transformed into mel-spectrogram representations,and visual data are represented as raw frame sequences.Spatial and temporal features are extracted through convolutional and transformer-based encoders,allowing the framework to capture complementary and hierarchical information fromboth sources.Across-modal attentionmodule enables selective emphasis on relevant signals while suppressing modality-specific noise.Performance is validated on a modified version of the AFEW dataset,in which controlled noise is introduced to emulate realistic conditions.The framework achieves higher classification accuracy than comparative baselines,confirming increased robustness under conditions of cross-modal disruption.This result demonstrates the suitability of the proposed method for deployment in practical emotion-aware technologies operating outside controlled environments.The study also contributes a systematic approach to fusion design and supports further exploration in the direction of resilientmultimodal emotion analysis frameworks.The source code is publicly available at https://github.com/asmoon002/AVER(accessed on 18 August 2025).
基金funded by the National Natural Science Foundation of China(grant nos.52475084 and 52375076)the Postdoctoral Fellowship Program of CPSF(grant no.GZC20230202).
文摘Difficulty in extracting nonlinear sparse impulse features due to variable speed conditions and redundant noise interference leads to challenges in diagnosing variable speed faults.Therefore,an improved spectral amplitude modulation(ISAM)based on sparse feature adaptive convolution(SFAC)is proposed to enhance the fault features under variable speed conditions.First,an optimal bi-damped wavelet construction method is proposed to learn signal impulse features,which selects the optimal bi-damped wavelet parameters with correlation criterion and particle swarm optimization.Second,a convolutional basis pursuit denoising model based on an optimal bi-damped wavelet is proposed for resolving sparse impulses.A model regularization parameter selection method based on weighted fault characteristic amplitude ratio assistance is proposed.Then,an ISAM method based on kurtosis threshold is proposed to further enhance the fault information of sparse signal.Finally,the type of variable speed faults is determined by order spectrum analysis.Various experimental results,such as spectral amplitude modulation and Morlet wavelet matching,verify the effectiveness and advantages of the ISAM-SFAC method.
基金Supported by the National Key R&D Program of China(2022YFC3803600).
文摘Background Three-dimensional(3D)shape representation using mesh data is essential in various applications,such as virtual reality and simulation technologies.Current methods for extracting features from mesh edges or faces struggle with complex 3D models because edge-based approaches miss global contexts and face-based methods overlook variations in adjacent areas,which affects the overall precision.To address these issues,we propose the Feature Discrimination and Context Propagation Network(FDCPNet),which is a novel approach that synergistically integrates local and global features in mesh datasets.Methods FDCPNet is composed of two modules:(1)the Feature Discrimination Module,which employs an attention mechanism to enhance the identification of key local features,and(2)the Context Propagation Module,which enriches key local features by integrating global contextual information,thereby facilitating a more detailed and comprehensive representation of crucial areas within the mesh model.Results Experiments on popular datasets validated the effectiveness of FDCPNet,showing an improvement in the classification accuracy over the baseline MeshNet.Furthermore,even with reduced mesh face numbers and limited training data,FDCPNet achieved promising results,demonstrating its robustness in scenarios of variable complexity.