Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s...Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.展开更多
In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge...In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed.展开更多
In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparame...In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparametric approach for checking the residuals of time series models. This approach is based on the maximal correlation coefficient ρ 2 * between the residuals and time t . The basic idea is to use the bootstrap to form the null distribution of the statistic ρ 2 * under the null hypothesis H 0:ρ 2 * =0. For calculating ρ 2 * , we proposes a ρ algorithm, analogous to ACE procedure. Power study shows this approach is more powerful than Ljung Box test. Meanwhile, some numerical results and two examples are reported in this paper.展开更多
Crime scene investigation(CSI)is an important link in the criminal justice system as it serves as a bridge between establishing the happenings during an incident and possibly identifying the accountable persons,provid...Crime scene investigation(CSI)is an important link in the criminal justice system as it serves as a bridge between establishing the happenings during an incident and possibly identifying the accountable persons,providing light in the dark.The International Organization for Standardization(ISO)and the International Electrotechnical Commission(IEC)collaborated to develop the ISO/IEC 17020:2012 standard to govern the quality of CSI,a branch of inspection activity.These protocols include the impartiality and competence of the crime scene investigators involved,contemporary recording of scene observations and data obtained,the correct use of resources during scene processing,forensic evidence collection and handling procedures,and the confidentiality and integrity of any scene information obtained from other parties etc.The preparatory work,the accreditation processes involved and the implementation of new quality measures to the existing quality management system in order to achieve the ISO/IE 17020:2012 accreditation at the Forensic Science Division of the Government Laboratory in Hong Kong are discussed in this paper.展开更多
To meticulously dissect the cracking issue in the transverse diaphragm concrete,situated at the anchor point of a colossal large-span,single cable plane cable-stayed bridge,this research paper adopts an innovative lay...To meticulously dissect the cracking issue in the transverse diaphragm concrete,situated at the anchor point of a colossal large-span,single cable plane cable-stayed bridge,this research paper adopts an innovative layered modeling analysis methodology for numerical simulations.The approach is structured into three distinct layers,each tailored to address specific aspects of the cracking phenomenon.The foundational first layer model operates under the assumption of linear elasticity,adhering to the Saint Venant principle.It narrows its focus to the crucial zone between the Bp20 transverse diaphragm and the central axis of pier 4’s support,encompassing the critically cracked diaphragm beneath the N1 cable anchor.This layer provides a preliminary estimate of potential cracking zones within the concrete,serving as a baseline for further analysis.The second layer model builds upon this foundation by incorporating material plasticity into its considerations.It pinpoints its investigation to the immediate vicinity of the cracked transverse diaphragm associated with the N1 cable,aiming to capture the intricate material behavior under stress.This layer’s predictions of crack locations and patterns exhibit a remarkable alignment with actual detection results,confirming its precision and reliability.The third and most intricate layer delves deep into the heart of the matter,examining the cracked transverse diaphragm precisely where the cable force attains its maximum intensity.By leveraging advanced extended finite element technology,this layer offers an unprecedented level of detail in tracing the progression of concrete cracks.Its findings reveal a close correlation between predicted and observed crack widths,validating the model’s proficiency in simulating real-world cracking dynamics.Crucially,the boundary conditions for each layer are meticulously aligned with those of the overarching model,ensuring consistency and integrity throughout the analysis.These results not only enrich our understanding of the cracking mechanisms but also underscore the efficacy of reinforcing cracked concrete sections with external steel plates.In conclusion,this study represents a significant contribution to the field of bridge engineering,offering both theoretical insights and practical solutions for addressing similar challenges.展开更多
Chinese Chemical Letters(CCL)(ISSN 1001-8417) was founded in July 1990. The journal publishes preliminary accounts in the whole field of chemistry, including inorganic chemistry, organic chemistry, analytical chemistr...Chinese Chemical Letters(CCL)(ISSN 1001-8417) was founded in July 1990. The journal publishes preliminary accounts in the whole field of chemistry, including inorganic chemistry, organic chemistry, analytical chemistry, physical chemistry, polymer chemistry, applied chemistry, etc., satisfying a real and urgent need for the dissemination of research results, especially hot topics. The journal does not accept articles previously published or scheduled to be published. To verify originality, your article may be checked by the originality detection service CrossCheck.展开更多
The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchai...The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchains enable on-chain modification,they suffer from inefficiency and excessive centralization,the majority of redactable blockchain schemes ignore the difficult problems of traceability and consistency check.In this paper,we present a Dynamically Redactable Blockchain based on decentralized Chameleon hash(DRBC).Specifically,we propose an Identity-Based Decentralized Chameleon Hash(IDCH)and a Version-Based Transaction structure(VT)to realize the traceability of transaction modifications in a decentralized environment.Then,we propose an efficient block consistency check protocol based on the Bloom filter tree,which can realize the consistency check of transactions with extremely low time and space cost.Security analysis and experiment results demonstrate the reliability of DRBC and its significant advantages in a decentralized environment.展开更多
Check dams are widely constructed on China's Loess Plateau,which had a total number of 58,776 by the end of 2019.Great achievements in check dam construction have been gained regarding the economic and environment...Check dams are widely constructed on China's Loess Plateau,which had a total number of 58,776 by the end of 2019.Great achievements in check dam construction have been gained regarding the economic and environmental impacts.This study reviews the remarkable benefits of check dams on the land reclamation and environmental improvement on the Loess Plateau,and sediment reduction entering the Yellow River.However,the flood incidents on check dams have been frequently reported for the past decades,which has attracted more attention in the context of climate change and extreme rainfall events recently.Advances in the flood migration techniques achieved by the research group led by the first author have been highlighted to migrate the breach risk of check dams due to floods.The“family tree method”has been proposed to determine the survival status and critical rainfall threshold of each check dam in the complicated dam system.An updated dam breach flood evaluation framework and the corresponding numerical algorithm(i.e.,DB-IWHR)have been developed.Moreover,innovative types of water-release facilities for check dams,including geobag stepped spillway and prestressed concrete cylinder pipe in the underlying conduit,have been proposed and developed.Finally,the perspectives concerning the check dam construction on the Loess Plateau have been put forward.展开更多
Hybrid entangled states(HESs),which involve different particles with various degrees of freedom,have garnered significant attention and been applied in a wide range of quantum technologies.However,similar to other cat...Hybrid entangled states(HESs),which involve different particles with various degrees of freedom,have garnered significant attention and been applied in a wide range of quantum technologies.However,similar to other categories of entanglement,maximally HESs inevitably degrade to mixed states due to the environmental noise and operational imperfections.To address the degradation problem,measurement-based entanglement purification offers a feasible and robust solution alternative to conventional gate-based purification methods.In this paper,we propose a measurement-based hybrid entanglement purification protocol(MB-HEPP)for a certain kind of HES which consists of polarization photons and coherent states.We extend our methodology to several conditions,such as the multi-copy and multi-party scenarios,and the photon-loss condition.Compared with previous HEPPs,this protocol has several advantages.First,it does not depend on post-selection and the purified HESs can be retained for further application.Second,it does not require the Bell state measurement,but only uses the parity check with conventional linear optical elements,which makes it have the higher success probability and more feasible.Our MB-HEPP has potential applications in future heterogeneous quantum networks.展开更多
Dear Editor,The Veterans Health Administration(VHA)plays a crucial role in the U.S.healthcare system,particularly for a population with a high prevalence of skin cancer[1].Timely total body skin examination(TBSE)is vi...Dear Editor,The Veterans Health Administration(VHA)plays a crucial role in the U.S.healthcare system,particularly for a population with a high prevalence of skin cancer[1].Timely total body skin examination(TBSE)is vital for managing cutaneous malignancies[2].Despite National Comprehensive Cancer Network(NCCN)guidelines advocating regular TBSE post-diagnosis[3].展开更多
Insulin resistance(IR)is widely recognized as a key contributor to metabolic disorders,and various surrogate indices have been developed to estimate IR in clinical and research settings.The hyperinsulinemic-euglycemic...Insulin resistance(IR)is widely recognized as a key contributor to metabolic disorders,and various surrogate indices have been developed to estimate IR in clinical and research settings.The hyperinsulinemic-euglycemic clamp is considered the gold standard method for assessing insulin resistance due to its precision;however,its complexity limits its widespread clinical application.Consequently,surrogate indices derived from fasting and post-load glucose and insulin levels have been developed to estimate IR,facilitating early detection and risk stratification in metabolic disorders.This mini-review discusses the clinical utility,strengths,and limitations of key IR indices,including the homeostasis model assessment of IR,quantitative insulin sensitivity check index,Matsuda index,and triglyceride-glucose index.Overall,the evidence presented to date suggests that these indices provide valuable estimates of IR in various popula-tions.Yet,their applicability varies depending on ethnic background,disease status,and clinical setting.Integrating these indices into routine clinical practice and research could improve metabolic risk assessment and guide preventive interventions.Further investigations are necessary to refine their accuracy and determine optimal cut-off values for various populations.展开更多
Federal Aviation Administration(FAA) and NASA technical reports indicate that the misunderstanding in radiotelephony communications is a primary causal factor associated with operation errors, and a sizable proportion...Federal Aviation Administration(FAA) and NASA technical reports indicate that the misunderstanding in radiotelephony communications is a primary causal factor associated with operation errors, and a sizable proportion of operation errors lead to read-back errors. We introduce deep learning method to solve this problem and propose a new semantic checking model based on Long Short-Time Memory network(LSTM) for intelligent read-back error checking. A meanpooling layer is added to the traditional LSTM, so as to utilize the information obtained by all the hidden activation vectors, and also to improve the robustness of the semantic vector extracted by LSTM. A MultiLayer Perceptron(MLP) layer, which can maintain the information of different regions in the concatenated vectors obtained by the mean-pooling layer, is applied instead of traditional similarity function in the new model to express the semantic similarity of the read-back pairs quantitatively. The K-Nearest Neighbor(KNN) classifier is used to verify whether the read-back pairs are consistent in semantics according to the output of MLP layer. Extensive experiments are conducted and the results show that the proposed model is more effective and more robust than the traditional checking model to verify the semantic consistency of read-backs automatically.展开更多
Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term...Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term definition set, instantiation assertion set and term restriction set. Based on the extended model, the issue on ontology checking was studied with the conclusion that the four kinds of term checking, including term satisfiability checking, term subsumption checking, term equivalence checking and term disjointness checking, can be reduced to the satisfiability checking, and satisfiability checking can be transformed into instantiation consistence checking.展开更多
Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is ...Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks.展开更多
Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced contr...Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites.展开更多
A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed...A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed,including the single-chip computer with CAN controller AT89C51CC03,the CAN bus transceiver TJA1050,the large capacity DataFlash memory,the real-time clock DS1302,the voice chip ISD2560 and the card-reading circuit in Wie-gand format. All the extended hardware satisfies the requirements for intrinsically safe circuits (GB3836.4-2000) and intrinsically safe authentication promoted by the national explosion-proof institute. Further,the software programming methods for the CAN controller (AT89C51CC03) and the implementation of the CAN communications protocol are presented as well.展开更多
The current collector fracture failure of lithium-ion batteries(LIBs)occurs during its winding production process frequently,and the consequent damages are usually large,but little research has been conducted on this ...The current collector fracture failure of lithium-ion batteries(LIBs)occurs during its winding production process frequently,and the consequent damages are usually large,but little research has been conducted on this phenomenon.This work stems from the difficulty and obstacles in the winding process of actual production of LIBs.The fracture failure of the current collectors is easily caused by the evolution and mutation of the mechanical behavior during the winding process,resulting in safety hazards and poor efficiency.The purpose of this work is to reveal the evolution and distribution mechanism of circumferential strain of the current collectors on the fracture failure under the constraint of winding process.Experimental tests,finite element calculations and theoretical model are used to study the evolution and distribution of circumferential strain.The dynamic evolution process of circumferential strain is tested accurately,and the mechanism of fracture failure of current collectors is revealed.The criterion for current collector strength is proposed based on the results of strain analysis and SEM observation.展开更多
A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagra...A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria.展开更多
基金The work is partially supported by Natural Science Foundation of Ningxia(Grant No.AAC03300)National Natural Science Foundation of China(Grant No.61962001)Graduate Innovation Project of North Minzu University(Grant No.YCX23152).
文摘Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.
基金The National Natural Science Foundation of China (No.10974093)the Scientific Research Foundation for Senior Personnel of Jiangsu University (No.07JDG014)the Natural Science Foundation of Higher Education Institutions of Jiangsu Province (No.08KJD520015)
文摘In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed.
文摘In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparametric approach for checking the residuals of time series models. This approach is based on the maximal correlation coefficient ρ 2 * between the residuals and time t . The basic idea is to use the bootstrap to form the null distribution of the statistic ρ 2 * under the null hypothesis H 0:ρ 2 * =0. For calculating ρ 2 * , we proposes a ρ algorithm, analogous to ACE procedure. Power study shows this approach is more powerful than Ljung Box test. Meanwhile, some numerical results and two examples are reported in this paper.
文摘Crime scene investigation(CSI)is an important link in the criminal justice system as it serves as a bridge between establishing the happenings during an incident and possibly identifying the accountable persons,providing light in the dark.The International Organization for Standardization(ISO)and the International Electrotechnical Commission(IEC)collaborated to develop the ISO/IEC 17020:2012 standard to govern the quality of CSI,a branch of inspection activity.These protocols include the impartiality and competence of the crime scene investigators involved,contemporary recording of scene observations and data obtained,the correct use of resources during scene processing,forensic evidence collection and handling procedures,and the confidentiality and integrity of any scene information obtained from other parties etc.The preparatory work,the accreditation processes involved and the implementation of new quality measures to the existing quality management system in order to achieve the ISO/IE 17020:2012 accreditation at the Forensic Science Division of the Government Laboratory in Hong Kong are discussed in this paper.
基金financially supported by National Natural Science Foundation of China(Project No.51878156,received by Wenwei Wang).
文摘To meticulously dissect the cracking issue in the transverse diaphragm concrete,situated at the anchor point of a colossal large-span,single cable plane cable-stayed bridge,this research paper adopts an innovative layered modeling analysis methodology for numerical simulations.The approach is structured into three distinct layers,each tailored to address specific aspects of the cracking phenomenon.The foundational first layer model operates under the assumption of linear elasticity,adhering to the Saint Venant principle.It narrows its focus to the crucial zone between the Bp20 transverse diaphragm and the central axis of pier 4’s support,encompassing the critically cracked diaphragm beneath the N1 cable anchor.This layer provides a preliminary estimate of potential cracking zones within the concrete,serving as a baseline for further analysis.The second layer model builds upon this foundation by incorporating material plasticity into its considerations.It pinpoints its investigation to the immediate vicinity of the cracked transverse diaphragm associated with the N1 cable,aiming to capture the intricate material behavior under stress.This layer’s predictions of crack locations and patterns exhibit a remarkable alignment with actual detection results,confirming its precision and reliability.The third and most intricate layer delves deep into the heart of the matter,examining the cracked transverse diaphragm precisely where the cable force attains its maximum intensity.By leveraging advanced extended finite element technology,this layer offers an unprecedented level of detail in tracing the progression of concrete cracks.Its findings reveal a close correlation between predicted and observed crack widths,validating the model’s proficiency in simulating real-world cracking dynamics.Crucially,the boundary conditions for each layer are meticulously aligned with those of the overarching model,ensuring consistency and integrity throughout the analysis.These results not only enrich our understanding of the cracking mechanisms but also underscore the efficacy of reinforcing cracked concrete sections with external steel plates.In conclusion,this study represents a significant contribution to the field of bridge engineering,offering both theoretical insights and practical solutions for addressing similar challenges.
文摘Chinese Chemical Letters(CCL)(ISSN 1001-8417) was founded in July 1990. The journal publishes preliminary accounts in the whole field of chemistry, including inorganic chemistry, organic chemistry, analytical chemistry, physical chemistry, polymer chemistry, applied chemistry, etc., satisfying a real and urgent need for the dissemination of research results, especially hot topics. The journal does not accept articles previously published or scheduled to be published. To verify originality, your article may be checked by the originality detection service CrossCheck.
基金supported in part by the National Key R&D Program of China under project 2022YFB2702901the Guangxi Natural Science Foundation under grants 2024GXNSFDA010064 and 2024GXNSFAA010453+5 种基金the National Natural Science Foundation of China under projects 62172119,62362013,U21A20467 and 72192801Zhejiang Provincial Natural Science Foundation of China under grant LZ23F020012Innovation Project of GUET Graduate Education under grants 2023YCXS070the Guangxi Young Teachers'Basic Ability Improvement Program under grant 2024KY0224Lion Rock Labs of Cyberspace Security under grant LRL24-1-C003one of the research outcomes of the Xiong'an Autonomous and Controllable Blockchain Underlying Technology Platform Project(2020).
文摘The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchains enable on-chain modification,they suffer from inefficiency and excessive centralization,the majority of redactable blockchain schemes ignore the difficult problems of traceability and consistency check.In this paper,we present a Dynamically Redactable Blockchain based on decentralized Chameleon hash(DRBC).Specifically,we propose an Identity-Based Decentralized Chameleon Hash(IDCH)and a Version-Based Transaction structure(VT)to realize the traceability of transaction modifications in a decentralized environment.Then,we propose an efficient block consistency check protocol based on the Bloom filter tree,which can realize the consistency check of transactions with extremely low time and space cost.Security analysis and experiment results demonstrate the reliability of DRBC and its significant advantages in a decentralized environment.
基金National Natural Science Foundation of China,Grant/Award Number:42330719National Natural Science Foundation of China,Grant/Award Number:U2443228+1 种基金Power Construction Corporation of China,Grant/Award Number:DJ-ZDXM-2021-51China Institute of Water Resources and Hydropower Research,Grant/Award Number:GE121003A0042022。
文摘Check dams are widely constructed on China's Loess Plateau,which had a total number of 58,776 by the end of 2019.Great achievements in check dam construction have been gained regarding the economic and environmental impacts.This study reviews the remarkable benefits of check dams on the land reclamation and environmental improvement on the Loess Plateau,and sediment reduction entering the Yellow River.However,the flood incidents on check dams have been frequently reported for the past decades,which has attracted more attention in the context of climate change and extreme rainfall events recently.Advances in the flood migration techniques achieved by the research group led by the first author have been highlighted to migrate the breach risk of check dams due to floods.The“family tree method”has been proposed to determine the survival status and critical rainfall threshold of each check dam in the complicated dam system.An updated dam breach flood evaluation framework and the corresponding numerical algorithm(i.e.,DB-IWHR)have been developed.Moreover,innovative types of water-release facilities for check dams,including geobag stepped spillway and prestressed concrete cylinder pipe in the underlying conduit,have been proposed and developed.Finally,the perspectives concerning the check dam construction on the Loess Plateau have been put forward.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12175106 and 92365110)the Postgraduate Research and Practice Innovation Program of Jiangsu Province(Grant No.KYCX23-1028)。
文摘Hybrid entangled states(HESs),which involve different particles with various degrees of freedom,have garnered significant attention and been applied in a wide range of quantum technologies.However,similar to other categories of entanglement,maximally HESs inevitably degrade to mixed states due to the environmental noise and operational imperfections.To address the degradation problem,measurement-based entanglement purification offers a feasible and robust solution alternative to conventional gate-based purification methods.In this paper,we propose a measurement-based hybrid entanglement purification protocol(MB-HEPP)for a certain kind of HES which consists of polarization photons and coherent states.We extend our methodology to several conditions,such as the multi-copy and multi-party scenarios,and the photon-loss condition.Compared with previous HEPPs,this protocol has several advantages.First,it does not depend on post-selection and the purified HESs can be retained for further application.Second,it does not require the Bell state measurement,but only uses the parity check with conventional linear optical elements,which makes it have the higher success probability and more feasible.Our MB-HEPP has potential applications in future heterogeneous quantum networks.
文摘Dear Editor,The Veterans Health Administration(VHA)plays a crucial role in the U.S.healthcare system,particularly for a population with a high prevalence of skin cancer[1].Timely total body skin examination(TBSE)is vital for managing cutaneous malignancies[2].Despite National Comprehensive Cancer Network(NCCN)guidelines advocating regular TBSE post-diagnosis[3].
文摘Insulin resistance(IR)is widely recognized as a key contributor to metabolic disorders,and various surrogate indices have been developed to estimate IR in clinical and research settings.The hyperinsulinemic-euglycemic clamp is considered the gold standard method for assessing insulin resistance due to its precision;however,its complexity limits its widespread clinical application.Consequently,surrogate indices derived from fasting and post-load glucose and insulin levels have been developed to estimate IR,facilitating early detection and risk stratification in metabolic disorders.This mini-review discusses the clinical utility,strengths,and limitations of key IR indices,including the homeostasis model assessment of IR,quantitative insulin sensitivity check index,Matsuda index,and triglyceride-glucose index.Overall,the evidence presented to date suggests that these indices provide valuable estimates of IR in various popula-tions.Yet,their applicability varies depending on ethnic background,disease status,and clinical setting.Integrating these indices into routine clinical practice and research could improve metabolic risk assessment and guide preventive interventions.Further investigations are necessary to refine their accuracy and determine optimal cut-off values for various populations.
基金supported by the National Natural Science Foundation of China(Nos.61502498,U1433120 and 61806208)the Fundamental Research Funds for the Central Universities,China(No.3122017001)
文摘Federal Aviation Administration(FAA) and NASA technical reports indicate that the misunderstanding in radiotelephony communications is a primary causal factor associated with operation errors, and a sizable proportion of operation errors lead to read-back errors. We introduce deep learning method to solve this problem and propose a new semantic checking model based on Long Short-Time Memory network(LSTM) for intelligent read-back error checking. A meanpooling layer is added to the traditional LSTM, so as to utilize the information obtained by all the hidden activation vectors, and also to improve the robustness of the semantic vector extracted by LSTM. A MultiLayer Perceptron(MLP) layer, which can maintain the information of different regions in the concatenated vectors obtained by the mean-pooling layer, is applied instead of traditional similarity function in the new model to express the semantic similarity of the read-back pairs quantitatively. The K-Nearest Neighbor(KNN) classifier is used to verify whether the read-back pairs are consistent in semantics according to the output of MLP layer. Extensive experiments are conducted and the results show that the proposed model is more effective and more robust than the traditional checking model to verify the semantic consistency of read-backs automatically.
基金National Natural Science Foundation ofChina(No.70 2 710 3 8)
文摘Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term definition set, instantiation assertion set and term restriction set. Based on the extended model, the issue on ontology checking was studied with the conclusion that the four kinds of term checking, including term satisfiability checking, term subsumption checking, term equivalence checking and term disjointness checking, can be reduced to the satisfiability checking, and satisfiability checking can be transformed into instantiation consistence checking.
基金supported by National Natural Science Foundation of China under Grant No. 61003079
文摘Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks.
基金support from the National Natural Science Foundation of Chinathe Fundamental Research Funds for the Central Universities of China
文摘Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites.
基金Projects 50674086 supported by the National Natural Science Foundation of ChinaBS2006002 by the Society Development Science and Technology Planof Jiangsu Province20060290508 by the Doctoral Foundation of Ministry of Education of China
文摘A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed,including the single-chip computer with CAN controller AT89C51CC03,the CAN bus transceiver TJA1050,the large capacity DataFlash memory,the real-time clock DS1302,the voice chip ISD2560 and the card-reading circuit in Wie-gand format. All the extended hardware satisfies the requirements for intrinsically safe circuits (GB3836.4-2000) and intrinsically safe authentication promoted by the national explosion-proof institute. Further,the software programming methods for the CAN controller (AT89C51CC03) and the implementation of the CAN communications protocol are presented as well.
基金National Natural Science Foundation of China(12002183)Postdoctoral Science Foundation(2019TQ0171,2020M670304)Beijing Natural Science Foundation(Grant Nos.16L00001 and 2182065)are Rratefullv acknowledged.
文摘The current collector fracture failure of lithium-ion batteries(LIBs)occurs during its winding production process frequently,and the consequent damages are usually large,but little research has been conducted on this phenomenon.This work stems from the difficulty and obstacles in the winding process of actual production of LIBs.The fracture failure of the current collectors is easily caused by the evolution and mutation of the mechanical behavior during the winding process,resulting in safety hazards and poor efficiency.The purpose of this work is to reveal the evolution and distribution mechanism of circumferential strain of the current collectors on the fracture failure under the constraint of winding process.Experimental tests,finite element calculations and theoretical model are used to study the evolution and distribution of circumferential strain.The dynamic evolution process of circumferential strain is tested accurately,and the mechanism of fracture failure of current collectors is revealed.The criterion for current collector strength is proposed based on the results of strain analysis and SEM observation.
基金Supported by the National Natural Science Foundation of China (60673115)the National Basic Research Program of China (973 Program) (2002CB312001)the Open Foundation of State Key Laboratory of Soft-ware Engineering (SKLSE05-13)
文摘A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria.