Nitrogen(N)serves as an essential nutrient for yield formation across diverse crop types.However,agricultural production encounters numerous challenges,notably high N fertilizer rates coupled with low N use efficiency...Nitrogen(N)serves as an essential nutrient for yield formation across diverse crop types.However,agricultural production encounters numerous challenges,notably high N fertilizer rates coupled with low N use efficiency and serious environmental pollution.Deep placement of nitrogen fertilizer(DPNF)is an agronomic measure that shows promise in addressing these issues.This review aims to offer a comprehensive understanding of DPNF,beginning with a succinct overview of its development and methodologies for implementation.Subsequently,the optimal fertilization depth and influencing factors for different crops are analyzed and discussed.Additionally,it investigates the regulation and mechanism underlying the DPNF on crop development,yield,N use efficiency and greenhouse gas emissions.Finally,the review delineates the limitations and challenges of this technology and provides suggestions for its improvement and application.This review provides valuable insight and reference for the promotion and adoption of DPNF in agricultural practice.展开更多
We sought to compare the safety and accuracy of a new free-hand pedicle screw placement technique to that of the conventional technique. One hundred fifty-three consecutive adult patients with simple fracture in the t...We sought to compare the safety and accuracy of a new free-hand pedicle screw placement technique to that of the conventional technique. One hundred fifty-three consecutive adult patients with simple fracture in the tho- racic or/and lumbar spine were alternately assigned to either the new free-hand or the conventional group. In the new free-hand technique group, preoperative computerized tomography (CT) images were used to calculate the targeted medial-lateral angle of each pedicle trajectory and the pedicle screw was inserted perpendicular to the corresponding supraspinal ligament. In the conventional technique group, the medial-lateral and cranial-caudal angle of each pedicle trajectory was determined by intraoperatively under fluoroscopic guidance. The accuracy rate of pedicle screw placement, the time of intraoperative fluoroscopy, the operating time and the amount of blood loss during operation were respectively compared. All screws were analyzed by using intraoperative ra- diographs, intraoperative triggered electromyography (EMG) monitoring data, postoperative CT data and clinical outcomes. The accuracy rate of pedicle screw placement in the new free-hand technique group and the conven- tional technique group was 96.3% and 94.2% (P 〈 0.05), respectively. The intraoperative fluoroscopy time of the new technique group was less than that of the conventional technique group (5.37 seconds vs. 8.79 seconds, P 〈 0.05). However, there was no statistical difference in the operating time and the amount of blood loss during op- eration (P 〉 0.05). Pedicle screw placement with the free-hand technique which keeps the screw perpendicular to the supraspinal ligament is an accurate, reliable and safe technique to treat simple fracture in the thoracic or lum- bar spine.展开更多
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middl...To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function entities.Due to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation fairness.Then a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances placement.Finally, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms.展开更多
In this paper, we analyse the deployment of middlebox. For a given network information and policy requirements, an attempt is made to determine the optimal location of middlebox to achieve the best performance. In ter...In this paper, we analyse the deployment of middlebox. For a given network information and policy requirements, an attempt is made to determine the optimal location of middlebox to achieve the best performance. In terms of the end-to-end delay as a performance optimization index, a distributed middlebox placement algorithm based on potential game is proposed. Through extensive simulations, it demonstrates that the proposed algorithm achieves the near-optimal solution, and the end-to-end delay decreases significantly.展开更多
To improve the anti-jamming and interference mitigation ability of the UAV-aided communication systems, this paper investigates the channel selection optimization problem in face of both internal mutual interference a...To improve the anti-jamming and interference mitigation ability of the UAV-aided communication systems, this paper investigates the channel selection optimization problem in face of both internal mutual interference and external malicious jamming. A cooperative anti-jamming and interference mitigation method based on local altruistic is proposed to optimize UAVs’ channel selection. Specifically, a Stackelberg game is modeled to formulate the confrontation relationship between UAVs and the jammer. A local altruistic game is modeled with each UAV considering the utilities of both itself and other UAVs. A distributed cooperative anti-jamming and interference mitigation algorithm is proposed to obtain the Stackelberg equilibrium. Finally, the convergence of the proposed algorithm and the impact of the transmission power on the system loss value are analyzed, and the anti-jamming performance of the proposed algorithm can be improved by around 64% compared with the existing algorithms.展开更多
The pursuit-evasion game models the strategic interaction among players, attracting attention in many realistic scenarios, such as missile guidance, unmanned aerial vehicles, and target defense. Existing studies mainl...The pursuit-evasion game models the strategic interaction among players, attracting attention in many realistic scenarios, such as missile guidance, unmanned aerial vehicles, and target defense. Existing studies mainly concentrate on the cooperative pursuit of multiple players in two-dimensional pursuit-evasion games. However, these approaches can hardly be applied to practical situations where players usually move in three-dimensional space with a three-degree-of-freedom control. In this paper,we make the first attempt to investigate the equilibrium strategy of the realistic pursuit-evasion game, in which the pursuer follows a three-degree-of-freedom control, and the evader moves freely. First, we describe the pursuer's three-degree-of-freedom control and the evader's relative coordinate. We then rigorously derive the equilibrium strategy by solving the retrogressive path equation according to the Hamilton-Jacobi-Bellman-Isaacs(HJBI) method, which divides the pursuit-evasion process into the navigation and acceleration phases. Besides, we analyze the maximum allowable speed for the pursuer to capture the evader successfully and provide the strategy with which the evader can escape when the pursuer's speed exceeds the threshold. We further conduct comparison tests with various unilateral deviations to verify that the proposed strategy forms a Nash equilibrium.展开更多
Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also ...Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also cause privacy leakage and energy consumption.How to optimize the energy consumption in distributed communication systems,while ensuring the privacy of users and model accuracy,has become an urgent challenge.In this paper,we define the FL as a 3-layer architecture including users,agents and server.In order to find a balance among model training accuracy,privacy-preserving effect,and energy consumption,we design the training process of FL as game models.We use an extensive game tree to analyze the key elements that influence the players’decisions in the single game,and then find the incentive mechanism that meet the social norms through the repeated game.The experimental results show that the Nash equilibrium we obtained satisfies the laws of reality,and the proposed incentive mechanism can also promote users to submit high-quality data in FL.Following the multiple rounds of play,the incentive mechanism can help all players find the optimal strategies for energy,privacy,and accuracy of FL in distributed communication systems.展开更多
A three-dimensional reconstruction of rough fracture surfaces of hydraulically fractured rock outcrops is carried out by casting process,a large-scale experimental setup for visualizing rough fractures is built to per...A three-dimensional reconstruction of rough fracture surfaces of hydraulically fractured rock outcrops is carried out by casting process,a large-scale experimental setup for visualizing rough fractures is built to perform proppant transport experiments.The typical characteristics of proppant transport and placement in rough fractures and its intrinsic mechanisms are investigated,and the influences of fracture inclination,fracture width and fracturing fluid viscosity on proppant transport and placement in rough fractures are analyzed.The results show that the rough fractures cause variations in the shape of the flow channel and the fluid flow pattern,resulting in the bridging buildup during proppant transport to form unfilled zone,the emergence of multiple complex flow patterns such as channeling,reverse flow and bypassing of sand-carrying fluid,and the influence on the stability of the sand dune.The proppant has a higher placement rate in inclined rough fractures,with a maximum increase of 22.16 percentage points in the experiments compared to vertical fractures,but exhibits poor stability of the sand dune.Reduced fracture width aggravates the bridging of proppant and induces higher pumping pressure.Increasing the viscosity of the fracturing fluid can weaken the proppant bridging phenomenon caused by the rough fractures.展开更多
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf...Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.展开更多
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.How...Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.However,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud computing.An approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing costs.This approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of applications.In this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing cost.We consider four cost-types for application deployment:Computation,communication,energy consumption,and violations.The proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the system.An extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art approaches.The results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost.展开更多
In the realm of aerial warfare,the protection of Unmanned Aerial Vehicles(UAVs) against adversarial threats is crucial.In order to balance the impact of response delays and the demand for onboard applications,this pap...In the realm of aerial warfare,the protection of Unmanned Aerial Vehicles(UAVs) against adversarial threats is crucial.In order to balance the impact of response delays and the demand for onboard applications,this paper derives three analytical game strategies for the active defense of UAVs from differential game theory,accommodating the first-order dynamic delays.The targeted UAV executes evasive maneuvers and launches a defending missile to intercept the attacking missile,which constitutes a UAVMissile-Defender(UMD) three-body game problem.We explore two distinct operational paradigms:the first involves the UAV and the defender working collaboratively to intercept the incoming threat,while the second prioritizes UAV self-preservation,with independent maneuvering away from potentially sacrificial engagements.Starting with model linearization and order reduction,the Collaborative Interception Strategy(CIS) is first derived via a linear quadratic differential game formulation.Building upon CIS,we further explore two distinct strategies:the Informed Defender Interception Strategy(IDIS),which utilizes UAV maneuvering information,and the Unassisted Defender Interception Strategy(UDIS),which does not rely on UAV maneuvering information.Additionally,we investigate the conditions for the existence of saddle point solutions and their relationship with vehicle maneuverability and response agility.The simulations demonstrate the effectiveness and advantages of the proposed strategies.展开更多
1.Introduction In August 2024,over 4400 Paralympic athletes will gather in Paris for the Paralympic Summer Games—the pinnacle of every Paralympian’s(Para athletes competing at the Paralympic Games)career to showcase...1.Introduction In August 2024,over 4400 Paralympic athletes will gather in Paris for the Paralympic Summer Games—the pinnacle of every Paralympian’s(Para athletes competing at the Paralympic Games)career to showcase their ability and skills.Their training,preparation,and effort in the years leading up to the Games are unparalleled.To achieve success,Paralympians specifically rely on a medical support team to achieve their goals.So,what is required of the medical support team to prepare Paralympians to get ready,set,and go to Paris 2024?展开更多
Objective: To study the problematic use of video games among secondary school students in the city of Parakou in 2023. Methods: Descriptive cross-sectional study conducted in the commune of Parakou from December 2022 ...Objective: To study the problematic use of video games among secondary school students in the city of Parakou in 2023. Methods: Descriptive cross-sectional study conducted in the commune of Parakou from December 2022 to July 2023. The study population consisted of students regularly enrolled in public and private secondary schools in the city of Parakou for the 2022-2023 academic year. A two-stage non-proportional stratified sampling technique combined with simple random sampling was adopted. The Problem Video Game Playing (PVP) scale was used to assess problem gambling in the study population, while anxiety and depression were assessed using the Hospital Anxiety and Depression Scale (HADS). Results: A total of 1030 students were included. The mean age of the pupils surveyed was 15.06 ± 2.68 years, with extremes of 10 and 28 years. The [13 - 18] age group was the most represented, with a proportion of 59.6% (614) in the general population. Females predominated, at 52.8% (544), with a sex ratio of 0.89. The prevalence of problematic video game use was 24.9%, measured using the Video Game Playing scale. Associated factors were male gender (p = 0.005), pocket money under 10,000 cfa (p = 0.001) and between 20,000 - 90,000 cfa (p = 0.030), addictive family behavior (p < 0.001), monogamous family (p = 0.023), good relationship with father (p = 0.020), organization of video game competitions (p = 0.001) and definite anxiety (p Conclusion: Substance-free addiction is struggling to attract the attention it deserves, as it did in its infancy everywhere else. This study complements existing data and serves as a reminder of the need to focus on this group of addictions, whose problematic use of video games remains the most frequent due to its accessibility and social tolerance. Preventive action combined with curative measures remains the most effective means of combating the problem at national level.展开更多
The controller is a main component in the Software-Defined Networking(SDN)framework,which plays a significant role in enabling programmability and orchestration for 5G and next-generation networks.In SDN,frequent comm...The controller is a main component in the Software-Defined Networking(SDN)framework,which plays a significant role in enabling programmability and orchestration for 5G and next-generation networks.In SDN,frequent communication occurs between network switches and the controller,which manages and directs traffic flows.If the controller is not strategically placed within the network,this communication can experience increased delays,negatively affecting network performance.Specifically,an improperly placed controller can lead to higher end-to-end(E2E)delay,as switches must traverse more hops or encounter greater propagation delays when communicating with the controller.This paper introduces a novel approach using Deep Q-Learning(DQL)to dynamically place controllers in Software-Defined Internet of Things(SD-IoT)environments,with the goal of minimizing E2E delay between switches and controllers.E2E delay,a crucial metric for network performance,is influenced by two key factors:hop count,which measures the number of network nodes data must traverse,and propagation delay,which accounts for the physical distance between nodes.Our approach models the controller placement problem as a Markov Decision Process(MDP).In this model,the network configuration at any given time is represented as a“state,”while“actions”correspond to potential decisions regarding the placement of controllers or the reassignment of switches to controllers.Using a Deep Q-Network(DQN)to approximate the Q-function,the system learns the optimal controller placement by maximizing the cumulative reward,which is defined as the negative of the E2E delay.Essentially,the lower the delay,the higher the reward the system receives,enabling it to continuously improve its controller placement strategy.The experimental results show that our DQL-based method significantly reduces E2E delay when compared to traditional benchmark placement strategies.By dynamically learning from the network’s real-time conditions,the proposed method ensures that controller placement remains efficient and responsive,reducing communication delays and enhancing overall network performance.展开更多
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver...Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances.展开更多
Automated fiber placement(AFP)enables the efficient and precise fabrication of complex-shaped aerospace composite structures with lightweight and high-performance properties.However,due to the excessive compression on...Automated fiber placement(AFP)enables the efficient and precise fabrication of complex-shaped aerospace composite structures with lightweight and high-performance properties.However,due to the excessive compression on the inner edge of the tow placed along the curved trajectory,the resulting defects represented by buckling and wrinkles in spatial tow steering can induce poor manufacturing accuracy and quality degradation of products.In this paper,a theoretical model of tow buckling based on the first-order shear deformation laminate theory,linear elastic adhesion interface and Hertz compaction contact theory is proposed to analyze the formation mechanism of the wrinkles and predict the formation of defects by solving the critical radius of the trajectory,and finite element analysis involving the cohesive zone modeling(CZM)is innovated to simulate the local buckling state of the steered tow in AFP.Additionally,numerical parametric studies and experimental results indicate that mechanical properties and geometric parameters of the prepreg,the curvature of the placement trajectory and critical process parameters have a significant impact on buckling formation,and optimization of process parameters can achieve effective suppression of placement defects.This research proposes a theoretical modeling method for tow buckling,and conducts in-depth research on defect formation and suppression methods based on finite element simulation and placement experiments.展开更多
Given a graph g=( V,A ) , we define a space of subgraphs M with the binary operation of union and the unique decomposition property into blocks. This space allows us to discuss a notion of minimal subgraphs (minimal c...Given a graph g=( V,A ) , we define a space of subgraphs M with the binary operation of union and the unique decomposition property into blocks. This space allows us to discuss a notion of minimal subgraphs (minimal coalitions) that are of interest for the game. Additionally, a partition of the game is defined in terms of the gain of each block, and subsequently, a solution to the game is defined based on distributing to each player (node and edge) present in each block a payment proportional to their contribution to the coalition.展开更多
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t...The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.展开更多
Fiber is highly escapable in conventional slickwater,making it difficult to form fiber-proppant agglomerate with proppant and exhibit limited effectiveness.To solve these problems,a novel structure stabilizer(SS)is de...Fiber is highly escapable in conventional slickwater,making it difficult to form fiber-proppant agglomerate with proppant and exhibit limited effectiveness.To solve these problems,a novel structure stabilizer(SS)is developed.Through microscopic structural observations and performance evaluations in indoor experiments,the mechanism of proppant placement under the action of the SS and the effects of the SS on proppant placement dimensions and fracture conductivity were elucidated.The SS facilitates the formation of robust fiber-proppant agglomerates by polymer,fiber,and quartz sand.Compared to bare proppants,these agglomerates exhibit reduced density,increased volume,and enlarged contact area with the fluid during settlement,leading to heightened buoyancy and drag forces,ultimately resulting in slower settling velocities and enhanced transportability into deeper regions of the fracture.Co-injecting the fiber and the SS alongside the proppant into the reservoir effectively reduces the fiber escape rate,increases the proppant volume in the slickwater,and boosts the proppant placement height,conveyance distance and fracture conductivity,while also decreasing the proppant backflow.Experimental results indicate an optimal SS mass fraction of 0.3%.The application of this SS in over 80 wells targeting tight gas,shale oil,and shale gas reservoirs has substantiated its strong adaptability and general suitability for meeting the production enhancement,cost reduction,and sand control requirements of such wells.展开更多
As the current global environment is deteriorating,distributed renewable energy is gradually becoming an important member of the energy internet.Blockchain,as a decentralized distributed ledger with decentralization,t...As the current global environment is deteriorating,distributed renewable energy is gradually becoming an important member of the energy internet.Blockchain,as a decentralized distributed ledger with decentralization,traceability and tamper-proof features,is an importantway to achieve efficient consumption andmulti-party supply of new energy.In this article,we establish a blockchain-based mathematical model of multiple microgrids and microgrid aggregators’revenue,consider the degree of microgrid users’preference for electricity thus increasing users’reliance on the blockchainmarket,and apply the one-master-multiple-slave Stackelberg game theory to solve the energy dispatching strategy when each market entity pursues the maximum revenue.The simulation results show that the blockchain-based dynamic game of the multi-microgrid market can effectively increase the revenue of both microgrids and aggregators and improve the utilization of renewable energy.展开更多
基金funded by grants from the National Natural Science Foundation of China(32301947,32272220 and 32172120)the China Postdoctoral Science Foundation(2023M730909).
文摘Nitrogen(N)serves as an essential nutrient for yield formation across diverse crop types.However,agricultural production encounters numerous challenges,notably high N fertilizer rates coupled with low N use efficiency and serious environmental pollution.Deep placement of nitrogen fertilizer(DPNF)is an agronomic measure that shows promise in addressing these issues.This review aims to offer a comprehensive understanding of DPNF,beginning with a succinct overview of its development and methodologies for implementation.Subsequently,the optimal fertilization depth and influencing factors for different crops are analyzed and discussed.Additionally,it investigates the regulation and mechanism underlying the DPNF on crop development,yield,N use efficiency and greenhouse gas emissions.Finally,the review delineates the limitations and challenges of this technology and provides suggestions for its improvement and application.This review provides valuable insight and reference for the promotion and adoption of DPNF in agricultural practice.
文摘We sought to compare the safety and accuracy of a new free-hand pedicle screw placement technique to that of the conventional technique. One hundred fifty-three consecutive adult patients with simple fracture in the tho- racic or/and lumbar spine were alternately assigned to either the new free-hand or the conventional group. In the new free-hand technique group, preoperative computerized tomography (CT) images were used to calculate the targeted medial-lateral angle of each pedicle trajectory and the pedicle screw was inserted perpendicular to the corresponding supraspinal ligament. In the conventional technique group, the medial-lateral and cranial-caudal angle of each pedicle trajectory was determined by intraoperatively under fluoroscopic guidance. The accuracy rate of pedicle screw placement, the time of intraoperative fluoroscopy, the operating time and the amount of blood loss during operation were respectively compared. All screws were analyzed by using intraoperative ra- diographs, intraoperative triggered electromyography (EMG) monitoring data, postoperative CT data and clinical outcomes. The accuracy rate of pedicle screw placement in the new free-hand technique group and the conven- tional technique group was 96.3% and 94.2% (P 〈 0.05), respectively. The intraoperative fluoroscopy time of the new technique group was less than that of the conventional technique group (5.37 seconds vs. 8.79 seconds, P 〈 0.05). However, there was no statistical difference in the operating time and the amount of blood loss during op- eration (P 〉 0.05). Pedicle screw placement with the free-hand technique which keeps the screw perpendicular to the supraspinal ligament is an accurate, reliable and safe technique to treat simple fracture in the thoracic or lum- bar spine.
基金supported by The National Basic Research Program of China (973) (Grant No. 2012CB315901, 2013CB329104)The National Natural Science Foundation of China (Grant No. 61521003, 61372121, 61309019, 61572519, 61502530)The National High Technology Research and Development Program of China (863) (Grant No. 2015AA016102)
文摘To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function entities.Due to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation fairness.Then a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances placement.Finally, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms.
文摘In this paper, we analyse the deployment of middlebox. For a given network information and policy requirements, an attempt is made to determine the optimal location of middlebox to achieve the best performance. In terms of the end-to-end delay as a performance optimization index, a distributed middlebox placement algorithm based on potential game is proposed. Through extensive simulations, it demonstrates that the proposed algorithm achieves the near-optimal solution, and the end-to-end delay decreases significantly.
基金supported in part by the National Natural Science Foundation of China (No.62271253,61901523,62001381)Fundamental Research Funds for the Central Universities (No.NS2023018)+2 种基金the National Aerospace Science Foundation of China under Grant 2023Z021052002the open research fund of National Mobile Communications Research Laboratory,Southeast University (No.2023D09)Postgraduate Research & Practice Innovation Program of NUAA (No.xcxjh20220402)。
文摘To improve the anti-jamming and interference mitigation ability of the UAV-aided communication systems, this paper investigates the channel selection optimization problem in face of both internal mutual interference and external malicious jamming. A cooperative anti-jamming and interference mitigation method based on local altruistic is proposed to optimize UAVs’ channel selection. Specifically, a Stackelberg game is modeled to formulate the confrontation relationship between UAVs and the jammer. A local altruistic game is modeled with each UAV considering the utilities of both itself and other UAVs. A distributed cooperative anti-jamming and interference mitigation algorithm is proposed to obtain the Stackelberg equilibrium. Finally, the convergence of the proposed algorithm and the impact of the transmission power on the system loss value are analyzed, and the anti-jamming performance of the proposed algorithm can be improved by around 64% compared with the existing algorithms.
基金supported in part by the Strategic Priority Research Program of Chinese Academy of Sciences(XDA27030100)National Natural Science Foundation of China(72293575, 11832001)。
文摘The pursuit-evasion game models the strategic interaction among players, attracting attention in many realistic scenarios, such as missile guidance, unmanned aerial vehicles, and target defense. Existing studies mainly concentrate on the cooperative pursuit of multiple players in two-dimensional pursuit-evasion games. However, these approaches can hardly be applied to practical situations where players usually move in three-dimensional space with a three-degree-of-freedom control. In this paper,we make the first attempt to investigate the equilibrium strategy of the realistic pursuit-evasion game, in which the pursuer follows a three-degree-of-freedom control, and the evader moves freely. First, we describe the pursuer's three-degree-of-freedom control and the evader's relative coordinate. We then rigorously derive the equilibrium strategy by solving the retrogressive path equation according to the Hamilton-Jacobi-Bellman-Isaacs(HJBI) method, which divides the pursuit-evasion process into the navigation and acceleration phases. Besides, we analyze the maximum allowable speed for the pursuer to capture the evader successfully and provide the strategy with which the evader can escape when the pursuer's speed exceeds the threshold. We further conduct comparison tests with various unilateral deviations to verify that the proposed strategy forms a Nash equilibrium.
基金sponsored by the National Key R&D Program of China(No.2018YFB2100400)the National Natural Science Foundation of China(No.62002077,61872100)+4 种基金the Major Research Plan of the National Natural Science Foundation of China(92167203)the Guangdong Basic and Applied Basic Research Foundation(No.2020A1515110385)the China Postdoctoral Science Foundation(No.2022M710860)the Zhejiang Lab(No.2020NF0AB01)Guangzhou Science and Technology Plan Project(202102010440).
文摘Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also cause privacy leakage and energy consumption.How to optimize the energy consumption in distributed communication systems,while ensuring the privacy of users and model accuracy,has become an urgent challenge.In this paper,we define the FL as a 3-layer architecture including users,agents and server.In order to find a balance among model training accuracy,privacy-preserving effect,and energy consumption,we design the training process of FL as game models.We use an extensive game tree to analyze the key elements that influence the players’decisions in the single game,and then find the incentive mechanism that meet the social norms through the repeated game.The experimental results show that the Nash equilibrium we obtained satisfies the laws of reality,and the proposed incentive mechanism can also promote users to submit high-quality data in FL.Following the multiple rounds of play,the incentive mechanism can help all players find the optimal strategies for energy,privacy,and accuracy of FL in distributed communication systems.
基金Supported by National Key Research and Development Program of China(2022YFE0137200)Outstanding Youth Natural Science Fund of Shaanxi Province(2022JC-37)+2 种基金Innovation Capability Support Program of Shaanxi(2023-CX-TD-31)Natural Science Basic Research Project of Shaanxi Province(2024JC-YBQN-0381)National Natural Science Foundation of China(51874240,52204021)。
文摘A three-dimensional reconstruction of rough fracture surfaces of hydraulically fractured rock outcrops is carried out by casting process,a large-scale experimental setup for visualizing rough fractures is built to perform proppant transport experiments.The typical characteristics of proppant transport and placement in rough fractures and its intrinsic mechanisms are investigated,and the influences of fracture inclination,fracture width and fracturing fluid viscosity on proppant transport and placement in rough fractures are analyzed.The results show that the rough fractures cause variations in the shape of the flow channel and the fluid flow pattern,resulting in the bridging buildup during proppant transport to form unfilled zone,the emergence of multiple complex flow patterns such as channeling,reverse flow and bypassing of sand-carrying fluid,and the influence on the stability of the sand dune.The proppant has a higher placement rate in inclined rough fractures,with a maximum increase of 22.16 percentage points in the experiments compared to vertical fractures,but exhibits poor stability of the sand dune.Reduced fracture width aggravates the bridging of proppant and induces higher pumping pressure.Increasing the viscosity of the fracturing fluid can weaken the proppant bridging phenomenon caused by the rough fractures.
基金supported by the National Natural Science Foundation of China(Nos.51977113,62293500,62293501 and 62293505).
文摘Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.
基金supported via funding from Prince Sattam bin Abdulaziz University Project Number(PSAU/2024/R/1445).
文摘Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.However,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud computing.An approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing costs.This approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of applications.In this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing cost.We consider four cost-types for application deployment:Computation,communication,energy consumption,and violations.The proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the system.An extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art approaches.The results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost.
基金supported by the China Postdoctoral Science Foundation (Grant No.2021M700321)the Fundamental Research Funds for the Central Universities (Grant No.YWF-23-Q1041)。
文摘In the realm of aerial warfare,the protection of Unmanned Aerial Vehicles(UAVs) against adversarial threats is crucial.In order to balance the impact of response delays and the demand for onboard applications,this paper derives three analytical game strategies for the active defense of UAVs from differential game theory,accommodating the first-order dynamic delays.The targeted UAV executes evasive maneuvers and launches a defending missile to intercept the attacking missile,which constitutes a UAVMissile-Defender(UMD) three-body game problem.We explore two distinct operational paradigms:the first involves the UAV and the defender working collaboratively to intercept the incoming threat,while the second prioritizes UAV self-preservation,with independent maneuvering away from potentially sacrificial engagements.Starting with model linearization and order reduction,the Collaborative Interception Strategy(CIS) is first derived via a linear quadratic differential game formulation.Building upon CIS,we further explore two distinct strategies:the Informed Defender Interception Strategy(IDIS),which utilizes UAV maneuvering information,and the Unassisted Defender Interception Strategy(UDIS),which does not rely on UAV maneuvering information.Additionally,we investigate the conditions for the existence of saddle point solutions and their relationship with vehicle maneuverability and response agility.The simulations demonstrate the effectiveness and advantages of the proposed strategies.
文摘1.Introduction In August 2024,over 4400 Paralympic athletes will gather in Paris for the Paralympic Summer Games—the pinnacle of every Paralympian’s(Para athletes competing at the Paralympic Games)career to showcase their ability and skills.Their training,preparation,and effort in the years leading up to the Games are unparalleled.To achieve success,Paralympians specifically rely on a medical support team to achieve their goals.So,what is required of the medical support team to prepare Paralympians to get ready,set,and go to Paris 2024?
文摘Objective: To study the problematic use of video games among secondary school students in the city of Parakou in 2023. Methods: Descriptive cross-sectional study conducted in the commune of Parakou from December 2022 to July 2023. The study population consisted of students regularly enrolled in public and private secondary schools in the city of Parakou for the 2022-2023 academic year. A two-stage non-proportional stratified sampling technique combined with simple random sampling was adopted. The Problem Video Game Playing (PVP) scale was used to assess problem gambling in the study population, while anxiety and depression were assessed using the Hospital Anxiety and Depression Scale (HADS). Results: A total of 1030 students were included. The mean age of the pupils surveyed was 15.06 ± 2.68 years, with extremes of 10 and 28 years. The [13 - 18] age group was the most represented, with a proportion of 59.6% (614) in the general population. Females predominated, at 52.8% (544), with a sex ratio of 0.89. The prevalence of problematic video game use was 24.9%, measured using the Video Game Playing scale. Associated factors were male gender (p = 0.005), pocket money under 10,000 cfa (p = 0.001) and between 20,000 - 90,000 cfa (p = 0.030), addictive family behavior (p < 0.001), monogamous family (p = 0.023), good relationship with father (p = 0.020), organization of video game competitions (p = 0.001) and definite anxiety (p Conclusion: Substance-free addiction is struggling to attract the attention it deserves, as it did in its infancy everywhere else. This study complements existing data and serves as a reminder of the need to focus on this group of addictions, whose problematic use of video games remains the most frequent due to its accessibility and social tolerance. Preventive action combined with curative measures remains the most effective means of combating the problem at national level.
基金supported by the Researcher Supporting Project number(RSPD2024R582),King Saud University,Riyadh,Saudi Arabia.
文摘The controller is a main component in the Software-Defined Networking(SDN)framework,which plays a significant role in enabling programmability and orchestration for 5G and next-generation networks.In SDN,frequent communication occurs between network switches and the controller,which manages and directs traffic flows.If the controller is not strategically placed within the network,this communication can experience increased delays,negatively affecting network performance.Specifically,an improperly placed controller can lead to higher end-to-end(E2E)delay,as switches must traverse more hops or encounter greater propagation delays when communicating with the controller.This paper introduces a novel approach using Deep Q-Learning(DQL)to dynamically place controllers in Software-Defined Internet of Things(SD-IoT)environments,with the goal of minimizing E2E delay between switches and controllers.E2E delay,a crucial metric for network performance,is influenced by two key factors:hop count,which measures the number of network nodes data must traverse,and propagation delay,which accounts for the physical distance between nodes.Our approach models the controller placement problem as a Markov Decision Process(MDP).In this model,the network configuration at any given time is represented as a“state,”while“actions”correspond to potential decisions regarding the placement of controllers or the reassignment of switches to controllers.Using a Deep Q-Network(DQN)to approximate the Q-function,the system learns the optimal controller placement by maximizing the cumulative reward,which is defined as the negative of the E2E delay.Essentially,the lower the delay,the higher the reward the system receives,enabling it to continuously improve its controller placement strategy.The experimental results show that our DQL-based method significantly reduces E2E delay when compared to traditional benchmark placement strategies.By dynamically learning from the network’s real-time conditions,the proposed method ensures that controller placement remains efficient and responsive,reducing communication delays and enhancing overall network performance.
基金supported by National Natural Sciences Foundation of China(No.62271165,62027802,61831008)the Guangdong Basic and Applied Basic Research Foundation(No.2023A1515030297,2021A1515011572)Shenzhen Science and Technology Program ZDSYS20210623091808025,Stable Support Plan Program GXWD20231129102638002.
文摘Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances.
基金Supported by National Natural Science Foundation of China(Grant Nos.52205003 and 51575018)Zhejiang Provincial Natural Science Foundation(Grant No.LD22E050011)Ningbo Municipal Key Projects of Science and Technology Innovation 2025 Plan(Grant No.2022Z070).
文摘Automated fiber placement(AFP)enables the efficient and precise fabrication of complex-shaped aerospace composite structures with lightweight and high-performance properties.However,due to the excessive compression on the inner edge of the tow placed along the curved trajectory,the resulting defects represented by buckling and wrinkles in spatial tow steering can induce poor manufacturing accuracy and quality degradation of products.In this paper,a theoretical model of tow buckling based on the first-order shear deformation laminate theory,linear elastic adhesion interface and Hertz compaction contact theory is proposed to analyze the formation mechanism of the wrinkles and predict the formation of defects by solving the critical radius of the trajectory,and finite element analysis involving the cohesive zone modeling(CZM)is innovated to simulate the local buckling state of the steered tow in AFP.Additionally,numerical parametric studies and experimental results indicate that mechanical properties and geometric parameters of the prepreg,the curvature of the placement trajectory and critical process parameters have a significant impact on buckling formation,and optimization of process parameters can achieve effective suppression of placement defects.This research proposes a theoretical modeling method for tow buckling,and conducts in-depth research on defect formation and suppression methods based on finite element simulation and placement experiments.
文摘Given a graph g=( V,A ) , we define a space of subgraphs M with the binary operation of union and the unique decomposition property into blocks. This space allows us to discuss a notion of minimal subgraphs (minimal coalitions) that are of interest for the game. Additionally, a partition of the game is defined in terms of the gain of each block, and subsequently, a solution to the game is defined based on distributing to each player (node and edge) present in each block a payment proportional to their contribution to the coalition.
基金funded by the“Ling Yan”Research and Development Project of Science Technology Department of Zhejiang Province of China under Grants No.2022C03122Public Welfare Technology Application and Research Projects of Science Technology Department of Zhejiang Province of China under Grants No.LGF22F020006 and LGF21F010004.
文摘The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.
文摘Fiber is highly escapable in conventional slickwater,making it difficult to form fiber-proppant agglomerate with proppant and exhibit limited effectiveness.To solve these problems,a novel structure stabilizer(SS)is developed.Through microscopic structural observations and performance evaluations in indoor experiments,the mechanism of proppant placement under the action of the SS and the effects of the SS on proppant placement dimensions and fracture conductivity were elucidated.The SS facilitates the formation of robust fiber-proppant agglomerates by polymer,fiber,and quartz sand.Compared to bare proppants,these agglomerates exhibit reduced density,increased volume,and enlarged contact area with the fluid during settlement,leading to heightened buoyancy and drag forces,ultimately resulting in slower settling velocities and enhanced transportability into deeper regions of the fracture.Co-injecting the fiber and the SS alongside the proppant into the reservoir effectively reduces the fiber escape rate,increases the proppant volume in the slickwater,and boosts the proppant placement height,conveyance distance and fracture conductivity,while also decreasing the proppant backflow.Experimental results indicate an optimal SS mass fraction of 0.3%.The application of this SS in over 80 wells targeting tight gas,shale oil,and shale gas reservoirs has substantiated its strong adaptability and general suitability for meeting the production enhancement,cost reduction,and sand control requirements of such wells.
基金This research was funded by the NSFC under Grant No.61803279in part by the Qing Lan Project of Jiangsu,in part by the China Postdoctoral Science Foundation under Grant Nos.2020M671596 and 2021M692369+3 种基金in part by the Suzhou Science and Technology Development Plan Project(Key Industry Technology Innovation)under Grant No.SYG202114in part by the Open Project Funding from Anhui Province Key Laboratory of Intelligent Building and Building Energy Saving,Anhui Jianzhu University,under Grant No.IBES2021KF08in part by the Postgraduate Research&Practice Innovation Program of Jiangsu Province under Grant No.KYCX23_3320in part by the Postgraduate Research&Practice Innovation Program of Jiangsu Province under Grant No.SJCX22_1585.
文摘As the current global environment is deteriorating,distributed renewable energy is gradually becoming an important member of the energy internet.Blockchain,as a decentralized distributed ledger with decentralization,traceability and tamper-proof features,is an importantway to achieve efficient consumption andmulti-party supply of new energy.In this article,we establish a blockchain-based mathematical model of multiple microgrids and microgrid aggregators’revenue,consider the degree of microgrid users’preference for electricity thus increasing users’reliance on the blockchainmarket,and apply the one-master-multiple-slave Stackelberg game theory to solve the energy dispatching strategy when each market entity pursues the maximum revenue.The simulation results show that the blockchain-based dynamic game of the multi-microgrid market can effectively increase the revenue of both microgrids and aggregators and improve the utilization of renewable energy.