A novel method of coupled SPH with smoothed point interpolation method (S-PIM) has been employed to simulate the 2-D problem of liquid sloshing with multiple flexible baffles. In this simulation, the exciting force en...
详细信息
This paper proposes an arrhythmia classification method based on Extreme Learning Machine (ELM). Firstly, we extract a feature vector from the electrocardiogram (ECG) dataset as the input of the ELM model for each hea...
详细信息
The 3d-transition-metal (hydro)oxides belong to a group of highly efficient, scalable and inexpensive electrocatalysts for widespread energy-related applications that feature easily tailorable crystal and electronic s...
详细信息
The 3d-transition-metal (hydro)oxides belong to a group of highly efficient, scalable and inexpensive electrocatalysts for widespread energy-related applications that feature easily tailorable crystal and electronic structures. We propose a general strategy to further boost their electrocatalytic activities by introducing organic ligands into the framework, considering that most 3d-metal (hydro)oxides usually exhibit quite strong binding with reaction intermediates and thus compromised activity due to the scaling relations. Involving weakly bonded ligands downshifts the d-band center, which narrows the band gap, and optimizes the adsorption of these intermediates. For example, the activity of the oxygen evolution reaction (OER) can be greatly promoted by ≈5.7 times over a NiCo layered double hydroxide (LDH) after a terephthalic acid (TPA)-induced conversion process, arising from the reduced energy barrier of the deprotonation of OH* to O*. Impressively, the proposed ligand-induced conversion strategy is applicable to a series of 3d-block metal (hydro)oxides, including NiFe 2 O 4 , NiCo 2 O 4 , and NiZn LDH, providing a general structural upgrading scheme for existing high-performance electrocatalytic systems.
Background: Systems Medicine is a novel approach to medicine, that is, an interdisciplinary field that considers the human body as a system, composed of multiple parts and of complex relationships at multiple levels, ...
详细信息
The known Iπ=81+, Ex=2129−keV isomer in the semimagic nucleus Cd13082 was populated in the projectile fission of a U238 beam at the Radioactive Isotope Beam Factory at RIKEN. The high counting statistics of the accum...
详细信息
The known Iπ=81+, Ex=2129−keV isomer in the semimagic nucleus Cd13082 was populated in the projectile fission of a U238 beam at the Radioactive Isotope Beam Factory at RIKEN. The high counting statistics of the accumulated data allowed us to determine the excitation energy, Ex=2001.2(7) keV, and half-life, T1/2=57(3) ns, of the Iπ=61+ state based on γγ coincidence information. Furthermore, the half-life of the 81+ state, T1/2=224(4) ns, was remeasured with high precision. The new experimental information, combined with available data for Sn134 and large-scale shell model calculations, allowed us to extract proton and neutron effective charges for Sn132, a doubly magic nucleus far-off stability. A comparison to analogous information for Sn100 provides first reliable information regarding the isospin dependence of the isoscalar and isovector effective charges in heavy nuclei.
Cyber defenses based on heterogeneous redundant techniques have been proposed as a way to make systems more resistant to attacks. These defense approaches depend on the heterogeneous resources within the system in ord...
ISBN:
(数字)9781538682463
ISBN:
(纸本)9781538682470
Cyber defenses based on heterogeneous redundant techniques have been proposed as a way to make systems more resistant to attacks. These defense approaches depend on the heterogeneous resources within the system in order to make attacks more complicated. However, little work has been done on evaluating or measuring heterogeneity among systems. In this work, we first build the attack surface model of information system with dissimilar redundant architecture. The attack surface model helps us identify the special system resources applied to the attack instances on a tested. Based on the analysis results, we get the attack surface resources of instance object. For the sake of increasing the system security, we construct the more heterogeneous executive entities by the attack surface resources. When we evaluate the heterogeneity among them, we conclude that the attack surface model administers to improve system security and its security increases as the heterogeneity of its executive entities becomes larger.
Text clustering has been widely used in many Natural Language Processing (NLP) applications such as text summarization and news recommendation. However, most of the current algorithms need to predefine a clustering nu...
详细信息
ISBN:
(数字)9781728109626
ISBN:
(纸本)9781728109633
Text clustering has been widely used in many Natural Language Processing (NLP) applications such as text summarization and news recommendation. However, most of the current algorithms need to predefine a clustering number, which is difficult to obtain. Moreover, the mutli-label clustering is useful in multiple clustering tasks in many applications, but related works are rarely available. Although several studies have attempted to solve above two problems, there is a need for methods that can solve the two issues simultaneously. Therefore, we propose a new text clustering algorithm called Word2Cluster. Word2Cluster can automatically generate an adaptive number of clusters and support multi-label clustering. To test the performance of Wrod2Cluster, we build a Chinese text dataset, Hotline, according to real world applications. To evaluate the clustering results better, we propose an improved evaluation method based on basic accuracy, precision and recall for multi-label text clustering. Experimental results on a Chinese text dataset (Hotline) and a public English text dataset (Reuters) demonstrate that our algorithm can achieve better F1-measure and runs faster than the state-of- the-art baselines.
We introduce the concept of a socio-rational secret sharing scheme, in which shares are delivered based on players' reputation and the way they contact with other participants. At the secret sharing stage, weights...
详细信息
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to...
详细信息
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to improve the performances of classical IP geolocation algorithms by finding rich-connected sub-networks inside poor-connected networks. First, a new delay-distance correlation model (RTD-Corr model) is proposed. It builds the relationship between delay-distance correlation and actual network factors such as the tortuosity of the network path and the ratio of propagation delay. Second, based on the RTD-Corr model and actual network characteristics, this paper discusses about how to find rich-connected networks inside China Intemet which is a typical actual poor-connected network. Then we find rich-connected sub-networks of China Intemet through a large-scale network measurement which covers three major ISPs and thirty provinces. At last, based on the founded rich-connected sub-networks, we modify two classical IP geolocation algorithms and the experiments in China Intemet show that their accuracy is significantly increased.
The Large High Altitude Air Shower Observatory (LHAASO) has three sub-arrays, KM2A, WCDA and WFCTA. The flux variations of cosmic ray air showers were studied by analyzing the KM2A data during the thunderstorm on 10 J...
详细信息
暂无评论