Dear Editor,This letter deals with the set stabilization of stochastic Boolean control networks(SBCNs)by the pinning control strategy,which is to realize the full control for systems by imposing control inputs on a fr...Dear Editor,This letter deals with the set stabilization of stochastic Boolean control networks(SBCNs)by the pinning control strategy,which is to realize the full control for systems by imposing control inputs on a fraction of agents.展开更多
The computer code for the prediction of forest fire behavior is presented. Basic concept of the study is a combined approach to the problem, including the original formulation of fire spread mathematical model, classi...The computer code for the prediction of forest fire behavior is presented. Basic concept of the study is a combined approach to the problem, including the original formulation of fire spread mathematical model, classification of natural fuels, processing of the forest inventory data and programming output of fire simulation code which is compatible with commonly used geographic information system.展开更多
The use of the internet is increasing all over the world on a daily basis in the last two decades.The increase in the internet causes many sexual crimes,such as sexual misuse,domestic violence,and child pornography.Va...The use of the internet is increasing all over the world on a daily basis in the last two decades.The increase in the internet causes many sexual crimes,such as sexual misuse,domestic violence,and child pornography.Various research has been done for pornographic image detection and classification.Most of the used models used machine learning techniques and deep learning models which show less accuracy,while the deep learning model ware used for classification and detection performed better as compared to machine learning.Therefore,this research evaluates the performance analysis of intelligent neural-based deep learning models which are based on Convolution neural network(CNN),Visual geometry group(VGG-16),VGG-14,and Residual Network(ResNet-50)with the expanded dataset,trained using transfer learning approaches applied in the fully connected layer for datasets to classify rank(Pornographic vs.Nonpornographic)classification in images.The simulation result shows that VGG-16 performed better than the used model in this study without augmented data.The VGG-16 model with augmented data reached a training and validation accuracy of 0.97,0.94 with a loss of 0.070,0.16.The precision,recall,and f-measure values for explicit and non-explicit images are(0.94,0.94,0.94)and(0.94,0.94,0.94).Similarly,The VGG-14 model with augmented data reached a training and validation accuracy of 0.98,0.96 with a loss of 0.059,0.11.The f-measure,recall,and precision values for explicit and non-explicit images are(0.98,0.98,0.98)and(0.98,0.98,0.98).The CNN model with augmented data reached a training and validation accuracy of 0.776&0.78 with losses of 0.48&0.46.The f-measure,recall,and precision values for explicit and non-explicit images are(0.80,0.80,0.80)and(0.78,0.79,0.78).The ResNet-50 model with expanded data reached with training accuracy of 0.89 with a loss of 0.389 and 0.86 of validation accuracy and a loss of 0.47.The f-measure,recall,and precision values for explicit and non-explicit images are(0.86,0.97,0.91)and(0.86,0.93,0.89).Where else without augmented data the VGG-16 model reached a training and validation accuracy of 0.997,0.986 with a loss of 0.008,0.056.The f-measure,recall,and precision values for explicit and non-explicit images are(0.94,0.99,0.97)and(0.99,0.93,0.96)which outperforms the used models with the augmented dataset in this study.展开更多
Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell t...Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women.展开更多
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ...In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s.展开更多
Some convergence theorems of Ishikawa type iterative sequence with errors for nonlinear general quasi-contractive mapping in convex metric spaces are proved. The results not only extend and improve the corresponding r...Some convergence theorems of Ishikawa type iterative sequence with errors for nonlinear general quasi-contractive mapping in convex metric spaces are proved. The results not only extend and improve the corresponding results of L. B. Ciric, Q. H. Liu, H. E. Rhoades and H. K. Xu, et al., but also give an affirmative answer to the open question of Rhoades-Naimpally- Singh in convex metric spaces.展开更多
AIM:To investigate perception of natural orifice transluminal endoscopic surgery(NOTES)as a potential technique for appendectomy.METHODS:One hundred patients undergoing endoscopy and 100 physicians were given a questi...AIM:To investigate perception of natural orifice transluminal endoscopic surgery(NOTES)as a potential technique for appendectomy.METHODS:One hundred patients undergoing endoscopy and 100 physicians were given a questionnaire describing in detail the techniques of NOTES and laparoscopic appendectomy.They were asked about the reasons for their preference,choice of orifice,and extent of complication risk they were willing to accept.RESULTS:Fifty patients(50%)and only 21 physicians(21%)preferred NOTES(P<0.001).Patients had previously heard of NOTES less frequently(7%vs73%,P<0.001)and had undergone endoscopy more frequently(88%vs 36%,P<0.001)than physicians.Absence of hernia was the most common reason for NOTES preference in physicians(80%vs 44%,P= 0.003),whereas reduced pain was the most common reason in patients(66%vs 52%).Physicians were more likely to refuse NOTES as a novel and unsure technique(P<0.001)and having an increased risk of infection(P<0.001).The preferred access site in both groups was colon followed by stomach,with vagina being rarely preferred.In multivariable modeling,those with high-school education[odds ratio(OR):2.68,95% confidence interval(CI):1.23-5.83]and prior colonoscopy(OR:2.10,95%CI:1.05-4.19)were more likely to prefer NOTES over laparoscopic appendectomy.There was a steep decline in NOTES preference with increased rate of procedural complications.Male patients were more likely to consent to their wives vaginal NOTES appendectomy than male physicians(P=0.02).CONCLUSION:The preference of NOTES for appendectomy was greater in patients than physicians and was related to reduced pain and absence of hernia rather than lack of scarring.展开更多
This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal ...This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal the whole secret message without permission from the controller. An improvement is proposed to avoid this flaw.展开更多
The control of underactuated mechanical systems is very complex for the loss of its control inputs. The model of underactuated mechanical systems in a potential field is built with Lagrangian method and its structural...The control of underactuated mechanical systems is very complex for the loss of its control inputs. The model of underactuated mechanical systems in a potential field is built with Lagrangian method and its structural properties are analyzed in detail. A stable control approach is proposed for the class of underactuated mechanical systems. This approach is applied to an underactuated double-pendulum-type overhead crane and the simulation results illustrate the correctness of dynamics analysis and validity of the proposed control algorithm.展开更多
Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as ...Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively.展开更多
Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers.In this paper,we have presented methodology to recognize human behavior in thin crowd which may b...Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers.In this paper,we have presented methodology to recognize human behavior in thin crowd which may be very helpful in surveillance.Research have mostly focused the problem of human detection in thin crowd,overall behavior of the crowd and actions of individuals in video sequences.Vision based Human behavior modeling is a complex task as it involves human detection,tracking,classifying normal and abnormal behavior.The proposed methodology takes input video and applies Gaussian based segmentation technique followed by post processing through presenting hole filling algorithm i.e.,fill hole inside objects algorithm.Human detection is performed by presenting human detection algorithm and then geometrical features from human skeleton are extracted using feature extraction algorithm.The classification task is achieved using binary and multi class support vector machines.The proposed technique is validated through accuracy,precision,recall and F-measure metrics.展开更多
This paper introduces several alternative statistical approaches to modeling and prediction of electric energy generated by photovoltaic farms. The statistical models use outputs of a numerical weather prediction mode...This paper introduces several alternative statistical approaches to modeling and prediction of electric energy generated by photovoltaic farms. The statistical models use outputs of a numerical weather prediction model as their inputs. Presented statistical models allow for easy-to-compute predictions, both in temporal sense and for out-of-sample individual farms. Model performance is illustrated on a sample of real photovoltaic farms located in the Czech Republic.展开更多
In this paper, a nonlinear hemivariational inequality of second order with a forcing term of subcritical growth is studied. Using techniques from multivalued analysis and the theory of nonlinear operators of monotone ...In this paper, a nonlinear hemivariational inequality of second order with a forcing term of subcritical growth is studied. Using techniques from multivalued analysis and the theory of nonlinear operators of monotone type, an existence theorem for the Dirichlet boundary value problem is proved.展开更多
Recently, approaches utilizing spatial-temporal features to form Bag-of-Words (BoWs) models have achieved great success due to their simplicity and effectiveness. But they still have difficulties when distinguishing...Recently, approaches utilizing spatial-temporal features to form Bag-of-Words (BoWs) models have achieved great success due to their simplicity and effectiveness. But they still have difficulties when distinguishing between actions with high inter-ambiguity. The main reason is that they describe actions by orderless bag of features, and ignore the spatial and temporal structure information of visual words. In order to improve classification performance, we present a novel approach called sequential Bag-of-Words. It captures temporal sequential structure by segmenting the entire action into sub-actions. Meanwhile, we pay more attention to the distinguishing parts of an action by classifying sub- actions separately, which is then employed to vote for the final result. Extensive experiments are conducted on challenging datasets and real scenes to evaluate our method. Concretely, we compare our results to some state-of-the-art classification approaches and confirm the advantages of our approach to distinguish similar actions. Results show that our approach is robust and outperforms most existing BoWs based classification approaches, especially on complex datasets with interactive activities, cluttered backgrounds and inter-class action ambiguities.展开更多
Both a general domain-independent bottom-up multi-level model and an algorithm for establishing the taxonomic relation of Chinese ontology are proposed.The model consists of extracting domain vocabularies and establis...Both a general domain-independent bottom-up multi-level model and an algorithm for establishing the taxonomic relation of Chinese ontology are proposed.The model consists of extracting domain vocabularies and establishing taxonomic relation,with the consideration of characteristics unique to Chinese natural language.By establishing the semantic forests of domain vocabularies and then using the existing semantic dictionary or machine-readable dictionary(MRD),the proposed algorithm can integrate these semantic forests together to establish the taxonomic relation.Experimental results show that the proposed algorithm is feasible and effective in establishing the integrated taxonomic relation among domain vocabularies and concepts.展开更多
A class of generalized implicit quasivariational inclusions with fuzzy mappings in Hilbert space is discussed in this paper which proves an existence theorem of the solutions and proposes a new iterative algorithm and...A class of generalized implicit quasivariational inclusions with fuzzy mappings in Hilbert space is discussed in this paper which proves an existence theorem of the solutions and proposes a new iterative algorithm and the convergence of the iterative sequence generated by the new algorithm. These results extend and improve some recent corresponding achievements.展开更多
Self-starting Q-switching,Q-switched mode-locking and mode-locking operation modes are achieved sequentially in an all-fiber erbium-doped fiber laser with thulium-doped fiber saturable absorber for the first time.The ...Self-starting Q-switching,Q-switched mode-locking and mode-locking operation modes are achieved sequentially in an all-fiber erbium-doped fiber laser with thulium-doped fiber saturable absorber for the first time.The central wavelengths of Q-switching,Q-switched mode-locking and mode-locking operation modes are 1569.7 nm,1570.9 nm,and 1572 nm,respectively.The mode-locking operation of the proposed fiber laser generates stable dark soliton with a repetition rate of 0.99 MHz and signal-to-noise ratio of 65 dB.The results validate the capability of generating soliton pulse by doped fiber saturable absorber.Furthermore,the proposed fiber laser is beneficial to the applications of optical communication and signal processing system.展开更多
The state of the physics of convective clouds and cloud seeding is discussed briefly. It is noted that at the present time there is a transition from the stage of investigation of “elementary” processes in the cloud...The state of the physics of convective clouds and cloud seeding is discussed briefly. It is noted that at the present time there is a transition from the stage of investigation of “elementary” processes in the clouds to the stage of studying the formation of macro- and microstructural characteristics of clouds as a whole, taking into account their system properties. The main directions of the development of cloud physics at the upcoming stage of its development are discussed. The paper points out that one of these areas is the determination of the structure-forming factors for the clouds and the study of their influence on their formation and evolution. It is noted that one of such factors is the interaction of clouds with their surrounding atmosphere, and the main method of studying its role in the processes of cloud formation is mathematical modeling. A three-dimensional nonstationary model of convective clouds is presented with a detailed account of the processes of thermohydrodynamics and microphysics, which is used for research. The results of modeling the influence of the wind field structure in the atmosphere on the formation and evolution of clouds are presented. It is shown that the dynamic characteristics of the atmosphere have a significant effect on the formation of macro- and microstructural characteristics of convective clouds: the more complex the structure of the wind field in the atmosphere (i.e., the more intense the interaction of the atmosphere and the cloud), the less powerful the clouds are formed.展开更多
基金supported by the National Key Research and Development Project of China(2020YFA0714301)the National Natural Science Foundation of China(61833005)。
文摘Dear Editor,This letter deals with the set stabilization of stochastic Boolean control networks(SBCNs)by the pinning control strategy,which is to realize the full control for systems by imposing control inputs on a fraction of agents.
文摘The computer code for the prediction of forest fire behavior is presented. Basic concept of the study is a combined approach to the problem, including the original formulation of fire spread mathematical model, classification of natural fuels, processing of the forest inventory data and programming output of fire simulation code which is compatible with commonly used geographic information system.
基金funded by the Deanship of Scientific Research at Jouf University under Gran Number DSR–2022–RG–0101.
文摘The use of the internet is increasing all over the world on a daily basis in the last two decades.The increase in the internet causes many sexual crimes,such as sexual misuse,domestic violence,and child pornography.Various research has been done for pornographic image detection and classification.Most of the used models used machine learning techniques and deep learning models which show less accuracy,while the deep learning model ware used for classification and detection performed better as compared to machine learning.Therefore,this research evaluates the performance analysis of intelligent neural-based deep learning models which are based on Convolution neural network(CNN),Visual geometry group(VGG-16),VGG-14,and Residual Network(ResNet-50)with the expanded dataset,trained using transfer learning approaches applied in the fully connected layer for datasets to classify rank(Pornographic vs.Nonpornographic)classification in images.The simulation result shows that VGG-16 performed better than the used model in this study without augmented data.The VGG-16 model with augmented data reached a training and validation accuracy of 0.97,0.94 with a loss of 0.070,0.16.The precision,recall,and f-measure values for explicit and non-explicit images are(0.94,0.94,0.94)and(0.94,0.94,0.94).Similarly,The VGG-14 model with augmented data reached a training and validation accuracy of 0.98,0.96 with a loss of 0.059,0.11.The f-measure,recall,and precision values for explicit and non-explicit images are(0.98,0.98,0.98)and(0.98,0.98,0.98).The CNN model with augmented data reached a training and validation accuracy of 0.776&0.78 with losses of 0.48&0.46.The f-measure,recall,and precision values for explicit and non-explicit images are(0.80,0.80,0.80)and(0.78,0.79,0.78).The ResNet-50 model with expanded data reached with training accuracy of 0.89 with a loss of 0.389 and 0.86 of validation accuracy and a loss of 0.47.The f-measure,recall,and precision values for explicit and non-explicit images are(0.86,0.97,0.91)and(0.86,0.93,0.89).Where else without augmented data the VGG-16 model reached a training and validation accuracy of 0.997,0.986 with a loss of 0.008,0.056.The f-measure,recall,and precision values for explicit and non-explicit images are(0.94,0.99,0.97)and(0.99,0.93,0.96)which outperforms the used models with the augmented dataset in this study.
基金the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number 223202.
文摘Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women.
基金the deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFP-2022-34).
文摘In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s.
基金Foundation items:the National Ntural Science Foundation of China(19771058)the Natural Science Foundation of Education Department of Sichuan Province(01LA70)
文摘Some convergence theorems of Ishikawa type iterative sequence with errors for nonlinear general quasi-contractive mapping in convex metric spaces are proved. The results not only extend and improve the corresponding results of L. B. Ciric, Q. H. Liu, H. E. Rhoades and H. K. Xu, et al., but also give an affirmative answer to the open question of Rhoades-Naimpally- Singh in convex metric spaces.
基金Supported by Grant NT 11234-3 of the Czech Ministry of Healththe Institutional Research Plan AV0Z10300504
文摘AIM:To investigate perception of natural orifice transluminal endoscopic surgery(NOTES)as a potential technique for appendectomy.METHODS:One hundred patients undergoing endoscopy and 100 physicians were given a questionnaire describing in detail the techniques of NOTES and laparoscopic appendectomy.They were asked about the reasons for their preference,choice of orifice,and extent of complication risk they were willing to accept.RESULTS:Fifty patients(50%)and only 21 physicians(21%)preferred NOTES(P<0.001).Patients had previously heard of NOTES less frequently(7%vs73%,P<0.001)and had undergone endoscopy more frequently(88%vs 36%,P<0.001)than physicians.Absence of hernia was the most common reason for NOTES preference in physicians(80%vs 44%,P= 0.003),whereas reduced pain was the most common reason in patients(66%vs 52%).Physicians were more likely to refuse NOTES as a novel and unsure technique(P<0.001)and having an increased risk of infection(P<0.001).The preferred access site in both groups was colon followed by stomach,with vagina being rarely preferred.In multivariable modeling,those with high-school education[odds ratio(OR):2.68,95% confidence interval(CI):1.23-5.83]and prior colonoscopy(OR:2.10,95%CI:1.05-4.19)were more likely to prefer NOTES over laparoscopic appendectomy.There was a steep decline in NOTES preference with increased rate of procedural complications.Male patients were more likely to consent to their wives vaginal NOTES appendectomy than male physicians(P=0.02).CONCLUSION:The preference of NOTES for appendectomy was greater in patients than physicians and was related to reduced pain and absence of hernia rather than lack of scarring.
基金supported by the National Science Council,Taiwan,(Grant No. NSC 100-2221-E-006-152-MY3)
文摘This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal the whole secret message without permission from the controller. An improvement is proposed to avoid this flaw.
基金Supported by National Natural Science Foundation of P.R.China (60575047)
文摘The control of underactuated mechanical systems is very complex for the loss of its control inputs. The model of underactuated mechanical systems in a potential field is built with Lagrangian method and its structural properties are analyzed in detail. A stable control approach is proposed for the class of underactuated mechanical systems. This approach is applied to an underactuated double-pendulum-type overhead crane and the simulation results illustrate the correctness of dynamics analysis and validity of the proposed control algorithm.
基金the European Union's Horizon 2020 research and innovation program under the Marie Sklodowska-Curie grant agreement No.824019 and China Scholarship Council(CSC)the Fundamental Research Funds for Central Universities(No.2020JJ014,YY19SSK05).
文摘Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively.
文摘Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers.In this paper,we have presented methodology to recognize human behavior in thin crowd which may be very helpful in surveillance.Research have mostly focused the problem of human detection in thin crowd,overall behavior of the crowd and actions of individuals in video sequences.Vision based Human behavior modeling is a complex task as it involves human detection,tracking,classifying normal and abnormal behavior.The proposed methodology takes input video and applies Gaussian based segmentation technique followed by post processing through presenting hole filling algorithm i.e.,fill hole inside objects algorithm.Human detection is performed by presenting human detection algorithm and then geometrical features from human skeleton are extracted using feature extraction algorithm.The classification task is achieved using binary and multi class support vector machines.The proposed technique is validated through accuracy,precision,recall and F-measure metrics.
基金Acknowledgments: This work is supported by the State Key Laboratory of Software Engineering and the Natural Science Foundation of Guizhou and the Science Foundation of Guizhou Province(No. 20043029).
文摘This paper introduces several alternative statistical approaches to modeling and prediction of electric energy generated by photovoltaic farms. The statistical models use outputs of a numerical weather prediction model as their inputs. Presented statistical models allow for easy-to-compute predictions, both in temporal sense and for out-of-sample individual farms. Model performance is illustrated on a sample of real photovoltaic farms located in the Czech Republic.
文摘In this paper, a nonlinear hemivariational inequality of second order with a forcing term of subcritical growth is studied. Using techniques from multivalued analysis and the theory of nonlinear operators of monotone type, an existence theorem for the Dirichlet boundary value problem is proved.
文摘Recently, approaches utilizing spatial-temporal features to form Bag-of-Words (BoWs) models have achieved great success due to their simplicity and effectiveness. But they still have difficulties when distinguishing between actions with high inter-ambiguity. The main reason is that they describe actions by orderless bag of features, and ignore the spatial and temporal structure information of visual words. In order to improve classification performance, we present a novel approach called sequential Bag-of-Words. It captures temporal sequential structure by segmenting the entire action into sub-actions. Meanwhile, we pay more attention to the distinguishing parts of an action by classifying sub- actions separately, which is then employed to vote for the final result. Extensive experiments are conducted on challenging datasets and real scenes to evaluate our method. Concretely, we compare our results to some state-of-the-art classification approaches and confirm the advantages of our approach to distinguish similar actions. Results show that our approach is robust and outperforms most existing BoWs based classification approaches, especially on complex datasets with interactive activities, cluttered backgrounds and inter-class action ambiguities.
基金Sponsored by the National Natural Science Foundation of China(Grant No.60496326 and No.10671045)
文摘Both a general domain-independent bottom-up multi-level model and an algorithm for establishing the taxonomic relation of Chinese ontology are proposed.The model consists of extracting domain vocabularies and establishing taxonomic relation,with the consideration of characteristics unique to Chinese natural language.By establishing the semantic forests of domain vocabularies and then using the existing semantic dictionary or machine-readable dictionary(MRD),the proposed algorithm can integrate these semantic forests together to establish the taxonomic relation.Experimental results show that the proposed algorithm is feasible and effective in establishing the integrated taxonomic relation among domain vocabularies and concepts.
基金Funded by Excellent youth Teacher Foundation of Chongqing Municipal Education Commission (D2005-37).
文摘A class of generalized implicit quasivariational inclusions with fuzzy mappings in Hilbert space is discussed in this paper which proves an existence theorem of the solutions and proposes a new iterative algorithm and the convergence of the iterative sequence generated by the new algorithm. These results extend and improve some recent corresponding achievements.
基金supported by the Science and Technology Innovation Program of Hunan Province,China(Grant No.2021RC5012).
文摘Self-starting Q-switching,Q-switched mode-locking and mode-locking operation modes are achieved sequentially in an all-fiber erbium-doped fiber laser with thulium-doped fiber saturable absorber for the first time.The central wavelengths of Q-switching,Q-switched mode-locking and mode-locking operation modes are 1569.7 nm,1570.9 nm,and 1572 nm,respectively.The mode-locking operation of the proposed fiber laser generates stable dark soliton with a repetition rate of 0.99 MHz and signal-to-noise ratio of 65 dB.The results validate the capability of generating soliton pulse by doped fiber saturable absorber.Furthermore,the proposed fiber laser is beneficial to the applications of optical communication and signal processing system.
文摘The state of the physics of convective clouds and cloud seeding is discussed briefly. It is noted that at the present time there is a transition from the stage of investigation of “elementary” processes in the clouds to the stage of studying the formation of macro- and microstructural characteristics of clouds as a whole, taking into account their system properties. The main directions of the development of cloud physics at the upcoming stage of its development are discussed. The paper points out that one of these areas is the determination of the structure-forming factors for the clouds and the study of their influence on their formation and evolution. It is noted that one of such factors is the interaction of clouds with their surrounding atmosphere, and the main method of studying its role in the processes of cloud formation is mathematical modeling. A three-dimensional nonstationary model of convective clouds is presented with a detailed account of the processes of thermohydrodynamics and microphysics, which is used for research. The results of modeling the influence of the wind field structure in the atmosphere on the formation and evolution of clouds are presented. It is shown that the dynamic characteristics of the atmosphere have a significant effect on the formation of macro- and microstructural characteristics of convective clouds: the more complex the structure of the wind field in the atmosphere (i.e., the more intense the interaction of the atmosphere and the cloud), the less powerful the clouds are formed.