We have applied strong coupling unitary transformation method combined with Bose–Einstein statistical law to investigate magnetopolaron energy level temperature effects in halogen ion crystal quantum wells.The obtain...We have applied strong coupling unitary transformation method combined with Bose–Einstein statistical law to investigate magnetopolaron energy level temperature effects in halogen ion crystal quantum wells.The obtained results showed that under magnetic field effect,magnetopolaron quasiparticle was formed through the interaction of electrons and surrounding phonons.At the same time,magnetopolaron was influenced by phonon temperature statistical law and important energy level shifts down and binding energy increases.This revealed that lattice temperature and magnetic field could easily affect magnetopolaron and the above results could play key roles in exploring thermoelectric conversion and conductivity of crystal materials.展开更多
Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the ...Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the nuclear binding energies are modeled directly using a machine-learning method called the Gaussian process. First, the binding energies for 2238 nuclei with Z > 20 and N > 20 are calculated using the Gaussian process in a physically motivated feature space, yielding an average deviation of 0.046 MeV and a standard deviation of 0.066 MeV. The results show the good learning ability of the Gaussian process in the studies of binding energies. Then, the predictive power of the Gaussian process is studied by calculating the binding energies for 108 nuclei newly included in AME2020. The theoretical results are in good agreement with the experimental data, reflecting the good predictive power of the Gaussian process. Moreover, the α-decay energies for 1169 nuclei with 50 ≤ Z ≤ 110 are derived from the theoretical binding energies calculated using the Gaussian process. The average deviation and the standard deviation are, respectively, 0.047 MeV and 0.070 MeV. Noticeably, the calculated α-decay energies for the two new isotopes ^ (204 )Ac(Huang et al. Phys Lett B 834, 137484(2022)) and ^ (207) Th(Yang et al. Phys Rev C 105, L051302(2022)) agree well with the latest experimental data. These results demonstrate that the Gaussian process is reliable for the calculations of nuclear binding energies. Finally, the α-decay properties of some unknown actinide nuclei are predicted using the Gaussian process. The predicted results can be useful guides for future research on binding energies and α-decay properties.展开更多
Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X...Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X_(i)(s))^(2))^(1/2)(i=1,…,d)is commensurate with■for s=(s_(1),…,s_(N)),t=(t_(1),…,t_(N))∈R~N,α_(i)∈(0,1],and with the continuous functionγ(·)satisfying certain conditions.First,the upper and lower bounds of the hitting probabilities of X can be derived from the corresponding generalized Hausdorff measure and capacity,which are based on the kernel functions depending explicitly onγ(·).Furthermore,the multiple intersections of the sample paths of two independent centered space-time anisotropic Gaussian fields with different distributions are considered.Our results extend the corresponding results for anisotropic Gaussian fields to a large class of space-time anisotropic Gaussian fields.展开更多
To accurately model flows with shock waves using staggered-grid Lagrangian hydrodynamics, the artificial viscosity has to be introduced to convert kinetic energy into internal energy, thereby increasing the entropy ac...To accurately model flows with shock waves using staggered-grid Lagrangian hydrodynamics, the artificial viscosity has to be introduced to convert kinetic energy into internal energy, thereby increasing the entropy across shocks. Determining the appropriate strength of the artificial viscosity is an art and strongly depends on the particular problem and experience of the researcher. The objective of this study is to pose the problem of finding the appropriate strength of the artificial viscosity as an optimization problem and solve this problem using machine learning (ML) tools, specifically using surrogate models based on Gaussian Process regression (GPR) and Bayesian analysis. We describe the optimization method and discuss various practical details of its implementation. The shock-containing problems for which we apply this method all have been implemented in the LANL code FLAG (Burton in Connectivity structures and differencing techniques for staggered-grid free-Lagrange hydrodynamics, Tech. Rep. UCRL-JC-110555, Lawrence Livermore National Laboratory, Livermore, CA, 1992, 1992, in Consistent finite-volume discretization of hydrodynamic conservation laws for unstructured grids, Tech. Rep. CRL-JC-118788, Lawrence Livermore National Laboratory, Livermore, CA, 1992, 1994, Multidimensional discretization of conservation laws for unstructured polyhedral grids, Tech. Rep. UCRL-JC-118306, Lawrence Livermore National Laboratory, Livermore, CA, 1992, 1994, in FLAG, a multi-dimensional, multiple mesh, adaptive free-Lagrange, hydrodynamics code. In: NECDC, 1992). First, we apply ML to find optimal values to isolated shock problems of different strengths. Second, we apply ML to optimize the viscosity for a one-dimensional (1D) propagating detonation problem based on Zel’dovich-von Neumann-Doring (ZND) (Fickett and Davis in Detonation: theory and experiment. Dover books on physics. Dover Publications, Mineola, 2000) detonation theory using a reactive burn model. We compare results for default (currently used values in FLAG) and optimized values of the artificial viscosity for these problems demonstrating the potential for significant improvement in the accuracy of computations.展开更多
The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is ...The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is an effective technique for acquiring detailed information on geological structures in coal seam working faces.However,the existing reflected in-seam wave imaging technique can no longer meet the exploration precision requirements,making it imperative to develop a new reflected in-seam wave imaging technique.This study applies the Gaussian beam summation(GBS)migration method to imaging coal seams'reflected in-seam wave data.Firstly,with regard to the characteristics of the reflected in-seam wave data,methods such as wavefield removal and enveloped superposition are employed for the corresponding wavefield separation,wave train compression and other processing of reflected in-seam waves.Thereafter,imaging is performed using the GBS migration technique.The feasibility and effectiveness of the proposed method for reflected in-seam wave imaging are validated by conducting GBS migration tests on 3D coal-seam fault models with different dip angles and throws.By applying the method to reflected in-seam wave data for an actual coal seam working face,accurate imaging of a fault structure is obtained,thereby validating its practicality.展开更多
Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstruct...Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstructed from an OAM-multiplexing hologram. However, the traditional design of an OAM hologram is constrained by the helical mode index of the selected OAM mode, for a larger helical mode index OAM mode has a bigger sampling distance, and the crosstalk is produced for different sampling distances for different OAM modes. In this paper, we present the design of the OAM hologram based on a Bessel–Gaussian beam, which is non-diffractive and has a self-healing property during its propagation. The Fourier transform of the Bessel–Gaussian beam is the perfect vortex mode that has the fixed ring radius for different OAM modes. The results of simulation and experiment have demonstrated the feasibility of the generation of the OAM hologram with the Bessel–Gaussian beam. The quality of the reconstructed holographic image is increased, and the security is enhanced. Additionally, the anti-interference property is improved owing to its self-healing property of the Bessel-OAM holography.展开更多
Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to...Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to differentiate between quantum entanglement and quantum correlation.Nonetheless,this indistinguishability is no longer holds for mixed states.To contribute to a better understanding of this differentiation,we have explored a simple model for both generating and measuring these quantum correlations.Our study concerns two macroscopic mechanical resonators placed in separate Fabry–Pérot cavities,coupled through the photon hopping process.this system offers a comprehensively way to investigate and quantify quantum correlations beyond entanglement between these mechanical modes.The key ingredient in analyzing quantum correlation in this system is the global covariance matrix.It forms the basis for computing two essential metrics:the logarithmic negativity(E_(N)^(m))and the Gaussian interferometric power(P_(G)^(m)).These metrics provide the tools to measure the degree of quantum entanglement and quantum correlations,respectively.Our study reveals that the Gaussian interferometric power(P_(G)^(m))proves to be a more suitable metric for characterizing quantum correlations among the mechanical modes in an optomechanical quantum system,particularly in scenarios featuring resilient photon hopping.展开更多
Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation indust...Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process.展开更多
This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian mod...This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian model with different parameters,and the target is modeled as a subspace rangespread target model.The persymmetric structure is used to model the clutter covariance matrix,in order to reduce the reliance on secondary data of the designed detectors.Three adaptive polarimetric persymmetric detectors are designed based on the generalized likelihood ratio test(GLRT),Rao test,and Wald test.All the proposed detectors have constant falsealarm rate property with respect to the clutter texture,the speckle covariance matrix.Experimental results on simulated and measured data show that three adaptive detectors outperform the competitors in different clutter environments,and the proposed GLRT detector has the best detection performance under different parameters.展开更多
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim...Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher security.Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack implementation.To overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)algorithm.This approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear problems.This limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to detect.To verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat model.Based on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack methods.We also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering techniques.The experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior stealthiness.Furthermore,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.展开更多
Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying som...Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying some mild assumptions.Let HX,L(ℝ^(n))be the Hardy space associated with both X and L,which is defined by the Lusin area function related to the semigroup generated by L.In this article,the authors establish various maximal function characterizations of the Hardy space HX,L(ℝ^(n))and then apply these characterizations to obtain the solvability of the related Cauchy problem.These results have a wide range of generality and,in particular,the specific spaces X to which these results can be applied include the weighted space,the variable space,the mixed-norm space,the Orlicz space,the Orlicz-slice space,and the Morrey space.Moreover,the obtained maximal function characterizations of the mixed-norm Hardy space,the Orlicz-slice Hardy space,and the Morrey-Hardy space associated with L are completely new.展开更多
In recent years,machine learning(ML)and deep learning(DL)have significantly advanced intrusion detection systems,effectively addressing potential malicious attacks across networks.This paper introduces a robust method...In recent years,machine learning(ML)and deep learning(DL)have significantly advanced intrusion detection systems,effectively addressing potential malicious attacks across networks.This paper introduces a robust method for detecting and categorizing attacks within the Internet of Things(IoT)environment,leveraging the NSL-KDD dataset.To achieve high accuracy,the authors used the feature extraction technique in combination with an autoencoder,integrated with a gated recurrent unit(GRU).Therefore,the accurate features are selected by using the cuckoo search algorithm integrated particle swarm optimization(PSO),and PSO has been employed for training the features.The final classification of features has been carried out by using the proposed RF-GNB random forest with the Gaussian Naïve Bayes classifier.The proposed model has been evaluated and its performance is verified with some of the standard metrics such as precision,accuracy rate,recall F1-score,etc.,and has been compared with different existing models.The generated results that detected approximately 99.87%of intrusions within the IoT environments,demonstrated the high performance of the proposed method.These results affirmed the efficacy of the proposed method in increasing the accuracy of intrusion detection within IoT network systems.展开更多
The noise that comes from finite element simulation often causes the model to fall into the local optimal solution and over fitting during optimization of generator.Thus,this paper proposes a Gaussian Process Regressi...The noise that comes from finite element simulation often causes the model to fall into the local optimal solution and over fitting during optimization of generator.Thus,this paper proposes a Gaussian Process Regression(GPR)model based on Conditional Likelihood Lower Bound Search(CLLBS)to optimize the design of the generator,which can filter the noise in the data and search for global optimization by combining the Conditional Likelihood Lower Bound Search method.Taking the efficiency optimization of 15 kW Permanent Magnet Synchronous Motor as an example.Firstly,this method uses the elementary effect analysis to choose the sensitive variables,combining the evolutionary algorithm to design the super Latin cube sampling plan;Then the generator-converter system is simulated by establishing a co-simulation platform to obtain data.A Gaussian process regression model combing the method of the conditional likelihood lower bound search is established,which combined the chi-square test to optimize the accuracy of the model globally.Secondly,after the model reaches the accuracy,the Pareto frontier is obtained through the NSGA-II algorithm by considering the maximum output torque as a constraint.Last,the constrained optimization is transformed into an unconstrained optimizing problem by introducing maximum constrained improvement expectation(CEI)optimization method based on the re-interpolation model,which cross-validated the optimization results of the Gaussian process regression model.The above method increase the efficiency of generator by 0.76%and 0.5%respectively;And this method can be used for rapid modeling and multi-objective optimization of generator systems.展开更多
The performance of lithium-ion batteries(LIBs)gradually declines over time,making it critical to predict the battery’s state of health(SOH)in real-time.This paper presents a model that incorporates health indicators ...The performance of lithium-ion batteries(LIBs)gradually declines over time,making it critical to predict the battery’s state of health(SOH)in real-time.This paper presents a model that incorporates health indicators and ensemble Gaussian process regression(EGPR)to predict the SOH of LIBs.Firstly,the degradation process of an LIB is analyzed through indirect health indicators(HIs)derived from voltage and temperature during discharge.Next,the parameters in the EGPR model are optimized using the gannet optimization algorithm(GOA),and the EGPR is employed to estimate the SOH of LIBs.Finally,the proposed model is tested under various experimental scenarios and compared with other machine learning models.The effectiveness of EGPR model is demonstrated using the National Aeronautics and Space Administration(NASA)LIB.The root mean square error(RMSE)is maintained within 0.20%,and the mean absolute error(MAE)is below 0.16%,illustrating the proposed approach’s excellent predictive accuracy and wide applicability.展开更多
In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the ...In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers(GI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.But the prime field dependent on the Elliptic curve(EC)provides one S-box at a time by fixing three parameters a,b,and p.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability.展开更多
Wireless sensor network(WSN)positioning has a good effect on indoor positioning,so it has received extensive attention in the field of positioning.Non-line-of sight(NLOS)is a primary challenge in indoor complex enviro...Wireless sensor network(WSN)positioning has a good effect on indoor positioning,so it has received extensive attention in the field of positioning.Non-line-of sight(NLOS)is a primary challenge in indoor complex environment.In this paper,a robust localization algorithm based on Gaussian mixture model and fitting polynomial is proposed to solve the problem of NLOS error.Firstly,fitting polynomials are used to predict the measured values.The residuals of predicted and measured values are clustered by Gaussian mixture model(GMM).The LOS probability and NLOS probability are calculated according to the clustering centers.The measured values are filtered by Kalman filter(KF),variable parameter unscented Kalman filter(VPUKF)and variable parameter particle filter(VPPF)in turn.The distance value processed by KF and VPUKF and the distance value processed by KF,VPUKF and VPPF are combined according to probability.Finally,the maximum likelihood method is used to calculate the position coordinate estimation.Through simulation comparison,the proposed algorithm has better positioning accuracy than several comparison algorithms in this paper.And it shows strong robustness in strong NLOS environment.展开更多
基金the National Natural Science Foundation of China(Grant Nos.12164032,11964026,and 12364010)the Natural Science Foundation of Inner Mongolia Autonomous Region,China(Grant Nos.2019MS01010,2022MS01014,and 2020BS01009)+1 种基金the Doctor Research Start-up Fund of Inner Mongolia Minzu University(Grant Nos.BS625 and BS439)the Basic Research Funds for Universities Directly under the Inner Mongolia Autonomous Region,China(Grant No.GXKY23Z029).
文摘We have applied strong coupling unitary transformation method combined with Bose–Einstein statistical law to investigate magnetopolaron energy level temperature effects in halogen ion crystal quantum wells.The obtained results showed that under magnetic field effect,magnetopolaron quasiparticle was formed through the interaction of electrons and surrounding phonons.At the same time,magnetopolaron was influenced by phonon temperature statistical law and important energy level shifts down and binding energy increases.This revealed that lattice temperature and magnetic field could easily affect magnetopolaron and the above results could play key roles in exploring thermoelectric conversion and conductivity of crystal materials.
基金the National Key R&D Program of China(No.2023YFA1606503)the National Natural Science Foundation of China(Nos.12035011,11975167,11947211,11905103,11881240623,and 11961141003).
文摘Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the nuclear binding energies are modeled directly using a machine-learning method called the Gaussian process. First, the binding energies for 2238 nuclei with Z > 20 and N > 20 are calculated using the Gaussian process in a physically motivated feature space, yielding an average deviation of 0.046 MeV and a standard deviation of 0.066 MeV. The results show the good learning ability of the Gaussian process in the studies of binding energies. Then, the predictive power of the Gaussian process is studied by calculating the binding energies for 108 nuclei newly included in AME2020. The theoretical results are in good agreement with the experimental data, reflecting the good predictive power of the Gaussian process. Moreover, the α-decay energies for 1169 nuclei with 50 ≤ Z ≤ 110 are derived from the theoretical binding energies calculated using the Gaussian process. The average deviation and the standard deviation are, respectively, 0.047 MeV and 0.070 MeV. Noticeably, the calculated α-decay energies for the two new isotopes ^ (204 )Ac(Huang et al. Phys Lett B 834, 137484(2022)) and ^ (207) Th(Yang et al. Phys Rev C 105, L051302(2022)) agree well with the latest experimental data. These results demonstrate that the Gaussian process is reliable for the calculations of nuclear binding energies. Finally, the α-decay properties of some unknown actinide nuclei are predicted using the Gaussian process. The predicted results can be useful guides for future research on binding energies and α-decay properties.
基金supported by the National Natural Science Foundation of China(12371150,11971432)the Natural Science Foundation of Zhejiang Province(LY21G010003)+2 种基金the Management Project of"Digital+"Discipline Construction of Zhejiang Gongshang University(SZJ2022A012,SZJ2022B017)the Characteristic&Preponderant Discipline of Key Construction Universities in Zhejiang Province(Zhejiang Gongshang University-Statistics)the Scientific Research Projects of Universities in Anhui Province(2022AH050955)。
文摘Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X_(i)(s))^(2))^(1/2)(i=1,…,d)is commensurate with■for s=(s_(1),…,s_(N)),t=(t_(1),…,t_(N))∈R~N,α_(i)∈(0,1],and with the continuous functionγ(·)satisfying certain conditions.First,the upper and lower bounds of the hitting probabilities of X can be derived from the corresponding generalized Hausdorff measure and capacity,which are based on the kernel functions depending explicitly onγ(·).Furthermore,the multiple intersections of the sample paths of two independent centered space-time anisotropic Gaussian fields with different distributions are considered.Our results extend the corresponding results for anisotropic Gaussian fields to a large class of space-time anisotropic Gaussian fields.
基金This work was performed under the auspices of the National Nuclear Security Administration of the US Department of Energy at Los Alamos National Laboratory under Contract No.89233218CNA000001The Authors gratefully acknowledge the support of the US Department of Energy National Nuclear Security Administration Advanced Simulation and Computing Program.LA-UR-22-33159.
文摘To accurately model flows with shock waves using staggered-grid Lagrangian hydrodynamics, the artificial viscosity has to be introduced to convert kinetic energy into internal energy, thereby increasing the entropy across shocks. Determining the appropriate strength of the artificial viscosity is an art and strongly depends on the particular problem and experience of the researcher. The objective of this study is to pose the problem of finding the appropriate strength of the artificial viscosity as an optimization problem and solve this problem using machine learning (ML) tools, specifically using surrogate models based on Gaussian Process regression (GPR) and Bayesian analysis. We describe the optimization method and discuss various practical details of its implementation. The shock-containing problems for which we apply this method all have been implemented in the LANL code FLAG (Burton in Connectivity structures and differencing techniques for staggered-grid free-Lagrange hydrodynamics, Tech. Rep. UCRL-JC-110555, Lawrence Livermore National Laboratory, Livermore, CA, 1992, 1992, in Consistent finite-volume discretization of hydrodynamic conservation laws for unstructured grids, Tech. Rep. CRL-JC-118788, Lawrence Livermore National Laboratory, Livermore, CA, 1992, 1994, Multidimensional discretization of conservation laws for unstructured polyhedral grids, Tech. Rep. UCRL-JC-118306, Lawrence Livermore National Laboratory, Livermore, CA, 1992, 1994, in FLAG, a multi-dimensional, multiple mesh, adaptive free-Lagrange, hydrodynamics code. In: NECDC, 1992). First, we apply ML to find optimal values to isolated shock problems of different strengths. Second, we apply ML to optimize the viscosity for a one-dimensional (1D) propagating detonation problem based on Zel’dovich-von Neumann-Doring (ZND) (Fickett and Davis in Detonation: theory and experiment. Dover books on physics. Dover Publications, Mineola, 2000) detonation theory using a reactive burn model. We compare results for default (currently used values in FLAG) and optimized values of the artificial viscosity for these problems demonstrating the potential for significant improvement in the accuracy of computations.
基金supported by the National Natural Science Foundation of China(Grant No.42174157)the CAGS Research Fund(Grant No.JKY202216)the Chinese Geological Survey Project(Grant Nos.DD20230008,DD20233002).
文摘The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is an effective technique for acquiring detailed information on geological structures in coal seam working faces.However,the existing reflected in-seam wave imaging technique can no longer meet the exploration precision requirements,making it imperative to develop a new reflected in-seam wave imaging technique.This study applies the Gaussian beam summation(GBS)migration method to imaging coal seams'reflected in-seam wave data.Firstly,with regard to the characteristics of the reflected in-seam wave data,methods such as wavefield removal and enveloped superposition are employed for the corresponding wavefield separation,wave train compression and other processing of reflected in-seam waves.Thereafter,imaging is performed using the GBS migration technique.The feasibility and effectiveness of the proposed method for reflected in-seam wave imaging are validated by conducting GBS migration tests on 3D coal-seam fault models with different dip angles and throws.By applying the method to reflected in-seam wave data for an actual coal seam working face,accurate imaging of a fault structure is obtained,thereby validating its practicality.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.62375140 and 62001249)the Open Research Fund of the National Laboratory of Solid State Microstructures (Grant No.M36055)。
文摘Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstructed from an OAM-multiplexing hologram. However, the traditional design of an OAM hologram is constrained by the helical mode index of the selected OAM mode, for a larger helical mode index OAM mode has a bigger sampling distance, and the crosstalk is produced for different sampling distances for different OAM modes. In this paper, we present the design of the OAM hologram based on a Bessel–Gaussian beam, which is non-diffractive and has a self-healing property during its propagation. The Fourier transform of the Bessel–Gaussian beam is the perfect vortex mode that has the fixed ring radius for different OAM modes. The results of simulation and experiment have demonstrated the feasibility of the generation of the OAM hologram with the Bessel–Gaussian beam. The quality of the reconstructed holographic image is increased, and the security is enhanced. Additionally, the anti-interference property is improved owing to its self-healing property of the Bessel-OAM holography.
文摘Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to differentiate between quantum entanglement and quantum correlation.Nonetheless,this indistinguishability is no longer holds for mixed states.To contribute to a better understanding of this differentiation,we have explored a simple model for both generating and measuring these quantum correlations.Our study concerns two macroscopic mechanical resonators placed in separate Fabry–Pérot cavities,coupled through the photon hopping process.this system offers a comprehensively way to investigate and quantify quantum correlations beyond entanglement between these mechanical modes.The key ingredient in analyzing quantum correlation in this system is the global covariance matrix.It forms the basis for computing two essential metrics:the logarithmic negativity(E_(N)^(m))and the Gaussian interferometric power(P_(G)^(m)).These metrics provide the tools to measure the degree of quantum entanglement and quantum correlations,respectively.Our study reveals that the Gaussian interferometric power(P_(G)^(m))proves to be a more suitable metric for characterizing quantum correlations among the mechanical modes in an optomechanical quantum system,particularly in scenarios featuring resilient photon hopping.
基金supported in part by the National Key Research and Development Program of China(2021YFC2902703)the National Natural Science Foundation of China(62173078,61773105,61533007,61873049,61873053,61703085,61374147)。
文摘Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process.
基金supported by the National Natural Science Foundation of China(62371382,62071346)the Science,Technology&Innovation Project of Xiong’an New Area(2022XAGG0181)the Special Funds for Creative Research(2022C61540)。
文摘This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian model with different parameters,and the target is modeled as a subspace rangespread target model.The persymmetric structure is used to model the clutter covariance matrix,in order to reduce the reliance on secondary data of the designed detectors.Three adaptive polarimetric persymmetric detectors are designed based on the generalized likelihood ratio test(GLRT),Rao test,and Wald test.All the proposed detectors have constant falsealarm rate property with respect to the clutter texture,the speckle covariance matrix.Experimental results on simulated and measured data show that three adaptive detectors outperform the competitors in different clutter environments,and the proposed GLRT detector has the best detection performance under different parameters.
基金funded by National Natural Science Foundation of China under Grant No.61806171The Sichuan University of Science&Engineering Talent Project under Grant No.2021RC15Sichuan University of Science&Engineering Graduate Student Innovation Fund under Grant No.Y2023115,The Scientific Research and Innovation Team Program of Sichuan University of Science and Technology under Grant No.SUSE652A006.
文摘Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher security.Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack implementation.To overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)algorithm.This approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear problems.This limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to detect.To verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat model.Based on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack methods.We also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering techniques.The experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior stealthiness.Furthermore,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.
基金supported by the National Key Research and Development Program of China(2020YFA0712900)the National Natural Science Foundation of China(12371093,12071197,12122102 and 12071431)+2 种基金the Key Project of Gansu Provincial National Science Foundation(23JRRA1022)the Fundamental Research Funds for the Central Universities(2233300008 and lzujbky-2021-ey18)the Innovative Groups of Basic Research in Gansu Province(22JR5RA391).
文摘Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying some mild assumptions.Let HX,L(ℝ^(n))be the Hardy space associated with both X and L,which is defined by the Lusin area function related to the semigroup generated by L.In this article,the authors establish various maximal function characterizations of the Hardy space HX,L(ℝ^(n))and then apply these characterizations to obtain the solvability of the related Cauchy problem.These results have a wide range of generality and,in particular,the specific spaces X to which these results can be applied include the weighted space,the variable space,the mixed-norm space,the Orlicz space,the Orlicz-slice space,and the Morrey space.Moreover,the obtained maximal function characterizations of the mixed-norm Hardy space,the Orlicz-slice Hardy space,and the Morrey-Hardy space associated with L are completely new.
基金the Deanship of Scientific Research at Shaqra University for funding this research work through the project number(SU-ANN-2023051).
文摘In recent years,machine learning(ML)and deep learning(DL)have significantly advanced intrusion detection systems,effectively addressing potential malicious attacks across networks.This paper introduces a robust method for detecting and categorizing attacks within the Internet of Things(IoT)environment,leveraging the NSL-KDD dataset.To achieve high accuracy,the authors used the feature extraction technique in combination with an autoencoder,integrated with a gated recurrent unit(GRU).Therefore,the accurate features are selected by using the cuckoo search algorithm integrated particle swarm optimization(PSO),and PSO has been employed for training the features.The final classification of features has been carried out by using the proposed RF-GNB random forest with the Gaussian Naïve Bayes classifier.The proposed model has been evaluated and its performance is verified with some of the standard metrics such as precision,accuracy rate,recall F1-score,etc.,and has been compared with different existing models.The generated results that detected approximately 99.87%of intrusions within the IoT environments,demonstrated the high performance of the proposed method.These results affirmed the efficacy of the proposed method in increasing the accuracy of intrusion detection within IoT network systems.
基金supported in part by the National Key Research and Development Program of China(2019YFB1503700)the Hunan Natural Science Foundation-Science and Education Joint Project(2019JJ70063)。
文摘The noise that comes from finite element simulation often causes the model to fall into the local optimal solution and over fitting during optimization of generator.Thus,this paper proposes a Gaussian Process Regression(GPR)model based on Conditional Likelihood Lower Bound Search(CLLBS)to optimize the design of the generator,which can filter the noise in the data and search for global optimization by combining the Conditional Likelihood Lower Bound Search method.Taking the efficiency optimization of 15 kW Permanent Magnet Synchronous Motor as an example.Firstly,this method uses the elementary effect analysis to choose the sensitive variables,combining the evolutionary algorithm to design the super Latin cube sampling plan;Then the generator-converter system is simulated by establishing a co-simulation platform to obtain data.A Gaussian process regression model combing the method of the conditional likelihood lower bound search is established,which combined the chi-square test to optimize the accuracy of the model globally.Secondly,after the model reaches the accuracy,the Pareto frontier is obtained through the NSGA-II algorithm by considering the maximum output torque as a constraint.Last,the constrained optimization is transformed into an unconstrained optimizing problem by introducing maximum constrained improvement expectation(CEI)optimization method based on the re-interpolation model,which cross-validated the optimization results of the Gaussian process regression model.The above method increase the efficiency of generator by 0.76%and 0.5%respectively;And this method can be used for rapid modeling and multi-objective optimization of generator systems.
基金supported by Fundamental Research Program of Shanxi Province(No.202203021211088)Shanxi Provincial Natural Science Foundation(No.202204021301049).
文摘The performance of lithium-ion batteries(LIBs)gradually declines over time,making it critical to predict the battery’s state of health(SOH)in real-time.This paper presents a model that incorporates health indicators and ensemble Gaussian process regression(EGPR)to predict the SOH of LIBs.Firstly,the degradation process of an LIB is analyzed through indirect health indicators(HIs)derived from voltage and temperature during discharge.Next,the parameters in the EGPR model are optimized using the gannet optimization algorithm(GOA),and the EGPR is employed to estimate the SOH of LIBs.Finally,the proposed model is tested under various experimental scenarios and compared with other machine learning models.The effectiveness of EGPR model is demonstrated using the National Aeronautics and Space Administration(NASA)LIB.The root mean square error(RMSE)is maintained within 0.20%,and the mean absolute error(MAE)is below 0.16%,illustrating the proposed approach’s excellent predictive accuracy and wide applicability.
文摘In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers(GI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.But the prime field dependent on the Elliptic curve(EC)provides one S-box at a time by fixing three parameters a,b,and p.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability.
基金supported by the National Natural Science Foundation of China under Grant No.62273083 and No.61973069Natural Science Foundation of Hebei Province under Grant No.F2020501012。
文摘Wireless sensor network(WSN)positioning has a good effect on indoor positioning,so it has received extensive attention in the field of positioning.Non-line-of sight(NLOS)is a primary challenge in indoor complex environment.In this paper,a robust localization algorithm based on Gaussian mixture model and fitting polynomial is proposed to solve the problem of NLOS error.Firstly,fitting polynomials are used to predict the measured values.The residuals of predicted and measured values are clustered by Gaussian mixture model(GMM).The LOS probability and NLOS probability are calculated according to the clustering centers.The measured values are filtered by Kalman filter(KF),variable parameter unscented Kalman filter(VPUKF)and variable parameter particle filter(VPPF)in turn.The distance value processed by KF and VPUKF and the distance value processed by KF,VPUKF and VPPF are combined according to probability.Finally,the maximum likelihood method is used to calculate the position coordinate estimation.Through simulation comparison,the proposed algorithm has better positioning accuracy than several comparison algorithms in this paper.And it shows strong robustness in strong NLOS environment.