Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the ...Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the nuclear binding energies are modeled directly using a machine-learning method called the Gaussian process. First, the binding energies for 2238 nuclei with Z > 20 and N > 20 are calculated using the Gaussian process in a physically motivated feature space, yielding an average deviation of 0.046 MeV and a standard deviation of 0.066 MeV. The results show the good learning ability of the Gaussian process in the studies of binding energies. Then, the predictive power of the Gaussian process is studied by calculating the binding energies for 108 nuclei newly included in AME2020. The theoretical results are in good agreement with the experimental data, reflecting the good predictive power of the Gaussian process. Moreover, the α-decay energies for 1169 nuclei with 50 ≤ Z ≤ 110 are derived from the theoretical binding energies calculated using the Gaussian process. The average deviation and the standard deviation are, respectively, 0.047 MeV and 0.070 MeV. Noticeably, the calculated α-decay energies for the two new isotopes ^ (204 )Ac(Huang et al. Phys Lett B 834, 137484(2022)) and ^ (207) Th(Yang et al. Phys Rev C 105, L051302(2022)) agree well with the latest experimental data. These results demonstrate that the Gaussian process is reliable for the calculations of nuclear binding energies. Finally, the α-decay properties of some unknown actinide nuclei are predicted using the Gaussian process. The predicted results can be useful guides for future research on binding energies and α-decay properties.展开更多
Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X...Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X_(i)(s))^(2))^(1/2)(i=1,…,d)is commensurate with■for s=(s_(1),…,s_(N)),t=(t_(1),…,t_(N))∈R~N,α_(i)∈(0,1],and with the continuous functionγ(·)satisfying certain conditions.First,the upper and lower bounds of the hitting probabilities of X can be derived from the corresponding generalized Hausdorff measure and capacity,which are based on the kernel functions depending explicitly onγ(·).Furthermore,the multiple intersections of the sample paths of two independent centered space-time anisotropic Gaussian fields with different distributions are considered.Our results extend the corresponding results for anisotropic Gaussian fields to a large class of space-time anisotropic Gaussian fields.展开更多
The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is ...The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is an effective technique for acquiring detailed information on geological structures in coal seam working faces.However,the existing reflected in-seam wave imaging technique can no longer meet the exploration precision requirements,making it imperative to develop a new reflected in-seam wave imaging technique.This study applies the Gaussian beam summation(GBS)migration method to imaging coal seams'reflected in-seam wave data.Firstly,with regard to the characteristics of the reflected in-seam wave data,methods such as wavefield removal and enveloped superposition are employed for the corresponding wavefield separation,wave train compression and other processing of reflected in-seam waves.Thereafter,imaging is performed using the GBS migration technique.The feasibility and effectiveness of the proposed method for reflected in-seam wave imaging are validated by conducting GBS migration tests on 3D coal-seam fault models with different dip angles and throws.By applying the method to reflected in-seam wave data for an actual coal seam working face,accurate imaging of a fault structure is obtained,thereby validating its practicality.展开更多
Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstruct...Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstructed from an OAM-multiplexing hologram. However, the traditional design of an OAM hologram is constrained by the helical mode index of the selected OAM mode, for a larger helical mode index OAM mode has a bigger sampling distance, and the crosstalk is produced for different sampling distances for different OAM modes. In this paper, we present the design of the OAM hologram based on a Bessel–Gaussian beam, which is non-diffractive and has a self-healing property during its propagation. The Fourier transform of the Bessel–Gaussian beam is the perfect vortex mode that has the fixed ring radius for different OAM modes. The results of simulation and experiment have demonstrated the feasibility of the generation of the OAM hologram with the Bessel–Gaussian beam. The quality of the reconstructed holographic image is increased, and the security is enhanced. Additionally, the anti-interference property is improved owing to its self-healing property of the Bessel-OAM holography.展开更多
Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to...Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to differentiate between quantum entanglement and quantum correlation.Nonetheless,this indistinguishability is no longer holds for mixed states.To contribute to a better understanding of this differentiation,we have explored a simple model for both generating and measuring these quantum correlations.Our study concerns two macroscopic mechanical resonators placed in separate Fabry–Pérot cavities,coupled through the photon hopping process.this system offers a comprehensively way to investigate and quantify quantum correlations beyond entanglement between these mechanical modes.The key ingredient in analyzing quantum correlation in this system is the global covariance matrix.It forms the basis for computing two essential metrics:the logarithmic negativity(E_(N)^(m))and the Gaussian interferometric power(P_(G)^(m)).These metrics provide the tools to measure the degree of quantum entanglement and quantum correlations,respectively.Our study reveals that the Gaussian interferometric power(P_(G)^(m))proves to be a more suitable metric for characterizing quantum correlations among the mechanical modes in an optomechanical quantum system,particularly in scenarios featuring resilient photon hopping.展开更多
Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation indust...Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process.展开更多
This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian mod...This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian model with different parameters,and the target is modeled as a subspace rangespread target model.The persymmetric structure is used to model the clutter covariance matrix,in order to reduce the reliance on secondary data of the designed detectors.Three adaptive polarimetric persymmetric detectors are designed based on the generalized likelihood ratio test(GLRT),Rao test,and Wald test.All the proposed detectors have constant falsealarm rate property with respect to the clutter texture,the speckle covariance matrix.Experimental results on simulated and measured data show that three adaptive detectors outperform the competitors in different clutter environments,and the proposed GLRT detector has the best detection performance under different parameters.展开更多
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim...Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher security.Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack implementation.To overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)algorithm.This approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear problems.This limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to detect.To verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat model.Based on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack methods.We also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering techniques.The experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior stealthiness.Furthermore,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.展开更多
Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying som...Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying some mild assumptions.Let HX,L(ℝ^(n))be the Hardy space associated with both X and L,which is defined by the Lusin area function related to the semigroup generated by L.In this article,the authors establish various maximal function characterizations of the Hardy space HX,L(ℝ^(n))and then apply these characterizations to obtain the solvability of the related Cauchy problem.These results have a wide range of generality and,in particular,the specific spaces X to which these results can be applied include the weighted space,the variable space,the mixed-norm space,the Orlicz space,the Orlicz-slice space,and the Morrey space.Moreover,the obtained maximal function characterizations of the mixed-norm Hardy space,the Orlicz-slice Hardy space,and the Morrey-Hardy space associated with L are completely new.展开更多
In recent years,machine learning(ML)and deep learning(DL)have significantly advanced intrusion detection systems,effectively addressing potential malicious attacks across networks.This paper introduces a robust method...In recent years,machine learning(ML)and deep learning(DL)have significantly advanced intrusion detection systems,effectively addressing potential malicious attacks across networks.This paper introduces a robust method for detecting and categorizing attacks within the Internet of Things(IoT)environment,leveraging the NSL-KDD dataset.To achieve high accuracy,the authors used the feature extraction technique in combination with an autoencoder,integrated with a gated recurrent unit(GRU).Therefore,the accurate features are selected by using the cuckoo search algorithm integrated particle swarm optimization(PSO),and PSO has been employed for training the features.The final classification of features has been carried out by using the proposed RF-GNB random forest with the Gaussian Naïve Bayes classifier.The proposed model has been evaluated and its performance is verified with some of the standard metrics such as precision,accuracy rate,recall F1-score,etc.,and has been compared with different existing models.The generated results that detected approximately 99.87%of intrusions within the IoT environments,demonstrated the high performance of the proposed method.These results affirmed the efficacy of the proposed method in increasing the accuracy of intrusion detection within IoT network systems.展开更多
The noise that comes from finite element simulation often causes the model to fall into the local optimal solution and over fitting during optimization of generator.Thus,this paper proposes a Gaussian Process Regressi...The noise that comes from finite element simulation often causes the model to fall into the local optimal solution and over fitting during optimization of generator.Thus,this paper proposes a Gaussian Process Regression(GPR)model based on Conditional Likelihood Lower Bound Search(CLLBS)to optimize the design of the generator,which can filter the noise in the data and search for global optimization by combining the Conditional Likelihood Lower Bound Search method.Taking the efficiency optimization of 15 kW Permanent Magnet Synchronous Motor as an example.Firstly,this method uses the elementary effect analysis to choose the sensitive variables,combining the evolutionary algorithm to design the super Latin cube sampling plan;Then the generator-converter system is simulated by establishing a co-simulation platform to obtain data.A Gaussian process regression model combing the method of the conditional likelihood lower bound search is established,which combined the chi-square test to optimize the accuracy of the model globally.Secondly,after the model reaches the accuracy,the Pareto frontier is obtained through the NSGA-II algorithm by considering the maximum output torque as a constraint.Last,the constrained optimization is transformed into an unconstrained optimizing problem by introducing maximum constrained improvement expectation(CEI)optimization method based on the re-interpolation model,which cross-validated the optimization results of the Gaussian process regression model.The above method increase the efficiency of generator by 0.76%and 0.5%respectively;And this method can be used for rapid modeling and multi-objective optimization of generator systems.展开更多
In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the ...In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers(GI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.But the prime field dependent on the Elliptic curve(EC)provides one S-box at a time by fixing three parameters a,b,and p.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability.展开更多
Wireless sensor network(WSN)positioning has a good effect on indoor positioning,so it has received extensive attention in the field of positioning.Non-line-of sight(NLOS)is a primary challenge in indoor complex enviro...Wireless sensor network(WSN)positioning has a good effect on indoor positioning,so it has received extensive attention in the field of positioning.Non-line-of sight(NLOS)is a primary challenge in indoor complex environment.In this paper,a robust localization algorithm based on Gaussian mixture model and fitting polynomial is proposed to solve the problem of NLOS error.Firstly,fitting polynomials are used to predict the measured values.The residuals of predicted and measured values are clustered by Gaussian mixture model(GMM).The LOS probability and NLOS probability are calculated according to the clustering centers.The measured values are filtered by Kalman filter(KF),variable parameter unscented Kalman filter(VPUKF)and variable parameter particle filter(VPPF)in turn.The distance value processed by KF and VPUKF and the distance value processed by KF,VPUKF and VPPF are combined according to probability.Finally,the maximum likelihood method is used to calculate the position coordinate estimation.Through simulation comparison,the proposed algorithm has better positioning accuracy than several comparison algorithms in this paper.And it shows strong robustness in strong NLOS environment.展开更多
The large blast furnace is essential equipment in the process of iron and steel manufacturing. Due to the complex operation process and frequent fluctuations of variables, conventional monitoring methods often bring f...The large blast furnace is essential equipment in the process of iron and steel manufacturing. Due to the complex operation process and frequent fluctuations of variables, conventional monitoring methods often bring false alarms. To address the above problem, an ensemble of greedy dynamic principal component analysis-Gaussian mixture model(EGDPCA-GMM) is proposed in this paper. First, PCA-GMM is introduced to deal with the collinearity and the non-Gaussian distribution of blast furnace data.Second, in order to explain the dynamics of data, the greedy algorithm is used to determine the extended variables and their corresponding time lags, so as to avoid introducing unnecessary noise. Then the bagging ensemble is adopted to cooperate with greedy extension to eliminate the randomness brought by the greedy algorithm and further reduce the false alarm rate(FAR) of monitoring results. Finally, the algorithm is applied to the blast furnace of a large iron and steel group in South China to verify performance.Compared with the basic algorithms, the proposed method achieves lowest FAR, while keeping missed alarm rate(MAR) remain stable.展开更多
It remains challenging to effectively estimate the remaining capacity of the secondary lithium-ion batteries that have been widely adopted for consumer electronics,energy storage,and electric vehicles.Herein,by integr...It remains challenging to effectively estimate the remaining capacity of the secondary lithium-ion batteries that have been widely adopted for consumer electronics,energy storage,and electric vehicles.Herein,by integrating regular real-time current short pulse tests with data-driven Gaussian process regression algorithm,an efficient battery estimation has been successfully developed and validated for batteries with capacity ranging from 100%of the state of health(SOH)to below 50%,reaching an average accuracy as high as 95%.Interestingly,the proposed pulse test strategy for battery capacity measurement could reduce test time by more than 80%compared with regular long charge/discharge tests.The short-term features of the current pulse test were selected for an optimal training process.Data at different voltage stages and state of charge(SOC)are collected and explored to find the most suitable estimation model.In particular,we explore the validity of five different machine-learning methods for estimating capacity driven by pulse features,whereas Gaussian process regression with Matern kernel performs the best,providing guidance for future exploration.The new strategy of combining short pulse tests with machine-learning algorithms could further open window for efficiently forecasting lithium-ion battery remaining capacity.展开更多
Expressions are derived for calculating the three-dimensional acoustic radiation force(ARF)on a multilayer microsphere positioned arbitrarily in a Gaussian beam.A theoretical model of a three-layer microsphere with a ...Expressions are derived for calculating the three-dimensional acoustic radiation force(ARF)on a multilayer microsphere positioned arbitrarily in a Gaussian beam.A theoretical model of a three-layer microsphere with a cell membrane,cytoplasm,and nucleus is established to study how particle geometry and position affect the three-dimensional ARF,and its results agree well with finite-element numerical results.The microsphere can be moved relative to the beam axis by changing its structure and position in the beam,and the axial ARF increases with increasing outer-shell thickness and core size.This study offers a theoretical foundation for selecting suitable parameters for manipulating a three-layer microsphere in a Gaussian beam.展开更多
基金the National Key R&D Program of China(No.2023YFA1606503)the National Natural Science Foundation of China(Nos.12035011,11975167,11947211,11905103,11881240623,and 11961141003).
文摘Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the nuclear binding energies are modeled directly using a machine-learning method called the Gaussian process. First, the binding energies for 2238 nuclei with Z > 20 and N > 20 are calculated using the Gaussian process in a physically motivated feature space, yielding an average deviation of 0.046 MeV and a standard deviation of 0.066 MeV. The results show the good learning ability of the Gaussian process in the studies of binding energies. Then, the predictive power of the Gaussian process is studied by calculating the binding energies for 108 nuclei newly included in AME2020. The theoretical results are in good agreement with the experimental data, reflecting the good predictive power of the Gaussian process. Moreover, the α-decay energies for 1169 nuclei with 50 ≤ Z ≤ 110 are derived from the theoretical binding energies calculated using the Gaussian process. The average deviation and the standard deviation are, respectively, 0.047 MeV and 0.070 MeV. Noticeably, the calculated α-decay energies for the two new isotopes ^ (204 )Ac(Huang et al. Phys Lett B 834, 137484(2022)) and ^ (207) Th(Yang et al. Phys Rev C 105, L051302(2022)) agree well with the latest experimental data. These results demonstrate that the Gaussian process is reliable for the calculations of nuclear binding energies. Finally, the α-decay properties of some unknown actinide nuclei are predicted using the Gaussian process. The predicted results can be useful guides for future research on binding energies and α-decay properties.
基金supported by the National Natural Science Foundation of China(12371150,11971432)the Natural Science Foundation of Zhejiang Province(LY21G010003)+2 种基金the Management Project of"Digital+"Discipline Construction of Zhejiang Gongshang University(SZJ2022A012,SZJ2022B017)the Characteristic&Preponderant Discipline of Key Construction Universities in Zhejiang Province(Zhejiang Gongshang University-Statistics)the Scientific Research Projects of Universities in Anhui Province(2022AH050955)。
文摘Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X_(i)(s))^(2))^(1/2)(i=1,…,d)is commensurate with■for s=(s_(1),…,s_(N)),t=(t_(1),…,t_(N))∈R~N,α_(i)∈(0,1],and with the continuous functionγ(·)satisfying certain conditions.First,the upper and lower bounds of the hitting probabilities of X can be derived from the corresponding generalized Hausdorff measure and capacity,which are based on the kernel functions depending explicitly onγ(·).Furthermore,the multiple intersections of the sample paths of two independent centered space-time anisotropic Gaussian fields with different distributions are considered.Our results extend the corresponding results for anisotropic Gaussian fields to a large class of space-time anisotropic Gaussian fields.
基金supported by the National Natural Science Foundation of China(Grant No.42174157)the CAGS Research Fund(Grant No.JKY202216)the Chinese Geological Survey Project(Grant Nos.DD20230008,DD20233002).
文摘The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is an effective technique for acquiring detailed information on geological structures in coal seam working faces.However,the existing reflected in-seam wave imaging technique can no longer meet the exploration precision requirements,making it imperative to develop a new reflected in-seam wave imaging technique.This study applies the Gaussian beam summation(GBS)migration method to imaging coal seams'reflected in-seam wave data.Firstly,with regard to the characteristics of the reflected in-seam wave data,methods such as wavefield removal and enveloped superposition are employed for the corresponding wavefield separation,wave train compression and other processing of reflected in-seam waves.Thereafter,imaging is performed using the GBS migration technique.The feasibility and effectiveness of the proposed method for reflected in-seam wave imaging are validated by conducting GBS migration tests on 3D coal-seam fault models with different dip angles and throws.By applying the method to reflected in-seam wave data for an actual coal seam working face,accurate imaging of a fault structure is obtained,thereby validating its practicality.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.62375140 and 62001249)the Open Research Fund of the National Laboratory of Solid State Microstructures (Grant No.M36055)。
文摘Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstructed from an OAM-multiplexing hologram. However, the traditional design of an OAM hologram is constrained by the helical mode index of the selected OAM mode, for a larger helical mode index OAM mode has a bigger sampling distance, and the crosstalk is produced for different sampling distances for different OAM modes. In this paper, we present the design of the OAM hologram based on a Bessel–Gaussian beam, which is non-diffractive and has a self-healing property during its propagation. The Fourier transform of the Bessel–Gaussian beam is the perfect vortex mode that has the fixed ring radius for different OAM modes. The results of simulation and experiment have demonstrated the feasibility of the generation of the OAM hologram with the Bessel–Gaussian beam. The quality of the reconstructed holographic image is increased, and the security is enhanced. Additionally, the anti-interference property is improved owing to its self-healing property of the Bessel-OAM holography.
文摘Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to differentiate between quantum entanglement and quantum correlation.Nonetheless,this indistinguishability is no longer holds for mixed states.To contribute to a better understanding of this differentiation,we have explored a simple model for both generating and measuring these quantum correlations.Our study concerns two macroscopic mechanical resonators placed in separate Fabry–Pérot cavities,coupled through the photon hopping process.this system offers a comprehensively way to investigate and quantify quantum correlations beyond entanglement between these mechanical modes.The key ingredient in analyzing quantum correlation in this system is the global covariance matrix.It forms the basis for computing two essential metrics:the logarithmic negativity(E_(N)^(m))and the Gaussian interferometric power(P_(G)^(m)).These metrics provide the tools to measure the degree of quantum entanglement and quantum correlations,respectively.Our study reveals that the Gaussian interferometric power(P_(G)^(m))proves to be a more suitable metric for characterizing quantum correlations among the mechanical modes in an optomechanical quantum system,particularly in scenarios featuring resilient photon hopping.
基金supported in part by the National Key Research and Development Program of China(2021YFC2902703)the National Natural Science Foundation of China(62173078,61773105,61533007,61873049,61873053,61703085,61374147)。
文摘Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process.
基金supported by the National Natural Science Foundation of China(62371382,62071346)the Science,Technology&Innovation Project of Xiong’an New Area(2022XAGG0181)the Special Funds for Creative Research(2022C61540)。
文摘This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian model with different parameters,and the target is modeled as a subspace rangespread target model.The persymmetric structure is used to model the clutter covariance matrix,in order to reduce the reliance on secondary data of the designed detectors.Three adaptive polarimetric persymmetric detectors are designed based on the generalized likelihood ratio test(GLRT),Rao test,and Wald test.All the proposed detectors have constant falsealarm rate property with respect to the clutter texture,the speckle covariance matrix.Experimental results on simulated and measured data show that three adaptive detectors outperform the competitors in different clutter environments,and the proposed GLRT detector has the best detection performance under different parameters.
基金funded by National Natural Science Foundation of China under Grant No.61806171The Sichuan University of Science&Engineering Talent Project under Grant No.2021RC15Sichuan University of Science&Engineering Graduate Student Innovation Fund under Grant No.Y2023115,The Scientific Research and Innovation Team Program of Sichuan University of Science and Technology under Grant No.SUSE652A006.
文摘Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher security.Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack implementation.To overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)algorithm.This approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear problems.This limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to detect.To verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat model.Based on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack methods.We also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering techniques.The experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior stealthiness.Furthermore,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.
基金supported by the National Key Research and Development Program of China(2020YFA0712900)the National Natural Science Foundation of China(12371093,12071197,12122102 and 12071431)+2 种基金the Key Project of Gansu Provincial National Science Foundation(23JRRA1022)the Fundamental Research Funds for the Central Universities(2233300008 and lzujbky-2021-ey18)the Innovative Groups of Basic Research in Gansu Province(22JR5RA391).
文摘Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying some mild assumptions.Let HX,L(ℝ^(n))be the Hardy space associated with both X and L,which is defined by the Lusin area function related to the semigroup generated by L.In this article,the authors establish various maximal function characterizations of the Hardy space HX,L(ℝ^(n))and then apply these characterizations to obtain the solvability of the related Cauchy problem.These results have a wide range of generality and,in particular,the specific spaces X to which these results can be applied include the weighted space,the variable space,the mixed-norm space,the Orlicz space,the Orlicz-slice space,and the Morrey space.Moreover,the obtained maximal function characterizations of the mixed-norm Hardy space,the Orlicz-slice Hardy space,and the Morrey-Hardy space associated with L are completely new.
基金the Deanship of Scientific Research at Shaqra University for funding this research work through the project number(SU-ANN-2023051).
文摘In recent years,machine learning(ML)and deep learning(DL)have significantly advanced intrusion detection systems,effectively addressing potential malicious attacks across networks.This paper introduces a robust method for detecting and categorizing attacks within the Internet of Things(IoT)environment,leveraging the NSL-KDD dataset.To achieve high accuracy,the authors used the feature extraction technique in combination with an autoencoder,integrated with a gated recurrent unit(GRU).Therefore,the accurate features are selected by using the cuckoo search algorithm integrated particle swarm optimization(PSO),and PSO has been employed for training the features.The final classification of features has been carried out by using the proposed RF-GNB random forest with the Gaussian Naïve Bayes classifier.The proposed model has been evaluated and its performance is verified with some of the standard metrics such as precision,accuracy rate,recall F1-score,etc.,and has been compared with different existing models.The generated results that detected approximately 99.87%of intrusions within the IoT environments,demonstrated the high performance of the proposed method.These results affirmed the efficacy of the proposed method in increasing the accuracy of intrusion detection within IoT network systems.
基金supported in part by the National Key Research and Development Program of China(2019YFB1503700)the Hunan Natural Science Foundation-Science and Education Joint Project(2019JJ70063)。
文摘The noise that comes from finite element simulation often causes the model to fall into the local optimal solution and over fitting during optimization of generator.Thus,this paper proposes a Gaussian Process Regression(GPR)model based on Conditional Likelihood Lower Bound Search(CLLBS)to optimize the design of the generator,which can filter the noise in the data and search for global optimization by combining the Conditional Likelihood Lower Bound Search method.Taking the efficiency optimization of 15 kW Permanent Magnet Synchronous Motor as an example.Firstly,this method uses the elementary effect analysis to choose the sensitive variables,combining the evolutionary algorithm to design the super Latin cube sampling plan;Then the generator-converter system is simulated by establishing a co-simulation platform to obtain data.A Gaussian process regression model combing the method of the conditional likelihood lower bound search is established,which combined the chi-square test to optimize the accuracy of the model globally.Secondly,after the model reaches the accuracy,the Pareto frontier is obtained through the NSGA-II algorithm by considering the maximum output torque as a constraint.Last,the constrained optimization is transformed into an unconstrained optimizing problem by introducing maximum constrained improvement expectation(CEI)optimization method based on the re-interpolation model,which cross-validated the optimization results of the Gaussian process regression model.The above method increase the efficiency of generator by 0.76%and 0.5%respectively;And this method can be used for rapid modeling and multi-objective optimization of generator systems.
文摘In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers(GI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.But the prime field dependent on the Elliptic curve(EC)provides one S-box at a time by fixing three parameters a,b,and p.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability.
基金supported by the National Natural Science Foundation of China under Grant No.62273083 and No.61973069Natural Science Foundation of Hebei Province under Grant No.F2020501012。
文摘Wireless sensor network(WSN)positioning has a good effect on indoor positioning,so it has received extensive attention in the field of positioning.Non-line-of sight(NLOS)is a primary challenge in indoor complex environment.In this paper,a robust localization algorithm based on Gaussian mixture model and fitting polynomial is proposed to solve the problem of NLOS error.Firstly,fitting polynomials are used to predict the measured values.The residuals of predicted and measured values are clustered by Gaussian mixture model(GMM).The LOS probability and NLOS probability are calculated according to the clustering centers.The measured values are filtered by Kalman filter(KF),variable parameter unscented Kalman filter(VPUKF)and variable parameter particle filter(VPPF)in turn.The distance value processed by KF and VPUKF and the distance value processed by KF,VPUKF and VPPF are combined according to probability.Finally,the maximum likelihood method is used to calculate the position coordinate estimation.Through simulation comparison,the proposed algorithm has better positioning accuracy than several comparison algorithms in this paper.And it shows strong robustness in strong NLOS environment.
基金supported by the National Natural Science Foundation of China (61903326, 61933015)。
文摘The large blast furnace is essential equipment in the process of iron and steel manufacturing. Due to the complex operation process and frequent fluctuations of variables, conventional monitoring methods often bring false alarms. To address the above problem, an ensemble of greedy dynamic principal component analysis-Gaussian mixture model(EGDPCA-GMM) is proposed in this paper. First, PCA-GMM is introduced to deal with the collinearity and the non-Gaussian distribution of blast furnace data.Second, in order to explain the dynamics of data, the greedy algorithm is used to determine the extended variables and their corresponding time lags, so as to avoid introducing unnecessary noise. Then the bagging ensemble is adopted to cooperate with greedy extension to eliminate the randomness brought by the greedy algorithm and further reduce the false alarm rate(FAR) of monitoring results. Finally, the algorithm is applied to the blast furnace of a large iron and steel group in South China to verify performance.Compared with the basic algorithms, the proposed method achieves lowest FAR, while keeping missed alarm rate(MAR) remain stable.
基金support from Shenzhen Municipal Development and Reform Commission(Grant Number:SDRC[2016]172)Shenzhen Science and Technology Program(Grant No.KQTD20170810150821146)Interdisciplinary Research and Innovation Fund of Tsinghua Shenzhen International Graduate School,and Shanghai Shun Feng Machinery Co.,Ltd.
文摘It remains challenging to effectively estimate the remaining capacity of the secondary lithium-ion batteries that have been widely adopted for consumer electronics,energy storage,and electric vehicles.Herein,by integrating regular real-time current short pulse tests with data-driven Gaussian process regression algorithm,an efficient battery estimation has been successfully developed and validated for batteries with capacity ranging from 100%of the state of health(SOH)to below 50%,reaching an average accuracy as high as 95%.Interestingly,the proposed pulse test strategy for battery capacity measurement could reduce test time by more than 80%compared with regular long charge/discharge tests.The short-term features of the current pulse test were selected for an optimal training process.Data at different voltage stages and state of charge(SOC)are collected and explored to find the most suitable estimation model.In particular,we explore the validity of five different machine-learning methods for estimating capacity driven by pulse features,whereas Gaussian process regression with Matern kernel performs the best,providing guidance for future exploration.The new strategy of combining short pulse tests with machine-learning algorithms could further open window for efficiently forecasting lithium-ion battery remaining capacity.
基金supported by the National Natural Science Foundation of China (Grant No.11874252)the Fundamental Research Funds for the Central Universities (Grant No.2020TS029).
文摘Expressions are derived for calculating the three-dimensional acoustic radiation force(ARF)on a multilayer microsphere positioned arbitrarily in a Gaussian beam.A theoretical model of a three-layer microsphere with a cell membrane,cytoplasm,and nucleus is established to study how particle geometry and position affect the three-dimensional ARF,and its results agree well with finite-element numerical results.The microsphere can be moved relative to the beam axis by changing its structure and position in the beam,and the axial ARF increases with increasing outer-shell thickness and core size.This study offers a theoretical foundation for selecting suitable parameters for manipulating a three-layer microsphere in a Gaussian beam.