Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties...Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.展开更多
In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical in...In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical interpretations,the small phase theorem,and the sectored real lemma;The synchronization of a multi-agent network using phase alignment.Towards the end,we also summarize a list of ongoing research on the phase theory and speculate what will happen in the next five years.展开更多
In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at ...In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.展开更多
Electrical and electronic waste(e-waste)is a growing challenge,matching the widespread boom in the use of information and communication technology.Opposite to an alarming increasing amount of e-waste,a low rate of con...Electrical and electronic waste(e-waste)is a growing challenge,matching the widespread boom in the use of information and communication technology.Opposite to an alarming increasing amount of e-waste,a low rate of consumer engagement in ensuring the proper disposal of such materials intensifies the pressure on the exist‐ing e-waste crisis.To deal with this thorny problem,it is of great interest to grasp consumers’disposal and re‐cycling behavioral intentions.Therefore,this study attempts to understand complementary perspectives around consumers’e-waste recycling intention based on the integration of the valence theory and the norm activation theory.Four data mining models using classification and prediction-based algorithms,namely Chi squared automatic interaction detector(CHAID),Neural network,Discriminant analysis,and Quick,unbiased,efficient statistical tree(QUEST),were employed to analyze a set of the 398 data collected in Vietnam.The re‐sults revealed that the social support value is by far the most critical predictor,followed by the utilitarian value,task difficulty,and monetary risk.It is also noteworthy that the awareness of consequences,education background,the ascription of responsibility,and age were also ranked as critical affecting factors.The lowest influential predictors found in this study were income and gender.In addition,a comparison was made in terms of the classification performance of the four utilized data mining techniques.Based on several evalua‐tion measurements(confusion matrix,accuracy,precision,recall,specificity,F-measure,ROC curve,and AUC),the aggregated results suggested that CHAID and Neural network performed the best.The findings of this research are expected to assist policymakers and future researchers in updating all information surround‐ing consumer behavioral intention-related topics focusing on e-waste.Furthermore,the adoption of data min‐ing algorithms for prediction is another insight of this study,which may shed the light on data mining applica‐tions in such environmental studies in the future.展开更多
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf...Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.展开更多
BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to e...BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to enhance the psychological well-being and overall quality of life for primipara,while also furnishing healthcare providers with efficacious interventions to tackle the psychological and physiological obstacles encountered during the stages of pregnancy and postpartum.AIM To explore the effect of timing theory combined with behavior change on selfefficacy,negative emotions and quality of life in patients with primipara.METHODS A total of 80 primipara cases were selected and admitted to our hospital between August 2020 and May 2022.These cases were divided into two groups,namely the observation group and the control group,with 40 cases in each group.The nursing interventions differed between the two groups,with the control group receiving routine nursing and the observation group receiving integrated nursing based on the timing theory and behavior change.The study aimed to compare the pre-and post-nursing scores of Chinese Perceived Stress Scale(CPSS),Edinburgh Postpartum Depression Scale(EPDS),Self-rating Anxiety Scale(SAS),breast milk knowledge,self-efficacy,and SF-36 quality of life in both groups.RESULTS After nursing,the CPSS,EPDS,and SAS scores of the two groups was significantly lower than that before nursing,and the CPSS,EPDS,and SAS scores of the observation group was significantly lower than that of the control group(P=0.002,P=0.011,and P=0.001 respectively).After nursing,the breastfeeding knowledge mastery,selfefficacy,and SF-36 quality of life scores was significantly higher than that before nursing,and the breastfeeding knowledge mastery(P=0.013),self-efficacy(P=0.008),and SF-36 quality of life(P=0.011)scores of the observation group was significantly higher than that of the control group.CONCLUSION The integration of timing theory and behavior change integrated theory has been found to be an effective approach in alleviating negative mood and stress experienced by primipara individuals,while also enhancing their selfefficacy and overall quality of life.This study focuses on the key concepts of timing theory,behavior change,primipara individuals,negative mood,and quality of life.展开更多
The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad...The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad measurements but lack finer resolution.Laboratory-based rock core measurements offer higher resolution but are resource-intensive.Conventionally,wireline logging and rock core measurements have been used independently.This study introduces a novel approach that integrates both data sources.The method leverages the detailed features from limited core data to enhance the resolution of wireline logging data.By combining machine learning with random field theory,the method allows for probabilistic predictions in regions with sparse data sampling.In this framework,12 parameters from wireline tests are used to predict trends in rock core data.The residuals are modeled using random field theory.The outcomes are high-resolution predictions that combine both the predicted trend and the probabilistic realizations of the residual.By utilizing unconditional and conditional random field theories,this method enables unconditional and conditional simulations of the underlying high-resolution rock compressional wave travel time profile and provides uncertainty estimates.This integrated approach optimizes the use of existing core and logging data.Its applicability is confirmed in an oil project in West China.展开更多
It is an important way to realize rural revitalization and sustainable development to guide rural settlement transition(RST)in an appropriate way.This paper uses actor network theory(ANT)to construct a theoretical fra...It is an important way to realize rural revitalization and sustainable development to guide rural settlement transition(RST)in an appropriate way.This paper uses actor network theory(ANT)to construct a theoretical framework for the study of RST.Taking two typical villages with different transition paths in rural areas of North China Plain as examples,this paper reveals the mechanism of RST and makes a comparative analysis.The results show that:1)after identifying problems and obligatory passage point,key actors recruit heterogeneous actors into the actor network by entrusting them with common interests,and realize RST under the system operation.2)Rural settlements under different transition paths have similarities in the problems to be solved,collective actions and policy factors,but there are differences in the transition process,mechanism and effect.The actor network and mechanism of RST through the path of new rural community construction are more complex and the transition effect is more thorough.In contrast,the degree of RST of retention development path is limited if there is no resource and location advantage.3)Based on the applicable conditions of different paths,this paper designs a logical framework of‘Situation-Structure-Behavior-Result’to scientifically guide the identification of RST paths under the background of rural revitalization.展开更多
In the 19th century, Cantor created the infinite cardinal number theory based on the “1-1 correspondence” principle. The continuum hypothesis is proposed under this theoretical framework. In 1900, Hilbert made it th...In the 19th century, Cantor created the infinite cardinal number theory based on the “1-1 correspondence” principle. The continuum hypothesis is proposed under this theoretical framework. In 1900, Hilbert made it the first problem in his famous speech on mathematical problems, which shows the importance of this question. We know that the infinitesimal problem triggered the second mathematical crisis in the 17-18th centuries. The Infinity problem is no less important than the infinitesimal problem. In the 21st century, Sergeyev introduced the Grossone method from the principle of “whole is greater than part”, and created another ruler for measuring infinite sets. The discussion in this paper shows that, compared with the cardinal number method, the Grossone method enables infinity calculation to achieve a leap from qualitative calculation to quantitative calculation. According to Grossone theory, there is neither the largest infinity and infinitesimal, nor the smallest infinity and infinitesimal. Hilbert’s first problem was caused by the immaturity of the infinity theory.展开更多
We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implemen...We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implementedthe charge self-consistent DFT+DMFT formalism by interfacing a full-potential all-electron DFT code with threehybridization expansion-based continuous-time quantum Monte Carlo impurity solvers.The benchmarks on several 3d,4fand 5f strongly correlated electron systems validated our formalism and implementation.Furthermore,within the LCANOframework,our formalism is general and the code architecture is extensible,so it can work as a bridge merging differentLCNAO DFT packages and impurity solvers to do charge self-consistent DFT+DMFT calculations.展开更多
This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the c...This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.展开更多
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea...The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.展开更多
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical ach...In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.展开更多
Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past...Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past three decades,significant progress in materials science,microfabrication,and various applications has boosted the development of promising functional microfluidic devices.In this review,the recent progress on novel microfluidic devices with various functions and applications is presented.First,the theory and numerical methods for studying the performance of microfluidic devices are briefly introduced.Then,materials and fabrication methods of functional microfluidic devices are summarized.Next,the recent significant advances in applications of microfluidic devices are highlighted,including heat sinks,clean water production,chemical reactions,sensors,biomedicine,capillaric circuits,wearable electronic devices,and microrobotics.Finally,perspectives on the challenges and future developments of functional microfluidic devices are presented.This review aims to inspire researchers from various fields engineering,materials,chemistry,mathematics,physics,and more—to collaborate and drive forward the development and applications of functional microfluidic devices,specifically for achieving carbon neutrality.展开更多
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t...The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.展开更多
In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.I...In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.In our research,we propose an optimization method to expedite density functional theory(DFT)calculations for systems with large aspect ratios,such as metallic nanorods,nanowires,or scanning tunneling microscope tips.This method focuses on employing basis set to expand the electron density,Coulomb potential,and exchange-correlation potential.By precomputing integrals and caching redundant results,this expansion streamlines the integration process,significantly accelerating DFT computations.As a case study,we have applied this optimization to metallic nanorod systems of various radii and lengths,obtaining corresponding ground-state electron densities and potentials.展开更多
Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Mean...Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Meanwhile,existing disease control methods often assume users’full compliance with measures like mandatory isolation,which does not align with the actual situation.To address these issues,this paper proposes a prospect theorybased framework to model users’decision-making process in epidemics and analyzes how irrationality affects individuals’behaviors and epidemic dynamics.According to the analysis results,irrationality tends to prompt conservative behaviors when the infection risk is low but encourages risk-seeking behaviors when the risk is high.Then,this paper proposes a behavior inducement algorithm to guide individuals’behaviors and control the spread of disease.Simulations and real user tests validate our analysis,and simulation results show that the proposed behavior inducement algorithm can effectively guide individuals’behavior.展开更多
Understanding the adsorption interactions between carbon materials and sulfur compounds has far-reaching impacts,in addition to their well-known important role in energy storage and conversion,such as lithium-ion batt...Understanding the adsorption interactions between carbon materials and sulfur compounds has far-reaching impacts,in addition to their well-known important role in energy storage and conversion,such as lithium-ion batteries.In this paper,properties of intrinsic B or Si single-atom doped,and B-Si codoped graphene(GR)and graphdiyne(GDY)were investigated by using density functional theory-based calculations,in which the optimal doping configurations were explored for potential applications in adsorbing sulfur compounds.Results showed that both B or Si single-atom doping and B-Si codoping could substantially enhance the electron transport properties of GR and GDY,improving their surface activity.Notably,B and Si atoms displayed synergistic effects for the codoped configurations,where B-Si codoped GR/GDY exhibited much better performance in the adsorption of sulfurcontaining chemicals than single-atom doped systems.In addition,results demonstrated that,after B-Si codoping,the adsorption energy and charge transfer amounts of GDY with sulfur compounds were much larger than those of GR,indicating that B-Si codoped GDY might be a favorable material for more effectively interacting with sulfur reagents.展开更多
Combining the mean field Pozhar-Gubbins(PG)theory and the weighted density approximation,a novel method for local thermal conductivity of inhomogeneous fluids is proposed.The correlation effect that is beyond the mean...Combining the mean field Pozhar-Gubbins(PG)theory and the weighted density approximation,a novel method for local thermal conductivity of inhomogeneous fluids is proposed.The correlation effect that is beyond the mean field treatment is taken into account by the simulation-based empirical correlations.The application of this method to confined argon in slit pore shows that its prediction agrees well with the simulation results,and that it performs better than the original PG theory as well as the local averaged density model(LADM).In its further application to the nano-fluidic films,the influences of fluid parameters and pore parameters on the thermal conductivity are calculated and investigated.It is found that both the local thermal conductivity and the overall thermal conductivity can be significantly modulated by these parameters.Specifically,in the supercritical states,the thermal conductivity of the confined fluid shows positive correlation to the bulk density as well as the temperature.However,when the bulk density is small,the thermal conductivity exhibits a decrease-increase transition as the temperature is increased.This is also the case in which the temperature is low.In fact,the decrease-increase transition in both the small-bulk-density and low-temperature cases arises from the capillary condensation in the pore.Furthermore,smaller pore width and/or stronger adsorption potential can raise the critical temperature for condensation,and then are beneficial to the enhancement of the thermal conductivity.These modulation behaviors of the local thermal conductivity lead immediately to the significant difference of the overall thermal conductivity in different phase regions.展开更多
文摘Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.
基金supported in part by the National Natural Science Foundation of China(62073003,72131001)Hong Hong Research Grants Council under GRF grants(16200619,16201120,16205421,1620-3922)Shenzhen-Hong Kong-Macao Science and Technology Innovation Fund(SGDX20201103094600006)。
文摘In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical interpretations,the small phase theorem,and the sectored real lemma;The synchronization of a multi-agent network using phase alignment.Towards the end,we also summarize a list of ongoing research on the phase theory and speculate what will happen in the next five years.
基金supported by the National Natural Science Foundation of China under Grant Nos.12122401 and 12074007.
文摘In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.
文摘Electrical and electronic waste(e-waste)is a growing challenge,matching the widespread boom in the use of information and communication technology.Opposite to an alarming increasing amount of e-waste,a low rate of consumer engagement in ensuring the proper disposal of such materials intensifies the pressure on the exist‐ing e-waste crisis.To deal with this thorny problem,it is of great interest to grasp consumers’disposal and re‐cycling behavioral intentions.Therefore,this study attempts to understand complementary perspectives around consumers’e-waste recycling intention based on the integration of the valence theory and the norm activation theory.Four data mining models using classification and prediction-based algorithms,namely Chi squared automatic interaction detector(CHAID),Neural network,Discriminant analysis,and Quick,unbiased,efficient statistical tree(QUEST),were employed to analyze a set of the 398 data collected in Vietnam.The re‐sults revealed that the social support value is by far the most critical predictor,followed by the utilitarian value,task difficulty,and monetary risk.It is also noteworthy that the awareness of consequences,education background,the ascription of responsibility,and age were also ranked as critical affecting factors.The lowest influential predictors found in this study were income and gender.In addition,a comparison was made in terms of the classification performance of the four utilized data mining techniques.Based on several evalua‐tion measurements(confusion matrix,accuracy,precision,recall,specificity,F-measure,ROC curve,and AUC),the aggregated results suggested that CHAID and Neural network performed the best.The findings of this research are expected to assist policymakers and future researchers in updating all information surround‐ing consumer behavioral intention-related topics focusing on e-waste.Furthermore,the adoption of data min‐ing algorithms for prediction is another insight of this study,which may shed the light on data mining applica‐tions in such environmental studies in the future.
基金supported by the National Natural Science Foundation of China(Nos.51977113,62293500,62293501 and 62293505).
文摘Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.
文摘BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to enhance the psychological well-being and overall quality of life for primipara,while also furnishing healthcare providers with efficacious interventions to tackle the psychological and physiological obstacles encountered during the stages of pregnancy and postpartum.AIM To explore the effect of timing theory combined with behavior change on selfefficacy,negative emotions and quality of life in patients with primipara.METHODS A total of 80 primipara cases were selected and admitted to our hospital between August 2020 and May 2022.These cases were divided into two groups,namely the observation group and the control group,with 40 cases in each group.The nursing interventions differed between the two groups,with the control group receiving routine nursing and the observation group receiving integrated nursing based on the timing theory and behavior change.The study aimed to compare the pre-and post-nursing scores of Chinese Perceived Stress Scale(CPSS),Edinburgh Postpartum Depression Scale(EPDS),Self-rating Anxiety Scale(SAS),breast milk knowledge,self-efficacy,and SF-36 quality of life in both groups.RESULTS After nursing,the CPSS,EPDS,and SAS scores of the two groups was significantly lower than that before nursing,and the CPSS,EPDS,and SAS scores of the observation group was significantly lower than that of the control group(P=0.002,P=0.011,and P=0.001 respectively).After nursing,the breastfeeding knowledge mastery,selfefficacy,and SF-36 quality of life scores was significantly higher than that before nursing,and the breastfeeding knowledge mastery(P=0.013),self-efficacy(P=0.008),and SF-36 quality of life(P=0.011)scores of the observation group was significantly higher than that of the control group.CONCLUSION The integration of timing theory and behavior change integrated theory has been found to be an effective approach in alleviating negative mood and stress experienced by primipara individuals,while also enhancing their selfefficacy and overall quality of life.This study focuses on the key concepts of timing theory,behavior change,primipara individuals,negative mood,and quality of life.
基金the Australian Government through the Australian Research Council's Discovery Projects funding scheme(Project DP190101592)the National Natural Science Foundation of China(Grant Nos.41972280 and 52179103).
文摘The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad measurements but lack finer resolution.Laboratory-based rock core measurements offer higher resolution but are resource-intensive.Conventionally,wireline logging and rock core measurements have been used independently.This study introduces a novel approach that integrates both data sources.The method leverages the detailed features from limited core data to enhance the resolution of wireline logging data.By combining machine learning with random field theory,the method allows for probabilistic predictions in regions with sparse data sampling.In this framework,12 parameters from wireline tests are used to predict trends in rock core data.The residuals are modeled using random field theory.The outcomes are high-resolution predictions that combine both the predicted trend and the probabilistic realizations of the residual.By utilizing unconditional and conditional random field theories,this method enables unconditional and conditional simulations of the underlying high-resolution rock compressional wave travel time profile and provides uncertainty estimates.This integrated approach optimizes the use of existing core and logging data.Its applicability is confirmed in an oil project in West China.
基金Under the auspices of the Taishan Scholars Project Special FundsNational Natural Science Fundation of China(No.42077434,42001199)Youth Innovation Technology Project of Higher School in Shandong Province(No.2019RWG016)。
文摘It is an important way to realize rural revitalization and sustainable development to guide rural settlement transition(RST)in an appropriate way.This paper uses actor network theory(ANT)to construct a theoretical framework for the study of RST.Taking two typical villages with different transition paths in rural areas of North China Plain as examples,this paper reveals the mechanism of RST and makes a comparative analysis.The results show that:1)after identifying problems and obligatory passage point,key actors recruit heterogeneous actors into the actor network by entrusting them with common interests,and realize RST under the system operation.2)Rural settlements under different transition paths have similarities in the problems to be solved,collective actions and policy factors,but there are differences in the transition process,mechanism and effect.The actor network and mechanism of RST through the path of new rural community construction are more complex and the transition effect is more thorough.In contrast,the degree of RST of retention development path is limited if there is no resource and location advantage.3)Based on the applicable conditions of different paths,this paper designs a logical framework of‘Situation-Structure-Behavior-Result’to scientifically guide the identification of RST paths under the background of rural revitalization.
文摘In the 19th century, Cantor created the infinite cardinal number theory based on the “1-1 correspondence” principle. The continuum hypothesis is proposed under this theoretical framework. In 1900, Hilbert made it the first problem in his famous speech on mathematical problems, which shows the importance of this question. We know that the infinitesimal problem triggered the second mathematical crisis in the 17-18th centuries. The Infinity problem is no less important than the infinitesimal problem. In the 21st century, Sergeyev introduced the Grossone method from the principle of “whole is greater than part”, and created another ruler for measuring infinite sets. The discussion in this paper shows that, compared with the cardinal number method, the Grossone method enables infinity calculation to achieve a leap from qualitative calculation to quantitative calculation. According to Grossone theory, there is neither the largest infinity and infinitesimal, nor the smallest infinity and infinitesimal. Hilbert’s first problem was caused by the immaturity of the infinity theory.
文摘We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implementedthe charge self-consistent DFT+DMFT formalism by interfacing a full-potential all-electron DFT code with threehybridization expansion-based continuous-time quantum Monte Carlo impurity solvers.The benchmarks on several 3d,4fand 5f strongly correlated electron systems validated our formalism and implementation.Furthermore,within the LCANOframework,our formalism is general and the code architecture is extensible,so it can work as a bridge merging differentLCNAO DFT packages and impurity solvers to do charge self-consistent DFT+DMFT calculations.
文摘This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.
文摘The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFB1804604).
文摘In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.
基金supported by the National Natural Science Foundation of China(52006056)the Key-Area Research and Development Program of Guangdong Province(2020B090923003)The project was also partly supported by Natural Research Institute for Family Planning as well。
文摘Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past three decades,significant progress in materials science,microfabrication,and various applications has boosted the development of promising functional microfluidic devices.In this review,the recent progress on novel microfluidic devices with various functions and applications is presented.First,the theory and numerical methods for studying the performance of microfluidic devices are briefly introduced.Then,materials and fabrication methods of functional microfluidic devices are summarized.Next,the recent significant advances in applications of microfluidic devices are highlighted,including heat sinks,clean water production,chemical reactions,sensors,biomedicine,capillaric circuits,wearable electronic devices,and microrobotics.Finally,perspectives on the challenges and future developments of functional microfluidic devices are presented.This review aims to inspire researchers from various fields engineering,materials,chemistry,mathematics,physics,and more—to collaborate and drive forward the development and applications of functional microfluidic devices,specifically for achieving carbon neutrality.
基金funded by the“Ling Yan”Research and Development Project of Science Technology Department of Zhejiang Province of China under Grants No.2022C03122Public Welfare Technology Application and Research Projects of Science Technology Department of Zhejiang Province of China under Grants No.LGF22F020006 and LGF21F010004.
文摘The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFA0211303)the National Natural Science Foundation of China(Grant No.91850207)the numerical calculations in this paper have been done on the supercomputing system in the Supercomputing Center of Wuhan University.
文摘In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.In our research,we propose an optimization method to expedite density functional theory(DFT)calculations for systems with large aspect ratios,such as metallic nanorods,nanowires,or scanning tunneling microscope tips.This method focuses on employing basis set to expand the electron density,Coulomb potential,and exchange-correlation potential.By precomputing integrals and caching redundant results,this expansion streamlines the integration process,significantly accelerating DFT computations.As a case study,we have applied this optimization to metallic nanorod systems of various radii and lengths,obtaining corresponding ground-state electron densities and potentials.
文摘Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Meanwhile,existing disease control methods often assume users’full compliance with measures like mandatory isolation,which does not align with the actual situation.To address these issues,this paper proposes a prospect theorybased framework to model users’decision-making process in epidemics and analyzes how irrationality affects individuals’behaviors and epidemic dynamics.According to the analysis results,irrationality tends to prompt conservative behaviors when the infection risk is low but encourages risk-seeking behaviors when the risk is high.Then,this paper proposes a behavior inducement algorithm to guide individuals’behaviors and control the spread of disease.Simulations and real user tests validate our analysis,and simulation results show that the proposed behavior inducement algorithm can effectively guide individuals’behavior.
基金the support of the National Natural Science Foundation of China(Grant No.51472074).
文摘Understanding the adsorption interactions between carbon materials and sulfur compounds has far-reaching impacts,in addition to their well-known important role in energy storage and conversion,such as lithium-ion batteries.In this paper,properties of intrinsic B or Si single-atom doped,and B-Si codoped graphene(GR)and graphdiyne(GDY)were investigated by using density functional theory-based calculations,in which the optimal doping configurations were explored for potential applications in adsorbing sulfur compounds.Results showed that both B or Si single-atom doping and B-Si codoping could substantially enhance the electron transport properties of GR and GDY,improving their surface activity.Notably,B and Si atoms displayed synergistic effects for the codoped configurations,where B-Si codoped GR/GDY exhibited much better performance in the adsorption of sulfurcontaining chemicals than single-atom doped systems.In addition,results demonstrated that,after B-Si codoping,the adsorption energy and charge transfer amounts of GDY with sulfur compounds were much larger than those of GR,indicating that B-Si codoped GDY might be a favorable material for more effectively interacting with sulfur reagents.
基金Project supported by the Fundamental Research Fund for the Central Universities of Chinathe Research Project for Independently Cultivate Talents of Hebei Agricultural University (Grant No.ZY2023007)。
文摘Combining the mean field Pozhar-Gubbins(PG)theory and the weighted density approximation,a novel method for local thermal conductivity of inhomogeneous fluids is proposed.The correlation effect that is beyond the mean field treatment is taken into account by the simulation-based empirical correlations.The application of this method to confined argon in slit pore shows that its prediction agrees well with the simulation results,and that it performs better than the original PG theory as well as the local averaged density model(LADM).In its further application to the nano-fluidic films,the influences of fluid parameters and pore parameters on the thermal conductivity are calculated and investigated.It is found that both the local thermal conductivity and the overall thermal conductivity can be significantly modulated by these parameters.Specifically,in the supercritical states,the thermal conductivity of the confined fluid shows positive correlation to the bulk density as well as the temperature.However,when the bulk density is small,the thermal conductivity exhibits a decrease-increase transition as the temperature is increased.This is also the case in which the temperature is low.In fact,the decrease-increase transition in both the small-bulk-density and low-temperature cases arises from the capillary condensation in the pore.Furthermore,smaller pore width and/or stronger adsorption potential can raise the critical temperature for condensation,and then are beneficial to the enhancement of the thermal conductivity.These modulation behaviors of the local thermal conductivity lead immediately to the significant difference of the overall thermal conductivity in different phase regions.