Kidney transplantation(KT)accounts for nearly three-fourths of organ transplants in India,with living donors contributing to 82%of cases.Induction immunosuppression is essential to optimize initial immunosuppression,r...Kidney transplantation(KT)accounts for nearly three-fourths of organ transplants in India,with living donors contributing to 82%of cases.Induction immunosuppression is essential to optimize initial immunosuppression,reduce acute rejections,and enable tailored use of maintenance agents.Rabbit anti-thymocyte globulin(rATG)and interleukin-2 receptor anatagonists(IL-2RA/IL-2RBs)are the most widely used induction therapies.However,data on induction practices across India are limited.To evaluate induction immunosuppression practices across KT centers in India and establish a consensus for different subsets of KT recipients.A nationwide online survey was conducted by the Indian Society of Organ Transplantation(ISOT)among its members(400 KT centers).Responses were analyzed to assess induction practices across diverse donor types,age groups,and immunological risk profiles.Heterogeneity in practices prompted consensus building using a modified Delphi process.Literature review and expert panel discussions(April 2024)were followed by structured voting,and 16 consensus statements were finalized.Of 400 centers approached,254 participated.rATG was the most commonly used induction therapy,followed by IL-2RBs;alemtuzumab was least used.Significant heterogeneity was observed in type,dose,and duration of induction therapy.Consensus recommendations were framed:rATG for high immunological risk recipients and deceased donor KTs;IL-2RB or low-dose rATG for low immunological risk;rituximab in ABOincompatible KTs;and tailoring based on age,diabetes,donor type,infection risk,and affordability.This first ISOT consensus provides 16 India-specific statements on induction therapy in KT.It emphasizes risk-stratified,evidenceinformed,and context-appropriate induction strategies,supporting standardization of care across the country.展开更多
At present,the emerging solid-phase friction-based additive manufacturing technology,including friction rolling additive man-ufacturing(FRAM),can only manufacture simple single-pass components.In this study,multi-laye...At present,the emerging solid-phase friction-based additive manufacturing technology,including friction rolling additive man-ufacturing(FRAM),can only manufacture simple single-pass components.In this study,multi-layer multi-pass FRAM-deposited alumin-um alloy samples were successfully prepared using a non-shoulder tool head.The material flow behavior and microstructure of the over-lapped zone between adjacent layers and passes during multi-layer multi-pass FRAM deposition were studied using the hybrid 6061 and 5052 aluminum alloys.The results showed that a mechanical interlocking structure was formed between the adjacent layers and the adja-cent passes in the overlapped center area.Repeated friction and rolling of the tool head led to different degrees of lateral flow and plastic deformation of the materials in the overlapped zone,which made the recrystallization degree in the left and right edge zones of the over-lapped zone the highest,followed by the overlapped center zone and the non-overlapped zone.The tensile strength of the overlapped zone exceeded 90%of that of the single-pass deposition sample.It is proved that although there are uneven grooves on the surface of the over-lapping area during multi-layer and multi-pass deposition,they can be filled by the flow of materials during the deposition of the next lay-er,thus ensuring the dense microstructure and excellent mechanical properties of the overlapping area.The multi-layer multi-pass FRAM deposition overcomes the limitation of deposition width and lays the foundation for the future deposition of large-scale high-performance components.展开更多
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ...The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.展开更多
The research and development of new traditional Chinese medicine(TCM)drugs have progressively established a novel system founded on the integration of TCM theory,human experience,and clinical trials(termed the“Three ...The research and development of new traditional Chinese medicine(TCM)drugs have progressively established a novel system founded on the integration of TCM theory,human experience,and clinical trials(termed the“Three Combinations”).However,considering TCM's distinctive features of“syndrome differentiation and treatment”and“multicomponent formulations and complex mechanisms”,current TCM drug development faces challenges such as insufficient understanding of the material basis and the overall mechanism of action and an incomplete evidence chain system.Moreover,significant obstacles persist in gathering human experience data,evaluating clinical efficacy,and controlling the quality of active ingredients,which impede the innovation process in TCM drug development.Network pharmacology,centered on the“network targets”theory,transcends the limitations of the conventional“single target”reductionist research model.It emphasizes the comprehensive effects of disease or syndrome biological networks as targets to elucidate the overall regulatory mechanism of TCM prescriptions.This approach aligns with the holistic perspective of TCM,offering a novel method consistent with TCM's holistic view for investigating the complex mechanisms of TCM and developing new TCM drugs.It is internationally recognized as a“next-generation drug research model”.To advance the research of new tools,methods,and standards for TCM evaluation and to overcome fundamental,critical,and cutting-edge technical challenges in TCM regulation,this consensus aims to explore the characteristics,progress,challenges,applicable pathways,and specific applications of network pharmacology as a new theory,method,and tool in TCM drug development.The goal is to enhance the quality of TCM drug research and development and accelerate the efficiency of developing new TCM products.展开更多
Early correction of childhood malocclusion is timely managing morphological,structural,and functional abnormalities at different dentomaxillofacial developmental stages.The selection of appropriate imaging examination...Early correction of childhood malocclusion is timely managing morphological,structural,and functional abnormalities at different dentomaxillofacial developmental stages.The selection of appropriate imaging examination and comprehensive radiological diagnosis and analysis play an important role in early correction of childhood malocclusion.This expert consensus is a collaborative effort by multidisciplinary experts in dentistry across the nation based on the current clinical evidence,aiming to provide general guidance on appropriate imaging examination selection,comprehensive and accurate imaging assessment for early orthodontic treatment patients.展开更多
Dear Editor,This letter studies output consensus problem of heterogeneous linear multiagent systems over directed graphs. A novel adaptive dynamic event-triggered controller is presented based only on the feedback com...Dear Editor,This letter studies output consensus problem of heterogeneous linear multiagent systems over directed graphs. A novel adaptive dynamic event-triggered controller is presented based only on the feedback combination of the agent's own state and neighbors' output,which can achieve exponential output consensus through intermittent communication. The controller is obtained by solving two linear matrix equations, and Zeno behavior is excluded.展开更多
Dear Editor,This letter studies the bipartite consensus tracking problem for heterogeneous multi-agent systems with actuator faults and a leader's unknown time-varying control input. To handle such a problem, the ...Dear Editor,This letter studies the bipartite consensus tracking problem for heterogeneous multi-agent systems with actuator faults and a leader's unknown time-varying control input. To handle such a problem, the continuous fault-tolerant control protocol via observer design is developed. In addition, it is strictly proved that the multi-agent system driven by the designed controllers can still achieve bipartite consensus tracking after faults occur.展开更多
This paper mainly focuses on the velocity-constrained consensus problem of discrete-time heterogeneous multi-agent systems with nonconvex constraints and arbitrarily switching topologies,where each agent has first-ord...This paper mainly focuses on the velocity-constrained consensus problem of discrete-time heterogeneous multi-agent systems with nonconvex constraints and arbitrarily switching topologies,where each agent has first-order or second-order dynamics.To solve this problem,a distributed algorithm is proposed based on a contraction operator.By employing the properties of the stochastic matrix,it is shown that all agents’position states could converge to a common point and second-order agents’velocity states could remain in corresponding nonconvex constraint sets and converge to zero as long as the joint communication topology has one directed spanning tree.Finally,the numerical simulation results are provided to verify the effectiveness of the proposed algorithms.展开更多
Objective:To develop an expert consensus on subcutaneous injection for allergen-specific immunotherapy.Methods:Relevant domestic and international literature was reviewed,and nursing experts experienced in subcutaneou...Objective:To develop an expert consensus on subcutaneous injection for allergen-specific immunotherapy.Methods:Relevant domestic and international literature was reviewed,and nursing experts experienced in subcutaneous injection of allergen-specific immunotherapy were interviewed to form the initial draft of the consensus.A total of 85 experts from 42 hospitals nationwide were invited to participate the discussions.Through two rounds of expert consultations,adjustments,revisions,and improvements to the initial draft,an online meeting was held to form the final version of the consensus.The content approved by more than 75%of the expert group is retained.Results:The expert consensus includes operational standards for subcutaneous injection of allergen-specific immunotherapy,identification and management of adverse reactions,and health education.Conclusion:The consensus demonstrates strong scientific rigor and practicality,providing guidance for nursing practices in the field of clinical allergology.展开更多
This paper focuses on the problem of leaderfollowing consensus for nonlinear cascaded multi-agent systems.The control strategies for these systems are transformed into successive control problem schemes for lower-orde...This paper focuses on the problem of leaderfollowing consensus for nonlinear cascaded multi-agent systems.The control strategies for these systems are transformed into successive control problem schemes for lower-order error subsystems.A distributed consensus analysis for the corresponding error systems is conducted by employing recursive methods and virtual controllers,accompanied by a series of Lyapunov functions devised throughout the iterative process,which solves the leaderfollowing consensus problem of a class of nonlinear cascaded multi-agent systems.Specific simulation examples illustrate the effectiveness of the proposed control algorithm.展开更多
Traditional Internet of Things(IoT)architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage.To address this issue,blockchain has bee...Traditional Internet of Things(IoT)architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage.To address this issue,blockchain has been advocated for decentralized data management in a tamper-resistance,traceable,and transparent manner.However,a major issue that hinders the integration of blockchain and IoT lies in that,it is rather challenging for resource-constrained IoT devices to perform computation-intensive blockchain consensuses such as Proof-of-Work(PoW).Furthermore,the incentive mechanism of PoW pushes lightweight IoT nodes to aggregate their computing power to increase the possibility of successful block generation.Nevertheless,this eventually leads to the formation of computing power alliances,and significantly compromises the decentralization and security of BlockChain-aided IoT(BC-IoT)networks.To cope with these issues,we propose a lightweight consensus protocol for BC-IoT,called Proof-of-Trusted-Work(PoTW).The goal of the proposed consensus is to disincentivize the centralization of computing power and encourage the independent participation of lightweight IoT nodes in blockchain consensus.First,we put forth an on-chain reputation evaluation rule and a reputation chain for PoTW to enable the verifiability and traceability of nodes’reputations based on their contributions of computing power to the blockchain consensus,and we incorporate the multi-level block generation difficulty as a rewards for nodes to accumulate reputations.Second,we model the block generation process of PoTW and analyze the block throughput using the continuous time Markov chain.Additionally,we define and optimize the relative throughput gain to quantify and maximize the capability of PoTW that suppresses the computing power centralization(i.e.,centralization suppression).Furthermore,we investigate the impact of the computing power of the computing power alliance and the levels of block generation difficulty on the centralization suppression capability of PoTW.Finally,simulation results demonstrate the consistency of the analytical results in terms of block throughput.In particular,the results show that PoTW effectively reduces the block generation proportion of the computing power alliance compared with PoW,while simultaneously improving that of individual lightweight nodes.This indicates that PoTW is capable of suppressing the centralization of computing power to a certain degree.Moreover,as the levels of block generation difficulty in PoTW increase,its centralization suppression capability strengthens.展开更多
The huge impact kinetic energy cannot be quickly dissipated by the energy-absorbing structure and transferred to the other vehicle through the car body structure,which will cause structural damage and threaten the liv...The huge impact kinetic energy cannot be quickly dissipated by the energy-absorbing structure and transferred to the other vehicle through the car body structure,which will cause structural damage and threaten the lives of the occupants.Therefore,it is necessary to understand the laws of energy conversion,dissipation and transfer during train collisions.This study proposes a multi-layer progressive analysis method of energy flow during train collisions,considering the characteristics of the train.In this method,the train collision system is divided into conversion,dissipation,and transfer layers from the perspective of the train,collision interface,and car body structure to analyze the energy conversion,dissipation and transfer characteristics.Taking the collision process of a rail train as an example,a train collision energy transfer path analysis model was established based on power flow theory.The results show that when the maximum mean acceleration of the vehicle meets the standard requirements,the jerk may exceed the allowable limit of the human body,and there is a risk of injury to the occupants of a secondary collision.The decay rate of the collision energy along the direction of train operation reaches 79%.As the collision progresses,the collision energy gradually converges in the structure with holes,and the structure deforms when the gathered energy is greater than the maximum energy the structure can withstand.The proposed method helps to understand the train collision energy flow law and provides theoretical support for the train crashworthiness design in the future.展开更多
Intelligent blockchain is an emerging field that integrates Artificial Intelligence(AI)techniques with blockchain networks,with a particular emphasis on improving the performance of blockchain,especially in cryptocurr...Intelligent blockchain is an emerging field that integrates Artificial Intelligence(AI)techniques with blockchain networks,with a particular emphasis on improving the performance of blockchain,especially in cryptocurrencies exchanges.Meanwhile,arbitrage bots are widely deployed and increasing in intelligent blockchain.These bots exploit the characteristics of cryptocurrencies exchanges to engage in frontrunning,generating substantial profits at the expense of ordinary users.In this paper,we address this issue by proposing a more efficient asynchronous Byzantine ordered consensus protocol,which can be used to prevent arbitrage bots from changing the order of the transactions for profits in intelligent blockchain-based cryptocurrencies.Specifically,we present two signal asynchronous common subset protocols,the more optimal one with only constant time complexity.We implement both our protocol and the optimal existing solution Chronos with Go language in the same environment.The experiment results indicate that our protocols achieve a threefold improvement over Chronos in consensus latency and nearly a tenfold increase in throughput.展开更多
The growing incidence of cyberattacks necessitates a robust and effective Intrusion Detection Systems(IDS)for enhanced network security.While conventional IDSs can be unsuitable for detecting different and emerging at...The growing incidence of cyberattacks necessitates a robust and effective Intrusion Detection Systems(IDS)for enhanced network security.While conventional IDSs can be unsuitable for detecting different and emerging attacks,there is a demand for better techniques to improve detection reliability.This study introduces a new method,the Deep Adaptive Multi-Layer Attention Network(DAMLAN),to boost the result of intrusion detection on network data.Due to its multi-scale attention mechanisms and graph features,DAMLAN aims to address both known and unknown intrusions.The real-world NSL-KDD dataset,a popular choice among IDS researchers,is used to assess the proposed model.There are 67,343 normal samples and 58,630 intrusion attacks in the training set,12,833 normal samples,and 9711 intrusion attacks in the test set.Thus,the proposed DAMLAN method is more effective than the standard models due to the consideration of patterns by the attention layers.The experimental performance of the proposed model demonstrates that it achieves 99.26%training accuracy and 90.68%testing accuracy,with precision reaching 98.54%on the training set and 96.64%on the testing set.The recall and F1 scores again support the model with training set values of 99.90%and 99.21%and testing set values of 86.65%and 91.37%.These results provide a strong basis for the claims made regarding the model’s potential to identify intrusion attacks and affirm its relatively strong overall performance,irrespective of type.Future work would employ more attempts to extend the scalability and applicability of DAMLAN for real-time use in intrusion detection systems.展开更多
Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resour...Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resources,a spectrum sharing policy-based consensus mechanism is proposed in this paper.Firstly,a spectrum sharing algorithm based on graph neural network is designed in the satelliteterrestrial spectrum sharing networks under the underlay model.It avoids high computational overhead of the traditional iterative optimization algorithm when the wireless channel condition and network topology are highly dynamic.Secondly,a consensus mechanism based on spectrum sharing strategy is designed,which converts the traditional meaningless hash problem into the graph neural network training.Miners compete for accounting rights by training a graph neutral network model that meets the spectrum sharing requirement.Finally,the consensus delay,communication and storage overhead of the proposed consensus mechanism are analyzed theoretically.The simulation results show that the proposed consensus mechanism can effectively improve spectrum efficiency with excellent scalability and generalization performance.展开更多
The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper ...The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information.展开更多
In practical engineering construction,multi-layered barriers containing geomembranes are extensively applied to retard the migration of pollutants.However,the associated analytical theory on pollutants diffusion still...In practical engineering construction,multi-layered barriers containing geomembranes are extensively applied to retard the migration of pollutants.However,the associated analytical theory on pollutants diffusion still needs to be further improved.In this work,general analytical solutions are derived for one-dimensional diffusion of degradable organic contaminant(DOC)in the multi-layered media containing geomembranes under a time-varying concentration boundary condition,where the variable substitution and separated variable approaches are employed.These analytical solutions with clear expressions can be used not only to study the diffusion behaviors of DOC in bottom and vertical composite barrier systems,but also to verify other complex numerical models.The proposed general analytical solutions are then fully validated via three comparative analyses,including comparisons with the experimental measurements,an existing analytical solution,and a finite-difference solution.Ultimately,the influences of different factors on the composite cutoff wall’s(CCW,which consists of two soil-bentonite layers and a geomembrane)service performance are investigated through a composite vertical barrier system as the application example.The findings obtained from this investigation can provide scientific guidance for the barrier performance evaluation and the engineering design of CCWs.This application example also exhibits the necessity and effectiveness of the developed analytical solutions.展开更多
Continuous control protocols are extensively utilized in traditional MASs,in which information needs to be transmitted among agents consecutively,therefore resulting in excessive consumption of limited resources.To de...Continuous control protocols are extensively utilized in traditional MASs,in which information needs to be transmitted among agents consecutively,therefore resulting in excessive consumption of limited resources.To decrease the control cost,based on ISC,several LFC problems are investigated for second-order MASs without and with time delay,respectively.Firstly,an intermittent sampled controller is designed,and a sufficient and necessary condition is derived,under which state errors between the leader and all the followers approach zero asymptotically.Considering that time delay is inevitable,a new protocol is proposed to deal with the time-delay situation.The error system’s stability is analyzed using the Schur stability theorem,and sufficient and necessary conditions for LFC are obtained,which are closely associated with the coupling gain,the system parameters,and the network structure.Furthermore,for the case where the current position and velocity information are not available,a distributed protocol is designed that depends only on the sampled position information.The sufficient and necessary conditions for LFC are also given.The results show that second-order MASs can achieve the LFC if and only if the system parameters satisfy the inequalities proposed in the paper.Finally,the correctness of the obtained results is verified by numerical simulations.展开更多
Helicobacter pylori(H.pylori),a widespread gram-negative bacterium that colonizes the stomach,causes chronic gastritis,which may progress to peptic ulcer,mucosa-associated lymphoid tissue lymphoma,and gastric cancer.H...Helicobacter pylori(H.pylori),a widespread gram-negative bacterium that colonizes the stomach,causes chronic gastritis,which may progress to peptic ulcer,mucosa-associated lymphoid tissue lymphoma,and gastric cancer.H.pylori infection affects over 50%of people in developing countries and 10%-20%in developed countries.The Kyoto consensus classifies H.pylori gastritis as an infectious disease in the International Classification of Disease 11th Revision.The Maastricht/Florence consensus recommends treatment for all infected individuals,introducing a shift in the management strategies.The prevalence of H.pylori infection is high in the Middle East,with infection rates of 40%-70%and 85%-90%being reported among children and adults,respectively.The increasing resistance to antibiotics,including macrolides and fluoroquinolones,is a major challenge in the management of H.pylori.Clarithromycin resistance,which is associated with reduced effectiveness of standard triple therapy regimens,leading to higher rates of treatment failure,impacts the eradication rates.This emphasizes the need for routine antibiotic susceptibility testing at the national level,the use of alternative therapies,including new molecular methods,and antibiotic stewardship.An online panel of experts from the Middle East,along with an international expert,developed this consensus to provide comprehensive guidelines on the diagnosis,treatment,prevention,and role of gut microbiota in H.pylori infection,with the goal of improving clinical decision-making and reducing the impact of antibiotic resistance in the region.These guidelines are intended to support healthcare professionals involved in the diagnosis and management of H.pylori,including primary care physicians,gastroenterologists,and other specialists.They may also inform future clinical research aimed at optimizing treatment strategies and addressing regional challenges.展开更多
Objective:To establish consensus on Chinese Herbal Medicine(CHM)for rheumatoid arthritis(RA)among 21 Singaporean experts,this study addressed the lack of CHM clinical practice guidelines(CPGs)in Singapore.Despite adva...Objective:To establish consensus on Chinese Herbal Medicine(CHM)for rheumatoid arthritis(RA)among 21 Singaporean experts,this study addressed the lack of CHM clinical practice guidelines(CPGs)in Singapore.Despite advancements in RA therapies,the disease's progressive nature and high costs of novel treatments worsen disparities in management and outcomes.The initiative aimed to bridge this gap by developing expert-backed recommendations for CHM use in RA care.Methods:The group of experts conducted two rounds of Delphi surveys containing 29 items identified from a literature review.Consensus was defined as≥75%of votes in dichotomized ratings on a fivepoint ordinal scale for recognition.Items that did not reach consensus were discussed in a focus group with four selected experts.Results:Nineteen experts completed both rounds of Delphi surveys.A consensus was reached for 27 items,which encompassed Chinese medicine rationale,pattern differentiation,management,CHM prescription,and co-effectiveness with pharmacological therapy.Collective expert opinions were formed for the two remaining items.All items received a recognition score>3.5.Conclusions:The consensus derived from this study provides a foundation for CHM CPGs for RA in Singapore.However,the findings are limited by the demographic composition of the experts and the representativeness of the patient pool.展开更多
文摘Kidney transplantation(KT)accounts for nearly three-fourths of organ transplants in India,with living donors contributing to 82%of cases.Induction immunosuppression is essential to optimize initial immunosuppression,reduce acute rejections,and enable tailored use of maintenance agents.Rabbit anti-thymocyte globulin(rATG)and interleukin-2 receptor anatagonists(IL-2RA/IL-2RBs)are the most widely used induction therapies.However,data on induction practices across India are limited.To evaluate induction immunosuppression practices across KT centers in India and establish a consensus for different subsets of KT recipients.A nationwide online survey was conducted by the Indian Society of Organ Transplantation(ISOT)among its members(400 KT centers).Responses were analyzed to assess induction practices across diverse donor types,age groups,and immunological risk profiles.Heterogeneity in practices prompted consensus building using a modified Delphi process.Literature review and expert panel discussions(April 2024)were followed by structured voting,and 16 consensus statements were finalized.Of 400 centers approached,254 participated.rATG was the most commonly used induction therapy,followed by IL-2RBs;alemtuzumab was least used.Significant heterogeneity was observed in type,dose,and duration of induction therapy.Consensus recommendations were framed:rATG for high immunological risk recipients and deceased donor KTs;IL-2RB or low-dose rATG for low immunological risk;rituximab in ABOincompatible KTs;and tailoring based on age,diabetes,donor type,infection risk,and affordability.This first ISOT consensus provides 16 India-specific statements on induction therapy in KT.It emphasizes risk-stratified,evidenceinformed,and context-appropriate induction strategies,supporting standardization of care across the country.
基金supported by the National Key Research and Development Program of China(No.2022YFB3404700)the National Natural Science Foundation of China(Nos.52105313 and 52275299)+2 种基金the Research and Development Program of Beijing Municipal Education Commission,China(No.KM202210005036)the Natural Science Foundation of Chongqing,China(No.CSTB2023NSCQ-MSX0701)the National Defense Basic Research Projects of China(No.JCKY2022405C002).
文摘At present,the emerging solid-phase friction-based additive manufacturing technology,including friction rolling additive man-ufacturing(FRAM),can only manufacture simple single-pass components.In this study,multi-layer multi-pass FRAM-deposited alumin-um alloy samples were successfully prepared using a non-shoulder tool head.The material flow behavior and microstructure of the over-lapped zone between adjacent layers and passes during multi-layer multi-pass FRAM deposition were studied using the hybrid 6061 and 5052 aluminum alloys.The results showed that a mechanical interlocking structure was formed between the adjacent layers and the adja-cent passes in the overlapped center area.Repeated friction and rolling of the tool head led to different degrees of lateral flow and plastic deformation of the materials in the overlapped zone,which made the recrystallization degree in the left and right edge zones of the over-lapped zone the highest,followed by the overlapped center zone and the non-overlapped zone.The tensile strength of the overlapped zone exceeded 90%of that of the single-pass deposition sample.It is proved that although there are uneven grooves on the surface of the over-lapping area during multi-layer and multi-pass deposition,they can be filled by the flow of materials during the deposition of the next lay-er,thus ensuring the dense microstructure and excellent mechanical properties of the overlapping area.The multi-layer multi-pass FRAM deposition overcomes the limitation of deposition width and lays the foundation for the future deposition of large-scale high-performance components.
文摘The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.
基金supported by the National Medical Products Administration Commissioned Research Project (No.20211440216)the National Administration of Traditional Chinese Medicine Science and Technology Project (No.GZY-KJS-2024-03)+3 种基金the State Key Laboratory of Drug Regulatory Science Project (No.2023SKLDRS0104)the Basic Research Program Natural Science Fund-Frontier Leading Technology Basic Research Special Project of Jiangsu Province (No.BK20232014)the Programs Foundation for Leading Talents in National Administration of Traditional Chinese Medicine of China“Qihuang scholars”Projectthe Tianjin Administration for Market Regulation Science and Technology Key Projects (No.2022-W35)。
文摘The research and development of new traditional Chinese medicine(TCM)drugs have progressively established a novel system founded on the integration of TCM theory,human experience,and clinical trials(termed the“Three Combinations”).However,considering TCM's distinctive features of“syndrome differentiation and treatment”and“multicomponent formulations and complex mechanisms”,current TCM drug development faces challenges such as insufficient understanding of the material basis and the overall mechanism of action and an incomplete evidence chain system.Moreover,significant obstacles persist in gathering human experience data,evaluating clinical efficacy,and controlling the quality of active ingredients,which impede the innovation process in TCM drug development.Network pharmacology,centered on the“network targets”theory,transcends the limitations of the conventional“single target”reductionist research model.It emphasizes the comprehensive effects of disease or syndrome biological networks as targets to elucidate the overall regulatory mechanism of TCM prescriptions.This approach aligns with the holistic perspective of TCM,offering a novel method consistent with TCM's holistic view for investigating the complex mechanisms of TCM and developing new TCM drugs.It is internationally recognized as a“next-generation drug research model”.To advance the research of new tools,methods,and standards for TCM evaluation and to overcome fundamental,critical,and cutting-edge technical challenges in TCM regulation,this consensus aims to explore the characteristics,progress,challenges,applicable pathways,and specific applications of network pharmacology as a new theory,method,and tool in TCM drug development.The goal is to enhance the quality of TCM drug research and development and accelerate the efficiency of developing new TCM products.
基金supports by the National Natural Science Foundation of China(Nos.82201135)"2015"Cultivation Program for Reserve Talents for Academic Leaders of Nanjing Stomatological School,Medical School of Nanjing University(No.0223A204).
文摘Early correction of childhood malocclusion is timely managing morphological,structural,and functional abnormalities at different dentomaxillofacial developmental stages.The selection of appropriate imaging examination and comprehensive radiological diagnosis and analysis play an important role in early correction of childhood malocclusion.This expert consensus is a collaborative effort by multidisciplinary experts in dentistry across the nation based on the current clinical evidence,aiming to provide general guidance on appropriate imaging examination selection,comprehensive and accurate imaging assessment for early orthodontic treatment patients.
基金supported by the National Science and Technology Innovation 2030-Major Program(2022ZD 0115403)the National Natural Science Foundation of China(61991414)+1 种基金Chongqing Natural Science Foundation(CSTB2023NSCQJQX0018)Beijing Natural Science Foundation(L221005)
文摘Dear Editor,This letter studies output consensus problem of heterogeneous linear multiagent systems over directed graphs. A novel adaptive dynamic event-triggered controller is presented based only on the feedback combination of the agent's own state and neighbors' output,which can achieve exponential output consensus through intermittent communication. The controller is obtained by solving two linear matrix equations, and Zeno behavior is excluded.
基金supported by the National Natural Science Foundation of China(62325304,U22B2046,62073079,62376029)the Jiangsu Provincial Scientific Research Center of Applied Mathematics(BK20233002)the China Postdoctoral Science Foundation(2023M730255,2024T171123)
文摘Dear Editor,This letter studies the bipartite consensus tracking problem for heterogeneous multi-agent systems with actuator faults and a leader's unknown time-varying control input. To handle such a problem, the continuous fault-tolerant control protocol via observer design is developed. In addition, it is strictly proved that the multi-agent system driven by the designed controllers can still achieve bipartite consensus tracking after faults occur.
基金2024 Jiangsu Province Youth Science and Technology Talent Support Project2024 Yancheng Key Research and Development Plan(Social Development)projects,“Research and Application of Multi Agent Offline Distributed Trust Perception Virtual Wireless Sensor Network Algorithm”and“Research and Application of a New Type of Fishery Ship Safety Production Monitoring Equipment”。
文摘This paper mainly focuses on the velocity-constrained consensus problem of discrete-time heterogeneous multi-agent systems with nonconvex constraints and arbitrarily switching topologies,where each agent has first-order or second-order dynamics.To solve this problem,a distributed algorithm is proposed based on a contraction operator.By employing the properties of the stochastic matrix,it is shown that all agents’position states could converge to a common point and second-order agents’velocity states could remain in corresponding nonconvex constraint sets and converge to zero as long as the joint communication topology has one directed spanning tree.Finally,the numerical simulation results are provided to verify the effectiveness of the proposed algorithms.
基金supported by the Peking Union Medical College Hospital Central High-Level Hospital Clinical Research Fund(2022-PUMCH-B-130).
文摘Objective:To develop an expert consensus on subcutaneous injection for allergen-specific immunotherapy.Methods:Relevant domestic and international literature was reviewed,and nursing experts experienced in subcutaneous injection of allergen-specific immunotherapy were interviewed to form the initial draft of the consensus.A total of 85 experts from 42 hospitals nationwide were invited to participate the discussions.Through two rounds of expert consultations,adjustments,revisions,and improvements to the initial draft,an online meeting was held to form the final version of the consensus.The content approved by more than 75%of the expert group is retained.Results:The expert consensus includes operational standards for subcutaneous injection of allergen-specific immunotherapy,identification and management of adverse reactions,and health education.Conclusion:The consensus demonstrates strong scientific rigor and practicality,providing guidance for nursing practices in the field of clinical allergology.
基金National Natural Science Foundation of China(No.12071370)。
文摘This paper focuses on the problem of leaderfollowing consensus for nonlinear cascaded multi-agent systems.The control strategies for these systems are transformed into successive control problem schemes for lower-order error subsystems.A distributed consensus analysis for the corresponding error systems is conducted by employing recursive methods and virtual controllers,accompanied by a series of Lyapunov functions devised throughout the iterative process,which solves the leaderfollowing consensus problem of a class of nonlinear cascaded multi-agent systems.Specific simulation examples illustrate the effectiveness of the proposed control algorithm.
基金supported in part by National Key R&D Program of China(Grant No.2021YFB1714100)in part by the National Natural Science Foundation of China(NSFC)under Grant 62371239+5 种基金in part by the the Program of Science and Technology Cooperation of Nanjing with International/Hong Kong,Macao and Taiwan(Grant No.202401019)in part by the Guangdong Basic and Applied Basic Research Foundation(Grant No.2024A1515012407)in part by the the Research Center for FinTech and Digital-Intelligent Management at Shenzhen University,in part by the National Natural Science Foundation of China under Grant 62271192in part by the Equipment Pre-Research Joint Research Program of Ministry of Education under Grant 8091B032129in part by the Major Science and Technology Projects of Longmen Laboratory under Grant 231100220300 and 231100220200in part by the Central Plains Leading Talent in Scientific and Technological Innovation Program under Grant 244200510048.
文摘Traditional Internet of Things(IoT)architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage.To address this issue,blockchain has been advocated for decentralized data management in a tamper-resistance,traceable,and transparent manner.However,a major issue that hinders the integration of blockchain and IoT lies in that,it is rather challenging for resource-constrained IoT devices to perform computation-intensive blockchain consensuses such as Proof-of-Work(PoW).Furthermore,the incentive mechanism of PoW pushes lightweight IoT nodes to aggregate their computing power to increase the possibility of successful block generation.Nevertheless,this eventually leads to the formation of computing power alliances,and significantly compromises the decentralization and security of BlockChain-aided IoT(BC-IoT)networks.To cope with these issues,we propose a lightweight consensus protocol for BC-IoT,called Proof-of-Trusted-Work(PoTW).The goal of the proposed consensus is to disincentivize the centralization of computing power and encourage the independent participation of lightweight IoT nodes in blockchain consensus.First,we put forth an on-chain reputation evaluation rule and a reputation chain for PoTW to enable the verifiability and traceability of nodes’reputations based on their contributions of computing power to the blockchain consensus,and we incorporate the multi-level block generation difficulty as a rewards for nodes to accumulate reputations.Second,we model the block generation process of PoTW and analyze the block throughput using the continuous time Markov chain.Additionally,we define and optimize the relative throughput gain to quantify and maximize the capability of PoTW that suppresses the computing power centralization(i.e.,centralization suppression).Furthermore,we investigate the impact of the computing power of the computing power alliance and the levels of block generation difficulty on the centralization suppression capability of PoTW.Finally,simulation results demonstrate the consistency of the analytical results in terms of block throughput.In particular,the results show that PoTW effectively reduces the block generation proportion of the computing power alliance compared with PoW,while simultaneously improving that of individual lightweight nodes.This indicates that PoTW is capable of suppressing the centralization of computing power to a certain degree.Moreover,as the levels of block generation difficulty in PoTW increase,its centralization suppression capability strengthens.
基金Supported by the National Natural Science Foundation of China(Grant No.52172409)Postdoctoral Innovation Talents Support Program(Grant No.BX20240298)+1 种基金the Fundamental Research Funds for the Central Universities(Grant No.2682024GF023)Heilongjiang Province Postdoctoral Foundation Project(Grant No.LBH-Z23041).
文摘The huge impact kinetic energy cannot be quickly dissipated by the energy-absorbing structure and transferred to the other vehicle through the car body structure,which will cause structural damage and threaten the lives of the occupants.Therefore,it is necessary to understand the laws of energy conversion,dissipation and transfer during train collisions.This study proposes a multi-layer progressive analysis method of energy flow during train collisions,considering the characteristics of the train.In this method,the train collision system is divided into conversion,dissipation,and transfer layers from the perspective of the train,collision interface,and car body structure to analyze the energy conversion,dissipation and transfer characteristics.Taking the collision process of a rail train as an example,a train collision energy transfer path analysis model was established based on power flow theory.The results show that when the maximum mean acceleration of the vehicle meets the standard requirements,the jerk may exceed the allowable limit of the human body,and there is a risk of injury to the occupants of a secondary collision.The decay rate of the collision energy along the direction of train operation reaches 79%.As the collision progresses,the collision energy gradually converges in the structure with holes,and the structure deforms when the gathered energy is greater than the maximum energy the structure can withstand.The proposed method helps to understand the train collision energy flow law and provides theoretical support for the train crashworthiness design in the future.
基金supported by the National Key R&D Program of China under Grant(2022YFB2702702)in part by the National Natural Science Foundation of China under Grants(62372020,72031001)+1 种基金in part by the Beijing Natural Science Foundation under Grants(L222050)in part by the Fundamental Research Funds for the Central Universities under Grant(YWF-23-L-1032).
文摘Intelligent blockchain is an emerging field that integrates Artificial Intelligence(AI)techniques with blockchain networks,with a particular emphasis on improving the performance of blockchain,especially in cryptocurrencies exchanges.Meanwhile,arbitrage bots are widely deployed and increasing in intelligent blockchain.These bots exploit the characteristics of cryptocurrencies exchanges to engage in frontrunning,generating substantial profits at the expense of ordinary users.In this paper,we address this issue by proposing a more efficient asynchronous Byzantine ordered consensus protocol,which can be used to prevent arbitrage bots from changing the order of the transactions for profits in intelligent blockchain-based cryptocurrencies.Specifically,we present two signal asynchronous common subset protocols,the more optimal one with only constant time complexity.We implement both our protocol and the optimal existing solution Chronos with Go language in the same environment.The experiment results indicate that our protocols achieve a threefold improvement over Chronos in consensus latency and nearly a tenfold increase in throughput.
基金Nourah bint Abdulrahman University for funding this project through the Researchers Supporting Project(PNURSP2025R319)Riyadh,Saudi Arabia and Prince Sultan University for covering the article processing charges(APC)associated with this publication.Special acknowledgement to Automated Systems&Soft Computing Lab(ASSCL),Prince Sultan University,Riyadh,Saudi Arabia.
文摘The growing incidence of cyberattacks necessitates a robust and effective Intrusion Detection Systems(IDS)for enhanced network security.While conventional IDSs can be unsuitable for detecting different and emerging attacks,there is a demand for better techniques to improve detection reliability.This study introduces a new method,the Deep Adaptive Multi-Layer Attention Network(DAMLAN),to boost the result of intrusion detection on network data.Due to its multi-scale attention mechanisms and graph features,DAMLAN aims to address both known and unknown intrusions.The real-world NSL-KDD dataset,a popular choice among IDS researchers,is used to assess the proposed model.There are 67,343 normal samples and 58,630 intrusion attacks in the training set,12,833 normal samples,and 9711 intrusion attacks in the test set.Thus,the proposed DAMLAN method is more effective than the standard models due to the consideration of patterns by the attention layers.The experimental performance of the proposed model demonstrates that it achieves 99.26%training accuracy and 90.68%testing accuracy,with precision reaching 98.54%on the training set and 96.64%on the testing set.The recall and F1 scores again support the model with training set values of 99.90%and 99.21%and testing set values of 86.65%and 91.37%.These results provide a strong basis for the claims made regarding the model’s potential to identify intrusion attacks and affirm its relatively strong overall performance,irrespective of type.Future work would employ more attempts to extend the scalability and applicability of DAMLAN for real-time use in intrusion detection systems.
基金supported in part by the National Natural Science Foundation of China under Grant 62171020.
文摘Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resources,a spectrum sharing policy-based consensus mechanism is proposed in this paper.Firstly,a spectrum sharing algorithm based on graph neural network is designed in the satelliteterrestrial spectrum sharing networks under the underlay model.It avoids high computational overhead of the traditional iterative optimization algorithm when the wireless channel condition and network topology are highly dynamic.Secondly,a consensus mechanism based on spectrum sharing strategy is designed,which converts the traditional meaningless hash problem into the graph neural network training.Miners compete for accounting rights by training a graph neutral network model that meets the spectrum sharing requirement.Finally,the consensus delay,communication and storage overhead of the proposed consensus mechanism are analyzed theoretically.The simulation results show that the proposed consensus mechanism can effectively improve spectrum efficiency with excellent scalability and generalization performance.
基金supported by National Natural Science Foundation of China under Grants 62203045,62433020 and T2293770。
文摘The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information.
基金Project(2023YFC3707800)supported by the National Key Research and Development Program of China。
文摘In practical engineering construction,multi-layered barriers containing geomembranes are extensively applied to retard the migration of pollutants.However,the associated analytical theory on pollutants diffusion still needs to be further improved.In this work,general analytical solutions are derived for one-dimensional diffusion of degradable organic contaminant(DOC)in the multi-layered media containing geomembranes under a time-varying concentration boundary condition,where the variable substitution and separated variable approaches are employed.These analytical solutions with clear expressions can be used not only to study the diffusion behaviors of DOC in bottom and vertical composite barrier systems,but also to verify other complex numerical models.The proposed general analytical solutions are then fully validated via three comparative analyses,including comparisons with the experimental measurements,an existing analytical solution,and a finite-difference solution.Ultimately,the influences of different factors on the composite cutoff wall’s(CCW,which consists of two soil-bentonite layers and a geomembrane)service performance are investigated through a composite vertical barrier system as the application example.The findings obtained from this investigation can provide scientific guidance for the barrier performance evaluation and the engineering design of CCWs.This application example also exhibits the necessity and effectiveness of the developed analytical solutions.
基金supported by the National Natural Science Foundation of China under Grants 62476138 and 42375016.
文摘Continuous control protocols are extensively utilized in traditional MASs,in which information needs to be transmitted among agents consecutively,therefore resulting in excessive consumption of limited resources.To decrease the control cost,based on ISC,several LFC problems are investigated for second-order MASs without and with time delay,respectively.Firstly,an intermittent sampled controller is designed,and a sufficient and necessary condition is derived,under which state errors between the leader and all the followers approach zero asymptotically.Considering that time delay is inevitable,a new protocol is proposed to deal with the time-delay situation.The error system’s stability is analyzed using the Schur stability theorem,and sufficient and necessary conditions for LFC are obtained,which are closely associated with the coupling gain,the system parameters,and the network structure.Furthermore,for the case where the current position and velocity information are not available,a distributed protocol is designed that depends only on the sampled position information.The sufficient and necessary conditions for LFC are also given.The results show that second-order MASs can achieve the LFC if and only if the system parameters satisfy the inequalities proposed in the paper.Finally,the correctness of the obtained results is verified by numerical simulations.
文摘Helicobacter pylori(H.pylori),a widespread gram-negative bacterium that colonizes the stomach,causes chronic gastritis,which may progress to peptic ulcer,mucosa-associated lymphoid tissue lymphoma,and gastric cancer.H.pylori infection affects over 50%of people in developing countries and 10%-20%in developed countries.The Kyoto consensus classifies H.pylori gastritis as an infectious disease in the International Classification of Disease 11th Revision.The Maastricht/Florence consensus recommends treatment for all infected individuals,introducing a shift in the management strategies.The prevalence of H.pylori infection is high in the Middle East,with infection rates of 40%-70%and 85%-90%being reported among children and adults,respectively.The increasing resistance to antibiotics,including macrolides and fluoroquinolones,is a major challenge in the management of H.pylori.Clarithromycin resistance,which is associated with reduced effectiveness of standard triple therapy regimens,leading to higher rates of treatment failure,impacts the eradication rates.This emphasizes the need for routine antibiotic susceptibility testing at the national level,the use of alternative therapies,including new molecular methods,and antibiotic stewardship.An online panel of experts from the Middle East,along with an international expert,developed this consensus to provide comprehensive guidelines on the diagnosis,treatment,prevention,and role of gut microbiota in H.pylori infection,with the goal of improving clinical decision-making and reducing the impact of antibiotic resistance in the region.These guidelines are intended to support healthcare professionals involved in the diagnosis and management of H.pylori,including primary care physicians,gastroenterologists,and other specialists.They may also inform future clinical research aimed at optimizing treatment strategies and addressing regional challenges.
基金supported by the Nanyang Technological University Start-Up Grant(#022387‒00001).
文摘Objective:To establish consensus on Chinese Herbal Medicine(CHM)for rheumatoid arthritis(RA)among 21 Singaporean experts,this study addressed the lack of CHM clinical practice guidelines(CPGs)in Singapore.Despite advancements in RA therapies,the disease's progressive nature and high costs of novel treatments worsen disparities in management and outcomes.The initiative aimed to bridge this gap by developing expert-backed recommendations for CHM use in RA care.Methods:The group of experts conducted two rounds of Delphi surveys containing 29 items identified from a literature review.Consensus was defined as≥75%of votes in dichotomized ratings on a fivepoint ordinal scale for recognition.Items that did not reach consensus were discussed in a focus group with four selected experts.Results:Nineteen experts completed both rounds of Delphi surveys.A consensus was reached for 27 items,which encompassed Chinese medicine rationale,pattern differentiation,management,CHM prescription,and co-effectiveness with pharmacological therapy.Collective expert opinions were formed for the two remaining items.All items received a recognition score>3.5.Conclusions:The consensus derived from this study provides a foundation for CHM CPGs for RA in Singapore.However,the findings are limited by the demographic composition of the experts and the representativeness of the patient pool.