Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the relat...Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage.展开更多
The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.H...The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency.展开更多
Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there ar...Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there are seldom schemes supporting both updatable block-level deduplication and public auditing. In this paper, an updatable block-level deduplication scheme with efficient auditing is proposed based on a tree-based authenticated structure. In the proposed scheme, the cloud server(CS) can perform block-level deduplication, and the TPA achieves integrity auditing tasks. When a data block is updated, the ciphertext and auditing tags could be updated efficiently. The security analysis demonstrates that the proposed scheme can achieve privacy under chosen distribution attacks in secure deduplication and resist uncheatable chosen distribution attacks(UNC-CDA) in proof of ownership(PoW). Furthermore, the integrity auditing process is proven secure under adaptive chosen-message attacks. Compared with previous relevant schemes, the proposed scheme achieves better functionality and higher efficiency.展开更多
Prediction of stability in SG(Smart Grid)is essential in maintaining consistency and reliability of power supply in grid infrastructure.Analyzing the fluctuations in power generation and consumption patterns of smart ...Prediction of stability in SG(Smart Grid)is essential in maintaining consistency and reliability of power supply in grid infrastructure.Analyzing the fluctuations in power generation and consumption patterns of smart cities assists in effectively managing continuous power supply in the grid.It also possesses a better impact on averting overloading and permitting effective energy storage.Even though many traditional techniques have predicted the consumption rate for preserving stability,enhancement is required in prediction measures with minimized loss.To overcome the complications in existing studies,this paper intends to predict stability from the smart grid stability prediction dataset using machine learning algorithms.To accomplish this,pre-processing is performed initially to handle missing values since it develops biased models when missing values are mishandled and performs feature scaling to normalize independent data features.Then,the pre-processed data are taken for training and testing.Following that,the regression process is performed using Modified PSO(Particle Swarm Optimization)optimized XGBoost Technique with dynamic inertia weight update,which analyses variables like gamma(G),reaction time(tau1–tau4),and power balance(p1–p4)for providing effective future stability in SG.Since PSO attains optimal solution by adjusting position through dynamic inertial weights,it is integrated with XGBoost due to its scalability and faster computational speed characteristics.The hyperparameters of XGBoost are fine-tuned in the training process for achieving promising outcomes on prediction.Regression results are measured through evaluation metrics such as MSE(Mean Square Error)of 0.011312781,MAE(Mean Absolute Error)of 0.008596322,and RMSE(Root Mean Square Error)of 0.010636156 and MAPE(Mean Absolute Percentage Error)value of 0.0052 which determine the efficacy of the system.展开更多
With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly increased.However,traditional collaboration tools primarily rely on access control,leaving data stored on cloud...With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly increased.However,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulnerable due to insufficient encryption.This paper introduces a novel mechanism that encrypts data in‘bundle’units,designed to meet the dual requirements of efficiency and security for frequently updated collaborative data.Each bundle includes updated information,allowing only the updated portions to be reencrypted when changes occur.The encryption method proposed in this paper addresses the inefficiencies of traditional encryption modes,such as Cipher Block Chaining(CBC)and Counter(CTR),which require decrypting and re-encrypting the entire dataset whenever updates occur.The proposed method leverages update-specific information embedded within data bundles and metadata that maps the relationship between these bundles and the plaintext data.By utilizing this information,the method accurately identifies the modified portions and applies algorithms to selectively re-encrypt only those sections.This approach significantly enhances the efficiency of data updates while maintaining high performance,particularly in large-scale data environments.To validate this approach,we conducted experiments measuring execution time as both the size of the modified data and the total dataset size varied.Results show that the proposed method significantly outperforms CBC and CTR modes in execution speed,with greater performance gains as data size increases.Additionally,our security evaluation confirms that this method provides robust protection against both passive and active attacks.展开更多
Based on available records,a comprehensive overview of the biodiversity and geographical distribution of Collembola in China is presented.A total of 735 species,155 genera and 20 families were recorded in the checklis...Based on available records,a comprehensive overview of the biodiversity and geographical distribution of Collembola in China is presented.A total of 735 species,155 genera and 20 families were recorded in the checklist,including current name information,synonyms,geographical records,and bibliographic references.Taxonomic notes were added where necessary and Chinese translations were provided for genera and families.The following new combinations are proposed:Rambutsinella grinnellia(Wang,Chen&Christiansen,2004)comb.nov.for Pseudosinella grinnellia Wang,Chen&Christiansen 2004;Rambutsinella hui(Wang,Chen&Christiansen,2003)comb.nov.for Pseudosinella hui Wang,Chen&Christiansen 2003;and Rambutsinella tridentifera(Rusek,1971)comb.nov.for Pseudosinella tridentifera Rusek 1971.In addition,certain species have been merged with their synonyms.This checklist includes articles published up to August 2023.展开更多
Declaration of Competing Interest statements is updated in the published version of the following articles that appeared in issues of Resources Chemicals and Materials.The appropriate updated Declaration of Competing ...Declaration of Competing Interest statements is updated in the published version of the following articles that appeared in issues of Resources Chemicals and Materials.The appropriate updated Declaration of Competing Interest state-ments,provided by the Authors,are included below.展开更多
Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extrac...Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extraction and model construction.Firstly,the convolutional neural network(CNN)features of the face are extracted by the trained deep learning network.Next,the steady-state and dynamic classifiers for face recognition are constructed based on the CNN features and Haar features respectively,with two-stage sparse representation introduced in the process of constructing the steady-state classifier and the feature templates with high reliability are dynamically selected as alternative templates from the sparse representation template dictionary constructed using the CNN features.Finally,the results of face recognition are given based on the classification results of the steady-state classifier and the dynamic classifier together.Based on this,the feature weights of the steady-state classifier template are adjusted in real time and the dictionary set is dynamically updated to reduce the probability of irrelevant features entering the dictionary set.The average recognition accuracy of this method is 94.45%on the CMU PIE face database and 96.58%on the AR face database,which is significantly improved compared with that of the traditional face recognition methods.展开更多
Persistent and maladaptive drug-related memories represent a key component in drug addiction.Converging evidence from both preclinical and clinical studies has demonstrated the potential efficacy of the memory reconso...Persistent and maladaptive drug-related memories represent a key component in drug addiction.Converging evidence from both preclinical and clinical studies has demonstrated the potential efficacy of the memory reconsolidation updating procedure(MRUP),a non-pharmacological strategy intertwining two distinct memory processes:reconsolidation and extinction—alternatively termed“the memory retrieval-extinction procedure”.This procedure presents a promising approach to attenuate,if not erase,entrenched drug memories and prevent relapse.The present review delineates the applications,molecular underpinnings,and operational boundaries of MRUP in the context of various forms of substance dependence.Furthermore,we critically examine the methodological limitations of MRUP,postulating potential refinement to optimize its therapeutic efficacy.In addition,we also look at the potential integration of MRUP and neurostimulation treatments in the domain of substance addiction.Overall,existing studies underscore the significant potential of MRUP,suggesting that interventions predicated on it could herald a promising avenue to enhance clinical outcomes in substance addiction therapy.展开更多
Land subsidence significantly impacts the accuracy of the National Elevation Datum in China.In order to solve this issue,a dynamic and economical way was proposed to update the National Elevation Datum with the assist...Land subsidence significantly impacts the accuracy of the National Elevation Datum in China.In order to solve this issue,a dynamic and economical way was proposed to update the National Elevation Datum with the assistance of InSAR in the North China Plain,which served as the research area.Moreover,the GNSS result was used to correct the InSAR result for the vertical deformation field,which has a relatively unified deformation reference.By integrating the vertical deformation field with the national elevation control point,an analysis and evaluation of changes in the National Elevation Datum were conducted.In addition,a regional remeasurement scheme was formulated to achieve dynamic updates and mainte-nance of the National Elevation Datum on a regional scale.Through data acquisition and processing,we successfully improved reliability within the main subsidence areas for future use.As a result,updating the elevation values utilize a regional update method,and a dynamic and economical technical process to update the National Elevation Datum is shown in the study.展开更多
The assimilation of dual-polarization(dual-pol)radar data plays a crucial role in enhancing the simulation of hydrometeors and improving the short-term precipitation forecasts of numerical weather prediction(NWP)model...The assimilation of dual-polarization(dual-pol)radar data plays a crucial role in enhancing the simulation of hydrometeors and improving the short-term precipitation forecasts of numerical weather prediction(NWP)models.However,existing dual-pol radar data assimilation(DA)methods exhibit limitations in terms of computational efficiency and data utilization.In this study,a new dual-pol radar DA approach is developed that utilizes a UNet-based model to retrieve mixing ratio information for four hydrometeor species from dual-pol radar data.The validation results for the UNet-based model indicate that the distributions of the retrieved hydrometeor mixing ratios provided by the model align well with the labeled data,yielding a reasonable range of root mean square errors(RMSEs).On this basis,the hydrometeor analysis increments retrieved by the UNet-based model are incorporated into the model integration process through the incremental analysis update(IAU)scheme,establishing a complete dual-pol radar DA framework for the CMA-MESO model.To evaluate the efficacy of this DA scheme,comparative simulation experiments were conducted for Typhoon Lekima(2019).Verification results indicate that using the hydrometeor DA scheme generally improves the threat scores(TSs)for 3-hour accumulated precipitation during medium-and heavy-rainfall events.Additionally,the 24-hour accumulated rainfall TSs for the medium-,heavy-,and extreme-precipitation categories in the DA experiment are all superior to those in the control experiment.The DA method also yields superior predictions of the spatial distribution of extremerainfall events.These results demonstrate that the proposed dual-pol radar DA approach effectively enhances the precipitation forecasting capabilities of numerical weather models.展开更多
Current damage detection methods based on model updating and sensitivity Jacobian matrixes show a low convergence ratio and computational efficiency for online calculations.The aim of this paper is to construct a real...Current damage detection methods based on model updating and sensitivity Jacobian matrixes show a low convergence ratio and computational efficiency for online calculations.The aim of this paper is to construct a real-time automated damage detection method by developing a theory-assisted adaptive mutiagent twin delayed deep deterministic(TA2-MATD3)policy gradient algorithm.First,the theoretical framework of reinforcement-learning-driven damage detection is established.To address the disadvantages of traditional mutiagent twin delayed deep deterministic(MATD3)method,the theory-assisted mechanism and the adaptive experience playback mechanism are introduced.Moreover,a historical residential house built in 1889 was taken as an example,using its 12-month structural health monitoring data.TA2-MATD3 was compared with existing damage detection methods in terms of the convergence ratio,online computing efficiency,and damage detection accuracy.The results show that the computational efficiency of TA2-MATD3 is approximately 117–160 times that of the traditional methods.The convergence ratio of damage detection on the training set is approximately 97%,and that on the test set is in the range of 86.2%–91.9%.In addition,the main apparent damages found in the field survey were identified by TA2-MATD3.The results indicate that the proposed method can significantly improve the online computing efficiency and damage detection accuracy.This research can provide novel perspectives for the use of reinforcement learning methods to conduct damage detection in online structural health monitoring.展开更多
Colorectal cancer(CRC)is the most frequently diagnosed malignancy of the digestive system and the second leading cause of cancer-related deaths worldwide(1).In China,CRC ranks as the second most common cancer with inc...Colorectal cancer(CRC)is the most frequently diagnosed malignancy of the digestive system and the second leading cause of cancer-related deaths worldwide(1).In China,CRC ranks as the second most common cancer with incidence and mortality rates continuing to rise(2).The Chinese Society of Clinical Oncology(CSCO)first introduced its guidelines in 2017,and since then,they have been updated annually to incorporate the latest clinical research findings,drug availability,and expert consensus(3-8).This article presents the key updates in the 2025 edition compared to the 2024 version.展开更多
The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artifici...The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artificial Intelligence Generated Content(AIGC).However,the openness of power system channels and the resource-constrained nature of power sensors have led to new challenges for the secure transmission of power data and decision instructions.Although traditional public key cryptographic primitives can offer high security,the substantial key management and computational overhead associated with these primitives make them unsuitable for power systems.To ensure the real-time and security of power data and command transmission,we propose a lightweight identity authentication scheme tailored for power AIGC systems.The scheme utilizes lightweight symmetric encryption algorithms,minimizing the resource overhead on power sensors.Additionally,it incorporates a dynamic credential update mechanism,which can realize the rotation and update of temporary credentials to ensure anonymity and security.We rigorously validate the security of the scheme using the Real-or-Random(ROR)model and AVISPA simulation,and the results show that our scheme can resist various active and passive attacks.Finally,performance comparisons and NS3 simulation results demonstrate that our proposed scheme offers enhanced security features with lower overhead,making it more suitable for power AIGC systems compared to existing solutions.展开更多
Engineering tests can yield inaccurate data due to instrument errors,human factors,and environmental interference,introducing uncertainty in numerical model updating.This study employs the probability-box(p-box)method...Engineering tests can yield inaccurate data due to instrument errors,human factors,and environmental interference,introducing uncertainty in numerical model updating.This study employs the probability-box(p-box)method for representing observational uncertainty and develops a two-step approximate Bayesian computation(ABC)framework using time-series data.Within the ABC framework,Euclidean and Bhattacharyya distances are employed as uncertainty quantification metrics to delineate approximate likelihood functions in the initial and subsequent steps,respectively.A novel variational Bayesian Monte Carlo method is introduced to efficiently apply the ABC framework amidst observational uncertainty,resulting in rapid convergence and accurate parameter estimation with minimal iterations.The efficacy of the proposed updating strategy is validated by its application to a shear frame model excited by seismic wave and an aviation pump force sensor for thermal output analysis.The results affirm the efficiency,robustness,and practical applicability of the proposed method.展开更多
The operational and regional conditions to which the prestressed concrete sleeper(PCS)is subjected in a railway track significantly contribute to its performance and durability.Maintaining the health of PCS poses chal...The operational and regional conditions to which the prestressed concrete sleeper(PCS)is subjected in a railway track significantly contribute to its performance and durability.Maintaining the health of PCS poses challenges,and one of these issues involves the potential occurrence of longitudinal cracks in reinforcing bars,which can be caused by various constructional,functional,and environmental factors.Longitudinal cracks in PCS compromise the structural performance,resulting in a reduced capacity to withstand the loads exerted by moving vehicles.The current evaluations not only fail to yield a precise parameter for estimating the behavior and response of the PCS,but they also overlook the specific conditions of the PCS,such as prestressing,and only provide limited information regarding existing damage.Balancing the need for accurate evaluation with consideration of costs and resources,and making informed decisions about maintenance and track performance enhancement,has become a multifaceted challenge in ensuring a robust PCS assessment.This research introduces a novel methodology to improve the evaluation of mechanical and geometrical parameters of PCS over their operational lifespan.The objective is to enhance the accuracy of PCS performance estimation by concentrating on detecting longitudinal cracks.The suggested approach seamlessly integrates model updating methods and the finite element(FE)approach to achieve an accurate and timely assessment of PCS conditions.This comprehensive examination scrutinizes the methodology by applying artificial cracks to the PCS.In addition to introducing this assessment approach,a detailed examination is conducted on a laboratory-simulated PCS featuring various combinations of longitudinal cracks measuring 40,80,and 120 cm in length.This systematic and rigorous approach ensures the reliability and robustness of the methodology.Ultimately,the parameters of cross-sectional area,moment of inertia,and modulus of elasticity,which significantly impact the performance of this sleeper,are explored and demonstrated through functional methodologies.The findings suggest that assessing and addressing damage should be conducted through a comprehensive and integrated procedure,taking into account the actual conditions of the PCS.Longitudinal cracks lead to a substantial decrease in the performance of these components in railway tracks.By applying the proposed methods,it is anticipated that the evaluation error for these components will be reduced by approximately 30%compared to visual inspections,particularly in predicting the extent of damage for cracks measuring up to 120 cm.This research has the potential to significantly enhance the evaluation of PCS performance and mitigate the impact of longitudinal cracks on the safety and longevity of ballasted railway tracks in desert areas.展开更多
With the widespread adoption of hydraulic fracturing technology in oil and gas resource development,improving the accuracy and efficiency of fracturing simulations has become a critical research focus.This paper propo...With the widespread adoption of hydraulic fracturing technology in oil and gas resource development,improving the accuracy and efficiency of fracturing simulations has become a critical research focus.This paper proposes an improved fluid flow algorithm,aiming to enhance the computational efficiency of hydraulic fracturing simulations while ensuring computational accuracy.The algorithm optimizes the aperture law and iteration criteria,focusing on improving the domain volume and crack pressure update strategy,thereby enabling precise capture of dynamic borehole pressure variations during injection tests.The effectiveness of the algorithm is verified through three flow-solid coupling cases.The study also analyzes the effects of borehole size,domain volume,and crack pressure update strategy on fracturing behavior.Furthermore,the performance of the improved algorithm in terms of crack propagation rate,micro-crack formation,and fluid pressure distribution was further evaluated.The results indicate that while large-size boreholes delay crack initiation,the cracks propagate more rapidly once formed.Additionally,the optimized domain volume calculation and crack pressure update strategy significantly shorten the pressure propagation stage,promote crack propagation,and improve computational efficiency.展开更多
In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilizati...In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries.展开更多
Following the publication of Xu et al.(2022),an error was identified in Figure 1D.Specifically,the top left panel was inadvertently duplicated during figure preparation.To ensure the accuracy and integrity of our publ...Following the publication of Xu et al.(2022),an error was identified in Figure 1D.Specifically,the top left panel was inadvertently duplicated during figure preparation.To ensure the accuracy and integrity of our published work,we request the publication of a corrigendum with the corrected image.We apologize for this oversight and any confusion it may have caused.The amended figure is provided in the updated Supplementary Materials.展开更多
Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programm...Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programming(GP),characterized by its tree-based solution structure,is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems.This paper introduces a GP-based framework(GPEAs)for the autonomous generation of update formulas,aiming to reduce human intervention.Partial modifications to tree-based GP have been instigated,encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.By designing suitable function sets and terminal sets tailored to the selected evolutionary algorithm,and ultimately derive an improved update formula.The Cat Swarm Optimization Algorithm(CSO)is chosen as a case study,and the GP-EAs is employed to regenerate the speed update formulas of the CSO.To validate the feasibility of the GP-EAs,the comprehensive performance of the enhanced algorithm(GP-CSO)was evaluated on the CEC2017 benchmark suite.Furthermore,GP-CSO is applied to deduce suitable embedding factors,thereby improving the robustness of the digital watermarking process.The experimental results indicate that the update formulas generated through training with GP-EAs possess excellent performance scalability and practical application proficiency.展开更多
基金This work was supported by the National Key Research and Development Program of China under Grant No. 2017YFt30802000, the National Natural Science Foundation of China under Grant Nos. 61802241, 61772326, 61572303, 61872229, 61802242, and 61602290, the National Natural Science Foundation of China for International Young Scientists under Grant No. 61750110528, the National Cryp-tographv Development Fund during the 13th Five-Year Plan Period of China under Grant Nos. MMJJ20170216 and MMJJ20180217, the Foundation of State Key Laboratory of Information Security of China under Grant No. 2017-MS-03, and the Fundamental Re- search Funds for the Central Universities of China under Grant Nos. GK201603084, GK201702004, GK201603092, GK201603093, and GK201703062.
文摘Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage.
基金supported by the National Key Research and Development Program of China under Grant 2022YFB2901501in part by the Science and Technology Innovation leading Talents Subsidy Project of Central Plains under Grant 244200510038.
文摘The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency.
基金supported by the Doctoral Foundation in Henan University of Technology (31401152)
文摘Updatable block-level message-locked encryption(MLE) can efficiently update encrypted data, and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor(TPA). However, there are seldom schemes supporting both updatable block-level deduplication and public auditing. In this paper, an updatable block-level deduplication scheme with efficient auditing is proposed based on a tree-based authenticated structure. In the proposed scheme, the cloud server(CS) can perform block-level deduplication, and the TPA achieves integrity auditing tasks. When a data block is updated, the ciphertext and auditing tags could be updated efficiently. The security analysis demonstrates that the proposed scheme can achieve privacy under chosen distribution attacks in secure deduplication and resist uncheatable chosen distribution attacks(UNC-CDA) in proof of ownership(PoW). Furthermore, the integrity auditing process is proven secure under adaptive chosen-message attacks. Compared with previous relevant schemes, the proposed scheme achieves better functionality and higher efficiency.
基金Prince Sattam bin Abdulaziz University project number(PSAU/2023/R/1445)。
文摘Prediction of stability in SG(Smart Grid)is essential in maintaining consistency and reliability of power supply in grid infrastructure.Analyzing the fluctuations in power generation and consumption patterns of smart cities assists in effectively managing continuous power supply in the grid.It also possesses a better impact on averting overloading and permitting effective energy storage.Even though many traditional techniques have predicted the consumption rate for preserving stability,enhancement is required in prediction measures with minimized loss.To overcome the complications in existing studies,this paper intends to predict stability from the smart grid stability prediction dataset using machine learning algorithms.To accomplish this,pre-processing is performed initially to handle missing values since it develops biased models when missing values are mishandled and performs feature scaling to normalize independent data features.Then,the pre-processed data are taken for training and testing.Following that,the regression process is performed using Modified PSO(Particle Swarm Optimization)optimized XGBoost Technique with dynamic inertia weight update,which analyses variables like gamma(G),reaction time(tau1–tau4),and power balance(p1–p4)for providing effective future stability in SG.Since PSO attains optimal solution by adjusting position through dynamic inertial weights,it is integrated with XGBoost due to its scalability and faster computational speed characteristics.The hyperparameters of XGBoost are fine-tuned in the training process for achieving promising outcomes on prediction.Regression results are measured through evaluation metrics such as MSE(Mean Square Error)of 0.011312781,MAE(Mean Absolute Error)of 0.008596322,and RMSE(Root Mean Square Error)of 0.010636156 and MAPE(Mean Absolute Percentage Error)value of 0.0052 which determine the efficacy of the system.
基金supported by the Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(RS-2024-00399401,Development of Quantum-Safe Infrastructure Migration and Quantum Security Verification Technologies).
文摘With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly increased.However,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulnerable due to insufficient encryption.This paper introduces a novel mechanism that encrypts data in‘bundle’units,designed to meet the dual requirements of efficiency and security for frequently updated collaborative data.Each bundle includes updated information,allowing only the updated portions to be reencrypted when changes occur.The encryption method proposed in this paper addresses the inefficiencies of traditional encryption modes,such as Cipher Block Chaining(CBC)and Counter(CTR),which require decrypting and re-encrypting the entire dataset whenever updates occur.The proposed method leverages update-specific information embedded within data bundles and metadata that maps the relationship between these bundles and the plaintext data.By utilizing this information,the method accurately identifies the modified portions and applies algorithms to selectively re-encrypt only those sections.This approach significantly enhances the efficiency of data updates while maintaining high performance,particularly in large-scale data environments.To validate this approach,we conducted experiments measuring execution time as both the size of the modified data and the total dataset size varied.Results show that the proposed method significantly outperforms CBC and CTR modes in execution speed,with greater performance gains as data size increases.Additionally,our security evaluation confirms that this method provides robust protection against both passive and active attacks.
基金supported by the National Science and Technology Fundamental Resources Investigation Program of China(2018FY100300)National Natural Science Foundation of China(31970434 and 32270470)。
文摘Based on available records,a comprehensive overview of the biodiversity and geographical distribution of Collembola in China is presented.A total of 735 species,155 genera and 20 families were recorded in the checklist,including current name information,synonyms,geographical records,and bibliographic references.Taxonomic notes were added where necessary and Chinese translations were provided for genera and families.The following new combinations are proposed:Rambutsinella grinnellia(Wang,Chen&Christiansen,2004)comb.nov.for Pseudosinella grinnellia Wang,Chen&Christiansen 2004;Rambutsinella hui(Wang,Chen&Christiansen,2003)comb.nov.for Pseudosinella hui Wang,Chen&Christiansen 2003;and Rambutsinella tridentifera(Rusek,1971)comb.nov.for Pseudosinella tridentifera Rusek 1971.In addition,certain species have been merged with their synonyms.This checklist includes articles published up to August 2023.
文摘Declaration of Competing Interest statements is updated in the published version of the following articles that appeared in issues of Resources Chemicals and Materials.The appropriate updated Declaration of Competing Interest state-ments,provided by the Authors,are included below.
基金the financial support from Natural Science Foundation of Gansu Province(Nos.22JR5RA217,22JR5RA216)Lanzhou Science and Technology Program(No.2022-2-111)+1 种基金Lanzhou University of Arts and Sciences School Innovation Fund Project(No.XJ2022000103)Lanzhou College of Arts and Sciences 2023 Talent Cultivation Quality Improvement Project(No.2023-ZL-jxzz-03)。
文摘Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extraction and model construction.Firstly,the convolutional neural network(CNN)features of the face are extracted by the trained deep learning network.Next,the steady-state and dynamic classifiers for face recognition are constructed based on the CNN features and Haar features respectively,with two-stage sparse representation introduced in the process of constructing the steady-state classifier and the feature templates with high reliability are dynamically selected as alternative templates from the sparse representation template dictionary constructed using the CNN features.Finally,the results of face recognition are given based on the classification results of the steady-state classifier and the dynamic classifier together.Based on this,the feature weights of the steady-state classifier template are adjusted in real time and the dictionary set is dynamically updated to reduce the probability of irrelevant features entering the dictionary set.The average recognition accuracy of this method is 94.45%on the CMU PIE face database and 96.58%on the AR face database,which is significantly improved compared with that of the traditional face recognition methods.
基金supported by the National Natural Science Foundation of China(82071498,81871046,and 32161143022)STI2030-Major Projects(2022ZD0214500).
文摘Persistent and maladaptive drug-related memories represent a key component in drug addiction.Converging evidence from both preclinical and clinical studies has demonstrated the potential efficacy of the memory reconsolidation updating procedure(MRUP),a non-pharmacological strategy intertwining two distinct memory processes:reconsolidation and extinction—alternatively termed“the memory retrieval-extinction procedure”.This procedure presents a promising approach to attenuate,if not erase,entrenched drug memories and prevent relapse.The present review delineates the applications,molecular underpinnings,and operational boundaries of MRUP in the context of various forms of substance dependence.Furthermore,we critically examine the methodological limitations of MRUP,postulating potential refinement to optimize its therapeutic efficacy.In addition,we also look at the potential integration of MRUP and neurostimulation treatments in the domain of substance addiction.Overall,existing studies underscore the significant potential of MRUP,suggesting that interventions predicated on it could herald a promising avenue to enhance clinical outcomes in substance addiction therapy.
基金supported by the Scientific and Technological Innovation Project of SHASG(SCK2022-01)National Key Research and Development Program of China(2016YFC0803109)。
文摘Land subsidence significantly impacts the accuracy of the National Elevation Datum in China.In order to solve this issue,a dynamic and economical way was proposed to update the National Elevation Datum with the assistance of InSAR in the North China Plain,which served as the research area.Moreover,the GNSS result was used to correct the InSAR result for the vertical deformation field,which has a relatively unified deformation reference.By integrating the vertical deformation field with the national elevation control point,an analysis and evaluation of changes in the National Elevation Datum were conducted.In addition,a regional remeasurement scheme was formulated to achieve dynamic updates and mainte-nance of the National Elevation Datum on a regional scale.Through data acquisition and processing,we successfully improved reliability within the main subsidence areas for future use.As a result,updating the elevation values utilize a regional update method,and a dynamic and economical technical process to update the National Elevation Datum is shown in the study.
基金Major Key Project of PCL(PCL2025A10)Open Research Project of the China Meteorological Administration Hydro-Meteorology Key Laboratory(23SWQXM036)+2 种基金National Natural Science Foundation of China(42375160)Project of the Key Laboratory of Atmospheric Sounding of China Meteorological Administration(2022KLAS06M)Science and Technology Research Project of the Guangdong Provincial Meteorological Bureau(GRMC2024M04)。
文摘The assimilation of dual-polarization(dual-pol)radar data plays a crucial role in enhancing the simulation of hydrometeors and improving the short-term precipitation forecasts of numerical weather prediction(NWP)models.However,existing dual-pol radar data assimilation(DA)methods exhibit limitations in terms of computational efficiency and data utilization.In this study,a new dual-pol radar DA approach is developed that utilizes a UNet-based model to retrieve mixing ratio information for four hydrometeor species from dual-pol radar data.The validation results for the UNet-based model indicate that the distributions of the retrieved hydrometeor mixing ratios provided by the model align well with the labeled data,yielding a reasonable range of root mean square errors(RMSEs).On this basis,the hydrometeor analysis increments retrieved by the UNet-based model are incorporated into the model integration process through the incremental analysis update(IAU)scheme,establishing a complete dual-pol radar DA framework for the CMA-MESO model.To evaluate the efficacy of this DA scheme,comparative simulation experiments were conducted for Typhoon Lekima(2019).Verification results indicate that using the hydrometeor DA scheme generally improves the threat scores(TSs)for 3-hour accumulated precipitation during medium-and heavy-rainfall events.Additionally,the 24-hour accumulated rainfall TSs for the medium-,heavy-,and extreme-precipitation categories in the DA experiment are all superior to those in the control experiment.The DA method also yields superior predictions of the spatial distribution of extremerainfall events.These results demonstrate that the proposed dual-pol radar DA approach effectively enhances the precipitation forecasting capabilities of numerical weather models.
基金supported by National Key Research and Development Program of China(2023YFF0906100)National Natural Science Foundation of China(52408008)Key Research and Development Program of Jiangsu Province(BE2022833).
文摘Current damage detection methods based on model updating and sensitivity Jacobian matrixes show a low convergence ratio and computational efficiency for online calculations.The aim of this paper is to construct a real-time automated damage detection method by developing a theory-assisted adaptive mutiagent twin delayed deep deterministic(TA2-MATD3)policy gradient algorithm.First,the theoretical framework of reinforcement-learning-driven damage detection is established.To address the disadvantages of traditional mutiagent twin delayed deep deterministic(MATD3)method,the theory-assisted mechanism and the adaptive experience playback mechanism are introduced.Moreover,a historical residential house built in 1889 was taken as an example,using its 12-month structural health monitoring data.TA2-MATD3 was compared with existing damage detection methods in terms of the convergence ratio,online computing efficiency,and damage detection accuracy.The results show that the computational efficiency of TA2-MATD3 is approximately 117–160 times that of the traditional methods.The convergence ratio of damage detection on the training set is approximately 97%,and that on the test set is in the range of 86.2%–91.9%.In addition,the main apparent damages found in the field survey were identified by TA2-MATD3.The results indicate that the proposed method can significantly improve the online computing efficiency and damage detection accuracy.This research can provide novel perspectives for the use of reinforcement learning methods to conduct damage detection in online structural health monitoring.
基金supported by the National Natural Science Foundation of China(No.82373415)Beijing Xisike Clinical Oncology Research Foundation(No.Ytongshu2021/ms-0003)。
文摘Colorectal cancer(CRC)is the most frequently diagnosed malignancy of the digestive system and the second leading cause of cancer-related deaths worldwide(1).In China,CRC ranks as the second most common cancer with incidence and mortality rates continuing to rise(2).The Chinese Society of Clinical Oncology(CSCO)first introduced its guidelines in 2017,and since then,they have been updated annually to incorporate the latest clinical research findings,drug availability,and expert consensus(3-8).This article presents the key updates in the 2025 edition compared to the 2024 version.
文摘The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artificial Intelligence Generated Content(AIGC).However,the openness of power system channels and the resource-constrained nature of power sensors have led to new challenges for the secure transmission of power data and decision instructions.Although traditional public key cryptographic primitives can offer high security,the substantial key management and computational overhead associated with these primitives make them unsuitable for power systems.To ensure the real-time and security of power data and command transmission,we propose a lightweight identity authentication scheme tailored for power AIGC systems.The scheme utilizes lightweight symmetric encryption algorithms,minimizing the resource overhead on power sensors.Additionally,it incorporates a dynamic credential update mechanism,which can realize the rotation and update of temporary credentials to ensure anonymity and security.We rigorously validate the security of the scheme using the Real-or-Random(ROR)model and AVISPA simulation,and the results show that our scheme can resist various active and passive attacks.Finally,performance comparisons and NS3 simulation results demonstrate that our proposed scheme offers enhanced security features with lower overhead,making it more suitable for power AIGC systems compared to existing solutions.
基金supported by the National Natural Science Foundation of China(Grant No.U23B20105).
文摘Engineering tests can yield inaccurate data due to instrument errors,human factors,and environmental interference,introducing uncertainty in numerical model updating.This study employs the probability-box(p-box)method for representing observational uncertainty and develops a two-step approximate Bayesian computation(ABC)framework using time-series data.Within the ABC framework,Euclidean and Bhattacharyya distances are employed as uncertainty quantification metrics to delineate approximate likelihood functions in the initial and subsequent steps,respectively.A novel variational Bayesian Monte Carlo method is introduced to efficiently apply the ABC framework amidst observational uncertainty,resulting in rapid convergence and accurate parameter estimation with minimal iterations.The efficacy of the proposed updating strategy is validated by its application to a shear frame model excited by seismic wave and an aviation pump force sensor for thermal output analysis.The results affirm the efficiency,robustness,and practical applicability of the proposed method.
文摘The operational and regional conditions to which the prestressed concrete sleeper(PCS)is subjected in a railway track significantly contribute to its performance and durability.Maintaining the health of PCS poses challenges,and one of these issues involves the potential occurrence of longitudinal cracks in reinforcing bars,which can be caused by various constructional,functional,and environmental factors.Longitudinal cracks in PCS compromise the structural performance,resulting in a reduced capacity to withstand the loads exerted by moving vehicles.The current evaluations not only fail to yield a precise parameter for estimating the behavior and response of the PCS,but they also overlook the specific conditions of the PCS,such as prestressing,and only provide limited information regarding existing damage.Balancing the need for accurate evaluation with consideration of costs and resources,and making informed decisions about maintenance and track performance enhancement,has become a multifaceted challenge in ensuring a robust PCS assessment.This research introduces a novel methodology to improve the evaluation of mechanical and geometrical parameters of PCS over their operational lifespan.The objective is to enhance the accuracy of PCS performance estimation by concentrating on detecting longitudinal cracks.The suggested approach seamlessly integrates model updating methods and the finite element(FE)approach to achieve an accurate and timely assessment of PCS conditions.This comprehensive examination scrutinizes the methodology by applying artificial cracks to the PCS.In addition to introducing this assessment approach,a detailed examination is conducted on a laboratory-simulated PCS featuring various combinations of longitudinal cracks measuring 40,80,and 120 cm in length.This systematic and rigorous approach ensures the reliability and robustness of the methodology.Ultimately,the parameters of cross-sectional area,moment of inertia,and modulus of elasticity,which significantly impact the performance of this sleeper,are explored and demonstrated through functional methodologies.The findings suggest that assessing and addressing damage should be conducted through a comprehensive and integrated procedure,taking into account the actual conditions of the PCS.Longitudinal cracks lead to a substantial decrease in the performance of these components in railway tracks.By applying the proposed methods,it is anticipated that the evaluation error for these components will be reduced by approximately 30%compared to visual inspections,particularly in predicting the extent of damage for cracks measuring up to 120 cm.This research has the potential to significantly enhance the evaluation of PCS performance and mitigate the impact of longitudinal cracks on the safety and longevity of ballasted railway tracks in desert areas.
基金supported by the National Natural Science Foundation of China(Nos.52164001,52064006,52004072 and 52364004)the Science and Technology Support Project of Guizhou(Nos.[2020]4Y044,[2021]N404 and[2021]N511)+1 种基金the Guizhou Provincial Science and Technology Foundation(No.GCC[2022]005-1),Talents of Guizhou University(No.201901)the Special Research Funds of Guizhou University(Nos.201903,202011,and 202012).
文摘With the widespread adoption of hydraulic fracturing technology in oil and gas resource development,improving the accuracy and efficiency of fracturing simulations has become a critical research focus.This paper proposes an improved fluid flow algorithm,aiming to enhance the computational efficiency of hydraulic fracturing simulations while ensuring computational accuracy.The algorithm optimizes the aperture law and iteration criteria,focusing on improving the domain volume and crack pressure update strategy,thereby enabling precise capture of dynamic borehole pressure variations during injection tests.The effectiveness of the algorithm is verified through three flow-solid coupling cases.The study also analyzes the effects of borehole size,domain volume,and crack pressure update strategy on fracturing behavior.Furthermore,the performance of the improved algorithm in terms of crack propagation rate,micro-crack formation,and fluid pressure distribution was further evaluated.The results indicate that while large-size boreholes delay crack initiation,the cracks propagate more rapidly once formed.Additionally,the optimized domain volume calculation and crack pressure update strategy significantly shorten the pressure propagation stage,promote crack propagation,and improve computational efficiency.
文摘In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries.
文摘Following the publication of Xu et al.(2022),an error was identified in Figure 1D.Specifically,the top left panel was inadvertently duplicated during figure preparation.To ensure the accuracy and integrity of our published work,we request the publication of a corrigendum with the corrected image.We apologize for this oversight and any confusion it may have caused.The amended figure is provided in the updated Supplementary Materials.
文摘Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programming(GP),characterized by its tree-based solution structure,is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems.This paper introduces a GP-based framework(GPEAs)for the autonomous generation of update formulas,aiming to reduce human intervention.Partial modifications to tree-based GP have been instigated,encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.By designing suitable function sets and terminal sets tailored to the selected evolutionary algorithm,and ultimately derive an improved update formula.The Cat Swarm Optimization Algorithm(CSO)is chosen as a case study,and the GP-EAs is employed to regenerate the speed update formulas of the CSO.To validate the feasibility of the GP-EAs,the comprehensive performance of the enhanced algorithm(GP-CSO)was evaluated on the CEC2017 benchmark suite.Furthermore,GP-CSO is applied to deduce suitable embedding factors,thereby improving the robustness of the digital watermarking process.The experimental results indicate that the update formulas generated through training with GP-EAs possess excellent performance scalability and practical application proficiency.