The absolute and relative concentrations for six forms of or fractions of Cd (exchangeable,bound to carbonates, weakly-bounded. exchangeable plus weakly-bounded, bound to Fe-Mn oxides,and bound to organic matter sulfi...The absolute and relative concentrations for six forms of or fractions of Cd (exchangeable,bound to carbonates, weakly-bounded. exchangeable plus weakly-bounded, bound to Fe-Mn oxides,and bound to organic matter sulfides) in eight main soil types in China were measured. The regional differentiation situations of various forms of Cd are identified Analytical results indicate that exchangeable forms of Cd and exchangeable plus weakly-bounded forms of Cd have obvious regional differentiation Characteristics. Based on these differentiation rules and the combination features, and by using traditional synthetic inductive method and the principal component analysis method, we divide the concentration distribution s of the two forms of Cd into three categories.展开更多
A new numerical approach, called the “subdomain Chebyshev spectral method” is presented for calculation of the spatial derivatives in a curved coordinate system, which may be employed for numerical solutions of part...A new numerical approach, called the “subdomain Chebyshev spectral method” is presented for calculation of the spatial derivatives in a curved coordinate system, which may be employed for numerical solutions of partial differential equations defined in a 2D or 3D geological model. The new approach refers to a “strong version” against the “weak version” of the subspace spectral method based on the variational principle or Galerkin’s weighting scheme. We incorporate local nonlinear transformations and global spline interpolations in a curved coordinate system and make the discrete grid exactly matches geometry of the model so that it is achieved to convert the global domain into subdomains and apply Chebyshev points to locally sampling physical quantities and globally computing the spatial derivatives. This new approach not only remains exponential convergence of the standard spectral method in subdomains, but also yields a sparse assembled matrix when applied for the global domain simulations. We conducted 2D and 3D synthetic experiments and compared accuracies of the numerical differentiations with traditional finite difference approaches. The results show that as the points of differentiation vector are larger than five, the subdomain Chebyshev spectral method significantly improve the accuracies of the finite difference approaches.展开更多
This paper deals with Mckean-Vlasov backward stochastic differential equations with weak monotonicity coefficients.We first establish the existence and uniqueness of solutions to Mckean-Vlasov backward stochastic diff...This paper deals with Mckean-Vlasov backward stochastic differential equations with weak monotonicity coefficients.We first establish the existence and uniqueness of solutions to Mckean-Vlasov backward stochastic differential equations.Then we obtain a comparison theorem in one-dimensional situation.展开更多
The capture zones of the continuous and pulsed guidance laws in the pursuit-evasion game are analytically discussed in this paper to provide deep insights into the capturability distinction between the continuous guid...The capture zones of the continuous and pulsed guidance laws in the pursuit-evasion game are analytically discussed in this paper to provide deep insights into the capturability distinction between the continuous guidance law and the pulsed guidance law.Specifically,first,in the pursuit-evasion game,various capture cases are defined regarding the Zero-Effort Miss distance(ZEM)to facilitate the capturability analysis.Then,for both the evader and the pursuer,the Linear-Quadratic Differential Game(LQDG)guidance laws concerning the continuous acceleration and the pulsed acceleration are converted into a unified form.In each capture case,the optimal solution existence conditions are derived,and the corresponding capture zones are formulated.The discussion on the capture zones shows that if the optimal solution exists,the distinction between the pulsed guidance law and the continuous guidance law can be neglected under small guidance effort weight.However,the capture zone of the continuous guidance law is larger than that of the pulsed guidance law with large pursuer guidance effort weight,but smaller with large evader guidance effort weight.Finally,various simulations are conducted to illustrate the distinction of the continuous and pulsed guidance laws,as well as the impact of the acceleration ratio and the time constant ratio on the capturability.展开更多
At the start of the new year,Cao Xiucheng,Chairman of Henan No.2 Textile Machinery Co.,Ltd.,was on his way to visit clients when he kept receiving urgent calls from the Xinyang production base regarding order scheduli...At the start of the new year,Cao Xiucheng,Chairman of Henan No.2 Textile Machinery Co.,Ltd.,was on his way to visit clients when he kept receiving urgent calls from the Xinyang production base regarding order scheduling.It turned out that since the end of 2025,the company had successively secured bulk spindle orders from overseas clients in Bangladesh and other countries,coupled with continuous urgent requests for orders from domestic manufacturers.Faced with such a production peak right at the beginning of the year,Mr.Cao Xiucheng admitted,“It was truly unexpected.”展开更多
This study addresses the risk of privacy leakage during the transmission and sharing of multimodal data in smart grid substations by proposing a three-tier privacy-preserving architecture based on asynchronous federat...This study addresses the risk of privacy leakage during the transmission and sharing of multimodal data in smart grid substations by proposing a three-tier privacy-preserving architecture based on asynchronous federated learning.The framework integrates blockchain technology,the InterPlanetary File System(IPFS)for distributed storage,and a dynamic differential privacy mechanism to achieve collaborative security across the storage,service,and federated coordination layers.It accommodates both multimodal data classification and object detection tasks,enabling the identification and localization of key targets and abnormal behaviors in substation scenarios while ensuring privacy protection.This effectively mitigates the single-point failures and model leakage issues inherent in centralized architectures.A dynamically adjustable differential privacy mechanism is introduced to allocate privacy budgets according to client contribution levels and upload frequencies,achieving a personalized balance between model performance and privacy protection.Multi-dimensional experimental evaluations,including classification accuracy,F1-score,encryption latency,and aggregation latency,verify the security and efficiency of the proposed architecture.The improved CNN model achieves 72.34%accuracy and an F1-score of 0.72 in object detection and classification tasks on infrared surveillance imagery,effectively identifying typical risk events such as not wearing safety helmets and unauthorized intrusion,while maintaining an aggregation latency of only 1.58 s and a query latency of 80.79 ms.Compared with traditional static differential privacy and centralized approaches,the proposed method demonstrates significant advantages in accuracy,latency,and security,providing a new technical paradigm for efficient,secure data sharing,object detection,and privacy preservation in smart grid substations.展开更多
The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns.However,the use of real-world trajectory data poses significant privacy risks,such as location re...The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns.However,the use of real-world trajectory data poses significant privacy risks,such as location reidentification and correlation attacks.To address these challenges,privacy-preserving trajectory generation methods are critical for applications relying on sensitive location data.This paper introduces DPIL-Traj,an advanced framework designed to generate synthetic trajectories while achieving a superior balance between data utility and privacy preservation.Firstly,the framework incorporates Differential Privacy Clustering,which anonymizes trajectory data by applying differential privacy techniques that add noise,ensuring the protection of sensitive user information.Secondly,Imitation Learning is used to replicate decision-making behaviors observed in real-world trajectories.By learning from expert trajectories,this component generates synthetic data that closely mimics real-world decision-making processes while optimizing the quality of the generated trajectories.Finally,Markov-based Trajectory Generation is employed to capture and maintain the inherent temporal dynamics of movement patterns.Extensive experiments conducted on the GeoLife trajectory dataset show that DPIL-Traj improves utility performance by an average of 19.85%,and in terms of privacy performance by an average of 12.51%,compared to state-of-the-art approaches.Ablation studies further reveal that DP clustering effectively safeguards privacy,imitation learning enhances utility under noise,and the Markov module strengthens temporal coherence.展开更多
With the increasing complexity of malware attack techniques,traditional detection methods face significant challenges,such as privacy preservation,data heterogeneity,and lacking category information.To address these i...With the increasing complexity of malware attack techniques,traditional detection methods face significant challenges,such as privacy preservation,data heterogeneity,and lacking category information.To address these issues,we propose Federated Dynamic Prototype Learning(FedDPL)for malware classification by integrating Federated Learning with a specifically designed K-means.Under the Federated Learning framework,model training occurs locally without data sharing,effectively protecting user data privacy and preventing the leakage of sensitive information.Furthermore,to tackle the challenges of data heterogeneity and the lack of category information,FedDPL introduces a dynamic prototype learning mechanism,which adaptively adjusts the clustering prototypes in terms of position and number.Thus,the dependency on predefined category numbers in typical K-means and its variants can be significantly reduced,resulting in improved clustering performance.Theoretically,it provides a more accurate detection of malicious behavior.Experimental results confirm that FedDPL excels in handling malware classification tasks,demonstrating superior accuracy,robustness,and privacy protection.展开更多
Nuclear heating plays an important aspect in design and deployment of both fission and fusion reactors and experimental devices in terms of cooling requirements. Two experimental campaigns in the framework of a collab...Nuclear heating plays an important aspect in design and deployment of both fission and fusion reactors and experimental devices in terms of cooling requirements. Two experimental campaigns in the framework of a collaboration project between the French Atomic and Alternative Energy Commission(CEA) and Jožef Stefan Institute(JSI), Slovenia, have been performed at the JSI TRIGA reactor for the experimental assessment of nuclear heating in fission and fusion-relevant materials by the differential calorimetry technique, based on the CALMOS and CARMEN differential calorimeters, previously developed at CEA. The results of the first campaign performed at reactor powers between 100 and 250 kW have already been reported, highlighting some measurement difficulties. Therefore, the second campaign was performed at a lower reactor power of 30 kW to overcome these issues. Moreover, a computational analysis of the experiments was performed using the JSIR2S code package to calculate the nuclear heating levels. Both experiments and their reproduction by simulations are described in detail. We present a comparison of the previously reported measured nuclear heating values of the first campaign with the computational results, with consistent underestimation by simulations by 8–35%. We report the experimental and computational results for the second experimental campaign performed at a reactor power of 30 kW. The simulated heating values were in agreement with the measurements within the measured heating uncertainty, with simulated heating 2.7–11.3% lower than the experimental values.展开更多
As deep learning(DL)models are increasingly deployed in sensitive domains(e.g.,healthcare),concerns over privacy and security have intensified.Conventional penetration testing frameworks,such asOWASP and NIST,are effe...As deep learning(DL)models are increasingly deployed in sensitive domains(e.g.,healthcare),concerns over privacy and security have intensified.Conventional penetration testing frameworks,such asOWASP and NIST,are effective for traditional networks and applications but lack the capabilities to address DL-specific threats,such asmodel inversion,membership inference,and adversarial attacks.This review provides a comprehensive analysis of penetration testing for the privacy of DL models,examining the shortfalls of existing frameworks,tools,and testing methodologies.Through systematic evaluation of existing literature and empirical analysis,we identify three major contributions:(i)a critical assessment of traditional penetration testing frameworks’inadequacies when applied to DL-specific privacy vulnerabilities,(ii)a comprehensive evaluation of state-of-the-art privacy-preserving methods and their integration with penetration testing workflows,and(iii)the development of a structured framework that combines reconnaissance,threat modeling,exploitation,and post-exploitation phases specifically tailored for DL privacy assessment.Moreover,this review evaluates popular solutions such as IBMAdversarial Robustness Toolbox and TensorFlowPrivacy,alongside privacy-preserving techniques(e.g.,Differential Privacy,Homomorphic Encryption,and Federated Learning),which we systematically analyze through comparative studies of their effectiveness,computational overhead,and practical deployment constraints.While these techniques offer promising safeguards,their adoption is hindered by accuracy loss,performance overheads,and the rapid evolution of attack strategies.Our findings reveal that no single existing solution provides comprehensive protection,which leads us to propose a hybrid approach that strategically combines multiple privacy-preserving mechanisms.The findings of this survey underscore an urgent need for automated,regulationcompliant penetration testing frameworks specifically tailored to DL systems.We argue for hybrid privacy solutions that combinemultiple protectivemechanisms to ensure bothmodel accuracy and privacy.Building on our analysis,we present actionable recommendations for developing adaptive penetration testing strategies that incorporate automated vulnerability assessment,continuous monitoring,and regulatory compliance verification.展开更多
BACKGROUND The treatment technology of liver cancer is progressing.In addition to traditional surgical resection,combined therapies of immunotherapy based on immune checkpoint inhibitors,chemotherapy,and transcatheter...BACKGROUND The treatment technology of liver cancer is progressing.In addition to traditional surgical resection,combined therapies of immunotherapy based on immune checkpoint inhibitors,chemotherapy,and transcatheter arterial chemoembolization for hepatocellular carcinoma are more and more widely used.Accurate preoperative diagnosis of liver cancer will provide important information for comprehensive treatment and prognosis evaluation of liver cancer.Sonazoidcontrast-enhanced ultrasound is not only helpful for the qualitative diagnosis of liver lesions,but also has great potential in the diagnosis of histological differentiation of liver cancer.AIM To assess the differentiation of hepatocellular carcinoma(HCC)by utilizing the parameters and imaging features of Sonazoid-contrast-enhanced ultrasound(CEUS).METHODS A retrospective analysis was conducted on the CEUS data of 239 lesions through case-control study.These patients received Sonazoid-CEUS within one week before surgery and were confirmed as HCC by postoperative pathology.Within the cases,patients were further categorized into well-differentiated and poorlydifferentiated group.Time-intensity curves of the region of interest in both arterial and Kupffer phases were generated,allowing for the acquisition of quantitative parameters to assess the diagnostic efficacy in distinguishing lesions between these two groups and determining an appropriate cut-off value.RESULTS Univariate analysis showed that the absolute value of enhancement intensity(EIAV),intensity ratio(IR)and intensity difference(ID)in Kupffer phase were statistically different between the groups with different degree(P=0.015,P=0.000,P=0.000).The sensitivity and specificity were 40.2%,82.4%,80.4% and 78.1%,86.9% and 74.5%,respectively,for differentiating HCC lesions with EIAV≥56.384 dB,IR≥1.215 and ID≥9.184 dB.The area under the receiver operating characteristic curve were 0.590,0.877,0.815.There was no significant difference in the parameters of arterial phase,including peak time,initial growth time,rise time and the absolute value of peak intensity of lesions between the two groups(P>0.05).Multivariate analysis showed that the level of alphafetoprotein(AFP)and IR were risk factors for poor differentiation(P=0.001).CONCLUSION Among the parameters of Sonazoid-CEUS,IR in Kupffer phase exhibits superior diagnostic efficacy with high sensitivity and specificity in the diagnose of pathological differentiation of HCC.Combined with preoperative AFP level,a more accurate diagnosis will be obtained.Compared with portal vein phase,Kupffer phase showed the ability to identify HCC lesions more sensitive.These findings hold significant guiding implications and reference value for clinical practice.展开更多
With a perspective of interest in the modeling of dynamic processes, here we investigate various types of basic growth equations, which in their formulation quantify the change of the variables, the state, or the inde...With a perspective of interest in the modeling of dynamic processes, here we investigate various types of basic growth equations, which in their formulation quantify the change of the variables, the state, or the independent one, using balance equations in which the counts(aggregation-reduction) are of the multiplicative type. We enter the context of the “differential” equations typical of non-Newtonian calculations, such as geometric calculus, bi-geometric calculus, or the lesser-known logarithmic calculus, when we take the step to the limit. In these new possibilities of dynamic laws, we highlight the interpretive aspects. A particular case is to review the equivalents of the logistic equation of the standard calculation in the new accounting calculations, where we make graphical and semantic comparisons. Finally, the construction of a geometric type equation is exemplified, with applications inherent to the financial mathematics.展开更多
Moving beyond the conventional“level diagnosis-case analysis”framework,this study,grounded in the SOLO Taxonomy,constructs a four-dimensional instructional model of“stratified objectives,tasks,guidance,and assessme...Moving beyond the conventional“level diagnosis-case analysis”framework,this study,grounded in the SOLO Taxonomy,constructs a four-dimensional instructional model of“stratified objectives,tasks,guidance,and assessment.”Focusing on geometric proofs in middle school,the model is practically applied through case studies of the properties of parallelograms and triangle congruence.By transforming the SOLO levels into actionable instructional steps,the model addresses key student challenges-such as fragmented thinking processes,disorganized logical expression,and weak knowledge transfer-thereby facilitating cognitive progression among students at different levels.The implementation demonstrates that this model significantly enhances the precision and effectiveness of teaching geometric proofs.Its core strengths lie in using visualized diagnostic tools for precise instructional positioning and constructing scaffolded task sequences to build clear pathways for cognitive development.展开更多
With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods...With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods are deficient,failing to reasonably allocate the privacy budget for non-outlier location points and ignoring the critical location information that may be contained in the outlier points,leading to decreased data availability and privacy exposure problems.To address these problems,this paper proposes a Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering(MLDP).The method first utilizes the DBSCAN clustering algorithm to classify location points into non-outliers and outliers.For non-outliers,the scoring function is designed by combining geographic information and semantic information,and the privacy budget is allocated according to the heat intensity of the hotspot area;for outliers,the scoring function is constructed to allocate the privacy budget based on their correlation with the hotspot area.By comprehensively considering the geographic information,semantic information,and correlation with hotspot areas of the location points,a reasonable privacy budget is assigned to each location point,andfinallynoise is added throughthe Laplacemechanismto realizeprivacyprotection.Experimental results on tworeal trajectory datasets,Geolife and T-Drive,show that the MLDP approach significantly improves data availability while effectively protecting location privacy.Compared with the comparison methods,the maximum available data ratio of MLDP is 1.Moreover,compared with the RandomNoise method,its execution time is 0.056–0.061 s longer,and the logRE is 0.12951–0.62194 lower;compared with KemeansDP,QTK-DP,DPK-F,IDP-SC,and DPK-Means-up methods,it saves 0.114–0.296 s in execution time,and the logRE is 0.01112–0.38283 lower.展开更多
Stem cell proliferation is tightly regulated in developing and adult tissues through the coordinated action of cell-intrinsic and extracellular signals.Although many extracellular cues were identified,the cell-intrins...Stem cell proliferation is tightly regulated in developing and adult tissues through the coordinated action of cell-intrinsic and extracellular signals.Although many extracellular cues were identified,the cell-intrinsic mechanisms underlying the decision of a stem cell to proliferate,enter a dormant quiescent state or differentiate into a specific cell type remains incompletely understood.展开更多
As a gene required for sexual development,intersex(ix),functions in concert with the female-specific product of doublesex(dsx)at the end of the hierarchy to facilitate the sex-specific differentiation of sexually dimo...As a gene required for sexual development,intersex(ix),functions in concert with the female-specific product of doublesex(dsx)at the end of the hierarchy to facilitate the sex-specific differentiation of sexually dimorphic characters in female Drosophila melanogaster.In the present study,we initially identified the ix homolog in Gryllus bimaculatus,with the detection of a single isoform expressed in both sexes.Phylogenetic analyses and multiple sequence alignment revealed that Gbix exhibited conservation.Here we employed RNA interference(RNAi)and clustered regularly interspaced short palindromic repeats(CRISPR)/CRISPR-associated nuclease 9(Cas9),respectively,to analyze the functions of Gbix.Our findings indicated that Gbix played a crucial role in the normal development of the embryo and nymph,as well as in the regulation of wing morphogenesis in both sexes.RNAi-mediated knockdown of Gbix resulted in poorly developed ovaries,whereas testicular development was not significantly affected.Nevertheless,CRISPR/Cas9-mediated knockout of Gbix resulted in internal genital defects in both sexes,which ultimately led to a reduction in reproductive capacity in female and male individuals.Our results provide insights into the pleiotropic functions of Gbix in embryogenesis and sexual development,while also advancing our comprehension of sex determination in a hemimetabolous insect species.展开更多
The proliferation of carrier aircraft and the integration of unmanned aerial vehicles(UAVs)on aircraft carriers present new challenges to the automation of launch and recovery operations.This paper investigates a coll...The proliferation of carrier aircraft and the integration of unmanned aerial vehicles(UAVs)on aircraft carriers present new challenges to the automation of launch and recovery operations.This paper investigates a collaborative scheduling problem inherent to the operational processes of carrier aircraft,where launch and recovery tasks are conducted concurrently on the flight deck.The objective is to minimize the cumulative weighted waiting time in the air for recovering aircraft and the cumulative weighted delay time for launching aircraft.To tackle this challenge,a multiple population self-adaptive differential evolution(MPSADE)algorithm is proposed.This method features a self-adaptive parameter updating mechanism that is contingent upon population diversity,an asynchronous updating scheme,an individual migration operator,and a global crossover mechanism.Additionally,comprehensive experiments are conducted to validate the effectiveness of the proposed model and algorithm.Ultimately,a comparative analysis with existing operation modes confirms the enhanced efficiency of the collaborative operation mode.展开更多
As a key precursor of hydroxyl(OH) radicals, the budget of nitrous acid(HONO) at different altitudes has received extensive attention. In this study, vertically resolved observations of HONO, NO_(2), O_(3), and HCHO w...As a key precursor of hydroxyl(OH) radicals, the budget of nitrous acid(HONO) at different altitudes has received extensive attention. In this study, vertically resolved observations of HONO, NO_(2), O_(3), and HCHO were conducted during an autumn field campaign in Beijing in 2019. The significant correlation between HONO and NO2, along with variations in their ratios across different altitudes, underscores the importance of aerosol surface chemistry in HONO formation and its altitude-dependent behavior. To enhance the model performance, the heterogeneous conversion of NO_(2) and its photochemical enhancement are incorporated into the 1D model. The simulations reveal that the nocturnal HONO production is dominated by the heterogeneous conversion of NO_(2) both at the surface and aloft. During the daytime, groundsurface sources of HONO are mainly driven by nitrate photolysis and light-enhanced heterogeneous conversion of NO_(2).Meanwhile, a large portion of the HONO generated at the surface is transported upwards through vertical mixing. In the higher atmosphere, HONO originates from vertical transport and in situ processes. As precursors of OH radicals, the observed concentrations of HONO, O_(3), and HCHO exhibit distinct diurnal variations and vertical distribution patterns.HONO contributes to OH radical production predominantly during the early morning across all layers and it even becomes the main contributor throughout the daytime in the lowest layer near the ground, while O_(3) and HCHO become more prominent towards midday, especially in the higher layers. These results will be beneficial for a deeper understanding of the atmospheric oxidation process within the urban boundary layer.展开更多
Differential Code Bias(DCB)is the time delays between two different GNSS signals,which is crucial for GNSS positioning.Previous studies have shown that it can be significantly affected by the flex power operations in ...Differential Code Bias(DCB)is the time delays between two different GNSS signals,which is crucial for GNSS positioning.Previous studies have shown that it can be significantly affected by the flex power operations in satellites.This study proposes a 15-min short-term DCB estimation method to analyze flex power's impact on DCB variations.The method jointly estimates satellite DCB,receiver DCB,and ionospheric parameters using over 300 MGEX stations.We examined three representative flex power events in 2024,achieving average internal RMS values of 0.042 ns and 0.0068 ns for inter-frequency and intra-frequency scenarios respectively.Results show that intra-frequency DCB exhibits clear shift biases synchronized with flex power state transitions while maintaining stability within 0.20 ns during nontransition periods.No definitive impact on inter-frequency DCB was observed at current estimation precision levels.展开更多
文摘The absolute and relative concentrations for six forms of or fractions of Cd (exchangeable,bound to carbonates, weakly-bounded. exchangeable plus weakly-bounded, bound to Fe-Mn oxides,and bound to organic matter sulfides) in eight main soil types in China were measured. The regional differentiation situations of various forms of Cd are identified Analytical results indicate that exchangeable forms of Cd and exchangeable plus weakly-bounded forms of Cd have obvious regional differentiation Characteristics. Based on these differentiation rules and the combination features, and by using traditional synthetic inductive method and the principal component analysis method, we divide the concentration distribution s of the two forms of Cd into three categories.
文摘A new numerical approach, called the “subdomain Chebyshev spectral method” is presented for calculation of the spatial derivatives in a curved coordinate system, which may be employed for numerical solutions of partial differential equations defined in a 2D or 3D geological model. The new approach refers to a “strong version” against the “weak version” of the subspace spectral method based on the variational principle or Galerkin’s weighting scheme. We incorporate local nonlinear transformations and global spline interpolations in a curved coordinate system and make the discrete grid exactly matches geometry of the model so that it is achieved to convert the global domain into subdomains and apply Chebyshev points to locally sampling physical quantities and globally computing the spatial derivatives. This new approach not only remains exponential convergence of the standard spectral method in subdomains, but also yields a sparse assembled matrix when applied for the global domain simulations. We conducted 2D and 3D synthetic experiments and compared accuracies of the numerical differentiations with traditional finite difference approaches. The results show that as the points of differentiation vector are larger than five, the subdomain Chebyshev spectral method significantly improve the accuracies of the finite difference approaches.
基金Supported by the National Natural Science Foundation of China(12001074)the Research Innovation Program of Graduate Students in Hunan Province(CX20220258)+1 种基金the Research Innovation Program of Graduate Students of Central South University(1053320214147)the Key Scientific Research Project of Higher Education Institutions in Henan Province(25B110025)。
文摘This paper deals with Mckean-Vlasov backward stochastic differential equations with weak monotonicity coefficients.We first establish the existence and uniqueness of solutions to Mckean-Vlasov backward stochastic differential equations.Then we obtain a comparison theorem in one-dimensional situation.
基金co-supported by the National Natural Science Foundation of China(Nos.U24B20157,62203031)the Natural Science Foundation of Beijing Municipality,China(No.4242041)+2 种基金the Natural Science Foundation of Zhejiang Province,China(No.LY24F030002)the Aeronautical ScienceFoundation of China(No.2024Z066051001)the Fundamental Research Funds for the Central Universities of China。
文摘The capture zones of the continuous and pulsed guidance laws in the pursuit-evasion game are analytically discussed in this paper to provide deep insights into the capturability distinction between the continuous guidance law and the pulsed guidance law.Specifically,first,in the pursuit-evasion game,various capture cases are defined regarding the Zero-Effort Miss distance(ZEM)to facilitate the capturability analysis.Then,for both the evader and the pursuer,the Linear-Quadratic Differential Game(LQDG)guidance laws concerning the continuous acceleration and the pulsed acceleration are converted into a unified form.In each capture case,the optimal solution existence conditions are derived,and the corresponding capture zones are formulated.The discussion on the capture zones shows that if the optimal solution exists,the distinction between the pulsed guidance law and the continuous guidance law can be neglected under small guidance effort weight.However,the capture zone of the continuous guidance law is larger than that of the pulsed guidance law with large pursuer guidance effort weight,but smaller with large evader guidance effort weight.Finally,various simulations are conducted to illustrate the distinction of the continuous and pulsed guidance laws,as well as the impact of the acceleration ratio and the time constant ratio on the capturability.
文摘At the start of the new year,Cao Xiucheng,Chairman of Henan No.2 Textile Machinery Co.,Ltd.,was on his way to visit clients when he kept receiving urgent calls from the Xinyang production base regarding order scheduling.It turned out that since the end of 2025,the company had successively secured bulk spindle orders from overseas clients in Bangladesh and other countries,coupled with continuous urgent requests for orders from domestic manufacturers.Faced with such a production peak right at the beginning of the year,Mr.Cao Xiucheng admitted,“It was truly unexpected.”
基金funded by the National Natural Science Foundation of China,grant number 61605004the Fundamental Research Funds for the Central Universities,grant number FRF-TP-19-016A2Guizhou Power Grid Co.,Ltd.2024 first batch of services(2024-2026 technology R&D services for science and technology projects(in addition to national and SGCC key projects)),grant number 060100KC23100012。
文摘This study addresses the risk of privacy leakage during the transmission and sharing of multimodal data in smart grid substations by proposing a three-tier privacy-preserving architecture based on asynchronous federated learning.The framework integrates blockchain technology,the InterPlanetary File System(IPFS)for distributed storage,and a dynamic differential privacy mechanism to achieve collaborative security across the storage,service,and federated coordination layers.It accommodates both multimodal data classification and object detection tasks,enabling the identification and localization of key targets and abnormal behaviors in substation scenarios while ensuring privacy protection.This effectively mitigates the single-point failures and model leakage issues inherent in centralized architectures.A dynamically adjustable differential privacy mechanism is introduced to allocate privacy budgets according to client contribution levels and upload frequencies,achieving a personalized balance between model performance and privacy protection.Multi-dimensional experimental evaluations,including classification accuracy,F1-score,encryption latency,and aggregation latency,verify the security and efficiency of the proposed architecture.The improved CNN model achieves 72.34%accuracy and an F1-score of 0.72 in object detection and classification tasks on infrared surveillance imagery,effectively identifying typical risk events such as not wearing safety helmets and unauthorized intrusion,while maintaining an aggregation latency of only 1.58 s and a query latency of 80.79 ms.Compared with traditional static differential privacy and centralized approaches,the proposed method demonstrates significant advantages in accuracy,latency,and security,providing a new technical paradigm for efficient,secure data sharing,object detection,and privacy preservation in smart grid substations.
基金supported by the Natural Science Foundation of Fujian Province of China(2025J01380)National Natural Science Foundation of China(No.62471139)+3 种基金the Major Health Research Project of Fujian Province(2021ZD01001)Fujian Provincial Units Special Funds for Education and Research(2022639)Fujian University of Technology Research Start-up Fund(GY-S24002)Fujian Research and Training Grants for Young and Middle-aged Leaders in Healthcare(GY-H-24179).
文摘The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns.However,the use of real-world trajectory data poses significant privacy risks,such as location reidentification and correlation attacks.To address these challenges,privacy-preserving trajectory generation methods are critical for applications relying on sensitive location data.This paper introduces DPIL-Traj,an advanced framework designed to generate synthetic trajectories while achieving a superior balance between data utility and privacy preservation.Firstly,the framework incorporates Differential Privacy Clustering,which anonymizes trajectory data by applying differential privacy techniques that add noise,ensuring the protection of sensitive user information.Secondly,Imitation Learning is used to replicate decision-making behaviors observed in real-world trajectories.By learning from expert trajectories,this component generates synthetic data that closely mimics real-world decision-making processes while optimizing the quality of the generated trajectories.Finally,Markov-based Trajectory Generation is employed to capture and maintain the inherent temporal dynamics of movement patterns.Extensive experiments conducted on the GeoLife trajectory dataset show that DPIL-Traj improves utility performance by an average of 19.85%,and in terms of privacy performance by an average of 12.51%,compared to state-of-the-art approaches.Ablation studies further reveal that DP clustering effectively safeguards privacy,imitation learning enhances utility under noise,and the Markov module strengthens temporal coherence.
基金supported by the National Natural Science Foundation of China under Grant No.62162009the Key Technologies R&D Program of He’nan Province under Grant No.242102211065+2 种基金the Postgraduate Education Reform and Quality Improvement Project of Henan Province under Grant Nos.YJS2025GZZ36,YJS2024AL112,and YJS2024JD38the Innovation Scientists and Technicians Troop Construction Projects of Henan Province under Grant No.CXTD2017099the Scientific Research Innovation Team of Xuchang University under Grant No.2022CXTD003.
文摘With the increasing complexity of malware attack techniques,traditional detection methods face significant challenges,such as privacy preservation,data heterogeneity,and lacking category information.To address these issues,we propose Federated Dynamic Prototype Learning(FedDPL)for malware classification by integrating Federated Learning with a specifically designed K-means.Under the Federated Learning framework,model training occurs locally without data sharing,effectively protecting user data privacy and preventing the leakage of sensitive information.Furthermore,to tackle the challenges of data heterogeneity and the lack of category information,FedDPL introduces a dynamic prototype learning mechanism,which adaptively adjusts the clustering prototypes in terms of position and number.Thus,the dependency on predefined category numbers in typical K-means and its variants can be significantly reduced,resulting in improved clustering performance.Theoretically,it provides a more accurate detection of malicious behavior.Experimental results confirm that FedDPL excels in handling malware classification tasks,demonstrating superior accuracy,robustness,and privacy protection.
基金supported by the Slovenian Research Agency(research project NC-0001-Analysis of nuclear heating in a reactor,research core funding Reactor physics No.P2-0073,infrastructure program I0-0005)。
文摘Nuclear heating plays an important aspect in design and deployment of both fission and fusion reactors and experimental devices in terms of cooling requirements. Two experimental campaigns in the framework of a collaboration project between the French Atomic and Alternative Energy Commission(CEA) and Jožef Stefan Institute(JSI), Slovenia, have been performed at the JSI TRIGA reactor for the experimental assessment of nuclear heating in fission and fusion-relevant materials by the differential calorimetry technique, based on the CALMOS and CARMEN differential calorimeters, previously developed at CEA. The results of the first campaign performed at reactor powers between 100 and 250 kW have already been reported, highlighting some measurement difficulties. Therefore, the second campaign was performed at a lower reactor power of 30 kW to overcome these issues. Moreover, a computational analysis of the experiments was performed using the JSIR2S code package to calculate the nuclear heating levels. Both experiments and their reproduction by simulations are described in detail. We present a comparison of the previously reported measured nuclear heating values of the first campaign with the computational results, with consistent underestimation by simulations by 8–35%. We report the experimental and computational results for the second experimental campaign performed at a reactor power of 30 kW. The simulated heating values were in agreement with the measurements within the measured heating uncertainty, with simulated heating 2.7–11.3% lower than the experimental values.
基金supported in part by the Tianjin Natural Science Foundation Project(24JCZDJC01000)the Fundamental Research Funds for the Central Universities of China(No.3122025091).
文摘As deep learning(DL)models are increasingly deployed in sensitive domains(e.g.,healthcare),concerns over privacy and security have intensified.Conventional penetration testing frameworks,such asOWASP and NIST,are effective for traditional networks and applications but lack the capabilities to address DL-specific threats,such asmodel inversion,membership inference,and adversarial attacks.This review provides a comprehensive analysis of penetration testing for the privacy of DL models,examining the shortfalls of existing frameworks,tools,and testing methodologies.Through systematic evaluation of existing literature and empirical analysis,we identify three major contributions:(i)a critical assessment of traditional penetration testing frameworks’inadequacies when applied to DL-specific privacy vulnerabilities,(ii)a comprehensive evaluation of state-of-the-art privacy-preserving methods and their integration with penetration testing workflows,and(iii)the development of a structured framework that combines reconnaissance,threat modeling,exploitation,and post-exploitation phases specifically tailored for DL privacy assessment.Moreover,this review evaluates popular solutions such as IBMAdversarial Robustness Toolbox and TensorFlowPrivacy,alongside privacy-preserving techniques(e.g.,Differential Privacy,Homomorphic Encryption,and Federated Learning),which we systematically analyze through comparative studies of their effectiveness,computational overhead,and practical deployment constraints.While these techniques offer promising safeguards,their adoption is hindered by accuracy loss,performance overheads,and the rapid evolution of attack strategies.Our findings reveal that no single existing solution provides comprehensive protection,which leads us to propose a hybrid approach that strategically combines multiple privacy-preserving mechanisms.The findings of this survey underscore an urgent need for automated,regulationcompliant penetration testing frameworks specifically tailored to DL systems.We argue for hybrid privacy solutions that combinemultiple protectivemechanisms to ensure bothmodel accuracy and privacy.Building on our analysis,we present actionable recommendations for developing adaptive penetration testing strategies that incorporate automated vulnerability assessment,continuous monitoring,and regulatory compliance verification.
文摘BACKGROUND The treatment technology of liver cancer is progressing.In addition to traditional surgical resection,combined therapies of immunotherapy based on immune checkpoint inhibitors,chemotherapy,and transcatheter arterial chemoembolization for hepatocellular carcinoma are more and more widely used.Accurate preoperative diagnosis of liver cancer will provide important information for comprehensive treatment and prognosis evaluation of liver cancer.Sonazoidcontrast-enhanced ultrasound is not only helpful for the qualitative diagnosis of liver lesions,but also has great potential in the diagnosis of histological differentiation of liver cancer.AIM To assess the differentiation of hepatocellular carcinoma(HCC)by utilizing the parameters and imaging features of Sonazoid-contrast-enhanced ultrasound(CEUS).METHODS A retrospective analysis was conducted on the CEUS data of 239 lesions through case-control study.These patients received Sonazoid-CEUS within one week before surgery and were confirmed as HCC by postoperative pathology.Within the cases,patients were further categorized into well-differentiated and poorlydifferentiated group.Time-intensity curves of the region of interest in both arterial and Kupffer phases were generated,allowing for the acquisition of quantitative parameters to assess the diagnostic efficacy in distinguishing lesions between these two groups and determining an appropriate cut-off value.RESULTS Univariate analysis showed that the absolute value of enhancement intensity(EIAV),intensity ratio(IR)and intensity difference(ID)in Kupffer phase were statistically different between the groups with different degree(P=0.015,P=0.000,P=0.000).The sensitivity and specificity were 40.2%,82.4%,80.4% and 78.1%,86.9% and 74.5%,respectively,for differentiating HCC lesions with EIAV≥56.384 dB,IR≥1.215 and ID≥9.184 dB.The area under the receiver operating characteristic curve were 0.590,0.877,0.815.There was no significant difference in the parameters of arterial phase,including peak time,initial growth time,rise time and the absolute value of peak intensity of lesions between the two groups(P>0.05).Multivariate analysis showed that the level of alphafetoprotein(AFP)and IR were risk factors for poor differentiation(P=0.001).CONCLUSION Among the parameters of Sonazoid-CEUS,IR in Kupffer phase exhibits superior diagnostic efficacy with high sensitivity and specificity in the diagnose of pathological differentiation of HCC.Combined with preoperative AFP level,a more accurate diagnosis will be obtained.Compared with portal vein phase,Kupffer phase showed the ability to identify HCC lesions more sensitive.These findings hold significant guiding implications and reference value for clinical practice.
文摘With a perspective of interest in the modeling of dynamic processes, here we investigate various types of basic growth equations, which in their formulation quantify the change of the variables, the state, or the independent one, using balance equations in which the counts(aggregation-reduction) are of the multiplicative type. We enter the context of the “differential” equations typical of non-Newtonian calculations, such as geometric calculus, bi-geometric calculus, or the lesser-known logarithmic calculus, when we take the step to the limit. In these new possibilities of dynamic laws, we highlight the interpretive aspects. A particular case is to review the equivalents of the logistic equation of the standard calculation in the new accounting calculations, where we make graphical and semantic comparisons. Finally, the construction of a geometric type equation is exemplified, with applications inherent to the financial mathematics.
文摘Moving beyond the conventional“level diagnosis-case analysis”framework,this study,grounded in the SOLO Taxonomy,constructs a four-dimensional instructional model of“stratified objectives,tasks,guidance,and assessment.”Focusing on geometric proofs in middle school,the model is practically applied through case studies of the properties of parallelograms and triangle congruence.By transforming the SOLO levels into actionable instructional steps,the model addresses key student challenges-such as fragmented thinking processes,disorganized logical expression,and weak knowledge transfer-thereby facilitating cognitive progression among students at different levels.The implementation demonstrates that this model significantly enhances the precision and effectiveness of teaching geometric proofs.Its core strengths lie in using visualized diagnostic tools for precise instructional positioning and constructing scaffolded task sequences to build clear pathways for cognitive development.
基金supported in part by the National Natural Science Foundation of China(Grant No.61971291)the Basic Scientific Research Project of the Liaoning Provincial Department of Education(LJ212410144013)+2 种基金the Leading Talent of the‘Xing Liao Ying Cai Plan’(XLYC2202013)the Shenyang Natural Science Foundation(22-315-6-10)the Guangxuan Scholar of Shenyang Ligong University(SYLUGXXZ202205).
文摘With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods are deficient,failing to reasonably allocate the privacy budget for non-outlier location points and ignoring the critical location information that may be contained in the outlier points,leading to decreased data availability and privacy exposure problems.To address these problems,this paper proposes a Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering(MLDP).The method first utilizes the DBSCAN clustering algorithm to classify location points into non-outliers and outliers.For non-outliers,the scoring function is designed by combining geographic information and semantic information,and the privacy budget is allocated according to the heat intensity of the hotspot area;for outliers,the scoring function is constructed to allocate the privacy budget based on their correlation with the hotspot area.By comprehensively considering the geographic information,semantic information,and correlation with hotspot areas of the location points,a reasonable privacy budget is assigned to each location point,andfinallynoise is added throughthe Laplacemechanismto realizeprivacyprotection.Experimental results on tworeal trajectory datasets,Geolife and T-Drive,show that the MLDP approach significantly improves data availability while effectively protecting location privacy.Compared with the comparison methods,the maximum available data ratio of MLDP is 1.Moreover,compared with the RandomNoise method,its execution time is 0.056–0.061 s longer,and the logRE is 0.12951–0.62194 lower;compared with KemeansDP,QTK-DP,DPK-F,IDP-SC,and DPK-Means-up methods,it saves 0.114–0.296 s in execution time,and the logRE is 0.01112–0.38283 lower.
基金supported by the Argentine Agency for the Promotion of Science and Technology ANPCyT(PICT2019-1472 to GP,PICT2019-4597 to FL,PICT2020-1524 to GP,and PICT2021-00627 to FL)supported by an Independent Career Position from CONICETsupported by a postdoctoral fellowship from ANPCyT。
文摘Stem cell proliferation is tightly regulated in developing and adult tissues through the coordinated action of cell-intrinsic and extracellular signals.Although many extracellular cues were identified,the cell-intrinsic mechanisms underlying the decision of a stem cell to proliferate,enter a dormant quiescent state or differentiate into a specific cell type remains incompletely understood.
基金funded by the National Natural Science Foundation of China(No.31801997).
文摘As a gene required for sexual development,intersex(ix),functions in concert with the female-specific product of doublesex(dsx)at the end of the hierarchy to facilitate the sex-specific differentiation of sexually dimorphic characters in female Drosophila melanogaster.In the present study,we initially identified the ix homolog in Gryllus bimaculatus,with the detection of a single isoform expressed in both sexes.Phylogenetic analyses and multiple sequence alignment revealed that Gbix exhibited conservation.Here we employed RNA interference(RNAi)and clustered regularly interspaced short palindromic repeats(CRISPR)/CRISPR-associated nuclease 9(Cas9),respectively,to analyze the functions of Gbix.Our findings indicated that Gbix played a crucial role in the normal development of the embryo and nymph,as well as in the regulation of wing morphogenesis in both sexes.RNAi-mediated knockdown of Gbix resulted in poorly developed ovaries,whereas testicular development was not significantly affected.Nevertheless,CRISPR/Cas9-mediated knockout of Gbix resulted in internal genital defects in both sexes,which ultimately led to a reduction in reproductive capacity in female and male individuals.Our results provide insights into the pleiotropic functions of Gbix in embryogenesis and sexual development,while also advancing our comprehension of sex determination in a hemimetabolous insect species.
文摘The proliferation of carrier aircraft and the integration of unmanned aerial vehicles(UAVs)on aircraft carriers present new challenges to the automation of launch and recovery operations.This paper investigates a collaborative scheduling problem inherent to the operational processes of carrier aircraft,where launch and recovery tasks are conducted concurrently on the flight deck.The objective is to minimize the cumulative weighted waiting time in the air for recovering aircraft and the cumulative weighted delay time for launching aircraft.To tackle this challenge,a multiple population self-adaptive differential evolution(MPSADE)algorithm is proposed.This method features a self-adaptive parameter updating mechanism that is contingent upon population diversity,an asynchronous updating scheme,an individual migration operator,and a global crossover mechanism.Additionally,comprehensive experiments are conducted to validate the effectiveness of the proposed model and algorithm.Ultimately,a comparative analysis with existing operation modes confirms the enhanced efficiency of the collaborative operation mode.
基金supported by the National Natural Science Foundation of China (Grant Nos.42075097,42177081 and 22176037)。
文摘As a key precursor of hydroxyl(OH) radicals, the budget of nitrous acid(HONO) at different altitudes has received extensive attention. In this study, vertically resolved observations of HONO, NO_(2), O_(3), and HCHO were conducted during an autumn field campaign in Beijing in 2019. The significant correlation between HONO and NO2, along with variations in their ratios across different altitudes, underscores the importance of aerosol surface chemistry in HONO formation and its altitude-dependent behavior. To enhance the model performance, the heterogeneous conversion of NO_(2) and its photochemical enhancement are incorporated into the 1D model. The simulations reveal that the nocturnal HONO production is dominated by the heterogeneous conversion of NO_(2) both at the surface and aloft. During the daytime, groundsurface sources of HONO are mainly driven by nitrate photolysis and light-enhanced heterogeneous conversion of NO_(2).Meanwhile, a large portion of the HONO generated at the surface is transported upwards through vertical mixing. In the higher atmosphere, HONO originates from vertical transport and in situ processes. As precursors of OH radicals, the observed concentrations of HONO, O_(3), and HCHO exhibit distinct diurnal variations and vertical distribution patterns.HONO contributes to OH radical production predominantly during the early morning across all layers and it even becomes the main contributor throughout the daytime in the lowest layer near the ground, while O_(3) and HCHO become more prominent towards midday, especially in the higher layers. These results will be beneficial for a deeper understanding of the atmospheric oxidation process within the urban boundary layer.
基金the funds from the Key Laboratory of Smart Earth(KF2023YB01-07)Shanghai Collaborative Innovation Fund(XTCX-KJ-2024-17)the National Natural Science Foundation of China(42388102,62303311,and 62231010)。
文摘Differential Code Bias(DCB)is the time delays between two different GNSS signals,which is crucial for GNSS positioning.Previous studies have shown that it can be significantly affected by the flex power operations in satellites.This study proposes a 15-min short-term DCB estimation method to analyze flex power's impact on DCB variations.The method jointly estimates satellite DCB,receiver DCB,and ionospheric parameters using over 300 MGEX stations.We examined three representative flex power events in 2024,achieving average internal RMS values of 0.042 ns and 0.0068 ns for inter-frequency and intra-frequency scenarios respectively.Results show that intra-frequency DCB exhibits clear shift biases synchronized with flex power state transitions while maintaining stability within 0.20 ns during nontransition periods.No definitive impact on inter-frequency DCB was observed at current estimation precision levels.