With the rapid growth of the Internet and social media, information is widely disseminated in multimodal forms, such as text and images, where discriminatory content can manifest in various ways. Discrimination detect...With the rapid growth of the Internet and social media, information is widely disseminated in multimodal forms, such as text and images, where discriminatory content can manifest in various ways. Discrimination detection techniques for multilingual and multimodal data can identify potential discriminatory behavior and help foster a more equitable and inclusive cyberspace. However, existing methods often struggle in complex contexts and multilingual environments. To address these challenges, this paper proposes an innovative detection method, using image and multilingual text encoders to separately extract features from different modalities. It continuously updates a historical feature memory bank, aggregates the Top-K most similar samples, and utilizes a Gated Recurrent Unit (GRU) to integrate current and historical features, generating enhanced feature representations with stronger semantic expressiveness to improve the model’s ability to capture discriminatory signals. Experimental results demonstrate that the proposed method exhibits superior discriminative power and detection accuracy in multilingual and multimodal contexts, offering a reliable and effective solution for identifying discriminatory content.展开更多
With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performan...With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks.However,the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices.Therefore,this paper proposes an efficient privacy-preserving CNN framework(i.e.,EPPA)based on the Fully Homomorphic Encryption(FHE)scheme for AIoT application scenarios.In the plaintext domain,we verify schemes with different activation structures to determine the actual activation functions applicable to the corresponding ciphertext domain.Within the encryption domain,we integrate batch normalization(BN)into the convolutional layers to simplify the computation process.For nonlinear activation functions,we use composite polynomials for approximate calculation.Regarding the noise accumulation caused by homomorphic multiplication operations,we realize the refreshment of ciphertext noise through minimal“decryption-encryption”interactions,instead of adopting bootstrapping operations.Additionally,in practical implementation,we convert three-dimensional convolution into two-dimensional convolution to reduce the amount of computation in the encryption domain.Finally,we conduct extensive experiments on four IoT datasets,different CNN architectures,and two platforms with different resource configurations to evaluate the performance of EPPA in detail.展开更多
In recent years,the research on superconductivity in one-dimensional(1D)materials has been attracting increasing attention due to its potential applications in low-dimensional nanodevices.However,the critical temperat...In recent years,the research on superconductivity in one-dimensional(1D)materials has been attracting increasing attention due to its potential applications in low-dimensional nanodevices.However,the critical temperature(T_(c))of 1D superconductors is low.In this work,we theoretically investigate the possible high T_(c) superconductivity of(5,5)carbon nanotube(CNT).The pristine(5,5)CNT is a Dirac semimetal and can be modulated into a semiconductor by full hydrogenation.Interestingly,by further hole doping,it can be regulated into a metallic state with the sp3-hybridized𝜎electrons metalized,and a giant Kohn anomaly appears in the optical phonons.The two factors together enhance the electron–phonon coupling,and lead to high-T_(c) superconductivity.When the hole doping concentration of hydrogenated-(5,5)CNT is 2.5 hole/cell,the calculated T_(c) is 82.3 K,exceeding the boiling point of liquid nitrogen.Therefore,the predicted hole-doped hydrogenated-(5,5)CNT provides a new platform for 1D high-T_(c) superconductivity and may have potential applications in 1D nanodevices.展开更多
Rapid regional population shifts and spatial polarization have heightened pressure on cultivated land—a critical resource demanding urgent attention amid ongoing urban-rural transition.This study selects Jiangsu prov...Rapid regional population shifts and spatial polarization have heightened pressure on cultivated land—a critical resource demanding urgent attention amid ongoing urban-rural transition.This study selects Jiangsu province,a national leader in both economic and agricultural development,as a case area to construct a multidimensional framework for assessing the recessive morphological characteristics of multifunctional cultivated land use.We examine temporal dynamics,spatial heterogeneity,and propose an integrated zoning strategy based on empirical analysis.The results reveal that:(1)The recessive morphology index shows a consistent upward trend,with structural breaks in 2007 and 2013,and a spatial shift from“higher in the east and lower in the west”to“higher in the south and lower in the north.”(2)Coordination among sub-dimensions of the index has steadily improved.(3)The index is expected to continue rising in the next decade,though at a slower pace.(4)To promote coordinated multidimensional land-use development,we recommend a policy framework that reinforces existing strengths,addresses weaknesses,and adapts zoning schemes to current spatial conditions.This research offers new insights into multifunctional cultivated land systems and underscores their role in enhancing human well-being,securing food supply,and supporting sustainable urban-rural integration.展开更多
OBJECTIVE:To study the morphological basis of the role of Siqi(cold as winter,cool as autumn,warm as spring,hot as summer),Wuwei(five flavors:sweet,pungent,salty,sour,and bitter),and Guijing(meridian tropism) through ...OBJECTIVE:To study the morphological basis of the role of Siqi(cold as winter,cool as autumn,warm as spring,hot as summer),Wuwei(five flavors:sweet,pungent,salty,sour,and bitter),and Guijing(meridian tropism) through the use of information integration.METHODS:A14C-2-deoxy-glucose autoradiography method was adopted to determine the overall impact of treatment with 39 herbs on functions of various tissues and organs.Data was measured at 4hs after a single dose and following the last treatment of repeated doses for a week.Least-squares estimation was used and fitted for each herb regression effect of organs and tissues after singleand repeated treatment.The slope of the regression line represented the cumulative trend of the effect of the herbs(β),and the standard deviation of the slope(Sβ) was compared with those of the untreated animals(t 'test).All significantly cumulative effect trends were applied with an artificial neural network,which integrated the relationship among Siqi,Wuwei,and Guijing with tissues and organs.RESULTS:There is a certain relationship among the Siqi,Wuwei,Guijing and the anatomy of organs and tissues,but the different scores indicate that influence of Siqi,Wuwei,Guijing to anatomy of organs and tissues was a nonlinear state.CONCLUSION:Results demonstrated that the effects of Siqi,Wuwei,and Guijing have a morphological basis,and each concept was associated with multiple anatomical structures.展开更多
This paper has designed a unified storage model of Automatic Weather Station Quality Information Inquiries and Feedback( AWSQIF),and has developed an AWSQIF automatic management system,which implements the storage of ...This paper has designed a unified storage model of Automatic Weather Station Quality Information Inquiries and Feedback( AWSQIF),and has developed an AWSQIF automatic management system,which implements the storage of AWSQIF automatically in national quality information two-way feedback process. Based on the unified storage,AWSQIF data have important application in real-time data management,data quality assessment and quality control effect analysis. The results show that the data quality has been improved significantly,and the data assessment has achieved online operating. In addition,AWSQIF can assist the improvement of the quality control effect.展开更多
Aiming at the integrative management and comprehensive applications of large-scale 3D geospatial information covering the full 3D space of a city, this paper briefly introduces the design and implementation of a full ...Aiming at the integrative management and comprehensive applications of large-scale 3D geospatial information covering the full 3D space of a city, this paper briefly introduces the design and implementation of a full 3D GIS platform: GeoScope, which provides a professional solution for the massive full three-dimensional geospatial data integration, management, analysis, visualization, and applications. GeoScope is characterized by: (1) extendible software architecture based on the hierarchical message bus, facilitates multimodal integrative applications of 2D GIS and 3D GIS; (2) unified 3D city models, support multiscale se- mantic representation of outdoor & indoor and aboveground & underground 3D objects; (3) high-efficient 3D geospatial database engine, supports integrated management of massive 3D geospatial data for real-time applications; and (4) high-performance visualization engine exploiting the massively parallel computation architecture of modem GPUs, supports real-time realistic rendering of large-scale complicated 3D geospatial environments. The successful pilot application of GeoScope is also illustrated with the 3D city models of 8494 knl2 of the whole Wuhan City, the largest city in middle China.展开更多
Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configur...Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology.展开更多
Marine geographic information system (MGIS) has great ability to deal with the spatio-temporal problems and has potential superiority when it is applied to oceanography. Using the feature extraction of oceanic pheno...Marine geographic information system (MGIS) has great ability to deal with the spatio-temporal problems and has potential superiority when it is applied to oceanography. Using the feature extraction of oceanic phenomena as a case study, the functions of the MGIS are analyzed, and thus the position of MGIS in the oceanography is defined. Comparing the requirement of MGIS with that of the traditional GIS which has been developed in the terrestrial applications in the past four decades, the frame for the functions of MGIS is constructed. According to the established MGIS, some key technologies are discussed in detail with emphasis on the specialities which can distinguish the MGIS from the traditional GIS.展开更多
During the 12^(th)Five-Year Plan period,the environmental protection information work made remarkable achievements,and the construction of nationwide air quality monitoring network was completed; the trinitarian monit...During the 12^(th)Five-Year Plan period,the environmental protection information work made remarkable achievements,and the construction of nationwide air quality monitoring network was completed; the trinitarian monitoring system was established,and environmental emergency command ability enhanced significantly. However,the issues of " information island" and " application silo" are still outstanding,and the application and promotion of new technologies make slow progress; the capacity of information system to support environmental protection business is insufficient,and there is no capacity for decision analysis. In the 13^(th)Five-Year Plan period,it is needed to strengthen the application and promotion of new technologies such as cloud computing,big data,Internet of Things,and spatial information,mainly construct and improve " Cloud Computing Based Environmental Protection( CCBEP) ", " big data platform of ecological environment",and then realize the core objective of improving environmental quality.展开更多
Attaining a highly efficient and inexpensive electrocatalyst is significant for the hydrogen evolution reaction(HER)but still challenging nowadays.The transition-metal phosphides(TMPs)catalysts with platinum-like elec...Attaining a highly efficient and inexpensive electrocatalyst is significant for the hydrogen evolution reaction(HER)but still challenging nowadays.The transition-metal phosphides(TMPs)catalysts with platinum-like electronic structures are a potential candidate for the HER,but those are prone to be strongly bound with hydrogen intermediates(H∗),resulting in sluggish HER kinetics.Herein we report a unique hybrid structure of CoP anchored on graphene nanoscrolls@carbon nano tubes(CNTs)scaffold(Ni M@C-CoP)encapsulating various Ni M(M=Zn,Mo,Ni,Co)bimetal nanoalloy via chemical vapor deposi-tion(CVD)growth of CNT on graphene nanoscrolls followed by the impregnation of cobalt precursors and phosphorization for efficiently electrocatalytic hydrogen evolution.CoP nanoparticles mainly scattered at the tip of CNT branches which exhibited the analogical“Three-layer core-shell”structures.Experiments and density functional theory(DFT)calculations consistently disclose that the encapsulated various NiMs can offer different numbers of electrons to weaken the interactions of outmost CoP with H∗and push the downshift of the d-band center to different degrees as well as stabilize the outmost CoP nanopar-ticles to gain catalytic stability via the electron traversing effect.The electrocatalytic HER activity can be maximumly enhanced with low overpotentials of 78 mV(alkaline)and 89 mV(acidic)at a current density of 10 mA/cm^(2) and sustained at least 24 h especially for NiZn@C-CoP catalyst.This novel system is distinct from conventional three-layer heterostructure,providing a specially thought of d-band center control engineering strategy for the design of heterogeneous catalysts and expanding to other electrocat-alysts,energy storage,sensing,and other applications.展开更多
With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.He...With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method.展开更多
Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper...Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center.展开更多
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an...Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted fro...Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
Based on nonlinear prediction and information theory, vertical heterogeneity of predictability and information loss rate in geopotential height field are obtained over the Northern Hemisphere. On a seasonal-to-interan...Based on nonlinear prediction and information theory, vertical heterogeneity of predictability and information loss rate in geopotential height field are obtained over the Northern Hemisphere. On a seasonal-to-interannual time scale, the predictability is low in the lower troposphere and high in the mid-upper troposphere. However, within mid-upper troposphere over the subtropics ocean area, there is a relatively poor predictability. These conclusions also fit the seasonal time scale. Moving to the interannual time scale, the predictability becomes high in the lower troposphere and low in the mid-upper troposphere, contrary to the former case. On the whole the interannual trend is more predictable than the seasonal trend. The average information loss rate is low over the mid-east Pacific, west of North America, Atlantic and Eurasia, and the atmosphere over other places has a relatively high information loss rate on all-time scales. Two channels are found steadily over the Pacific Ocean and Atlantic Ocean in subtropics. There are also unstable channels. The four- season influence on predictability and information communication are studied. The predictability is low, no matter which season data are removed and each season plays an important role in the existence of the channels, except for the winter. The predictability and teleconnections are paramount issues in atmospheric science, and the teleconnections may be established by communication channels. So, this work is interesting since it reveals the vertical structure of predictability distribution, channel locations, and the contributions of different time scales to them and their variations under different seasons.展开更多
Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a no...Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a novel controlled quantum network coding without information loss.The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie.Firstly,two pairs of threeparticle non-maximum entangled states are pre-shared between senders and controller.By adding auxiliary particles and local operations,the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the Z-{10>,|1>}basis.Secondly,when trans-mission fails upon prediction,the quantum state will not be lost,and it will sill be held by the sender.Subsequently,the controller Charlie re-prepares another three-particle non-maximum entangled state to start a new round.When the predicted transmission is successful,the quantum state can be transmitted successfully within the butterfly network.If the receiver wants to receive the effective quantum state,the quantum measurements from Charlie are needed.Thirdly,when the transmission fails,Charlie does not need to integrate the X-{1+>,1->}basis to measure its own particles,by which quantum resources are saved.Charlie not only controls the effective transmission of quantum states,but also the usage of classical and quantum channels.Finally,the implementation of the quantum circuits,as well as a flow chart and safety analysis of our scheme,is proposed.展开更多
Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in ...Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in educational institutions,determining the security level for a single IT system has been well developed.However,it is still dificult to evaluate the information security level of the entire educational institution consid-ering multiple IT systems,because there might be too many different IT systems in one institution,educational institutions can be very different,and there is no standard model or method to provide a just ifable information security evaluation among different educational inst itutions considering their differences.In light of these difi-culties,a security evaluation model of educational institutions'IT systems(SEMEIS)is proposed in this work to facilitate the information security management for the educat ional institutions.Firstly,a simplified educational industry information system security level protection rating(EIISSLPR)with a new weight redistribution strategy for a single IT systern is proposed by choosing important evaluation questions from EIISSLPR and redistributing the weights of these questions.Then for the entire educational institution,analytic hierarchy process(AHP)is used to redistribute the weights of multiple IT systems at different security levels.considering the risk of pos-sible network security vulnerabilities,a risk index is forulated by weighting different factors,normalized by a utility function,and calculated with the real data collected from the institutions under the evaluation.Finally,the information security performance of educational institutions is obtained as the final score from SEMEIS.The results show that SEMEIS can evaluate the security level of the educat ion institutions practically and provide an efficient and effective management tool for the information security management.展开更多
基金funded by the Open Foundation of Key Laboratory of Cyberspace Security,Ministry of Education[KLCS20240210].
文摘With the rapid growth of the Internet and social media, information is widely disseminated in multimodal forms, such as text and images, where discriminatory content can manifest in various ways. Discrimination detection techniques for multilingual and multimodal data can identify potential discriminatory behavior and help foster a more equitable and inclusive cyberspace. However, existing methods often struggle in complex contexts and multilingual environments. To address these challenges, this paper proposes an innovative detection method, using image and multilingual text encoders to separately extract features from different modalities. It continuously updates a historical feature memory bank, aggregates the Top-K most similar samples, and utilizes a Gated Recurrent Unit (GRU) to integrate current and historical features, generating enhanced feature representations with stronger semantic expressiveness to improve the model’s ability to capture discriminatory signals. Experimental results demonstrate that the proposed method exhibits superior discriminative power and detection accuracy in multilingual and multimodal contexts, offering a reliable and effective solution for identifying discriminatory content.
基金supported by the Natural Science Foundation of China No.62362008the Major Scientific and Technological Special Project of Guizhou Province([2024]014).
文摘With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks.However,the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices.Therefore,this paper proposes an efficient privacy-preserving CNN framework(i.e.,EPPA)based on the Fully Homomorphic Encryption(FHE)scheme for AIoT application scenarios.In the plaintext domain,we verify schemes with different activation structures to determine the actual activation functions applicable to the corresponding ciphertext domain.Within the encryption domain,we integrate batch normalization(BN)into the convolutional layers to simplify the computation process.For nonlinear activation functions,we use composite polynomials for approximate calculation.Regarding the noise accumulation caused by homomorphic multiplication operations,we realize the refreshment of ciphertext noise through minimal“decryption-encryption”interactions,instead of adopting bootstrapping operations.Additionally,in practical implementation,we convert three-dimensional convolution into two-dimensional convolution to reduce the amount of computation in the encryption domain.Finally,we conduct extensive experiments on four IoT datasets,different CNN architectures,and two platforms with different resource configurations to evaluate the performance of EPPA in detail.
基金supported by the National Natural Science Foundation of China (Grant Nos.12074213 and 11574108)the Major Basic Program of Natural Science Foundation of Shandong Province (Grant No.ZR2021ZD01)the Natural Science Foundation of Shandong Province (Grant No.ZR2023MA082)。
文摘In recent years,the research on superconductivity in one-dimensional(1D)materials has been attracting increasing attention due to its potential applications in low-dimensional nanodevices.However,the critical temperature(T_(c))of 1D superconductors is low.In this work,we theoretically investigate the possible high T_(c) superconductivity of(5,5)carbon nanotube(CNT).The pristine(5,5)CNT is a Dirac semimetal and can be modulated into a semiconductor by full hydrogenation.Interestingly,by further hole doping,it can be regulated into a metallic state with the sp3-hybridized𝜎electrons metalized,and a giant Kohn anomaly appears in the optical phonons.The two factors together enhance the electron–phonon coupling,and lead to high-T_(c) superconductivity.When the hole doping concentration of hydrogenated-(5,5)CNT is 2.5 hole/cell,the calculated T_(c) is 82.3 K,exceeding the boiling point of liquid nitrogen.Therefore,the predicted hole-doped hydrogenated-(5,5)CNT provides a new platform for 1D high-T_(c) superconductivity and may have potential applications in 1D nanodevices.
基金National Natural Science Foundation of China,No.42101252。
文摘Rapid regional population shifts and spatial polarization have heightened pressure on cultivated land—a critical resource demanding urgent attention amid ongoing urban-rural transition.This study selects Jiangsu province,a national leader in both economic and agricultural development,as a case area to construct a multidimensional framework for assessing the recessive morphological characteristics of multifunctional cultivated land use.We examine temporal dynamics,spatial heterogeneity,and propose an integrated zoning strategy based on empirical analysis.The results reveal that:(1)The recessive morphology index shows a consistent upward trend,with structural breaks in 2007 and 2013,and a spatial shift from“higher in the east and lower in the west”to“higher in the south and lower in the north.”(2)Coordination among sub-dimensions of the index has steadily improved.(3)The index is expected to continue rising in the next decade,though at a slower pace.(4)To promote coordinated multidimensional land-use development,we recommend a policy framework that reinforces existing strengths,addresses weaknesses,and adapts zoning schemes to current spatial conditions.This research offers new insights into multifunctional cultivated land systems and underscores their role in enhancing human well-being,securing food supply,and supporting sustainable urban-rural integration.
基金Support by National Natural Science Foundation Grant(Correlation Analysis Among Herb's Properties affecting the Multiple Parameters of the Blood and the Morphology of the Organism Structure,No.81473366)
文摘OBJECTIVE:To study the morphological basis of the role of Siqi(cold as winter,cool as autumn,warm as spring,hot as summer),Wuwei(five flavors:sweet,pungent,salty,sour,and bitter),and Guijing(meridian tropism) through the use of information integration.METHODS:A14C-2-deoxy-glucose autoradiography method was adopted to determine the overall impact of treatment with 39 herbs on functions of various tissues and organs.Data was measured at 4hs after a single dose and following the last treatment of repeated doses for a week.Least-squares estimation was used and fitted for each herb regression effect of organs and tissues after singleand repeated treatment.The slope of the regression line represented the cumulative trend of the effect of the herbs(β),and the standard deviation of the slope(Sβ) was compared with those of the untreated animals(t 'test).All significantly cumulative effect trends were applied with an artificial neural network,which integrated the relationship among Siqi,Wuwei,and Guijing with tissues and organs.RESULTS:There is a certain relationship among the Siqi,Wuwei,Guijing and the anatomy of organs and tissues,but the different scores indicate that influence of Siqi,Wuwei,Guijing to anatomy of organs and tissues was a nonlinear state.CONCLUSION:Results demonstrated that the effects of Siqi,Wuwei,and Guijing have a morphological basis,and each concept was associated with multiple anatomical structures.
基金Supported by Business Construction Project of China Meteorological Administration in 2011Key Project of Key Meteorological Technology Integration and Application of China Meteorological Administration(CMAGJ2013Z01)
文摘This paper has designed a unified storage model of Automatic Weather Station Quality Information Inquiries and Feedback( AWSQIF),and has developed an AWSQIF automatic management system,which implements the storage of AWSQIF automatically in national quality information two-way feedback process. Based on the unified storage,AWSQIF data have important application in real-time data management,data quality assessment and quality control effect analysis. The results show that the data quality has been improved significantly,and the data assessment has achieved online operating. In addition,AWSQIF can assist the improvement of the quality control effect.
基金the National High Technology Research and Development Program of China (863 Program) (No. 2008AA121600)the National BasicResearch Program of China (973 Program)(No. 2010CB731801)the National Natural Science Foundation of China (No. 40871212)
文摘Aiming at the integrative management and comprehensive applications of large-scale 3D geospatial information covering the full 3D space of a city, this paper briefly introduces the design and implementation of a full 3D GIS platform: GeoScope, which provides a professional solution for the massive full three-dimensional geospatial data integration, management, analysis, visualization, and applications. GeoScope is characterized by: (1) extendible software architecture based on the hierarchical message bus, facilitates multimodal integrative applications of 2D GIS and 3D GIS; (2) unified 3D city models, support multiscale se- mantic representation of outdoor & indoor and aboveground & underground 3D objects; (3) high-efficient 3D geospatial database engine, supports integrated management of massive 3D geospatial data for real-time applications; and (4) high-performance visualization engine exploiting the massively parallel computation architecture of modem GPUs, supports real-time realistic rendering of large-scale complicated 3D geospatial environments. The successful pilot application of GeoScope is also illustrated with the 3D city models of 8494 knl2 of the whole Wuhan City, the largest city in middle China.
基金the Hi-Tech and Research Development Program of China(2005AA133070)the Electronics Information Industry Development Fund Tender Project(XDJ2-0514-27)
文摘Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology.
基金funded by the Project of"973"Program of China under contract No.2006 CB701305the National Natural Science Foundation of China under contract No.40571129.
文摘Marine geographic information system (MGIS) has great ability to deal with the spatio-temporal problems and has potential superiority when it is applied to oceanography. Using the feature extraction of oceanic phenomena as a case study, the functions of the MGIS are analyzed, and thus the position of MGIS in the oceanography is defined. Comparing the requirement of MGIS with that of the traditional GIS which has been developed in the terrestrial applications in the past four decades, the frame for the functions of MGIS is constructed. According to the established MGIS, some key technologies are discussed in detail with emphasis on the specialities which can distinguish the MGIS from the traditional GIS.
文摘During the 12^(th)Five-Year Plan period,the environmental protection information work made remarkable achievements,and the construction of nationwide air quality monitoring network was completed; the trinitarian monitoring system was established,and environmental emergency command ability enhanced significantly. However,the issues of " information island" and " application silo" are still outstanding,and the application and promotion of new technologies make slow progress; the capacity of information system to support environmental protection business is insufficient,and there is no capacity for decision analysis. In the 13^(th)Five-Year Plan period,it is needed to strengthen the application and promotion of new technologies such as cloud computing,big data,Internet of Things,and spatial information,mainly construct and improve " Cloud Computing Based Environmental Protection( CCBEP) ", " big data platform of ecological environment",and then realize the core objective of improving environmental quality.
基金This work was supported by the Science and Technology Pro-gram of Shaanxi Province(No.2019GY-200).Shengwu Guo and Wei Wang contributed to the material TEM and SEM characterizations in this work.
文摘Attaining a highly efficient and inexpensive electrocatalyst is significant for the hydrogen evolution reaction(HER)but still challenging nowadays.The transition-metal phosphides(TMPs)catalysts with platinum-like electronic structures are a potential candidate for the HER,but those are prone to be strongly bound with hydrogen intermediates(H∗),resulting in sluggish HER kinetics.Herein we report a unique hybrid structure of CoP anchored on graphene nanoscrolls@carbon nano tubes(CNTs)scaffold(Ni M@C-CoP)encapsulating various Ni M(M=Zn,Mo,Ni,Co)bimetal nanoalloy via chemical vapor deposi-tion(CVD)growth of CNT on graphene nanoscrolls followed by the impregnation of cobalt precursors and phosphorization for efficiently electrocatalytic hydrogen evolution.CoP nanoparticles mainly scattered at the tip of CNT branches which exhibited the analogical“Three-layer core-shell”structures.Experiments and density functional theory(DFT)calculations consistently disclose that the encapsulated various NiMs can offer different numbers of electrons to weaken the interactions of outmost CoP with H∗and push the downshift of the d-band center to different degrees as well as stabilize the outmost CoP nanopar-ticles to gain catalytic stability via the electron traversing effect.The electrocatalytic HER activity can be maximumly enhanced with low overpotentials of 78 mV(alkaline)and 89 mV(acidic)at a current density of 10 mA/cm^(2) and sustained at least 24 h especially for NiZn@C-CoP catalyst.This novel system is distinct from conventional three-layer heterostructure,providing a specially thought of d-band center control engineering strategy for the design of heterogeneous catalysts and expanding to other electrocat-alysts,energy storage,sensing,and other applications.
文摘With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method.
文摘Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303199,61272514,61170272,61121061,and 61411146001)the Shandong Provincial Natural Science Foundation of China(Grant Nos.ZR2013FM025,ZR2013FQ001,and ZR2014FM003)+4 种基金the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China(Grant Nos.BS2013DX010 and BS2014DX007)the Program for New Century Excellent Talents in Universities,China(Grant No.NCET-13-0681)the National Development Foundation for Cryptological Research,China(Grant No.MMJJ201401012)the Fok Ying Tong Education Foundation,China(Grant No.131067)the Shandong Academy of Sciences Youth Fund Project,China(Grant No.2013QN007)
文摘Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
文摘Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
基金Project supported by the National Key Basic Research and Development Program,China (Grant Nos.2012CB955902 and 2013CB430204)the National Natural Science Foundation of China (Grant Nos.41305059,41305100,41275096 and 41105070)
文摘Based on nonlinear prediction and information theory, vertical heterogeneity of predictability and information loss rate in geopotential height field are obtained over the Northern Hemisphere. On a seasonal-to-interannual time scale, the predictability is low in the lower troposphere and high in the mid-upper troposphere. However, within mid-upper troposphere over the subtropics ocean area, there is a relatively poor predictability. These conclusions also fit the seasonal time scale. Moving to the interannual time scale, the predictability becomes high in the lower troposphere and low in the mid-upper troposphere, contrary to the former case. On the whole the interannual trend is more predictable than the seasonal trend. The average information loss rate is low over the mid-east Pacific, west of North America, Atlantic and Eurasia, and the atmosphere over other places has a relatively high information loss rate on all-time scales. Two channels are found steadily over the Pacific Ocean and Atlantic Ocean in subtropics. There are also unstable channels. The four- season influence on predictability and information communication are studied. The predictability is low, no matter which season data are removed and each season plays an important role in the existence of the channels, except for the winter. The predictability and teleconnections are paramount issues in atmospheric science, and the teleconnections may be established by communication channels. So, this work is interesting since it reveals the vertical structure of predictability distribution, channel locations, and the contributions of different time scales to them and their variations under different seasons.
基金This work is supported by NSFC(Grant Nos.92046001,61571024,61671087,61962009,61971021)the Aeronautical Science Foundation of China(2018ZC51016)+4 种基金the Fundamental Research Funds for the Central Universities(Grant No.2019XD-A02)the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant Nos.2018BDKFJJ018,2019BDKFJJ010,2019BDKFJJ014)the Open Research Project of the State Key Laboratory of Media Convergence and Communication,Communication University of China,China(Grant No.SKLMCC2020KF006)Huawei Technologies Co.Ltd(Grant No.YBN2020085019)the Scientific Research Foundation of North China University of Technology.
文摘Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a novel controlled quantum network coding without information loss.The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie.Firstly,two pairs of threeparticle non-maximum entangled states are pre-shared between senders and controller.By adding auxiliary particles and local operations,the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the Z-{10>,|1>}basis.Secondly,when trans-mission fails upon prediction,the quantum state will not be lost,and it will sill be held by the sender.Subsequently,the controller Charlie re-prepares another three-particle non-maximum entangled state to start a new round.When the predicted transmission is successful,the quantum state can be transmitted successfully within the butterfly network.If the receiver wants to receive the effective quantum state,the quantum measurements from Charlie are needed.Thirdly,when the transmission fails,Charlie does not need to integrate the X-{1+>,1->}basis to measure its own particles,by which quantum resources are saved.Charlie not only controls the effective transmission of quantum states,but also the usage of classical and quantum channels.Finally,the implementation of the quantum circuits,as well as a flow chart and safety analysis of our scheme,is proposed.
基金the Science and Technology Innovation Program of Shanghai Science and Technology Commit-tee(No.19511103500)。
文摘Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in educational institutions,determining the security level for a single IT system has been well developed.However,it is still dificult to evaluate the information security level of the entire educational institution consid-ering multiple IT systems,because there might be too many different IT systems in one institution,educational institutions can be very different,and there is no standard model or method to provide a just ifable information security evaluation among different educational inst itutions considering their differences.In light of these difi-culties,a security evaluation model of educational institutions'IT systems(SEMEIS)is proposed in this work to facilitate the information security management for the educat ional institutions.Firstly,a simplified educational industry information system security level protection rating(EIISSLPR)with a new weight redistribution strategy for a single IT systern is proposed by choosing important evaluation questions from EIISSLPR and redistributing the weights of these questions.Then for the entire educational institution,analytic hierarchy process(AHP)is used to redistribute the weights of multiple IT systems at different security levels.considering the risk of pos-sible network security vulnerabilities,a risk index is forulated by weighting different factors,normalized by a utility function,and calculated with the real data collected from the institutions under the evaluation.Finally,the information security performance of educational institutions is obtained as the final score from SEMEIS.The results show that SEMEIS can evaluate the security level of the educat ion institutions practically and provide an efficient and effective management tool for the information security management.