The headquarters of Plutus Financial Group Ltd,based in Hong Kong of China,stands as a silent yet razorsharp marker—rooted deeply in the heart of traditional finance,while piercing boundaries,exploring the vast nebul...The headquarters of Plutus Financial Group Ltd,based in Hong Kong of China,stands as a silent yet razorsharp marker—rooted deeply in the heart of traditional finance,while piercing boundaries,exploring the vast nebulae of blockchain and artificial intelligence.This integrated financial services group,newly listed on Nasdaq this February,is moving through the cut-and-thrust of the capital market with the postureof a"white knight."展开更多
Dr.He's bloodletting therapy utilizing three edged needles is one of his "three adjusting methods of acupuncture". During his 70 years of clinical practice, he developed the theory that most diseases are caused by ...Dr.He's bloodletting therapy utilizing three edged needles is one of his "three adjusting methods of acupuncture". During his 70 years of clinical practice, he developed the theory that most diseases are caused by qi stagnation, and in order to restore qi circulation one needs to improve the blood circulation first. Based on this theory, in combination with empirical insights from clinical practice, he has developed a unique technique for using three-edged needles. He has also categorized and extended the application of bloodletting therapy with three edged needles to cover over 150 diseases. In addition, Dr. He's bloodletting therapy with three edged needles is an innovation that may inspire other physicians to develope and expand the use of acupuncture-related therapies to treat disease.展开更多
This study involved numerical simulations of a double tube heat exchanger using the ANSYS FLUENT programversion 22.The study aims to examine methods for minimizing pressure loss and consequently enhancing the thermal ...This study involved numerical simulations of a double tube heat exchanger using the ANSYS FLUENT programversion 22.The study aims to examine methods for minimizing pressure loss and consequently enhancing the thermal performance index(TPI)of a heat exchanger fitted with wavy edge tape that is a heat recovery system(the hot air in simulation instead of t heat from the exhaust gases of the brick factory furnaces and return it to warm the heavy fuel oil by substituting the electrical heater with a heat exchanger to recuperate waste heat from the flue gases,so elevating the temperature of Heavy fuel oil(HFO)to inject from the roof nozzles of combustion chamber of the furnace furthermore reducing cost(by finding the optimal design of wavy edge tape))and energy consumption.Air was selected as the hot gas in the inner pipe instead of furnace exhaust gases due to their similar thermal characteristics.A numerical analysis was conducted to create a novel wavy edge tape with varying widths(50%Di,75%Di,and 95%Di),lengths(1000,1200,1400)mm,amplitudes(5,10,15)mm,and periods of wavy length(5,10,15)mm.The flow rate of the outer pipe fluid(oil)ranges from(0.06 to 0.1)kg/s,while the velocity of the hot fluid(air)varies from(1 to 27)m/s,Re_(air)(6957 to 187,837).The entrance temperature of the hot fluid can be either(200,225,and 250)℃.The study finds that wavy edge tape tubes are more effective than smooth tubes in terms of oil outlet temperature;results revealed that an increase in the oil mass flow rate leads to a decrease in the oil outlet temperature and an increase in the heat transfer rate,at the air temperature 250℃.Additionally,the results indicate that increasing the width,length,and amplitude also leads to an increase in the oil outlet temperature of(94-94.12)℃,the pressure drop of(568.3)Pa,and the Nusselt number(65.7-66.5)respectively on the oil side.Finally,the heat exchanger’s best thermal performance index was found by investigating temperature contour at amplitude(A=5),period(p=15),width(w=75%Di),and length(L=1200 mm).The values for these parameters are,in order(1.02,1.025,1.02,and 1.0077).展开更多
A hardwale demodulation method for 2-D edge detection is proposed. The filtering step and the differential step are implemented by using the hardware circuit. This demodulation circuit simplifies the edgefinder and re...A hardwale demodulation method for 2-D edge detection is proposed. The filtering step and the differential step are implemented by using the hardware circuit. This demodulation circuit simplifies the edgefinder and reduces the measuring cycle. The calibration method of scale setting is also presented,and bymeasuring some calibrated objects,the demodulation errors and the error correction table is obtained.展开更多
Coulomb drag refers to the phenomenon in which a current driven through one conducting layer induces a voltage nearby,electrically isolated layer sorely through interlayer Coulomb interactions between charge carriers....Coulomb drag refers to the phenomenon in which a current driven through one conducting layer induces a voltage nearby,electrically isolated layer sorely through interlayer Coulomb interactions between charge carriers.It has been extensively studied in various systems,including parallel nanowires,double quantum wells,and double-layer graphene.Here,we report the observation of Coulomb drag in a novel system consisting of two graphene layers separated laterally by a 30 nm gap within the material plane,exhibiting behavior distinct from that in vertical graphene heterostructures.Our experiments reveal pronounced negative drag resistances under an out-of-plane magnetic field at the quantum Hall edges,reaching a maximum when the carrier densities in both graphene layers are tuned to the charge neutrality point via gate voltages.Our work establish two separate and spatially closed quantum Hall edge modes as a new platform to explore electronic interaction physics between one dimensional systems.展开更多
Interplay between topology and magnetism can give rise to exotic properties in topological materials.Two-dimensional bismuth has been extensively studied owing to its topological states with a strong spin-orbit coupli...Interplay between topology and magnetism can give rise to exotic properties in topological materials.Two-dimensional bismuth has been extensively studied owing to its topological states with a strong spin-orbit coupling,and 1T-VTe_(2)monolayer theoretically predicted to host an intrinsic magnetism as experimentally suggested.In this work,we successfully constructed a vertical heterostructure composed of the two-dimensional Bi(110)monolayer and 1T-VTe_(2)monolayer by using molecular beam epitaxy(MBE).Scanning tunneling microscopy(STM)measurements revealed that the growth of Bi preferably occurs along the step edges of the VTe_(2)monolayer,forming a Bi(110)monolayer on top of the VTe_(2)monolayer next to a peripheral Bi bilayer.The Bi(100)/VTe_(2)heterostructure exhibits a specific lattice registry with a well-defined moiréperiodicity.Scanning tunneling spectroscopy(STS)measurements further unveiled an universal suppression in the local density-of-states at the boundary of the Bi(110)/VTe_(2)bilayer.By examining the atomic structures of Bi(110)boundaries,we found this effect does not originate from the previously proposed atomic reconstruction at the step edge of Bi(110),but is likely related to the magnetic properties of the VTe_(2)monolayer.展开更多
The exponential growth of Internet of Things(IoT)devices,autonomous systems,and digital services is generating massive volumes of big data,projected to exceed 291 zettabytes by 2027.Conventional cloud computing,despit...The exponential growth of Internet of Things(IoT)devices,autonomous systems,and digital services is generating massive volumes of big data,projected to exceed 291 zettabytes by 2027.Conventional cloud computing,despite its high processing and storage capacity,suffers from increased network latency,network congestion,and high operational costs,making it unsuitable for latency-sensitive applications.Edge computing addresses these issues by processing data near the source but faces scalability challenges and elevated Total Cost of Ownership(TCO).Hybrid solutions,such as fog computing,cloudlets,and Mobile Edge Computing(MEC),attempt to balance cost and performance;however,they still struggle with limited resource sharing and high deployment expenses.This paper proposes Public Edge as a Service(PEaaS),a novel paradigm that utilizes idle resources contributed by universities,enterprises,cellular operators,and individuals under a collaborative service model.By decentralizing computation and enabling multi-tenant resource sharing,PEaaS reduces reliance on centralized cloud infrastructure,minimizes communication costs,and enhances scalability.The proposed framework is evaluated using EdgeCloudSim under varying workloads,for keymetrics such as latency,communication cost,server utilization,and task failure rate.Results reveal that while cloud has a task failure rate rising sharply to 12.3%at 2000 devices,PEaaS maintains a low rate of 2.5%,closely matching edge computing.Furthermore,communication costs remain 25% lower than cloud and latency remains below 0.3,even under peak load.These findings demonstrate that PEaaS achieves near-edge performance with reduced costs and enhanced scalability,offering a sustainable and economically viable solution for next-generation computing environments.展开更多
Given the growing number of vehicle accidents caused by unintended acceleration and braking failure,verifying Sudden Unintended Acceleration(SUA)incidents has become a persistent challenge.A central issue of debate is...Given the growing number of vehicle accidents caused by unintended acceleration and braking failure,verifying Sudden Unintended Acceleration(SUA)incidents has become a persistent challenge.A central issue of debate is whether such events stem frommechanical malfunctions or driver pedalmisapplications.However,existing verification procedures implemented by vehiclemanufacturers often involve closed tests after vehicle recalls;thus raising ongoing concerns about reliability and transparency.Consequently,there is a growing need for a user-driven framework that enables independent data acquisition and verification.Although previous studies have addressed SUA detection using deep learning,few have explored howclass granularity optimization affects power efficiency and inference performance in real-time Edge AI systems.To address this problem,this work presents a cloud-assisted artificial intelligence(AI)solution for the reliable verification of SUA occurrences.The proposed system integrates multimodal sensor streams including camera-based foot images,On-Board Diagnostics II(OBD-II)signals,and six-axismeasurements to determine whether the brake pedal was actually engaged at themoment of a suspected SUA.Beyond image acquisition,convolutional neural network(CNN)models perform real-time inference to classify the driver’s pedal operation states with the resulting outputs transmitted and archived in the cloud.A dedicated dataset of brake and accelerator pedal images was collected from 15 vehicles produced by 6 domestic and international manufacturers.Using this dataset,transfer learning techniques were applied to compare and analyze model performance and generalization as the CNN class granularity varied from coarse to fine levels.Furthermore,classification performance was evaluated in terms of latency and power efficiency under different class configurations.The experimental results demonstrated that the proposed solution identified the driver’s pedal behavior accurately and promptly,with the two-class model achieving the highest F1-score and accuracy among all granularity settings.展开更多
This work presents a systematic analysis of proton-induced total ionizing dose(TID)effects in 1.2 k V silicon carbide(SiC)power devices with various edge termination structures.Three edge terminations including ring-a...This work presents a systematic analysis of proton-induced total ionizing dose(TID)effects in 1.2 k V silicon carbide(SiC)power devices with various edge termination structures.Three edge terminations including ring-assisted junction termination extension(RA-JTE),multiple floating zone JTE(MFZ-JTE),and field limiting rings(FLR)were fabricated and irradiated with45 Me V protons at fluences ranging from 1×10^(12) to 1×10^(14) cm^(-2).Experimental results,supported by TCAD simulations,show that the RA-JTE structure maintained stable breakdown performance with less than 1%variation due to its effective electric field redistribution by multiple P+rings.In contrast,MFZ-JTE and FLR exhibit breakdown voltage shifts of 6.1%and 15.2%,respectively,under the highest fluence.These results demonstrate the superior radiation tolerance of the RA-JTE structure under TID conditions and provide practical design guidance for radiation-hardened Si C power devices in space and other highradiation environments.展开更多
As a fundamental component in computer vision,edges can be categorized into four types based on discontinuities in reflectance,illumination,surface normal,or depth.While deep CNNs have significantly advanced generic e...As a fundamental component in computer vision,edges can be categorized into four types based on discontinuities in reflectance,illumination,surface normal,or depth.While deep CNNs have significantly advanced generic edge detection,real-time multi-class semantic edge detection under resource constraints remains challenging.To address this,we propose a lightweight framework based on PiDiNet that enables fine-grained semantic edge detection.Our model simultaneously predicts background and four edge categories from full-resolution inputs,balancing accuracy and efficiency.Key contributions include:a multi-channel output structure expanding binary edge prediction to five classes,supported by a deep supervision mechanism;a dynamic class-balancing strategy combining adaptive weighting with physical priors to handle extreme class imbalance;and maintained architectural efficiency enabling real-time inference.Extensive evaluations on BSDS-RIND show our approach achieves accuracy competitive with state-of-the-art methods while operating in real time.展开更多
Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approa...Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approach in current practices.However,in complex and dynamic traffic scenes,particularly with smaller traffic sign objects,challenges such as missed and false detections can lead to reduced overall detection accuracy.To address this issue,this paper proposes a detection algorithm that integrates edge and shape information.Recognizing that traffic signs have specific shapes and distinct edge contours,this paper introduces an edge feature extraction branch within the backbone network,enabling adaptive fusion with features of the same hierarchical level.Additionally,a shape prior convolution module is designed to replaces the first two convolutional modules of the backbone network,aimed at enhancing the model's perception ability for specific shape objects and reducing its sensitivity to background noise.The algorithm was evaluated on the CCTSDB and TT100k datasets,and compared to YOLOv8s,the mAP50 values increased by 3.0%and 10.4%,respectively,demonstrating the effectiveness of the proposed method in improving the accuracy of traffic sign detection.展开更多
Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monit...Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monitoring and automate the communication process.In recent decades,researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations.However,the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity.These systems are vulnerable to a variety of cyberattacks,including unauthorized access,denial-of-service attacks,and data leakage,which compromise the network’s security.Additionally,uneven load balancing between mobile IoT devices,which frequently experience link interferences,compromises the trustworthiness of the system.This paper introduces a Multi-Agent secured framework using lightweight edge computing to enhance cybersecurity for sensor networks,aiming to leverage artificial intelligence for adaptive routing and multi-metric trust evaluation to achieve data privacy and mitigate potential threats.Moreover,it enhances the efficiency of distributed sensors for energy consumption through intelligent data analytics techniques,resulting in highly consistent and low-latency network communication.Using simulations,the proposed framework reveals its significant performance compared to state-of-the-art approaches for energy consumption by 43%,latency by 46%,network throughput by 51%,packet loss rate by 40%,and denial of service attacks by 42%.展开更多
High-elevation forests are among the most climate-sensitive ecosystems,and understanding their growth responses is crucial for predicting ecological consequences under future climate change.The climate sensitivity of ...High-elevation forests are among the most climate-sensitive ecosystems,and understanding their growth responses is crucial for predicting ecological consequences under future climate change.The climate sensitivity of tree species in the Hyrcanian forests in the Alborz Mountains of northern Iran,one of the southernmost temperate deciduous forests in the Northern Hemisphere,remains largely unexplored.In particular,Acer hyrcanum Fisch.&C.A.Mey.,growing mainly at high elevations,has not yet been studied in detail in dendroclimatology.Here,we present the first tree-ring chronology of Acer hyrcanum spanning 1814-2022 and analyze its growth-climate relationships to assess how this species reflects climatic sensitivity at the upper forest limit.The results reveal significant positive correlations between tree-ring width and temperature,particularly from May to September,suggesting that warmer growing-season temperatures enhance tree growth.In contrast,tree-ring width showed negative correlations with precipitation and standardized precipitation-evapotranspiration index,especially from January to May,and with cloud cover from March to May.These findings suggest that moisture availability does not limit radial growth in Acer hyrcanum and that the precipitation and water surplus signals may instead reflect the influence of cloud cover,which reduces sunlight availability during critical early-season months.This study contributes to the growing body of dendroclimatic research in the Alborz Mountains and,more broadly,on Acer species,particularly in high-elevation ecosystems where such studies are scarce.It also provides valuable insights into how Acer hyrcanum may respond to future climate change.展开更多
For hypersonic air-breathing vehicles,the V-shaped leading edges(VSLEs)of supersonic combustion ramjet(scramjet)inlets experience complex shock interactions and intense aerodynamic loads.This paper provides a comprehe...For hypersonic air-breathing vehicles,the V-shaped leading edges(VSLEs)of supersonic combustion ramjet(scramjet)inlets experience complex shock interactions and intense aerodynamic loads.This paper provides a comprehensive review of flow characteristics at the crotch of VSLEs,with particular focus on the transition of shock interaction types and the variation of wall heat flux under different freestream Mach numbers and geometric configurations.The mechanisms governing shock transition,unsteady oscillations,hysteresis,and three-dimensional effects in VSLE flows are first examined.Subsequently,thermal protection strategies aimed at mitigating extreme heating loads are reviewed,emphasizing their relevance to practical engineering applications.Special attention is given to recent studies addressing thermochemical nonequilibrium effects on VSLE shock interactions,and the limitations of current research are critically assessed.Finally,perspectives for future investigations into hypersonic VSLE shock interactions are outlined,highlighting opportunities for advancing design and thermal management strategies.展开更多
With the large-scale deployment of the Internet ofThings(IoT)devices,their weak securitymechanisms make them prime targets for malware attacks.Attackers often use Domain Generation Algorithm(DGA)to generate random dom...With the large-scale deployment of the Internet ofThings(IoT)devices,their weak securitymechanisms make them prime targets for malware attacks.Attackers often use Domain Generation Algorithm(DGA)to generate random domain names,hiding the real IP of Command and Control(C&C)servers to build botnets.Due to the randomness and dynamics of DGA,traditional methods struggle to detect them accurately,increasing the difficulty of network defense.This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments.Specifically,a teacher model combining CharacterBERT,a bidirectional long short-term memory(BiLSTM)network,and attention mechanism(ATT)is constructed:it extracts character-level semantic features viaCharacterBERT,captures sequence dependencieswith the BiLSTM,and integrates theATT for key feature weighting,formingmulti-granularity feature fusion.An improved knowledge distillation approach transfers the teacher model’s learned knowledge to the simplified DistilBERT student model.Experimental results show the teacher model achieves 98.68%detection accuracy.The student modelmaintains slightly improved accuracy while significantly compressing parameters to approximately 38.4%of the teacher model’s scale,greatly reducing computational overhead for IoT deployment.展开更多
An injective k-edge coloring of a graph G is k-edge coloringκof G such thatκ(e1)≠κ(e3)for any three consecutive edges ei,e2 and e3 of a path or a triangle.The injective chromatic index of G,denoted by x'i(G),i...An injective k-edge coloring of a graph G is k-edge coloringκof G such thatκ(e1)≠κ(e3)for any three consecutive edges ei,e2 and e3 of a path or a triangle.The injective chromatic index of G,denoted by x'i(G),is the smallest integer k such that G has an injective k-edge coloring.In this paper,we prove that x'i(G)≤9 if G is a planar graph with maximum degreeΔ≤4,girth g≥6 and without intersecting 6-cycles.展开更多
The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significa...The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significant security challenges,including impersonation threats,data manipulation,distributed denial of service(DDoS)attacks,and privacy breaches.Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks.This survey provides a comprehensive review of how Federated Learning(FL),Blockchain,and Digital Twin(DT)technologies can collectively enhance the security of 5G and 6G systems.Blockchain offers decentralized,immutable,and transparent mechanisms for securing network transactions,while FL enables privacy-preserving collaborative learning without sharing raw data.Digital Twins create virtual replicas of network components,enabling real-time monitoring,anomaly detection,and predictive threat analysis.The survey examines major security issues in emerging wireless architectures and analyzes recent advancements that integrate FL,Blockchain,and DT to mitigate these threats.Additionally,it presents practical use cases,synthesizes key lessons learned,and identifies ongoing research challenges.Finally,the survey outlines future research directions to support the development of scalable,intelligent,and robust security frameworks for next-generation wireless networks.展开更多
There has been an increasing emphasis on performing deep neural network(DNN)inference locally on edge devices due to challenges such as network congestion and security concerns.However,as DRAM process technology conti...There has been an increasing emphasis on performing deep neural network(DNN)inference locally on edge devices due to challenges such as network congestion and security concerns.However,as DRAM process technology continues to scale down,the bit-flip errors in the memory of edge devices become more frequent,thereby leading to substantial DNN inference accuracy loss.Though several techniques have been proposed to alleviate the accuracy loss in edge environments,they require complex computations and additional parity bits for error correction,thus resulting in significant performance and storage overheads.In this paper,we propose FeatherGuard,a data-driven lightweight error protection scheme for DNN inference on edge devices.FeatherGuard selectively protects critical bit positions(that have a significant impact on DNN inference accuracy)against bit-flip errors,by considering various DNN characteristics(e.g.,data format,layer-wise weight distribution,actually stored logical values).Thus,it achieves high error tolerability during DNN inference.Since FeatherGuard reduces the bit-flip errors based on only a few simple arithmetic operations(e.g.,NOT operations)without parity bits,it causes negligible performance overhead and no storage overhead.Our experimental results show that FeatherGuard improves the error tolerability by up to 6667×and 4000×,compared to the conventional systems and the state-of-the-art error protection technique for edge environments,respectively.展开更多
Industrial operators need reliable communication in high-noise,safety-critical environments where speech or touch input is often impractical.Existing gesture systems either miss real-time deadlines on resourceconstrai...Industrial operators need reliable communication in high-noise,safety-critical environments where speech or touch input is often impractical.Existing gesture systems either miss real-time deadlines on resourceconstrained hardware or lose accuracy under occlusion,vibration,and lighting changes.We introduce Industrial EdgeSign,a dual-path framework that combines hardware-aware neural architecture search(NAS)with large multimodalmodel(LMM)guided semantics to deliver robust,low-latency gesture recognition on edge devices.The searched model uses a truncated ResNet50 front end,a dimensional-reduction network that preserves spatiotemporal structure for tubelet-based attention,and localized Transformer layers tuned for on-device inference.To reduce reliance on gloss annotations and mitigate domain shift,we distill semantics from factory-tuned vision-language models and pre-train with masked language modeling and video-text contrastive objectives,aligning visual features with a shared text space.OnML2HP and SHREC’17,theNAS-derived architecture attains 94.7% accuracywith 86ms inference latency and about 5.9W power on Jetson Nano.Under occlusion,lighting shifts,andmotion blur,accuracy remains above 82%.For safetycritical commands,the emergency-stop gesture achieves 72 ms 99th percentile latency with 99.7% fail-safe triggering.Ablation studies confirm the contribution of the spatiotemporal tubelet extractor and text-side pre-training,and we observe gains in translation quality(BLEU-422.33).These results show that Industrial EdgeSign provides accurate,resource-aware,and safety-aligned gesture recognition suitable for deployment in smart factory settings.展开更多
Structural displacement monitoring faces significant challenges under complex environmental conditions due to the loss or degradation of target features,making it difficult for traditional methods to ensure high accur...Structural displacement monitoring faces significant challenges under complex environmental conditions due to the loss or degradation of target features,making it difficult for traditional methods to ensure high accuracy and robustness.Therefore,this study proposes a structural displacement identification and quantification method that integrates YOLOv8n with an improved edge-orientation gradient-based template matching algorithm.By combining deep learning techniques with traditional template matching methods,the accuracy and robustness of monitoring are enhanced under adverse conditions such as noise and extremely low illumination.Specifically,in the edge-orientation gradient matching stage,the Canny-Devernay sub-pixel edge detection technique and an improved ellipse-fitting method are employed for sub-pixel edge extraction,and a five-level Gaussian pyramid structure is introduced to accelerate the matching speed.Experimental results show that the proposed method achieves high-precision displacement monitoring under sufficient illumination,and it maintains stable target localization and displacement quantification performance under conditions of noise interference and extremely low illumination.Notably,under salt-and-pepper noise interference,although YOLOv8n maintains a high level of localization confidence,the accuracy of gradient matching deteriorates,resulting in a root-mean-square error(RMSE)of 0.035 mm.This finding reveals the differential impact of various noise types on different stages of the algorithm.The proposed method offers a novel technological approach for precise structural displacement monitoring in complex environments.展开更多
文摘The headquarters of Plutus Financial Group Ltd,based in Hong Kong of China,stands as a silent yet razorsharp marker—rooted deeply in the heart of traditional finance,while piercing boundaries,exploring the vast nebulae of blockchain and artificial intelligence.This integrated financial services group,newly listed on Nasdaq this February,is moving through the cut-and-thrust of the capital market with the postureof a"white knight."
文摘Dr.He's bloodletting therapy utilizing three edged needles is one of his "three adjusting methods of acupuncture". During his 70 years of clinical practice, he developed the theory that most diseases are caused by qi stagnation, and in order to restore qi circulation one needs to improve the blood circulation first. Based on this theory, in combination with empirical insights from clinical practice, he has developed a unique technique for using three-edged needles. He has also categorized and extended the application of bloodletting therapy with three edged needles to cover over 150 diseases. In addition, Dr. He's bloodletting therapy with three edged needles is an innovation that may inspire other physicians to develope and expand the use of acupuncture-related therapies to treat disease.
文摘This study involved numerical simulations of a double tube heat exchanger using the ANSYS FLUENT programversion 22.The study aims to examine methods for minimizing pressure loss and consequently enhancing the thermal performance index(TPI)of a heat exchanger fitted with wavy edge tape that is a heat recovery system(the hot air in simulation instead of t heat from the exhaust gases of the brick factory furnaces and return it to warm the heavy fuel oil by substituting the electrical heater with a heat exchanger to recuperate waste heat from the flue gases,so elevating the temperature of Heavy fuel oil(HFO)to inject from the roof nozzles of combustion chamber of the furnace furthermore reducing cost(by finding the optimal design of wavy edge tape))and energy consumption.Air was selected as the hot gas in the inner pipe instead of furnace exhaust gases due to their similar thermal characteristics.A numerical analysis was conducted to create a novel wavy edge tape with varying widths(50%Di,75%Di,and 95%Di),lengths(1000,1200,1400)mm,amplitudes(5,10,15)mm,and periods of wavy length(5,10,15)mm.The flow rate of the outer pipe fluid(oil)ranges from(0.06 to 0.1)kg/s,while the velocity of the hot fluid(air)varies from(1 to 27)m/s,Re_(air)(6957 to 187,837).The entrance temperature of the hot fluid can be either(200,225,and 250)℃.The study finds that wavy edge tape tubes are more effective than smooth tubes in terms of oil outlet temperature;results revealed that an increase in the oil mass flow rate leads to a decrease in the oil outlet temperature and an increase in the heat transfer rate,at the air temperature 250℃.Additionally,the results indicate that increasing the width,length,and amplitude also leads to an increase in the oil outlet temperature of(94-94.12)℃,the pressure drop of(568.3)Pa,and the Nusselt number(65.7-66.5)respectively on the oil side.Finally,the heat exchanger’s best thermal performance index was found by investigating temperature contour at amplitude(A=5),period(p=15),width(w=75%Di),and length(L=1200 mm).The values for these parameters are,in order(1.02,1.025,1.02,and 1.0077).
文摘A hardwale demodulation method for 2-D edge detection is proposed. The filtering step and the differential step are implemented by using the hardware circuit. This demodulation circuit simplifies the edgefinder and reduces the measuring cycle. The calibration method of scale setting is also presented,and bymeasuring some calibrated objects,the demodulation errors and the error correction table is obtained.
基金support from the National Key Projects for Research and Development of China(Grant Nos.2022YFA1204700,2021YFA1400400)National Natural Science Foundation of China(Grant No.12525403)+3 种基金Natural Science Foundation of Jiangsu Province(Grant Nos.BK20220066,BK20233001)Program for Innovative Talents and Entrepreneur in Jiangsu(Grant No.JSSCTD202101)support from the JSPS KAKENHI(Grant Numbers 21H05233 and 23H02052)World Premier International Research Center Initiative(WPI),MEXT,Japan.
文摘Coulomb drag refers to the phenomenon in which a current driven through one conducting layer induces a voltage nearby,electrically isolated layer sorely through interlayer Coulomb interactions between charge carriers.It has been extensively studied in various systems,including parallel nanowires,double quantum wells,and double-layer graphene.Here,we report the observation of Coulomb drag in a novel system consisting of two graphene layers separated laterally by a 30 nm gap within the material plane,exhibiting behavior distinct from that in vertical graphene heterostructures.Our experiments reveal pronounced negative drag resistances under an out-of-plane magnetic field at the quantum Hall edges,reaching a maximum when the carrier densities in both graphene layers are tuned to the charge neutrality point via gate voltages.Our work establish two separate and spatially closed quantum Hall edge modes as a new platform to explore electronic interaction physics between one dimensional systems.
基金financially supported by the National Key Research and Development Program of China(Grant No.2021YFA1400403)the National Natural Science Foundation of China(Grant Nos.12374183,92165205)+2 种基金the Natural Science Foundation of Jiangsu Province(Grant No.BK20233001)the Innovation Program for Quantum Science and Technology(Grant No.2021ZD0302800)the Fundamental Research Funds for the Central Universities(Grant No.020414380207).
文摘Interplay between topology and magnetism can give rise to exotic properties in topological materials.Two-dimensional bismuth has been extensively studied owing to its topological states with a strong spin-orbit coupling,and 1T-VTe_(2)monolayer theoretically predicted to host an intrinsic magnetism as experimentally suggested.In this work,we successfully constructed a vertical heterostructure composed of the two-dimensional Bi(110)monolayer and 1T-VTe_(2)monolayer by using molecular beam epitaxy(MBE).Scanning tunneling microscopy(STM)measurements revealed that the growth of Bi preferably occurs along the step edges of the VTe_(2)monolayer,forming a Bi(110)monolayer on top of the VTe_(2)monolayer next to a peripheral Bi bilayer.The Bi(100)/VTe_(2)heterostructure exhibits a specific lattice registry with a well-defined moiréperiodicity.Scanning tunneling spectroscopy(STS)measurements further unveiled an universal suppression in the local density-of-states at the boundary of the Bi(110)/VTe_(2)bilayer.By examining the atomic structures of Bi(110)boundaries,we found this effect does not originate from the previously proposed atomic reconstruction at the step edge of Bi(110),but is likely related to the magnetic properties of the VTe_(2)monolayer.
文摘The exponential growth of Internet of Things(IoT)devices,autonomous systems,and digital services is generating massive volumes of big data,projected to exceed 291 zettabytes by 2027.Conventional cloud computing,despite its high processing and storage capacity,suffers from increased network latency,network congestion,and high operational costs,making it unsuitable for latency-sensitive applications.Edge computing addresses these issues by processing data near the source but faces scalability challenges and elevated Total Cost of Ownership(TCO).Hybrid solutions,such as fog computing,cloudlets,and Mobile Edge Computing(MEC),attempt to balance cost and performance;however,they still struggle with limited resource sharing and high deployment expenses.This paper proposes Public Edge as a Service(PEaaS),a novel paradigm that utilizes idle resources contributed by universities,enterprises,cellular operators,and individuals under a collaborative service model.By decentralizing computation and enabling multi-tenant resource sharing,PEaaS reduces reliance on centralized cloud infrastructure,minimizes communication costs,and enhances scalability.The proposed framework is evaluated using EdgeCloudSim under varying workloads,for keymetrics such as latency,communication cost,server utilization,and task failure rate.Results reveal that while cloud has a task failure rate rising sharply to 12.3%at 2000 devices,PEaaS maintains a low rate of 2.5%,closely matching edge computing.Furthermore,communication costs remain 25% lower than cloud and latency remains below 0.3,even under peak load.These findings demonstrate that PEaaS achieves near-edge performance with reduced costs and enhanced scalability,offering a sustainable and economically viable solution for next-generation computing environments.
基金supported by Basic Science Research Program to Research Institute for Basic Sciences(RIBS)of Jeju National University through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(RS-2019-NR040080)This research was also carried out with the support of the Jeju RISE Center,funded by the Ministry of Education and Jeju Special Self-Governing Province in 2025,as part of the“Regional Innovation System&Education(RISE):Glocal University 30”initiative.
文摘Given the growing number of vehicle accidents caused by unintended acceleration and braking failure,verifying Sudden Unintended Acceleration(SUA)incidents has become a persistent challenge.A central issue of debate is whether such events stem frommechanical malfunctions or driver pedalmisapplications.However,existing verification procedures implemented by vehiclemanufacturers often involve closed tests after vehicle recalls;thus raising ongoing concerns about reliability and transparency.Consequently,there is a growing need for a user-driven framework that enables independent data acquisition and verification.Although previous studies have addressed SUA detection using deep learning,few have explored howclass granularity optimization affects power efficiency and inference performance in real-time Edge AI systems.To address this problem,this work presents a cloud-assisted artificial intelligence(AI)solution for the reliable verification of SUA occurrences.The proposed system integrates multimodal sensor streams including camera-based foot images,On-Board Diagnostics II(OBD-II)signals,and six-axismeasurements to determine whether the brake pedal was actually engaged at themoment of a suspected SUA.Beyond image acquisition,convolutional neural network(CNN)models perform real-time inference to classify the driver’s pedal operation states with the resulting outputs transmitted and archived in the cloud.A dedicated dataset of brake and accelerator pedal images was collected from 15 vehicles produced by 6 domestic and international manufacturers.Using this dataset,transfer learning techniques were applied to compare and analyze model performance and generalization as the CNN class granularity varied from coarse to fine levels.Furthermore,classification performance was evaluated in terms of latency and power efficiency under different class configurations.The experimental results demonstrated that the proposed solution identified the driver’s pedal behavior accurately and promptly,with the two-class model achieving the highest F1-score and accuracy among all granularity settings.
基金supported by the IITP(Institute for Information&Communications Technology Planning&Evaluation)under the ITRC(Information Technology Research Center)support program(IITP-2025-RS-2024-00438288)grant funded by the Korea government(MSIT)+1 种基金National Research Council of Science&Technology(NST)grant by the MSIT(Aerospace Semiconductor Strategy Research Project No.GTL25051-000)supported by the IC Design Education Center(IDEC),Korea。
文摘This work presents a systematic analysis of proton-induced total ionizing dose(TID)effects in 1.2 k V silicon carbide(SiC)power devices with various edge termination structures.Three edge terminations including ring-assisted junction termination extension(RA-JTE),multiple floating zone JTE(MFZ-JTE),and field limiting rings(FLR)were fabricated and irradiated with45 Me V protons at fluences ranging from 1×10^(12) to 1×10^(14) cm^(-2).Experimental results,supported by TCAD simulations,show that the RA-JTE structure maintained stable breakdown performance with less than 1%variation due to its effective electric field redistribution by multiple P+rings.In contrast,MFZ-JTE and FLR exhibit breakdown voltage shifts of 6.1%and 15.2%,respectively,under the highest fluence.These results demonstrate the superior radiation tolerance of the RA-JTE structure under TID conditions and provide practical design guidance for radiation-hardened Si C power devices in space and other highradiation environments.
基金supported by the National Natural Science Foundation of China 62402171.
文摘As a fundamental component in computer vision,edges can be categorized into four types based on discontinuities in reflectance,illumination,surface normal,or depth.While deep CNNs have significantly advanced generic edge detection,real-time multi-class semantic edge detection under resource constraints remains challenging.To address this,we propose a lightweight framework based on PiDiNet that enables fine-grained semantic edge detection.Our model simultaneously predicts background and four edge categories from full-resolution inputs,balancing accuracy and efficiency.Key contributions include:a multi-channel output structure expanding binary edge prediction to five classes,supported by a deep supervision mechanism;a dynamic class-balancing strategy combining adaptive weighting with physical priors to handle extreme class imbalance;and maintained architectural efficiency enabling real-time inference.Extensive evaluations on BSDS-RIND show our approach achieves accuracy competitive with state-of-the-art methods while operating in real time.
基金supported by the National Natural Science Foundation of China(Grant Nos.62572057,62272049,U24A20331)Beijing Natural Science Foundation(Grant Nos.4232026,4242020)Academic Research Projects of Beijing Union University(Grant No.ZK10202404).
文摘Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approach in current practices.However,in complex and dynamic traffic scenes,particularly with smaller traffic sign objects,challenges such as missed and false detections can lead to reduced overall detection accuracy.To address this issue,this paper proposes a detection algorithm that integrates edge and shape information.Recognizing that traffic signs have specific shapes and distinct edge contours,this paper introduces an edge feature extraction branch within the backbone network,enabling adaptive fusion with features of the same hierarchical level.Additionally,a shape prior convolution module is designed to replaces the first two convolutional modules of the backbone network,aimed at enhancing the model's perception ability for specific shape objects and reducing its sensitivity to background noise.The algorithm was evaluated on the CCTSDB and TT100k datasets,and compared to YOLOv8s,the mAP50 values increased by 3.0%and 10.4%,respectively,demonstrating the effectiveness of the proposed method in improving the accuracy of traffic sign detection.
基金supported by the Deanship of Graduate Studies and Scientific Research at Jouf University.
文摘Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monitoring and automate the communication process.In recent decades,researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations.However,the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity.These systems are vulnerable to a variety of cyberattacks,including unauthorized access,denial-of-service attacks,and data leakage,which compromise the network’s security.Additionally,uneven load balancing between mobile IoT devices,which frequently experience link interferences,compromises the trustworthiness of the system.This paper introduces a Multi-Agent secured framework using lightweight edge computing to enhance cybersecurity for sensor networks,aiming to leverage artificial intelligence for adaptive routing and multi-metric trust evaluation to achieve data privacy and mitigate potential threats.Moreover,it enhances the efficiency of distributed sensors for energy consumption through intelligent data analytics techniques,resulting in highly consistent and low-latency network communication.Using simulations,the proposed framework reveals its significant performance compared to state-of-the-art approaches for energy consumption by 43%,latency by 46%,network throughput by 51%,packet loss rate by 40%,and denial of service attacks by 42%.
基金supported by the Alexander von Humboldt Foundation(AvH),which provided a research stay for HM(Humboldt-ID number 1222705).
文摘High-elevation forests are among the most climate-sensitive ecosystems,and understanding their growth responses is crucial for predicting ecological consequences under future climate change.The climate sensitivity of tree species in the Hyrcanian forests in the Alborz Mountains of northern Iran,one of the southernmost temperate deciduous forests in the Northern Hemisphere,remains largely unexplored.In particular,Acer hyrcanum Fisch.&C.A.Mey.,growing mainly at high elevations,has not yet been studied in detail in dendroclimatology.Here,we present the first tree-ring chronology of Acer hyrcanum spanning 1814-2022 and analyze its growth-climate relationships to assess how this species reflects climatic sensitivity at the upper forest limit.The results reveal significant positive correlations between tree-ring width and temperature,particularly from May to September,suggesting that warmer growing-season temperatures enhance tree growth.In contrast,tree-ring width showed negative correlations with precipitation and standardized precipitation-evapotranspiration index,especially from January to May,and with cloud cover from March to May.These findings suggest that moisture availability does not limit radial growth in Acer hyrcanum and that the precipitation and water surplus signals may instead reflect the influence of cloud cover,which reduces sunlight availability during critical early-season months.This study contributes to the growing body of dendroclimatic research in the Alborz Mountains and,more broadly,on Acer species,particularly in high-elevation ecosystems where such studies are scarce.It also provides valuable insights into how Acer hyrcanum may respond to future climate change.
基金funded by the Research Fund of National Key Laboratory of Aerospace Physics in Fluids,grant number 2024-APF-KFZD-01Guangdong Basic and Applied Basic Research Foundation,grant number 2025A1515012081+1 种基金National Natural Science Foundation of China,grant number 12002193Shandong Provincial Natural Science Foundation,China,grant number ZR2019QA018.
文摘For hypersonic air-breathing vehicles,the V-shaped leading edges(VSLEs)of supersonic combustion ramjet(scramjet)inlets experience complex shock interactions and intense aerodynamic loads.This paper provides a comprehensive review of flow characteristics at the crotch of VSLEs,with particular focus on the transition of shock interaction types and the variation of wall heat flux under different freestream Mach numbers and geometric configurations.The mechanisms governing shock transition,unsteady oscillations,hysteresis,and three-dimensional effects in VSLE flows are first examined.Subsequently,thermal protection strategies aimed at mitigating extreme heating loads are reviewed,emphasizing their relevance to practical engineering applications.Special attention is given to recent studies addressing thermochemical nonequilibrium effects on VSLE shock interactions,and the limitations of current research are critically assessed.Finally,perspectives for future investigations into hypersonic VSLE shock interactions are outlined,highlighting opportunities for advancing design and thermal management strategies.
基金supported by the following projects:National Natural Science Foundation of China(62461041)Natural Science Foundation of Jiangxi Province China(20242BAB25068).
文摘With the large-scale deployment of the Internet ofThings(IoT)devices,their weak securitymechanisms make them prime targets for malware attacks.Attackers often use Domain Generation Algorithm(DGA)to generate random domain names,hiding the real IP of Command and Control(C&C)servers to build botnets.Due to the randomness and dynamics of DGA,traditional methods struggle to detect them accurately,increasing the difficulty of network defense.This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments.Specifically,a teacher model combining CharacterBERT,a bidirectional long short-term memory(BiLSTM)network,and attention mechanism(ATT)is constructed:it extracts character-level semantic features viaCharacterBERT,captures sequence dependencieswith the BiLSTM,and integrates theATT for key feature weighting,formingmulti-granularity feature fusion.An improved knowledge distillation approach transfers the teacher model’s learned knowledge to the simplified DistilBERT student model.Experimental results show the teacher model achieves 98.68%detection accuracy.The student modelmaintains slightly improved accuracy while significantly compressing parameters to approximately 38.4%of the teacher model’s scale,greatly reducing computational overhead for IoT deployment.
基金Supported by the National Natural Science Foundation of China(Grant Nos.12071265,12001481)the Natural Science Foundation of Shandong Province(Grant No.ZR2021MA103)the Youth Innovation Team Project of Shandong Province Universities(Grant No.2024KJG078).
文摘An injective k-edge coloring of a graph G is k-edge coloringκof G such thatκ(e1)≠κ(e3)for any three consecutive edges ei,e2 and e3 of a path or a triangle.The injective chromatic index of G,denoted by x'i(G),is the smallest integer k such that G has an injective k-edge coloring.In this paper,we prove that x'i(G)≤9 if G is a planar graph with maximum degreeΔ≤4,girth g≥6 and without intersecting 6-cycles.
基金derived from a research grant“Cybersecurity Research and Innovation Pioneers Grants Initiative”funded by The National Program for RDI in Cybersecurity(National Cybersecurity Authority)-Kingdom of Saudi Arabia-with grant number(CRPG-25-3168)supported by EIAS Data Science and Blockchain Lab,CCIS,Prince Sultan University.
文摘The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significant security challenges,including impersonation threats,data manipulation,distributed denial of service(DDoS)attacks,and privacy breaches.Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks.This survey provides a comprehensive review of how Federated Learning(FL),Blockchain,and Digital Twin(DT)technologies can collectively enhance the security of 5G and 6G systems.Blockchain offers decentralized,immutable,and transparent mechanisms for securing network transactions,while FL enables privacy-preserving collaborative learning without sharing raw data.Digital Twins create virtual replicas of network components,enabling real-time monitoring,anomaly detection,and predictive threat analysis.The survey examines major security issues in emerging wireless architectures and analyzes recent advancements that integrate FL,Blockchain,and DT to mitigate these threats.Additionally,it presents practical use cases,synthesizes key lessons learned,and identifies ongoing research challenges.Finally,the survey outlines future research directions to support the development of scalable,intelligent,and robust security frameworks for next-generation wireless networks.
基金the“Convergence and Open sharing System”Project,supported by the Ministry of Education and National Research Foundation of Korea.
文摘There has been an increasing emphasis on performing deep neural network(DNN)inference locally on edge devices due to challenges such as network congestion and security concerns.However,as DRAM process technology continues to scale down,the bit-flip errors in the memory of edge devices become more frequent,thereby leading to substantial DNN inference accuracy loss.Though several techniques have been proposed to alleviate the accuracy loss in edge environments,they require complex computations and additional parity bits for error correction,thus resulting in significant performance and storage overheads.In this paper,we propose FeatherGuard,a data-driven lightweight error protection scheme for DNN inference on edge devices.FeatherGuard selectively protects critical bit positions(that have a significant impact on DNN inference accuracy)against bit-flip errors,by considering various DNN characteristics(e.g.,data format,layer-wise weight distribution,actually stored logical values).Thus,it achieves high error tolerability during DNN inference.Since FeatherGuard reduces the bit-flip errors based on only a few simple arithmetic operations(e.g.,NOT operations)without parity bits,it causes negligible performance overhead and no storage overhead.Our experimental results show that FeatherGuard improves the error tolerability by up to 6667×and 4000×,compared to the conventional systems and the state-of-the-art error protection technique for edge environments,respectively.
文摘Industrial operators need reliable communication in high-noise,safety-critical environments where speech or touch input is often impractical.Existing gesture systems either miss real-time deadlines on resourceconstrained hardware or lose accuracy under occlusion,vibration,and lighting changes.We introduce Industrial EdgeSign,a dual-path framework that combines hardware-aware neural architecture search(NAS)with large multimodalmodel(LMM)guided semantics to deliver robust,low-latency gesture recognition on edge devices.The searched model uses a truncated ResNet50 front end,a dimensional-reduction network that preserves spatiotemporal structure for tubelet-based attention,and localized Transformer layers tuned for on-device inference.To reduce reliance on gloss annotations and mitigate domain shift,we distill semantics from factory-tuned vision-language models and pre-train with masked language modeling and video-text contrastive objectives,aligning visual features with a shared text space.OnML2HP and SHREC’17,theNAS-derived architecture attains 94.7% accuracywith 86ms inference latency and about 5.9W power on Jetson Nano.Under occlusion,lighting shifts,andmotion blur,accuracy remains above 82%.For safetycritical commands,the emergency-stop gesture achieves 72 ms 99th percentile latency with 99.7% fail-safe triggering.Ablation studies confirm the contribution of the spatiotemporal tubelet extractor and text-side pre-training,and we observe gains in translation quality(BLEU-422.33).These results show that Industrial EdgeSign provides accurate,resource-aware,and safety-aligned gesture recognition suitable for deployment in smart factory settings.
基金supported by the National Natural Science Foundation of China(No.52408533)the Natural Science Foundation of Shandong Province(No.ZR2024QE408)+3 种基金the University of Jinan Disciplinary Cross-Convergence Construction Project 2023(XKJC202310)the Municipal and School Integration Development Strategic Project of Jinan City(JNSX2023023)Natural Science Foundation of Tianjin(24JCQNJC00870)Doctoral Fund Support Project of University of Jinan(XRC2563).
文摘Structural displacement monitoring faces significant challenges under complex environmental conditions due to the loss or degradation of target features,making it difficult for traditional methods to ensure high accuracy and robustness.Therefore,this study proposes a structural displacement identification and quantification method that integrates YOLOv8n with an improved edge-orientation gradient-based template matching algorithm.By combining deep learning techniques with traditional template matching methods,the accuracy and robustness of monitoring are enhanced under adverse conditions such as noise and extremely low illumination.Specifically,in the edge-orientation gradient matching stage,the Canny-Devernay sub-pixel edge detection technique and an improved ellipse-fitting method are employed for sub-pixel edge extraction,and a five-level Gaussian pyramid structure is introduced to accelerate the matching speed.Experimental results show that the proposed method achieves high-precision displacement monitoring under sufficient illumination,and it maintains stable target localization and displacement quantification performance under conditions of noise interference and extremely low illumination.Notably,under salt-and-pepper noise interference,although YOLOv8n maintains a high level of localization confidence,the accuracy of gradient matching deteriorates,resulting in a root-mean-square error(RMSE)of 0.035 mm.This finding reveals the differential impact of various noise types on different stages of the algorithm.The proposed method offers a novel technological approach for precise structural displacement monitoring in complex environments.