Although the construction of underground dams is one of the best methods to conserve water resources in arid and semi-arid regions,applying efficient methods for the selection of suitable sites for subsurface dam cons...Although the construction of underground dams is one of the best methods to conserve water resources in arid and semi-arid regions,applying efficient methods for the selection of suitable sites for subsurface dam construction remains a challenge.Due to the costly and time-consuming methods of site selection for underground dam construction,this study aimed to present a new method using geographic information systems techniques and decision-making processes.The exclusionary criteria including fault,slope,hypsometry,land use,soil,stream,geology,and chemical properties of groundwater were selected for site selection of dam construction and inappropriate regions were omitted by integration and scoring layers in ArcGIS based on the Boolean logic.Finally,appropriate sites were prioritized using the Multi-Attribute Utility Theory.According to the results of the utility coefficient,seven sites were selected as the region for underground dam construction based on all criteria and experts’opinions.The site of Nazarabad dam was the best location for underground dam construction with a utility coefficient of 0.7137 followed by sites of Akhavan with a utility coefficient of 0.4633 and Mirshamsi with a utility coefficient of 0.4083.This study proposed a new approach for the construction of the subsurface dam at the proper site and help managers and decision-makers achieve sustainable water resources with limited facilities and capital and avoid wasting national capital.展开更多
D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated...D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated areas. First, we choose seismic attributes that are most sensitive to CBM content changes with the guidance of CBM content measured at well sites. Then the selected seismic attributes are fused using D-S evidence theory and the fusion results are used to predict CBM-enriched area. The application shows that the predicted CBM content and the measured values are basically consistent. The results indicate that using D-S evidence theory in seismic multi-attribute fusion to predict CBM-enriched areas is feasible.展开更多
Probabilistic linguistic term sets(PLTSs)are an effective tool for expressing subjective human cognition that offer advantages in the field ofmulti-attribute decision-making(MADM).However,studies have found that PLTSs...Probabilistic linguistic term sets(PLTSs)are an effective tool for expressing subjective human cognition that offer advantages in the field ofmulti-attribute decision-making(MADM).However,studies have found that PLTSs have lost their ability to accurately capture the views of decision-makers(DMs)in certain circumstances,such as when the DM hesitates between multiple linguistic terms or the decision information is incomplete,thus affecting their role in the decision-making process.Belief function theory is a leading streamof thought in uncertainty processing that is suitable for dealing with the limitations of PLTS.Therefore,the purpose of this study is to extend PLTS to incorporate belief function theory.First,we provide the basic concepts of the extended PLTS(i.e.,belief-based PLTS)through case analyses.Second,the aggregation operator of belief-based PLTS is defined with the ordered weighted average(OWA)-based soft likelihood function,which is improved by considering the reliability of the information source.Third,to measure the magnitude of different belief-based PLTSs,the belief interval of singleton is calculated,and the comparison method of belief-based PLTS is constructed based on probabilities.On the basis of the preceding discussion,we further develop an emergency decision framework that includes several novel techniques,such as attribute weight determination and decision information aggregation.Finally,the usefulness of the framework is demonstrated through a case study,and its effectiveness is illustrated through a series of comparisons.展开更多
In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at ...In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.展开更多
Multi-attribute decision problems where the performances of the alternatives are random variables are considered. The suggested approach grades the probabilities of preference of one alternative over another with resp...Multi-attribute decision problems where the performances of the alternatives are random variables are considered. The suggested approach grades the probabilities of preference of one alternative over another with respect to the same attribute. Based on the graded probabilistic dominance relation, the pairwise comparison information table is defined. The global preferences of the decision maker can be seen as a rough binary relation. The present paper proposes to approximate this preference relation by means of the graded probabilistic dominance relation with respect to the subsets of attributes. At last, the method is illustrated by an example.展开更多
In real life,incomplete information,inaccurate data,and the preferences of decision-makers during qualitative judgment would impact the process of decision-making.As a technical instrument that can successfully handle...In real life,incomplete information,inaccurate data,and the preferences of decision-makers during qualitative judgment would impact the process of decision-making.As a technical instrument that can successfully handle uncertain information,Fermatean fuzzy sets have recently been used to solve the multi-attribute decision-making(MADM)problems.This paper proposes a Fermatean hesitant fuzzy information aggregation method to address the problem of fusion where the membership,non-membership,and priority are considered simultaneously.Combining the Fermatean hesitant fuzzy sets with Heronian Mean operators,this paper proposes the Fermatean hesitant fuzzy Heronian mean(FHFHM)operator and the Fermatean hesitant fuzzyweighted Heronian mean(FHFWHM)operator.Then,considering the priority relationship between attributes is often easier to obtain than the weight of attributes,this paper defines a new Fermatean hesitant fuzzy prioritized Heronian mean operator(FHFPHM),and discusses its elegant properties such as idempotency,boundedness and monotonicity in detail.Later,for problems with unknown weights and the Fermatean hesitant fuzzy information,aMADM approach based on prioritized attributes is proposed,which can effectively depict the correlation between attributes and avoid the influence of subjective factors on the results.Finally,a numerical example of multi-sensor electronic surveillance is applied to verify the feasibility and validity of the method proposed in this paper.展开更多
Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties...Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.展开更多
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf...Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.展开更多
BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to e...BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to enhance the psychological well-being and overall quality of life for primipara,while also furnishing healthcare providers with efficacious interventions to tackle the psychological and physiological obstacles encountered during the stages of pregnancy and postpartum.AIM To explore the effect of timing theory combined with behavior change on selfefficacy,negative emotions and quality of life in patients with primipara.METHODS A total of 80 primipara cases were selected and admitted to our hospital between August 2020 and May 2022.These cases were divided into two groups,namely the observation group and the control group,with 40 cases in each group.The nursing interventions differed between the two groups,with the control group receiving routine nursing and the observation group receiving integrated nursing based on the timing theory and behavior change.The study aimed to compare the pre-and post-nursing scores of Chinese Perceived Stress Scale(CPSS),Edinburgh Postpartum Depression Scale(EPDS),Self-rating Anxiety Scale(SAS),breast milk knowledge,self-efficacy,and SF-36 quality of life in both groups.RESULTS After nursing,the CPSS,EPDS,and SAS scores of the two groups was significantly lower than that before nursing,and the CPSS,EPDS,and SAS scores of the observation group was significantly lower than that of the control group(P=0.002,P=0.011,and P=0.001 respectively).After nursing,the breastfeeding knowledge mastery,selfefficacy,and SF-36 quality of life scores was significantly higher than that before nursing,and the breastfeeding knowledge mastery(P=0.013),self-efficacy(P=0.008),and SF-36 quality of life(P=0.011)scores of the observation group was significantly higher than that of the control group.CONCLUSION The integration of timing theory and behavior change integrated theory has been found to be an effective approach in alleviating negative mood and stress experienced by primipara individuals,while also enhancing their selfefficacy and overall quality of life.This study focuses on the key concepts of timing theory,behavior change,primipara individuals,negative mood,and quality of life.展开更多
The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad...The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad measurements but lack finer resolution.Laboratory-based rock core measurements offer higher resolution but are resource-intensive.Conventionally,wireline logging and rock core measurements have been used independently.This study introduces a novel approach that integrates both data sources.The method leverages the detailed features from limited core data to enhance the resolution of wireline logging data.By combining machine learning with random field theory,the method allows for probabilistic predictions in regions with sparse data sampling.In this framework,12 parameters from wireline tests are used to predict trends in rock core data.The residuals are modeled using random field theory.The outcomes are high-resolution predictions that combine both the predicted trend and the probabilistic realizations of the residual.By utilizing unconditional and conditional random field theories,this method enables unconditional and conditional simulations of the underlying high-resolution rock compressional wave travel time profile and provides uncertainty estimates.This integrated approach optimizes the use of existing core and logging data.Its applicability is confirmed in an oil project in West China.展开更多
In previous research on two-sided matching(TSM)decision,agents’preferences were often given in the form of exact values of ordinal numbers and linguistic phrase term sets.Nowdays,the matching agent cannot perform the...In previous research on two-sided matching(TSM)decision,agents’preferences were often given in the form of exact values of ordinal numbers and linguistic phrase term sets.Nowdays,the matching agent cannot perform the exact evaluation in the TSM situations due to the great fuzziness of human thought and the complexity of reality.Probability hesitant fuzzy sets,however,have grown in popularity due to their advantages in communicating complex information.Therefore,this paper develops a TSM decision-making approach with multi-attribute probability hesitant fuzzy sets and unknown attribute weight information.The agent attribute weight vector should be obtained by using the maximum deviation method and Hamming distance.The probabilistic hesitancy fuzzy information matrix of each agent is then arranged to determine the comprehensive evaluation of two matching agent sets.The agent satisfaction degree is calculated using the technique for order preference by similarity to ideal solution(TOPSIS).Additionally,the multi-object programming technique is used to establish a TSM method with the objective of maximizing the agent satisfaction of two-sided agents,and the matching schemes are then established by solving the built model.The study concludes by providing a real-world supply-demand scenario to illustrate the effectiveness of the proposed method.The proposed method is more flexible than prior research since it expresses evaluation information using probability hesitating fuzzy sets and can be used in scenarios when attribute weight information is unclear.展开更多
We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implemen...We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implementedthe charge self-consistent DFT+DMFT formalism by interfacing a full-potential all-electron DFT code with threehybridization expansion-based continuous-time quantum Monte Carlo impurity solvers.The benchmarks on several 3d,4fand 5f strongly correlated electron systems validated our formalism and implementation.Furthermore,within the LCANOframework,our formalism is general and the code architecture is extensible,so it can work as a bridge merging differentLCNAO DFT packages and impurity solvers to do charge self-consistent DFT+DMFT calculations.展开更多
This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the c...This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.展开更多
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea...The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.展开更多
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical ach...In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.展开更多
Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past...Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past three decades,significant progress in materials science,microfabrication,and various applications has boosted the development of promising functional microfluidic devices.In this review,the recent progress on novel microfluidic devices with various functions and applications is presented.First,the theory and numerical methods for studying the performance of microfluidic devices are briefly introduced.Then,materials and fabrication methods of functional microfluidic devices are summarized.Next,the recent significant advances in applications of microfluidic devices are highlighted,including heat sinks,clean water production,chemical reactions,sensors,biomedicine,capillaric circuits,wearable electronic devices,and microrobotics.Finally,perspectives on the challenges and future developments of functional microfluidic devices are presented.This review aims to inspire researchers from various fields engineering,materials,chemistry,mathematics,physics,and more—to collaborate and drive forward the development and applications of functional microfluidic devices,specifically for achieving carbon neutrality.展开更多
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t...The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.展开更多
In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.I...In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.In our research,we propose an optimization method to expedite density functional theory(DFT)calculations for systems with large aspect ratios,such as metallic nanorods,nanowires,or scanning tunneling microscope tips.This method focuses on employing basis set to expand the electron density,Coulomb potential,and exchange-correlation potential.By precomputing integrals and caching redundant results,this expansion streamlines the integration process,significantly accelerating DFT computations.As a case study,we have applied this optimization to metallic nanorod systems of various radii and lengths,obtaining corresponding ground-state electron densities and potentials.展开更多
Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Mean...Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Meanwhile,existing disease control methods often assume users’full compliance with measures like mandatory isolation,which does not align with the actual situation.To address these issues,this paper proposes a prospect theorybased framework to model users’decision-making process in epidemics and analyzes how irrationality affects individuals’behaviors and epidemic dynamics.According to the analysis results,irrationality tends to prompt conservative behaviors when the infection risk is low but encourages risk-seeking behaviors when the risk is high.Then,this paper proposes a behavior inducement algorithm to guide individuals’behaviors and control the spread of disease.Simulations and real user tests validate our analysis,and simulation results show that the proposed behavior inducement algorithm can effectively guide individuals’behavior.展开更多
Understanding the adsorption interactions between carbon materials and sulfur compounds has far-reaching impacts,in addition to their well-known important role in energy storage and conversion,such as lithium-ion batt...Understanding the adsorption interactions between carbon materials and sulfur compounds has far-reaching impacts,in addition to their well-known important role in energy storage and conversion,such as lithium-ion batteries.In this paper,properties of intrinsic B or Si single-atom doped,and B-Si codoped graphene(GR)and graphdiyne(GDY)were investigated by using density functional theory-based calculations,in which the optimal doping configurations were explored for potential applications in adsorbing sulfur compounds.Results showed that both B or Si single-atom doping and B-Si codoping could substantially enhance the electron transport properties of GR and GDY,improving their surface activity.Notably,B and Si atoms displayed synergistic effects for the codoped configurations,where B-Si codoped GR/GDY exhibited much better performance in the adsorption of sulfurcontaining chemicals than single-atom doped systems.In addition,results demonstrated that,after B-Si codoping,the adsorption energy and charge transfer amounts of GDY with sulfur compounds were much larger than those of GR,indicating that B-Si codoped GDY might be a favorable material for more effectively interacting with sulfur reagents.展开更多
文摘Although the construction of underground dams is one of the best methods to conserve water resources in arid and semi-arid regions,applying efficient methods for the selection of suitable sites for subsurface dam construction remains a challenge.Due to the costly and time-consuming methods of site selection for underground dam construction,this study aimed to present a new method using geographic information systems techniques and decision-making processes.The exclusionary criteria including fault,slope,hypsometry,land use,soil,stream,geology,and chemical properties of groundwater were selected for site selection of dam construction and inappropriate regions were omitted by integration and scoring layers in ArcGIS based on the Boolean logic.Finally,appropriate sites were prioritized using the Multi-Attribute Utility Theory.According to the results of the utility coefficient,seven sites were selected as the region for underground dam construction based on all criteria and experts’opinions.The site of Nazarabad dam was the best location for underground dam construction with a utility coefficient of 0.7137 followed by sites of Akhavan with a utility coefficient of 0.4633 and Mirshamsi with a utility coefficient of 0.4083.This study proposed a new approach for the construction of the subsurface dam at the proper site and help managers and decision-makers achieve sustainable water resources with limited facilities and capital and avoid wasting national capital.
基金supported by the National Basic Research Program of China (973 Program) (No. 2009CB219603)Key Special National Project (No. 2008ZX05035)Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated areas. First, we choose seismic attributes that are most sensitive to CBM content changes with the guidance of CBM content measured at well sites. Then the selected seismic attributes are fused using D-S evidence theory and the fusion results are used to predict CBM-enriched area. The application shows that the predicted CBM content and the measured values are basically consistent. The results indicate that using D-S evidence theory in seismic multi-attribute fusion to predict CBM-enriched areas is feasible.
基金supported by National Social Science Foundation of China (Grant No.17ZDA030).
文摘Probabilistic linguistic term sets(PLTSs)are an effective tool for expressing subjective human cognition that offer advantages in the field ofmulti-attribute decision-making(MADM).However,studies have found that PLTSs have lost their ability to accurately capture the views of decision-makers(DMs)in certain circumstances,such as when the DM hesitates between multiple linguistic terms or the decision information is incomplete,thus affecting their role in the decision-making process.Belief function theory is a leading streamof thought in uncertainty processing that is suitable for dealing with the limitations of PLTS.Therefore,the purpose of this study is to extend PLTS to incorporate belief function theory.First,we provide the basic concepts of the extended PLTS(i.e.,belief-based PLTS)through case analyses.Second,the aggregation operator of belief-based PLTS is defined with the ordered weighted average(OWA)-based soft likelihood function,which is improved by considering the reliability of the information source.Third,to measure the magnitude of different belief-based PLTSs,the belief interval of singleton is calculated,and the comparison method of belief-based PLTS is constructed based on probabilities.On the basis of the preceding discussion,we further develop an emergency decision framework that includes several novel techniques,such as attribute weight determination and decision information aggregation.Finally,the usefulness of the framework is demonstrated through a case study,and its effectiveness is illustrated through a series of comparisons.
基金supported by the National Natural Science Foundation of China under Grant Nos.12122401 and 12074007.
文摘In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.
文摘Multi-attribute decision problems where the performances of the alternatives are random variables are considered. The suggested approach grades the probabilities of preference of one alternative over another with respect to the same attribute. Based on the graded probabilistic dominance relation, the pairwise comparison information table is defined. The global preferences of the decision maker can be seen as a rough binary relation. The present paper proposes to approximate this preference relation by means of the graded probabilistic dominance relation with respect to the subsets of attributes. At last, the method is illustrated by an example.
文摘In real life,incomplete information,inaccurate data,and the preferences of decision-makers during qualitative judgment would impact the process of decision-making.As a technical instrument that can successfully handle uncertain information,Fermatean fuzzy sets have recently been used to solve the multi-attribute decision-making(MADM)problems.This paper proposes a Fermatean hesitant fuzzy information aggregation method to address the problem of fusion where the membership,non-membership,and priority are considered simultaneously.Combining the Fermatean hesitant fuzzy sets with Heronian Mean operators,this paper proposes the Fermatean hesitant fuzzy Heronian mean(FHFHM)operator and the Fermatean hesitant fuzzyweighted Heronian mean(FHFWHM)operator.Then,considering the priority relationship between attributes is often easier to obtain than the weight of attributes,this paper defines a new Fermatean hesitant fuzzy prioritized Heronian mean operator(FHFPHM),and discusses its elegant properties such as idempotency,boundedness and monotonicity in detail.Later,for problems with unknown weights and the Fermatean hesitant fuzzy information,aMADM approach based on prioritized attributes is proposed,which can effectively depict the correlation between attributes and avoid the influence of subjective factors on the results.Finally,a numerical example of multi-sensor electronic surveillance is applied to verify the feasibility and validity of the method proposed in this paper.
文摘Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.
基金supported by the National Natural Science Foundation of China(Nos.51977113,62293500,62293501 and 62293505).
文摘Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.
文摘BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to enhance the psychological well-being and overall quality of life for primipara,while also furnishing healthcare providers with efficacious interventions to tackle the psychological and physiological obstacles encountered during the stages of pregnancy and postpartum.AIM To explore the effect of timing theory combined with behavior change on selfefficacy,negative emotions and quality of life in patients with primipara.METHODS A total of 80 primipara cases were selected and admitted to our hospital between August 2020 and May 2022.These cases were divided into two groups,namely the observation group and the control group,with 40 cases in each group.The nursing interventions differed between the two groups,with the control group receiving routine nursing and the observation group receiving integrated nursing based on the timing theory and behavior change.The study aimed to compare the pre-and post-nursing scores of Chinese Perceived Stress Scale(CPSS),Edinburgh Postpartum Depression Scale(EPDS),Self-rating Anxiety Scale(SAS),breast milk knowledge,self-efficacy,and SF-36 quality of life in both groups.RESULTS After nursing,the CPSS,EPDS,and SAS scores of the two groups was significantly lower than that before nursing,and the CPSS,EPDS,and SAS scores of the observation group was significantly lower than that of the control group(P=0.002,P=0.011,and P=0.001 respectively).After nursing,the breastfeeding knowledge mastery,selfefficacy,and SF-36 quality of life scores was significantly higher than that before nursing,and the breastfeeding knowledge mastery(P=0.013),self-efficacy(P=0.008),and SF-36 quality of life(P=0.011)scores of the observation group was significantly higher than that of the control group.CONCLUSION The integration of timing theory and behavior change integrated theory has been found to be an effective approach in alleviating negative mood and stress experienced by primipara individuals,while also enhancing their selfefficacy and overall quality of life.This study focuses on the key concepts of timing theory,behavior change,primipara individuals,negative mood,and quality of life.
基金the Australian Government through the Australian Research Council's Discovery Projects funding scheme(Project DP190101592)the National Natural Science Foundation of China(Grant Nos.41972280 and 52179103).
文摘The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad measurements but lack finer resolution.Laboratory-based rock core measurements offer higher resolution but are resource-intensive.Conventionally,wireline logging and rock core measurements have been used independently.This study introduces a novel approach that integrates both data sources.The method leverages the detailed features from limited core data to enhance the resolution of wireline logging data.By combining machine learning with random field theory,the method allows for probabilistic predictions in regions with sparse data sampling.In this framework,12 parameters from wireline tests are used to predict trends in rock core data.The residuals are modeled using random field theory.The outcomes are high-resolution predictions that combine both the predicted trend and the probabilistic realizations of the residual.By utilizing unconditional and conditional random field theories,this method enables unconditional and conditional simulations of the underlying high-resolution rock compressional wave travel time profile and provides uncertainty estimates.This integrated approach optimizes the use of existing core and logging data.Its applicability is confirmed in an oil project in West China.
基金supported by the National Natural Science Foundation in China(Yue Qi,Project No.71861015).
文摘In previous research on two-sided matching(TSM)decision,agents’preferences were often given in the form of exact values of ordinal numbers and linguistic phrase term sets.Nowdays,the matching agent cannot perform the exact evaluation in the TSM situations due to the great fuzziness of human thought and the complexity of reality.Probability hesitant fuzzy sets,however,have grown in popularity due to their advantages in communicating complex information.Therefore,this paper develops a TSM decision-making approach with multi-attribute probability hesitant fuzzy sets and unknown attribute weight information.The agent attribute weight vector should be obtained by using the maximum deviation method and Hamming distance.The probabilistic hesitancy fuzzy information matrix of each agent is then arranged to determine the comprehensive evaluation of two matching agent sets.The agent satisfaction degree is calculated using the technique for order preference by similarity to ideal solution(TOPSIS).Additionally,the multi-object programming technique is used to establish a TSM method with the objective of maximizing the agent satisfaction of two-sided agents,and the matching schemes are then established by solving the built model.The study concludes by providing a real-world supply-demand scenario to illustrate the effectiveness of the proposed method.The proposed method is more flexible than prior research since it expresses evaluation information using probability hesitating fuzzy sets and can be used in scenarios when attribute weight information is unclear.
文摘We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implementedthe charge self-consistent DFT+DMFT formalism by interfacing a full-potential all-electron DFT code with threehybridization expansion-based continuous-time quantum Monte Carlo impurity solvers.The benchmarks on several 3d,4fand 5f strongly correlated electron systems validated our formalism and implementation.Furthermore,within the LCANOframework,our formalism is general and the code architecture is extensible,so it can work as a bridge merging differentLCNAO DFT packages and impurity solvers to do charge self-consistent DFT+DMFT calculations.
文摘This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.
文摘The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFB1804604).
文摘In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.
基金supported by the National Natural Science Foundation of China(52006056)the Key-Area Research and Development Program of Guangdong Province(2020B090923003)The project was also partly supported by Natural Research Institute for Family Planning as well。
文摘Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past three decades,significant progress in materials science,microfabrication,and various applications has boosted the development of promising functional microfluidic devices.In this review,the recent progress on novel microfluidic devices with various functions and applications is presented.First,the theory and numerical methods for studying the performance of microfluidic devices are briefly introduced.Then,materials and fabrication methods of functional microfluidic devices are summarized.Next,the recent significant advances in applications of microfluidic devices are highlighted,including heat sinks,clean water production,chemical reactions,sensors,biomedicine,capillaric circuits,wearable electronic devices,and microrobotics.Finally,perspectives on the challenges and future developments of functional microfluidic devices are presented.This review aims to inspire researchers from various fields engineering,materials,chemistry,mathematics,physics,and more—to collaborate and drive forward the development and applications of functional microfluidic devices,specifically for achieving carbon neutrality.
基金funded by the“Ling Yan”Research and Development Project of Science Technology Department of Zhejiang Province of China under Grants No.2022C03122Public Welfare Technology Application and Research Projects of Science Technology Department of Zhejiang Province of China under Grants No.LGF22F020006 and LGF21F010004.
文摘The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFA0211303)the National Natural Science Foundation of China(Grant No.91850207)the numerical calculations in this paper have been done on the supercomputing system in the Supercomputing Center of Wuhan University.
文摘In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.In our research,we propose an optimization method to expedite density functional theory(DFT)calculations for systems with large aspect ratios,such as metallic nanorods,nanowires,or scanning tunneling microscope tips.This method focuses on employing basis set to expand the electron density,Coulomb potential,and exchange-correlation potential.By precomputing integrals and caching redundant results,this expansion streamlines the integration process,significantly accelerating DFT computations.As a case study,we have applied this optimization to metallic nanorod systems of various radii and lengths,obtaining corresponding ground-state electron densities and potentials.
文摘Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Meanwhile,existing disease control methods often assume users’full compliance with measures like mandatory isolation,which does not align with the actual situation.To address these issues,this paper proposes a prospect theorybased framework to model users’decision-making process in epidemics and analyzes how irrationality affects individuals’behaviors and epidemic dynamics.According to the analysis results,irrationality tends to prompt conservative behaviors when the infection risk is low but encourages risk-seeking behaviors when the risk is high.Then,this paper proposes a behavior inducement algorithm to guide individuals’behaviors and control the spread of disease.Simulations and real user tests validate our analysis,and simulation results show that the proposed behavior inducement algorithm can effectively guide individuals’behavior.
基金the support of the National Natural Science Foundation of China(Grant No.51472074).
文摘Understanding the adsorption interactions between carbon materials and sulfur compounds has far-reaching impacts,in addition to their well-known important role in energy storage and conversion,such as lithium-ion batteries.In this paper,properties of intrinsic B or Si single-atom doped,and B-Si codoped graphene(GR)and graphdiyne(GDY)were investigated by using density functional theory-based calculations,in which the optimal doping configurations were explored for potential applications in adsorbing sulfur compounds.Results showed that both B or Si single-atom doping and B-Si codoping could substantially enhance the electron transport properties of GR and GDY,improving their surface activity.Notably,B and Si atoms displayed synergistic effects for the codoped configurations,where B-Si codoped GR/GDY exhibited much better performance in the adsorption of sulfurcontaining chemicals than single-atom doped systems.In addition,results demonstrated that,after B-Si codoping,the adsorption energy and charge transfer amounts of GDY with sulfur compounds were much larger than those of GR,indicating that B-Si codoped GDY might be a favorable material for more effectively interacting with sulfur reagents.