Inspired by nature's self-similar designs,novel honeycomb-spiderweb based self-similar hybrid cellular structures are proposed here for efficient energy absorption in impact applications.The energy absorption is e...Inspired by nature's self-similar designs,novel honeycomb-spiderweb based self-similar hybrid cellular structures are proposed here for efficient energy absorption in impact applications.The energy absorption is enhanced by optimizing the geometry and topology for a given mass.The proposed hybrid cellular structure is arrived after a thorough analysis of topologically enhanced self-similar structures.The optimized cell designs are rigorously tested considering dynamic loads involving crush and high-velocity bullet impact.Furthermore,the influence of thickness,radial connectivity,and order of patterning at the unit cell level are also investigated.The maximum crushing efficiency attained is found to be more than 95%,which is significantly higher than most existing traditional designs.Later on,the first and second-order hierarchical self-similar unit cell designs developed during crush analysis are used to prepare the cores for sandwich structures.Impact tests are performed on the developed sandwich structures using the standard 9-mm parabellum.The influence of multistaging on impact resistance is also investigated by maintaining a constant total thickness and mass of the sandwich structure.Moreover,in order to avoid layer-wise weak zones and hence,attain a uniform out-of-plane impact strength,off-setting the designs in each stage is proposed.The sandwich structures with first and second-order self-similar hybrid cores are observed to withstand impact velocities as high as 170 m/s and 270 m/s,respectively.展开更多
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r...Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition.展开更多
Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installat...Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installation and use of the environment is introduced.A code established on the platform of MATLAB,which deals with the modal analysis of magnetic bearing system(MBS) supporting rotors of five degrees of freedom and considering the coupling of thrust bearing with radical bearings is modified to work in the environment.The purpose is to realize a remote call of the code by users through Internet for the performance analysis of the system.Such an application is very important to the concurrent design of MBS and for the utilization of distributive knowledge acquisition resources in collaborative design.The work on modification and realization is described and the results are discussed.展开更多
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite...The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.展开更多
Making use of Microsoft Visual Studio. NET platform, hierarchical network planning is realized in working procedure time-optimization of the construction by TBM, and hierarchical network graph of the construction by T...Making use of Microsoft Visual Studio. NET platform, hierarchical network planning is realized in working procedure time-optimization of the construction by TBM, and hierarchical network graph of the construction by TBM is drawn based on browser. Then the theory of system realization is discussed, six components of system that can be reused are explained emphatically. The realization of hierarchical network panning in Internet provides available guarantee for controlling rate of progress in large-scale or middle-sized projects. Key words Web - network graph - hierarchical network planning CLC number TU721 Biography: WU Shi-jing (1963-), male, Professor, research direction: equipments management engineering, mechatronics, state monitoring and malfunction diagnostics of machine and electronics equipments.展开更多
The Internet has stepped into Web 2.0 era. Web 2.0 application technologies and services are rapidly developing, accompanied by the innovation and revolution of business models. This article analyzes the development o...The Internet has stepped into Web 2.0 era. Web 2.0 application technologies and services are rapidly developing, accompanied by the innovation and revolution of business models. This article analyzes the development of Web 2.0 technologies and their promotion role in the development of Internet services, discusses the implementation of Web 2.0 core concepts (including user participation, resource sharing and platform) by the multiple Internet application technologies, and gives the development trends of Internet application technologies.展开更多
Nitrogen deposition and water tables are important factors to control soil microbial community structure.However,the specific effects and mechanisms of nitrogen deposition and water tables coupling on bacterial divers...Nitrogen deposition and water tables are important factors to control soil microbial community structure.However,the specific effects and mechanisms of nitrogen deposition and water tables coupling on bacterial diversity,abundance,and community structure in arid alpine wetlands remain unclear.The nitrogen deposition(0,10,and 20 kg N/(hm^(2)•a))experiments were conducted in the Bayinbulak alpine wetland with different water tables(perennial flooding,seasonal waterlogging,and perennial drying).The 16S rRNA(ribosomal ribonucleic acid)gene sequencing technology was employed to analyze the changes in bacterial community diversity,network structure,and function in the soil.Results indicated that bacterial diversity was the highest under seasonal waterlogging condition.However,nitrogen deposition only affected the bacterial Chao1 and beta diversity indices under seasonal waterlogging condition.The abundance of bacterial communities under different water tables showed significant differences at the phylum and genus levels.The dominant phylum,Proteobacteria,was sensitive to soil moisture and its abundance decreased with decreasing water tables.Although nitrogen deposition led to changes in bacterial abundance,such changes were small compared with the effects of water tables.Nitrogen deposition with 10 kg N/(hm^(2)•a)decreased bacterial edge number,average path length,and robustness.However,perennial flooding and drying conditions could simply resist environmental changes caused by 20 kg N/(hm^(2)•a)nitrogen deposition and their network structure remain unchanged.The sulfur cycle function was dominant under perennial flooding condition,and carbon and nitrogen cycle functions were dominant under seasonal waterlogging and perennial drying conditions.Nitrogen application increased the potential function of part of nitrogen cycle and decreased the potential function of sulfur cycle in bacterial community.In summary,composition of bacterial community in the arid alpine wetland was determined by water tables,and diversity of bacterial community was inhibited by a lower water table.Effect of nitrogen deposition on bacterial community structure and function depended on water tables.展开更多
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa...As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.展开更多
目的:探讨围生期创伤知情护理领域的研究热点与趋势。方法:计算机检索Web of Science核心合集中的科学引文索引(SCI)和社会科学引文索引(SSCI)数据库2008年1月1日—2023年10月25日发表有关围生期创伤知情护理相关文献,通过bibliometrix...目的:探讨围生期创伤知情护理领域的研究热点与趋势。方法:计算机检索Web of Science核心合集中的科学引文索引(SCI)和社会科学引文索引(SSCI)数据库2008年1月1日—2023年10月25日发表有关围生期创伤知情护理相关文献,通过bibliometrix对文献年度发文量、国家和机构、高被引期刊、论文及作者进行统计分析,使用Cite Space 6.2.R4软件对关键词进行共现分析。结果:共纳入278篇文献,年度发文量呈上升趋势,美国是发文量最多的国家,Aparicio E M是该领域最具影响力的作者,高频关键词包括亲密关系暴力、创伤后应激障碍、童年逆境、分娩等,共包含14个关键词聚类和9个关键词突现,演化路径由女性创伤史的识别到围生期的分娩体验。结论:围生期创伤知情护理集中于创伤史的识别与方案构建,随着研究深入,其热点将为围生期护理人员对于创伤知情护理的看法及干预实践。展开更多
Due to the restricted satellite payloads in LEO mega-constellation networks(LMCNs),remote sensing image analysis,online learning and other big data services desirably need onboard distributed processing(OBDP).In exist...Due to the restricted satellite payloads in LEO mega-constellation networks(LMCNs),remote sensing image analysis,online learning and other big data services desirably need onboard distributed processing(OBDP).In existing technologies,the efficiency of big data applications(BDAs)in distributed systems hinges on the stable-state and low-latency links between worker nodes.However,LMCNs with high-dynamic nodes and long-distance links can not provide the above conditions,which makes the performance of OBDP hard to be intuitively measured.To bridge this gap,a multidimensional simulation platform is indispensable that can simulate the network environment of LMCNs and put BDAs in it for performance testing.Using STK's APIs and parallel computing framework,we achieve real-time simulation for thousands of satellite nodes,which are mapped as application nodes through software defined network(SDN)and container technologies.We elaborate the architecture and mechanism of the simulation platform,and take the Starlink and Hadoop as realistic examples for simulations.The results indicate that LMCNs have dynamic end-to-end latency which fluctuates periodically with the constellation movement.Compared to ground data center networks(GDCNs),LMCNs deteriorate the computing and storage job throughput,which can be alleviated by the utilization of erasure codes and data flow scheduling of worker nodes.展开更多
This work leveraged predictive modeling techniques in machine learning (ML) to predict heart disease using a dataset sourced from the Center for Disease Control and Prevention in the US. The dataset was preprocessed a...This work leveraged predictive modeling techniques in machine learning (ML) to predict heart disease using a dataset sourced from the Center for Disease Control and Prevention in the US. The dataset was preprocessed and used to train five machine learning models: random forest, support vector machine, logistic regression, extreme gradient boosting and light gradient boosting. The goal was to use the best performing model to develop a web application capable of reliably predicting heart disease based on user-provided data. The extreme gradient boosting classifier provided the most reliable results with precision, recall and F1-score of 97%, 72%, and 83% respectively for Class 0 (no heart disease) and 21% (precision), 81% (recall) and 34% (F1-score) for Class 1 (heart disease). The model was further deployed as a web application.展开更多
Measles,an infectious disease caused by the measles virus,remains a significant public health concern worldwide due to its highly contagious nature and potential for severe complications[1].In addition to symptoms suc...Measles,an infectious disease caused by the measles virus,remains a significant public health concern worldwide due to its highly contagious nature and potential for severe complications[1].In addition to symptoms such as high fever,cough,Koplik spots,and rash,measles can lead to serious complications including pneumonia and myocarditis,particularly in vulnerable populations such as young children[1,2].展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
The dual transmitter implements the equivalent anti-magnetic flux transient electromagnetic method, which can effectively reduce the scope of the transient electromagnetic detection blind area. However, this method is...The dual transmitter implements the equivalent anti-magnetic flux transient electromagnetic method, which can effectively reduce the scope of the transient electromagnetic detection blind area. However, this method is rarely reported in the detection of pipelines in urban geophysical exploration and the application of coal mines. Based on this, this paper realizes the equivalent anti-magnetic flux transient electromagnetic method based on the dual launcher. The suppression effect of this method on the blind area is analyzed by physical simulation. And the detection experiment of underground pipelines is carried out outdoors. The results show that the dual launcher can significantly reduce the turn-off time, thereby effectively reducing the impact of the blind area on the detection results, and the pipeline detection results verify the device’s effectiveness. Finally, based on the ground experimental results, the application prospect of mine advanced detection is discussed. Compared with other detection fields, the formation of blind areas is mainly caused by the equipment. If the dual launcher can be used to reduce the blind area, the accuracy of advanced detection can be improved more effectively. The above research results are of great significance for improving the detection accuracy of the underground transient electromagnetic method.展开更多
This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural la...This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural launch in 2002,China has achieved substantial advancements in ocean satellite technology,forming an observation system composed of the HY-1,HY-2,and HY-3 series satellites.These satellites are integral to global ocean environmental monitoring due to their high resolution,extensive coverage,and frequent observations.Looking forward,China aims to further enhance and expand its ocean satellite capabilities through ongoing projects to support global environmental protection and sustainable development.展开更多
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge...In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.展开更多
Calcium ferrite(CF)is recognized as a potential green and efficient functional material because of its advantages of magnetism,electrochemistry,catalysis,and biocompatibility in the fields of materials chemistry,envir...Calcium ferrite(CF)is recognized as a potential green and efficient functional material because of its advantages of magnetism,electrochemistry,catalysis,and biocompatibility in the fields of materials chemistry,environmental engineering,and biomedicine.There-fore,the obtained research results need to be systematically summarized,and new perspectives on CF and its composite materials need to be analyzed.Based on the presented studies of CF and its composite materials,the types and structures of the crystal are summarized.In addition,the current application technologies and theoretical mechanisms with various properties in different fields are elucidated.Moreover,the various preparation methods of CF and its composite materials are elaborated in detail.Most importantly,the advantages and disadvantages of the synthesis methods of CF and its composite materials are discussed,and the existing problems and emerging challenges in practical production are identified.Furthermore,the key future research directions of CF and its composite materials have been prospected from the potential application technologies to provide references for its synthesis and efficient utilization.展开更多
In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog...In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers.展开更多
基金the Science and Engineering Research Board(SERB),Department of Science and Technology,India,for funding this research through grant number SRG/2019/001581。
文摘Inspired by nature's self-similar designs,novel honeycomb-spiderweb based self-similar hybrid cellular structures are proposed here for efficient energy absorption in impact applications.The energy absorption is enhanced by optimizing the geometry and topology for a given mass.The proposed hybrid cellular structure is arrived after a thorough analysis of topologically enhanced self-similar structures.The optimized cell designs are rigorously tested considering dynamic loads involving crush and high-velocity bullet impact.Furthermore,the influence of thickness,radial connectivity,and order of patterning at the unit cell level are also investigated.The maximum crushing efficiency attained is found to be more than 95%,which is significantly higher than most existing traditional designs.Later on,the first and second-order hierarchical self-similar unit cell designs developed during crush analysis are used to prepare the cores for sandwich structures.Impact tests are performed on the developed sandwich structures using the standard 9-mm parabellum.The influence of multistaging on impact resistance is also investigated by maintaining a constant total thickness and mass of the sandwich structure.Moreover,in order to avoid layer-wise weak zones and hence,attain a uniform out-of-plane impact strength,off-setting the designs in each stage is proposed.The sandwich structures with first and second-order self-similar hybrid cores are observed to withstand impact velocities as high as 170 m/s and 270 m/s,respectively.
基金supported in part by the National Science Foundation of China under Grants U22B2027,62172297,62102262,61902276 and 62272311,Tianjin Intelligent Manufacturing Special Fund Project under Grant 20211097the China Guangxi Science and Technology Plan Project(Guangxi Science and Technology Base and Talent Special Project)under Grant AD23026096(Application Number 2022AC20001)+1 种基金Hainan Provincial Natural Science Foundation of China under Grant 622RC616CCF-Nsfocus Kunpeng Fund Project under Grant CCF-NSFOCUS202207.
文摘Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition.
文摘Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installation and use of the environment is introduced.A code established on the platform of MATLAB,which deals with the modal analysis of magnetic bearing system(MBS) supporting rotors of five degrees of freedom and considering the coupling of thrust bearing with radical bearings is modified to work in the environment.The purpose is to realize a remote call of the code by users through Internet for the performance analysis of the system.Such an application is very important to the concurrent design of MBS and for the utilization of distributive knowledge acquisition resources in collaborative design.The work on modification and realization is described and the results are discussed.
文摘The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.
文摘Making use of Microsoft Visual Studio. NET platform, hierarchical network planning is realized in working procedure time-optimization of the construction by TBM, and hierarchical network graph of the construction by TBM is drawn based on browser. Then the theory of system realization is discussed, six components of system that can be reused are explained emphatically. The realization of hierarchical network panning in Internet provides available guarantee for controlling rate of progress in large-scale or middle-sized projects. Key words Web - network graph - hierarchical network planning CLC number TU721 Biography: WU Shi-jing (1963-), male, Professor, research direction: equipments management engineering, mechatronics, state monitoring and malfunction diagnostics of machine and electronics equipments.
文摘The Internet has stepped into Web 2.0 era. Web 2.0 application technologies and services are rapidly developing, accompanied by the innovation and revolution of business models. This article analyzes the development of Web 2.0 technologies and their promotion role in the development of Internet services, discusses the implementation of Web 2.0 core concepts (including user participation, resource sharing and platform) by the multiple Internet application technologies, and gives the development trends of Internet application technologies.
基金supported by the National Natural Science Foundation of China(31960258)the Graduate Research Innovation Project of Xinjiang Uygur Autonomous Region(XJ2023G119).
文摘Nitrogen deposition and water tables are important factors to control soil microbial community structure.However,the specific effects and mechanisms of nitrogen deposition and water tables coupling on bacterial diversity,abundance,and community structure in arid alpine wetlands remain unclear.The nitrogen deposition(0,10,and 20 kg N/(hm^(2)•a))experiments were conducted in the Bayinbulak alpine wetland with different water tables(perennial flooding,seasonal waterlogging,and perennial drying).The 16S rRNA(ribosomal ribonucleic acid)gene sequencing technology was employed to analyze the changes in bacterial community diversity,network structure,and function in the soil.Results indicated that bacterial diversity was the highest under seasonal waterlogging condition.However,nitrogen deposition only affected the bacterial Chao1 and beta diversity indices under seasonal waterlogging condition.The abundance of bacterial communities under different water tables showed significant differences at the phylum and genus levels.The dominant phylum,Proteobacteria,was sensitive to soil moisture and its abundance decreased with decreasing water tables.Although nitrogen deposition led to changes in bacterial abundance,such changes were small compared with the effects of water tables.Nitrogen deposition with 10 kg N/(hm^(2)•a)decreased bacterial edge number,average path length,and robustness.However,perennial flooding and drying conditions could simply resist environmental changes caused by 20 kg N/(hm^(2)•a)nitrogen deposition and their network structure remain unchanged.The sulfur cycle function was dominant under perennial flooding condition,and carbon and nitrogen cycle functions were dominant under seasonal waterlogging and perennial drying conditions.Nitrogen application increased the potential function of part of nitrogen cycle and decreased the potential function of sulfur cycle in bacterial community.In summary,composition of bacterial community in the arid alpine wetland was determined by water tables,and diversity of bacterial community was inhibited by a lower water table.Effect of nitrogen deposition on bacterial community structure and function depended on water tables.
文摘As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.
文摘目的:探讨围生期创伤知情护理领域的研究热点与趋势。方法:计算机检索Web of Science核心合集中的科学引文索引(SCI)和社会科学引文索引(SSCI)数据库2008年1月1日—2023年10月25日发表有关围生期创伤知情护理相关文献,通过bibliometrix对文献年度发文量、国家和机构、高被引期刊、论文及作者进行统计分析,使用Cite Space 6.2.R4软件对关键词进行共现分析。结果:共纳入278篇文献,年度发文量呈上升趋势,美国是发文量最多的国家,Aparicio E M是该领域最具影响力的作者,高频关键词包括亲密关系暴力、创伤后应激障碍、童年逆境、分娩等,共包含14个关键词聚类和9个关键词突现,演化路径由女性创伤史的识别到围生期的分娩体验。结论:围生期创伤知情护理集中于创伤史的识别与方案构建,随着研究深入,其热点将为围生期护理人员对于创伤知情护理的看法及干预实践。
基金supported by National Natural Sciences Foundation of China(No.62271165,62027802,62201307)the Guangdong Basic and Applied Basic Research Foundation(No.2023A1515030297)+2 种基金the Shenzhen Science and Technology Program ZDSYS20210623091808025Stable Support Plan Program GXWD20231129102638002the Major Key Project of PCL(No.PCL2024A01)。
文摘Due to the restricted satellite payloads in LEO mega-constellation networks(LMCNs),remote sensing image analysis,online learning and other big data services desirably need onboard distributed processing(OBDP).In existing technologies,the efficiency of big data applications(BDAs)in distributed systems hinges on the stable-state and low-latency links between worker nodes.However,LMCNs with high-dynamic nodes and long-distance links can not provide the above conditions,which makes the performance of OBDP hard to be intuitively measured.To bridge this gap,a multidimensional simulation platform is indispensable that can simulate the network environment of LMCNs and put BDAs in it for performance testing.Using STK's APIs and parallel computing framework,we achieve real-time simulation for thousands of satellite nodes,which are mapped as application nodes through software defined network(SDN)and container technologies.We elaborate the architecture and mechanism of the simulation platform,and take the Starlink and Hadoop as realistic examples for simulations.The results indicate that LMCNs have dynamic end-to-end latency which fluctuates periodically with the constellation movement.Compared to ground data center networks(GDCNs),LMCNs deteriorate the computing and storage job throughput,which can be alleviated by the utilization of erasure codes and data flow scheduling of worker nodes.
文摘This work leveraged predictive modeling techniques in machine learning (ML) to predict heart disease using a dataset sourced from the Center for Disease Control and Prevention in the US. The dataset was preprocessed and used to train five machine learning models: random forest, support vector machine, logistic regression, extreme gradient boosting and light gradient boosting. The goal was to use the best performing model to develop a web application capable of reliably predicting heart disease based on user-provided data. The extreme gradient boosting classifier provided the most reliable results with precision, recall and F1-score of 97%, 72%, and 83% respectively for Class 0 (no heart disease) and 21% (precision), 81% (recall) and 34% (F1-score) for Class 1 (heart disease). The model was further deployed as a web application.
文摘Measles,an infectious disease caused by the measles virus,remains a significant public health concern worldwide due to its highly contagious nature and potential for severe complications[1].In addition to symptoms such as high fever,cough,Koplik spots,and rash,measles can lead to serious complications including pneumonia and myocarditis,particularly in vulnerable populations such as young children[1,2].
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
文摘The dual transmitter implements the equivalent anti-magnetic flux transient electromagnetic method, which can effectively reduce the scope of the transient electromagnetic detection blind area. However, this method is rarely reported in the detection of pipelines in urban geophysical exploration and the application of coal mines. Based on this, this paper realizes the equivalent anti-magnetic flux transient electromagnetic method based on the dual launcher. The suppression effect of this method on the blind area is analyzed by physical simulation. And the detection experiment of underground pipelines is carried out outdoors. The results show that the dual launcher can significantly reduce the turn-off time, thereby effectively reducing the impact of the blind area on the detection results, and the pipeline detection results verify the device’s effectiveness. Finally, based on the ground experimental results, the application prospect of mine advanced detection is discussed. Compared with other detection fields, the formation of blind areas is mainly caused by the equipment. If the dual launcher can be used to reduce the blind area, the accuracy of advanced detection can be improved more effectively. The above research results are of great significance for improving the detection accuracy of the underground transient electromagnetic method.
基金Supported by Remote Sensing Support for Offshore Ocean Environment and Polar Sea Ice Early Warning Services(102121201550000009004)。
文摘This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural launch in 2002,China has achieved substantial advancements in ocean satellite technology,forming an observation system composed of the HY-1,HY-2,and HY-3 series satellites.These satellites are integral to global ocean environmental monitoring due to their high resolution,extensive coverage,and frequent observations.Looking forward,China aims to further enhance and expand its ocean satellite capabilities through ongoing projects to support global environmental protection and sustainable development.
文摘In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
基金supported by the National Natural Science Foundation of China(No.51574105)the Science and Technology Program of Hebei Province,China(No.23564101D)+2 种基金the Natural Science Foundation of Hebei Province,China(No.E2021209147)the Key Research Project of North China University of Science and Technology(No.ZD-ST-202308)the Postgraduate Innovation Funding Project of Hebei Province,China(No.CXZZBS2024135).
文摘Calcium ferrite(CF)is recognized as a potential green and efficient functional material because of its advantages of magnetism,electrochemistry,catalysis,and biocompatibility in the fields of materials chemistry,environmental engineering,and biomedicine.There-fore,the obtained research results need to be systematically summarized,and new perspectives on CF and its composite materials need to be analyzed.Based on the presented studies of CF and its composite materials,the types and structures of the crystal are summarized.In addition,the current application technologies and theoretical mechanisms with various properties in different fields are elucidated.Moreover,the various preparation methods of CF and its composite materials are elaborated in detail.Most importantly,the advantages and disadvantages of the synthesis methods of CF and its composite materials are discussed,and the existing problems and emerging challenges in practical production are identified.Furthermore,the key future research directions of CF and its composite materials have been prospected from the potential application technologies to provide references for its synthesis and efficient utilization.
文摘In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers.