Background: Social media platforms are popular among children and often feature challenges that become viral. Notably, the Tide Pod® and Benadryl® challenges encouraged viewers to ingest these substances for...Background: Social media platforms are popular among children and often feature challenges that become viral. Notably, the Tide Pod® and Benadryl® challenges encouraged viewers to ingest these substances for their visual appeal and hallucinogenic effects, respectively. This study aimed to assess the clinical impact and outcomes of single-use detergent sacs (SUDS) and diphenhydramine challenges on pediatric ingestions reported to United States (U.S.) Poison Control Centers (PCCs). Methods: We conducted a retrospective review of pediatric exposures reported to U.S. PCCs using data from the National Poison Data System (NPDS). The study included intentional single-substance ingestions of both brand-name and generic forms of SUDS and diphenhydramine among children ≤ 19 years. We compared the number of calls, clinical effects, disposition, and management strategies for SUDS (pre: 01/01/17 to 12/31/17 vs. post: 01/01/18 to 12/31/18) and diphenhydramine (pre: 08/01/19 to 07/31/20 vs. post: 08/01/20 to 07/31/21) ingestions 12 months before and after the introduction of the respective social media challenges. Differences in proportions were compared using the Chi-square test. Results: During the study period, 469 ingestions of SUDS and 5,702 ingestions of diphenhydramine were reported. Post-challenge periods saw an increase in both SUDS (pre: 82 vs. post: 387;372% increase) and diphenhydramine ingestions (pre: 2,672 vs. post: 3,030;13% increase). While there were no significant changes in moderate or major clinical outcomes, hospitalizations increased post-challenge for both SUDS [pre: 4 (4.9%) vs. post: 33 (8.5%);p = 0.25] and diphenhydramine [pre: n = 904 (33.8%) vs. post: 1,190 (39.3%);p Conclusion: Pediatric ingestions reported to U.S. PCCs and hospitalizations increased coinciding with the introduction of Tide Pod® and Benadryl® challenges. While causality cannot be definitively established, it is essential for pediatricians and parents to be aware of these challenges and educate vulnerable children about the harmful effects of participation in such challenges.展开更多
This paper has designed a unified storage model of Automatic Weather Station Quality Information Inquiries and Feedback( AWSQIF),and has developed an AWSQIF automatic management system,which implements the storage of ...This paper has designed a unified storage model of Automatic Weather Station Quality Information Inquiries and Feedback( AWSQIF),and has developed an AWSQIF automatic management system,which implements the storage of AWSQIF automatically in national quality information two-way feedback process. Based on the unified storage,AWSQIF data have important application in real-time data management,data quality assessment and quality control effect analysis. The results show that the data quality has been improved significantly,and the data assessment has achieved online operating. In addition,AWSQIF can assist the improvement of the quality control effect.展开更多
Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configur...Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology.展开更多
Marine geographic information system (MGIS) has great ability to deal with the spatio-temporal problems and has potential superiority when it is applied to oceanography. Using the feature extraction of oceanic pheno...Marine geographic information system (MGIS) has great ability to deal with the spatio-temporal problems and has potential superiority when it is applied to oceanography. Using the feature extraction of oceanic phenomena as a case study, the functions of the MGIS are analyzed, and thus the position of MGIS in the oceanography is defined. Comparing the requirement of MGIS with that of the traditional GIS which has been developed in the terrestrial applications in the past four decades, the frame for the functions of MGIS is constructed. According to the established MGIS, some key technologies are discussed in detail with emphasis on the specialities which can distinguish the MGIS from the traditional GIS.展开更多
During the 12^(th)Five-Year Plan period,the environmental protection information work made remarkable achievements,and the construction of nationwide air quality monitoring network was completed; the trinitarian monit...During the 12^(th)Five-Year Plan period,the environmental protection information work made remarkable achievements,and the construction of nationwide air quality monitoring network was completed; the trinitarian monitoring system was established,and environmental emergency command ability enhanced significantly. However,the issues of " information island" and " application silo" are still outstanding,and the application and promotion of new technologies make slow progress; the capacity of information system to support environmental protection business is insufficient,and there is no capacity for decision analysis. In the 13^(th)Five-Year Plan period,it is needed to strengthen the application and promotion of new technologies such as cloud computing,big data,Internet of Things,and spatial information,mainly construct and improve " Cloud Computing Based Environmental Protection( CCBEP) ", " big data platform of ecological environment",and then realize the core objective of improving environmental quality.展开更多
Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper...Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted fro...Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively.展开更多
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an...Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
Based on nonlinear prediction and information theory, vertical heterogeneity of predictability and information loss rate in geopotential height field are obtained over the Northern Hemisphere. On a seasonal-to-interan...Based on nonlinear prediction and information theory, vertical heterogeneity of predictability and information loss rate in geopotential height field are obtained over the Northern Hemisphere. On a seasonal-to-interannual time scale, the predictability is low in the lower troposphere and high in the mid-upper troposphere. However, within mid-upper troposphere over the subtropics ocean area, there is a relatively poor predictability. These conclusions also fit the seasonal time scale. Moving to the interannual time scale, the predictability becomes high in the lower troposphere and low in the mid-upper troposphere, contrary to the former case. On the whole the interannual trend is more predictable than the seasonal trend. The average information loss rate is low over the mid-east Pacific, west of North America, Atlantic and Eurasia, and the atmosphere over other places has a relatively high information loss rate on all-time scales. Two channels are found steadily over the Pacific Ocean and Atlantic Ocean in subtropics. There are also unstable channels. The four- season influence on predictability and information communication are studied. The predictability is low, no matter which season data are removed and each season plays an important role in the existence of the channels, except for the winter. The predictability and teleconnections are paramount issues in atmospheric science, and the teleconnections may be established by communication channels. So, this work is interesting since it reveals the vertical structure of predictability distribution, channel locations, and the contributions of different time scales to them and their variations under different seasons.展开更多
Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a no...Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a novel controlled quantum network coding without information loss.The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie.Firstly,two pairs of threeparticle non-maximum entangled states are pre-shared between senders and controller.By adding auxiliary particles and local operations,the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the Z-{10>,|1>}basis.Secondly,when trans-mission fails upon prediction,the quantum state will not be lost,and it will sill be held by the sender.Subsequently,the controller Charlie re-prepares another three-particle non-maximum entangled state to start a new round.When the predicted transmission is successful,the quantum state can be transmitted successfully within the butterfly network.If the receiver wants to receive the effective quantum state,the quantum measurements from Charlie are needed.Thirdly,when the transmission fails,Charlie does not need to integrate the X-{1+>,1->}basis to measure its own particles,by which quantum resources are saved.Charlie not only controls the effective transmission of quantum states,but also the usage of classical and quantum channels.Finally,the implementation of the quantum circuits,as well as a flow chart and safety analysis of our scheme,is proposed.展开更多
Considering special working conditions of under ground coal mines,traditional IC cards,magnetic cards or radio frequency cards do not work well in entrance guard and work attendance check system because of inconvenien...Considering special working conditions of under ground coal mines,traditional IC cards,magnetic cards or radio frequency cards do not work well in entrance guard and work attendance check system because of inconvenient carry,damaged easily and unsuitable in severe surroundings.So an access and attendance system for mine which is more firmly,durable and good performance is designed using new intelligent information carrier-iButton(Information Button).For iButton has a stainless steel shell,which make it has the advantages of anti-strike,antirust,anti-magnetism and anti-folded,the reliability of the system is enhanced greatly.展开更多
Infrastructure for spatial information is an important part of our national information construction that is the subject of essentials on the social of spatial information.As an EU member,Germany has an obligation for...Infrastructure for spatial information is an important part of our national information construction that is the subject of essentials on the social of spatial information.As an EU member,Germany has an obligation for the European spatial information infrastructure to provide its spatial data.The relevant experience of the Germany in the organization,design and implementation of spatial information infrastructure will be a good reference to build our geospatial framework construction.展开更多
With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.He...With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method.展开更多
BACKGROUND Crohn’s disease(CD)is complicated by perianal fistulas in approximately 20%of patients.Achieving permanent fistula closure remains a challenge for physicians.An association between serum anti-tumor necrosi...BACKGROUND Crohn’s disease(CD)is complicated by perianal fistulas in approximately 20%of patients.Achieving permanent fistula closure remains a challenge for physicians.An association between serum anti-tumor necrosis factor-αconcentrations and clinical outcomes in patients with CD has been demonstrated;however,little information is available on serum adalimumab(ADA)concentrations and remission of perianal fistulas in such patients.AIM To study the relationship between serum ADA concentrations and clinical remission of CDassociated perianal fistulas.METHODS This cross-sectional study of patients with CD-associated perianal fistulas treated with ADA was performed at four French hospitals between December 2013 and March 2018.At the time of each serum ADA concentration measurement,we collected information about the patients and their fistulas.The primary study endpoint was clinical remission of fistulas defined as the absence of drainage(in accordance with Present’s criteria),with a PDAI≤4,absence of a seton and assessment of the overall evaluation as favorable by the proctologist at the relevant center.We also assessed fistula healing[defined as being in clinical and radiological(magnetic resonance imaging,MRI)remission]and adverse events.RESULTS The study cohort comprised 34 patients who underwent 56 evaluations(patients had between one and four evaluations).Fifteen patients had clinical remissions(44%),four of whom had healed fistulas on MRI.Serum ADA concentrations were significantly higher at evaluations in which clinical remission was identified than at evaluations in which it was not[14(10-16)vs 10(2-15)μg/mL,P=0.01].Serum ADA concentrations were comparable at the times of evaluation of patients with and without healed fistulas[11(7-14)vs 10(4-16)μg/mL,P=0.69].The adverse event rate did not differ between different serum ADA concentrations.CONCLUSION We found a significant association between high serum ADA concentrations and clinical remission of CD-associated perianal fistulas.展开更多
Based on the retrospect and analysis of the main points of the development of computer management information system,on the basis of the study of relevant data such as enterprise units,mass media,personal information ...Based on the retrospect and analysis of the main points of the development of computer management information system,on the basis of the study of relevant data such as enterprise units,mass media,personal information and information security,and according to the actual situation of our country,this paper intentionally and systematically collects relevant research materials on the role of management information system in the survival and development of enterprises,and aims at one or more merits.To study its impact,this paper focuses on three aspects:application analysis,development direction and implementation strategy,which can provide strong reference and guidance for the application of enterprise computer management system.展开更多
Logistics information construction in colleges and universities is an important part of smart campus. This paper expounds the current situation and existing problems of the logistics information construction in colleg...Logistics information construction in colleges and universities is an important part of smart campus. This paper expounds the current situation and existing problems of the logistics information construction in colleges and universities. Taking China University of Geosciences (Beijing) as an example, this paper discusses the construction principles and Personnel organization structure of the logistics information construction, and provides the construction scheme of the logistics information service platform. It can be used for reference for the implementation of logistics information construction in other colleges and universities.展开更多
This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical fra...This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment.展开更多
文摘Background: Social media platforms are popular among children and often feature challenges that become viral. Notably, the Tide Pod® and Benadryl® challenges encouraged viewers to ingest these substances for their visual appeal and hallucinogenic effects, respectively. This study aimed to assess the clinical impact and outcomes of single-use detergent sacs (SUDS) and diphenhydramine challenges on pediatric ingestions reported to United States (U.S.) Poison Control Centers (PCCs). Methods: We conducted a retrospective review of pediatric exposures reported to U.S. PCCs using data from the National Poison Data System (NPDS). The study included intentional single-substance ingestions of both brand-name and generic forms of SUDS and diphenhydramine among children ≤ 19 years. We compared the number of calls, clinical effects, disposition, and management strategies for SUDS (pre: 01/01/17 to 12/31/17 vs. post: 01/01/18 to 12/31/18) and diphenhydramine (pre: 08/01/19 to 07/31/20 vs. post: 08/01/20 to 07/31/21) ingestions 12 months before and after the introduction of the respective social media challenges. Differences in proportions were compared using the Chi-square test. Results: During the study period, 469 ingestions of SUDS and 5,702 ingestions of diphenhydramine were reported. Post-challenge periods saw an increase in both SUDS (pre: 82 vs. post: 387;372% increase) and diphenhydramine ingestions (pre: 2,672 vs. post: 3,030;13% increase). While there were no significant changes in moderate or major clinical outcomes, hospitalizations increased post-challenge for both SUDS [pre: 4 (4.9%) vs. post: 33 (8.5%);p = 0.25] and diphenhydramine [pre: n = 904 (33.8%) vs. post: 1,190 (39.3%);p Conclusion: Pediatric ingestions reported to U.S. PCCs and hospitalizations increased coinciding with the introduction of Tide Pod® and Benadryl® challenges. While causality cannot be definitively established, it is essential for pediatricians and parents to be aware of these challenges and educate vulnerable children about the harmful effects of participation in such challenges.
基金Supported by Business Construction Project of China Meteorological Administration in 2011Key Project of Key Meteorological Technology Integration and Application of China Meteorological Administration(CMAGJ2013Z01)
文摘This paper has designed a unified storage model of Automatic Weather Station Quality Information Inquiries and Feedback( AWSQIF),and has developed an AWSQIF automatic management system,which implements the storage of AWSQIF automatically in national quality information two-way feedback process. Based on the unified storage,AWSQIF data have important application in real-time data management,data quality assessment and quality control effect analysis. The results show that the data quality has been improved significantly,and the data assessment has achieved online operating. In addition,AWSQIF can assist the improvement of the quality control effect.
基金the Hi-Tech and Research Development Program of China(2005AA133070)the Electronics Information Industry Development Fund Tender Project(XDJ2-0514-27)
文摘Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology.
基金funded by the Project of"973"Program of China under contract No.2006 CB701305the National Natural Science Foundation of China under contract No.40571129.
文摘Marine geographic information system (MGIS) has great ability to deal with the spatio-temporal problems and has potential superiority when it is applied to oceanography. Using the feature extraction of oceanic phenomena as a case study, the functions of the MGIS are analyzed, and thus the position of MGIS in the oceanography is defined. Comparing the requirement of MGIS with that of the traditional GIS which has been developed in the terrestrial applications in the past four decades, the frame for the functions of MGIS is constructed. According to the established MGIS, some key technologies are discussed in detail with emphasis on the specialities which can distinguish the MGIS from the traditional GIS.
文摘During the 12^(th)Five-Year Plan period,the environmental protection information work made remarkable achievements,and the construction of nationwide air quality monitoring network was completed; the trinitarian monitoring system was established,and environmental emergency command ability enhanced significantly. However,the issues of " information island" and " application silo" are still outstanding,and the application and promotion of new technologies make slow progress; the capacity of information system to support environmental protection business is insufficient,and there is no capacity for decision analysis. In the 13^(th)Five-Year Plan period,it is needed to strengthen the application and promotion of new technologies such as cloud computing,big data,Internet of Things,and spatial information,mainly construct and improve " Cloud Computing Based Environmental Protection( CCBEP) ", " big data platform of ecological environment",and then realize the core objective of improving environmental quality.
文摘Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
文摘Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303199,61272514,61170272,61121061,and 61411146001)the Shandong Provincial Natural Science Foundation of China(Grant Nos.ZR2013FM025,ZR2013FQ001,and ZR2014FM003)+4 种基金the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China(Grant Nos.BS2013DX010 and BS2014DX007)the Program for New Century Excellent Talents in Universities,China(Grant No.NCET-13-0681)the National Development Foundation for Cryptological Research,China(Grant No.MMJJ201401012)the Fok Ying Tong Education Foundation,China(Grant No.131067)the Shandong Academy of Sciences Youth Fund Project,China(Grant No.2013QN007)
文摘Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
基金Project supported by the National Key Basic Research and Development Program,China (Grant Nos.2012CB955902 and 2013CB430204)the National Natural Science Foundation of China (Grant Nos.41305059,41305100,41275096 and 41105070)
文摘Based on nonlinear prediction and information theory, vertical heterogeneity of predictability and information loss rate in geopotential height field are obtained over the Northern Hemisphere. On a seasonal-to-interannual time scale, the predictability is low in the lower troposphere and high in the mid-upper troposphere. However, within mid-upper troposphere over the subtropics ocean area, there is a relatively poor predictability. These conclusions also fit the seasonal time scale. Moving to the interannual time scale, the predictability becomes high in the lower troposphere and low in the mid-upper troposphere, contrary to the former case. On the whole the interannual trend is more predictable than the seasonal trend. The average information loss rate is low over the mid-east Pacific, west of North America, Atlantic and Eurasia, and the atmosphere over other places has a relatively high information loss rate on all-time scales. Two channels are found steadily over the Pacific Ocean and Atlantic Ocean in subtropics. There are also unstable channels. The four- season influence on predictability and information communication are studied. The predictability is low, no matter which season data are removed and each season plays an important role in the existence of the channels, except for the winter. The predictability and teleconnections are paramount issues in atmospheric science, and the teleconnections may be established by communication channels. So, this work is interesting since it reveals the vertical structure of predictability distribution, channel locations, and the contributions of different time scales to them and their variations under different seasons.
基金This work is supported by NSFC(Grant Nos.92046001,61571024,61671087,61962009,61971021)the Aeronautical Science Foundation of China(2018ZC51016)+4 种基金the Fundamental Research Funds for the Central Universities(Grant No.2019XD-A02)the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant Nos.2018BDKFJJ018,2019BDKFJJ010,2019BDKFJJ014)the Open Research Project of the State Key Laboratory of Media Convergence and Communication,Communication University of China,China(Grant No.SKLMCC2020KF006)Huawei Technologies Co.Ltd(Grant No.YBN2020085019)the Scientific Research Foundation of North China University of Technology.
文摘Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a novel controlled quantum network coding without information loss.The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie.Firstly,two pairs of threeparticle non-maximum entangled states are pre-shared between senders and controller.By adding auxiliary particles and local operations,the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the Z-{10>,|1>}basis.Secondly,when trans-mission fails upon prediction,the quantum state will not be lost,and it will sill be held by the sender.Subsequently,the controller Charlie re-prepares another three-particle non-maximum entangled state to start a new round.When the predicted transmission is successful,the quantum state can be transmitted successfully within the butterfly network.If the receiver wants to receive the effective quantum state,the quantum measurements from Charlie are needed.Thirdly,when the transmission fails,Charlie does not need to integrate the X-{1+>,1->}basis to measure its own particles,by which quantum resources are saved.Charlie not only controls the effective transmission of quantum states,but also the usage of classical and quantum channels.Finally,the implementation of the quantum circuits,as well as a flow chart and safety analysis of our scheme,is proposed.
基金supported by the Natural Science Foundation of Shandong Province(ZR2009GQ012)Science and Technology Development Plan of China National Coal Association(10-067)
文摘Considering special working conditions of under ground coal mines,traditional IC cards,magnetic cards or radio frequency cards do not work well in entrance guard and work attendance check system because of inconvenient carry,damaged easily and unsuitable in severe surroundings.So an access and attendance system for mine which is more firmly,durable and good performance is designed using new intelligent information carrier-iButton(Information Button).For iButton has a stainless steel shell,which make it has the advantages of anti-strike,antirust,anti-magnetism and anti-folded,the reliability of the system is enhanced greatly.
文摘Infrastructure for spatial information is an important part of our national information construction that is the subject of essentials on the social of spatial information.As an EU member,Germany has an obligation for the European spatial information infrastructure to provide its spatial data.The relevant experience of the Germany in the organization,design and implementation of spatial information infrastructure will be a good reference to build our geospatial framework construction.
文摘With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method.
基金Supported by the Assistance Publique des H?pitaux de Paris and AbbVie (North Chicago, Illinois, United States)
文摘BACKGROUND Crohn’s disease(CD)is complicated by perianal fistulas in approximately 20%of patients.Achieving permanent fistula closure remains a challenge for physicians.An association between serum anti-tumor necrosis factor-αconcentrations and clinical outcomes in patients with CD has been demonstrated;however,little information is available on serum adalimumab(ADA)concentrations and remission of perianal fistulas in such patients.AIM To study the relationship between serum ADA concentrations and clinical remission of CDassociated perianal fistulas.METHODS This cross-sectional study of patients with CD-associated perianal fistulas treated with ADA was performed at four French hospitals between December 2013 and March 2018.At the time of each serum ADA concentration measurement,we collected information about the patients and their fistulas.The primary study endpoint was clinical remission of fistulas defined as the absence of drainage(in accordance with Present’s criteria),with a PDAI≤4,absence of a seton and assessment of the overall evaluation as favorable by the proctologist at the relevant center.We also assessed fistula healing[defined as being in clinical and radiological(magnetic resonance imaging,MRI)remission]and adverse events.RESULTS The study cohort comprised 34 patients who underwent 56 evaluations(patients had between one and four evaluations).Fifteen patients had clinical remissions(44%),four of whom had healed fistulas on MRI.Serum ADA concentrations were significantly higher at evaluations in which clinical remission was identified than at evaluations in which it was not[14(10-16)vs 10(2-15)μg/mL,P=0.01].Serum ADA concentrations were comparable at the times of evaluation of patients with and without healed fistulas[11(7-14)vs 10(4-16)μg/mL,P=0.69].The adverse event rate did not differ between different serum ADA concentrations.CONCLUSION We found a significant association between high serum ADA concentrations and clinical remission of CD-associated perianal fistulas.
基金(1)Project Name:Research on Key Technologies of safe campus construction based on multi-sensor big data fusion(Project number:20190303096sf)(2)Project Name:Research on Key Technologies of smart campus management platform based on big data(Project No.:18dy026)(3)Research on the application of BIM based high-rise building fire rescue and big data escape planning system(Project No.:2020c019-7)。
文摘Based on the retrospect and analysis of the main points of the development of computer management information system,on the basis of the study of relevant data such as enterprise units,mass media,personal information and information security,and according to the actual situation of our country,this paper intentionally and systematically collects relevant research materials on the role of management information system in the survival and development of enterprises,and aims at one or more merits.To study its impact,this paper focuses on three aspects:application analysis,development direction and implementation strategy,which can provide strong reference and guidance for the application of enterprise computer management system.
文摘Logistics information construction in colleges and universities is an important part of smart campus. This paper expounds the current situation and existing problems of the logistics information construction in colleges and universities. Taking China University of Geosciences (Beijing) as an example, this paper discusses the construction principles and Personnel organization structure of the logistics information construction, and provides the construction scheme of the logistics information service platform. It can be used for reference for the implementation of logistics information construction in other colleges and universities.
文摘This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment.