In this article,we study Kahler metrics on a certain line bundle over some compact Kahler manifolds to find complete Kahler metrics with positive holomorphic sectional(or bisectional)curvatures.Thus,we apply a strateg...In this article,we study Kahler metrics on a certain line bundle over some compact Kahler manifolds to find complete Kahler metrics with positive holomorphic sectional(or bisectional)curvatures.Thus,we apply a strategy to a famous Yau conjecture with a co-homogeneity one geometry.展开更多
Evaluating complex information systems necessitates deep contextual knowledge of technology, user needs, and quality. The quality evaluation challenges increase with the system’s complexity, especially when multiple ...Evaluating complex information systems necessitates deep contextual knowledge of technology, user needs, and quality. The quality evaluation challenges increase with the system’s complexity, especially when multiple services supported by varied technological modules, are offered. Existing standards for software quality, such as the ISO25000 series, provide a broad framework for evaluation. Broadness offers initial implementation ease albeit, it often lacks specificity to cater to individual system modules. This paper maps 48 data metrics and 175 software metrics on specific system modules while aligning them with ISO standard quality traits. Using the ISO25000 series as a foundation, especially ISO25010 and 25012, this research seeks to augment the applicability of these standards to multi-faceted systems, exemplified by five distinct software modules prevalent in modern information ecosystems.展开更多
Assessment of rock mass quality significantly impacts the design and construction of underground and open-pit mines from the point of stability and economy.This study develops the novel Gromov-Hausdorff distance for r...Assessment of rock mass quality significantly impacts the design and construction of underground and open-pit mines from the point of stability and economy.This study develops the novel Gromov-Hausdorff distance for rock quality(GHDQR)methodology for rock mass quality rating based on multi-criteria grey metric space.It usually presents the quality of surrounding rock by classes(metric spaces)with specified properties and adequate interval-grey numbers.Measuring the distance between surrounding rock sample characteristics and existing classes represents the core of this study.The Gromov-Hausdorff distance is an especially useful discriminant function,i.e.,a classifier to calculate these distances,and assess the quality of the surrounding rock.The efficiency of the developed methodology is analyzed using the Mean Absolute Percentage Error(MAPE)technique.Seven existing methods,such as the Gaussian cloud method,Discriminant method,Mutation series method,Artificial neural network(ANN),Support vector machine(SVM),Grey wolf optimizer and Support vector classification method(GWO-SVC)and Rock mass rating method(RMR)are used for comparison with the proposed GHDQR method.The share of the highly accurate category of 85.71%clearly indicates compliance with actual values obtained by the compared methods.The results of comparisons showed that the model enables objective,efficient,and reliable assessment of rock mass quality.展开更多
In this paper,we study a class of Finsler metrics defined by a vector field on a gradient Ricci soliton.We obtain a necessary and sufficient condition for these Finsler metrics on a compact gradient Ricci soliton to b...In this paper,we study a class of Finsler metrics defined by a vector field on a gradient Ricci soliton.We obtain a necessary and sufficient condition for these Finsler metrics on a compact gradient Ricci soliton to be of isotropic S-curvature by establishing a new integral inequality.Then we determine the Ricci curvature of navigation Finsler metrics of isotropic S-curvature on a gradient Ricci soliton generalizing result only known in the case when such soliton is of Einstein type.As its application,we obtain the Ricci curvature of all navigation Finsler metrics of isotropic S-curvature on Gaussian shrinking soliton.展开更多
We investigate the quantum metric and topological Euler number in a cyclically modulated Su-Schrieffer-Heeger(SSH)model with long-range hopping terms.By computing the quantum geometry tensor,we derive exact expression...We investigate the quantum metric and topological Euler number in a cyclically modulated Su-Schrieffer-Heeger(SSH)model with long-range hopping terms.By computing the quantum geometry tensor,we derive exact expressions for the quantum metric and Berry curvature of the energy band electrons,and we obtain the phase diagram of the model marked by the first Chern number.Furthermore,we also obtain the topological Euler number of the energy band based on the Gauss-Bonnet theorem on the topological characterization of the closed Bloch states manifold in the first Brillouin zone.However,some regions where the Berry curvature is identically zero in the first Brillouin zone result in the degeneracy of the quantum metric,which leads to ill-defined non-integer topological Euler numbers.Nevertheless,the non-integer"Euler number"provides valuable insights and an upper bound for the absolute values of the Chern numbers.展开更多
Background:Failure to rescue has been an effective quality metric in congenital heart surgery.Conversely,mor-bidity and mortality depend greatly on non-modifiable individual factors and have a weak correlation with be...Background:Failure to rescue has been an effective quality metric in congenital heart surgery.Conversely,mor-bidity and mortality depend greatly on non-modifiable individual factors and have a weak correlation with better-quality performance.We aim to measure the complications,mortality,and risk factors in pediatric patients undergoing congenital heart surgery in a high-complexity institution located in a middle-income country and compare it with other institutions that have conducted a similar study.Methods:A retrospective observational study was conducted in a high-complexity service provider institution,in Cali,Colombia.All pediatric patients undergoing any congenital heart surgery between 2019 and 2022 were included.The main outcomes evaluated in the study were complication,mortality,and failure to rescue rate.Univariate and multivariate logistic regression analysis was performed with mortality as the outcome variable.Results:We evaluated 308 congenital heart sur-geries.Regarding the outcomes,201(65%)complications occurred,23(7.5%)patients died,and the FTR of the entire cohort was 11.4%.The presence of a postoperative complication(OR 14.88,CI 3.06–268.37,p=0.009),age(OR 0.79,CI 0.57–0.96,p=0.068),and urgent/emergent surgery(OR 8.14,CI 2.97–28.66,p<0.001)were the most significant variables in predicting mortality.Conclusions:Failure to rescue is an effective and comparable quality measure in healthcare institutions and is the major contributor to postoperative mortality in congenital heart surgeries.Despite our higher mortality and complication rate,we obtained a comparable failure to rescue rate to high-income countries’health institutions.展开更多
In this article,we first establish an asymptotically sharp result on the higher order Fréchet derivatives for bounded holomorphic mappings f(x)=f(0)+∞∑s=1Dskf(0)(x^(sk))/(sk)!:B_(X)→B_(Y),where B_X is the unit...In this article,we first establish an asymptotically sharp result on the higher order Fréchet derivatives for bounded holomorphic mappings f(x)=f(0)+∞∑s=1Dskf(0)(x^(sk))/(sk)!:B_(X)→B_(Y),where B_X is the unit ball of X.We next give a sharp result on the first order Fréchet derivative for bounded holomorphic mappings F(X)=F(0+)∞∑s=KD^(s)f(0)(x^(8)/s!):B_(X)→B_(Y),where B_(X)is the unit ball of X.The results that we derive include some results in several complex variables,and extend the classical result in one complex variable to several complex variables.展开更多
Cross entropy is a measure in machine learning and deep learning that assesses the difference between predicted and actual probability distributions. In this study, we propose cross entropy as a performance evaluation...Cross entropy is a measure in machine learning and deep learning that assesses the difference between predicted and actual probability distributions. In this study, we propose cross entropy as a performance evaluation metric for image classifier models and apply it to the CT image classification of lung cancer. A convolutional neural network is employed as the deep neural network (DNN) image classifier, with the residual network (ResNet) 50 chosen as the DNN archi-tecture. The image data used comprise a lung CT image set. Two classification models are built from datasets with varying amounts of data, and lung cancer is categorized into four classes using 10-fold cross-validation. Furthermore, we employ t-distributed stochastic neighbor embedding to visually explain the data distribution after classification. Experimental results demonstrate that cross en-tropy is a highly useful metric for evaluating the reliability of image classifier models. It is noted that for a more comprehensive evaluation of model perfor-mance, combining with other evaluation metrics is considered essential. .展开更多
Using the Raychaudhuri equation, we associate quantum probability amplitudes (propagators) to equatorial principal ingoing and outgoing null geodesic congruences in the Kerr metric. The expansion scalars diverge at th...Using the Raychaudhuri equation, we associate quantum probability amplitudes (propagators) to equatorial principal ingoing and outgoing null geodesic congruences in the Kerr metric. The expansion scalars diverge at the ring singularity;however, the propagators remain finite, which is an indication that at the quantum level singularities might disappear or, at least, become softened.展开更多
In this paper we introduce the notions of mean dimension and metric mean dimension for non-autonomous iterated function systems(NAIFSs for short)on countably infinite alphabets which can be regarded as generalizations...In this paper we introduce the notions of mean dimension and metric mean dimension for non-autonomous iterated function systems(NAIFSs for short)on countably infinite alphabets which can be regarded as generalizations of the mean dimension and the Lindenstrauss metric mean dimension for non-autonomous iterated function systems.We also show the relationship between the mean topological dimension and the metric mean dimension.展开更多
Large Language Models (LLMs) have revolutionized Generative Artificial Intelligence (GenAI) tasks, becoming an integral part of various applications in society, including text generation, translation, summarization, a...Large Language Models (LLMs) have revolutionized Generative Artificial Intelligence (GenAI) tasks, becoming an integral part of various applications in society, including text generation, translation, summarization, and more. However, their widespread usage emphasizes the critical need to enhance their security posture to ensure the integrity and reliability of their outputs and minimize harmful effects. Prompt injections and training data poisoning attacks are two of the most prominent vulnerabilities in LLMs, which could potentially lead to unpredictable and undesirable behaviors, such as biased outputs, misinformation propagation, and even malicious content generation. The Common Vulnerability Scoring System (CVSS) framework provides a standardized approach to capturing the principal characteristics of vulnerabilities, facilitating a deeper understanding of their severity within the security and AI communities. By extending the current CVSS framework, we generate scores for these vulnerabilities such that organizations can prioritize mitigation efforts, allocate resources effectively, and implement targeted security measures to defend against potential risks.展开更多
In a very recent article of mine I have corrected the traditional derivation of the Schwarzschild metric thus arriving to formulate a correct Schwarzschild metric different from the traditional Schwarzschild metric. I...In a very recent article of mine I have corrected the traditional derivation of the Schwarzschild metric thus arriving to formulate a correct Schwarzschild metric different from the traditional Schwarzschild metric. In this article, starting from this correct Schwarzschild metric, I also propose corrections to the other traditional Reissner-Nordstrøm, Kerr and Kerr-Newman metrics on the basis of the fact that these metrics should be equal to the correct Schwarzschild metric in the borderline case in which they reduce to the case described by this metric. In this way, we see that, like the correct Schwarzschild metric, also the correct Reissner-Nordstrøm, Kerr and Kerr-Newman metrics do not present any event horizon (and therefore do not present any black hole) unlike the traditional Reissner-Nordstrøm, Kerr and Kerr-Newman metrics.展开更多
A method of topology synthesis based on graph theory and mechanism combination theory was applied to the configuration design of locomotion systems of lunar exploration rovers(LER).Through topology combination of whee...A method of topology synthesis based on graph theory and mechanism combination theory was applied to the configuration design of locomotion systems of lunar exploration rovers(LER).Through topology combination of wheel structural unit,suspension unit,and connecting device unit between suspension and load platform,some new locomotion system configurations were proposed and the metrics and indexes to evaluate the performance of the new locomotion system were analyzed.Performance evaluation and comparison between two LER with locomotion systems of different configurations were analyzed.The analysis results indicate that the new locomotion system configuration has good trafficability performance.展开更多
In this paper,we prove that for some completions of certain fiber bundles there is a Maxwell-Einstein metric conformally related to any given Kahler class.
With the advancement of network communication technology,network traffic shows explosive growth.Consequently,network attacks occur frequently.Network intrusion detection systems are still the primary means of detectin...With the advancement of network communication technology,network traffic shows explosive growth.Consequently,network attacks occur frequently.Network intrusion detection systems are still the primary means of detecting attacks.However,two challenges continue to stymie the development of a viable network intrusion detection system:imbalanced training data and new undiscovered attacks.Therefore,this study proposes a unique deep learning-based intrusion detection method.We use two independent in-memory autoencoders trained on regular network traffic and attacks to capture the dynamic relationship between traffic features in the presence of unbalanced training data.Then the original data is fed into the triplet network by forming a triplet with the data reconstructed from the two encoders to train.Finally,the distance relationship between the triples determines whether the traffic is an attack.In addition,to improve the accuracy of detecting unknown attacks,this research proposes an improved triplet loss function that is used to pull the distances of the same class closer while pushing the distances belonging to different classes farther in the learned feature space.The proposed approach’s effectiveness,stability,and significance are evaluated against advanced models on the Android Adware and General Malware Dataset(AAGM17),Knowledge Discovery and Data Mining Cup 1999(KDDCUP99),Canadian Institute for Cybersecurity Group’s Intrusion Detection Evaluation Dataset(CICIDS2017),UNSW-NB15,Network Security Lab-Knowledge Discovery and Data Mining(NSL-KDD)datasets.The achieved results confirmed the superiority of the proposed method for the task of network intrusion detection.展开更多
Studies were conducted to evaluate driver injury metrics with varying crash pulse in offset crash. First, a vehicle finite element ( FE ) model and an occupant restraint system (ORS) model were developed and valid...Studies were conducted to evaluate driver injury metrics with varying crash pulse in offset crash. First, a vehicle finite element ( FE ) model and an occupant restraint system (ORS) model were developed and validated against tests; then, the crash pulse collected from the test vehicle was equivalent to a dual-trapezoid shape pulse which will be quantitatively described by six parameters and was put into the ORS model; finally, parametric studies were conducted to analyze the sensitivi- ties of parameters of equivalent crash pulse on head resultant acceleration, head injury criteria (HIC), neck axial force and chest deformation. Results showed that the second peak value of the crash pulse was statistically significant on all these injury criteria (P = 0. 001, 0. 000, 0. 000, 0. 000 re- spectively), the first peak level had a negative significantly effect on all the criteria aforementioned except the chest deformation (P = 0. 011, 0. 038, and 0. 033 respectively), and the interaction of the time-points of first and second peak values had a significant influence on head resultant acceleration (P = 0. 03 ). A higher first peak value and a lower second peak value of the crash pulse could bring deeply lower injury metrics.展开更多
Based on analysis of the syntax structure and semantics model of the metric interval temporal logic (MITL) formulas, it is shown how to transform a formula written in the real-time temporal logic MITL formula into a...Based on analysis of the syntax structure and semantics model of the metric interval temporal logic (MITL) formulas, it is shown how to transform a formula written in the real-time temporal logic MITL formula into a fair timed automaton (TA) that recognizes its satisfying models with prototype verification system (PVS) in this paper. Both the tabular construction's principles and the PVS implementation details are given for the different type of MITL formula according to the corresponding semantics interpretations. After this transformation procedure, specifications expressed with MITL formula can be verified formally in the timed automata framework developed previously.展开更多
In order to quantitatively analyze air traffic operation complexity,multidimensional metrics were selected based on the operational characteristics of traffic flow.The kernel principal component analysis method was ut...In order to quantitatively analyze air traffic operation complexity,multidimensional metrics were selected based on the operational characteristics of traffic flow.The kernel principal component analysis method was utilized to reduce the dimensionality of metrics,therefore to extract crucial information in the metrics.The hierarchical clustering method was used to analyze the complexity of different airspace.Fourteen sectors of Guangzhou Area Control Center were taken as samples.The operation complexity of traffic situation in each sector was calculated based on real flight radar data.Clustering analysis verified the feasibility and rationality of the method,and provided a reference for airspace operation and management.展开更多
In people’s daily life, the role of weatherforecast is self-evident. However, the accuracy offorecasting is based on the accuracy and reliability ofmeteorological data which depends on the sensitivityof meteorologica...In people’s daily life, the role of weatherforecast is self-evident. However, the accuracy offorecasting is based on the accuracy and reliability ofmeteorological data which depends on the sensitivityof meteorological device. Therefore, an importantduty of the detection institution of meteorologicalmetrical device is to have the effective detectionof meteorological device, so as to ensure a highsensitivity of the device. However, the meteorologicaldevice used by some meteorological bureaus is nottechnologically advanced and the device detectionmode is too old, which cannot meet the new regulationsissued by the China Meteorological Administration.So it is necessary for the meteorological bureau todevelop a set of devices that can easily meet the newmeteorological measurement requirements, which is ofgreat significance to ensure the accurate measurementof meteorological data.展开更多
文摘In this article,we study Kahler metrics on a certain line bundle over some compact Kahler manifolds to find complete Kahler metrics with positive holomorphic sectional(or bisectional)curvatures.Thus,we apply a strategy to a famous Yau conjecture with a co-homogeneity one geometry.
文摘Evaluating complex information systems necessitates deep contextual knowledge of technology, user needs, and quality. The quality evaluation challenges increase with the system’s complexity, especially when multiple services supported by varied technological modules, are offered. Existing standards for software quality, such as the ISO25000 series, provide a broad framework for evaluation. Broadness offers initial implementation ease albeit, it often lacks specificity to cater to individual system modules. This paper maps 48 data metrics and 175 software metrics on specific system modules while aligning them with ISO standard quality traits. Using the ISO25000 series as a foundation, especially ISO25010 and 25012, this research seeks to augment the applicability of these standards to multi-faceted systems, exemplified by five distinct software modules prevalent in modern information ecosystems.
文摘Assessment of rock mass quality significantly impacts the design and construction of underground and open-pit mines from the point of stability and economy.This study develops the novel Gromov-Hausdorff distance for rock quality(GHDQR)methodology for rock mass quality rating based on multi-criteria grey metric space.It usually presents the quality of surrounding rock by classes(metric spaces)with specified properties and adequate interval-grey numbers.Measuring the distance between surrounding rock sample characteristics and existing classes represents the core of this study.The Gromov-Hausdorff distance is an especially useful discriminant function,i.e.,a classifier to calculate these distances,and assess the quality of the surrounding rock.The efficiency of the developed methodology is analyzed using the Mean Absolute Percentage Error(MAPE)technique.Seven existing methods,such as the Gaussian cloud method,Discriminant method,Mutation series method,Artificial neural network(ANN),Support vector machine(SVM),Grey wolf optimizer and Support vector classification method(GWO-SVC)and Rock mass rating method(RMR)are used for comparison with the proposed GHDQR method.The share of the highly accurate category of 85.71%clearly indicates compliance with actual values obtained by the compared methods.The results of comparisons showed that the model enables objective,efficient,and reliable assessment of rock mass quality.
基金Supported by the National Natural Science Foundation of China(11771020,12171005).
文摘In this paper,we study a class of Finsler metrics defined by a vector field on a gradient Ricci soliton.We obtain a necessary and sufficient condition for these Finsler metrics on a compact gradient Ricci soliton to be of isotropic S-curvature by establishing a new integral inequality.Then we determine the Ricci curvature of navigation Finsler metrics of isotropic S-curvature on a gradient Ricci soliton generalizing result only known in the case when such soliton is of Einstein type.As its application,we obtain the Ricci curvature of all navigation Finsler metrics of isotropic S-curvature on Gaussian shrinking soliton.
基金Project supported by the Beijing Natural Science Foundation(Grant No.1232026)the Qinxin Talents Program of BISTU(Grant No.QXTCP C201711)+2 种基金the R&D Program of Beijing Municipal Education Commission(Grant No.KM202011232017)the National Natural Science Foundation of China(Grant No.12304190)the Research fund of BISTU(Grant No.2022XJJ32).
文摘We investigate the quantum metric and topological Euler number in a cyclically modulated Su-Schrieffer-Heeger(SSH)model with long-range hopping terms.By computing the quantum geometry tensor,we derive exact expressions for the quantum metric and Berry curvature of the energy band electrons,and we obtain the phase diagram of the model marked by the first Chern number.Furthermore,we also obtain the topological Euler number of the energy band based on the Gauss-Bonnet theorem on the topological characterization of the closed Bloch states manifold in the first Brillouin zone.However,some regions where the Berry curvature is identically zero in the first Brillouin zone result in the degeneracy of the quantum metric,which leads to ill-defined non-integer topological Euler numbers.Nevertheless,the non-integer"Euler number"provides valuable insights and an upper bound for the absolute values of the Chern numbers.
基金approved by the Institutional Ethics Committee(approval number 628-2022 Act No.I22-112 of November 02,2022)following national and international recommendations for human research.In。
文摘Background:Failure to rescue has been an effective quality metric in congenital heart surgery.Conversely,mor-bidity and mortality depend greatly on non-modifiable individual factors and have a weak correlation with better-quality performance.We aim to measure the complications,mortality,and risk factors in pediatric patients undergoing congenital heart surgery in a high-complexity institution located in a middle-income country and compare it with other institutions that have conducted a similar study.Methods:A retrospective observational study was conducted in a high-complexity service provider institution,in Cali,Colombia.All pediatric patients undergoing any congenital heart surgery between 2019 and 2022 were included.The main outcomes evaluated in the study were complication,mortality,and failure to rescue rate.Univariate and multivariate logistic regression analysis was performed with mortality as the outcome variable.Results:We evaluated 308 congenital heart sur-geries.Regarding the outcomes,201(65%)complications occurred,23(7.5%)patients died,and the FTR of the entire cohort was 11.4%.The presence of a postoperative complication(OR 14.88,CI 3.06–268.37,p=0.009),age(OR 0.79,CI 0.57–0.96,p=0.068),and urgent/emergent surgery(OR 8.14,CI 2.97–28.66,p<0.001)were the most significant variables in predicting mortality.Conclusions:Failure to rescue is an effective and comparable quality measure in healthcare institutions and is the major contributor to postoperative mortality in congenital heart surgeries.Despite our higher mortality and complication rate,we obtained a comparable failure to rescue rate to high-income countries’health institutions.
基金supported by the NSFC(11871257,12071130)supported by the NSFC(11971165)。
文摘In this article,we first establish an asymptotically sharp result on the higher order Fréchet derivatives for bounded holomorphic mappings f(x)=f(0)+∞∑s=1Dskf(0)(x^(sk))/(sk)!:B_(X)→B_(Y),where B_X is the unit ball of X.We next give a sharp result on the first order Fréchet derivative for bounded holomorphic mappings F(X)=F(0+)∞∑s=KD^(s)f(0)(x^(8)/s!):B_(X)→B_(Y),where B_(X)is the unit ball of X.The results that we derive include some results in several complex variables,and extend the classical result in one complex variable to several complex variables.
文摘Cross entropy is a measure in machine learning and deep learning that assesses the difference between predicted and actual probability distributions. In this study, we propose cross entropy as a performance evaluation metric for image classifier models and apply it to the CT image classification of lung cancer. A convolutional neural network is employed as the deep neural network (DNN) image classifier, with the residual network (ResNet) 50 chosen as the DNN archi-tecture. The image data used comprise a lung CT image set. Two classification models are built from datasets with varying amounts of data, and lung cancer is categorized into four classes using 10-fold cross-validation. Furthermore, we employ t-distributed stochastic neighbor embedding to visually explain the data distribution after classification. Experimental results demonstrate that cross en-tropy is a highly useful metric for evaluating the reliability of image classifier models. It is noted that for a more comprehensive evaluation of model perfor-mance, combining with other evaluation metrics is considered essential. .
文摘Using the Raychaudhuri equation, we associate quantum probability amplitudes (propagators) to equatorial principal ingoing and outgoing null geodesic congruences in the Kerr metric. The expansion scalars diverge at the ring singularity;however, the propagators remain finite, which is an indication that at the quantum level singularities might disappear or, at least, become softened.
文摘In this paper we introduce the notions of mean dimension and metric mean dimension for non-autonomous iterated function systems(NAIFSs for short)on countably infinite alphabets which can be regarded as generalizations of the mean dimension and the Lindenstrauss metric mean dimension for non-autonomous iterated function systems.We also show the relationship between the mean topological dimension and the metric mean dimension.
文摘Large Language Models (LLMs) have revolutionized Generative Artificial Intelligence (GenAI) tasks, becoming an integral part of various applications in society, including text generation, translation, summarization, and more. However, their widespread usage emphasizes the critical need to enhance their security posture to ensure the integrity and reliability of their outputs and minimize harmful effects. Prompt injections and training data poisoning attacks are two of the most prominent vulnerabilities in LLMs, which could potentially lead to unpredictable and undesirable behaviors, such as biased outputs, misinformation propagation, and even malicious content generation. The Common Vulnerability Scoring System (CVSS) framework provides a standardized approach to capturing the principal characteristics of vulnerabilities, facilitating a deeper understanding of their severity within the security and AI communities. By extending the current CVSS framework, we generate scores for these vulnerabilities such that organizations can prioritize mitigation efforts, allocate resources effectively, and implement targeted security measures to defend against potential risks.
文摘In a very recent article of mine I have corrected the traditional derivation of the Schwarzschild metric thus arriving to formulate a correct Schwarzschild metric different from the traditional Schwarzschild metric. In this article, starting from this correct Schwarzschild metric, I also propose corrections to the other traditional Reissner-Nordstrøm, Kerr and Kerr-Newman metrics on the basis of the fact that these metrics should be equal to the correct Schwarzschild metric in the borderline case in which they reduce to the case described by this metric. In this way, we see that, like the correct Schwarzschild metric, also the correct Reissner-Nordstrøm, Kerr and Kerr-Newman metrics do not present any event horizon (and therefore do not present any black hole) unlike the traditional Reissner-Nordstrøm, Kerr and Kerr-Newman metrics.
基金Supported by National "863" High-Tech Program (No.2006AA04Z231)Foundation of State Key Laboratory of Robotics and Systems (No.SKLRS-200801A02)+1 种基金the College Discipline Innovation Wisdom Plan (No.B07018)Natural Science Foundation of Heilongjiang Province (No.ZJG0709)
文摘A method of topology synthesis based on graph theory and mechanism combination theory was applied to the configuration design of locomotion systems of lunar exploration rovers(LER).Through topology combination of wheel structural unit,suspension unit,and connecting device unit between suspension and load platform,some new locomotion system configurations were proposed and the metrics and indexes to evaluate the performance of the new locomotion system were analyzed.Performance evaluation and comparison between two LER with locomotion systems of different configurations were analyzed.The analysis results indicate that the new locomotion system configuration has good trafficability performance.
文摘In this paper,we prove that for some completions of certain fiber bundles there is a Maxwell-Einstein metric conformally related to any given Kahler class.
基金support of National Natural Science Foundation of China(U1936213)Yunnan Provincial Natural Science Foundation,“Robustness analysis method and coupling mechanism of complex coupled network system”(202101AT070167)Yunnan Provincial Major Science and Technology Program,“Construction and application demonstration of intelligent diagnosis and treatment system for childhood diseases based on intelligent medical platform”(202102AA100021).
文摘With the advancement of network communication technology,network traffic shows explosive growth.Consequently,network attacks occur frequently.Network intrusion detection systems are still the primary means of detecting attacks.However,two challenges continue to stymie the development of a viable network intrusion detection system:imbalanced training data and new undiscovered attacks.Therefore,this study proposes a unique deep learning-based intrusion detection method.We use two independent in-memory autoencoders trained on regular network traffic and attacks to capture the dynamic relationship between traffic features in the presence of unbalanced training data.Then the original data is fed into the triplet network by forming a triplet with the data reconstructed from the two encoders to train.Finally,the distance relationship between the triples determines whether the traffic is an attack.In addition,to improve the accuracy of detecting unknown attacks,this research proposes an improved triplet loss function that is used to pull the distances of the same class closer while pushing the distances belonging to different classes farther in the learned feature space.The proposed approach’s effectiveness,stability,and significance are evaluated against advanced models on the Android Adware and General Malware Dataset(AAGM17),Knowledge Discovery and Data Mining Cup 1999(KDDCUP99),Canadian Institute for Cybersecurity Group’s Intrusion Detection Evaluation Dataset(CICIDS2017),UNSW-NB15,Network Security Lab-Knowledge Discovery and Data Mining(NSL-KDD)datasets.The achieved results confirmed the superiority of the proposed method for the task of network intrusion detection.
文摘Studies were conducted to evaluate driver injury metrics with varying crash pulse in offset crash. First, a vehicle finite element ( FE ) model and an occupant restraint system (ORS) model were developed and validated against tests; then, the crash pulse collected from the test vehicle was equivalent to a dual-trapezoid shape pulse which will be quantitatively described by six parameters and was put into the ORS model; finally, parametric studies were conducted to analyze the sensitivi- ties of parameters of equivalent crash pulse on head resultant acceleration, head injury criteria (HIC), neck axial force and chest deformation. Results showed that the second peak value of the crash pulse was statistically significant on all these injury criteria (P = 0. 001, 0. 000, 0. 000, 0. 000 re- spectively), the first peak level had a negative significantly effect on all the criteria aforementioned except the chest deformation (P = 0. 011, 0. 038, and 0. 033 respectively), and the interaction of the time-points of first and second peak values had a significant influence on head resultant acceleration (P = 0. 03 ). A higher first peak value and a lower second peak value of the crash pulse could bring deeply lower injury metrics.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.60373072, 60673115), the National Basic Research Program of China (Grant No.2002CB312001), and the National High-Technology Research and Development Program of China (Grant No.2007AA012144)
文摘Based on analysis of the syntax structure and semantics model of the metric interval temporal logic (MITL) formulas, it is shown how to transform a formula written in the real-time temporal logic MITL formula into a fair timed automaton (TA) that recognizes its satisfying models with prototype verification system (PVS) in this paper. Both the tabular construction's principles and the PVS implementation details are given for the different type of MITL formula according to the corresponding semantics interpretations. After this transformation procedure, specifications expressed with MITL formula can be verified formally in the timed automata framework developed previously.
基金co-supported by the National Natural Science Foundation of China(No.61304190)the Fundamental Research Funds for the Central Universities of China(No.NJ20150030)the Youth Science and Technology Innovation Fund(No.NS2014067)
文摘In order to quantitatively analyze air traffic operation complexity,multidimensional metrics were selected based on the operational characteristics of traffic flow.The kernel principal component analysis method was utilized to reduce the dimensionality of metrics,therefore to extract crucial information in the metrics.The hierarchical clustering method was used to analyze the complexity of different airspace.Fourteen sectors of Guangzhou Area Control Center were taken as samples.The operation complexity of traffic situation in each sector was calculated based on real flight radar data.Clustering analysis verified the feasibility and rationality of the method,and provided a reference for airspace operation and management.
文摘In people’s daily life, the role of weatherforecast is self-evident. However, the accuracy offorecasting is based on the accuracy and reliability ofmeteorological data which depends on the sensitivityof meteorological device. Therefore, an importantduty of the detection institution of meteorologicalmetrical device is to have the effective detectionof meteorological device, so as to ensure a highsensitivity of the device. However, the meteorologicaldevice used by some meteorological bureaus is nottechnologically advanced and the device detectionmode is too old, which cannot meet the new regulationsissued by the China Meteorological Administration.So it is necessary for the meteorological bureau todevelop a set of devices that can easily meet the newmeteorological measurement requirements, which is ofgreat significance to ensure the accurate measurementof meteorological data.