In this work,we propose a low-regularity Fourier integrator with almost mass conservation to solve the Davey-StewartsonⅡsystem(hyperbolic-elliptic case).Arbitrary order mass convergence could be achieved by the suita...In this work,we propose a low-regularity Fourier integrator with almost mass conservation to solve the Davey-StewartsonⅡsystem(hyperbolic-elliptic case).Arbitrary order mass convergence could be achieved by the suitable addition of correction terms,while keeping the first order accuracy in H~γ×H^(γ+1)for initial data in H^(γ+1)×H^(γ+1)withγ>1.The main theorem is that,up to some fixed time T,there exist constantsτ_(0)and C depending only on T and‖u‖_(L^(∞)((0,T);H^(γ+1)))such that,for any 0<τ≤τ_(0),we have that‖u(t_(n),·)-u^(n)‖H_γ≤C_(τ),‖v(t_(n),·)-v^(n)‖_(Hγ+1)≤C_(τ),where u^(n)and v^(n)denote the numerical solutions at t_(n)=nτ.Moreover,the mass of the numerical solution M(u^(n))satisfies that|M(u^(n))-M(u_0)|≤Cτ~5.展开更多
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int...In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.展开更多
As a new trend in tourism and cultural development,the integration of culture and tourism is capturing the zeitgeist with its unique charm.In this context,various regions have explored distinctive cultural tourism res...As a new trend in tourism and cultural development,the integration of culture and tourism is capturing the zeitgeist with its unique charm.In this context,various regions have explored distinctive cultural tourism resources and created unique tourism brands through in-depth exploration and innovation of local culture.Chongqing,with its unique geomorphological features and distinctive architectural style,retains the deep flavor of traditional Chinese culture while cleverly integrating the futuristic sense of modern technology.This combination aligns perfectly with today’s popular Chinese cyberpunk style,making Chongqing an ideal place for the development of cyberpunk cultural tourism.This article investigates the history of cyberpunk culture and its current development status in Chongqing through a literature review.It then discusses the feasibility of developing cyberpunk cultural tourism in terms of social and cultural development needs and market demand.Based on a survey of cyberpunk tourists’experiences,the article deeply analyzes the existing problems of cyberpunk cultural tourism in Chongqing and proposes corresponding experience enhancement strategies,aiming to provide references for the development of cyberpunk cultural tourism in Chongqing Municipality.展开更多
Although auxin is known to induce ethylene biosynthesis in some Rosaceae fruit crops,the mechanisms underlying the auxin–ethylene interaction during fruit ripening remain largely unknown.Here,the regulatory role of a...Although auxin is known to induce ethylene biosynthesis in some Rosaceae fruit crops,the mechanisms underlying the auxin–ethylene interaction during fruit ripening remain largely unknown.Here,the regulatory role of an auxin response factor,PpARF6,in fruit ripening was investigated in peach.Peach fruits showed accelerated ripening after treatment with auxin and PpARF6 was found to be significantly induced.PpARF6 not only could induce ethylene synthesis by directly activating the transcription of ethylene biosynthetic genes,but also competed with EIN3-binding F-box proteins PpEBF1/2 for binding to ethylene-insensitive3-like proteins PpEIL2/3,thereby keeping PpEIL2/3 active.Moreover,PpARF6 showed an interaction with PpEIL2/3 to enhance the PpEIL2/3-activated transcription of ethylene biosynthetic genes.Additionally,ectopic overexpression of PpARF6 in tomato accelerated fruit ripening by promoting the expression of genes involved in ethylene synthesis and fruit texture.In summary,our results revealed a positive regulatory role of PpARF6 in peach fruit ripening via integrating auxin and ethylene signaling.展开更多
The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated...The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats.展开更多
Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The p...Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The proposed method is capable of producing top-notch data sets to address the issues of insufficient samples and substandard quality.展开更多
Electromagnetic interference shielding(EMI SE)modules are the core com-ponent of modern electronics.However,the tra-ditional metal-based SE modules always take up indispensable three-dimensional space inside electroni...Electromagnetic interference shielding(EMI SE)modules are the core com-ponent of modern electronics.However,the tra-ditional metal-based SE modules always take up indispensable three-dimensional space inside electronics,posing a major obstacle to the integra-tion of electronics.The innovation of integrating 3D-printed conformal shielding(c-SE)modules with packaging materials onto core electronics offers infinite possibilities to satisfy ideal SE func-tion without occupying additional space.Herein,the 3D printable carbon-based inks with various proportions of graphene and carbon nanotube nanoparticles are well-formulated by manipulating their rheological peculiarity.Accordingly,the free-constructed architectures with arbitrarily-customized structure and multifunctionality are created via 3D printing.In particular,the SE performance of 3D-printed frame is up to 61.4 dB,simultaneously accompanied with an ultralight architecture of 0.076 g cm^(-3) and a superhigh specific shielding of 802.4 dB cm3 g^(-1).Moreover,as a proof-of-concept,the 3D-printed c-SE module is in situ integrated into core electronics,successfully replacing the traditional metal-based module to afford multiple functions for electromagnetic compatibility and thermal dissipa-tion.Thus,this scientific innovation completely makes up the blank for assembling carbon-based c-SE modules and sheds a brilliant light on developing the next generation of high-performance shielding materials with arbitrarily-customized structure for integrated electronics.展开更多
In the realm of the synthesis of heat-integrated distillation configurations,the conventional approach for exploring more heat integration possibilities typically entails the splitting of a single column into a twocol...In the realm of the synthesis of heat-integrated distillation configurations,the conventional approach for exploring more heat integration possibilities typically entails the splitting of a single column into a twocolumn configuration.However,this approach frequently necessitates tedious enumeration procedures,resulting in a considerable computational burden.To surmount this formidable challenge,the present study introduces an innovative remedy:The proposition of a superstructure that encompasses both single-column and multiple two-column configurations.Additionally,a simultaneous optimization algorithm is applied to optimize both the process parameters and heat integration structures of the twocolumn configurations.The effectiveness of this approach is demonstrated through a case study focusing on industrial organosilicon separation.The results underscore that the superstructure methodology not only substantially mitigates computational time compared to exhaustive enumeration but also furnishes solutions that exhibit comparable performance.展开更多
Multi-level programmable photonic integrated circuits(PICs)and optical metasurfaces have gained widespread attention in many fields,such as neuromorphic photonics,opticalcommunications,and quantum information.In this ...Multi-level programmable photonic integrated circuits(PICs)and optical metasurfaces have gained widespread attention in many fields,such as neuromorphic photonics,opticalcommunications,and quantum information.In this paper,we propose pixelated programmable Si_(3)N_(4)PICs with record-high 20-level intermediate states at 785 nm wavelength.Such flexibility in phase or amplitude modulation is achieved by a programmable Sb_(2)S_(3)matrix,the footprint of whose elements can be as small as 1.2μm,limited only by the optical diffraction limit of anin-house developed pulsed laser writing system.We believe our work lays the foundation for laser-writing ultra-high-level(20 levels and even more)programmable photonic systems and metasurfaces based on phase change materials,which could catalyze diverse applications such as programmable neuromorphic photonics,biosensing,optical computing,photonic quantum computing,and reconfigurable metasurfaces.展开更多
High-chromium vanadium-titanium magnetite(HVTM)is a crucial polymetallic-associated resource to be developed.The allpellet operation is a blast furnace trend that aims to reduce carbon dioxide emissions in the future....High-chromium vanadium-titanium magnetite(HVTM)is a crucial polymetallic-associated resource to be developed.The allpellet operation is a blast furnace trend that aims to reduce carbon dioxide emissions in the future.By referencing the production data of vanadium-titanium magnetite blast furnaces,this study explored the softening-melting behavior of high-chromium vanadium-titanium magnetite and obtained the optimal integrated burden based on flux pellets.The results show that the burden with a composition of 70wt%flux pellets and 30wt%acid pellets exhibits the best softening-melting properties.In comparison to that of the single burden,the softening-melting characteristic temperature of this burden composition was higher.The melting interval first increased from 307 to 362℃and then decreased to 282℃.The maximum pressure drop(ΔPmax)decreased from 26.76 to 19.01 kPa.The permeability index(S)dropped from 4643.5 to 2446.8 kPa·℃.The softening-melting properties of the integrated burden were apparently improved.The acid pellets played a role in withstanding load during the softening process.The flux pellets in the integrated burden exhibited a higher slag melting point,which increased the melting temperature during the melting process.The slag homogeneity and the TiC produced by over-reduction led to the gas permeability deterioration of the single burden.The segregation of the flux and acid pellets in the HVTM proportion and basicity mainly led to the better softening-melting properties of the integrated burden.展开更多
El Niño-Southern Oscillation(ENSO)is the strongest interannual climate mode influencing the coupled ocean-atmosphere system in the tropical Pacific,and numerous dynamical and statistical models have been develope...El Niño-Southern Oscillation(ENSO)is the strongest interannual climate mode influencing the coupled ocean-atmosphere system in the tropical Pacific,and numerous dynamical and statistical models have been developed to simulate and predict it.In some simplified coupled ocean-atmosphere models,the relationship between sea surface temperature(SST)anomalies and wind stress(τ)anomalies can be constructed by statistical methods,such as singular value decomposition(SVD).In recent years,the applications of artificial intelligence(AI)to climate modeling have shown promising prospects,and the integrations of AI-based models with dynamical models are active areas of research.This study constructs U-Net models for representing the relationship between SSTAs andτanomalies in the tropical Pacific;the UNet-derivedτmodel,denoted asτUNet,is then used to replace the original SVD-basedτmodel of an intermediate coupled model(ICM),forming a newly AI-integrated ICM,referred to as ICM-UNet.The simulation results obtained from ICM-UNet demonstrate their ability to represent the spatiotemporal variability of oceanic and atmospheric anomaly fields in the equatorial Pacific.In the ocean-only case study,theτUNet-derived wind stress anomaly fields are used to force the ocean component of the ICM,the results of which also indicate reasonable simulations of typical ENSO events.These results demonstrate the feasibility of integrating an AI-derived model with a physics-based dynamical model for ENSO modeling studies.Furthermore,the successful integration of the dynamical ocean models with the AI-based atmospheric wind model provides a novel approach to ocean-atmosphere interaction modeling studies.展开更多
In this work,a consistent and physically accurate implementation of the general framework of unified second-order time accurate integrators via the well-known GSSSS framework in the Discrete Element Method is presente...In this work,a consistent and physically accurate implementation of the general framework of unified second-order time accurate integrators via the well-known GSSSS framework in the Discrete Element Method is presented.The improved tangential displacement evaluation in the present implementation of the discrete element method has been derived and implemented to preserve the consistency of the correct time level evaluation during the time integration process in calculating the algorithmic tangential displacement.Several numerical examples have been used to validate the proposed tangential displacement evaluation;this is in contrast to past practices which only seem to attain the first-order time accuracy due to inconsistent time level implementation with different algorithms for normal and tangential directions.The comparisons with the existing implementation and the superiority of the proposed implementation are given in terms of the convergence rate with improved numerical accuracy in time.Moreover,several schemes via the unified second-order time integrators within the framework of the GSSSS family have been carried out based on the proposed correct implementation.All the numerical results demonstrate that using the existing state-of-the-art implementation reduces the time accuracy to be first-order accurate in time,while the proposed implementation preserves the correct time accuracy to yield second-order.展开更多
In this study,we present a novel nodal integration-based particle finite element method(N-PFEM)designed for the dynamic analysis of saturated soils.Our approach incorporates the nodal integration technique into a gene...In this study,we present a novel nodal integration-based particle finite element method(N-PFEM)designed for the dynamic analysis of saturated soils.Our approach incorporates the nodal integration technique into a generalised Hellinger-Reissner(HR)variational principle,creating an implicit PFEM formulation.To mitigate the volumetric locking issue in low-order elements,we employ a node-based strain smoothing technique.By discretising field variables at the centre of smoothing cells,we achieve nodal integration over cells,eliminating the need for sophisticated mapping operations after re-meshing in the PFEM.We express the discretised governing equations as a min-max optimisation problem,which is further reformulated as a standard second-order cone programming(SOCP)problem.Stresses,pore water pressure,and displacements are simultaneously determined using the advanced primal-dual interior point method.Consequently,our numerical model offers improved accuracy for stresses and pore water pressure compared to the displacement-based PFEM formulation.Numerical experiments demonstrate that the N-PFEM efficiently captures both transient and long-term hydro-mechanical behaviour of saturated soils with high accuracy,obviating the need for stabilisation or regularisation techniques commonly employed in other nodal integration-based PFEM approaches.This work holds significant implications for the development of robust and accurate numerical tools for studying saturated soil dynamics.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues...Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks.展开更多
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori...Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.展开更多
Currently,cybersecurity threats such as data breaches and phishing have been on the rise due to the many differentattack strategies of cyber attackers,significantly increasing risks to individuals and organizations.Tr...Currently,cybersecurity threats such as data breaches and phishing have been on the rise due to the many differentattack strategies of cyber attackers,significantly increasing risks to individuals and organizations.Traditionalsecurity technologies such as intrusion detection have been developed to respond to these cyber threats.Recently,advanced integrated cybersecurity that incorporates Artificial Intelligence has been the focus.In this paper,wepropose a response strategy using a reinforcement-learning-based cyber-attack-defense simulation tool to addresscontinuously evolving cyber threats.Additionally,we have implemented an effective reinforcement-learning-basedcyber-attack scenario using Cyber Battle Simulation,which is a cyber-attack-defense simulator.This scenarioinvolves important security components such as node value,cost,firewalls,and services.Furthermore,we applieda new vulnerability assessment method based on the Common Vulnerability Scoring System.This approach candesign an optimal attack strategy by considering the importance of attack goals,which helps in developing moreeffective response strategies.These attack strategies are evaluated by comparing their performance using a variety ofReinforcement Learning methods.The experimental results show that RL models demonstrate improved learningperformance with the proposed attack strategy compared to the original strategies.In particular,the success rateof the Advantage Actor-Critic-based attack strategy improved by 5.04 percentage points,reaching 10.17%,whichrepresents an impressive 98.24%increase over the original scenario.Consequently,the proposed method canenhance security and risk management capabilities in cyber environments,improving the efficiency of securitymanagement and significantly contributing to the development of security systems.展开更多
This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance system...This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance systems of missiles is challenging.As our contribution,the velocity control channel is designed to deal with the intractable velocity problem and improve tracking accuracy.The global prescribed performance function,which guarantees the tracking error within the set range and the global convergence of the tracking guidance system,is first proposed based on the traditional PPF.Then,a tracking guidance strategy is derived using the integral sliding mode control techniques to make the sliding manifold and tracking errors converge to zero and avoid singularities.Meanwhile,an improved switching control law is introduced into the designed tracking guidance algorithm to deal with the chattering problem.A back propagation neural network(BPNN)extended state observer(BPNNESO)is employed in the inner loop to identify disturbances.The obtained results indicate that the proposed tracking guidance approach achieves the trajectory tracking guidance objective without and with disturbances and outperforms the existing tracking guidance schemes with the lowest tracking errors,convergence times,and overshoots.展开更多
The performance of optical interconnection has improved dramatically in recent years.Silicon-based optoelectronic heterogeneous integration is the key enabler to achieve high performance optical interconnection,which ...The performance of optical interconnection has improved dramatically in recent years.Silicon-based optoelectronic heterogeneous integration is the key enabler to achieve high performance optical interconnection,which not only provides the optical gain which is absent from native Si substrates and enables complete photonic functionalities on chip,but also improves the system performance through advanced heterogeneous integrated packaging.This paper reviews recent progress of silicon-based optoelectronic heterogeneous integration in high performance optical interconnection.The research status,development trend and application of ultra-low loss optical waveguides,high-speed detectors,high-speed modulators,lasers and 2D,2.5D,3D and monolithic integration are focused on.展开更多
基金supported by the NSFC(11901120)supported by the NSFC(12171356)the Science and Technology Program of Guangzhou,China(2024A04J4027)。
文摘In this work,we propose a low-regularity Fourier integrator with almost mass conservation to solve the Davey-StewartsonⅡsystem(hyperbolic-elliptic case).Arbitrary order mass convergence could be achieved by the suitable addition of correction terms,while keeping the first order accuracy in H~γ×H^(γ+1)for initial data in H^(γ+1)×H^(γ+1)withγ>1.The main theorem is that,up to some fixed time T,there exist constantsτ_(0)and C depending only on T and‖u‖_(L^(∞)((0,T);H^(γ+1)))such that,for any 0<τ≤τ_(0),we have that‖u(t_(n),·)-u^(n)‖H_γ≤C_(τ),‖v(t_(n),·)-v^(n)‖_(Hγ+1)≤C_(τ),where u^(n)and v^(n)denote the numerical solutions at t_(n)=nτ.Moreover,the mass of the numerical solution M(u^(n))satisfies that|M(u^(n))-M(u_0)|≤Cτ~5.
文摘In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.
基金Chongqing University of Science and Technology’s Master’s Degree Innovation Project“Research on Chongqing Digital Cultural Tourism Innovation and Development Based on Cyberpunk”(Project No.YKJCX2320906)。
文摘As a new trend in tourism and cultural development,the integration of culture and tourism is capturing the zeitgeist with its unique charm.In this context,various regions have explored distinctive cultural tourism resources and created unique tourism brands through in-depth exploration and innovation of local culture.Chongqing,with its unique geomorphological features and distinctive architectural style,retains the deep flavor of traditional Chinese culture while cleverly integrating the futuristic sense of modern technology.This combination aligns perfectly with today’s popular Chinese cyberpunk style,making Chongqing an ideal place for the development of cyberpunk cultural tourism.This article investigates the history of cyberpunk culture and its current development status in Chongqing through a literature review.It then discusses the feasibility of developing cyberpunk cultural tourism in terms of social and cultural development needs and market demand.Based on a survey of cyberpunk tourists’experiences,the article deeply analyzes the existing problems of cyberpunk cultural tourism in Chongqing and proposes corresponding experience enhancement strategies,aiming to provide references for the development of cyberpunk cultural tourism in Chongqing Municipality.
基金supported by grants from the Strategic Priority Research Program of the Chinese Academy of Sciences(Precision Seed Design and Breeding,XDA24030404)the National Natural Science Foundation of China(32102363 and 32272687)+1 种基金the China Agriculture Research System(CARS-30)Hubei Hongshan Laboratory(2021hszd017).
文摘Although auxin is known to induce ethylene biosynthesis in some Rosaceae fruit crops,the mechanisms underlying the auxin–ethylene interaction during fruit ripening remain largely unknown.Here,the regulatory role of an auxin response factor,PpARF6,in fruit ripening was investigated in peach.Peach fruits showed accelerated ripening after treatment with auxin and PpARF6 was found to be significantly induced.PpARF6 not only could induce ethylene synthesis by directly activating the transcription of ethylene biosynthetic genes,but also competed with EIN3-binding F-box proteins PpEBF1/2 for binding to ethylene-insensitive3-like proteins PpEIL2/3,thereby keeping PpEIL2/3 active.Moreover,PpARF6 showed an interaction with PpEIL2/3 to enhance the PpEIL2/3-activated transcription of ethylene biosynthetic genes.Additionally,ectopic overexpression of PpARF6 in tomato accelerated fruit ripening by promoting the expression of genes involved in ethylene synthesis and fruit texture.In summary,our results revealed a positive regulatory role of PpARF6 in peach fruit ripening via integrating auxin and ethylene signaling.
文摘The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats.
基金supported by the National Natural Science Foundation of China(21978013)the Fundamental Research Funds for the Central in China(XK1802-4)。
文摘Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The proposed method is capable of producing top-notch data sets to address the issues of insufficient samples and substandard quality.
基金This work is financially supported by the National Natural Science Foundation of China(52303036)the Natural Science Foundation of Guangxi Province(2020GXNSFAA297028)+4 种基金the Guangxi Science and Technology Base and Talent Special Project(GUIKE AD23026179)the International Science&Technology Cooperation Project of Chengdu(2021-GH03-00009-HZ)the Program of Innovative Research Team for Young Scientists of Sichuan Province(22CXTD0019)the Natural Science Foundation of Sichuan Province(2023NSFSC0986)the Opening Project of State Key Laboratory of Polymer Materials Engineering(Sichuan University)(Sklpme2023-3-18).
文摘Electromagnetic interference shielding(EMI SE)modules are the core com-ponent of modern electronics.However,the tra-ditional metal-based SE modules always take up indispensable three-dimensional space inside electronics,posing a major obstacle to the integra-tion of electronics.The innovation of integrating 3D-printed conformal shielding(c-SE)modules with packaging materials onto core electronics offers infinite possibilities to satisfy ideal SE func-tion without occupying additional space.Herein,the 3D printable carbon-based inks with various proportions of graphene and carbon nanotube nanoparticles are well-formulated by manipulating their rheological peculiarity.Accordingly,the free-constructed architectures with arbitrarily-customized structure and multifunctionality are created via 3D printing.In particular,the SE performance of 3D-printed frame is up to 61.4 dB,simultaneously accompanied with an ultralight architecture of 0.076 g cm^(-3) and a superhigh specific shielding of 802.4 dB cm3 g^(-1).Moreover,as a proof-of-concept,the 3D-printed c-SE module is in situ integrated into core electronics,successfully replacing the traditional metal-based module to afford multiple functions for electromagnetic compatibility and thermal dissipa-tion.Thus,this scientific innovation completely makes up the blank for assembling carbon-based c-SE modules and sheds a brilliant light on developing the next generation of high-performance shielding materials with arbitrarily-customized structure for integrated electronics.
文摘In the realm of the synthesis of heat-integrated distillation configurations,the conventional approach for exploring more heat integration possibilities typically entails the splitting of a single column into a twocolumn configuration.However,this approach frequently necessitates tedious enumeration procedures,resulting in a considerable computational burden.To surmount this formidable challenge,the present study introduces an innovative remedy:The proposition of a superstructure that encompasses both single-column and multiple two-column configurations.Additionally,a simultaneous optimization algorithm is applied to optimize both the process parameters and heat integration structures of the twocolumn configurations.The effectiveness of this approach is demonstrated through a case study focusing on industrial organosilicon separation.The results underscore that the superstructure methodology not only substantially mitigates computational time compared to exhaustive enumeration but also furnishes solutions that exhibit comparable performance.
基金funded by the National Nature Science Foundation of China(Grant Nos.52175509 and 52130504)National Key Research and Development Program of China(2017YFF0204705)2021 Postdoctoral Innovation Research Plan of Hubei Province(0106100226)。
文摘Multi-level programmable photonic integrated circuits(PICs)and optical metasurfaces have gained widespread attention in many fields,such as neuromorphic photonics,opticalcommunications,and quantum information.In this paper,we propose pixelated programmable Si_(3)N_(4)PICs with record-high 20-level intermediate states at 785 nm wavelength.Such flexibility in phase or amplitude modulation is achieved by a programmable Sb_(2)S_(3)matrix,the footprint of whose elements can be as small as 1.2μm,limited only by the optical diffraction limit of anin-house developed pulsed laser writing system.We believe our work lays the foundation for laser-writing ultra-high-level(20 levels and even more)programmable photonic systems and metasurfaces based on phase change materials,which could catalyze diverse applications such as programmable neuromorphic photonics,biosensing,optical computing,photonic quantum computing,and reconfigurable metasurfaces.
基金supported by the National Natural Science Foundation of China (Nos.52174277 and 52204309)the China Postdoctoral Science Foundation (No.2022M720683).
文摘High-chromium vanadium-titanium magnetite(HVTM)is a crucial polymetallic-associated resource to be developed.The allpellet operation is a blast furnace trend that aims to reduce carbon dioxide emissions in the future.By referencing the production data of vanadium-titanium magnetite blast furnaces,this study explored the softening-melting behavior of high-chromium vanadium-titanium magnetite and obtained the optimal integrated burden based on flux pellets.The results show that the burden with a composition of 70wt%flux pellets and 30wt%acid pellets exhibits the best softening-melting properties.In comparison to that of the single burden,the softening-melting characteristic temperature of this burden composition was higher.The melting interval first increased from 307 to 362℃and then decreased to 282℃.The maximum pressure drop(ΔPmax)decreased from 26.76 to 19.01 kPa.The permeability index(S)dropped from 4643.5 to 2446.8 kPa·℃.The softening-melting properties of the integrated burden were apparently improved.The acid pellets played a role in withstanding load during the softening process.The flux pellets in the integrated burden exhibited a higher slag melting point,which increased the melting temperature during the melting process.The slag homogeneity and the TiC produced by over-reduction led to the gas permeability deterioration of the single burden.The segregation of the flux and acid pellets in the HVTM proportion and basicity mainly led to the better softening-melting properties of the integrated burden.
基金supported by the National Natural Science Foundation of China(NFSCGrant No.42030410)+2 种基金Laoshan Laboratory(No.LSKJ202202402)the Strategic Priority Research Program of the Chinese Academy of Sciences(Grant No.XDB40000000)the Startup Foundation for Introducing Talent of NUIST.
文摘El Niño-Southern Oscillation(ENSO)is the strongest interannual climate mode influencing the coupled ocean-atmosphere system in the tropical Pacific,and numerous dynamical and statistical models have been developed to simulate and predict it.In some simplified coupled ocean-atmosphere models,the relationship between sea surface temperature(SST)anomalies and wind stress(τ)anomalies can be constructed by statistical methods,such as singular value decomposition(SVD).In recent years,the applications of artificial intelligence(AI)to climate modeling have shown promising prospects,and the integrations of AI-based models with dynamical models are active areas of research.This study constructs U-Net models for representing the relationship between SSTAs andτanomalies in the tropical Pacific;the UNet-derivedτmodel,denoted asτUNet,is then used to replace the original SVD-basedτmodel of an intermediate coupled model(ICM),forming a newly AI-integrated ICM,referred to as ICM-UNet.The simulation results obtained from ICM-UNet demonstrate their ability to represent the spatiotemporal variability of oceanic and atmospheric anomaly fields in the equatorial Pacific.In the ocean-only case study,theτUNet-derived wind stress anomaly fields are used to force the ocean component of the ICM,the results of which also indicate reasonable simulations of typical ENSO events.These results demonstrate the feasibility of integrating an AI-derived model with a physics-based dynamical model for ENSO modeling studies.Furthermore,the successful integration of the dynamical ocean models with the AI-based atmospheric wind model provides a novel approach to ocean-atmosphere interaction modeling studies.
文摘In this work,a consistent and physically accurate implementation of the general framework of unified second-order time accurate integrators via the well-known GSSSS framework in the Discrete Element Method is presented.The improved tangential displacement evaluation in the present implementation of the discrete element method has been derived and implemented to preserve the consistency of the correct time level evaluation during the time integration process in calculating the algorithmic tangential displacement.Several numerical examples have been used to validate the proposed tangential displacement evaluation;this is in contrast to past practices which only seem to attain the first-order time accuracy due to inconsistent time level implementation with different algorithms for normal and tangential directions.The comparisons with the existing implementation and the superiority of the proposed implementation are given in terms of the convergence rate with improved numerical accuracy in time.Moreover,several schemes via the unified second-order time integrators within the framework of the GSSSS family have been carried out based on the proposed correct implementation.All the numerical results demonstrate that using the existing state-of-the-art implementation reduces the time accuracy to be first-order accurate in time,while the proposed implementation preserves the correct time accuracy to yield second-order.
基金supported by the Swiss National Science Foundation(Grant No.189882)the National Natural Science Foundation of China(Grant No.41961134032)support provided by the New Investigator Award grant from the UK Engineering and Physical Sciences Research Council(Grant No.EP/V012169/1).
文摘In this study,we present a novel nodal integration-based particle finite element method(N-PFEM)designed for the dynamic analysis of saturated soils.Our approach incorporates the nodal integration technique into a generalised Hellinger-Reissner(HR)variational principle,creating an implicit PFEM formulation.To mitigate the volumetric locking issue in low-order elements,we employ a node-based strain smoothing technique.By discretising field variables at the centre of smoothing cells,we achieve nodal integration over cells,eliminating the need for sophisticated mapping operations after re-meshing in the PFEM.We express the discretised governing equations as a min-max optimisation problem,which is further reformulated as a standard second-order cone programming(SOCP)problem.Stresses,pore water pressure,and displacements are simultaneously determined using the advanced primal-dual interior point method.Consequently,our numerical model offers improved accuracy for stresses and pore water pressure compared to the displacement-based PFEM formulation.Numerical experiments demonstrate that the N-PFEM efficiently captures both transient and long-term hydro-mechanical behaviour of saturated soils with high accuracy,obviating the need for stabilisation or regularisation techniques commonly employed in other nodal integration-based PFEM approaches.This work holds significant implications for the development of robust and accurate numerical tools for studying saturated soil dynamics.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
基金supported by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.KFU242068).
文摘Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks.
文摘Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea Government(MSIT)(No.RS2022-II220961).
文摘Currently,cybersecurity threats such as data breaches and phishing have been on the rise due to the many differentattack strategies of cyber attackers,significantly increasing risks to individuals and organizations.Traditionalsecurity technologies such as intrusion detection have been developed to respond to these cyber threats.Recently,advanced integrated cybersecurity that incorporates Artificial Intelligence has been the focus.In this paper,wepropose a response strategy using a reinforcement-learning-based cyber-attack-defense simulation tool to addresscontinuously evolving cyber threats.Additionally,we have implemented an effective reinforcement-learning-basedcyber-attack scenario using Cyber Battle Simulation,which is a cyber-attack-defense simulator.This scenarioinvolves important security components such as node value,cost,firewalls,and services.Furthermore,we applieda new vulnerability assessment method based on the Common Vulnerability Scoring System.This approach candesign an optimal attack strategy by considering the importance of attack goals,which helps in developing moreeffective response strategies.These attack strategies are evaluated by comparing their performance using a variety ofReinforcement Learning methods.The experimental results show that RL models demonstrate improved learningperformance with the proposed attack strategy compared to the original strategies.In particular,the success rateof the Advantage Actor-Critic-based attack strategy improved by 5.04 percentage points,reaching 10.17%,whichrepresents an impressive 98.24%increase over the original scenario.Consequently,the proposed method canenhance security and risk management capabilities in cyber environments,improving the efficiency of securitymanagement and significantly contributing to the development of security systems.
基金the National Natural Science Foundation of China(Grant No.12072090).
文摘This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance systems of missiles is challenging.As our contribution,the velocity control channel is designed to deal with the intractable velocity problem and improve tracking accuracy.The global prescribed performance function,which guarantees the tracking error within the set range and the global convergence of the tracking guidance system,is first proposed based on the traditional PPF.Then,a tracking guidance strategy is derived using the integral sliding mode control techniques to make the sliding manifold and tracking errors converge to zero and avoid singularities.Meanwhile,an improved switching control law is introduced into the designed tracking guidance algorithm to deal with the chattering problem.A back propagation neural network(BPNN)extended state observer(BPNNESO)is employed in the inner loop to identify disturbances.The obtained results indicate that the proposed tracking guidance approach achieves the trajectory tracking guidance objective without and with disturbances and outperforms the existing tracking guidance schemes with the lowest tracking errors,convergence times,and overshoots.
基金Project supported in part by the National Key Research and Development Program of China(Grant No.2021YFB2206504)the National Natural Science Foundation of China(Grant No.62235017)the China Postdoctoral Science Foundation(Grant No.2021M703125).
文摘The performance of optical interconnection has improved dramatically in recent years.Silicon-based optoelectronic heterogeneous integration is the key enabler to achieve high performance optical interconnection,which not only provides the optical gain which is absent from native Si substrates and enables complete photonic functionalities on chip,but also improves the system performance through advanced heterogeneous integrated packaging.This paper reviews recent progress of silicon-based optoelectronic heterogeneous integration in high performance optical interconnection.The research status,development trend and application of ultra-low loss optical waveguides,high-speed detectors,high-speed modulators,lasers and 2D,2.5D,3D and monolithic integration are focused on.