The dynamic optimal interpolation(DOI)method is a technique based on quasi-geostrophic dynamics for merging multi-satellite altimeter along-track observations to generate gridded absolute dynamic topography(ADT).Compa...The dynamic optimal interpolation(DOI)method is a technique based on quasi-geostrophic dynamics for merging multi-satellite altimeter along-track observations to generate gridded absolute dynamic topography(ADT).Compared with the linear optimal interpolation(LOI)method,the DOI method can improve the accuracy of gridded ADT locally but with low computational efficiency.Consequently,considering both computational efficiency and accuracy,the DOI method is more suitable to be used only for regional applications.In this study,we propose to evaluate the suitable region for applying the DOI method based on the correlation between the absolute value of the Jacobian operator of the geostrophic stream function and the improvement achieved by the DOI method.After verifying the LOI and DOI methods,the suitable region was investigated in three typical areas:the Gulf Stream(25°N-50°N,55°W-80°W),the Japanese Kuroshio(25°N-45°N,135°E-155°E),and the South China Sea(5°N-25°N,100°E-125°E).We propose to use the DOI method only in regions outside the equatorial region and where the absolute value of the Jacobian operator of the geostrophic stream function is higher than1×10^(-11).展开更多
Missing value is one of the main factors that cause dirty data.Without high-quality data,there will be no reliable analysis results and precise decision-making.Therefore,the data warehouse needs to integrate high-qual...Missing value is one of the main factors that cause dirty data.Without high-quality data,there will be no reliable analysis results and precise decision-making.Therefore,the data warehouse needs to integrate high-quality data consistently.In the power system,the electricity consumption data of some large users cannot be normally collected resulting in missing data,which affects the calculation of power supply and eventually leads to a large error in the daily power line loss rate.For the problem of missing electricity consumption data,this study proposes a group method of data handling(GMDH)based data interpolation method in distribution power networks and applies it in the analysis of actually collected electricity data.First,the dependent and independent variables are defined from the original data,and the upper and lower limits of missing values are determined according to prior knowledge or existing data information.All missing data are randomly interpolated within the upper and lower limits.Then,the GMDH network is established to obtain the optimal complexity model,which is used to predict the missing data to replace the last imputed electricity consumption data.At last,this process is implemented iteratively until the missing values do not change.Under a relatively small noise level(α=0.25),the proposed approach achieves a maximum error of no more than 0.605%.Experimental findings demonstrate the efficacy and feasibility of the proposed approach,which realizes the transformation from incomplete data to complete data.Also,this proposed data interpolation approach provides a strong basis for the electricity theft diagnosis and metering fault analysis of electricity enterprises.展开更多
To address the impact of wind-power fluctuations on the stability of power systems,we propose a comprehensive approach that integrates multiple strategies and methods to enhance the efficiency and reliability of a sys...To address the impact of wind-power fluctuations on the stability of power systems,we propose a comprehensive approach that integrates multiple strategies and methods to enhance the efficiency and reliability of a system.First,we employ a strategy that restricts long-and short-term power output deviations to smoothen wind power fluctuations in real time.Second,we adopt the sliding window instantaneous complete ensemble empirical mode decomposition with adaptive noise(SW-ICEEMDAN)strategy to achieve real-time decomposition of the energy storage power,facilitating internal power distribution within the hybrid energy storage system.Finally,we introduce a rule-based multi-fuzzy control strategy for the secondary adjustment of the initial power allocation commands for different energy storage components.Through simulation validation,we demonstrate that the proposed comprehensive control strategy can smoothen wind power fluctuations in real time and decompose energy storage power.Compared with traditional empirical mode decomposition(EMD),ensemble empirical mode decomposition(EEMD),and complete ensemble empirical mode decomposition with adaptive noise(CEEMDAN)decomposition strategies,the configuration of the energy storage system under the SW-ICEEMDAN control strategy is more optimal.Additionally,the state-of-charge of energy storage components fluctuates within a reasonable range,enhancing the stability of the power system and ensuring the secure operation of the energy storage system.展开更多
As a branch of quantum image processing,quantum image scaling has been widely studied.However,most of the existing quantum image scaling algorithms are based on nearest-neighbor interpolation and bilinear interpolatio...As a branch of quantum image processing,quantum image scaling has been widely studied.However,most of the existing quantum image scaling algorithms are based on nearest-neighbor interpolation and bilinear interpolation,the quantum version of bicubic interpolation has not yet been studied.In this work,we present the first quantum image scaling scheme for bicubic interpolation based on the novel enhanced quantum representation(NEQR).Our scheme can realize synchronous enlargement and reduction of the image with the size of 2^(n)×2^(n) by integral multiple.Firstly,the image is represented by NEQR and the original image coordinates are obtained through multiple CNOT modules.Then,16 neighborhood pixels are obtained by quantum operation circuits,and the corresponding weights of these pixels are calculated by quantum arithmetic modules.Finally,a quantum matrix operation,instead of a classical convolution operation,is used to realize the sum of convolution of these pixels.Through simulation experiments and complexity analysis,we demonstrate that our scheme achieves exponential speedup over the classical bicubic interpolation algorithm,and has better effect than the quantum version of bilinear interpolation.展开更多
The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-r...The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-ronment is a challenging task.Current instance segmentation algorithms for strawberries suffer from issues such as poor real-time performance and low accuracy.To this end,the present study proposes an Efficient YOLACT(E-YOLACT)algorithm for strawberry detection and segmentation based on the YOLACT framework.The key enhancements of the E-YOLACT encompass the development of a lightweight attention mechanism,pyramid squeeze shuffle attention(PSSA),for efficient feature extraction.Additionally,an attention-guided context-feature pyramid network(AC-FPN)is employed instead of FPN to optimize the architecture’s performance.Furthermore,a feature-enhanced model(FEM)is introduced to enhance the prediction head’s capabilities,while efficient fast non-maximum suppression(EF-NMS)is devised to improve non-maximum suppression.The experimental results demonstrate that the E-YOLACT achieves a Box-mAP and Mask-mAP of 77.9 and 76.6,respectively,on the custom dataset.Moreover,it exhibits an impressive category accuracy of 93.5%.Notably,the E-YOLACT also demonstrates a remarkable real-time detection capability with a speed of 34.8 FPS.The method proposed in this article presents an efficient approach for the vision system of a strawberry-picking robot.展开更多
In recent years,frequent fire disasters have led to enormous damage in China.Effective firefighting rescues can minimize the losses caused by fires.During the rescue processes,the travel time of fire trucks can be sev...In recent years,frequent fire disasters have led to enormous damage in China.Effective firefighting rescues can minimize the losses caused by fires.During the rescue processes,the travel time of fire trucks can be severely affected by traffic conditions,changing the effective coverage of fire stations.However,it is still challenging to determine the effective coverage of fire stations considering dynamic traffic conditions.This paper addresses this issue by combining the traveling time calculationmodelwith the effective coverage simulationmodel.In addition,it proposes a new index of total effective coverage area(TECA)based on the time-weighted average of the effective coverage area(ECA)to evaluate the urban fire services.It also selects China as the case study to validate the feasibility of the models,a fire station(FS-JX)in Changsha.FS-JX station and its surrounding 9,117 fire risk points are selected as the fire service supply and demand points,respectively.A total of 196 simulation scenarios throughout a consecutiveweek are analyzed.Eventually,1,933,815 sets of valid sample data are obtained.The results showed that the TECA of FS-JX is 3.27 km^(2),which is far below the standard requirement of 7.00 km^(2) due to the traffic conditions.The visualization results showed that three rivers around FS-JX interrupt the continuity of its effective coverage.The proposed method can provide data support to optimize the locations of fire stations by accurately and dynamically determining the effective coverage of fire stations.展开更多
In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on ...In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on machine learning and mud logging data is studied in this paper.This method can effectively utilize downhole parameters collected in real-time during drilling,to identify lithology in real-time and provide a reference for optimization of drilling parameters.Given the imbalance of lithology samples,the synthetic minority over-sampling technique(SMOTE)and Tomek link were used to balance the sample number of five lithologies.Meanwhile,this paper introduces Tent map,random opposition-based learning and dynamic perceived probability to the original crow search algorithm(CSA),and establishes an improved crow search algorithm(ICSA).In this paper,ICSA is used to optimize the hyperparameter combination of random forest(RF),extremely random trees(ET),extreme gradient boosting(XGB),and light gradient boosting machine(LGBM)models.In addition,this study combines the recognition advantages of the four models.The accuracy of lithology identification by the weighted average probability model reaches 0.877.The study of this paper realizes high-precision real-time lithology identification method,which can provide lithology reference for the drilling process.展开更多
Understanding the variations in microscopic pore-fracture structures(MPFS) during coal creep under pore pressure and stress coupling is crucial for coal mining and effective gas treatment. In this manuscript, a triaxi...Understanding the variations in microscopic pore-fracture structures(MPFS) during coal creep under pore pressure and stress coupling is crucial for coal mining and effective gas treatment. In this manuscript, a triaxial creep test on deep coal at various pore pressures using a test system that combines in-situ mechanical loading with real-time nuclear magnetic resonance(NMR) detection was conducted.Full-scale quantitative characterization, online real-time detection, and visualization of MPFS during coal creep influenced by pore pressure and stress coupling were performed using NMR and NMR imaging(NMRI) techniques. The results revealed that seepage pores and microfractures(SPM) undergo the most significant changes during coal creep, with creep failure gradually expanding from dense primary pore fractures. Pore pressure presence promotes MPFS development primarily by inhibiting SPM compression and encouraging adsorption pores(AP) to evolve into SPM. Coal enters the accelerated creep stage earlier at lower stress levels, resulting in more pronounced creep deformation. The connection between the micro and macro values was established, demonstrating that increased porosity at different pore pressures leads to a negative exponential decay of the viscosity coefficient. The Newton dashpot in the ideal viscoplastic body and the Burgers model was improved using NMR experimental results, and a creep model that considers pore pressure and stress coupling using variable-order fractional operators was developed. The model’s reasonableness was confirmed using creep experimental data. The damagestate adjustment factors ω and β were identified through a parameter sensitivity analysis to characterize the effect of pore pressure and stress coupling on the creep damage characteristics(size and degree of difficulty) of coal.展开更多
In this study,a wavelet multi-resolution interpolation Galerkin method(WMIGM)is proposed to solve linear singularly perturbed boundary value problems.Unlike conventional wavelet schemes,the proposed algorithm can be r...In this study,a wavelet multi-resolution interpolation Galerkin method(WMIGM)is proposed to solve linear singularly perturbed boundary value problems.Unlike conventional wavelet schemes,the proposed algorithm can be readily extended to special node generation techniques,such as the Shishkin node.Such a wavelet method allows a high degree of local refinement of the nodal distribution to efficiently capture localized steep gradients.All the shape functions possess the Kronecker delta property,making the imposition of boundary conditions as easy as that in the finite element method.Four numerical examples are studied to demonstrate the validity and accuracy of the proposedwavelet method.The results showthat the use ofmodified Shishkin nodes can significantly reduce numerical oscillation near the boundary layer.Compared with many other methods,the proposed method possesses satisfactory accuracy and efficiency.The theoretical and numerical results demonstrate that the order of theε-uniform convergence of this wavelet method can reach 5.展开更多
AIM:To investigate the stability of the seven housekeeping genes:beta-actin(ActB),glyceraldehyde-3-phosphate dehydrogenase(GAPDH),18s ribosomal unit 5(18s),cyclophilin A(CycA),hypoxanthine-guanine phosphoribosyl trans...AIM:To investigate the stability of the seven housekeeping genes:beta-actin(ActB),glyceraldehyde-3-phosphate dehydrogenase(GAPDH),18s ribosomal unit 5(18s),cyclophilin A(CycA),hypoxanthine-guanine phosphoribosyl transferase(HPRT),ribosomal protein large P0(36B4)and terminal uridylyl transferase 1(U6)in the diabetic retinal tissue of rat model.METHODS:The expression of these seven genes in rat retinal tissues was determined using real-time quantitative reverse transcription polymerase chain reaction(RT-qPCR)in two groups;normal control rats and streptozotocininduced diabetic rats.The stability analysis of gene expression was investigated using geNorm,NormFinder,BestKeeper,and comparative delta-Ct(ΔCt)algorithms.RESULTS:The 36B4 gene was stably expressed in the retinal tissues of normal control animals;however,it was less stable in diabetic retinas.The 18s gene was expressed consistently in both normal control and diabetic rats’retinal tissue.That this gene was the best reference for data normalisation in RT-qPCR studies that used the retinal tissue of streptozotocin-induced diabetic rats.Furthermore,there was no ideal gene stably expressed for use in all experimental settings.CONCLUSION:Identifying relevant genes is a need for achieving RT-qPCR validity and reliability and must be appropriately achieved based on a specific experimental setting.展开更多
The purpose of this paper is to investigate the spatial interpolation of rainfall variability with deterministic and geostatic inspections in the Prefecture of Kilkis (Greece). The precipitation data where recorded fr...The purpose of this paper is to investigate the spatial interpolation of rainfall variability with deterministic and geostatic inspections in the Prefecture of Kilkis (Greece). The precipitation data where recorded from 12 meteorological stations in the Prefecture of Kilkis for 36 hydrological years (1973-2008). The cumulative monthly values of rainfall were studied on an annual and seasonal basis as well as during the arid-dry season. In the deterministic tests, the I.D.W. and R.B.F. checks were inspected, while in the geostatic tests, Ordinary Kriging and Universal Kriging respectively. The selection of the optimum method was made based on the least Root Mean Square Error (R.M.S.E.), as well as on the Mean Error (M.E.), as assessed by the cross validation analysis. The geostatical Kriging also considered the impact of isotropy and anisotropy across all time periods of data collection. Moreover, for Universal Kriging, the study explored spherical, exponential and Gaussian models in various combinations. Geostatistical techniques consistently demonstrated greater reliability than deterministic techniques across all time periods of data collection. Specifically, during the annual period, anisotropy was the prevailing characteristic in geostatistical techniques. Moreover, the results for the irrigation and seasonal periods were generally comparable, with few exceptions where isotropic methods yielded lower (R.M.S.E.) in some seasonal observations.展开更多
Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The m...Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
基金supported by National Natural Science Foundation of China under Grants 42192531 and 42192534the Special Fund of Hubei Luojia Laboratory(China)under Grant 220100001the Natural Science Foundation of Hubei Province for Distinguished Young Scholars(China)under Grant 2022CFA090。
文摘The dynamic optimal interpolation(DOI)method is a technique based on quasi-geostrophic dynamics for merging multi-satellite altimeter along-track observations to generate gridded absolute dynamic topography(ADT).Compared with the linear optimal interpolation(LOI)method,the DOI method can improve the accuracy of gridded ADT locally but with low computational efficiency.Consequently,considering both computational efficiency and accuracy,the DOI method is more suitable to be used only for regional applications.In this study,we propose to evaluate the suitable region for applying the DOI method based on the correlation between the absolute value of the Jacobian operator of the geostrophic stream function and the improvement achieved by the DOI method.After verifying the LOI and DOI methods,the suitable region was investigated in three typical areas:the Gulf Stream(25°N-50°N,55°W-80°W),the Japanese Kuroshio(25°N-45°N,135°E-155°E),and the South China Sea(5°N-25°N,100°E-125°E).We propose to use the DOI method only in regions outside the equatorial region and where the absolute value of the Jacobian operator of the geostrophic stream function is higher than1×10^(-11).
基金This research was funded by the National Nature Sciences Foundation of China(Grant No.42250410321).
文摘Missing value is one of the main factors that cause dirty data.Without high-quality data,there will be no reliable analysis results and precise decision-making.Therefore,the data warehouse needs to integrate high-quality data consistently.In the power system,the electricity consumption data of some large users cannot be normally collected resulting in missing data,which affects the calculation of power supply and eventually leads to a large error in the daily power line loss rate.For the problem of missing electricity consumption data,this study proposes a group method of data handling(GMDH)based data interpolation method in distribution power networks and applies it in the analysis of actually collected electricity data.First,the dependent and independent variables are defined from the original data,and the upper and lower limits of missing values are determined according to prior knowledge or existing data information.All missing data are randomly interpolated within the upper and lower limits.Then,the GMDH network is established to obtain the optimal complexity model,which is used to predict the missing data to replace the last imputed electricity consumption data.At last,this process is implemented iteratively until the missing values do not change.Under a relatively small noise level(α=0.25),the proposed approach achieves a maximum error of no more than 0.605%.Experimental findings demonstrate the efficacy and feasibility of the proposed approach,which realizes the transformation from incomplete data to complete data.Also,this proposed data interpolation approach provides a strong basis for the electricity theft diagnosis and metering fault analysis of electricity enterprises.
基金supported by the National Natural Science Foundation of China(Grant No.51677058)。
文摘To address the impact of wind-power fluctuations on the stability of power systems,we propose a comprehensive approach that integrates multiple strategies and methods to enhance the efficiency and reliability of a system.First,we employ a strategy that restricts long-and short-term power output deviations to smoothen wind power fluctuations in real time.Second,we adopt the sliding window instantaneous complete ensemble empirical mode decomposition with adaptive noise(SW-ICEEMDAN)strategy to achieve real-time decomposition of the energy storage power,facilitating internal power distribution within the hybrid energy storage system.Finally,we introduce a rule-based multi-fuzzy control strategy for the secondary adjustment of the initial power allocation commands for different energy storage components.Through simulation validation,we demonstrate that the proposed comprehensive control strategy can smoothen wind power fluctuations in real time and decompose energy storage power.Compared with traditional empirical mode decomposition(EMD),ensemble empirical mode decomposition(EEMD),and complete ensemble empirical mode decomposition with adaptive noise(CEEMDAN)decomposition strategies,the configuration of the energy storage system under the SW-ICEEMDAN control strategy is more optimal.Additionally,the state-of-charge of energy storage components fluctuates within a reasonable range,enhancing the stability of the power system and ensuring the secure operation of the energy storage system.
基金Project supported by the Scientific Research Fund of Hunan Provincial Education Department,China (Grant No.21A0470)the Natural Science Foundation of Hunan Province,China (Grant No.2023JJ50268)+1 种基金the National Natural Science Foundation of China (Grant Nos.62172268 and 62302289)the Shanghai Science and Technology Project,China (Grant Nos.21JC1402800 and 23YF1416200)。
文摘As a branch of quantum image processing,quantum image scaling has been widely studied.However,most of the existing quantum image scaling algorithms are based on nearest-neighbor interpolation and bilinear interpolation,the quantum version of bicubic interpolation has not yet been studied.In this work,we present the first quantum image scaling scheme for bicubic interpolation based on the novel enhanced quantum representation(NEQR).Our scheme can realize synchronous enlargement and reduction of the image with the size of 2^(n)×2^(n) by integral multiple.Firstly,the image is represented by NEQR and the original image coordinates are obtained through multiple CNOT modules.Then,16 neighborhood pixels are obtained by quantum operation circuits,and the corresponding weights of these pixels are calculated by quantum arithmetic modules.Finally,a quantum matrix operation,instead of a classical convolution operation,is used to realize the sum of convolution of these pixels.Through simulation experiments and complexity analysis,we demonstrate that our scheme achieves exponential speedup over the classical bicubic interpolation algorithm,and has better effect than the quantum version of bilinear interpolation.
基金funded by Anhui Provincial Natural Science Foundation(No.2208085ME128)the Anhui University-Level Special Project of Anhui University of Science and Technology(No.XCZX2021-01)+1 种基金the Research and the Development Fund of the Institute of Environmental Friendly Materials and Occupational Health,Anhui University of Science and Technology(No.ALW2022YF06)Anhui Province New Era Education Quality Project(Graduate Education)(No.2022xscx073).
文摘The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-ronment is a challenging task.Current instance segmentation algorithms for strawberries suffer from issues such as poor real-time performance and low accuracy.To this end,the present study proposes an Efficient YOLACT(E-YOLACT)algorithm for strawberry detection and segmentation based on the YOLACT framework.The key enhancements of the E-YOLACT encompass the development of a lightweight attention mechanism,pyramid squeeze shuffle attention(PSSA),for efficient feature extraction.Additionally,an attention-guided context-feature pyramid network(AC-FPN)is employed instead of FPN to optimize the architecture’s performance.Furthermore,a feature-enhanced model(FEM)is introduced to enhance the prediction head’s capabilities,while efficient fast non-maximum suppression(EF-NMS)is devised to improve non-maximum suppression.The experimental results demonstrate that the E-YOLACT achieves a Box-mAP and Mask-mAP of 77.9 and 76.6,respectively,on the custom dataset.Moreover,it exhibits an impressive category accuracy of 93.5%.Notably,the E-YOLACT also demonstrates a remarkable real-time detection capability with a speed of 34.8 FPS.The method proposed in this article presents an efficient approach for the vision system of a strawberry-picking robot.
基金support from the National Natural Science Foundation of China (No.52204202)the Hunan Provincial Natural Science Foundation of China (No.2023JJ40058)the Science and Technology Program of Hunan Provincial Departent of Transportation (No.202122).
文摘In recent years,frequent fire disasters have led to enormous damage in China.Effective firefighting rescues can minimize the losses caused by fires.During the rescue processes,the travel time of fire trucks can be severely affected by traffic conditions,changing the effective coverage of fire stations.However,it is still challenging to determine the effective coverage of fire stations considering dynamic traffic conditions.This paper addresses this issue by combining the traveling time calculationmodelwith the effective coverage simulationmodel.In addition,it proposes a new index of total effective coverage area(TECA)based on the time-weighted average of the effective coverage area(ECA)to evaluate the urban fire services.It also selects China as the case study to validate the feasibility of the models,a fire station(FS-JX)in Changsha.FS-JX station and its surrounding 9,117 fire risk points are selected as the fire service supply and demand points,respectively.A total of 196 simulation scenarios throughout a consecutiveweek are analyzed.Eventually,1,933,815 sets of valid sample data are obtained.The results showed that the TECA of FS-JX is 3.27 km^(2),which is far below the standard requirement of 7.00 km^(2) due to the traffic conditions.The visualization results showed that three rivers around FS-JX interrupt the continuity of its effective coverage.The proposed method can provide data support to optimize the locations of fire stations by accurately and dynamically determining the effective coverage of fire stations.
基金supported by CNPC-CZU Innovation Alliancesupported by the Program of Polar Drilling Environmental Protection and Waste Treatment Technology (2022YFC2806403)。
文摘In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on machine learning and mud logging data is studied in this paper.This method can effectively utilize downhole parameters collected in real-time during drilling,to identify lithology in real-time and provide a reference for optimization of drilling parameters.Given the imbalance of lithology samples,the synthetic minority over-sampling technique(SMOTE)and Tomek link were used to balance the sample number of five lithologies.Meanwhile,this paper introduces Tent map,random opposition-based learning and dynamic perceived probability to the original crow search algorithm(CSA),and establishes an improved crow search algorithm(ICSA).In this paper,ICSA is used to optimize the hyperparameter combination of random forest(RF),extremely random trees(ET),extreme gradient boosting(XGB),and light gradient boosting machine(LGBM)models.In addition,this study combines the recognition advantages of the four models.The accuracy of lithology identification by the weighted average probability model reaches 0.877.The study of this paper realizes high-precision real-time lithology identification method,which can provide lithology reference for the drilling process.
基金supported by the National Natural Science Foundation of China(Nos.52121003,51827901 and 52204110)China Postdoctoral Science Foundation(No.2022M722346)+1 种基金the 111 Project(No.B14006)the Yueqi Outstanding Scholar Program of CUMTB(No.2017A03).
文摘Understanding the variations in microscopic pore-fracture structures(MPFS) during coal creep under pore pressure and stress coupling is crucial for coal mining and effective gas treatment. In this manuscript, a triaxial creep test on deep coal at various pore pressures using a test system that combines in-situ mechanical loading with real-time nuclear magnetic resonance(NMR) detection was conducted.Full-scale quantitative characterization, online real-time detection, and visualization of MPFS during coal creep influenced by pore pressure and stress coupling were performed using NMR and NMR imaging(NMRI) techniques. The results revealed that seepage pores and microfractures(SPM) undergo the most significant changes during coal creep, with creep failure gradually expanding from dense primary pore fractures. Pore pressure presence promotes MPFS development primarily by inhibiting SPM compression and encouraging adsorption pores(AP) to evolve into SPM. Coal enters the accelerated creep stage earlier at lower stress levels, resulting in more pronounced creep deformation. The connection between the micro and macro values was established, demonstrating that increased porosity at different pore pressures leads to a negative exponential decay of the viscosity coefficient. The Newton dashpot in the ideal viscoplastic body and the Burgers model was improved using NMR experimental results, and a creep model that considers pore pressure and stress coupling using variable-order fractional operators was developed. The model’s reasonableness was confirmed using creep experimental data. The damagestate adjustment factors ω and β were identified through a parameter sensitivity analysis to characterize the effect of pore pressure and stress coupling on the creep damage characteristics(size and degree of difficulty) of coal.
基金supported by the National Natural Science Foundation of China (No.12172154)the 111 Project (No.B14044)+1 种基金the Natural Science Foundation of Gansu Province (No.23JRRA1035)the Natural Science Foundation of Anhui University of Finance and Economics (No.ACKYC20043).
文摘In this study,a wavelet multi-resolution interpolation Galerkin method(WMIGM)is proposed to solve linear singularly perturbed boundary value problems.Unlike conventional wavelet schemes,the proposed algorithm can be readily extended to special node generation techniques,such as the Shishkin node.Such a wavelet method allows a high degree of local refinement of the nodal distribution to efficiently capture localized steep gradients.All the shape functions possess the Kronecker delta property,making the imposition of boundary conditions as easy as that in the finite element method.Four numerical examples are studied to demonstrate the validity and accuracy of the proposedwavelet method.The results showthat the use ofmodified Shishkin nodes can significantly reduce numerical oscillation near the boundary layer.Compared with many other methods,the proposed method possesses satisfactory accuracy and efficiency.The theoretical and numerical results demonstrate that the order of theε-uniform convergence of this wavelet method can reach 5.
基金Supported by grant from Fundamental Research Grant Scheme by Ministry of Higher Education(MoHE)600-IRMI/FRGS 5/3(101/2019).
文摘AIM:To investigate the stability of the seven housekeeping genes:beta-actin(ActB),glyceraldehyde-3-phosphate dehydrogenase(GAPDH),18s ribosomal unit 5(18s),cyclophilin A(CycA),hypoxanthine-guanine phosphoribosyl transferase(HPRT),ribosomal protein large P0(36B4)and terminal uridylyl transferase 1(U6)in the diabetic retinal tissue of rat model.METHODS:The expression of these seven genes in rat retinal tissues was determined using real-time quantitative reverse transcription polymerase chain reaction(RT-qPCR)in two groups;normal control rats and streptozotocininduced diabetic rats.The stability analysis of gene expression was investigated using geNorm,NormFinder,BestKeeper,and comparative delta-Ct(ΔCt)algorithms.RESULTS:The 36B4 gene was stably expressed in the retinal tissues of normal control animals;however,it was less stable in diabetic retinas.The 18s gene was expressed consistently in both normal control and diabetic rats’retinal tissue.That this gene was the best reference for data normalisation in RT-qPCR studies that used the retinal tissue of streptozotocin-induced diabetic rats.Furthermore,there was no ideal gene stably expressed for use in all experimental settings.CONCLUSION:Identifying relevant genes is a need for achieving RT-qPCR validity and reliability and must be appropriately achieved based on a specific experimental setting.
文摘The purpose of this paper is to investigate the spatial interpolation of rainfall variability with deterministic and geostatic inspections in the Prefecture of Kilkis (Greece). The precipitation data where recorded from 12 meteorological stations in the Prefecture of Kilkis for 36 hydrological years (1973-2008). The cumulative monthly values of rainfall were studied on an annual and seasonal basis as well as during the arid-dry season. In the deterministic tests, the I.D.W. and R.B.F. checks were inspected, while in the geostatic tests, Ordinary Kriging and Universal Kriging respectively. The selection of the optimum method was made based on the least Root Mean Square Error (R.M.S.E.), as well as on the Mean Error (M.E.), as assessed by the cross validation analysis. The geostatical Kriging also considered the impact of isotropy and anisotropy across all time periods of data collection. Moreover, for Universal Kriging, the study explored spherical, exponential and Gaussian models in various combinations. Geostatistical techniques consistently demonstrated greater reliability than deterministic techniques across all time periods of data collection. Specifically, during the annual period, anisotropy was the prevailing characteristic in geostatistical techniques. Moreover, the results for the irrigation and seasonal periods were generally comparable, with few exceptions where isotropic methods yielded lower (R.M.S.E.) in some seasonal observations.
文摘Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].