This paper develops a comprehensive computational modeling and simulation framework based on Complex Adaptive Systems(CAS)theory to unveil the underlying mechanisms of self-organization,nonlinear evolution,and emergen...This paper develops a comprehensive computational modeling and simulation framework based on Complex Adaptive Systems(CAS)theory to unveil the underlying mechanisms of self-organization,nonlinear evolution,and emergence in social systems.By integrating mathematical models,agent-based modeling,network dynamic analysis,and hybrid modeling approaches,the study applies CAS theory to case studies in economic markets,political decision-making,and social interactions.The experimental results demonstrate that local interactions among individual agents can give rise to complex global phenomena,such as market fluctuations,opinion polarization,and sudden outbreaks of social movements.This framework not only provides a more robust explanation for the nonlinear dynamics and abrupt transitions that traditional models often fail to capture,but also offers valuable decision-support tools for public policy formulation,social governance,and risk management.Emphasizing the importance of interdisciplinary approaches,this work outlines future research directions in high-performance computing,artificial intelligence,and real-time data integration to further advance the theoretical and practical applications of CAS in the social sciences.展开更多
Transportation systems are experiencing a significant transformation due to the integration of advanced technologies, including artificial intelligence and machine learning. In the context of intelligent transportatio...Transportation systems are experiencing a significant transformation due to the integration of advanced technologies, including artificial intelligence and machine learning. In the context of intelligent transportation systems (ITS) and Advanced Driver Assistance Systems (ADAS), the development of efficient and reliable traffic light detection mechanisms is crucial for enhancing road safety and traffic management. This paper presents an optimized convolutional neural network (CNN) framework designed to detect traffic lights in real-time within complex urban environments. Leveraging multi-scale pyramid feature maps, the proposed model addresses key challenges such as the detection of small, occluded, and low-resolution traffic lights amidst complex backgrounds. The integration of dilated convolutions, Region of Interest (ROI) alignment, and Soft Non-Maximum Suppression (Soft-NMS) further improves detection accuracy and reduces false positives. By optimizing computational efficiency and parameter complexity, the framework is designed to operate seamlessly on embedded systems, ensuring robust performance in real-world applications. Extensive experiments using real-world datasets demonstrate that our model significantly outperforms existing methods, providing a scalable solution for ITS and ADAS applications. This research contributes to the advancement of Artificial Intelligence-driven (AI-driven) pattern recognition in transportation systems and offers a mathematical approach to improving efficiency and safety in logistics and transportation networks.展开更多
Model-based system-of-systems(SOS)engineering(MBSoSE)is becoming a promising solution for the design of SoS with increasing complexity.However,bridging the models from the design phase to the simulation phase poses si...Model-based system-of-systems(SOS)engineering(MBSoSE)is becoming a promising solution for the design of SoS with increasing complexity.However,bridging the models from the design phase to the simulation phase poses significant challenges and requires an integrated approach.In this study,a unified requirement modeling approach is proposed based on unified architecture framework(UAF).Theoretical models are proposed which compose formalized descriptions from both topdown and bottom-up perspectives.Based on the description,the UAF profile is proposed to represent the SoS mission and constituent systems(CS)goal.Moreover,the agent-based simulation information is also described based on the overview,design concepts,and details(ODD)protocol as the complement part of the SoS profile,which can be transformed into different simulation platforms based on the eXtensible markup language(XML)technology and model-to-text method.In this way,the design of the SoS is simulated automatically in the early design stage.Finally,the method is implemented and an example is given to illustrate the whole process.展开更多
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig...Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.展开更多
Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emp...Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emphasis on structural durability and monitoring is required.This study focuses on the mechanical vibrations that occur in rotary drilling systems,which have a substantial impact on the structural integrity of drilling equipment.The study specifically investigates axial,torsional,and lateral vibrations,which might lead to negative consequences such as bit-bounce,chaotic whirling,and high-frequency stick-slip.These events not only hinder the efficiency of drilling but also lead to exhaustion and harm to the system’s components since they are difficult to be detected and controlled in real time.The study investigates the dynamic interactions of these vibrations,specifically in their high-frequency modes,usingfield data obtained from measurement while drilling.Thefindings have demonstrated the effect of strong coupling between the high-frequency modes of these vibrations on drilling sys-tem performance.The obtained results highlight the importance of considering the interconnected impacts of these vibrations when designing and implementing robust control systems.Therefore,integrating these compo-nents can increase the durability of drill bits and drill strings,as well as improve the ability to monitor and detect damage.Moreover,by exploiting thesefindings,the assessment of structural resilience in rotary drilling systems can be enhanced.Furthermore,the study demonstrates the capacity of structural health monitoring to improve the quality,dependability,and efficiency of rotary drilling systems in the petroleum industry.展开更多
In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained f...In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained from the Euler-Maruyama discretization of the underlying stochastic differential equations(SDEs),based on which the loss function is built.The stochastic gradient descent method is applied in the neural network training.Numerical experiments demonstrate the effectiveness of our method.展开更多
BACKGROUND The primary issue in managing edentulous patients is the severely resorbed mandibular ridge,particularly in older individuals with diminished adaptive capacities.This compromised situation leads to the fabr...BACKGROUND The primary issue in managing edentulous patients is the severely resorbed mandibular ridge,particularly in older individuals with diminished adaptive capacities.This compromised situation leads to the fabrication of inadequate dentures that lack retention and stability,potentially causing psychosocial issues.AIM To determine the difference in retentive capacity between three attachment systems in implant-retained overdentures.METHODS Three edentulous mandibular models were fabricated using heat-cured polymethacrylate resin,with two implant replicas placed in the intra-foraminal region of each model.30 acrylic resin mandibular overdentures were fabricated with provisions for three different overdenture attachment systems:A prefabricated ball/O-ring attachment,a locator attachment system,and an equator attachment system.Each model was subjected to 15000 pulls using a universal testing machine to remove the overdenture from the acrylic model and the force data were recorded.RESULTS The ball/O-ring attachment system demonstrated superior retentive capacity for 15 years,while the locator and equator attachment systems maintained excellent retentive capacity for 5 years.CONCLUSION The ball/O-ring attachment system outperformed better than the other two attachment systems regarding retentive capacity.The locator and equator attachment systems presented sufficient retentive abilities until 15000 cycles.After 7500 cycles,significant differences in retentive force between the systems evolved.展开更多
Understanding the factors triggering slope failure is essential to ensure the safety of buildings and transportation infrastructure on slopes. Specifically,the failure of stabilizing piles due to groundwater migration...Understanding the factors triggering slope failure is essential to ensure the safety of buildings and transportation infrastructure on slopes. Specifically,the failure of stabilizing piles due to groundwater migration and freeze–thaw(FT) cycles is a significant factor causing slope failure. This study aims to investigate the transmedia seepage characteristics at slope–concrete stabilizing pile interface systems by using silty clay and concrete with varying microstructure characteristics under FT cycles. To this end, a self-developed indoor test device for transmedia water migration, combined with a macro-meso-micro multiscale testing approach, was used to analyze the laws and mechanisms of transmedia seepage at the interface systems. The effect of the medium's microstructure characteristics on the transmedia seepage behavior at the interface systems under FT cycles was also assessed. Results indicated that the transmedia water migration exhibited particularity due to the migration of soil particles and the low permeability characteristics of concrete. The water content in the media increased significantly within the range of 1/3–2/3 of the height from the interface for soil and within 5 mm from the interface for concrete.FT cycles promoted the increase and penetration of cracks within the medium, enhancing the permeability of the slope-concrete stabilizing pile interface systems.With the increase in FT cycles, the porosity inside the medium first decreased and then increased, and the porosity reached the minimum after 25 FT cycles and the maximum after 75 FT cycles, and the water content of the medium after water migration was positively correlated with the porosity. FT cycles also significantly influenced the temporal variation characteristics of soil moisture and the migration path of water in concrete. The study results could serve as a reference for related research on slope stability assessment.展开更多
Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptibl...Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.展开更多
This paper mainly focuses on the velocity-constrained consensus problem of discrete-time heterogeneous multi-agent systems with nonconvex constraints and arbitrarily switching topologies,where each agent has first-ord...This paper mainly focuses on the velocity-constrained consensus problem of discrete-time heterogeneous multi-agent systems with nonconvex constraints and arbitrarily switching topologies,where each agent has first-order or second-order dynamics.To solve this problem,a distributed algorithm is proposed based on a contraction operator.By employing the properties of the stochastic matrix,it is shown that all agents’position states could converge to a common point and second-order agents’velocity states could remain in corresponding nonconvex constraint sets and converge to zero as long as the joint communication topology has one directed spanning tree.Finally,the numerical simulation results are provided to verify the effectiveness of the proposed algorithms.展开更多
Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary a...Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary ammonium alkaloid isolated from Coptidis Rhizoma,a traditional Chinese medicine,has superior anti-diabetic and heart-protective properties.The purpose of this study is to assess the impact of BBR on DCM.Methods:This study used a systems pharmacology approach to evaluate the related proteins and signalling pathways between BBR and DCM targets,combined with experimental validation using diabetic mouse heart sections.Microstructural and pathological changes were observed using Hematoxylin-eosin,Masson’s trichrome stain and wheat germ agglutinin staining.Immunofluorescence and western blot were used to determine protein expression.Results:The results indicate that BBR and DCM share 21 core relevant targets,with cross-targets predominantly located in mitochondrial,endoplasmic reticulum,and plasma membrane components.BBR exerts its main effects in improving DCM by maintaining mitochondrial integrity,particularly involving the PI3K-AKT-GSK3βand apoptosis signalling pathways.In addition,post-treatment changes in the key targets of BBR,including cysteine aspartate specific protease(Caspase)-3,phosphoinositide 3-kinase(PI3K)and mitochondria-related proteins,are suggestive of its efficacy.Conclusion:BBR crucially improves DCM by maintaining mitochondrial integrity,inhibiting apoptosis,and modulating PI3K-AKT-GSK3βsignaling.Further studies must address animal model limitations and validate clinical efficacy to understand BBR’s mechanisms fully and its potential clinical use.展开更多
The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this stud...The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.展开更多
This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity fa...This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.展开更多
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s...Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.展开更多
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ...The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.展开更多
River ethics,a significant advancement inspired by Chinese President XI Jinping's ecological civilization thought,embodies the philosophical essence of river governance and represents a legacy of innovation by gen...River ethics,a significant advancement inspired by Chinese President XI Jinping's ecological civilization thought,embodies the philosophical essence of river governance and represents a legacy of innovation by generations of water resources professionals.Rooted in river ecology,it offers a framework for advancing modern water governance systems and capabilities.This paper examines eight dimensions of river ethics to provide actionable recommendations:enhancing knowledge systems on water,rivers,and lakes;addressing critical challenges in water governance to strengthen the foundational role of water authorities in ensuring water security,resource management,ecological sustainability and environmental protection;optimizing water project planning to mitigate ecological impacts;ensuring high standards in the lifecycle management of water projects;refining water diversion strategies for precise scheduling;utilizing ecosystem complexity for river and lake restoration;implementing tiered management of water-related disasters;and driving reforms to modernize water governance systems and mechanisms.展开更多
In recent years,there has been a surge of interest in higher-order topological phases(HOTPs)across various disciplines within the field of physics.These unique phases are characterized by their ability to harbor topol...In recent years,there has been a surge of interest in higher-order topological phases(HOTPs)across various disciplines within the field of physics.These unique phases are characterized by their ability to harbor topological protected boundary states at lower-dimensional boundaries,a distinguishing feature that sets them apart from conventional topological phases and is attributed to the higher-order bulk-boundary correspondence.Two-dimensional(2D)twisted systems offer an optimal platform for investigating HOTPs,owing to their strong controllability and experimental feasibility.Here,we provide a comprehensive overview of the latest research advancements on HOTPs in 2D twisted multilayer systems.We will mainly review the HOTPs in electronic,magnonic,acoustic,photonic and mechanical twisted systems,and finally provide a perspective of this topic.展开更多
The phenomenon of pyroptosis has gained increasing prominence in recent decades as a significant contributor to cellular mortality.The process of pyroptosis plays a crucial role in the regulation of various types of c...The phenomenon of pyroptosis has gained increasing prominence in recent decades as a significant contributor to cellular mortality.The process of pyroptosis plays a crucial role in the regulation of various types of cancers.The induction of pyroptosis can be achieved through various mechanisms,including the activation of small molecule pyrogen inducers.The use of.small molecule pyrogen inducer alone,however,has limitations.On one hand,we benefit from the utilization of nano delivery systems(NDS).On the other hand,there is an enhanced comprehension of the underlying mechanism governing pyroptosis.A novel therapeutic strategy,resulting from a clever amalgamation of the two approaches,has demonstrated significant efficacy in experimental treatment of certain diseases.A variety of nanocarriers,including liposomes,hydrogels,polymer micelles,exosomes,metal-organic frameworks protein nanoparticles,cell membrane biomimetic nanocarriers,carbon nanotubes,dendrimers,polymer conjugates and polymer nanoparticles are utilized for the delivery of drugs that induce pyroptosis in cells.By integrating the aforementioned approaches,a diverse range of pyroptosis strategies have been developed utilizing NDS,encompassing stem cell targeting,disruption of ion homeostasis,augmentation of reactive oxygen species generation,induction of epigenetic modifications,and transportation of gaseous protein gasdermins family proteins.However,the clinical application of these strategies still encounters numerous challenges that need to be addressed,including limited comprehension of NDS,incomplete understanding of the interaction mechanisms between nanomaterials and biological systems,and insufficient knowledge regarding nanocarrier materials.In this study,we aim to advance the field of pyroptosis in cancer treatment.The induction of pyroptotic cell death is believed to hold great promise as an ideal therapeutic approach for the management,regulation,and treatment of numerous types of cancers.展开更多
This paper addresses the time-varying formation-containment(FC) problem for nonholonomic multi-agent systems with a desired trajectory constraint, where only the leaders can acquire information about the desired traje...This paper addresses the time-varying formation-containment(FC) problem for nonholonomic multi-agent systems with a desired trajectory constraint, where only the leaders can acquire information about the desired trajectory. Input the fixed time-varying formation template to the leader and start executing, this process also needs to track the desired trajectory, and the follower needs to converge to the convex hull that the leader crosses. Firstly, the dynamic models of nonholonomic systems are linearized to second-order dynamics. Then, based on the desired trajectory and formation template, the FC control protocols are proposed. Sufficient conditions to achieve FC are introduced and an algorithm is proposed to resolve the control parameters by solving an algebraic Riccati equation. The system is demonstrated to achieve FC, with the average position and velocity of the leaders converging asymptotically to the desired trajectory. Finally, the theoretical achievements are verified in simulations by a multi-agent system composed of virtual human individuals.展开更多
The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines ...The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.展开更多
文摘This paper develops a comprehensive computational modeling and simulation framework based on Complex Adaptive Systems(CAS)theory to unveil the underlying mechanisms of self-organization,nonlinear evolution,and emergence in social systems.By integrating mathematical models,agent-based modeling,network dynamic analysis,and hybrid modeling approaches,the study applies CAS theory to case studies in economic markets,political decision-making,and social interactions.The experimental results demonstrate that local interactions among individual agents can give rise to complex global phenomena,such as market fluctuations,opinion polarization,and sudden outbreaks of social movements.This framework not only provides a more robust explanation for the nonlinear dynamics and abrupt transitions that traditional models often fail to capture,but also offers valuable decision-support tools for public policy formulation,social governance,and risk management.Emphasizing the importance of interdisciplinary approaches,this work outlines future research directions in high-performance computing,artificial intelligence,and real-time data integration to further advance the theoretical and practical applications of CAS in the social sciences.
基金funded by the Deanship of Scientific Research at Northern Border University,Arar,Saudi Arabia through research group No.(RG-NBU-2022-1234).
文摘Transportation systems are experiencing a significant transformation due to the integration of advanced technologies, including artificial intelligence and machine learning. In the context of intelligent transportation systems (ITS) and Advanced Driver Assistance Systems (ADAS), the development of efficient and reliable traffic light detection mechanisms is crucial for enhancing road safety and traffic management. This paper presents an optimized convolutional neural network (CNN) framework designed to detect traffic lights in real-time within complex urban environments. Leveraging multi-scale pyramid feature maps, the proposed model addresses key challenges such as the detection of small, occluded, and low-resolution traffic lights amidst complex backgrounds. The integration of dilated convolutions, Region of Interest (ROI) alignment, and Soft Non-Maximum Suppression (Soft-NMS) further improves detection accuracy and reduces false positives. By optimizing computational efficiency and parameter complexity, the framework is designed to operate seamlessly on embedded systems, ensuring robust performance in real-world applications. Extensive experiments using real-world datasets demonstrate that our model significantly outperforms existing methods, providing a scalable solution for ITS and ADAS applications. This research contributes to the advancement of Artificial Intelligence-driven (AI-driven) pattern recognition in transportation systems and offers a mathematical approach to improving efficiency and safety in logistics and transportation networks.
基金Fifth Electronic Research Institute of the Ministry of Industry and Information Technology(HK07202200877)Pre-research Project on Civil Aerospace Technologies of CNSA(D020101)+2 种基金Zhejiang Provincial Science and Technology Plan Project(2022C01052)Frontier Scientific Research Program of Deep Space Exploration Laboratory(2022-QYKYJHHXYF-018,2022-QYKYJH-GCXD-001)Zhiyuan Laboratory(ZYL2024001)。
文摘Model-based system-of-systems(SOS)engineering(MBSoSE)is becoming a promising solution for the design of SoS with increasing complexity.However,bridging the models from the design phase to the simulation phase poses significant challenges and requires an integrated approach.In this study,a unified requirement modeling approach is proposed based on unified architecture framework(UAF).Theoretical models are proposed which compose formalized descriptions from both topdown and bottom-up perspectives.Based on the description,the UAF profile is proposed to represent the SoS mission and constituent systems(CS)goal.Moreover,the agent-based simulation information is also described based on the overview,design concepts,and details(ODD)protocol as the complement part of the SoS profile,which can be transformed into different simulation platforms based on the eXtensible markup language(XML)technology and model-to-text method.In this way,the design of the SoS is simulated automatically in the early design stage.Finally,the method is implemented and an example is given to illustrate the whole process.
基金supported by the Science and Technology Project of the State Grid Corporation of China,Grant number 5700-202223189A-1-1-ZN.
文摘Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.
文摘Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emphasis on structural durability and monitoring is required.This study focuses on the mechanical vibrations that occur in rotary drilling systems,which have a substantial impact on the structural integrity of drilling equipment.The study specifically investigates axial,torsional,and lateral vibrations,which might lead to negative consequences such as bit-bounce,chaotic whirling,and high-frequency stick-slip.These events not only hinder the efficiency of drilling but also lead to exhaustion and harm to the system’s components since they are difficult to be detected and controlled in real time.The study investigates the dynamic interactions of these vibrations,specifically in their high-frequency modes,usingfield data obtained from measurement while drilling.Thefindings have demonstrated the effect of strong coupling between the high-frequency modes of these vibrations on drilling sys-tem performance.The obtained results highlight the importance of considering the interconnected impacts of these vibrations when designing and implementing robust control systems.Therefore,integrating these compo-nents can increase the durability of drill bits and drill strings,as well as improve the ability to monitor and detect damage.Moreover,by exploiting thesefindings,the assessment of structural resilience in rotary drilling systems can be enhanced.Furthermore,the study demonstrates the capacity of structural health monitoring to improve the quality,dependability,and efficiency of rotary drilling systems in the petroleum industry.
基金Supported by the National Natural Science Foundation of China(11971458,11471310)。
文摘In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained from the Euler-Maruyama discretization of the underlying stochastic differential equations(SDEs),based on which the loss function is built.The stochastic gradient descent method is applied in the neural network training.Numerical experiments demonstrate the effectiveness of our method.
文摘BACKGROUND The primary issue in managing edentulous patients is the severely resorbed mandibular ridge,particularly in older individuals with diminished adaptive capacities.This compromised situation leads to the fabrication of inadequate dentures that lack retention and stability,potentially causing psychosocial issues.AIM To determine the difference in retentive capacity between three attachment systems in implant-retained overdentures.METHODS Three edentulous mandibular models were fabricated using heat-cured polymethacrylate resin,with two implant replicas placed in the intra-foraminal region of each model.30 acrylic resin mandibular overdentures were fabricated with provisions for three different overdenture attachment systems:A prefabricated ball/O-ring attachment,a locator attachment system,and an equator attachment system.Each model was subjected to 15000 pulls using a universal testing machine to remove the overdenture from the acrylic model and the force data were recorded.RESULTS The ball/O-ring attachment system demonstrated superior retentive capacity for 15 years,while the locator and equator attachment systems maintained excellent retentive capacity for 5 years.CONCLUSION The ball/O-ring attachment system outperformed better than the other two attachment systems regarding retentive capacity.The locator and equator attachment systems presented sufficient retentive abilities until 15000 cycles.After 7500 cycles,significant differences in retentive force between the systems evolved.
基金financially supported by Jilin Provincial Natural Science Foundation (No.20220101164JC)。
文摘Understanding the factors triggering slope failure is essential to ensure the safety of buildings and transportation infrastructure on slopes. Specifically,the failure of stabilizing piles due to groundwater migration and freeze–thaw(FT) cycles is a significant factor causing slope failure. This study aims to investigate the transmedia seepage characteristics at slope–concrete stabilizing pile interface systems by using silty clay and concrete with varying microstructure characteristics under FT cycles. To this end, a self-developed indoor test device for transmedia water migration, combined with a macro-meso-micro multiscale testing approach, was used to analyze the laws and mechanisms of transmedia seepage at the interface systems. The effect of the medium's microstructure characteristics on the transmedia seepage behavior at the interface systems under FT cycles was also assessed. Results indicated that the transmedia water migration exhibited particularity due to the migration of soil particles and the low permeability characteristics of concrete. The water content in the media increased significantly within the range of 1/3–2/3 of the height from the interface for soil and within 5 mm from the interface for concrete.FT cycles promoted the increase and penetration of cracks within the medium, enhancing the permeability of the slope-concrete stabilizing pile interface systems.With the increase in FT cycles, the porosity inside the medium first decreased and then increased, and the porosity reached the minimum after 25 FT cycles and the maximum after 75 FT cycles, and the water content of the medium after water migration was positively correlated with the porosity. FT cycles also significantly influenced the temporal variation characteristics of soil moisture and the migration path of water in concrete. The study results could serve as a reference for related research on slope stability assessment.
文摘Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.
基金2024 Jiangsu Province Youth Science and Technology Talent Support Project2024 Yancheng Key Research and Development Plan(Social Development)projects,“Research and Application of Multi Agent Offline Distributed Trust Perception Virtual Wireless Sensor Network Algorithm”and“Research and Application of a New Type of Fishery Ship Safety Production Monitoring Equipment”。
文摘This paper mainly focuses on the velocity-constrained consensus problem of discrete-time heterogeneous multi-agent systems with nonconvex constraints and arbitrarily switching topologies,where each agent has first-order or second-order dynamics.To solve this problem,a distributed algorithm is proposed based on a contraction operator.By employing the properties of the stochastic matrix,it is shown that all agents’position states could converge to a common point and second-order agents’velocity states could remain in corresponding nonconvex constraint sets and converge to zero as long as the joint communication topology has one directed spanning tree.Finally,the numerical simulation results are provided to verify the effectiveness of the proposed algorithms.
基金supported by the National Natural Science Foundation of China(Grant No.82270892)Natural Science Foundation of Hubei Province(Grant No.2022CFB287)+2 种基金Xianning City Science and Technology Plan Project(Grant No.2022ZRKX052)School projects of Hubei University of Science and Technology(Grant No.2022T01,2021WG05,2021TNB01)Hubei University of Science and Technology School-level Fund(Grant No.BK202122).
文摘Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary ammonium alkaloid isolated from Coptidis Rhizoma,a traditional Chinese medicine,has superior anti-diabetic and heart-protective properties.The purpose of this study is to assess the impact of BBR on DCM.Methods:This study used a systems pharmacology approach to evaluate the related proteins and signalling pathways between BBR and DCM targets,combined with experimental validation using diabetic mouse heart sections.Microstructural and pathological changes were observed using Hematoxylin-eosin,Masson’s trichrome stain and wheat germ agglutinin staining.Immunofluorescence and western blot were used to determine protein expression.Results:The results indicate that BBR and DCM share 21 core relevant targets,with cross-targets predominantly located in mitochondrial,endoplasmic reticulum,and plasma membrane components.BBR exerts its main effects in improving DCM by maintaining mitochondrial integrity,particularly involving the PI3K-AKT-GSK3βand apoptosis signalling pathways.In addition,post-treatment changes in the key targets of BBR,including cysteine aspartate specific protease(Caspase)-3,phosphoinositide 3-kinase(PI3K)and mitochondria-related proteins,are suggestive of its efficacy.Conclusion:BBR crucially improves DCM by maintaining mitochondrial integrity,inhibiting apoptosis,and modulating PI3K-AKT-GSK3βsignaling.Further studies must address animal model limitations and validate clinical efficacy to understand BBR’s mechanisms fully and its potential clinical use.
文摘The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.
文摘This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.
文摘Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.
文摘The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.
基金Three Gorges Follow-up Work Fund,Grant/Award Number:WE0161A042024National Key Research Program of China,Grant/Award Number:2024YFC3210900。
文摘River ethics,a significant advancement inspired by Chinese President XI Jinping's ecological civilization thought,embodies the philosophical essence of river governance and represents a legacy of innovation by generations of water resources professionals.Rooted in river ecology,it offers a framework for advancing modern water governance systems and capabilities.This paper examines eight dimensions of river ethics to provide actionable recommendations:enhancing knowledge systems on water,rivers,and lakes;addressing critical challenges in water governance to strengthen the foundational role of water authorities in ensuring water security,resource management,ecological sustainability and environmental protection;optimizing water project planning to mitigate ecological impacts;ensuring high standards in the lifecycle management of water projects;refining water diversion strategies for precise scheduling;utilizing ecosystem complexity for river and lake restoration;implementing tiered management of water-related disasters;and driving reforms to modernize water governance systems and mechanisms.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12304539,12074108,12474151,12347101)the Natural Science Foundation of Chongqing(Grant No.CSTB2022NSCQ-MSX0568)Beijing National Laboratory for Condensed Matter Physics(Grant No.2024BNLCMPKF025)。
文摘In recent years,there has been a surge of interest in higher-order topological phases(HOTPs)across various disciplines within the field of physics.These unique phases are characterized by their ability to harbor topological protected boundary states at lower-dimensional boundaries,a distinguishing feature that sets them apart from conventional topological phases and is attributed to the higher-order bulk-boundary correspondence.Two-dimensional(2D)twisted systems offer an optimal platform for investigating HOTPs,owing to their strong controllability and experimental feasibility.Here,we provide a comprehensive overview of the latest research advancements on HOTPs in 2D twisted multilayer systems.We will mainly review the HOTPs in electronic,magnonic,acoustic,photonic and mechanical twisted systems,and finally provide a perspective of this topic.
文摘The phenomenon of pyroptosis has gained increasing prominence in recent decades as a significant contributor to cellular mortality.The process of pyroptosis plays a crucial role in the regulation of various types of cancers.The induction of pyroptosis can be achieved through various mechanisms,including the activation of small molecule pyrogen inducers.The use of.small molecule pyrogen inducer alone,however,has limitations.On one hand,we benefit from the utilization of nano delivery systems(NDS).On the other hand,there is an enhanced comprehension of the underlying mechanism governing pyroptosis.A novel therapeutic strategy,resulting from a clever amalgamation of the two approaches,has demonstrated significant efficacy in experimental treatment of certain diseases.A variety of nanocarriers,including liposomes,hydrogels,polymer micelles,exosomes,metal-organic frameworks protein nanoparticles,cell membrane biomimetic nanocarriers,carbon nanotubes,dendrimers,polymer conjugates and polymer nanoparticles are utilized for the delivery of drugs that induce pyroptosis in cells.By integrating the aforementioned approaches,a diverse range of pyroptosis strategies have been developed utilizing NDS,encompassing stem cell targeting,disruption of ion homeostasis,augmentation of reactive oxygen species generation,induction of epigenetic modifications,and transportation of gaseous protein gasdermins family proteins.However,the clinical application of these strategies still encounters numerous challenges that need to be addressed,including limited comprehension of NDS,incomplete understanding of the interaction mechanisms between nanomaterials and biological systems,and insufficient knowledge regarding nanocarrier materials.In this study,we aim to advance the field of pyroptosis in cancer treatment.The induction of pyroptotic cell death is believed to hold great promise as an ideal therapeutic approach for the management,regulation,and treatment of numerous types of cancers.
文摘This paper addresses the time-varying formation-containment(FC) problem for nonholonomic multi-agent systems with a desired trajectory constraint, where only the leaders can acquire information about the desired trajectory. Input the fixed time-varying formation template to the leader and start executing, this process also needs to track the desired trajectory, and the follower needs to converge to the convex hull that the leader crosses. Firstly, the dynamic models of nonholonomic systems are linearized to second-order dynamics. Then, based on the desired trajectory and formation template, the FC control protocols are proposed. Sufficient conditions to achieve FC are introduced and an algorithm is proposed to resolve the control parameters by solving an algebraic Riccati equation. The system is demonstrated to achieve FC, with the average position and velocity of the leaders converging asymptotically to the desired trajectory. Finally, the theoretical achievements are verified in simulations by a multi-agent system composed of virtual human individuals.
文摘The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.