In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive ...In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive image.In this paper,an improved sine map(ISM)possessing a larger chaotic region,more complex chaotic behavior and greater unpredictability is proposed and extensively tested.Drawing upon the strengths of ISM,we introduce a lightweight symmetric image encryption cryptosystem in wavelet domain(WDLIC).The WDLIC employs selective encryption to strike a satisfactory balance between security and speed.Initially,only the low-frequency-low-frequency component is chosen to encrypt utilizing classic permutation and diffusion.Then leveraging the statistical properties in wavelet domain,Gaussianization operation which opens the minds of encrypting image information in wavelet domain is first proposed and employed to all sub-bands.Simulations and theoretical analysis demonstrate the high speed and the remarkable effectiveness of WDLIC.展开更多
Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to...Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to differentiate between quantum entanglement and quantum correlation.Nonetheless,this indistinguishability is no longer holds for mixed states.To contribute to a better understanding of this differentiation,we have explored a simple model for both generating and measuring these quantum correlations.Our study concerns two macroscopic mechanical resonators placed in separate Fabry–Pérot cavities,coupled through the photon hopping process.this system offers a comprehensively way to investigate and quantify quantum correlations beyond entanglement between these mechanical modes.The key ingredient in analyzing quantum correlation in this system is the global covariance matrix.It forms the basis for computing two essential metrics:the logarithmic negativity(E_(N)^(m))and the Gaussian interferometric power(P_(G)^(m)).These metrics provide the tools to measure the degree of quantum entanglement and quantum correlations,respectively.Our study reveals that the Gaussian interferometric power(P_(G)^(m))proves to be a more suitable metric for characterizing quantum correlations among the mechanical modes in an optomechanical quantum system,particularly in scenarios featuring resilient photon hopping.展开更多
Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the ...Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the nuclear binding energies are modeled directly using a machine-learning method called the Gaussian process. First, the binding energies for 2238 nuclei with Z > 20 and N > 20 are calculated using the Gaussian process in a physically motivated feature space, yielding an average deviation of 0.046 MeV and a standard deviation of 0.066 MeV. The results show the good learning ability of the Gaussian process in the studies of binding energies. Then, the predictive power of the Gaussian process is studied by calculating the binding energies for 108 nuclei newly included in AME2020. The theoretical results are in good agreement with the experimental data, reflecting the good predictive power of the Gaussian process. Moreover, the α-decay energies for 1169 nuclei with 50 ≤ Z ≤ 110 are derived from the theoretical binding energies calculated using the Gaussian process. The average deviation and the standard deviation are, respectively, 0.047 MeV and 0.070 MeV. Noticeably, the calculated α-decay energies for the two new isotopes ^ (204 )Ac(Huang et al. Phys Lett B 834, 137484(2022)) and ^ (207) Th(Yang et al. Phys Rev C 105, L051302(2022)) agree well with the latest experimental data. These results demonstrate that the Gaussian process is reliable for the calculations of nuclear binding energies. Finally, the α-decay properties of some unknown actinide nuclei are predicted using the Gaussian process. The predicted results can be useful guides for future research on binding energies and α-decay properties.展开更多
Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X...Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X_(i)(s))^(2))^(1/2)(i=1,…,d)is commensurate with■for s=(s_(1),…,s_(N)),t=(t_(1),…,t_(N))∈R~N,α_(i)∈(0,1],and with the continuous functionγ(·)satisfying certain conditions.First,the upper and lower bounds of the hitting probabilities of X can be derived from the corresponding generalized Hausdorff measure and capacity,which are based on the kernel functions depending explicitly onγ(·).Furthermore,the multiple intersections of the sample paths of two independent centered space-time anisotropic Gaussian fields with different distributions are considered.Our results extend the corresponding results for anisotropic Gaussian fields to a large class of space-time anisotropic Gaussian fields.展开更多
The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is ...The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is an effective technique for acquiring detailed information on geological structures in coal seam working faces.However,the existing reflected in-seam wave imaging technique can no longer meet the exploration precision requirements,making it imperative to develop a new reflected in-seam wave imaging technique.This study applies the Gaussian beam summation(GBS)migration method to imaging coal seams'reflected in-seam wave data.Firstly,with regard to the characteristics of the reflected in-seam wave data,methods such as wavefield removal and enveloped superposition are employed for the corresponding wavefield separation,wave train compression and other processing of reflected in-seam waves.Thereafter,imaging is performed using the GBS migration technique.The feasibility and effectiveness of the proposed method for reflected in-seam wave imaging are validated by conducting GBS migration tests on 3D coal-seam fault models with different dip angles and throws.By applying the method to reflected in-seam wave data for an actual coal seam working face,accurate imaging of a fault structure is obtained,thereby validating its practicality.展开更多
Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstruct...Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstructed from an OAM-multiplexing hologram. However, the traditional design of an OAM hologram is constrained by the helical mode index of the selected OAM mode, for a larger helical mode index OAM mode has a bigger sampling distance, and the crosstalk is produced for different sampling distances for different OAM modes. In this paper, we present the design of the OAM hologram based on a Bessel–Gaussian beam, which is non-diffractive and has a self-healing property during its propagation. The Fourier transform of the Bessel–Gaussian beam is the perfect vortex mode that has the fixed ring radius for different OAM modes. The results of simulation and experiment have demonstrated the feasibility of the generation of the OAM hologram with the Bessel–Gaussian beam. The quality of the reconstructed holographic image is increased, and the security is enhanced. Additionally, the anti-interference property is improved owing to its self-healing property of the Bessel-OAM holography.展开更多
An accurate plasma current profile has irreplaceable value for the steady-state operation of the plasma.In this study,plasma current tomography based on Bayesian inference is applied to an HL-2A device and used to rec...An accurate plasma current profile has irreplaceable value for the steady-state operation of the plasma.In this study,plasma current tomography based on Bayesian inference is applied to an HL-2A device and used to reconstruct the plasma current profile.Two different Bayesian probability priors are tried,namely the Conditional Auto Regressive(CAR)prior and the Advanced Squared Exponential(ASE)kernel prior.Compared to the CAR prior,the ASE kernel prior adopts nonstationary hyperparameters and introduces the current profile of the reference discharge into the hyperparameters,which can make the shape of the current profile more flexible in space.The results indicate that the ASE prior couples more information,reduces the probability of unreasonable solutions,and achieves higher reconstruction accuracy.展开更多
In this paper,we study a class of Finsler metrics defined by a vector field on a gradient Ricci soliton.We obtain a necessary and sufficient condition for these Finsler metrics on a compact gradient Ricci soliton to b...In this paper,we study a class of Finsler metrics defined by a vector field on a gradient Ricci soliton.We obtain a necessary and sufficient condition for these Finsler metrics on a compact gradient Ricci soliton to be of isotropic S-curvature by establishing a new integral inequality.Then we determine the Ricci curvature of navigation Finsler metrics of isotropic S-curvature on a gradient Ricci soliton generalizing result only known in the case when such soliton is of Einstein type.As its application,we obtain the Ricci curvature of all navigation Finsler metrics of isotropic S-curvature on Gaussian shrinking soliton.展开更多
It is well-known that interpolation by rational functions results in a more accurate approximation than the polynomials interpolation.However,classical rational interpolation has some deficiencies such as uncontrollab...It is well-known that interpolation by rational functions results in a more accurate approximation than the polynomials interpolation.However,classical rational interpolation has some deficiencies such as uncontrollable poles and low convergence order.In contrast with the classical rational interpolants,the generalized barycentric rational interpolants which depend linearly on the interpolated values,yield infinite smooth approximation with no poles in real numbers.In this paper,a numerical collocation approach,based on the generalized barycentric rational interpolation and Gaussian quadrature formula,was introduced to approximate the solution of Volterra-Fredholm integral equations.Three types of points in the solution domain are used as interpolation nodes.The obtained numerical results confirm that the barycentric rational interpolants are efficient tools for solving Volterra-Fredholm integral equations.Moreover,integral equations with Runge’s function as an exact solution,no oscillation occurrs in the obtained approximate solutions so that the Runge’s phenomenon is avoided.展开更多
This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian mod...This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian model with different parameters,and the target is modeled as a subspace rangespread target model.The persymmetric structure is used to model the clutter covariance matrix,in order to reduce the reliance on secondary data of the designed detectors.Three adaptive polarimetric persymmetric detectors are designed based on the generalized likelihood ratio test(GLRT),Rao test,and Wald test.All the proposed detectors have constant falsealarm rate property with respect to the clutter texture,the speckle covariance matrix.Experimental results on simulated and measured data show that three adaptive detectors outperform the competitors in different clutter environments,and the proposed GLRT detector has the best detection performance under different parameters.展开更多
Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying som...Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying some mild assumptions.Let HX,L(ℝ^(n))be the Hardy space associated with both X and L,which is defined by the Lusin area function related to the semigroup generated by L.In this article,the authors establish various maximal function characterizations of the Hardy space HX,L(ℝ^(n))and then apply these characterizations to obtain the solvability of the related Cauchy problem.These results have a wide range of generality and,in particular,the specific spaces X to which these results can be applied include the weighted space,the variable space,the mixed-norm space,the Orlicz space,the Orlicz-slice space,and the Morrey space.Moreover,the obtained maximal function characterizations of the mixed-norm Hardy space,the Orlicz-slice Hardy space,and the Morrey-Hardy space associated with L are completely new.展开更多
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l...Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks.展开更多
Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation indust...Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process.展开更多
In this paper,we consider the Chan–Vese(C-V)model for image segmentation and obtain its numerical solution accurately and efficiently.For this purpose,we present a local radial basis function method based on a Gaussi...In this paper,we consider the Chan–Vese(C-V)model for image segmentation and obtain its numerical solution accurately and efficiently.For this purpose,we present a local radial basis function method based on a Gaussian kernel(GA-LRBF)for spatial discretization.Compared to the standard radial basis functionmethod,this approach consumes less CPU time and maintains good stability because it uses only a small subset of points in the whole computational domain.Additionally,since the Gaussian function has the property of dimensional separation,the GA-LRBF method is suitable for dealing with isotropic images.Finally,a numerical scheme that couples GA-LRBF with the fourth-order Runge–Kutta method is applied to the C-V model,and a comparison of some numerical results demonstrates that this scheme achieves much more reliable image segmentation.展开更多
The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that c...The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced.This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images.The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression.This paper introduces a content-based image authentication mechanism that is suitable for usage across an untrusted network and resistant to data loss during transmission.By employing scale attributes and a key-dependent parametric Long Short-Term Memory(LSTM),it is feasible to improve the resilience of digital signatures against image deterioration and strengthen their security against malicious actions.Furthermore,the successful implementation of transmitting biometric data in a compressed format over a wireless network has been accomplished.For applications involving the transmission and sharing of images across a network.The suggested technique utilizes the scalability of a structural digital signature to attain a satisfactory equilibrium between security and picture transfer.An effective adaptive compression strategy was created to lengthen the overall lifetime of the network by sharing the processing of responsibilities.This scheme ensures a large reduction in computational and energy requirements while minimizing image quality loss.This approach employs multi-scale characteristics to improve the resistance of signatures against image deterioration.The proposed system attained a Gaussian noise value of 98%and a rotation accuracy surpassing 99%.展开更多
基金Project supported by the Key Area Research and Development Program of Guangdong Province,China(Grant No.2022B0701180001)the National Natural Science Foundation of China(Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China(Grant Nos.2019B010140002 and 2020B111110002)the Guangdong–Hong Kong–Macao Joint Innovation Field Project(Grant No.2021A0505080006).
文摘In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive image.In this paper,an improved sine map(ISM)possessing a larger chaotic region,more complex chaotic behavior and greater unpredictability is proposed and extensively tested.Drawing upon the strengths of ISM,we introduce a lightweight symmetric image encryption cryptosystem in wavelet domain(WDLIC).The WDLIC employs selective encryption to strike a satisfactory balance between security and speed.Initially,only the low-frequency-low-frequency component is chosen to encrypt utilizing classic permutation and diffusion.Then leveraging the statistical properties in wavelet domain,Gaussianization operation which opens the minds of encrypting image information in wavelet domain is first proposed and employed to all sub-bands.Simulations and theoretical analysis demonstrate the high speed and the remarkable effectiveness of WDLIC.
文摘Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to differentiate between quantum entanglement and quantum correlation.Nonetheless,this indistinguishability is no longer holds for mixed states.To contribute to a better understanding of this differentiation,we have explored a simple model for both generating and measuring these quantum correlations.Our study concerns two macroscopic mechanical resonators placed in separate Fabry–Pérot cavities,coupled through the photon hopping process.this system offers a comprehensively way to investigate and quantify quantum correlations beyond entanglement between these mechanical modes.The key ingredient in analyzing quantum correlation in this system is the global covariance matrix.It forms the basis for computing two essential metrics:the logarithmic negativity(E_(N)^(m))and the Gaussian interferometric power(P_(G)^(m)).These metrics provide the tools to measure the degree of quantum entanglement and quantum correlations,respectively.Our study reveals that the Gaussian interferometric power(P_(G)^(m))proves to be a more suitable metric for characterizing quantum correlations among the mechanical modes in an optomechanical quantum system,particularly in scenarios featuring resilient photon hopping.
基金the National Key R&D Program of China(No.2023YFA1606503)the National Natural Science Foundation of China(Nos.12035011,11975167,11947211,11905103,11881240623,and 11961141003).
文摘Reliable calculations of nuclear binding energies are crucial for advancing the research of nuclear physics. Machine learning provides an innovative approach to exploring complex physical problems. In this study, the nuclear binding energies are modeled directly using a machine-learning method called the Gaussian process. First, the binding energies for 2238 nuclei with Z > 20 and N > 20 are calculated using the Gaussian process in a physically motivated feature space, yielding an average deviation of 0.046 MeV and a standard deviation of 0.066 MeV. The results show the good learning ability of the Gaussian process in the studies of binding energies. Then, the predictive power of the Gaussian process is studied by calculating the binding energies for 108 nuclei newly included in AME2020. The theoretical results are in good agreement with the experimental data, reflecting the good predictive power of the Gaussian process. Moreover, the α-decay energies for 1169 nuclei with 50 ≤ Z ≤ 110 are derived from the theoretical binding energies calculated using the Gaussian process. The average deviation and the standard deviation are, respectively, 0.047 MeV and 0.070 MeV. Noticeably, the calculated α-decay energies for the two new isotopes ^ (204 )Ac(Huang et al. Phys Lett B 834, 137484(2022)) and ^ (207) Th(Yang et al. Phys Rev C 105, L051302(2022)) agree well with the latest experimental data. These results demonstrate that the Gaussian process is reliable for the calculations of nuclear binding energies. Finally, the α-decay properties of some unknown actinide nuclei are predicted using the Gaussian process. The predicted results can be useful guides for future research on binding energies and α-decay properties.
基金supported by the National Natural Science Foundation of China(12371150,11971432)the Natural Science Foundation of Zhejiang Province(LY21G010003)+2 种基金the Management Project of"Digital+"Discipline Construction of Zhejiang Gongshang University(SZJ2022A012,SZJ2022B017)the Characteristic&Preponderant Discipline of Key Construction Universities in Zhejiang Province(Zhejiang Gongshang University-Statistics)the Scientific Research Projects of Universities in Anhui Province(2022AH050955)。
文摘Let X={X(t)∈R^(d),t∈R^(N)}be a centered space-time anisotropic Gaussian field with indices H=(H_(1),…,H_(N))∈(0,1)~N,where the components X_(i)(i=1,…,d)of X are independent,and the canonical metric√(E(X_(i)(t)-X_(i)(s))^(2))^(1/2)(i=1,…,d)is commensurate with■for s=(s_(1),…,s_(N)),t=(t_(1),…,t_(N))∈R~N,α_(i)∈(0,1],and with the continuous functionγ(·)satisfying certain conditions.First,the upper and lower bounds of the hitting probabilities of X can be derived from the corresponding generalized Hausdorff measure and capacity,which are based on the kernel functions depending explicitly onγ(·).Furthermore,the multiple intersections of the sample paths of two independent centered space-time anisotropic Gaussian fields with different distributions are considered.Our results extend the corresponding results for anisotropic Gaussian fields to a large class of space-time anisotropic Gaussian fields.
基金supported by the National Natural Science Foundation of China(Grant No.42174157)the CAGS Research Fund(Grant No.JKY202216)the Chinese Geological Survey Project(Grant Nos.DD20230008,DD20233002).
文摘The geological conditions for coal mining in China are complex,with various structural issues such as faults and collapsed columns seriously compromising the safety of coal mine production.In-seam wave exploration is an effective technique for acquiring detailed information on geological structures in coal seam working faces.However,the existing reflected in-seam wave imaging technique can no longer meet the exploration precision requirements,making it imperative to develop a new reflected in-seam wave imaging technique.This study applies the Gaussian beam summation(GBS)migration method to imaging coal seams'reflected in-seam wave data.Firstly,with regard to the characteristics of the reflected in-seam wave data,methods such as wavefield removal and enveloped superposition are employed for the corresponding wavefield separation,wave train compression and other processing of reflected in-seam waves.Thereafter,imaging is performed using the GBS migration technique.The feasibility and effectiveness of the proposed method for reflected in-seam wave imaging are validated by conducting GBS migration tests on 3D coal-seam fault models with different dip angles and throws.By applying the method to reflected in-seam wave data for an actual coal seam working face,accurate imaging of a fault structure is obtained,thereby validating its practicality.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.62375140 and 62001249)the Open Research Fund of the National Laboratory of Solid State Microstructures (Grant No.M36055)。
文摘Orbital angular momentum(OAM), as a new degree of freedom, has recently been applied in holography technology.Due to the infinite helical mode index of OAM mode, a large number of holographic images can be reconstructed from an OAM-multiplexing hologram. However, the traditional design of an OAM hologram is constrained by the helical mode index of the selected OAM mode, for a larger helical mode index OAM mode has a bigger sampling distance, and the crosstalk is produced for different sampling distances for different OAM modes. In this paper, we present the design of the OAM hologram based on a Bessel–Gaussian beam, which is non-diffractive and has a self-healing property during its propagation. The Fourier transform of the Bessel–Gaussian beam is the perfect vortex mode that has the fixed ring radius for different OAM modes. The results of simulation and experiment have demonstrated the feasibility of the generation of the OAM hologram with the Bessel–Gaussian beam. The quality of the reconstructed holographic image is increased, and the security is enhanced. Additionally, the anti-interference property is improved owing to its self-healing property of the Bessel-OAM holography.
基金supported by the National MCF Energy R&D Program of China (Nos. 2018 YFE0301105, 2022YFE03010002 and 2018YFE0302100)the National Key R&D Program of China (Nos. 2022YFE03070004 and 2022YFE03070000)National Natural Science Foundation of China (Nos. 12205195, 12075155 and 11975277)
文摘An accurate plasma current profile has irreplaceable value for the steady-state operation of the plasma.In this study,plasma current tomography based on Bayesian inference is applied to an HL-2A device and used to reconstruct the plasma current profile.Two different Bayesian probability priors are tried,namely the Conditional Auto Regressive(CAR)prior and the Advanced Squared Exponential(ASE)kernel prior.Compared to the CAR prior,the ASE kernel prior adopts nonstationary hyperparameters and introduces the current profile of the reference discharge into the hyperparameters,which can make the shape of the current profile more flexible in space.The results indicate that the ASE prior couples more information,reduces the probability of unreasonable solutions,and achieves higher reconstruction accuracy.
基金Supported by the National Natural Science Foundation of China(11771020,12171005).
文摘In this paper,we study a class of Finsler metrics defined by a vector field on a gradient Ricci soliton.We obtain a necessary and sufficient condition for these Finsler metrics on a compact gradient Ricci soliton to be of isotropic S-curvature by establishing a new integral inequality.Then we determine the Ricci curvature of navigation Finsler metrics of isotropic S-curvature on a gradient Ricci soliton generalizing result only known in the case when such soliton is of Einstein type.As its application,we obtain the Ricci curvature of all navigation Finsler metrics of isotropic S-curvature on Gaussian shrinking soliton.
文摘It is well-known that interpolation by rational functions results in a more accurate approximation than the polynomials interpolation.However,classical rational interpolation has some deficiencies such as uncontrollable poles and low convergence order.In contrast with the classical rational interpolants,the generalized barycentric rational interpolants which depend linearly on the interpolated values,yield infinite smooth approximation with no poles in real numbers.In this paper,a numerical collocation approach,based on the generalized barycentric rational interpolation and Gaussian quadrature formula,was introduced to approximate the solution of Volterra-Fredholm integral equations.Three types of points in the solution domain are used as interpolation nodes.The obtained numerical results confirm that the barycentric rational interpolants are efficient tools for solving Volterra-Fredholm integral equations.Moreover,integral equations with Runge’s function as an exact solution,no oscillation occurrs in the obtained approximate solutions so that the Runge’s phenomenon is avoided.
基金supported by the National Natural Science Foundation of China(62371382,62071346)the Science,Technology&Innovation Project of Xiong’an New Area(2022XAGG0181)the Special Funds for Creative Research(2022C61540)。
文摘This paper focuses on the adaptive detection of range and Doppler dual-spread targets in non-homogeneous and nonGaussian sea clutter.The sea clutter from two polarimetric channels is modeled as a compound-Gaussian model with different parameters,and the target is modeled as a subspace rangespread target model.The persymmetric structure is used to model the clutter covariance matrix,in order to reduce the reliance on secondary data of the designed detectors.Three adaptive polarimetric persymmetric detectors are designed based on the generalized likelihood ratio test(GLRT),Rao test,and Wald test.All the proposed detectors have constant falsealarm rate property with respect to the clutter texture,the speckle covariance matrix.Experimental results on simulated and measured data show that three adaptive detectors outperform the competitors in different clutter environments,and the proposed GLRT detector has the best detection performance under different parameters.
基金supported by the National Key Research and Development Program of China(2020YFA0712900)the National Natural Science Foundation of China(12371093,12071197,12122102 and 12071431)+2 种基金the Key Project of Gansu Provincial National Science Foundation(23JRRA1022)the Fundamental Research Funds for the Central Universities(2233300008 and lzujbky-2021-ey18)the Innovative Groups of Basic Research in Gansu Province(22JR5RA391).
文摘Assume that L is a non-negative self-adjoint operator on L^(2)(ℝ^(n))with its heat kernels satisfying the so-called Gaussian upper bound estimate and that X is a ball quasi-Banach function space onℝ^(n) satisfying some mild assumptions.Let HX,L(ℝ^(n))be the Hardy space associated with both X and L,which is defined by the Lusin area function related to the semigroup generated by L.In this article,the authors establish various maximal function characterizations of the Hardy space HX,L(ℝ^(n))and then apply these characterizations to obtain the solvability of the related Cauchy problem.These results have a wide range of generality and,in particular,the specific spaces X to which these results can be applied include the weighted space,the variable space,the mixed-norm space,the Orlicz space,the Orlicz-slice space,and the Morrey space.Moreover,the obtained maximal function characterizations of the mixed-norm Hardy space,the Orlicz-slice Hardy space,and the Morrey-Hardy space associated with L are completely new.
基金funding by Comunidad de Madrid within the framework of the Multiannual Agreement with Universidad Politécnica de Madrid to encourage research by young doctors(PRINCE project).
文摘Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks.
基金supported in part by the National Key Research and Development Program of China(2021YFC2902703)the National Natural Science Foundation of China(62173078,61773105,61533007,61873049,61873053,61703085,61374147)。
文摘Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process.
基金sponsored by Guangdong Basic and Applied Basic Research Foundation under Grant No.2021A1515110680Guangzhou Basic and Applied Basic Research under Grant No.202102020340.
文摘In this paper,we consider the Chan–Vese(C-V)model for image segmentation and obtain its numerical solution accurately and efficiently.For this purpose,we present a local radial basis function method based on a Gaussian kernel(GA-LRBF)for spatial discretization.Compared to the standard radial basis functionmethod,this approach consumes less CPU time and maintains good stability because it uses only a small subset of points in the whole computational domain.Additionally,since the Gaussian function has the property of dimensional separation,the GA-LRBF method is suitable for dealing with isotropic images.Finally,a numerical scheme that couples GA-LRBF with the fourth-order Runge–Kutta method is applied to the C-V model,and a comparison of some numerical results demonstrates that this scheme achieves much more reliable image segmentation.
文摘The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced.This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images.The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression.This paper introduces a content-based image authentication mechanism that is suitable for usage across an untrusted network and resistant to data loss during transmission.By employing scale attributes and a key-dependent parametric Long Short-Term Memory(LSTM),it is feasible to improve the resilience of digital signatures against image deterioration and strengthen their security against malicious actions.Furthermore,the successful implementation of transmitting biometric data in a compressed format over a wireless network has been accomplished.For applications involving the transmission and sharing of images across a network.The suggested technique utilizes the scalability of a structural digital signature to attain a satisfactory equilibrium between security and picture transfer.An effective adaptive compression strategy was created to lengthen the overall lifetime of the network by sharing the processing of responsibilities.This scheme ensures a large reduction in computational and energy requirements while minimizing image quality loss.This approach employs multi-scale characteristics to improve the resistance of signatures against image deterioration.The proposed system attained a Gaussian noise value of 98%and a rotation accuracy surpassing 99%.