This study aimed to develop An Interactive On-the-Job Training Monitoring and Help Desk System with SMS for the College of Information and Communication Technology Nueva Ecija University of Science and Technology. The...This study aimed to develop An Interactive On-the-Job Training Monitoring and Help Desk System with SMS for the College of Information and Communication Technology Nueva Ecija University of Science and Technology. The system made the OJT course procedure trouble-free by emerging a system accessible through the internet. Students have a user account, which gives them the aptitude to upload document files of their reports, thereby minimizing the time and energy spent traveling from the company’s location to the university and the other way around. Similarly, the OJT coordinators of the college are given their accounts to access and check the reports submitted by the students. The system is capable of generating reports and requirements in real-time, as long as all data is stored within the database and, therefore, the process is completed online. In addition, the system provides an interactive website that might help both students and coordinators to communicate instantaneously by having an online help desk where the students can ask related questions on their OJT course that the OJT coordinator and other students will answer. The coordinators can send a brief message service to the students enrolled within the OJT course through the utilization of the proposed system - this can be for the students who aren’t capable of opening their account more often, in order that they are still informed of the announcements they need to understand immediately. The interactive OJT help desk system with SMS can be used as a tool to help the students of the College of Information and Communication Technology (CICT) and the OJT coordinators in their tasks more conveniently.展开更多
As conventional communication systems based on classic information theory have closely approached Shannon capacity,semantic communication is emerging as a key enabling technology for the further improvement of communi...As conventional communication systems based on classic information theory have closely approached Shannon capacity,semantic communication is emerging as a key enabling technology for the further improvement of communication performance.However,it is still unsettled on how to represent semantic information and characterise the theoretical limits of semantic-oriented compression and transmission.In this paper,we consider a semantic source which is characterised by a set of correlated random variables whose joint probabilistic distribution can be described by a Bayesian network.We give the information-theoretic limit on the lossless compression of the semantic source and introduce a low complexity encoding method by exploiting the conditional independence.We further characterise the limits on lossy compression of the semantic source and the upper and lower bounds of the rate-distortion function.We also investigate the lossy compression of the semantic source with two-sided information at the encoder and decoder,and obtain the corresponding rate distortion function.We prove that the optimal code of the semantic source is the combination of the optimal codes of each conditional independent set given the side information.展开更多
In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise p...In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise parameter information,particularly in low signal-to-noise ratio(SNR)situations.In this paper,an approach to intelligent recognition and complex jamming parameter estimate based on joint time-frequency distribution features is proposed to address this challenging issue.Firstly,a joint algorithm based on YOLOv5 convolutional neural networks(CNNs)is proposed,which is used to achieve the jamming signal classification and preliminary parameter estimation.Furthermore,an accurate jamming key parameters estimation algorithm is constructed by comprehensively utilizing chi-square statistical test,feature region search,position regression,spectrum interpolation,etc.,which realizes the accurate estimation of jamming carrier frequency,relative delay,Doppler frequency shift,and other parameters.Finally,the approach has improved performance for complex jamming recognition and parameter estimation under low SNR,and the recognition rate can reach 98%under−15 dB SNR,according to simulation and real data verification results.展开更多
An individual’s self-image is a multi-dimensional and multi-structural concept.Its internal dimensions include ability,knowledge,values,personality,and temperament,and its external dimensions are physical appearance,...An individual’s self-image is a multi-dimensional and multi-structural concept.Its internal dimensions include ability,knowledge,values,personality,and temperament,and its external dimensions are physical appearance,behavior,and clothing.A good image will have a positive impact both in life and at work.We will choose appropriate clothing and makeup to modify the external image and cultivate positive qualities such as correct values and an optimistic attitude towards life to enhance internal dimensions.Among them,“personality”and“ability”mostly belong to the research category of mental health education,and“values”fit in the research field of ideological and political education.Ideological and political education and mental health education are both important components of higher education,which show similarities between them.Ideological and political education and mental health education can complement each other in many ways to enhance students’self-image.展开更多
Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The p...Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The proposed method is capable of producing top-notch data sets to address the issues of insufficient samples and substandard quality.展开更多
In order to improve the comprehensive defense capability of data security in digital twins(DTs),an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and...In order to improve the comprehensive defense capability of data security in digital twins(DTs),an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and transmission mechanism at present.Firstly,based on the advanced encryption standard(AES)encryption,we use the keystore to expand the traditional key,and use the digital pointer to avoid the key transmission in a wireless channel.Secondly,the identity authentication technology is adopted to ensure the data integrity,and an automatic retransmission mechanism is added for the endogenous properties of the wireless channel.Finally,the software defined radio(SDR)platform composed of universal software radio peripheral(USRP)and GNU radio is used to simulate the data interaction between the physical entity and the virtual entity.The numerical results show that the DTs architecture can guarantee the encrypted data transmitted completely and decrypted accurately with high efficiency and reliability,thus providing a basis for intelligent and secure information interaction for DTs in the future.展开更多
We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables&...We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables'complementarity and the complementarity of uncertainty whilst the upper bound includes the complementarity of the observables,quantum discord,and quantum condition entropy.In quantum measurement processing,there exists a relationship between the complementarity of uncertainty and the complementarity of information.In addition,based on the information exclusion principle the complementarity of uncertainty and the shareability of quantum discord can exist as an essential factor to enhance the bounds of each other in the presence of quantum memory.展开更多
THE tremendous impact of large models represented by ChatGPT[1]-[3]makes it necessary to con-sider the practical applications of such models[4].However,for an artificial intelligence(AI)to truly evolve,it needs to pos...THE tremendous impact of large models represented by ChatGPT[1]-[3]makes it necessary to con-sider the practical applications of such models[4].However,for an artificial intelligence(AI)to truly evolve,it needs to possess a physical“body”to transition from the virtual world to the real world and evolve through interaction with the real environments.In this context,“embodied intelligence”has sparked a new wave of research and technology,leading AI beyond the digital realm into a new paradigm that can actively act and perceive in a physical environment through tangible entities such as robots and automated devices[5].展开更多
For bistatic multiple-input multiple-output(MIMO)radar,this paper presents a robust and direction finding method in strong impulse noise environment.By means of a new lower order covariance,the method is effective in ...For bistatic multiple-input multiple-output(MIMO)radar,this paper presents a robust and direction finding method in strong impulse noise environment.By means of a new lower order covariance,the method is effective in suppressing impulse noise and achieving superior direction finding performance using the maximum likelihood(ML)estimation method.A quantum equilibrium optimizer algorithm(QEOA)is devised to resolve the corresponding objective function for efficient and accurate direc-tion finding.The results of simulation reveal the capability of the presented method in success rate and root mean square error over existing direction-finding methods in different application situations,e.g.,locating coherent signal sources with very few snapshots in strong impulse noise.Other than that,the Cramér-Rao bound(CRB)under impulse noise environment has been drawn to test the capability of the presented method.展开更多
In this paper,a class of time-varying output group formation containment control problem of general linear hetero-geneous multiagent systems(MASs)is investigated under directed topology.The MAS is composed of a number...In this paper,a class of time-varying output group formation containment control problem of general linear hetero-geneous multiagent systems(MASs)is investigated under directed topology.The MAS is composed of a number of tracking leaders,formation leaders and followers,where two different types of leaders are used to provide reference trajectories for movement and to achieve certain formations,respectively.Firstly,compen-sators are designed whose states are estimations of tracking lead-ers,based on which,a controller is developed for each formation leader to accomplish the expected formation.Secondly,two event-triggered compensators are proposed for each follower to evalu-ate the state and formation information of the formation leaders in the same group,respectively.Subsequently,a control protocol is designed for each follower,utilizing the output information,to guide the output towards the convex hull generated by the forma-tion leaders within the group.Next,the triggering sequence in this paper is decomposed into two sequences,and the inter-event intervals of these two triggering conditions are provided to rule out the Zeno behavior.Finally,a numerical simulation is intro-duced to confirm the validity of the proposed results.展开更多
The full-potential linearized augmented plane wave plus local orbital method is utilized for exploring the electronic,magnetic,and magneto-optical properties of the NiX_(2)(X=Cl,Br,and I)single layer.The first-princip...The full-potential linearized augmented plane wave plus local orbital method is utilized for exploring the electronic,magnetic,and magneto-optical properties of the NiX_(2)(X=Cl,Br,and I)single layer.The first-principles calculation demonstrates that these compounds are ferromagnetic indirect semiconductors,and the energy band gaps of NiX_(2)for X=Cl,Br,and I are 3.888,3.134,and 2.157 eV,respectively.The magnetic moments of Ni atoms in NiX_(2)monolayer are 1.656,1.588,1.449μB,and their magneto-crystalline anisotropy energies are 0.167,0.029,0.090 meV,respectively.Based on the macro-linear response theory,we systematically studied the influences of the external magnetic field and out-of-plane strain on the magneto-optical Kerr effect(MOKE)spectrum of the NiX_(2)single layer.It is found that,when the external magnetic field is perpendicular to the sample plane,the value of the Kerr rotation angle reaches the maximum,and the single-layer NiI_(2)material has a Kerr rotation angle of 1.89°at the photon energy of 1.986 eV.Besides,the Kerr rotation spectrum of NiCl_(2)and NiBr_(2)monolayers redshift as the out-of-plane strain increases,while NiI_(2)monolayer blueshifts.Accurate computation of the MOKE spectrum of NiX_(2)materials provides an opportunity for applications of 2D magnetic material ranging from sensing to data storing.展开更多
Asparagus stem blight,also known as“asparagus cancer”,is a serious plant disease with a regional distribution.The widespread occurrence of the disease has had a negative impact on the yield and quality of asparagus ...Asparagus stem blight,also known as“asparagus cancer”,is a serious plant disease with a regional distribution.The widespread occurrence of the disease has had a negative impact on the yield and quality of asparagus and has become one of the main problems threatening asparagus production.To improve the ability to accurately identify and localize phenotypic lesions of stem blight in asparagus and to enhance the accuracy of the test,a YOLOv8-CBAM detection algorithm for asparagus stem blight based on YOLOv8 was proposed.The algorithm aims to achieve rapid detection of phenotypic images of asparagus stem blight and to provide effective assistance in the control of asparagus stem blight.To enhance the model’s capacity to capture subtle lesion features,the Convolutional Block AttentionModule(CBAM)is added after C2f in the head.Simultaneously,the original CIoU loss function in YOLOv8 was replaced with the Focal-EIoU loss function,ensuring that the updated loss function emphasizes higher-quality bounding boxes.The YOLOv8-CBAM algorithm can effectively detect asparagus stem blight phenotypic images with a mean average precision(mAP)of 95.51%,which is 0.22%,14.99%,1.77%,and 5.71%higher than the YOLOv5,YOLOv7,YOLOv8,and Mask R-CNN models,respectively.This greatly enhances the efficiency of asparagus growers in identifying asparagus stem blight,aids in improving the prevention and control of asparagus stem blight,and is crucial for the application of computer vision in agriculture.展开更多
Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation indust...Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process.展开更多
The chimera states underlying many realistic dynamical processes have attracted ample attention in the area of dynamical systems.Here, we generalize the Kuramoto model with nonlocal coupling incorporating higher-order...The chimera states underlying many realistic dynamical processes have attracted ample attention in the area of dynamical systems.Here, we generalize the Kuramoto model with nonlocal coupling incorporating higher-order interactions encoded with simplicial complexes.Previous works have shown that higher-order interactions promote coherent states.However, we uncover the fact that the introduced higher-order couplings can significantly enhance the emergence of the incoherent state.Remarkably, we identify that the chimera states arise as a result of multi-attractors in dynamic states.Importantly, we review that the increasing higher-order interactions can significantly shape the emergent probability of chimera states.All the observed results can be well described in terms of the dimension reduction method.This study is a step forward in highlighting the importance of nonlocal higher-order couplings, which might provide control strategies for the occurrence of spatial-temporal patterns in networked systems.展开更多
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM ope...Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital algorithm.Then, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. Computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.展开更多
Let B^(H) be a fractional Brownian motion with Hurst index 1/2≤H<1.In this paper,we consider the equation(called the Ornstein-Uhlenbeck process with a linear self-repelling drift)dX_(t)^(H)=dB_(t)^(H)+σ X_(t)^(H)...Let B^(H) be a fractional Brownian motion with Hurst index 1/2≤H<1.In this paper,we consider the equation(called the Ornstein-Uhlenbeck process with a linear self-repelling drift)dX_(t)^(H)=dB_(t)^(H)+σ X_(t)^(H)dt+vdt-θ(∫_(0)^(t)(X_(t)^(H)-X_(s)^(H))ds)dt,whereθ<0,σ,v∈ℝ.The process is an analogue of self-attracting diffusion(Cranston,Le Jan.Math Ann,1995,303:87–93).Our main aim is to study the large time behaviors of the process.We show that the solution X^(H)diverges to infinity as t tends to infinity,and obtain the speed at which the process X^(H)diverges to infinity.展开更多
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens...This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems.展开更多
Fusarium head blight (FHB) is one of the most destructive diseases in global wheat production. In order to count the FHB-infected wheat ears under field conditions, this study proposed an algorithm for diseased wheat ...Fusarium head blight (FHB) is one of the most destructive diseases in global wheat production. In order to count the FHB-infected wheat ears under field conditions, this study proposed an algorithm for diseased wheat ear detection based on improved YOLOv5s (Tr-YOLOv5s). The Swin Transformer was used to replace the CSPDarknet backbone network to enhance the extraction of characteristic information of the population wheat ears of FHB in the field background. The convolutional block attention module (CBAM) attention mechanism was added to improve the detection effect of target wheat ears, subsequently improving the overall accuracy of the model. The original loss function complete intersection over union (CIoU) was replaced by Scylla intersection over union (SIoU) loss to accelerate the model convergence and decrease the loss value. The results showed that the mean average precision (mAP) of the Tr-YOLOv5s model reached 90.64%, making a 4.63% improvement compared to the original YOLOv5s model. The improved model could quickly detect and count wheat FHB ear in the field environment, which laid a foundation for the subsequent automatic disease identification and grading of wheat FHB under field conditions.展开更多
The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an eff...The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’privacy by anonymizing big data.However,the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability.In addition,ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced.Based on this,we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data,while guaranteeing improved data usability.Specifically,we construct a new information loss function based on the information quantity theory.Considering that different quasi-identification attributes have different impacts on sensitive attributes,we set weights for each quasi-identification attribute when designing the information loss function.In addition,to reduce information loss,we improve K-anonymity in two ways.First,we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms,i.e.,greedy algorithm and 2-means clustering algorithm.In addition,we improve the 2-means clustering algorithm by designing a mean-center method to select the initial center of mass.Meanwhile,we design the K-anonymity algorithm of this scheme based on the constructed information loss function,the improved 2-means clustering algorithm,and the greedy algorithm,which reduces the information loss.Finally,we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss.展开更多
As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most q...As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most quantum image filterings are based on classical domains and grayscale images,and there are relatively fewer studies on anti-aliasing in the quantum domain.This paper proposes a scheme for anti-aliasing filtering based on quantum grayscale and color image scaling in the spatial domain.It achieves the effect of anti-aliasing filtering on quantum images during the scaling process.First,we use the novel enhanced quantum representation(NEQR)and the improved quantum representation of color images(INCQI)to represent classical images.Since aliasing phenomena are more pronounced when images are scaled down,this paper focuses only on the anti-aliasing effects in the case of reduction.Subsequently,we perform anti-aliasing filtering on the quantum representation of the original image and then use bilinear interpolation to scale down the image,achieving the anti-aliasing effect.The constructed pyramid model is then used to select an appropriate image for upscaling to the original image size.Finally,the complexity of the circuit is analyzed.Compared to the images experiencing aliasing effects solely due to scaling,applying anti-aliasing filtering to the images results in smoother and clearer outputs.Additionally,the anti-aliasing filtering allows for manual intervention to select the desired level of image smoothness.展开更多
文摘This study aimed to develop An Interactive On-the-Job Training Monitoring and Help Desk System with SMS for the College of Information and Communication Technology Nueva Ecija University of Science and Technology. The system made the OJT course procedure trouble-free by emerging a system accessible through the internet. Students have a user account, which gives them the aptitude to upload document files of their reports, thereby minimizing the time and energy spent traveling from the company’s location to the university and the other way around. Similarly, the OJT coordinators of the college are given their accounts to access and check the reports submitted by the students. The system is capable of generating reports and requirements in real-time, as long as all data is stored within the database and, therefore, the process is completed online. In addition, the system provides an interactive website that might help both students and coordinators to communicate instantaneously by having an online help desk where the students can ask related questions on their OJT course that the OJT coordinator and other students will answer. The coordinators can send a brief message service to the students enrolled within the OJT course through the utilization of the proposed system - this can be for the students who aren’t capable of opening their account more often, in order that they are still informed of the announcements they need to understand immediately. The interactive OJT help desk system with SMS can be used as a tool to help the students of the College of Information and Communication Technology (CICT) and the OJT coordinators in their tasks more conveniently.
基金partly supported by NSFC under grant No.62293481,No.62201505partly by the SUTDZJU IDEA Grant(SUTD-ZJU(VP)202102)。
文摘As conventional communication systems based on classic information theory have closely approached Shannon capacity,semantic communication is emerging as a key enabling technology for the further improvement of communication performance.However,it is still unsettled on how to represent semantic information and characterise the theoretical limits of semantic-oriented compression and transmission.In this paper,we consider a semantic source which is characterised by a set of correlated random variables whose joint probabilistic distribution can be described by a Bayesian network.We give the information-theoretic limit on the lossless compression of the semantic source and introduce a low complexity encoding method by exploiting the conditional independence.We further characterise the limits on lossy compression of the semantic source and the upper and lower bounds of the rate-distortion function.We also investigate the lossy compression of the semantic source with two-sided information at the encoder and decoder,and obtain the corresponding rate distortion function.We prove that the optimal code of the semantic source is the combination of the optimal codes of each conditional independent set given the side information.
基金supported by Shandong Provincial Natural Science Foundation(ZR2020MF015)Aerospace Technology Group Stability Support Project(ZY0110020009).
文摘In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise parameter information,particularly in low signal-to-noise ratio(SNR)situations.In this paper,an approach to intelligent recognition and complex jamming parameter estimate based on joint time-frequency distribution features is proposed to address this challenging issue.Firstly,a joint algorithm based on YOLOv5 convolutional neural networks(CNNs)is proposed,which is used to achieve the jamming signal classification and preliminary parameter estimation.Furthermore,an accurate jamming key parameters estimation algorithm is constructed by comprehensively utilizing chi-square statistical test,feature region search,position regression,spectrum interpolation,etc.,which realizes the accurate estimation of jamming carrier frequency,relative delay,Doppler frequency shift,and other parameters.Finally,the approach has improved performance for complex jamming recognition and parameter estimation under low SNR,and the recognition rate can reach 98%under−15 dB SNR,according to simulation and real data verification results.
基金Sichuan Provincial Key Research Base for Philosophy and Social Sciences,Mental Health Education Research Project“Research on Self-Image Cognition Improvement Strategies of Higher Vocational Students Under the Background of Ideological and Political Education in Colleges and Universities”(XLJKJY202114C)。
文摘An individual’s self-image is a multi-dimensional and multi-structural concept.Its internal dimensions include ability,knowledge,values,personality,and temperament,and its external dimensions are physical appearance,behavior,and clothing.A good image will have a positive impact both in life and at work.We will choose appropriate clothing and makeup to modify the external image and cultivate positive qualities such as correct values and an optimistic attitude towards life to enhance internal dimensions.Among them,“personality”and“ability”mostly belong to the research category of mental health education,and“values”fit in the research field of ideological and political education.Ideological and political education and mental health education are both important components of higher education,which show similarities between them.Ideological and political education and mental health education can complement each other in many ways to enhance students’self-image.
基金supported by the National Natural Science Foundation of China(21978013)the Fundamental Research Funds for the Central in China(XK1802-4)。
文摘Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The proposed method is capable of producing top-notch data sets to address the issues of insufficient samples and substandard quality.
基金supported in part by the Intergovernmental International Cooperation in Science and Technology Innovation Program under Grants 2019YFE0111600in part by National Natural Science Foundation of China under Grants 62122069,62072490,62201507,and 62071431+2 种基金in part by Science and Technology Development Fund of Macao SAR under Grants 0060/2019/A1 and 0162/2019/A3in part by FDCT-MOST Joint Project under Grant 0066/2019/AMJin part by Research Grant of University of Macao under Grant MYRG2020-00107IOTSC。
文摘In order to improve the comprehensive defense capability of data security in digital twins(DTs),an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and transmission mechanism at present.Firstly,based on the advanced encryption standard(AES)encryption,we use the keystore to expand the traditional key,and use the digital pointer to avoid the key transmission in a wireless channel.Secondly,the identity authentication technology is adopted to ensure the data integrity,and an automatic retransmission mechanism is added for the endogenous properties of the wireless channel.Finally,the software defined radio(SDR)platform composed of universal software radio peripheral(USRP)and GNU radio is used to simulate the data interaction between the physical entity and the virtual entity.The numerical results show that the DTs architecture can guarantee the encrypted data transmitted completely and decrypted accurately with high efficiency and reliability,thus providing a basis for intelligent and secure information interaction for DTs in the future.
基金the National Natural Science Foundation of China(Grant Nos.12271394,11775040,12011530014)the Natural Science Foundation of Shanxi Province+3 种基金China(Grant Nos.201801D221032 and 201801D121016)the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi(Grant No.2019L0178)the Key Research and Development Program of Shanxi Province(Grant No.202102010101004)the China Scholarship Council。
文摘We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables'complementarity and the complementarity of uncertainty whilst the upper bound includes the complementarity of the observables,quantum discord,and quantum condition entropy.In quantum measurement processing,there exists a relationship between the complementarity of uncertainty and the complementarity of information.In addition,based on the information exclusion principle the complementarity of uncertainty and the shareability of quantum discord can exist as an essential factor to enhance the bounds of each other in the presence of quantum memory.
基金supported by the National Natural Science Foundation of China(62302047,62203250)the Science and Technology Development Fund of Macao SAR(0093/2023/RIA2,0050/2020/A1).
文摘THE tremendous impact of large models represented by ChatGPT[1]-[3]makes it necessary to con-sider the practical applications of such models[4].However,for an artificial intelligence(AI)to truly evolve,it needs to possess a physical“body”to transition from the virtual world to the real world and evolve through interaction with the real environments.In this context,“embodied intelligence”has sparked a new wave of research and technology,leading AI beyond the digital realm into a new paradigm that can actively act and perceive in a physical environment through tangible entities such as robots and automated devices[5].
基金This work was supported by the National Natural Science Foundation of China(62073093)the Postdoctoral Scientific Research Developmental Fund of Heilongjiang Province(LBH-Q19098)+1 种基金the Heilongjiang Provincial Natural Science Foundation of China(LH2020F017)the Key Laboratory of Advanced Marine Communication and Information Technology,Ministry of Industry and Information Technology.
文摘For bistatic multiple-input multiple-output(MIMO)radar,this paper presents a robust and direction finding method in strong impulse noise environment.By means of a new lower order covariance,the method is effective in suppressing impulse noise and achieving superior direction finding performance using the maximum likelihood(ML)estimation method.A quantum equilibrium optimizer algorithm(QEOA)is devised to resolve the corresponding objective function for efficient and accurate direc-tion finding.The results of simulation reveal the capability of the presented method in success rate and root mean square error over existing direction-finding methods in different application situations,e.g.,locating coherent signal sources with very few snapshots in strong impulse noise.Other than that,the Cramér-Rao bound(CRB)under impulse noise environment has been drawn to test the capability of the presented method.
基金supported in part by the National Key Research and Development Program of China(2018YFA0702200)the National Natural Science Foundation of China(52377079,62203097,62373196)。
文摘In this paper,a class of time-varying output group formation containment control problem of general linear hetero-geneous multiagent systems(MASs)is investigated under directed topology.The MAS is composed of a number of tracking leaders,formation leaders and followers,where two different types of leaders are used to provide reference trajectories for movement and to achieve certain formations,respectively.Firstly,compen-sators are designed whose states are estimations of tracking lead-ers,based on which,a controller is developed for each formation leader to accomplish the expected formation.Secondly,two event-triggered compensators are proposed for each follower to evalu-ate the state and formation information of the formation leaders in the same group,respectively.Subsequently,a control protocol is designed for each follower,utilizing the output information,to guide the output towards the convex hull generated by the forma-tion leaders within the group.Next,the triggering sequence in this paper is decomposed into two sequences,and the inter-event intervals of these two triggering conditions are provided to rule out the Zeno behavior.Finally,a numerical simulation is intro-duced to confirm the validity of the proposed results.
文摘The full-potential linearized augmented plane wave plus local orbital method is utilized for exploring the electronic,magnetic,and magneto-optical properties of the NiX_(2)(X=Cl,Br,and I)single layer.The first-principles calculation demonstrates that these compounds are ferromagnetic indirect semiconductors,and the energy band gaps of NiX_(2)for X=Cl,Br,and I are 3.888,3.134,and 2.157 eV,respectively.The magnetic moments of Ni atoms in NiX_(2)monolayer are 1.656,1.588,1.449μB,and their magneto-crystalline anisotropy energies are 0.167,0.029,0.090 meV,respectively.Based on the macro-linear response theory,we systematically studied the influences of the external magnetic field and out-of-plane strain on the magneto-optical Kerr effect(MOKE)spectrum of the NiX_(2)single layer.It is found that,when the external magnetic field is perpendicular to the sample plane,the value of the Kerr rotation angle reaches the maximum,and the single-layer NiI_(2)material has a Kerr rotation angle of 1.89°at the photon energy of 1.986 eV.Besides,the Kerr rotation spectrum of NiCl_(2)and NiBr_(2)monolayers redshift as the out-of-plane strain increases,while NiI_(2)monolayer blueshifts.Accurate computation of the MOKE spectrum of NiX_(2)materials provides an opportunity for applications of 2D magnetic material ranging from sensing to data storing.
基金supported by the Feicheng Artificial Intelligence Robot and Smart Agriculture Service Platform(381387).
文摘Asparagus stem blight,also known as“asparagus cancer”,is a serious plant disease with a regional distribution.The widespread occurrence of the disease has had a negative impact on the yield and quality of asparagus and has become one of the main problems threatening asparagus production.To improve the ability to accurately identify and localize phenotypic lesions of stem blight in asparagus and to enhance the accuracy of the test,a YOLOv8-CBAM detection algorithm for asparagus stem blight based on YOLOv8 was proposed.The algorithm aims to achieve rapid detection of phenotypic images of asparagus stem blight and to provide effective assistance in the control of asparagus stem blight.To enhance the model’s capacity to capture subtle lesion features,the Convolutional Block AttentionModule(CBAM)is added after C2f in the head.Simultaneously,the original CIoU loss function in YOLOv8 was replaced with the Focal-EIoU loss function,ensuring that the updated loss function emphasizes higher-quality bounding boxes.The YOLOv8-CBAM algorithm can effectively detect asparagus stem blight phenotypic images with a mean average precision(mAP)of 95.51%,which is 0.22%,14.99%,1.77%,and 5.71%higher than the YOLOv5,YOLOv7,YOLOv8,and Mask R-CNN models,respectively.This greatly enhances the efficiency of asparagus growers in identifying asparagus stem blight,aids in improving the prevention and control of asparagus stem blight,and is crucial for the application of computer vision in agriculture.
基金supported in part by the National Key Research and Development Program of China(2021YFC2902703)the National Natural Science Foundation of China(62173078,61773105,61533007,61873049,61873053,61703085,61374147)。
文摘Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process.
基金Project supported by the National Natural Science Foundation of China (Grants Nos.12375031 and 11905068)the Natural Science Foundation of Fujian Province, China (Grant No.2023J01113)the Scientific Research Funds of Huaqiao University (Grant No.ZQN-810)。
文摘The chimera states underlying many realistic dynamical processes have attracted ample attention in the area of dynamical systems.Here, we generalize the Kuramoto model with nonlocal coupling incorporating higher-order interactions encoded with simplicial complexes.Previous works have shown that higher-order interactions promote coherent states.However, we uncover the fact that the introduced higher-order couplings can significantly enhance the emergence of the incoherent state.Remarkably, we identify that the chimera states arise as a result of multi-attractors in dynamic states.Importantly, we review that the increasing higher-order interactions can significantly shape the emergent probability of chimera states.All the observed results can be well described in terms of the dimension reduction method.This study is a step forward in highlighting the importance of nonlocal higher-order couplings, which might provide control strategies for the occurrence of spatial-temporal patterns in networked systems.
基金supported by National Natural Science Foundation of China (No. 61971149, 62071504, 62271208)in part by the Special Projects in Key Fields for General Universities of Guangdong Province (No. 2020ZDZX3025, 2021ZDZX056)+1 种基金in part by the Guangdong Basic and Applied Basic Research Foundation (No. 2021A1515011657)in part by the Featured Innovation Projects of Guangdong Province of China (No. 2021KTSCX049)。
文摘Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital algorithm.Then, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. Computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.
文摘Let B^(H) be a fractional Brownian motion with Hurst index 1/2≤H<1.In this paper,we consider the equation(called the Ornstein-Uhlenbeck process with a linear self-repelling drift)dX_(t)^(H)=dB_(t)^(H)+σ X_(t)^(H)dt+vdt-θ(∫_(0)^(t)(X_(t)^(H)-X_(s)^(H))ds)dt,whereθ<0,σ,v∈ℝ.The process is an analogue of self-attracting diffusion(Cranston,Le Jan.Math Ann,1995,303:87–93).Our main aim is to study the large time behaviors of the process.We show that the solution X^(H)diverges to infinity as t tends to infinity,and obtain the speed at which the process X^(H)diverges to infinity.
基金supported in part by the National Natural Science Foundation of China (NSFC)(61703086, 61773106)the IAPI Fundamental Research Funds (2018ZCX27)
文摘This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems.
基金Bai for their strong support for this work. This study was supported by the Natural Science Foundation of Henan Province (NO. 222301420113, 232102520006)Major Science and Technology Special Project of Henan Province (NO. 221100210600)+2 种基金Henan Province key research and development project (NO. 231111110100)Key Scientific and Technological Project of Henan Province (NO. 242102111193)the Natural Science Foundation of China(NO. 31501225, 42101362).
文摘Fusarium head blight (FHB) is one of the most destructive diseases in global wheat production. In order to count the FHB-infected wheat ears under field conditions, this study proposed an algorithm for diseased wheat ear detection based on improved YOLOv5s (Tr-YOLOv5s). The Swin Transformer was used to replace the CSPDarknet backbone network to enhance the extraction of characteristic information of the population wheat ears of FHB in the field background. The convolutional block attention module (CBAM) attention mechanism was added to improve the detection effect of target wheat ears, subsequently improving the overall accuracy of the model. The original loss function complete intersection over union (CIoU) was replaced by Scylla intersection over union (SIoU) loss to accelerate the model convergence and decrease the loss value. The results showed that the mean average precision (mAP) of the Tr-YOLOv5s model reached 90.64%, making a 4.63% improvement compared to the original YOLOv5s model. The improved model could quickly detect and count wheat FHB ear in the field environment, which laid a foundation for the subsequent automatic disease identification and grading of wheat FHB under field conditions.
基金Foundation of National Natural Science Foundation of China(62202118)Scientific and Technological Research Projects from Guizhou Education Department([2023]003)+1 种基金Guizhou Provincial Department of Science and Technology Hundred Levels of Innovative Talents Project(GCC[2023]018)Top Technology Talent Project from Guizhou Education Department([2022]073).
文摘The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’privacy by anonymizing big data.However,the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability.In addition,ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced.Based on this,we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data,while guaranteeing improved data usability.Specifically,we construct a new information loss function based on the information quantity theory.Considering that different quasi-identification attributes have different impacts on sensitive attributes,we set weights for each quasi-identification attribute when designing the information loss function.In addition,to reduce information loss,we improve K-anonymity in two ways.First,we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms,i.e.,greedy algorithm and 2-means clustering algorithm.In addition,we improve the 2-means clustering algorithm by designing a mean-center method to select the initial center of mass.Meanwhile,we design the K-anonymity algorithm of this scheme based on the constructed information loss function,the improved 2-means clustering algorithm,and the greedy algorithm,which reduces the information loss.Finally,we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62172268 and 62302289)the Shanghai Science and Technology Project(Grant Nos.21JC1402800 and 23YF1416200)。
文摘As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most quantum image filterings are based on classical domains and grayscale images,and there are relatively fewer studies on anti-aliasing in the quantum domain.This paper proposes a scheme for anti-aliasing filtering based on quantum grayscale and color image scaling in the spatial domain.It achieves the effect of anti-aliasing filtering on quantum images during the scaling process.First,we use the novel enhanced quantum representation(NEQR)and the improved quantum representation of color images(INCQI)to represent classical images.Since aliasing phenomena are more pronounced when images are scaled down,this paper focuses only on the anti-aliasing effects in the case of reduction.Subsequently,we perform anti-aliasing filtering on the quantum representation of the original image and then use bilinear interpolation to scale down the image,achieving the anti-aliasing effect.The constructed pyramid model is then used to select an appropriate image for upscaling to the original image size.Finally,the complexity of the circuit is analyzed.Compared to the images experiencing aliasing effects solely due to scaling,applying anti-aliasing filtering to the images results in smoother and clearer outputs.Additionally,the anti-aliasing filtering allows for manual intervention to select the desired level of image smoothness.