Leadership is a complex process.It is one of the most researched areas around the world.It has gained importance in every walk of life from politics to business and from education to social organizations.According to ...Leadership is a complex process.It is one of the most researched areas around the world.It has gained importance in every walk of life from politics to business and from education to social organizations.According to the study of"Leadership in Adult Education Venues",here has a much more clear recognition of leadership:leadership is a process whereby an individual influences a group of individuals to achieve a common goal.There are many approaches of leadership throughout the study of this class,the three theories of leadership I choose to describe in this paper are:Leader-Member Exchange(LMX)Theory,Transformational Leadership,and Team Leadership.展开更多
内斯比特(KateNesbitt)在她的Theorizing A New Agenda for Architecture,An Anthology of Architectural Theory,1965~1995一书中较为全面地介绍了当代西方建筑理论界所关心的主要问题及其相关的思考。对于这些问题,国内建筑理论界也...内斯比特(KateNesbitt)在她的Theorizing A New Agenda for Architecture,An Anthology of Architectural Theory,1965~1995一书中较为全面地介绍了当代西方建筑理论界所关心的主要问题及其相关的思考。对于这些问题,国内建筑理论界也有自己的认识。该文通过对两者的比较,试图理清建筑理论的基本意义,那就是提出问题并引起思考。展开更多
The purpose is to reestablish the balance laws of momentum, angular momentum and energy and to derive the corresponding local and nonlocal balance equations for micromorphic continuum mechanics and couple stress theor...The purpose is to reestablish the balance laws of momentum, angular momentum and energy and to derive the corresponding local and nonlocal balance equations for micromorphic continuum mechanics and couple stress theory. The desired results for micromorphic continuum mechanics and couple stress theory are naturally obtained via direct transitions and reductions from the coupled conservation law of energy for micropolar continuum theory, respectively. The basic balance laws and equations for micromorphic continuum mechanics and couple stress theory are constituted by combining these results derived here and the traditional conservation laws and equations of mass and microinertia and the entropy inequality. The incomplete degrees of the former related continuum theories are clarified. Finally, some special cases are conveniently derived.展开更多
In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at ...In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.展开更多
Dominant technology formation is the key for the hightech industry to“cross the chasm”and gain an established foothold in the market(and hence disrupt the regime).Therefore,a stimulus-response model is proposed to i...Dominant technology formation is the key for the hightech industry to“cross the chasm”and gain an established foothold in the market(and hence disrupt the regime).Therefore,a stimulus-response model is proposed to investigate the dominant technology by exploring its formation process and mechanism.Specifically,based on complex adaptive system theory and the basic stimulus-response model,we use a combination of agent-based modeling and system dynamics modeling to capture the interactions between dominant technology and the socio-technical landscape.The results indicate the following:(i)The dynamic interaction is“stimulus-reaction-selection”,which promotes the dominant technology’s formation.(ii)The dominant technology’s formation can be described as a dynamic process in which the adaptation intensity of technology standards increases continuously until it becomes the leading technology under the dual action of internal and external mechanisms.(iii)The dominant technology’s formation in the high-tech industry is influenced by learning ability,the number of adopting users and adaptability.Therein,a“critical scale”of learning ability exists to promote the formation of leading technology:a large number of adopting users can promote the dominant technology’s formation by influencing the adaptive response of technology standards to the socio-technical landscape and the choice of technology standards by the socio-technical landscape.There is a minimum threshold and a maximum threshold for the role of adaptability in the dominant technology’s formation.(iv)The socio-technical landscape can promote the leading technology’s shaping in the high-tech industry,and different elements have different effects.This study promotes research on the formation mechanism of dominant technology in the high-tech industry,presents new perspectives and methods for researchers,and provides essential enlightenment for managers to formulate technology strategies.展开更多
By basic equations, two basic theories are presented: 1.Theory of stock's value v *(t)=v *(0) exp (ar * 2t); 2. Theory of conservation of stock's energy. Let stock's energy be defined as a q...By basic equations, two basic theories are presented: 1.Theory of stock's value v *(t)=v *(0) exp (ar * 2t); 2. Theory of conservation of stock's energy. Let stock's energy be defined as a quadratic function of stock's price v and its derivative , =Av 2+ Bv+C 2+Dv, under the constraint of basic equation, the problem was reduced to a problem of constrained optimization along optimal path. Using Lagrange multiplier and Euler equation of variation method, it can be proved that keeps conservation for any v,. The application of these equations and theories on judgement and analysis of tendency of stock market are given, and the judgement is checked to be correct by the recorded tendency of Shenzhen and Shanghai stock markets.展开更多
This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhe...This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhering to evidence-based principles.Utilizing the System Function Decoding Model(SFDM),the research progresses through define,quantify,infer,and validate phases to systematically explore TCM’s material basis.It employs a dual analytical approach that combines top-down,systems theory-guided perspectives with bottom-up,elements-structure-function methodologies,provides comprehensive insights into TCM’s holistic material basis.Moreover,the research examines AI’s role in quantitative assessment and predictive analysis of TCM’s material components,proposing two specific AIdriven technical applications.This interdisciplinary effort underscores AI’s potential to enhance our understanding of TCM’s holistic material basis and establishes a foundation for future research at the intersection of traditional wisdom and modern technology.展开更多
Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties...Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.展开更多
The three core issues in the“digital human rights”debate are whether“digital human rights”are possible,necessary,and feasible.Both sides of the debate focus on discovering the value of“digital human rights”to in...The three core issues in the“digital human rights”debate are whether“digital human rights”are possible,necessary,and feasible.Both sides of the debate focus on discovering the value of“digital human rights”to individuals from a semantic level,but ignore the significance of“digital human rights”to the whole society and its subsystems at the level of social structure.By introducing Niklas Luhmann's System Theory,this observation blind spot can be eliminated.Fundamental rights are devoted to directly shaping not a physiological-psychological“individual”as a social environment but a social“person”that can be included by social systems.It is clear that digital human rights are the right to participate in digital communication of a“human”as a“person”,so they are possible in terms of conceptual definition.Digital human rights can help“people”lower the threshold for participation in digital communication,limit the excessive expansion of social systems,and promote the free and complete expression of body and mind,so they are necessary for social functions.There are limitations in the existing two ideas of“incorporating digital human rights into the constitution”.Based on the new construction idea of System Theory of Law,digital human rights as the right to participate in digital communication can be typified into digital communication in social sub-fields such as politics,economy,science,and art.The right to participate constructs a complete digital human rights system,making it feasible on the basis of the constitution.展开更多
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf...Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.展开更多
The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessmen...The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted.展开更多
BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to e...BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to enhance the psychological well-being and overall quality of life for primipara,while also furnishing healthcare providers with efficacious interventions to tackle the psychological and physiological obstacles encountered during the stages of pregnancy and postpartum.AIM To explore the effect of timing theory combined with behavior change on selfefficacy,negative emotions and quality of life in patients with primipara.METHODS A total of 80 primipara cases were selected and admitted to our hospital between August 2020 and May 2022.These cases were divided into two groups,namely the observation group and the control group,with 40 cases in each group.The nursing interventions differed between the two groups,with the control group receiving routine nursing and the observation group receiving integrated nursing based on the timing theory and behavior change.The study aimed to compare the pre-and post-nursing scores of Chinese Perceived Stress Scale(CPSS),Edinburgh Postpartum Depression Scale(EPDS),Self-rating Anxiety Scale(SAS),breast milk knowledge,self-efficacy,and SF-36 quality of life in both groups.RESULTS After nursing,the CPSS,EPDS,and SAS scores of the two groups was significantly lower than that before nursing,and the CPSS,EPDS,and SAS scores of the observation group was significantly lower than that of the control group(P=0.002,P=0.011,and P=0.001 respectively).After nursing,the breastfeeding knowledge mastery,selfefficacy,and SF-36 quality of life scores was significantly higher than that before nursing,and the breastfeeding knowledge mastery(P=0.013),self-efficacy(P=0.008),and SF-36 quality of life(P=0.011)scores of the observation group was significantly higher than that of the control group.CONCLUSION The integration of timing theory and behavior change integrated theory has been found to be an effective approach in alleviating negative mood and stress experienced by primipara individuals,while also enhancing their selfefficacy and overall quality of life.This study focuses on the key concepts of timing theory,behavior change,primipara individuals,negative mood,and quality of life.展开更多
Using the Skyrme density functional theory,potential energy surfaces of^(240)Pu with constraints on the axial quadrupole and octupole deformations(q_(20)and q_(30))were calculated.The volume-like and surface-like pair...Using the Skyrme density functional theory,potential energy surfaces of^(240)Pu with constraints on the axial quadrupole and octupole deformations(q_(20)and q_(30))were calculated.The volume-like and surface-like pairing forces,as well as a combination of these two forces,were used for the Hartree–Fock–Bogoliubov approximation.Variations in the least-energy fission path,fission barrier,pairing energy,total kinetic energy,scission line,and mass distribution of the fission fragments based on the different forms of the pairing forces were analyzed and discussed.The fission dynamics were studied based on the timedependent generator coordinate method plus the Gaussian overlap approximation.The results demonstrated a sensitivity of the mass and charge distributions of the fission fragments on the form of the pairing force.Based on the investigation of the neutron-induced fission of^(239)Pu,among the volume,mixed,and surface pairing forces,the mixed pairing force presented a good reproduction of the experimental data.展开更多
The authors discuss contradictions between the principal branches of the modern physical picture of the universe. Space and time have been shown in the Unitary Quantum Theory (UQT) not to be connected one with the oth...The authors discuss contradictions between the principal branches of the modern physical picture of the universe. Space and time have been shown in the Unitary Quantum Theory (UQT) not to be connected one with the other, unlike in the Special Theory of Relativity. In UQT, time becomes Newtonian again, and the growth of the particle’s mass with growing speed proceeds from other considerations of physics. Unlike the quantum theory, the modern gravitation theory (the general theory of relativity) is not confirmed by experiments and needs to be considerably revised.展开更多
We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implemen...We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implementedthe charge self-consistent DFT+DMFT formalism by interfacing a full-potential all-electron DFT code with threehybridization expansion-based continuous-time quantum Monte Carlo impurity solvers.The benchmarks on several 3d,4fand 5f strongly correlated electron systems validated our formalism and implementation.Furthermore,within the LCANOframework,our formalism is general and the code architecture is extensible,so it can work as a bridge merging differentLCNAO DFT packages and impurity solvers to do charge self-consistent DFT+DMFT calculations.展开更多
This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the c...This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.展开更多
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea...The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.展开更多
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical ach...In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.展开更多
Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past...Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past three decades,significant progress in materials science,microfabrication,and various applications has boosted the development of promising functional microfluidic devices.In this review,the recent progress on novel microfluidic devices with various functions and applications is presented.First,the theory and numerical methods for studying the performance of microfluidic devices are briefly introduced.Then,materials and fabrication methods of functional microfluidic devices are summarized.Next,the recent significant advances in applications of microfluidic devices are highlighted,including heat sinks,clean water production,chemical reactions,sensors,biomedicine,capillaric circuits,wearable electronic devices,and microrobotics.Finally,perspectives on the challenges and future developments of functional microfluidic devices are presented.This review aims to inspire researchers from various fields engineering,materials,chemistry,mathematics,physics,and more—to collaborate and drive forward the development and applications of functional microfluidic devices,specifically for achieving carbon neutrality.展开更多
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t...The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.展开更多
文摘Leadership is a complex process.It is one of the most researched areas around the world.It has gained importance in every walk of life from politics to business and from education to social organizations.According to the study of"Leadership in Adult Education Venues",here has a much more clear recognition of leadership:leadership is a process whereby an individual influences a group of individuals to achieve a common goal.There are many approaches of leadership throughout the study of this class,the three theories of leadership I choose to describe in this paper are:Leader-Member Exchange(LMX)Theory,Transformational Leadership,and Team Leadership.
文摘内斯比特(KateNesbitt)在她的Theorizing A New Agenda for Architecture,An Anthology of Architectural Theory,1965~1995一书中较为全面地介绍了当代西方建筑理论界所关心的主要问题及其相关的思考。对于这些问题,国内建筑理论界也有自己的认识。该文通过对两者的比较,试图理清建筑理论的基本意义,那就是提出问题并引起思考。
文摘The purpose is to reestablish the balance laws of momentum, angular momentum and energy and to derive the corresponding local and nonlocal balance equations for micromorphic continuum mechanics and couple stress theory. The desired results for micromorphic continuum mechanics and couple stress theory are naturally obtained via direct transitions and reductions from the coupled conservation law of energy for micropolar continuum theory, respectively. The basic balance laws and equations for micromorphic continuum mechanics and couple stress theory are constituted by combining these results derived here and the traditional conservation laws and equations of mass and microinertia and the entropy inequality. The incomplete degrees of the former related continuum theories are clarified. Finally, some special cases are conveniently derived.
基金supported by the National Natural Science Foundation of China under Grant Nos.12122401 and 12074007.
文摘In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.
基金supported by the Shanghai Philosophy and Social Science Foundation(2022ECK004)Shanghai Soft Science Research Project(23692123400)。
文摘Dominant technology formation is the key for the hightech industry to“cross the chasm”and gain an established foothold in the market(and hence disrupt the regime).Therefore,a stimulus-response model is proposed to investigate the dominant technology by exploring its formation process and mechanism.Specifically,based on complex adaptive system theory and the basic stimulus-response model,we use a combination of agent-based modeling and system dynamics modeling to capture the interactions between dominant technology and the socio-technical landscape.The results indicate the following:(i)The dynamic interaction is“stimulus-reaction-selection”,which promotes the dominant technology’s formation.(ii)The dominant technology’s formation can be described as a dynamic process in which the adaptation intensity of technology standards increases continuously until it becomes the leading technology under the dual action of internal and external mechanisms.(iii)The dominant technology’s formation in the high-tech industry is influenced by learning ability,the number of adopting users and adaptability.Therein,a“critical scale”of learning ability exists to promote the formation of leading technology:a large number of adopting users can promote the dominant technology’s formation by influencing the adaptive response of technology standards to the socio-technical landscape and the choice of technology standards by the socio-technical landscape.There is a minimum threshold and a maximum threshold for the role of adaptability in the dominant technology’s formation.(iv)The socio-technical landscape can promote the leading technology’s shaping in the high-tech industry,and different elements have different effects.This study promotes research on the formation mechanism of dominant technology in the high-tech industry,presents new perspectives and methods for researchers,and provides essential enlightenment for managers to formulate technology strategies.
文摘By basic equations, two basic theories are presented: 1.Theory of stock's value v *(t)=v *(0) exp (ar * 2t); 2. Theory of conservation of stock's energy. Let stock's energy be defined as a quadratic function of stock's price v and its derivative , =Av 2+ Bv+C 2+Dv, under the constraint of basic equation, the problem was reduced to a problem of constrained optimization along optimal path. Using Lagrange multiplier and Euler equation of variation method, it can be proved that keeps conservation for any v,. The application of these equations and theories on judgement and analysis of tendency of stock market are given, and the judgement is checked to be correct by the recorded tendency of Shenzhen and Shanghai stock markets.
基金supported by the National Natural Science Foundation of China(82230117).
文摘This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhering to evidence-based principles.Utilizing the System Function Decoding Model(SFDM),the research progresses through define,quantify,infer,and validate phases to systematically explore TCM’s material basis.It employs a dual analytical approach that combines top-down,systems theory-guided perspectives with bottom-up,elements-structure-function methodologies,provides comprehensive insights into TCM’s holistic material basis.Moreover,the research examines AI’s role in quantitative assessment and predictive analysis of TCM’s material components,proposing two specific AIdriven technical applications.This interdisciplinary effort underscores AI’s potential to enhance our understanding of TCM’s holistic material basis and establishes a foundation for future research at the intersection of traditional wisdom and modern technology.
文摘Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.
基金a phased achievement of the research project“Research on the Basic Issues of Digital Rule of Law from the Perspective of System Theory”(Project Approval Number 22AZD149)。
文摘The three core issues in the“digital human rights”debate are whether“digital human rights”are possible,necessary,and feasible.Both sides of the debate focus on discovering the value of“digital human rights”to individuals from a semantic level,but ignore the significance of“digital human rights”to the whole society and its subsystems at the level of social structure.By introducing Niklas Luhmann's System Theory,this observation blind spot can be eliminated.Fundamental rights are devoted to directly shaping not a physiological-psychological“individual”as a social environment but a social“person”that can be included by social systems.It is clear that digital human rights are the right to participate in digital communication of a“human”as a“person”,so they are possible in terms of conceptual definition.Digital human rights can help“people”lower the threshold for participation in digital communication,limit the excessive expansion of social systems,and promote the free and complete expression of body and mind,so they are necessary for social functions.There are limitations in the existing two ideas of“incorporating digital human rights into the constitution”.Based on the new construction idea of System Theory of Law,digital human rights as the right to participate in digital communication can be typified into digital communication in social sub-fields such as politics,economy,science,and art.The right to participate constructs a complete digital human rights system,making it feasible on the basis of the constitution.
基金supported by the National Natural Science Foundation of China(Nos.51977113,62293500,62293501 and 62293505).
文摘Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.
基金the“Application of the Dynamic System Theory in the Determination of Infringement Liability for Immaterial Personality Rights in the Civil Code”(Project Approval Number 2022MFXH006)a project of the young scholar research program of the Civil Law Society of CLS in 2022。
文摘The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted.
文摘BACKGROUND The comprehension and utilization of timing theory and behavior change can offer a more extensive and individualized provision of support and treatment alternatives for primipara.This has the potential to enhance the psychological well-being and overall quality of life for primipara,while also furnishing healthcare providers with efficacious interventions to tackle the psychological and physiological obstacles encountered during the stages of pregnancy and postpartum.AIM To explore the effect of timing theory combined with behavior change on selfefficacy,negative emotions and quality of life in patients with primipara.METHODS A total of 80 primipara cases were selected and admitted to our hospital between August 2020 and May 2022.These cases were divided into two groups,namely the observation group and the control group,with 40 cases in each group.The nursing interventions differed between the two groups,with the control group receiving routine nursing and the observation group receiving integrated nursing based on the timing theory and behavior change.The study aimed to compare the pre-and post-nursing scores of Chinese Perceived Stress Scale(CPSS),Edinburgh Postpartum Depression Scale(EPDS),Self-rating Anxiety Scale(SAS),breast milk knowledge,self-efficacy,and SF-36 quality of life in both groups.RESULTS After nursing,the CPSS,EPDS,and SAS scores of the two groups was significantly lower than that before nursing,and the CPSS,EPDS,and SAS scores of the observation group was significantly lower than that of the control group(P=0.002,P=0.011,and P=0.001 respectively).After nursing,the breastfeeding knowledge mastery,selfefficacy,and SF-36 quality of life scores was significantly higher than that before nursing,and the breastfeeding knowledge mastery(P=0.013),self-efficacy(P=0.008),and SF-36 quality of life(P=0.011)scores of the observation group was significantly higher than that of the control group.CONCLUSION The integration of timing theory and behavior change integrated theory has been found to be an effective approach in alleviating negative mood and stress experienced by primipara individuals,while also enhancing their selfefficacy and overall quality of life.This study focuses on the key concepts of timing theory,behavior change,primipara individuals,negative mood,and quality of life.
基金supported by the National Key R&D Program of China(No.2022YFA1602000)National Natural Science Foundation of China(Nos.12275081,U2067205,11790325,and U1732138)the Continuous-support Basic Scientific Research Project。
文摘Using the Skyrme density functional theory,potential energy surfaces of^(240)Pu with constraints on the axial quadrupole and octupole deformations(q_(20)and q_(30))were calculated.The volume-like and surface-like pairing forces,as well as a combination of these two forces,were used for the Hartree–Fock–Bogoliubov approximation.Variations in the least-energy fission path,fission barrier,pairing energy,total kinetic energy,scission line,and mass distribution of the fission fragments based on the different forms of the pairing forces were analyzed and discussed.The fission dynamics were studied based on the timedependent generator coordinate method plus the Gaussian overlap approximation.The results demonstrated a sensitivity of the mass and charge distributions of the fission fragments on the form of the pairing force.Based on the investigation of the neutron-induced fission of^(239)Pu,among the volume,mixed,and surface pairing forces,the mixed pairing force presented a good reproduction of the experimental data.
文摘The authors discuss contradictions between the principal branches of the modern physical picture of the universe. Space and time have been shown in the Unitary Quantum Theory (UQT) not to be connected one with the other, unlike in the Special Theory of Relativity. In UQT, time becomes Newtonian again, and the growth of the particle’s mass with growing speed proceeds from other considerations of physics. Unlike the quantum theory, the modern gravitation theory (the general theory of relativity) is not confirmed by experiments and needs to be considerably revised.
文摘We present a formalism of charge self-consistent dynamical mean field theory(DMFT)in combination with densityfunctional theory(DFT)within the linear combination of numerical atomic orbitals(LCNAO)framework.We implementedthe charge self-consistent DFT+DMFT formalism by interfacing a full-potential all-electron DFT code with threehybridization expansion-based continuous-time quantum Monte Carlo impurity solvers.The benchmarks on several 3d,4fand 5f strongly correlated electron systems validated our formalism and implementation.Furthermore,within the LCANOframework,our formalism is general and the code architecture is extensible,so it can work as a bridge merging differentLCNAO DFT packages and impurity solvers to do charge self-consistent DFT+DMFT calculations.
文摘This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.
文摘The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFB1804604).
文摘In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.
基金supported by the National Natural Science Foundation of China(52006056)the Key-Area Research and Development Program of Guangdong Province(2020B090923003)The project was also partly supported by Natural Research Institute for Family Planning as well。
文摘Microfluidic devices are composed of microchannels with a diameter ranging from ten to a few hundred micrometers.Thus,quite a small(10-9–10-18l)amount of liquid can be manipulated by such a precise system.In the past three decades,significant progress in materials science,microfabrication,and various applications has boosted the development of promising functional microfluidic devices.In this review,the recent progress on novel microfluidic devices with various functions and applications is presented.First,the theory and numerical methods for studying the performance of microfluidic devices are briefly introduced.Then,materials and fabrication methods of functional microfluidic devices are summarized.Next,the recent significant advances in applications of microfluidic devices are highlighted,including heat sinks,clean water production,chemical reactions,sensors,biomedicine,capillaric circuits,wearable electronic devices,and microrobotics.Finally,perspectives on the challenges and future developments of functional microfluidic devices are presented.This review aims to inspire researchers from various fields engineering,materials,chemistry,mathematics,physics,and more—to collaborate and drive forward the development and applications of functional microfluidic devices,specifically for achieving carbon neutrality.
基金funded by the“Ling Yan”Research and Development Project of Science Technology Department of Zhejiang Province of China under Grants No.2022C03122Public Welfare Technology Application and Research Projects of Science Technology Department of Zhejiang Province of China under Grants No.LGF22F020006 and LGF21F010004.
文摘The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.