A comprehensive understanding of spatial distribution and clustering patterns of gravels is of great significance for ecological restoration and monitoring.However,traditional methods for studying gravels are low-effi...A comprehensive understanding of spatial distribution and clustering patterns of gravels is of great significance for ecological restoration and monitoring.However,traditional methods for studying gravels are low-efficiency and have many errors.This study researched the spatial distribution and cluster characteristics of gravels based on digital image processing technology combined with a self-organizing map(SOM)and multivariate statistical methods in the grassland of northern Tibetan Plateau.Moreover,the correlation of morphological parameters of gravels between different cluster groups and the environmental factors affecting gravel distribution were analyzed.The results showed that the morphological characteristics of gravels in northern region(cluster C)and southern region(cluster B)of the Tibetan Plateau were similar,with a low gravel coverage,small gravel diameter,and elongated shape.These regions were mainly distributed in high mountainous areas with large topographic relief.The central region(cluster A)has high coverage of gravels with a larger diameter,mainly distributed in high-altitude plains with smaller undulation.Principal component analysis(PCA)results showed that the gravel distribution of cluster A may be mainly affected by vegetation,while those in clusters B and C could be mainly affected by topography,climate,and soil.The study confirmed that the combination of digital image processing technology and SOM could effectively analyzed the spatial distribution characteristics of gravels,providing a new mode for gravel research.展开更多
In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at ...In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.展开更多
Internet of things and network densification bring significant challenges to uplink management.Only depending on optimization algorithm enhancements is not enough for uplink transmission.To control intercell interfere...Internet of things and network densification bring significant challenges to uplink management.Only depending on optimization algorithm enhancements is not enough for uplink transmission.To control intercell interference,Fractional Uplink Power Control(FUPC)should be optimized from network-wide perspective,which has to find a better traffic distribution model.Conventionally,traffic distribution is geographic-based,and ineffective due to tricky locating efforts.This paper proposes a novel uplink power management framework for Self-Organizing Networks(SON),which firstly builds up pathloss-based traffic distribution model and then makes the decision of FUPC based on the model.PathLoss-based Traffic Distribution(PLTD)aggregates traffic based on the propagation condition of traffic that is defined as the pathloss between the position generating the traffic and surrounding cells.Simulations show that the improvement in optimization efficiency of FUPC with PLTD can be up to 40%compared to conventional GeoGraphic-based Traffic Distribution(GGTD).展开更多
This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhe...This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhering to evidence-based principles.Utilizing the System Function Decoding Model(SFDM),the research progresses through define,quantify,infer,and validate phases to systematically explore TCM’s material basis.It employs a dual analytical approach that combines top-down,systems theory-guided perspectives with bottom-up,elements-structure-function methodologies,provides comprehensive insights into TCM’s holistic material basis.Moreover,the research examines AI’s role in quantitative assessment and predictive analysis of TCM’s material components,proposing two specific AIdriven technical applications.This interdisciplinary effort underscores AI’s potential to enhance our understanding of TCM’s holistic material basis and establishes a foundation for future research at the intersection of traditional wisdom and modern technology.展开更多
Through literature research, field research and urban design analysis methods, based on the self-organization theory, the evolution characteristics of the settlement space of Anju Ancient Town with significant charact...Through literature research, field research and urban design analysis methods, based on the self-organization theory, the evolution characteristics of the settlement space of Anju Ancient Town with significant characteristics of traditional mountain settlements were analyzed, and then its internal and external influencing factors were summarized. Finally, appropriate protection and development strategies were proposed, such as reasonably planning functional zones, breaking through the single structure, and creating a good living cultural environment. The innovation of this study is that it integrates the self-organization theory into the cognition of traditional mountain settlement space, and discusses the connection between the mountain settlement space and the traditional regional context under the modern development concept, so as to seek the benign protection and reasonable development of traditional mountain settlement space.展开更多
Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties...Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.展开更多
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf...Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.展开更多
BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to e...BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to enhance the psychological well-being and overall quality of life for primipara,while also furnishing healthcare providers with efficacious interventions to tackle the psychological and physiological obstacles encountered during the stages of pregnancy and postpartum.AIM To explore the effect of timing theory combined with behavior change on selfefficacy,negative emotions and quality of life in patients with primipara.METHODS A total of 80 primipara cases were selected and admitted to our hospital between August 2020 and May 2022.These cases were divided into two groups,namely the observation group and the control group,with 40 cases in each group.The nursing interventions differed between the two groups,with the control group receiving routine nursing and the observation group receiving integrated nursing based on the timing theory and behavior change.The study aimed to compare the pre-and post-nursing scores of Chinese Perceived Stress Scale(CPSS),Edinburgh Postpartum Depression Scale(EPDS),Self-rating Anxiety Scale(SAS),breast milk knowledge,self-efficacy,and SF-36 quality of life in both groups.RESULTS After nursing,the CPSS,EPDS,and SAS scores of the two groups was significantly lower than that before nursing,and the CPSS,EPDS,and SAS scores of the observation group was significantly lower than that of the control group(P=0.002,P=0.011,and P=0.001 respectively).After nursing,the breastfeeding knowledge mastery,selfefficacy,and SF-36 quality of life scores was significantly higher than that before nursing,and the breastfeeding knowledge mastery(P=0.013),self-efficacy(P=0.008),and SF-36 quality of life(P=0.011)scores of the observation group was significantly higher than that of the control group.CONCLUSION The integration of timing theory and behavior change integrated theory has been found to be an effective approach in alleviating negative mood and stress experienced by primipara individuals,while also enhancing their selfefficacy and overall quality of life.This study focuses on the key concepts of timing theory,behavior change,primipara individuals,negative mood,and quality of life.展开更多
The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad...The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad measurements but lack finer resolution.Laboratory-based rock core measurements offer higher resolution but are resource-intensive.Conventionally,wireline logging and rock core measurements have been used independently.This study introduces a novel approach that integrates both data sources.The method leverages the detailed features from limited core data to enhance the resolution of wireline logging data.By combining machine learning with random field theory,the method allows for probabilistic predictions in regions with sparse data sampling.In this framework,12 parameters from wireline tests are used to predict trends in rock core data.The residuals are modeled using random field theory.The outcomes are high-resolution predictions that combine both the predicted trend and the probabilistic realizations of the residual.By utilizing unconditional and conditional random field theories,this method enables unconditional and conditional simulations of the underlying high-resolution rock compressional wave travel time profile and provides uncertainty estimates.This integrated approach optimizes the use of existing core and logging data.Its applicability is confirmed in an oil project in West China.展开更多
In recent years,sensor technology has been widely used in the defense and control of sensitive areas in cities,or in various scenarios such as early warning of forest fires,monitoring of forest pests and diseases,and ...In recent years,sensor technology has been widely used in the defense and control of sensitive areas in cities,or in various scenarios such as early warning of forest fires,monitoring of forest pests and diseases,and protection of endangered animals.Deploying sensors to collect data and then utilizing unmanned aerial vehicle(UAV)to collect the data stored in the sensors has replaced traditional manual data collection as the dominant method.The current strategies for efficient data collection in above scenarios are still imperfect,and the low quality of the collected data and the excessive energy consumed by UAV flights are still the main problems faced in data collection.With regards this,this paper proposes a multi-UAV mission planning method for self-organized sensor data acquisition by comprehensively utilizing the techniques of self-organized sensor clustering,multi-UAV mission area allocation,and sub-area data acquisition scheme optimization.The improvedα-hop clustering method utilizes the average transmission distance to reduce the size of the collection sensors,and the K-Dimensional method is used to form a multi-UAV cooperative workspace,and then,the genetic algorithm is used to trade-off the speed with the age of information(AoI)of the collected information and the energy consumption to form the multi-UAV data collection operation scheme.The combined optimization scheme in paper improves the performance by 95.56%and 58.21%,respectively,compared to the traditional baseline model.In order to verify the excellent generalization and applicability of the proposed method in real scenarios,the simulation test is conducted by introducing the digital elevation model data of the real terrain,and the results show that the relative error values of the proposed method and the performance test of the actual flight of the UAV are within the error interval of±10%.Then,the advantages and disadvantages of the present method with the existing mainstream schemes are tested,and the results show that the present method has a huge advantage in terms of space and time complexity,and at the same time,the accuracy for data extraction is relatively improved by 10.46%and 12.71%.Finally,by eliminating the clustering process and the subtask assignment process,the AoI performance decreases by 3.46×and 4.45×,and the energy performance decreases by 3.52×and 4.47×.This paper presents a comprehensive and detailed proactive optimization of the existing challenges faced in the field of data acquisition by means of a series of combinatorial optimizations.展开更多
In the reversed field pinch(RFP),plasmas exhibit various self-organized states.Among these,the three-dimensional(3D)helical state known as the“quasi-single-helical”(QSH)state enhances RFP confinement.However,accurat...In the reversed field pinch(RFP),plasmas exhibit various self-organized states.Among these,the three-dimensional(3D)helical state known as the“quasi-single-helical”(QSH)state enhances RFP confinement.However,accurately describing the equilibrium is challenging due to the presence of 3D structures,magnetic islands,and chaotic regions.It is difficult to obtain a balance between the available diagnostic and the real equilibrium structure.To address this issue,we introduce KTX3DFit,a new 3D equilibrium reconstruction code specifically designed for the Keda Torus eXperiment(KTX)RFP.KTX3DFit utilizes the stepped-pressure equilibrium code(SPEC)to compute 3D equilibria and uses polarimetric interferometer signals from experiments.KTX3DFit is able to reconstruct equilibria in various states,including axisymmetric,doubleaxis helical(DAx),and single-helical-axis(SHAx)states.Notably,this study marks the first integration of the SPEC code with internal magnetic field data for equilibrium reconstruction and could be used for other 3D configurations.展开更多
We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implemen...We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implementedthe charge self-consistent DFT+DMFT formalism by interfacing a full-potential all-electron DFT code with threehybridization expansion-based continuous-time quantum Monte Carlo impurity solvers.The benchmarks on several 3d,4fand 5f strongly correlated electron systems validated our formalism and implementation.Furthermore,within the LCANOframework,our formalism is general and the code architecture is extensible,so it can work as a bridge merging differentLCNAO DFT packages and impurity solvers to do charge self-consistent DFT+DMFT calculations.展开更多
This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the c...This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.展开更多
The main objective of this paper is to demonstrate that the internal processes of Self-Organizing Systems represent a unique and singular process, characterized by their specific generativity. This process can be mode...The main objective of this paper is to demonstrate that the internal processes of Self-Organizing Systems represent a unique and singular process, characterized by their specific generativity. This process can be modeled using the Maximum Ordinality Principle and its associated formal language, known as the “Incipient” Differential Calculus (IDC).展开更多
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical ach...In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.展开更多
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea...The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.展开更多
Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past...Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past three decades,significant progress in materials science,microfabrication,and various applications has boosted the development of promising functional microfluidic devices.In this review,the recent progress on novel microfluidic devices with various functions and applications is presented.First,the theory and numerical methods for studying the performance of microfluidic devices are briefly introduced.Then,materials and fabrication methods of functional microfluidic devices are summarized.Next,the recent significant advances in applications of microfluidic devices are highlighted,including heat sinks,clean water production,chemical reactions,sensors,biomedicine,capillaric circuits,wearable electronic devices,and microrobotics.Finally,perspectives on the challenges and future developments of functional microfluidic devices are presented.This review aims to inspire researchers from various fields engineering,materials,chemistry,mathematics,physics,and more—to collaborate and drive forward the development and applications of functional microfluidic devices,specifically for achieving carbon neutrality.展开更多
In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.I...In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.In our research,we propose an optimization method to expedite density functional theory(DFT)calculations for systems with large aspect ratios,such as metallic nanorods,nanowires,or scanning tunneling microscope tips.This method focuses on employing basis set to expand the electron density,Coulomb potential,and exchange-correlation potential.By precomputing integrals and caching redundant results,this expansion streamlines the integration process,significantly accelerating DFT computations.As a case study,we have applied this optimization to metallic nanorod systems of various radii and lengths,obtaining corresponding ground-state electron densities and potentials.展开更多
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t...The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.展开更多
Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Mean...Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Meanwhile,existing disease control methods often assume users’full compliance with measures like mandatory isolation,which does not align with the actual situation.To address these issues,this paper proposes a prospect theorybased framework to model users’decision-making process in epidemics and analyzes how irrationality affects individuals’behaviors and epidemic dynamics.According to the analysis results,irrationality tends to prompt conservative behaviors when the infection risk is low but encourages risk-seeking behaviors when the risk is high.Then,this paper proposes a behavior inducement algorithm to guide individuals’behaviors and control the spread of disease.Simulations and real user tests validate our analysis,and simulation results show that the proposed behavior inducement algorithm can effectively guide individuals’behavior.展开更多
基金funded by the National Natural Science Foundation of China(41971226,41871357)the Major Research and Development and Achievement Transformation Projects of Qinghai,China(2022-QY-224)the Strategic Priority Research Program of the Chinese Academy of Sciences(XDA28110502,XDA19030303).
文摘A comprehensive understanding of spatial distribution and clustering patterns of gravels is of great significance for ecological restoration and monitoring.However,traditional methods for studying gravels are low-efficiency and have many errors.This study researched the spatial distribution and cluster characteristics of gravels based on digital image processing technology combined with a self-organizing map(SOM)and multivariate statistical methods in the grassland of northern Tibetan Plateau.Moreover,the correlation of morphological parameters of gravels between different cluster groups and the environmental factors affecting gravel distribution were analyzed.The results showed that the morphological characteristics of gravels in northern region(cluster C)and southern region(cluster B)of the Tibetan Plateau were similar,with a low gravel coverage,small gravel diameter,and elongated shape.These regions were mainly distributed in high mountainous areas with large topographic relief.The central region(cluster A)has high coverage of gravels with a larger diameter,mainly distributed in high-altitude plains with smaller undulation.Principal component analysis(PCA)results showed that the gravel distribution of cluster A may be mainly affected by vegetation,while those in clusters B and C could be mainly affected by topography,climate,and soil.The study confirmed that the combination of digital image processing technology and SOM could effectively analyzed the spatial distribution characteristics of gravels,providing a new mode for gravel research.
基金supported by the National Natural Science Foundation of China under Grant Nos.12122401 and 12074007.
文摘In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.
文摘Internet of things and network densification bring significant challenges to uplink management.Only depending on optimization algorithm enhancements is not enough for uplink transmission.To control intercell interference,Fractional Uplink Power Control(FUPC)should be optimized from network-wide perspective,which has to find a better traffic distribution model.Conventionally,traffic distribution is geographic-based,and ineffective due to tricky locating efforts.This paper proposes a novel uplink power management framework for Self-Organizing Networks(SON),which firstly builds up pathloss-based traffic distribution model and then makes the decision of FUPC based on the model.PathLoss-based Traffic Distribution(PLTD)aggregates traffic based on the propagation condition of traffic that is defined as the pathloss between the position generating the traffic and surrounding cells.Simulations show that the improvement in optimization efficiency of FUPC with PLTD can be up to 40%compared to conventional GeoGraphic-based Traffic Distribution(GGTD).
基金supported by the National Natural Science Foundation of China(82230117).
文摘This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhering to evidence-based principles.Utilizing the System Function Decoding Model(SFDM),the research progresses through define,quantify,infer,and validate phases to systematically explore TCM’s material basis.It employs a dual analytical approach that combines top-down,systems theory-guided perspectives with bottom-up,elements-structure-function methodologies,provides comprehensive insights into TCM’s holistic material basis.Moreover,the research examines AI’s role in quantitative assessment and predictive analysis of TCM’s material components,proposing two specific AIdriven technical applications.This interdisciplinary effort underscores AI’s potential to enhance our understanding of TCM’s holistic material basis and establishes a foundation for future research at the intersection of traditional wisdom and modern technology.
基金the General Project of National Natural Science Foundation of China(51778078)General Project of Natural Science Foundation of Chongqing City(cstc2021jcyj-msxmX1055).
文摘Through literature research, field research and urban design analysis methods, based on the self-organization theory, the evolution characteristics of the settlement space of Anju Ancient Town with significant characteristics of traditional mountain settlements were analyzed, and then its internal and external influencing factors were summarized. Finally, appropriate protection and development strategies were proposed, such as reasonably planning functional zones, breaking through the single structure, and creating a good living cultural environment. The innovation of this study is that it integrates the self-organization theory into the cognition of traditional mountain settlement space, and discusses the connection between the mountain settlement space and the traditional regional context under the modern development concept, so as to seek the benign protection and reasonable development of traditional mountain settlement space.
文摘Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.
基金supported by the National Natural Science Foundation of China(Nos.51977113,62293500,62293501 and 62293505).
文摘Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.
文摘BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to enhance the psychological well-being and overall quality of life for primipara,while also furnishing healthcare providers with efficacious interventions to tackle the psychological and physiological obstacles encountered during the stages of pregnancy and postpartum.AIM To explore the effect of timing theory combined with behavior change on selfefficacy,negative emotions and quality of life in patients with primipara.METHODS A total of 80 primipara cases were selected and admitted to our hospital between August 2020 and May 2022.These cases were divided into two groups,namely the observation group and the control group,with 40 cases in each group.The nursing interventions differed between the two groups,with the control group receiving routine nursing and the observation group receiving integrated nursing based on the timing theory and behavior change.The study aimed to compare the pre-and post-nursing scores of Chinese Perceived Stress Scale(CPSS),Edinburgh Postpartum Depression Scale(EPDS),Self-rating Anxiety Scale(SAS),breast milk knowledge,self-efficacy,and SF-36 quality of life in both groups.RESULTS After nursing,the CPSS,EPDS,and SAS scores of the two groups was significantly lower than that before nursing,and the CPSS,EPDS,and SAS scores of the observation group was significantly lower than that of the control group(P=0.002,P=0.011,and P=0.001 respectively).After nursing,the breastfeeding knowledge mastery,selfefficacy,and SF-36 quality of life scores was significantly higher than that before nursing,and the breastfeeding knowledge mastery(P=0.013),self-efficacy(P=0.008),and SF-36 quality of life(P=0.011)scores of the observation group was significantly higher than that of the control group.CONCLUSION The integration of timing theory and behavior change integrated theory has been found to be an effective approach in alleviating negative mood and stress experienced by primipara individuals,while also enhancing their selfefficacy and overall quality of life.This study focuses on the key concepts of timing theory,behavior change,primipara individuals,negative mood,and quality of life.
基金the Australian Government through the Australian Research Council's Discovery Projects funding scheme(Project DP190101592)the National Natural Science Foundation of China(Grant Nos.41972280 and 52179103).
文摘The travel time of rock compressional waves is an essential parameter used for estimating important rock properties,such as porosity,permeability,and lithology.Current methods,like wireline logging tests,provide broad measurements but lack finer resolution.Laboratory-based rock core measurements offer higher resolution but are resource-intensive.Conventionally,wireline logging and rock core measurements have been used independently.This study introduces a novel approach that integrates both data sources.The method leverages the detailed features from limited core data to enhance the resolution of wireline logging data.By combining machine learning with random field theory,the method allows for probabilistic predictions in regions with sparse data sampling.In this framework,12 parameters from wireline tests are used to predict trends in rock core data.The residuals are modeled using random field theory.The outcomes are high-resolution predictions that combine both the predicted trend and the probabilistic realizations of the residual.By utilizing unconditional and conditional random field theories,this method enables unconditional and conditional simulations of the underlying high-resolution rock compressional wave travel time profile and provides uncertainty estimates.This integrated approach optimizes the use of existing core and logging data.Its applicability is confirmed in an oil project in West China.
基金National Key R&D Program of China(2022YFF1302700)Xiong’an New Area Science and Technology Innovation Special Project of Ministry of Science and Technology of China(2023XAGG0065)+2 种基金Ant Group through CCF-Ant Research Fund(CCF-AFSG RF20220214)Outstanding Youth Team Project of Central Universities(QNTD202308)Beijing Forestry University National Training Program of Innovation and Entrepreneurship for Undergraduates(202310022097).
文摘In recent years,sensor technology has been widely used in the defense and control of sensitive areas in cities,or in various scenarios such as early warning of forest fires,monitoring of forest pests and diseases,and protection of endangered animals.Deploying sensors to collect data and then utilizing unmanned aerial vehicle(UAV)to collect the data stored in the sensors has replaced traditional manual data collection as the dominant method.The current strategies for efficient data collection in above scenarios are still imperfect,and the low quality of the collected data and the excessive energy consumed by UAV flights are still the main problems faced in data collection.With regards this,this paper proposes a multi-UAV mission planning method for self-organized sensor data acquisition by comprehensively utilizing the techniques of self-organized sensor clustering,multi-UAV mission area allocation,and sub-area data acquisition scheme optimization.The improvedα-hop clustering method utilizes the average transmission distance to reduce the size of the collection sensors,and the K-Dimensional method is used to form a multi-UAV cooperative workspace,and then,the genetic algorithm is used to trade-off the speed with the age of information(AoI)of the collected information and the energy consumption to form the multi-UAV data collection operation scheme.The combined optimization scheme in paper improves the performance by 95.56%and 58.21%,respectively,compared to the traditional baseline model.In order to verify the excellent generalization and applicability of the proposed method in real scenarios,the simulation test is conducted by introducing the digital elevation model data of the real terrain,and the results show that the relative error values of the proposed method and the performance test of the actual flight of the UAV are within the error interval of±10%.Then,the advantages and disadvantages of the present method with the existing mainstream schemes are tested,and the results show that the present method has a huge advantage in terms of space and time complexity,and at the same time,the accuracy for data extraction is relatively improved by 10.46%and 12.71%.Finally,by eliminating the clustering process and the subtask assignment process,the AoI performance decreases by 3.46×and 4.45×,and the energy performance decreases by 3.52×and 4.47×.This paper presents a comprehensive and detailed proactive optimization of the existing challenges faced in the field of data acquisition by means of a series of combinatorial optimizations.
基金supported by National Natural Science Foundation of China(Nos.12175227 and 12375226)the National Magnetic Confinement Fusion Program of China(No.2022YFE03100004)+1 种基金the Fundamental Research Funds for the Central Universities(No.USTC 20210079)the Collaborative Innovation Program of Hefei Science Center,CAS(No.2022HSC-CIP022)。
文摘In the reversed field pinch(RFP),plasmas exhibit various self-organized states.Among these,the three-dimensional(3D)helical state known as the“quasi-single-helical”(QSH)state enhances RFP confinement.However,accurately describing the equilibrium is challenging due to the presence of 3D structures,magnetic islands,and chaotic regions.It is difficult to obtain a balance between the available diagnostic and the real equilibrium structure.To address this issue,we introduce KTX3DFit,a new 3D equilibrium reconstruction code specifically designed for the Keda Torus eXperiment(KTX)RFP.KTX3DFit utilizes the stepped-pressure equilibrium code(SPEC)to compute 3D equilibria and uses polarimetric interferometer signals from experiments.KTX3DFit is able to reconstruct equilibria in various states,including axisymmetric,doubleaxis helical(DAx),and single-helical-axis(SHAx)states.Notably,this study marks the first integration of the SPEC code with internal magnetic field data for equilibrium reconstruction and could be used for other 3D configurations.
文摘We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implementedthe charge self-consistent DFT+DMFT formalism by interfacing a full-potential all-electron DFT code with threehybridization expansion-based continuous-time quantum Monte Carlo impurity solvers.The benchmarks on several 3d,4fand 5f strongly correlated electron systems validated our formalism and implementation.Furthermore,within the LCANOframework,our formalism is general and the code architecture is extensible,so it can work as a bridge merging differentLCNAO DFT packages and impurity solvers to do charge self-consistent DFT+DMFT calculations.
文摘This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.
文摘The main objective of this paper is to demonstrate that the internal processes of Self-Organizing Systems represent a unique and singular process, characterized by their specific generativity. This process can be modeled using the Maximum Ordinality Principle and its associated formal language, known as the “Incipient” Differential Calculus (IDC).
基金supported by the National Key Research and Development Program of China(Grant No.2020YFB1804604).
文摘In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.
文摘The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.
基金supported by the National Natural Science Foundation of China(52006056)the Key-Area Research and Development Program of Guangdong Province(2020B090923003)The project was also partly supported by Natural Research Institute for Family Planning as well。
文摘Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past three decades,significant progress in materials science,microfabrication,and various applications has boosted the development of promising functional microfluidic devices.In this review,the recent progress on novel microfluidic devices with various functions and applications is presented.First,the theory and numerical methods for studying the performance of microfluidic devices are briefly introduced.Then,materials and fabrication methods of functional microfluidic devices are summarized.Next,the recent significant advances in applications of microfluidic devices are highlighted,including heat sinks,clean water production,chemical reactions,sensors,biomedicine,capillaric circuits,wearable electronic devices,and microrobotics.Finally,perspectives on the challenges and future developments of functional microfluidic devices are presented.This review aims to inspire researchers from various fields engineering,materials,chemistry,mathematics,physics,and more—to collaborate and drive forward the development and applications of functional microfluidic devices,specifically for achieving carbon neutrality.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFA0211303)the National Natural Science Foundation of China(Grant No.91850207)the numerical calculations in this paper have been done on the supercomputing system in the Supercomputing Center of Wuhan University.
文摘In real space density functional theory calculations,the effective potential depends on the electron density,requiring self-consistent iterations,and numerous integrals at each step,making the process time-consuming.In our research,we propose an optimization method to expedite density functional theory(DFT)calculations for systems with large aspect ratios,such as metallic nanorods,nanowires,or scanning tunneling microscope tips.This method focuses on employing basis set to expand the electron density,Coulomb potential,and exchange-correlation potential.By precomputing integrals and caching redundant results,this expansion streamlines the integration process,significantly accelerating DFT computations.As a case study,we have applied this optimization to metallic nanorod systems of various radii and lengths,obtaining corresponding ground-state electron densities and potentials.
基金funded by the“Ling Yan”Research and Development Project of Science Technology Department of Zhejiang Province of China under Grants No.2022C03122Public Welfare Technology Application and Research Projects of Science Technology Department of Zhejiang Province of China under Grants No.LGF22F020006 and LGF21F010004.
文摘The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.
文摘Understanding and modeling individuals’behaviors during epidemics is crucial for effective epidemic control.However,existing research ignores the impact of users’irrationality on decision-making in the epidemic.Meanwhile,existing disease control methods often assume users’full compliance with measures like mandatory isolation,which does not align with the actual situation.To address these issues,this paper proposes a prospect theorybased framework to model users’decision-making process in epidemics and analyzes how irrationality affects individuals’behaviors and epidemic dynamics.According to the analysis results,irrationality tends to prompt conservative behaviors when the infection risk is low but encourages risk-seeking behaviors when the risk is high.Then,this paper proposes a behavior inducement algorithm to guide individuals’behaviors and control the spread of disease.Simulations and real user tests validate our analysis,and simulation results show that the proposed behavior inducement algorithm can effectively guide individuals’behavior.