With the proliferation of the Internet of Things(IoT),various services are emerging with totally different features and requirements,which cannot be supported by the current fifth generation of mobile cellular network...With the proliferation of the Internet of Things(IoT),various services are emerging with totally different features and requirements,which cannot be supported by the current fifth generation of mobile cellular networks(5G).The future sixth generation of mobile cellular networks(6G)is expected to have the capability to support new and unknown services with changing requirements.Hence,in addition to enhancing its capability by 10–100 times compared with 5G,6G should also be intelligent and open to adapt to the ever-changing services in the IoT,which requires a convergence of Communication,Computing and Caching(3C).Based on the analysis of the requirements of new services for 6G,this paper identifies key enabling technologies for an intelligent and open 6G network,all featured with 3C convergence.These technologies cover fundamental and emerging topics,including 3C-based spectrum management,radio channel construction,delay-aware transmission,wireless distributed computing,and network self-evolution.From the detailed analysis of these 3C-based technologies presented in this paper,we can see that although they are promising to enable an intelligent and open 6G,more efforts are needed to realize the expected 6G network.展开更多
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM...With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.展开更多
Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computin...Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computing,as it extends the paradigm of granular computing to ordered data,specifies a syntax and modality of information granules which are appropriate for dealing with ordered data,and enables computing with words and reasoning about ordered data.Granular computing with ordered data is a very general paradigm,because other modalities of information constraints,such as veristic,possibilistic and probabilistic modalities,have also to deal with ordered value sets(with qualifiers relative to grades of truth,possibility and probability),which gives DRSA a large area of applications.展开更多
The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for thre...The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for three versions of the Ballet family block ciphers.The Ballet‑p/k includes a modular-addition operation uncommon in lightweight block ciphers.Quantum ripple-carry adder is implemented for both“32+32”and“64+64”scale to support this operation.Subsequently,qubits,quantum gates count,and quantum circuit depth of three versions of Ballet algorithm are systematically evaluated under quantum computing model,and key recovery attack circuits are constructed based on Grover’s algorithm against each version.The comprehensive analysis shows:Ballet-128/128 fails to NIST Level 1 security,while when the resource accounting is restricted to the Clifford gates and T gates set for the Ballet-128/256 and Ballet-256/256 quantum circuits,the design attains Level 3.展开更多
1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the es...1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the escalating demand for high-performance computing over space.Computing over space entails the deployment of computational resources on platforms such as satellites to process large-scale data under constraints such as high radiation exposure,restricted power consumption,and minimized weight.展开更多
Purpose–This paper conducts a joint analysis of monitoring data in the hidden danger areas of railway subgrade deformation using a data-driven method,thereby realizing the systematic risk identification of regional h...Purpose–This paper conducts a joint analysis of monitoring data in the hidden danger areas of railway subgrade deformation using a data-driven method,thereby realizing the systematic risk identification of regional hidden dangers.Design/methodology/approach–The paper proposes a regional systematic risk identification method based on Bayesian and independent component analysis(ICA)theories.Firstly,the Gray Wolf Optimization(GWO)algorithm is used to partition each group of monitoring data in the hidden danger area,so that the data distribution characteristics within each sub-block are similar.Then,a distributed ICA early warning model is constructed to obtain prior knowledge such as control limits and statistics of the area under normal conditions.For the online evaluation process,the input data is partitioned following the above-mentioned procedure and the ICA statistics of each sub-block are calculated.The Bayesian method is applied to fuse online parameters with offline parameters,yielding statistics under a specific confidence interval.These statistics are then compared with the control limits–specifically,checking whether they exceed the pre-set confidence parameters–thus realizing the systematic risk identification of the hidden danger area.Findings–Through simulation experiments,the proposed method can integrate prior knowledge such as control limits and statistics to effectively determine the overall stability status of the area,thereby realizing the systematic risk identification of the hidden danger area.Originality/value–The proposed method leverages Bayesian theory to fuse online process parameters with offline parameters and further compares them with confidence parameters,thereby effectively enhancing the utilization efficiency of monitoring data and the robustness of the analytical model.展开更多
Purpose-The indoor vibration compaction test(IVCT)was a key step in controlling the compaction quality for high-speed railway graded aggregate(HRGA),which currently had a research gap on the assessment indicators and ...Purpose-The indoor vibration compaction test(IVCT)was a key step in controlling the compaction quality for high-speed railway graded aggregate(HRGA),which currently had a research gap on the assessment indicators and compaction parameters.Design/methodology/approach-To address these issues,a novel multi-indicator IVCT method was proposed,including physical indicator dry density(ρd)and mechanical indicators dynamic stiffness(Krb)and bearing capacity coefficient(K20).Then,a series of IVCTs on HRGA under different compaction parameters were conducted with an improved vibration compactor,which could monitor the physical-mechanical indicators in real-time.Finally,the optimal vibration compaction parameters,including the moisture content(ω),the diameter-to-maximum particle size ratio(Rd),the thickness-to-maximum particle size ratio(Rh),the vibration frequency(f),the vibration mass(Mc)and the eccentric distance(re),were determined based on the evolution characteristics for the physical-mechanical indicators during compaction.Findings-All results indicated that theρd gradually increased and then stabilized,and the Krb initially increased and then decreased.Moreover,the inflection time of the Krb was present as the optimal compaction time(Tlp)during compaction.Additionally,optimal compaction was achieved whenωwas the water-holding content after mud pumping,Rd was 3.4,Rh was 3.5,f was the resonance frequency,and the ratio between the excitation force and the Mc was 1.8.Originality/value-The findings of this paper were significant for the quality control of HRGA compaction.展开更多
Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed ...Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed Vehicular Communication Network(VCN)topologies.However,when the network is under attack,the communication delay may be much higher,and the stability of the system may not be guaranteed.This paper proposes a novel communication Delay Aware CACC with Dynamic Network Topologies(DADNT).The main idea is that for various communication delays,in order to maximize the traffic capacity while guaranteeing stability and minimizing the following error,the CACC should dynamically adjust the VCN network topology to achieve the minimum inter-vehicle spacing.To this end,a multi-objective optimization problem is formulated,and a 3-step Divide-And-Conquer sub-optimal solution(3DAC)is proposed.Simulation results show that with 3DAC,the proposed DADNT with CACC can reduce the inter-vehicle spacing by 5%,10%,and 14%,respectively,compared with the traditional CACC with fixed one-vehicle,two-vehicle,and three-vehicle look-ahead network topologies,thereby improving the traffic efficiency.展开更多
Accurate evaluation of elec-tron correlations is essential for the reliable quantitative de-scription of electronic struc-tures in strongly correlated sys-tems,including bond-dissociat-ing molecules,polyradicals,large...Accurate evaluation of elec-tron correlations is essential for the reliable quantitative de-scription of electronic struc-tures in strongly correlated sys-tems,including bond-dissociat-ing molecules,polyradicals,large conjugated molecules,and transition metal complex-es.To provide a user-friendly tool for studying such challeng-ing systems,our team developed Kylin 1.0[J.Comput.Chem.44,1316(2023)],an ab initio quantum chemistry program designed for efficient density matrix renormalization group(DMRG)and post-DMRG methods,enabling high-accuracy calculations with large active spaces.We have now further advanced the software with the release of Kylin 1.3,featuring optimized DMRG algorithms and an improved tensor contraction scheme in the diagonaliza-tion step.Benchmark calculations on the Mn_(4)CaO_(5)cluster demonstrate a remarkable speed-up of up to 16 fater than Kylin 1.0.Moreover,a more user-friendly and efficient algorithm[J.Chem.Theory Comput.17,3414(2021)]for sampling configurations from DMRG wavefunc-tion is implemented as well.Additionally,we have also implemented a spin-adapted version of the externally contracted multi-reference configuration interaction(EC-MRCI)method[J.Phys.Chem.A 128,958(2024)],further enhancing the program’s efficiency and accuracy for electron correlation calculations.展开更多
Behavioral scoring based on clinical observations remains the gold standard for screening,diagnosing,and evaluating infantile epileptic spasm syndrome(IESS).The accurate identification of seizures is crucial for clini...Behavioral scoring based on clinical observations remains the gold standard for screening,diagnosing,and evaluating infantile epileptic spasm syndrome(IESS).The accurate identification of seizures is crucial for clinical diagnosis and assessment.In this study,we propose an innovative seizure detection method based on video feature recognition of patient spasms.To capture the temporal characteristics of the spasm behavior presented in the videos effectively,we incorporate asymmetric convolutions and convolution–batch normalization–ReLU(CBR)modules.Specifically within the 3D-ResNet residual blocks,we split the larger convolutional kernels into two asymmetric 3D convolutional kernels.These kernels are connected in series to enhance the ability of the convolutional layers to extract key local features,both horizontally and vertically.In addition,we introduce a 3D convolutional block attention module to enhance the spatial correlations between video frame channels efficiently.To improve the generalization ability,we design a composite loss function that combines cross-entropy loss with triplet loss to balance the classification and similarity requirements.We train and evaluate our method using the PLA IESS-VIDEO dataset,achieving an average seizure recognition accuracy of 90.59%,precision of 90.94%,and recall of 87.64%.To validate its generalization capability further,we conducted external validation using six different patient monitoring videos compared with assessments by six human experts from various medical centers.The final test results demonstrate that our method achieved a recall of 0.6476,surpassing the average level achieved by human experts(0.5595),while attaining a high F1-score of 0.7219.These findings have substantial significance for the long-term assessment of patients with IESS.展开更多
To implement five-axis functions in CNC system, based on domestic system Lan Tian series, an improved design method for the system software structure is proposed in this paper. The numerical control kernel of CNC syst...To implement five-axis functions in CNC system, based on domestic system Lan Tian series, an improved design method for the system software structure is proposed in this paper. The numerical control kernel of CNC system is divided into the task layer and the motion layer. A five-axis transformation unit is integrated into the motion layer. After classifying five-axis machines into different types and analyzing their geometry information, the five-axis kinematic library is designed according to the abstract factory pattern. Furthermore, by taking CA spindle- tilting machine as an example, the forward and the inverse kinematic transformations are deduced. Based on the new software architecture and the five-axis kinematic library, algorithms of RTCP (rotation tool center point control) and 3D radius compensation for end-milling are designed and realized. The milling results show that, with five-axis functions based on such software struc- ture, the instructions with respect to the cutter's position and orientation can be directly carried out in the CNC system.展开更多
The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while...The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while ignoring the structural diversity of different sub-networks. In this paper, we evaluate the robustness of the global cargo ship transportation network based on the most recent Automatic Identification System(AIS) data available. First, we subdivide three typical cargo ship transportation networks(i.e., oil tanker, container ship and bulk carrier) from the original cargo ship transportation network. Then, we design statistical indices based on complex network theory and employ four attack strategies, including random attack and three intentional attacks(i.e., degree-based attack, betweenness-based attack and flux-based attack) to evaluate the robustness of the three typical cargo ship transportation networks. Finally, we compare the integrity of the remaining ports of the network when a small proportion of ports lose their function. The results show that 1) compared with the holistic cargo ship transportation network, the fine-grain-based cargo ship transportation networks can fully reflect the pattern and process of global cargo transportation; 2) different cargo ship networks behave heterogeneously in terms of their robustness, with the container network being the weakest and the bulk carrier network being the strongest; and 3) small-scale intentional attacks may have significant influence on the integrity of the container network but a minor impact on the bulk carrier and oil tanker transportation networks. These conclusions can help improve the decision support capabilities in maritime transportation planning and emergency response and facilitate the establishment of a more reliable maritime transportation system.Abstract: The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while ignoring the structural diversity of different sub-networks. In this paper, we evaluate the robustness of the global cargo ship transporta- tion network based on the most recent Automatic Identification System (AIS) data available. First, we subdivide three typical cargo ship transportation networks (i.e., oil tanker, container ship and bulk carrier) from the original cargo ship transportation network. Then, we design statistical indices based on complex network theory and employ four attack strategies, in- cluding random attack and three intentional attacks (i.e., degree-based attack, between- ness-based attack and flux-based attack) to evaluate the robustness of the three typical cargo ship transportation networks. Finally, we compare the integrity of the remaining ports of the network when a small proportion of ports lose their function. The results show that 1) com- pared with the holistic cargo ship transportation network, the fine-grain-based cargo ship transportation networks can fully reflect the pattern and process of global cargo transportation 2) different cargo ship networks behave heterogeneously in terms of their robustness, with the container network being the weakest and the bulk carrier network being the strongest; and 3) small-scale intentional attacks may have significant influence on the integrity of the con- tainer network but a minor impact on the bulk carrier and oil tanker transportation networks.These conclusions can help improve the decision support capabilities in maritime transportation planning and emergency response and facilitate the establishment of a more reliable maritime transportation system.展开更多
Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch att...Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed.展开更多
Graph convolutional networks(GCNs)have received significant attention from various research fields due to the excellent performance in learning graph representations.Although GCN performs well compared with other meth...Graph convolutional networks(GCNs)have received significant attention from various research fields due to the excellent performance in learning graph representations.Although GCN performs well compared with other methods,it still faces challenges.Training a GCN model for large-scale graphs in a conventional way requires high computation and storage costs.Therefore,motivated by an urgent need in terms of efficiency and scalability in training GCN,sampling methods have been proposed and achieved a significant effect.In this paper,we categorize sampling methods based on the sampling mechanisms and provide a comprehensive survey of sampling methods for efficient training of GCN.To highlight the characteristics and differences of sampling methods,we present a detailed comparison within each category and further give an overall comparative analysis for the sampling methods in all categories.Finally,we discuss some challenges and future research directions of the sampling methods.展开更多
Interstitial fluid(ISF)flow through vascular adventitia has been discovered recently.However,its kinetic pattern was unclear.We used histological and topographical identification to observe ISF flow along venous vesse...Interstitial fluid(ISF)flow through vascular adventitia has been discovered recently.However,its kinetic pattern was unclear.We used histological and topographical identification to observe ISF flow along venous vessels in rabbits.By magnetic resonance imaging(MRI)in live subjects,the inherent pathways of ISF flow from the ankle dermis through the legs,abdomen,and thorax were enhanced by paramagnetic contrast.By fluorescence stereomicroscopy and layer-by-layer dissection after the rabbits were sacrificed,the perivascular and adventitial connective tissues(PACTs)along the saphenous veins and inferior vena cava were found to be stained by sodium fluorescein from the ankle dermis,which coincided with the findings by MRI.The direction of ISF transport in a venous PACT pathway was the same as that of venous blood flow.By confocal microscopy and histological analysis,the stained PACT pathways were verified to be the fibrous connective tissues,consisting of longitudinally assembled fibers.Real-time observations by fluorescence stereomicroscopy revealed at least two types of spaces for ISF flow:one along adventitial fibers and another one between the vascular adventitia and its covering fascia.Using nanoparticles and surfactants,a PACT pathway was found to be accessible by a nanoparticle of<100 nm and contained two parts:a transport channel and an absorptive part.The calculated velocity of continuous ISF flow along fibers of the PACT pathway was 3.6-15.6 mm/s.These data revealed that a PACT pathway was a"slit-shaped"porous biomaterial,comprising a longitudinal transport channel and an absorptive part for imbibition.The use of surfactants suggested that interfacial tension might play an essential role in layers of continuous ISF flow along vascular vessels.A hypothetical"gel pump"is proposed based on interfacial tension and interactions to regulate ISF flow.These experimental findings may inspire future studies to explore the physiological and pathophysiological functions of vascular ISF or interfacial fluid flow among interstitial connective tissues throughout the body.展开更多
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n...The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly.展开更多
For the problems of machining distortion and the low accepted product during milling process of aluminum alloy thin-walled part,this paper starts from the analysis of initial stress state in material preparation proce...For the problems of machining distortion and the low accepted product during milling process of aluminum alloy thin-walled part,this paper starts from the analysis of initial stress state in material preparation process,the change process of residual stress within aluminum alloy pre-stretching plate is researched,and the distribution law of residual stress is indirectly obtained by delamination measurement methods,so the effect of internal residual stress on machining distortion is considered before finite element simulation. Considering the coupling effects of residual stress,dynamic milling force and clamping force on machining distortion,a threedimensional dynamic finite element simulation model is established,and the whole cutting process is simulated from the blank material to finished product,a novel prediction method is proposed,which can availably predict the machining distortion accurately. The machining distortion state of the thin-walled part is achieved at different processing steps,the machining distortion of the thin-walled part is detected with three coordinate measuring machine tools,show that the simulation results are in good agreement with experimental data.展开更多
AVS2 is a new generation video coding standard developed by the AVS working group. Compared with the first generation AVS video coding standard, known as AVS1, AVS2 significantly improves coding performance by using m...AVS2 is a new generation video coding standard developed by the AVS working group. Compared with the first generation AVS video coding standard, known as AVS1, AVS2 significantly improves coding performance by using many new coding technologies, e.g., adaptive block partition and two level transform coding. Moreover, for scene video, e.g. surveillance video and conference vid?eo, AVS2 provided a background picture modeling scheme to achieve more accurate prediction, which can also make object detec?tion and tracking in surveillance video coding more flexible. Experimental results show that AVS2 is competitive with High Effi?ciency Video Coding (HEVC) in terms of performance. Especially for scene video, AVS2 can achieve 39% bit rate saving over HEVC.展开更多
DNS is one of the most important basic infrastructures of the Internet,attacks on which will prevent the Internet from working properly.Therefore,its security is receiving great concern.This paper analyzes the princip...DNS is one of the most important basic infrastructures of the Internet,attacks on which will prevent the Internet from working properly.Therefore,its security is receiving great concern.This paper analyzes the principles of both traditional and novel(Kaminsky)DNS cache poisoning,presents attack samples and describes the whole attack process in detail.After verifying the potential harm of DNS cache poisoning,the paper gives out several defense strategies.展开更多
基金This work is supported by the National Natural Science Youth Fund of China granted by No.61901452 and Innovative Project of ICT/CAS granted by No.20196110
文摘With the proliferation of the Internet of Things(IoT),various services are emerging with totally different features and requirements,which cannot be supported by the current fifth generation of mobile cellular networks(5G).The future sixth generation of mobile cellular networks(6G)is expected to have the capability to support new and unknown services with changing requirements.Hence,in addition to enhancing its capability by 10–100 times compared with 5G,6G should also be intelligent and open to adapt to the ever-changing services in the IoT,which requires a convergence of Communication,Computing and Caching(3C).Based on the analysis of the requirements of new services for 6G,this paper identifies key enabling technologies for an intelligent and open 6G network,all featured with 3C convergence.These technologies cover fundamental and emerging topics,including 3C-based spectrum management,radio channel construction,delay-aware transmission,wireless distributed computing,and network self-evolution.From the detailed analysis of these 3C-based technologies presented in this paper,we can see that although they are promising to enable an intelligent and open 6G,more efforts are needed to realize the expected 6G network.
基金Supported by the National Program on Key Basic Re-search Project of China (G1999035801)
文摘With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.
文摘Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computing,as it extends the paradigm of granular computing to ordered data,specifies a syntax and modality of information granules which are appropriate for dealing with ordered data,and enables computing with words and reasoning about ordered data.Granular computing with ordered data is a very general paradigm,because other modalities of information constraints,such as veristic,possibilistic and probabilistic modalities,have also to deal with ordered value sets(with qualifiers relative to grades of truth,possibility and probability),which gives DRSA a large area of applications.
基金State Key Lab of Processors,Institute of Computing Technology,Chinese Academy of Sciences(CLQ202516)the Fundamental Research Funds for the Central Universities of China(3282025047,3282024051,3282024009)。
文摘The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for three versions of the Ballet family block ciphers.The Ballet‑p/k includes a modular-addition operation uncommon in lightweight block ciphers.Quantum ripple-carry adder is implemented for both“32+32”and“64+64”scale to support this operation.Subsequently,qubits,quantum gates count,and quantum circuit depth of three versions of Ballet algorithm are systematically evaluated under quantum computing model,and key recovery attack circuits are constructed based on Grover’s algorithm against each version.The comprehensive analysis shows:Ballet-128/128 fails to NIST Level 1 security,while when the resource accounting is restricted to the Clifford gates and T gates set for the Ballet-128/256 and Ballet-256/256 quantum circuits,the design attains Level 3.
基金supported in part by the National Natural Science Foundation of China(62025404)in part by the National Key Research and Development Program of China(2022YFB3902802)+1 种基金in part by the Beijing Natural Science Foundation(L241013)in part by the Strategic Priority Research Program of the Chinese Academy of Sciences(XDA000000).
文摘1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the escalating demand for high-performance computing over space.Computing over space entails the deployment of computational resources on platforms such as satellites to process large-scale data under constraints such as high radiation exposure,restricted power consumption,and minimized weight.
基金supported by Science and Technology Research and Development Program Project of China State Railway Group Co.,Ltd.(award number:K2024X010).
文摘Purpose–This paper conducts a joint analysis of monitoring data in the hidden danger areas of railway subgrade deformation using a data-driven method,thereby realizing the systematic risk identification of regional hidden dangers.Design/methodology/approach–The paper proposes a regional systematic risk identification method based on Bayesian and independent component analysis(ICA)theories.Firstly,the Gray Wolf Optimization(GWO)algorithm is used to partition each group of monitoring data in the hidden danger area,so that the data distribution characteristics within each sub-block are similar.Then,a distributed ICA early warning model is constructed to obtain prior knowledge such as control limits and statistics of the area under normal conditions.For the online evaluation process,the input data is partitioned following the above-mentioned procedure and the ICA statistics of each sub-block are calculated.The Bayesian method is applied to fuse online parameters with offline parameters,yielding statistics under a specific confidence interval.These statistics are then compared with the control limits–specifically,checking whether they exceed the pre-set confidence parameters–thus realizing the systematic risk identification of the hidden danger area.Findings–Through simulation experiments,the proposed method can integrate prior knowledge such as control limits and statistics to effectively determine the overall stability status of the area,thereby realizing the systematic risk identification of the hidden danger area.Originality/value–The proposed method leverages Bayesian theory to fuse online process parameters with offline parameters and further compares them with confidence parameters,thereby effectively enhancing the utilization efficiency of monitoring data and the robustness of the analytical model.
基金funded by the National Key R&D Program“Transportation Infrastructure”project(No.2022YFB2603400)the Technology Research and Development Plan Program of China State Railway Group Co.,Ltd.(No.Q2024T001)the National project pre research project of Suzhou City University(No.2023SGY019).
文摘Purpose-The indoor vibration compaction test(IVCT)was a key step in controlling the compaction quality for high-speed railway graded aggregate(HRGA),which currently had a research gap on the assessment indicators and compaction parameters.Design/methodology/approach-To address these issues,a novel multi-indicator IVCT method was proposed,including physical indicator dry density(ρd)and mechanical indicators dynamic stiffness(Krb)and bearing capacity coefficient(K20).Then,a series of IVCTs on HRGA under different compaction parameters were conducted with an improved vibration compactor,which could monitor the physical-mechanical indicators in real-time.Finally,the optimal vibration compaction parameters,including the moisture content(ω),the diameter-to-maximum particle size ratio(Rd),the thickness-to-maximum particle size ratio(Rh),the vibration frequency(f),the vibration mass(Mc)and the eccentric distance(re),were determined based on the evolution characteristics for the physical-mechanical indicators during compaction.Findings-All results indicated that theρd gradually increased and then stabilized,and the Krb initially increased and then decreased.Moreover,the inflection time of the Krb was present as the optimal compaction time(Tlp)during compaction.Additionally,optimal compaction was achieved whenωwas the water-holding content after mud pumping,Rd was 3.4,Rh was 3.5,f was the resonance frequency,and the ratio between the excitation force and the Mc was 1.8.Originality/value-The findings of this paper were significant for the quality control of HRGA compaction.
基金supported by the National Natural Science Foundation of China under Grant U21A20449in part by Jiangsu Provincial Key Research and Development Program under Grant BE2021013-2。
文摘Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed Vehicular Communication Network(VCN)topologies.However,when the network is under attack,the communication delay may be much higher,and the stability of the system may not be guaranteed.This paper proposes a novel communication Delay Aware CACC with Dynamic Network Topologies(DADNT).The main idea is that for various communication delays,in order to maximize the traffic capacity while guaranteeing stability and minimizing the following error,the CACC should dynamically adjust the VCN network topology to achieve the minimum inter-vehicle spacing.To this end,a multi-objective optimization problem is formulated,and a 3-step Divide-And-Conquer sub-optimal solution(3DAC)is proposed.Simulation results show that with 3DAC,the proposed DADNT with CACC can reduce the inter-vehicle spacing by 5%,10%,and 14%,respectively,compared with the traditional CACC with fixed one-vehicle,two-vehicle,and three-vehicle look-ahead network topologies,thereby improving the traffic efficiency.
基金supported by Shandong Provincial Nat-ural Science Foundation(ZR2024ZD30)the National Natural Science Foundation of China(Nos.22325302 and 22403100).
文摘Accurate evaluation of elec-tron correlations is essential for the reliable quantitative de-scription of electronic struc-tures in strongly correlated sys-tems,including bond-dissociat-ing molecules,polyradicals,large conjugated molecules,and transition metal complex-es.To provide a user-friendly tool for studying such challeng-ing systems,our team developed Kylin 1.0[J.Comput.Chem.44,1316(2023)],an ab initio quantum chemistry program designed for efficient density matrix renormalization group(DMRG)and post-DMRG methods,enabling high-accuracy calculations with large active spaces.We have now further advanced the software with the release of Kylin 1.3,featuring optimized DMRG algorithms and an improved tensor contraction scheme in the diagonaliza-tion step.Benchmark calculations on the Mn_(4)CaO_(5)cluster demonstrate a remarkable speed-up of up to 16 fater than Kylin 1.0.Moreover,a more user-friendly and efficient algorithm[J.Chem.Theory Comput.17,3414(2021)]for sampling configurations from DMRG wavefunc-tion is implemented as well.Additionally,we have also implemented a spin-adapted version of the externally contracted multi-reference configuration interaction(EC-MRCI)method[J.Phys.Chem.A 128,958(2024)],further enhancing the program’s efficiency and accuracy for electron correlation calculations.
基金the National Social Science Foundation of China(No.21BTQ106),the Natural Science Foundation of Beijing(No.7222187),and the Key Project of Innovation Cultivation Fund of the Seventh Medical Center of PLA General Hospital(No.qzx-2023-1)。
文摘Behavioral scoring based on clinical observations remains the gold standard for screening,diagnosing,and evaluating infantile epileptic spasm syndrome(IESS).The accurate identification of seizures is crucial for clinical diagnosis and assessment.In this study,we propose an innovative seizure detection method based on video feature recognition of patient spasms.To capture the temporal characteristics of the spasm behavior presented in the videos effectively,we incorporate asymmetric convolutions and convolution–batch normalization–ReLU(CBR)modules.Specifically within the 3D-ResNet residual blocks,we split the larger convolutional kernels into two asymmetric 3D convolutional kernels.These kernels are connected in series to enhance the ability of the convolutional layers to extract key local features,both horizontally and vertically.In addition,we introduce a 3D convolutional block attention module to enhance the spatial correlations between video frame channels efficiently.To improve the generalization ability,we design a composite loss function that combines cross-entropy loss with triplet loss to balance the classification and similarity requirements.We train and evaluate our method using the PLA IESS-VIDEO dataset,achieving an average seizure recognition accuracy of 90.59%,precision of 90.94%,and recall of 87.64%.To validate its generalization capability further,we conducted external validation using six different patient monitoring videos compared with assessments by six human experts from various medical centers.The final test results demonstrate that our method achieved a recall of 0.6476,surpassing the average level achieved by human experts(0.5595),while attaining a high F1-score of 0.7219.These findings have substantial significance for the long-term assessment of patients with IESS.
基金supported by the National Basic Research Program of China (No. 2011CB302400)the Important National Science & Technology Specific Projects (No. 2013ZX04007031).
文摘To implement five-axis functions in CNC system, based on domestic system Lan Tian series, an improved design method for the system software structure is proposed in this paper. The numerical control kernel of CNC system is divided into the task layer and the motion layer. A five-axis transformation unit is integrated into the motion layer. After classifying five-axis machines into different types and analyzing their geometry information, the five-axis kinematic library is designed according to the abstract factory pattern. Furthermore, by taking CA spindle- tilting machine as an example, the forward and the inverse kinematic transformations are deduced. Based on the new software architecture and the five-axis kinematic library, algorithms of RTCP (rotation tool center point control) and 3D radius compensation for end-milling are designed and realized. The milling results show that, with five-axis functions based on such software struc- ture, the instructions with respect to the cutter's position and orientation can be directly carried out in the CNC system.
基金Key Project of the Chinese Academy of Sciences,No.ZDRW-ZS-2016-6-3National Natural Science Foundation of China,No.41501490
文摘The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while ignoring the structural diversity of different sub-networks. In this paper, we evaluate the robustness of the global cargo ship transportation network based on the most recent Automatic Identification System(AIS) data available. First, we subdivide three typical cargo ship transportation networks(i.e., oil tanker, container ship and bulk carrier) from the original cargo ship transportation network. Then, we design statistical indices based on complex network theory and employ four attack strategies, including random attack and three intentional attacks(i.e., degree-based attack, betweenness-based attack and flux-based attack) to evaluate the robustness of the three typical cargo ship transportation networks. Finally, we compare the integrity of the remaining ports of the network when a small proportion of ports lose their function. The results show that 1) compared with the holistic cargo ship transportation network, the fine-grain-based cargo ship transportation networks can fully reflect the pattern and process of global cargo transportation; 2) different cargo ship networks behave heterogeneously in terms of their robustness, with the container network being the weakest and the bulk carrier network being the strongest; and 3) small-scale intentional attacks may have significant influence on the integrity of the container network but a minor impact on the bulk carrier and oil tanker transportation networks. These conclusions can help improve the decision support capabilities in maritime transportation planning and emergency response and facilitate the establishment of a more reliable maritime transportation system.Abstract: The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while ignoring the structural diversity of different sub-networks. In this paper, we evaluate the robustness of the global cargo ship transporta- tion network based on the most recent Automatic Identification System (AIS) data available. First, we subdivide three typical cargo ship transportation networks (i.e., oil tanker, container ship and bulk carrier) from the original cargo ship transportation network. Then, we design statistical indices based on complex network theory and employ four attack strategies, in- cluding random attack and three intentional attacks (i.e., degree-based attack, between- ness-based attack and flux-based attack) to evaluate the robustness of the three typical cargo ship transportation networks. Finally, we compare the integrity of the remaining ports of the network when a small proportion of ports lose their function. The results show that 1) com- pared with the holistic cargo ship transportation network, the fine-grain-based cargo ship transportation networks can fully reflect the pattern and process of global cargo transportation 2) different cargo ship networks behave heterogeneously in terms of their robustness, with the container network being the weakest and the bulk carrier network being the strongest; and 3) small-scale intentional attacks may have significant influence on the integrity of the con- tainer network but a minor impact on the bulk carrier and oil tanker transportation networks.These conclusions can help improve the decision support capabilities in maritime transportation planning and emergency response and facilitate the establishment of a more reliable maritime transportation system.
基金Supported by the National High-TechnologyResearch and Development Programof China (2002AA1Z2101)
文摘Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed.
基金supported by the National Natural Science Foundation of China(61732018,61872335,61802367,61876215)the Strategic Priority Research Program of Chinese Academy of Sciences(XDC05000000)+1 种基金Beijing Academy of Artificial Intelligence(BAAI),the Open Project Program of the State Key Laboratory of Mathematical Engineering and Advanced Computing(2019A07)the Open Project of Zhejiang Laboratory,and a grant from the Institute for Guo Qiang,Tsinghua University.Recommended by Associate Editor Long Chen.
文摘Graph convolutional networks(GCNs)have received significant attention from various research fields due to the excellent performance in learning graph representations.Although GCN performs well compared with other methods,it still faces challenges.Training a GCN model for large-scale graphs in a conventional way requires high computation and storage costs.Therefore,motivated by an urgent need in terms of efficiency and scalability in training GCN,sampling methods have been proposed and achieved a significant effect.In this paper,we categorize sampling methods based on the sampling mechanisms and provide a comprehensive survey of sampling methods for efficient training of GCN.To highlight the characteristics and differences of sampling methods,we present a detailed comparison within each category and further give an overall comparative analysis for the sampling methods in all categories.Finally,we discuss some challenges and future research directions of the sampling methods.
基金supported by the National Natural Science Foundation of China(Nos.82050004 and 81141118)the Beijing Hospital Clinical Research 121 Project(No.121-2016002)+1 种基金the National Basic Research Program of China(No.2015CB554507)Ms.Siu TUEN,Lucy Chan LAU,Mr.Waichun TIN,and Weiwu HU for their financial support。
文摘Interstitial fluid(ISF)flow through vascular adventitia has been discovered recently.However,its kinetic pattern was unclear.We used histological and topographical identification to observe ISF flow along venous vessels in rabbits.By magnetic resonance imaging(MRI)in live subjects,the inherent pathways of ISF flow from the ankle dermis through the legs,abdomen,and thorax were enhanced by paramagnetic contrast.By fluorescence stereomicroscopy and layer-by-layer dissection after the rabbits were sacrificed,the perivascular and adventitial connective tissues(PACTs)along the saphenous veins and inferior vena cava were found to be stained by sodium fluorescein from the ankle dermis,which coincided with the findings by MRI.The direction of ISF transport in a venous PACT pathway was the same as that of venous blood flow.By confocal microscopy and histological analysis,the stained PACT pathways were verified to be the fibrous connective tissues,consisting of longitudinally assembled fibers.Real-time observations by fluorescence stereomicroscopy revealed at least two types of spaces for ISF flow:one along adventitial fibers and another one between the vascular adventitia and its covering fascia.Using nanoparticles and surfactants,a PACT pathway was found to be accessible by a nanoparticle of<100 nm and contained two parts:a transport channel and an absorptive part.The calculated velocity of continuous ISF flow along fibers of the PACT pathway was 3.6-15.6 mm/s.These data revealed that a PACT pathway was a"slit-shaped"porous biomaterial,comprising a longitudinal transport channel and an absorptive part for imbibition.The use of surfactants suggested that interfacial tension might play an essential role in layers of continuous ISF flow along vascular vessels.A hypothetical"gel pump"is proposed based on interfacial tension and interactions to regulate ISF flow.These experimental findings may inspire future studies to explore the physiological and pathophysiological functions of vascular ISF or interfacial fluid flow among interstitial connective tissues throughout the body.
基金supported in part by the National Science Foundationof China under Grant number 61431001the Beijing Talents Fund under Grant number 2015000021223ZK31
文摘The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly.
基金Sponsored by the National Natural Science Foundation of China(Grant No.,51475106)NSAF(Grant No.U1230110)
文摘For the problems of machining distortion and the low accepted product during milling process of aluminum alloy thin-walled part,this paper starts from the analysis of initial stress state in material preparation process,the change process of residual stress within aluminum alloy pre-stretching plate is researched,and the distribution law of residual stress is indirectly obtained by delamination measurement methods,so the effect of internal residual stress on machining distortion is considered before finite element simulation. Considering the coupling effects of residual stress,dynamic milling force and clamping force on machining distortion,a threedimensional dynamic finite element simulation model is established,and the whole cutting process is simulated from the blank material to finished product,a novel prediction method is proposed,which can availably predict the machining distortion accurately. The machining distortion state of the thin-walled part is achieved at different processing steps,the machining distortion of the thin-walled part is detected with three coordinate measuring machine tools,show that the simulation results are in good agreement with experimental data.
文摘AVS2 is a new generation video coding standard developed by the AVS working group. Compared with the first generation AVS video coding standard, known as AVS1, AVS2 significantly improves coding performance by using many new coding technologies, e.g., adaptive block partition and two level transform coding. Moreover, for scene video, e.g. surveillance video and conference vid?eo, AVS2 provided a background picture modeling scheme to achieve more accurate prediction, which can also make object detec?tion and tracking in surveillance video coding more flexible. Experimental results show that AVS2 is competitive with High Effi?ciency Video Coding (HEVC) in terms of performance. Especially for scene video, AVS2 can achieve 39% bit rate saving over HEVC.
文摘DNS is one of the most important basic infrastructures of the Internet,attacks on which will prevent the Internet from working properly.Therefore,its security is receiving great concern.This paper analyzes the principles of both traditional and novel(Kaminsky)DNS cache poisoning,presents attack samples and describes the whole attack process in detail.After verifying the potential harm of DNS cache poisoning,the paper gives out several defense strategies.