The first-principles calculations are performed to examine structural,mechanical,and electronic properties at large strain for a monolayer C_(4)N_(4),which has been predicted as an anchoring promising material to atte...The first-principles calculations are performed to examine structural,mechanical,and electronic properties at large strain for a monolayer C_(4)N_(4),which has been predicted as an anchoring promising material to attenuate shuttle effect in Li–S batteries stemming from its large absorption energy and low diffusion energy barrier.Our results show that the ideal strengths of C_(4)N_(4)under tension and pure shear deformation conditions reach 13.9 GPa and 12.5 GPa when the strains are 0.07 and 0.28,respectively.The folded five-membered rings and diverse bonding modes between carbon and nitrogen atoms enhance the ability to resist plastic deformation of C_(4)N_(4).The orderly bond-rearranging behaviors under the weak tensile loading path along the[100]direction cause the impressive semiconductor–metal transition and inverse semiconductor–metal transition.The present results enrich the knowledge of the structure and electronic properties of C_(4)N_(4)under deformations and shed light on exploring other two-dimensional materials under diverse loading conditions.展开更多
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su...With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value.展开更多
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal...In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system.展开更多
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate...In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.展开更多
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g....Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.展开更多
In the case of massive data,matrix operations are very computationally intensive,and the memory limitation in standalone mode leads to the system inefficiencies.At the same time,it is difficult for matrix operations t...In the case of massive data,matrix operations are very computationally intensive,and the memory limitation in standalone mode leads to the system inefficiencies.At the same time,it is difficult for matrix operations to achieve flexible switching between different requirements when implemented in hardware.To address this problem,this paper proposes a matrix operation accelerator based on reconfigurable arrays in the context of the application of recommender systems(RS).Based on the reconfigurable array processor(APR-16)with reconfiguration,a parallelized design of matrix operations on processing element(PE)array is realized with flexibility.The experimental results show that,compared with the proposed central processing unit(CPU)and graphics processing unit(GPU)hybrid implementation matrix multiplication framework,the energy efficiency ratio of the accelerator proposed in this paper is improved by about 35×.Compared with blocked alternating least squares(BALS),its the energy efficiency ratio has been accelerated by about 1×,and the switching of matrix factorization(MF)schemes suitable for different sparsity can be realized.展开更多
Backscatter communications will play an important role in connecting everything for beyond 5G(B5G)and 6G systems.One open challenge for backscatter communications is that the signals suffer a round-trip path loss so t...Backscatter communications will play an important role in connecting everything for beyond 5G(B5G)and 6G systems.One open challenge for backscatter communications is that the signals suffer a round-trip path loss so that the communication distance is short.In this paper,we first calculate the communication distance upper bounds for both uplink and downlink by measuring the tag sensitivity and reflection coefficient.It is found that the activation voltage of the envelope detection diode of the downlink tag is the main factor limiting the back-scatter communication distance.Based on this analysis,we then propose to implement a low-noise amplifier(LNA)module before the envelope detection at the tag to enhance the incident signal strength.Our experimental results on the hardware platform show that our method can increase the downlink communication range by nearly 20 m.展开更多
In recent years, numerous theoretical tandem mass spectrometry prediction methods have been proposed, yet a systematic study and evaluation of their theoretical accuracy limits have not been conducted. If the accuracy...In recent years, numerous theoretical tandem mass spectrometry prediction methods have been proposed, yet a systematic study and evaluation of their theoretical accuracy limits have not been conducted. If the accuracy of current methods approaches this limit, further exploration of new prediction techniques may become redundant. Conversely, a need for more precise prediction methods or models may be indicated. In this study, we have experimentally analyzed the limits of accuracy at different numbers of ions and parameters using repeated spectral pairs and integrating various similarity metrics. Results show significant achievements in accuracy for backbone ion methods with room for improvement. In contrast, full-spectrum prediction methods exhibit greater potential relative to the theoretical accuracy limit. Additionally, findings highlight the significant impact of normalized collision energy and instrument type on prediction accuracy, underscoring the importance of considering these factors in future theoretical tandem mass spectrometry predictions.展开更多
In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to in...In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to individually present their laptops for inspection. The paper introduced a method for laptop removal. By combining projection algorithms with the YOLOv7-Seg model, a laptop’s three views were generated through projection, and instance segmentation of these views was achieved using YOLOv7-Seg. The resulting 2D masks from instance segmentation at different angles were employed to reconstruct a 3D mask through angle restoration. Ultimately, the intersection of this 3D mask with the original 3D data enabled the successful extraction of the laptop’s 3D information. Experimental results demonstrated that the fusion of projection and instance segmentation facilitated the automatic removal of laptops from CT data. Moreover, higher instance segmentation model accuracy leads to more precise removal outcomes. By implementing the laptop removal functionality, the civil aviation security screening process becomes more efficient and convenient. Passengers will no longer be required to individually handle their laptops, effectively enhancing the efficiency and accuracy of security screening.展开更多
Electroencephalogram(EEG) signals contain important information about the regulation of brain system. Thus, automatic detection of epilepsy by analyzing the characteristics obtained from EEG signals has important rese...Electroencephalogram(EEG) signals contain important information about the regulation of brain system. Thus, automatic detection of epilepsy by analyzing the characteristics obtained from EEG signals has important research implications in the field of clinical medicine. In this paper, the horizontal visibility graph(HVG) algorithm is used to map multifractal EEG signals into complex networks. Then, we study the structure of the networks and explore the nonlinear dynamics properties of the EEG signals inherited from these networks. In order to better describe complex brain behaviors, we use the angle between two connected nodes as the edge weight of the network and construct the weighted horizontal visibility graph(WHVG). In our studies, fractality and multifractality of WHVG are innovatively used to analyze the structure of related networks. However, these methods only analyze the reconstructed dynamical system in general characterizations,they are not sufficient to describe the complex behavior and cannot provide a comprehensive picture of the system. To this effect, we propose an improved multiscale multifractal analysis(MMA) for network, which extends the description of the network dynamics features by focusing on the relationship between the multifractality and the measured scale-free intervals.Furthermore, neural networks are applied to train the above-mentioned parameters for the classification and identification of three kinds of EEG signals, i.e., health, interictal phase, and ictal phase. By evaluating our experimental results, the classification accuracy is 99.0%, reflecting the effectiveness of the WHVG algorithm in extracting the potential dynamic characteristics of EEG signals.展开更多
With the development of urbanization,the problem of neurological diseases brought about by population aging has gradually become a social problem of worldwide concern.Aging leads to gradual degeneration of the central...With the development of urbanization,the problem of neurological diseases brought about by population aging has gradually become a social problem of worldwide concern.Aging leads to gradual degeneration of the central nervous system,shrinkage of brain tissue,and decline in physical function in many elderlies,making them susceptible to neurological diseases such as Alzheimer’s disease(AD),stroke,Parkinson’s and major depressive disorder(MDD).Due to the influence of these neurological diseases,the elderly have troubles such as memory loss,inability to move,falling,and getting lost,which seriously affect their quality of life.Tracking and positioning of elderly with neurological diseases and keeping track of their location in real-time are necessary and crucial in order to detect and treat dangerous and unexpected situations in time.Considering that the elderly with neurological diseases forget to wear a positioning device or have mobility problems due to carrying a positioning device,device-free positioning as a passive positioning technology that detects device-free individuals is more suitable than traditional active positioning for the home-based care of the elderly with neurological diseases.This paper provides an extensive and in-depth survey of device-free indoor positioning technology for home-based care and an in-depth analysis of the main features of current positioning systems,as well as the techniques,technologies andmethods they employ,fromthe perspective of the needs of the elderly with neurological conditions.Moreover,evaluation criteria and possible solutions of positioning techniques for the home-based care of the elderly with neurological conditions are proposed.Finally,the opportunities and challenges for the development of indoor positioning technology in 6G mobile networks for home-based care of the elderly with neurological diseases are discussed.This review has provided comprehensive and effective tracking and positioning techniques,technologies and methods for the elderly,by which we can obtain the location information of the elderly in real-time and make home-based care more comfortable and safer for the elderly with neurological diseases.展开更多
A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combin...A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.展开更多
Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote devices.Taskoffloading has several advantage...Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote devices.Taskoffloading has several advantages,including increased battery life,lower latency,and better application performance.A task offloading method determines whether sections of the full application should be run locally or offloaded for execution remotely.The offloading choice problem is influenced by several factors,including application properties,network conditions,hardware features,and mobility,influencing the offloading system’s operational environment.This study provides a thorough examination of current task offloading and resource allocation in edge computing,covering offloading strategies,algorithms,and factors that influence offloading.Full offloading and partial offloading strategies are the two types of offloading strategies.The algorithms for task offloading and resource allocation are then categorized into two parts:machine learning algorithms and non-machine learning algorithms.We examine and elaborate on algorithms like Supervised Learning,Unsupervised Learning,and Reinforcement Learning(RL)under machine learning.Under the non-machine learning algorithm,we elaborate on algorithms like non(convex)optimization,Lyapunov optimization,Game theory,Heuristic Algorithm,Dynamic Voltage Scaling,Gibbs Sampling,and Generalized Benders Decomposition(GBD).Finally,we highlight and discuss some research challenges and issues in edge computing.展开更多
Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to d...Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems.The value of ISD lies in its ability to guide the design,development,application,and evaluation of largescale information system-of-systems(So Ss),just as mechanical dynamics theories guide mechanical systems engineering.This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space,improving a mathematical theory for information measurement,and proposing a dynamic configuration model for information systems.In this way,it establishes a basic theoretical framework for ISD.The proposed theoretical methodologies have been successfully applied and verified in the Smart Court So Ss Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization.The proposed ISD provides an innovative paradigm for the analysis,design,development,and evaluation of large-scale complex information systems,such as electronic government and smart cities.展开更多
The electrocardiogram(ECG)is one of the physiological signals applied in medical clinics to determine health status.The physiological complexity of the cardiac system is related to age,disease,etc.For the investigatio...The electrocardiogram(ECG)is one of the physiological signals applied in medical clinics to determine health status.The physiological complexity of the cardiac system is related to age,disease,etc.For the investigation of the effects of age and cardiovascular disease on the cardiac system,we then construct multivariate recurrence networks with multiple scale factors from multivariate time series.We propose a new concept of cross-clustering coefficient entropy to construct a weighted network,and calculate the average weighted path length and the graph energy of the weighted network to quantitatively probe the topological properties.The obtained results suggest that these two network measures show distinct changes between different subjects.This is because,with aging or cardiovascular disease,a reduction in the conductivity or structural changes in the myocardium of the heart contributes to a reduction in the complexity of the cardiac system.Consequently,the complexity of the cardiac system is reduced.After that,the support vector machine(SVM)classifier is adopted to evaluate the performance of the proposed approach.Accuracy of 94.1%and 95.58%between healthy and myocardial infarction is achieved on two datasets.Therefore,this method can be adopted for the development of a noninvasive and low-cost clinical prognostic system to identify heart-related diseases and detect hidden state changes in the cardiac system.展开更多
Delay and stability are two key factors that affect the performance of multicast data transmission in a network.However,current algorithms of tree generation hardly meet the requirements of low delay and high sta-bili...Delay and stability are two key factors that affect the performance of multicast data transmission in a network.However,current algorithms of tree generation hardly meet the requirements of low delay and high sta-bility simultaneously.Given a general network,the generation algorithm of a multicast tree with minimum delay and maximum stability is an NP-hard problem,without a precise and efficient algorithm.To address these challenges,this paper studies the generation of low-delay and high-stability multicast trees under the model of spanning tree based on stability probability,degree-constrained,edge-weighted for multicast(T-SDE).A class of algorithms was proposed which creates the multicast tree greedy on the ratio of fan-out to delay(RFD)and probability of stability of terminal to obtain a high performance in multicast.The proposed algorithms greedily select terminals with a large RFD and a high probability of stability as forwarding nodes in the generation of the multicast tree,where the larger RFD and higher stability of upstream nodes are beneficial to achieve a low transmission delay and high stability in multicast.The proposed RFD can be compatible with the original model,which can take advantage of network connectivity during the generation of a multicast tree.This paper carries out simulation experiments on Matlab R2016b to measure the performance of the proposed algorithm.Experimental results show that the proposed algorithm can provide a smaller height,higher stability,and a lower transmission delay of the resulting multicast tree than other solutions.The spanning tree of the proposed algorithms can support low transmission delay and high stability in multicast transmission.展开更多
Thanks to the rapid development of naked-eye 3D and wireless communication technology,3D video related applications on mobile devices have attracted a lot of attention.Nevertheless,the time-varying characteristics of ...Thanks to the rapid development of naked-eye 3D and wireless communication technology,3D video related applications on mobile devices have attracted a lot of attention.Nevertheless,the time-varying characteristics of the wireless channel is very challenging for conventional source-channel coding based transmission strategy.Also,the high complexity of source-channel coding based transmission scheme is undesired for low power mobile terminals.An advanced transmission scheme named Softcast was proposed to achieve efficient transmission performance for 2D image/video.Unfortunately,it cannot be directly applied to wireless 3D video transmission with high efficiency.This paper proposes a more efficient soft transmission scheme for 3D video with a graceful quality adaptation within a wide range of channel Signal-to-Noise Ratio(SNR).The proposed method first extends the linear transform to 4 dimensions with additional view dimension to eliminate the view redundancy,and then metadata optimization and chunk interleaving are designed to further improve the transmission performance.Meanwhile,a synthesis distortion based chunk discard strategy is developed to improve the overall 3D video quality under the condition of limited bandwidth.The experimental results demonstrate that the proposed method significantly improves the 3D video transmission performance over the wireless channel for low power and low complexity scenarios.展开更多
A Taylor series expansion(TSE) based design for minimum mean-square error(MMSE) and QR decomposition(QRD) of multi-input and multi-output(MIMO) systems is proposed based on application specific instruction set process...A Taylor series expansion(TSE) based design for minimum mean-square error(MMSE) and QR decomposition(QRD) of multi-input and multi-output(MIMO) systems is proposed based on application specific instruction set processor(ASIP), which uses TSE algorithm instead of resource-consuming reciprocal and reciprocal square root(RSR) operations.The aim is to give a high performance implementation for MMSE and QRD in one programmable platform simultaneously.Furthermore, instruction set architecture(ISA) and the allocation of data paths in single instruction multiple data-very long instruction word(SIMD-VLIW) architecture are provided, offering more data parallelism and instruction parallelism for different dimension matrices and operation types.Meanwhile, multiple level numerical precision can be achieved with flexible table size and expansion order in TSE ISA.The ASIP has been implemented to a 28 nm CMOS process and frequency reaches 800 MHz.Experimental results show that the proposed design provides perfect numerical precision within the fixed bit-width of the ASIP, higher matrix processing rate better than the requirements of 5G system and more rate-area efficiency comparable with ASIC implementations.展开更多
Hydrostatic pressure provides an efficient way to tune and optimize the properties of solid materials without chang-ing their composition.In this work,we investigate the electronic,optical,and mechanical properties of...Hydrostatic pressure provides an efficient way to tune and optimize the properties of solid materials without chang-ing their composition.In this work,we investigate the electronic,optical,and mechanical properties of antiperovskite X_(3)NP(X^(2+)=Ca,Mg)upon compression by first-principles calculations.Our results reveal that the system is anisotropic,and the lat-tice constant a of X_(3)NP exhibits the fastest rate of decrease upon compression among the three directions,which is different from the typical Pnma phase of halide and chalcogenide perovskites.Meanwhile,Ca_(3)NP has higher compressibility than Mg_(3)NP due to its small bulk modulus.The electronic and optical properties of Mg_(3)NP show small fluctuations upon compression,but those of Ca_(3)NP are more sensitive to pressure due to its higher compressibility and lower unoccupied 3d orbital energy.For example,the band gap,lattice dielectric constant,and exciton binding energy of Ca_(3)NP decrease rapidly as the pressure increases.In addition,the increase in pressure significantly improves the optical absorption and theoretical conversion effi-ciency of Ca_(3)NP.Finally,the mechanical properties of X_(3)NP are also increased upon compression due to the reduction in bond length,while inducing a brittle-to-ductile transition.Our research provides theoretical guidance and insights for future experi-mental tuning of the physical properties of antiperovskite semiconductors by pressure.展开更多
The combination of quantitative evaluation(QE)and non-quantitative evaluation(NQE)is an important evaluation tool in the fields of academic level evaluation(e.g.,EasyChair,Academic paper review form)and internet commo...The combination of quantitative evaluation(QE)and non-quantitative evaluation(NQE)is an important evaluation tool in the fields of academic level evaluation(e.g.,EasyChair,Academic paper review form)and internet commodity evaluation(e.g.,Amazon’s review,Feedback).But the inconsistency between QE and NQE greatly reduces the correctness and usability of the evaluation.Therefore,it is a necessary task to judge whether QE is consistent with NQE.In this paper,the predicate formula satisfiability problem is firstly reduced in polynomial time to the consistency problem of QE and NQE,and the uncertainty of the consistency problem is proved.Then the approximate solution to the problem is investigated by using a natural language processing method,which performs sentiment analysis on NQE and finally invokes a database query statement to determine whether QE is consistent with NQE.The results shed light on the feasibility of using the natural language processing method to solve undecidable problems.展开更多
基金Project support by the National Natural Science Foundation of China(Grant Nos.11704044 and 12074140)。
文摘The first-principles calculations are performed to examine structural,mechanical,and electronic properties at large strain for a monolayer C_(4)N_(4),which has been predicted as an anchoring promising material to attenuate shuttle effect in Li–S batteries stemming from its large absorption energy and low diffusion energy barrier.Our results show that the ideal strengths of C_(4)N_(4)under tension and pure shear deformation conditions reach 13.9 GPa and 12.5 GPa when the strains are 0.07 and 0.28,respectively.The folded five-membered rings and diverse bonding modes between carbon and nitrogen atoms enhance the ability to resist plastic deformation of C_(4)N_(4).The orderly bond-rearranging behaviors under the weak tensile loading path along the[100]direction cause the impressive semiconductor–metal transition and inverse semiconductor–metal transition.The present results enrich the knowledge of the structure and electronic properties of C_(4)N_(4)under deformations and shed light on exploring other two-dimensional materials under diverse loading conditions.
基金supported by the Major Public Welfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value.
基金supported by National Natural Science Foundation of China (62171390)Central Universities of Southwest Minzu University (ZYN2022032,2023NYXXS034)the State Scholarship Fund of the China Scholarship Council (NO.202008510081)。
文摘In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system.
基金supported in part by the National Natural Science Foundation of China under Grant No.U2268204,62172061 and 61871422National Key R&D Program of China under Grant No.2020YFB1711800 and 2020YFB1707900+2 种基金the Science and Technology Project of Sichuan Province under Grant No.2023ZHCG0014,2023ZHCG0011,2022YFG0155,2022YFG0157,2021GFW019,2021YFG0152,2021YFG0025,2020YFG0322Central Universities of Southwest Minzu University under Grant No.ZYN2022032,2023NYXXS034the State Scholarship Fund of the China Scholarship Council under Grant No.202008510081。
文摘In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.
基金the support of Prince Sultan University for the Article Processing Charges(APC)of this publication。
文摘Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.
基金the National Key R&D Program of China(No.2022ZD0119001)the National Natural Science Foundation of China(No.61834005)+3 种基金the Shaanxi Province Key R&D Plan(No.2022GY-027)the Key Scientific Research Project of Shaanxi Department of Education(No.22JY060)the Education Research Project of Xi'an University of Posts and Telecommunications(No.JGA202108)the Graduate Student Innovation Fund of Xi’an University of Posts and Telecommunications(No.CXJJYL2022035).
文摘In the case of massive data,matrix operations are very computationally intensive,and the memory limitation in standalone mode leads to the system inefficiencies.At the same time,it is difficult for matrix operations to achieve flexible switching between different requirements when implemented in hardware.To address this problem,this paper proposes a matrix operation accelerator based on reconfigurable arrays in the context of the application of recommender systems(RS).Based on the reconfigurable array processor(APR-16)with reconfiguration,a parallelized design of matrix operations on processing element(PE)array is realized with flexibility.The experimental results show that,compared with the proposed central processing unit(CPU)and graphics processing unit(GPU)hybrid implementation matrix multiplication framework,the energy efficiency ratio of the accelerator proposed in this paper is improved by about 35×.Compared with blocked alternating least squares(BALS),its the energy efficiency ratio has been accelerated by about 1×,and the switching of matrix factorization(MF)schemes suitable for different sparsity can be realized.
基金supported in part by National Natural Science Foundation of China under Grant Nos.61971029 and U22B2004in part by Beijing Municipal Natural Science Foundation under Grant No.L222002.
文摘Backscatter communications will play an important role in connecting everything for beyond 5G(B5G)and 6G systems.One open challenge for backscatter communications is that the signals suffer a round-trip path loss so that the communication distance is short.In this paper,we first calculate the communication distance upper bounds for both uplink and downlink by measuring the tag sensitivity and reflection coefficient.It is found that the activation voltage of the envelope detection diode of the downlink tag is the main factor limiting the back-scatter communication distance.Based on this analysis,we then propose to implement a low-noise amplifier(LNA)module before the envelope detection at the tag to enhance the incident signal strength.Our experimental results on the hardware platform show that our method can increase the downlink communication range by nearly 20 m.
文摘In recent years, numerous theoretical tandem mass spectrometry prediction methods have been proposed, yet a systematic study and evaluation of their theoretical accuracy limits have not been conducted. If the accuracy of current methods approaches this limit, further exploration of new prediction techniques may become redundant. Conversely, a need for more precise prediction methods or models may be indicated. In this study, we have experimentally analyzed the limits of accuracy at different numbers of ions and parameters using repeated spectral pairs and integrating various similarity metrics. Results show significant achievements in accuracy for backbone ion methods with room for improvement. In contrast, full-spectrum prediction methods exhibit greater potential relative to the theoretical accuracy limit. Additionally, findings highlight the significant impact of normalized collision energy and instrument type on prediction accuracy, underscoring the importance of considering these factors in future theoretical tandem mass spectrometry predictions.
文摘In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to individually present their laptops for inspection. The paper introduced a method for laptop removal. By combining projection algorithms with the YOLOv7-Seg model, a laptop’s three views were generated through projection, and instance segmentation of these views was achieved using YOLOv7-Seg. The resulting 2D masks from instance segmentation at different angles were employed to reconstruct a 3D mask through angle restoration. Ultimately, the intersection of this 3D mask with the original 3D data enabled the successful extraction of the laptop’s 3D information. Experimental results demonstrated that the fusion of projection and instance segmentation facilitated the automatic removal of laptops from CT data. Moreover, higher instance segmentation model accuracy leads to more precise removal outcomes. By implementing the laptop removal functionality, the civil aviation security screening process becomes more efficient and convenient. Passengers will no longer be required to individually handle their laptops, effectively enhancing the efficiency and accuracy of security screening.
基金Project supported by the Xuzhou Key Research and Development Program (Social Development) (Grant No. KC21304)the National Natural Science Foundation of China (Grant No. 61876186)。
文摘Electroencephalogram(EEG) signals contain important information about the regulation of brain system. Thus, automatic detection of epilepsy by analyzing the characteristics obtained from EEG signals has important research implications in the field of clinical medicine. In this paper, the horizontal visibility graph(HVG) algorithm is used to map multifractal EEG signals into complex networks. Then, we study the structure of the networks and explore the nonlinear dynamics properties of the EEG signals inherited from these networks. In order to better describe complex brain behaviors, we use the angle between two connected nodes as the edge weight of the network and construct the weighted horizontal visibility graph(WHVG). In our studies, fractality and multifractality of WHVG are innovatively used to analyze the structure of related networks. However, these methods only analyze the reconstructed dynamical system in general characterizations,they are not sufficient to describe the complex behavior and cannot provide a comprehensive picture of the system. To this effect, we propose an improved multiscale multifractal analysis(MMA) for network, which extends the description of the network dynamics features by focusing on the relationship between the multifractality and the measured scale-free intervals.Furthermore, neural networks are applied to train the above-mentioned parameters for the classification and identification of three kinds of EEG signals, i.e., health, interictal phase, and ictal phase. By evaluating our experimental results, the classification accuracy is 99.0%, reflecting the effectiveness of the WHVG algorithm in extracting the potential dynamic characteristics of EEG signals.
基金supported by the National Natural Science Foundation of China under Grant No.61701284the Innovative Research Foundation of Qingdao under Grant No.19-6-2-1-CG+5 种基金the Elite Plan Project of Shandong University of Science and Technology under Grant No.skr21-3-B-048the Sci.&Tech.Development Fund of Shandong Province of China under Grant Nos.ZR202102230289,ZR202102250695,and ZR2019LZH001the Humanities and Social Science Research Project of the Ministry of Education under Grant No.18YJAZH017the Taishan Scholar Program of Shandong Province,the Shandong Chongqing Science and Technology Cooperation Project under Grant No.cstc2020jscx-lyjsAX0008the Sci.&Tech.Development Fund of Qingdao under Grant No.21-1-5-zlyj-1-zc,SDUST Research Fund under Grant No.2015TDJH102the Science and Technology Support Plan of Youth Innovation Team of Shandong higher School under Grant No.2019KJN024.
文摘With the development of urbanization,the problem of neurological diseases brought about by population aging has gradually become a social problem of worldwide concern.Aging leads to gradual degeneration of the central nervous system,shrinkage of brain tissue,and decline in physical function in many elderlies,making them susceptible to neurological diseases such as Alzheimer’s disease(AD),stroke,Parkinson’s and major depressive disorder(MDD).Due to the influence of these neurological diseases,the elderly have troubles such as memory loss,inability to move,falling,and getting lost,which seriously affect their quality of life.Tracking and positioning of elderly with neurological diseases and keeping track of their location in real-time are necessary and crucial in order to detect and treat dangerous and unexpected situations in time.Considering that the elderly with neurological diseases forget to wear a positioning device or have mobility problems due to carrying a positioning device,device-free positioning as a passive positioning technology that detects device-free individuals is more suitable than traditional active positioning for the home-based care of the elderly with neurological diseases.This paper provides an extensive and in-depth survey of device-free indoor positioning technology for home-based care and an in-depth analysis of the main features of current positioning systems,as well as the techniques,technologies andmethods they employ,fromthe perspective of the needs of the elderly with neurological conditions.Moreover,evaluation criteria and possible solutions of positioning techniques for the home-based care of the elderly with neurological conditions are proposed.Finally,the opportunities and challenges for the development of indoor positioning technology in 6G mobile networks for home-based care of the elderly with neurological diseases are discussed.This review has provided comprehensive and effective tracking and positioning techniques,technologies and methods for the elderly,by which we can obtain the location information of the elderly in real-time and make home-based care more comfortable and safer for the elderly with neurological diseases.
基金supported by the National Key R&D Program of China (No.2021YFF0901002)the National Natural Science Foundation of China (No.61802291)+1 种基金Fundamental Research Funds for the Provincial Universities of Zhejiang (GK199900299012-025)Fundamental Research Funds for the Central Universities (No.JB210311).
文摘A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.
基金supported by the National Natural Science Foundation of China(Grant No.61872002)Anhui Province Key Research and Development Program Project(Grant No.201904a05020091).
文摘Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote devices.Taskoffloading has several advantages,including increased battery life,lower latency,and better application performance.A task offloading method determines whether sections of the full application should be run locally or offloaded for execution remotely.The offloading choice problem is influenced by several factors,including application properties,network conditions,hardware features,and mobility,influencing the offloading system’s operational environment.This study provides a thorough examination of current task offloading and resource allocation in edge computing,covering offloading strategies,algorithms,and factors that influence offloading.Full offloading and partial offloading strategies are the two types of offloading strategies.The algorithms for task offloading and resource allocation are then categorized into two parts:machine learning algorithms and non-machine learning algorithms.We examine and elaborate on algorithms like Supervised Learning,Unsupervised Learning,and Reinforcement Learning(RL)under machine learning.Under the non-machine learning algorithm,we elaborate on algorithms like non(convex)optimization,Lyapunov optimization,Game theory,Heuristic Algorithm,Dynamic Voltage Scaling,Gibbs Sampling,and Generalized Benders Decomposition(GBD).Finally,we highlight and discuss some research challenges and issues in edge computing.
基金supported by the National Key Research and Development Program of China(2016YFC0800801)the Research and Innovation Project of China University of Political Science and Law(10820356)the Fundamental Research Funds for the Central Universities。
文摘Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems.The value of ISD lies in its ability to guide the design,development,application,and evaluation of largescale information system-of-systems(So Ss),just as mechanical dynamics theories guide mechanical systems engineering.This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space,improving a mathematical theory for information measurement,and proposing a dynamic configuration model for information systems.In this way,it establishes a basic theoretical framework for ISD.The proposed theoretical methodologies have been successfully applied and verified in the Smart Court So Ss Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization.The proposed ISD provides an innovative paradigm for the analysis,design,development,and evaluation of large-scale complex information systems,such as electronic government and smart cities.
基金Project supported by the Xuzhou Key Research and Development Program(Social Development)(Grant No.KC21304)the National Natural Science Foundation of China(Grant No.61876186)。
文摘The electrocardiogram(ECG)is one of the physiological signals applied in medical clinics to determine health status.The physiological complexity of the cardiac system is related to age,disease,etc.For the investigation of the effects of age and cardiovascular disease on the cardiac system,we then construct multivariate recurrence networks with multiple scale factors from multivariate time series.We propose a new concept of cross-clustering coefficient entropy to construct a weighted network,and calculate the average weighted path length and the graph energy of the weighted network to quantitatively probe the topological properties.The obtained results suggest that these two network measures show distinct changes between different subjects.This is because,with aging or cardiovascular disease,a reduction in the conductivity or structural changes in the myocardium of the heart contributes to a reduction in the complexity of the cardiac system.Consequently,the complexity of the cardiac system is reduced.After that,the support vector machine(SVM)classifier is adopted to evaluate the performance of the proposed approach.Accuracy of 94.1%and 95.58%between healthy and myocardial infarction is achieved on two datasets.Therefore,this method can be adopted for the development of a noninvasive and low-cost clinical prognostic system to identify heart-related diseases and detect hidden state changes in the cardiac system.
基金supported by the Hainan Provincial Natural Science Foundation of China(620RC560,2019RC096,620RC562)the Scientific Research Setup Fund of Hainan University(KYQD(ZR)1877)+2 种基金the National Natural Science Foundation of China(62162021,61802092,82160345,61862020)the key research and development program of Hainan province(ZDYF2020199,ZDYF2021GXJS017)the key science and technology plan project of Haikou(2011-016).
文摘Delay and stability are two key factors that affect the performance of multicast data transmission in a network.However,current algorithms of tree generation hardly meet the requirements of low delay and high sta-bility simultaneously.Given a general network,the generation algorithm of a multicast tree with minimum delay and maximum stability is an NP-hard problem,without a precise and efficient algorithm.To address these challenges,this paper studies the generation of low-delay and high-stability multicast trees under the model of spanning tree based on stability probability,degree-constrained,edge-weighted for multicast(T-SDE).A class of algorithms was proposed which creates the multicast tree greedy on the ratio of fan-out to delay(RFD)and probability of stability of terminal to obtain a high performance in multicast.The proposed algorithms greedily select terminals with a large RFD and a high probability of stability as forwarding nodes in the generation of the multicast tree,where the larger RFD and higher stability of upstream nodes are beneficial to achieve a low transmission delay and high stability in multicast.The proposed RFD can be compatible with the original model,which can take advantage of network connectivity during the generation of a multicast tree.This paper carries out simulation experiments on Matlab R2016b to measure the performance of the proposed algorithm.Experimental results show that the proposed algorithm can provide a smaller height,higher stability,and a lower transmission delay of the resulting multicast tree than other solutions.The spanning tree of the proposed algorithms can support low transmission delay and high stability in multicast transmission.
基金supported in part by the National Natural Science Foundation of China under Grant 61501074.
文摘Thanks to the rapid development of naked-eye 3D and wireless communication technology,3D video related applications on mobile devices have attracted a lot of attention.Nevertheless,the time-varying characteristics of the wireless channel is very challenging for conventional source-channel coding based transmission strategy.Also,the high complexity of source-channel coding based transmission scheme is undesired for low power mobile terminals.An advanced transmission scheme named Softcast was proposed to achieve efficient transmission performance for 2D image/video.Unfortunately,it cannot be directly applied to wireless 3D video transmission with high efficiency.This paper proposes a more efficient soft transmission scheme for 3D video with a graceful quality adaptation within a wide range of channel Signal-to-Noise Ratio(SNR).The proposed method first extends the linear transform to 4 dimensions with additional view dimension to eliminate the view redundancy,and then metadata optimization and chunk interleaving are designed to further improve the transmission performance.Meanwhile,a synthesis distortion based chunk discard strategy is developed to improve the overall 3D video quality under the condition of limited bandwidth.The experimental results demonstrate that the proposed method significantly improves the 3D video transmission performance over the wireless channel for low power and low complexity scenarios.
基金Supported by the Industrial Internet Innovation and Development Project of Ministry of Industry and Information Technology (No.GHBJ2004)。
文摘A Taylor series expansion(TSE) based design for minimum mean-square error(MMSE) and QR decomposition(QRD) of multi-input and multi-output(MIMO) systems is proposed based on application specific instruction set processor(ASIP), which uses TSE algorithm instead of resource-consuming reciprocal and reciprocal square root(RSR) operations.The aim is to give a high performance implementation for MMSE and QRD in one programmable platform simultaneously.Furthermore, instruction set architecture(ISA) and the allocation of data paths in single instruction multiple data-very long instruction word(SIMD-VLIW) architecture are provided, offering more data parallelism and instruction parallelism for different dimension matrices and operation types.Meanwhile, multiple level numerical precision can be achieved with flexible table size and expansion order in TSE ISA.The ASIP has been implemented to a 28 nm CMOS process and frequency reaches 800 MHz.Experimental results show that the proposed design provides perfect numerical precision within the fixed bit-width of the ASIP, higher matrix processing rate better than the requirements of 5G system and more rate-area efficiency comparable with ASIC implementations.
基金supported by the Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No. KJQN202100626)the Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No. KJQN202200619)+3 种基金supported by Beijing Institute of Technology Research Fund Program for Young Scholars (Grant No. XSQD-202222008)the support from the National Natural Science Foundation of China (Grant No. 12204081)the Natural Science Foundation of Chongqing (Grant No. 2022NSCQ-MSX2540)supported by TianHe Qingsuo Project-spec ial fund project
文摘Hydrostatic pressure provides an efficient way to tune and optimize the properties of solid materials without chang-ing their composition.In this work,we investigate the electronic,optical,and mechanical properties of antiperovskite X_(3)NP(X^(2+)=Ca,Mg)upon compression by first-principles calculations.Our results reveal that the system is anisotropic,and the lat-tice constant a of X_(3)NP exhibits the fastest rate of decrease upon compression among the three directions,which is different from the typical Pnma phase of halide and chalcogenide perovskites.Meanwhile,Ca_(3)NP has higher compressibility than Mg_(3)NP due to its small bulk modulus.The electronic and optical properties of Mg_(3)NP show small fluctuations upon compression,but those of Ca_(3)NP are more sensitive to pressure due to its higher compressibility and lower unoccupied 3d orbital energy.For example,the band gap,lattice dielectric constant,and exciton binding energy of Ca_(3)NP decrease rapidly as the pressure increases.In addition,the increase in pressure significantly improves the optical absorption and theoretical conversion effi-ciency of Ca_(3)NP.Finally,the mechanical properties of X_(3)NP are also increased upon compression due to the reduction in bond length,while inducing a brittle-to-ductile transition.Our research provides theoretical guidance and insights for future experi-mental tuning of the physical properties of antiperovskite semiconductors by pressure.
基金Shanghai Foundation for Development of Industrial Internet Innovation,China(No.2019-GYHLW-004)。
文摘The combination of quantitative evaluation(QE)and non-quantitative evaluation(NQE)is an important evaluation tool in the fields of academic level evaluation(e.g.,EasyChair,Academic paper review form)and internet commodity evaluation(e.g.,Amazon’s review,Feedback).But the inconsistency between QE and NQE greatly reduces the correctness and usability of the evaluation.Therefore,it is a necessary task to judge whether QE is consistent with NQE.In this paper,the predicate formula satisfiability problem is firstly reduced in polynomial time to the consistency problem of QE and NQE,and the uncertainty of the consistency problem is proved.Then the approximate solution to the problem is investigated by using a natural language processing method,which performs sentiment analysis on NQE and finally invokes a database query statement to determine whether QE is consistent with NQE.The results shed light on the feasibility of using the natural language processing method to solve undecidable problems.