The emerging virtual coupling technology aims to operate multiple train units in a Virtually Coupled Train Set(VCTS)at a minimal but safe distance.To guarantee collision avoidance,the safety distance should be calcula...The emerging virtual coupling technology aims to operate multiple train units in a Virtually Coupled Train Set(VCTS)at a minimal but safe distance.To guarantee collision avoidance,the safety distance should be calculated using the state-of-the-art space-time separation principle that separates the Emergency Braking(EB)trajectories of two successive units during the whole EB process.In this case,the minimal safety distance is usually numerically calculated without an analytic formulation.Thus,the constrained VCTS control problem is hard to address with space-time separation,which is still a gap in the existing literature.To solve this problem,we propose a Distributed Economic Model Predictive Control(DEMPC)approach with computation efficiency and theoretical guarantee.Specifically,to alleviate the computation burden,we transform implicit safety constraints into explicitly linear ones,such that the optimal control problem in DEMPC is a quadratic programming problem that can be solved efficiently.For theoretical analysis,sufficient conditions are derived to guarantee the recursive feasibility and stability of DEMPC,employing compatibility constraints,tube techniques and terminal ingredient tuning.Moreover,we extend our approach with globally optimal and distributed online EB configuration methods to shorten the minimal distance among VCTS.Finally,experimental results demonstrate the performance and advantages of the proposed approaches.展开更多
The 18th International Conference on Scientometrics and Informetrics(ISSI 2021)was held virtually on 12-15 July 2021,hosted by KU Leuven in close collaboration with the University of Antwerp.It is the first time that ...The 18th International Conference on Scientometrics and Informetrics(ISSI 2021)was held virtually on 12-15 July 2021,hosted by KU Leuven in close collaboration with the University of Antwerp.It is the first time that ISSI Conference was held in online format due to the pandemic.展开更多
Current rates of mental illness are worrisome.Mental illness mainly affects females and younger age groups.The use of the internet to deliver mental health care has been growing since 2020 and includes the implementat...Current rates of mental illness are worrisome.Mental illness mainly affects females and younger age groups.The use of the internet to deliver mental health care has been growing since 2020 and includes the implementation of novel mental health treatments using virtual reality,augmented reality,and artificial intelligence.A new three dimensional digital environment,known as the metaverse,has emerged as the next version of the Internet.Artificial intelligence,augmented reality,and virtual reality will create fully immersive,experiential,and interactive online environments in the metaverse.People will use a unique avatar to do anything they do in their“real”lives,including seeking and receiving mental health care.In this opinion review,we reflect on how the metaverse could reshape how we deliver mental health treatment,its opportunities,and its challenges.展开更多
BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential...BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential benefits,there are studies on patient satisfaction but there is limited information on the usability of virtual reality(VR)technology for new nurses in giving preoperative education to patients.AIM To investigate the impact on satisfaction,usability,and burnout of a system using VR technology in preoperative patient education.METHODS The study involved 20 nurses from the plastic surgery ward and 80 patients admitted between April and May 2019.Each nurse taught four patients:Two using traditional verbal education and two using virtual reality.The System Usability Scale,After-Scenario Questionnaire,and Maslach Burnout Inventory(MBI)were employed to evaluate the impact of these education methods.RESULTS The VR education groups showed a statistically higher satisfaction than the traditional verbal education groups.Among the three subscales of the MBI,emotional exhaustion and personal accomplishment improved statistically significantly.VR was also better in terms of usability.CONCLUSION This study suggests VR enhances usability and reduces burnout in nurses,but further research is needed to assess its impact on depersonalization and objective measures like stress and heart rate.展开更多
High-repetition-rate(HRR) pulsed fiber lasers have attracted much attention in various fields. To effectively achieve HRR pulses in fiber lasers, dissipative four-wave-mixing mode-locking is a promising method. In thi...High-repetition-rate(HRR) pulsed fiber lasers have attracted much attention in various fields. To effectively achieve HRR pulses in fiber lasers, dissipative four-wave-mixing mode-locking is a promising method. In this work, we demonstrated an HRR pulsed fiber laser based on a virtually imaged phased array(VIPA), serving as a comb filter. Due to the high spectral resolution and low polarization sensitivity features of VIPA, the 30 GHz pulse with high quality and high stability could be obtained. In the experiments, both the single-waveband and dual-waveband HRR pulses were achieved. Such an HRR pulsed fiber laser could have potential applications in related fields, such as optical communications.展开更多
Virtual water trade(VWT)provides a new perspective for alleviating water crisis and has thus attracted widespread attention.However,the heterogeneity of virtual water trade inside and outside the river basin and its i...Virtual water trade(VWT)provides a new perspective for alleviating water crisis and has thus attracted widespread attention.However,the heterogeneity of virtual water trade inside and outside the river basin and its influencing factors remains further study.In this study,for better investigating the pattern and heterogeneity of virtual water trade inside and outside provincial regions along the Yellow River Basin in 2015 using the input-output model(MRIO),we proposed two new concepts,i.e.,virtual water surplus and virtual water deficit,and then used the Logarithmic Mean Divisia Index(LMDI)model to identify the inherent mechanism of the imbalance of virtual water trade between provincial regions along the Yellow River Basin and the other four regions in China.The results show that:1)in provincial regions along the Yellow River Basin,the less developed the economy was,the larger the contribution of the agricultural sector in virtual water trade,while the smaller the contribution of the industrial sector.2)Due to the large output of agricultural products,the upstream and midstream provincial regions of the Yellow River Basin had a virtual water surplus,with a net outflow of virtual water of 2.7×10^(8) m^(3) and 0.9×10^(8) m^(3),respectively.3)provincial regions along the Yellow River Basin were in a virtual water deficit with the rest of China,and the decisive factor was the active degree of trade with the outside.This study would be beneficial to illuminate the trade-related water use issues in provincial regions along the Yellow River Basin,which has farreaching practical signific-ance for alleviating water scarcity.展开更多
This contribution presents a novel wear dependent virtual flow rate sensor for single stage single lobe progressing cavity pumps. We study the wear-induced material loss of the pump components and the impact of this m...This contribution presents a novel wear dependent virtual flow rate sensor for single stage single lobe progressing cavity pumps. We study the wear-induced material loss of the pump components and the impact of this material loss on the volumetric efficiency. The results are combined with an established backflow model to implement a backflow calculation procedure that is adaptive to wear. We use a laboratory test setup with a highly abrasive fluid and operate a pump from new to worn condition to validate our approach. The obtained measurement data show that the presented virtual sensor is capable of calculating the flow rate of a pump being subject to wear during its regular operation.展开更多
The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a mul...The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a multitude of nanoscale applications.Over the past decade,the optical microsphere nanoimaging technique has been demonstrated to be a cost-effective solution for overcoming the diffraction limit and has achieved an imaging resolution of up to about k6k8 in a real-time and label-free manner,making it highly competitive among numerous super-resolution imaging technologies.In this review,we summarize the underlying nano-imaging mechanisms of the microsphere nanoscope and key advancements aimed at imaging performance enhancement:first,to change the working environment or modify the peripheral hardware of a single microsphere nanoscope at the system level;second,to compose the microsphere compound lens;and third,to engineer the geometry or ingredients of microspheres.We also analyze challenges yet to be overcome in optical microsphere nano-imaging,followed by an outlook of this technique.展开更多
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.展开更多
Physical assistive robotics are oriented to support and improve functional capacities of people.In physical rehabilitation,robots are indeed useful for functional recovery of affected limb.However,there are still open...Physical assistive robotics are oriented to support and improve functional capacities of people.In physical rehabilitation,robots are indeed useful for functional recovery of affected limb.However,there are still open questions related to technological aspects.This work presents a systematic review of upper limb rehabilitation robotics in order to analyze and establish technological challenges and future directions in this area.A bibliometric analysis was performed for the systematic literature review.Literature from the last six years,conducted between August 2020 and May 2021,was reviewed.The methodology for the literature search and a bibliometric analysis of the metadata are presented.After a preliminary search resulted in 820 articles,a total of 66 articles were included.A concurrency network and bibliographic analysis were provided.And an analysis of occurrences,taxonomy,and rehabilitation robotics reported in the literature is presented.This review aims to provide to the scientific community an overview of the state of the art in assistive robotics for upper limb physical rehabilitation.The literature analysis allows access to a gap of unexplored options to define the technological prospects applied to upper limb physical rehabilitation robotics.展开更多
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor...This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.展开更多
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.展开更多
In this work,we present a reconfigurable data glove design to capture different modes of human hand-object interactions,which are critical in training embodied artificial intelligence(AI)agents for fine manipulation t...In this work,we present a reconfigurable data glove design to capture different modes of human hand-object interactions,which are critical in training embodied artificial intelligence(AI)agents for fine manipulation tasks.To achieve various downstream tasks with distinct features,our reconfigurable data glove operates in three modes sharing a unified backbone design that reconstructs hand gestures in real time.In the tactile-sensing mode,the glove system aggregates manipulation force via customized force sensors made from a soft and thin piezoresistive material;this design minimizes interference during complex hand movements.The virtual reality(VR)mode enables real-time interaction in a physically plausible fashion:A caging-based approach is devised to determine stable grasps by detecting collision events.Leveraging a state-of-the-art finite element method,the simulation mode collects data on fine-grained four-dimensionalmanipulation events comprising hand and object motions in three-dimensional space and how the object's physical properties(e.g.,stress and energy)change in accordance with manipulation over time.Notably,the glove system presented here is the first to use high-fidelity simulation to investigate the unobservable physical and causal factors behind manipulation actions.In a series of experiments,we characterize our data glove in terms of individual sensors and the overall system.More specifically,we evaluate the system's three modes by①recording hand gestures and associated forces,②improving manipulation fluency in VR,and③producing realistic simulation effects of various tool uses,respectively.Based on these three modes,our reconfigurable data glove collects and reconstructs fine-grained human grasp data in both physical and virtual environments,thereby opening up new avenues for the learning of manipulation skills for embodied AI agents.展开更多
The traditional nutritional and medical hemp(Cannabis sativa L.)seed protein were explored for the discovery and directional preparation of new xanthine oxidase inhibitory(XOI)peptides by structure-based virtual scree...The traditional nutritional and medical hemp(Cannabis sativa L.)seed protein were explored for the discovery and directional preparation of new xanthine oxidase inhibitory(XOI)peptides by structure-based virtual screening,compound synthesis,in vitro bioassay and proteolysis.Six subtypes of hemp seed edestin and albumin were in silico hydrolyzed by 29 proteases,and 192 encrypted bioactive peptides were screened out.Six peptides showed to be XOI peptides,of which four(about 67%)were released by elastase hydrolysis.The peptide DDNPRRFY displayed the highest XOI activity(IC50=(2.10±0.06)mg/mL),acting as a mixed inhibitor.The pancreatic elastase directionally prepared XOI hemp seed protein hydrolysates,from which 6 high-abundance XOI peptides encrypted 3 virtually-screened ones including the DDNPRRFY.The novel outstanding hemp seed protein-derived XOI peptides and their virtual screening and directed preparation methods provide a promising and applicable approach to conveniently and efficiently explore food-derived bioactive peptides.展开更多
This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery(LiB)time series data.As the energy sector increasingly focuses on integrating distributed energy resources,Virtual Power Plants(...This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery(LiB)time series data.As the energy sector increasingly focuses on integrating distributed energy resources,Virtual Power Plants(VPP)have become a vital new framework for energy management.LiBs are key in this context,owing to their high-efficiency energy storage capabilities essential for VPP operations.However,LiBs are prone to various abnormal states like overcharging,over-discharging,and internal short circuits,which impede power transmission efficiency.Traditional methods for detecting such abnormalities in LiB are too broad and lack precision for the dynamic and irregular nature of LiB data.In response,we introduce an innovative method:a Long Short-Term Memory(LSTM)autoencoder based on Dynamic Frequency Memory and Correlation Attention(DFMCA-LSTM-AE).This unsupervised,end-to-end approach is specifically designed for dynamically monitoring abnormal states in LiB data.The method starts with a Dynamic Frequency Fourier Transform module,which dynamically captures the frequency characteristics of time series data across three scales,incorporating a memory mechanism to reduce overgeneralization of abnormal frequencies.This is followed by integrating LSTM into both the encoder and decoder,enabling the model to effectively encode and decode the temporal relationships in the time series.Empirical tests on a real-world LiB dataset demonstrate that DFMCA-LSTM-AE outperforms existing models,achieving an average Area Under the Curve(AUC)of 90.73%and an F1 score of 83.83%.These results mark significant improvements over existing models,ranging from 2.4%–45.3%for AUC and 1.6%–28.9%for F1 score,showcasing the model’s enhanced accuracy and reliability in detecting abnormal states in LiB data.展开更多
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa...As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.展开更多
Ultrahigh-temperature-pressure experiments are crucial for understanding the physical and chemical properties of matter.The recent development of boron-doped diamond(BDD)heaters has made such melting experiments possi...Ultrahigh-temperature-pressure experiments are crucial for understanding the physical and chemical properties of matter.The recent development of boron-doped diamond(BDD)heaters has made such melting experiments possible in large-volume presses.However,estimates of temperatures above 2600 K and of the temperature distributions inside BDD heaters are not well constrained,owing to the lack of a suitable thermometer.Here,we establish a three-dimensional finite element model as a virtual thermometer to estimate the temperature and temperature field above 2600 K.The advantage of this virtual thermometer over those proposed in previous studies is that it considers both alternating and direct current heating modes,the actual sizes of cell assemblies after compression,the effects of the electrode,thermocouple and anvil,and the heat dissipation by the pressure-transmitting medium.The virtual thermometer reproduces the power-temperature relationships of ultrahigh-temperature-pressure experiments below 2600 K at press loads of 2.8-7.9 MN(~19 to 28 GPa)within experimental uncertainties.The temperatures above 2600 K predicted by our virtual thermometer are within the uncertainty of those extrapolated from power-temperature relationships below 2600 K.Furthermore,our model shows that the temperature distribution inside a BDD heater(19-26 K/mm along the radial direction and<83 K/mm along the longitudinal direction)is more homogeneous than those inside conventional heaters such as graphite or LaCrO_(3) heaters(100-200 K/mm).Our study thus provides a reliable virtual thermometer for ultrahigh-temperature experiments using BDD heaters in Earth and material sciences.展开更多
Realization of high performance satellite onboard clock is vital for various positioning, navigation, and timing applications. For further improvement of the synchronization-based satellite time and frequency referenc...Realization of high performance satellite onboard clock is vital for various positioning, navigation, and timing applications. For further improvement of the synchronization-based satellite time and frequency references, we propose a geosynchronous(GEO) satellite virtual clock concept based on ground–satellite synchronization and present a beacon transponder structure for its implementation(scheduled for launch in 2025), which does not require atomic clocks to be mounted on the satellite. Its high performance relies only on minor modifications to the existing transponder structure of GEO satellites. We carefully model the carrier phase link and analyze the factors causing link asymmetry within the special relativity. Considering that performance of such synchronization-based satellite clocks is primarily limited by the link's random phase noise, which cannot be adequately modeled, we design a closed-loop experiment based on commercial GEO satellites for pre-evaluation. This experiment aims at extracting the zero-means random part of the ground-satellite Ku-band carrier phase via a feedback loop. Ultimately, we obtain a 1σ value of 0.633 ps(two-way link), following the Gaussian distribution. From this result, we conclude that the proposed real-time Einstein-synchronization-defined satellite virtual clock can achieve picosecond-level replication of onboard time and frequency.展开更多
基金supported by the National Natural Science Foundation of China(52372310)the State Key Laboratory of Advanced Rail Autonomous Operation(RAO2023ZZ001)+1 种基金the Fundamental Research Funds for the Central Universities(2022JBQY001)Beijing Laboratory of Urban Rail Transit.
文摘The emerging virtual coupling technology aims to operate multiple train units in a Virtually Coupled Train Set(VCTS)at a minimal but safe distance.To guarantee collision avoidance,the safety distance should be calculated using the state-of-the-art space-time separation principle that separates the Emergency Braking(EB)trajectories of two successive units during the whole EB process.In this case,the minimal safety distance is usually numerically calculated without an analytic formulation.Thus,the constrained VCTS control problem is hard to address with space-time separation,which is still a gap in the existing literature.To solve this problem,we propose a Distributed Economic Model Predictive Control(DEMPC)approach with computation efficiency and theoretical guarantee.Specifically,to alleviate the computation burden,we transform implicit safety constraints into explicitly linear ones,such that the optimal control problem in DEMPC is a quadratic programming problem that can be solved efficiently.For theoretical analysis,sufficient conditions are derived to guarantee the recursive feasibility and stability of DEMPC,employing compatibility constraints,tube techniques and terminal ingredient tuning.Moreover,we extend our approach with globally optimal and distributed online EB configuration methods to shorten the minimal distance among VCTS.Finally,experimental results demonstrate the performance and advantages of the proposed approaches.
文摘The 18th International Conference on Scientometrics and Informetrics(ISSI 2021)was held virtually on 12-15 July 2021,hosted by KU Leuven in close collaboration with the University of Antwerp.It is the first time that ISSI Conference was held in online format due to the pandemic.
基金Supported by Instituto de Salud CarlosⅢ(ISCⅢ),with group funds the Research Network on Chronicity,Primary Care and Health Promotion(RICAPPS,RD21/0016/0005)that is part of the Results-Oriented Cooperative Research Networks in Health(RICORS)(CarlosⅢHealth Institute),co-funded by the European Union“NextGeneration EU/PRTR”funds and with group funds Mental health research group in Primary Care(B17_23R),which is part of the Department of Innovation,Research,and University in the Government of Aragón(Spain).
文摘Current rates of mental illness are worrisome.Mental illness mainly affects females and younger age groups.The use of the internet to deliver mental health care has been growing since 2020 and includes the implementation of novel mental health treatments using virtual reality,augmented reality,and artificial intelligence.A new three dimensional digital environment,known as the metaverse,has emerged as the next version of the Internet.Artificial intelligence,augmented reality,and virtual reality will create fully immersive,experiential,and interactive online environments in the metaverse.People will use a unique avatar to do anything they do in their“real”lives,including seeking and receiving mental health care.In this opinion review,we reflect on how the metaverse could reshape how we deliver mental health treatment,its opportunities,and its challenges.
基金Research Fund of Chungnam National University,Chungnam National University,the Ministry of Trade,Industry,and Energy,Korea,under the“Regional industry-based organization support program”,No.P0001940the Korea Institute for Advancement of Technology,and a grant of the Korea Health Technology R&D Project through the Korea Health Industry Development Institute,funded by the Ministry of Health&Welfare,Republic of Korea,No.HI20C2088.
文摘BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential benefits,there are studies on patient satisfaction but there is limited information on the usability of virtual reality(VR)technology for new nurses in giving preoperative education to patients.AIM To investigate the impact on satisfaction,usability,and burnout of a system using VR technology in preoperative patient education.METHODS The study involved 20 nurses from the plastic surgery ward and 80 patients admitted between April and May 2019.Each nurse taught four patients:Two using traditional verbal education and two using virtual reality.The System Usability Scale,After-Scenario Questionnaire,and Maslach Burnout Inventory(MBI)were employed to evaluate the impact of these education methods.RESULTS The VR education groups showed a statistically higher satisfaction than the traditional verbal education groups.Among the three subscales of the MBI,emotional exhaustion and personal accomplishment improved statistically significantly.VR was also better in terms of usability.CONCLUSION This study suggests VR enhances usability and reduces burnout in nurses,but further research is needed to assess its impact on depersonalization and objective measures like stress and heart rate.
基金supported in part by the National Natural Science Foundation of China(NSFC)(Nos.61805084,11974006,11874018 and 61875058)Science and Technology Program of Guangzhou(No.2019050001)+4 种基金Guangdong Key R&D Program(No.2018B090904003)Guangdong Basic and Applied Basic Research Foundation(No.2019A1515010879)Foundation for Young Talents in Higher Education of Guangdong(No.2017KQNCX051)Scientific Research Foundation of Young Teacher of South China Normal University(No.17KJ09)Open Fund of the Guangdong Provincial Key Laboratory of Fiber Laser Materials and Applied Techniques(South China University of Technology,2019-2)
文摘High-repetition-rate(HRR) pulsed fiber lasers have attracted much attention in various fields. To effectively achieve HRR pulses in fiber lasers, dissipative four-wave-mixing mode-locking is a promising method. In this work, we demonstrated an HRR pulsed fiber laser based on a virtually imaged phased array(VIPA), serving as a comb filter. Due to the high spectral resolution and low polarization sensitivity features of VIPA, the 30 GHz pulse with high quality and high stability could be obtained. In the experiments, both the single-waveband and dual-waveband HRR pulses were achieved. Such an HRR pulsed fiber laser could have potential applications in related fields, such as optical communications.
基金Under the auspices of National Natural Science Foundation of China(No.42201302)‘Double First-Class’University Construction Project of Lanzhou University(No.561120213)。
文摘Virtual water trade(VWT)provides a new perspective for alleviating water crisis and has thus attracted widespread attention.However,the heterogeneity of virtual water trade inside and outside the river basin and its influencing factors remains further study.In this study,for better investigating the pattern and heterogeneity of virtual water trade inside and outside provincial regions along the Yellow River Basin in 2015 using the input-output model(MRIO),we proposed two new concepts,i.e.,virtual water surplus and virtual water deficit,and then used the Logarithmic Mean Divisia Index(LMDI)model to identify the inherent mechanism of the imbalance of virtual water trade between provincial regions along the Yellow River Basin and the other four regions in China.The results show that:1)in provincial regions along the Yellow River Basin,the less developed the economy was,the larger the contribution of the agricultural sector in virtual water trade,while the smaller the contribution of the industrial sector.2)Due to the large output of agricultural products,the upstream and midstream provincial regions of the Yellow River Basin had a virtual water surplus,with a net outflow of virtual water of 2.7×10^(8) m^(3) and 0.9×10^(8) m^(3),respectively.3)provincial regions along the Yellow River Basin were in a virtual water deficit with the rest of China,and the decisive factor was the active degree of trade with the outside.This study would be beneficial to illuminate the trade-related water use issues in provincial regions along the Yellow River Basin,which has farreaching practical signific-ance for alleviating water scarcity.
基金Funding by Ministerium für Wirtschaft,Innovation,Digitalisierung und Energie des Landes Nordrhein-Westfalen。
文摘This contribution presents a novel wear dependent virtual flow rate sensor for single stage single lobe progressing cavity pumps. We study the wear-induced material loss of the pump components and the impact of this material loss on the volumetric efficiency. The results are combined with an established backflow model to implement a backflow calculation procedure that is adaptive to wear. We use a laboratory test setup with a highly abrasive fluid and operate a pump from new to worn condition to validate our approach. The obtained measurement data show that the presented virtual sensor is capable of calculating the flow rate of a pump being subject to wear during its regular operation.
基金supported by Innovation Laboratory for Sciences and Technologies of Energy Materials of Fujian Province Human Resource Training Project(HRTP-[2022]-53).
文摘The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a multitude of nanoscale applications.Over the past decade,the optical microsphere nanoimaging technique has been demonstrated to be a cost-effective solution for overcoming the diffraction limit and has achieved an imaging resolution of up to about k6k8 in a real-time and label-free manner,making it highly competitive among numerous super-resolution imaging technologies.In this review,we summarize the underlying nano-imaging mechanisms of the microsphere nanoscope and key advancements aimed at imaging performance enhancement:first,to change the working environment or modify the peripheral hardware of a single microsphere nanoscope at the system level;second,to compose the microsphere compound lens;and third,to engineer the geometry or ingredients of microspheres.We also analyze challenges yet to be overcome in optical microsphere nano-imaging,followed by an outlook of this technique.
基金This work was funded by the Deanship of Scientific Research at Jouf University under Grant Number(DSR2022-RG-0102).
文摘Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
基金Supported by Militar Nueva Granada University of Colombia (Grant No.IMP-ING-3127)。
文摘Physical assistive robotics are oriented to support and improve functional capacities of people.In physical rehabilitation,robots are indeed useful for functional recovery of affected limb.However,there are still open questions related to technological aspects.This work presents a systematic review of upper limb rehabilitation robotics in order to analyze and establish technological challenges and future directions in this area.A bibliometric analysis was performed for the systematic literature review.Literature from the last six years,conducted between August 2020 and May 2021,was reviewed.The methodology for the literature search and a bibliometric analysis of the metadata are presented.After a preliminary search resulted in 820 articles,a total of 66 articles were included.A concurrency network and bibliographic analysis were provided.And an analysis of occurrences,taxonomy,and rehabilitation robotics reported in the literature is presented.This review aims to provide to the scientific community an overview of the state of the art in assistive robotics for upper limb physical rehabilitation.The literature analysis allows access to a gap of unexplored options to define the technological prospects applied to upper limb physical rehabilitation robotics.
基金Project supported by the National Natural Science Foundation of China(Grant No.62363005)the Jiangxi Provincial Natural Science Foundation(Grant Nos.20161BAB212032 and 20232BAB202034)the Science and Technology Research Project of Jiangxi Provincial Department of Education(Grant Nos.GJJ202602 and GJJ202601)。
文摘This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.
文摘As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.
基金the National Key Research and Development Program of China(2021ZD0150200)the Beijing Nova Program.
文摘In this work,we present a reconfigurable data glove design to capture different modes of human hand-object interactions,which are critical in training embodied artificial intelligence(AI)agents for fine manipulation tasks.To achieve various downstream tasks with distinct features,our reconfigurable data glove operates in three modes sharing a unified backbone design that reconstructs hand gestures in real time.In the tactile-sensing mode,the glove system aggregates manipulation force via customized force sensors made from a soft and thin piezoresistive material;this design minimizes interference during complex hand movements.The virtual reality(VR)mode enables real-time interaction in a physically plausible fashion:A caging-based approach is devised to determine stable grasps by detecting collision events.Leveraging a state-of-the-art finite element method,the simulation mode collects data on fine-grained four-dimensionalmanipulation events comprising hand and object motions in three-dimensional space and how the object's physical properties(e.g.,stress and energy)change in accordance with manipulation over time.Notably,the glove system presented here is the first to use high-fidelity simulation to investigate the unobservable physical and causal factors behind manipulation actions.In a series of experiments,we characterize our data glove in terms of individual sensors and the overall system.More specifically,we evaluate the system's three modes by①recording hand gestures and associated forces,②improving manipulation fluency in VR,and③producing realistic simulation effects of various tool uses,respectively.Based on these three modes,our reconfigurable data glove collects and reconstructs fine-grained human grasp data in both physical and virtual environments,thereby opening up new avenues for the learning of manipulation skills for embodied AI agents.
基金funded by National Natural Science Foundation of China(21868003)Bama County Program for Talents in Science and Technology(BaRenKe20210045).
文摘The traditional nutritional and medical hemp(Cannabis sativa L.)seed protein were explored for the discovery and directional preparation of new xanthine oxidase inhibitory(XOI)peptides by structure-based virtual screening,compound synthesis,in vitro bioassay and proteolysis.Six subtypes of hemp seed edestin and albumin were in silico hydrolyzed by 29 proteases,and 192 encrypted bioactive peptides were screened out.Six peptides showed to be XOI peptides,of which four(about 67%)were released by elastase hydrolysis.The peptide DDNPRRFY displayed the highest XOI activity(IC50=(2.10±0.06)mg/mL),acting as a mixed inhibitor.The pancreatic elastase directionally prepared XOI hemp seed protein hydrolysates,from which 6 high-abundance XOI peptides encrypted 3 virtually-screened ones including the DDNPRRFY.The novel outstanding hemp seed protein-derived XOI peptides and their virtual screening and directed preparation methods provide a promising and applicable approach to conveniently and efficiently explore food-derived bioactive peptides.
基金supported by“Regional Innovation Strategy(RIS)”through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(MOE)(2021RIS-002)the Technology Development Program(RS-2023-00278623)funded by the Ministry of SMEs and Startups(MSS,Korea).
文摘This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery(LiB)time series data.As the energy sector increasingly focuses on integrating distributed energy resources,Virtual Power Plants(VPP)have become a vital new framework for energy management.LiBs are key in this context,owing to their high-efficiency energy storage capabilities essential for VPP operations.However,LiBs are prone to various abnormal states like overcharging,over-discharging,and internal short circuits,which impede power transmission efficiency.Traditional methods for detecting such abnormalities in LiB are too broad and lack precision for the dynamic and irregular nature of LiB data.In response,we introduce an innovative method:a Long Short-Term Memory(LSTM)autoencoder based on Dynamic Frequency Memory and Correlation Attention(DFMCA-LSTM-AE).This unsupervised,end-to-end approach is specifically designed for dynamically monitoring abnormal states in LiB data.The method starts with a Dynamic Frequency Fourier Transform module,which dynamically captures the frequency characteristics of time series data across three scales,incorporating a memory mechanism to reduce overgeneralization of abnormal frequencies.This is followed by integrating LSTM into both the encoder and decoder,enabling the model to effectively encode and decode the temporal relationships in the time series.Empirical tests on a real-world LiB dataset demonstrate that DFMCA-LSTM-AE outperforms existing models,achieving an average Area Under the Curve(AUC)of 90.73%and an F1 score of 83.83%.These results mark significant improvements over existing models,ranging from 2.4%–45.3%for AUC and 1.6%–28.9%for F1 score,showcasing the model’s enhanced accuracy and reliability in detecting abnormal states in LiB data.
文摘As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.
基金supported financially by the National Key R&D Program of China(Grant No.2022YFB3706602)the National Natural Science Foundation of China(Grant Nos.42272041,41902034,and 12011530063)the Jilin University High-Level Innovation Team Foundation,China(Grant No.2021TD-05).
文摘Ultrahigh-temperature-pressure experiments are crucial for understanding the physical and chemical properties of matter.The recent development of boron-doped diamond(BDD)heaters has made such melting experiments possible in large-volume presses.However,estimates of temperatures above 2600 K and of the temperature distributions inside BDD heaters are not well constrained,owing to the lack of a suitable thermometer.Here,we establish a three-dimensional finite element model as a virtual thermometer to estimate the temperature and temperature field above 2600 K.The advantage of this virtual thermometer over those proposed in previous studies is that it considers both alternating and direct current heating modes,the actual sizes of cell assemblies after compression,the effects of the electrode,thermocouple and anvil,and the heat dissipation by the pressure-transmitting medium.The virtual thermometer reproduces the power-temperature relationships of ultrahigh-temperature-pressure experiments below 2600 K at press loads of 2.8-7.9 MN(~19 to 28 GPa)within experimental uncertainties.The temperatures above 2600 K predicted by our virtual thermometer are within the uncertainty of those extrapolated from power-temperature relationships below 2600 K.Furthermore,our model shows that the temperature distribution inside a BDD heater(19-26 K/mm along the radial direction and<83 K/mm along the longitudinal direction)is more homogeneous than those inside conventional heaters such as graphite or LaCrO_(3) heaters(100-200 K/mm).Our study thus provides a reliable virtual thermometer for ultrahigh-temperature experiments using BDD heaters in Earth and material sciences.
基金supported by the National Key Research and Development Program of China(Grant No.2021YFA1402100)。
文摘Realization of high performance satellite onboard clock is vital for various positioning, navigation, and timing applications. For further improvement of the synchronization-based satellite time and frequency references, we propose a geosynchronous(GEO) satellite virtual clock concept based on ground–satellite synchronization and present a beacon transponder structure for its implementation(scheduled for launch in 2025), which does not require atomic clocks to be mounted on the satellite. Its high performance relies only on minor modifications to the existing transponder structure of GEO satellites. We carefully model the carrier phase link and analyze the factors causing link asymmetry within the special relativity. Considering that performance of such synchronization-based satellite clocks is primarily limited by the link's random phase noise, which cannot be adequately modeled, we design a closed-loop experiment based on commercial GEO satellites for pre-evaluation. This experiment aims at extracting the zero-means random part of the ground-satellite Ku-band carrier phase via a feedback loop. Ultimately, we obtain a 1σ value of 0.633 ps(two-way link), following the Gaussian distribution. From this result, we conclude that the proposed real-time Einstein-synchronization-defined satellite virtual clock can achieve picosecond-level replication of onboard time and frequency.