Machine learning(ML)-based prediction models for mapping hazard(e.g.,landslide and debris flow)susceptibility have been widely developed in recent research.However,in some specific areas,ML models have limited applica...Machine learning(ML)-based prediction models for mapping hazard(e.g.,landslide and debris flow)susceptibility have been widely developed in recent research.However,in some specific areas,ML models have limited application because of the uncertainties in identifying negative samples.The Parlung Tsangpo Basin exemplifies a region prone to recurrent glacial debris flows(GDFs)and is characterized by a prominent landform featuring deep gullies.Considering the limitations of the ML model,we developed and compared two combined statistical models(FA-WE and FA-IC)based on factor analysis(FA),weight of evidence(WE),and the information content(IC)method.The final GDF susceptibility maps were generated by selecting 8 most important static factors and considering the influence of precipitation.The results show that the FA-IC model has the best performance.The areas with a very high susceptibility to GDFs are primarily located in the narrow valley section upstream,on both sides of the valley in the middle and downstream of the Parlung Tsangpo River,and in the narrow valley section of each tributary.These areas encompass 86 gullies and are characterized as"narrow and steep".展开更多
The application of unmanned driving in the Internet of Things is one of the concrete manifestations of the application of artificial intelligence technology.Image semantic segmentation can help the unmanned driving sy...The application of unmanned driving in the Internet of Things is one of the concrete manifestations of the application of artificial intelligence technology.Image semantic segmentation can help the unmanned driving system by achieving road accessibility analysis.Semantic segmentation is also a challenging technology for image understanding and scene parsing.We focused on the challenging task of real-time semantic segmentation in this paper.In this paper,we proposed a novel fast architecture for real-time semantic segmentation named DuFNet.Starting from the existing work of Bilateral Segmentation Network(BiSeNet),DuFNet proposes a novel Semantic Information Flow(SIF)structure for context information and a novel Fringe Information Flow(FIF)structure for spatial information.We also proposed two kinds of SIF with cascaded and paralleled structures,respectively.The SIF encodes the input stage by stage in the ResNet18 backbone and provides context information for the feature fusionmodule.Features from previous stages usually contain rich low-level details but high-level semantics for later stages.Themultiple convolutions embed in Parallel SIF aggregate the corresponding features among different stages and generate a powerful global context representation with less computational cost.The FIF consists of a pooling layer and an upsampling operator followed by projection convolution layer.The concise component provides more spatial details for the network.Compared with BiSeNet,our work achieved faster speed and comparable performance with 72.34%mIoU accuracy and 78 FPS on Cityscapes Dataset based on the ResNet18 backbone.展开更多
Supported by the spatial analysis feature of geographic information science and assessment model of regional debris flows, hazards degrees of the debris flows in the Upper Yangtze River Watershed (UYRW) are divided ...Supported by the spatial analysis feature of geographic information science and assessment model of regional debris flows, hazards degrees of the debris flows in the Upper Yangtze River Watershed (UYRW) are divided into five grades based on grid cell. The area of no danger, light danger, medium danger, severe danger and extreme severe danger regions respectively are 278 000, 288 000, 217 000, 127 000, 15 000 km^2. Furthermore, the counties in the UYRW are classified into four classes based on the hazards degrees in each county. The number of severe danger, medium danger, light danger and no danger counties respectively are 49, 82, 77 and 105. The assessment results will be provided for the hazards forecasting and mitigation in the UYRW and ongoing regionalization of Main Function Regions in China as data and technique framework.展开更多
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif...Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance.展开更多
Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between u...Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between users and virtual machines.Whether direct or indirect data leakage,it can be regarded as illegal information flow.Methods,such as access control models can control the information flow,but not the covert information flow.Therefore,it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture.Typical noninterference models are not suitable to certificate information flow in cloud computing architecture.In this paper,we propose several information flow models for cloud architecture.One model is for transitive cloud computing architecture.The others are for intransitive cloud computing architecture.When concurrent access actions execute in the cloud architecture,we want that security domain and security domain do not affect each other,that there is no information flow between security domains.But in fact,there will be more or less indirect information flow between security domains.Our models are concerned with how much information is allowed to flow.For example,in the CIP model,the other domain can learn the sequence of actions.But in the CTA model,the other domain can’t learn the information.Which security model will be used in an architecture depends on the security requirements for that architecture.展开更多
Multi-product collaborative development is adopted widely in manufacturing enterprise, while the present multi-project planning models don't take techni- cal/data interactions of multiple products into account. To de...Multi-product collaborative development is adopted widely in manufacturing enterprise, while the present multi-project planning models don't take techni- cal/data interactions of multiple products into account. To decrease the influence of technical/data interactions on project progresses, the information flow scheduling models based on the extended DSM is presented. Firstly, infor- mation dependencies are divided into four types: series, parallel, coupling and similar. Secondly, different types of dependencies are expressed as DSM units, and the exten- ded DSM model is brought forward, described as a block matrix. Furthermore, the information flow scheduling methods is proposed, which involves four types of opera- tions, where partitioning and clustering algorithm are modified from DSM for ensuring progress of high-priority project, merging and converting is the specific computation of the extended DSM. Finally, the information flow scheduling of two machine tools development is analyzed with example, and different project priorities correspond to different task sequences and total coordination cost. The proposed methodology provides a detailed instruction for information flow scheduling in multi-product development, with specially concerning technical/data interactions.展开更多
Based on Bayesian network (BN) and information flow (IF),a new machine learning-based model named IFBN is put forward to interpolate missing time series of multiple ocean variables. An improved BN structural learning ...Based on Bayesian network (BN) and information flow (IF),a new machine learning-based model named IFBN is put forward to interpolate missing time series of multiple ocean variables. An improved BN structural learning algorithm with IF is designed to mine causal relationships among ocean variables to build network structure. Nondirectional inference mechanism of BN is applied to achieve the synchronous interpolation of multiple missing time series. With the IFBN,all ocean variables are placed in a causal network visually,making full use of information about related variables to fill missing data. More importantly,the synchronous interpolation of multiple variables can avoid model retraining when interpolative objects change. Interpolation experiments show that IFBN has even better interpolation accuracy,effectiveness and stability than existing methods.展开更多
In order to obtain the trend of urban rail transit traffic flow and grasp the fluctuation range of passenger flow better,this paper proposes a combined forecasting model of passenger flow fluctuation range based on fu...In order to obtain the trend of urban rail transit traffic flow and grasp the fluctuation range of passenger flow better,this paper proposes a combined forecasting model of passenger flow fluctuation range based on fuzzy information granulation and least squares support vector machine(LS-SVM)optimized by chaos particle swarm optimization(CPSO).Due to the nonlinearity and fluctuation of the passenger flow,firstly,fuzzy information granulation is used to extract the valid data from the window according to the requirement.Secondly,CPSO that has strong global search ability is applied to optimize the parameters of the LS-SVM forecasting model.Finally,the combined model is used to forecast the fluctuation range of early peak passenger flow at Tiyu Xilu Station of Guangzhou Metro Line 3 in 2014,and the results are compared and analyzed with other models.Simulation results demonstrate that the combined forecasting model can effectively track the fluctuation of passenger flow,which provides an effective method for predicting the fluctuation range of short-term passenger flow in the future.展开更多
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The struc...Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes.展开更多
The information flow chart within product life cycle is given out based on collaborative production commerce (CPC) thoughts. In this chart, the separated information systems are integrated by means of enterprise kno...The information flow chart within product life cycle is given out based on collaborative production commerce (CPC) thoughts. In this chart, the separated information systems are integrated by means of enterprise knowledge assets that are promoted by CPC from production knowledge. The information flow in R&D process is analyzed in the environment of virtual R&D group and distributed PDM. In addition, the information flow throughout the manufacturing and marketing process is analyzed in CPC environment.展开更多
BACKGROUND:Neuro-rehabilitative training has been shown to promote motor function recovery in stroke patients,although the underlying mechanisms have not been fully clarified.OBJECTIVE:To investigate the effects of ...BACKGROUND:Neuro-rehabilitative training has been shown to promote motor function recovery in stroke patients,although the underlying mechanisms have not been fully clarified.OBJECTIVE:To investigate the effects of finger movement training on functional connectivity and information flow direction in cerebral motor areas of healthy people using electroencephalogram (EEG).DESIGN,TIME AND SETTING:A self-controlled,observational study was performed at the College of Life Science and Bioengineering,Beijing University of Technology between December 2008 and April 2009.PARTICIPANTS:Nineteen healthy adults,who seldom played musical instruments or keyboards,were included in the present study.METHODS:Specific finger movement training was performed,and all subjects were asked to separately press keys with their left or right hand fingers,according to instructions.The task comprised five sessions of test train test train-test.Thirty-six channel EEG signals were recorded in different test sessions prior to and after training.Data were statistically analyzed using one-way analysis of variance.MAIN OUTCOME MEASURES:The number of effective performances,correct ratio,average response time,average movement time,correlation coefficient between pairs of EEG channels,and information flow direction in motor regions were analyzed and compared between different training sessions.RESULTS:Motor function of all subjects was significantly improved in the third test comparedwith the first test (P〈 0.01).More than 80% of connections were strengthened in the motor-related areas following two training sessions,in particular the primary motor regions under the C4 electrode.Compared to the first test,a greater amount of information flowed from the Cz and Fcz electrodes (corresponding to supplementary motor area) to the C4 electrode in the third test.CONCLUSION:Finger task training increased motor ability in subjects by strengthening connections and changing information flow in the motor areas.These results provided a greater understanding of the mechanisms involved in motor rehabilitation.展开更多
Bigeye tuna Thunnus obesus is an important migratory species that forages deeply,and El Niño events highly influence its distribution in the eastern Pacific Ocean.While sea surface temperature is widely recognize...Bigeye tuna Thunnus obesus is an important migratory species that forages deeply,and El Niño events highly influence its distribution in the eastern Pacific Ocean.While sea surface temperature is widely recognized as the main factor affecting bigeye tuna(BET)distribution during El Niño events,the roles of different types of El Niño and subsurface oceanic signals,such as ocean heat content and mixed layer depth,remain unclear.We conducted A spatial-temporal analysis to investigate the relationship among BET distribution,El Niño events,and the underlying oceanic signals to address this knowledge gap.We used monthly purse seine fisheries data of BET in the eastern tropical Pacific Ocean(ETPO)from 1994 to 2012 and extracted the central-Pacific El Niño(CPEN)indices based on Niño 3 and Niño 4indexes.Furthermore,we employed Explainable Artificial Intelligence(XAI)models to identify the main patterns and feature importance of the six environmental variables and used information flow analysis to determine the causality between the selected factors and BET distribution.Finally,we analyzed Argo datasets to calculate the vertical,horizontal,and zonal mean temperature differences during CPEN and normal years to clarify the oceanic thermodynamic structure differences between the two types of years.Our findings reveal that BET distribution during the CPEN years is mainly driven by advection feedback of subsurface warmer thermal signals and vertically warmer habitats in the CPEN domain area,especially in high-yield fishing areas.The high frequency of CPEN events will likely lead to the westward shift of fisheries centers.展开更多
In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a...In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a small perturbation around the homogeneous flow solution and find that the improvement in the stability of traffic flow is obtained by taking into account preceding mixture traffic information. Direct simulations also confirm that the traffic jam can be suppressed efficiently by considering the relative currents ahead, just like incorporating site information in front. Moreover, from the nonlinear analysis of the extended models, the preceding mixture traffic information dependence of the propagating kink solutions for traffic jams is obtained by deriving the modified KdV equation near the critical point using the reductive perturbation method.展开更多
A large number of debris flow disasters(called Seismic debris flows) would occur after an earthquake, which can cause a great amount of damage. UAV low-altitude remote sensing technology has become a means of quickly ...A large number of debris flow disasters(called Seismic debris flows) would occur after an earthquake, which can cause a great amount of damage. UAV low-altitude remote sensing technology has become a means of quickly obtaining disaster information as it has the advantage of convenience and timeliness, but the spectral information of the image is so scarce, making it difficult to accurately detect the information of earthquake debris flow disasters. Based on the above problems, a seismic debris flow detection method based on transfer learning(TL) mechanism is proposed. On the basis of the constructed seismic debris flow disaster database, the features acquired from the training of the convolutional neural network(CNN) are transferred to the disaster information detection of the seismic debris flow. The automatic detection of earthquake debris flow disaster information is then completed, and the results of object-oriented seismic debris flow disaster information detection are compared and analyzed with the detection results supported by transfer learning.展开更多
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput...With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.展开更多
The characteristics of highway transport and the application of information technology in highway transport service are combined; the information flows' promotion and substitution on highway transport are analyzed; a...The characteristics of highway transport and the application of information technology in highway transport service are combined; the information flows' promotion and substitution on highway transport are analyzed; and the highway transport development strategy based on information flow impact is proposed.展开更多
The management of information flow for production improvement has always been a target in the research. In this paper, the focus is on the analysis model of the characteristics of information flow in shop floor operat...The management of information flow for production improvement has always been a target in the research. In this paper, the focus is on the analysis model of the characteristics of information flow in shop floor operations based on the influence that dimension (support or medium), direction and the quality information flow have on the value of information flow using machine learning classification algorithms. The obtained results of classification algorithms used to analyze the value of information flow are Decision Trees (DT) and Random Forest (RF) with a score of 0.99% and the mean absolute error of 0.005. The results also show that the management of information flow using DT or RF shows that, the dimension of information such as digital information has the greatest value of information flow in shop floor operations when the shop floor is totally digitalized. Direction of information flow does not have any great influence on shop floor operations processes when the operations processes are digitalized or done by operators as machines.展开更多
The development o f the network technology, and especially the web search engine, has brought great changes to the field of the English translation. Translators can acquire the background information of the translated...The development o f the network technology, and especially the web search engine, has brought great changes to the field of the English translation. Translators can acquire the background information of the translated texts by using the web search engine correctly, inquire about the correct translation methods of the rare professional terms, apply the fixed sentence patterns, and check the correctness of the translation, so as to improve the translation speed and quality.展开更多
Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study...Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study, through using the natural language processing(NLP) and data mining, we analyzed the information content transmitted via a microblog, users' social networks and their interactions, and carried out an empirical analysis on the dissemination process of one particular piece of information via Sina Weibo.Based on the result of these analyses, we attempt to develop a better understanding about the rule and mechanism of the informal information flow in microblogging.展开更多
基金funded by the National Natural Science Foundation of China(Grant Nos.42377170).
文摘Machine learning(ML)-based prediction models for mapping hazard(e.g.,landslide and debris flow)susceptibility have been widely developed in recent research.However,in some specific areas,ML models have limited application because of the uncertainties in identifying negative samples.The Parlung Tsangpo Basin exemplifies a region prone to recurrent glacial debris flows(GDFs)and is characterized by a prominent landform featuring deep gullies.Considering the limitations of the ML model,we developed and compared two combined statistical models(FA-WE and FA-IC)based on factor analysis(FA),weight of evidence(WE),and the information content(IC)method.The final GDF susceptibility maps were generated by selecting 8 most important static factors and considering the influence of precipitation.The results show that the FA-IC model has the best performance.The areas with a very high susceptibility to GDFs are primarily located in the narrow valley section upstream,on both sides of the valley in the middle and downstream of the Parlung Tsangpo River,and in the narrow valley section of each tributary.These areas encompass 86 gullies and are characterized as"narrow and steep".
基金supported in part by the National Key RD Program of China (2021YFF0602104-2,2020YFB1804604)in part by the 2020 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of Chinain part by the Fundamental Research Fund for the Central Universities (30918012204,30920041112).
文摘The application of unmanned driving in the Internet of Things is one of the concrete manifestations of the application of artificial intelligence technology.Image semantic segmentation can help the unmanned driving system by achieving road accessibility analysis.Semantic segmentation is also a challenging technology for image understanding and scene parsing.We focused on the challenging task of real-time semantic segmentation in this paper.In this paper,we proposed a novel fast architecture for real-time semantic segmentation named DuFNet.Starting from the existing work of Bilateral Segmentation Network(BiSeNet),DuFNet proposes a novel Semantic Information Flow(SIF)structure for context information and a novel Fringe Information Flow(FIF)structure for spatial information.We also proposed two kinds of SIF with cascaded and paralleled structures,respectively.The SIF encodes the input stage by stage in the ResNet18 backbone and provides context information for the feature fusionmodule.Features from previous stages usually contain rich low-level details but high-level semantics for later stages.Themultiple convolutions embed in Parallel SIF aggregate the corresponding features among different stages and generate a powerful global context representation with less computational cost.The FIF consists of a pooling layer and an upsampling operator followed by projection convolution layer.The concise component provides more spatial details for the network.Compared with BiSeNet,our work achieved faster speed and comparable performance with 72.34%mIoU accuracy and 78 FPS on Cityscapes Dataset based on the ResNet18 backbone.
基金The National Basic Research Program (973 program) (2002CB111506)the R&D Infrastructure and Facility Devel-opment Program (2005DKA32300)
文摘Supported by the spatial analysis feature of geographic information science and assessment model of regional debris flows, hazards degrees of the debris flows in the Upper Yangtze River Watershed (UYRW) are divided into five grades based on grid cell. The area of no danger, light danger, medium danger, severe danger and extreme severe danger regions respectively are 278 000, 288 000, 217 000, 127 000, 15 000 km^2. Furthermore, the counties in the UYRW are classified into four classes based on the hazards degrees in each county. The number of severe danger, medium danger, light danger and no danger counties respectively are 49, 82, 77 and 105. The assessment results will be provided for the hazards forecasting and mitigation in the UYRW and ongoing regionalization of Main Function Regions in China as data and technique framework.
基金supported in part by National Natural Science Foundation of China(61502368,61303033,U1135002 and U1405255)the National High Technology Research and Development Program(863 Program)of China(No.2015AA017203)+1 种基金the Fundamental Research Funds for the Central Universities(XJS14072,JB150308)the Aviation Science Foundation of China(No.2013ZC31003,20141931001)
文摘Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance.
基金Natural Science Research Project of Jiangsu Province Universities and Colleges(No.17KJD520005,Congdong Lv).
文摘Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between users and virtual machines.Whether direct or indirect data leakage,it can be regarded as illegal information flow.Methods,such as access control models can control the information flow,but not the covert information flow.Therefore,it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture.Typical noninterference models are not suitable to certificate information flow in cloud computing architecture.In this paper,we propose several information flow models for cloud architecture.One model is for transitive cloud computing architecture.The others are for intransitive cloud computing architecture.When concurrent access actions execute in the cloud architecture,we want that security domain and security domain do not affect each other,that there is no information flow between security domains.But in fact,there will be more or less indirect information flow between security domains.Our models are concerned with how much information is allowed to flow.For example,in the CIP model,the other domain can learn the sequence of actions.But in the CTA model,the other domain can’t learn the information.Which security model will be used in an architecture depends on the security requirements for that architecture.
基金Supported by National Natural Science Foundation of China(Grant Nos.51475077,51005038)Science and Technology Foundation of Liaoning China(Grant Nos.201301002,2014028012)
文摘Multi-product collaborative development is adopted widely in manufacturing enterprise, while the present multi-project planning models don't take techni- cal/data interactions of multiple products into account. To decrease the influence of technical/data interactions on project progresses, the information flow scheduling models based on the extended DSM is presented. Firstly, infor- mation dependencies are divided into four types: series, parallel, coupling and similar. Secondly, different types of dependencies are expressed as DSM units, and the exten- ded DSM model is brought forward, described as a block matrix. Furthermore, the information flow scheduling methods is proposed, which involves four types of opera- tions, where partitioning and clustering algorithm are modified from DSM for ensuring progress of high-priority project, merging and converting is the specific computation of the extended DSM. Finally, the information flow scheduling of two machine tools development is analyzed with example, and different project priorities correspond to different task sequences and total coordination cost. The proposed methodology provides a detailed instruction for information flow scheduling in multi-product development, with specially concerning technical/data interactions.
基金The National Natural Science Foundation of China under contract Nos 41875061 and 41976188the“Double First-Class”Research Program of National University of Defense Technology under contract No.xslw05.
文摘Based on Bayesian network (BN) and information flow (IF),a new machine learning-based model named IFBN is put forward to interpolate missing time series of multiple ocean variables. An improved BN structural learning algorithm with IF is designed to mine causal relationships among ocean variables to build network structure. Nondirectional inference mechanism of BN is applied to achieve the synchronous interpolation of multiple missing time series. With the IFBN,all ocean variables are placed in a causal network visually,making full use of information about related variables to fill missing data. More importantly,the synchronous interpolation of multiple variables can avoid model retraining when interpolative objects change. Interpolation experiments show that IFBN has even better interpolation accuracy,effectiveness and stability than existing methods.
基金National Natural Science Foundation of China(No.61663021)Science and Technology Support Project of Gansu Province(No.1304GKCA023)Scientific Research Project in University of Gansu Province(No.2017A-025)
文摘In order to obtain the trend of urban rail transit traffic flow and grasp the fluctuation range of passenger flow better,this paper proposes a combined forecasting model of passenger flow fluctuation range based on fuzzy information granulation and least squares support vector machine(LS-SVM)optimized by chaos particle swarm optimization(CPSO).Due to the nonlinearity and fluctuation of the passenger flow,firstly,fuzzy information granulation is used to extract the valid data from the window according to the requirement.Secondly,CPSO that has strong global search ability is applied to optimize the parameters of the LS-SVM forecasting model.Finally,the combined model is used to forecast the fluctuation range of early peak passenger flow at Tiyu Xilu Station of Guangzhou Metro Line 3 in 2014,and the results are compared and analyzed with other models.Simulation results demonstrate that the combined forecasting model can effectively track the fluctuation of passenger flow,which provides an effective method for predicting the fluctuation range of short-term passenger flow in the future.
基金supported in part by the National Natural Science Foundation of China(62225306,U2141235,52188102,and 62003145)the National Key Research and Development Program of China(2022ZD0119601)+1 种基金Guangdong Basic and Applied Research Foundation(2022B1515120069)the Science and Technology Project of State Grid Corporation of China(5100-202199557A-0-5-ZN).
文摘Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes.
文摘The information flow chart within product life cycle is given out based on collaborative production commerce (CPC) thoughts. In this chart, the separated information systems are integrated by means of enterprise knowledge assets that are promoted by CPC from production knowledge. The information flow in R&D process is analyzed in the environment of virtual R&D group and distributed PDM. In addition, the information flow throughout the manufacturing and marketing process is analyzed in CPC environment.
基金the National Natural Science Foundation of China,No. 30670543
文摘BACKGROUND:Neuro-rehabilitative training has been shown to promote motor function recovery in stroke patients,although the underlying mechanisms have not been fully clarified.OBJECTIVE:To investigate the effects of finger movement training on functional connectivity and information flow direction in cerebral motor areas of healthy people using electroencephalogram (EEG).DESIGN,TIME AND SETTING:A self-controlled,observational study was performed at the College of Life Science and Bioengineering,Beijing University of Technology between December 2008 and April 2009.PARTICIPANTS:Nineteen healthy adults,who seldom played musical instruments or keyboards,were included in the present study.METHODS:Specific finger movement training was performed,and all subjects were asked to separately press keys with their left or right hand fingers,according to instructions.The task comprised five sessions of test train test train-test.Thirty-six channel EEG signals were recorded in different test sessions prior to and after training.Data were statistically analyzed using one-way analysis of variance.MAIN OUTCOME MEASURES:The number of effective performances,correct ratio,average response time,average movement time,correlation coefficient between pairs of EEG channels,and information flow direction in motor regions were analyzed and compared between different training sessions.RESULTS:Motor function of all subjects was significantly improved in the third test comparedwith the first test (P〈 0.01).More than 80% of connections were strengthened in the motor-related areas following two training sessions,in particular the primary motor regions under the C4 electrode.Compared to the first test,a greater amount of information flowed from the Cz and Fcz electrodes (corresponding to supplementary motor area) to the C4 electrode in the third test.CONCLUSION:Finger task training increased motor ability in subjects by strengthening connections and changing information flow in the motor areas.These results provided a greater understanding of the mechanisms involved in motor rehabilitation.
基金Supported by the Marine S&T Fund of Laoshan Laboratory(Qingdao)(No.LSKJ202204302)the National Natural Science Foundation of China(Nos.42090044,42376175,U2006211)。
文摘Bigeye tuna Thunnus obesus is an important migratory species that forages deeply,and El Niño events highly influence its distribution in the eastern Pacific Ocean.While sea surface temperature is widely recognized as the main factor affecting bigeye tuna(BET)distribution during El Niño events,the roles of different types of El Niño and subsurface oceanic signals,such as ocean heat content and mixed layer depth,remain unclear.We conducted A spatial-temporal analysis to investigate the relationship among BET distribution,El Niño events,and the underlying oceanic signals to address this knowledge gap.We used monthly purse seine fisheries data of BET in the eastern tropical Pacific Ocean(ETPO)from 1994 to 2012 and extracted the central-Pacific El Niño(CPEN)indices based on Niño 3 and Niño 4indexes.Furthermore,we employed Explainable Artificial Intelligence(XAI)models to identify the main patterns and feature importance of the six environmental variables and used information flow analysis to determine the causality between the selected factors and BET distribution.Finally,we analyzed Argo datasets to calculate the vertical,horizontal,and zonal mean temperature differences during CPEN and normal years to clarify the oceanic thermodynamic structure differences between the two types of years.Our findings reveal that BET distribution during the CPEN years is mainly driven by advection feedback of subsurface warmer thermal signals and vertically warmer habitats in the CPEN domain area,especially in high-yield fishing areas.The high frequency of CPEN events will likely lead to the westward shift of fisheries centers.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 60904068,10902076,11072117,and 61004113)
文摘In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a small perturbation around the homogeneous flow solution and find that the improvement in the stability of traffic flow is obtained by taking into account preceding mixture traffic information. Direct simulations also confirm that the traffic jam can be suppressed efficiently by considering the relative currents ahead, just like incorporating site information in front. Moreover, from the nonlinear analysis of the extended models, the preceding mixture traffic information dependence of the propagating kink solutions for traffic jams is obtained by deriving the modified KdV equation near the critical point using the reductive perturbation method.
基金supported by the National Natural Science Foundation of China(41701499)the Sichuan Science and Technology Program(2018GZ0265)the Geomatics Technology and Application Key Laboratory of Qinghai Province(QHDX-2018-07)
文摘A large number of debris flow disasters(called Seismic debris flows) would occur after an earthquake, which can cause a great amount of damage. UAV low-altitude remote sensing technology has become a means of quickly obtaining disaster information as it has the advantage of convenience and timeliness, but the spectral information of the image is so scarce, making it difficult to accurately detect the information of earthquake debris flow disasters. Based on the above problems, a seismic debris flow detection method based on transfer learning(TL) mechanism is proposed. On the basis of the constructed seismic debris flow disaster database, the features acquired from the training of the convolutional neural network(CNN) are transferred to the disaster information detection of the seismic debris flow. The automatic detection of earthquake debris flow disaster information is then completed, and the results of object-oriented seismic debris flow disaster information detection are compared and analyzed with the detection results supported by transfer learning.
基金This work is supported by National Natural Science Foundation of China (Grant No.60773093, 60873209, and 60970107), the Key Program for Basic Research of Shanghai (Grant No. 09JC1407900, 09510701600, 10511500100), IBM SUR Funding and IBM Research-China JP Funding, and Key Lab of Information Network Security, Ministry of Public Security.
文摘With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.
文摘The characteristics of highway transport and the application of information technology in highway transport service are combined; the information flows' promotion and substitution on highway transport are analyzed; and the highway transport development strategy based on information flow impact is proposed.
文摘The management of information flow for production improvement has always been a target in the research. In this paper, the focus is on the analysis model of the characteristics of information flow in shop floor operations based on the influence that dimension (support or medium), direction and the quality information flow have on the value of information flow using machine learning classification algorithms. The obtained results of classification algorithms used to analyze the value of information flow are Decision Trees (DT) and Random Forest (RF) with a score of 0.99% and the mean absolute error of 0.005. The results also show that the management of information flow using DT or RF shows that, the dimension of information such as digital information has the greatest value of information flow in shop floor operations when the shop floor is totally digitalized. Direction of information flow does not have any great influence on shop floor operations processes when the operations processes are digitalized or done by operators as machines.
文摘The development o f the network technology, and especially the web search engine, has brought great changes to the field of the English translation. Translators can acquire the background information of the translated texts by using the web search engine correctly, inquire about the correct translation methods of the rare professional terms, apply the fixed sentence patterns, and check the correctness of the translation, so as to improve the translation speed and quality.
文摘Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study, through using the natural language processing(NLP) and data mining, we analyzed the information content transmitted via a microblog, users' social networks and their interactions, and carried out an empirical analysis on the dissemination process of one particular piece of information via Sina Weibo.Based on the result of these analyses, we attempt to develop a better understanding about the rule and mechanism of the informal information flow in microblogging.