As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ...As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards.展开更多
The opaque property plays an important role in the operation of a security-critical system,implying that pre-defined secret information of the system is not able to be inferred through partially observing its behavior...The opaque property plays an important role in the operation of a security-critical system,implying that pre-defined secret information of the system is not able to be inferred through partially observing its behavior.This paper addresses the verification of current-state,initial-state,infinite-step,and K-step opacity of networked discrete event systems modeled by labeled Petri nets,where communication losses and delays are considered.Based on the symbolic technique for the representation of states in Petri nets,an observer and an estimator are designed for the verification of current-state and initial-state opacity,respectively.Then,we propose a structure called an I-observer that is combined with secret states to verify whether a networked discrete event system is infinite-step opaque or K-step opaque.Due to the utilization of symbolic approaches for the state-based opacity verification,the computation of the reachability graphs of labeled Petri nets is avoided,which dramatically reduces the computational overheads stemming from networked discrete event systems.展开更多
Dear Editor,This letter concerns the development of approximately bi-similar symbolic models for a discrete-time interconnected switched system(DT-ISS).The DT-ISS under consideration is formed by connecting multiple s...Dear Editor,This letter concerns the development of approximately bi-similar symbolic models for a discrete-time interconnected switched system(DT-ISS).The DT-ISS under consideration is formed by connecting multiple switched systems known as component switched systems(CSSs).Although the problem of constructing approximately bi-similar symbolic models for DT-ISS has been addressed in some literature,the previous works have relied on the assumption that all the subsystems of CSSs are incrementally input-state stable.展开更多
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i...Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.展开更多
Many countries list the Spring Festival as a national holiday,and about one-fifth of humanity celebrates this festival in various ways.THE Chinese New Year,also known as the Spring Festival,is a time-honored social an...Many countries list the Spring Festival as a national holiday,and about one-fifth of humanity celebrates this festival in various ways.THE Chinese New Year,also known as the Spring Festival,is a time-honored social and cultural tradition that has been celebrated for thousands of years.It is a festival that not only marks the inception of a new year in Chinese lunar calendar,but also acts as a symbolic bridge to connect individuals from different cultures and backgrounds.展开更多
Water Governance in China-Perspectives of Xi Jinping Author:Ministry of Water Resources Hardcover,512 pages Published by Foreign Languages Press Water has a vital symbolic significance in Chinese culture.Over 2,000 ye...Water Governance in China-Perspectives of Xi Jinping Author:Ministry of Water Resources Hardcover,512 pages Published by Foreign Languages Press Water has a vital symbolic significance in Chinese culture.Over 2,000 years ago,Lao Zi,the philosopher and founder of Taoism in the late Spring and Autumn Period(770-476 BC),noted,“The greatest virtue is like water,nurturing all living things without competing with them,”conveying the idea that true virtue,like flowing water,benefits all.展开更多
Rational design of high-performance electrocatalysts for hydrogen evolution reaction(HER)is vital for future renewable energy systems.The incorporation of foreign metal ions into catalysts can be an effective approach...Rational design of high-performance electrocatalysts for hydrogen evolution reaction(HER)is vital for future renewable energy systems.The incorporation of foreign metal ions into catalysts can be an effective approach to optimize its performance.However,there is a lack of systematic theoretical studies to reveal the quantitative relationships at the electronic level.Here,we develop a multi-level screening methodology to search for highly stable and active dopants for CoP catalysts.The density functional theory(DFT)calculations and symbolic regression(SR)were performed to investigate the relationship between the adsorption free energy(ΔG_(H^(*)))and 10 electronic parameters.The mathematic formulas derived from SR indicate that the difference of work function(ΔΦ)between doped metal and the acceptor plays the most important role in regulatingΔG_(H^(*)),followed by the d-band center(d-BC)of doped system.The descriptor of HER can be expressed asΔG_(H^(*))=1.59×√|0.188ΔΦ+d BC+0.120|1/2-0.166 with a high determination coefficient(R^(2)=0.807).Consistent with the theoretical prediction,experimental results show that the Al-CoP delivers superior electrocatalytic HER activity with a low overpotential of75 m V to drive a current density of 10 mA cm^(-2),while the overpotentials for undoped CoP,Mo-CoP,and V-CoP are 206,134,and 83 m V,respectively.The current work proves that theΔΦis the most significant regulatory parameter ofΔG_(H^(*))for ion-doped electrocatalysts.This finding can drive the discovery of high-performance ion-doped electrocatalysts,which is crucial for electrocatalytic water splitting.展开更多
Machine learning(ML)has powerful nonlinear processing and multivariate learning capabilities,so it has been widely utilised in the fatigue field.However,most ML methods are inexplicable black-box models that are diffi...Machine learning(ML)has powerful nonlinear processing and multivariate learning capabilities,so it has been widely utilised in the fatigue field.However,most ML methods are inexplicable black-box models that are difficult to apply in engineering practice.Symbolic regression(SR)is an interpretable machine learning method for determining the optimal fitting equation for datasets.In this study,domain knowledge-guided SR was used to determine a new fatigue crack growth(FCG)rate model.Three terms of the variable subtree ofΔK,R-ratio,andΔK_(th)were obtained by analysing eight traditional semi-empirical FCG rate models.Based on the FCG rate test data from other literature,the SR model was constructed using Al-7055-T7511.It was subsequently extended to other alloys(Ti-10V-2Fe-3Al,Ti-6Al-4V,Cr-Mo-V,LC9cs,Al-6013-T651,and Al-2324-T3)using multiple linear regression.Compared with the three semi-empirical FCG rate models,the SR model yielded higher prediction accuracy.This result demonstrates the potential of domain knowledge-guided SR for building the FCG rate model.展开更多
Radial Basis Function Neural Network(RBFNN)ensembles have long suffered from non-efficient training,where incorrect parameter settings can be computationally disastrous.This paper examines different evolutionary algor...Radial Basis Function Neural Network(RBFNN)ensembles have long suffered from non-efficient training,where incorrect parameter settings can be computationally disastrous.This paper examines different evolutionary algorithms for training the Symbolic Radial Basis Function Neural Network(SRBFNN)through the behavior’s integration of satisfiability programming.Inspired by evolutionary algorithms,which can iteratively find the nearoptimal solution,different Evolutionary Algorithms(EAs)were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation(SRBFNN-2SAT).The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms,including Genetic Algorithm(GA),Evolution Strategy Algorithm(ES),Differential Evolution Algorithm(DE),and Evolutionary Programming Algorithm(EP).Each of these methods is presented in the steps in the flowchart form which can be used for its straightforward implementation in any programming language.With the use of SRBFNN-2SAT,a training method based on these algorithms has been presented,then training has been compared among algorithms,which were applied in Microsoft Visual C++software using multiple metrics of performance,including Mean Absolute Relative Error(MARE),Root Mean Square Error(RMSE),Mean Absolute Percentage Error(MAPE),Mean Bias Error(MBE),Systematic Error(SD),Schwarz Bayesian Criterion(SBC),and Central Process Unit time(CPU time).Based on the results,the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms.It has been confirmed that the EP algorithm is quite effective in training and obtaining the best output weight,accompanied by the slightest iteration error,which minimizes the objective function of SRBFNN-2SAT.展开更多
Adolescence is a pivotal moment in shaping one’s character and holds great implications for one’s values and personal growth.The Gift of the Magi by O.Henry portrays how an ordinary young couple in difficult financi...Adolescence is a pivotal moment in shaping one’s character and holds great implications for one’s values and personal growth.The Gift of the Magi by O.Henry portrays how an ordinary young couple in difficult financial circumstances managed to show their love for each other,eulogizing truth,goodness,and beauty in humanity.We conducted a thorough examination of the significance of moral values conveyed in The Gift of the Magi for teenager education using the“situation-emotion-symbol”model that is based on Randall Collins’theory of interaction ritual chains in order to establish an interaction ritual chain model for moral education of teenagers.Our study reveals that situated cognition is useful in constructing the focus of attention for the moral education of teenagers;that shared emotion is the driving force for achieving moral education of teenagers;and that symbolic connections help teenagers put the virtues they’ve learned from The Gift of the Magi into action and provides effective measures that can significantly contribute to the cultivation and implementation of moral education among teenagers.展开更多
Araby is a short story by the famous Irish stream-of-consciousness writer James Joyce.Through a series of images,the novel expresses the theme of the story:the“mental paralysis”of Dubliners and the“spiritual Epiph...Araby is a short story by the famous Irish stream-of-consciousness writer James Joyce.Through a series of images,the novel expresses the theme of the story:the“mental paralysis”of Dubliners and the“spiritual Epiphany”of the little boy,which reflects the spiritual barren of Dubliners at that time.Through the analysis of the symbolic meaning of many images in the work,this paper reveals the social background and religious significance hidden behind the images.展开更多
Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is f...Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is finding ways to make software more reliable. This review provides an overview of techniques developed over time in the field of software model checking to solve the problem of detecting errors in program code. In addition, the challenges posed by this technology are discussed and ways to mitigate them in future research and applications are proposed. A comprehensive examination of the various model verification methods used to detect program code errors is intended to lay the foundation for future research in this area.展开更多
Utilizing the character of chaos, the sensitivity to the initial conditions, the concept and the structure of so-called chaotic transducer based on Tent map is provided in this paper creatively. The possibility of app...Utilizing the character of chaos, the sensitivity to the initial conditions, the concept and the structure of so-called chaotic transducer based on Tent map is provided in this paper creatively. The possibility of applying the basic theory of symbolic dynamics to the measurement is presented and proved. Then, the theoretical model of chaotic transducer is realized by using the switched capacitor and the basic experimental results are given. The transducer has such characters as high sensitivity, resolution, the simple structure and combining signal amplification with A/D. The new area of the application of chaos is exploited. Meanwhile, it provides a new method of exploring the structure of new type transducer.展开更多
Using the high sensitivity to initial values of chaotic systems, this paper describes an application of chaos in the field of measurement. A general method for signal coding based on symbolic sequences and the relatio...Using the high sensitivity to initial values of chaotic systems, this paper describes an application of chaos in the field of measurement. A general method for signal coding based on symbolic sequences and the relationship between the variable (to be measured) and its symbolic sequence are presented. Some performances of the chaos based measurement system are also discussed. Theoretical analysis and experimental results show that chaotic systems are potentially attractive in the field of measurement.展开更多
The connotation of city symbolic image was redefined in this study.Based on this,the main shortages of Yibin City symbolic image were listed and analyzed with an emphasis.And then the specific strategies to improve in...The connotation of city symbolic image was redefined in this study.Based on this,the main shortages of Yibin City symbolic image were listed and analyzed with an emphasis.And then the specific strategies to improve intrinsic image and symbolic image of the city were proposed with a pertinence,so as to provide reference for establishment of Yibin City symbolic image and development of export-oriented economy.展开更多
In order to effectively derive the inverse kinematic solution of the Delta robot and realize actuator control a description of the linear graph principle for automatically generating kinematic equations in a mechanica...In order to effectively derive the inverse kinematic solution of the Delta robot and realize actuator control a description of the linear graph principle for automatically generating kinematic equations in a mechanical system as well as the symbolic computation implementation of this procedure is reviewed and projected into the Delta robot. Based on the established linear graph representation the explicit symbolic expression of constraint equations and inverse kinematic solutions are obtained successfully using a symbolic computation engine Maple so that actuator control and trajectory tracking can be directly realized.Two practical motions the circular path and Adept motion are simulated for the validation of symbolic solutions respectively.Results indicate that the simulation satisfies the requirement of the quick motion within an acceptable threshold. Thus the precision of kinematic response can be confirmed and the correctness of inverse solution is verified.展开更多
A Rose for Emily is one of William Faulkner's most famous short stories.Through the representing of patriarchy influence on Emily,Faulkner shows his readers Emily's tragic life.From the diverse meanings of the...A Rose for Emily is one of William Faulkner's most famous short stories.Through the representing of patriarchy influence on Emily,Faulkner shows his readers Emily's tragic life.From the diverse meanings of the "Rose" to the debated themes,this story has been discussed before.This paper tries to analyze the three stages of Emily's struggle for love in order to represent the symbolism of the "Rose" from the perspective of feminism.It also represents the root of Emily's tragedy and the sympathy for the tragic fate of the Southern women.展开更多
A practical method of current mode circuit symbolic analysis using Mathematica is proposed. With the powerful symbolic manipulation capacity of Mathematica, current mode circuit symbolic analysis can be significantly ...A practical method of current mode circuit symbolic analysis using Mathematica is proposed. With the powerful symbolic manipulation capacity of Mathematica, current mode circuit symbolic analysis can be significantly simplified. The active devices are modelled by nullors. The examples of current mode filters using CCIIs are presented.展开更多
This thesis intends to use the symbolic structure of cigar to analyze the extract Blackmail from Arthur Hailey's short novel Hotel.The function of cigar in Blackmail can be concluded as a) constructive clue of the...This thesis intends to use the symbolic structure of cigar to analyze the extract Blackmail from Arthur Hailey's short novel Hotel.The function of cigar in Blackmail can be concluded as a) constructive clue of the plot progression,b) genteel carrier in making up characters.Rotating around the constructive clue,cigar,the writer of this thesis breaks down the whole story into seven parts,i.e.mystical entrance,prelude,crossfire,preparatory victory,absolute superiority,negotiation (absence of cigar) and discard.As to cigar's function of making up character,this thesis examines it from four main social and historical aspects,i.e.the origin of cigar in history,the social token of cigar,the complicated approaches of using cigar,and the historical stereotypes related to cigar smoking.展开更多
基金supported by the Meteorological Soft Science Project(Grant No.2023ZZXM29)the Natural Science Fund Project of Tianjin,China(Grant No.21JCYBJC00740)the Key Research and Development-Social Development Program of Jiangsu Province,China(Grant No.BE2021685).
文摘As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards.
基金supported by the National R&D Program of China(2018YFB 1700104)the Science and Technology Development FundMacao Special Administrative Region(MSAR)(0029/2023/RIA1)。
文摘The opaque property plays an important role in the operation of a security-critical system,implying that pre-defined secret information of the system is not able to be inferred through partially observing its behavior.This paper addresses the verification of current-state,initial-state,infinite-step,and K-step opacity of networked discrete event systems modeled by labeled Petri nets,where communication losses and delays are considered.Based on the symbolic technique for the representation of states in Petri nets,an observer and an estimator are designed for the verification of current-state and initial-state opacity,respectively.Then,we propose a structure called an I-observer that is combined with secret states to verify whether a networked discrete event system is infinite-step opaque or K-step opaque.Due to the utilization of symbolic approaches for the state-based opacity verification,the computation of the reachability graphs of labeled Petri nets is avoided,which dramatically reduces the computational overheads stemming from networked discrete event systems.
基金supported by the Natural Science Foundation of Shanghai Municipality(21ZR1423400)the National Natural Science Funds of China(62173217)NSFC/Royal Society Cooperation and Exchange Project(62111530154,IEC\NSFC\201107).
文摘Dear Editor,This letter concerns the development of approximately bi-similar symbolic models for a discrete-time interconnected switched system(DT-ISS).The DT-ISS under consideration is formed by connecting multiple switched systems known as component switched systems(CSSs).Although the problem of constructing approximately bi-similar symbolic models for DT-ISS has been addressed in some literature,the previous works have relied on the assumption that all the subsystems of CSSs are incrementally input-state stable.
文摘Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.
文摘Many countries list the Spring Festival as a national holiday,and about one-fifth of humanity celebrates this festival in various ways.THE Chinese New Year,also known as the Spring Festival,is a time-honored social and cultural tradition that has been celebrated for thousands of years.It is a festival that not only marks the inception of a new year in Chinese lunar calendar,but also acts as a symbolic bridge to connect individuals from different cultures and backgrounds.
文摘Water Governance in China-Perspectives of Xi Jinping Author:Ministry of Water Resources Hardcover,512 pages Published by Foreign Languages Press Water has a vital symbolic significance in Chinese culture.Over 2,000 years ago,Lao Zi,the philosopher and founder of Taoism in the late Spring and Autumn Period(770-476 BC),noted,“The greatest virtue is like water,nurturing all living things without competing with them,”conveying the idea that true virtue,like flowing water,benefits all.
基金Financial support from the National Natural Science Foundation of China(21676216)the Special project of Shaanxi Provincial Education Department(20JC034)+1 种基金GHfund B(202202022563)Hefei Advanced Computing Center。
文摘Rational design of high-performance electrocatalysts for hydrogen evolution reaction(HER)is vital for future renewable energy systems.The incorporation of foreign metal ions into catalysts can be an effective approach to optimize its performance.However,there is a lack of systematic theoretical studies to reveal the quantitative relationships at the electronic level.Here,we develop a multi-level screening methodology to search for highly stable and active dopants for CoP catalysts.The density functional theory(DFT)calculations and symbolic regression(SR)were performed to investigate the relationship between the adsorption free energy(ΔG_(H^(*)))and 10 electronic parameters.The mathematic formulas derived from SR indicate that the difference of work function(ΔΦ)between doped metal and the acceptor plays the most important role in regulatingΔG_(H^(*)),followed by the d-band center(d-BC)of doped system.The descriptor of HER can be expressed asΔG_(H^(*))=1.59×√|0.188ΔΦ+d BC+0.120|1/2-0.166 with a high determination coefficient(R^(2)=0.807).Consistent with the theoretical prediction,experimental results show that the Al-CoP delivers superior electrocatalytic HER activity with a low overpotential of75 m V to drive a current density of 10 mA cm^(-2),while the overpotentials for undoped CoP,Mo-CoP,and V-CoP are 206,134,and 83 m V,respectively.The current work proves that theΔΦis the most significant regulatory parameter ofΔG_(H^(*))for ion-doped electrocatalysts.This finding can drive the discovery of high-performance ion-doped electrocatalysts,which is crucial for electrocatalytic water splitting.
基金Supported by Sichuan Provincial Science and Technology Program(Grant No.2022YFH0075)Opening Project of State Key Laboratory of Performance Monitoring and Protecting of Rail Transit Infrastructure(Grant No.HJGZ2021113)Independent Research Project of State Key Laboratory of Traction Power(Grant No.2022TPL_T03).
文摘Machine learning(ML)has powerful nonlinear processing and multivariate learning capabilities,so it has been widely utilised in the fatigue field.However,most ML methods are inexplicable black-box models that are difficult to apply in engineering practice.Symbolic regression(SR)is an interpretable machine learning method for determining the optimal fitting equation for datasets.In this study,domain knowledge-guided SR was used to determine a new fatigue crack growth(FCG)rate model.Three terms of the variable subtree ofΔK,R-ratio,andΔK_(th)were obtained by analysing eight traditional semi-empirical FCG rate models.Based on the FCG rate test data from other literature,the SR model was constructed using Al-7055-T7511.It was subsequently extended to other alloys(Ti-10V-2Fe-3Al,Ti-6Al-4V,Cr-Mo-V,LC9cs,Al-6013-T651,and Al-2324-T3)using multiple linear regression.Compared with the three semi-empirical FCG rate models,the SR model yielded higher prediction accuracy.This result demonstrates the potential of domain knowledge-guided SR for building the FCG rate model.
基金This work is supported by Ministry of Higher Education(MOHE)through Fundamental Research Grant Scheme(FRGS)(FRGS/1/2020/STG06/UTHM/03/7).
文摘Radial Basis Function Neural Network(RBFNN)ensembles have long suffered from non-efficient training,where incorrect parameter settings can be computationally disastrous.This paper examines different evolutionary algorithms for training the Symbolic Radial Basis Function Neural Network(SRBFNN)through the behavior’s integration of satisfiability programming.Inspired by evolutionary algorithms,which can iteratively find the nearoptimal solution,different Evolutionary Algorithms(EAs)were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation(SRBFNN-2SAT).The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms,including Genetic Algorithm(GA),Evolution Strategy Algorithm(ES),Differential Evolution Algorithm(DE),and Evolutionary Programming Algorithm(EP).Each of these methods is presented in the steps in the flowchart form which can be used for its straightforward implementation in any programming language.With the use of SRBFNN-2SAT,a training method based on these algorithms has been presented,then training has been compared among algorithms,which were applied in Microsoft Visual C++software using multiple metrics of performance,including Mean Absolute Relative Error(MARE),Root Mean Square Error(RMSE),Mean Absolute Percentage Error(MAPE),Mean Bias Error(MBE),Systematic Error(SD),Schwarz Bayesian Criterion(SBC),and Central Process Unit time(CPU time).Based on the results,the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms.It has been confirmed that the EP algorithm is quite effective in training and obtaining the best output weight,accompanied by the slightest iteration error,which minimizes the objective function of SRBFNN-2SAT.
文摘Adolescence is a pivotal moment in shaping one’s character and holds great implications for one’s values and personal growth.The Gift of the Magi by O.Henry portrays how an ordinary young couple in difficult financial circumstances managed to show their love for each other,eulogizing truth,goodness,and beauty in humanity.We conducted a thorough examination of the significance of moral values conveyed in The Gift of the Magi for teenager education using the“situation-emotion-symbol”model that is based on Randall Collins’theory of interaction ritual chains in order to establish an interaction ritual chain model for moral education of teenagers.Our study reveals that situated cognition is useful in constructing the focus of attention for the moral education of teenagers;that shared emotion is the driving force for achieving moral education of teenagers;and that symbolic connections help teenagers put the virtues they’ve learned from The Gift of the Magi into action and provides effective measures that can significantly contribute to the cultivation and implementation of moral education among teenagers.
文摘Araby is a short story by the famous Irish stream-of-consciousness writer James Joyce.Through a series of images,the novel expresses the theme of the story:the“mental paralysis”of Dubliners and the“spiritual Epiphany”of the little boy,which reflects the spiritual barren of Dubliners at that time.Through the analysis of the symbolic meaning of many images in the work,this paper reveals the social background and religious significance hidden behind the images.
文摘Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is finding ways to make software more reliable. This review provides an overview of techniques developed over time in the field of software model checking to solve the problem of detecting errors in program code. In addition, the challenges posed by this technology are discussed and ways to mitigate them in future research and applications are proposed. A comprehensive examination of the various model verification methods used to detect program code errors is intended to lay the foundation for future research in this area.
文摘Utilizing the character of chaos, the sensitivity to the initial conditions, the concept and the structure of so-called chaotic transducer based on Tent map is provided in this paper creatively. The possibility of applying the basic theory of symbolic dynamics to the measurement is presented and proved. Then, the theoretical model of chaotic transducer is realized by using the switched capacitor and the basic experimental results are given. The transducer has such characters as high sensitivity, resolution, the simple structure and combining signal amplification with A/D. The new area of the application of chaos is exploited. Meanwhile, it provides a new method of exploring the structure of new type transducer.
文摘Using the high sensitivity to initial values of chaotic systems, this paper describes an application of chaos in the field of measurement. A general method for signal coding based on symbolic sequences and the relationship between the variable (to be measured) and its symbolic sequence are presented. Some performances of the chaos based measurement system are also discussed. Theoretical analysis and experimental results show that chaotic systems are potentially attractive in the field of measurement.
基金Supported by Youth Fund Project of Department of Education of Sichuan Province(09SB116)~~
文摘The connotation of city symbolic image was redefined in this study.Based on this,the main shortages of Yibin City symbolic image were listed and analyzed with an emphasis.And then the specific strategies to improve intrinsic image and symbolic image of the city were proposed with a pertinence,so as to provide reference for establishment of Yibin City symbolic image and development of export-oriented economy.
基金The National Natural Science Foundation of China(No.51205208)
文摘In order to effectively derive the inverse kinematic solution of the Delta robot and realize actuator control a description of the linear graph principle for automatically generating kinematic equations in a mechanical system as well as the symbolic computation implementation of this procedure is reviewed and projected into the Delta robot. Based on the established linear graph representation the explicit symbolic expression of constraint equations and inverse kinematic solutions are obtained successfully using a symbolic computation engine Maple so that actuator control and trajectory tracking can be directly realized.Two practical motions the circular path and Adept motion are simulated for the validation of symbolic solutions respectively.Results indicate that the simulation satisfies the requirement of the quick motion within an acceptable threshold. Thus the precision of kinematic response can be confirmed and the correctness of inverse solution is verified.
文摘A Rose for Emily is one of William Faulkner's most famous short stories.Through the representing of patriarchy influence on Emily,Faulkner shows his readers Emily's tragic life.From the diverse meanings of the "Rose" to the debated themes,this story has been discussed before.This paper tries to analyze the three stages of Emily's struggle for love in order to represent the symbolism of the "Rose" from the perspective of feminism.It also represents the root of Emily's tragedy and the sympathy for the tragic fate of the Southern women.
文摘A practical method of current mode circuit symbolic analysis using Mathematica is proposed. With the powerful symbolic manipulation capacity of Mathematica, current mode circuit symbolic analysis can be significantly simplified. The active devices are modelled by nullors. The examples of current mode filters using CCIIs are presented.
文摘This thesis intends to use the symbolic structure of cigar to analyze the extract Blackmail from Arthur Hailey's short novel Hotel.The function of cigar in Blackmail can be concluded as a) constructive clue of the plot progression,b) genteel carrier in making up characters.Rotating around the constructive clue,cigar,the writer of this thesis breaks down the whole story into seven parts,i.e.mystical entrance,prelude,crossfire,preparatory victory,absolute superiority,negotiation (absence of cigar) and discard.As to cigar's function of making up character,this thesis examines it from four main social and historical aspects,i.e.the origin of cigar in history,the social token of cigar,the complicated approaches of using cigar,and the historical stereotypes related to cigar smoking.