World-known computer manufacturers are making efforts to develop high-grade typesetting systems. In 1993, the Zhuhai Stone Computer Typesetting System Development Company and Beijing Stone Modem Typesetting and Printi...World-known computer manufacturers are making efforts to develop high-grade typesetting systems. In 1993, the Zhuhai Stone Computer Typesetting System Development Company and Beijing Stone Modem Typesetting and Printing Equipment Company, both subsidiaries of the Beijing Stone Group, marketed the Stone Quick and Easy Tvpesetting Module and展开更多
One of the most extensively used technologies for improving the security of IoT devices is blockchain technology.It is a new technology that can be utilized to boost the security.It is a decentralized peer-to-peer net...One of the most extensively used technologies for improving the security of IoT devices is blockchain technology.It is a new technology that can be utilized to boost the security.It is a decentralized peer-to-peer network with no central authority.Multiple nodes on the network mine or verify the data recorded on the Blockchain.It is a distributed ledger that may be used to keep track of transactions between several parties.No one can tamper with the data on the blockchain since it is unchangeable.Because the blocks are connected by hashes,the transaction data is safe.It is managed by a system that is based on the consensus of network users rather than a central authority.The immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and hashing.Furthermore,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s laws.There is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain transactions.This paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing parties.It builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack chain.Smart contracts are also used to send automatic early warning replies to possible attack targets.Simulation tests are used to verify the feasibility and efficacy of the suggested model.展开更多
该文以Web of Science数据库1999-2018年449条国外数字故事研究论文题录数据为研究对象,利用CiteSpace对其进行可视化分析。通过共引分析和共现分析,揭示了国外数字故事研究领域的发文量、发文期刊、关键词、关键文献、代表性学者等,并...该文以Web of Science数据库1999-2018年449条国外数字故事研究论文题录数据为研究对象,利用CiteSpace对其进行可视化分析。通过共引分析和共现分析,揭示了国外数字故事研究领域的发文量、发文期刊、关键词、关键文献、代表性学者等,并在此基础上揭示了数字故事研究前沿主题,揭示了近二十年国外数字故事研究的知识基础:数字故事的定义及内涵、数字故事以及教育数字故事制作的基本要素、数字故事对学生21世纪技能的影响等;揭示了多模态教学模式、线上学习空间、学科应用深度整合、表现形式多样化、交互式数字故事特征与创作、21世纪技能提升等研究热点;揭示了数字故事的研究范围在专业教育领域的拓展。展开更多
In this paper,a modified form of the traditional inverse Lomax distribution is proposed and its characteristics are studied.The new distribution which called modified logarithmic transformed inverse Lomax distribution...In this paper,a modified form of the traditional inverse Lomax distribution is proposed and its characteristics are studied.The new distribution which called modified logarithmic transformed inverse Lomax distribution is generated by adding a new shape parameter based on logarithmic transformed method.It contains two shape and one scale parameters and has different shapes of probability density and hazard rate functions.The new shape parameter increases the flexibility of the statistical properties of the traditional inverse Lomax distribution including mean,variance,skewness and kurtosis.The moments,entropies,order statistics and other properties are discussed.Six methods of estimation are considered to estimate the distribution parameters.To compare the performance of the different estimators,a simulation study is performed.To show the flexibility and applicability of the proposed distribution two real data sets to engineering and medical fields are analyzed.The simulation results and real data analysis showed that the Anderson-Darling estimates have the smallest mean square errors among all other estimates.Also,the analysis of the real data sets showed that the traditional inverse Lomax distribution and some of its generalizations have shortcomings in modeling engineering and medical data.Our proposed distribution overcomes this shortage and provides a good fit which makes it a suitable choice to model such data sets.展开更多
Urban rail transit can solve the current inconvenient transportation problem for China’s large urban population.A compound onboard energy storage system can meet vehicles’traction requirements and recover energy in ...Urban rail transit can solve the current inconvenient transportation problem for China’s large urban population.A compound onboard energy storage system can meet vehicles’traction requirements and recover energy in vehicles’braking stage to improve energy utilisation.However,the composite onboard energy storage system has several concerns,such as its power and energy demand,battery aging,and maintenance costs.Therefore,the NSGA-II algorithm is proposed to optimise matching the composite energy storage system parameters for urban rail trains.The NSGA-II algorithm was used with an improved elite retention strategy to optimise the parameters matching of the composite power supply.The optimisation’s objective concerns the replacement costs and economy of the composite power supply.The method increases the vertical diversity of searching and avoids genetic precocity.The NSGA-II algorithm calls the simulation model of composite power supply in real-time and simultaneously optimises the composite power supply and control parameters.The Pareto set of optimisation objectives and corresponding parameters and control strategies of composite power supply are obtained.The NSGA-II algorithm can optimise the composite energy storage system’s parameters and improve the train and the composite power supply’s performance indexes.The algorithm greatly reduces the composite power supply’s capacitance and reduces the system’s total energy consumption.Then,the multi-component energy loss caused by the multi-power source system can be effectively controlled.The total capacitance is reduced by 12.1%,the battery life is prolonged by 18.86%,and the optimised composite power supply’s energy storage is increased by 17.6%.展开更多
The design of universal segments and deviation control of segment assembly are essential for robust and low-risk tunnel construction.A building information modeling(BIM)-based framework was proposed for parametric mod...The design of universal segments and deviation control of segment assembly are essential for robust and low-risk tunnel construction.A building information modeling(BIM)-based framework was proposed for parametric modeling,automatic assembly,and deviation control of universal segments.First,segment models of different levels of detail(LoDs)were built based on BIM visual programming language(VPL)for different project life cycles.Then,the geometric constraints,requirements,and procedures for parametric segment assembly were distilled to develop a program that combines a novel typesetting algorithm with a 3D path replanning algorithm.Typesetting is implemented by introducing a point indication matrix,characterizing segments by sides,and manipulating geometries in a VPL.Simultaneously,3D path replanning,with non-uniform rational B-splines(NURBS)and arcs as basic shapes,was used to resolve unacceptable deviation situations after typesetting.Finally,the proposed framework was validated on a water diversion line and was found to be more effective and accurate than the previous method.展开更多
文摘World-known computer manufacturers are making efforts to develop high-grade typesetting systems. In 1993, the Zhuhai Stone Computer Typesetting System Development Company and Beijing Stone Modem Typesetting and Printing Equipment Company, both subsidiaries of the Beijing Stone Group, marketed the Stone Quick and Easy Tvpesetting Module and
文摘One of the most extensively used technologies for improving the security of IoT devices is blockchain technology.It is a new technology that can be utilized to boost the security.It is a decentralized peer-to-peer network with no central authority.Multiple nodes on the network mine or verify the data recorded on the Blockchain.It is a distributed ledger that may be used to keep track of transactions between several parties.No one can tamper with the data on the blockchain since it is unchangeable.Because the blocks are connected by hashes,the transaction data is safe.It is managed by a system that is based on the consensus of network users rather than a central authority.The immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and hashing.Furthermore,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s laws.There is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain transactions.This paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing parties.It builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack chain.Smart contracts are also used to send automatic early warning replies to possible attack targets.Simulation tests are used to verify the feasibility and efficacy of the suggested model.
文摘该文以Web of Science数据库1999-2018年449条国外数字故事研究论文题录数据为研究对象,利用CiteSpace对其进行可视化分析。通过共引分析和共现分析,揭示了国外数字故事研究领域的发文量、发文期刊、关键词、关键文献、代表性学者等,并在此基础上揭示了数字故事研究前沿主题,揭示了近二十年国外数字故事研究的知识基础:数字故事的定义及内涵、数字故事以及教育数字故事制作的基本要素、数字故事对学生21世纪技能的影响等;揭示了多模态教学模式、线上学习空间、学科应用深度整合、表现形式多样化、交互式数字故事特征与创作、21世纪技能提升等研究热点;揭示了数字故事的研究范围在专业教育领域的拓展。
基金This project was funded by the Deanship Scientific Research(DSR),King Abdulaziz University,Jeddah under Grant No.(RG-14-130-41)The author,therefore,acknowledge with thanks DSR for technical and financial support.
文摘In this paper,a modified form of the traditional inverse Lomax distribution is proposed and its characteristics are studied.The new distribution which called modified logarithmic transformed inverse Lomax distribution is generated by adding a new shape parameter based on logarithmic transformed method.It contains two shape and one scale parameters and has different shapes of probability density and hazard rate functions.The new shape parameter increases the flexibility of the statistical properties of the traditional inverse Lomax distribution including mean,variance,skewness and kurtosis.The moments,entropies,order statistics and other properties are discussed.Six methods of estimation are considered to estimate the distribution parameters.To compare the performance of the different estimators,a simulation study is performed.To show the flexibility and applicability of the proposed distribution two real data sets to engineering and medical fields are analyzed.The simulation results and real data analysis showed that the Anderson-Darling estimates have the smallest mean square errors among all other estimates.Also,the analysis of the real data sets showed that the traditional inverse Lomax distribution and some of its generalizations have shortcomings in modeling engineering and medical data.Our proposed distribution overcomes this shortage and provides a good fit which makes it a suitable choice to model such data sets.
基金Henan province’s project of science and technology under Grant No.202102210134.
文摘Urban rail transit can solve the current inconvenient transportation problem for China’s large urban population.A compound onboard energy storage system can meet vehicles’traction requirements and recover energy in vehicles’braking stage to improve energy utilisation.However,the composite onboard energy storage system has several concerns,such as its power and energy demand,battery aging,and maintenance costs.Therefore,the NSGA-II algorithm is proposed to optimise matching the composite energy storage system parameters for urban rail trains.The NSGA-II algorithm was used with an improved elite retention strategy to optimise the parameters matching of the composite power supply.The optimisation’s objective concerns the replacement costs and economy of the composite power supply.The method increases the vertical diversity of searching and avoids genetic precocity.The NSGA-II algorithm calls the simulation model of composite power supply in real-time and simultaneously optimises the composite power supply and control parameters.The Pareto set of optimisation objectives and corresponding parameters and control strategies of composite power supply are obtained.The NSGA-II algorithm can optimise the composite energy storage system’s parameters and improve the train and the composite power supply’s performance indexes.The algorithm greatly reduces the composite power supply’s capacitance and reduces the system’s total energy consumption.Then,the multi-component energy loss caused by the multi-power source system can be effectively controlled.The total capacitance is reduced by 12.1%,the battery life is prolonged by 18.86%,and the optimised composite power supply’s energy storage is increased by 17.6%.
文摘The design of universal segments and deviation control of segment assembly are essential for robust and low-risk tunnel construction.A building information modeling(BIM)-based framework was proposed for parametric modeling,automatic assembly,and deviation control of universal segments.First,segment models of different levels of detail(LoDs)were built based on BIM visual programming language(VPL)for different project life cycles.Then,the geometric constraints,requirements,and procedures for parametric segment assembly were distilled to develop a program that combines a novel typesetting algorithm with a 3D path replanning algorithm.Typesetting is implemented by introducing a point indication matrix,characterizing segments by sides,and manipulating geometries in a VPL.Simultaneously,3D path replanning,with non-uniform rational B-splines(NURBS)and arcs as basic shapes,was used to resolve unacceptable deviation situations after typesetting.Finally,the proposed framework was validated on a water diversion line and was found to be more effective and accurate than the previous method.