In a recent case report in the World Journal of Clinical Cases,emphasized the crucial role of rapidly and accurately identifying pathogens to optimize patient treatment outcomes.Laboratory-on-a-chip(LOC)technology has...In a recent case report in the World Journal of Clinical Cases,emphasized the crucial role of rapidly and accurately identifying pathogens to optimize patient treatment outcomes.Laboratory-on-a-chip(LOC)technology has emerged as a transformative tool in health care,offering rapid,sensitive,and specific identification of microorganisms.This editorial provides a comprehensive overview of LOC technology,highlighting its principles,advantages,applications,challenges,and future directions.Success studies from the field have demonstrated the practical benefits of LOC devices in clinical diagnostics,epidemiology,and food safety.Comparative studies have underscored the superiority of LOC technology over traditional methods,showcasing improvements in speed,accuracy,and portability.The future integration of LOC with biosensors,artificial intelligence,and data analytics promises further innovation and expansion.This call to action emphasizes the importance of continued research,investment,and adoption to realize the full potential of LOC technology in improving healthcare outcomes worldwide.展开更多
Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will hel...Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will help policy regulators and enterprise managers to more accurately implement this development strategy.A lot of research has been carried out,but it is still a difficult problem that how to accommodate and adapt the complex carbon emission data computing models and factor libraries developed by different regions,different industries and different enterprises.Meanwhile,with the rapid development of the Industrial Internet,it has not only been used for the supply chain optimization and intelligent scheduling of the manufacturing industry,but also been used by more and more industries as an important way of digital transformation.Especially in China,the Industrial Internet identification and resolution system is becoming an important digital infrastructure to uniquely identify objects and share data.Hence,a compatible carbon efficiency information service framework based on the Industrial Internet Identification is proposed in this paper to address the problem of computing and querying multi-source heterogeneous carbon emission data.We have defined a multi cooperation carbon emission data interaction model consisting of three roles and three basic operations.Further,the implementation of the framework includes carbon emission data identification,modeling,calculation,query and sharing.The practice results show that its capability and effectiveness in improving the responsiveness,accuracy,and credibility of compatible carbon efficiency data query and sharing services.展开更多
This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event...This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation.展开更多
Identification of the ice channel is the basic technology for developing intelligent ships in ice-covered waters,which is important to ensure the safety and economy of navigation.In the Arctic,merchant ships with low ...Identification of the ice channel is the basic technology for developing intelligent ships in ice-covered waters,which is important to ensure the safety and economy of navigation.In the Arctic,merchant ships with low ice class often navigate in channels opened up by icebreakers.Navigation in the ice channel often depends on good maneuverability skills and abundant experience from the captain to a large extent.The ship may get stuck if steered into ice fields off the channel.Under this circumstance,it is very important to study how to identify the boundary lines of ice channels with a reliable method.In this paper,a two-staged ice channel identification method is developed based on image segmentation and corner point regression.The first stage employs the image segmentation method to extract channel regions.In the second stage,an intelligent corner regression network is proposed to extract the channel boundary lines from the channel region.A non-intelligent angle-based filtering and clustering method is proposed and compared with corner point regression network.The training and evaluation of the segmentation method and corner regression network are carried out on the synthetic and real ice channel dataset.The evaluation results show that the accuracy of the method using the corner point regression network in the second stage is achieved as high as 73.33%on the synthetic ice channel dataset and 70.66%on the real ice channel dataset,and the processing speed can reach up to 14.58frames per second.展开更多
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f...Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security.展开更多
Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexi...Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification.展开更多
Taking the Lower Permian Fengcheng Formation shale in Mahu Sag of Junggar Basin,NW China,as an example,core observation,test analysis,geological analysis and numerical simulation were applied to identify the shale oil...Taking the Lower Permian Fengcheng Formation shale in Mahu Sag of Junggar Basin,NW China,as an example,core observation,test analysis,geological analysis and numerical simulation were applied to identify the shale oil micro-migration phenomenon.The hydrocarbon micro-migration in shale oil was quantitatively evaluated and verified by a self-created hydrocarbon expulsion potential method,and the petroleum geological significance of shale oil micro-migration evaluation was determined.Results show that significant micro-migration can be recognized between the organic-rich lamina and organic-poor lamina.The organic-rich lamina has strong hydrocarbon generation ability.The heavy components of hydrocarbon preferentially retained by kerogen swelling or adsorption,while the light components of hydrocarbon were migrated and accumulated to the interbedded felsic or carbonate organic-poor laminae as free oil.About 69% of the Fengcheng Formation shale samples in Well MY1 exhibit hydrocarbon charging phenomenon,while 31% of those exhibit hydrocarbon expulsion phenomenon.The reliability of the micro-migration evaluation results was verified by combining the group components based on the geochromatography effect,two-dimension nuclear magnetic resonance analysis,and the geochemical behavior of inorganic manganese elements in the process of hydrocarbon migration.Micro-migration is a bridge connecting the hydrocarbon accumulation elements in shale formations,which reflects the whole process of shale oil generation,expulsion and accumulation,and controls the content and composition of shale oil.The identification and evaluation of shale oil micro-migration will provide new perspectives for dynamically differential enrichment mechanism of shale oil and establishing a“multi-peak model in oil generation”of shale.展开更多
Groundwater is an important source of drinking water.Groundwater pollution severely endangers drinking water safety and sustainable social development.In the case of groundwater pollution,the top priority is to identi...Groundwater is an important source of drinking water.Groundwater pollution severely endangers drinking water safety and sustainable social development.In the case of groundwater pollution,the top priority is to identify pollution sources,and accurate information on pollution sources is the premise of efficient remediation.Then,an appropriate pollution remediation scheme should be developed according to information on pollution sources,site conditions,and economic costs.The methods for identifying pollution sources mainly include geophysical exploration,geochemistry,isotopic tracing,and numerical modeling.Among these identification methods,only the numerical modeling can recognize various information on pollution sources,while other methods can only identify a certain aspect of pollution sources.The remediation technologies of groundwater can be divided into in-situ and ex-situ remediation technologies according to the remediation location.The in-situ remediation technologies enjoy low costs and a wide remediation range,but their remediation performance is prone to be affected by environmental conditions and cause secondary pollution.The ex-situ remediation technologies boast high remediation efficiency,high processing capacity,and high treatment concentration but suffer high costs.Different methods for pollution source identification and remediation technologies are applicable to different conditions.To achieve the expected identification and remediation results,it is feasible to combine several methods and technologies according to the actual hydrogeological conditions of contaminated sites and the nature of pollutants.Additionally,detailed knowledge about the hydrogeological conditions and stratigraphic structure of the contaminated site is the basis of all work regardless of the adopted identification methods or remediation technologies.展开更多
Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.Ho...Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification.展开更多
Bovine tuberculosis (bTB) is an endemic zoonosis significantly affects animal health in Burkina Faso. The primary causative agent is Mycobacterium tuberculosis (M. tuberculosis) complex, mainly M. bovis. Cattle are co...Bovine tuberculosis (bTB) is an endemic zoonosis significantly affects animal health in Burkina Faso. The primary causative agent is Mycobacterium tuberculosis (M. tuberculosis) complex, mainly M. bovis. Cattle are considered as natural reservoir of M. bovis. However, in Burkina Faso, the circulation of these strains remains poorly understood and documented. This study aimed to identify and characterize Mycobacterium strains from suspected carcasses during routine meat inspection at Bobo-Dioulasso refrigerated slaughterhouse. A prospective cross-sectional study was conducted from January 2021 to December 2022 on cases of seizures linked to suspected bovine tuberculosis. Microbiological and molecular analyzes were used for mycobacterial strain isolation and characterization. Out of 50 samples, 24% tested positive by microscopy and 12% by culture. Molecular analysis identified 6 strains of Mycobacteria, exclusively Mycobacterium bovis specifically the subspecies bovis (Mycobacterium bovis subsp bovis). In conclusion, M. bovis subsp bovis is the primary agent responsible for bovine tuberculosis in Bobo-Dioulasso. Continuous monitoring of mycobacterial strains is therefore necessary for the effective control of this pathology in the local cattle population.展开更多
This paper investigates the adaptive trajectory tracking control problem and the unknown parameter identification problem of a class of rotor-missiles with parametric system uncertainties.First,considering the uncerta...This paper investigates the adaptive trajectory tracking control problem and the unknown parameter identification problem of a class of rotor-missiles with parametric system uncertainties.First,considering the uncertainty of structural and aerodynamic parameters,the six-degree-of-freedom(6Do F) nonlinear equations describing the position and attitude dynamics of the rotor-missile are established,respectively,in the inertial and body-fixed reference frames.Next,a hierarchical adaptive trajectory tracking controller that can guarantee closed-loop stability is proposed according to the cascade characteristics of the 6Do F dynamics.Then,a memory-augmented update rule of unknown parameters is proposed by integrating all historical data of the regression matrix.As long as the finitely excited condition is satisfied,the precise identification of unknown parameters can be achieved.Finally,the validity of the proposed trajectory tracking controller and the parameter identification method is proved through Lyapunov stability theory and numerical simulations.展开更多
This paper presents the development of an artificial neural network (ANN) model based on the multi-layer perceptron (MLP) for analyzing internet traffic data over IP networks. We applied the ANN to analyze a time seri...This paper presents the development of an artificial neural network (ANN) model based on the multi-layer perceptron (MLP) for analyzing internet traffic data over IP networks. We applied the ANN to analyze a time series of measured data for network response evaluation. For this reason, we used the input and output data of an internet traffic over IP networks to identify the ANN model, and we studied the performance of some training algorithms used to estimate the weights of the neuron. The comparison between some training algorithms demonstrates the efficiency and the accu-racy of the Levenberg-Marquardt (LM) and the Resilient back propagation (Rp) algorithms in term of statistical crite-ria. Consequently, the obtained results show that the developed models, using the LM and the Rp algorithms, can successfully be used for analyzing internet traffic over IP networks, and can be applied as an excellent and fundamental tool for the management of the internet traffic at different times.展开更多
A dual-arm nursing robot can gently lift patients and transfer them between a bed and a wheelchair.With its lightweight design,high load-bearing capacity,and smooth surface,the coupled-drive joint is particularly well...A dual-arm nursing robot can gently lift patients and transfer them between a bed and a wheelchair.With its lightweight design,high load-bearing capacity,and smooth surface,the coupled-drive joint is particularly well suited for these robots.However,the coupled nature of the joint disrupts the direct linear relationship between the input and output torques,posing challenges for dynamic modeling and practical applications.This study investigated the transmission mechanism of this joint and employed the Lagrangian method to construct a dynamic model of its internal dynamics.Building on this foundation,the Newton-Euler method was used to develop a dynamic model for the entire robotic arm.A continuously differentiable friction model was incorporated to reduce the vibrations caused by speed transitions to zero.An experimental method was designed to compensate for gravity,inertia,and modeling errors to identify the parameters of the friction model.This method establishes a mapping relationship between the friction force and motor current.In addition,a Fourier series-based excitation trajectory was developed to facilitate the identification of the dynamic model parameters of the robotic arm.Trajectory tracking experiments were conducted during the experimental validation phase,demonstrating the high accuracy of the dynamic model and the parameter identification method for the robotic arm.This study presents a dynamic modeling and parameter identification method for coupled-drive joint robotic arms,thereby establishing a foundation for motion control in humanoid nursing robots.展开更多
The intricate distribution of oil and water in tight rocks makes pinpointing oil layers challenging.While conventional identification methods offer potential solutions,their limited accuracy precludes them from being ...The intricate distribution of oil and water in tight rocks makes pinpointing oil layers challenging.While conventional identification methods offer potential solutions,their limited accuracy precludes them from being effective in their applications to unconventional reservoirs.This study employed nuclear magnetic resonance(NMR)spectrum decomposition to dissect the NMR T_(2)spectrum into multiple subspectra.Furthermore,it employed laboratory NMR experiments to ascertain the fluid properties of these sub-spectra,aiming to enhance identification accuracy.The findings indicate that fluids of distinct properties overlap in the T_(2)spectra,with bound water,movable water,bound oil,and movable oil appearing sequentially from the low-value zone to the high-value zone.Consequently,an oil layer classification scheme was proposed,which considers the physical properties of reservoirs,oil-bearing capacity,and the characteristics of both mobility and the oil-water two-phase flow.When applied to tight oil layer identification,the scheme's outcomes align closely with actual test results.A horizontal well,deployed based on these findings,has produced high-yield industrial oil flow,underscoring the precision and dependability of this new approach.展开更多
Internet traffic classification plays an important role in network management, and many approaches have been proposed to classify different kinds of internet traffics. A novel approach was proposed to classify network...Internet traffic classification plays an important role in network management, and many approaches have been proposed to classify different kinds of internet traffics. A novel approach was proposed to classify network applications by optimized back-propagation (BP) neural network. Particle swarm optimization (PSO) algorithm was used to optimize the BP neural network. And in order to increase the identification performance, wavelet packet decomposition (WPD) was used to extract several hidden features from the time-frequency information of network traffic. The experimental results show that the average classification accuracy of various network applications can reach 97%. Moreover, this approach optimized by BP neural network takes 50% of the training time compared with the traditional neural network.展开更多
The social transformation brought aboutby digital technology is deeply impacting various industries.Digital education products, with core technologiessuch as 5G, AI, IoT (Internet of Things),etc., are continuously pen...The social transformation brought aboutby digital technology is deeply impacting various industries.Digital education products, with core technologiessuch as 5G, AI, IoT (Internet of Things),etc., are continuously penetrating areas such as teaching,management, and evaluation. Apps, miniprograms,and emerging large-scale models are providingexcellent knowledge performance and flexiblecross-media output. However, they also exposerisks such as content discrimination and algorithmcommercialization. This paper conducts anevidence-based analysis of digital education productrisks from four dimensions: “digital resourcesinformationdissemination-algorithm design-cognitiveassessment”. It breaks through corresponding identificationtechnologies and, relying on the diverse characteristicsof governance systems, explores governancestrategies for digital education products from the threedomains of “regulators-developers-users”.展开更多
A hybrid identification model based on multilayer artificial neural networks(ANNs) and particle swarm optimization(PSO) algorithm is developed to improve the simultaneous identification efficiency of thermal conductiv...A hybrid identification model based on multilayer artificial neural networks(ANNs) and particle swarm optimization(PSO) algorithm is developed to improve the simultaneous identification efficiency of thermal conductivity and effective absorption coefficient of semitransparent materials.For the direct model,the spherical harmonic method and the finite volume method are used to solve the coupled conduction-radiation heat transfer problem in an absorbing,emitting,and non-scattering 2D axisymmetric gray medium in the background of laser flash method.For the identification part,firstly,the temperature field and the incident radiation field in different positions are chosen as observables.Then,a traditional identification model based on PSO algorithm is established.Finally,multilayer ANNs are built to fit and replace the direct model in the traditional identification model to speed up the identification process.The results show that compared with the traditional identification model,the time cost of the hybrid identification model is reduced by about 1 000 times.Besides,the hybrid identification model remains a high level of accuracy even with measurement errors.展开更多
Identification of stratigraphic interfaces and lithology is a key aspect in geological and geotechnical investigations.In this study,a monitoring while-drilling system was developed,along with a corresponding data pre...Identification of stratigraphic interfaces and lithology is a key aspect in geological and geotechnical investigations.In this study,a monitoring while-drilling system was developed,along with a corresponding data pre-processing method.The method can handle invalid drilling data generated during manual operations.The correlation between various drilling parameters was analyzed,and a database of stratigraphic interfaces and key lithology identification based on the monitoring parameters was established.The average drilling speed was found to be the most suitable parameter for stratigraphic and lithology identification,and when the average drilling speed varied over a wide range,it corresponded to a stratigraphic interface.The average drilling speeds in sandy mudstone and sandstone strata were in the ranges of 0.1e0.2 m/min and 0.2e0.29 m/min,respectively.The results obtained using the present method were consistent with geotechnical survey results.The proposed method can be used for realtime lithology identification and represents a novel approach for intelligent geotechnical surveying.展开更多
Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age c...Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion.展开更多
With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process proble...With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process problem in e-commerce,focusing on the specific application of Internet of Things technology in e-commerce.Warehousing logistics is an important link in today’s e-commerce transactions.This article proposes a distributed analysis method for RFID-based e-commerce warehousing process optimization and an e-commerce supply chain management process based on Internet of Things technology.This article first introduces the advantages and disadvantages of shared IoT identification technology and the IoT resource sharing platform based on the three-layer abstract data model and representational state transfer(REST)style.Combining actual IoT applications and the characteristics of an existing platform,a REST-based IoT resource sharing platform is proposed.Combined with actual projects,a REST-based IoT resource sharing platform was built,and key technology experiments were conducted for verification.Finally,optimizing the e-commerce supply chain management process under Internet of Things technology and explaining the advantages of optimized e-commerce supply chain management are discussed.Research on this subject provides a theoretical basis for the application of the Internet of Things in e-commerce and has practical significance and practical value for managing service capabilities and service levels in e-commerce.展开更多
文摘In a recent case report in the World Journal of Clinical Cases,emphasized the crucial role of rapidly and accurately identifying pathogens to optimize patient treatment outcomes.Laboratory-on-a-chip(LOC)technology has emerged as a transformative tool in health care,offering rapid,sensitive,and specific identification of microorganisms.This editorial provides a comprehensive overview of LOC technology,highlighting its principles,advantages,applications,challenges,and future directions.Success studies from the field have demonstrated the practical benefits of LOC devices in clinical diagnostics,epidemiology,and food safety.Comparative studies have underscored the superiority of LOC technology over traditional methods,showcasing improvements in speed,accuracy,and portability.The future integration of LOC with biosensors,artificial intelligence,and data analytics promises further innovation and expansion.This call to action emphasizes the importance of continued research,investment,and adoption to realize the full potential of LOC technology in improving healthcare outcomes worldwide.
基金supported by the 2018 Industrial Internet Innovation and Development Project——Industrial Internet Identification Resolution Sys⁃tem:National Top-Level Node Construction Project(Phase I).
文摘Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will help policy regulators and enterprise managers to more accurately implement this development strategy.A lot of research has been carried out,but it is still a difficult problem that how to accommodate and adapt the complex carbon emission data computing models and factor libraries developed by different regions,different industries and different enterprises.Meanwhile,with the rapid development of the Industrial Internet,it has not only been used for the supply chain optimization and intelligent scheduling of the manufacturing industry,but also been used by more and more industries as an important way of digital transformation.Especially in China,the Industrial Internet identification and resolution system is becoming an important digital infrastructure to uniquely identify objects and share data.Hence,a compatible carbon efficiency information service framework based on the Industrial Internet Identification is proposed in this paper to address the problem of computing and querying multi-source heterogeneous carbon emission data.We have defined a multi cooperation carbon emission data interaction model consisting of three roles and three basic operations.Further,the implementation of the framework includes carbon emission data identification,modeling,calculation,query and sharing.The practice results show that its capability and effectiveness in improving the responsiveness,accuracy,and credibility of compatible carbon efficiency data query and sharing services.
文摘This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation.
基金financially supported by the National Key Research and Development Program(Grant No.2022YFE0107000)the General Projects of the National Natural Science Foundation of China(Grant No.52171259)the High-Tech Ship Research Project of the Ministry of Industry and Information Technology(Grant No.[2021]342)。
文摘Identification of the ice channel is the basic technology for developing intelligent ships in ice-covered waters,which is important to ensure the safety and economy of navigation.In the Arctic,merchant ships with low ice class often navigate in channels opened up by icebreakers.Navigation in the ice channel often depends on good maneuverability skills and abundant experience from the captain to a large extent.The ship may get stuck if steered into ice fields off the channel.Under this circumstance,it is very important to study how to identify the boundary lines of ice channels with a reliable method.In this paper,a two-staged ice channel identification method is developed based on image segmentation and corner point regression.The first stage employs the image segmentation method to extract channel regions.In the second stage,an intelligent corner regression network is proposed to extract the channel boundary lines from the channel region.A non-intelligent angle-based filtering and clustering method is proposed and compared with corner point regression network.The training and evaluation of the segmentation method and corner regression network are carried out on the synthetic and real ice channel dataset.The evaluation results show that the accuracy of the method using the corner point regression network in the second stage is achieved as high as 73.33%on the synthetic ice channel dataset and 70.66%on the real ice channel dataset,and the processing speed can reach up to 14.58frames per second.
基金the Competitive Research Fund of the University of Aizu,Japan.
文摘Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security.
基金supported by the National Natural Science Foundation of China under Grant 61602162the Hubei Provincial Science and Technology Plan Project under Grant 2023BCB041.
文摘Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification.
基金Supported by the National Natural Science Foundation(42202133,42072174,42130803,41872148)PetroChina Science and Technology Innovation Fund(2023DQ02-0106)PetroChina Basic Technology Project(2021DJ0101).
文摘Taking the Lower Permian Fengcheng Formation shale in Mahu Sag of Junggar Basin,NW China,as an example,core observation,test analysis,geological analysis and numerical simulation were applied to identify the shale oil micro-migration phenomenon.The hydrocarbon micro-migration in shale oil was quantitatively evaluated and verified by a self-created hydrocarbon expulsion potential method,and the petroleum geological significance of shale oil micro-migration evaluation was determined.Results show that significant micro-migration can be recognized between the organic-rich lamina and organic-poor lamina.The organic-rich lamina has strong hydrocarbon generation ability.The heavy components of hydrocarbon preferentially retained by kerogen swelling or adsorption,while the light components of hydrocarbon were migrated and accumulated to the interbedded felsic or carbonate organic-poor laminae as free oil.About 69% of the Fengcheng Formation shale samples in Well MY1 exhibit hydrocarbon charging phenomenon,while 31% of those exhibit hydrocarbon expulsion phenomenon.The reliability of the micro-migration evaluation results was verified by combining the group components based on the geochromatography effect,two-dimension nuclear magnetic resonance analysis,and the geochemical behavior of inorganic manganese elements in the process of hydrocarbon migration.Micro-migration is a bridge connecting the hydrocarbon accumulation elements in shale formations,which reflects the whole process of shale oil generation,expulsion and accumulation,and controls the content and composition of shale oil.The identification and evaluation of shale oil micro-migration will provide new perspectives for dynamically differential enrichment mechanism of shale oil and establishing a“multi-peak model in oil generation”of shale.
基金funded by the National Natural Science Foundation of China(41907175)the Open Fund of Key Laboratory(WSRCR-2023-01)the project of the China Geological Survey(DD20230459).
文摘Groundwater is an important source of drinking water.Groundwater pollution severely endangers drinking water safety and sustainable social development.In the case of groundwater pollution,the top priority is to identify pollution sources,and accurate information on pollution sources is the premise of efficient remediation.Then,an appropriate pollution remediation scheme should be developed according to information on pollution sources,site conditions,and economic costs.The methods for identifying pollution sources mainly include geophysical exploration,geochemistry,isotopic tracing,and numerical modeling.Among these identification methods,only the numerical modeling can recognize various information on pollution sources,while other methods can only identify a certain aspect of pollution sources.The remediation technologies of groundwater can be divided into in-situ and ex-situ remediation technologies according to the remediation location.The in-situ remediation technologies enjoy low costs and a wide remediation range,but their remediation performance is prone to be affected by environmental conditions and cause secondary pollution.The ex-situ remediation technologies boast high remediation efficiency,high processing capacity,and high treatment concentration but suffer high costs.Different methods for pollution source identification and remediation technologies are applicable to different conditions.To achieve the expected identification and remediation results,it is feasible to combine several methods and technologies according to the actual hydrogeological conditions of contaminated sites and the nature of pollutants.Additionally,detailed knowledge about the hydrogeological conditions and stratigraphic structure of the contaminated site is the basis of all work regardless of the adopted identification methods or remediation technologies.
基金funded by the National Natural Science Foundation of China under Grant No.62002103Henan Province Science Foundation for Youths No.222300420058+1 种基金Henan Province Science and Technology Research Project No.232102321064Teacher Education Curriculum Reform Research Priority Project No.2023-JSJYZD-011.
文摘Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification.
文摘Bovine tuberculosis (bTB) is an endemic zoonosis significantly affects animal health in Burkina Faso. The primary causative agent is Mycobacterium tuberculosis (M. tuberculosis) complex, mainly M. bovis. Cattle are considered as natural reservoir of M. bovis. However, in Burkina Faso, the circulation of these strains remains poorly understood and documented. This study aimed to identify and characterize Mycobacterium strains from suspected carcasses during routine meat inspection at Bobo-Dioulasso refrigerated slaughterhouse. A prospective cross-sectional study was conducted from January 2021 to December 2022 on cases of seizures linked to suspected bovine tuberculosis. Microbiological and molecular analyzes were used for mycobacterial strain isolation and characterization. Out of 50 samples, 24% tested positive by microscopy and 12% by culture. Molecular analysis identified 6 strains of Mycobacteria, exclusively Mycobacterium bovis specifically the subspecies bovis (Mycobacterium bovis subsp bovis). In conclusion, M. bovis subsp bovis is the primary agent responsible for bovine tuberculosis in Bobo-Dioulasso. Continuous monitoring of mycobacterial strains is therefore necessary for the effective control of this pathology in the local cattle population.
基金partially supported by the Natural Science Foundation of China (Grant Nos.62103052,52272358)partially supported by the Beijing Institute of Technology Research Fund Program for Young Scholars。
文摘This paper investigates the adaptive trajectory tracking control problem and the unknown parameter identification problem of a class of rotor-missiles with parametric system uncertainties.First,considering the uncertainty of structural and aerodynamic parameters,the six-degree-of-freedom(6Do F) nonlinear equations describing the position and attitude dynamics of the rotor-missile are established,respectively,in the inertial and body-fixed reference frames.Next,a hierarchical adaptive trajectory tracking controller that can guarantee closed-loop stability is proposed according to the cascade characteristics of the 6Do F dynamics.Then,a memory-augmented update rule of unknown parameters is proposed by integrating all historical data of the regression matrix.As long as the finitely excited condition is satisfied,the precise identification of unknown parameters can be achieved.Finally,the validity of the proposed trajectory tracking controller and the parameter identification method is proved through Lyapunov stability theory and numerical simulations.
文摘This paper presents the development of an artificial neural network (ANN) model based on the multi-layer perceptron (MLP) for analyzing internet traffic data over IP networks. We applied the ANN to analyze a time series of measured data for network response evaluation. For this reason, we used the input and output data of an internet traffic over IP networks to identify the ANN model, and we studied the performance of some training algorithms used to estimate the weights of the neuron. The comparison between some training algorithms demonstrates the efficiency and the accu-racy of the Levenberg-Marquardt (LM) and the Resilient back propagation (Rp) algorithms in term of statistical crite-ria. Consequently, the obtained results show that the developed models, using the LM and the Rp algorithms, can successfully be used for analyzing internet traffic over IP networks, and can be applied as an excellent and fundamental tool for the management of the internet traffic at different times.
基金Supported by Shanghai Municipal Science and Technology Program (Grant No.21511101701)National Key Research and Development Program of China (Grant No.2021YFC0122704)。
文摘A dual-arm nursing robot can gently lift patients and transfer them between a bed and a wheelchair.With its lightweight design,high load-bearing capacity,and smooth surface,the coupled-drive joint is particularly well suited for these robots.However,the coupled nature of the joint disrupts the direct linear relationship between the input and output torques,posing challenges for dynamic modeling and practical applications.This study investigated the transmission mechanism of this joint and employed the Lagrangian method to construct a dynamic model of its internal dynamics.Building on this foundation,the Newton-Euler method was used to develop a dynamic model for the entire robotic arm.A continuously differentiable friction model was incorporated to reduce the vibrations caused by speed transitions to zero.An experimental method was designed to compensate for gravity,inertia,and modeling errors to identify the parameters of the friction model.This method establishes a mapping relationship between the friction force and motor current.In addition,a Fourier series-based excitation trajectory was developed to facilitate the identification of the dynamic model parameters of the robotic arm.Trajectory tracking experiments were conducted during the experimental validation phase,demonstrating the high accuracy of the dynamic model and the parameter identification method for the robotic arm.This study presents a dynamic modeling and parameter identification method for coupled-drive joint robotic arms,thereby establishing a foundation for motion control in humanoid nursing robots.
基金funded by a major special project of PetroChina Company Limited(No.2021DJ1003No.2023ZZ2).
文摘The intricate distribution of oil and water in tight rocks makes pinpointing oil layers challenging.While conventional identification methods offer potential solutions,their limited accuracy precludes them from being effective in their applications to unconventional reservoirs.This study employed nuclear magnetic resonance(NMR)spectrum decomposition to dissect the NMR T_(2)spectrum into multiple subspectra.Furthermore,it employed laboratory NMR experiments to ascertain the fluid properties of these sub-spectra,aiming to enhance identification accuracy.The findings indicate that fluids of distinct properties overlap in the T_(2)spectra,with bound water,movable water,bound oil,and movable oil appearing sequentially from the low-value zone to the high-value zone.Consequently,an oil layer classification scheme was proposed,which considers the physical properties of reservoirs,oil-bearing capacity,and the characteristics of both mobility and the oil-water two-phase flow.When applied to tight oil layer identification,the scheme's outcomes align closely with actual test results.A horizontal well,deployed based on these findings,has produced high-yield industrial oil flow,underscoring the precision and dependability of this new approach.
基金Project(2007CB311106) supported by National Key Basic Research Program of ChinaProject(NEUL20090101) supported by the Foundation of National Information Control Laboratory of China
文摘Internet traffic classification plays an important role in network management, and many approaches have been proposed to classify different kinds of internet traffics. A novel approach was proposed to classify network applications by optimized back-propagation (BP) neural network. Particle swarm optimization (PSO) algorithm was used to optimize the BP neural network. And in order to increase the identification performance, wavelet packet decomposition (WPD) was used to extract several hidden features from the time-frequency information of network traffic. The experimental results show that the average classification accuracy of various network applications can reach 97%. Moreover, this approach optimized by BP neural network takes 50% of the training time compared with the traditional neural network.
基金supported by the 2022 National Natural Science Foundation of China(No.62277002)the National Key Research and Development Program of China(2022YFC3303500).
文摘The social transformation brought aboutby digital technology is deeply impacting various industries.Digital education products, with core technologiessuch as 5G, AI, IoT (Internet of Things),etc., are continuously penetrating areas such as teaching,management, and evaluation. Apps, miniprograms,and emerging large-scale models are providingexcellent knowledge performance and flexiblecross-media output. However, they also exposerisks such as content discrimination and algorithmcommercialization. This paper conducts anevidence-based analysis of digital education productrisks from four dimensions: “digital resourcesinformationdissemination-algorithm design-cognitiveassessment”. It breaks through corresponding identificationtechnologies and, relying on the diverse characteristicsof governance systems, explores governancestrategies for digital education products from the threedomains of “regulators-developers-users”.
基金supported by the Fundamental Research Funds for the Central Universities (No.3122020072)the Multi-investment Project of Tianjin Applied Basic Research(No.23JCQNJC00250)。
文摘A hybrid identification model based on multilayer artificial neural networks(ANNs) and particle swarm optimization(PSO) algorithm is developed to improve the simultaneous identification efficiency of thermal conductivity and effective absorption coefficient of semitransparent materials.For the direct model,the spherical harmonic method and the finite volume method are used to solve the coupled conduction-radiation heat transfer problem in an absorbing,emitting,and non-scattering 2D axisymmetric gray medium in the background of laser flash method.For the identification part,firstly,the temperature field and the incident radiation field in different positions are chosen as observables.Then,a traditional identification model based on PSO algorithm is established.Finally,multilayer ANNs are built to fit and replace the direct model in the traditional identification model to speed up the identification process.The results show that compared with the traditional identification model,the time cost of the hybrid identification model is reduced by about 1 000 times.Besides,the hybrid identification model remains a high level of accuracy even with measurement errors.
文摘Identification of stratigraphic interfaces and lithology is a key aspect in geological and geotechnical investigations.In this study,a monitoring while-drilling system was developed,along with a corresponding data pre-processing method.The method can handle invalid drilling data generated during manual operations.The correlation between various drilling parameters was analyzed,and a database of stratigraphic interfaces and key lithology identification based on the monitoring parameters was established.The average drilling speed was found to be the most suitable parameter for stratigraphic and lithology identification,and when the average drilling speed varied over a wide range,it corresponded to a stratigraphic interface.The average drilling speeds in sandy mudstone and sandstone strata were in the ranges of 0.1e0.2 m/min and 0.2e0.29 m/min,respectively.The results obtained using the present method were consistent with geotechnical survey results.The proposed method can be used for realtime lithology identification and represents a novel approach for intelligent geotechnical surveying.
基金supported by the National Key Technology R&D Program under Grant No. 2012BAH18B05
文摘Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion.
文摘With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process problem in e-commerce,focusing on the specific application of Internet of Things technology in e-commerce.Warehousing logistics is an important link in today’s e-commerce transactions.This article proposes a distributed analysis method for RFID-based e-commerce warehousing process optimization and an e-commerce supply chain management process based on Internet of Things technology.This article first introduces the advantages and disadvantages of shared IoT identification technology and the IoT resource sharing platform based on the three-layer abstract data model and representational state transfer(REST)style.Combining actual IoT applications and the characteristics of an existing platform,a REST-based IoT resource sharing platform is proposed.Combined with actual projects,a REST-based IoT resource sharing platform was built,and key technology experiments were conducted for verification.Finally,optimizing the e-commerce supply chain management process under Internet of Things technology and explaining the advantages of optimized e-commerce supply chain management are discussed.Research on this subject provides a theoretical basis for the application of the Internet of Things in e-commerce and has practical significance and practical value for managing service capabilities and service levels in e-commerce.