This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eli...This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eliminate nonlinearities,neural networks are applied to approximate the inherent dynamics of the system.In addition,due to the limitations of the actual working conditions,each follower agent can only obtain the locally measurable partial state information of the leader agent.To address this problem,a neural network state observer based on the leader state information is designed.Then,a finite-time prescribed performance adaptive output feedback control strategy is proposed by restricting the sliding mode surface to a prescribed region,which ensures that the closed-loop system has practical finite-time stability and that formation errors of the multi-agent systems converge to the prescribed performance bound in finite time.Finally,a numerical simulation is provided to demonstrate the practicality and effectiveness of the developed algorithm.展开更多
In this paper,a class of time-varying output group formation containment control problem of general linear hetero-geneous multiagent systems(MASs)is investigated under directed topology.The MAS is composed of a number...In this paper,a class of time-varying output group formation containment control problem of general linear hetero-geneous multiagent systems(MASs)is investigated under directed topology.The MAS is composed of a number of tracking leaders,formation leaders and followers,where two different types of leaders are used to provide reference trajectories for movement and to achieve certain formations,respectively.Firstly,compen-sators are designed whose states are estimations of tracking lead-ers,based on which,a controller is developed for each formation leader to accomplish the expected formation.Secondly,two event-triggered compensators are proposed for each follower to evalu-ate the state and formation information of the formation leaders in the same group,respectively.Subsequently,a control protocol is designed for each follower,utilizing the output information,to guide the output towards the convex hull generated by the forma-tion leaders within the group.Next,the triggering sequence in this paper is decomposed into two sequences,and the inter-event intervals of these two triggering conditions are provided to rule out the Zeno behavior.Finally,a numerical simulation is intro-duced to confirm the validity of the proposed results.展开更多
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens...This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems.展开更多
The Xihu Depression is the largest hydrocarbon-bearing depression of the East China Sea Shelf Basin(also referred to as the ECSSB).However,the depositional systems and reservoir distribution of the Oligocene Huagang F...The Xihu Depression is the largest hydrocarbon-bearing depression of the East China Sea Shelf Basin(also referred to as the ECSSB).However,the depositional systems and reservoir distribution of the Oligocene Huagang Formation in the Xihu Depression are still controversial.Under the guidance of sedimentology and stratigraphy,this study documented a marine-terrestrial transitional environment in the restricted bay setting of the Oligocene Huagang Formation through core description,well logging,and seismic data analysis.This study also revealed that the Oligocene Huagang Formation is dominated by tidal delta,estuary,and gravity flow deposits in the central anticline zone of the Xihu Depression.The new understanding of the sedimentary systems and the discovery of the transgressive gap in the eastern Diaoyu Islands uplift explain the origin of fine-grained sediments and the EW-trending sand bodies in the central depression and the sand bodies parallel to shoreline in the west slope belt,which cannot be explained by previous study results,such as southern transgression or fluvial deltas and even lacustrine deposition.Moreover,the tidal channels,tidal sand flats,and gravity flow sand bodies formed by the transgressive tides are high-quality reservoirs.The study will provide a basis for well placement and serve as guidance for the selection of favorable hydrocarbon exploration areas in the Xihu Depression.展开更多
Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ...Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets.展开更多
The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr...The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.展开更多
Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and ...Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings.展开更多
Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majori...Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majority of following behavior model and overtaking behavior model are imprecise and unrealistic compared with pedestrian movement in the real world.In this study,a pedestrian dynamic model considering detailed modelling of the following behavior and overtaking behavior is constructed,and a method of measuring the lane formation and pedestrian system order based on information entropy is proposed.Simulation and analysis demonstrate that the following and avoidance behaviors are important factors of lane formation.A high tendency of following results in good lane formation.Both non-selective following behavior and aggressive overtaking behavior cause the system order to decrease.The most orderly following strategy for a pedestrian is to overtake the former pedestrian whose speed is lower than approximately 70%of his own.The influence of the obstacle layout on pedestrian lane and egress efficiency is also studied with this model.The presence of a small obstacle does not obstruct the walking of pedestrians;in contrast,it may help to improve the egress efficiency by guiding the pedestrian flow and mitigating the reduction of pedestrian system orderliness.展开更多
The casing deformation prevention technology based on the optimization of cement slurry is proposed to reduce the casing deformation of shale oil and gas wells during hydraulic fracturing. In this paper, the fracture ...The casing deformation prevention technology based on the optimization of cement slurry is proposed to reduce the casing deformation of shale oil and gas wells during hydraulic fracturing. In this paper, the fracture mechanism of hollow particles in cement sheath was firstly analyzed by discrete element method, and the effect of hollow particles in cement on casing deformation was investigated by laboratory experiment method. Finally, field test was carried out to verify the improvement effect of the casing deformation based on cement slurry modification. The results show that the formation displacement can be absorbed effectively by hollow particles inside the cement transferring the excessive deformation away from casing. The particles in the uncemented state provide deformation space during formation slipping. The casing with diameter of 139.7 mm could be passed through by bridge plug with the diameter of 99 mm when the mass ratio of particle/cement reaches 1:4. According to the field test feedback, the method based on optimization of cement slurry can effectively reduce the risk of casing deformation, and the recommended range of hollow microbeads content in the cement slurry is between 15% and 25%.展开更多
Taking the Paleogene Shahejie Formation in Nanpu sag of Bohai Bay Basin as an example,this study comprehensively utilizes seismic,mud logging,well logging,physical property analysis and core thin section data to inves...Taking the Paleogene Shahejie Formation in Nanpu sag of Bohai Bay Basin as an example,this study comprehensively utilizes seismic,mud logging,well logging,physical property analysis and core thin section data to investigate the metamorphic reservoir formed by contact metamorphism after igneous rock intrusion.(1)A geological model of the igneous intrusion contact met amorphic system is proposed,which can be divided into five structural layers vertically:the intrusion,upper metamorphic aureole,lower metamorphic aureole,normal sedimentary layers on the roof and floor.(2)The intrusion is characterized by xenoliths indicating intrusive facies at the top,regular changes in rock texture and mineral crystallization from the center to the edge on a microscopic scale,and low-angle oblique penetrations of the intrusion through sedimentary strata on a macroscopic scale.The metamorphic aureole has characteristics such as sedimentary rocks as the host rock,typical palimpsest textures developed,various low-temperature thermal metamorphic minerals developed,and medium-low grade thermal metamorphic rocks as the lithology.(3)The reservoir in contact metamorphic aureole has two types of reservoir spaces:matrix pores and fractures.The matrix pores are secondary"intergranular pores"distributed around metamorphic minerals after thermal metamorphic transformation in metasandstones.The fractures are mainly structural fractures and intrusive compressive fractures in metamudstones.The reservoirs generally have three spatial distribution characteristics:layered,porphyritic and hydrocarbon impregnation along fracture.(4)The distribution of reservoirs in the metamorphic aureole is mainly controlled by the intensity of thermal baking.Furthermore,the distribution of favorable reservoirs is controlled by the coupling of favorable lithofacies and thermal contact metamorphism,intrusive compression and hydrothermal dissolution.The proposal and application of the geological model of the intrusion contact metamorphic system are expected to promote the discovery of exploration targets of contact metamorphic rock in Nanpu sag,and provide a reference for the study and exploration of deep contact metamorphic rock reservoirs in the Bohai Bay Basin.展开更多
In this paper,the formation control problem of secondorder nonholonomic mobile robot systems is investigated in a dynamic event-triggered scheme.Event-triggered control protocols combined with persistent excitation(PE...In this paper,the formation control problem of secondorder nonholonomic mobile robot systems is investigated in a dynamic event-triggered scheme.Event-triggered control protocols combined with persistent excitation(PE)conditions are presented.In event-detecting processes,an inactive time is introduced after each sampling instant,which can ensure a positive minimum sampling interval.To increase the flexibility of the event-triggered scheme,internal dynamic variables are included in event-triggering conditions.Moreover,the dynamic event-triggered scheme plays an important role in increasing the lengths of time intervals between any two consecutive events.In addition,event-triggered control protocols without forward and angular velocities are also presented based on approximate-differentiation(low-pass)filters.The asymptotic convergence results are given based on a nested Matrosov theorem and artificial sampling methods.展开更多
This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of...This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of-services(DoS)attacks,false-data injection attacks,camouflage attacks,and actuation attacks(AAs).Inspired by the concept of digital twin,a new two-layered protocol equipped with a safe and private twin layer(TL)is proposed,which decouples the above problems into the defense scheme against DoS attacks on the TL and the defense scheme against AAs on the cyber-physical layer.First,a topologyrepairing strategy against frequency-constrained DoS attacks is implemented via a Zeno-free event-triggered estimation scheme,which saves communication resources considerably.The upper bound of the reaction time needed to launch the repaired topology after the occurrence of DoS attacks is calculated.Second,a decentralized adaptive and chattering-relief controller against potentially unbounded AAs is designed.Moreover,this novel adaptive controller can achieve uniformly ultimately bounded convergence,whose error bound can be given explicitly.The practicability and validity of this new two-layered protocol are shown via a simulation example and a UAV swarm experiment equipped with both Ultra-WideBand and WiFi communication channels.展开更多
In the era of rapid information development,with the popularity of computers,the advancement of science and technology,and the ongoing expansion of IT technology and business,the enterprise resource planning(ERP)syste...In the era of rapid information development,with the popularity of computers,the advancement of science and technology,and the ongoing expansion of IT technology and business,the enterprise resource planning(ERP)system has evolved into a platform and a guarantee for the fulfilment of company management procedures after long-term operations.Because of developments in information technology,most manual accounting procedures are being replaced by computerized Accounting Information Systems(AIS),which are quicker and more accurate.The primary factors influencing the decisions of logistics firm trading parties are investigated in order to enhance the design of decision-supporting modules and to improve the performance of logistics enterprises through AIS.This paper proposed a novel approach to calculate the weights of each information element in order to establish their important degree.The main purpose of this research is to present a quantitative analytic approach for determining the important information of logistics business collaboration response.Furthermore,the idea of total orders and the significant degrees stated above are used to identify the optimal order of all information elements.Using the three ways of marginal revenue,marginal cost,and business matching degree,the information with cumulative weights is which is deployed to form the data from the intersection of the best order.It has the ability to drastically reduce the time and effort required to create a logistics business control/decision-making system.展开更多
This paper concerns minimum-energy leader-following formation design and analysis problems of distributed multiagent systems(DMASs)subjected to randomly switching topologies and aperiodic communication pauses.The crit...This paper concerns minimum-energy leader-following formation design and analysis problems of distributed multiagent systems(DMASs)subjected to randomly switching topologies and aperiodic communication pauses.The critical feature of this paper is that the energy consumption during the formation control process is restricted by the minimum-energy constraint in the sense of the linear matrix inequality.Firstly,the leader-following formation control protocol is proposed based on the relative state information of neighboring agents,where the total energy consumption is considered.Then,minimum-energy leader-following formation design and analysis criteria are presented in the form of the linear matrix inequality,which can be checked by the generalized eigenvalue method.Especially,the value of the minimum-energy constraint is determined.An illustrative simulation is provided to show the effectiveness of the main results.展开更多
Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to d...Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems.The value of ISD lies in its ability to guide the design,development,application,and evaluation of largescale information system-of-systems(So Ss),just as mechanical dynamics theories guide mechanical systems engineering.This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space,improving a mathematical theory for information measurement,and proposing a dynamic configuration model for information systems.In this way,it establishes a basic theoretical framework for ISD.The proposed theoretical methodologies have been successfully applied and verified in the Smart Court So Ss Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization.The proposed ISD provides an innovative paradigm for the analysis,design,development,and evaluation of large-scale complex information systems,such as electronic government and smart cities.展开更多
Evaluating complex information systems necessitates deep contextual knowledge of technology, user needs, and quality. The quality evaluation challenges increase with the system’s complexity, especially when multiple ...Evaluating complex information systems necessitates deep contextual knowledge of technology, user needs, and quality. The quality evaluation challenges increase with the system’s complexity, especially when multiple services supported by varied technological modules, are offered. Existing standards for software quality, such as the ISO25000 series, provide a broad framework for evaluation. Broadness offers initial implementation ease albeit, it often lacks specificity to cater to individual system modules. This paper maps 48 data metrics and 175 software metrics on specific system modules while aligning them with ISO standard quality traits. Using the ISO25000 series as a foundation, especially ISO25010 and 25012, this research seeks to augment the applicability of these standards to multi-faceted systems, exemplified by five distinct software modules prevalent in modern information ecosystems.展开更多
Cybersecurity is therefore one of the most important elements of security in developed countries. Especially since there is an overall trend towards cybersecurity in all aspects of life, I have found that the idea of ...Cybersecurity is therefore one of the most important elements of security in developed countries. Especially since there is an overall trend towards cybersecurity in all aspects of life, I have found that the idea of cybersecurity is based on protecting critical facilities: The nation’s information infrastructure. Information systems, including e-government management systems, are managed by key state agencies. As with economic, scientific, commercial, and other systems, threats are threats to a nation’s national security. We have therefore found that many countries are preparing institutions capable of integrating cybersecurity into protection, development, and information security. This concept has become the most important concern of developed countries, which have secured all scientific possibilities and systems to achieve it. The electronic information network has become an integral part of today’s daily lives in all places. In addition to personal uses, digital information is used, processed, stored, and shared. As this information increases and spreads, we have found that its protection has become more vital and has an effective impact on national security and technical progress.展开更多
Instabilities in grid-connected inverters can arise from a number of sources, including mismatched parameters, grid impedance, faults, and feedback delays. Park’s transformation provides accurate control over reactiv...Instabilities in grid-connected inverters can arise from a number of sources, including mismatched parameters, grid impedance, faults, and feedback delays. Park’s transformation provides accurate control over reactive and active (real) power. This enhances the overall efficiency of the system by enabling operators to control reactive power compensation and optimize energy flow. In dynamic settings, this guarantees greater system stability and faster response times. The current paper aims to improve the grid system by utilizing the dq0 controller. The current work focuses on the analysis based on simulations and theory, where the state space equation serves as the basis for dq-axis current decoupling. A MATLAB platform was used to simulate the complete system. TDH values of 2.45%, or less than 5%, in the given results are acceptable. The suggested controller was hence appropriate for grid system applications.展开更多
With the beginning of the information systems’ spreading, people started thinking about using them for making business decisions. Computer technology solutions, such as the Decision Support System, make the decision-...With the beginning of the information systems’ spreading, people started thinking about using them for making business decisions. Computer technology solutions, such as the Decision Support System, make the decision-making process less complex and simpler for problem-solving. In order to make a high-quality business decision, managers need to have a great deal of appropriate information. Nonetheless, this complicates the process of making appropriate decisions. In a situation like that, the possibility of using DSS is quite logical. The aim of this paper is to find out the intended use of DSS for medium and large business organizations in USA by applying the Technology Acceptance Model (TAM). Different models were developed in order to understand and predict the use of information systems, but the information systems community mostly used TAM to ensure this issue. The purpose of the research model is to determine the elements of analysis that contribute to these results. The sample for the research consisted of the target group that was supposed to have completed an online questionnaire about the manager’s use of DSS in medium and large American companies. The information obtained from the questionnaires was analyzed through the SPSS statistical software. The research has indicated that, this is primarily used due to a significant level of Perceived usefulness and For the Perceived ease of use.展开更多
Bone formation and deposition are initiated by sensory nerve infiltration in adaptive bone remodeling. Here, we focused on the role of Semaphorin 3A(Sema3A), expressed by sensory nerves, in mechanical loads-induced bo...Bone formation and deposition are initiated by sensory nerve infiltration in adaptive bone remodeling. Here, we focused on the role of Semaphorin 3A(Sema3A), expressed by sensory nerves, in mechanical loads-induced bone formation and nerve withdrawal using orthodontic tooth movement(OTM) model. Firstly, bone formation was activated after the 3rd day of OTM,coinciding with a decrease in sensory nerves and an increase in pain threshold. Sema3A, rather than nerve growth factor(NGF),highly expressed in both trigeminal ganglion and the axons of periodontal ligament following the 3rd day of OTM. Moreover, in vitro mechanical loads upregulated Sema3A in neurons instead of in human periodontal ligament cells(hPDLCs) within 24 hours.Furthermore, exogenous Sema3A restored the suppressed alveolar bone formation and the osteogenic differentiation of hPDLCs induced by mechanical overload. Mechanistically, Sema3A prevented overstretching of F-actin induced by mechanical overload through ROCK2 pathway, maintaining mitochondrial dynamics as mitochondrial fusion. Therefore, Sema3A exhibits dual therapeutic effects in mechanical loads-induced bone formation, both as a pain-sensitive analgesic and a positive regulator for bone formation.展开更多
基金the National Natural Science Foundation of China(62203356)Fundamental Research Funds for the Central Universities of China(31020210502002)。
文摘This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eliminate nonlinearities,neural networks are applied to approximate the inherent dynamics of the system.In addition,due to the limitations of the actual working conditions,each follower agent can only obtain the locally measurable partial state information of the leader agent.To address this problem,a neural network state observer based on the leader state information is designed.Then,a finite-time prescribed performance adaptive output feedback control strategy is proposed by restricting the sliding mode surface to a prescribed region,which ensures that the closed-loop system has practical finite-time stability and that formation errors of the multi-agent systems converge to the prescribed performance bound in finite time.Finally,a numerical simulation is provided to demonstrate the practicality and effectiveness of the developed algorithm.
基金supported in part by the National Key Research and Development Program of China(2018YFA0702200)the National Natural Science Foundation of China(52377079,62203097,62373196)。
文摘In this paper,a class of time-varying output group formation containment control problem of general linear hetero-geneous multiagent systems(MASs)is investigated under directed topology.The MAS is composed of a number of tracking leaders,formation leaders and followers,where two different types of leaders are used to provide reference trajectories for movement and to achieve certain formations,respectively.Firstly,compen-sators are designed whose states are estimations of tracking lead-ers,based on which,a controller is developed for each formation leader to accomplish the expected formation.Secondly,two event-triggered compensators are proposed for each follower to evalu-ate the state and formation information of the formation leaders in the same group,respectively.Subsequently,a control protocol is designed for each follower,utilizing the output information,to guide the output towards the convex hull generated by the forma-tion leaders within the group.Next,the triggering sequence in this paper is decomposed into two sequences,and the inter-event intervals of these two triggering conditions are provided to rule out the Zeno behavior.Finally,a numerical simulation is intro-duced to confirm the validity of the proposed results.
基金supported in part by the National Natural Science Foundation of China (NSFC)(61703086, 61773106)the IAPI Fundamental Research Funds (2018ZCX27)
文摘This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems.
文摘The Xihu Depression is the largest hydrocarbon-bearing depression of the East China Sea Shelf Basin(also referred to as the ECSSB).However,the depositional systems and reservoir distribution of the Oligocene Huagang Formation in the Xihu Depression are still controversial.Under the guidance of sedimentology and stratigraphy,this study documented a marine-terrestrial transitional environment in the restricted bay setting of the Oligocene Huagang Formation through core description,well logging,and seismic data analysis.This study also revealed that the Oligocene Huagang Formation is dominated by tidal delta,estuary,and gravity flow deposits in the central anticline zone of the Xihu Depression.The new understanding of the sedimentary systems and the discovery of the transgressive gap in the eastern Diaoyu Islands uplift explain the origin of fine-grained sediments and the EW-trending sand bodies in the central depression and the sand bodies parallel to shoreline in the west slope belt,which cannot be explained by previous study results,such as southern transgression or fluvial deltas and even lacustrine deposition.Moreover,the tidal channels,tidal sand flats,and gravity flow sand bodies formed by the transgressive tides are high-quality reservoirs.The study will provide a basis for well placement and serve as guidance for the selection of favorable hydrocarbon exploration areas in the Xihu Depression.
基金This work was supported by the Kyonggi University Research Grant 2022.
文摘Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets.
基金Anhui Province Natural Science Research Project of Colleges and Universities(2023AH040321)Excellent Scientific Research and Innovation Team of Anhui Colleges(2022AH010098).
文摘The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.
文摘Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings.
基金Project supported by the National Natural Science Foundation of China(Grant No.71603146).
文摘Pedestrian self-organizing movement plays a significant role in evacuation studies and architectural design.Lane formation,a typical self-organizing phenomenon,helps pedestrian system to become more orderly,the majority of following behavior model and overtaking behavior model are imprecise and unrealistic compared with pedestrian movement in the real world.In this study,a pedestrian dynamic model considering detailed modelling of the following behavior and overtaking behavior is constructed,and a method of measuring the lane formation and pedestrian system order based on information entropy is proposed.Simulation and analysis demonstrate that the following and avoidance behaviors are important factors of lane formation.A high tendency of following results in good lane formation.Both non-selective following behavior and aggressive overtaking behavior cause the system order to decrease.The most orderly following strategy for a pedestrian is to overtake the former pedestrian whose speed is lower than approximately 70%of his own.The influence of the obstacle layout on pedestrian lane and egress efficiency is also studied with this model.The presence of a small obstacle does not obstruct the walking of pedestrians;in contrast,it may help to improve the egress efficiency by guiding the pedestrian flow and mitigating the reduction of pedestrian system orderliness.
基金the supports of project funded by China Postdoctoral Science Foundation(2023M743886)Project of Shale Gas Evaluation and Exploitation Key Laboratory of Sichuan Province(YSK2023004)youth project funded by Shaanxi Province Natural Science Basic Research Program(2024JC-YBQN-0522)。
文摘The casing deformation prevention technology based on the optimization of cement slurry is proposed to reduce the casing deformation of shale oil and gas wells during hydraulic fracturing. In this paper, the fracture mechanism of hollow particles in cement sheath was firstly analyzed by discrete element method, and the effect of hollow particles in cement on casing deformation was investigated by laboratory experiment method. Finally, field test was carried out to verify the improvement effect of the casing deformation based on cement slurry modification. The results show that the formation displacement can be absorbed effectively by hollow particles inside the cement transferring the excessive deformation away from casing. The particles in the uncemented state provide deformation space during formation slipping. The casing with diameter of 139.7 mm could be passed through by bridge plug with the diameter of 99 mm when the mass ratio of particle/cement reaches 1:4. According to the field test feedback, the method based on optimization of cement slurry can effectively reduce the risk of casing deformation, and the recommended range of hollow microbeads content in the cement slurry is between 15% and 25%.
基金Supported by the Basic Science Research Fund Project of PetroChina Affiliated Institute(2020D-5008-06)。
文摘Taking the Paleogene Shahejie Formation in Nanpu sag of Bohai Bay Basin as an example,this study comprehensively utilizes seismic,mud logging,well logging,physical property analysis and core thin section data to investigate the metamorphic reservoir formed by contact metamorphism after igneous rock intrusion.(1)A geological model of the igneous intrusion contact met amorphic system is proposed,which can be divided into five structural layers vertically:the intrusion,upper metamorphic aureole,lower metamorphic aureole,normal sedimentary layers on the roof and floor.(2)The intrusion is characterized by xenoliths indicating intrusive facies at the top,regular changes in rock texture and mineral crystallization from the center to the edge on a microscopic scale,and low-angle oblique penetrations of the intrusion through sedimentary strata on a macroscopic scale.The metamorphic aureole has characteristics such as sedimentary rocks as the host rock,typical palimpsest textures developed,various low-temperature thermal metamorphic minerals developed,and medium-low grade thermal metamorphic rocks as the lithology.(3)The reservoir in contact metamorphic aureole has two types of reservoir spaces:matrix pores and fractures.The matrix pores are secondary"intergranular pores"distributed around metamorphic minerals after thermal metamorphic transformation in metasandstones.The fractures are mainly structural fractures and intrusive compressive fractures in metamudstones.The reservoirs generally have three spatial distribution characteristics:layered,porphyritic and hydrocarbon impregnation along fracture.(4)The distribution of reservoirs in the metamorphic aureole is mainly controlled by the intensity of thermal baking.Furthermore,the distribution of favorable reservoirs is controlled by the coupling of favorable lithofacies and thermal contact metamorphism,intrusive compression and hydrothermal dissolution.The proposal and application of the geological model of the intrusion contact metamorphic system are expected to promote the discovery of exploration targets of contact metamorphic rock in Nanpu sag,and provide a reference for the study and exploration of deep contact metamorphic rock reservoirs in the Bohai Bay Basin.
基金supported by the Beijing Natural Science Foundation(4222053).
文摘In this paper,the formation control problem of secondorder nonholonomic mobile robot systems is investigated in a dynamic event-triggered scheme.Event-triggered control protocols combined with persistent excitation(PE)conditions are presented.In event-detecting processes,an inactive time is introduced after each sampling instant,which can ensure a positive minimum sampling interval.To increase the flexibility of the event-triggered scheme,internal dynamic variables are included in event-triggering conditions.Moreover,the dynamic event-triggered scheme plays an important role in increasing the lengths of time intervals between any two consecutive events.In addition,event-triggered control protocols without forward and angular velocities are also presented based on approximate-differentiation(low-pass)filters.The asymptotic convergence results are given based on a nested Matrosov theorem and artificial sampling methods.
基金This work was supported in part by the National Natural Science Foundation of China(61903258)Guangdong Basic and Applied Basic Research Foundation(2022A1515010234)+1 种基金the Project of Department of Education of Guangdong Province(2022KTSCX105)Qatar National Research Fund(NPRP12C-0814-190012).
文摘This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of-services(DoS)attacks,false-data injection attacks,camouflage attacks,and actuation attacks(AAs).Inspired by the concept of digital twin,a new two-layered protocol equipped with a safe and private twin layer(TL)is proposed,which decouples the above problems into the defense scheme against DoS attacks on the TL and the defense scheme against AAs on the cyber-physical layer.First,a topologyrepairing strategy against frequency-constrained DoS attacks is implemented via a Zeno-free event-triggered estimation scheme,which saves communication resources considerably.The upper bound of the reaction time needed to launch the repaired topology after the occurrence of DoS attacks is calculated.Second,a decentralized adaptive and chattering-relief controller against potentially unbounded AAs is designed.Moreover,this novel adaptive controller can achieve uniformly ultimately bounded convergence,whose error bound can be given explicitly.The practicability and validity of this new two-layered protocol are shown via a simulation example and a UAV swarm experiment equipped with both Ultra-WideBand and WiFi communication channels.
基金This work was supported by the Researchers Supporting Project(No.RSP-2021/395),King Saud University,Riyadh,Saudi Arabia.
文摘In the era of rapid information development,with the popularity of computers,the advancement of science and technology,and the ongoing expansion of IT technology and business,the enterprise resource planning(ERP)system has evolved into a platform and a guarantee for the fulfilment of company management procedures after long-term operations.Because of developments in information technology,most manual accounting procedures are being replaced by computerized Accounting Information Systems(AIS),which are quicker and more accurate.The primary factors influencing the decisions of logistics firm trading parties are investigated in order to enhance the design of decision-supporting modules and to improve the performance of logistics enterprises through AIS.This paper proposed a novel approach to calculate the weights of each information element in order to establish their important degree.The main purpose of this research is to present a quantitative analytic approach for determining the important information of logistics business collaboration response.Furthermore,the idea of total orders and the significant degrees stated above are used to identify the optimal order of all information elements.Using the three ways of marginal revenue,marginal cost,and business matching degree,the information with cumulative weights is which is deployed to form the data from the intersection of the best order.It has the ability to drastically reduce the time and effort required to create a logistics business control/decision-making system.
基金the National Natural Science Foundation of China(62176263,62103434,62003363)the Science Foundation for Distinguished Youth of Shaanxi Province(2021JC-35)+2 种基金the Youth Talent Promotion Program of Shaanxi Provincial Association for Science and Technology(20220123)the Natural Science Basic Research Program of Shaanxi Province(2022KJXX-99)the National Defense Basic Research Program of Technology and Industry for National Defense(JCKY2021912B001).
文摘This paper concerns minimum-energy leader-following formation design and analysis problems of distributed multiagent systems(DMASs)subjected to randomly switching topologies and aperiodic communication pauses.The critical feature of this paper is that the energy consumption during the formation control process is restricted by the minimum-energy constraint in the sense of the linear matrix inequality.Firstly,the leader-following formation control protocol is proposed based on the relative state information of neighboring agents,where the total energy consumption is considered.Then,minimum-energy leader-following formation design and analysis criteria are presented in the form of the linear matrix inequality,which can be checked by the generalized eigenvalue method.Especially,the value of the minimum-energy constraint is determined.An illustrative simulation is provided to show the effectiveness of the main results.
基金supported by the National Key Research and Development Program of China(2016YFC0800801)the Research and Innovation Project of China University of Political Science and Law(10820356)the Fundamental Research Funds for the Central Universities。
文摘Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems.The value of ISD lies in its ability to guide the design,development,application,and evaluation of largescale information system-of-systems(So Ss),just as mechanical dynamics theories guide mechanical systems engineering.This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space,improving a mathematical theory for information measurement,and proposing a dynamic configuration model for information systems.In this way,it establishes a basic theoretical framework for ISD.The proposed theoretical methodologies have been successfully applied and verified in the Smart Court So Ss Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization.The proposed ISD provides an innovative paradigm for the analysis,design,development,and evaluation of large-scale complex information systems,such as electronic government and smart cities.
文摘Evaluating complex information systems necessitates deep contextual knowledge of technology, user needs, and quality. The quality evaluation challenges increase with the system’s complexity, especially when multiple services supported by varied technological modules, are offered. Existing standards for software quality, such as the ISO25000 series, provide a broad framework for evaluation. Broadness offers initial implementation ease albeit, it often lacks specificity to cater to individual system modules. This paper maps 48 data metrics and 175 software metrics on specific system modules while aligning them with ISO standard quality traits. Using the ISO25000 series as a foundation, especially ISO25010 and 25012, this research seeks to augment the applicability of these standards to multi-faceted systems, exemplified by five distinct software modules prevalent in modern information ecosystems.
文摘Cybersecurity is therefore one of the most important elements of security in developed countries. Especially since there is an overall trend towards cybersecurity in all aspects of life, I have found that the idea of cybersecurity is based on protecting critical facilities: The nation’s information infrastructure. Information systems, including e-government management systems, are managed by key state agencies. As with economic, scientific, commercial, and other systems, threats are threats to a nation’s national security. We have therefore found that many countries are preparing institutions capable of integrating cybersecurity into protection, development, and information security. This concept has become the most important concern of developed countries, which have secured all scientific possibilities and systems to achieve it. The electronic information network has become an integral part of today’s daily lives in all places. In addition to personal uses, digital information is used, processed, stored, and shared. As this information increases and spreads, we have found that its protection has become more vital and has an effective impact on national security and technical progress.
文摘Instabilities in grid-connected inverters can arise from a number of sources, including mismatched parameters, grid impedance, faults, and feedback delays. Park’s transformation provides accurate control over reactive and active (real) power. This enhances the overall efficiency of the system by enabling operators to control reactive power compensation and optimize energy flow. In dynamic settings, this guarantees greater system stability and faster response times. The current paper aims to improve the grid system by utilizing the dq0 controller. The current work focuses on the analysis based on simulations and theory, where the state space equation serves as the basis for dq-axis current decoupling. A MATLAB platform was used to simulate the complete system. TDH values of 2.45%, or less than 5%, in the given results are acceptable. The suggested controller was hence appropriate for grid system applications.
文摘With the beginning of the information systems’ spreading, people started thinking about using them for making business decisions. Computer technology solutions, such as the Decision Support System, make the decision-making process less complex and simpler for problem-solving. In order to make a high-quality business decision, managers need to have a great deal of appropriate information. Nonetheless, this complicates the process of making appropriate decisions. In a situation like that, the possibility of using DSS is quite logical. The aim of this paper is to find out the intended use of DSS for medium and large business organizations in USA by applying the Technology Acceptance Model (TAM). Different models were developed in order to understand and predict the use of information systems, but the information systems community mostly used TAM to ensure this issue. The purpose of the research model is to determine the elements of analysis that contribute to these results. The sample for the research consisted of the target group that was supposed to have completed an online questionnaire about the manager’s use of DSS in medium and large American companies. The information obtained from the questionnaires was analyzed through the SPSS statistical software. The research has indicated that, this is primarily used due to a significant level of Perceived usefulness and For the Perceived ease of use.
基金supported in part by National Natural Science Foundation of China(32271364 & 31971240)Interdisciplinary innovation project from West China Hospital of Stomatology, Sichuan University(RD-03-202305)。
文摘Bone formation and deposition are initiated by sensory nerve infiltration in adaptive bone remodeling. Here, we focused on the role of Semaphorin 3A(Sema3A), expressed by sensory nerves, in mechanical loads-induced bone formation and nerve withdrawal using orthodontic tooth movement(OTM) model. Firstly, bone formation was activated after the 3rd day of OTM,coinciding with a decrease in sensory nerves and an increase in pain threshold. Sema3A, rather than nerve growth factor(NGF),highly expressed in both trigeminal ganglion and the axons of periodontal ligament following the 3rd day of OTM. Moreover, in vitro mechanical loads upregulated Sema3A in neurons instead of in human periodontal ligament cells(hPDLCs) within 24 hours.Furthermore, exogenous Sema3A restored the suppressed alveolar bone formation and the osteogenic differentiation of hPDLCs induced by mechanical overload. Mechanistically, Sema3A prevented overstretching of F-actin induced by mechanical overload through ROCK2 pathway, maintaining mitochondrial dynamics as mitochondrial fusion. Therefore, Sema3A exhibits dual therapeutic effects in mechanical loads-induced bone formation, both as a pain-sensitive analgesic and a positive regulator for bone formation.