In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ...In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.展开更多
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess...The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient.展开更多
With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking servic...With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking services.For this reason,a countermeasure is required to improve the security of the online identification process.The current security and authentication mechanisms applied to financial services,such as Internet banking services for 5G-enabled IoT,do not ensure security.In this paper,a transaction-linkage technique with which the designated terminal is combined is proposed to solve this fundamental problem.The technique improves the security of online identification mechanisms because it is possible to counteract all of the existing security threats.The proposed technique supports mutual authentication and is safe from eavesdropping attacks,replay attacks,spoofing attacks,and service-denial attacks.Moreover,the technique supports non-repudiation by storing the transaction history in a transaction-linkage device.We believe that the security of Internet-banking services for 5G-enabled IoT will be increased through the utilization of the proposed technique.展开更多
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the...Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.展开更多
Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are lik...Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are likely not aware of the specific types of disaster. So, first of all, we need to know what kind<span style="font-family:;" "="">s</span><span style="font-family:;" "=""> of hazards are important. However, the information that integrates multiple hazards is not well maintained, and there are few such studies. On the other hand, in Japan, a lot of hazard information is being released on the Internet. So, we summarized and assessed hazard data that can be accessed online regarding shelters (where evacuees live during disasters) and their catchments (areas assigned to each shelter) in Yokohama City, Kanagawa Prefecture. Based on the results, we investigated whether a grouping by cluster analysis would allow for multi-hazard assessment. We used four natural disasters (seismic, flood, tsunami, sediment disaster) and six parameters of other population and senior population. However, since the characteristics of the population and the senior population were almost the same, only population data was used in the final examination. From the cluster analysis, it was found that it is appropriate to group the designated evacuation centers in Yokohama City into six groups. In addition, each of the six groups was found <span>to have explainable characteristics, confirming the effectiveness of multi-hazard</span> creation using cluster analysis. For example, we divided, all hazards are low, both flood and Seismic hazards are high, sediment hazards are high, etc. In many Japanese cities, disaster prevention measures have been constructed in consideration of ground hazards, mainly for earthquake disasters. In this paper, we confirmed the consistency between the evaluation results of the multi-hazard evaluated here and the existing ground hazard map and examined the usefulness of the designated evacuation center. Finally, the validity was confirmed by comparing this result with the ground hazard based on the actual measurement by the past research. In places where the seismic hazard is large, the two are consistent with the fact that the easiness of shaking by actual measurement is also large.</span>展开更多
Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance wi...Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance with the principle of"concentrating patients,experts,resources and treatment".Designated hospitals are often the strength of the general hospital and general hospital complex layers of various kinds of personnel,campus area is large,multi-channel,ordinary outpatient accepts people more,for emergency and severe cases treatment in patients with normal difficulty pressuure big,suspected/confirmed cases,combined with the COVID-19 occurred when the traditional holiday,the country launched the emergency response since,process reform faces a difficult labor,shortage of mampower,protective shortages,short time limit,and many other difficulties,hospital infection prevention and control is facing unprecedented pressure.In this paper,the West China-Guang'an Hospital,Sichuan University(Guang'an people's hospital)as a designated hospital,on the basis of the relevant scheme of the national health committee,epidemic prevention and control of the actual,combined with comprehensive hospital leadership,mampower allocation,protection,security,patient management,disinfection isolation,preview triage,preventive measures,training,monitoring,etc.,with practical experience summary for the COVID-19 diring the hospital infection prevention and control to improve the practice exploration.展开更多
“Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,...“Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,including four classes in national economy,namely,industrial enterprises above designated size,construction and real estate development and management enterprises above qualifications,wholesale and retail,catering and accommodation enterprises,and service enterprises above designated size,which are the primary part of national economic and social development activities.This paper is focused on analyzing the practice and difficulties in the current statistics work of four-classes enterprises,and then this paper proposes some recommendations.展开更多
The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National ...The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National Geoparks of China in Sichuan Province, 18 UNESCO Global Geoparks in China, and 219 World Heritage sites in China and 8 European nations. Through analysis and synthesis, the author concludes that doubled designation, which also leads to unbalanced park distribution, is particularly prevalent in China other than in Europe. Therefore, on-site management agencies and related governments in China should carefully translate the doubled designations into responsibilities and harmonious partnerships between all stakeholders in order to enhance the management effectiveness and avoid paper park phenomenon.展开更多
Objective:To describe the information technology and artificial intelligence support in management experiences of the pediatric designated hospital in the wave of COVID-19 in Shanghai.Methods:We retrospectively conclu...Objective:To describe the information technology and artificial intelligence support in management experiences of the pediatric designated hospital in the wave of COVID-19 in Shanghai.Methods:We retrospectively concluded the management experiences at the largest pediatric designated hospital from March 1st to May 11th in 2022 in Shanghai.We summarized the application of Internet hospital,face recognition technology in outpatient department,critical illness warning system and remote consultation system in the ward and the structed electronic medical record in the inpatient system.We illustrated the role of the information system through the number and prognosis of patients treated.Results:The COVID-19 designated hospitals were built particularly for critical patients requiring high-level medical care,responded quickly and scientifically to prevent and control the epidemic situation.From March 1st to May 11th,2022,we received and treated 768 children confirmed by positive RT-PCR and treated at our center.In our management,we use Internet Information on the Internet Hospital,face recognition technology in outpatient department,critical illness warning system and remote consultation system in the ward,structed electronic medical record in the inpatient system.No deaths or nosocomial infections occurred.The number of offline outpatient visits dropped,from March to May 2022,146,106,48,379,57,686 respectively.But the outpatient volume on the internet hospital increased significantly(3,347 in March 2022 vs.372 in March 2021;4,465 in April 2022 vs.409 in April 2021;4,677 in May 2022 vs.538 in May 2021).Conclusions:Information technology and artificial intelligence has provided significant supports in the management.The system might optimize the admission screening process,increases the communication inside and outside the ward,achieves early detection and diagnosis,timely isolates patients,and timely treatment of various types of children.展开更多
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectio...Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones.展开更多
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and ...Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and its applications to various advanced control fields. First, the background of the development of ADP is described, emphasizing the significance of regulation and tracking control problems. Some effective offline and online algorithms for ADP/adaptive critic control are displayed, where the main results towards discrete-time systems and continuous-time systems are surveyed, respectively.Then, the research progress on adaptive critic control based on the event-triggered framework and under uncertain environment is discussed, respectively, where event-based design, robust stabilization, and game design are reviewed. Moreover, the extensions of ADP for addressing control problems under complex environment attract enormous attention. The ADP architecture is revisited under the perspective of data-driven and RL frameworks,showing how they promote ADP formulation significantly.Finally, several typical control applications with respect to RL and ADP are summarized, particularly in the fields of wastewater treatment processes and power systems, followed by some general prospects for future research. Overall, the comprehensive survey on ADP and RL for advanced control applications has d emonstrated its remarkable potential within the artificial intelligence era. In addition, it also plays a vital role in promoting environmental protection and industrial intelligence.展开更多
Lithium–sulfur(Li–S)batteries are supposed to be one of the most potential next-generation batteries owing to their high theoretical capacity and low cost.Nevertheless,the shuttle effect of firm multi-step two-elect...Lithium–sulfur(Li–S)batteries are supposed to be one of the most potential next-generation batteries owing to their high theoretical capacity and low cost.Nevertheless,the shuttle effect of firm multi-step two-electron reaction between sulfur and lithium in liquid electrolyte makes the capacity much smaller than the theoretical value.Many methods were proposed for inhibiting the shuttle effect of polysulfide,improving corresponding redox kinetics and enhancing the integral performance of Li–S batteries.Here,we will comprehensively and systematically summarize the strategies for inhibiting the shuttle effect from all components of Li–S batteries.First,the electrochemical principles/mechanism and origin of the shuttle effect are described in detail.Moreover,the efficient strategies,including boosting the sulfur conversion rate of sulfur,confining sulfur or lithium polysulfides(LPS)within cathode host,confining LPS in the shield layer,and preventing LPS from contacting the anode,will be discussed to suppress the shuttle effect.Then,recent advances in inhibition of shuttle effect in cathode,electrolyte,separator,and anode with the aforementioned strategies have been summarized to direct the further design of efficient materials for Li–S batteries.Finally,we present prospects for inhibition of the LPS shuttle and potential development directions in Li–S batteries.展开更多
High-entropy alloys(HEAs),which were introduced as a pioneering concept in 2004,have captured the keen interest of nu-merous researchers.Entropy,in this context,can be perceived as representing disorder and randomness...High-entropy alloys(HEAs),which were introduced as a pioneering concept in 2004,have captured the keen interest of nu-merous researchers.Entropy,in this context,can be perceived as representing disorder and randomness.By contrast,elemental composi-tions within alloy systems occupy specific structural sites in space,a concept referred to as structure.In accordance with Shannon entropy,structure is analogous to information.Generally,the arrangement of atoms within a material,termed its structure,plays a pivotal role in dictating its properties.In addition to expanding the array of options for alloy composites,HEAs afford ample opportunities for diverse structural designs.The profound influence of distinct structural features on the exceptional behaviors of alloys is underscored by numer-ous examples.These features include remarkably high fracture strength with excellent ductility,antiballistic capability,exceptional radi-ation resistance,and corrosion resistance.In this paper,we delve into various unique material structures and properties while elucidating the intricate relationship between structure and performance.展开更多
基金Supported by the National Natural Science Foun-dation of Chinafor Distinguished Young Scholars(60225007) the Na-tional Research Fundfor the Doctoral Programof Higher Education ofChina(20020248024) the Science and Technology Research Pro-ject of Shanghai (04DZ07067)
文摘In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient.
基金This work was partially supported by the National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(No.2018R1A4A1025632)the Soonchunhyang University Research Fund.
文摘With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking services.For this reason,a countermeasure is required to improve the security of the online identification process.The current security and authentication mechanisms applied to financial services,such as Internet banking services for 5G-enabled IoT,do not ensure security.In this paper,a transaction-linkage technique with which the designated terminal is combined is proposed to solve this fundamental problem.The technique improves the security of online identification mechanisms because it is possible to counteract all of the existing security threats.The proposed technique supports mutual authentication and is safe from eavesdropping attacks,replay attacks,spoofing attacks,and service-denial attacks.Moreover,the technique supports non-repudiation by storing the transaction history in a transaction-linkage device.We believe that the security of Internet-banking services for 5G-enabled IoT will be increased through the utilization of the proposed technique.
基金Supported by Scientific Research Common Programof Beijing Municipal Commission of Education ( KM200610009011)Open Fund of State Key Laboratory of Information Security(Institute of Software of Chinese Academy of Sciences) (02-4)
文摘Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.
文摘Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are likely not aware of the specific types of disaster. So, first of all, we need to know what kind<span style="font-family:;" "="">s</span><span style="font-family:;" "=""> of hazards are important. However, the information that integrates multiple hazards is not well maintained, and there are few such studies. On the other hand, in Japan, a lot of hazard information is being released on the Internet. So, we summarized and assessed hazard data that can be accessed online regarding shelters (where evacuees live during disasters) and their catchments (areas assigned to each shelter) in Yokohama City, Kanagawa Prefecture. Based on the results, we investigated whether a grouping by cluster analysis would allow for multi-hazard assessment. We used four natural disasters (seismic, flood, tsunami, sediment disaster) and six parameters of other population and senior population. However, since the characteristics of the population and the senior population were almost the same, only population data was used in the final examination. From the cluster analysis, it was found that it is appropriate to group the designated evacuation centers in Yokohama City into six groups. In addition, each of the six groups was found <span>to have explainable characteristics, confirming the effectiveness of multi-hazard</span> creation using cluster analysis. For example, we divided, all hazards are low, both flood and Seismic hazards are high, sediment hazards are high, etc. In many Japanese cities, disaster prevention measures have been constructed in consideration of ground hazards, mainly for earthquake disasters. In this paper, we confirmed the consistency between the evaluation results of the multi-hazard evaluated here and the existing ground hazard map and examined the usefulness of the designated evacuation center. Finally, the validity was confirmed by comparing this result with the ground hazard based on the actual measurement by the past research. In places where the seismic hazard is large, the two are consistent with the fact that the easiness of shaking by actual measurement is also large.</span>
文摘Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance with the principle of"concentrating patients,experts,resources and treatment".Designated hospitals are often the strength of the general hospital and general hospital complex layers of various kinds of personnel,campus area is large,multi-channel,ordinary outpatient accepts people more,for emergency and severe cases treatment in patients with normal difficulty pressuure big,suspected/confirmed cases,combined with the COVID-19 occurred when the traditional holiday,the country launched the emergency response since,process reform faces a difficult labor,shortage of mampower,protective shortages,short time limit,and many other difficulties,hospital infection prevention and control is facing unprecedented pressure.In this paper,the West China-Guang'an Hospital,Sichuan University(Guang'an people's hospital)as a designated hospital,on the basis of the relevant scheme of the national health committee,epidemic prevention and control of the actual,combined with comprehensive hospital leadership,mampower allocation,protection,security,patient management,disinfection isolation,preview triage,preventive measures,training,monitoring,etc.,with practical experience summary for the COVID-19 diring the hospital infection prevention and control to improve the practice exploration.
文摘“Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,including four classes in national economy,namely,industrial enterprises above designated size,construction and real estate development and management enterprises above qualifications,wholesale and retail,catering and accommodation enterprises,and service enterprises above designated size,which are the primary part of national economic and social development activities.This paper is focused on analyzing the practice and difficulties in the current statistics work of four-classes enterprises,and then this paper proposes some recommendations.
基金Lab Construction Support Funding for Returned Oversea Scholars, Ministry of Education, No.[2003]18
文摘The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National Geoparks of China in Sichuan Province, 18 UNESCO Global Geoparks in China, and 219 World Heritage sites in China and 8 European nations. Through analysis and synthesis, the author concludes that doubled designation, which also leads to unbalanced park distribution, is particularly prevalent in China other than in Europe. Therefore, on-site management agencies and related governments in China should carefully translate the doubled designations into responsibilities and harmonious partnerships between all stakeholders in order to enhance the management effectiveness and avoid paper park phenomenon.
基金Evaluation Study on Fudan Pediatric Medical Consortium's Response to Public Health Emergencies Based on the Prevention and Control of COVID-19 of Shanghai Municipal Health Commission under Grant No.202150028Practical Research on Medical Management of Integrated Paediatric COVID-19 Designated Hospital in peacetime and wartime of Shanghai Shenkang Hospital Development Center under Grant No.2022SKMR-17Research on the Exploration and Application of the"4s"Management Mode of Pediatric Medical Safety under the Normalized Epidemic Prevention and Control of Shanghai Shenkang Hospital Development Center under Grant No.SHDC12021620.
文摘Objective:To describe the information technology and artificial intelligence support in management experiences of the pediatric designated hospital in the wave of COVID-19 in Shanghai.Methods:We retrospectively concluded the management experiences at the largest pediatric designated hospital from March 1st to May 11th in 2022 in Shanghai.We summarized the application of Internet hospital,face recognition technology in outpatient department,critical illness warning system and remote consultation system in the ward and the structed electronic medical record in the inpatient system.We illustrated the role of the information system through the number and prognosis of patients treated.Results:The COVID-19 designated hospitals were built particularly for critical patients requiring high-level medical care,responded quickly and scientifically to prevent and control the epidemic situation.From March 1st to May 11th,2022,we received and treated 768 children confirmed by positive RT-PCR and treated at our center.In our management,we use Internet Information on the Internet Hospital,face recognition technology in outpatient department,critical illness warning system and remote consultation system in the ward,structed electronic medical record in the inpatient system.No deaths or nosocomial infections occurred.The number of offline outpatient visits dropped,from March to May 2022,146,106,48,379,57,686 respectively.But the outpatient volume on the internet hospital increased significantly(3,347 in March 2022 vs.372 in March 2021;4,465 in April 2022 vs.409 in April 2021;4,677 in May 2022 vs.538 in May 2021).Conclusions:Information technology and artificial intelligence has provided significant supports in the management.The system might optimize the admission screening process,increases the communication inside and outside the ward,achieves early detection and diagnosis,timely isolates patients,and timely treatment of various types of children.
基金supported by the National Natural Science Foundation of China(Nos.62172337,62241207)Key Project of GansuNatural Science Foundation(No.23JRRA685).
文摘Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones.
基金supported in part by the National Natural Science Foundation of China(62222301, 62073085, 62073158, 61890930-5, 62021003)the National Key Research and Development Program of China (2021ZD0112302, 2021ZD0112301, 2018YFC1900800-5)Beijing Natural Science Foundation (JQ19013)。
文摘Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and its applications to various advanced control fields. First, the background of the development of ADP is described, emphasizing the significance of regulation and tracking control problems. Some effective offline and online algorithms for ADP/adaptive critic control are displayed, where the main results towards discrete-time systems and continuous-time systems are surveyed, respectively.Then, the research progress on adaptive critic control based on the event-triggered framework and under uncertain environment is discussed, respectively, where event-based design, robust stabilization, and game design are reviewed. Moreover, the extensions of ADP for addressing control problems under complex environment attract enormous attention. The ADP architecture is revisited under the perspective of data-driven and RL frameworks,showing how they promote ADP formulation significantly.Finally, several typical control applications with respect to RL and ADP are summarized, particularly in the fields of wastewater treatment processes and power systems, followed by some general prospects for future research. Overall, the comprehensive survey on ADP and RL for advanced control applications has d emonstrated its remarkable potential within the artificial intelligence era. In addition, it also plays a vital role in promoting environmental protection and industrial intelligence.
基金support from the “Joint International Laboratory on Environmental and Energy Frontier Materials”“Innovation Research Team of High-Level Local Universities in Shanghai”support from the National Natural Science Foundation of China (22209103)
文摘Lithium–sulfur(Li–S)batteries are supposed to be one of the most potential next-generation batteries owing to their high theoretical capacity and low cost.Nevertheless,the shuttle effect of firm multi-step two-electron reaction between sulfur and lithium in liquid electrolyte makes the capacity much smaller than the theoretical value.Many methods were proposed for inhibiting the shuttle effect of polysulfide,improving corresponding redox kinetics and enhancing the integral performance of Li–S batteries.Here,we will comprehensively and systematically summarize the strategies for inhibiting the shuttle effect from all components of Li–S batteries.First,the electrochemical principles/mechanism and origin of the shuttle effect are described in detail.Moreover,the efficient strategies,including boosting the sulfur conversion rate of sulfur,confining sulfur or lithium polysulfides(LPS)within cathode host,confining LPS in the shield layer,and preventing LPS from contacting the anode,will be discussed to suppress the shuttle effect.Then,recent advances in inhibition of shuttle effect in cathode,electrolyte,separator,and anode with the aforementioned strategies have been summarized to direct the further design of efficient materials for Li–S batteries.Finally,we present prospects for inhibition of the LPS shuttle and potential development directions in Li–S batteries.
基金supported by the National Natural Science Foundation of China(No.52273280)the Creative Research Groups of China(No.51921001).
文摘High-entropy alloys(HEAs),which were introduced as a pioneering concept in 2004,have captured the keen interest of nu-merous researchers.Entropy,in this context,can be perceived as representing disorder and randomness.By contrast,elemental composi-tions within alloy systems occupy specific structural sites in space,a concept referred to as structure.In accordance with Shannon entropy,structure is analogous to information.Generally,the arrangement of atoms within a material,termed its structure,plays a pivotal role in dictating its properties.In addition to expanding the array of options for alloy composites,HEAs afford ample opportunities for diverse structural designs.The profound influence of distinct structural features on the exceptional behaviors of alloys is underscored by numer-ous examples.These features include remarkably high fracture strength with excellent ductility,antiballistic capability,exceptional radi-ation resistance,and corrosion resistance.In this paper,we delve into various unique material structures and properties while elucidating the intricate relationship between structure and performance.