Current rates of mental illness are worrisome.Mental illness mainly affects females and younger age groups.The use of the internet to deliver mental health care has been growing since 2020 and includes the implementat...Current rates of mental illness are worrisome.Mental illness mainly affects females and younger age groups.The use of the internet to deliver mental health care has been growing since 2020 and includes the implementation of novel mental health treatments using virtual reality,augmented reality,and artificial intelligence.A new three dimensional digital environment,known as the metaverse,has emerged as the next version of the Internet.Artificial intelligence,augmented reality,and virtual reality will create fully immersive,experiential,and interactive online environments in the metaverse.People will use a unique avatar to do anything they do in their“real”lives,including seeking and receiving mental health care.In this opinion review,we reflect on how the metaverse could reshape how we deliver mental health treatment,its opportunities,and its challenges.展开更多
BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential...BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential benefits,there are studies on patient satisfaction but there is limited information on the usability of virtual reality(VR)technology for new nurses in giving preoperative education to patients.AIM To investigate the impact on satisfaction,usability,and burnout of a system using VR technology in preoperative patient education.METHODS The study involved 20 nurses from the plastic surgery ward and 80 patients admitted between April and May 2019.Each nurse taught four patients:Two using traditional verbal education and two using virtual reality.The System Usability Scale,After-Scenario Questionnaire,and Maslach Burnout Inventory(MBI)were employed to evaluate the impact of these education methods.RESULTS The VR education groups showed a statistically higher satisfaction than the traditional verbal education groups.Among the three subscales of the MBI,emotional exhaustion and personal accomplishment improved statistically significantly.VR was also better in terms of usability.CONCLUSION This study suggests VR enhances usability and reduces burnout in nurses,but further research is needed to assess its impact on depersonalization and objective measures like stress and heart rate.展开更多
Virtual water trade(VWT)provides a new perspective for alleviating water crisis and has thus attracted widespread attention.However,the heterogeneity of virtual water trade inside and outside the river basin and its i...Virtual water trade(VWT)provides a new perspective for alleviating water crisis and has thus attracted widespread attention.However,the heterogeneity of virtual water trade inside and outside the river basin and its influencing factors remains further study.In this study,for better investigating the pattern and heterogeneity of virtual water trade inside and outside provincial regions along the Yellow River Basin in 2015 using the input-output model(MRIO),we proposed two new concepts,i.e.,virtual water surplus and virtual water deficit,and then used the Logarithmic Mean Divisia Index(LMDI)model to identify the inherent mechanism of the imbalance of virtual water trade between provincial regions along the Yellow River Basin and the other four regions in China.The results show that:1)in provincial regions along the Yellow River Basin,the less developed the economy was,the larger the contribution of the agricultural sector in virtual water trade,while the smaller the contribution of the industrial sector.2)Due to the large output of agricultural products,the upstream and midstream provincial regions of the Yellow River Basin had a virtual water surplus,with a net outflow of virtual water of 2.7×10^(8) m^(3) and 0.9×10^(8) m^(3),respectively.3)provincial regions along the Yellow River Basin were in a virtual water deficit with the rest of China,and the decisive factor was the active degree of trade with the outside.This study would be beneficial to illuminate the trade-related water use issues in provincial regions along the Yellow River Basin,which has farreaching practical signific-ance for alleviating water scarcity.展开更多
This contribution presents a novel wear dependent virtual flow rate sensor for single stage single lobe progressing cavity pumps. We study the wear-induced material loss of the pump components and the impact of this m...This contribution presents a novel wear dependent virtual flow rate sensor for single stage single lobe progressing cavity pumps. We study the wear-induced material loss of the pump components and the impact of this material loss on the volumetric efficiency. The results are combined with an established backflow model to implement a backflow calculation procedure that is adaptive to wear. We use a laboratory test setup with a highly abrasive fluid and operate a pump from new to worn condition to validate our approach. The obtained measurement data show that the presented virtual sensor is capable of calculating the flow rate of a pump being subject to wear during its regular operation.展开更多
The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a mul...The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a multitude of nanoscale applications.Over the past decade,the optical microsphere nanoimaging technique has been demonstrated to be a cost-effective solution for overcoming the diffraction limit and has achieved an imaging resolution of up to about k6k8 in a real-time and label-free manner,making it highly competitive among numerous super-resolution imaging technologies.In this review,we summarize the underlying nano-imaging mechanisms of the microsphere nanoscope and key advancements aimed at imaging performance enhancement:first,to change the working environment or modify the peripheral hardware of a single microsphere nanoscope at the system level;second,to compose the microsphere compound lens;and third,to engineer the geometry or ingredients of microspheres.We also analyze challenges yet to be overcome in optical microsphere nano-imaging,followed by an outlook of this technique.展开更多
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.展开更多
Physical assistive robotics are oriented to support and improve functional capacities of people.In physical rehabilitation,robots are indeed useful for functional recovery of affected limb.However,there are still open...Physical assistive robotics are oriented to support and improve functional capacities of people.In physical rehabilitation,robots are indeed useful for functional recovery of affected limb.However,there are still open questions related to technological aspects.This work presents a systematic review of upper limb rehabilitation robotics in order to analyze and establish technological challenges and future directions in this area.A bibliometric analysis was performed for the systematic literature review.Literature from the last six years,conducted between August 2020 and May 2021,was reviewed.The methodology for the literature search and a bibliometric analysis of the metadata are presented.After a preliminary search resulted in 820 articles,a total of 66 articles were included.A concurrency network and bibliographic analysis were provided.And an analysis of occurrences,taxonomy,and rehabilitation robotics reported in the literature is presented.This review aims to provide to the scientific community an overview of the state of the art in assistive robotics for upper limb physical rehabilitation.The literature analysis allows access to a gap of unexplored options to define the technological prospects applied to upper limb physical rehabilitation robotics.展开更多
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor...This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.展开更多
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.展开更多
In this work,we present a reconfigurable data glove design to capture different modes of human hand-object interactions,which are critical in training embodied artificial intelligence(AI)agents for fine manipulation t...In this work,we present a reconfigurable data glove design to capture different modes of human hand-object interactions,which are critical in training embodied artificial intelligence(AI)agents for fine manipulation tasks.To achieve various downstream tasks with distinct features,our reconfigurable data glove operates in three modes sharing a unified backbone design that reconstructs hand gestures in real time.In the tactile-sensing mode,the glove system aggregates manipulation force via customized force sensors made from a soft and thin piezoresistive material;this design minimizes interference during complex hand movements.The virtual reality(VR)mode enables real-time interaction in a physically plausible fashion:A caging-based approach is devised to determine stable grasps by detecting collision events.Leveraging a state-of-the-art finite element method,the simulation mode collects data on fine-grained four-dimensionalmanipulation events comprising hand and object motions in three-dimensional space and how the object's physical properties(e.g.,stress and energy)change in accordance with manipulation over time.Notably,the glove system presented here is the first to use high-fidelity simulation to investigate the unobservable physical and causal factors behind manipulation actions.In a series of experiments,we characterize our data glove in terms of individual sensors and the overall system.More specifically,we evaluate the system's three modes by①recording hand gestures and associated forces,②improving manipulation fluency in VR,and③producing realistic simulation effects of various tool uses,respectively.Based on these three modes,our reconfigurable data glove collects and reconstructs fine-grained human grasp data in both physical and virtual environments,thereby opening up new avenues for the learning of manipulation skills for embodied AI agents.展开更多
The traditional nutritional and medical hemp(Cannabis sativa L.)seed protein were explored for the discovery and directional preparation of new xanthine oxidase inhibitory(XOI)peptides by structure-based virtual scree...The traditional nutritional and medical hemp(Cannabis sativa L.)seed protein were explored for the discovery and directional preparation of new xanthine oxidase inhibitory(XOI)peptides by structure-based virtual screening,compound synthesis,in vitro bioassay and proteolysis.Six subtypes of hemp seed edestin and albumin were in silico hydrolyzed by 29 proteases,and 192 encrypted bioactive peptides were screened out.Six peptides showed to be XOI peptides,of which four(about 67%)were released by elastase hydrolysis.The peptide DDNPRRFY displayed the highest XOI activity(IC50=(2.10±0.06)mg/mL),acting as a mixed inhibitor.The pancreatic elastase directionally prepared XOI hemp seed protein hydrolysates,from which 6 high-abundance XOI peptides encrypted 3 virtually-screened ones including the DDNPRRFY.The novel outstanding hemp seed protein-derived XOI peptides and their virtual screening and directed preparation methods provide a promising and applicable approach to conveniently and efficiently explore food-derived bioactive peptides.展开更多
This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery(LiB)time series data.As the energy sector increasingly focuses on integrating distributed energy resources,Virtual Power Plants(...This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery(LiB)time series data.As the energy sector increasingly focuses on integrating distributed energy resources,Virtual Power Plants(VPP)have become a vital new framework for energy management.LiBs are key in this context,owing to their high-efficiency energy storage capabilities essential for VPP operations.However,LiBs are prone to various abnormal states like overcharging,over-discharging,and internal short circuits,which impede power transmission efficiency.Traditional methods for detecting such abnormalities in LiB are too broad and lack precision for the dynamic and irregular nature of LiB data.In response,we introduce an innovative method:a Long Short-Term Memory(LSTM)autoencoder based on Dynamic Frequency Memory and Correlation Attention(DFMCA-LSTM-AE).This unsupervised,end-to-end approach is specifically designed for dynamically monitoring abnormal states in LiB data.The method starts with a Dynamic Frequency Fourier Transform module,which dynamically captures the frequency characteristics of time series data across three scales,incorporating a memory mechanism to reduce overgeneralization of abnormal frequencies.This is followed by integrating LSTM into both the encoder and decoder,enabling the model to effectively encode and decode the temporal relationships in the time series.Empirical tests on a real-world LiB dataset demonstrate that DFMCA-LSTM-AE outperforms existing models,achieving an average Area Under the Curve(AUC)of 90.73%and an F1 score of 83.83%.These results mark significant improvements over existing models,ranging from 2.4%–45.3%for AUC and 1.6%–28.9%for F1 score,showcasing the model’s enhanced accuracy and reliability in detecting abnormal states in LiB data.展开更多
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa...As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.展开更多
Ultrahigh-temperature-pressure experiments are crucial for understanding the physical and chemical properties of matter.The recent development of boron-doped diamond(BDD)heaters has made such melting experiments possi...Ultrahigh-temperature-pressure experiments are crucial for understanding the physical and chemical properties of matter.The recent development of boron-doped diamond(BDD)heaters has made such melting experiments possible in large-volume presses.However,estimates of temperatures above 2600 K and of the temperature distributions inside BDD heaters are not well constrained,owing to the lack of a suitable thermometer.Here,we establish a three-dimensional finite element model as a virtual thermometer to estimate the temperature and temperature field above 2600 K.The advantage of this virtual thermometer over those proposed in previous studies is that it considers both alternating and direct current heating modes,the actual sizes of cell assemblies after compression,the effects of the electrode,thermocouple and anvil,and the heat dissipation by the pressure-transmitting medium.The virtual thermometer reproduces the power-temperature relationships of ultrahigh-temperature-pressure experiments below 2600 K at press loads of 2.8-7.9 MN(~19 to 28 GPa)within experimental uncertainties.The temperatures above 2600 K predicted by our virtual thermometer are within the uncertainty of those extrapolated from power-temperature relationships below 2600 K.Furthermore,our model shows that the temperature distribution inside a BDD heater(19-26 K/mm along the radial direction and<83 K/mm along the longitudinal direction)is more homogeneous than those inside conventional heaters such as graphite or LaCrO_(3) heaters(100-200 K/mm).Our study thus provides a reliable virtual thermometer for ultrahigh-temperature experiments using BDD heaters in Earth and material sciences.展开更多
Realization of high performance satellite onboard clock is vital for various positioning, navigation, and timing applications. For further improvement of the synchronization-based satellite time and frequency referenc...Realization of high performance satellite onboard clock is vital for various positioning, navigation, and timing applications. For further improvement of the synchronization-based satellite time and frequency references, we propose a geosynchronous(GEO) satellite virtual clock concept based on ground–satellite synchronization and present a beacon transponder structure for its implementation(scheduled for launch in 2025), which does not require atomic clocks to be mounted on the satellite. Its high performance relies only on minor modifications to the existing transponder structure of GEO satellites. We carefully model the carrier phase link and analyze the factors causing link asymmetry within the special relativity. Considering that performance of such synchronization-based satellite clocks is primarily limited by the link's random phase noise, which cannot be adequately modeled, we design a closed-loop experiment based on commercial GEO satellites for pre-evaluation. This experiment aims at extracting the zero-means random part of the ground-satellite Ku-band carrier phase via a feedback loop. Ultimately, we obtain a 1σ value of 0.633 ps(two-way link), following the Gaussian distribution. From this result, we conclude that the proposed real-time Einstein-synchronization-defined satellite virtual clock can achieve picosecond-level replication of onboard time and frequency.展开更多
In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a...In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a good application prospect.Firstly,a numerical virtual flight simulation model based on overlapping dynamic mesh technology is constructed.In order to verify the accuracy of the dynamic grid technology and the calculation of unsteady flow,a numerical simulation of the basic finner projectile without control is carried out.The simulation results are in good agreement with the experiment data which shows that the algorithm used in this paper can also be used in the design and evaluation of the intelligent controller in the numerical virtual flight simulation.Secondly,combined with the real-time control requirements of aerodynamic,attitude and displacement parameters of the projectile during the flight process,the numerical simulations of the basic finner projectile’s pitch channel are carried out under the traditional PID(Proportional-Integral-Derivative)control strategy and the intelligent PID control strategy respectively.The intelligent PID controller based on BP(Back Propagation)neural network can realize online learning and self-optimization of control parameters according to the acquired real-time flight parameters.Compared with the traditional PID controller,the concerned control variable overshoot,rise time,transition time and steady state error and other performance indicators have been greatly improved,and the higher the learning efficiency or the inertia coefficient,the faster the system,the larger the overshoot,and the smaller the stability error.The intelligent control method applying on numerical virtual flight is capable of solving the complicated unsteady motion and flow with the intelligent PID control strategy and has a strong promotion to engineering application.展开更多
In the process of dense vehicles traveling fast,there will be mutual occlusion between vehicles,which will lead to the problem of deterioration of the tracking effect of different vehicles,so this paper proposes a res...In the process of dense vehicles traveling fast,there will be mutual occlusion between vehicles,which will lead to the problem of deterioration of the tracking effect of different vehicles,so this paper proposes a research method of virtual simulation video vehicle target tracking based on you only look once(YOLO)v5s and deep simple online and realtime tracking(DeepSort).Given that the DeepSort algorithm is currently the most effective tracking method,this paper merges the YOLOv5 algorithm with the DeepSort algorithm.Then it adds the efficient channel attention networks(ECA-Net)focusing mechanism at the back for the cross-stage partial bottleneck with 3 convolutions(C3)modules about the YOLOv5 backbone network and before the up-sampling of the Neck feature pyramid.The YOLOv5 algorithm adopts expected intersection over union(EIOU)instead of complete intersection over union(CIOU)as the loss function of the target frame regression.The improved YOLOv5 algorithm is named YOLOv5-Block.The experimental results show that in the special vehicle target detection(TD)and tracking in the virtual simulation environment,The YOLOv5-Block algorithm has an average accuracy(AP)of 99.5%,which significantly improves the target recognition correctness for typical occlusion cases,and is 1.48 times better than the baseline algorithm.After the virtual simulation video sequence test,multiple objects tracking accuracy(MOTA)and various objects tracking precision(MOTP)improved by 10.7 and 1.75 percentage points,respectively,and the number of vehicle target identity document(ID)switches decreased.Compared with recent mainstream vehicle detection and tracking models,the YOLOv5-Block+Deepsort algorithm can accurately and continuously complete the detection and tracking tasks of special vehicle targets in different scenes.展开更多
This work uses cloud-resolving simulations to study mock-Walker cells driven by a specified sea surface temperature(SST).The associated precipitation in the mock-Walker cells exhibits three different modes,including a...This work uses cloud-resolving simulations to study mock-Walker cells driven by a specified sea surface temperature(SST).The associated precipitation in the mock-Walker cells exhibits three different modes,including a single peak of precipitation over the SST maximum(mode 1),symmetric double peaks of precipitation straddling the SST maximum(mode 2),and a single peak of precipitation on one side of the SST maximum(mode 3).The three modes are caused by three distinct convective activity center migration traits.Analyses indicate that the virtual effect of water vapor plays an important role in differentiating the three modes.When the SST gradient is large,the virtual effect may be strong enough to overcome the temperature effect,generating a low-level low-pressure anomaly below the ascending branch of the Walker cell off the center.The results here highlight the importance of the virtual effect of water vapor and its interaction with convection and large-scale circulation in the Walker circulation.展开更多
In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish ...In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish security-threat assessment architectures to evaluate risks of traffic elements by managing and sharing securitythreat information.Unfortunately,most assessment architectures process data in a centralized manner,causing delays in query services.To address this issue,in this paper,a Hierarchical Blockchain-enabled Security threat Assessment Architecture(HBSAA)is proposed,utilizing edge chains and global chains to share data.In addition,data virtualization technology is introduced to manage multi-source heterogeneous data,and a metadata association model based on attribute graph is designed to deal with complex data relationships.In order to provide high-speed query service,the ant colony optimization of key nodes is designed,and the HBSAA prototype is also developed and the performance is tested.Experimental results on the large-scale vulnerabilities data gathered from NVD demonstrate that the HBSAA not only shields data heterogeneity,but also reduces service response time.展开更多
基金Supported by Instituto de Salud CarlosⅢ(ISCⅢ),with group funds the Research Network on Chronicity,Primary Care and Health Promotion(RICAPPS,RD21/0016/0005)that is part of the Results-Oriented Cooperative Research Networks in Health(RICORS)(CarlosⅢHealth Institute),co-funded by the European Union“NextGeneration EU/PRTR”funds and with group funds Mental health research group in Primary Care(B17_23R),which is part of the Department of Innovation,Research,and University in the Government of Aragón(Spain).
文摘Current rates of mental illness are worrisome.Mental illness mainly affects females and younger age groups.The use of the internet to deliver mental health care has been growing since 2020 and includes the implementation of novel mental health treatments using virtual reality,augmented reality,and artificial intelligence.A new three dimensional digital environment,known as the metaverse,has emerged as the next version of the Internet.Artificial intelligence,augmented reality,and virtual reality will create fully immersive,experiential,and interactive online environments in the metaverse.People will use a unique avatar to do anything they do in their“real”lives,including seeking and receiving mental health care.In this opinion review,we reflect on how the metaverse could reshape how we deliver mental health treatment,its opportunities,and its challenges.
基金Research Fund of Chungnam National University,Chungnam National University,the Ministry of Trade,Industry,and Energy,Korea,under the“Regional industry-based organization support program”,No.P0001940the Korea Institute for Advancement of Technology,and a grant of the Korea Health Technology R&D Project through the Korea Health Industry Development Institute,funded by the Ministry of Health&Welfare,Republic of Korea,No.HI20C2088.
文摘BACKGROUND Traditional paper-based preoperative patient education is a struggle for new nurses and requires extensive training.In this situation,virtual reality technology can help the new nurses.Despite its potential benefits,there are studies on patient satisfaction but there is limited information on the usability of virtual reality(VR)technology for new nurses in giving preoperative education to patients.AIM To investigate the impact on satisfaction,usability,and burnout of a system using VR technology in preoperative patient education.METHODS The study involved 20 nurses from the plastic surgery ward and 80 patients admitted between April and May 2019.Each nurse taught four patients:Two using traditional verbal education and two using virtual reality.The System Usability Scale,After-Scenario Questionnaire,and Maslach Burnout Inventory(MBI)were employed to evaluate the impact of these education methods.RESULTS The VR education groups showed a statistically higher satisfaction than the traditional verbal education groups.Among the three subscales of the MBI,emotional exhaustion and personal accomplishment improved statistically significantly.VR was also better in terms of usability.CONCLUSION This study suggests VR enhances usability and reduces burnout in nurses,but further research is needed to assess its impact on depersonalization and objective measures like stress and heart rate.
基金Under the auspices of National Natural Science Foundation of China(No.42201302)‘Double First-Class’University Construction Project of Lanzhou University(No.561120213)。
文摘Virtual water trade(VWT)provides a new perspective for alleviating water crisis and has thus attracted widespread attention.However,the heterogeneity of virtual water trade inside and outside the river basin and its influencing factors remains further study.In this study,for better investigating the pattern and heterogeneity of virtual water trade inside and outside provincial regions along the Yellow River Basin in 2015 using the input-output model(MRIO),we proposed two new concepts,i.e.,virtual water surplus and virtual water deficit,and then used the Logarithmic Mean Divisia Index(LMDI)model to identify the inherent mechanism of the imbalance of virtual water trade between provincial regions along the Yellow River Basin and the other four regions in China.The results show that:1)in provincial regions along the Yellow River Basin,the less developed the economy was,the larger the contribution of the agricultural sector in virtual water trade,while the smaller the contribution of the industrial sector.2)Due to the large output of agricultural products,the upstream and midstream provincial regions of the Yellow River Basin had a virtual water surplus,with a net outflow of virtual water of 2.7×10^(8) m^(3) and 0.9×10^(8) m^(3),respectively.3)provincial regions along the Yellow River Basin were in a virtual water deficit with the rest of China,and the decisive factor was the active degree of trade with the outside.This study would be beneficial to illuminate the trade-related water use issues in provincial regions along the Yellow River Basin,which has farreaching practical signific-ance for alleviating water scarcity.
基金Funding by Ministerium für Wirtschaft,Innovation,Digitalisierung und Energie des Landes Nordrhein-Westfalen。
文摘This contribution presents a novel wear dependent virtual flow rate sensor for single stage single lobe progressing cavity pumps. We study the wear-induced material loss of the pump components and the impact of this material loss on the volumetric efficiency. The results are combined with an established backflow model to implement a backflow calculation procedure that is adaptive to wear. We use a laboratory test setup with a highly abrasive fluid and operate a pump from new to worn condition to validate our approach. The obtained measurement data show that the presented virtual sensor is capable of calculating the flow rate of a pump being subject to wear during its regular operation.
基金supported by Innovation Laboratory for Sciences and Technologies of Energy Materials of Fujian Province Human Resource Training Project(HRTP-[2022]-53).
文摘The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a multitude of nanoscale applications.Over the past decade,the optical microsphere nanoimaging technique has been demonstrated to be a cost-effective solution for overcoming the diffraction limit and has achieved an imaging resolution of up to about k6k8 in a real-time and label-free manner,making it highly competitive among numerous super-resolution imaging technologies.In this review,we summarize the underlying nano-imaging mechanisms of the microsphere nanoscope and key advancements aimed at imaging performance enhancement:first,to change the working environment or modify the peripheral hardware of a single microsphere nanoscope at the system level;second,to compose the microsphere compound lens;and third,to engineer the geometry or ingredients of microspheres.We also analyze challenges yet to be overcome in optical microsphere nano-imaging,followed by an outlook of this technique.
基金This work was funded by the Deanship of Scientific Research at Jouf University under Grant Number(DSR2022-RG-0102).
文摘Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
基金Supported by Militar Nueva Granada University of Colombia (Grant No.IMP-ING-3127)。
文摘Physical assistive robotics are oriented to support and improve functional capacities of people.In physical rehabilitation,robots are indeed useful for functional recovery of affected limb.However,there are still open questions related to technological aspects.This work presents a systematic review of upper limb rehabilitation robotics in order to analyze and establish technological challenges and future directions in this area.A bibliometric analysis was performed for the systematic literature review.Literature from the last six years,conducted between August 2020 and May 2021,was reviewed.The methodology for the literature search and a bibliometric analysis of the metadata are presented.After a preliminary search resulted in 820 articles,a total of 66 articles were included.A concurrency network and bibliographic analysis were provided.And an analysis of occurrences,taxonomy,and rehabilitation robotics reported in the literature is presented.This review aims to provide to the scientific community an overview of the state of the art in assistive robotics for upper limb physical rehabilitation.The literature analysis allows access to a gap of unexplored options to define the technological prospects applied to upper limb physical rehabilitation robotics.
基金Project supported by the National Natural Science Foundation of China(Grant No.62363005)the Jiangxi Provincial Natural Science Foundation(Grant Nos.20161BAB212032 and 20232BAB202034)the Science and Technology Research Project of Jiangxi Provincial Department of Education(Grant Nos.GJJ202602 and GJJ202601)。
文摘This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.
文摘As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.
基金the National Key Research and Development Program of China(2021ZD0150200)the Beijing Nova Program.
文摘In this work,we present a reconfigurable data glove design to capture different modes of human hand-object interactions,which are critical in training embodied artificial intelligence(AI)agents for fine manipulation tasks.To achieve various downstream tasks with distinct features,our reconfigurable data glove operates in three modes sharing a unified backbone design that reconstructs hand gestures in real time.In the tactile-sensing mode,the glove system aggregates manipulation force via customized force sensors made from a soft and thin piezoresistive material;this design minimizes interference during complex hand movements.The virtual reality(VR)mode enables real-time interaction in a physically plausible fashion:A caging-based approach is devised to determine stable grasps by detecting collision events.Leveraging a state-of-the-art finite element method,the simulation mode collects data on fine-grained four-dimensionalmanipulation events comprising hand and object motions in three-dimensional space and how the object's physical properties(e.g.,stress and energy)change in accordance with manipulation over time.Notably,the glove system presented here is the first to use high-fidelity simulation to investigate the unobservable physical and causal factors behind manipulation actions.In a series of experiments,we characterize our data glove in terms of individual sensors and the overall system.More specifically,we evaluate the system's three modes by①recording hand gestures and associated forces,②improving manipulation fluency in VR,and③producing realistic simulation effects of various tool uses,respectively.Based on these three modes,our reconfigurable data glove collects and reconstructs fine-grained human grasp data in both physical and virtual environments,thereby opening up new avenues for the learning of manipulation skills for embodied AI agents.
基金funded by National Natural Science Foundation of China(21868003)Bama County Program for Talents in Science and Technology(BaRenKe20210045).
文摘The traditional nutritional and medical hemp(Cannabis sativa L.)seed protein were explored for the discovery and directional preparation of new xanthine oxidase inhibitory(XOI)peptides by structure-based virtual screening,compound synthesis,in vitro bioassay and proteolysis.Six subtypes of hemp seed edestin and albumin were in silico hydrolyzed by 29 proteases,and 192 encrypted bioactive peptides were screened out.Six peptides showed to be XOI peptides,of which four(about 67%)were released by elastase hydrolysis.The peptide DDNPRRFY displayed the highest XOI activity(IC50=(2.10±0.06)mg/mL),acting as a mixed inhibitor.The pancreatic elastase directionally prepared XOI hemp seed protein hydrolysates,from which 6 high-abundance XOI peptides encrypted 3 virtually-screened ones including the DDNPRRFY.The novel outstanding hemp seed protein-derived XOI peptides and their virtual screening and directed preparation methods provide a promising and applicable approach to conveniently and efficiently explore food-derived bioactive peptides.
基金supported by“Regional Innovation Strategy(RIS)”through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(MOE)(2021RIS-002)the Technology Development Program(RS-2023-00278623)funded by the Ministry of SMEs and Startups(MSS,Korea).
文摘This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery(LiB)time series data.As the energy sector increasingly focuses on integrating distributed energy resources,Virtual Power Plants(VPP)have become a vital new framework for energy management.LiBs are key in this context,owing to their high-efficiency energy storage capabilities essential for VPP operations.However,LiBs are prone to various abnormal states like overcharging,over-discharging,and internal short circuits,which impede power transmission efficiency.Traditional methods for detecting such abnormalities in LiB are too broad and lack precision for the dynamic and irregular nature of LiB data.In response,we introduce an innovative method:a Long Short-Term Memory(LSTM)autoencoder based on Dynamic Frequency Memory and Correlation Attention(DFMCA-LSTM-AE).This unsupervised,end-to-end approach is specifically designed for dynamically monitoring abnormal states in LiB data.The method starts with a Dynamic Frequency Fourier Transform module,which dynamically captures the frequency characteristics of time series data across three scales,incorporating a memory mechanism to reduce overgeneralization of abnormal frequencies.This is followed by integrating LSTM into both the encoder and decoder,enabling the model to effectively encode and decode the temporal relationships in the time series.Empirical tests on a real-world LiB dataset demonstrate that DFMCA-LSTM-AE outperforms existing models,achieving an average Area Under the Curve(AUC)of 90.73%and an F1 score of 83.83%.These results mark significant improvements over existing models,ranging from 2.4%–45.3%for AUC and 1.6%–28.9%for F1 score,showcasing the model’s enhanced accuracy and reliability in detecting abnormal states in LiB data.
文摘As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.
基金supported financially by the National Key R&D Program of China(Grant No.2022YFB3706602)the National Natural Science Foundation of China(Grant Nos.42272041,41902034,and 12011530063)the Jilin University High-Level Innovation Team Foundation,China(Grant No.2021TD-05).
文摘Ultrahigh-temperature-pressure experiments are crucial for understanding the physical and chemical properties of matter.The recent development of boron-doped diamond(BDD)heaters has made such melting experiments possible in large-volume presses.However,estimates of temperatures above 2600 K and of the temperature distributions inside BDD heaters are not well constrained,owing to the lack of a suitable thermometer.Here,we establish a three-dimensional finite element model as a virtual thermometer to estimate the temperature and temperature field above 2600 K.The advantage of this virtual thermometer over those proposed in previous studies is that it considers both alternating and direct current heating modes,the actual sizes of cell assemblies after compression,the effects of the electrode,thermocouple and anvil,and the heat dissipation by the pressure-transmitting medium.The virtual thermometer reproduces the power-temperature relationships of ultrahigh-temperature-pressure experiments below 2600 K at press loads of 2.8-7.9 MN(~19 to 28 GPa)within experimental uncertainties.The temperatures above 2600 K predicted by our virtual thermometer are within the uncertainty of those extrapolated from power-temperature relationships below 2600 K.Furthermore,our model shows that the temperature distribution inside a BDD heater(19-26 K/mm along the radial direction and<83 K/mm along the longitudinal direction)is more homogeneous than those inside conventional heaters such as graphite or LaCrO_(3) heaters(100-200 K/mm).Our study thus provides a reliable virtual thermometer for ultrahigh-temperature experiments using BDD heaters in Earth and material sciences.
基金supported by the National Key Research and Development Program of China(Grant No.2021YFA1402100)。
文摘Realization of high performance satellite onboard clock is vital for various positioning, navigation, and timing applications. For further improvement of the synchronization-based satellite time and frequency references, we propose a geosynchronous(GEO) satellite virtual clock concept based on ground–satellite synchronization and present a beacon transponder structure for its implementation(scheduled for launch in 2025), which does not require atomic clocks to be mounted on the satellite. Its high performance relies only on minor modifications to the existing transponder structure of GEO satellites. We carefully model the carrier phase link and analyze the factors causing link asymmetry within the special relativity. Considering that performance of such synchronization-based satellite clocks is primarily limited by the link's random phase noise, which cannot be adequately modeled, we design a closed-loop experiment based on commercial GEO satellites for pre-evaluation. This experiment aims at extracting the zero-means random part of the ground-satellite Ku-band carrier phase via a feedback loop. Ultimately, we obtain a 1σ value of 0.633 ps(two-way link), following the Gaussian distribution. From this result, we conclude that the proposed real-time Einstein-synchronization-defined satellite virtual clock can achieve picosecond-level replication of onboard time and frequency.
文摘In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a good application prospect.Firstly,a numerical virtual flight simulation model based on overlapping dynamic mesh technology is constructed.In order to verify the accuracy of the dynamic grid technology and the calculation of unsteady flow,a numerical simulation of the basic finner projectile without control is carried out.The simulation results are in good agreement with the experiment data which shows that the algorithm used in this paper can also be used in the design and evaluation of the intelligent controller in the numerical virtual flight simulation.Secondly,combined with the real-time control requirements of aerodynamic,attitude and displacement parameters of the projectile during the flight process,the numerical simulations of the basic finner projectile’s pitch channel are carried out under the traditional PID(Proportional-Integral-Derivative)control strategy and the intelligent PID control strategy respectively.The intelligent PID controller based on BP(Back Propagation)neural network can realize online learning and self-optimization of control parameters according to the acquired real-time flight parameters.Compared with the traditional PID controller,the concerned control variable overshoot,rise time,transition time and steady state error and other performance indicators have been greatly improved,and the higher the learning efficiency or the inertia coefficient,the faster the system,the larger the overshoot,and the smaller the stability error.The intelligent control method applying on numerical virtual flight is capable of solving the complicated unsteady motion and flow with the intelligent PID control strategy and has a strong promotion to engineering application.
基金supported in part by the National Key R&D Program of China under Grant 2022YFB2703304in part by the National Natural Science Foundation of China under Grant 52074064in part by the Fundamental Research Funds for the Central Universities under Grant N2404013,N2404015.
文摘In the process of dense vehicles traveling fast,there will be mutual occlusion between vehicles,which will lead to the problem of deterioration of the tracking effect of different vehicles,so this paper proposes a research method of virtual simulation video vehicle target tracking based on you only look once(YOLO)v5s and deep simple online and realtime tracking(DeepSort).Given that the DeepSort algorithm is currently the most effective tracking method,this paper merges the YOLOv5 algorithm with the DeepSort algorithm.Then it adds the efficient channel attention networks(ECA-Net)focusing mechanism at the back for the cross-stage partial bottleneck with 3 convolutions(C3)modules about the YOLOv5 backbone network and before the up-sampling of the Neck feature pyramid.The YOLOv5 algorithm adopts expected intersection over union(EIOU)instead of complete intersection over union(CIOU)as the loss function of the target frame regression.The improved YOLOv5 algorithm is named YOLOv5-Block.The experimental results show that in the special vehicle target detection(TD)and tracking in the virtual simulation environment,The YOLOv5-Block algorithm has an average accuracy(AP)of 99.5%,which significantly improves the target recognition correctness for typical occlusion cases,and is 1.48 times better than the baseline algorithm.After the virtual simulation video sequence test,multiple objects tracking accuracy(MOTA)and various objects tracking precision(MOTP)improved by 10.7 and 1.75 percentage points,respectively,and the number of vehicle target identity document(ID)switches decreased.Compared with recent mainstream vehicle detection and tracking models,the YOLOv5-Block+Deepsort algorithm can accurately and continuously complete the detection and tracking tasks of special vehicle targets in different scenes.
基金the National Key R&D Program of China(Grant No.2022YFC3003902)the National Natural Science Foundation of China(Grant No.42075146).
文摘This work uses cloud-resolving simulations to study mock-Walker cells driven by a specified sea surface temperature(SST).The associated precipitation in the mock-Walker cells exhibits three different modes,including a single peak of precipitation over the SST maximum(mode 1),symmetric double peaks of precipitation straddling the SST maximum(mode 2),and a single peak of precipitation on one side of the SST maximum(mode 3).The three modes are caused by three distinct convective activity center migration traits.Analyses indicate that the virtual effect of water vapor plays an important role in differentiating the three modes.When the SST gradient is large,the virtual effect may be strong enough to overcome the temperature effect,generating a low-level low-pressure anomaly below the ascending branch of the Walker cell off the center.The results here highlight the importance of the virtual effect of water vapor and its interaction with convection and large-scale circulation in the Walker circulation.
基金supported in part by the Science and Technology Project Program of Sichuan under Grant 2022YFG0022in part by the Science and Technology Research Program of Chongqing Municipal Education Commission under Grant KJZD-K202000602+1 种基金in part by the General Program of Natural Science Foundation of Chongqing under Grant cstc2020jcyj-msxmX1021in part by the Chongqing Natural Science Foundation of China under Grant cstc2020jcyj-msxmX0343.
文摘In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish security-threat assessment architectures to evaluate risks of traffic elements by managing and sharing securitythreat information.Unfortunately,most assessment architectures process data in a centralized manner,causing delays in query services.To address this issue,in this paper,a Hierarchical Blockchain-enabled Security threat Assessment Architecture(HBSAA)is proposed,utilizing edge chains and global chains to share data.In addition,data virtualization technology is introduced to manage multi-source heterogeneous data,and a metadata association model based on attribute graph is designed to deal with complex data relationships.In order to provide high-speed query service,the ant colony optimization of key nodes is designed,and the HBSAA prototype is also developed and the performance is tested.Experimental results on the large-scale vulnerabilities data gathered from NVD demonstrate that the HBSAA not only shields data heterogeneity,but also reduces service response time.