This paper addresses the verification of strong currentstate opacity with respect to real-time observations generated from a discrete-event system that is modeled with time labeled Petri nets. The standard current-sta...This paper addresses the verification of strong currentstate opacity with respect to real-time observations generated from a discrete-event system that is modeled with time labeled Petri nets. The standard current-state opacity cannot completely characterize higher-level security. To ensure the higher-level security requirements of a time-dependent system, we propose a strong version of opacity known as strong current-state opacity. For any path(state-event sequence with time information)π derived from a real-time observation that ends at a secret state, the strong current-state opacity of the real-time observation signifies that there is a non-secret path with the same real-time observation as π. We propose general and non-secret state class graphs, which characterize the general and non-secret states of time-dependent systems, respectively. To capture the observable behavior of non-secret states, a non-secret observer is proposed.Finally, we develop a structure called a real-time concurrent verifier to verify the strong current-state opacity of time labeled Petri nets. This approach is efficient since the real-time concurrent verifier can be constructed by solving a certain number of linear programming problems.展开更多
The opaque property plays an important role in the operation of a security-critical system,implying that pre-defined secret information of the system is not able to be inferred through partially observing its behavior...The opaque property plays an important role in the operation of a security-critical system,implying that pre-defined secret information of the system is not able to be inferred through partially observing its behavior.This paper addresses the verification of current-state,initial-state,infinite-step,and K-step opacity of networked discrete event systems modeled by labeled Petri nets,where communication losses and delays are considered.Based on the symbolic technique for the representation of states in Petri nets,an observer and an estimator are designed for the verification of current-state and initial-state opacity,respectively.Then,we propose a structure called an I-observer that is combined with secret states to verify whether a networked discrete event system is infinite-step opaque or K-step opaque.Due to the utilization of symbolic approaches for the state-based opacity verification,the computation of the reachability graphs of labeled Petri nets is avoided,which dramatically reduces the computational overheads stemming from networked discrete event systems.展开更多
We study the influence of conformity on the evolution of cooperative behavior in games under the learning method of sampling on networks.A strategy update rule based on sampling is introduced into the stag hunt game,w...We study the influence of conformity on the evolution of cooperative behavior in games under the learning method of sampling on networks.A strategy update rule based on sampling is introduced into the stag hunt game,where agents draw samples from their neighbors and then update their strategies based on conformity or inference according to the situation in the sample.Based on these assumptions,we present the state transition equations in the dynamic evolution of population cooperation,conduct simulation analysis on lattice networks and scale-free networks,and discuss how this mechanism affects the evolution of cooperation and how cooperation evolves under different levels of conformity in the network.Our simulation results show that blindly imitating the strategies of neighbors does not necessarily lead to rapid consensus in the population.Instead,rational inference through samples can better promote the evolution of the same strategy among all agents in the population.Moreover,the simulation results also show that a smaller sample size cannot reflect the true situation of the neighbors,which has a large randomness,and the size of the benefits obtained in cooperation determines the direction of the entire population towards cooperation or defection.This work incorporates the conforming behavior of agents into the game,uses the method of sampling for strategy updates and enriches the theory of evolutionary games with a more realistic significance.展开更多
With the development of cyber-physical systems,system security faces more risks from cyber-attacks.In this work,we study the problem that an external attacker implements covert sensor and actuator attacks with resourc...With the development of cyber-physical systems,system security faces more risks from cyber-attacks.In this work,we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints(the total resource consumption of the attacks is not greater than a given initial resource of the attacker)to mislead a discrete event system under supervisory control to reach unsafe states.We consider that the attacker can implement two types of attacks:One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor.Each attack has its corresponding resource consumption and remains covert.To solve this problem,we first introduce a notion of combined-attackability to determine whether a closedloop system may reach an unsafe state after receiving attacks with resource constraints.We develop an algorithm to construct a corrupted supervisor under attacks,provide a verification method for combined-attackability in polynomial time based on a plant,a corrupted supervisor,and an attacker's initial resource,and propose a corresponding attack synthesis algorithm.The effectiveness of the proposed method is illustrated by an example.展开更多
This paper highlights the utilization of parallel control and adaptive dynamic programming(ADP) for event-triggered robust parallel optimal consensus control(ETRPOC) of uncertain nonlinear continuous-time multiagent s...This paper highlights the utilization of parallel control and adaptive dynamic programming(ADP) for event-triggered robust parallel optimal consensus control(ETRPOC) of uncertain nonlinear continuous-time multiagent systems(MASs).First, the parallel control system, which consists of a virtual control variable and a specific auxiliary variable obtained from the coupled Hamiltonian, allows general systems to be transformed into affine systems. Of interest is the fact that the parallel control technique's introduction provides an unprecedented perspective on eliminating the negative effects of disturbance. Then, an eventtriggered mechanism is adopted to save communication resources while ensuring the system's stability. The coupled HamiltonJacobi(HJ) equation's solution is approximated using a critic neural network(NN), whose weights are updated in response to events. Furthermore, theoretical analysis reveals that the weight estimation error is uniformly ultimately bounded(UUB). Finally,numerical simulations demonstrate the effectiveness of the developed ETRPOC method.展开更多
To improve the slow kinetics and poor mechanical strength of aqueous silver peroxide−aluminum(AgO−Al)battery cathode materials,the effects of different binders including polytetrafluoroethylene(PTFE)and polyvinylpyrro...To improve the slow kinetics and poor mechanical strength of aqueous silver peroxide−aluminum(AgO−Al)battery cathode materials,the effects of different binders including polytetrafluoroethylene(PTFE)and polyvinylpyrrolidone(PVP)on the AgO cathode material were investigated.The samples were characterized by scanning electron microscopy(SEM),transmission electron microscopy(TEM),cyclic voltammetry(CV),electrochemical impedance spectrum(EIS),and galvanostatic discharge.In contrast to the pure AgO and AgO−PTFE electrodes,the results demonstrated that the PVP effectively bound the electrode materials together.The prepared AgO−PVP as the cathode material of AgO−Al batteries could improve the battery capacity,exhibiting a high specific capacity(389.95 mA·h/g at 500 mA/cm^(2)),a high operating voltage(1.75 V at 500 mA/cm^(2)),a maximum energy density(665.65 W·h/kg),and a maximum power density(5236 W/kg).Furthermore,the electrochemical mechanism of the AgO−PVP cathode material was examined,revealing that the electrode exhibited rapid ion diffusion and effective interfacial ion/electron transport.展开更多
An investigation and outline of MetaControl and DeControl in Metaverses for control intelligence and knowledge automation are presented.Prescriptive control with prescriptive knowledge and parallel philosophy is propo...An investigation and outline of MetaControl and DeControl in Metaverses for control intelligence and knowledge automation are presented.Prescriptive control with prescriptive knowledge and parallel philosophy is proposed as the starting point for the new control philosophy and technology,especially for computational control of metasystems in cyberphysical-social systems.We argue that circular causality,the generalized feedback mechanism for complex and purposive systems,should be adapted as the fundamental principle for control and management of metasystems with metacomplexity in metaverses.Particularly,an interdisciplinary approach is suggested for MetaControl and DeControl as a new form of intelligent control based on five control metaverses:MetaVerses,MultiVerses,InterVerses,TransVerse,and DeepVerses.展开更多
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects phy...A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects physical and cyber worlds.In order to meet ever-changing industrial requirements,its structures and functions are constantly improved.Meanwhile,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and practitioners.This paper presents a survey of state-of-the-art results of cyber attacks on cyber physical systems.First,as typical system models are employed to study these systems,time-driven and event-driven systems are reviewed.Then,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are discussed.In particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and defenders.Namely,both attack and defense strategies are discussed based on different system models.Some challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.展开更多
The mass loss and nose blunting of a projectile during high-speed deep penetration into concrete target may cause structural destruction and ballistic trajectory instability of the penetrator,obviously reducing the pe...The mass loss and nose blunting of a projectile during high-speed deep penetration into concrete target may cause structural destruction and ballistic trajectory instability of the penetrator,obviously reducing the penetration efficiency of penetrator.Provided that the work of friction between projectile and target is totally transformed into the heat to melt penetrator material at its nose surface,an engineering model is established for the mass loss and nose-blunting of the ogive-nosed projectile.A dimensionless formula for the relative mass loss of projectile is obtained by introducing the dimensionless impact function I and geometry function N of the projectile.The critical value V c0of the initial striking velocity is formulated,and the mass loss of projectile tends to increase weakly nonlinearly with I/N when V0〉V c0,whilst the mass loss is proportional to the initial kinetic energy of projectile when V0展开更多
This paper investigates the consensus problem for linear multi-agent systems with the heterogeneous disturbances generated by the Brown motion.Its main contribution is that a control scheme is designed to achieve the ...This paper investigates the consensus problem for linear multi-agent systems with the heterogeneous disturbances generated by the Brown motion.Its main contribution is that a control scheme is designed to achieve the dynamic consensus for the multi-agent systems in directed topology interfered by stochastic noise.In traditional ways,the coupling weights depending on the communication structure are static.A new distributed controller is designed based on Riccati inequalities,while updating the coupling weights associated with the gain matrix by state errors between adjacent agents.By introducing time-varying coupling weights into this novel control law,the state errors between leader and followers asymptotically converge to the minimum value utilizing the local interaction.Through the Lyapunov directed method and It?formula,the stability of the closed-loop system with the proposed control law is analyzed.Two simulation results conducted by the new and traditional schemes are presented to demonstrate the effectiveness and advantage of the developed control method.展开更多
BACKGROUND Within the normal range,elevated alanine aminotransferase(ALT)levels are associated with an increased risk of metabolic dysfunction-associated fatty liver disease(MAFLD).AIM To investigate the associations ...BACKGROUND Within the normal range,elevated alanine aminotransferase(ALT)levels are associated with an increased risk of metabolic dysfunction-associated fatty liver disease(MAFLD).AIM To investigate the associations between repeated high-normal ALT measurements and the risk of new-onset MAFLD prospectively.METHODS A cohort of 3553 participants followed for four consecutive health examinations over 4 years was selected.The incidence rate,cumulative times,and equally and unequally weighted cumulative effects of excess high-normal ALT levels(ehALT)were measured.Cox proportional hazards regression was used to analyse the association between the cumulative effects of ehALT and the risk of new-onset MAFLD.RESULTS A total of 83.13%of participants with MAFLD had normal ALT levels.The incidence rate of MAFLD showed a linear increasing trend in the cumulative ehALT group.Compared with those in the low-normal ALT group,the multivariate adjusted hazard ratios of the equally and unequally weighted cumulative effects of ehALT were 1.651[95%confidence interval(CI):1.199-2.273]and 1.535(95%CI:1.119-2.106)in the third quartile and 1.616(95%CI:1.162-2.246)and 1.580(95%CI:1.155-2.162)in the fourth quartile,respectively.CONCLUSION Most participants with MAFLD had normal ALT levels.Long-term high-normal ALT levels were associated with a cumulative increased risk of new-onset MAFLD.展开更多
In this study,a series of hypervelocity impact tests were carried out based on a two-stage light gas gun,and the sequence spectrum and radiation evolution data of the impact products under different impact conditions ...In this study,a series of hypervelocity impact tests were carried out based on a two-stage light gas gun,and the sequence spectrum and radiation evolution data of the impact products under different impact conditions were obtained.The diameter of the projectile is 3-5 mm,the impact velocity is 3.13-6.58 km/s,and the chamber pressure is 0.56-990 Pa.The spectrum of ejected debris cloud in the 250-310 nm band were obtained using a transient spectral measurement system and a multi-channel radiometer measurement system.The test results reveal that the flash radiation intensity increases as a power function with the kinetic energy of the impact.Furthermore,the peak value of the line spectrum decreases as the chamber vacuum degree increases,while the radiation width gradually expands.The line spectrum in the spectral characterization curve corresponds to the ejected debris clouds splitting phase,which does not produce significant line spectrum during material fragmentation and is dominated by the continuum spectrum produced by blackbody radiation.There will appear one or three characteristic peaks in the flash radiation time curve,the first and second peaks correspond to the penetration phase and the third peak corresponds to the expansion phase of the ejected debris clouds on the time scale,the first and second peaks are more sensitive to the chamber vacuum degree,and when the pressure is higher than 99 Pa,the first and second characteristic peaks will disappear.The radiant heat attenuation of the flash under different impact conditions is significantly different,the attenuation exponent has a power function relationship with the impact velocity and the chamber vacuum degree,while the attenuation exponent has a linear relationship with the diameter of the projectile,the specific expression of the attenuation exponent is obtained by fitting.The findings from this research can serve as a valuable reference for remote diagnostic technologies based on flash radiation characteristics.展开更多
Shaped charge warhead is important for enhancing the damage performance of underwater weapons.This paper used finite element analysis software and based on JPC water penetration experiments to examine the influence of...Shaped charge warhead is important for enhancing the damage performance of underwater weapons.This paper used finite element analysis software and based on JPC water penetration experiments to examine the influence of liner parameters(wall thickness,material),charge aspect ratio,and stand-off distance on the movement characteristics of JPC in water.The findings reveal that the head diameter of the JPC increases and experiences significant erosion after entering the water,the effective length of the JPC in water undergoes two distinct phases:a growth phase and a decrease phase,with the velocity of the JPC decaying exponentially.Increasing the liner thickness,stand-off distance and the charge aspect ratio can improve the erosion resistance and the velocity retention capacity of the JPC.The optimal ranges for liner thickness and stand-off distance are 0.0363D_(k) to 0.0545D_(k)(D_(k) is the charge diameter),the stand-off distance should be within 1.0D_(k).After the charge aspect ratio higher than 1.25,the charge structure exerts minimal influence the movement characteristics of the JPC in water.Material density plays a crucial role in the velocity decay pattern of the JPC during penetration.JPC with higher densities exhibit superior velocity retention capabilities in water,with the velocity decay pattern converging if the densities are similar.Consequently,copper,tantalum and tungsten liners are deemed appropriate for underwater shaped charge warhead.Finally,the results will provide an important reference for the design of underwater shaped charge warhead.展开更多
Stochastic switched epidemic systems with a discrete or distributed time delay are constructed and investigated. By the Lyapunov method and lto's differential rule, the existence and uniqueness of global positive sol...Stochastic switched epidemic systems with a discrete or distributed time delay are constructed and investigated. By the Lyapunov method and lto's differential rule, the existence and uniqueness of global positive solution of each system is proved. And stability conditions of the disease-free equilibrium of the systems are obtained. Numerical simulations are presented to illustrate the results.展开更多
Due to the time-varying topology and possible disturbances in a conflict environment,it is still challenging to maintain the mission performance of flying Ad hoc networks(FANET),which limits the application of Unmanne...Due to the time-varying topology and possible disturbances in a conflict environment,it is still challenging to maintain the mission performance of flying Ad hoc networks(FANET),which limits the application of Unmanned Aerial Vehicle(UAV)swarms in harsh environments.This paper proposes an intelligent framework to quickly recover the cooperative coveragemission by aggregating the historical spatio-temporal network with the attention mechanism.The mission resilience metric is introduced in conjunction with connectivity and coverage status information to simplify the optimization model.A spatio-temporal node pooling method is proposed to ensure all node location features can be updated after destruction by capturing the temporal network structure.Combined with the corresponding Laplacian matrix as the hyperparameter,a recovery algorithm based on the multi-head attention graph network is designed to achieve rapid recovery.Simulation results showed that the proposed framework can facilitate rapid recovery of the connectivity and coverage more effectively compared to the existing studies.The results demonstrate that the average connectivity and coverage results is improved by 17.92%and 16.96%,respectively compared with the state-of-the-art model.Furthermore,by the ablation study,the contributions of each different improvement are compared.The proposed model can be used to support resilient network design for real-time mission execution.展开更多
In this paper, the optimal viability decision problem of linear discrete-time stochastic systems with probability criterion is investigated. Under the condition of sequence-reachable discrete-time dynamic systems, the...In this paper, the optimal viability decision problem of linear discrete-time stochastic systems with probability criterion is investigated. Under the condition of sequence-reachable discrete-time dynamic systems, the existence theorem of optimal viability strategy is given and the solving procedure of the optimal strategy is provided based on dynamic programming. A numerical example shows the effectiveness of the proposed methods.展开更多
In this paper,a new optimal adaptive backstepping control approach for nonlinear systems under deception attacks via reinforcement learning is presented in this paper.The existence of nonlinear terms in the studied sy...In this paper,a new optimal adaptive backstepping control approach for nonlinear systems under deception attacks via reinforcement learning is presented in this paper.The existence of nonlinear terms in the studied system makes it very difficult to design the optimal controller using traditional methods.To achieve optimal control,RL algorithm based on critic–actor architecture is considered for the nonlinear system.Due to the significant security risks of network transmission,the system is vulnerable to deception attacks,which can make all the system state unavailable.By using the attacked states to design coordinate transformation,the harm brought by unknown deception attacks has been overcome.The presented control strategy can ensure that all signals in the closed-loop system are semi-globally ultimately bounded.Finally,the simulation experiment is shown to prove the effectiveness of the strategy.展开更多
A special type of asymptotic (exponential) stability, namely componentwise asymptotic (exponential) stability for the continuous-time interval system is investigated. A set-valued map that represents the constraint of...A special type of asymptotic (exponential) stability, namely componentwise asymptotic (exponential) stability for the continuous-time interval system is investigated. A set-valued map that represents the constraint of the state of the system is defined. And, by applying the viability theory of differential equation, sufficient and necessary conditions for the componentwise asymptotical (exponential) stability of this kind of systems are given.展开更多
At present,although knowledge graphs have been widely used in various fields such as recommendation systems,question and answer systems,and intelligent search,there are always quality problems such as knowledge omissi...At present,although knowledge graphs have been widely used in various fields such as recommendation systems,question and answer systems,and intelligent search,there are always quality problems such as knowledge omissions and errors.Quality assessment and control,as an important means to ensure the quality of knowledge,can make the applications based on knowledge graphs more complete and more accurate by reasonably assessing the knowledge graphs and fixing and improving the quality problems at the same time.Therefore,as an indispensable part of the knowledge graph construction process,the results of quality assessment and control determine the usefulness of the knowledge graph.Among them,the assessment and enhancement of completeness,as an important part of the assessment and control phase,determine whether the knowledge graph can fully reflect objective phenomena and reveal potential connections among entities.In this paper,we review specific techniques of completeness assessment and classify completeness assessment techniques in terms of closed world assumptions,open world assumptions,and partial completeness assumptions.The purpose of this paper is to further promote the development of knowledge graph quality control and to lay the foundation for subsequent research on the completeness assessment of knowledge graphs by reviewing and classifying completeness assessment techniques.展开更多
基金supported by the Special Fund for Scientific and Technological Innovation Strategy of Guangdong Province(2022A0505030025)the Science and Technology Fund,FDCT,Macao SAR(0064/2021/A2)
文摘This paper addresses the verification of strong currentstate opacity with respect to real-time observations generated from a discrete-event system that is modeled with time labeled Petri nets. The standard current-state opacity cannot completely characterize higher-level security. To ensure the higher-level security requirements of a time-dependent system, we propose a strong version of opacity known as strong current-state opacity. For any path(state-event sequence with time information)π derived from a real-time observation that ends at a secret state, the strong current-state opacity of the real-time observation signifies that there is a non-secret path with the same real-time observation as π. We propose general and non-secret state class graphs, which characterize the general and non-secret states of time-dependent systems, respectively. To capture the observable behavior of non-secret states, a non-secret observer is proposed.Finally, we develop a structure called a real-time concurrent verifier to verify the strong current-state opacity of time labeled Petri nets. This approach is efficient since the real-time concurrent verifier can be constructed by solving a certain number of linear programming problems.
基金supported by the National R&D Program of China(2018YFB 1700104)the Science and Technology Development FundMacao Special Administrative Region(MSAR)(0029/2023/RIA1)。
文摘The opaque property plays an important role in the operation of a security-critical system,implying that pre-defined secret information of the system is not able to be inferred through partially observing its behavior.This paper addresses the verification of current-state,initial-state,infinite-step,and K-step opacity of networked discrete event systems modeled by labeled Petri nets,where communication losses and delays are considered.Based on the symbolic technique for the representation of states in Petri nets,an observer and an estimator are designed for the verification of current-state and initial-state opacity,respectively.Then,we propose a structure called an I-observer that is combined with secret states to verify whether a networked discrete event system is infinite-step opaque or K-step opaque.Due to the utilization of symbolic approaches for the state-based opacity verification,the computation of the reachability graphs of labeled Petri nets is avoided,which dramatically reduces the computational overheads stemming from networked discrete event systems.
基金Project supported by the National Natural Science Foundation of China(Grant No.72031009)the National Social Science Foundation of China(Grant No.20&ZD058)。
文摘We study the influence of conformity on the evolution of cooperative behavior in games under the learning method of sampling on networks.A strategy update rule based on sampling is introduced into the stag hunt game,where agents draw samples from their neighbors and then update their strategies based on conformity or inference according to the situation in the sample.Based on these assumptions,we present the state transition equations in the dynamic evolution of population cooperation,conduct simulation analysis on lattice networks and scale-free networks,and discuss how this mechanism affects the evolution of cooperation and how cooperation evolves under different levels of conformity in the network.Our simulation results show that blindly imitating the strategies of neighbors does not necessarily lead to rapid consensus in the population.Instead,rational inference through samples can better promote the evolution of the same strategy among all agents in the population.Moreover,the simulation results also show that a smaller sample size cannot reflect the true situation of the neighbors,which has a large randomness,and the size of the benefits obtained in cooperation determines the direction of the entire population towards cooperation or defection.This work incorporates the conforming behavior of agents into the game,uses the method of sampling for strategy updates and enriches the theory of evolutionary games with a more realistic significance.
基金partially supported by the Science Technology Development Fund,Macao Special Administrative Region(0029/2023/RIA1)the National Research Foundation Singapore under its AI Singapore Programme(AISG2-GC-2023-007)
文摘With the development of cyber-physical systems,system security faces more risks from cyber-attacks.In this work,we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints(the total resource consumption of the attacks is not greater than a given initial resource of the attacker)to mislead a discrete event system under supervisory control to reach unsafe states.We consider that the attacker can implement two types of attacks:One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor.Each attack has its corresponding resource consumption and remains covert.To solve this problem,we first introduce a notion of combined-attackability to determine whether a closedloop system may reach an unsafe state after receiving attacks with resource constraints.We develop an algorithm to construct a corrupted supervisor under attacks,provide a verification method for combined-attackability in polynomial time based on a plant,a corrupted supervisor,and an attacker's initial resource,and propose a corresponding attack synthesis algorithm.The effectiveness of the proposed method is illustrated by an example.
基金supported in part by the National Key Research and Development Program of China(2021YFE0206100)the National Natural Science Foundation of China(62425310,62073321)+2 种基金the National Defense Basic Scientific Research Program(JCKY2019203C029,JCKY2020130C025)the Science and Technology Development FundMacao SAR(FDCT-22-009-MISE,0060/2021/A2,0015/2020/AMJ)
文摘This paper highlights the utilization of parallel control and adaptive dynamic programming(ADP) for event-triggered robust parallel optimal consensus control(ETRPOC) of uncertain nonlinear continuous-time multiagent systems(MASs).First, the parallel control system, which consists of a virtual control variable and a specific auxiliary variable obtained from the coupled Hamiltonian, allows general systems to be transformed into affine systems. Of interest is the fact that the parallel control technique's introduction provides an unprecedented perspective on eliminating the negative effects of disturbance. Then, an eventtriggered mechanism is adopted to save communication resources while ensuring the system's stability. The coupled HamiltonJacobi(HJ) equation's solution is approximated using a critic neural network(NN), whose weights are updated in response to events. Furthermore, theoretical analysis reveals that the weight estimation error is uniformly ultimately bounded(UUB). Finally,numerical simulations demonstrate the effectiveness of the developed ETRPOC method.
基金supported by the Fundamental Research Funds for the Central Universities of Central South University,China(No.2022XQLH046)the Technical Area Fund of Foundation Strengthening,China(No.2022-JCJQ-ZD-174-00-20)National Defense Basic Scientific Research Projects,China,and Central South University−Zijin Mining Technical Cooperation Development Project,China.
文摘To improve the slow kinetics and poor mechanical strength of aqueous silver peroxide−aluminum(AgO−Al)battery cathode materials,the effects of different binders including polytetrafluoroethylene(PTFE)and polyvinylpyrrolidone(PVP)on the AgO cathode material were investigated.The samples were characterized by scanning electron microscopy(SEM),transmission electron microscopy(TEM),cyclic voltammetry(CV),electrochemical impedance spectrum(EIS),and galvanostatic discharge.In contrast to the pure AgO and AgO−PTFE electrodes,the results demonstrated that the PVP effectively bound the electrode materials together.The prepared AgO−PVP as the cathode material of AgO−Al batteries could improve the battery capacity,exhibiting a high specific capacity(389.95 mA·h/g at 500 mA/cm^(2)),a high operating voltage(1.75 V at 500 mA/cm^(2)),a maximum energy density(665.65 W·h/kg),and a maximum power density(5236 W/kg).Furthermore,the electrochemical mechanism of the AgO−PVP cathode material was examined,revealing that the electrode exhibited rapid ion diffusion and effective interfacial ion/electron transport.
文摘An investigation and outline of MetaControl and DeControl in Metaverses for control intelligence and knowledge automation are presented.Prescriptive control with prescriptive knowledge and parallel philosophy is proposed as the starting point for the new control philosophy and technology,especially for computational control of metasystems in cyberphysical-social systems.We argue that circular causality,the generalized feedback mechanism for complex and purposive systems,should be adapted as the fundamental principle for control and management of metasystems with metacomplexity in metaverses.Particularly,an interdisciplinary approach is suggested for MetaControl and DeControl as a new form of intelligent control based on five control metaverses:MetaVerses,MultiVerses,InterVerses,TransVerse,and DeepVerses.
基金supported by Institutional Fund Projects(IFPNC-001-135-2020)technical and financial support from the Ministry of Education and King Abdulaziz University,DSR,Jeddah,Saudi Arabia。
文摘A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects physical and cyber worlds.In order to meet ever-changing industrial requirements,its structures and functions are constantly improved.Meanwhile,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and practitioners.This paper presents a survey of state-of-the-art results of cyber attacks on cyber physical systems.First,as typical system models are employed to study these systems,time-driven and event-driven systems are reviewed.Then,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are discussed.In particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and defenders.Namely,both attack and defense strategies are discussed based on different system models.Some challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.
基金supported by the National Outstanding Young Scientists Foundation of China(11225213)the Funds for Creative Research Groups of China(51321064)the National Natural Science Foundation of China(11172282 and 51378015)
文摘The mass loss and nose blunting of a projectile during high-speed deep penetration into concrete target may cause structural destruction and ballistic trajectory instability of the penetrator,obviously reducing the penetration efficiency of penetrator.Provided that the work of friction between projectile and target is totally transformed into the heat to melt penetrator material at its nose surface,an engineering model is established for the mass loss and nose-blunting of the ogive-nosed projectile.A dimensionless formula for the relative mass loss of projectile is obtained by introducing the dimensionless impact function I and geometry function N of the projectile.The critical value V c0of the initial striking velocity is formulated,and the mass loss of projectile tends to increase weakly nonlinearly with I/N when V0〉V c0,whilst the mass loss is proportional to the initial kinetic energy of projectile when V0
基金supported in part by the National Natural Science Foundation of China(61722312,61533017,62073321)the National Key Research and Development Program of China(2018YFB1702300)。
文摘This paper investigates the consensus problem for linear multi-agent systems with the heterogeneous disturbances generated by the Brown motion.Its main contribution is that a control scheme is designed to achieve the dynamic consensus for the multi-agent systems in directed topology interfered by stochastic noise.In traditional ways,the coupling weights depending on the communication structure are static.A new distributed controller is designed based on Riccati inequalities,while updating the coupling weights associated with the gain matrix by state errors between adjacent agents.By introducing time-varying coupling weights into this novel control law,the state errors between leader and followers asymptotically converge to the minimum value utilizing the local interaction.Through the Lyapunov directed method and It?formula,the stability of the closed-loop system with the proposed control law is analyzed.Two simulation results conducted by the new and traditional schemes are presented to demonstrate the effectiveness and advantage of the developed control method.
基金National Natural Science Foundation of China,No.72101236China Postdoctoral Science Foundation,No.2022M722900+1 种基金Collaborative Innovation Project of Zhengzhou City,No.XTCX2023006Nursing Team Project of the First Affiliated Hospital of Zhengzhou University,No.HLKY2023005.
文摘BACKGROUND Within the normal range,elevated alanine aminotransferase(ALT)levels are associated with an increased risk of metabolic dysfunction-associated fatty liver disease(MAFLD).AIM To investigate the associations between repeated high-normal ALT measurements and the risk of new-onset MAFLD prospectively.METHODS A cohort of 3553 participants followed for four consecutive health examinations over 4 years was selected.The incidence rate,cumulative times,and equally and unequally weighted cumulative effects of excess high-normal ALT levels(ehALT)were measured.Cox proportional hazards regression was used to analyse the association between the cumulative effects of ehALT and the risk of new-onset MAFLD.RESULTS A total of 83.13%of participants with MAFLD had normal ALT levels.The incidence rate of MAFLD showed a linear increasing trend in the cumulative ehALT group.Compared with those in the low-normal ALT group,the multivariate adjusted hazard ratios of the equally and unequally weighted cumulative effects of ehALT were 1.651[95%confidence interval(CI):1.199-2.273]and 1.535(95%CI:1.119-2.106)in the third quartile and 1.616(95%CI:1.162-2.246)and 1.580(95%CI:1.155-2.162)in the fourth quartile,respectively.CONCLUSION Most participants with MAFLD had normal ALT levels.Long-term high-normal ALT levels were associated with a cumulative increased risk of new-onset MAFLD.
基金supported by the National Natural Science Foundation of China (Grant No.11672278)。
文摘In this study,a series of hypervelocity impact tests were carried out based on a two-stage light gas gun,and the sequence spectrum and radiation evolution data of the impact products under different impact conditions were obtained.The diameter of the projectile is 3-5 mm,the impact velocity is 3.13-6.58 km/s,and the chamber pressure is 0.56-990 Pa.The spectrum of ejected debris cloud in the 250-310 nm band were obtained using a transient spectral measurement system and a multi-channel radiometer measurement system.The test results reveal that the flash radiation intensity increases as a power function with the kinetic energy of the impact.Furthermore,the peak value of the line spectrum decreases as the chamber vacuum degree increases,while the radiation width gradually expands.The line spectrum in the spectral characterization curve corresponds to the ejected debris clouds splitting phase,which does not produce significant line spectrum during material fragmentation and is dominated by the continuum spectrum produced by blackbody radiation.There will appear one or three characteristic peaks in the flash radiation time curve,the first and second peaks correspond to the penetration phase and the third peak corresponds to the expansion phase of the ejected debris clouds on the time scale,the first and second peaks are more sensitive to the chamber vacuum degree,and when the pressure is higher than 99 Pa,the first and second characteristic peaks will disappear.The radiant heat attenuation of the flash under different impact conditions is significantly different,the attenuation exponent has a power function relationship with the impact velocity and the chamber vacuum degree,while the attenuation exponent has a linear relationship with the diameter of the projectile,the specific expression of the attenuation exponent is obtained by fitting.The findings from this research can serve as a valuable reference for remote diagnostic technologies based on flash radiation characteristics.
基金supported by the National Natural Science Foundation of China(Grant No.11672278)。
文摘Shaped charge warhead is important for enhancing the damage performance of underwater weapons.This paper used finite element analysis software and based on JPC water penetration experiments to examine the influence of liner parameters(wall thickness,material),charge aspect ratio,and stand-off distance on the movement characteristics of JPC in water.The findings reveal that the head diameter of the JPC increases and experiences significant erosion after entering the water,the effective length of the JPC in water undergoes two distinct phases:a growth phase and a decrease phase,with the velocity of the JPC decaying exponentially.Increasing the liner thickness,stand-off distance and the charge aspect ratio can improve the erosion resistance and the velocity retention capacity of the JPC.The optimal ranges for liner thickness and stand-off distance are 0.0363D_(k) to 0.0545D_(k)(D_(k) is the charge diameter),the stand-off distance should be within 1.0D_(k).After the charge aspect ratio higher than 1.25,the charge structure exerts minimal influence the movement characteristics of the JPC in water.Material density plays a crucial role in the velocity decay pattern of the JPC during penetration.JPC with higher densities exhibit superior velocity retention capabilities in water,with the velocity decay pattern converging if the densities are similar.Consequently,copper,tantalum and tungsten liners are deemed appropriate for underwater shaped charge warhead.Finally,the results will provide an important reference for the design of underwater shaped charge warhead.
基金supported by the National Natural Science Foundation of China(60874114)
文摘Stochastic switched epidemic systems with a discrete or distributed time delay are constructed and investigated. By the Lyapunov method and lto's differential rule, the existence and uniqueness of global positive solution of each system is proved. And stability conditions of the disease-free equilibrium of the systems are obtained. Numerical simulations are presented to illustrate the results.
基金the National Natural Science Foundation of China(NNSFC)(Grant Nos.72001213 and 72301292)the National Social Science Fund of China(Grant No.19BGL297)the Basic Research Program of Natural Science in Shaanxi Province(Grant No.2021JQ-369).
文摘Due to the time-varying topology and possible disturbances in a conflict environment,it is still challenging to maintain the mission performance of flying Ad hoc networks(FANET),which limits the application of Unmanned Aerial Vehicle(UAV)swarms in harsh environments.This paper proposes an intelligent framework to quickly recover the cooperative coveragemission by aggregating the historical spatio-temporal network with the attention mechanism.The mission resilience metric is introduced in conjunction with connectivity and coverage status information to simplify the optimization model.A spatio-temporal node pooling method is proposed to ensure all node location features can be updated after destruction by capturing the temporal network structure.Combined with the corresponding Laplacian matrix as the hyperparameter,a recovery algorithm based on the multi-head attention graph network is designed to achieve rapid recovery.Simulation results showed that the proposed framework can facilitate rapid recovery of the connectivity and coverage more effectively compared to the existing studies.The results demonstrate that the average connectivity and coverage results is improved by 17.92%and 16.96%,respectively compared with the state-of-the-art model.Furthermore,by the ablation study,the contributions of each different improvement are compared.The proposed model can be used to support resilient network design for real-time mission execution.
基金supported by the National Natural Science Foundation of China (No.70471049)
文摘In this paper, the optimal viability decision problem of linear discrete-time stochastic systems with probability criterion is investigated. Under the condition of sequence-reachable discrete-time dynamic systems, the existence theorem of optimal viability strategy is given and the solving procedure of the optimal strategy is provided based on dynamic programming. A numerical example shows the effectiveness of the proposed methods.
基金supported in part by the National Key R&D Program of China under Grants 2021YFE0206100in part by the National Natural Science Foundation of China under Grant 62073321+2 种基金in part by National Defense Basic Scientific Research Program JCKY2019203C029in part by the Science and Technology Development Fund,Macao SAR under Grants FDCT-22-009-MISE,0060/2021/A2 and 0015/2020/AMJin part by the financial support from the National Defense Basic Scientific Research Project(JCKY2020130C025).
文摘In this paper,a new optimal adaptive backstepping control approach for nonlinear systems under deception attacks via reinforcement learning is presented in this paper.The existence of nonlinear terms in the studied system makes it very difficult to design the optimal controller using traditional methods.To achieve optimal control,RL algorithm based on critic–actor architecture is considered for the nonlinear system.Due to the significant security risks of network transmission,the system is vulnerable to deception attacks,which can make all the system state unavailable.By using the attacked states to design coordinate transformation,the harm brought by unknown deception attacks has been overcome.The presented control strategy can ensure that all signals in the closed-loop system are semi-globally ultimately bounded.Finally,the simulation experiment is shown to prove the effectiveness of the strategy.
基金This project was supported by the National Natural Science Foundation of China (7017004).
文摘A special type of asymptotic (exponential) stability, namely componentwise asymptotic (exponential) stability for the continuous-time interval system is investigated. A set-valued map that represents the constraint of the state of the system is defined. And, by applying the viability theory of differential equation, sufficient and necessary conditions for the componentwise asymptotical (exponential) stability of this kind of systems are given.
基金supported by the National Key Laboratory for Complex Systems Simulation Foundation(6142006190301)。
文摘At present,although knowledge graphs have been widely used in various fields such as recommendation systems,question and answer systems,and intelligent search,there are always quality problems such as knowledge omissions and errors.Quality assessment and control,as an important means to ensure the quality of knowledge,can make the applications based on knowledge graphs more complete and more accurate by reasonably assessing the knowledge graphs and fixing and improving the quality problems at the same time.Therefore,as an indispensable part of the knowledge graph construction process,the results of quality assessment and control determine the usefulness of the knowledge graph.Among them,the assessment and enhancement of completeness,as an important part of the assessment and control phase,determine whether the knowledge graph can fully reflect objective phenomena and reveal potential connections among entities.In this paper,we review specific techniques of completeness assessment and classify completeness assessment techniques in terms of closed world assumptions,open world assumptions,and partial completeness assumptions.The purpose of this paper is to further promote the development of knowledge graph quality control and to lay the foundation for subsequent research on the completeness assessment of knowledge graphs by reviewing and classifying completeness assessment techniques.