When fault occurs on cross-coupling autotransformer(AT)power supply traction network,the up-line and down-line feeder circuit breakers in the traction substation trip at the same time without selectivity,which leads t...When fault occurs on cross-coupling autotransformer(AT)power supply traction network,the up-line and down-line feeder circuit breakers in the traction substation trip at the same time without selectivity,which leads to an extended power failure.Based on equivalent circuit and Kirchhoff’s current law,the feeder current characteristic in the substation,AT station and sectioning post when T-R fault,F-R fault,and T-F fault occur are analyzed and their expressions are obtained.When the traction power supply system is equipped with wide-area protection measurement and control system,the feeder protection device in each station collects the feeder currents in other two stations through the wide-area protection channel and a wide-area current differential protection scheme based on the feeder current characteristic is proposed.When a short-circuit fault occurs in the power supply arm,all the feeder protection devices in each station receive the feeder currents with time stamp in other two stations.After data synchronous processing and logic judgment,the fault line of the power supply arm can be identified and isolated quickly.The simulation result based on MATLAB/Simulink shows that the power supply arm protection scheme based on wide-area current differential has good fault discrimination ability under different fault positions,transition resistances,and fault types.The verification of measured data shows that the novel protection scheme will not be affected by the special working conditions of the electrical multiple unit(EMU),and reliability,selectivity,and rapidity of relay protection are all improved.展开更多
Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hi...Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hibernation techniques,mild hypothermia has preliminarily confirmed its clinical effect on spinal cord injury.However,its technical defects and barriers,along with serious clinical side effects,restrict its clinical application for spinal cord injury.Artificial hibernation is a futureoriented disruptive technology for human life support.It involves endogenous hibernation inducers and hibernation-related central neuromodulation that activate particular neurons,reduce the central constant temperature setting point,disrupt the normal constant body temperature,make the body adapt"to the external cold environment,and reduce the physiological resistance to cold stimulation.Thus,studying the artificial hibernation mechanism may help develop new treatment strategies more suitable for clinical use than the cooling method of mild hypothermia technology.This review introduces artificial hibernation technologies,including mild hypothermia technology,hibernation inducers,and hibernation-related central neuromodulation technology.It summarizes the relevant research on hypothermia and hibernation for organ and nerve protection.These studies show that artificial hibernation technologies have therapeutic significance on nerve injury after spinal co rd injury through inflammatory inhibition,immunosuppression,oxidative defense,and possible central protection.It also promotes the repair and protection of res pirato ry and digestive,cardiovascular,locomoto r,urinary,and endocrine systems.This review provides new insights for the clinical treatment of nerve and multiple organ protection after spinal cord injury thanks to artificial hibernation.At present,artificial hibernation technology is not mature,and research fa ces various challenges.Neve rtheless,the effort is wo rthwhile for the future development of medicine.展开更多
An innovative complex lidar system deployed on an airborne rotorcraft platform for remote sensing of atmospheric pollution is proposed and demonstrated.The system incorporates integrated-path differential absorption l...An innovative complex lidar system deployed on an airborne rotorcraft platform for remote sensing of atmospheric pollution is proposed and demonstrated.The system incorporates integrated-path differential absorption lidar(DIAL) and coherent-doppler lidar(CDL) techniques using a dual tunable TEA CO_(2)laser in the 9—11 μm band and a 1.55 μm fiber laser.By combining the principles of differential absorption detection and pulsed coherent detection,the system enables agile and remote sensing of atmospheric pollution.Extensive static tests validate the system’s real-time detection capabilities,including the measurement of concentration-path-length product(CL),front distance,and path wind speed of air pollution plumes over long distances exceeding 4 km.Flight experiments is conducted with the helicopter.Scanning of the pollutant concentration and the wind field is carried out in an approximately 1 km slant range over scanning angle ranges from 45°to 65°,with a radial resolution of 30 m and10 s.The test results demonstrate the system’s ability to spatially map atmospheric pollution plumes and predict their motion and dispersion patterns,thereby ensuring the protection of public safety.展开更多
In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in...In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in the completion phase,the weighted-selection strategy is applied to provide low overhead.The performance of the proposed scheme is analyzed and compared with the existing UEP online fountain scheme.Simulation results show that in terms of MIS and the least important symbols(LIS),when the bit error ratio is 10-4,the proposed scheme can achieve 85%and 31.58%overhead reduction,respectively.展开更多
Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and su...Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and subsequent experimental validation.Methods:Network pharmacology was applied to construct an active ingredient-efficacy target-disease protein network to reveal the unique regulation pattern of s.miltiorrhiza and C.tinctorius as herb pair.Molecular docking was used to verify the binding of the components of these herbs and their potential targets.An H9c2 glucose hypoxia model was used to evaluate the efficacy of the components and their synergistic effects,which were evaluated using the combination index.Western blot was performed to detect the protein expression of these targets.Results:Network pharmacology analysis revealed 5 pathways and 8 core targets of s.miltiorrhiza and C.tinctorius in myocardial protection.Five of the core targets were enriched in the hypoxia-inducible factor-1(HIF-1)signaling pathway.S.miltiorrhiza-C.tinctorius achieved vascular tone mainly by regulating the target genes of the HIF-1 pathway.As an upstream gene of the HIF-1 pathway,STAT3 can be activated by the active ingredients cryptotanshinone(Ctan),salvianolic acid B(Sal.B),and myricetin(Myric).Cell experiments revealed that Myric,Sal.B,and Ctan also exhibited synergistic myocardial protective activity.Molecular docking verified the strong binding of Myric,Sal.B,and Ctan to STAT3.Western blot further showed that the active ingredients synergistically upregulated the protein expressionof STAT3.Conclusion:The pharmacodynamic transmission analysis revealed that the active ingredients of S.miltiorrhiza and C.tinctorius can synergistically resist ischemia through various targets and pathways.This study provides a methodological reference for interpreting traditional Chinese medicine compatibility.展开更多
Because of the features involved with their varied kernels,differential operators relying on convolution formulations have been acknowledged as effective mathematical resources for modeling real-world issues.In this p...Because of the features involved with their varied kernels,differential operators relying on convolution formulations have been acknowledged as effective mathematical resources for modeling real-world issues.In this paper,we constructed a stochastic fractional framework of measles spreading mechanisms with dual medication immunization considering the exponential decay and Mittag-Leffler kernels.In this approach,the overall population was separated into five cohorts.Furthermore,the descriptive behavior of the system was investigated,including prerequisites for the positivity of solutions,invariant domain of the solution,presence and stability of equilibrium points,and sensitivity analysis.We included a stochastic element in every cohort and employed linear growth and Lipschitz criteria to show the existence and uniqueness of solutions.Several numerical simulations for various fractional orders and randomization intensities are illustrated.展开更多
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i...A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare.展开更多
Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,whic...Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,which is intrinsically triggered by the overcharging and overheating.To improve the safety of LIBs,various protection strategies based on self-actuating reaction control mechanisms(SRCMs)have been proposed,including redox shuttle,polymerizable monomer additive,potential-sensitive separator,thermal shutdown separator,positive-temperature-coefficient electrode,thermally polymerizable addi-tive,and reversible thermal phase transition electrolyte.As build-in protection mechanisms,these meth-ods can sensitively detect either the temperature change inside battery or the potential change of the electrode,and spontaneously shut down the electrode reaction at risky conditions,thus preventing the battery from going into thermal runaway.Given their advantages in enhancing the intrinsic safety of LIBs,this paper overviews the research progresses of SRCMs after a brief introduction of thermal runaway mechanism and limitations of conventional thermal runaway mitigating measures.More importantly,the current states and issues,key challenges,and future developing trends of SRCTs are also discussed and outlined from the viewpoint of practical application,aiming at providing insights and guidance for developing more effective SRCMs for LIBs.展开更多
Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological cond...Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological conditions,including stroke,head trauma,and neurodegenerative disease,can generate stress in neurons,affecting their survival and proper function.In most neural pathologies,mitochondria become dysfunctional and this plays a pivotal role in the process of cell death.The challenge over the last few decades has been to develop effective interventions that improve neuronal homeostasis under pathological conditions.Such interventions,often referred to as disease-modifying or neuroprotective,have,however,proved frustratingly elusive,at both preclinical and,in particular,clinical levels.In this perspective,we highlight two factors that we feel are key to the development of effective neuroprotective treatments.These are:firstly,the choice of dose of intervention and method of application,and secondly,the selection of subjects,whether they be patients or the animal model.展开更多
Correction to:Nuclear Science and Techniques(2024)35:61 https://doi.org/10.1007/s41365-024-01421-5 In this article,the figures were wrongly numbered.The Fig.7 and 8 should have been Fig.11 and 12.The Fig.9,10,11,and 1...Correction to:Nuclear Science and Techniques(2024)35:61 https://doi.org/10.1007/s41365-024-01421-5 In this article,the figures were wrongly numbered.The Fig.7 and 8 should have been Fig.11 and 12.The Fig.9,10,11,and 12 should have been 7,8,9 and 10.The original article has been corrected.展开更多
Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the subopt...Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse.展开更多
With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issue...With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing.In this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in blockchain.Both the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy protection.However,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries.We propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF queries.The framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy protection.The data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy budget.We propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query time.The VB-cm tree uses the vector commitment to verify the query results.The fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing operations.We conduct an extensive evaluation of the proposed framework.The experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.展开更多
Chromia-forming alloys have good resistance to oxidizing agents such as O2, CO2, … It is accepted that the protection of these alloys is always due to the chromia layer formed at the surface of the alloys, which acts...Chromia-forming alloys have good resistance to oxidizing agents such as O2, CO2, … It is accepted that the protection of these alloys is always due to the chromia layer formed at the surface of the alloys, which acts as a barrier between the oxidizing gases and the alloy substrates, forming a diffusion zone that limits the overall reaction rate and leads to parabolic kinetics. But this was not verified in the study devoted to Inconel®625 the oxidation in CO2 that was followed by TGA, with characterizations by XRD, EDS and FIB microscopy. Contrary to what was expected and accepted in similar studies on other chromia-forming alloys, it was shown that the diffusion step that governs the overall reaction rate is not located inside the chromia layer but inside the alloy, precisely inside a zone just beneath the interface alloy/chromia, this zone being depleted in chromium. The chromia layer, therefore, plays no kinetic role and does not directly protect the underlying alloy. This result was demonstrated using a simple test that consisted in removing the chromia layer from the surface of samples partially oxidized and then to continue the thermal treatment: insofar as the kinetics continued without any change in rate, this proved that this surface layer of oxide did not protect the substrate. Based on previous work on many chromia-forming alloys, the possibility of a similar reaction mechanism is discussed. If the chromia layer is not the source of protection for a number of chromia-forming alloys, as is suspected, this might have major consequences in terms of industrial applications.展开更多
The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses ...The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses a threat to both stability and sustainability.However,there is limited knowledge regarding the morphology,dynamic changes,and ecological responses associated with these sand patches.Therefore,we analyzed the formation and development process of sand patches within the protection system and its effects on herbaceous vegetation growth and soil nutrients through field observation,survey,and indoor analysis methods.The results showed that sand patch development can be divided into three stages,i.e.,formation,expansion,and stabilization,which correspond to the initial,actively developing,and semi-fixed sand patches,respectively.The average dimensions of all sand patch erosional areas were found to be 7.72 m in length,3.91 m in width,and 0.32 m in depth.The actively developing sand patches were the largest,and the initial sand patches were the smallest.Throughout the stage of formation and expansion,the herbaceous community composition changed,and the plant density decreased by more than 50.95%.Moreover,the coverage and height of herbaceous plants decreased in the erosional area and slightly increased in the depositional lobe;and the fine particles and nutrients of soils in the erosional area and depositional lobe showed a decreasing trend.In the stabilization phases of sand patches,the area from the inlet to the bottom of sand patches becomes initially covered with crusts.Vegetation and 0-2 cm surface soil condition improved in the erosional area,but this improvement was not yet evident in the depositional lobe.Factors such as disturbance,climate change,and surface resistance to erosion exert notable influences on the formation and dynamics of sand patches.The results can provide evidence for the future treatment of sand patches and the management of the protection system of Shapotou section of the Baotou-Lanzhou railway.展开更多
In recent decades,the ozone layer has suffered considerable damage,increasing the entry of ultraviolet(UV)light into the atmosphere and reaching the earth’s surface,negatively affecting life.Accordingly,researchers a...In recent decades,the ozone layer has suffered considerable damage,increasing the entry of ultraviolet(UV)light into the atmosphere and reaching the earth’s surface,negatively affecting life.Accordingly,researchers aimed to solve this problem by synthesizing advanced UV-shielding materials.On the other hand,developing an easy and green strategy to prepare functional materials with outstanding properties based on naturally abundant and environmentally friendly raw materials is highly desirable for sustainable development.Because biomass-derived materials are sustainable and biodegradable,they present a promising substitute for petroleum-based polymers.The three main structural constituents of the plant biomass-based materials that are naturally available are cellulose,hemicellulose,and lignin.This review details current developments using wood-based products such as cellulose,hemicellulose,and lignin in UV-shielding applications.It will start with assembling the structure and chemistry of cellulose,hemicellulose,and lignin,followed by their contributions to preparing UV-shielding materials.Finally,it will briefly discuss the different processing methods for the design of UV-shielding materials.The wood by-products offer additional opportunities to use the whole tree harvest.展开更多
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou...With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis.展开更多
For preterm infants, bronchopulmonary dysplasia (BPD) is usually caused by abnormal lung development due to various factors during prenatal and postnatal process. One of the reasons for death and bad prognosis of pret...For preterm infants, bronchopulmonary dysplasia (BPD) is usually caused by abnormal lung development due to various factors during prenatal and postnatal process. One of the reasons for death and bad prognosis of preterm infants is to have BPD. Up to now, there are no unified strategies or drugs to treat BPD. In clinical, many intervention treatments have been applied to achieve BPD therapy, mainly including preterm protection, protective ventilation strategies, and delivery of corticosteroids, pulmonary vasodilators, and antioxidants. This review summarizes the current advances in BPD protection and treatment, and notes that gut microbiota and mesenchymal stem cells (MSCs) can be the promising strategy for protecting and treating BPD in the future.展开更多
In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advanta...In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advantages of decentralized storage,the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership.The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files.To this end,an innovative approach is proposed that integrates blockchain,digital signature,and blind watermarking.Blockchain technology functions as a decentralized and tamper-resistant ledger,recording and verifying the source information of files,thereby establishing credible evidence of file origin.A digital signature serves to authenticate the identity and integrity of the individual responsible for uploading the file,ensuring data security.Furthermore,blind watermarking is employed to embed invisible information within images,thereby safeguarding digital copyrights and enabling file traceability.To further optimize the efficiency of file retrieval within IPFS,a dual-layer Distributed Hash Table(DHT)indexing structure is proposed.This structure divides file index information into a global index layer and a local index layer,significantly reducing retrieval time and network overhead.The feasibility of the proposed approach is demonstrated through practical examples,providing an effective solution to the copyright protection issues associated with IPFS image files.展开更多
A method for in-situ stress measurement via fiber optics was proposed. The method utilizes the relationship between rock mass elastic parameters and in-situ stress. The approach offers the advantage of long-term stres...A method for in-situ stress measurement via fiber optics was proposed. The method utilizes the relationship between rock mass elastic parameters and in-situ stress. The approach offers the advantage of long-term stress measurements with high spatial resolution and frequency, significantly enhancing the ability to measure in-situ stress. The sensing casing, spirally wrapped with fiber optic, is cemented into the formation to establish a formation sensing nerve. Injecting fluid into the casing generates strain disturbance, establishing the relationship between rock mass properties and treatment pressure.Moreover, an optimization algorithm is established to invert the elastic parameters of formation via fiber optic strains. In the first part of this paper series, we established the theoretical basis for the inverse differential strain analysis method for in-situ stress measurement, which was subsequently verified using an analytical model. This paper is the fundamental basis for the inverse differential strain analysis method.展开更多
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ...The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data.展开更多
基金supported by the Natural Science Foundation of Sichuan Province(No.2022NSFSC0405).
文摘When fault occurs on cross-coupling autotransformer(AT)power supply traction network,the up-line and down-line feeder circuit breakers in the traction substation trip at the same time without selectivity,which leads to an extended power failure.Based on equivalent circuit and Kirchhoff’s current law,the feeder current characteristic in the substation,AT station and sectioning post when T-R fault,F-R fault,and T-F fault occur are analyzed and their expressions are obtained.When the traction power supply system is equipped with wide-area protection measurement and control system,the feeder protection device in each station collects the feeder currents in other two stations through the wide-area protection channel and a wide-area current differential protection scheme based on the feeder current characteristic is proposed.When a short-circuit fault occurs in the power supply arm,all the feeder protection devices in each station receive the feeder currents with time stamp in other two stations.After data synchronous processing and logic judgment,the fault line of the power supply arm can be identified and isolated quickly.The simulation result based on MATLAB/Simulink shows that the power supply arm protection scheme based on wide-area current differential has good fault discrimination ability under different fault positions,transition resistances,and fault types.The verification of measured data shows that the novel protection scheme will not be affected by the special working conditions of the electrical multiple unit(EMU),and reliability,selectivity,and rapidity of relay protection are all improved.
基金supported by the Key Projects of the National Natural Science Foundation of China,No.11932013(to XC)Key Military Logistics Research Projects,No.B WJ21J002(to XC)+4 种基金the Key projects of the Special Zone for National Defence Innovation,No.21-163-12-ZT006002-13(to XC)the National Nature Science Foundation of China No.82272255(to XC)the National Defense Science and Technology Outstanding Youth Science Fund Program,No.2021-JCIQ-ZQ-035(to XC)the Scientific Research Innovation Team Project of Armed Police Characteristic Medical Center,No.KYCXTD0104(to ZL)the National Natural Science Foundation of China Youth Fund,No.82004467(to BC)。
文摘Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hibernation techniques,mild hypothermia has preliminarily confirmed its clinical effect on spinal cord injury.However,its technical defects and barriers,along with serious clinical side effects,restrict its clinical application for spinal cord injury.Artificial hibernation is a futureoriented disruptive technology for human life support.It involves endogenous hibernation inducers and hibernation-related central neuromodulation that activate particular neurons,reduce the central constant temperature setting point,disrupt the normal constant body temperature,make the body adapt"to the external cold environment,and reduce the physiological resistance to cold stimulation.Thus,studying the artificial hibernation mechanism may help develop new treatment strategies more suitable for clinical use than the cooling method of mild hypothermia technology.This review introduces artificial hibernation technologies,including mild hypothermia technology,hibernation inducers,and hibernation-related central neuromodulation technology.It summarizes the relevant research on hypothermia and hibernation for organ and nerve protection.These studies show that artificial hibernation technologies have therapeutic significance on nerve injury after spinal co rd injury through inflammatory inhibition,immunosuppression,oxidative defense,and possible central protection.It also promotes the repair and protection of res pirato ry and digestive,cardiovascular,locomoto r,urinary,and endocrine systems.This review provides new insights for the clinical treatment of nerve and multiple organ protection after spinal cord injury thanks to artificial hibernation.At present,artificial hibernation technology is not mature,and research fa ces various challenges.Neve rtheless,the effort is wo rthwhile for the future development of medicine.
文摘An innovative complex lidar system deployed on an airborne rotorcraft platform for remote sensing of atmospheric pollution is proposed and demonstrated.The system incorporates integrated-path differential absorption lidar(DIAL) and coherent-doppler lidar(CDL) techniques using a dual tunable TEA CO_(2)laser in the 9—11 μm band and a 1.55 μm fiber laser.By combining the principles of differential absorption detection and pulsed coherent detection,the system enables agile and remote sensing of atmospheric pollution.Extensive static tests validate the system’s real-time detection capabilities,including the measurement of concentration-path-length product(CL),front distance,and path wind speed of air pollution plumes over long distances exceeding 4 km.Flight experiments is conducted with the helicopter.Scanning of the pollutant concentration and the wind field is carried out in an approximately 1 km slant range over scanning angle ranges from 45°to 65°,with a radial resolution of 30 m and10 s.The test results demonstrate the system’s ability to spatially map atmospheric pollution plumes and predict their motion and dispersion patterns,thereby ensuring the protection of public safety.
基金supported by the National Natural Science Foundation of China(61601147)the Beijing Natural Science Foundation(L182032)。
文摘In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in the completion phase,the weighted-selection strategy is applied to provide low overhead.The performance of the proposed scheme is analyzed and compared with the existing UEP online fountain scheme.Simulation results show that in terms of MIS and the least important symbols(LIS),when the bit error ratio is 10-4,the proposed scheme can achieve 85%and 31.58%overhead reduction,respectively.
基金supported by the National Natural Science Foundation of China(81703947)the Fundamental Research Funds for the Central Universities(2019-JYB-XJSJJ-011).
文摘Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and subsequent experimental validation.Methods:Network pharmacology was applied to construct an active ingredient-efficacy target-disease protein network to reveal the unique regulation pattern of s.miltiorrhiza and C.tinctorius as herb pair.Molecular docking was used to verify the binding of the components of these herbs and their potential targets.An H9c2 glucose hypoxia model was used to evaluate the efficacy of the components and their synergistic effects,which were evaluated using the combination index.Western blot was performed to detect the protein expression of these targets.Results:Network pharmacology analysis revealed 5 pathways and 8 core targets of s.miltiorrhiza and C.tinctorius in myocardial protection.Five of the core targets were enriched in the hypoxia-inducible factor-1(HIF-1)signaling pathway.S.miltiorrhiza-C.tinctorius achieved vascular tone mainly by regulating the target genes of the HIF-1 pathway.As an upstream gene of the HIF-1 pathway,STAT3 can be activated by the active ingredients cryptotanshinone(Ctan),salvianolic acid B(Sal.B),and myricetin(Myric).Cell experiments revealed that Myric,Sal.B,and Ctan also exhibited synergistic myocardial protective activity.Molecular docking verified the strong binding of Myric,Sal.B,and Ctan to STAT3.Western blot further showed that the active ingredients synergistically upregulated the protein expressionof STAT3.Conclusion:The pharmacodynamic transmission analysis revealed that the active ingredients of S.miltiorrhiza and C.tinctorius can synergistically resist ischemia through various targets and pathways.This study provides a methodological reference for interpreting traditional Chinese medicine compatibility.
文摘Because of the features involved with their varied kernels,differential operators relying on convolution formulations have been acknowledged as effective mathematical resources for modeling real-world issues.In this paper,we constructed a stochastic fractional framework of measles spreading mechanisms with dual medication immunization considering the exponential decay and Mittag-Leffler kernels.In this approach,the overall population was separated into five cohorts.Furthermore,the descriptive behavior of the system was investigated,including prerequisites for the positivity of solutions,invariant domain of the solution,presence and stability of equilibrium points,and sensitivity analysis.We included a stochastic element in every cohort and employed linear growth and Lipschitz criteria to show the existence and uniqueness of solutions.Several numerical simulations for various fractional orders and randomization intensities are illustrated.
基金co-financed by the European Regional Development Fund of the European UnionGreek national funds through the Operational Program Competitiveness,Entrepreneurship and Innovation,under the call RESEARCH-CREATE-INNOVATE(project code:T1EDK-04429)。
文摘A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare.
基金financially supported by the National Natural Science Foundation of China(U22A20438)the National Key R&D Program of China(2022YFB2502100)the National Natural Science Foundation of China(22309138).
文摘Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,which is intrinsically triggered by the overcharging and overheating.To improve the safety of LIBs,various protection strategies based on self-actuating reaction control mechanisms(SRCMs)have been proposed,including redox shuttle,polymerizable monomer additive,potential-sensitive separator,thermal shutdown separator,positive-temperature-coefficient electrode,thermally polymerizable addi-tive,and reversible thermal phase transition electrolyte.As build-in protection mechanisms,these meth-ods can sensitively detect either the temperature change inside battery or the potential change of the electrode,and spontaneously shut down the electrode reaction at risky conditions,thus preventing the battery from going into thermal runaway.Given their advantages in enhancing the intrinsic safety of LIBs,this paper overviews the research progresses of SRCMs after a brief introduction of thermal runaway mechanism and limitations of conventional thermal runaway mitigating measures.More importantly,the current states and issues,key challenges,and future developing trends of SRCTs are also discussed and outlined from the viewpoint of practical application,aiming at providing insights and guidance for developing more effective SRCMs for LIBs.
基金supported by Fonds Clinatec and COVEA France(to JM).
文摘Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological conditions,including stroke,head trauma,and neurodegenerative disease,can generate stress in neurons,affecting their survival and proper function.In most neural pathologies,mitochondria become dysfunctional and this plays a pivotal role in the process of cell death.The challenge over the last few decades has been to develop effective interventions that improve neuronal homeostasis under pathological conditions.Such interventions,often referred to as disease-modifying or neuroprotective,have,however,proved frustratingly elusive,at both preclinical and,in particular,clinical levels.In this perspective,we highlight two factors that we feel are key to the development of effective neuroprotective treatments.These are:firstly,the choice of dose of intervention and method of application,and secondly,the selection of subjects,whether they be patients or the animal model.
文摘Correction to:Nuclear Science and Techniques(2024)35:61 https://doi.org/10.1007/s41365-024-01421-5 In this article,the figures were wrongly numbered.The Fig.7 and 8 should have been Fig.11 and 12.The Fig.9,10,11,and 12 should have been 7,8,9 and 10.The original article has been corrected.
基金supported by“Regional Innovation Strategy(RIS)”through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(MOE)(2021RIS-004)supported by the Technology Development Program(S3230339)funded by the Ministry of SMEs and Startups(MSS,Korea).
文摘Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse.
文摘With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing.In this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in blockchain.Both the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy protection.However,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries.We propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF queries.The framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy protection.The data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy budget.We propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query time.The VB-cm tree uses the vector commitment to verify the query results.The fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing operations.We conduct an extensive evaluation of the proposed framework.The experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.
文摘Chromia-forming alloys have good resistance to oxidizing agents such as O2, CO2, … It is accepted that the protection of these alloys is always due to the chromia layer formed at the surface of the alloys, which acts as a barrier between the oxidizing gases and the alloy substrates, forming a diffusion zone that limits the overall reaction rate and leads to parabolic kinetics. But this was not verified in the study devoted to Inconel®625 the oxidation in CO2 that was followed by TGA, with characterizations by XRD, EDS and FIB microscopy. Contrary to what was expected and accepted in similar studies on other chromia-forming alloys, it was shown that the diffusion step that governs the overall reaction rate is not located inside the chromia layer but inside the alloy, precisely inside a zone just beneath the interface alloy/chromia, this zone being depleted in chromium. The chromia layer, therefore, plays no kinetic role and does not directly protect the underlying alloy. This result was demonstrated using a simple test that consisted in removing the chromia layer from the surface of samples partially oxidized and then to continue the thermal treatment: insofar as the kinetics continued without any change in rate, this proved that this surface layer of oxide did not protect the substrate. Based on previous work on many chromia-forming alloys, the possibility of a similar reaction mechanism is discussed. If the chromia layer is not the source of protection for a number of chromia-forming alloys, as is suspected, this might have major consequences in terms of industrial applications.
基金supported by the Key Research and Development Program of Ningxia Hui Autonomous Region,China(2022BEG02003)the Excellent Member of Youth Innovation Promotion Association,Chinese Academy of Sciences(Y202085)the Youth Innovation Promotion Association,Chinese Academy of Sciences(2023448).
文摘The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses a threat to both stability and sustainability.However,there is limited knowledge regarding the morphology,dynamic changes,and ecological responses associated with these sand patches.Therefore,we analyzed the formation and development process of sand patches within the protection system and its effects on herbaceous vegetation growth and soil nutrients through field observation,survey,and indoor analysis methods.The results showed that sand patch development can be divided into three stages,i.e.,formation,expansion,and stabilization,which correspond to the initial,actively developing,and semi-fixed sand patches,respectively.The average dimensions of all sand patch erosional areas were found to be 7.72 m in length,3.91 m in width,and 0.32 m in depth.The actively developing sand patches were the largest,and the initial sand patches were the smallest.Throughout the stage of formation and expansion,the herbaceous community composition changed,and the plant density decreased by more than 50.95%.Moreover,the coverage and height of herbaceous plants decreased in the erosional area and slightly increased in the depositional lobe;and the fine particles and nutrients of soils in the erosional area and depositional lobe showed a decreasing trend.In the stabilization phases of sand patches,the area from the inlet to the bottom of sand patches becomes initially covered with crusts.Vegetation and 0-2 cm surface soil condition improved in the erosional area,but this improvement was not yet evident in the depositional lobe.Factors such as disturbance,climate change,and surface resistance to erosion exert notable influences on the formation and dynamics of sand patches.The results can provide evidence for the future treatment of sand patches and the management of the protection system of Shapotou section of the Baotou-Lanzhou railway.
文摘In recent decades,the ozone layer has suffered considerable damage,increasing the entry of ultraviolet(UV)light into the atmosphere and reaching the earth’s surface,negatively affecting life.Accordingly,researchers aimed to solve this problem by synthesizing advanced UV-shielding materials.On the other hand,developing an easy and green strategy to prepare functional materials with outstanding properties based on naturally abundant and environmentally friendly raw materials is highly desirable for sustainable development.Because biomass-derived materials are sustainable and biodegradable,they present a promising substitute for petroleum-based polymers.The three main structural constituents of the plant biomass-based materials that are naturally available are cellulose,hemicellulose,and lignin.This review details current developments using wood-based products such as cellulose,hemicellulose,and lignin in UV-shielding applications.It will start with assembling the structure and chemistry of cellulose,hemicellulose,and lignin,followed by their contributions to preparing UV-shielding materials.Finally,it will briefly discuss the different processing methods for the design of UV-shielding materials.The wood by-products offer additional opportunities to use the whole tree harvest.
基金sponsored by the National Natural Science Foundation of China under grant number No. 62172353, No. 62302114, No. U20B2046 and No. 62172115Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education No.1331007 and No. 1311022+1 种基金Natural Science Foundation of the Jiangsu Higher Education Institutions Grant No. 17KJB520044Six Talent Peaks Project in Jiangsu Province No.XYDXX-108
文摘With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis.
文摘For preterm infants, bronchopulmonary dysplasia (BPD) is usually caused by abnormal lung development due to various factors during prenatal and postnatal process. One of the reasons for death and bad prognosis of preterm infants is to have BPD. Up to now, there are no unified strategies or drugs to treat BPD. In clinical, many intervention treatments have been applied to achieve BPD therapy, mainly including preterm protection, protective ventilation strategies, and delivery of corticosteroids, pulmonary vasodilators, and antioxidants. This review summarizes the current advances in BPD protection and treatment, and notes that gut microbiota and mesenchymal stem cells (MSCs) can be the promising strategy for protecting and treating BPD in the future.
基金supported by the Doctoral Research Foundation of Chongqing Normal University(Nos.21XLB030,21XLB029)the Key Program of Chongqing Education Science Planning Project(No.K22YE205098).
文摘In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advantages of decentralized storage,the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership.The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files.To this end,an innovative approach is proposed that integrates blockchain,digital signature,and blind watermarking.Blockchain technology functions as a decentralized and tamper-resistant ledger,recording and verifying the source information of files,thereby establishing credible evidence of file origin.A digital signature serves to authenticate the identity and integrity of the individual responsible for uploading the file,ensuring data security.Furthermore,blind watermarking is employed to embed invisible information within images,thereby safeguarding digital copyrights and enabling file traceability.To further optimize the efficiency of file retrieval within IPFS,a dual-layer Distributed Hash Table(DHT)indexing structure is proposed.This structure divides file index information into a global index layer and a local index layer,significantly reducing retrieval time and network overhead.The feasibility of the proposed approach is demonstrated through practical examples,providing an effective solution to the copyright protection issues associated with IPFS image files.
基金the Project Support of NSFC(No.U19B6003-05 and No.52074314)。
文摘A method for in-situ stress measurement via fiber optics was proposed. The method utilizes the relationship between rock mass elastic parameters and in-situ stress. The approach offers the advantage of long-term stress measurements with high spatial resolution and frequency, significantly enhancing the ability to measure in-situ stress. The sensing casing, spirally wrapped with fiber optic, is cemented into the formation to establish a formation sensing nerve. Injecting fluid into the casing generates strain disturbance, establishing the relationship between rock mass properties and treatment pressure.Moreover, an optimization algorithm is established to invert the elastic parameters of formation via fiber optic strains. In the first part of this paper series, we established the theoretical basis for the inverse differential strain analysis method for in-situ stress measurement, which was subsequently verified using an analytical model. This paper is the fundamental basis for the inverse differential strain analysis method.
基金supported by National Natural Science Foundation of China under Grant No.61972360Shandong Provincial Natural Science Foundation of China under Grant Nos.ZR2020MF148,ZR2020QF108.
文摘The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data.