In order to obtain the transient characteristics of a low-speed centrifugal pump during the start-up and shutdown stages,dedicated experimental tests were conducted with eight different valve opening conditions.The Pe...In order to obtain the transient characteristics of a low-speed centrifugal pump during the start-up and shutdown stages,dedicated experimental tests were conducted with eight different valve opening conditions.The Pearson correlation coefficient was used to reveal the linear correlation between variables.According to the results,the stable rotational speed decreases with increasing valve opening(rotational speed decreases from approximately 1472 to 1453 r/min),while the stable shaft power exhibits an increasing trend(shaft power increases from approximately 0.242 to 0.390 kW).The stable time and zeroing time of each parameter during start-up and shutdown processes vary,with the flow zeroing time significantly increasing with the relative flow,reaching up to 10.468 s,while the shaft power zeroing time is roughly between 1.219 and 1.375 s.The results demonstrate that with increasing valve opening,the stable and zeroing time of flow significantly increase(|r|greater than 0.95),while the stable and zeroing time of rotational speed,power,and head display a smaller sensitivity on the valve opening(|r|less than 0.6).展开更多
This paper presents a distributed scheme with limited communications, aiming to achieve cooperative motion control for multiple omnidirectional mobile manipulators(MOMMs).The proposed scheme extends the existing singl...This paper presents a distributed scheme with limited communications, aiming to achieve cooperative motion control for multiple omnidirectional mobile manipulators(MOMMs).The proposed scheme extends the existing single-agent motion control to cater to scenarios involving the cooperative operation of MOMMs. Specifically, squeeze-free cooperative load transportation is achieved for the end-effectors of MOMMs by incorporating cooperative repetitive motion planning(CRMP), while guiding each individual to desired poses. Then, the distributed scheme is formulated as a time-varying quadratic programming(QP) and solved online utilizing a noise-tolerant zeroing neural network(NTZNN). Theoretical analysis shows that the NTZNN model converges globally to the optimal solution of QP in the presence of noise. Finally, the effectiveness of the control design is demonstrated by numerical simulations and physical platform experiments.展开更多
When it was proposed to use one wire instead of two or three, there were many objections. The most serious objection was this. 1) The entire globe is covered with three phase (three wires) lines. They work and transmi...When it was proposed to use one wire instead of two or three, there were many objections. The most serious objection was this. 1) The entire globe is covered with three phase (three wires) lines. They work and transmit energy. Nobody will remake them [1]. 2) Yes it is logically. Therefore in this work we will not speak detailed about one wire method. About this method there are patents, books, articles [2]. Maybe will be better to speak about penguins and horses.展开更多
In this study,we systematically investigated the effect of proton concentration on the kinetics of the oxygen reduction reaction(ORR)on Pt(111)in acidic solutions.Experimental results demonstrate a rectangular hyperbo...In this study,we systematically investigated the effect of proton concentration on the kinetics of the oxygen reduction reaction(ORR)on Pt(111)in acidic solutions.Experimental results demonstrate a rectangular hyperbolic relationship,i.e.,the ORR current excluding the effect of other variables increases with proton concentration and then tends to a constant value.We consider that this is caused by the limitation of ORR kinetics by the trace oxygen concentration in the solution,which determines the upper limit of ORR kinetics.A model of effective concentration is further proposed for rectangular hyperbolic relationships:when the reactant concentration is high enough to reach a critical saturation concentration,the effective reactant concentration will become a constant value.This could be due to the limited concentration of a certain reactant for reactions involving more than one reactant or the limited number of active sites available on the catalyst.Our study provides new insights into the kinetics of electrocatalytic reactions,and it is important for the proper evaluation of catalyst activity and the study of structureperformance relationships.展开更多
In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of ...In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes.展开更多
Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power consumption.The power consumption at the receiver ra...Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power consumption.The power consumption at the receiver radio frequency(RF)circuits can be significantly reduced by the application of analog-to-digital converter(ADC)of low resolution.In this paper we investigate bandwidth efficiency(BE)of massive MIMO with perfect channel state information(CSI)by applying low resolution ADCs with Rician fadings.We start our analysis by deriving the additive quantization noise model,which helps to understand the effects of ADC resolution on BE by keeping the power constraint at the receiver in radar.We also investigate deeply the effects of using higher bit rates and the number of BS antennas on bandwidth efficiency(BE)of the system.We emphasize that good bandwidth efficiency can be achieved by even using low resolution ADC by using regularized zero-forcing(RZF)combining algorithm.We also provide a generic analysis of energy efficiency(EE)with different options of bits by calculating the energy efficiencies(EE)using the achievable rates.We emphasize that satisfactory BE can be achieved by even using low-resolution ADC/DAC in massive MIMO.展开更多
Elastic metamaterials with unusual elastic properties offer unprecedented ways to modulate the polarization and propagation of elastic waves.However,most of them rely on the resonant structural components,and thus are...Elastic metamaterials with unusual elastic properties offer unprecedented ways to modulate the polarization and propagation of elastic waves.However,most of them rely on the resonant structural components,and thus are frequency-dependent and unchangeable.Here,we present a reconfigurable 2D mechanism-based metamaterial which possesses transformable and frequency-independent elastic properties.Based on the proposed mechanism-based metamaterial,interesting functionalities,such as ternarycoded elastic wave polarizer and programmable refraction,are demonstrated.Particularly,unique ternary-coded polarizers,with 1-trit polarization filtering and 2-trit polarization separating of longitudinal and transverse waves,are first achieved.Then,the strong anisotropy of the proposed metamaterial is harnessed to realize positive-negative bi-refraction,only-positive refraction,and only-negative refraction.Finally,the wave functions with detailed microstructures are numerically verified.展开更多
The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak...The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak type double-stage Hall thruster configuration, and a particle-in-cell simulation is carried out to investigate the influences of both acceleration electrode voltage value and zero magnetic point position on the thruster discharge characteristics and performances.The results indicate that increasing the acceleration voltage leads to a larger potential drop in the acceleration stage, allowing ions to gain higher energy, while electrons are easily absorbed by the intermediate electrode, resulting in a decrease in the anode current and ionization rate. When the acceleration voltage reaches 500 V, the thrust and efficiency are maximized, resulting in a 15%increase in efficiency. After the acceleration voltage exceeds 500 V, a potential barrier forms within the channel, leading to a decrease in thruster efficiency. Further study shows that as the second zero magnetic point moves towards the outlet of the channel, more electrons easily traverse the zero magnetic field region, participating in the ionization. The increase in the ionization rate leads to a gradual enhancement in both thrust and efficiency.展开更多
It is found from textbooks and literature that there are three different statements for the third law of thermodynamics,i.e., the Nernst theorem, the unattainability statement of absolute zero temperature, and the hea...It is found from textbooks and literature that there are three different statements for the third law of thermodynamics,i.e., the Nernst theorem, the unattainability statement of absolute zero temperature, and the heat capacity statement. It is pointed out that such three statements correspond to three thermodynamic parameters, which are, respectively, the entropy,temperature, and heat capacity, and can be obtained by extrapolating the experimental results of different parameters at ultralow temperatures to absolute zero. It is expounded that because there is no need for additional assumptions in the derivation of the Nernst equation, the Nernst theorem should be renamed as the Nernst statement. Moreover, it is proved that both the Nernst statement and the heat capacity statement are mutually deducible and equivalent, while the unattainability of absolute zero temperature is only a corollary of the Nernst statement or the heat capacity statement so that it is unsuitably referred to as one statement of the third law of thermodynamics. The conclusion is that the Nernst statement and the heat capacity statement are two equivalent statements of the third law of thermodynamics.展开更多
In this paper, we design high-order Runge-Kutta discontinuous Galerkin (RKDG) methods with multi-resolution weighted essentially non-oscillatory (multi-resolution WENO) limiters to compute compressible steady-state pr...In this paper, we design high-order Runge-Kutta discontinuous Galerkin (RKDG) methods with multi-resolution weighted essentially non-oscillatory (multi-resolution WENO) limiters to compute compressible steady-state problems on triangular meshes. A troubled cell indicator extended from structured meshes to unstructured meshes is constructed to identify triangular cells in which the application of the limiting procedures is required. In such troubled cells, the multi-resolution WENO limiting methods are used to the hierarchical L^(2) projection polynomial sequence of the DG solution. Through using the RKDG methods with multi-resolution WENO limiters, the optimal high-order accuracy can be gradually reduced to first-order in the triangular troubled cells, so that the shock wave oscillations can be well suppressed. In steady-state simulations on triangular meshes, the numerical residual converges to near machine zero. The proposed spatial reconstruction methods enhance the robustness of classical DG methods on triangular meshes. The good results of these RKDG methods with multi-resolution WENO limiters are verified by a series of two-dimensional steady-state problems.展开更多
Majorana quantum computation offers a potential approach to securely manipulating and storing quantum data in a topological manner that may effectively resist the decoherence induced by local noise. However, actual Ma...Majorana quantum computation offers a potential approach to securely manipulating and storing quantum data in a topological manner that may effectively resist the decoherence induced by local noise. However, actual Majorana qubit setups are susceptible to noise. In this study, from a quantum dynamics perspective, we develop a noise model for Majorana qubits that accounts for quasi-particle poisoning and Majorana overlapping with fluctuation. Furthermore, we focus on Majorana parity readout methodologies, specifically those leveraging an ancillary quantum dot, and carry out an indepth exploration of continuous measurement techniques founded on the quantum jump model of a quantum point contact.Utilizing these methodologies, we proceed to analyze the influence of noise on the afore-mentioned noise model, employing numerical computation to evaluate the power spectrum and frequency curve. In the culmination of our study, we put forward a strategy to benchmark the presence and detailed properties of noise in Majorana qubits.展开更多
The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with ...The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with microscale spatialresolution.However,a bias magnetic field is necessary to fully separate the resonance lines of optically detected magneticresonance(ODMR)spectrum of NV ensembles.This brings disturbances in samples being detected and limits the rangeof application.Here,we demonstrate a method of vector magnetometry in zero bias magnetic field using NV ensembles.By utilizing the anisotropy property of fluorescence excited from NV centers,we analyzed the ODMR spectrum of NVensembles under various polarized angles of excitation laser in zero bias magnetic field with a quantitative numerical modeland reconstructed the magnetic field vector.The minimum magnetic field modulus that can be resolved accurately is downto~0.64 G theoretically depending on the ODMR spectral line width(1.8 MHz),and~2 G experimentally due to noisesin fluorescence signals and errors in calibration.By using 13C purified and low nitrogen concentration diamond combinedwith improving calibration of unknown parameters,the ODMR spectral line width can be further decreased below 0.5 MHz,corresponding to~0.18 G minimum resolvable magnetic field modulus.展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall...The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.展开更多
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre...With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.展开更多
In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential pol...In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential polynomial,which extends the related result of Li,and Chen et al..An example is given to show that the hypothesis on the zeros of a(z)is necessary.展开更多
Clean steel encompasses a multitude of concepts that are based on fulfilling customer requirements and can be produced in many ways depending on the existing equipment and detailed customer demands.A common feature of...Clean steel encompasses a multitude of concepts that are based on fulfilling customer requirements and can be produced in many ways depending on the existing equipment and detailed customer demands.A common feature of all clean steel production is tight process control along with continuous monitoring.To meet an increasing demand for cold-rolled(CR)steel sheets of improved mechanical properties,and to cope with the change of the annealing process from a batch-type to a continuous process,it is necessary to establish a technique for making ultralow carbon(ULC)steel with a C-concentration lower than 20 ppm for the steelmaking process associated with a major challenge to guarantee the competitiveness with observance of environmental requirements.Steel ladle lining plays an important role on the energy consumption during the production and the refractory lining design contributes to minimize thermal bath loss,carbon pick up and shell temperature.A new generation of unfired zero carbon refractories was developed with two specific approaches:(1)replacement of firing bricks reducing CO_(2) footprint and(2)replacement of carbon containing with performance increasing.Bricks can be used in working and safety linings with a unique microstructure with better heat scattering and similar thermomechanical properties.This work presents customers’performance compared to traditional products highlighting energy savings.展开更多
Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national ...Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national challenges with poor viral suppression. The OTZ program aligns with the UNAIDS 95-95-95 goals. It seeks to empower AYPLHIV to be in charge of their treatment and commit to triple zero outcomeszero missed appointments, zero missed drugs, and zero viral loads. The purpose of the study was to assess the impact of the OTZ program on viral load suppression among members of the adolescent club in 68 NARHY, Lagos. Method: A cross-sectional retrospective study to evaluate the impact of the OTZ program on the viral load of 53 AYP enrolled in the OTZ program between March 2019 to December 2019 was analyzed. The Percentage of viral load suppression before enrollment compared with 6 and 12 months after enrollment into the OTZ program. The AYP is grouped into 10 - 14, 15 - 19, and 20 - 24 years. Activities conducted were peer driven monthly meetings with the AYP during which the adolescents interacted on issues relating to improving their treatment outcomes, healthcare workers reviewed their clinical status, viral load result, provider peer counseling, and caregivers engagement to support adherence to medication and ARV refills. Results: Before OTZ, 81% aged 10 - 14 years, 75% aged 15 - 19 years, and 25% aged 20 - 24 years were virally suppressed (VL less than 1000 copies/ml). Six months after enrollment, 94% were virally suppressed95% aged 10 - 14 years, 96% aged 15 - 19 years, and 66% aged 20-24 years. Twelve months after enrollment, 96% of AYP were virally suppressed100% aged 10-14 years, 93% aged 15 - 19 years, and 100% aged 20 - 24 years. Males viral load (VL) suppression improved from 79% to 96% and 92%, while females VL suppression improved from 69% to 93% and 100% at 6 and 12 months respectively. Conclusion: The OTZ activities contributed to improved viral load suppression in the AYP of the facility.展开更多
Anxiety is a significant mental health issue that substantially affects an individual’s quality of life. Feelings of uneasiness, irritability, and sleep disturbances characterize it. 4-Hydroxyphenyl acetic acid (4-HP...Anxiety is a significant mental health issue that substantially affects an individual’s quality of life. Feelings of uneasiness, irritability, and sleep disturbances characterize it. 4-Hydroxyphenyl acetic acid (4-HPAA) is identified in brain cells as a physiological byproduct of tyramine. This study hypothesizes that 4-HPAA may regulate anxiety due to its anxiolytic properties, acting as a modulator of the GABAergic system, which plays a crucial role in the pathophysiology of anxiety disorders. Our study aims to enhance the anxiolytic effects of 4-HPAA through chemical modification to improve its pharmacokinetic properties. Three derivatives, namely Isopropyl-4-hydroxy-[phenyl] acetate (IHPA), Isopropyl-4-hydroxy-[phenyl] acetate (MPAA), and 4-methoxyphenyl acetate (MPHA), have been synthesized from 4-HPAA. This assessment will use well-established animal models, specifically the Elevated Plus-Maze (EPM) and Zero Maze (EZM) tests, selected for their validity in replicating anxiety-like symptoms in animals. Chronic caffeine administration via drinking water (0.3 g/l for 14 days) was employed to induce an anxiety state for testing purposes. IHPA and MPAA demonstrated significant anxiolyticactivity when tested in the EPM and EZM experiments. Molecular docking simulations using AutoDock Vina indicated that 4-HPAA derivatives had docking scores ranging from −5.8 to −4.8 kcal/mol, compared to the standard anxiolytic medication Diazepam, which scored −7.1 kcal/mol. These scores suggest a potential for 4-HPAA derivatives to interact effectively with the Gamma-aminobutyric acid (GABA_A) receptor. In conclusion, our in vivo and in silico analyses indicate a promising anxiolytic potential for 4-HPAA derivatives.展开更多
基金supported by Science and Technology Project of Quzhou(Grant Nos.2023K256,2023NC08)Zhejiang Provincial Natural Science Foundation of China(Grant No.LZY21E050001)Hunan Province Key Field R&D Plan Project(Grant No.2022GK2068).
文摘In order to obtain the transient characteristics of a low-speed centrifugal pump during the start-up and shutdown stages,dedicated experimental tests were conducted with eight different valve opening conditions.The Pearson correlation coefficient was used to reveal the linear correlation between variables.According to the results,the stable rotational speed decreases with increasing valve opening(rotational speed decreases from approximately 1472 to 1453 r/min),while the stable shaft power exhibits an increasing trend(shaft power increases from approximately 0.242 to 0.390 kW).The stable time and zeroing time of each parameter during start-up and shutdown processes vary,with the flow zeroing time significantly increasing with the relative flow,reaching up to 10.468 s,while the shaft power zeroing time is roughly between 1.219 and 1.375 s.The results demonstrate that with increasing valve opening,the stable and zeroing time of flow significantly increase(|r|greater than 0.95),while the stable and zeroing time of rotational speed,power,and head display a smaller sensitivity on the valve opening(|r|less than 0.6).
基金supported in part by the National Natural Science Foundation of China (62373065,61873304,62173048,62106023)the Innovation and Entrepreneurship Talent funding Project of Jilin Province(2022QN04)+1 种基金the Changchun Science and Technology Project (21ZY41)the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University (2024D09)。
文摘This paper presents a distributed scheme with limited communications, aiming to achieve cooperative motion control for multiple omnidirectional mobile manipulators(MOMMs).The proposed scheme extends the existing single-agent motion control to cater to scenarios involving the cooperative operation of MOMMs. Specifically, squeeze-free cooperative load transportation is achieved for the end-effectors of MOMMs by incorporating cooperative repetitive motion planning(CRMP), while guiding each individual to desired poses. Then, the distributed scheme is formulated as a time-varying quadratic programming(QP) and solved online utilizing a noise-tolerant zeroing neural network(NTZNN). Theoretical analysis shows that the NTZNN model converges globally to the optimal solution of QP in the presence of noise. Finally, the effectiveness of the control design is demonstrated by numerical simulations and physical platform experiments.
文摘When it was proposed to use one wire instead of two or three, there were many objections. The most serious objection was this. 1) The entire globe is covered with three phase (three wires) lines. They work and transmit energy. Nobody will remake them [1]. 2) Yes it is logically. Therefore in this work we will not speak detailed about one wire method. About this method there are patents, books, articles [2]. Maybe will be better to speak about penguins and horses.
基金supported by the National Natural Science Foundation of China(21972131)。
文摘In this study,we systematically investigated the effect of proton concentration on the kinetics of the oxygen reduction reaction(ORR)on Pt(111)in acidic solutions.Experimental results demonstrate a rectangular hyperbolic relationship,i.e.,the ORR current excluding the effect of other variables increases with proton concentration and then tends to a constant value.We consider that this is caused by the limitation of ORR kinetics by the trace oxygen concentration in the solution,which determines the upper limit of ORR kinetics.A model of effective concentration is further proposed for rectangular hyperbolic relationships:when the reactant concentration is high enough to reach a critical saturation concentration,the effective reactant concentration will become a constant value.This could be due to the limited concentration of a certain reactant for reactions involving more than one reactant or the limited number of active sites available on the catalyst.Our study provides new insights into the kinetics of electrocatalytic reactions,and it is important for the proper evaluation of catalyst activity and the study of structureperformance relationships.
基金This work was supported by the Key Scientific and Technological Project of Henan Province(Grant Number 222102210212)Doctoral Research Start Project of Henan Institute of Technology(Grant Number KQ2005)Key Research Projects of Colleges and Universities in Henan Province(Grant Number 23B510006).
文摘In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes.
文摘Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power consumption.The power consumption at the receiver radio frequency(RF)circuits can be significantly reduced by the application of analog-to-digital converter(ADC)of low resolution.In this paper we investigate bandwidth efficiency(BE)of massive MIMO with perfect channel state information(CSI)by applying low resolution ADCs with Rician fadings.We start our analysis by deriving the additive quantization noise model,which helps to understand the effects of ADC resolution on BE by keeping the power constraint at the receiver in radar.We also investigate deeply the effects of using higher bit rates and the number of BS antennas on bandwidth efficiency(BE)of the system.We emphasize that good bandwidth efficiency can be achieved by even using low resolution ADC by using regularized zero-forcing(RZF)combining algorithm.We also provide a generic analysis of energy efficiency(EE)with different options of bits by calculating the energy efficiencies(EE)using the achievable rates.We emphasize that satisfactory BE can be achieved by even using low-resolution ADC/DAC in massive MIMO.
基金supported by the National Key R&D Program of China(No.2021YFE0110900)the National Natural Science Foundation of China(Nos.U22B2078 and 11991033)。
文摘Elastic metamaterials with unusual elastic properties offer unprecedented ways to modulate the polarization and propagation of elastic waves.However,most of them rely on the resonant structural components,and thus are frequency-dependent and unchangeable.Here,we present a reconfigurable 2D mechanism-based metamaterial which possesses transformable and frequency-independent elastic properties.Based on the proposed mechanism-based metamaterial,interesting functionalities,such as ternarycoded elastic wave polarizer and programmable refraction,are demonstrated.Particularly,unique ternary-coded polarizers,with 1-trit polarization filtering and 2-trit polarization separating of longitudinal and transverse waves,are first achieved.Then,the strong anisotropy of the proposed metamaterial is harnessed to realize positive-negative bi-refraction,only-positive refraction,and only-negative refraction.Finally,the wave functions with detailed microstructures are numerically verified.
基金supported by National Natural Science Foundation of China (Nos. 11975062, 11605021 and 12375009)the Fundamental Research Funds for the Central Universities (No. 3132023192)。
文摘The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak type double-stage Hall thruster configuration, and a particle-in-cell simulation is carried out to investigate the influences of both acceleration electrode voltage value and zero magnetic point position on the thruster discharge characteristics and performances.The results indicate that increasing the acceleration voltage leads to a larger potential drop in the acceleration stage, allowing ions to gain higher energy, while electrons are easily absorbed by the intermediate electrode, resulting in a decrease in the anode current and ionization rate. When the acceleration voltage reaches 500 V, the thrust and efficiency are maximized, resulting in a 15%increase in efficiency. After the acceleration voltage exceeds 500 V, a potential barrier forms within the channel, leading to a decrease in thruster efficiency. Further study shows that as the second zero magnetic point moves towards the outlet of the channel, more electrons easily traverse the zero magnetic field region, participating in the ionization. The increase in the ionization rate leads to a gradual enhancement in both thrust and efficiency.
基金Project supported by the National Natural Science Foundation of China (Grant No. 12075197)the Fundamental Research Fund for the Central Universities of China (Grant No. 20720210020)。
文摘It is found from textbooks and literature that there are three different statements for the third law of thermodynamics,i.e., the Nernst theorem, the unattainability statement of absolute zero temperature, and the heat capacity statement. It is pointed out that such three statements correspond to three thermodynamic parameters, which are, respectively, the entropy,temperature, and heat capacity, and can be obtained by extrapolating the experimental results of different parameters at ultralow temperatures to absolute zero. It is expounded that because there is no need for additional assumptions in the derivation of the Nernst equation, the Nernst theorem should be renamed as the Nernst statement. Moreover, it is proved that both the Nernst statement and the heat capacity statement are mutually deducible and equivalent, while the unattainability of absolute zero temperature is only a corollary of the Nernst statement or the heat capacity statement so that it is unsuitably referred to as one statement of the third law of thermodynamics. The conclusion is that the Nernst statement and the heat capacity statement are two equivalent statements of the third law of thermodynamics.
基金supported by the NSFC Grant No.11872210 and Grant No.MCMS-I-0120G01Chi-Wang Shu:Research is supported by the AFOSR Grant FA9550-20-1-0055 and the NSF Grant DMS-2010107Jianxian Qiu:Research is supported by the NSFC Grant No.12071392.
文摘In this paper, we design high-order Runge-Kutta discontinuous Galerkin (RKDG) methods with multi-resolution weighted essentially non-oscillatory (multi-resolution WENO) limiters to compute compressible steady-state problems on triangular meshes. A troubled cell indicator extended from structured meshes to unstructured meshes is constructed to identify triangular cells in which the application of the limiting procedures is required. In such troubled cells, the multi-resolution WENO limiting methods are used to the hierarchical L^(2) projection polynomial sequence of the DG solution. Through using the RKDG methods with multi-resolution WENO limiters, the optimal high-order accuracy can be gradually reduced to first-order in the triangular troubled cells, so that the shock wave oscillations can be well suppressed. In steady-state simulations on triangular meshes, the numerical residual converges to near machine zero. The proposed spatial reconstruction methods enhance the robustness of classical DG methods on triangular meshes. The good results of these RKDG methods with multi-resolution WENO limiters are verified by a series of two-dimensional steady-state problems.
基金supported by the Innovation Program for Quantum Science and Technology (Grant No.2021ZD0302400)the National Natural Science Foundation of China (Grants No.11974198)the Natural Science Foundation of Shandong Province of China (Grant No.ZR2021MA091)。
文摘Majorana quantum computation offers a potential approach to securely manipulating and storing quantum data in a topological manner that may effectively resist the decoherence induced by local noise. However, actual Majorana qubit setups are susceptible to noise. In this study, from a quantum dynamics perspective, we develop a noise model for Majorana qubits that accounts for quasi-particle poisoning and Majorana overlapping with fluctuation. Furthermore, we focus on Majorana parity readout methodologies, specifically those leveraging an ancillary quantum dot, and carry out an indepth exploration of continuous measurement techniques founded on the quantum jump model of a quantum point contact.Utilizing these methodologies, we proceed to analyze the influence of noise on the afore-mentioned noise model, employing numerical computation to evaluate the power spectrum and frequency curve. In the culmination of our study, we put forward a strategy to benchmark the presence and detailed properties of noise in Majorana qubits.
基金supported by the National Key R&D Program of China(Grant Nos.2021YFB3202800 and 2023YF0718400)Chinese Academy of Sciences(Grant No.ZDZBGCH2021002)+2 种基金Chinese Academy of Sciences(Grant No.GJJSTD20200001)Innovation Program for Quantum Science and Technology(Grant No.2021ZD0303204)Anhui Initiative in Quantum Information Technologies,USTC Tang Scholar,and the Fundamental Research Funds for the Central Universities.
文摘The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with microscale spatialresolution.However,a bias magnetic field is necessary to fully separate the resonance lines of optically detected magneticresonance(ODMR)spectrum of NV ensembles.This brings disturbances in samples being detected and limits the rangeof application.Here,we demonstrate a method of vector magnetometry in zero bias magnetic field using NV ensembles.By utilizing the anisotropy property of fluorescence excited from NV centers,we analyzed the ODMR spectrum of NVensembles under various polarized angles of excitation laser in zero bias magnetic field with a quantitative numerical modeland reconstructed the magnetic field vector.The minimum magnetic field modulus that can be resolved accurately is downto~0.64 G theoretically depending on the ODMR spectral line width(1.8 MHz),and~2 G experimentally due to noisesin fluorescence signals and errors in calibration.By using 13C purified and low nitrogen concentration diamond combinedwith improving calibration of unknown parameters,the ODMR spectral line width can be further decreased below 0.5 MHz,corresponding to~0.18 G minimum resolvable magnetic field modulus.
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
基金supported by the National Key Research and Development Program of China(grant number 2019YFE0123600)。
文摘The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.
文摘With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.
文摘In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential polynomial,which extends the related result of Li,and Chen et al..An example is given to show that the hypothesis on the zeros of a(z)is necessary.
文摘Clean steel encompasses a multitude of concepts that are based on fulfilling customer requirements and can be produced in many ways depending on the existing equipment and detailed customer demands.A common feature of all clean steel production is tight process control along with continuous monitoring.To meet an increasing demand for cold-rolled(CR)steel sheets of improved mechanical properties,and to cope with the change of the annealing process from a batch-type to a continuous process,it is necessary to establish a technique for making ultralow carbon(ULC)steel with a C-concentration lower than 20 ppm for the steelmaking process associated with a major challenge to guarantee the competitiveness with observance of environmental requirements.Steel ladle lining plays an important role on the energy consumption during the production and the refractory lining design contributes to minimize thermal bath loss,carbon pick up and shell temperature.A new generation of unfired zero carbon refractories was developed with two specific approaches:(1)replacement of firing bricks reducing CO_(2) footprint and(2)replacement of carbon containing with performance increasing.Bricks can be used in working and safety linings with a unique microstructure with better heat scattering and similar thermomechanical properties.This work presents customers’performance compared to traditional products highlighting energy savings.
文摘Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national challenges with poor viral suppression. The OTZ program aligns with the UNAIDS 95-95-95 goals. It seeks to empower AYPLHIV to be in charge of their treatment and commit to triple zero outcomeszero missed appointments, zero missed drugs, and zero viral loads. The purpose of the study was to assess the impact of the OTZ program on viral load suppression among members of the adolescent club in 68 NARHY, Lagos. Method: A cross-sectional retrospective study to evaluate the impact of the OTZ program on the viral load of 53 AYP enrolled in the OTZ program between March 2019 to December 2019 was analyzed. The Percentage of viral load suppression before enrollment compared with 6 and 12 months after enrollment into the OTZ program. The AYP is grouped into 10 - 14, 15 - 19, and 20 - 24 years. Activities conducted were peer driven monthly meetings with the AYP during which the adolescents interacted on issues relating to improving their treatment outcomes, healthcare workers reviewed their clinical status, viral load result, provider peer counseling, and caregivers engagement to support adherence to medication and ARV refills. Results: Before OTZ, 81% aged 10 - 14 years, 75% aged 15 - 19 years, and 25% aged 20 - 24 years were virally suppressed (VL less than 1000 copies/ml). Six months after enrollment, 94% were virally suppressed95% aged 10 - 14 years, 96% aged 15 - 19 years, and 66% aged 20-24 years. Twelve months after enrollment, 96% of AYP were virally suppressed100% aged 10-14 years, 93% aged 15 - 19 years, and 100% aged 20 - 24 years. Males viral load (VL) suppression improved from 79% to 96% and 92%, while females VL suppression improved from 69% to 93% and 100% at 6 and 12 months respectively. Conclusion: The OTZ activities contributed to improved viral load suppression in the AYP of the facility.
文摘Anxiety is a significant mental health issue that substantially affects an individual’s quality of life. Feelings of uneasiness, irritability, and sleep disturbances characterize it. 4-Hydroxyphenyl acetic acid (4-HPAA) is identified in brain cells as a physiological byproduct of tyramine. This study hypothesizes that 4-HPAA may regulate anxiety due to its anxiolytic properties, acting as a modulator of the GABAergic system, which plays a crucial role in the pathophysiology of anxiety disorders. Our study aims to enhance the anxiolytic effects of 4-HPAA through chemical modification to improve its pharmacokinetic properties. Three derivatives, namely Isopropyl-4-hydroxy-[phenyl] acetate (IHPA), Isopropyl-4-hydroxy-[phenyl] acetate (MPAA), and 4-methoxyphenyl acetate (MPHA), have been synthesized from 4-HPAA. This assessment will use well-established animal models, specifically the Elevated Plus-Maze (EPM) and Zero Maze (EZM) tests, selected for their validity in replicating anxiety-like symptoms in animals. Chronic caffeine administration via drinking water (0.3 g/l for 14 days) was employed to induce an anxiety state for testing purposes. IHPA and MPAA demonstrated significant anxiolyticactivity when tested in the EPM and EZM experiments. Molecular docking simulations using AutoDock Vina indicated that 4-HPAA derivatives had docking scores ranging from −5.8 to −4.8 kcal/mol, compared to the standard anxiolytic medication Diazepam, which scored −7.1 kcal/mol. These scores suggest a potential for 4-HPAA derivatives to interact effectively with the Gamma-aminobutyric acid (GABA_A) receptor. In conclusion, our in vivo and in silico analyses indicate a promising anxiolytic potential for 4-HPAA derivatives.