The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr...The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ...In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.展开更多
Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majori...Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majority of following behavior model and overtaking behavior model are imprecise and unrealistic compared with pedestrian movement in the real world.In this study,a pedestrian dynamic model considering detailed modelling of the following behavior and overtaking behavior is constructed,and a method of measuring the lane formation and pedestrian system order based on information entropy is proposed.Simulation and analysis demonstrate that the following and avoidance behaviors are important factors of lane formation.A high tendency of following results in good lane formation.Both non-selective following behavior and aggressive overtaking behavior cause the system order to decrease.The most orderly following strategy for a pedestrian is to overtake the former pedestrian whose speed is lower than approximately 70%of his own.The influence of the obstacle layout on pedestrian lane and egress efficiency is also studied with this model.The presence of a small obstacle does not obstruct the walking of pedestrians;in contrast,it may help to improve the egress efficiency by guiding the pedestrian flow and mitigating the reduction of pedestrian system orderliness.展开更多
Quantum Fisher information is used to witness the quantum phase transition in a non-Hermitian trapped ion system with balanced gain and loss,from the viewpoint of quantum parameter estimation.We formulate a general no...Quantum Fisher information is used to witness the quantum phase transition in a non-Hermitian trapped ion system with balanced gain and loss,from the viewpoint of quantum parameter estimation.We formulate a general non-unitary dynamic of any two-level non-Hermitian system in the form of state vector.The sudden change in the dynamics of quantum Fisher information occurs at an exceptional point characterizing quantum criticality.The dynamical behaviors of quantum Fisher information are classified into two different ways which depends on whether the system is located in symmetry unbroken or broken phase regimes.In the phase regime where parity and time reversal symmetry are unbroken,the oscillatory evolution of quantum Fisher information is presented,achieving better quantum measurement precision.In the broken phase regime,quantum Fisher information undergoes the monotonically decreasing behavior.The maximum value of quantum estimation precision is obtained at the exceptional point.It is found that the two distinct kinds of behaviors can be verified by quantum entropy and coherence.Utilizing quantum Fisher information to witness phase transition in the non-Hermitian system is emphasized.The results may have potential applications to non-Hermitian quantum information technology.展开更多
The paper addresses the decentralized optimal control and stabilization problems for interconnected systems subject to asymmetric information.Compared with previous work,a closed-loop optimal solution to the control p...The paper addresses the decentralized optimal control and stabilization problems for interconnected systems subject to asymmetric information.Compared with previous work,a closed-loop optimal solution to the control problem and sufficient and necessary conditions for the stabilization problem of the interconnected systems are given for the first time.The main challenge lies in three aspects:Firstly,the asymmetric information results in coupling between control and estimation and failure of the separation principle.Secondly,two extra unknown variables are generated by asymmetric information(different information filtration)when solving forward-backward stochastic difference equations.Thirdly,the existence of additive noise makes the study of mean-square boundedness an obstacle.The adopted technique is proving and assuming the linear form of controllers and establishing the equivalence between the two systems with and without additive noise.A dual-motor parallel drive system is presented to demonstrate the validity of the proposed algorithm.展开更多
In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and comp...In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and complex structure),the aircraft control system contains several uncertainties,such as imprecision,incompleteness,redundancy and randomness.The information fusion technology is usually used to solve the uncertainty issue,thus improving the sampled data reliability,which can further effectively increase the performance of the fault diagnosis decision-making in the aircraft control system.In this work,we first analyze the uncertainties in the aircraft control system,and also compare different uncertainty quantitative methods.Since the information fusion can eliminate the effects of the uncertainties,it is widely used in the fault diagnosis.Thus,this paper summarizes the recent work in this aera.Furthermore,we analyze the application of information fusion methods in the fault diagnosis of the aircraft control system.Finally,this work identifies existing problems in the use of information fusion for diagnosis and outlines future trends.展开更多
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems...Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.展开更多
The meridian theory is an important component of traditional Chinese medicine,playing a crucial role in disease diagnosis,treatment,and health preservation.Serving as the media for the effects of acupuncture,moxibusti...The meridian theory is an important component of traditional Chinese medicine,playing a crucial role in disease diagnosis,treatment,and health preservation.Serving as the media for the effects of acupuncture,moxibustion,herbal medicine,and acupressure massage,meridians exert undeniable impact on the human body.However,the essence of meridians remains a topic of debate.Recent research has primarily focused on their anatomical structures,leading to numerous hypotheses.Simultaneously,other researchers have approached this subject from an energetic perspective,discovering information interactions within the meridian system.These findings suggest that meridians possess both physical and information dimensions,indicating that a singular approach to their study is insufficient.To bridge this gap,a shift from purely structural research toward an exploration of the information aspects of meridians is necessary.By integrating this information approach with traditional meridian theory,it may be possible to develop a new,modernized meridian theory that is aligned with contemporary concepts,making it more accessible and applicable in clinical settings.展开更多
Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ...Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets.展开更多
Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s...Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.展开更多
BACKGROUND Nutritional support for patients hospitalized in the intensive care unit(ICU)is an important part of clinical treatment and care,but there are significant implementation difficulties.AIM To introduce a modi...BACKGROUND Nutritional support for patients hospitalized in the intensive care unit(ICU)is an important part of clinical treatment and care,but there are significant implementation difficulties.AIM To introduce a modified nutritional support management system for ICU patients based on closed-loop information management and psychological counseling.METHODS The division of functions,personnel training,system construction,development of an intelligent decision-making software system,quality control,and improvement of the whole process were carried out to systematically manage nutritional support for ICU patients.RESULTS Following the implementation of the whole process management system,the scores of ICU medical staff’s knowledge,attitudes/beliefs,and practices regarding nutritional support were comprehensively enhanced.The proportion of hospital bed-days of total enteral nutrition(EN)in ICU patients increased from 5.58%to 11.46%,and the proportion of EN plus parenteral nutrition increased from 42.71%to 47.07%.The rate of EN initiation within 48 h of ICU admission increased from 37.50%to 48.28%,and the EN compliance rate within 72 h elevated from 20.59%to 31.72%.After the implementation of the project,the Self-rating Anxiety Scale score decreased from 61.07±9.91 points to 52.03±9.02 points,the Self-rating Depression Scale score reduced from 62.47±10.50 points to 56.34±9.83 points,and the ICU stay decreased from 5.76±2.77 d to 5.10±2.12 d.CONCLUSION The nutritional support management system based on closed-loop information management and psychological counseling achieved remarkable results in clinical applications in ICU patients.展开更多
As Natural Language Processing(NLP)continues to advance,driven by the emergence of sophisticated large language models such as ChatGPT,there has been a notable growth in research activity.This rapid uptake reflects in...As Natural Language Processing(NLP)continues to advance,driven by the emergence of sophisticated large language models such as ChatGPT,there has been a notable growth in research activity.This rapid uptake reflects increasing interest in the field and induces critical inquiries into ChatGPT’s applicability in the NLP domain.This review paper systematically investigates the role of ChatGPT in diverse NLP tasks,including information extraction,Name Entity Recognition(NER),event extraction,relation extraction,Part of Speech(PoS)tagging,text classification,sentiment analysis,emotion recognition and text annotation.The novelty of this work lies in its comprehensive analysis of the existing literature,addressing a critical gap in understanding ChatGPT’s adaptability,limitations,and optimal application.In this paper,we employed a systematic stepwise approach following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)framework to direct our search process and seek relevant studies.Our review reveals ChatGPT’s significant potential in enhancing various NLP tasks.Its adaptability in information extraction tasks,sentiment analysis,and text classification showcases its ability to comprehend diverse contexts and extract meaningful details.Additionally,ChatGPT’s flexibility in annotation tasks reducesmanual efforts and accelerates the annotation process,making it a valuable asset in NLP development and research.Furthermore,GPT-4 and prompt engineering emerge as a complementary mechanism,empowering users to guide the model and enhance overall accuracy.Despite its promising potential,challenges persist.The performance of ChatGP Tneeds tobe testedusingmore extensivedatasets anddiversedata structures.Subsequently,its limitations in handling domain-specific language and the need for fine-tuning in specific applications highlight the importance of further investigations to address these issues.展开更多
Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We condu...Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .展开更多
The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate be...The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate between their upper and lower bounds, where the number of oscillations increases as the Rashba interaction strength increases. The exchanging rate of these three quantities depends on the Rashba strength, and whether the entangled state is generated via direct/indirect interaction. Moreover, the coherence parameter can be used as a control parameter to maximize or minimize the three physical quantities.展开更多
The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessmen...The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted.展开更多
The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud se...The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.展开更多
The integration of set-valued ordered rough set models and incremental learning signify a progressive advancement of conventional rough set theory, with the objective of tackling the heterogeneity and ongoing transfor...The integration of set-valued ordered rough set models and incremental learning signify a progressive advancement of conventional rough set theory, with the objective of tackling the heterogeneity and ongoing transformations in information systems. In set-valued ordered decision systems, when changes occur in the attribute value domain, such as adding conditional values, it may result in changes in the preference relation between objects, indirectly leading to changes in approximations. In this paper, we effectively addressed the issue of updating approximations that arose from adding conditional values in set-valued ordered decision systems. Firstly, we classified the research objects into two categories: objects with changes in conditional values and objects without changes, and then conducted theoretical studies on updating approximations for these two categories, presenting approximation update theories for adding conditional values. Subsequently, we presented incremental algorithms corresponding to approximation update theories. We demonstrated the feasibility of the proposed incremental update method with numerical examples and showed that our incremental algorithm outperformed the static algorithm. Ultimately, by comparing experimental results on different datasets, it is evident that the incremental algorithm efficiently reduced processing time. In conclusion, this study offered a promising strategy to address the challenges of set-valued ordered decision systems in dynamic environments.展开更多
Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and ...Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings.展开更多
With the rapid development of information technology,5G communication technology has gradually entered real life,among which the application of edge computing is particularly significant in the information and communi...With the rapid development of information technology,5G communication technology has gradually entered real life,among which the application of edge computing is particularly significant in the information and communication system field.This paper focuses on using edge computing based on 5G communication in information and communication systems.First,the study analyzes the importance of combining edge computing technology with 5G communication technology,and its advantages,such as high efficiency and low latency in processing large amounts of data.The study then explores multiple application scenarios of edge computing in information and communication systems,such as integrated use in the Internet of Things,intelligent transportation,telemedicine and Industry 4.0.The research method is mainly based on theoretical analysis and experimental verification,combined with the characteristics of the 5G network to optimize the edge computing model and test the performance of edge computing in different scenarios through experimental simulation.The results show that edge computing significantly improves the data processing capacity and response speed of ICS in a 5G environment.However,there are also a series of challenges in practical application,including data security and privacy protection,the complexity of resource management and allocation,and the guarantee of quality of service(QoS).Through the case analysis and problem analysis,the paper puts forward the corresponding solution strategies,such as strengthening the data security protocol,introducing the intelligent resource scheduling system and establishing a multi-dimensional service quality monitoring mechanism.Finally,this study points out that the deep integration of edge computing and 5G communication will continue to promote the innovative development of information and communication systems,which has a far-reaching impact and important practical significance for promoting the transformation and upgrading in the field of information technology.展开更多
基金Anhui Province Natural Science Research Project of Colleges and Universities(2023AH040321)Excellent Scientific Research and Innovation Team of Anhui Colleges(2022AH010098).
文摘The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.
基金Project supported by the National Natural Science Foundation of China(Grant No.71603146).
文摘Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majority of following behavior model and overtaking behavior model are imprecise and unrealistic compared with pedestrian movement in the real world.In this study,a pedestrian dynamic model considering detailed modelling of the following behavior and overtaking behavior is constructed,and a method of measuring the lane formation and pedestrian system order based on information entropy is proposed.Simulation and analysis demonstrate that the following and avoidance behaviors are important factors of lane formation.A high tendency of following results in good lane formation.Both non-selective following behavior and aggressive overtaking behavior cause the system order to decrease.The most orderly following strategy for a pedestrian is to overtake the former pedestrian whose speed is lower than approximately 70%of his own.The influence of the obstacle layout on pedestrian lane and egress efficiency is also studied with this model.The presence of a small obstacle does not obstruct the walking of pedestrians;in contrast,it may help to improve the egress efficiency by guiding the pedestrian flow and mitigating the reduction of pedestrian system orderliness.
文摘Quantum Fisher information is used to witness the quantum phase transition in a non-Hermitian trapped ion system with balanced gain and loss,from the viewpoint of quantum parameter estimation.We formulate a general non-unitary dynamic of any two-level non-Hermitian system in the form of state vector.The sudden change in the dynamics of quantum Fisher information occurs at an exceptional point characterizing quantum criticality.The dynamical behaviors of quantum Fisher information are classified into two different ways which depends on whether the system is located in symmetry unbroken or broken phase regimes.In the phase regime where parity and time reversal symmetry are unbroken,the oscillatory evolution of quantum Fisher information is presented,achieving better quantum measurement precision.In the broken phase regime,quantum Fisher information undergoes the monotonically decreasing behavior.The maximum value of quantum estimation precision is obtained at the exceptional point.It is found that the two distinct kinds of behaviors can be verified by quantum entropy and coherence.Utilizing quantum Fisher information to witness phase transition in the non-Hermitian system is emphasized.The results may have potential applications to non-Hermitian quantum information technology.
基金supported by the National Natural Science Foundation of China(62273213,62073199,62103241)Natural Science Foundation of Shandong Province for Innovation and Development Joint Funds(ZR2022LZH001)+4 种基金Natural Science Foundation of Shandong Province(ZR2020MF095,ZR2021QF107)Taishan Scholarship Construction Engineeringthe Original Exploratory Program Project of National Natural Science Foundation of China(62250056)Major Basic Research of Natural Science Foundation of Shandong Province(ZR2021ZD14)High-level Talent Team Project of Qingdao West Coast New Area(RCTD-JC-2019-05)。
文摘The paper addresses the decentralized optimal control and stabilization problems for interconnected systems subject to asymmetric information.Compared with previous work,a closed-loop optimal solution to the control problem and sufficient and necessary conditions for the stabilization problem of the interconnected systems are given for the first time.The main challenge lies in three aspects:Firstly,the asymmetric information results in coupling between control and estimation and failure of the separation principle.Secondly,two extra unknown variables are generated by asymmetric information(different information filtration)when solving forward-backward stochastic difference equations.Thirdly,the existence of additive noise makes the study of mean-square boundedness an obstacle.The adopted technique is proving and assuming the linear form of controllers and establishing the equivalence between the two systems with and without additive noise.A dual-motor parallel drive system is presented to demonstrate the validity of the proposed algorithm.
基金supported by the National Natural Science Foundation of China(62273176)the Aeronautical Science Foundation of China(20200007018001)the China Scholarship Council(202306830096).
文摘In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and complex structure),the aircraft control system contains several uncertainties,such as imprecision,incompleteness,redundancy and randomness.The information fusion technology is usually used to solve the uncertainty issue,thus improving the sampled data reliability,which can further effectively increase the performance of the fault diagnosis decision-making in the aircraft control system.In this work,we first analyze the uncertainties in the aircraft control system,and also compare different uncertainty quantitative methods.Since the information fusion can eliminate the effects of the uncertainties,it is widely used in the fault diagnosis.Thus,this paper summarizes the recent work in this aera.Furthermore,we analyze the application of information fusion methods in the fault diagnosis of the aircraft control system.Finally,this work identifies existing problems in the use of information fusion for diagnosis and outlines future trends.
基金funded by the National Natural Science Foundation of China(62072056,62172058)the Researchers Supporting Project Number(RSP2023R102)King Saud University,Riyadh,Saudi Arabia+4 种基金funded by the Hunan Provincial Key Research and Development Program(2022SK2107,2022GK2019)the Natural Science Foundation of Hunan Province(2023JJ30054)the Foundation of State Key Laboratory of Public Big Data(PBD2021-15)the Young Doctor Innovation Program of Zhejiang Shuren University(2019QC30)Postgraduate Scientific Research Innovation Project of Hunan Province(CX20220940,CX20220941).
文摘Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
基金supported by the National Natural Science Foundation of China(82205286)the National Natural Science Foundation of China(82074556)+1 种基金the National Natural Science Foundation of China(U21A20404)the Natural Science Foundation of Sichuan Province(2023NSFSC1819).
文摘The meridian theory is an important component of traditional Chinese medicine,playing a crucial role in disease diagnosis,treatment,and health preservation.Serving as the media for the effects of acupuncture,moxibustion,herbal medicine,and acupressure massage,meridians exert undeniable impact on the human body.However,the essence of meridians remains a topic of debate.Recent research has primarily focused on their anatomical structures,leading to numerous hypotheses.Simultaneously,other researchers have approached this subject from an energetic perspective,discovering information interactions within the meridian system.These findings suggest that meridians possess both physical and information dimensions,indicating that a singular approach to their study is insufficient.To bridge this gap,a shift from purely structural research toward an exploration of the information aspects of meridians is necessary.By integrating this information approach with traditional meridian theory,it may be possible to develop a new,modernized meridian theory that is aligned with contemporary concepts,making it more accessible and applicable in clinical settings.
基金This work was supported by the Kyonggi University Research Grant 2022.
文摘Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets.
文摘Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.
基金Supported by Research Project of Zhejiang Provincial Department of Education,No.Y202045115.
文摘BACKGROUND Nutritional support for patients hospitalized in the intensive care unit(ICU)is an important part of clinical treatment and care,but there are significant implementation difficulties.AIM To introduce a modified nutritional support management system for ICU patients based on closed-loop information management and psychological counseling.METHODS The division of functions,personnel training,system construction,development of an intelligent decision-making software system,quality control,and improvement of the whole process were carried out to systematically manage nutritional support for ICU patients.RESULTS Following the implementation of the whole process management system,the scores of ICU medical staff’s knowledge,attitudes/beliefs,and practices regarding nutritional support were comprehensively enhanced.The proportion of hospital bed-days of total enteral nutrition(EN)in ICU patients increased from 5.58%to 11.46%,and the proportion of EN plus parenteral nutrition increased from 42.71%to 47.07%.The rate of EN initiation within 48 h of ICU admission increased from 37.50%to 48.28%,and the EN compliance rate within 72 h elevated from 20.59%to 31.72%.After the implementation of the project,the Self-rating Anxiety Scale score decreased from 61.07±9.91 points to 52.03±9.02 points,the Self-rating Depression Scale score reduced from 62.47±10.50 points to 56.34±9.83 points,and the ICU stay decreased from 5.76±2.77 d to 5.10±2.12 d.CONCLUSION The nutritional support management system based on closed-loop information management and psychological counseling achieved remarkable results in clinical applications in ICU patients.
文摘As Natural Language Processing(NLP)continues to advance,driven by the emergence of sophisticated large language models such as ChatGPT,there has been a notable growth in research activity.This rapid uptake reflects increasing interest in the field and induces critical inquiries into ChatGPT’s applicability in the NLP domain.This review paper systematically investigates the role of ChatGPT in diverse NLP tasks,including information extraction,Name Entity Recognition(NER),event extraction,relation extraction,Part of Speech(PoS)tagging,text classification,sentiment analysis,emotion recognition and text annotation.The novelty of this work lies in its comprehensive analysis of the existing literature,addressing a critical gap in understanding ChatGPT’s adaptability,limitations,and optimal application.In this paper,we employed a systematic stepwise approach following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)framework to direct our search process and seek relevant studies.Our review reveals ChatGPT’s significant potential in enhancing various NLP tasks.Its adaptability in information extraction tasks,sentiment analysis,and text classification showcases its ability to comprehend diverse contexts and extract meaningful details.Additionally,ChatGPT’s flexibility in annotation tasks reducesmanual efforts and accelerates the annotation process,making it a valuable asset in NLP development and research.Furthermore,GPT-4 and prompt engineering emerge as a complementary mechanism,empowering users to guide the model and enhance overall accuracy.Despite its promising potential,challenges persist.The performance of ChatGP Tneeds tobe testedusingmore extensivedatasets anddiversedata structures.Subsequently,its limitations in handling domain-specific language and the need for fine-tuning in specific applications highlight the importance of further investigations to address these issues.
文摘Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .
文摘The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate between their upper and lower bounds, where the number of oscillations increases as the Rashba interaction strength increases. The exchanging rate of these three quantities depends on the Rashba strength, and whether the entangled state is generated via direct/indirect interaction. Moreover, the coherence parameter can be used as a control parameter to maximize or minimize the three physical quantities.
基金the“Application of the Dynamic System Theory in the Determination of Infringement Liability for Immaterial Personality Rights in the Civil Code”(Project Approval Number 2022MFXH006)a project of the young scholar research program of the Civil Law Society of CLS in 2022。
文摘The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted.
文摘The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.
文摘The integration of set-valued ordered rough set models and incremental learning signify a progressive advancement of conventional rough set theory, with the objective of tackling the heterogeneity and ongoing transformations in information systems. In set-valued ordered decision systems, when changes occur in the attribute value domain, such as adding conditional values, it may result in changes in the preference relation between objects, indirectly leading to changes in approximations. In this paper, we effectively addressed the issue of updating approximations that arose from adding conditional values in set-valued ordered decision systems. Firstly, we classified the research objects into two categories: objects with changes in conditional values and objects without changes, and then conducted theoretical studies on updating approximations for these two categories, presenting approximation update theories for adding conditional values. Subsequently, we presented incremental algorithms corresponding to approximation update theories. We demonstrated the feasibility of the proposed incremental update method with numerical examples and showed that our incremental algorithm outperformed the static algorithm. Ultimately, by comparing experimental results on different datasets, it is evident that the incremental algorithm efficiently reduced processing time. In conclusion, this study offered a promising strategy to address the challenges of set-valued ordered decision systems in dynamic environments.
文摘Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings.
文摘With the rapid development of information technology,5G communication technology has gradually entered real life,among which the application of edge computing is particularly significant in the information and communication system field.This paper focuses on using edge computing based on 5G communication in information and communication systems.First,the study analyzes the importance of combining edge computing technology with 5G communication technology,and its advantages,such as high efficiency and low latency in processing large amounts of data.The study then explores multiple application scenarios of edge computing in information and communication systems,such as integrated use in the Internet of Things,intelligent transportation,telemedicine and Industry 4.0.The research method is mainly based on theoretical analysis and experimental verification,combined with the characteristics of the 5G network to optimize the edge computing model and test the performance of edge computing in different scenarios through experimental simulation.The results show that edge computing significantly improves the data processing capacity and response speed of ICS in a 5G environment.However,there are also a series of challenges in practical application,including data security and privacy protection,the complexity of resource management and allocation,and the guarantee of quality of service(QoS).Through the case analysis and problem analysis,the paper puts forward the corresponding solution strategies,such as strengthening the data security protocol,introducing the intelligent resource scheduling system and establishing a multi-dimensional service quality monitoring mechanism.Finally,this study points out that the deep integration of edge computing and 5G communication will continue to promote the innovative development of information and communication systems,which has a far-reaching impact and important practical significance for promoting the transformation and upgrading in the field of information technology.