We consider various tasks of recognizing properties of DRSs(Decision Rule Systems)in this paper.As solution algorithms,DDTs(Deterministic Decision Trees)and NDTs(Nondeterministic Decision Trees)are used.An NDT can be ...We consider various tasks of recognizing properties of DRSs(Decision Rule Systems)in this paper.As solution algorithms,DDTs(Deterministic Decision Trees)and NDTs(Nondeterministic Decision Trees)are used.An NDT can be considered as a representation of a DRS that satisfies the conditions of the considered task and covers all potential inputs.It has been shown that the minimum depth of a DDT solving the task does not exceed the square of the minimum depth of an NDT.The growth of the minimum number of nodes in DDTs and NDTs can be exponential with the size of the original DRSs.There-fore,in the general case,it is better to simulate the behavior of the DT(Deci-sion Tree)on the given tuple of feature values rather than building the entire tree.We propose a greedy algorithm for such modeling and study its efficiency for a class of tasks of recognizing properties of DRSs.The obtained results may be of interest for data analysis in which both DRSs and DTs are intensively studied.In particular,these results make one think about the possibilities of transforming DRSs into DTs.展开更多
In industrial production and engineering operations,the health state of complex systems is critical,and predicting it can ensure normal operation.Complex systems have many monitoring indicators,complex coupling struct...In industrial production and engineering operations,the health state of complex systems is critical,and predicting it can ensure normal operation.Complex systems have many monitoring indicators,complex coupling structures,non-linear and time-varying characteristics,so it is a challenge to establish a reliable prediction model.The belief rule base(BRB)can fuse observed data and expert knowledge to establish a nonlinear relationship between input and output and has well modeling capabilities.Since each indicator of the complex system can reflect the health state to some extent,the BRB is built based on the causal relationship between system indicators and the health state to achieve the prediction.A health state prediction model based on BRB and long short term memory for complex systems is proposed in this paper.Firstly,the LSTMis introduced to predict the trend of the indicators in the system.Secondly,the Density Peak Clustering(DPC)algorithmis used todetermine referential values of indicators for BRB,which effectively offset the lack of expert knowledge.Then,the predicted values and expert knowledge are fused to construct BRB to predict the health state of the systems by inference.Finally,the effectiveness of the model is verified by a case study of a certain vehicle hydraulic pump.展开更多
Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to...Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to November 2021 were randomly selected,and all samples were manually microscopic examined after the detection of the UN9000 urine analysis line.The intelligent audit rules(including the microscopic review rules and manual verification rules)were validated based on the manual microscopic examination and manual audit,and the rules were adjusted to apply to our laboratory.The laboratory turnaround time(TAT)before and after the application of intelligent audit rules was compared.Result:The microscopic review rate of intelligent rules was 25.63%(292/1139),the true positive rate,false positive rate,true negative rate,and false negative rate were 27.66%(315/1139),6.49%(74/1139),62.34%(710/1139)and 3.51%(40/1139),respectively.The approval consistency rate of manual verification rules was 84.92%(727/856),the approval inconsistency rate was 0%(0/856),the interception consistency rate was 12.61%(108/856),and the interception inconsistency rate was 0%(0/856).Conclusion:The intelligence audit rules for urine analysis by Cui et al.have good clinical applicability in our laboratory.展开更多
The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helpin...The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helping infringement in network infringement.China’s Tort Liability Law and Civil Code amended the“notice-and-takedown”rule so that when the right holder sends an effective notice of infringement to the ISP,the ISP shall take necessary measures more than removal to be exempted from liability.This article will discuss the transformation of the rule and types of necessary measures,and reconstruct the relationship between effectiveness of notice and types of necessary measures.展开更多
Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in...Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection accuracy.In this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify intrusions.The ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the environment.Such fuzzy logic sets produce adaptive detection rules by reducing data uncertainty.Also,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical IDS.Under extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional models.Integrating the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion detection.This research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats.展开更多
A literature review on AI applications in the field of railway safety shows that the implemented approaches mainly concern the operational,maintenance,and feedback phases following railway incidents or accidents.These...A literature review on AI applications in the field of railway safety shows that the implemented approaches mainly concern the operational,maintenance,and feedback phases following railway incidents or accidents.These approaches exploit railway safety data once the transport system has received authorization for commissioning.However,railway standards and regulations require the development of a safety management system(SMS)from the specification and design phases of the railway system.This article proposes a new AI approach for analyzing and assessing safety from the specification and design phases of the railway system with a view to improving the development of the SMS.Unlike some learning methods,the proposed approach,which is dedicated in particular to safety assessment bodies,is based on semi-supervised learning carried out in close collaboration with safety experts who contributed to the development of a database of potential accident scenarios(learning example database)relating to the risk of rail collision.The proposed decision support is based on the use of an expert system whose knowledge base is automatically generated by inductive learning in the form of an association rule(rule base)and whose main objective is to suggest to the safety expert possible hazards not considered during the development of the SMS to complete the initial hazard register.展开更多
BACKGROUND There is a lack of study on vitamin D and calcium levels in epileptic patients receiving therapy,despite the growing recognition of the importance of bone health in individuals with epilepsy.Associations on...BACKGROUND There is a lack of study on vitamin D and calcium levels in epileptic patients receiving therapy,despite the growing recognition of the importance of bone health in individuals with epilepsy.Associations one statistical method for finding correlations between variables in big datasets is called association rule mining(ARM).This technique finds patterns of common items or events in the data set,including associations.Through the analysis of patient data,including demographics,genetic information,and reactions with previous treatments,ARM can identify harmful drug reactions,possible novel combinations of medicines,and trends which connect particular individual features to treatment outcomes.AIM To investigate the evidence on the effects of anti-epileptic drugs(AEDs)on calcium metabolism and supplementing with vitamin D to help lower the likelihood of bone-related issues using ARM technique.METHODS ARM technique was used to analyze patients’behavior on calcium metabolism,vitamin D and anti-epileptic medicines.Epileptic sufferers of both sexes who attended neurological outpatient and in patient department clinics were recruited for the study.There were three patient groups:Group 1 received one AED,group 2 received two AEDs,and group 3 received more than two AEDs.The researchers analyzed the alkaline phosphatase,ionized calcium,total calcium,phosphorus,vitamin D levels,or parathyroid hormone values.RESULTS A total of 150 patients,aged 12 years to 60 years,were studied,with 50 in each group(1,2,and 3).60%were men,this gender imbalance may affect the study’s findings,as women have different bone metabolism dynamics influenced by hormonal variations,including menopause.The results may not fully capture the distinct effects of AEDs on female patients.A greater equal distribution of women should be the goal of future studies in order to offer a complete comprehension of the metabolic alterations brought on by AEDs.86 patients had generalized epilepsy,64 partial.42%of patients had AEDs for>5 years.Polytherapy reduced calcium and vitamin D levels compared to mono and dual therapy.Polytherapy elevated alkaline phosphatase and phosphorus levels.CONCLUSION ARM revealed the possible effects of variables like age,gender,and polytherapy on parathyroid hormone levels in individuals taking antiepileptic medication.展开更多
After the design of aerospace products is completed,a manufacturability assessment needs to be conducted based on 3D model's features in terms of modeling quality and process design,otherwise the cost of design ch...After the design of aerospace products is completed,a manufacturability assessment needs to be conducted based on 3D model's features in terms of modeling quality and process design,otherwise the cost of design changes will increase.Due to the poor structure and low reusability of product manufacturing feature information and assessment knowledge in the current aerospace product manufacturability assessment process,it is difficult to realize automated manufacturability assessment.To address these issues,a domain ontology model is established for aerospace product manufacturability assessment in this paper.On this basis,a structured representation method of manufacturability assessment knowledge and a knowledge graph data layer construction method are proposed.Based on the semantic information and association information expressed by the knowledge graph,a rule matching method based on subgraph matching is proposed to improve the precision and recall.Finally,applications and experiments based on the software platform verify the effectiveness of the proposed knowledge graph construction and rule matching method.展开更多
The evidential reasoning(ER)rule framework has been widely applied in multi-attribute decision analysis and system assessment to manage uncertainty.However,traditional ER implementations rely on two critical limitatio...The evidential reasoning(ER)rule framework has been widely applied in multi-attribute decision analysis and system assessment to manage uncertainty.However,traditional ER implementations rely on two critical limitations:1)unrealistic assumptions of complete evidence independence,and 2)a lack of mechanisms to differentiate causal relationships from spurious correlations.Existing similarity-based approaches often misinterpret interdependent evidence,leading to unreliable decision outcomes.To address these gaps,this study proposes a causality-enhanced ER rule(CER-e)framework with three key methodological innovations:1)a multidimensional causal representation of evidence to capture dependency structures;2)probabilistic quantification of causal strength using transfer entropy,a model-free information-theoretic measure;3)systematic integration of causal parameters into the ER inference process while maintaining evidential objectivity.The PC algorithm is employed during causal discovery to eliminate spurious correlations,ensuring robust causal inference.Case studies in two types of domains—telecommunications network security assessment and structural risk evaluation—validate CER-e’s effectiveness in real-world scenarios.Under simulated incomplete information conditions,the framework demonstrates superior algorithmic robustness compared to traditional ER.Comparative analyses show that CER-e significantly improves both the interpretability of causal relationships and the reliability of assessment results,establishing a novel paradigm for integrating causal inference with evidential reasoning in complex system evaluation.展开更多
As the geopolitical and economic landscape of the Asia-Pacific continues to evolve,the partnership between China and ASEAN has reached a defining juncture.The dual imperatives of maintaining strategic autonomy while d...As the geopolitical and economic landscape of the Asia-Pacific continues to evolve,the partnership between China and ASEAN has reached a defining juncture.The dual imperatives of maintaining strategic autonomy while deepening economic interdependence have pushed regional actors to refine their approaches to cooperation.Among them,Singapore and Thailand o"er two distinct yet complementary perspectives on how Southeast Asia can sustain stability,inclusivity,and shared growth amid intensifying global uncertainties.展开更多
Against the backdrop of profound reshaping of the current international landscape and the unprecedentedly rapid iteration of digital technologies,the global digital economy landscape and international trade rule syste...Against the backdrop of profound reshaping of the current international landscape and the unprecedentedly rapid iteration of digital technologies,the global digital economy landscape and international trade rule system are entering a new era full of changes.Digital trade rules have emerged as a prominent focus in this field.Firstly,through a comprehensive review of sample data such as the WTO e-commerce proposals under the current multilateral framework,we can gain a profound insight into the negotiation practices of major economies regarding digital trade rules.In this context,China has demonstrated strong defensive interests in the“emerging”issues of digital trade,aiming to safeguard national data security and promote the healthy development of the digital economy.Therefore,when participating in the formulation of global digital trade rules,China needs to accurately strike a balance between offense and defense,contribute Chinese wisdom and solutions,and promote the construction of a fairer,more reasonable,and inclusive international digital trade governance system.展开更多
We propose the scaling rule of Morse oscillator,based on this rule and by virtue of the Her-mann-Feymann theorem,we respectively obtain the distribution of potential and kinetic ener-gy of the Morse Hamiltonian.Also,w...We propose the scaling rule of Morse oscillator,based on this rule and by virtue of the Her-mann-Feymann theorem,we respectively obtain the distribution of potential and kinetic ener-gy of the Morse Hamiltonian.Also,we derive the exact upper limit of physical energy level.Further,we derive some recursive relations for energy matrix elements of the potential and other similar operators in the context of Morse oscillator theory.展开更多
Bergmann's rule predicts that the larger of two homeotherm species differing only in size would occur at higher latitudes, or in cooler climates than the smaller, because of relative thermoregulatory costs in rela...Bergmann's rule predicts that the larger of two homeotherm species differing only in size would occur at higher latitudes, or in cooler climates than the smaller, because of relative thermoregulatory costs in relation to body mass/surface area ratio. Individual tracking data from two congeneric long-distance migratory northern nesting swan species, Tundra Cygnus columbianus (TS, n = 99) and Whooper Swans C. cygnus (WS, 61–71% larger mass than TS, n = 47) were used to determine their summering and wintering latitudes along similar migration routes and common staging areas along the same flyway. We hypothesised that throughout Arctic and Boreal breeding areas (10℃ in July), summer ambient temperatures mainly exceed the Lower Critical Temperatures (LCT, c. 1℃) for both swan species, so the duration of the snow-free summer period will favour smaller body size at highest latitudes, since this constrains the time available to lay, incubate eggs and raise cygnets to fledging. We hypothesised that in contrast, in winter, both species occur in temperatures near to freezing (−3℃ in January), below their respective LCT, so differential thermoregulation demands would constrain TS to winter south of WS. Tracking of individuals showed for the first time that while smaller TS summered significantly north of WS, WS wintered significantly north of TS, with limited overlap in both seasons. We conclude that differences in relative summer distribution of these two closely related migratory herbivores are not to do with latitude per se but are constrained by the time both species require to raise their young to fledging during the short northern summer, when thermoregulation costs are unlikely limiting. In winter, both swan species occur within a climate envelop at or below their respective LCT and smaller TS occurred consistently south of the range of the tracked WS, as predicted by Bergmann's rule.展开更多
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla...The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally.展开更多
Root system architecture has often been overlooked in plant research despite its critical role in plant adaptation to environmental conditions.This study focused on the root system architecture of the desert shrub Rea...Root system architecture has often been overlooked in plant research despite its critical role in plant adaptation to environmental conditions.This study focused on the root system architecture of the desert shrub Reaumuria soongorica in the Alxa steppe desert,Northwest China.Plant samples were collected during May-September 2019.Using excavation methods,in situ measurements,and root scanning techniques,we analyzed the root distribution,topology,and branching patterns of R.soongorica across an age sequence of 7-51 a.Additionally,we investigated the allometric relationships of root collar diameter with total coarse root length,biomass,and topological parameters.The results showed that the roots of R.soongorica were predominantly concentrated in shallow soil layers(10-50 cm),with lateral root branching and biomass allocation increasing with shrub age.The root topology exhibited a herringbone-like structure,with average topological and modified topological indices of 0.89 and 0.96,respectively,both of which adjusted with shrub age.The root system displayed a self-similar branching pattern,maintaining a constant cross-sectional area ratio of 1.13 before and after branching,deviating from the area-preserving rule.These adaptive traits allow R.soongorica to efficiently expand its nutrient acquisition zone,minimize internal competition,and optimize resource uptake from the upper soil layers.Furthermore,significant linear relationships were observed between log10-transformed root collar diameter and log10-transformed total coarse root length,biomass,and topological parameters.These findings advance non-destructive approaches for studying root characteristics and contribute to the development of root-related models.Besides,this study provides new insights into the adaptive strategies of R.soongorica under extreme drought conditions,offering valuable guidance for species selection and cultivation in desert restoration efforts.展开更多
Reducing raw materials consumption(RMC)in electric arc furnace(EAF)steelmaking process is beneficial to the reduction in resource and energy consumption.The conventional indicator of evaluating RMC only focuses on EAF...Reducing raw materials consumption(RMC)in electric arc furnace(EAF)steelmaking process is beneficial to the reduction in resource and energy consumption.The conventional indicator of evaluating RMC only focuses on EAF inputs and outputs,neglecting the associations between smelting operations and RMC.Traditional methods of reducing RMC rely on manual experience and lack a standard operation guidance.A method based on association rules mining and metallurgical mechanism(ARM-MM)was proposed.ARM-MM proposed an improved evaluation indicator of RMC and the indicator independently showed the associations between smelting operations and RMC.On the basis,1265 heats of real EAF data were used to obtain the operation guidance for RMC reduction.According to the ratio of hot metal(HM)in charge metals,data were divided into all dataset,low HM ratio dataset,medium HM ratio dataset,and high HM ratio dataset.ARM algorithm was used in each dataset to obtain specific operation guidance.The real average RMC under all dataset,medium HM ratio dataset,and high HM ratio dataset was reduced by 279,486,and 252 kg/heat,respectively,when obtained operation guidance was applied.展开更多
Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,th...Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction.Therefore,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule.Firstly,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,respectively.Then,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute features.This noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference image.Additionally,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed model.Experimental results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden information.Furthermore,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis.展开更多
Objective:To explore the core acupuncture acupoints and pattern-adapted acupoint combination rules for autism spectrum disorder(ASD)complicated with sleep disorder using clinical data mining technology.Methods:A retro...Objective:To explore the core acupuncture acupoints and pattern-adapted acupoint combination rules for autism spectrum disorder(ASD)complicated with sleep disorder using clinical data mining technology.Methods:A retrospective analysis was conducted on the diagnosis and treatment data of 104 children with ASD complicated with sleep disorder admitted to Xi’an Traditional Chinese Medicine(TCM)Encephalopathy Hospital from January 2022 to December 2024.Cross-pattern main acupoints were screened via frequency statistics,chi-square test,and factor analysis;pattern-specific auxiliary acupoints were extracted by combining multiple correspondence analysis,cluster analysis,and association rule mining.Results:Ten cross-pattern main acupoints(Baihui,Sishenzhen,Language Area 1,Language Area 2,Neiguan,Shenmen,Yongquan,Xuanzhong)were identified,and acupoint combination schemes for four major TCM patterns(Hyperactivity of Liver and Heart Fire,Deficiency of Kidney Essence,Deficiency of Both Heart and Spleen,Hyperactivity of Liver with Spleen Deficiency)were established.Conclusion:Acupuncture treatment should follow the principle of“regulating spirit and calming the brain as the root,and dredging collaterals based on pattern differentiation as the branch”.The synergy between main and auxiliary acupoints can accurately regulate the disease,providing a basis for precise clinical treatment.展开更多
基金supported by King Abdullah University of Science and Technology(KAUST).
文摘We consider various tasks of recognizing properties of DRSs(Decision Rule Systems)in this paper.As solution algorithms,DDTs(Deterministic Decision Trees)and NDTs(Nondeterministic Decision Trees)are used.An NDT can be considered as a representation of a DRS that satisfies the conditions of the considered task and covers all potential inputs.It has been shown that the minimum depth of a DDT solving the task does not exceed the square of the minimum depth of an NDT.The growth of the minimum number of nodes in DDTs and NDTs can be exponential with the size of the original DRSs.There-fore,in the general case,it is better to simulate the behavior of the DT(Deci-sion Tree)on the given tuple of feature values rather than building the entire tree.We propose a greedy algorithm for such modeling and study its efficiency for a class of tasks of recognizing properties of DRSs.The obtained results may be of interest for data analysis in which both DRSs and DTs are intensively studied.In particular,these results make one think about the possibilities of transforming DRSs into DTs.
基金supported by the Natural Science Foundation of China underGrant 61833016 and 61873293the Shaanxi OutstandingYouth Science Foundation underGrant 2020JC-34the Shaanxi Science and Technology Innovation Team under Grant 2022TD-24.
文摘In industrial production and engineering operations,the health state of complex systems is critical,and predicting it can ensure normal operation.Complex systems have many monitoring indicators,complex coupling structures,non-linear and time-varying characteristics,so it is a challenge to establish a reliable prediction model.The belief rule base(BRB)can fuse observed data and expert knowledge to establish a nonlinear relationship between input and output and has well modeling capabilities.Since each indicator of the complex system can reflect the health state to some extent,the BRB is built based on the causal relationship between system indicators and the health state to achieve the prediction.A health state prediction model based on BRB and long short term memory for complex systems is proposed in this paper.Firstly,the LSTMis introduced to predict the trend of the indicators in the system.Secondly,the Density Peak Clustering(DPC)algorithmis used todetermine referential values of indicators for BRB,which effectively offset the lack of expert knowledge.Then,the predicted values and expert knowledge are fused to construct BRB to predict the health state of the systems by inference.Finally,the effectiveness of the model is verified by a case study of a certain vehicle hydraulic pump.
文摘Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to November 2021 were randomly selected,and all samples were manually microscopic examined after the detection of the UN9000 urine analysis line.The intelligent audit rules(including the microscopic review rules and manual verification rules)were validated based on the manual microscopic examination and manual audit,and the rules were adjusted to apply to our laboratory.The laboratory turnaround time(TAT)before and after the application of intelligent audit rules was compared.Result:The microscopic review rate of intelligent rules was 25.63%(292/1139),the true positive rate,false positive rate,true negative rate,and false negative rate were 27.66%(315/1139),6.49%(74/1139),62.34%(710/1139)and 3.51%(40/1139),respectively.The approval consistency rate of manual verification rules was 84.92%(727/856),the approval inconsistency rate was 0%(0/856),the interception consistency rate was 12.61%(108/856),and the interception inconsistency rate was 0%(0/856).Conclusion:The intelligence audit rules for urine analysis by Cui et al.have good clinical applicability in our laboratory.
文摘The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helping infringement in network infringement.China’s Tort Liability Law and Civil Code amended the“notice-and-takedown”rule so that when the right holder sends an effective notice of infringement to the ISP,the ISP shall take necessary measures more than removal to be exempted from liability.This article will discuss the transformation of the rule and types of necessary measures,and reconstruct the relationship between effectiveness of notice and types of necessary measures.
基金A research grant from the Multimedia University,Malaysia supports this work。
文摘Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection accuracy.In this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify intrusions.The ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the environment.Such fuzzy logic sets produce adaptive detection rules by reducing data uncertainty.Also,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical IDS.Under extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional models.Integrating the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion detection.This research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats.
文摘A literature review on AI applications in the field of railway safety shows that the implemented approaches mainly concern the operational,maintenance,and feedback phases following railway incidents or accidents.These approaches exploit railway safety data once the transport system has received authorization for commissioning.However,railway standards and regulations require the development of a safety management system(SMS)from the specification and design phases of the railway system.This article proposes a new AI approach for analyzing and assessing safety from the specification and design phases of the railway system with a view to improving the development of the SMS.Unlike some learning methods,the proposed approach,which is dedicated in particular to safety assessment bodies,is based on semi-supervised learning carried out in close collaboration with safety experts who contributed to the development of a database of potential accident scenarios(learning example database)relating to the risk of rail collision.The proposed decision support is based on the use of an expert system whose knowledge base is automatically generated by inductive learning in the form of an association rule(rule base)and whose main objective is to suggest to the safety expert possible hazards not considered during the development of the SMS to complete the initial hazard register.
文摘BACKGROUND There is a lack of study on vitamin D and calcium levels in epileptic patients receiving therapy,despite the growing recognition of the importance of bone health in individuals with epilepsy.Associations one statistical method for finding correlations between variables in big datasets is called association rule mining(ARM).This technique finds patterns of common items or events in the data set,including associations.Through the analysis of patient data,including demographics,genetic information,and reactions with previous treatments,ARM can identify harmful drug reactions,possible novel combinations of medicines,and trends which connect particular individual features to treatment outcomes.AIM To investigate the evidence on the effects of anti-epileptic drugs(AEDs)on calcium metabolism and supplementing with vitamin D to help lower the likelihood of bone-related issues using ARM technique.METHODS ARM technique was used to analyze patients’behavior on calcium metabolism,vitamin D and anti-epileptic medicines.Epileptic sufferers of both sexes who attended neurological outpatient and in patient department clinics were recruited for the study.There were three patient groups:Group 1 received one AED,group 2 received two AEDs,and group 3 received more than two AEDs.The researchers analyzed the alkaline phosphatase,ionized calcium,total calcium,phosphorus,vitamin D levels,or parathyroid hormone values.RESULTS A total of 150 patients,aged 12 years to 60 years,were studied,with 50 in each group(1,2,and 3).60%were men,this gender imbalance may affect the study’s findings,as women have different bone metabolism dynamics influenced by hormonal variations,including menopause.The results may not fully capture the distinct effects of AEDs on female patients.A greater equal distribution of women should be the goal of future studies in order to offer a complete comprehension of the metabolic alterations brought on by AEDs.86 patients had generalized epilepsy,64 partial.42%of patients had AEDs for>5 years.Polytherapy reduced calcium and vitamin D levels compared to mono and dual therapy.Polytherapy elevated alkaline phosphatase and phosphorus levels.CONCLUSION ARM revealed the possible effects of variables like age,gender,and polytherapy on parathyroid hormone levels in individuals taking antiepileptic medication.
基金Sponsored by the National Key Research and Development Program from Ministry of Science and Technology of the People's Republic of China (Grant No.2020YFB1711403)。
文摘After the design of aerospace products is completed,a manufacturability assessment needs to be conducted based on 3D model's features in terms of modeling quality and process design,otherwise the cost of design changes will increase.Due to the poor structure and low reusability of product manufacturing feature information and assessment knowledge in the current aerospace product manufacturability assessment process,it is difficult to realize automated manufacturability assessment.To address these issues,a domain ontology model is established for aerospace product manufacturability assessment in this paper.On this basis,a structured representation method of manufacturability assessment knowledge and a knowledge graph data layer construction method are proposed.Based on the semantic information and association information expressed by the knowledge graph,a rule matching method based on subgraph matching is proposed to improve the precision and recall.Finally,applications and experiments based on the software platform verify the effectiveness of the proposed knowledge graph construction and rule matching method.
基金supported by the Natural Science Foundation of China(Nos.U22A2099,62273113,62203461,62203365)the Innovation Project of Guangxi Graduate Education under Grant YCBZ2023130by the Guangxi Higher Education Undergraduate Teaching Reform Project Key Project,grant number 2022JGZ130.
文摘The evidential reasoning(ER)rule framework has been widely applied in multi-attribute decision analysis and system assessment to manage uncertainty.However,traditional ER implementations rely on two critical limitations:1)unrealistic assumptions of complete evidence independence,and 2)a lack of mechanisms to differentiate causal relationships from spurious correlations.Existing similarity-based approaches often misinterpret interdependent evidence,leading to unreliable decision outcomes.To address these gaps,this study proposes a causality-enhanced ER rule(CER-e)framework with three key methodological innovations:1)a multidimensional causal representation of evidence to capture dependency structures;2)probabilistic quantification of causal strength using transfer entropy,a model-free information-theoretic measure;3)systematic integration of causal parameters into the ER inference process while maintaining evidential objectivity.The PC algorithm is employed during causal discovery to eliminate spurious correlations,ensuring robust causal inference.Case studies in two types of domains—telecommunications network security assessment and structural risk evaluation—validate CER-e’s effectiveness in real-world scenarios.Under simulated incomplete information conditions,the framework demonstrates superior algorithmic robustness compared to traditional ER.Comparative analyses show that CER-e significantly improves both the interpretability of causal relationships and the reliability of assessment results,establishing a novel paradigm for integrating causal inference with evidential reasoning in complex system evaluation.
文摘As the geopolitical and economic landscape of the Asia-Pacific continues to evolve,the partnership between China and ASEAN has reached a defining juncture.The dual imperatives of maintaining strategic autonomy while deepening economic interdependence have pushed regional actors to refine their approaches to cooperation.Among them,Singapore and Thailand o"er two distinct yet complementary perspectives on how Southeast Asia can sustain stability,inclusivity,and shared growth amid intensifying global uncertainties.
基金the achievements of the 2025 Guangxi Degree and Graduate Education Reform Project on Artificial Intelligence Empowering International Business Master’s Teaching Innovation Research(JGY2025036).
文摘Against the backdrop of profound reshaping of the current international landscape and the unprecedentedly rapid iteration of digital technologies,the global digital economy landscape and international trade rule system are entering a new era full of changes.Digital trade rules have emerged as a prominent focus in this field.Firstly,through a comprehensive review of sample data such as the WTO e-commerce proposals under the current multilateral framework,we can gain a profound insight into the negotiation practices of major economies regarding digital trade rules.In this context,China has demonstrated strong defensive interests in the“emerging”issues of digital trade,aiming to safeguard national data security and promote the healthy development of the digital economy.Therefore,when participating in the formulation of global digital trade rules,China needs to accurately strike a balance between offense and defense,contribute Chinese wisdom and solutions,and promote the construction of a fairer,more reasonable,and inclusive international digital trade governance system.
基金supported by the National Natural Science Foundation of China(No.10874174)。
文摘We propose the scaling rule of Morse oscillator,based on this rule and by virtue of the Her-mann-Feymann theorem,we respectively obtain the distribution of potential and kinetic ener-gy of the Morse Hamiltonian.Also,we derive the exact upper limit of physical energy level.Further,we derive some recursive relations for energy matrix elements of the potential and other similar operators in the context of Morse oscillator theory.
基金supported by the Joint Chinese Academy of Sciences(CAS)-Max Planck Society(MPG)Research Project(HZXM20225001MI)the China Biodiversity Observation Networks(Sino BON)+1 种基金the Ministry of the Environment of Japan(ME20080401,ME20090401)the US Geological Survey(Grant No.07WRAG0003,G09AC00046).
文摘Bergmann's rule predicts that the larger of two homeotherm species differing only in size would occur at higher latitudes, or in cooler climates than the smaller, because of relative thermoregulatory costs in relation to body mass/surface area ratio. Individual tracking data from two congeneric long-distance migratory northern nesting swan species, Tundra Cygnus columbianus (TS, n = 99) and Whooper Swans C. cygnus (WS, 61–71% larger mass than TS, n = 47) were used to determine their summering and wintering latitudes along similar migration routes and common staging areas along the same flyway. We hypothesised that throughout Arctic and Boreal breeding areas (10℃ in July), summer ambient temperatures mainly exceed the Lower Critical Temperatures (LCT, c. 1℃) for both swan species, so the duration of the snow-free summer period will favour smaller body size at highest latitudes, since this constrains the time available to lay, incubate eggs and raise cygnets to fledging. We hypothesised that in contrast, in winter, both species occur in temperatures near to freezing (−3℃ in January), below their respective LCT, so differential thermoregulation demands would constrain TS to winter south of WS. Tracking of individuals showed for the first time that while smaller TS summered significantly north of WS, WS wintered significantly north of TS, with limited overlap in both seasons. We conclude that differences in relative summer distribution of these two closely related migratory herbivores are not to do with latitude per se but are constrained by the time both species require to raise their young to fledging during the short northern summer, when thermoregulation costs are unlikely limiting. In winter, both swan species occur within a climate envelop at or below their respective LCT and smaller TS occurred consistently south of the range of the tracked WS, as predicted by Bergmann's rule.
基金This paper is a phased result of the“Research on the Issue of China’s Data Export System”(24SFB3035)a research project of the Ministry of Justice of China on the construction of the rule of law and the study of legal theories at the ministerial level in 2024.
文摘The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally.
基金funded by the Guangxi Science and Technology Plan Project(Guike AD22080050)the Basic Research Ability Improvement Project of Young and Middle-aged Teachers of Universities in Guangxi(2022KY0386)+1 种基金the Opening Foundation of Key Laboratory of Environment Change and Resources Use in Beibu Gulf,Ministry of Education,Nanning Normal University(NNNU-KLOP-K2202)the National Natural Science Foundation of China(42471055).
文摘Root system architecture has often been overlooked in plant research despite its critical role in plant adaptation to environmental conditions.This study focused on the root system architecture of the desert shrub Reaumuria soongorica in the Alxa steppe desert,Northwest China.Plant samples were collected during May-September 2019.Using excavation methods,in situ measurements,and root scanning techniques,we analyzed the root distribution,topology,and branching patterns of R.soongorica across an age sequence of 7-51 a.Additionally,we investigated the allometric relationships of root collar diameter with total coarse root length,biomass,and topological parameters.The results showed that the roots of R.soongorica were predominantly concentrated in shallow soil layers(10-50 cm),with lateral root branching and biomass allocation increasing with shrub age.The root topology exhibited a herringbone-like structure,with average topological and modified topological indices of 0.89 and 0.96,respectively,both of which adjusted with shrub age.The root system displayed a self-similar branching pattern,maintaining a constant cross-sectional area ratio of 1.13 before and after branching,deviating from the area-preserving rule.These adaptive traits allow R.soongorica to efficiently expand its nutrient acquisition zone,minimize internal competition,and optimize resource uptake from the upper soil layers.Furthermore,significant linear relationships were observed between log10-transformed root collar diameter and log10-transformed total coarse root length,biomass,and topological parameters.These findings advance non-destructive approaches for studying root characteristics and contribute to the development of root-related models.Besides,this study provides new insights into the adaptive strategies of R.soongorica under extreme drought conditions,offering valuable guidance for species selection and cultivation in desert restoration efforts.
基金supported by National Natural Science Foundation of China(Nos.52174328 and 52474368)Fundamental Research Funds for Central Universities of Central South University(Nos.2022ZZTS0084 and 2024ZZTS0062).
文摘Reducing raw materials consumption(RMC)in electric arc furnace(EAF)steelmaking process is beneficial to the reduction in resource and energy consumption.The conventional indicator of evaluating RMC only focuses on EAF inputs and outputs,neglecting the associations between smelting operations and RMC.Traditional methods of reducing RMC rely on manual experience and lack a standard operation guidance.A method based on association rules mining and metallurgical mechanism(ARM-MM)was proposed.ARM-MM proposed an improved evaluation indicator of RMC and the indicator independently showed the associations between smelting operations and RMC.On the basis,1265 heats of real EAF data were used to obtain the operation guidance for RMC reduction.According to the ratio of hot metal(HM)in charge metals,data were divided into all dataset,low HM ratio dataset,medium HM ratio dataset,and high HM ratio dataset.ARM algorithm was used in each dataset to obtain specific operation guidance.The real average RMC under all dataset,medium HM ratio dataset,and high HM ratio dataset was reduced by 279,486,and 252 kg/heat,respectively,when obtained operation guidance was applied.
基金supported in part by the National Natural Science Foundation of China(Nos.62202234,62401270)the China Postdoctoral Science Foundation(No.2023M741778)the Natural Science Foundation of Jiangsu Province(Nos.BK20240706,BK20240694).
文摘Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction.Therefore,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule.Firstly,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,respectively.Then,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute features.This noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference image.Additionally,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed model.Experimental results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden information.Furthermore,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis.
基金Song Hujie’s Inheritance Studio of National Renowned Traditional Chinese Medicine Experts.
文摘Objective:To explore the core acupuncture acupoints and pattern-adapted acupoint combination rules for autism spectrum disorder(ASD)complicated with sleep disorder using clinical data mining technology.Methods:A retrospective analysis was conducted on the diagnosis and treatment data of 104 children with ASD complicated with sleep disorder admitted to Xi’an Traditional Chinese Medicine(TCM)Encephalopathy Hospital from January 2022 to December 2024.Cross-pattern main acupoints were screened via frequency statistics,chi-square test,and factor analysis;pattern-specific auxiliary acupoints were extracted by combining multiple correspondence analysis,cluster analysis,and association rule mining.Results:Ten cross-pattern main acupoints(Baihui,Sishenzhen,Language Area 1,Language Area 2,Neiguan,Shenmen,Yongquan,Xuanzhong)were identified,and acupoint combination schemes for four major TCM patterns(Hyperactivity of Liver and Heart Fire,Deficiency of Kidney Essence,Deficiency of Both Heart and Spleen,Hyperactivity of Liver with Spleen Deficiency)were established.Conclusion:Acupuncture treatment should follow the principle of“regulating spirit and calming the brain as the root,and dredging collaterals based on pattern differentiation as the branch”.The synergy between main and auxiliary acupoints can accurately regulate the disease,providing a basis for precise clinical treatment.