From the perspective of a community energy operator,a two-stage optimal scheduling model of a community integrated energy system is proposed by integrating information on controllable loads.The day-ahead scheduling an...From the perspective of a community energy operator,a two-stage optimal scheduling model of a community integrated energy system is proposed by integrating information on controllable loads.The day-ahead scheduling analyzes whether various controllable loads participate in the optimization and investigates the impact of their responses on the operating economy of the community integrated energy system(IES)before and after;the intra-day scheduling proposes a two-stage rolling optimization model based on the day-ahead scheduling scheme,taking into account the fluctuation of wind turbine output and load within a short period of time and according to the different response rates of heat and cooling power,and solves the adjusted output of each controllable device.The simulation results show that the optimal scheduling of controllable loads effectively reduces the comprehensive operating costs of community IES;the two-stage optimal scheduling model can meet the energy demand of customers while effectively and timely suppressing the random fluctuations on both sides of the source and load during the intra-day stage,realizing the economic and smooth operation of IES.展开更多
A two-stage catalytic membrane reactor(CMR)that couples CO_(2) splitting with methane oxidation reactions was constructed based on an oxygen-permeable perovskite asymmetric membrane.The asymmetric membrane comprises a...A two-stage catalytic membrane reactor(CMR)that couples CO_(2) splitting with methane oxidation reactions was constructed based on an oxygen-permeable perovskite asymmetric membrane.The asymmetric membrane comprises a dense SrFe_(0.9)Ta_(0.1)O_(3-σ)(SFT)separation layer and a porous Sr_(0.9)(Fe_(0.9)Ta_(0.1))_(0.9)Cu_(0.1)O_(3-σ)(SFTC)catalytic layer.In thefirst stage reactor,a CO_(2) splitting reaction(CDS:2CO_(2)→2CO+O_(2))occurs at the SFTC catalytic layer.Subsequently,the O_(2) product is selectively extracted through the SFT separation layer to the permeated side for the methane combustion reaction(MCR),which provides an extremely low oxygen partial pressure to enhance the oxygen extraction.In the second stage,a Sr_(0.9)(Fe_(0.9)Ta_(0.1))_(0.9)Ni_(0.1)O_(3-σ)(SFTN)catalyst is employed to reform the products derived from MCR.The two-stage CMR design results in a remarkable 35.4%CO_(2) conversion for CDS at 900℃.The two-stage CMR was extended to a hollowfiber configuration combining with solar irradiation.The solar-assisted two-stage CMR can operate stably for over 50 h with a high hydrogen yield of 18.1 mL min^(-1) cm^(-2).These results provide a novel strategy for reducing CO_(2) emissions,suggesting potential avenues for the design of the high-performance CMRs and catalysts based on perovskite oxides in the future.展开更多
Aiming at the consumption problems caused by the high proportion of renewable energy being connected to the distribution network,it also aims to improve the power supply reliability of the power system and reduce the ...Aiming at the consumption problems caused by the high proportion of renewable energy being connected to the distribution network,it also aims to improve the power supply reliability of the power system and reduce the operating costs of the power system.This paper proposes a two-stage planning method for distributed generation and energy storage systems that considers the hierarchical partitioning of source-storage-load.Firstly,an electrical distance structural index that comprehensively considers active power output and reactive power output is proposed to divide the distributed generation voltage regulation domain and determine the access location and number of distributed power sources.Secondly,a two-stage planning is carried out based on the zoning results.In the phase 1 distribution network-zoning optimization layer,the network loss is minimized so that the node voltage in the area does not exceed the limit,and the distributed generation configuration results are initially determined;in phase 2,the partition-node optimization layer is planned with the goal of economic optimization,and the distance-based improved ant lion algorithm is used to solve the problem to obtain the optimal distributed generation and energy storage systemconfiguration.Finally,the IEEE33 node systemwas used for simulation.The results showed that the voltage quality was significantly improved after optimization,and the overall revenue increased by about 20.6%,verifying the effectiveness of the two-stage planning.展开更多
Rapeseed(Brassica napus L.)harvesting method is critical since it significantly determines the seed yield,oil quality,and industrial efficiency.This study investigated the influences of harvesting methods on the quali...Rapeseed(Brassica napus L.)harvesting method is critical since it significantly determines the seed yield,oil quality,and industrial efficiency.This study investigated the influences of harvesting methods on the quality of cold-pressed rapeseed oil of two varieties.Oil color,peroxide value(POV),tocopherol content,fatty acid composition,and polarity of total polyphenols(PTP)contents of two rapeseed varieties in Huanggang and Xiangyang were compared through artificially simulated combined harvesting and two-stage harvesting.Results showed significant differences in the quality of rapeseed oil between the two harvesting methods.The red value(R-value),POV,total tocopherol contents,linoleic and linolenic acid content,and PTP content of the pressed rapeseed oil prepared by the combined harvesting method were about 27.6,5.7,15.8,2.0,0.5,and 28.6%lower than those of the oil produced from the two-stage harvesting method,respectively.Xiangyang and Huayouza62 performed better in the two regions and two varieties,respectively.To sum up,the rapeseed oil obtained 41–44 days after final flowering of combined harvesting,35 days after final flowering,and six days of post-ripening of the two-stage harvesting had the best quality.展开更多
Tourism route planning is widely applied in the smart tourism field.The Pareto-optimal front obtained by the traditional multi-objective evolutionary algorithm exhibits long tails,sharp peaks and disconnected regions ...Tourism route planning is widely applied in the smart tourism field.The Pareto-optimal front obtained by the traditional multi-objective evolutionary algorithm exhibits long tails,sharp peaks and disconnected regions problems,which leads to uneven distribution and weak diversity of optimization solutions of tourism routes.Inspired by these limitations,we propose a multi-objective evolutionary algorithm for tourism route recommendation(MOTRR)with two-stage and Pareto layering based on decomposition.The method decomposes the multiobjective problem into several subproblems,and improves the distribution of solutions through a two-stage method.The crowding degree mechanism between extreme and intermediate populations is used in the two-stage method.The neighborhood is determined according to the weight of the subproblem for crossover mutation.Finally,Pareto layering is used to improve the updating efficiency and population diversity of the solution.The two-stage method is combined with the Pareto layering structure,which not only maintains the distribution and diversity of the algorithm,but also avoids the same solutions.Compared with several classical benchmark algorithms,the experimental results demonstrate competitive advantages on five test functions,hypervolume(HV)and inverted generational distance(IGD)metrics.Using the experimental results of real scenic spot datasets from two famous tourism social networking sites with vast amounts of users and large-scale online comments in Beijing,our proposed algorithm shows better distribution.It proves that the tourism routes recommended by our proposed algorithm have better distribution and diversity,so that the recommended routes can better meet the personalized needs of tourists.展开更多
After suffering from a grid blackout, distributed energy resources(DERs), such as local renewable energy and controllable distributed generators and energy storage can be used to restore loads enhancing the system’s ...After suffering from a grid blackout, distributed energy resources(DERs), such as local renewable energy and controllable distributed generators and energy storage can be used to restore loads enhancing the system’s resilience. In this study, a multi-source coordinated load restoration strategy was investigated for a distribution network with soft open points(SOPs). Here, the flexible regulation ability of the SOPs is fully utilized to improve the load restoration level while mitigating voltage deviations. Owing to the uncertainty, a scenario-based stochastic optimization approach was employed,and the load restoration problem was formulated as a mixed-integer nonlinear programming model. A computationally efficient solution algorithm was developed for the model using convex relaxation and linearization methods. The algorithm is organized into a two-stage structure, in which the energy storage system is dispatched in the first stage by solving a relaxed convex problem. In the second stage, an integer programming problem is calculated to acquire the outputs of both SOPs and power resources. A numerical test was conducted on both IEEE 33-bus and IEEE 123-bus systems to validate the effectiveness of the proposed strategy.展开更多
Periprosthetic joint infection(PJI)following total knee arthroplasty is one of the most catastrophic and costly complications that carries significant patient wellness as well as economic burdens.The road to efficient...Periprosthetic joint infection(PJI)following total knee arthroplasty is one of the most catastrophic and costly complications that carries significant patient wellness as well as economic burdens.The road to efficiently diagnosing and treating PJI is challenging,as there is still no gold standard method to reach the diagnosis as early as desired.There are also international controversies with respect to the best approach to manage PJI cases.In this review,we highlight recent advances in managing PJI following knee arthroplasty surgery and discuss in depth the two-stage revision method.展开更多
Limb length discrepancy(LLD)is a common orthopedic condition that can result in significant functional impairment,pain,and cosmetic deformities.Current reconstructive techniques for severe LLD are primarily based on c...Limb length discrepancy(LLD)is a common orthopedic condition that can result in significant functional impairment,pain,and cosmetic deformities.Current reconstructive techniques for severe LLD are primarily based on callus distraction,which is a time-consuming process that can lead to complications,such as significant infection,joint stiffness,and stress fractures.To reduce the therapeutic time and minimize the risk of complications,we investigated the use of vascularized bone flaps as a technical supplement to callus distraction in the reconstruction of short limbs.We present two cases of severe LLD in the upper and lower legs,in which a twostage reconstruction approach was used.In the first stage,external fixation was applied to the affected limb to correct the soft tissue length and convert the short deformity into a bone defect.In the second stage,the bone defect was reconstructed using bilateral(patient A)or unilateral(patient B)free vascularized fibula bone grafts.Both patients had complete survival of the fibular grafts without stress fractures,and bone consolidation took 8 months(patient A)and 4 months(patient B).Compared to the traditional callus distraction,the two-stage approach was found to be more time-saving and reliable.The entire reconstructive scheme required 18 and 4 months for patients A and B,respectively,whereas the traditional callus distraction required 41 and 17 months,respectively.These findings suggest that the use of vascularized bone flaps as a technical supplement for callus distraction may provide an effective and efficient alternative for the treatment of severe LLD.Further studies are needed to validate these results and assess the long-term outcomes of this approach.展开更多
In order to improve the rejection capability of mismatched interferer signals,a new two-stage detector is proposed under homogeneous scenarios with unknown covariance matrix,which is obtained by cascading the adaptive...In order to improve the rejection capability of mismatched interferer signals,a new two-stage detector is proposed under homogeneous scenarios with unknown covariance matrix,which is obtained by cascading the adaptive matched filter(AMF)detector and the enhanced RAO(EnRAO)detector.The new detector has constant false alarm performance,and the closed-form expression of probability of false alarm and probability of detection is derived.The performance of the new detector is assessed,and analyzed in comparison with other detectors.The results show that,the proposed detector can provide enhanced rejection capability in the case of mismatch,but the performance of the detector is slightly lost under the condition of matching.展开更多
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea...The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.展开更多
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor...This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.展开更多
The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conve...The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conventional smart contract vulnerability detection primarily relies on static analysis tools,which are less efficient and accurate.Although deep learning methods have improved detection efficiency,they are unable to fully utilize the static relationships within contracts.Therefore,we have adopted the advantages of the above two methods,combining feature extraction mode of tools with deep learning techniques.Firstly,we have constructed corresponding feature extraction mode for different vulnerabilities,which are used to extract feature graphs from the source code of smart contracts.Then,the node features in feature graphs are fed into a graph convolutional neural network for training,and the edge features are processed using a method that combines attentionmechanismwith gated units.Ultimately,the revised node features and edge features are concatenated through amulti-head attentionmechanism.The result of the splicing is a global representation of the entire feature graph.Our method was tested on three types of data:Timestamp vulnerabilities,reentrancy vulnerabilities,and access control vulnerabilities,where the F1 score of our method reaches 84.63%,92.55%,and 61.36%.The results indicate that our method surpasses most others in detecting smart contract vulnerabilities.展开更多
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi...In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.展开更多
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a...Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.展开更多
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su...With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value.展开更多
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno...The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.展开更多
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu...The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades.展开更多
In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on...In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on the electron radius under motion, incorporating the effects of length contraction. The findings suggest that the radius is subject to Lorentz contraction, which has interesting implications for relativistic effects at the subatomic level.展开更多
Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satis...Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satisfaction,and ultimately promote sales and maximize profit for the manufacturer.By considering the combinations of corrective maintenance and preventive maintenance,totally three types of maintenance service contracts are designed.Moreover,attractive incentive and penalty mechanisms are adopted in the contracts.On this basis,Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers,and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation.Numerical experiments are conducted.The results show that by taking into account the incentive and penalty mechanisms,the revenue can be improved for both the customers and manufacturer.Moreover,with the increase of repair rate and improvement factor in the preventive maintenance,the revenue will increase gradually for both the parties.展开更多
The limitation of traditional layout system and the continuous contraction of villages and towns have brought challenges to the layout of public service facilities.It is an imperative task against this background to i...The limitation of traditional layout system and the continuous contraction of villages and towns have brought challenges to the layout of public service facilities.It is an imperative task against this background to integrate space resources and allocate public service facilities scientifically and reasonably.This paper took the system and method of rural public service facility allocation from the perspective of smart contraction as the theoretic support,and Zixi County in Jiangxi Province for example,built the four-level life circle of“county-fundamental-basic-routine”based on the influence factors of facility allocation,village and town contraction strength,rural comprehensive assessment results,residents’trip willingness and demands on public service facilities,finally proposed the suggestions for optimizing the allocation of village and town public service facilities.展开更多
基金supported in part by the National Natural Science Foundation of China(51977127)Shanghai Municipal Science and Technology Commission(19020500800)“Shuguang Program”(20SG52)Shanghai Education Development Foundation and Shanghai Municipal Education Commission.
文摘From the perspective of a community energy operator,a two-stage optimal scheduling model of a community integrated energy system is proposed by integrating information on controllable loads.The day-ahead scheduling analyzes whether various controllable loads participate in the optimization and investigates the impact of their responses on the operating economy of the community integrated energy system(IES)before and after;the intra-day scheduling proposes a two-stage rolling optimization model based on the day-ahead scheduling scheme,taking into account the fluctuation of wind turbine output and load within a short period of time and according to the different response rates of heat and cooling power,and solves the adjusted output of each controllable device.The simulation results show that the optimal scheduling of controllable loads effectively reduces the comprehensive operating costs of community IES;the two-stage optimal scheduling model can meet the energy demand of customers while effectively and timely suppressing the random fluctuations on both sides of the source and load during the intra-day stage,realizing the economic and smooth operation of IES.
基金supported by the National Key Research and Development Program of China(2022YFE0101600)the National Natural Science Foundation of China(U23A20117)+2 种基金the Natural Science Foundation of Jiangsu Province(BK20220002,BE2022024)the Leading Talents Program of Zhejiang Province(2024C03223)Topnotch Academic Programs Project of Jiangsu Higher Education Institutions(TAPP).
文摘A two-stage catalytic membrane reactor(CMR)that couples CO_(2) splitting with methane oxidation reactions was constructed based on an oxygen-permeable perovskite asymmetric membrane.The asymmetric membrane comprises a dense SrFe_(0.9)Ta_(0.1)O_(3-σ)(SFT)separation layer and a porous Sr_(0.9)(Fe_(0.9)Ta_(0.1))_(0.9)Cu_(0.1)O_(3-σ)(SFTC)catalytic layer.In thefirst stage reactor,a CO_(2) splitting reaction(CDS:2CO_(2)→2CO+O_(2))occurs at the SFTC catalytic layer.Subsequently,the O_(2) product is selectively extracted through the SFT separation layer to the permeated side for the methane combustion reaction(MCR),which provides an extremely low oxygen partial pressure to enhance the oxygen extraction.In the second stage,a Sr_(0.9)(Fe_(0.9)Ta_(0.1))_(0.9)Ni_(0.1)O_(3-σ)(SFTN)catalyst is employed to reform the products derived from MCR.The two-stage CMR design results in a remarkable 35.4%CO_(2) conversion for CDS at 900℃.The two-stage CMR was extended to a hollowfiber configuration combining with solar irradiation.The solar-assisted two-stage CMR can operate stably for over 50 h with a high hydrogen yield of 18.1 mL min^(-1) cm^(-2).These results provide a novel strategy for reducing CO_(2) emissions,suggesting potential avenues for the design of the high-performance CMRs and catalysts based on perovskite oxides in the future.
基金supported by North China Electric Power Research Institute’s Self-Funded Science and Technology Project“Research on Distributed Energy Storage Optimal Configuration and Operation Control Technology for Photovoltaic Promotion in the Entire County”(KJZ2022049).
文摘Aiming at the consumption problems caused by the high proportion of renewable energy being connected to the distribution network,it also aims to improve the power supply reliability of the power system and reduce the operating costs of the power system.This paper proposes a two-stage planning method for distributed generation and energy storage systems that considers the hierarchical partitioning of source-storage-load.Firstly,an electrical distance structural index that comprehensively considers active power output and reactive power output is proposed to divide the distributed generation voltage regulation domain and determine the access location and number of distributed power sources.Secondly,a two-stage planning is carried out based on the zoning results.In the phase 1 distribution network-zoning optimization layer,the network loss is minimized so that the node voltage in the area does not exceed the limit,and the distributed generation configuration results are initially determined;in phase 2,the partition-node optimization layer is planned with the goal of economic optimization,and the distance-based improved ant lion algorithm is used to solve the problem to obtain the optimal distributed generation and energy storage systemconfiguration.Finally,the IEEE33 node systemwas used for simulation.The results showed that the voltage quality was significantly improved after optimization,and the overall revenue increased by about 20.6%,verifying the effectiveness of the two-stage planning.
基金supported by the National Key R&D Program of China(2021YFD1600502).
文摘Rapeseed(Brassica napus L.)harvesting method is critical since it significantly determines the seed yield,oil quality,and industrial efficiency.This study investigated the influences of harvesting methods on the quality of cold-pressed rapeseed oil of two varieties.Oil color,peroxide value(POV),tocopherol content,fatty acid composition,and polarity of total polyphenols(PTP)contents of two rapeseed varieties in Huanggang and Xiangyang were compared through artificially simulated combined harvesting and two-stage harvesting.Results showed significant differences in the quality of rapeseed oil between the two harvesting methods.The red value(R-value),POV,total tocopherol contents,linoleic and linolenic acid content,and PTP content of the pressed rapeseed oil prepared by the combined harvesting method were about 27.6,5.7,15.8,2.0,0.5,and 28.6%lower than those of the oil produced from the two-stage harvesting method,respectively.Xiangyang and Huayouza62 performed better in the two regions and two varieties,respectively.To sum up,the rapeseed oil obtained 41–44 days after final flowering of combined harvesting,35 days after final flowering,and six days of post-ripening of the two-stage harvesting had the best quality.
基金partially supported by the National Natural Science Foundation of China(41930644,61972439)the Collaborative Innovation Project of Anhui Province(GXXT-2022-093)the Key Program in the Youth Elite Support Plan in Universities of Anhui Province(gxyqZD2019010)。
文摘Tourism route planning is widely applied in the smart tourism field.The Pareto-optimal front obtained by the traditional multi-objective evolutionary algorithm exhibits long tails,sharp peaks and disconnected regions problems,which leads to uneven distribution and weak diversity of optimization solutions of tourism routes.Inspired by these limitations,we propose a multi-objective evolutionary algorithm for tourism route recommendation(MOTRR)with two-stage and Pareto layering based on decomposition.The method decomposes the multiobjective problem into several subproblems,and improves the distribution of solutions through a two-stage method.The crowding degree mechanism between extreme and intermediate populations is used in the two-stage method.The neighborhood is determined according to the weight of the subproblem for crossover mutation.Finally,Pareto layering is used to improve the updating efficiency and population diversity of the solution.The two-stage method is combined with the Pareto layering structure,which not only maintains the distribution and diversity of the algorithm,but also avoids the same solutions.Compared with several classical benchmark algorithms,the experimental results demonstrate competitive advantages on five test functions,hypervolume(HV)and inverted generational distance(IGD)metrics.Using the experimental results of real scenic spot datasets from two famous tourism social networking sites with vast amounts of users and large-scale online comments in Beijing,our proposed algorithm shows better distribution.It proves that the tourism routes recommended by our proposed algorithm have better distribution and diversity,so that the recommended routes can better meet the personalized needs of tourists.
基金supported by the State Grid Tianjin Electric Power Company Science and Technology Project (Grant No. KJ22-1-45)。
文摘After suffering from a grid blackout, distributed energy resources(DERs), such as local renewable energy and controllable distributed generators and energy storage can be used to restore loads enhancing the system’s resilience. In this study, a multi-source coordinated load restoration strategy was investigated for a distribution network with soft open points(SOPs). Here, the flexible regulation ability of the SOPs is fully utilized to improve the load restoration level while mitigating voltage deviations. Owing to the uncertainty, a scenario-based stochastic optimization approach was employed,and the load restoration problem was formulated as a mixed-integer nonlinear programming model. A computationally efficient solution algorithm was developed for the model using convex relaxation and linearization methods. The algorithm is organized into a two-stage structure, in which the energy storage system is dispatched in the first stage by solving a relaxed convex problem. In the second stage, an integer programming problem is calculated to acquire the outputs of both SOPs and power resources. A numerical test was conducted on both IEEE 33-bus and IEEE 123-bus systems to validate the effectiveness of the proposed strategy.
文摘Periprosthetic joint infection(PJI)following total knee arthroplasty is one of the most catastrophic and costly complications that carries significant patient wellness as well as economic burdens.The road to efficiently diagnosing and treating PJI is challenging,as there is still no gold standard method to reach the diagnosis as early as desired.There are also international controversies with respect to the best approach to manage PJI cases.In this review,we highlight recent advances in managing PJI following knee arthroplasty surgery and discuss in depth the two-stage revision method.
基金supported by the National Nature Science Foundation(grant nos.81871577 and 81971864)。
文摘Limb length discrepancy(LLD)is a common orthopedic condition that can result in significant functional impairment,pain,and cosmetic deformities.Current reconstructive techniques for severe LLD are primarily based on callus distraction,which is a time-consuming process that can lead to complications,such as significant infection,joint stiffness,and stress fractures.To reduce the therapeutic time and minimize the risk of complications,we investigated the use of vascularized bone flaps as a technical supplement to callus distraction in the reconstruction of short limbs.We present two cases of severe LLD in the upper and lower legs,in which a twostage reconstruction approach was used.In the first stage,external fixation was applied to the affected limb to correct the soft tissue length and convert the short deformity into a bone defect.In the second stage,the bone defect was reconstructed using bilateral(patient A)or unilateral(patient B)free vascularized fibula bone grafts.Both patients had complete survival of the fibular grafts without stress fractures,and bone consolidation took 8 months(patient A)and 4 months(patient B).Compared to the traditional callus distraction,the two-stage approach was found to be more time-saving and reliable.The entire reconstructive scheme required 18 and 4 months for patients A and B,respectively,whereas the traditional callus distraction required 41 and 17 months,respectively.These findings suggest that the use of vascularized bone flaps as a technical supplement for callus distraction may provide an effective and efficient alternative for the treatment of severe LLD.Further studies are needed to validate these results and assess the long-term outcomes of this approach.
基金supported by the National Natural Science Foundation of China(No.61971412).
文摘In order to improve the rejection capability of mismatched interferer signals,a new two-stage detector is proposed under homogeneous scenarios with unknown covariance matrix,which is obtained by cascading the adaptive matched filter(AMF)detector and the enhanced RAO(EnRAO)detector.The new detector has constant false alarm performance,and the closed-form expression of probability of false alarm and probability of detection is derived.The performance of the new detector is assessed,and analyzed in comparison with other detectors.The results show that,the proposed detector can provide enhanced rejection capability in the case of mismatch,but the performance of the detector is slightly lost under the condition of matching.
文摘The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.
基金Project supported by the National Natural Science Foundation of China(Grant No.62363005)the Jiangxi Provincial Natural Science Foundation(Grant Nos.20161BAB212032 and 20232BAB202034)the Science and Technology Research Project of Jiangxi Provincial Department of Education(Grant Nos.GJJ202602 and GJJ202601)。
文摘This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.
基金the Gansu Province Higher Education Institutions Industrial Support Program:Security Situational Awareness with Artificial Intelligence and Blockchain Technology.Project Number(2020C-29).
文摘The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conventional smart contract vulnerability detection primarily relies on static analysis tools,which are less efficient and accurate.Although deep learning methods have improved detection efficiency,they are unable to fully utilize the static relationships within contracts.Therefore,we have adopted the advantages of the above two methods,combining feature extraction mode of tools with deep learning techniques.Firstly,we have constructed corresponding feature extraction mode for different vulnerabilities,which are used to extract feature graphs from the source code of smart contracts.Then,the node features in feature graphs are fed into a graph convolutional neural network for training,and the edge features are processed using a method that combines attentionmechanismwith gated units.Ultimately,the revised node features and edge features are concatenated through amulti-head attentionmechanism.The result of the splicing is a global representation of the entire feature graph.Our method was tested on three types of data:Timestamp vulnerabilities,reentrancy vulnerabilities,and access control vulnerabilities,where the F1 score of our method reaches 84.63%,92.55%,and 61.36%.The results indicate that our method surpasses most others in detecting smart contract vulnerabilities.
基金funded by the Major PublicWelfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.
文摘Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
基金supported by the Major Public Welfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value.
文摘The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.
文摘The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades.
文摘In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on the electron radius under motion, incorporating the effects of length contraction. The findings suggest that the radius is subject to Lorentz contraction, which has interesting implications for relativistic effects at the subatomic level.
基金supported by the National Natural Science Foundation of China(71671035)。
文摘Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satisfaction,and ultimately promote sales and maximize profit for the manufacturer.By considering the combinations of corrective maintenance and preventive maintenance,totally three types of maintenance service contracts are designed.Moreover,attractive incentive and penalty mechanisms are adopted in the contracts.On this basis,Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers,and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation.Numerical experiments are conducted.The results show that by taking into account the incentive and penalty mechanisms,the revenue can be improved for both the customers and manufacturer.Moreover,with the increase of repair rate and improvement factor in the preventive maintenance,the revenue will increase gradually for both the parties.
文摘The limitation of traditional layout system and the continuous contraction of villages and towns have brought challenges to the layout of public service facilities.It is an imperative task against this background to integrate space resources and allocate public service facilities scientifically and reasonably.This paper took the system and method of rural public service facility allocation from the perspective of smart contraction as the theoretic support,and Zixi County in Jiangxi Province for example,built the four-level life circle of“county-fundamental-basic-routine”based on the influence factors of facility allocation,village and town contraction strength,rural comprehensive assessment results,residents’trip willingness and demands on public service facilities,finally proposed the suggestions for optimizing the allocation of village and town public service facilities.