随着隔震技术的推广应用以及建筑业信息化水平的持续提升,在隔震工程中对隔震层建筑信息模型(building information modeling, BIM)建模的需求逐渐增长,然而针对性的研究工作相对较少。为此,围绕隔震支座BIM模型的高效建模方法和应用模...随着隔震技术的推广应用以及建筑业信息化水平的持续提升,在隔震工程中对隔震层建筑信息模型(building information modeling, BIM)建模的需求逐渐增长,然而针对性的研究工作相对较少。为此,围绕隔震支座BIM模型的高效建模方法和应用模块开展了研究。首先,综合隔震支座应用情况和力学特性,可将其分为橡胶隔震支座、滑移摩擦隔震支座和其他类型隔震支座,据此提出了隔震支座BIM快速建模模块基本架构;随后,基于Revit和Visual Studio平台开发了三类隔震支座BIM模型的快速建模功能,并实现了连接节点参数化建模和支座批量/手动布置的操作功能;最后,开展了某化工公司的库房隔震加固项目的隔震层BIM模型建模实践,结果表明:利用快速建模模块可将隔震层BIM建模操作从7个步骤降低至2个步骤,且使用过程中对隔震支座构造细节的认知要求相对较低。同时,建成后的BIM模型与实际工程在建筑信息的多个方面具有较好的一致性。相关研究可为建筑和桥梁隔震工程的BIM建模提供参考和借鉴。展开更多
BACKGROUND Acute liver failure(ALF)has a high mortality with widespread hepatocyte death involving ferroptosis and pyroptosis.The silent information regulator sirtuin 1(SIRT1)-mediated deacetylation affects multiple b...BACKGROUND Acute liver failure(ALF)has a high mortality with widespread hepatocyte death involving ferroptosis and pyroptosis.The silent information regulator sirtuin 1(SIRT1)-mediated deacetylation affects multiple biological processes,including cellular senescence,apoptosis,sugar and lipid metabolism,oxidative stress,and inflammation.AIM To investigate the association between ferroptosis and pyroptosis and the upstream regulatory mechanisms.METHODS This study included 30 patients with ALF and 30 healthy individuals who underwent serum alanine aminotransferase(ALT)and aspartate aminotransferase(AST)testing.C57BL/6 mice were also intraperitoneally pretreated with SIRT1,p53,or glutathione peroxidase 4(GPX4)inducers and inhibitors and injected with lipopolysaccharide(LPS)/D-galactosamine(D-GalN)to induce ALF.Gasdermin D(GSDMD)^(-/-)mice were used as an experimental group.Histological changes in liver tissue were monitored by hematoxylin and eosin staining.ALT,AST,glutathione,reactive oxygen species,and iron levels were measured using commercial kits.Ferroptosis-and pyroptosis-related protein and mRNA expression was detected by western blot and quantitative real-time polymerase chain reaction.SIRT1,p53,and GSDMD were assessed by immunofluorescence analysis.RESULTS Serum AST and ALT levels were elevated in patients with ALF.SIRT1,solute carrier family 7a member 11(SLC7A11),and GPX4 protein expression was decreased and acetylated p5,p53,GSDMD,and acyl-CoA synthetase long-chain family member 4(ACSL4)protein levels were elevated in human ALF liver tissue.In the p53 and ferroptosis inhibitor-treated and GSDMD^(-/-)groups,serum interleukin(IL)-1β,tumour necrosis factor alpha,IL-6,IL-2 and C-C motif ligand 2 levels were decreased and hepatic impairment was mitigated.In mice with GSDMD knockout,p53 was reduced,GPX4 was increased,and ferroptotic events(depletion of SLC7A11,elevation of ACSL4,and iron accumulation)were detected.In vitro,knockdown of p53 and overexpression of GPX4 reduced AST and ALT levels,the cytostatic rate,and GSDMD expression,restoring SLC7A11 depletion.Moreover,SIRT1 agonist and overexpression of SIRT1 alleviated acute liver injury and decreased iron deposition compared with results in the model group,accompanied by reduced p53,GSDMD,and ACSL4,and increased SLC7A11 and GPX4.Inactivation of SIRT1 exacerbated ferroptotic and pyroptotic cell death and aggravated liver injury in LPS/D-GalNinduced in vitro and in vivo models.CONCLUSION SIRT1 activation attenuates LPS/D-GalN-induced ferroptosis and pyroptosis by inhibiting the p53/GPX4/GSDMD signaling pathway in ALF.展开更多
BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychologi...BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities.展开更多
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe...This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.展开更多
Energy limitation of traditional Wireless Sensor Networks(WSNs)greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery.The energy harvesting WSN is a novel ne...Energy limitation of traditional Wireless Sensor Networks(WSNs)greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery.The energy harvesting WSN is a novel network architecture to address the limitation of traditional WSN.However,existing coverage and deployment schemes neglect the environmental correlation of sensor nodes and external energy with respect to physical space.Comprehensively considering the spatial correlation of the environment and the uneven distribution of energy in energy harvesting WSN,we investigate how to deploy a collection of sensor nodes to save the deployment cost while ensuring the target perpetual coverage.The Confident Information Coverage(CIC)model is adopted to formulate the CIC Minimum Deployment Cost Target Perpetual Coverage(CICMTP)problem to minimize the deployed sensor nodes.As the CICMTP is NP-hard,we devise two approximation algorithms named Local Greedy Threshold Algorithm based on CIC(LGTA-CIC)and Overall Greedy Search Algorithm based on CIC(OGSA-CIC).The LGTA-CIC has a low time complexity and the OGSA-CIC has a better approximation rate.Extensive simulation results demonstrate that the OGSA-CIC is able to achieve lower deployment cost and the performance of the proposed algorithms outperforms GRNP,TPNP and EENP algorithms.展开更多
In this editorial we comment on the article published in a recent issue of the World Journal of Gastroenterology.Acute liver failure(ALF)is a critical condition characterized by rapid hepatocellular injury and organ d...In this editorial we comment on the article published in a recent issue of the World Journal of Gastroenterology.Acute liver failure(ALF)is a critical condition characterized by rapid hepatocellular injury and organ dysfunction,and it often necessitates liver transplant to ensure patient survival.Recent research has eluci-dated the involvement of distinct cell death pathways,namely ferroptosis and pyroptosis,in the pathogenesis of ALF.Ferroptosis is driven by iron-dependent lipid peroxidation,whereas pyroptosis is an inflammatory form of cell death;both pathways contribute to hepatocyte death and exacerbate tissue damage.This comprehensive review explores the interplay between ferroptosis and pyroptosis in ALF,highlighting the role of key regulators such as silent information regulator sirtuin 1.Insights from clinical and preclinical studies provide valuable perspectives on the dysregulation of cell death pathways in ALF and the therapeutic potential of targeting these pathways.Collaboration across multiple disciplines is essential for translating the experimental insights into effective treatments for this life-threatening condition.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
Positional information encoded in spatial concentration patterns is crucial for the development of multicellular organisms.However,it is still unclear how such information is affected by the physically dissipative dif...Positional information encoded in spatial concentration patterns is crucial for the development of multicellular organisms.However,it is still unclear how such information is affected by the physically dissipative diffusion process.Here we study one-dimensional patterning systems with analytical derivation and numerical simulations.We find that the diffusion constant of the patterning molecules exhibits a nonmonotonic effect on the readout of the positional information from the concentration patterns.Specifically,there exists an optimal diffusion constant that maximizes the positional information.Moreover,we find that the energy dissipation due to the physical diffusion imposes a fundamental upper limit on the positional information.展开更多
For unachievable tracking problems, where the system output cannot precisely track a given reference, achieving the best possible approximation for the reference trajectory becomes the objective. This study aims to in...For unachievable tracking problems, where the system output cannot precisely track a given reference, achieving the best possible approximation for the reference trajectory becomes the objective. This study aims to investigate solutions using the Ptype learning control scheme. Initially, we demonstrate the necessity of gradient information for achieving the best approximation.Subsequently, we propose an input-output-driven learning gain design to handle the imprecise gradients of a class of uncertain systems. However, it is discovered that the desired performance may not be attainable when faced with incomplete information.To address this issue, an extended iterative learning control scheme is introduced. In this scheme, the tracking errors are modified through output data sampling, which incorporates lowmemory footprints and offers flexibility in learning gain design.The input sequence is shown to converge towards the desired input, resulting in an output that is closest to the given reference in the least square sense. Numerical simulations are provided to validate the theoretical findings.展开更多
The attention mechanism can extract salient features in images,which has been proved to be effective in improving the performance of person re-identification(Re-ID).However,most of the existing attention modules have ...The attention mechanism can extract salient features in images,which has been proved to be effective in improving the performance of person re-identification(Re-ID).However,most of the existing attention modules have the following two shortcomings:On the one hand,they mostly use global average pooling to generate context descriptors,without highlighting the guiding role of salient information on descriptor generation,resulting in insufficient ability of the final generated attention mask representation;On the other hand,the design of most attention modules is complicated,which greatly increases the computational cost of the model.To solve these problems,this paper proposes an attention module called self-supervised recalibration(SR)block,which introduces both global and local information through adaptive weighted fusion to generate a more refined attention mask.In particular,a special"Squeeze-Excitation"(SE)unit is designed in the SR block to further process the generated intermediate masks,both for nonlinearizations of the features and for constraint of the resulting computation by controlling the number of channels.Furthermore,we combine the most commonly used Res Net-50 to construct the instantiation model of the SR block,and verify its effectiveness on multiple Re-ID datasets,especially the mean Average Precision(m AP)on the Occluded-Duke dataset exceeds the state-of-the-art(SOTA)algorithm by 4.49%.展开更多
As a novel paradigm,semantic communication provides an effective solution for breaking through the future development dilemma of classical communication systems.However,it remains an unsolved problem of how to measure...As a novel paradigm,semantic communication provides an effective solution for breaking through the future development dilemma of classical communication systems.However,it remains an unsolved problem of how to measure the information transmission capability for a given semantic communication method and subsequently compare it with the classical communication method.In this paper,we first present a review of the semantic communication system,including its system model and the two typical coding and transmission methods for its implementations.To address the unsolved issue of the information transmission capability measure for semantic communication methods,we propose a new universal performance measure called Information Conductivity.We provide the definition and the physical significance to state its effectiveness in representing the information transmission capabilities of the semantic communication systems and present elaborations including its measure methods,degrees of freedom,and progressive analysis.Experimental results in image transmission scenarios validate its practical applicability.展开更多
To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic upd...To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update.展开更多
The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr...The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.展开更多
A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)...A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)∶Eu^(3+)can produce red mechanoluminescence,and importantly,it shows good repeatability.The mechanoluminescence of Ca_(5)Ga_(6)O_(14)∶Eu^(3+) results from the piezoelectric field generated inside the material under stress,rather than the charge carriers stored in the traps,which can be confirmed by the multiple cycles of mechanoluminescence tests and heat treatment tests.The mechanoluminescence color can be turned from red to green by co-doping varied concentrations of Tb^(3+),which may be meaningful for encrypted letter writing.The encryption scheme for secure communication was devised by harnessing mechanoluminescence patterns in diverse shapes and ASCII codes,which shows good encryption performance.The results suggest that the mechanoluminescence phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+),Tb^(3+)may be applied to the optical information encryption.展开更多
Rainwater runoff that does not infiltrate the soil during heavy rainfall may increase slope instability. The effect of runoff is usually neglected in conventional rainfall-induced slope failure analysis to simplify th...Rainwater runoff that does not infiltrate the soil during heavy rainfall may increase slope instability. The effect of runoff is usually neglected in conventional rainfall-induced slope failure analysis to simplify the model. To analyze the effect of runoff on slope stability, this study simultaneously simulated the effects of surface runoff and rainfall infiltration on bank slopes in the Three Gorges Reservoir Area. A shallow slope failure method that can be used to analyze runoff was proposed based on the modified Green-Ampt model, the simplified Saint-Venant model, and the infinite slope model. In this model, the modified Green–Ampt model was used to estimate the rainfall infiltration capacity and the wetting front depth. The eight-flow(D8) method and the simplified Saint-Venant model were selected to estimate the distribution of runoff. By considering the wetting front depth as the slip surface depth, the factor of safety of the slope could be determined using the infinite slope stability model. A comparison of the different models reveals that runoff can escalate the instability of certain slopes, causing stable slopes to become unstable. Comparison of the unstable areas obtained from the simulation with the actual landslide sites shows that the model proposed in this study can successfully predict landslides at these sites. The slope instability assessment model proposed in this study offers an alternative approach for estimating high-risk areas in large mountainous regions.展开更多
This paper addresses a multi-agent scheduling problem with uniform parallel machines owned by a resource agent and competing jobs with dynamic arrival times that belong to different consumer agents.All agents are self...This paper addresses a multi-agent scheduling problem with uniform parallel machines owned by a resource agent and competing jobs with dynamic arrival times that belong to different consumer agents.All agents are self-interested and rational with the aim of maximizing their own objectives,resulting in intense resource competition among consumer agents and strategic behaviors of unwillingness to disclose private information.Within the context,a centralized scheduling approach is unfeasible,and a decentralized approach is considered to deal with the targeted problem.This study aims to generate a stable and collaborative solution with high social welfare while simultaneously accommodating consumer agents’preferences under incomplete information.For this purpose,a dynamic iterative auction-based approach based on a decentralized decision-making procedure is developed.In the proposed approach,a dynamic auction procedure is established for dynamic jobs participating in a realtime auction,and a straightforward and easy-to-implement bidding strategy without price is presented to reduce the complexity of bid determination.In addition,an adaptive Hungarian algorithm is applied to solve the winner determination problem efficiently.A theoretical analysis is conducted to prove that the proposed approach is individually rational and that the myopic bidding strategy is a weakly dominant strategy for consumer agents submitting bids.Extensive computational experiments demonstrate that the developed approach achieves high-quality solutions and exhibits considerable stability on largescale problems with numerous consumer agents and jobs.A further multi-agent scheduling problem considering multiple resource agents will be studied in future work.展开更多
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ...In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.展开更多
The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins ...The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins and preventing illicit covert communication online.Accurately discerning a steganographer from many normal users is challenging due to various factors,such as the complexity in obtaining the steganography algorithm,extracting highly separability features,and modeling the cover data.After extensive exploration,several methods have been proposed for steganographer identification.This paper presents a survey of existing studies.Firstly,we provide a concise introduction to the research background and outline the issue of steganographer identification.Secondly,we present fundamental concepts and techniques that establish a general framework for identifying steganographers.Within this framework,state-of-the-art methods are summarized from five key aspects:data acquisition,feature extraction,feature optimization,identification paradigm,and performance evaluation.Furthermore,theoretical and experimental analyses examine the advantages and limitations of these existing methods.Finally,the survey highlights outstanding issues in image steganographer identification that deserve further research.展开更多
Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majori...Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majority of following behavior model and overtaking behavior model are imprecise and unrealistic compared with pedestrian movement in the real world.In this study,a pedestrian dynamic model considering detailed modelling of the following behavior and overtaking behavior is constructed,and a method of measuring the lane formation and pedestrian system order based on information entropy is proposed.Simulation and analysis demonstrate that the following and avoidance behaviors are important factors of lane formation.A high tendency of following results in good lane formation.Both non-selective following behavior and aggressive overtaking behavior cause the system order to decrease.The most orderly following strategy for a pedestrian is to overtake the former pedestrian whose speed is lower than approximately 70%of his own.The influence of the obstacle layout on pedestrian lane and egress efficiency is also studied with this model.The presence of a small obstacle does not obstruct the walking of pedestrians;in contrast,it may help to improve the egress efficiency by guiding the pedestrian flow and mitigating the reduction of pedestrian system orderliness.展开更多
文摘随着隔震技术的推广应用以及建筑业信息化水平的持续提升,在隔震工程中对隔震层建筑信息模型(building information modeling, BIM)建模的需求逐渐增长,然而针对性的研究工作相对较少。为此,围绕隔震支座BIM模型的高效建模方法和应用模块开展了研究。首先,综合隔震支座应用情况和力学特性,可将其分为橡胶隔震支座、滑移摩擦隔震支座和其他类型隔震支座,据此提出了隔震支座BIM快速建模模块基本架构;随后,基于Revit和Visual Studio平台开发了三类隔震支座BIM模型的快速建模功能,并实现了连接节点参数化建模和支座批量/手动布置的操作功能;最后,开展了某化工公司的库房隔震加固项目的隔震层BIM模型建模实践,结果表明:利用快速建模模块可将隔震层BIM建模操作从7个步骤降低至2个步骤,且使用过程中对隔震支座构造细节的认知要求相对较低。同时,建成后的BIM模型与实际工程在建筑信息的多个方面具有较好的一致性。相关研究可为建筑和桥梁隔震工程的BIM建模提供参考和借鉴。
基金Supported by National Natural Science Foundation of China,No.82060123Doctoral Start-up Fund of Affiliated Hospital of Guizhou Medical University,No.gysybsky-2021-28+1 种基金Fund Project of Guizhou Provincial Science and Technology Department,No.[2020]1Y299Guizhou Provincial Health Commission,No.gzwjk2019-1-082。
文摘BACKGROUND Acute liver failure(ALF)has a high mortality with widespread hepatocyte death involving ferroptosis and pyroptosis.The silent information regulator sirtuin 1(SIRT1)-mediated deacetylation affects multiple biological processes,including cellular senescence,apoptosis,sugar and lipid metabolism,oxidative stress,and inflammation.AIM To investigate the association between ferroptosis and pyroptosis and the upstream regulatory mechanisms.METHODS This study included 30 patients with ALF and 30 healthy individuals who underwent serum alanine aminotransferase(ALT)and aspartate aminotransferase(AST)testing.C57BL/6 mice were also intraperitoneally pretreated with SIRT1,p53,or glutathione peroxidase 4(GPX4)inducers and inhibitors and injected with lipopolysaccharide(LPS)/D-galactosamine(D-GalN)to induce ALF.Gasdermin D(GSDMD)^(-/-)mice were used as an experimental group.Histological changes in liver tissue were monitored by hematoxylin and eosin staining.ALT,AST,glutathione,reactive oxygen species,and iron levels were measured using commercial kits.Ferroptosis-and pyroptosis-related protein and mRNA expression was detected by western blot and quantitative real-time polymerase chain reaction.SIRT1,p53,and GSDMD were assessed by immunofluorescence analysis.RESULTS Serum AST and ALT levels were elevated in patients with ALF.SIRT1,solute carrier family 7a member 11(SLC7A11),and GPX4 protein expression was decreased and acetylated p5,p53,GSDMD,and acyl-CoA synthetase long-chain family member 4(ACSL4)protein levels were elevated in human ALF liver tissue.In the p53 and ferroptosis inhibitor-treated and GSDMD^(-/-)groups,serum interleukin(IL)-1β,tumour necrosis factor alpha,IL-6,IL-2 and C-C motif ligand 2 levels were decreased and hepatic impairment was mitigated.In mice with GSDMD knockout,p53 was reduced,GPX4 was increased,and ferroptotic events(depletion of SLC7A11,elevation of ACSL4,and iron accumulation)were detected.In vitro,knockdown of p53 and overexpression of GPX4 reduced AST and ALT levels,the cytostatic rate,and GSDMD expression,restoring SLC7A11 depletion.Moreover,SIRT1 agonist and overexpression of SIRT1 alleviated acute liver injury and decreased iron deposition compared with results in the model group,accompanied by reduced p53,GSDMD,and ACSL4,and increased SLC7A11 and GPX4.Inactivation of SIRT1 exacerbated ferroptotic and pyroptotic cell death and aggravated liver injury in LPS/D-GalNinduced in vitro and in vivo models.CONCLUSION SIRT1 activation attenuates LPS/D-GalN-induced ferroptosis and pyroptosis by inhibiting the p53/GPX4/GSDMD signaling pathway in ALF.
文摘BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities.
基金the National Natural Science Foundation of China(Nos.62272478,61872384)Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584)+1 种基金National Natural Science Foundation of China(No.62172436)Engineering University of PAP’s Funding for Scientific Research Innovation Team,Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
文摘This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.
基金supported by National Natural Science Foundation of China(Grant No.61871209,No.62272182 and No.61901210)Shenzhen Science and Technology Program under Grant JCYJ20220530161004009+2 种基金Natural Science Foundation of Hubei Province(Grant No.2022CF011)Wuhan Business University Doctoral Fundamental Research Funds(Grant No.2021KB005)in part by Artificial Intelligence and Intelligent Transportation Joint Technical Center of HUST and Hubei Chutian Intelligent Transportation Co.,LTD under project Intelligent Tunnel Integrated Monitoring and Management System.
文摘Energy limitation of traditional Wireless Sensor Networks(WSNs)greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery.The energy harvesting WSN is a novel network architecture to address the limitation of traditional WSN.However,existing coverage and deployment schemes neglect the environmental correlation of sensor nodes and external energy with respect to physical space.Comprehensively considering the spatial correlation of the environment and the uneven distribution of energy in energy harvesting WSN,we investigate how to deploy a collection of sensor nodes to save the deployment cost while ensuring the target perpetual coverage.The Confident Information Coverage(CIC)model is adopted to formulate the CIC Minimum Deployment Cost Target Perpetual Coverage(CICMTP)problem to minimize the deployed sensor nodes.As the CICMTP is NP-hard,we devise two approximation algorithms named Local Greedy Threshold Algorithm based on CIC(LGTA-CIC)and Overall Greedy Search Algorithm based on CIC(OGSA-CIC).The LGTA-CIC has a low time complexity and the OGSA-CIC has a better approximation rate.Extensive simulation results demonstrate that the OGSA-CIC is able to achieve lower deployment cost and the performance of the proposed algorithms outperforms GRNP,TPNP and EENP algorithms.
基金Supported by China Medical University,No.CMU111-MF-10.
文摘In this editorial we comment on the article published in a recent issue of the World Journal of Gastroenterology.Acute liver failure(ALF)is a critical condition characterized by rapid hepatocellular injury and organ dysfunction,and it often necessitates liver transplant to ensure patient survival.Recent research has eluci-dated the involvement of distinct cell death pathways,namely ferroptosis and pyroptosis,in the pathogenesis of ALF.Ferroptosis is driven by iron-dependent lipid peroxidation,whereas pyroptosis is an inflammatory form of cell death;both pathways contribute to hepatocyte death and exacerbate tissue damage.This comprehensive review explores the interplay between ferroptosis and pyroptosis in ALF,highlighting the role of key regulators such as silent information regulator sirtuin 1.Insights from clinical and preclinical studies provide valuable perspectives on the dysregulation of cell death pathways in ALF and the therapeutic potential of targeting these pathways.Collaboration across multiple disciplines is essential for translating the experimental insights into effective treatments for this life-threatening condition.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.32271293 and 11875076)。
文摘Positional information encoded in spatial concentration patterns is crucial for the development of multicellular organisms.However,it is still unclear how such information is affected by the physically dissipative diffusion process.Here we study one-dimensional patterning systems with analytical derivation and numerical simulations.We find that the diffusion constant of the patterning molecules exhibits a nonmonotonic effect on the readout of the positional information from the concentration patterns.Specifically,there exists an optimal diffusion constant that maximizes the positional information.Moreover,we find that the energy dissipation due to the physical diffusion imposes a fundamental upper limit on the positional information.
基金supported by the National Natural Science Foundation of China (62173333, 12271522)Beijing Natural Science Foundation (Z210002)the Research Fund of Renmin University of China (2021030187)。
文摘For unachievable tracking problems, where the system output cannot precisely track a given reference, achieving the best possible approximation for the reference trajectory becomes the objective. This study aims to investigate solutions using the Ptype learning control scheme. Initially, we demonstrate the necessity of gradient information for achieving the best approximation.Subsequently, we propose an input-output-driven learning gain design to handle the imprecise gradients of a class of uncertain systems. However, it is discovered that the desired performance may not be attainable when faced with incomplete information.To address this issue, an extended iterative learning control scheme is introduced. In this scheme, the tracking errors are modified through output data sampling, which incorporates lowmemory footprints and offers flexibility in learning gain design.The input sequence is shown to converge towards the desired input, resulting in an output that is closest to the given reference in the least square sense. Numerical simulations are provided to validate the theoretical findings.
基金supported in part by the Natural Science Foundation of Xinjiang Uygur Autonomous Region(Grant No.2022D01B186 and No.2022D01B05)。
文摘The attention mechanism can extract salient features in images,which has been proved to be effective in improving the performance of person re-identification(Re-ID).However,most of the existing attention modules have the following two shortcomings:On the one hand,they mostly use global average pooling to generate context descriptors,without highlighting the guiding role of salient information on descriptor generation,resulting in insufficient ability of the final generated attention mask representation;On the other hand,the design of most attention modules is complicated,which greatly increases the computational cost of the model.To solve these problems,this paper proposes an attention module called self-supervised recalibration(SR)block,which introduces both global and local information through adaptive weighted fusion to generate a more refined attention mask.In particular,a special"Squeeze-Excitation"(SE)unit is designed in the SR block to further process the generated intermediate masks,both for nonlinearizations of the features and for constraint of the resulting computation by controlling the number of channels.Furthermore,we combine the most commonly used Res Net-50 to construct the instantiation model of the SR block,and verify its effectiveness on multiple Re-ID datasets,especially the mean Average Precision(m AP)on the Occluded-Duke dataset exceeds the state-of-the-art(SOTA)algorithm by 4.49%.
基金supported by the National Natural Science Foundation of China(No.62293481,No.62071058)。
文摘As a novel paradigm,semantic communication provides an effective solution for breaking through the future development dilemma of classical communication systems.However,it remains an unsolved problem of how to measure the information transmission capability for a given semantic communication method and subsequently compare it with the classical communication method.In this paper,we first present a review of the semantic communication system,including its system model and the two typical coding and transmission methods for its implementations.To address the unsolved issue of the information transmission capability measure for semantic communication methods,we propose a new universal performance measure called Information Conductivity.We provide the definition and the physical significance to state its effectiveness in representing the information transmission capabilities of the semantic communication systems and present elaborations including its measure methods,degrees of freedom,and progressive analysis.Experimental results in image transmission scenarios validate its practical applicability.
文摘To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update.
基金Anhui Province Natural Science Research Project of Colleges and Universities(2023AH040321)Excellent Scientific Research and Innovation Team of Anhui Colleges(2022AH010098).
文摘The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.
文摘A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)∶Eu^(3+)can produce red mechanoluminescence,and importantly,it shows good repeatability.The mechanoluminescence of Ca_(5)Ga_(6)O_(14)∶Eu^(3+) results from the piezoelectric field generated inside the material under stress,rather than the charge carriers stored in the traps,which can be confirmed by the multiple cycles of mechanoluminescence tests and heat treatment tests.The mechanoluminescence color can be turned from red to green by co-doping varied concentrations of Tb^(3+),which may be meaningful for encrypted letter writing.The encryption scheme for secure communication was devised by harnessing mechanoluminescence patterns in diverse shapes and ASCII codes,which shows good encryption performance.The results suggest that the mechanoluminescence phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+),Tb^(3+)may be applied to the optical information encryption.
基金supported by the National Natural Science Foundation of China (U2240221)the Sichuan Youth Science and Technology Innovation Research Team Project (2020JDTD0006)。
文摘Rainwater runoff that does not infiltrate the soil during heavy rainfall may increase slope instability. The effect of runoff is usually neglected in conventional rainfall-induced slope failure analysis to simplify the model. To analyze the effect of runoff on slope stability, this study simultaneously simulated the effects of surface runoff and rainfall infiltration on bank slopes in the Three Gorges Reservoir Area. A shallow slope failure method that can be used to analyze runoff was proposed based on the modified Green-Ampt model, the simplified Saint-Venant model, and the infinite slope model. In this model, the modified Green–Ampt model was used to estimate the rainfall infiltration capacity and the wetting front depth. The eight-flow(D8) method and the simplified Saint-Venant model were selected to estimate the distribution of runoff. By considering the wetting front depth as the slip surface depth, the factor of safety of the slope could be determined using the infinite slope stability model. A comparison of the different models reveals that runoff can escalate the instability of certain slopes, causing stable slopes to become unstable. Comparison of the unstable areas obtained from the simulation with the actual landslide sites shows that the model proposed in this study can successfully predict landslides at these sites. The slope instability assessment model proposed in this study offers an alternative approach for estimating high-risk areas in large mountainous regions.
基金supported by the National Natural Science Foundation of China(51975482)the China Scholarship Council.
文摘This paper addresses a multi-agent scheduling problem with uniform parallel machines owned by a resource agent and competing jobs with dynamic arrival times that belong to different consumer agents.All agents are self-interested and rational with the aim of maximizing their own objectives,resulting in intense resource competition among consumer agents and strategic behaviors of unwillingness to disclose private information.Within the context,a centralized scheduling approach is unfeasible,and a decentralized approach is considered to deal with the targeted problem.This study aims to generate a stable and collaborative solution with high social welfare while simultaneously accommodating consumer agents’preferences under incomplete information.For this purpose,a dynamic iterative auction-based approach based on a decentralized decision-making procedure is developed.In the proposed approach,a dynamic auction procedure is established for dynamic jobs participating in a realtime auction,and a straightforward and easy-to-implement bidding strategy without price is presented to reduce the complexity of bid determination.In addition,an adaptive Hungarian algorithm is applied to solve the winner determination problem efficiently.A theoretical analysis is conducted to prove that the proposed approach is individually rational and that the myopic bidding strategy is a weakly dominant strategy for consumer agents submitting bids.Extensive computational experiments demonstrate that the developed approach achieves high-quality solutions and exhibits considerable stability on largescale problems with numerous consumer agents and jobs.A further multi-agent scheduling problem considering multiple resource agents will be studied in future work.
文摘In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.
基金supported by the National Key Research and Development Program of China(No.2022YFB3102900)the National Natural Science Foundation of China(Nos.62172435,62202495 and 62002103)+2 种基金Zhongyuan Science and Technology Innovation Leading Talent Project of China(No.214200510019)Key Research and Development Project of Henan Province(No.2211321200)the Natural Science Foundation of Henan Province(No.222300420058).
文摘The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins and preventing illicit covert communication online.Accurately discerning a steganographer from many normal users is challenging due to various factors,such as the complexity in obtaining the steganography algorithm,extracting highly separability features,and modeling the cover data.After extensive exploration,several methods have been proposed for steganographer identification.This paper presents a survey of existing studies.Firstly,we provide a concise introduction to the research background and outline the issue of steganographer identification.Secondly,we present fundamental concepts and techniques that establish a general framework for identifying steganographers.Within this framework,state-of-the-art methods are summarized from five key aspects:data acquisition,feature extraction,feature optimization,identification paradigm,and performance evaluation.Furthermore,theoretical and experimental analyses examine the advantages and limitations of these existing methods.Finally,the survey highlights outstanding issues in image steganographer identification that deserve further research.
基金Project supported by the National Natural Science Foundation of China(Grant No.71603146).
文摘Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majority of following behavior model and overtaking behavior model are imprecise and unrealistic compared with pedestrian movement in the real world.In this study,a pedestrian dynamic model considering detailed modelling of the following behavior and overtaking behavior is constructed,and a method of measuring the lane formation and pedestrian system order based on information entropy is proposed.Simulation and analysis demonstrate that the following and avoidance behaviors are important factors of lane formation.A high tendency of following results in good lane formation.Both non-selective following behavior and aggressive overtaking behavior cause the system order to decrease.The most orderly following strategy for a pedestrian is to overtake the former pedestrian whose speed is lower than approximately 70%of his own.The influence of the obstacle layout on pedestrian lane and egress efficiency is also studied with this model.The presence of a small obstacle does not obstruct the walking of pedestrians;in contrast,it may help to improve the egress efficiency by guiding the pedestrian flow and mitigating the reduction of pedestrian system orderliness.