Designing and optimizing complex scientific code for new computing architectures is a challenging task. To address this issue in the E3SM land model (ELM) development, we developed a software tool called SPEL, which f...Designing and optimizing complex scientific code for new computing architectures is a challenging task. To address this issue in the E3SM land model (ELM) development, we developed a software tool called SPEL, which facilitates code generation, verification, and performance tuning using compiler directives within a Function Unit Test framework. In this paper, we present a SPEL extension that leverages the version control system (e.g., Git) to autonomous code generation and demonstrate its application to continuous code integration and development of the ELM software system. The study can benefit the scientific software development community.展开更多
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ...Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.展开更多
With the development of computer technology, embedded control system plays an important role in modern industry. For the embedded system, traditional development methods are time-consuming and system is not easy to ma...With the development of computer technology, embedded control system plays an important role in modern industry. For the embedded system, traditional development methods are time-consuming and system is not easy to maintain. Domain-specific modeling provides a solution for the problems. In this paper, we proposed development architecture for embedded control systems based on MIC. GME is used to construct meta-model and application model, model in-terpreter interprets model and stores model information in xml format document. The final cross-platform codes are automatically generated by different templates and xml format document. This development method can reduce time and cost in the lifecycle of system development.展开更多
We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in...We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in a power-law form, which is different from the well-known result in unweighted network case. Simulation results show that the nodes with larger strength are preferential to be infected, but the hierarchical dynamics are not clearly found. The simulation results also show that larger dispersion of weight of networks leads to slower propagating, which indicates that malicious code propagates more quickly in unweighted scale-free networks than in weighted scale-free networks under the same condition. These results show that not only the topology of networks but also the link weights affect the malicious propagating process.展开更多
Our previous work has introduced the newly generated program using the code transformation model GPT-2,verifying the generated programming codes through simhash(SH)and longest common subsequence(LCS)algo-rithms.Howeve...Our previous work has introduced the newly generated program using the code transformation model GPT-2,verifying the generated programming codes through simhash(SH)and longest common subsequence(LCS)algo-rithms.However,the entire code transformation process has encountered a time-consuming problem.Therefore,the objective of this study is to speed up the code transformation process signicantly.This paper has proposed deep learning approaches for modifying SH using a variational simhash(VSH)algorithm and replacing LCS with a piecewise longest common subsequence(PLCS)algorithm to faster the verication process in the test phase.Besides the code transformation model GPT-2,this study has also introduced MicrosoMASS and Facebook BART for a comparative analysis of their performance.Meanwhile,the explainable AI technique using local interpretable model-agnostic explanations(LIME)can also interpret the decision-making ofAImodels.The experimental results show that VSH can reduce the number of qualied programs by 22.11%,and PLCS can reduce the execution time of selected pocket programs by 32.39%.As a result,the proposed approaches can signicantly speed up the entire code transformation process by 1.38 times on average compared with our previous work.展开更多
脉冲噪声是影响电力线通信性能的最主要因素。为了提升极化码在电力线信道的性能,文章提出了分段循环冗余校验码辅助串行抵消列表比特翻转(segmented CRC aid SCL-bit flip,SCA-SCL-BF)译码算法,并在加性高斯白噪声(additive white gaus...脉冲噪声是影响电力线通信性能的最主要因素。为了提升极化码在电力线信道的性能,文章提出了分段循环冗余校验码辅助串行抵消列表比特翻转(segmented CRC aid SCL-bit flip,SCA-SCL-BF)译码算法,并在加性高斯白噪声(additive white gaussian noise,AWGN)信道和电力线信道下进行了仿真。在构造关键集合时引入Rate1子块,避免了全集搜索的复杂度;根据关键集合中比特的位置进行分段,每段翻转一比特,可以实现多比特翻转。仿真结果表明,SCA-SCL-BF算法的性能相较于公开文献中性能在信噪比(signal-to-noiseratios,SNR)大于0dB时有显著提升。该算法对于提升电力线传输性能有重要意义。展开更多
目的分析某专科医院在疾病诊断相关组(diagnosis related groups,DRGs)结算模式下存在的未入组病例问题,并提出相应的改进措施。方法通过回顾性分析和专家讨论,选取并总结某专科医院2021年1月—2022年6月上传至市医保平台病例信息管理...目的分析某专科医院在疾病诊断相关组(diagnosis related groups,DRGs)结算模式下存在的未入组病例问题,并提出相应的改进措施。方法通过回顾性分析和专家讨论,选取并总结某专科医院2021年1月—2022年6月上传至市医保平台病例信息管理系统中病例33935例中未入组病例300例,并对所有的未入组病例进行深入分析。结果未入组病例原因主要为主要诊断编码或者手术编码为灰码、医保版本切换导致原本入组的有效主诊断变成无效主诊断、主要诊断编码国家临床版医保版没有做好对照和临床医师主要诊断选择错误等方面。结论通过对医院DRGs结算模式下未入组病例的全面分析,找到改进措施,不断加强对临床医师和编码员的培训、加强病案首页质控、加强信息系统建设,从而提高DRGs入组率。展开更多
文摘Designing and optimizing complex scientific code for new computing architectures is a challenging task. To address this issue in the E3SM land model (ELM) development, we developed a software tool called SPEL, which facilitates code generation, verification, and performance tuning using compiler directives within a Function Unit Test framework. In this paper, we present a SPEL extension that leverages the version control system (e.g., Git) to autonomous code generation and demonstrate its application to continuous code integration and development of the ELM software system. The study can benefit the scientific software development community.
文摘Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.
文摘With the development of computer technology, embedded control system plays an important role in modern industry. For the embedded system, traditional development methods are time-consuming and system is not easy to maintain. Domain-specific modeling provides a solution for the problems. In this paper, we proposed development architecture for embedded control systems based on MIC. GME is used to construct meta-model and application model, model in-terpreter interprets model and stores model information in xml format document. The final cross-platform codes are automatically generated by different templates and xml format document. This development method can reduce time and cost in the lifecycle of system development.
基金Supported by the National Natural Science Foundation of China (90204012, 60573036) and the Natural Science Foundation of Hebei Province (F2006000177)
文摘We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in a power-law form, which is different from the well-known result in unweighted network case. Simulation results show that the nodes with larger strength are preferential to be infected, but the hierarchical dynamics are not clearly found. The simulation results also show that larger dispersion of weight of networks leads to slower propagating, which indicates that malicious code propagates more quickly in unweighted scale-free networks than in weighted scale-free networks under the same condition. These results show that not only the topology of networks but also the link weights affect the malicious propagating process.
基金supported by the Ministry of Science and Technology,Taiwan,under Grant Nos.MOST 111-2221-E-390-012 and MOST 111-2622-E-390-001.
文摘Our previous work has introduced the newly generated program using the code transformation model GPT-2,verifying the generated programming codes through simhash(SH)and longest common subsequence(LCS)algo-rithms.However,the entire code transformation process has encountered a time-consuming problem.Therefore,the objective of this study is to speed up the code transformation process signicantly.This paper has proposed deep learning approaches for modifying SH using a variational simhash(VSH)algorithm and replacing LCS with a piecewise longest common subsequence(PLCS)algorithm to faster the verication process in the test phase.Besides the code transformation model GPT-2,this study has also introduced MicrosoMASS and Facebook BART for a comparative analysis of their performance.Meanwhile,the explainable AI technique using local interpretable model-agnostic explanations(LIME)can also interpret the decision-making ofAImodels.The experimental results show that VSH can reduce the number of qualied programs by 22.11%,and PLCS can reduce the execution time of selected pocket programs by 32.39%.As a result,the proposed approaches can signicantly speed up the entire code transformation process by 1.38 times on average compared with our previous work.
文摘脉冲噪声是影响电力线通信性能的最主要因素。为了提升极化码在电力线信道的性能,文章提出了分段循环冗余校验码辅助串行抵消列表比特翻转(segmented CRC aid SCL-bit flip,SCA-SCL-BF)译码算法,并在加性高斯白噪声(additive white gaussian noise,AWGN)信道和电力线信道下进行了仿真。在构造关键集合时引入Rate1子块,避免了全集搜索的复杂度;根据关键集合中比特的位置进行分段,每段翻转一比特,可以实现多比特翻转。仿真结果表明,SCA-SCL-BF算法的性能相较于公开文献中性能在信噪比(signal-to-noiseratios,SNR)大于0dB时有显著提升。该算法对于提升电力线传输性能有重要意义。
文摘目的分析某专科医院在疾病诊断相关组(diagnosis related groups,DRGs)结算模式下存在的未入组病例问题,并提出相应的改进措施。方法通过回顾性分析和专家讨论,选取并总结某专科医院2021年1月—2022年6月上传至市医保平台病例信息管理系统中病例33935例中未入组病例300例,并对所有的未入组病例进行深入分析。结果未入组病例原因主要为主要诊断编码或者手术编码为灰码、医保版本切换导致原本入组的有效主诊断变成无效主诊断、主要诊断编码国家临床版医保版没有做好对照和临床医师主要诊断选择错误等方面。结论通过对医院DRGs结算模式下未入组病例的全面分析,找到改进措施,不断加强对临床医师和编码员的培训、加强病案首页质控、加强信息系统建设,从而提高DRGs入组率。