Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the relat...Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage.展开更多
Engineering optimization problems are often characterized by high dimensionality,constraints,and complex,multimodal landscapes.Traditional deterministic methods frequently struggle under such conditions,prompting incr...Engineering optimization problems are often characterized by high dimensionality,constraints,and complex,multimodal landscapes.Traditional deterministic methods frequently struggle under such conditions,prompting increased interest in swarm intelligence algorithms.Among these,the Cuckoo Search(CS)algorithm stands out for its promising global search capabilities.However,it often suffers from premature convergence when tackling complex problems.To address this limitation,this paper proposes a Grouped Dynamic Adaptive CS(GDACS)algorithm.Theenhancements incorporated intoGDACS can be summarized into two key aspects.Firstly,a chaotic map is employed to generate initial solutions,leveraging the inherent randomness of chaotic sequences to ensure a more uniform distribution across the search space and enhance population diversity from the outset.Secondly,Cauchy and Levy strategies replace the standard CS population update.This strategy involves evaluating the fitness of candidate solutions to dynamically group the population based on performance.Different step-size adaptation strategies are then applied to distinct groups,enabling an adaptive search mechanism that balances exploration and exploitation.Experiments were conducted on six benchmark functions and four constrained engineering design problems,and the results indicate that the proposed GDACS achieves good search efficiency and produces more accurate optimization results compared with other state-of-the-art algorithms.展开更多
This paper investigates the challenges of structural inconsistency,matching accuracy degradation,and trajectory interruptions caused by high-speed motion,frequent occlusions,and appearance variations of unmanned aeria...This paper investigates the challenges of structural inconsistency,matching accuracy degradation,and trajectory interruptions caused by high-speed motion,frequent occlusions,and appearance variations of unmanned aerial vehicle(UAV) targets in low-altitude airspace.A novel UAV visual tracking method is proposed for dynamic structural distortions,with a focus on structural consistency modeling to improve system robustness in complex scenarios.Unlike prior methods such as STARK,which rely on spatio-temporal prediction,and KeepTrack,which emphasize template maintenance,our approach enforces structural-level consistency between historical and current features,thereby addressing UAV-specific issues of rapid maneuvering and environmental complexity.The proposed framework features a structure-aware architecture that incorporates dual complementary mechanisms serving as spatial completion and temporal restoration components.First,a multi-scale structure extraction module with adaptive anchor scheduling is developed to dynamically perceive spatial target shape and generate high-quality proposals.Second,a structural memory module is designed to reconstruct local regions by leveraging high-confidence historical structural representations,thereby maintaining spatiotemporal coherence across frames.Furthermore,a structural verification mechanism coupled with a meta-learning-driven re-identification strategy is introduced to detect abrupt structural distortions and adaptively update templates,significantly improving resilience against disturbances.Overall,the main contributions of this paper can be summarized as follows:(1) introducing structural consistency modeling into UAV visual tracking for the first time;(2) designing a unified framework that combines adaptive proposal generation,full-image matching,and re-identification under structural constraints;and(3) achieving state-of-the-art performance on the anti-UAV benchmark,highlighting the method's practical value in real-world UAV surveillance applications.展开更多
The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.H...The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency.展开更多
The operational Tropical Regional Atmospheric Model System(TRAMS)often underestimates initial typhoon intensity when using the global analysis field as the initial condition.The TRAMS tropical cyclone(TC)initializatio...The operational Tropical Regional Atmospheric Model System(TRAMS)often underestimates initial typhoon intensity when using the global analysis field as the initial condition.The TRAMS tropical cyclone(TC)initialization scheme,developed based on the incremental analysis updates(IAU)technique,effectively reduces initial bias.However,the original IAU-based TC initialization scheme only adjusts the wind field at the analysis moment,with other variables adjusted implicitly under the model's constraints according to a gradually inserted wind increment(named“univariate adjustment scheme”hereafter).The univariate adjustment scheme requires approximately 3 h to reach a dynamic equilibrium state,which constrains the assimilation of hourly TC observations and causes excessive dissipation of meaningful short-wave information in adjustment increments.To address this limitation,this study develops a multivariate adjustment IAU-based TC initialization scheme that incorporates gradient wind balance and hydrostatic balance as its largescale constraints.Numerical experiments with TC Hato(2017)demonstrate that the multivariate adjustment scheme reduces the IAU relaxation time to 1 h while marginally improving forecast skill.These findings are consistently replicated across 12 additional TC cases.The development of the IAU-based multivariate adjustment initialization scheme establishes a foundation for 4-D initialization using hourly TC observations.展开更多
In erasure-coded storage systems,updating data requires parity maintenance,which often leads to significant I/O amplification due to“write-after-read”operations.Furthermore,scattered parity placement increases disk ...In erasure-coded storage systems,updating data requires parity maintenance,which often leads to significant I/O amplification due to“write-after-read”operations.Furthermore,scattered parity placement increases disk seek overhead during repair,resulting in degraded system performance.To address these challenges,this paper proposes a Cognitive Update and Repair Method(CURM)that leverages machine learning to classify files into writeonly,read-only,and read-write categories,enabling tailored update and repair strategies.For write-only and read-write files,CURM employs a data-differencemechanism combined with fine-grained I/O scheduling to minimize redundant read operations and mitigate I/O amplification.For read-write files,CURM further reserves adjacent disk space near parity blocks,supporting parallel reads and reducing disk seek overhead during repair.We implement CURM in a prototype system,Cognitive Update and Repair File System(CURFS),and conduct extensive experiments using realworld Network File System(NFS)and Microsoft Research(MSR)workloads on a 25-node cluster.Experimental results demonstrate that CURMimproves data update throughput by up to 82.52%,reduces recovery time by up to 47.47%,and decreases long-term storage overhead by more than 15% compared to state-of-the-art methods including Full Logging(FL),ParityLogging(PL),ParityLoggingwithReservedspace(PLR),andPARIX.These results validate the effectiveness of CURM in enhancing both update and repair performance,providing a scalable and efficient solution for large-scale erasure-coded storage systems.展开更多
The original online version of this article was revised:The layout update for Article 758 has impacted the page range in the published issue,but did not affect the scholarly content.To ensure consistency with the orig...The original online version of this article was revised:The layout update for Article 758 has impacted the page range in the published issue,but did not affect the scholarly content.To ensure consistency with the originally assigned pages(2595-2614),we will need to publish an erratum to correct the article and restore the original page range.The original article has been corrected.展开更多
Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there ar...Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there are seldom schemes supporting both updatable block-level deduplication and public auditing. In this paper, an updatable block-level deduplication scheme with efficient auditing is proposed based on a tree-based authenticated structure. In the proposed scheme, the cloud server(CS) can perform block-level deduplication, and the TPA achieves integrity auditing tasks. When a data block is updated, the ciphertext and auditing tags could be updated efficiently. The security analysis demonstrates that the proposed scheme can achieve privacy under chosen distribution attacks in secure deduplication and resist uncheatable chosen distribution attacks(UNC-CDA) in proof of ownership(PoW). Furthermore, the integrity auditing process is proven secure under adaptive chosen-message attacks. Compared with previous relevant schemes, the proposed scheme achieves better functionality and higher efficiency.展开更多
Colorectal cancer(CRC)is the most frequently diagnosed malignancy of the digestive system and the second leading cause of cancer-related deaths worldwide(1).In China,CRC ranks as the second most common cancer with inc...Colorectal cancer(CRC)is the most frequently diagnosed malignancy of the digestive system and the second leading cause of cancer-related deaths worldwide(1).In China,CRC ranks as the second most common cancer with incidence and mortality rates continuing to rise(2).The Chinese Society of Clinical Oncology(CSCO)first introduced its guidelines in 2017,and since then,they have been updated annually to incorporate the latest clinical research findings,drug availability,and expert consensus(3-8).This article presents the key updates in the 2025 edition compared to the 2024 version.展开更多
In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilizati...In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries.展开更多
Prediction of stability in SG(Smart Grid)is essential in maintaining consistency and reliability of power supply in grid infrastructure.Analyzing the fluctuations in power generation and consumption patterns of smart ...Prediction of stability in SG(Smart Grid)is essential in maintaining consistency and reliability of power supply in grid infrastructure.Analyzing the fluctuations in power generation and consumption patterns of smart cities assists in effectively managing continuous power supply in the grid.It also possesses a better impact on averting overloading and permitting effective energy storage.Even though many traditional techniques have predicted the consumption rate for preserving stability,enhancement is required in prediction measures with minimized loss.To overcome the complications in existing studies,this paper intends to predict stability from the smart grid stability prediction dataset using machine learning algorithms.To accomplish this,pre-processing is performed initially to handle missing values since it develops biased models when missing values are mishandled and performs feature scaling to normalize independent data features.Then,the pre-processed data are taken for training and testing.Following that,the regression process is performed using Modified PSO(Particle Swarm Optimization)optimized XGBoost Technique with dynamic inertia weight update,which analyses variables like gamma(G),reaction time(tau1–tau4),and power balance(p1–p4)for providing effective future stability in SG.Since PSO attains optimal solution by adjusting position through dynamic inertial weights,it is integrated with XGBoost due to its scalability and faster computational speed characteristics.The hyperparameters of XGBoost are fine-tuned in the training process for achieving promising outcomes on prediction.Regression results are measured through evaluation metrics such as MSE(Mean Square Error)of 0.011312781,MAE(Mean Absolute Error)of 0.008596322,and RMSE(Root Mean Square Error)of 0.010636156 and MAPE(Mean Absolute Percentage Error)value of 0.0052 which determine the efficacy of the system.展开更多
With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly increased.However,traditional collaboration tools primarily rely on access control,leaving data stored on cloud...With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly increased.However,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulnerable due to insufficient encryption.This paper introduces a novel mechanism that encrypts data in‘bundle’units,designed to meet the dual requirements of efficiency and security for frequently updated collaborative data.Each bundle includes updated information,allowing only the updated portions to be reencrypted when changes occur.The encryption method proposed in this paper addresses the inefficiencies of traditional encryption modes,such as Cipher Block Chaining(CBC)and Counter(CTR),which require decrypting and re-encrypting the entire dataset whenever updates occur.The proposed method leverages update-specific information embedded within data bundles and metadata that maps the relationship between these bundles and the plaintext data.By utilizing this information,the method accurately identifies the modified portions and applies algorithms to selectively re-encrypt only those sections.This approach significantly enhances the efficiency of data updates while maintaining high performance,particularly in large-scale data environments.To validate this approach,we conducted experiments measuring execution time as both the size of the modified data and the total dataset size varied.Results show that the proposed method significantly outperforms CBC and CTR modes in execution speed,with greater performance gains as data size increases.Additionally,our security evaluation confirms that this method provides robust protection against both passive and active attacks.展开更多
Based on available records,a comprehensive overview of the biodiversity and geographical distribution of Collembola in China is presented.A total of 735 species,155 genera and 20 families were recorded in the checklis...Based on available records,a comprehensive overview of the biodiversity and geographical distribution of Collembola in China is presented.A total of 735 species,155 genera and 20 families were recorded in the checklist,including current name information,synonyms,geographical records,and bibliographic references.Taxonomic notes were added where necessary and Chinese translations were provided for genera and families.The following new combinations are proposed:Rambutsinella grinnellia(Wang,Chen&Christiansen,2004)comb.nov.for Pseudosinella grinnellia Wang,Chen&Christiansen 2004;Rambutsinella hui(Wang,Chen&Christiansen,2003)comb.nov.for Pseudosinella hui Wang,Chen&Christiansen 2003;and Rambutsinella tridentifera(Rusek,1971)comb.nov.for Pseudosinella tridentifera Rusek 1971.In addition,certain species have been merged with their synonyms.This checklist includes articles published up to August 2023.展开更多
Declaration of Competing Interest statements is updated in the published version of the following articles that appeared in issues of Resources Chemicals and Materials.The appropriate updated Declaration of Competing ...Declaration of Competing Interest statements is updated in the published version of the following articles that appeared in issues of Resources Chemicals and Materials.The appropriate updated Declaration of Competing Interest state-ments,provided by the Authors,are included below.展开更多
Persistent and maladaptive drug-related memories represent a key component in drug addiction.Converging evidence from both preclinical and clinical studies has demonstrated the potential efficacy of the memory reconso...Persistent and maladaptive drug-related memories represent a key component in drug addiction.Converging evidence from both preclinical and clinical studies has demonstrated the potential efficacy of the memory reconsolidation updating procedure(MRUP),a non-pharmacological strategy intertwining two distinct memory processes:reconsolidation and extinction—alternatively termed“the memory retrieval-extinction procedure”.This procedure presents a promising approach to attenuate,if not erase,entrenched drug memories and prevent relapse.The present review delineates the applications,molecular underpinnings,and operational boundaries of MRUP in the context of various forms of substance dependence.Furthermore,we critically examine the methodological limitations of MRUP,postulating potential refinement to optimize its therapeutic efficacy.In addition,we also look at the potential integration of MRUP and neurostimulation treatments in the domain of substance addiction.Overall,existing studies underscore the significant potential of MRUP,suggesting that interventions predicated on it could herald a promising avenue to enhance clinical outcomes in substance addiction therapy.展开更多
Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extrac...Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extraction and model construction.Firstly,the convolutional neural network(CNN)features of the face are extracted by the trained deep learning network.Next,the steady-state and dynamic classifiers for face recognition are constructed based on the CNN features and Haar features respectively,with two-stage sparse representation introduced in the process of constructing the steady-state classifier and the feature templates with high reliability are dynamically selected as alternative templates from the sparse representation template dictionary constructed using the CNN features.Finally,the results of face recognition are given based on the classification results of the steady-state classifier and the dynamic classifier together.Based on this,the feature weights of the steady-state classifier template are adjusted in real time and the dictionary set is dynamically updated to reduce the probability of irrelevant features entering the dictionary set.The average recognition accuracy of this method is 94.45%on the CMU PIE face database and 96.58%on the AR face database,which is significantly improved compared with that of the traditional face recognition methods.展开更多
Structural damage detection is hard to conduct in large-scale civil structures due to enormous structural data and insufficient damage features.To improve this situation,a damage detection method based on model reduct...Structural damage detection is hard to conduct in large-scale civil structures due to enormous structural data and insufficient damage features.To improve this situation,a damage detection method based on model reduction and response reconstruction is presented.Based on the framework of two-step model updating including substructure-level localization and element-level detection,the response reconstruction strategy with an improved sensitivity algorithm is presented to conveniently complement modal information and promote the reliability of model updating.In the iteration process,the reconstructed response is involved in the sensitivity algorithm as a reconstruction-related item.Besides,model reduction is applied to reduce computational degrees of freedom(DOFs)in each detection step.A numerical truss bridge is modelled to vindicate the effectiveness and efficiency of the method.The results showed that the presented method reduces the requirement for installed sensors while improving efficiency and ensuring accuracy of damage detection compared to traditional methods.展开更多
The assimilation of dual-polarization(dual-pol)radar data plays a crucial role in enhancing the simulation of hydrometeors and improving the short-term precipitation forecasts of numerical weather prediction(NWP)model...The assimilation of dual-polarization(dual-pol)radar data plays a crucial role in enhancing the simulation of hydrometeors and improving the short-term precipitation forecasts of numerical weather prediction(NWP)models.However,existing dual-pol radar data assimilation(DA)methods exhibit limitations in terms of computational efficiency and data utilization.In this study,a new dual-pol radar DA approach is developed that utilizes a UNet-based model to retrieve mixing ratio information for four hydrometeor species from dual-pol radar data.The validation results for the UNet-based model indicate that the distributions of the retrieved hydrometeor mixing ratios provided by the model align well with the labeled data,yielding a reasonable range of root mean square errors(RMSEs).On this basis,the hydrometeor analysis increments retrieved by the UNet-based model are incorporated into the model integration process through the incremental analysis update(IAU)scheme,establishing a complete dual-pol radar DA framework for the CMA-MESO model.To evaluate the efficacy of this DA scheme,comparative simulation experiments were conducted for Typhoon Lekima(2019).Verification results indicate that using the hydrometeor DA scheme generally improves the threat scores(TSs)for 3-hour accumulated precipitation during medium-and heavy-rainfall events.Additionally,the 24-hour accumulated rainfall TSs for the medium-,heavy-,and extreme-precipitation categories in the DA experiment are all superior to those in the control experiment.The DA method also yields superior predictions of the spatial distribution of extremerainfall events.These results demonstrate that the proposed dual-pol radar DA approach effectively enhances the precipitation forecasting capabilities of numerical weather models.展开更多
Current damage detection methods based on model updating and sensitivity Jacobian matrixes show a low convergence ratio and computational efficiency for online calculations.The aim of this paper is to construct a real...Current damage detection methods based on model updating and sensitivity Jacobian matrixes show a low convergence ratio and computational efficiency for online calculations.The aim of this paper is to construct a real-time automated damage detection method by developing a theory-assisted adaptive mutiagent twin delayed deep deterministic(TA2-MATD3)policy gradient algorithm.First,the theoretical framework of reinforcement-learning-driven damage detection is established.To address the disadvantages of traditional mutiagent twin delayed deep deterministic(MATD3)method,the theory-assisted mechanism and the adaptive experience playback mechanism are introduced.Moreover,a historical residential house built in 1889 was taken as an example,using its 12-month structural health monitoring data.TA2-MATD3 was compared with existing damage detection methods in terms of the convergence ratio,online computing efficiency,and damage detection accuracy.The results show that the computational efficiency of TA2-MATD3 is approximately 117–160 times that of the traditional methods.The convergence ratio of damage detection on the training set is approximately 97%,and that on the test set is in the range of 86.2%–91.9%.In addition,the main apparent damages found in the field survey were identified by TA2-MATD3.The results indicate that the proposed method can significantly improve the online computing efficiency and damage detection accuracy.This research can provide novel perspectives for the use of reinforcement learning methods to conduct damage detection in online structural health monitoring.展开更多
Land subsidence significantly impacts the accuracy of the National Elevation Datum in China.In order to solve this issue,a dynamic and economical way was proposed to update the National Elevation Datum with the assist...Land subsidence significantly impacts the accuracy of the National Elevation Datum in China.In order to solve this issue,a dynamic and economical way was proposed to update the National Elevation Datum with the assistance of InSAR in the North China Plain,which served as the research area.Moreover,the GNSS result was used to correct the InSAR result for the vertical deformation field,which has a relatively unified deformation reference.By integrating the vertical deformation field with the national elevation control point,an analysis and evaluation of changes in the National Elevation Datum were conducted.In addition,a regional remeasurement scheme was formulated to achieve dynamic updates and mainte-nance of the National Elevation Datum on a regional scale.Through data acquisition and processing,we successfully improved reliability within the main subsidence areas for future use.As a result,updating the elevation values utilize a regional update method,and a dynamic and economical technical process to update the National Elevation Datum is shown in the study.展开更多
基金This work was supported by the National Key Research and Development Program of China under Grant No. 2017YFt30802000, the National Natural Science Foundation of China under Grant Nos. 61802241, 61772326, 61572303, 61872229, 61802242, and 61602290, the National Natural Science Foundation of China for International Young Scientists under Grant No. 61750110528, the National Cryp-tographv Development Fund during the 13th Five-Year Plan Period of China under Grant Nos. MMJJ20170216 and MMJJ20180217, the Foundation of State Key Laboratory of Information Security of China under Grant No. 2017-MS-03, and the Fundamental Re- search Funds for the Central Universities of China under Grant Nos. GK201603084, GK201702004, GK201603092, GK201603093, and GK201703062.
文摘Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage.
基金supported in part by the Ministry of Higher Education Malaysia(MOHE)through Fundamental Research Grant Scheme(FRGS)Ref:FRGS/1/2024/ICT02/UTM/02/10,Vot.No:R.J130000.7828.5F748the Scientific Research Project of Education Department of Hunan Province(Nos.22B1046 and 24A0771).
文摘Engineering optimization problems are often characterized by high dimensionality,constraints,and complex,multimodal landscapes.Traditional deterministic methods frequently struggle under such conditions,prompting increased interest in swarm intelligence algorithms.Among these,the Cuckoo Search(CS)algorithm stands out for its promising global search capabilities.However,it often suffers from premature convergence when tackling complex problems.To address this limitation,this paper proposes a Grouped Dynamic Adaptive CS(GDACS)algorithm.Theenhancements incorporated intoGDACS can be summarized into two key aspects.Firstly,a chaotic map is employed to generate initial solutions,leveraging the inherent randomness of chaotic sequences to ensure a more uniform distribution across the search space and enhance population diversity from the outset.Secondly,Cauchy and Levy strategies replace the standard CS population update.This strategy involves evaluating the fitness of candidate solutions to dynamically group the population based on performance.Different step-size adaptation strategies are then applied to distinct groups,enabling an adaptive search mechanism that balances exploration and exploitation.Experiments were conducted on six benchmark functions and four constrained engineering design problems,and the results indicate that the proposed GDACS achieves good search efficiency and produces more accurate optimization results compared with other state-of-the-art algorithms.
基金Supported by the National Science Foundation of China (No.62571164)the Natural Science Foundation of Heilongjiang Province (No.PL2024F025)the Fundamental Scientific Research Funds of Heilongjiang Province (No.2022-KYYWF-1050)。
文摘This paper investigates the challenges of structural inconsistency,matching accuracy degradation,and trajectory interruptions caused by high-speed motion,frequent occlusions,and appearance variations of unmanned aerial vehicle(UAV) targets in low-altitude airspace.A novel UAV visual tracking method is proposed for dynamic structural distortions,with a focus on structural consistency modeling to improve system robustness in complex scenarios.Unlike prior methods such as STARK,which rely on spatio-temporal prediction,and KeepTrack,which emphasize template maintenance,our approach enforces structural-level consistency between historical and current features,thereby addressing UAV-specific issues of rapid maneuvering and environmental complexity.The proposed framework features a structure-aware architecture that incorporates dual complementary mechanisms serving as spatial completion and temporal restoration components.First,a multi-scale structure extraction module with adaptive anchor scheduling is developed to dynamically perceive spatial target shape and generate high-quality proposals.Second,a structural memory module is designed to reconstruct local regions by leveraging high-confidence historical structural representations,thereby maintaining spatiotemporal coherence across frames.Furthermore,a structural verification mechanism coupled with a meta-learning-driven re-identification strategy is introduced to detect abrupt structural distortions and adaptively update templates,significantly improving resilience against disturbances.Overall,the main contributions of this paper can be summarized as follows:(1) introducing structural consistency modeling into UAV visual tracking for the first time;(2) designing a unified framework that combines adaptive proposal generation,full-image matching,and re-identification under structural constraints;and(3) achieving state-of-the-art performance on the anti-UAV benchmark,highlighting the method's practical value in real-world UAV surveillance applications.
基金supported by the National Key Research and Development Program of China under Grant 2022YFB2901501in part by the Science and Technology Innovation leading Talents Subsidy Project of Central Plains under Grant 244200510038.
文摘The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency.
基金supported by the National University of Defense Technology(NUDT)Research Initiation Funding for High-Level Scientific and Technological Innovative Talents(202402-YJRC-LJ-001)the National Natural Science Foundation of China(Grant No.U2142213)+1 种基金the Basic and Applied Basic Research Foundation of Guangdong Province(Grants 2025A1515011835,2022A1515011870)the National Natural Science Foundation of China(Grant No.42305167)。
文摘The operational Tropical Regional Atmospheric Model System(TRAMS)often underestimates initial typhoon intensity when using the global analysis field as the initial condition.The TRAMS tropical cyclone(TC)initialization scheme,developed based on the incremental analysis updates(IAU)technique,effectively reduces initial bias.However,the original IAU-based TC initialization scheme only adjusts the wind field at the analysis moment,with other variables adjusted implicitly under the model's constraints according to a gradually inserted wind increment(named“univariate adjustment scheme”hereafter).The univariate adjustment scheme requires approximately 3 h to reach a dynamic equilibrium state,which constrains the assimilation of hourly TC observations and causes excessive dissipation of meaningful short-wave information in adjustment increments.To address this limitation,this study develops a multivariate adjustment IAU-based TC initialization scheme that incorporates gradient wind balance and hydrostatic balance as its largescale constraints.Numerical experiments with TC Hato(2017)demonstrate that the multivariate adjustment scheme reduces the IAU relaxation time to 1 h while marginally improving forecast skill.These findings are consistently replicated across 12 additional TC cases.The development of the IAU-based multivariate adjustment initialization scheme establishes a foundation for 4-D initialization using hourly TC observations.
基金supported by the National Natural Science Foundation of China(Grant No.62362019)the Natural Science Foundation of Hainan Province(Grant No.624RC482)the Hainan Provincial Higher Education Teaching Reform Research Project(Grant Hnjg2024-27).
文摘In erasure-coded storage systems,updating data requires parity maintenance,which often leads to significant I/O amplification due to“write-after-read”operations.Furthermore,scattered parity placement increases disk seek overhead during repair,resulting in degraded system performance.To address these challenges,this paper proposes a Cognitive Update and Repair Method(CURM)that leverages machine learning to classify files into writeonly,read-only,and read-write categories,enabling tailored update and repair strategies.For write-only and read-write files,CURM employs a data-differencemechanism combined with fine-grained I/O scheduling to minimize redundant read operations and mitigate I/O amplification.For read-write files,CURM further reserves adjacent disk space near parity blocks,supporting parallel reads and reducing disk seek overhead during repair.We implement CURM in a prototype system,Cognitive Update and Repair File System(CURFS),and conduct extensive experiments using realworld Network File System(NFS)and Microsoft Research(MSR)workloads on a 25-node cluster.Experimental results demonstrate that CURMimproves data update throughput by up to 82.52%,reduces recovery time by up to 47.47%,and decreases long-term storage overhead by more than 15% compared to state-of-the-art methods including Full Logging(FL),ParityLogging(PL),ParityLoggingwithReservedspace(PLR),andPARIX.These results validate the effectiveness of CURM in enhancing both update and repair performance,providing a scalable and efficient solution for large-scale erasure-coded storage systems.
文摘The original online version of this article was revised:The layout update for Article 758 has impacted the page range in the published issue,but did not affect the scholarly content.To ensure consistency with the originally assigned pages(2595-2614),we will need to publish an erratum to correct the article and restore the original page range.The original article has been corrected.
基金supported by the Doctoral Foundation in Henan University of Technology (31401152)
文摘Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there are seldom schemes supporting both updatable block-level deduplication and public auditing. In this paper, an updatable block-level deduplication scheme with efficient auditing is proposed based on a tree-based authenticated structure. In the proposed scheme, the cloud server(CS) can perform block-level deduplication, and the TPA achieves integrity auditing tasks. When a data block is updated, the ciphertext and auditing tags could be updated efficiently. The security analysis demonstrates that the proposed scheme can achieve privacy under chosen distribution attacks in secure deduplication and resist uncheatable chosen distribution attacks(UNC-CDA) in proof of ownership(PoW). Furthermore, the integrity auditing process is proven secure under adaptive chosen-message attacks. Compared with previous relevant schemes, the proposed scheme achieves better functionality and higher efficiency.
基金supported by the National Natural Science Foundation of China(No.82373415)Beijing Xisike Clinical Oncology Research Foundation(No.Ytongshu2021/ms-0003)。
文摘Colorectal cancer(CRC)is the most frequently diagnosed malignancy of the digestive system and the second leading cause of cancer-related deaths worldwide(1).In China,CRC ranks as the second most common cancer with incidence and mortality rates continuing to rise(2).The Chinese Society of Clinical Oncology(CSCO)first introduced its guidelines in 2017,and since then,they have been updated annually to incorporate the latest clinical research findings,drug availability,and expert consensus(3-8).This article presents the key updates in the 2025 edition compared to the 2024 version.
文摘In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries.
基金Prince Sattam bin Abdulaziz University project number(PSAU/2023/R/1445)。
文摘Prediction of stability in SG(Smart Grid)is essential in maintaining consistency and reliability of power supply in grid infrastructure.Analyzing the fluctuations in power generation and consumption patterns of smart cities assists in effectively managing continuous power supply in the grid.It also possesses a better impact on averting overloading and permitting effective energy storage.Even though many traditional techniques have predicted the consumption rate for preserving stability,enhancement is required in prediction measures with minimized loss.To overcome the complications in existing studies,this paper intends to predict stability from the smart grid stability prediction dataset using machine learning algorithms.To accomplish this,pre-processing is performed initially to handle missing values since it develops biased models when missing values are mishandled and performs feature scaling to normalize independent data features.Then,the pre-processed data are taken for training and testing.Following that,the regression process is performed using Modified PSO(Particle Swarm Optimization)optimized XGBoost Technique with dynamic inertia weight update,which analyses variables like gamma(G),reaction time(tau1–tau4),and power balance(p1–p4)for providing effective future stability in SG.Since PSO attains optimal solution by adjusting position through dynamic inertial weights,it is integrated with XGBoost due to its scalability and faster computational speed characteristics.The hyperparameters of XGBoost are fine-tuned in the training process for achieving promising outcomes on prediction.Regression results are measured through evaluation metrics such as MSE(Mean Square Error)of 0.011312781,MAE(Mean Absolute Error)of 0.008596322,and RMSE(Root Mean Square Error)of 0.010636156 and MAPE(Mean Absolute Percentage Error)value of 0.0052 which determine the efficacy of the system.
基金supported by the Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(RS-2024-00399401,Development of Quantum-Safe Infrastructure Migration and Quantum Security Verification Technologies).
文摘With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly increased.However,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulnerable due to insufficient encryption.This paper introduces a novel mechanism that encrypts data in‘bundle’units,designed to meet the dual requirements of efficiency and security for frequently updated collaborative data.Each bundle includes updated information,allowing only the updated portions to be reencrypted when changes occur.The encryption method proposed in this paper addresses the inefficiencies of traditional encryption modes,such as Cipher Block Chaining(CBC)and Counter(CTR),which require decrypting and re-encrypting the entire dataset whenever updates occur.The proposed method leverages update-specific information embedded within data bundles and metadata that maps the relationship between these bundles and the plaintext data.By utilizing this information,the method accurately identifies the modified portions and applies algorithms to selectively re-encrypt only those sections.This approach significantly enhances the efficiency of data updates while maintaining high performance,particularly in large-scale data environments.To validate this approach,we conducted experiments measuring execution time as both the size of the modified data and the total dataset size varied.Results show that the proposed method significantly outperforms CBC and CTR modes in execution speed,with greater performance gains as data size increases.Additionally,our security evaluation confirms that this method provides robust protection against both passive and active attacks.
基金supported by the National Science and Technology Fundamental Resources Investigation Program of China(2018FY100300)National Natural Science Foundation of China(31970434 and 32270470)。
文摘Based on available records,a comprehensive overview of the biodiversity and geographical distribution of Collembola in China is presented.A total of 735 species,155 genera and 20 families were recorded in the checklist,including current name information,synonyms,geographical records,and bibliographic references.Taxonomic notes were added where necessary and Chinese translations were provided for genera and families.The following new combinations are proposed:Rambutsinella grinnellia(Wang,Chen&Christiansen,2004)comb.nov.for Pseudosinella grinnellia Wang,Chen&Christiansen 2004;Rambutsinella hui(Wang,Chen&Christiansen,2003)comb.nov.for Pseudosinella hui Wang,Chen&Christiansen 2003;and Rambutsinella tridentifera(Rusek,1971)comb.nov.for Pseudosinella tridentifera Rusek 1971.In addition,certain species have been merged with their synonyms.This checklist includes articles published up to August 2023.
文摘Declaration of Competing Interest statements is updated in the published version of the following articles that appeared in issues of Resources Chemicals and Materials.The appropriate updated Declaration of Competing Interest state-ments,provided by the Authors,are included below.
基金supported by the National Natural Science Foundation of China(82071498,81871046,and 32161143022)STI2030-Major Projects(2022ZD0214500).
文摘Persistent and maladaptive drug-related memories represent a key component in drug addiction.Converging evidence from both preclinical and clinical studies has demonstrated the potential efficacy of the memory reconsolidation updating procedure(MRUP),a non-pharmacological strategy intertwining two distinct memory processes:reconsolidation and extinction—alternatively termed“the memory retrieval-extinction procedure”.This procedure presents a promising approach to attenuate,if not erase,entrenched drug memories and prevent relapse.The present review delineates the applications,molecular underpinnings,and operational boundaries of MRUP in the context of various forms of substance dependence.Furthermore,we critically examine the methodological limitations of MRUP,postulating potential refinement to optimize its therapeutic efficacy.In addition,we also look at the potential integration of MRUP and neurostimulation treatments in the domain of substance addiction.Overall,existing studies underscore the significant potential of MRUP,suggesting that interventions predicated on it could herald a promising avenue to enhance clinical outcomes in substance addiction therapy.
基金the financial support from Natural Science Foundation of Gansu Province(Nos.22JR5RA217,22JR5RA216)Lanzhou Science and Technology Program(No.2022-2-111)+1 种基金Lanzhou University of Arts and Sciences School Innovation Fund Project(No.XJ2022000103)Lanzhou College of Arts and Sciences 2023 Talent Cultivation Quality Improvement Project(No.2023-ZL-jxzz-03)。
文摘Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extraction and model construction.Firstly,the convolutional neural network(CNN)features of the face are extracted by the trained deep learning network.Next,the steady-state and dynamic classifiers for face recognition are constructed based on the CNN features and Haar features respectively,with two-stage sparse representation introduced in the process of constructing the steady-state classifier and the feature templates with high reliability are dynamically selected as alternative templates from the sparse representation template dictionary constructed using the CNN features.Finally,the results of face recognition are given based on the classification results of the steady-state classifier and the dynamic classifier together.Based on this,the feature weights of the steady-state classifier template are adjusted in real time and the dictionary set is dynamically updated to reduce the probability of irrelevant features entering the dictionary set.The average recognition accuracy of this method is 94.45%on the CMU PIE face database and 96.58%on the AR face database,which is significantly improved compared with that of the traditional face recognition methods.
基金Projects(51925808,52078504)supported by the National Natural Science Foundation of ChinaProject(2022JJ10082)supported by the Natural Science Fund for Distinguished Young Scholar of Hunan Province,ChinaProject(2021RC3016)supported by the Science and Technology Innovation Program of Hunan Province,China。
文摘Structural damage detection is hard to conduct in large-scale civil structures due to enormous structural data and insufficient damage features.To improve this situation,a damage detection method based on model reduction and response reconstruction is presented.Based on the framework of two-step model updating including substructure-level localization and element-level detection,the response reconstruction strategy with an improved sensitivity algorithm is presented to conveniently complement modal information and promote the reliability of model updating.In the iteration process,the reconstructed response is involved in the sensitivity algorithm as a reconstruction-related item.Besides,model reduction is applied to reduce computational degrees of freedom(DOFs)in each detection step.A numerical truss bridge is modelled to vindicate the effectiveness and efficiency of the method.The results showed that the presented method reduces the requirement for installed sensors while improving efficiency and ensuring accuracy of damage detection compared to traditional methods.
基金Major Key Project of PCL(PCL2025A10)Open Research Project of the China Meteorological Administration Hydro-Meteorology Key Laboratory(23SWQXM036)+2 种基金National Natural Science Foundation of China(42375160)Project of the Key Laboratory of Atmospheric Sounding of China Meteorological Administration(2022KLAS06M)Science and Technology Research Project of the Guangdong Provincial Meteorological Bureau(GRMC2024M04)。
文摘The assimilation of dual-polarization(dual-pol)radar data plays a crucial role in enhancing the simulation of hydrometeors and improving the short-term precipitation forecasts of numerical weather prediction(NWP)models.However,existing dual-pol radar data assimilation(DA)methods exhibit limitations in terms of computational efficiency and data utilization.In this study,a new dual-pol radar DA approach is developed that utilizes a UNet-based model to retrieve mixing ratio information for four hydrometeor species from dual-pol radar data.The validation results for the UNet-based model indicate that the distributions of the retrieved hydrometeor mixing ratios provided by the model align well with the labeled data,yielding a reasonable range of root mean square errors(RMSEs).On this basis,the hydrometeor analysis increments retrieved by the UNet-based model are incorporated into the model integration process through the incremental analysis update(IAU)scheme,establishing a complete dual-pol radar DA framework for the CMA-MESO model.To evaluate the efficacy of this DA scheme,comparative simulation experiments were conducted for Typhoon Lekima(2019).Verification results indicate that using the hydrometeor DA scheme generally improves the threat scores(TSs)for 3-hour accumulated precipitation during medium-and heavy-rainfall events.Additionally,the 24-hour accumulated rainfall TSs for the medium-,heavy-,and extreme-precipitation categories in the DA experiment are all superior to those in the control experiment.The DA method also yields superior predictions of the spatial distribution of extremerainfall events.These results demonstrate that the proposed dual-pol radar DA approach effectively enhances the precipitation forecasting capabilities of numerical weather models.
基金supported by National Key Research and Development Program of China(2023YFF0906100)National Natural Science Foundation of China(52408008)Key Research and Development Program of Jiangsu Province(BE2022833).
文摘Current damage detection methods based on model updating and sensitivity Jacobian matrixes show a low convergence ratio and computational efficiency for online calculations.The aim of this paper is to construct a real-time automated damage detection method by developing a theory-assisted adaptive mutiagent twin delayed deep deterministic(TA2-MATD3)policy gradient algorithm.First,the theoretical framework of reinforcement-learning-driven damage detection is established.To address the disadvantages of traditional mutiagent twin delayed deep deterministic(MATD3)method,the theory-assisted mechanism and the adaptive experience playback mechanism are introduced.Moreover,a historical residential house built in 1889 was taken as an example,using its 12-month structural health monitoring data.TA2-MATD3 was compared with existing damage detection methods in terms of the convergence ratio,online computing efficiency,and damage detection accuracy.The results show that the computational efficiency of TA2-MATD3 is approximately 117–160 times that of the traditional methods.The convergence ratio of damage detection on the training set is approximately 97%,and that on the test set is in the range of 86.2%–91.9%.In addition,the main apparent damages found in the field survey were identified by TA2-MATD3.The results indicate that the proposed method can significantly improve the online computing efficiency and damage detection accuracy.This research can provide novel perspectives for the use of reinforcement learning methods to conduct damage detection in online structural health monitoring.
基金supported by the Scientific and Technological Innovation Project of SHASG(SCK2022-01)National Key Research and Development Program of China(2016YFC0803109)。
文摘Land subsidence significantly impacts the accuracy of the National Elevation Datum in China.In order to solve this issue,a dynamic and economical way was proposed to update the National Elevation Datum with the assistance of InSAR in the North China Plain,which served as the research area.Moreover,the GNSS result was used to correct the InSAR result for the vertical deformation field,which has a relatively unified deformation reference.By integrating the vertical deformation field with the national elevation control point,an analysis and evaluation of changes in the National Elevation Datum were conducted.In addition,a regional remeasurement scheme was formulated to achieve dynamic updates and mainte-nance of the National Elevation Datum on a regional scale.Through data acquisition and processing,we successfully improved reliability within the main subsidence areas for future use.As a result,updating the elevation values utilize a regional update method,and a dynamic and economical technical process to update the National Elevation Datum is shown in the study.