User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and opera...User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research.展开更多
The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/...The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/relativity, under preserving general covariance, is exposed. Dependent on a nondynamical affine connection, a generally covariant second-order effective Lagrangian for metric gravity is worked out, with the general relativity violation and the gravitational dark matter serving as the signatures of emergence.展开更多
We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencie...We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencies which can be detected assuming a sensitivity of 7×h^10-27 . From there we examine the implications of an earlier Hubble parameter at the start of inflation, and a phase transition treatment of pre to post Planckian inflation physics via use of inflatons. We close with an analysis of how gravitational constant G may vary with time, the tie in with the NEC condition and how to select a range of relic GW frequencies. The gravitational frequencies in turn may enable resolving a mis match between the datum that the entropy of the center of the galaxy black hole is greater than the entropy of the present four dimensional universe as we can infer and measure.展开更多
It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum defi...It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum definition. The results of such processed measures are apparently not the same, so Bell’s inequality would not be violated. It is a use of the wave function which implies the violation of the inequality, as it can be seen on the last flowcharts.展开更多
With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and exc...With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops.展开更多
The spontaneous conversion of muonium to antimuonium is an interesting charged lepton flavor violation phenomenon that offers a sensitive probe for potential new physics and serves as a tool to constrain the parameter...The spontaneous conversion of muonium to antimuonium is an interesting charged lepton flavor violation phenomenon that offers a sensitive probe for potential new physics and serves as a tool to constrain the parameter space beyond the Standard Model.The Muonium-to-Antimuonium Conversion Experiment(MACE)was designed to utilize a high-intensity muon beam,a Michel electron magnetic spectrometer,a positron transport system,and a positron detection system to either discover or constrain this rare process with a conversion probability of O(10^(-13)).This article presents an overview of the theoretical framework and a detailed description of the experimental design for muonium-to-antimuonium conversion.展开更多
With the growing integration of renewable energy sources(RESs)and smart interconnected devices,conventional distribution networks have turned to active distribution networks(ADNs)with complex system model and power fl...With the growing integration of renewable energy sources(RESs)and smart interconnected devices,conventional distribution networks have turned to active distribution networks(ADNs)with complex system model and power flow dynamics.The rapid fluctuation of RES power may easily result in frequent voltage violation issues.Taking the flexible RES reactive power as control variables,this paper proposes a two-layer control scheme with Koopman wide neural network(WNN)based model predictive control(MPC)method for optimal voltage regulation and network loss reduction.Based on Koopman operator theory,a data-driven WNN method is presented to fit a high-dimensional linear model of power flow.With the model,voltage and network loss sensitivities are computed analytically,and utilized for ADN partition and control model formulation.In the lower level,a dual-mode adaptive switching MPC strategy is put forward for optimal voltage control and network loss optimization in each individual partition to decide the RES reactive power.The upper level is to calculate the adjustment coefficients of the RES reactive power given in the low level by taking the coupling effects of different partitions into account,and then the final reactive power dispatches of RESs are obtained to realize optimal control of voltage and network loss.Simulation results on two ADNs demonstrate that the proposed strategy can reliably maintain the voltage at each node within the secure range,reduce network power losses,and enhance the overall system security and economic efficiency.展开更多
The dense integration of residential distributed photovoltaic(PV)systems into three-phase,four-wire low-voltage(LV)distribution networks results in reverse power flow and three-phase imbalance,leading to voltage viola...The dense integration of residential distributed photovoltaic(PV)systems into three-phase,four-wire low-voltage(LV)distribution networks results in reverse power flow and three-phase imbalance,leading to voltage violations that hinder the growth of rural distributed PV systems.Traditional voltage droop-based control methods regulate PV power output solely based on local voltage measurements at the point of PV connection.Due to a lack of global coordination and optimization,their efficiency is often subpar.This paper presents a centralized coordinated active/reactive power control strategy for PV inverters in rural LV distribution feeders with high PV penetration.The strategy optimizes residential PV inverter reactive and active power control to enhance voltage quality.It uses sensitivity coefficients derived from the inverse Jacobian matrix to assign adjustment weights to individual PV units and iteratively optimize their power outputs.The control sequence prioritizes reactive power increases;if the coefficients are below average or the inverters reach capacity,active power is curtailed until voltage issues are resolved.A simulation based on a real 37-node rural distribution network shows that the proposed method significantly reduces PV curtailment.Typical daily results indicate a curtailment rate of 1.47%,which is significantly lower than the 15.4%observed with the voltage droop-based control method.The total daily PV power output(measured every 15 min)increases from 5.55 to 6.41 MW,improving PV hosting capacity.展开更多
Computing Power Network(CPN)is a new paradigm that integrates communication,computing,and storage resources to provide services for tasks.However,tasks composed of non-independent subtasks have a preference for the re...Computing Power Network(CPN)is a new paradigm that integrates communication,computing,and storage resources to provide services for tasks.However,tasks composed of non-independent subtasks have a preference for the resources required at each stage,which increases the difficulty of heterogeneous resource allocation and reduces the latency performance of CPN services.Motivated by this,this paper jointly optimizes the full-service cycle of tasks,including transmission,task partitioning,and offloading.First,the transmission bandwidth is dynamically configured based on delay sensitivity of tasks.Second,with the real-time information from edge resource clusters and state resource clusters in the network,the optimal partitioning for a computation task is derived.Third,personalized resource allocation schemes are customized for computation and storage tasks respectively.Finally,the impact of resource parameter configuration on the latency violation probability of CPN is revealed.Moreover,compared with the benchmark schemes,our proposed scheme reduces the network latency violation probability by up to 1.17×in the same network setting.展开更多
The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achievi...The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment.Moreover,the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS)without impacting the Service Level Agreements(SLAs).However,the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements.In this paper,Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS)is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud environment.This CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud.Then,it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources.It further used CBBM for potential Virtual Machine(VM)deployment that attributes towards the provision of optimal resources.It is proposed with the capability of achieving optimal QoS with minimized time,energy consumption,SLA cost and SLA violation.The experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21%and reduced SLA violation rate of 18.74%,better than the compared autonomic cloud resource managing frameworks.展开更多
The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled h...The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector.展开更多
Objectives:Parentification,a role reversal where children assume age-inappropriate duties in the family,is a significant childhood adversity often linked to disrupted developmental trajectories and poor mental health ...Objectives:Parentification,a role reversal where children assume age-inappropriate duties in the family,is a significant childhood adversity often linked to disrupted developmental trajectories and poor mental health outcomes.Yet the complexity of parentification,influenced by various contextual factors,obscures a comprehensive understanding of its psychological consequences and its mental health aspects.The paper aims to map up-to-date research,synthesize key findings,and identify critical knowledge gaps.Methods:To that end,a systematic search was performed in Scopus,PsycINFO,PubMed,and EBSCO databases,and data was extracted and reviewed by two reviewers.The search yielded 29 studies,including 9 qualitative,1 mixed,and 19 quantitative studies that examined the mental health aspects of parentification,from various countries of origin.Results:Parentification,often arising from contexts like parental illness or substance abuse,is linked to varied mental and physical health outcomes.These outcomes are strongly moderated by the adolescent’s subjective perception of their role and the presence of protective factors like strong sibling relationships.The review also identified a clear pathway for the intergenerational transmission of parentification,where a parent’s own history was found to impact their parenting cognitions.Conclusion:This review concludes that future longitudinal research should move beyond negative or positive outcomes of parentification and investigate the mediating and moderating mechanisms that play a crucial role in the outcomes.Furthermore,the absence of prevalence studies on parentification is a notable limitation,and as a result,the size of the affected population remains unknown.Further research is also needed to identify potential protective factors in various circumstances.展开更多
This paper proposes a data-and model-driven col-laborative resource scheduling method to maximize the spec-tral efficiency(SE)of cell-free(CF)downlink multiuser multiple-input multiple-output(MIMO)systems,subject to d...This paper proposes a data-and model-driven col-laborative resource scheduling method to maximize the spec-tral efficiency(SE)of cell-free(CF)downlink multiuser multiple-input multiple-output(MIMO)systems,subject to delay violation probability and power constraints.The method integrates the weighted minimum mean square error(WMMSE)algorithm within the safety reinforcement learn-ing(Safety-RL)framework.The original optimization problem is decomposed into two coupled subproblems.The Safety-RL algorithm leverages state features to determine user priority weights and allocate bandwidths,while the WMMSE algorithm calculates the precoding matrix and fur-ther schedules resources based on user priority weights to obtain the reward and costs of Safety-RL.Considering dy-namic user access in CF systems,a distributed algorithm with user scalability is also proposed.Simulation results demonstrate that the proposed approach improves the SE while meeting the different delay violation probability con-straints of users.Furthermore,the distributed algorithm of-fers comparable performance to the fully centralized method while considerably reducing model training overhead,par-ticularly as users dynamically access the system.展开更多
Nonclassical light fields exhibit unique quantum characteristics that not only expand the scope of optical research but also provide a solid foundation for advancements in quantum technologies.In this study,we investi...Nonclassical light fields exhibit unique quantum characteristics that not only expand the scope of optical research but also provide a solid foundation for advancements in quantum technologies.In this study,we investigate a system consisting of one-^(133)Cs atom placed in a resonant cavity.Pumped by 459 nm laser light,the system generates cavity modes corresponding to the atomic 7S_(1/2)→6P_(3/2)(1470 nm)and 7S_(1/2)→6P_(1/2)(1359 nm)transitions,which are associated with the clock states of the cesium active optical clock.By analyzing the statistical and dynamical properties of the fields,we systematically explore the nonclassical behavior of the system under varying coupling strengths and cavity decay rates.We identify parameter regions where both individual fields and their cross-correlation exhibit nonclassicality,with the Cauchy-Schwarz(CS)violation coefficient R reaching a maximum of 13.9.This demonstrates the system’s ability to generate highly nonclassical photon pairs,enriching the repertoire of nonclassical light sources.展开更多
The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor ...The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor violation(LFV)process l_(i)→l_(j)γγ and di-production from the LFV process l_(i)→l_(j)γγ induced by dipole operators.Comparing the obtained numerical results with the corresponding experimental measurements,we obtain the constraints on the effective couplings of γ with the SM charged leptons.The upper limit of the effective coupling|DLμe|2+|DRμe|2coming from the process μ→e~γγis looser than the processμ→eγ by about one order of magnitude.展开更多
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire...Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.展开更多
In recent years, the infringements of information disclosure are conspicuous in listed companies in China, which has seriously impeded the healthy development of the capital market. In this paper, the results of regul...In recent years, the infringements of information disclosure are conspicuous in listed companies in China, which has seriously impeded the healthy development of the capital market. In this paper, the results of regulations of the infringements by means of the game theory and our findings suggest that we should witness less cases of violations when we intensify own efforts to check up and punish those violations, and lower the return of the infringement. At the same time, we would increase the effect of supervising violated behavior when we strengthen the deterrence.展开更多
Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, na...Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language.展开更多
基金This research work is implemented at the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property,Universities of Hunan ProvinceHunan Provincial Key Laboratory of Big Data Science and Technology,Finance and Economics+3 种基金Key Laboratory of Information Technology and Security,Hunan Provincial Higher Education.This research is funded by the Open Foundation for the University Innovation Platform in the Hunan Province(Grant No.18K103)Open Project(Grant Nos.20181901CRP03,20181901CRP04,20181901CRP05)Hunan Provincial Education Science 13th Five Year Plan(Grant No.XJK016BXX001)Social Science Foundation of Hunan Province(Grant No.17YBA049).
文摘User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research.
文摘The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/relativity, under preserving general covariance, is exposed. Dependent on a nondynamical affine connection, a generally covariant second-order effective Lagrangian for metric gravity is worked out, with the general relativity violation and the gravitational dark matter serving as the signatures of emergence.
文摘We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencies which can be detected assuming a sensitivity of 7×h^10-27 . From there we examine the implications of an earlier Hubble parameter at the start of inflation, and a phase transition treatment of pre to post Planckian inflation physics via use of inflatons. We close with an analysis of how gravitational constant G may vary with time, the tie in with the NEC condition and how to select a range of relic GW frequencies. The gravitational frequencies in turn may enable resolving a mis match between the datum that the entropy of the center of the galaxy black hole is greater than the entropy of the present four dimensional universe as we can infer and measure.
文摘It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum definition. The results of such processed measures are apparently not the same, so Bell’s inequality would not be violated. It is a use of the wave function which implies the violation of the inequality, as it can be seen on the last flowcharts.
基金TheNationalNatural Science Foundation ofChina(Nos.62272418,62102058)Zhejiang Provincial Natural Science Foundation Major Project(No.LD24F020004)the Major Open Project of Key Laboratory for Advanced Design and Intelligent Computing of the Ministry of Education(No.ADIC2023ZD001).
文摘With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops.
基金supported by National Natural Science Foundation of China(Nos.12075326,11535014,11975017,12475191,11905092,12105132 and 12175039)Guangdong Basic and Applied Basic Research Foundation(No.2025A1515010669)+7 种基金Natural Science Foundation of Guangzhou(No.2024A04J6243)Fundamental Research Funds for the Central Universities(23xkjc017)in Sun Yat-sen UniversityBasic Research Conditions and Major Scientific Instrument and Equipment Research and Development Projects of the Ministry of Science and Technology(No.2022YFF0705602)the State Key Laboratory of Particle Detection and Electronics(SKLPDE-ZZ-202412)Natural Science Foundation of Shandong Province(No.2023HWYQ-010)the“Fundamental Research Funds for the Central Universities”at Southeast Universitythe National Development and Reform Commission of China(Large Research Infrastructures of 12th Five-Year Plan:China initiative Accelerator Driven System)(No.2017-000052-75-01-000590)Innovation Training Program for bachelor students in Sun Yat-sen University。
文摘The spontaneous conversion of muonium to antimuonium is an interesting charged lepton flavor violation phenomenon that offers a sensitive probe for potential new physics and serves as a tool to constrain the parameter space beyond the Standard Model.The Muonium-to-Antimuonium Conversion Experiment(MACE)was designed to utilize a high-intensity muon beam,a Michel electron magnetic spectrometer,a positron transport system,and a positron detection system to either discover or constrain this rare process with a conversion probability of O(10^(-13)).This article presents an overview of the theoretical framework and a detailed description of the experimental design for muonium-to-antimuonium conversion.
基金supported by the Science and Technology Project of State Grid Jiangsu Electric Power Co.,Ltd.(J2024162).
文摘With the growing integration of renewable energy sources(RESs)and smart interconnected devices,conventional distribution networks have turned to active distribution networks(ADNs)with complex system model and power flow dynamics.The rapid fluctuation of RES power may easily result in frequent voltage violation issues.Taking the flexible RES reactive power as control variables,this paper proposes a two-layer control scheme with Koopman wide neural network(WNN)based model predictive control(MPC)method for optimal voltage regulation and network loss reduction.Based on Koopman operator theory,a data-driven WNN method is presented to fit a high-dimensional linear model of power flow.With the model,voltage and network loss sensitivities are computed analytically,and utilized for ADN partition and control model formulation.In the lower level,a dual-mode adaptive switching MPC strategy is put forward for optimal voltage control and network loss optimization in each individual partition to decide the RES reactive power.The upper level is to calculate the adjustment coefficients of the RES reactive power given in the low level by taking the coupling effects of different partitions into account,and then the final reactive power dispatches of RESs are obtained to realize optimal control of voltage and network loss.Simulation results on two ADNs demonstrate that the proposed strategy can reliably maintain the voltage at each node within the secure range,reduce network power losses,and enhance the overall system security and economic efficiency.
基金supported by the Provincial Industrial Science and Technology Project of State Grid Jiangsu Electric Power Co.,Ltd.of China,grant number JC2024118.
文摘The dense integration of residential distributed photovoltaic(PV)systems into three-phase,four-wire low-voltage(LV)distribution networks results in reverse power flow and three-phase imbalance,leading to voltage violations that hinder the growth of rural distributed PV systems.Traditional voltage droop-based control methods regulate PV power output solely based on local voltage measurements at the point of PV connection.Due to a lack of global coordination and optimization,their efficiency is often subpar.This paper presents a centralized coordinated active/reactive power control strategy for PV inverters in rural LV distribution feeders with high PV penetration.The strategy optimizes residential PV inverter reactive and active power control to enhance voltage quality.It uses sensitivity coefficients derived from the inverse Jacobian matrix to assign adjustment weights to individual PV units and iteratively optimize their power outputs.The control sequence prioritizes reactive power increases;if the coefficients are below average or the inverters reach capacity,active power is curtailed until voltage issues are resolved.A simulation based on a real 37-node rural distribution network shows that the proposed method significantly reduces PV curtailment.Typical daily results indicate a curtailment rate of 1.47%,which is significantly lower than the 15.4%observed with the voltage droop-based control method.The total daily PV power output(measured every 15 min)increases from 5.55 to 6.41 MW,improving PV hosting capacity.
基金supported in part by the Chongqing Postgraduate Research and Innovation Project(CYB22250)National Natural Science Foundation of China(62271096,U20A20157)+2 种基金Natural Science Foundation of Chongqing-China(CSTB2023NSCQ-LZX0134,CSTB2024NSCQ-LZX0124)University Innovation Research Group of Chongqing(CXQT20017)Youth Innovation Group Support Program of ICE Discipline of CQUPT(SCIE-QN-2022-04)。
文摘Computing Power Network(CPN)is a new paradigm that integrates communication,computing,and storage resources to provide services for tasks.However,tasks composed of non-independent subtasks have a preference for the resources required at each stage,which increases the difficulty of heterogeneous resource allocation and reduces the latency performance of CPN services.Motivated by this,this paper jointly optimizes the full-service cycle of tasks,including transmission,task partitioning,and offloading.First,the transmission bandwidth is dynamically configured based on delay sensitivity of tasks.Second,with the real-time information from edge resource clusters and state resource clusters in the network,the optimal partitioning for a computation task is derived.Third,personalized resource allocation schemes are customized for computation and storage tasks respectively.Finally,the impact of resource parameter configuration on the latency violation probability of CPN is revealed.Moreover,compared with the benchmark schemes,our proposed scheme reduces the network latency violation probability by up to 1.17×in the same network setting.
文摘The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment.Moreover,the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS)without impacting the Service Level Agreements(SLAs).However,the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements.In this paper,Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS)is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud environment.This CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud.Then,it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources.It further used CBBM for potential Virtual Machine(VM)deployment that attributes towards the provision of optimal resources.It is proposed with the capability of achieving optimal QoS with minimized time,energy consumption,SLA cost and SLA violation.The experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21%and reduced SLA violation rate of 18.74%,better than the compared autonomic cloud resource managing frameworks.
基金supported by the National Key R&D Program of China(2022YFA1602200)the International Partnership Program of the Chinese Academy of Sciences(211134KYSB20200057).
文摘The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector.
文摘Objectives:Parentification,a role reversal where children assume age-inappropriate duties in the family,is a significant childhood adversity often linked to disrupted developmental trajectories and poor mental health outcomes.Yet the complexity of parentification,influenced by various contextual factors,obscures a comprehensive understanding of its psychological consequences and its mental health aspects.The paper aims to map up-to-date research,synthesize key findings,and identify critical knowledge gaps.Methods:To that end,a systematic search was performed in Scopus,PsycINFO,PubMed,and EBSCO databases,and data was extracted and reviewed by two reviewers.The search yielded 29 studies,including 9 qualitative,1 mixed,and 19 quantitative studies that examined the mental health aspects of parentification,from various countries of origin.Results:Parentification,often arising from contexts like parental illness or substance abuse,is linked to varied mental and physical health outcomes.These outcomes are strongly moderated by the adolescent’s subjective perception of their role and the presence of protective factors like strong sibling relationships.The review also identified a clear pathway for the intergenerational transmission of parentification,where a parent’s own history was found to impact their parenting cognitions.Conclusion:This review concludes that future longitudinal research should move beyond negative or positive outcomes of parentification and investigate the mediating and moderating mechanisms that play a crucial role in the outcomes.Furthermore,the absence of prevalence studies on parentification is a notable limitation,and as a result,the size of the affected population remains unknown.Further research is also needed to identify potential protective factors in various circumstances.
基金The National Natural Science Foundation of China (No. 62271140, 62225107)the Natural Science Foundation of Jiangsu Province (No. BK20240174)+1 种基金the Fundamental Research Funds for the Central Universities (No. 2242022k60002)the Fund of Jiangsu Provincial Scientific Research Center of Applied Mathematics (No. BK20233002)。
文摘This paper proposes a data-and model-driven col-laborative resource scheduling method to maximize the spec-tral efficiency(SE)of cell-free(CF)downlink multiuser multiple-input multiple-output(MIMO)systems,subject to delay violation probability and power constraints.The method integrates the weighted minimum mean square error(WMMSE)algorithm within the safety reinforcement learn-ing(Safety-RL)framework.The original optimization problem is decomposed into two coupled subproblems.The Safety-RL algorithm leverages state features to determine user priority weights and allocate bandwidths,while the WMMSE algorithm calculates the precoding matrix and fur-ther schedules resources based on user priority weights to obtain the reward and costs of Safety-RL.Considering dy-namic user access in CF systems,a distributed algorithm with user scalability is also proposed.Simulation results demonstrate that the proposed approach improves the SE while meeting the different delay violation probability con-straints of users.Furthermore,the distributed algorithm of-fers comparable performance to the fully centralized method while considerably reducing model training overhead,par-ticularly as users dynamically access the system.
基金supported by CAS Project for National Time Service Center(Grant No.E239SC1101)Young Scientists in Basic Research(Grant No.YSBR-085).
文摘Nonclassical light fields exhibit unique quantum characteristics that not only expand the scope of optical research but also provide a solid foundation for advancements in quantum technologies.In this study,we investigate a system consisting of one-^(133)Cs atom placed in a resonant cavity.Pumped by 459 nm laser light,the system generates cavity modes corresponding to the atomic 7S_(1/2)→6P_(3/2)(1470 nm)and 7S_(1/2)→6P_(1/2)(1359 nm)transitions,which are associated with the clock states of the cesium active optical clock.By analyzing the statistical and dynamical properties of the fields,we systematically explore the nonclassical behavior of the system under varying coupling strengths and cavity decay rates.We identify parameter regions where both individual fields and their cross-correlation exhibit nonclassicality,with the Cauchy-Schwarz(CS)violation coefficient R reaching a maximum of 13.9.This demonstrates the system’s ability to generate highly nonclassical photon pairs,enriching the repertoire of nonclassical light sources.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.11875157,12147214the Doctoral Start-up Fund of Liaoning Normal University under Grant No.2024BSL018the Universitylevel National Research Project Cultivation Program under Grant No.2024170。
文摘The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor violation(LFV)process l_(i)→l_(j)γγ and di-production from the LFV process l_(i)→l_(j)γγ induced by dipole operators.Comparing the obtained numerical results with the corresponding experimental measurements,we obtain the constraints on the effective couplings of γ with the SM charged leptons.The upper limit of the effective coupling|DLμe|2+|DRμe|2coming from the process μ→e~γγis looser than the processμ→eγ by about one order of magnitude.
基金The National Key Technology R&D Program during the 11th Five-Year Plan Period(No.2009BAG13A05)the National Natural Science Foundation of China(No.51078086)
文摘Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.
文摘In recent years, the infringements of information disclosure are conspicuous in listed companies in China, which has seriously impeded the healthy development of the capital market. In this paper, the results of regulations of the infringements by means of the game theory and our findings suggest that we should witness less cases of violations when we intensify own efforts to check up and punish those violations, and lower the return of the infringement. At the same time, we would increase the effect of supervising violated behavior when we strengthen the deterrence.
文摘Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language.