Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra...Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy.展开更多
BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombo...BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombosis is a serious complication that can lead to morbidity and mortality in this patient population.Several risk factors have been identified for the development of PICC-related thrombosis,including cancer type,stage,comorbidities,and catheter characteristics.Understanding these risk factors and developing a predictive model can help healthcare providers identify high-risk patients and implement preventive measures to reduce the incidence of thrombosis.AIM To analyze the influencing factors of PICC-related thrombosis in hospitalized patients with liver cancer,construct a predictive model,and validate it.METHODS Clinical data of hospitalized patients with liver cancer admitted from January 2020 to December 2023 were collected.Thirty-five cases of PICC-related thrombosis in hospitalized patients with liver cancer were collected,and 220 patients who underwent PICC placement during the same period but did not develop PICC-related thrombosis were randomly selected as controls.A total of 255 samples were collected and used as the training set,and 77 cases were collected as the validation set in a 7:3 ratio.General patient information,case data,catheterization data,coagulation indicators,and Autar Thrombosis Risk Assessment Scale scores were analyzed.Univariate and multivariate unconditional logistic regression analyses were performed on relevant factors,and the value of combined indicators in predicting PICC-related thrombosis in hospitalized patients with liver cancer was evaluated using receiver operating characteristic(ROC)curve analysis.RESULTS Univariate analysis showed statistically significant differences(P<0.05)in age,sex,Karnofsky performance status score(KPS),bedridden time,activities of daily living impairment,parenteral nutrition,catheter duration,distant metastasis,and bone marrow suppression between the thrombosis group and the non-thrombosis group.Other aspects had no statistically significant differences(P>0.05).Multivariate regression analysis showed that age≥60 years,KPS score≤50 points,parenteral nutrition,stage III to IV,distant metastasis,bone marrow suppression,and activities of daily living impairment were independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer(P<0.05).Catheter duration of 1-6 months and catheter duration>6 months were protective factors for PICC-related thrombosis(P<0.05).The predictive model for PICC-related thrombosis was obtained as follows:P predictive probability=[exp(Logit P)]/[1+exp(Logit P)],where Logit P=age×1.907+KPS score×2.045+parenteral nutrition×9.467+catheter duration×0.506+tumor-node-metastasis(TNM)staging×2.844+distant metastasis×2.065+bone marrow suppression×2.082+activities of daily living impairment×13.926.ROC curve analysis showed an area under the curve(AUC)of 0.827(95%CI:0.724-0.929,P<0.001),with a corresponding optimal cut-off value of 0.612,sensitivity of 0.755,and specificity of 0.857.Calibration curve analysis showed good consistency between the predicted occurrence of PICC-related thrombosis and actual occurrence(P>0.05).ROC analysis showed AUCs of 0.888 and 0.729 for the training and validation sets,respectively.CONCLUSION Age,KPS score,parenteral nutrition,TNM staging,distant metastasis,bone marrow suppression,and activities of daily living impairment are independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer,while catheter duration is a protective factor for the disease.The predictive model has an AUC of 0.827,indicating high predictive accuracy and clinical value.展开更多
P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)...P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)andπ^(0)P_(c)(4312)since they can exchange an almost on-shell∑_(c)^(+).In this scenario,the parity of P_(c)(4457)will be positive,which is different from the candidate of the bound state of D*∑_(c).The main decay channel of P_(c)(4457)in this model is Pc(4312)π.We propose three processes∧_(b)^(0)→J/ψKapπ^(-),∧_(b)^(0)→J/ψK-pπ^(0),and∧_(b)^(0)→J/ψpπ^(-)π^(+)k^(-)to verify Pc(4457)→Pc(4312)π.展开更多
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u...In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.展开更多
This study describes an automatic berthing system with mooring lines. It is designed to be berthed by using mooring device on the upper deck of a ship. It is to berth once maintaining parallel with the quay by control...This study describes an automatic berthing system with mooring lines. It is designed to be berthed by using mooring device on the upper deck of a ship. It is to berth once maintaining parallel with the quay by controlling both forward and aft breast lines. Berthing method is used through length adjustment of mooring lines connected between ship and quay by controlling the angular velocity and the torque of hydraulic motor in mooring device. The study is conducted under three changing conditions of draft, such as even-keel, rise of the gravity center and trim to stern. Variables affecting berthing stability are determined based on the control performance of each condition. Bond graphs method is used to model the system. Controller is designed as PID control method of reference-model algorithm. The control program is composed of synchronous control system based on the equations derived with the numerical analysis. The tank test is conducted to verify the usefulness of the control program.展开更多
At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model ...At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.展开更多
Cold is an abiotic stress that can greatly affect the growth and survival of plants.Here,we reported that an AP2/ERF family gene,BplERF1,isolated from Betula platyphylla played a contributing role in cold stress toler...Cold is an abiotic stress that can greatly affect the growth and survival of plants.Here,we reported that an AP2/ERF family gene,BplERF1,isolated from Betula platyphylla played a contributing role in cold stress tolerance.Overexpression of BplERF1 in B.platyphylla transgenic lines enhanced cold stress tolerance by increasing the scavenging capability and reducing H_(2)O_(2) and malondialdehyde(MDA)content in transgenic plants.Construction of BplERF-mediated multilayered hierarchical gene regulatory network(ML-hGRN),using Top-down GGM algorithm and the transcriptomic data of BplERF1 overexpression lines,led to the identification of five candidate target genes of BplERF1 which include MPK20,ERF9,WRKY53,WRKY70,and GIA1.All of them were then verified to be the true target genes of BplERF1 by chromatin-immunoprecipitation PCR(ChIP-PCR)assay.Our results indicate that BplERF1 is a positive regulator of cold tolerance and is capable of exerting regulation on the expression of cold signaling and regulatory genes,causing mitigation of reactive oxygen species.展开更多
NICFED expert system-a rule-based"non-invasive cardiac function evaluationand cardiac diseases diagnosing expert system"-is discussed in this paper.The sys-tem can be regarded as an interpretation expert sys...NICFED expert system-a rule-based"non-invasive cardiac function evaluationand cardiac diseases diagnosing expert system"-is discussed in this paper.The sys-tem can be regarded as an interpretation expert system and as a diagnostic expertsystem.When it is applied to evaluate cardiac function,it can explain more than onehundred parameters detected by"MCA-Ⅲ cardiac function device of multi-domainand multidemension".With these parameters the cardiac function in time domain,fre-展开更多
Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the informatio...Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the information of the entire credential to the verifier, resulting in unnecessary overexposure of personal information. From the perspective of user privacy, this paper proposed a verifiable credential scheme with selective disclosure based on BLS (Bohen- Lynn-Shacham) aggregate signature. Instead of signing the credentials, we sign the claims in the credentials. When the user needs to present the credential to verifier, the user can select a part of but not all claims to be presented. To reduce the number of signatures of claims after selective disclosure, BLS aggregate signature is achieved to aggregate signatures of claims into one signature. In addition, our scheme also supports the aggregation of credentials from different users. As a result, verifier only needs to verify one signature in the credential to achieve the purpose of batch verification of credentials. We analyze the security of our aggregate signature scheme, which can effectively resist aggregate signature forgery attack and credential theft attack. The simulation results show that our selective disclosure scheme based on BLS aggregate signature is acceptable in terms of verification efficiency, and can reduce the storage cost and communication overhead. As a result, our scheme is suitable for blockchain, which is strict on bandwidth and storage overhead.展开更多
Based on theory of electron beam optics,the beam optical calculations for animmersion lens and a unipotential lens have been performed.The computational results showthat the beam optical calculations are consistent to...Based on theory of electron beam optics,the beam optical calculations for animmersion lens and a unipotential lens have been performed.The computational results showthat the beam optical calculations are consistent to the ray tracing and that the beam emittanceis conserved,even if the third order aberrations exist.展开更多
A method of EXAFS analysis to determine phase content and local structure surrounding same type atoms in different phase of a mixed phases system is proposed.A general expression of c(k)function for a two phases syste...A method of EXAFS analysis to determine phase content and local structure surrounding same type atoms in different phase of a mixed phases system is proposed.A general expression of c(k)function for a two phases system is presented.To verify the method,the EXAFS of some specimens were measured and analyzed.The results agreed well with expected ones.展开更多
Systematics of energy spectra and B(E2)with substantial improvements in the N_(π)N_(v) scheme are presented.The correlation of energy spectra over an extended region is pointed out and a simple explanation is given.A...Systematics of energy spectra and B(E2)with substantial improvements in the N_(π)N_(v) scheme are presented.The correlation of energy spectra over an extended region is pointed out and a simple explanation is given.A method for verifying the simple B(E2)systematics is also suggested.展开更多
To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) ...To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) has been built, which aims to give double verification effect of design scheme and physical device. The platform consists of eMEGAsim digital simulator, signal power amplifiers and digital-analog interface equipments. With this platform, the multiple protection device of ring structure grid can be accessed to form a close-loop test system. Since eMEGAsim model-simulated faults and actual protection device actions are on real time, the tripping settings of each device as well as their coordinate performance between multiple devices can be verified in this close-loop test.展开更多
Because of the fractional order derivatives, the identification of the fractional order system(FOS) is more complex than that of an integral order system(IOS). In order to avoid high time consumption in the system...Because of the fractional order derivatives, the identification of the fractional order system(FOS) is more complex than that of an integral order system(IOS). In order to avoid high time consumption in the system identification, the leastsquares method is used to find other parameters by fixing the fractional derivative order. Hereafter, the optimal parameters of a system will be found by varying the derivative order in an interval. In addition, the operational matrix of the fractional order integration combined with the multi-resolution nature of a wavelet is used to accelerate the FOS identification, which is achieved by discarding wavelet coefficients of high-frequency components of input and output signals. In the end, the identifications of some known fractional order systems and an elastic torsion system are used to verify the proposed method.展开更多
Introduction The 1991 International Conference on Power System Tech-nology was held on September 13-17 in Beijing. About 200 technicalpapers were presented in 36 sessions in the conference and bunchedinto the conferen...Introduction The 1991 International Conference on Power System Tech-nology was held on September 13-17 in Beijing. About 200 technicalpapers were presented in 36 sessions in the conference and bunchedinto the conference publication. The paper covered wide variety ofmodern power system techniques and categorised into the followingmajor subjects:展开更多
An advanced Gauss pseudospectral method(AGPM) was proposed to estimate the parameters of the continuous-time(CT)Hammerstein model.The nonlinear part of the Hammerstein system is approximated with pseudospectral approx...An advanced Gauss pseudospectral method(AGPM) was proposed to estimate the parameters of the continuous-time(CT)Hammerstein model.The nonlinear part of the Hammerstein system is approximated with pseudospectral approximation method.The linear part was written as a controllable canonical form to circumvent the high order time-derivative of the input and output(I/O) signals,which could multiply the measurement noise in the identification procession.Furthermore,an output error minimization was constructed for the CT Hammerstein model identification,which was then transcribed into a nonlinear programming(NLP) problem by AGPM.AGPM could converge to the true values of the CT Hammerstein model with few interpolated Legendre-Gauss(LG) nodes.Lastly,two illustrative examples were proposed to verify the accuracy and efficiency of the method.展开更多
To achieve wide-range, high-integration, and real-time performance on the neutron flux measurement on the HL-2A tokamak, a digital neutron flux measuring(DNFM) system based on the peripheral component interconnectio...To achieve wide-range, high-integration, and real-time performance on the neutron flux measurement on the HL-2A tokamak, a digital neutron flux measuring(DNFM) system based on the peripheral component interconnection(PCI) e Xtension for Instrumentation express(PXIe) bus was designed.This system comprises a charge-sensitive preamplifier and a field programmable gate array(FPGA)-based main electronics plug-in. The DNFM totally covers source-range and intermediate-range neutron flux measurements, and increases system integration by a large margin through joining the pulse-counting mode and Campbell mode. Meanwhile, the neutron flux estimation method based on pulse piling proportions is able to choose and switch measuring modes in accordance with current flux, and this ensures the accuracy of measurements when the neutron flux changes suddenly. It has been demonstrated by simulated signals that the DNFM enhances the full-scale measuring range up to 1.9×10^8cm^-2s^-1, with relative error below 6.1%. The DNFM has been verified to provide a high temporal sensitivity at 10 ms time intervals on a single fission chamber on HL-2A.展开更多
A passive optical network(PON) monitoring system combined light pulse and frequency sweep techniques is proposed and verified in a field test. The light pulse surveys over the all whole network and the frequency swe...A passive optical network(PON) monitoring system combined light pulse and frequency sweep techniques is proposed and verified in a field test. The light pulse surveys over the all whole network and the frequency sweep are used to investigate any fault in the link. The field test is performed with 4 PONs. Each PON is monitored at 4 ports, one is the splitter port and the other three are arbitrary chosen multiple optical units(ONUs). All the tested PONs are monitored in turns once per hour. Faults at the feeder and branch fiber have been observed in this field test and have been analyzed with the monitoring system.展开更多
Although the Cramer-Rao Bound(CRB) can be used as the benchmark of estimation algorithm performance,it's too complicated for joint training sequence(TS) design for multiple input multiple output(MIMO) orthogonal f...Although the Cramer-Rao Bound(CRB) can be used as the benchmark of estimation algorithm performance,it's too complicated for joint training sequence(TS) design for multiple input multiple output(MIMO) orthogonal frequency division multiplexing(OFDM) coordination on multiple point(CoMP) systems.So a minimum mean square error(MSE) based sub-optimal sequence design criterion was proposed,including ideal sequence correlation property and sequence length constraint.The simulation results verify the theory analysis.展开更多
Began from early 1992, Chongqing Power Supply Bureau had spent 3 and half years to build up a power load management system consisting of I master station, 6 relay stations, 1280 terminals and the distributed monitorin...Began from early 1992, Chongqing Power Supply Bureau had spent 3 and half years to build up a power load management system consisting of I master station, 6 relay stations, 1280 terminals and the distributed monitoring device. This system distributes in the hilly and mountainous areas where geographically complicated and the load widely scatters, it can supervise about 72% load and curtail more than 15% load展开更多
基金supported by the National Natural Science Foundation of China(No.62206238)the Natural Science Foundation of Jiangsu Province(Grant No.BK20220562)the Natural Science Research Project of Universities in Jiangsu Province(No.22KJB520010).
文摘Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy.
文摘BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombosis is a serious complication that can lead to morbidity and mortality in this patient population.Several risk factors have been identified for the development of PICC-related thrombosis,including cancer type,stage,comorbidities,and catheter characteristics.Understanding these risk factors and developing a predictive model can help healthcare providers identify high-risk patients and implement preventive measures to reduce the incidence of thrombosis.AIM To analyze the influencing factors of PICC-related thrombosis in hospitalized patients with liver cancer,construct a predictive model,and validate it.METHODS Clinical data of hospitalized patients with liver cancer admitted from January 2020 to December 2023 were collected.Thirty-five cases of PICC-related thrombosis in hospitalized patients with liver cancer were collected,and 220 patients who underwent PICC placement during the same period but did not develop PICC-related thrombosis were randomly selected as controls.A total of 255 samples were collected and used as the training set,and 77 cases were collected as the validation set in a 7:3 ratio.General patient information,case data,catheterization data,coagulation indicators,and Autar Thrombosis Risk Assessment Scale scores were analyzed.Univariate and multivariate unconditional logistic regression analyses were performed on relevant factors,and the value of combined indicators in predicting PICC-related thrombosis in hospitalized patients with liver cancer was evaluated using receiver operating characteristic(ROC)curve analysis.RESULTS Univariate analysis showed statistically significant differences(P<0.05)in age,sex,Karnofsky performance status score(KPS),bedridden time,activities of daily living impairment,parenteral nutrition,catheter duration,distant metastasis,and bone marrow suppression between the thrombosis group and the non-thrombosis group.Other aspects had no statistically significant differences(P>0.05).Multivariate regression analysis showed that age≥60 years,KPS score≤50 points,parenteral nutrition,stage III to IV,distant metastasis,bone marrow suppression,and activities of daily living impairment were independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer(P<0.05).Catheter duration of 1-6 months and catheter duration>6 months were protective factors for PICC-related thrombosis(P<0.05).The predictive model for PICC-related thrombosis was obtained as follows:P predictive probability=[exp(Logit P)]/[1+exp(Logit P)],where Logit P=age×1.907+KPS score×2.045+parenteral nutrition×9.467+catheter duration×0.506+tumor-node-metastasis(TNM)staging×2.844+distant metastasis×2.065+bone marrow suppression×2.082+activities of daily living impairment×13.926.ROC curve analysis showed an area under the curve(AUC)of 0.827(95%CI:0.724-0.929,P<0.001),with a corresponding optimal cut-off value of 0.612,sensitivity of 0.755,and specificity of 0.857.Calibration curve analysis showed good consistency between the predicted occurrence of PICC-related thrombosis and actual occurrence(P>0.05).ROC analysis showed AUCs of 0.888 and 0.729 for the training and validation sets,respectively.CONCLUSION Age,KPS score,parenteral nutrition,TNM staging,distant metastasis,bone marrow suppression,and activities of daily living impairment are independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer,while catheter duration is a protective factor for the disease.The predictive model has an AUC of 0.827,indicating high predictive accuracy and clinical value.
基金supported by the National Natural Science Foundation of China(Grant Nos.12175239,12135011,and 12221005)the National Key Research and Development Program of China(Grant No.2020YFA0406400)+1 种基金the Chinese Academy of Sciences(Grant No.YSBR-101)the Xiaomi Foundation/Xiaomi Young Talents Program。
文摘P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)andπ^(0)P_(c)(4312)since they can exchange an almost on-shell∑_(c)^(+).In this scenario,the parity of P_(c)(4457)will be positive,which is different from the candidate of the bound state of D*∑_(c).The main decay channel of P_(c)(4457)in this model is Pc(4312)π.We propose three processes∧_(b)^(0)→J/ψKapπ^(-),∧_(b)^(0)→J/ψK-pπ^(0),and∧_(b)^(0)→J/ψpπ^(-)π^(+)k^(-)to verify Pc(4457)→Pc(4312)π.
文摘In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.
基金financially supported by the Post Innovation Program of the Fisheries Science Institute of Chonnam National University
文摘This study describes an automatic berthing system with mooring lines. It is designed to be berthed by using mooring device on the upper deck of a ship. It is to berth once maintaining parallel with the quay by controlling both forward and aft breast lines. Berthing method is used through length adjustment of mooring lines connected between ship and quay by controlling the angular velocity and the torque of hydraulic motor in mooring device. The study is conducted under three changing conditions of draft, such as even-keel, rise of the gravity center and trim to stern. Variables affecting berthing stability are determined based on the control performance of each condition. Bond graphs method is used to model the system. Controller is designed as PID control method of reference-model algorithm. The control program is composed of synchronous control system based on the equations derived with the numerical analysis. The tank test is conducted to verify the usefulness of the control program.
基金National Natural Science Foundation of China(No.61462070)the"ChunHui Plan"Project of Educational Department,China(No.Z2009-1-01062)the Research of Evaluation Technology of Security and Reliability of Cloud Computing and the Built of Testing Platform That is a Technology Plan Project of Inner Mongolia,China
文摘At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.
基金supported by the Applied Technology Research and Development Planning Program of Heilongjiang Province(GA19B201).
文摘Cold is an abiotic stress that can greatly affect the growth and survival of plants.Here,we reported that an AP2/ERF family gene,BplERF1,isolated from Betula platyphylla played a contributing role in cold stress tolerance.Overexpression of BplERF1 in B.platyphylla transgenic lines enhanced cold stress tolerance by increasing the scavenging capability and reducing H_(2)O_(2) and malondialdehyde(MDA)content in transgenic plants.Construction of BplERF-mediated multilayered hierarchical gene regulatory network(ML-hGRN),using Top-down GGM algorithm and the transcriptomic data of BplERF1 overexpression lines,led to the identification of five candidate target genes of BplERF1 which include MPK20,ERF9,WRKY53,WRKY70,and GIA1.All of them were then verified to be the true target genes of BplERF1 by chromatin-immunoprecipitation PCR(ChIP-PCR)assay.Our results indicate that BplERF1 is a positive regulator of cold tolerance and is capable of exerting regulation on the expression of cold signaling and regulatory genes,causing mitigation of reactive oxygen species.
文摘NICFED expert system-a rule-based"non-invasive cardiac function evaluationand cardiac diseases diagnosing expert system"-is discussed in this paper.The sys-tem can be regarded as an interpretation expert system and as a diagnostic expertsystem.When it is applied to evaluate cardiac function,it can explain more than onehundred parameters detected by"MCA-Ⅲ cardiac function device of multi-domainand multidemension".With these parameters the cardiac function in time domain,fre-
文摘Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the information of the entire credential to the verifier, resulting in unnecessary overexposure of personal information. From the perspective of user privacy, this paper proposed a verifiable credential scheme with selective disclosure based on BLS (Bohen- Lynn-Shacham) aggregate signature. Instead of signing the credentials, we sign the claims in the credentials. When the user needs to present the credential to verifier, the user can select a part of but not all claims to be presented. To reduce the number of signatures of claims after selective disclosure, BLS aggregate signature is achieved to aggregate signatures of claims into one signature. In addition, our scheme also supports the aggregation of credentials from different users. As a result, verifier only needs to verify one signature in the credential to achieve the purpose of batch verification of credentials. We analyze the security of our aggregate signature scheme, which can effectively resist aggregate signature forgery attack and credential theft attack. The simulation results show that our selective disclosure scheme based on BLS aggregate signature is acceptable in terms of verification efficiency, and can reduce the storage cost and communication overhead. As a result, our scheme is suitable for blockchain, which is strict on bandwidth and storage overhead.
文摘Based on theory of electron beam optics,the beam optical calculations for animmersion lens and a unipotential lens have been performed.The computational results showthat the beam optical calculations are consistent to the ray tracing and that the beam emittanceis conserved,even if the third order aberrations exist.
文摘A method of EXAFS analysis to determine phase content and local structure surrounding same type atoms in different phase of a mixed phases system is proposed.A general expression of c(k)function for a two phases system is presented.To verify the method,the EXAFS of some specimens were measured and analyzed.The results agreed well with expected ones.
基金Supported by the Development Project Foundation of Chinathe National Natural Science Foundation of China+1 种基金Doctoral Education Fund of National Education Committeesupported by the Special Fund of Academia Sinica under LetZ-1298.
文摘Systematics of energy spectra and B(E2)with substantial improvements in the N_(π)N_(v) scheme are presented.The correlation of energy spectra over an extended region is pointed out and a simple explanation is given.A method for verifying the simple B(E2)systematics is also suggested.
文摘To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) has been built, which aims to give double verification effect of design scheme and physical device. The platform consists of eMEGAsim digital simulator, signal power amplifiers and digital-analog interface equipments. With this platform, the multiple protection device of ring structure grid can be accessed to form a close-loop test system. Since eMEGAsim model-simulated faults and actual protection device actions are on real time, the tripping settings of each device as well as their coordinate performance between multiple devices can be verified in this close-loop test.
基金Project supported by the National Natural Science Foundation of China(Grant No.61271395)the Natural Science Foundation of Jiangsu Province,China(Grant No.BK20161513)
文摘Because of the fractional order derivatives, the identification of the fractional order system(FOS) is more complex than that of an integral order system(IOS). In order to avoid high time consumption in the system identification, the leastsquares method is used to find other parameters by fixing the fractional derivative order. Hereafter, the optimal parameters of a system will be found by varying the derivative order in an interval. In addition, the operational matrix of the fractional order integration combined with the multi-resolution nature of a wavelet is used to accelerate the FOS identification, which is achieved by discarding wavelet coefficients of high-frequency components of input and output signals. In the end, the identifications of some known fractional order systems and an elastic torsion system are used to verify the proposed method.
文摘Introduction The 1991 International Conference on Power System Tech-nology was held on September 13-17 in Beijing. About 200 technicalpapers were presented in 36 sessions in the conference and bunchedinto the conference publication. The paper covered wide variety ofmodern power system techniques and categorised into the followingmajor subjects:
文摘An advanced Gauss pseudospectral method(AGPM) was proposed to estimate the parameters of the continuous-time(CT)Hammerstein model.The nonlinear part of the Hammerstein system is approximated with pseudospectral approximation method.The linear part was written as a controllable canonical form to circumvent the high order time-derivative of the input and output(I/O) signals,which could multiply the measurement noise in the identification procession.Furthermore,an output error minimization was constructed for the CT Hammerstein model identification,which was then transcribed into a nonlinear programming(NLP) problem by AGPM.AGPM could converge to the true values of the CT Hammerstein model with few interpolated Legendre-Gauss(LG) nodes.Lastly,two illustrative examples were proposed to verify the accuracy and efficiency of the method.
基金support by the HL-2A experimental teamsupported by National Natural Science Foundation of China(Nos.11375195,11575184)National Magnetic Confinement Fusion Energy Development Research(No.2013GB104003)
文摘To achieve wide-range, high-integration, and real-time performance on the neutron flux measurement on the HL-2A tokamak, a digital neutron flux measuring(DNFM) system based on the peripheral component interconnection(PCI) e Xtension for Instrumentation express(PXIe) bus was designed.This system comprises a charge-sensitive preamplifier and a field programmable gate array(FPGA)-based main electronics plug-in. The DNFM totally covers source-range and intermediate-range neutron flux measurements, and increases system integration by a large margin through joining the pulse-counting mode and Campbell mode. Meanwhile, the neutron flux estimation method based on pulse piling proportions is able to choose and switch measuring modes in accordance with current flux, and this ensures the accuracy of measurements when the neutron flux changes suddenly. It has been demonstrated by simulated signals that the DNFM enhances the full-scale measuring range up to 1.9×10^8cm^-2s^-1, with relative error below 6.1%. The DNFM has been verified to provide a high temporal sensitivity at 10 ms time intervals on a single fission chamber on HL-2A.
文摘A passive optical network(PON) monitoring system combined light pulse and frequency sweep techniques is proposed and verified in a field test. The light pulse surveys over the all whole network and the frequency sweep are used to investigate any fault in the link. The field test is performed with 4 PONs. Each PON is monitored at 4 ports, one is the splitter port and the other three are arbitrary chosen multiple optical units(ONUs). All the tested PONs are monitored in turns once per hour. Faults at the feeder and branch fiber have been observed in this field test and have been analyzed with the monitoring system.
基金International Science&Technology Cooperation Projects of Qinghai,China(Nos.2013-H-811,2014-HZ-821)Chunhui Plan Projects,China(Nos.Z2014013,Z2014014)
文摘Although the Cramer-Rao Bound(CRB) can be used as the benchmark of estimation algorithm performance,it's too complicated for joint training sequence(TS) design for multiple input multiple output(MIMO) orthogonal frequency division multiplexing(OFDM) coordination on multiple point(CoMP) systems.So a minimum mean square error(MSE) based sub-optimal sequence design criterion was proposed,including ideal sequence correlation property and sequence length constraint.The simulation results verify the theory analysis.
文摘Began from early 1992, Chongqing Power Supply Bureau had spent 3 and half years to build up a power load management system consisting of I master station, 6 relay stations, 1280 terminals and the distributed monitoring device. This system distributes in the hilly and mountainous areas where geographically complicated and the load widely scatters, it can supervise about 72% load and curtail more than 15% load