In the framework of an overlapping generations model, forward-looking monetary policy roles and backward-looking monetary policy rules were investigated. It is shown that the monetary steady state is more likely to be...In the framework of an overlapping generations model, forward-looking monetary policy roles and backward-looking monetary policy rules were investigated. It is shown that the monetary steady state is more likely to be indeterminate under an active forwardlooking rule than under the corresponding backward-looking rule. It is also shown that backward-looking roles can render the monetary steady state unstable.展开更多
A fter 60 years of im plem entation, the ethnic regional autonomous policy has provided basic p o litica l support for promoting the common development and prosperity of a ll ethnic groups.
The application scope of the forward scatter radar(FSR)based on the Global Navigation Satellite System(GNSS)can be expanded by improving the detection capability.Firstly,the forward-scatter signal model when the targe...The application scope of the forward scatter radar(FSR)based on the Global Navigation Satellite System(GNSS)can be expanded by improving the detection capability.Firstly,the forward-scatter signal model when the target crosses the baseline is constructed.Then,the detection method of the for-ward-scatter signal based on the Rényi entropy of time-fre-quency distribution is proposed and the detection performance with different time-frequency distributions is compared.Simula-tion results show that the method based on the smooth pseudo Wigner-Ville distribution(SPWVD)can achieve the best perfor-mance.Next,combined with the geometry of FSR,the influence on detection performance of the relative distance between the target and the baseline is analyzed.Finally,the proposed method is validated by the anechoic chamber measurements and the results show that the detection ability has a 10 dB improvement compared with the common constant false alarm rate(CFAR)detection.展开更多
In today’s society where the economy is developing rapidly and the process of urbanization is accelerating,the traffic in major cities in China is facing tremendous pressure.The economy of Beijing has developed rapid...In today’s society where the economy is developing rapidly and the process of urbanization is accelerating,the traffic in major cities in China is facing tremendous pressure.The economy of Beijing has developed rapidly,its population is dense,the living standard of people has improved significantly,and the number of cars has increased dramatically.From the end of 2005 to the end of November 2010,motor vehicles in Beijing increased from about 2.58 million to about 4.69 million.The problem of traffic congestion has become more prominent,affecting the daily lives of the residents.展开更多
Viability of decentralizing policing in Nigeria had been on the front burner of security discourse since Nigeria returned to democratic governance in 1999.Valid points had been put forward by both those in support and...Viability of decentralizing policing in Nigeria had been on the front burner of security discourse since Nigeria returned to democratic governance in 1999.Valid points had been put forward by both those in support and those in opposition.The Community Policing Department of the Nigeria Police had remained more of an administrative unit with little impact beyond the Police Community Relations Committee activities.Rising cases of herdsmen attacks of various communities,terrorist insurgency in the North-East,kidnappings across the different geo-political zones had resulted in the need to interrogate the efficacy of effective community policing and state policing as viable options to combating rising security challenges.The study adopted qualitative method,and being a library research relied entirely on secondary data.Sources of data included journals,relevant textbooks,newspapers,magazines,and materials downloaded from internet.The paper argues that the traditional security agencies had failed to effectively combat the many security challenges that Nigeria faces.The combination of the official security agencies and the military had failed to effectively combat insecurity in the country.The local vigilante groups on the other hand had made valuable inroad in curtailing some of the security challenges including terrorist insurgency as a result of their knowledge of the terrain.The paper concludes that to effectively combat the many security challenges,there is a need for new policy framework at the federal and state levels that would decentralize policing and give legal backing for collaboration between the official security agencies under the federal government and state security outfits including the vigilante.展开更多
Dear Editor,In this letter,the multi-objective optimal control problem of nonlinear discrete-time systems is investigated.A data-driven policy gradient algorithm is proposed in which the action-state value function is...Dear Editor,In this letter,the multi-objective optimal control problem of nonlinear discrete-time systems is investigated.A data-driven policy gradient algorithm is proposed in which the action-state value function is used to evaluate the policy.In the policy improvement process,the policy gradient based method is employed.展开更多
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social ...Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context.展开更多
Owing to the complex lithology of unconventional reservoirs,field interpreters usually need to provide a basis for interpretation using logging simulation models.Among the various detection tools that use nuclear sour...Owing to the complex lithology of unconventional reservoirs,field interpreters usually need to provide a basis for interpretation using logging simulation models.Among the various detection tools that use nuclear sources,the detector response can reflect various types of information of the medium.The Monte Carlo method is one of the primary methods used to obtain nuclear detection responses in complex environments.However,this requires a computational process with extensive random sampling,consumes considerable resources,and does not provide real-time response results.Therefore,a novel fast forward computational method(FFCM)for nuclear measurement that uses volumetric detection constraints to rapidly calculate the detector response in various complex environments is proposed.First,the data library required for the FFCM is built by collecting the detection volume,detector counts,and flux sensitivity functions through a Monte Carlo simulation.Then,based on perturbation theory and the Rytov approximation,a model for the detector response is derived using the flux sensitivity function method and a one-group diffusion model.The environmental perturbation is constrained to optimize the model according to the tool structure and the impact of the formation and borehole within the effective detection volume.Finally,the method is applied to a neutron porosity tool for verification.In various complex simulation environments,the maximum relative error between the calculated porosity results of Monte Carlo and FFCM was 6.80%,with a rootmean-square error of 0.62 p.u.In field well applications,the formation porosity model obtained using FFCM was in good agreement with the model obtained by interpreters,which demonstrates the validity and accuracy of the proposed method.展开更多
In the case of reverse drag of normal faulting, the displacement and horizontal extension are determined based on the established equations for the three mechanisms: rigid body, vertical shear and inclined shear. Ther...In the case of reverse drag of normal faulting, the displacement and horizontal extension are determined based on the established equations for the three mechanisms: rigid body, vertical shear and inclined shear. There are three sub-cases of basal detachment for the rigid body model: horizontal detachment, antithetic detachment and synthetic detachment. For the rigid body model, the established equations indicate that the total displacement on the synthetic base (D<sub>t2</sub>) is the largest, that on the horizontal base (D<sub>t1</sub>) is moderate, and that on the antithetic base (D<sub>t3</sub>) is the smallest. On the other hand, the value of (D<sub>t1</sub>) is larger than the displacement for the vertical shear (D<sub>t4</sub>). The value of (D<sub>t1</sub>) is larger than or less than the displacement for the inclined shear (D<sub>t5</sub>) depending on the original fault dip δ<sub>0</sub>, bedding angle θ, and the angle of shear direction β. For all original parameters, the value of D<sub>t5</sub> is less than the value of D<sub>t4</sub>. Also, by comparing three rotation mechanisms, we find that the inclined shear produces largest extension, the rigid body model with horizontal detachment produces the smallest extension, and the vertical shear model produces moderate extension.展开更多
The River Chief System (RCS) has evolved from local innovative practices to a national water governance strategy to address the current challenges in China’s water environmental management. In contrast to existing re...The River Chief System (RCS) has evolved from local innovative practices to a national water governance strategy to address the current challenges in China’s water environmental management. In contrast to existing research that focuses on the strengths, weaknesses, and improvements of RCS, this study uses literature study to reveal the dynamic evolution of RCS through three phases, with RCS spreading from developed coastal areas to central and western inland regions. RCS’s diffusion path involves vertical diffusion between central and local levels and horizontal diffusion among local governments. Moreover, RCS has also achieved conceptual spillover, gradually expanding into other governance domains, such as the Lake Chief System, the Field Chief System, the Forestry Chief System, and the integration of multiple chief roles. However, it is essential to scrutinize the phenomenon of applying similar governance mechanisms to different areas, as it may result in challenges such as overburdening local governments, insufficient public participation, oversimplification of differences in natural resource endowments, and limited applicability. This study also provides suggestions on how to address these challenges. The study contributes theoretical insights and policy implications, providing a foundation for practical policy innovation.展开更多
Insertional mutation,phenotypic evaluation,and mutated gene cloning are widely used to clone genes from scratch.Exogenous genes can be integrated into the genome during non-homologous end joining(NHEJ)of the double-st...Insertional mutation,phenotypic evaluation,and mutated gene cloning are widely used to clone genes from scratch.Exogenous genes can be integrated into the genome during non-homologous end joining(NHEJ)of the double-strand breaks of DNA,causing insertional mutation.The random insertional mutant library constructed using this method has become a method of forward genetics for gene cloning.However,the establishment of a random insertional mutant library requires a high transformation efficiency of exogenous genes.Many microalgal species show a low transformation efficiency,making constructing random insertional mutant libraries difficult.In this study,we established a highly efficient transformation method for constructing a random insertional mutant library of Nannochloropsis oceanica,and tentatively tried to isolate its genes to prove the feasibility of the method.A gene that may control the growth rate and cell size was identified.This method will facilitate the genetic studies of N.oceanica,which should also be a reference for other microalgal species.展开更多
H9N2 virus has been widely distributed in wild birds and poultry around the world since its first emergence in the United States of America in 1966(Gu et al.2017;Carnaccini and Perez 2020).The virus appeared in chicke...H9N2 virus has been widely distributed in wild birds and poultry around the world since its first emergence in the United States of America in 1966(Gu et al.2017;Carnaccini and Perez 2020).The virus appeared in chickens in China in the early 1990s,and over the last two decades has gradually become the dominant epidemic subtype(Sun and Liu 2015;Bi et al.2020).Although H9N2 virus infection alone cannot cause severe disease or death in poultry,H9N2 virus-infected birds experience a degree of egg production drop and can be easily infected by other pathogens,thus causing economic losses for poultry industry.展开更多
Obesity is gaining prominence as a serious public health challenge in the Southeast Asia(SEA)region,with an alarming rate of increase in its prevalence.Countries in the region have shown commitment to curbing the rise...Obesity is gaining prominence as a serious public health challenge in the Southeast Asia(SEA)region,with an alarming rate of increase in its prevalence.Countries in the region have shown commitment to curbing the rise of obesity by establishing policies,strategies,and action plans.This paper summarises the current situation and strategies undertaken to combat obesity and related chronic diseases.Although a range of policies and strate-gies have been developed,including national nutrition action plans,community intervention programmes,fiscal measures,nutrition labelling to promote healthier choices,countries in the region are struggling to make signifi-cant progress toward halting the scourge of obesity.It is imperative to strengthen existing health systems with a paradigm shift from a focus on"sick care"to and enhancing nutrition initiatives to support obesity prevention.A comprehensive and coordinated approach is essential,one that emphasises high-level coordination across all lev-els of government and multiple sectors,and a unified plan rather than fragmented initiatives.For strategies to be effective and sustainable,they must address the fundamental environmental determinants of poor dietary choices and nutritional inequalities.A more holistic approach is clearly needed to improve the entire food environment,which in SEA countries must include the multitude of eating places where large segments of the population"eat out"everyday to meet their energy and nutrient needs.There is a recognised need for more comprehensive measures to promote healthy eating among school children and ensure a supportive environment for lifelong healthy habits.This paper calls for a whole-of-government,whole-of-society approach that combines changes to the fundamental food environment and accompanied by systematic monitoring and surveillance systems to achieve long-lasting health outcomes.展开更多
From June 2008 to August 2013,approximately 67 kt of CO_(2) was injected into a deep saline formation at the Ketzin pilot CO_(2) storage site.During injection,3D seismic surveys have been performed to monitor the migr...From June 2008 to August 2013,approximately 67 kt of CO_(2) was injected into a deep saline formation at the Ketzin pilot CO_(2) storage site.During injection,3D seismic surveys have been performed to monitor the migration of sequestered CO_(2).Seismic monitoring results are limited by the acquisition and signal-to-noise ratio of the acquired data.The multiphysical reservoir simulation provides information regarding the CO_(2) fluid behavior,and the approximated model should be calibrated with the monitoring results.In this work,property models are delivered from the multiphysical model during 3D repeated seismic surveys.The simulated seismic data based on the models are compared with the real data,and the results validate the effectiveness of the multiphysical inversion method.Time-lapse analysis shows the trend of CO_(2) migration during and after injection.展开更多
In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This me...In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This method is aimed at organizations such as companies and schools that are transitioning from traditional access control models to the ABAC model.The manual retrieval and analysis involved in this transition are inefficient,prone to errors,and costly.Most organizations have high-level specifications defined for security policies that include a set of access control policies,which often exist in the form of natural language documents.Utilizing this rich source of information,our method effectively identifies and extracts the necessary attributes and rules for access control from natural language documents,thereby constructing and optimizing access control policies.This work transforms the problem of policy automation generation into two tasks:extraction of access control statements andmining of access control attributes.First,the Chat General Language Model(ChatGLM)isemployed to extract access control-related statements from a wide range of natural language documents by constructing unique prompts and leveraging the model’s In-Context Learning to contextualize the statements.Then,the Iterated Dilated-Convolutions-Conditional Random Field(ID-CNN-CRF)model is used to annotate access control attributes within these extracted statements,including subject attributes,object attributes,and action attributes,thus reassembling new access control policies.Experimental results show that our method,compared to baseline methods,achieved the highest F1 score of 0.961,confirming the model’s effectiveness and accuracy.展开更多
Purpose:The transformative impact of disruptive technologies on the restructuring of the times has attracted widespread global attention.This study aims to analyze the characteristics and shortcomings of China’s arti...Purpose:The transformative impact of disruptive technologies on the restructuring of the times has attracted widespread global attention.This study aims to analyze the characteristics and shortcomings of China’s artificial intelligence(AI)disruptive technology policy,and to put forward suggestions for optimizing China’s AI disruptive technology policy.Design/methodology/approach:Develop a three-dimensional analytical framework for“policy tools-policy actors-policy themes”and apply policy tools,social network analysis,and LDA topic model to conduct a comprehensive analysis of the utilization of policy tools,cooperative relationships among policy actors,and the trends in policy theme settings within China’s innovative AI technology policy.Findings:We find that the collaborative relationship among the policy actors of AI disruptive technology in China is insufficiently close.Marginal subjects exhibit low participation in the cooperation network and overly rely on central subjects,forming a“center-periphery”network structure.Policy tool usage is predominantly focused on supply and environmental types,with a severe inadequacy in demand-side policy tool utilization.Policy themes are diverse,encompassing topics such as“Intelligent Services”“Talent Cultivation”“Information Security”and“Technological Innovation”,which will remain focal points.Under the themes of“Intelligent Services”and“Intelligent Governance”,policy tool usage is relatively balanced,with close collaboration among policy entities.However,the theme of“AI Theoretical System”lacks a comprehensive understanding of tool usage and necessitates enhanced cooperation with other policy entities.Research limitations:The data sources and experimental scope are subject to certain limitations,potentially introducing biases and imperfections into the research results,necessitating further validation and refinement.Practical implications:The study introduces a three-dimensional analysis framework for disruptive technology policy texts,which is significant for formulating and enhancing disruptive technology policies.Originality/value:This study utilizes text mining and content analysis techniques to quantitatively analyze disruptive technology policy texts.It systematically evaluates China’s AI policies quantitatively,focusing on policy tools,policy actors,policy themes.The study uncovers the characteristics and deficiencies of current AI policies,offering recommendations for formulating and enhancing disruptive technology policies.展开更多
A novel temperature and salinity discriminative sensing method based on forward Brillouin scattering(FBS)in 1060-XP single-mode fiber(SMF)is proposed.The measured frequency shifts corresponding to different radial aco...A novel temperature and salinity discriminative sensing method based on forward Brillouin scattering(FBS)in 1060-XP single-mode fiber(SMF)is proposed.The measured frequency shifts corresponding to different radial acoustic modes in 1060-XP SMF show different sensitivities to temperature and salinity.Based on the new phenomenon that different radial acoustic modes have different frequency shift-temperature and frequency shift-salinity coefficients,we propose a novel method for simultaneously measuring temperature and salinity by measuring the frequency shift changes of two FBS scattering peaks.In a proof-of-concept experiment,the temperature and salinity measurement errors are 0.12℃and 0.29%,respectively.The proposed method for simultaneously measuring temperature and salinity has the potential applications such as ocean surveying,food manufacturing and pharmaceutical engineering.展开更多
Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains...Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains, particularly agriculture, to maximize their potential, it is crucial to identify emerging priority areas and existing research gaps for future research agendas. As a contribution to this effort, this paper employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to review the state-of-the-art in the field of climate services for disaster risk management. A comprehensive search across five literature databases combined with a snowball search method using ResearchRabbit was conducted and yielded 242 peer-reviewed articles, book sections, and reports over 2013-2023 after the screening process. The analysis revealed flood, drought, and food insecurity as major climate-related disasters addressed in the reviewed literature. Major climate services addressed included early warning systems, (sub)seasonal forecasts and impact-based warnings. Grounded in the policy processes’ theoretical perspective, the main focus identified and discussed three prevailing policy-oriented priority areas: 1) development of climate services, 2) use-adoption-uptake, and 3) evaluation of climate services. In response to the limitations of the prevalent supply-driven and top-down approach to climate services promotion, co-production emerges as a cross-cutting critical aspect of the identified priority areas. Despite the extensive research in the field, more attention is needed, particularly pronounced in the science-policy interface perspective, which in practice bridges scientific knowledge and policy decisions for effective policy processes. This perspective offers a valuable analytical lens as an entry point for further investigation. Hence, future research agendas would generate insightful evidence by scrutinizing this critical aspect given its importance to institutions and climate services capacity, to better understand intricate facets of the development and the integration of climate services into disaster risk management.展开更多
The hydrodynamic performance of a high forward-speed ship in obliquely propagating waves is numerically examined to assess both free motions and wave field in comparison with a low forward-speed ship.This numerical mo...The hydrodynamic performance of a high forward-speed ship in obliquely propagating waves is numerically examined to assess both free motions and wave field in comparison with a low forward-speed ship.This numerical model is based on the time-domain potential flow theory and higher-order boundary element method,where an analytical expression is completely expanded to determine the base-unsteady coupling flow imposed on the moving condition of the ship.The ship in the numerical model may possess different advancing speeds,i.e.stationary,low speed,and high speed.The role of the water depth,wave height,wave period,and incident wave angle is analyzed by means of the accurate numerical model.It is found that the resonant motions of the high forward-speed ship are triggered by comparison with the stationary one.More specifically,a higher forward speed generates a V-shaped wave region with a larger elevation,which induces stronger resonant motions corresponding to larger wave periods.The shoaling effect is adverse to the motion of the low-speed ship,but is beneficial to the resonant motion of the high-speed ship.When waves obliquely propagate toward the ship,the V-shaped wave region would be broken due to the coupling effect between roll and pitch motions.It is also demonstrated that the maximum heave motion occurs in beam seas for stationary cases but occurs in head waves for high speeds.However,the variation of the pitch motion with period is hardly affected by wave incident angles.展开更多
基金Project supported by National Natural Science Foundation of China (Grant No. 70071012)
文摘In the framework of an overlapping generations model, forward-looking monetary policy roles and backward-looking monetary policy rules were investigated. It is shown that the monetary steady state is more likely to be indeterminate under an active forwardlooking rule than under the corresponding backward-looking rule. It is also shown that backward-looking roles can render the monetary steady state unstable.
文摘A fter 60 years of im plem entation, the ethnic regional autonomous policy has provided basic p o litica l support for promoting the common development and prosperity of a ll ethnic groups.
基金This work was supported by the National Natural Science Foundation of China(62071475,61890541,62171447).
文摘The application scope of the forward scatter radar(FSR)based on the Global Navigation Satellite System(GNSS)can be expanded by improving the detection capability.Firstly,the forward-scatter signal model when the target crosses the baseline is constructed.Then,the detection method of the for-ward-scatter signal based on the Rényi entropy of time-fre-quency distribution is proposed and the detection performance with different time-frequency distributions is compared.Simula-tion results show that the method based on the smooth pseudo Wigner-Ville distribution(SPWVD)can achieve the best perfor-mance.Next,combined with the geometry of FSR,the influence on detection performance of the relative distance between the target and the baseline is analyzed.Finally,the proposed method is validated by the anechoic chamber measurements and the results show that the detection ability has a 10 dB improvement compared with the common constant false alarm rate(CFAR)detection.
文摘In today’s society where the economy is developing rapidly and the process of urbanization is accelerating,the traffic in major cities in China is facing tremendous pressure.The economy of Beijing has developed rapidly,its population is dense,the living standard of people has improved significantly,and the number of cars has increased dramatically.From the end of 2005 to the end of November 2010,motor vehicles in Beijing increased from about 2.58 million to about 4.69 million.The problem of traffic congestion has become more prominent,affecting the daily lives of the residents.
文摘Viability of decentralizing policing in Nigeria had been on the front burner of security discourse since Nigeria returned to democratic governance in 1999.Valid points had been put forward by both those in support and those in opposition.The Community Policing Department of the Nigeria Police had remained more of an administrative unit with little impact beyond the Police Community Relations Committee activities.Rising cases of herdsmen attacks of various communities,terrorist insurgency in the North-East,kidnappings across the different geo-political zones had resulted in the need to interrogate the efficacy of effective community policing and state policing as viable options to combating rising security challenges.The study adopted qualitative method,and being a library research relied entirely on secondary data.Sources of data included journals,relevant textbooks,newspapers,magazines,and materials downloaded from internet.The paper argues that the traditional security agencies had failed to effectively combat the many security challenges that Nigeria faces.The combination of the official security agencies and the military had failed to effectively combat insecurity in the country.The local vigilante groups on the other hand had made valuable inroad in curtailing some of the security challenges including terrorist insurgency as a result of their knowledge of the terrain.The paper concludes that to effectively combat the many security challenges,there is a need for new policy framework at the federal and state levels that would decentralize policing and give legal backing for collaboration between the official security agencies under the federal government and state security outfits including the vigilante.
基金the National Natural Science Foundation of China(61922063,62273255,62150026)in part by the Shanghai International Science and Technology Cooperation Project(21550760900,22510712000)+1 种基金the Shanghai Municipal Science and Technology Major Project(2021SHZDZX0100)the Fundamental Research Funds for the Central Universities。
文摘Dear Editor,In this letter,the multi-objective optimal control problem of nonlinear discrete-time systems is investigated.A data-driven policy gradient algorithm is proposed in which the action-state value function is used to evaluate the policy.In the policy improvement process,the policy gradient based method is employed.
基金supported by the NationalNatural Science Foundation of China(61972136)the Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation(T201410,T2020017)+1 种基金the Natural Science Foundation of Xiaogan City(XGKJ2022010095,XGKJ2022010094)the Science and Technology Research Project of Education Department of Hubei Province(No.Q20222704).
文摘Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context.
基金This work is supported by National Natural Science Foundation of China(Nos.U23B20151 and 52171253).
文摘Owing to the complex lithology of unconventional reservoirs,field interpreters usually need to provide a basis for interpretation using logging simulation models.Among the various detection tools that use nuclear sources,the detector response can reflect various types of information of the medium.The Monte Carlo method is one of the primary methods used to obtain nuclear detection responses in complex environments.However,this requires a computational process with extensive random sampling,consumes considerable resources,and does not provide real-time response results.Therefore,a novel fast forward computational method(FFCM)for nuclear measurement that uses volumetric detection constraints to rapidly calculate the detector response in various complex environments is proposed.First,the data library required for the FFCM is built by collecting the detection volume,detector counts,and flux sensitivity functions through a Monte Carlo simulation.Then,based on perturbation theory and the Rytov approximation,a model for the detector response is derived using the flux sensitivity function method and a one-group diffusion model.The environmental perturbation is constrained to optimize the model according to the tool structure and the impact of the formation and borehole within the effective detection volume.Finally,the method is applied to a neutron porosity tool for verification.In various complex simulation environments,the maximum relative error between the calculated porosity results of Monte Carlo and FFCM was 6.80%,with a rootmean-square error of 0.62 p.u.In field well applications,the formation porosity model obtained using FFCM was in good agreement with the model obtained by interpreters,which demonstrates the validity and accuracy of the proposed method.
文摘In the case of reverse drag of normal faulting, the displacement and horizontal extension are determined based on the established equations for the three mechanisms: rigid body, vertical shear and inclined shear. There are three sub-cases of basal detachment for the rigid body model: horizontal detachment, antithetic detachment and synthetic detachment. For the rigid body model, the established equations indicate that the total displacement on the synthetic base (D<sub>t2</sub>) is the largest, that on the horizontal base (D<sub>t1</sub>) is moderate, and that on the antithetic base (D<sub>t3</sub>) is the smallest. On the other hand, the value of (D<sub>t1</sub>) is larger than the displacement for the vertical shear (D<sub>t4</sub>). The value of (D<sub>t1</sub>) is larger than or less than the displacement for the inclined shear (D<sub>t5</sub>) depending on the original fault dip δ<sub>0</sub>, bedding angle θ, and the angle of shear direction β. For all original parameters, the value of D<sub>t5</sub> is less than the value of D<sub>t4</sub>. Also, by comparing three rotation mechanisms, we find that the inclined shear produces largest extension, the rigid body model with horizontal detachment produces the smallest extension, and the vertical shear model produces moderate extension.
文摘The River Chief System (RCS) has evolved from local innovative practices to a national water governance strategy to address the current challenges in China’s water environmental management. In contrast to existing research that focuses on the strengths, weaknesses, and improvements of RCS, this study uses literature study to reveal the dynamic evolution of RCS through three phases, with RCS spreading from developed coastal areas to central and western inland regions. RCS’s diffusion path involves vertical diffusion between central and local levels and horizontal diffusion among local governments. Moreover, RCS has also achieved conceptual spillover, gradually expanding into other governance domains, such as the Lake Chief System, the Field Chief System, the Forestry Chief System, and the integration of multiple chief roles. However, it is essential to scrutinize the phenomenon of applying similar governance mechanisms to different areas, as it may result in challenges such as overburdening local governments, insufficient public participation, oversimplification of differences in natural resource endowments, and limited applicability. This study also provides suggestions on how to address these challenges. The study contributes theoretical insights and policy implications, providing a foundation for practical policy innovation.
基金the National Key R&D Program of China(Nos.2018YFD0901506,2018YFD0900305)the Marine S&T Fund of Shandong Province for Pilot National Laboratory for Marine Science and Technology(Qingdao)(No.2018 SDKJ0406-3)。
文摘Insertional mutation,phenotypic evaluation,and mutated gene cloning are widely used to clone genes from scratch.Exogenous genes can be integrated into the genome during non-homologous end joining(NHEJ)of the double-strand breaks of DNA,causing insertional mutation.The random insertional mutant library constructed using this method has become a method of forward genetics for gene cloning.However,the establishment of a random insertional mutant library requires a high transformation efficiency of exogenous genes.Many microalgal species show a low transformation efficiency,making constructing random insertional mutant libraries difficult.In this study,we established a highly efficient transformation method for constructing a random insertional mutant library of Nannochloropsis oceanica,and tentatively tried to isolate its genes to prove the feasibility of the method.A gene that may control the growth rate and cell size was identified.This method will facilitate the genetic studies of N.oceanica,which should also be a reference for other microalgal species.
基金supported by the National Key Research and Development Program of China(2021YFD1800200 and 2021YFC2301700)the National Natural Science Foundation of China(32192451)+1 种基金the Innovation Program of the Chinese Academy of Agricultural Sciences(CAASCSLPDCP-202301)the earmarked fund for CARS41(CARS-41).
文摘H9N2 virus has been widely distributed in wild birds and poultry around the world since its first emergence in the United States of America in 1966(Gu et al.2017;Carnaccini and Perez 2020).The virus appeared in chickens in China in the early 1990s,and over the last two decades has gradually become the dominant epidemic subtype(Sun and Liu 2015;Bi et al.2020).Although H9N2 virus infection alone cannot cause severe disease or death in poultry,H9N2 virus-infected birds experience a degree of egg production drop and can be easily infected by other pathogens,thus causing economic losses for poultry industry.
文摘Obesity is gaining prominence as a serious public health challenge in the Southeast Asia(SEA)region,with an alarming rate of increase in its prevalence.Countries in the region have shown commitment to curbing the rise of obesity by establishing policies,strategies,and action plans.This paper summarises the current situation and strategies undertaken to combat obesity and related chronic diseases.Although a range of policies and strate-gies have been developed,including national nutrition action plans,community intervention programmes,fiscal measures,nutrition labelling to promote healthier choices,countries in the region are struggling to make signifi-cant progress toward halting the scourge of obesity.It is imperative to strengthen existing health systems with a paradigm shift from a focus on"sick care"to and enhancing nutrition initiatives to support obesity prevention.A comprehensive and coordinated approach is essential,one that emphasises high-level coordination across all lev-els of government and multiple sectors,and a unified plan rather than fragmented initiatives.For strategies to be effective and sustainable,they must address the fundamental environmental determinants of poor dietary choices and nutritional inequalities.A more holistic approach is clearly needed to improve the entire food environment,which in SEA countries must include the multitude of eating places where large segments of the population"eat out"everyday to meet their energy and nutrient needs.There is a recognised need for more comprehensive measures to promote healthy eating among school children and ensure a supportive environment for lifelong healthy habits.This paper calls for a whole-of-government,whole-of-society approach that combines changes to the fundamental food environment and accompanied by systematic monitoring and surveillance systems to achieve long-lasting health outcomes.
基金supported by the National Natural Science Foundation of China(Grant No.42025403)the Youth Innovation Promotion Association,Chinese Academy of Sciences(Grant No.2023074).
文摘From June 2008 to August 2013,approximately 67 kt of CO_(2) was injected into a deep saline formation at the Ketzin pilot CO_(2) storage site.During injection,3D seismic surveys have been performed to monitor the migration of sequestered CO_(2).Seismic monitoring results are limited by the acquisition and signal-to-noise ratio of the acquired data.The multiphysical reservoir simulation provides information regarding the CO_(2) fluid behavior,and the approximated model should be calibrated with the monitoring results.In this work,property models are delivered from the multiphysical model during 3D repeated seismic surveys.The simulated seismic data based on the models are compared with the real data,and the results validate the effectiveness of the multiphysical inversion method.Time-lapse analysis shows the trend of CO_(2) migration during and after injection.
基金supported by the National Natural Science Foundation of China Project(No.62302540),please visit their website at https://www.nsfc.gov.cn/(accessed on 18 June 2024)The Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020),Further details can be found at http://xt.hnkjt.gov.cn/data/pingtai/(accessed on 18 June 2024)Natural Science Foundation of Henan Province Youth Science Fund Project(No.232300420422),you can visit https://kjt.henan.gov.cn/2022/09-02/2599082.html(accessed on 18 June 2024).
文摘In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This method is aimed at organizations such as companies and schools that are transitioning from traditional access control models to the ABAC model.The manual retrieval and analysis involved in this transition are inefficient,prone to errors,and costly.Most organizations have high-level specifications defined for security policies that include a set of access control policies,which often exist in the form of natural language documents.Utilizing this rich source of information,our method effectively identifies and extracts the necessary attributes and rules for access control from natural language documents,thereby constructing and optimizing access control policies.This work transforms the problem of policy automation generation into two tasks:extraction of access control statements andmining of access control attributes.First,the Chat General Language Model(ChatGLM)isemployed to extract access control-related statements from a wide range of natural language documents by constructing unique prompts and leveraging the model’s In-Context Learning to contextualize the statements.Then,the Iterated Dilated-Convolutions-Conditional Random Field(ID-CNN-CRF)model is used to annotate access control attributes within these extracted statements,including subject attributes,object attributes,and action attributes,thus reassembling new access control policies.Experimental results show that our method,compared to baseline methods,achieved the highest F1 score of 0.961,confirming the model’s effectiveness and accuracy.
基金supported by the National Social Science Foundation of China(Grant No.22BTQ089).
文摘Purpose:The transformative impact of disruptive technologies on the restructuring of the times has attracted widespread global attention.This study aims to analyze the characteristics and shortcomings of China’s artificial intelligence(AI)disruptive technology policy,and to put forward suggestions for optimizing China’s AI disruptive technology policy.Design/methodology/approach:Develop a three-dimensional analytical framework for“policy tools-policy actors-policy themes”and apply policy tools,social network analysis,and LDA topic model to conduct a comprehensive analysis of the utilization of policy tools,cooperative relationships among policy actors,and the trends in policy theme settings within China’s innovative AI technology policy.Findings:We find that the collaborative relationship among the policy actors of AI disruptive technology in China is insufficiently close.Marginal subjects exhibit low participation in the cooperation network and overly rely on central subjects,forming a“center-periphery”network structure.Policy tool usage is predominantly focused on supply and environmental types,with a severe inadequacy in demand-side policy tool utilization.Policy themes are diverse,encompassing topics such as“Intelligent Services”“Talent Cultivation”“Information Security”and“Technological Innovation”,which will remain focal points.Under the themes of“Intelligent Services”and“Intelligent Governance”,policy tool usage is relatively balanced,with close collaboration among policy entities.However,the theme of“AI Theoretical System”lacks a comprehensive understanding of tool usage and necessitates enhanced cooperation with other policy entities.Research limitations:The data sources and experimental scope are subject to certain limitations,potentially introducing biases and imperfections into the research results,necessitating further validation and refinement.Practical implications:The study introduces a three-dimensional analysis framework for disruptive technology policy texts,which is significant for formulating and enhancing disruptive technology policies.Originality/value:This study utilizes text mining and content analysis techniques to quantitatively analyze disruptive technology policy texts.It systematically evaluates China’s AI policies quantitatively,focusing on policy tools,policy actors,policy themes.The study uncovers the characteristics and deficiencies of current AI policies,offering recommendations for formulating and enhancing disruptive technology policies.
基金supported by the Na-tional Natural Science Foundation of China(Nos.62175105,61875086)Fundamental Research Funds for the Cen-tral Universities of China(No.ILB240041A24)。
文摘A novel temperature and salinity discriminative sensing method based on forward Brillouin scattering(FBS)in 1060-XP single-mode fiber(SMF)is proposed.The measured frequency shifts corresponding to different radial acoustic modes in 1060-XP SMF show different sensitivities to temperature and salinity.Based on the new phenomenon that different radial acoustic modes have different frequency shift-temperature and frequency shift-salinity coefficients,we propose a novel method for simultaneously measuring temperature and salinity by measuring the frequency shift changes of two FBS scattering peaks.In a proof-of-concept experiment,the temperature and salinity measurement errors are 0.12℃and 0.29%,respectively.The proposed method for simultaneously measuring temperature and salinity has the potential applications such as ocean surveying,food manufacturing and pharmaceutical engineering.
文摘Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains, particularly agriculture, to maximize their potential, it is crucial to identify emerging priority areas and existing research gaps for future research agendas. As a contribution to this effort, this paper employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to review the state-of-the-art in the field of climate services for disaster risk management. A comprehensive search across five literature databases combined with a snowball search method using ResearchRabbit was conducted and yielded 242 peer-reviewed articles, book sections, and reports over 2013-2023 after the screening process. The analysis revealed flood, drought, and food insecurity as major climate-related disasters addressed in the reviewed literature. Major climate services addressed included early warning systems, (sub)seasonal forecasts and impact-based warnings. Grounded in the policy processes’ theoretical perspective, the main focus identified and discussed three prevailing policy-oriented priority areas: 1) development of climate services, 2) use-adoption-uptake, and 3) evaluation of climate services. In response to the limitations of the prevalent supply-driven and top-down approach to climate services promotion, co-production emerges as a cross-cutting critical aspect of the identified priority areas. Despite the extensive research in the field, more attention is needed, particularly pronounced in the science-policy interface perspective, which in practice bridges scientific knowledge and policy decisions for effective policy processes. This perspective offers a valuable analytical lens as an entry point for further investigation. Hence, future research agendas would generate insightful evidence by scrutinizing this critical aspect given its importance to institutions and climate services capacity, to better understand intricate facets of the development and the integration of climate services into disaster risk management.
基金supported by the National Natural Science Foundation of China(Grant Nos.52271278 and 52111530137)the Natural Science Foundation of Jiangsu Province(Grant No.SBK2022020579)the Newton Advanced Fellowships by the Royal Society(Grant No.NAF\R1\180304).
文摘The hydrodynamic performance of a high forward-speed ship in obliquely propagating waves is numerically examined to assess both free motions and wave field in comparison with a low forward-speed ship.This numerical model is based on the time-domain potential flow theory and higher-order boundary element method,where an analytical expression is completely expanded to determine the base-unsteady coupling flow imposed on the moving condition of the ship.The ship in the numerical model may possess different advancing speeds,i.e.stationary,low speed,and high speed.The role of the water depth,wave height,wave period,and incident wave angle is analyzed by means of the accurate numerical model.It is found that the resonant motions of the high forward-speed ship are triggered by comparison with the stationary one.More specifically,a higher forward speed generates a V-shaped wave region with a larger elevation,which induces stronger resonant motions corresponding to larger wave periods.The shoaling effect is adverse to the motion of the low-speed ship,but is beneficial to the resonant motion of the high-speed ship.When waves obliquely propagate toward the ship,the V-shaped wave region would be broken due to the coupling effect between roll and pitch motions.It is also demonstrated that the maximum heave motion occurs in beam seas for stationary cases but occurs in head waves for high speeds.However,the variation of the pitch motion with period is hardly affected by wave incident angles.