Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However,...Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.展开更多
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d...The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.展开更多
Agricultural products supply-chain finance, as one of the solutions to the issue of “capital problems” of agriculture, countryside and farmers, has proposed a kind of characteristics model to assess the risk of agri...Agricultural products supply-chain finance, as one of the solutions to the issue of “capital problems” of agriculture, countryside and farmers, has proposed a kind of characteristics model to assess the risk of agricultural production, processing and marketing, which can improve the issue of farmers and enterprises lacking of funds. This model is proposed on the basis of uncertain information processing method of D-S theory and its data combination rules, combined with the “discount rate” correction model, and it includes a risk assessment index system of agricultural products supply-chain finance, fully considering the five aspects of production, processing, marketing, cooperation of supply chain and collateral. At last, a taro supply chain is taken for example. And the risk assessment of its supply-chain finance based on this model has been discussed in detail. And the result has proved that the model and its algorithm are practical and feasible.展开更多
Power transformer is a core equipment of power system, which undertakes the important functions of power transmission and transformation, and its safe and stable operation has great significance to the normal operatio...Power transformer is a core equipment of power system, which undertakes the important functions of power transmission and transformation, and its safe and stable operation has great significance to the normal operation of the whole power system. Due to the complex structure of the transformer, the use of single information for condition-based maintenance (CBM) has certain limitations, with the help of advanced sensor monitoring and information fusion technology, multi-source information is applied to the prognostic and health management (PHM) of power transformer, which is an important way to realize the CBM of power transformer. This paper presents a method which combine deep belief network classifier (DBNC) and D-S evidence theory, and it is applied to the PHM of the large power transformer. The experimental results show that the proposed method has a high correct rate of fault diagnosis for the power transformer with a large number of multi-source data.展开更多
This paper presents an innovative approach for the fault isolation of Light Rail Vehicle (LRV) suspension system based on the Dempster-Shafer (D-S) evidence theory and its improvement application case. The considered ...This paper presents an innovative approach for the fault isolation of Light Rail Vehicle (LRV) suspension system based on the Dempster-Shafer (D-S) evidence theory and its improvement application case. The considered LRV has three rolling stocks and each one equips three sensors for monitoring the suspension system. A Kalman filter is applied to generate the residuals for fault diagnosis. For the purpose of fault isolation, a fault feature database is built in advance. The Eros and the norm distance between the fault feature of the new occurred fault and the one in the feature database are applied to measure the similarity of the feature which is the basis for the basic belief assignment to the fault, respectively. After the basic belief assignments are obtained, they are fused by using the D-S evidence theory. The fusion of the basic belief assignments increases the isolation accuracy significantly. The efficiency of the proposed method is demonstrated by two case studies.展开更多
The Evaluation of teaching quality is a complicated project. It’s a typical problem of uncertainty. A design scheme of teaching quality evaluation method based on cloud model and D-S theory is proposed with the schoo...The Evaluation of teaching quality is a complicated project. It’s a typical problem of uncertainty. A design scheme of teaching quality evaluation method based on cloud model and D-S theory is proposed with the school teaching evaluation index. With the experiences and knowledge of experts, evaluation index was described by cloud model and judgment matrix of AHP was revised by D-S theory. The weight of evaluation indexes was determined reasonably and objectively. Applied in the actual environment, the method can make an accurate and efficient evaluation with a certain practical value.展开更多
Inertial and gravitational mass or energy momentum need not be the same for virtual quantum states. Separating their roles naturally leads to the gauge theory of volume-preserving diffeomorphisms of an inner four-dime...Inertial and gravitational mass or energy momentum need not be the same for virtual quantum states. Separating their roles naturally leads to the gauge theory of volume-preserving diffeomorphisms of an inner four-dimensional space. The gauge-fixed action and the path integral measure occurring in the generating functional for the quantum Green functions of the theory are shown to obey a BRST-type symmetry. The related Zinn-Justin-type equation restricting the corresponding quantum effective action is established. This equation limits the infinite parts of the quantum effective action to have the same form as the gauge-fixed Lagrangian of the theory proving its spacetime renormalizability. The inner space integrals occurring in the quantum effective action which are divergent due to the gauge group’s infinite volume are shown to be regularizable in a way consistent with the symmetries of the theory demonstrating as a byproduct that viable quantum gauge field theories are not limited to finite-dimensional compact gauge groups as is commonly assumed.展开更多
For high-reliability systems in military,aerospace,and railway fields,the challenges of reliability analysis lie in dealing with unclear failure mechanisms,complex fault relationships,lack of fault data,and uncertaint...For high-reliability systems in military,aerospace,and railway fields,the challenges of reliability analysis lie in dealing with unclear failure mechanisms,complex fault relationships,lack of fault data,and uncertainty of fault states.To overcome these problems,this paper proposes a reliability analysismethod based on T-S fault tree analysis(T-S FTA)and Hyper-ellipsoidal Bayesian network(HE-BN).The method describes the connection between the various systemfault events by T-S fuzzy gates and translates them into a Bayesian network(BN)model.Combining the advantages of T-S fault tree modeling with the advantages of Bayesian network computation,a reliability modeling method is proposed that can fully reflect the fault characteristics of complex systems.Experts describe the degree of failure of the event in the form of interval numbers.The knowledge and experience of experts are fused with the D-S evidence theory to obtain the initial failure probability interval of the BN root node.Then,the Hyper-ellipsoidal model(HM)constrains the initial failure probability interval and constructs a HE-BN for the system.A reliability analysismethod is proposed to solve the problem of insufficient failure data and uncertainty in the degree of failure.The failure probability of the system is further calculated and the key components that affect the system’s reliability are identified.The proposedmethod accounts for the uncertainty and incompleteness of the failure data in complex multi-state systems and establishes an easily computable reliability model that fully reflects the characteristics of complex faults and accurately identifies system weaknesses.The feasibility and accuracy of the method are further verified by conducting case studies.展开更多
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr...The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results.展开更多
In this paper,convex optimization theory is introduced into the recognition of communication signals. The detailed content contains three parts. The first part gives a survey of basic concepts,main technology and reco...In this paper,convex optimization theory is introduced into the recognition of communication signals. The detailed content contains three parts. The first part gives a survey of basic concepts,main technology and recognition model of convex optimization theory. Special emphasis is placed on how to set up the new recognition model of communication signals with multisensor reports. The second part gives the solution method of the recognition model,which is called Logarithmic Penalty Barrier Function. The last part gives several numeric simulations,in contrast to D-S evidence inference method,this new method can also generate reasonable recognition results. Moreover,this new method can deal with the form of sensor reports which is more general than that allowed by the D-S evidence inference method,and it has much lower computation complexity than that of D-S evidence inference method. In addition,this new method has better recognition result,stronger anti-interference and robustness. Therefore,the convex optimization methods can be widely used in the recognition of communication signals.展开更多
An Ethereum blockchain based on proof of stake ( PoS) consensus mechanism is used to achieve the data sharing within the civil aviation service platform for both airport group management and passengers. Considering th...An Ethereum blockchain based on proof of stake ( PoS) consensus mechanism is used to achieve the data sharing within the civil aviation service platform for both airport group management and passengers. Considering the Gas consumption of Ethereum, the dynamic batch-service capacity constraint by the Block Gas Limit and the priority mechanism depending on the different Gas Price of transactions, M/ G/1 queuing theory with batch-service is used to construct the service model of transactions confirmation process in the proposed blockchain system, where the effects of transactions arrival rate, block capacity, service rate and number of nodes on the average confirmation time of transactions with different priority are analyzed, and eventually a performance analysis model of blockchain for civil aviation business data is proposed. The simulation results prove the usability and accuracy of the model, which can provide both theoretical basis for data sharing of civil aviation using Ethereum blockchain and the further optimization of transactions confirmation time.展开更多
Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D p...Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D projection. The origin of such rotation is the balance of the angular momenta of stars and that of positive and negative charged e-trino pairs, within a 3D ⊗1D?void of the stellar object, the existence of which is based on conservation/parity laws in physics if one starts with homogeneous 5D universe. While the in-phase e-trino pairs are proposed to be responsible for the generation of angular momentum, the anti-phase but oppositely charge pairs necessarily produce currents. In the 5D to 4D projection, one space variable in the 5D manifold was compacted to zero in most other 5D theories (including theories of Kaluza-Klein and Einstein [3] [4]). We have demonstrated, using the Fermat’s Last Theorem [5], that for validity of gauge invariance at the 4D-5D boundary, the 4th space variable in the 5D manifold is mapped into two current rings at both magnetic poles as required by Perelman entropy mapping;these loops are the origin of the dipolar magnetic field. One conclusion we draw is that there is no gravitational singularity, and hence no black holes in the universe, a result strongly supported by the recent discovery of many stars with masses well greater than 100 solar mass [6] [7] [8], without trace of phenomena observed (such as strong gamma and X ray emissions), which are supposed to be associated with black holes. We analyze the properties of such loop currents on the 4D-5D boundary, where Maxwell equations are valid. We derive explicit expressions for the dipolar fields over the whole temperature range. We then compare our prediction with measured surface magnetic fields of many stars. Since there is coupling in distribution between the in-phase and anti-phase pairs of e-trinos, the generated mag-netic field is directly related to the angular momentum, leading to the result that the magnetic field can be expressible in terms of only the mechanical variables (mass M, radius R, rotation period P)of a star, as if Maxwell equations are “hidden”. An explanation for the occurrence of this “un-expected result” is provided in Section (7.6). Therefore we provide satisfactory answers to a number of “mysteries” of magnetism in astrophysics such as the “Magnetic Bode’s Relation/Law” [9] and the experimental finding that B-P graph in the log-log plot is linear. Moreover, we have developed a new method for studying the relations among the data (M, R, P) during stellar evolution. Ten groups of stellar objects, effectively over 2000 samples are used in various parts of the analysis. We also explain the emergence of huge magnetic field in very old stars like White Dwarfs in terms of formation of 2D Semion state on stellar surface and release of magnetic flux as magnetic storms upon changing the 2D state back to 3D structure. Moreover, we provide an explanation, on the ground of the 5D theory, for the detection of extremely weak fields in Venus and Mars and the asymmetric distribution of magnetic field on the Martian surface. We predict the equatorial fields B of the newly discovered Trappist-1 star and the 6 nearest planets. The log B?−?log P graph for the 6 planets is linear and they satisfy the Magnetic Bode’s relation. Based on the above analysis, we have discovered several new laws of stellar magnetism, which are summarized in Section (7.6).展开更多
In cyber-physical systems, multidimensional data fusion is an important method to achieve comprehensive evaluation decisions and reduce data redundancy. In this paper, a data fusion algorithm based on fuzzy set theory...In cyber-physical systems, multidimensional data fusion is an important method to achieve comprehensive evaluation decisions and reduce data redundancy. In this paper, a data fusion algorithm based on fuzzy set theory and Dempster-Shafer(D-S) evidence theory is proposed to overcome the shortcomings of the existing decision-layer multidimensional data fusion algorithms. The basic probability distribution of evidence is determined based on fuzzy set theory and attribute weights, and the data fusion of attribute evidence is combined with the credibility of sensor nodes in a cyber-physical systems network. Experimental analysis shows that the proposed method has obvious advantages in the degree of the differentiation of the results.展开更多
文摘Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.
基金supported by the National Natural Science Foundation of China(Grants No.51190094,50909073,and 51179130)the Hubei Province Natural Science Foundation(Grant No.2010CDB08401)
文摘The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.
文摘Agricultural products supply-chain finance, as one of the solutions to the issue of “capital problems” of agriculture, countryside and farmers, has proposed a kind of characteristics model to assess the risk of agricultural production, processing and marketing, which can improve the issue of farmers and enterprises lacking of funds. This model is proposed on the basis of uncertain information processing method of D-S theory and its data combination rules, combined with the “discount rate” correction model, and it includes a risk assessment index system of agricultural products supply-chain finance, fully considering the five aspects of production, processing, marketing, cooperation of supply chain and collateral. At last, a taro supply chain is taken for example. And the risk assessment of its supply-chain finance based on this model has been discussed in detail. And the result has proved that the model and its algorithm are practical and feasible.
文摘Power transformer is a core equipment of power system, which undertakes the important functions of power transmission and transformation, and its safe and stable operation has great significance to the normal operation of the whole power system. Due to the complex structure of the transformer, the use of single information for condition-based maintenance (CBM) has certain limitations, with the help of advanced sensor monitoring and information fusion technology, multi-source information is applied to the prognostic and health management (PHM) of power transformer, which is an important way to realize the CBM of power transformer. This paper presents a method which combine deep belief network classifier (DBNC) and D-S evidence theory, and it is applied to the PHM of the large power transformer. The experimental results show that the proposed method has a high correct rate of fault diagnosis for the power transformer with a large number of multi-source data.
文摘This paper presents an innovative approach for the fault isolation of Light Rail Vehicle (LRV) suspension system based on the Dempster-Shafer (D-S) evidence theory and its improvement application case. The considered LRV has three rolling stocks and each one equips three sensors for monitoring the suspension system. A Kalman filter is applied to generate the residuals for fault diagnosis. For the purpose of fault isolation, a fault feature database is built in advance. The Eros and the norm distance between the fault feature of the new occurred fault and the one in the feature database are applied to measure the similarity of the feature which is the basis for the basic belief assignment to the fault, respectively. After the basic belief assignments are obtained, they are fused by using the D-S evidence theory. The fusion of the basic belief assignments increases the isolation accuracy significantly. The efficiency of the proposed method is demonstrated by two case studies.
文摘The Evaluation of teaching quality is a complicated project. It’s a typical problem of uncertainty. A design scheme of teaching quality evaluation method based on cloud model and D-S theory is proposed with the school teaching evaluation index. With the experiences and knowledge of experts, evaluation index was described by cloud model and judgment matrix of AHP was revised by D-S theory. The weight of evaluation indexes was determined reasonably and objectively. Applied in the actual environment, the method can make an accurate and efficient evaluation with a certain practical value.
文摘Inertial and gravitational mass or energy momentum need not be the same for virtual quantum states. Separating their roles naturally leads to the gauge theory of volume-preserving diffeomorphisms of an inner four-dimensional space. The gauge-fixed action and the path integral measure occurring in the generating functional for the quantum Green functions of the theory are shown to obey a BRST-type symmetry. The related Zinn-Justin-type equation restricting the corresponding quantum effective action is established. This equation limits the infinite parts of the quantum effective action to have the same form as the gauge-fixed Lagrangian of the theory proving its spacetime renormalizability. The inner space integrals occurring in the quantum effective action which are divergent due to the gauge group’s infinite volume are shown to be regularizable in a way consistent with the symmetries of the theory demonstrating as a byproduct that viable quantum gauge field theories are not limited to finite-dimensional compact gauge groups as is commonly assumed.
基金the National Natural Science Foundation of China(51875073).
文摘For high-reliability systems in military,aerospace,and railway fields,the challenges of reliability analysis lie in dealing with unclear failure mechanisms,complex fault relationships,lack of fault data,and uncertainty of fault states.To overcome these problems,this paper proposes a reliability analysismethod based on T-S fault tree analysis(T-S FTA)and Hyper-ellipsoidal Bayesian network(HE-BN).The method describes the connection between the various systemfault events by T-S fuzzy gates and translates them into a Bayesian network(BN)model.Combining the advantages of T-S fault tree modeling with the advantages of Bayesian network computation,a reliability modeling method is proposed that can fully reflect the fault characteristics of complex systems.Experts describe the degree of failure of the event in the form of interval numbers.The knowledge and experience of experts are fused with the D-S evidence theory to obtain the initial failure probability interval of the BN root node.Then,the Hyper-ellipsoidal model(HM)constrains the initial failure probability interval and constructs a HE-BN for the system.A reliability analysismethod is proposed to solve the problem of insufficient failure data and uncertainty in the degree of failure.The failure probability of the system is further calculated and the key components that affect the system’s reliability are identified.The proposedmethod accounts for the uncertainty and incompleteness of the failure data in complex multi-state systems and establishes an easily computable reliability model that fully reflects the characteristics of complex faults and accurately identifies system weaknesses.The feasibility and accuracy of the method are further verified by conducting case studies.
基金supported by the National Natural Science Foundation of China(Grant No.41371402)the National Basic Research Program of China("973"Program)(Grant No.2011CB302306)the Fundamental Research Funds for the Central University(Grant No.2015211020201 and No.211274230)
文摘The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results.
基金Sponsored by the Nation Nature Science Foundation of China(Grant No.61301095,61201237)the Nature Science Foundation of Heilongjiang Province of China(Grant No.QC2012C069)the Fundamental Research Funds for the Central Universities(Grant No.HEUCFZ1129,HEUCF130810,HEUCF130817)
文摘In this paper,convex optimization theory is introduced into the recognition of communication signals. The detailed content contains three parts. The first part gives a survey of basic concepts,main technology and recognition model of convex optimization theory. Special emphasis is placed on how to set up the new recognition model of communication signals with multisensor reports. The second part gives the solution method of the recognition model,which is called Logarithmic Penalty Barrier Function. The last part gives several numeric simulations,in contrast to D-S evidence inference method,this new method can also generate reasonable recognition results. Moreover,this new method can deal with the form of sensor reports which is more general than that allowed by the D-S evidence inference method,and it has much lower computation complexity than that of D-S evidence inference method. In addition,this new method has better recognition result,stronger anti-interference and robustness. Therefore,the convex optimization methods can be widely used in the recognition of communication signals.
基金the Open Foundation of Key Laboratory of Airports Cluster Intelligent Operation(No.KLACIO201900006124)National Natural Science Foundation of China(No.61901011)+1 种基金Foundation of Beijing Municipal Commission of Education(No.KM202010005017,KM202110005021)Beijing Natural Science Foundation(No.L192002).
文摘An Ethereum blockchain based on proof of stake ( PoS) consensus mechanism is used to achieve the data sharing within the civil aviation service platform for both airport group management and passengers. Considering the Gas consumption of Ethereum, the dynamic batch-service capacity constraint by the Block Gas Limit and the priority mechanism depending on the different Gas Price of transactions, M/ G/1 queuing theory with batch-service is used to construct the service model of transactions confirmation process in the proposed blockchain system, where the effects of transactions arrival rate, block capacity, service rate and number of nodes on the average confirmation time of transactions with different priority are analyzed, and eventually a performance analysis model of blockchain for civil aviation business data is proposed. The simulation results prove the usability and accuracy of the model, which can provide both theoretical basis for data sharing of civil aviation using Ethereum blockchain and the further optimization of transactions confirmation time.
文摘Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D projection. The origin of such rotation is the balance of the angular momenta of stars and that of positive and negative charged e-trino pairs, within a 3D ⊗1D?void of the stellar object, the existence of which is based on conservation/parity laws in physics if one starts with homogeneous 5D universe. While the in-phase e-trino pairs are proposed to be responsible for the generation of angular momentum, the anti-phase but oppositely charge pairs necessarily produce currents. In the 5D to 4D projection, one space variable in the 5D manifold was compacted to zero in most other 5D theories (including theories of Kaluza-Klein and Einstein [3] [4]). We have demonstrated, using the Fermat’s Last Theorem [5], that for validity of gauge invariance at the 4D-5D boundary, the 4th space variable in the 5D manifold is mapped into two current rings at both magnetic poles as required by Perelman entropy mapping;these loops are the origin of the dipolar magnetic field. One conclusion we draw is that there is no gravitational singularity, and hence no black holes in the universe, a result strongly supported by the recent discovery of many stars with masses well greater than 100 solar mass [6] [7] [8], without trace of phenomena observed (such as strong gamma and X ray emissions), which are supposed to be associated with black holes. We analyze the properties of such loop currents on the 4D-5D boundary, where Maxwell equations are valid. We derive explicit expressions for the dipolar fields over the whole temperature range. We then compare our prediction with measured surface magnetic fields of many stars. Since there is coupling in distribution between the in-phase and anti-phase pairs of e-trinos, the generated mag-netic field is directly related to the angular momentum, leading to the result that the magnetic field can be expressible in terms of only the mechanical variables (mass M, radius R, rotation period P)of a star, as if Maxwell equations are “hidden”. An explanation for the occurrence of this “un-expected result” is provided in Section (7.6). Therefore we provide satisfactory answers to a number of “mysteries” of magnetism in astrophysics such as the “Magnetic Bode’s Relation/Law” [9] and the experimental finding that B-P graph in the log-log plot is linear. Moreover, we have developed a new method for studying the relations among the data (M, R, P) during stellar evolution. Ten groups of stellar objects, effectively over 2000 samples are used in various parts of the analysis. We also explain the emergence of huge magnetic field in very old stars like White Dwarfs in terms of formation of 2D Semion state on stellar surface and release of magnetic flux as magnetic storms upon changing the 2D state back to 3D structure. Moreover, we provide an explanation, on the ground of the 5D theory, for the detection of extremely weak fields in Venus and Mars and the asymmetric distribution of magnetic field on the Martian surface. We predict the equatorial fields B of the newly discovered Trappist-1 star and the 6 nearest planets. The log B?−?log P graph for the 6 planets is linear and they satisfy the Magnetic Bode’s relation. Based on the above analysis, we have discovered several new laws of stellar magnetism, which are summarized in Section (7.6).
基金supported by the National Natural Science Foundation of China (No. 61462089)the Fundamental Research Funds for Beijing University of Civil Engineering and Architecture (No. X18002)
文摘In cyber-physical systems, multidimensional data fusion is an important method to achieve comprehensive evaluation decisions and reduce data redundancy. In this paper, a data fusion algorithm based on fuzzy set theory and Dempster-Shafer(D-S) evidence theory is proposed to overcome the shortcomings of the existing decision-layer multidimensional data fusion algorithms. The basic probability distribution of evidence is determined based on fuzzy set theory and attribute weights, and the data fusion of attribute evidence is combined with the credibility of sensor nodes in a cyber-physical systems network. Experimental analysis shows that the proposed method has obvious advantages in the degree of the differentiation of the results.