The lath-or plate-shaped bainitic ferrite of low and medium carbon alloy steels consists of packets of ferrite sublaths which are composed of many finer and regular ferrite blocks.They are uniform shear growth units o...The lath-or plate-shaped bainitic ferrite of low and medium carbon alloy steels consists of packets of ferrite sublaths which are composed of many finer and regular ferrite blocks.They are uniform shear growth units of bainitic phase transformation.No carbide is precipitated from them.The bainitic O-carbides are precipitated from γ-α interface or carbon-rich austenite.The mode of arrangement of the units in ferrite sublath packet is in uni-or bi-di- rection.Single surface relief is produced by the accumulation of uniform shear strains with all the ferrite units arranged unidirectionally in a sublath packet,while tent-shaped surface relief is formed by the integration of the uniform shear strains of two groups with ferrite units piling up in two directions and growing face to face;whereas if they grow back to back,the integra- tion will be responsible for invert-tent-shaped surface relief.The interface trace between two groups of ferrite units in a sublath packet is shown as“midrib”.展开更多
A new lattice hierarchy related to Ragnisco-Tu equation is proposed and its gauge equivalence to Ragnisco-Tu equation is proven. As an application of gauge transformation, we construct Darboux transformation (DT) of t...A new lattice hierarchy related to Ragnisco-Tu equation is proposed and its gauge equivalence to Ragnisco-Tu equation is proven. As an application of gauge transformation, we construct Darboux transformation (DT) of this new equation through DT of Ragnisco-Tu equation. An explicit exact solution is presented as an example.展开更多
This study discusses the basic guarantee of the Charter of the United Nations to realize the right to development from the angle of Transforming Our World: the 2030 Agenda for Sustainable Development. The concepts reg...This study discusses the basic guarantee of the Charter of the United Nations to realize the right to development from the angle of Transforming Our World: the 2030 Agenda for Sustainable Development. The concepts regarding the people as the focal point, the dignity, the worth of the human being, as well as larger aspects of freedom, and other basic concepts within the Charter of the United Nations, guide the right direction of action for the realization of the right to development. The purpose and principles of the United Nations establishment in the Charter constitute the basic legal protection of the right to development. Values of peace, international dialogue, and international cooperation show the right path to the realization of the right to development.展开更多
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning me...While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)model.At the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial features.The fusion of features from both granularities serves as the ultimate multidimensional representation of malicious traffic.Our approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut categories.The experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic.展开更多
Deep learning based recommendation methods, such as the recurrent neural network based recommendation method(RNNRec) and the gated recurrent unit(GRU) based recommendation method(GRURec), are proposed to solve the pro...Deep learning based recommendation methods, such as the recurrent neural network based recommendation method(RNNRec) and the gated recurrent unit(GRU) based recommendation method(GRURec), are proposed to solve the problem of time heterogeneous feedback recommendation. These methods out-perform several state-of-the-art methods. However, in RNNRec and GRURec, action vectors and item vectors are shared among users. The different meanings of the same action for different users are not considered. Similarly, different user preference for the same item is also ignored. To address this problem, the models of RNNRec and GRURec are modified in this paper. In the proposed methods, action vectors and item vectors are transformed into the user space for each user firstly, and then the transformed vectors are fed into the original neural networks of RNNRec and GRURec. The transformed action vectors and item vectors represent the user specified meaning of actions and the preference for items, which makes the proposed method obtain more accurate recommendation results. The experimental results on two real-life datasets indicate that the proposed method outperforms RNNRec and GRURec as well as other state-of-the-art approaches in most cases.展开更多
The development of accurate prediction models continues to be highly beneficial in myriad disciplines. Deep learning models have performed well in stock price prediction and give high accuracy. However, these models a...The development of accurate prediction models continues to be highly beneficial in myriad disciplines. Deep learning models have performed well in stock price prediction and give high accuracy. However, these models are largely affected by the vanishing gradient problem escalated by some activation functions. This study proposes the use of the Vanishing Gradient Resilient Optimized Gated Recurrent Unit (OGRU) model with a scaled mean Approximation Coefficient (AC) time lag which should counter slow convergence, vanishing gradient and large error metrics. This study employed the Rectified Linear Unit (ReLU), Hyperbolic Tangent (Tanh), Sigmoid and Exponential Linear Unit (ELU) activation functions. Real-life datasets including the daily Apple and 5-minute Netflix closing stock prices were used, and they were decomposed using the Stationary Wavelet Transform (SWT). The decomposed series formed a decomposed data model which was compared to an undecomposed data model with similar hyperparameters and different default lags. The Apple daily dataset performed well with a Default_1 lag, using an undecomposed data model and the ReLU, attaining 0.01312, 0.00854 and 3.67 minutes for RMSE, MAE and runtime. The Netflix data performed best with the MeanAC_42 lag, using decomposed data model and the ELU achieving 0.00620, 0.00487 and 3.01 minutes for the same metrics.展开更多
This paper is expected to make a brief review on the evolution and development of universities in United Kingdom from the‘Medieval Universities’taking Oxbridge as representatives to the‘New Universities’in twentie...This paper is expected to make a brief review on the evolution and development of universities in United Kingdom from the‘Medieval Universities’taking Oxbridge as representatives to the‘New Universities’in twentieth century,with entrepreneurial universities emerging in the twenty first century being included.The conclusion can be drawn from the brief review that when the“old”universities didn’t meet the social demand yet with the unshakable position,the newly learning institution comes into being in the history of HE in United Kingdom.Moreover,each category of universities possesses different characteristics and style.展开更多
Division of high resolution sequence stratigraphy units based on wavelet transform of logging data is found to be good at identifying subtle cycles of geological process in Kongnan area of Dagang Oilfield. The anal- y...Division of high resolution sequence stratigraphy units based on wavelet transform of logging data is found to be good at identifying subtle cycles of geological process in Kongnan area of Dagang Oilfield. The anal- ysis of multi-scales gyre of formation with 1-D continuous Dmey wavelet transform of log curve (GR) and I-D discrete Daubechies wavelet transform of log curve (Rt) all make the division of sequence interfaces more objec- tive and precise, which avoids the artificial influence with core analysis and the uncertainty with seismic data and core analysis.展开更多
The rapid growth of the Chinese economy has fueled the expansion of power grids.Power transformers are key equipment in power grid projects,and their price changes have a significant impact on cost control.However,the...The rapid growth of the Chinese economy has fueled the expansion of power grids.Power transformers are key equipment in power grid projects,and their price changes have a significant impact on cost control.However,the prices of power transformer materials manifest as nonsmooth and nonlinear sequences.Hence,estimating the acquisition costs of power grid projects is difficult,hindering the normal operation of power engineering construction.To more accurately predict the price of power transformer materials,this study proposes a method based on complementary ensemble empirical mode decomposition(CEEMD)and gated recurrent unit(GRU)network.First,the CEEMD decomposed the price series into multiple intrinsic mode functions(IMFs).Multiple IMFs were clustered to obtain several aggregated sequences based on the sample entropy of each IMF.Then,an empirical wavelet transform(EWT)was applied to the aggregation sequence with a large sample entropy,and the multiple subsequences obtained from the decomposition were predicted by the GRU model.The GRU model was used to directly predict the aggregation sequences with a small sample entropy.In this study,we used authentic historical pricing data for power transformer materials to validate the proposed approach.The empirical findings demonstrated the efficacy of our method across both datasets,with mean absolute percentage errors(MAPEs)of less than 1%and 3%.This approach holds a significant reference value for future research in the field of power transformer material price prediction.展开更多
Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user ...Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility.展开更多
Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties ...Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties in dealing with high dimensional time series target data, a threat assessment method based on self-attention mechanism and gated recurrent unit(SAGRU) is proposed. Firstly, a threat feature system including air combat situations and capability features is established. Moreover, a data augmentation process based on fractional Fourier transform(FRFT) is applied to extract more valuable information from time series situation features. Furthermore, aiming to capture key characteristics of battlefield evolution, a bidirectional GRU and SA mechanisms are designed for enhanced features.Subsequently, after the concatenation of the processed air combat situation and capability features, the target threat level will be predicted by fully connected neural layers and the softmax classifier. Finally, in order to validate this model, an air combat dataset generated by a combat simulation system is introduced for model training and testing. The comparison experiments show the proposed model has structural rationality and can perform threat assessment faster and more accurately than the other existing models based on deep learning.展开更多
文摘The lath-or plate-shaped bainitic ferrite of low and medium carbon alloy steels consists of packets of ferrite sublaths which are composed of many finer and regular ferrite blocks.They are uniform shear growth units of bainitic phase transformation.No carbide is precipitated from them.The bainitic O-carbides are precipitated from γ-α interface or carbon-rich austenite.The mode of arrangement of the units in ferrite sublath packet is in uni-or bi-di- rection.Single surface relief is produced by the accumulation of uniform shear strains with all the ferrite units arranged unidirectionally in a sublath packet,while tent-shaped surface relief is formed by the integration of the uniform shear strains of two groups with ferrite units piling up in two directions and growing face to face;whereas if they grow back to back,the integra- tion will be responsible for invert-tent-shaped surface relief.The interface trace between two groups of ferrite units in a sublath packet is shown as“midrib”.
文摘A new lattice hierarchy related to Ragnisco-Tu equation is proposed and its gauge equivalence to Ragnisco-Tu equation is proven. As an application of gauge transformation, we construct Darboux transformation (DT) of this new equation through DT of Ragnisco-Tu equation. An explicit exact solution is presented as an example.
文摘This study discusses the basic guarantee of the Charter of the United Nations to realize the right to development from the angle of Transforming Our World: the 2030 Agenda for Sustainable Development. The concepts regarding the people as the focal point, the dignity, the worth of the human being, as well as larger aspects of freedom, and other basic concepts within the Charter of the United Nations, guide the right direction of action for the realization of the right to development. The purpose and principles of the United Nations establishment in the Charter constitute the basic legal protection of the right to development. Values of peace, international dialogue, and international cooperation show the right path to the realization of the right to development.
基金This research was funded by National Natural Science Foundation of China under Grant No.61806171Sichuan University of Science&Engineering Talent Project under Grant No.2021RC15+2 种基金Open Fund Project of Key Laboratory for Non-Destructive Testing and Engineering Computer of Sichuan Province Universities on Bridge Inspection and Engineering under Grant No.2022QYJ06Sichuan University of Science&Engineering Graduate Student Innovation Fund under Grant No.Y2023115The Scientific Research and Innovation Team Program of Sichuan University of Science and Technology under Grant No.SUSE652A006.
文摘While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)model.At the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial features.The fusion of features from both granularities serves as the ultimate multidimensional representation of malicious traffic.Our approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut categories.The experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic.
基金supported by the National Natural Science Foundation of China(61403350)。
文摘Deep learning based recommendation methods, such as the recurrent neural network based recommendation method(RNNRec) and the gated recurrent unit(GRU) based recommendation method(GRURec), are proposed to solve the problem of time heterogeneous feedback recommendation. These methods out-perform several state-of-the-art methods. However, in RNNRec and GRURec, action vectors and item vectors are shared among users. The different meanings of the same action for different users are not considered. Similarly, different user preference for the same item is also ignored. To address this problem, the models of RNNRec and GRURec are modified in this paper. In the proposed methods, action vectors and item vectors are transformed into the user space for each user firstly, and then the transformed vectors are fed into the original neural networks of RNNRec and GRURec. The transformed action vectors and item vectors represent the user specified meaning of actions and the preference for items, which makes the proposed method obtain more accurate recommendation results. The experimental results on two real-life datasets indicate that the proposed method outperforms RNNRec and GRURec as well as other state-of-the-art approaches in most cases.
文摘The development of accurate prediction models continues to be highly beneficial in myriad disciplines. Deep learning models have performed well in stock price prediction and give high accuracy. However, these models are largely affected by the vanishing gradient problem escalated by some activation functions. This study proposes the use of the Vanishing Gradient Resilient Optimized Gated Recurrent Unit (OGRU) model with a scaled mean Approximation Coefficient (AC) time lag which should counter slow convergence, vanishing gradient and large error metrics. This study employed the Rectified Linear Unit (ReLU), Hyperbolic Tangent (Tanh), Sigmoid and Exponential Linear Unit (ELU) activation functions. Real-life datasets including the daily Apple and 5-minute Netflix closing stock prices were used, and they were decomposed using the Stationary Wavelet Transform (SWT). The decomposed series formed a decomposed data model which was compared to an undecomposed data model with similar hyperparameters and different default lags. The Apple daily dataset performed well with a Default_1 lag, using an undecomposed data model and the ReLU, attaining 0.01312, 0.00854 and 3.67 minutes for RMSE, MAE and runtime. The Netflix data performed best with the MeanAC_42 lag, using decomposed data model and the ELU achieving 0.00620, 0.00487 and 3.01 minutes for the same metrics.
文摘This paper is expected to make a brief review on the evolution and development of universities in United Kingdom from the‘Medieval Universities’taking Oxbridge as representatives to the‘New Universities’in twentieth century,with entrepreneurial universities emerging in the twenty first century being included.The conclusion can be drawn from the brief review that when the“old”universities didn’t meet the social demand yet with the unshakable position,the newly learning institution comes into being in the history of HE in United Kingdom.Moreover,each category of universities possesses different characteristics and style.
文摘Division of high resolution sequence stratigraphy units based on wavelet transform of logging data is found to be good at identifying subtle cycles of geological process in Kongnan area of Dagang Oilfield. The anal- ysis of multi-scales gyre of formation with 1-D continuous Dmey wavelet transform of log curve (GR) and I-D discrete Daubechies wavelet transform of log curve (Rt) all make the division of sequence interfaces more objec- tive and precise, which avoids the artificial influence with core analysis and the uncertainty with seismic data and core analysis.
基金supported by China Southern Power Grid Science and Technology Innovation Research Project(000000KK52220052).
文摘The rapid growth of the Chinese economy has fueled the expansion of power grids.Power transformers are key equipment in power grid projects,and their price changes have a significant impact on cost control.However,the prices of power transformer materials manifest as nonsmooth and nonlinear sequences.Hence,estimating the acquisition costs of power grid projects is difficult,hindering the normal operation of power engineering construction.To more accurately predict the price of power transformer materials,this study proposes a method based on complementary ensemble empirical mode decomposition(CEEMD)and gated recurrent unit(GRU)network.First,the CEEMD decomposed the price series into multiple intrinsic mode functions(IMFs).Multiple IMFs were clustered to obtain several aggregated sequences based on the sample entropy of each IMF.Then,an empirical wavelet transform(EWT)was applied to the aggregation sequence with a large sample entropy,and the multiple subsequences obtained from the decomposition were predicted by the GRU model.The GRU model was used to directly predict the aggregation sequences with a small sample entropy.In this study,we used authentic historical pricing data for power transformer materials to validate the proposed approach.The empirical findings demonstrated the efficacy of our method across both datasets,with mean absolute percentage errors(MAPEs)of less than 1%and 3%.This approach holds a significant reference value for future research in the field of power transformer material price prediction.
基金funded by The National Natural Science Foundation of China under Grant(No.62273108,62306081)The Youth Project of Guangdong Artificial Intelligence and Digital Economy Laboratory(Guangzhou)(PZL2022KF0006)+3 种基金The National Key Research and Development Program of China(2022YFB3604502)Special Fund Project of GuangzhouScience and Technology Innovation Development(202201011307)Guangdong Province Industrial Internet Identity Analysis and Construction Guidance Fund Secondary Node Project(1746312)Special Projects in Key Fields of General Colleges and Universities in Guangdong Province(2021ZDZX1016).
文摘Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility.
基金supported by the National Natural Science Foundation of China (6202201562088101)+1 种基金Shanghai Municipal Science and Technology Major Project (2021SHZDZX0100)Shanghai Municip al Commission of Science and Technology Project (19511132101)。
文摘Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties in dealing with high dimensional time series target data, a threat assessment method based on self-attention mechanism and gated recurrent unit(SAGRU) is proposed. Firstly, a threat feature system including air combat situations and capability features is established. Moreover, a data augmentation process based on fractional Fourier transform(FRFT) is applied to extract more valuable information from time series situation features. Furthermore, aiming to capture key characteristics of battlefield evolution, a bidirectional GRU and SA mechanisms are designed for enhanced features.Subsequently, after the concatenation of the processed air combat situation and capability features, the target threat level will be predicted by fully connected neural layers and the softmax classifier. Finally, in order to validate this model, an air combat dataset generated by a combat simulation system is introduced for model training and testing. The comparison experiments show the proposed model has structural rationality and can perform threat assessment faster and more accurately than the other existing models based on deep learning.