Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbers...Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbersome instrumentation.This study developed a portable and low-cost lactate measurement system,including independently detectable hardware circuits and user-friendly embedded software,computer,and smartphone applications.The experiment verified that the relative error of the detection current in the device circuit was less than 1%.The electrochemical performance was measured by comparing the[Fe(CN)_(6)]^(3−)/[Fe(CN)_(6)]^(4−)solution with the desktop electrochemical workstation CHI660E,and a nearly consistent chronoamperometry(CA)curve was obtained.Two modified lactate sensors were used for CA testing of lactate.Within the concentration range of 0.1 mmol·L^(−1)to 20 mmol·L^(−1),there was a good linear relationship between lactate concentration and steady-state current,with a correlation coefficient(R2)greater than 0.99 and good repeatability,demonstrating the reliability of the developed device.The lactate measurement system developed in this study not only provides excellent detection performance and reliability,but also achieves portability and low cost,providing a new solution for lactate measurement.展开更多
Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and so...Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack (PIA) against FedGNNs. Compared with prior works on centralized GNNs, in PIAFGNN, the attacker can only obtain the global embedding gradient distributed by the central server. The attacker converts the task of stealing the target user’s local embeddings into a regression problem, using a regression model to generate the target graph node embeddings. By training shadow models and property classifiers, the attacker can infer the basic property information within the target graph that is of interest. Experiments on three benchmark graph datasets demonstrate that PIAFGNN achieves attack accuracy of over 70% in most cases, even approaching the attack accuracy of inference attacks against centralized GNNs in some instances, which is much higher than the attack accuracy of the random guessing method. Furthermore, we observe that common defense mechanisms cannot mitigate our attack without affecting the model’s performance on mainly classification tasks.展开更多
This paper mainly explores the architectural form of the interior of Maiji Mountain’s Cave 4 and the spiritual realm it establishes.Previous research holds the view that the niche within Cave 4 is architecturally mod...This paper mainly explores the architectural form of the interior of Maiji Mountain’s Cave 4 and the spiritual realm it establishes.Previous research holds the view that the niche within Cave 4 is architecturally modeled after a tent-like structure.However,after in-depth research,this paper suggests that the niche in Cave 4 is more of an imitation of an embedded stupa,or rather,it reconstructs the stupa in an embedded form within the cave.In prior studies,analysis historical background and architectural details of Cave 4 remains inadequate,thus,this paper aims to take a thorough investigation on this point,and further clarify the significance of the form of the Buddha niche in Cave 4,as well as its construction design origins.Specifically,the octagonal wooden-imitating column,lotus-shaped clamp,inverted lotus pedestal,five lotus petals,and shadow sculptures within the niche,the shallow-relief ceiling and small platform outside the niche,as well as the banana leaf decorations,all suggest that the architectural form Cave 4 imitates is likely a single-story wooden stupa.In this way,the connection that this embedded stupa creates between the Budda and the faithful,is more direct and intimate,especially compared to the one built in traditional Buddhist activities.Moreover,by coordinating with various visual materials inside the cave,such as the layout of the Dharma assembly and the exquisite details of the Buddha images,it reconstructs the“realm of the mind”in Buddhism,reinforcing the faithful’s dual experience both in physical and spiritual fields.The Master Teacher Studio of basic education came into being with the new curriculum reform,which has become a new mechanism for the construction of teaching staff in social situations in China.As a brand-new way in the construction of teaching staff in the new era,through reviewing the relevant research,it is found that the focus of academic circles on Master Teacher Studio is mainly in four aspects:clarifying the conceptual boundary,seeking theoretical support,defining the functional orientation,and exploring status quo of development.The exploration of the research process is not only a process of summary but also a process of reflection.By reviewing relevant research,reflecting on the problems that have appeared in the process of building the Master Teacher Studio in basic education,clarify the development path of the Master Teacher Studio and further affirm its advantages to the construction of teaching staff in the Chinese context.展开更多
The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storag...The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications.展开更多
BACKGROUND Research on the combined use of ear acupoint embedding beans and warming meridians with cold-dispersing formulas for alleviating resting pain in patients with arteriosclerosis obliterans(ASO)remains limited...BACKGROUND Research on the combined use of ear acupoint embedding beans and warming meridians with cold-dispersing formulas for alleviating resting pain in patients with arteriosclerosis obliterans(ASO)remains limited.AIM To explore the therapeutic efficacy of auricular point embedding beans combined with Wenjing Sanhan prescription in alleviating resting pain in patients with lower-limb ASO.METHODS A total of 100 patients with ASO experiencing resting pain who were treated at our hospital from January 2022 to January 2023 were enrolled.They were randomly allocated into two groups using a double-blind approach.The control group was treated using a warming meridian with a cold-dispersing formula,while the study group received additional treatment with ear acupoint embedding beans.The clinical efficacy,ankle-brachial artery pressure ratio,hemorheological indicators,and traditional Chinese medicine symptom scores were compared between the two groups.RESULTS The clinical efficacy rate in the study group was significantly higher(94.00%)than that in the control group(72.00%,P<0.05).Moreover,the ankle-brachial artery pressure ratio was significantly higher in the study group after treatment(P<0.05).Hemorheological parameters,including whole blood viscosity,plasma viscosity(1.83±0.11)mPa/s,fibrinogen levels(3.30±0.21)g/L,platelet adhesion rate(49.87%±10.51%),and erythrocyte aggregation index(1.79±0)were improved in the study group compared to the control group.In addition,the scores for decreased skin temperature(1.41±0.26),intermittent claudication(1.30±0.20),and resting pain(1.23±0.31)were significantly lower in the study group than those in the control group(all P<0.05).The level of oxidative stress in the study group also exhibited significant improvement(P<0.05),and the levels of inflammatory factors were considerably lower than those in the control group.CONCLUSION The combination of ear point embedding beans and Wenjing Sanhan prescription demonstrates promising clinical efficacy in alleviating resting pain associated with ASO.展开更多
LiMn_(2)O_(4)(LMO)electrochemical lithium-ion pump has gained widespread attention due to its green,high efficiency,and low energy consumption in selectively extracting lithium from brine.However,collapse of crystal s...LiMn_(2)O_(4)(LMO)electrochemical lithium-ion pump has gained widespread attention due to its green,high efficiency,and low energy consumption in selectively extracting lithium from brine.However,collapse of crystal structure and loss of lithium extraction capacity caused by Mn dissolution loss limits its industrialized application.Hence,a multifunctional coating was developed by depositing amorphous AlPO_(4)on the surface of LMO using sol-gel method.The characterization and electrochemical performance test provided insights into the mechanism of Li^(+)embedment and de-embedment and revealed that multifunctional AlPO_(4)can reconstruct the physical and chemical state of LMO surface to improve the interface hydrophilicity,promote the transport of Li^(+),strengthen cycle stability.Remarkably,after 20 cycles,the capacity retention rate of 0.5AP-LMO reached 93.6%with only 0.147%Mn dissolution loss.The average Li^(+)release capacity of 0.5AP-LMO//Ag system in simulated brine is 28.77 mg/(g h),which is 90.4%higher than LMO.Encouragingly,even in the more complex Zabuye real brine,0.5AP-LMO//Ag can still maintain excellent lithium extraction performance.These results indicate that the 0.5AP-LMO//Ag lithium-ion pump shows promising potential as a Li^(+)selective extraction system.展开更多
Abrupt temperature volatility has detrimental effects on daily activities,macroeconomic growth,and human health.Predicting abrupt temperature volatility and thus diminishing its negative impacts can be achieved by exp...Abrupt temperature volatility has detrimental effects on daily activities,macroeconomic growth,and human health.Predicting abrupt temperature volatility and thus diminishing its negative impacts can be achieved by exploring homogeneous regions of temperature volatility and analyzing the driving factors.To investigate the regionalization of temperature volatility in China's mainland,a network constructed by the cosine similarity of temperature volatility series from China's mainland was embedded in hyperbolic space.Subsequently,we partitioned the network on the hyperbolic map using the critical gap method and then found eight regions in all.Ultimately,a network of communities was constructed while the interaction among communities was quantified.This yields a perspective of temperature volatility regionalization that can accurately reflect factors including altitude,climate type,and the geographic location of mountains.Further analysis demonstrates that the regionalization in the hyperbolic map is distinct from provinces and has a realistic basis:communities in southwest China show strong correlations due to the temperature sensitivity to altitude,and communities in northern China show a convergence in the area of Dingxi,Gansu,mainly owing to the strong temperature sensitivity to climate types.As a consequence,node distributions and community divisions in the hyperbolic map can offer new insights into the regionalization of temperature volatility in China's mainland.The results demonstrate the potential of hyperbolic embedding of complex networks in forecasting future node associations in real-world data.展开更多
Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditio...Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality.展开更多
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.展开更多
Emerging technological advances are reshaping the casting sector in latest decades.Casting technology is evolving towards intelligent casting paradigm that involves automation,greenization and intelligentization,which...Emerging technological advances are reshaping the casting sector in latest decades.Casting technology is evolving towards intelligent casting paradigm that involves automation,greenization and intelligentization,which attracts more and more attention from the academic and industry communities.In this paper,the main features of casting technology were briefly summarized and forecasted,and the recent developments of key technologies and the innovative efforts made in promoting intelligent casting process were discussed.Moreover,the technical visions of intelligent casting process were also put forward.The key technologies for intelligent casting process comprise 3D printing technologies,intelligent mold technologies and intelligent process control technologies.In future,the intelligent mold that derived from mold with sensors,control devices and actuators will probably incorporate the Internet of Things,online inspection,embedded simulation,decision-making and control system,and other technologies to form intelligent cyber-physical casting system,which may pave the way to realize intelligent casting.It is promising that the intelligent casting process will eventually achieve the goal of real-time process optimization and full-scale control,with the defects,microstructure,performance,and service life of the fabricated castings can be accurately predicted and tailored.展开更多
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ...Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.展开更多
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete...A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.展开更多
This study introduces a novel method integrating CO_(2)flooding with radial borehole fracturing for enhanced oil recovery and CO_(2)underground storage,a solution to the limited vertical stimulation reservoir volume i...This study introduces a novel method integrating CO_(2)flooding with radial borehole fracturing for enhanced oil recovery and CO_(2)underground storage,a solution to the limited vertical stimulation reservoir volume in horizontal well fracturing.A numerical model is established to investigate the production rate,reservoir pressure field,and CO_(2)saturation distribution corresponding to changing time of CO_(2)flooding with radial borehole fracturing.A sensitivity analysis on the influence of CO_(2)injection location,layer spacing,pressure difference,borehole number,and hydraulic fractures on oil production and CO_(2)storage is conducted.The CO_(2)flooding process is divided into four stages.Reductions in layer spacing will significantly improve oil production rate and gas storage capacity.However,serious gas channeling can occur when the spacing is lower than 20 m.Increasing the pressure difference between the producer and injector,the borehole number,the hydraulic fracture height,and the fracture width can also increase the oil production rate and gas storage rate.Sensitivity analysis shows that layer spacing and fracture height greatly influence gas storage and oil production.Research outcomes are expected to provide a theoretical basis for the efficient development of shale oil reservoirs in the vertical direction.展开更多
Additive manufacturing technology is highly regarded due to its advantages,such as high precision and the ability to address complex geometric challenges.However,the development of additive manufacturing process is co...Additive manufacturing technology is highly regarded due to its advantages,such as high precision and the ability to address complex geometric challenges.However,the development of additive manufacturing process is constrained by issues like unclear fundamental principles,complex experimental cycles,and high costs.Machine learning,as a novel artificial intelligence technology,has the potential to deeply engage in the development of additive manufacturing process,assisting engineers in learning and developing new techniques.This paper provides a comprehensive overview of the research and applications of machine learning in the field of additive manufacturing,particularly in model design and process development.Firstly,it introduces the background and significance of machine learning-assisted design in additive manufacturing process.It then further delves into the application of machine learning in additive manufacturing,focusing on model design and process guidance.Finally,it concludes by summarizing and forecasting the development trends of machine learning technology in the field of additive manufacturing.展开更多
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i...Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.展开更多
Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to en...Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence.展开更多
基金supported by National Natural Science Foundation of China(No.62006092)Natural Science Research Project of Anhui Educational Committee(No.2023AH030081)+1 种基金2023 New Era Education Provincial Quality Engineering Project(Graduate Education)(No.2023cxcysj103)2024 New Era Education Provincial Quality Engineering Project(Graduate Education)。
文摘Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbersome instrumentation.This study developed a portable and low-cost lactate measurement system,including independently detectable hardware circuits and user-friendly embedded software,computer,and smartphone applications.The experiment verified that the relative error of the detection current in the device circuit was less than 1%.The electrochemical performance was measured by comparing the[Fe(CN)_(6)]^(3−)/[Fe(CN)_(6)]^(4−)solution with the desktop electrochemical workstation CHI660E,and a nearly consistent chronoamperometry(CA)curve was obtained.Two modified lactate sensors were used for CA testing of lactate.Within the concentration range of 0.1 mmol·L^(−1)to 20 mmol·L^(−1),there was a good linear relationship between lactate concentration and steady-state current,with a correlation coefficient(R2)greater than 0.99 and good repeatability,demonstrating the reliability of the developed device.The lactate measurement system developed in this study not only provides excellent detection performance and reliability,but also achieves portability and low cost,providing a new solution for lactate measurement.
基金supported by the National Natural Science Foundation of China(Nos.62176122 and 62061146002).
文摘Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack (PIA) against FedGNNs. Compared with prior works on centralized GNNs, in PIAFGNN, the attacker can only obtain the global embedding gradient distributed by the central server. The attacker converts the task of stealing the target user’s local embeddings into a regression problem, using a regression model to generate the target graph node embeddings. By training shadow models and property classifiers, the attacker can infer the basic property information within the target graph that is of interest. Experiments on three benchmark graph datasets demonstrate that PIAFGNN achieves attack accuracy of over 70% in most cases, even approaching the attack accuracy of inference attacks against centralized GNNs in some instances, which is much higher than the attack accuracy of the random guessing method. Furthermore, we observe that common defense mechanisms cannot mitigate our attack without affecting the model’s performance on mainly classification tasks.
文摘This paper mainly explores the architectural form of the interior of Maiji Mountain’s Cave 4 and the spiritual realm it establishes.Previous research holds the view that the niche within Cave 4 is architecturally modeled after a tent-like structure.However,after in-depth research,this paper suggests that the niche in Cave 4 is more of an imitation of an embedded stupa,or rather,it reconstructs the stupa in an embedded form within the cave.In prior studies,analysis historical background and architectural details of Cave 4 remains inadequate,thus,this paper aims to take a thorough investigation on this point,and further clarify the significance of the form of the Buddha niche in Cave 4,as well as its construction design origins.Specifically,the octagonal wooden-imitating column,lotus-shaped clamp,inverted lotus pedestal,five lotus petals,and shadow sculptures within the niche,the shallow-relief ceiling and small platform outside the niche,as well as the banana leaf decorations,all suggest that the architectural form Cave 4 imitates is likely a single-story wooden stupa.In this way,the connection that this embedded stupa creates between the Budda and the faithful,is more direct and intimate,especially compared to the one built in traditional Buddhist activities.Moreover,by coordinating with various visual materials inside the cave,such as the layout of the Dharma assembly and the exquisite details of the Buddha images,it reconstructs the“realm of the mind”in Buddhism,reinforcing the faithful’s dual experience both in physical and spiritual fields.The Master Teacher Studio of basic education came into being with the new curriculum reform,which has become a new mechanism for the construction of teaching staff in social situations in China.As a brand-new way in the construction of teaching staff in the new era,through reviewing the relevant research,it is found that the focus of academic circles on Master Teacher Studio is mainly in four aspects:clarifying the conceptual boundary,seeking theoretical support,defining the functional orientation,and exploring status quo of development.The exploration of the research process is not only a process of summary but also a process of reflection.By reviewing relevant research,reflecting on the problems that have appeared in the process of building the Master Teacher Studio in basic education,clarify the development path of the Master Teacher Studio and further affirm its advantages to the construction of teaching staff in the Chinese context.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(2021R1A4A2000934).
文摘The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications.
基金the Scientific Research Program of Hebei Provincial Administration of Traditional Chinese Medicine,No.2020342the Shijiazhuang Hospital of Traditional Chinese Medicine Institutional Review Board,No.HB20191095.
文摘BACKGROUND Research on the combined use of ear acupoint embedding beans and warming meridians with cold-dispersing formulas for alleviating resting pain in patients with arteriosclerosis obliterans(ASO)remains limited.AIM To explore the therapeutic efficacy of auricular point embedding beans combined with Wenjing Sanhan prescription in alleviating resting pain in patients with lower-limb ASO.METHODS A total of 100 patients with ASO experiencing resting pain who were treated at our hospital from January 2022 to January 2023 were enrolled.They were randomly allocated into two groups using a double-blind approach.The control group was treated using a warming meridian with a cold-dispersing formula,while the study group received additional treatment with ear acupoint embedding beans.The clinical efficacy,ankle-brachial artery pressure ratio,hemorheological indicators,and traditional Chinese medicine symptom scores were compared between the two groups.RESULTS The clinical efficacy rate in the study group was significantly higher(94.00%)than that in the control group(72.00%,P<0.05).Moreover,the ankle-brachial artery pressure ratio was significantly higher in the study group after treatment(P<0.05).Hemorheological parameters,including whole blood viscosity,plasma viscosity(1.83±0.11)mPa/s,fibrinogen levels(3.30±0.21)g/L,platelet adhesion rate(49.87%±10.51%),and erythrocyte aggregation index(1.79±0)were improved in the study group compared to the control group.In addition,the scores for decreased skin temperature(1.41±0.26),intermittent claudication(1.30±0.20),and resting pain(1.23±0.31)were significantly lower in the study group than those in the control group(all P<0.05).The level of oxidative stress in the study group also exhibited significant improvement(P<0.05),and the levels of inflammatory factors were considerably lower than those in the control group.CONCLUSION The combination of ear point embedding beans and Wenjing Sanhan prescription demonstrates promising clinical efficacy in alleviating resting pain associated with ASO.
基金supported by the National Natural Science Foundation of China(21908082,22278426,and 22178154)the Jiangsu Funding Program for Excellent Postdoctoral Talent(2022ZB629)+1 种基金the Natural Science Foundation of Jiangsu Province(BK20221367)the China Postdoctoral Science Foundation(2021M701472)。
文摘LiMn_(2)O_(4)(LMO)electrochemical lithium-ion pump has gained widespread attention due to its green,high efficiency,and low energy consumption in selectively extracting lithium from brine.However,collapse of crystal structure and loss of lithium extraction capacity caused by Mn dissolution loss limits its industrialized application.Hence,a multifunctional coating was developed by depositing amorphous AlPO_(4)on the surface of LMO using sol-gel method.The characterization and electrochemical performance test provided insights into the mechanism of Li^(+)embedment and de-embedment and revealed that multifunctional AlPO_(4)can reconstruct the physical and chemical state of LMO surface to improve the interface hydrophilicity,promote the transport of Li^(+),strengthen cycle stability.Remarkably,after 20 cycles,the capacity retention rate of 0.5AP-LMO reached 93.6%with only 0.147%Mn dissolution loss.The average Li^(+)release capacity of 0.5AP-LMO//Ag system in simulated brine is 28.77 mg/(g h),which is 90.4%higher than LMO.Encouragingly,even in the more complex Zabuye real brine,0.5AP-LMO//Ag can still maintain excellent lithium extraction performance.These results indicate that the 0.5AP-LMO//Ag lithium-ion pump shows promising potential as a Li^(+)selective extraction system.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12275179,12005079,and 41975100),the Shanghai Natural Science Foundation of China(Grant No.21ZR1443900),Natural Science Foundation of Jiangsu Province(Grant No.BK20220511),the funding for Scientific Research Startup of Jiangsu University(Grant No.4111710001),and the Joint Research Project for Meteorological Capacity Improvement(Grant No.22NLTSZ004).
文摘Abrupt temperature volatility has detrimental effects on daily activities,macroeconomic growth,and human health.Predicting abrupt temperature volatility and thus diminishing its negative impacts can be achieved by exploring homogeneous regions of temperature volatility and analyzing the driving factors.To investigate the regionalization of temperature volatility in China's mainland,a network constructed by the cosine similarity of temperature volatility series from China's mainland was embedded in hyperbolic space.Subsequently,we partitioned the network on the hyperbolic map using the critical gap method and then found eight regions in all.Ultimately,a network of communities was constructed while the interaction among communities was quantified.This yields a perspective of temperature volatility regionalization that can accurately reflect factors including altitude,climate type,and the geographic location of mountains.Further analysis demonstrates that the regionalization in the hyperbolic map is distinct from provinces and has a realistic basis:communities in southwest China show strong correlations due to the temperature sensitivity to altitude,and communities in northern China show a convergence in the area of Dingxi,Gansu,mainly owing to the strong temperature sensitivity to climate types.As a consequence,node distributions and community divisions in the hyperbolic map can offer new insights into the regionalization of temperature volatility in China's mainland.The results demonstrate the potential of hyperbolic embedding of complex networks in forecasting future node associations in real-world data.
基金This paper is one of the phased achievements of the Education and Teaching Reform Project of Guangdong University of Petrochemical Engineering in 2022(71013413080)the Research and Practice Project of Teaching and Teaching Reform of University-Level Higher Vocational Education in 2023(JY202353).
文摘Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality.
基金supported in part by the National Natural Science Foundation of China(Nos.62372083,62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(No.2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2024NSFTD0005,2022YFQ0045,2022YFS0220,2023YFS0020,2023YFS0197,2023YFG0148)the CCF-about:blank Open Fund(No.202312)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
基金funded by the Beijing Natural Science Foundation-Haidian Original Innovation Joint Fund(L212002)the Tsinghua-Toyota Joint Research Fund(20223930096)the Guangdong Provincial Key Area Research and Development Program(2022B0909070001).
文摘Emerging technological advances are reshaping the casting sector in latest decades.Casting technology is evolving towards intelligent casting paradigm that involves automation,greenization and intelligentization,which attracts more and more attention from the academic and industry communities.In this paper,the main features of casting technology were briefly summarized and forecasted,and the recent developments of key technologies and the innovative efforts made in promoting intelligent casting process were discussed.Moreover,the technical visions of intelligent casting process were also put forward.The key technologies for intelligent casting process comprise 3D printing technologies,intelligent mold technologies and intelligent process control technologies.In future,the intelligent mold that derived from mold with sensors,control devices and actuators will probably incorporate the Internet of Things,online inspection,embedded simulation,decision-making and control system,and other technologies to form intelligent cyber-physical casting system,which may pave the way to realize intelligent casting.It is promising that the intelligent casting process will eventually achieve the goal of real-time process optimization and full-scale control,with the defects,microstructure,performance,and service life of the fabricated castings can be accurately predicted and tailored.
基金This research was funded by the Ministry of Higher Education(MOHE)through Fundamental Research Grant Scheme(FRGS)under the Grand Number FRGS/1/2020/ICT01/UK M/02/4,and University Kebangsaan Malaysia for open access publication.
文摘Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.
基金supported by the Key Area R&D Program of Guangdong Province (Grant No.2022B0701180001)the National Natural Science Foundation of China (Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China (Grant Nos.2019B010140002 and 2020B111110002)the Guangdong-Hong Kong-Macao Joint Innovation Field Project (Grant No.2021A0505080006)。
文摘A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.
基金This study has been funded by the National Science Fund for Distinguished Young Scholars(No.52204063)Science Foundation of China University of Petroleum,Beijing(No.2462023BJRC025).Moreover,we would like to express our heartfelt appreciation to the Computational Geosciences group in the Department of Mathematics and Cybernetics at SINTEF Digital for developing and providing the free open-source MATLAB Reservoir Simulation Toolbox(MRST)used in this research.
文摘This study introduces a novel method integrating CO_(2)flooding with radial borehole fracturing for enhanced oil recovery and CO_(2)underground storage,a solution to the limited vertical stimulation reservoir volume in horizontal well fracturing.A numerical model is established to investigate the production rate,reservoir pressure field,and CO_(2)saturation distribution corresponding to changing time of CO_(2)flooding with radial borehole fracturing.A sensitivity analysis on the influence of CO_(2)injection location,layer spacing,pressure difference,borehole number,and hydraulic fractures on oil production and CO_(2)storage is conducted.The CO_(2)flooding process is divided into four stages.Reductions in layer spacing will significantly improve oil production rate and gas storage capacity.However,serious gas channeling can occur when the spacing is lower than 20 m.Increasing the pressure difference between the producer and injector,the borehole number,the hydraulic fracture height,and the fracture width can also increase the oil production rate and gas storage rate.Sensitivity analysis shows that layer spacing and fracture height greatly influence gas storage and oil production.Research outcomes are expected to provide a theoretical basis for the efficient development of shale oil reservoirs in the vertical direction.
基金financially supported by the Technology Development Fund of China Academy of Machinery Science and Technology(No.170221ZY01)。
文摘Additive manufacturing technology is highly regarded due to its advantages,such as high precision and the ability to address complex geometric challenges.However,the development of additive manufacturing process is constrained by issues like unclear fundamental principles,complex experimental cycles,and high costs.Machine learning,as a novel artificial intelligence technology,has the potential to deeply engage in the development of additive manufacturing process,assisting engineers in learning and developing new techniques.This paper provides a comprehensive overview of the research and applications of machine learning in the field of additive manufacturing,particularly in model design and process development.Firstly,it introduces the background and significance of machine learning-assisted design in additive manufacturing process.It then further delves into the application of machine learning in additive manufacturing,focusing on model design and process guidance.Finally,it concludes by summarizing and forecasting the development trends of machine learning technology in the field of additive manufacturing.
文摘Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.
基金supported by the Key-Area Research and Development Program of Guangdong Province(Grant No.2021B0909060002)National Natural Science Foundation of China(Grant Nos.62204219,62204140)+1 种基金Major Program of Natural Science Foundation of Zhejiang Province(Grant No.LDT23F0401)Thanks to Professor Zhang Yishu from Zhejiang University,Professor Gao Xu from Soochow University,and Professor Zhong Shuai from Guangdong Institute of Intelligence Science and Technology for their support。
文摘Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence.