This study presents a machine learning-based method for predicting fragment velocity distribution in warhead fragmentation under explosive loading condition.The fragment resultant velocities are correlated with key de...This study presents a machine learning-based method for predicting fragment velocity distribution in warhead fragmentation under explosive loading condition.The fragment resultant velocities are correlated with key design parameters including casing dimensions and detonation positions.The paper details the finite element analysis for fragmentation,the characterizations of the dynamic hardening and fracture models,the generation of comprehensive datasets,and the training of the ANN model.The results show the influence of casing dimensions on fragment velocity distributions,with the tendencies indicating increased resultant velocity with reduced thickness,increased length and diameter.The model's predictive capability is demonstrated through the accurate predictions for both training and testing datasets,showing its potential for the real-time prediction of fragmentation performance.展开更多
Copper smelting is the main source of arsenic pollution in the environment,and China is the largest country for copper smelting.Taking 2022 as an example,this study analyzes the distribution and fate of arsenic across...Copper smelting is the main source of arsenic pollution in the environment,and China is the largest country for copper smelting.Taking 2022 as an example,this study analyzes the distribution and fate of arsenic across the copper mining,beneficiation,and smelting processes using a life-cycle approach,providing important insights for arsenic pollution prevention and the resource utilization of arsenic-bearing solid waste.The results show that the amount of As in waste rock,tailing and concentrate are 53483 t,86632 t,76162 t,respectively.After smelting treatment,the amount of arsenic in different types of solid waste,wastewater,waste gas and products are 76128 t,1 t,31 t and 2 t,respectively,and the proportion in arsenic sulfide slag is the highest(55%).The amount of emission to the environment is 32 t,accounting for only 0.04%of total amount.In the future,key considerations are to improve the resource utilization rate of arsenic-containing solid waste(tailing,smelting slag),especially arsenic sulfide slag,and to digest its environmental risk.展开更多
Estimating trawler fishing effort plays a critical role in characterizing marine fisheries activities,quantifying the ecological impact of trawling,and refining regulatory frameworks and policies.Understanding trawler...Estimating trawler fishing effort plays a critical role in characterizing marine fisheries activities,quantifying the ecological impact of trawling,and refining regulatory frameworks and policies.Understanding trawler fishing inputs offers crucial scientific data to support the sustainable management of offshore fishery resources in China.An XGBoost algorithm was introduced and optimized through Harris Hawks Optimization(HHO),to develop a model for identifying trawler fishing behaviour.The model demonstrated exceptional performance,achieving accuracy,sensitivity,specificity,and the Matthews correlation coefficient of 0.9713,0.9806,0.9632,and 0.9425,respectively.Using this model to detect fishing activities,the fishing effort of trawlers from Shandong Province in the sea area between 119°E to 124°E and 32°N to 40°N in 2021 was quantified.A heatmap depicting fishing effort,generated with a spatial resolution of 1/8°,revealed that fishing activities were predominantly concentrated in two regions:121.1°E to 124°E,35.7°N to 38.7°N,and 119.8°E to 122.8°E,33.6°N to 35.4°N.This research can provide a foundation for quantitative evaluations of fishery resources,which can offer vital data to promote the sustainable development of marine capture fisheries.展开更多
Identifying potential hazards is crucial for maintaining the structural stability of opencast mining area.To address the limitations of irregular structure and sparse microseismic events in opencast mining monitoring,...Identifying potential hazards is crucial for maintaining the structural stability of opencast mining area.To address the limitations of irregular structure and sparse microseismic events in opencast mining monitoring,this paper proposes an active-source imaging method for identifying potential hazards precisely based on velocity structure.This method innovatively divides the irregular structure into unstructured grids and introduces a damping and smoothing regularization operator into the inversion process,mitigating the ill-posedness caused by the sparse distribution of events and rays.Numerical and laboratory experiments were conducted to verify the reliability and effectiveness of the proposed method.The results demonstrate the competitive performance of the method in identifying hazard areas of varying sizes and numbers.The proposed method shows potential for meeting hazard identification requirements in the complex opencast mining structure.Furthermore,field experiments were conducted on an rare earth mine slope.It confirms that the proposed method provides a more concrete and intuitive scheme for stability monitoring for the microseismic monitoring system.This paper not only demonstrates the application of acoustic structure velocity imaging technology in detecting unstructured potential hazard regions but also provides valuable insights into the construction and maintenance of stable opencast mining area.展开更多
Addressing the issues of significant entry settlement and severe mining pressure manifestations in the conventional 121 approach,an innovative N00 approach is proposed.By comparing the mining process and entry formati...Addressing the issues of significant entry settlement and severe mining pressure manifestations in the conventional 121 approach,an innovative N00 approach is proposed.By comparing the mining process and entry formation process of different approaches,the characteristics of entry roof settlement evolution under different approaches are obtained.The N00 approach,which incorporates roof cutting and NPR cable support,optimizes the mining and entry formation process to reduce the settlement phase of entry roof,decreases the settlement of entry roof,and enhances the steadiness of entry roof.The N00 approach modifies the entry roof structure through roof cutting and establishes a hydraulic support load mechanics model for the mining panel to derive the theoretical load pressure formula for the N00 approach’s hydraulic support.Compared with the conventional 121 approach,the pressure on the N00 approach’s hydraulic support is reduced.Empirical data obtained through field monitoring demonstrate that the N00 approach has reduced the roof settlement of the entry and weakened the mining pressure manifestation at the mining panel,achieving the goal of protecting the entry and mining panel.展开更多
This study is to determine the support mechanism of pre-stressed expandable props for the stope roof in room- and-pillar mining, which is crucial for maintaining stability and preventing roof collapse in mines. Utiliz...This study is to determine the support mechanism of pre-stressed expandable props for the stope roof in room- and-pillar mining, which is crucial for maintaining stability and preventing roof collapse in mines. Utilizing an engineering case from a gold mine in Dandong, China, a laboratory-based similar test is conducted to extract the actual roof characteristic curve. This test continues until the mining stope collapses due to a U-shaped failure. Concurrently, a semi-theoretical method for obtaining the roof characteristic curve is proposed and verified against the actual curve. The semi-theoretical method calculated that the support force and vertical displacement at the demarcation point between the elastic and plastic zones of the roof characteristic curve are 5.0 MPa and 8.20 mm, respectively, corroborating well with the laboratory-based similar test results of 0.22 MPa and 0.730 mm. The weakening factor for the plastic zone in the roof characteristic curve was semi-theoretically estimated to be 0.75. The intersection between the actual roof characteristic curve and the support characteristic curves of expandable props, natural pillars, and concrete props indicates that the expandable prop is the most effective “yielding support” for the stope roof in room-and-pillar mining. That is, the deformation and failure of the stope roof can be effectively controlled with proper release of roof stress. This study provides practical insights for optimizing support strategies in room-and-pillar mining, enhancing the safety and efficiency of mining operations.展开更多
The reverse design of solid rocket motor(SRM)propellant grain involves determining the grain geometry to closely match a predefined internal ballistic curve.While existing reverse design methods are feasible,they ofte...The reverse design of solid rocket motor(SRM)propellant grain involves determining the grain geometry to closely match a predefined internal ballistic curve.While existing reverse design methods are feasible,they often face challenges such as lengthy computation times and limited accuracy.To achieve rapid and accurate matching between the targeted ballistic curve and complex grain shape,this paper proposes a novel reverse design method for SRM propellant grain based on time-series data imaging and convolutional neural network(CNN).First,a finocyl grain shape-internal ballistic curve dataset is created using parametric modeling techniques to comprehensively cover the design space.Next,the internal ballistic time-series data is encoded into three-channel images,establishing a potential relationship between the ballistic curves and their image representations.A CNN is then constructed and trained using these encoded images.Once trained,the model enables efficient inference of propellant grain dimensions from a target internal ballistic curve.This paper conducts comparative experiments across various neural network models,validating the effectiveness of the feature extraction method that transforms internal ballistic time-series data into images,as well as its generalization capability across different CNN architectures.Ignition tests were performed based on the predicted propellant grain.The results demonstrate that the relative error between the experimental internal ballistic curves and the target curves is less than 5%,confirming the validity and feasibility of the proposed reverse design methodology.展开更多
Heterogeneous federated learning(HtFL)has gained significant attention due to its ability to accommodate diverse models and data from distributed combat units.The prototype-based HtFL methods were proposed to reduce t...Heterogeneous federated learning(HtFL)has gained significant attention due to its ability to accommodate diverse models and data from distributed combat units.The prototype-based HtFL methods were proposed to reduce the high communication cost of transmitting model parameters.These methods allow for the sharing of only class representatives between heterogeneous clients while maintaining privacy.However,existing prototype learning approaches fail to take the data distribution of clients into consideration,which results in suboptimal global prototype learning and insufficient client model personalization capabilities.To address these issues,we propose a fair trainable prototype federated learning(FedFTP)algorithm,which employs a fair sampling training prototype(FSTP)mechanism and a hyperbolic space constraints(HSC)mechanism to enhance the fairness and effectiveness of prototype learning on the server in heterogeneous environments.Furthermore,a local prototype stable update(LPSU)mechanism is proposed as a means of maintaining personalization while promoting global consistency,based on contrastive learning.Comprehensive experimental results demonstrate that FedFTP achieves state-of-the-art performance in HtFL scenarios.展开更多
Recently, high-precision trajectory prediction of ballistic missiles in the boost phase has become a research hotspot. This paper proposes a trajectory prediction algorithm driven by data and knowledge(DKTP) to solve ...Recently, high-precision trajectory prediction of ballistic missiles in the boost phase has become a research hotspot. This paper proposes a trajectory prediction algorithm driven by data and knowledge(DKTP) to solve this problem. Firstly, the complex dynamics characteristics of ballistic missile in the boost phase are analyzed in detail. Secondly, combining the missile dynamics model with the target gravity turning model, a knowledge-driven target three-dimensional turning(T3) model is derived. Then, the BP neural network is used to train the boost phase trajectory database in typical scenarios to obtain a datadriven state parameter mapping(SPM) model. On this basis, an online trajectory prediction framework driven by data and knowledge is established. Based on the SPM model, the three-dimensional turning coefficients of the target are predicted by using the current state of the target, and the state of the target at the next moment is obtained by combining the T3 model. Finally, simulation verification is carried out under various conditions. The simulation results show that the DKTP algorithm combines the advantages of data-driven and knowledge-driven, improves the interpretability of the algorithm, reduces the uncertainty, which can achieve high-precision trajectory prediction of ballistic missile in the boost phase.展开更多
[Objective]Accurate prediction of tomato growth height is crucial for optimizing production environments in smart farming.However,current prediction methods predominantly rely on empirical,mechanistic,or learning-base...[Objective]Accurate prediction of tomato growth height is crucial for optimizing production environments in smart farming.However,current prediction methods predominantly rely on empirical,mechanistic,or learning-based models that utilize either images data or environmental data.These methods fail to fully leverage multi-modal data to capture the diverse aspects of plant growth comprehensively.[Methods]To address this limitation,a two-stage phenotypic feature extraction(PFE)model based on deep learning algorithm of recurrent neural network(RNN)and long short-term memory(LSTM)was developed.The model integrated environment and plant information to provide a holistic understanding of the growth process,emploied phenotypic and temporal feature extractors to comprehensively capture both types of features,enabled a deeper understanding of the interaction between tomato plants and their environment,ultimately leading to highly accurate predictions of growth height.[Results and Discussions]The experimental results showed the model's ef‐fectiveness:When predicting the next two days based on the past five days,the PFE-based RNN and LSTM models achieved mean absolute percentage error(MAPE)of 0.81%and 0.40%,respectively,which were significantly lower than the 8.00%MAPE of the large language model(LLM)and 6.72%MAPE of the Transformer-based model.In longer-term predictions,the 10-day prediction for 4 days ahead and the 30-day prediction for 12 days ahead,the PFE-RNN model continued to outperform the other two baseline models,with MAPE of 2.66%and 14.05%,respectively.[Conclusions]The proposed method,which leverages phenotypic-temporal collaboration,shows great potential for intelligent,data-driven management of tomato cultivation,making it a promising approach for enhancing the efficiency and precision of smart tomato planting management.展开更多
A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on ...A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section.展开更多
This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-...This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-combat behavior data.The technique of air-combat behavior data mining based on the truncation method is proposed to discover the air-combat rules or patterns.The simulation platform of the air-combat behavior data mining that supports two fighters is implemented.The simulation experimental results show that the proposed air-combat behavior data mining technique based on the truncation method is feasible whether in efficiency or in effectiveness.展开更多
For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to p...For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to process intercepted signals,which has a negative effect on signal classification. A classificationmethod based on spatial data mining is presented to address theabove challenge. Inspired by the idea of spatial data mining, theclassification method applies nuclear field to depicting the distributioninformation of pulse samples in feature space, and digs out thehidden cluster information by analyzing distribution characteristics.In addition, a membership-degree criterion to quantify the correlationamong all classes is established, which ensures classificationaccuracy of signal samples. Numerical experiments show that thepresented method can effectively prevent different working statesof multi-mode emitter from being classified as several emitters,and achieve higher classification accuracy.展开更多
According to the chaotic and non-linear characters of power load data,the time series matrix is established with the theory of phase-space reconstruction,and then Lyapunov exponents with chaotic time series are comput...According to the chaotic and non-linear characters of power load data,the time series matrix is established with the theory of phase-space reconstruction,and then Lyapunov exponents with chaotic time series are computed to determine the time delay and the embedding dimension.Due to different features of the data,data mining algorithm is conducted to classify the data into different groups.Redundant information is eliminated by the advantage of data mining technology,and the historical loads that have highly similar features with the forecasting day are searched by the system.As a result,the training data can be decreased and the computing speed can also be improved when constructing support vector machine(SVM) model.Then,SVM algorithm is used to predict power load with parameters that get in pretreatment.In order to prove the effectiveness of the new model,the calculation with data mining SVM algorithm is compared with that of single SVM and back propagation network.It can be seen that the new DSVM algorithm effectively improves the forecast accuracy by 0.75%,1.10% and 1.73% compared with SVM for two random dimensions of 11-dimension,14-dimension and BP network,respectively.This indicates that the DSVM gains perfect improvement effect in the short-term power load forecasting.展开更多
Objective speech quality is difficult to be measured without the input reference speech.Mapping methods using data mining are investigated and designed to improve the output-based speech quality assessment algorithm.T...Objective speech quality is difficult to be measured without the input reference speech.Mapping methods using data mining are investigated and designed to improve the output-based speech quality assessment algorithm.The degraded speech is firstly separated into three classes(unvoiced,voiced and silence),and then the consistency measurement between the degraded speech signal and the pre-trained reference model for each class is calculated and mapped to an objective speech quality score using data mining.Fuzzy Gaussian mixture model(GMM)is used to generate the artificial reference model trained on perceptual linear predictive(PLP)features.The mean opinion score(MOS)mapping methods including multivariate non-linear regression(MNLR),fuzzy neural network(FNN)and support vector regression(SVR)are designed and compared with the standard ITU-T P.563 method.Experimental results show that the assessment methods with data mining perform better than ITU-T P.563.Moreover,FNN and SVR are more efficient than MNLR,and FNN performs best with 14.50% increase in the correlation coefficient and 32.76% decrease in the root-mean-square MOS error.展开更多
In this paper, we present a cluster-based algorithm for time series outlier mining.We use discrete Fourier transformation (DFT) to transform time series from time domain to frequency domain. Time series thus can be ma...In this paper, we present a cluster-based algorithm for time series outlier mining.We use discrete Fourier transformation (DFT) to transform time series from time domain to frequency domain. Time series thus can be mapped as the points in k -dimensional space.For these points, a cluster-based algorithm is developed to mine the outliers from these points.The algorithm first partitions the input points into disjoint clusters and then prunes the clusters,through judgment that can not contain outliers.Our algorithm has been run in the electrical load time series of one steel enterprise and proved to be effective.展开更多
In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was pre...In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was presented with the definitions. From the model, data mining method was used to acquire the risk transmission matrix from the historical databases analysis. The quantitative calculation problem among the generic project risk elements was solved. This method deals with well the risk element transmission problems with limited states. And in order to get the limited states, fuzzy theory was used to discrete the historical data in historical databases. In an example, the controlling risk degree is chosen as P(Rs≥2) ≤0.1, it means that the probability of risk state which is not less than 2 in project is not more than 0.1, the risk element R3 is chosen to control the project, respectively. The result shows that three risk element transmission matrix can be acquired in 4 risk elements, and the frequency histogram and cumulative frequency histogram of each risk element are also given.展开更多
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux...Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.展开更多
基金supported by Poongsan-KAIST Future Research Center Projectthe fund support provided by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(Grant No.2023R1A2C2005661)。
文摘This study presents a machine learning-based method for predicting fragment velocity distribution in warhead fragmentation under explosive loading condition.The fragment resultant velocities are correlated with key design parameters including casing dimensions and detonation positions.The paper details the finite element analysis for fragmentation,the characterizations of the dynamic hardening and fracture models,the generation of comprehensive datasets,and the training of the ANN model.The results show the influence of casing dimensions on fragment velocity distributions,with the tendencies indicating increased resultant velocity with reduced thickness,increased length and diameter.The model's predictive capability is demonstrated through the accurate predictions for both training and testing datasets,showing its potential for the real-time prediction of fragmentation performance.
文摘Copper smelting is the main source of arsenic pollution in the environment,and China is the largest country for copper smelting.Taking 2022 as an example,this study analyzes the distribution and fate of arsenic across the copper mining,beneficiation,and smelting processes using a life-cycle approach,providing important insights for arsenic pollution prevention and the resource utilization of arsenic-bearing solid waste.The results show that the amount of As in waste rock,tailing and concentrate are 53483 t,86632 t,76162 t,respectively.After smelting treatment,the amount of arsenic in different types of solid waste,wastewater,waste gas and products are 76128 t,1 t,31 t and 2 t,respectively,and the proportion in arsenic sulfide slag is the highest(55%).The amount of emission to the environment is 32 t,accounting for only 0.04%of total amount.In the future,key considerations are to improve the resource utilization rate of arsenic-containing solid waste(tailing,smelting slag),especially arsenic sulfide slag,and to digest its environmental risk.
文摘Estimating trawler fishing effort plays a critical role in characterizing marine fisheries activities,quantifying the ecological impact of trawling,and refining regulatory frameworks and policies.Understanding trawler fishing inputs offers crucial scientific data to support the sustainable management of offshore fishery resources in China.An XGBoost algorithm was introduced and optimized through Harris Hawks Optimization(HHO),to develop a model for identifying trawler fishing behaviour.The model demonstrated exceptional performance,achieving accuracy,sensitivity,specificity,and the Matthews correlation coefficient of 0.9713,0.9806,0.9632,and 0.9425,respectively.Using this model to detect fishing activities,the fishing effort of trawlers from Shandong Province in the sea area between 119°E to 124°E and 32°N to 40°N in 2021 was quantified.A heatmap depicting fishing effort,generated with a spatial resolution of 1/8°,revealed that fishing activities were predominantly concentrated in two regions:121.1°E to 124°E,35.7°N to 38.7°N,and 119.8°E to 122.8°E,33.6°N to 35.4°N.This research can provide a foundation for quantitative evaluations of fishery resources,which can offer vital data to promote the sustainable development of marine capture fisheries.
基金Project(2021YFC2900500)supported by the National Key Research and Development Program of China。
文摘Identifying potential hazards is crucial for maintaining the structural stability of opencast mining area.To address the limitations of irregular structure and sparse microseismic events in opencast mining monitoring,this paper proposes an active-source imaging method for identifying potential hazards precisely based on velocity structure.This method innovatively divides the irregular structure into unstructured grids and introduces a damping and smoothing regularization operator into the inversion process,mitigating the ill-posedness caused by the sparse distribution of events and rays.Numerical and laboratory experiments were conducted to verify the reliability and effectiveness of the proposed method.The results demonstrate the competitive performance of the method in identifying hazard areas of varying sizes and numbers.The proposed method shows potential for meeting hazard identification requirements in the complex opencast mining structure.Furthermore,field experiments were conducted on an rare earth mine slope.It confirms that the proposed method provides a more concrete and intuitive scheme for stability monitoring for the microseismic monitoring system.This paper not only demonstrates the application of acoustic structure velocity imaging technology in detecting unstructured potential hazard regions but also provides valuable insights into the construction and maintenance of stable opencast mining area.
基金Project(2022XDHZ12)supported by the Lvliang Technology Project,ChinaProjects(8232056,2232080)supported by the Beijing Natural Science Foundation,ChinaProject([2020]3008)supported by the Science and Technology Projects in Guizhou Province,China。
文摘Addressing the issues of significant entry settlement and severe mining pressure manifestations in the conventional 121 approach,an innovative N00 approach is proposed.By comparing the mining process and entry formation process of different approaches,the characteristics of entry roof settlement evolution under different approaches are obtained.The N00 approach,which incorporates roof cutting and NPR cable support,optimizes the mining and entry formation process to reduce the settlement phase of entry roof,decreases the settlement of entry roof,and enhances the steadiness of entry roof.The N00 approach modifies the entry roof structure through roof cutting and establishes a hydraulic support load mechanics model for the mining panel to derive the theoretical load pressure formula for the N00 approach’s hydraulic support.Compared with the conventional 121 approach,the pressure on the N00 approach’s hydraulic support is reduced.Empirical data obtained through field monitoring demonstrate that the N00 approach has reduced the roof settlement of the entry and weakened the mining pressure manifestation at the mining panel,achieving the goal of protecting the entry and mining panel.
基金Project(2022YFC2903801) supported by the National Key Research and Development Program of ChinaProjects(52374117, 52274115) supported by the National Natural Science Foundation of China。
文摘This study is to determine the support mechanism of pre-stressed expandable props for the stope roof in room- and-pillar mining, which is crucial for maintaining stability and preventing roof collapse in mines. Utilizing an engineering case from a gold mine in Dandong, China, a laboratory-based similar test is conducted to extract the actual roof characteristic curve. This test continues until the mining stope collapses due to a U-shaped failure. Concurrently, a semi-theoretical method for obtaining the roof characteristic curve is proposed and verified against the actual curve. The semi-theoretical method calculated that the support force and vertical displacement at the demarcation point between the elastic and plastic zones of the roof characteristic curve are 5.0 MPa and 8.20 mm, respectively, corroborating well with the laboratory-based similar test results of 0.22 MPa and 0.730 mm. The weakening factor for the plastic zone in the roof characteristic curve was semi-theoretically estimated to be 0.75. The intersection between the actual roof characteristic curve and the support characteristic curves of expandable props, natural pillars, and concrete props indicates that the expandable prop is the most effective “yielding support” for the stope roof in room-and-pillar mining. That is, the deformation and failure of the stope roof can be effectively controlled with proper release of roof stress. This study provides practical insights for optimizing support strategies in room-and-pillar mining, enhancing the safety and efficiency of mining operations.
文摘The reverse design of solid rocket motor(SRM)propellant grain involves determining the grain geometry to closely match a predefined internal ballistic curve.While existing reverse design methods are feasible,they often face challenges such as lengthy computation times and limited accuracy.To achieve rapid and accurate matching between the targeted ballistic curve and complex grain shape,this paper proposes a novel reverse design method for SRM propellant grain based on time-series data imaging and convolutional neural network(CNN).First,a finocyl grain shape-internal ballistic curve dataset is created using parametric modeling techniques to comprehensively cover the design space.Next,the internal ballistic time-series data is encoded into three-channel images,establishing a potential relationship between the ballistic curves and their image representations.A CNN is then constructed and trained using these encoded images.Once trained,the model enables efficient inference of propellant grain dimensions from a target internal ballistic curve.This paper conducts comparative experiments across various neural network models,validating the effectiveness of the feature extraction method that transforms internal ballistic time-series data into images,as well as its generalization capability across different CNN architectures.Ignition tests were performed based on the predicted propellant grain.The results demonstrate that the relative error between the experimental internal ballistic curves and the target curves is less than 5%,confirming the validity and feasibility of the proposed reverse design methodology.
基金supported by the Natural Science Foundation of Xinjiang Uygur Autonomous Region(No.2022D01B187).
文摘Heterogeneous federated learning(HtFL)has gained significant attention due to its ability to accommodate diverse models and data from distributed combat units.The prototype-based HtFL methods were proposed to reduce the high communication cost of transmitting model parameters.These methods allow for the sharing of only class representatives between heterogeneous clients while maintaining privacy.However,existing prototype learning approaches fail to take the data distribution of clients into consideration,which results in suboptimal global prototype learning and insufficient client model personalization capabilities.To address these issues,we propose a fair trainable prototype federated learning(FedFTP)algorithm,which employs a fair sampling training prototype(FSTP)mechanism and a hyperbolic space constraints(HSC)mechanism to enhance the fairness and effectiveness of prototype learning on the server in heterogeneous environments.Furthermore,a local prototype stable update(LPSU)mechanism is proposed as a means of maintaining personalization while promoting global consistency,based on contrastive learning.Comprehensive experimental results demonstrate that FedFTP achieves state-of-the-art performance in HtFL scenarios.
基金the National Natural Science Foundation of China (Grants No. 12072090 and No.12302056) to provide fund for conducting experiments。
文摘Recently, high-precision trajectory prediction of ballistic missiles in the boost phase has become a research hotspot. This paper proposes a trajectory prediction algorithm driven by data and knowledge(DKTP) to solve this problem. Firstly, the complex dynamics characteristics of ballistic missile in the boost phase are analyzed in detail. Secondly, combining the missile dynamics model with the target gravity turning model, a knowledge-driven target three-dimensional turning(T3) model is derived. Then, the BP neural network is used to train the boost phase trajectory database in typical scenarios to obtain a datadriven state parameter mapping(SPM) model. On this basis, an online trajectory prediction framework driven by data and knowledge is established. Based on the SPM model, the three-dimensional turning coefficients of the target are predicted by using the current state of the target, and the state of the target at the next moment is obtained by combining the T3 model. Finally, simulation verification is carried out under various conditions. The simulation results show that the DKTP algorithm combines the advantages of data-driven and knowledge-driven, improves the interpretability of the algorithm, reduces the uncertainty, which can achieve high-precision trajectory prediction of ballistic missile in the boost phase.
文摘[Objective]Accurate prediction of tomato growth height is crucial for optimizing production environments in smart farming.However,current prediction methods predominantly rely on empirical,mechanistic,or learning-based models that utilize either images data or environmental data.These methods fail to fully leverage multi-modal data to capture the diverse aspects of plant growth comprehensively.[Methods]To address this limitation,a two-stage phenotypic feature extraction(PFE)model based on deep learning algorithm of recurrent neural network(RNN)and long short-term memory(LSTM)was developed.The model integrated environment and plant information to provide a holistic understanding of the growth process,emploied phenotypic and temporal feature extractors to comprehensively capture both types of features,enabled a deeper understanding of the interaction between tomato plants and their environment,ultimately leading to highly accurate predictions of growth height.[Results and Discussions]The experimental results showed the model's ef‐fectiveness:When predicting the next two days based on the past five days,the PFE-based RNN and LSTM models achieved mean absolute percentage error(MAPE)of 0.81%and 0.40%,respectively,which were significantly lower than the 8.00%MAPE of the large language model(LLM)and 6.72%MAPE of the Transformer-based model.In longer-term predictions,the 10-day prediction for 4 days ahead and the 30-day prediction for 12 days ahead,the PFE-RNN model continued to outperform the other two baseline models,with MAPE of 2.66%and 14.05%,respectively.[Conclusions]The proposed method,which leverages phenotypic-temporal collaboration,shows great potential for intelligent,data-driven management of tomato cultivation,making it a promising approach for enhancing the efficiency and precision of smart tomato planting management.
文摘A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section.
文摘This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-combat behavior data.The technique of air-combat behavior data mining based on the truncation method is proposed to discover the air-combat rules or patterns.The simulation platform of the air-combat behavior data mining that supports two fighters is implemented.The simulation experimental results show that the proposed air-combat behavior data mining technique based on the truncation method is feasible whether in efficiency or in effectiveness.
基金supported by the National Natural Science Foundation of China(61371172)the International S&T Cooperation Program of China(2015DFR10220)+1 种基金the Ocean Engineering Project of National Key Laboratory Foundation(1213)the Fundamental Research Funds for the Central Universities(HEUCF1608)
文摘For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to process intercepted signals,which has a negative effect on signal classification. A classificationmethod based on spatial data mining is presented to address theabove challenge. Inspired by the idea of spatial data mining, theclassification method applies nuclear field to depicting the distributioninformation of pulse samples in feature space, and digs out thehidden cluster information by analyzing distribution characteristics.In addition, a membership-degree criterion to quantify the correlationamong all classes is established, which ensures classificationaccuracy of signal samples. Numerical experiments show that thepresented method can effectively prevent different working statesof multi-mode emitter from being classified as several emitters,and achieve higher classification accuracy.
基金Project(70671039) supported by the National Natural Science Foundation of China
文摘According to the chaotic and non-linear characters of power load data,the time series matrix is established with the theory of phase-space reconstruction,and then Lyapunov exponents with chaotic time series are computed to determine the time delay and the embedding dimension.Due to different features of the data,data mining algorithm is conducted to classify the data into different groups.Redundant information is eliminated by the advantage of data mining technology,and the historical loads that have highly similar features with the forecasting day are searched by the system.As a result,the training data can be decreased and the computing speed can also be improved when constructing support vector machine(SVM) model.Then,SVM algorithm is used to predict power load with parameters that get in pretreatment.In order to prove the effectiveness of the new model,the calculation with data mining SVM algorithm is compared with that of single SVM and back propagation network.It can be seen that the new DSVM algorithm effectively improves the forecast accuracy by 0.75%,1.10% and 1.73% compared with SVM for two random dimensions of 11-dimension,14-dimension and BP network,respectively.This indicates that the DSVM gains perfect improvement effect in the short-term power load forecasting.
基金Projects(61001188,1161140319)supported by the National Natural Science Foundation of ChinaProject(2012ZX03001034)supported by the National Science and Technology Major ProjectProject(YETP1202)supported by Beijing Higher Education Young Elite Teacher Project,China
文摘Objective speech quality is difficult to be measured without the input reference speech.Mapping methods using data mining are investigated and designed to improve the output-based speech quality assessment algorithm.The degraded speech is firstly separated into three classes(unvoiced,voiced and silence),and then the consistency measurement between the degraded speech signal and the pre-trained reference model for each class is calculated and mapped to an objective speech quality score using data mining.Fuzzy Gaussian mixture model(GMM)is used to generate the artificial reference model trained on perceptual linear predictive(PLP)features.The mean opinion score(MOS)mapping methods including multivariate non-linear regression(MNLR),fuzzy neural network(FNN)and support vector regression(SVR)are designed and compared with the standard ITU-T P.563 method.Experimental results show that the assessment methods with data mining perform better than ITU-T P.563.Moreover,FNN and SVR are more efficient than MNLR,and FNN performs best with 14.50% increase in the correlation coefficient and 32.76% decrease in the root-mean-square MOS error.
文摘In this paper, we present a cluster-based algorithm for time series outlier mining.We use discrete Fourier transformation (DFT) to transform time series from time domain to frequency domain. Time series thus can be mapped as the points in k -dimensional space.For these points, a cluster-based algorithm is developed to mine the outliers from these points.The algorithm first partitions the input points into disjoint clusters and then prunes the clusters,through judgment that can not contain outliers.Our algorithm has been run in the electrical load time series of one steel enterprise and proved to be effective.
基金Project(70572090) supported by the National Natural Science Foundation of China
文摘In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was presented with the definitions. From the model, data mining method was used to acquire the risk transmission matrix from the historical databases analysis. The quantitative calculation problem among the generic project risk elements was solved. This method deals with well the risk element transmission problems with limited states. And in order to get the limited states, fuzzy theory was used to discrete the historical data in historical databases. In an example, the controlling risk degree is chosen as P(Rs≥2) ≤0.1, it means that the probability of risk state which is not less than 2 in project is not more than 0.1, the risk element R3 is chosen to control the project, respectively. The result shows that three risk element transmission matrix can be acquired in 4 risk elements, and the frequency histogram and cumulative frequency histogram of each risk element are also given.
基金supported by the National Grand Fundamental Research "973" Program of China (2004CB318109)the National High-Technology Research and Development Plan of China (2006AA01Z452)the National Information Security "242"Program of China (2005C39).
文摘Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.