As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this...As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this paper,a cooperative security monitoring mechanism aided by multiple slave cluster heads(SCHs)is proposed to keep track of the data security of a CH.By designing a low complexity“equilateral triangle algorithm(ETA)”,the optimal SCHs(named as ETA-based multiple SCHs)are selected from the candidate SCHs so as to improve the dispersion and coverage of SCHs and achieve largescale data security monitoring.In addition,by analyzing the entire monitoring process,the close form expression of the probability of the failure attack identification for the SCHs with respect to the probability of attack launched by ordinary nodes is deduced.The simulation results show that the proposed optimal ETA-based multiple SCH cooperation scheme has lower probability of the failure attack identification than that of the existing schemes.In addition,the numerical simulation results are consistent with the theoretical analysis results,thus verifying the effectiveness of the proposed scheme.展开更多
We study the problem of multiple node upset (MNU) using three-dimensional device simulation. The results show the transient floating node and charge lateral diffusion are the key reasons for MNU. We compare the MNU ...We study the problem of multiple node upset (MNU) using three-dimensional device simulation. The results show the transient floating node and charge lateral diffusion are the key reasons for MNU. We compare the MNU with multiple bit upset (MBU),and find that their characteristics are different. Methods to avoid MNU are also discussed.展开更多
Because of explosive growth in Internet traffic and high complexity of heterogeneous networks, improving the routing and wavelength assignment (RWA) algorithm in underlying optical networks has become very important...Because of explosive growth in Internet traffic and high complexity of heterogeneous networks, improving the routing and wavelength assignment (RWA) algorithm in underlying optical networks has become very important. Where there are multiple links between different the node pairs, a traditional wavelength-assignment algorithm may be invalid for a wavelength-switched optical networks (WSON) that has directional blocking constraints. Also, impairments in network nodes and subsequent degradation of optical signals may cause modulation failure in the optical network. In this paper, we propose an RWA algorithm based on a novel evaluation model for a WSQN that has multiple constraints. The algorithm includes comprehensive evaluation model (CEM) and directional blocking constraint RWA based on CEM (DB-RWA). Diverse constraints are abstracted into various constraint conditions in order to better assign routing and wavelength. We propose using the novel CEM to optimize routing according to an assessed value of constraints on transmission performance. This eliminates the effects of physical transmission impairments in a WSON. DB-RWA based on CEM abstracts directional blocking conditions in multiple links between network nodes into directional blocking constraints. It also satisfies rigorous network specifications and provides flexibility, scalability, and first-fit rate for the backbone, especially in multiple links between WSON nodes.展开更多
Three kinds of effective error bounds of the quadrature formulas with multiple nodes that are generalizations of the well-known Micchelli-Rivlin quadrature formula, when the integrand is a function analytic in the reg...Three kinds of effective error bounds of the quadrature formulas with multiple nodes that are generalizations of the well-known Micchelli-Rivlin quadrature formula, when the integrand is a function analytic in the regions bounded by confocal ellipses, are given. A numerical example which illustrates the calculation of these error bounds is included.展开更多
Our aim is to evaluate the association between body mass index(BMI)and preoperative total testosterone(TT)levels with the risk of single and multiple metastatic lymph node invasion(LNI)in prostate cancer patients unde...Our aim is to evaluate the association between body mass index(BMI)and preoperative total testosterone(TT)levels with the risk of single and multiple metastatic lymph node invasion(LNI)in prostate cancer patients undergoing radical prostatectomy and extended pelvic lymph node dissection.Preoperative BMI,basal levels of TT,and prostate-specific antigen(PSA)were evaluated in 361 consecutive patients undergoing radical prostatectomy with extended pelvic lymph node dissection between 2014 and 2017・Patients were grouped into either nonmetastatic,one,or more than one metastatic lymph node invasion groups.The association among clinical factors and LNI was evaluated.LNI was detected in 52(14.4%)patients:28(7.8%)cases had one metastatic node and 24(6.6%)had more than one metastatic node.In the overall study population,BMI correlated inversely with TT(r=-0.256;P<0.0001).In patients without metastases,BMI inversely correlated with TT(r=-0.282;P<0.0001).In patients with metastasis,this correlation was lost.In the overall study population,BMI(odds ratio[OR]=1.268;P=0.005)was the only in dependent clinical factor associated with the risk of multiple metastatic LNI compared to cases with one metastatic node.In the nonmetastatic group,TT was lower in patients with BMI>28 kg m^2(P<0.0001).In patients with any LNI,this association was lost(P=0.232).The median number of positive nodes was higher in patients with BMI>28 kg m^2(P-0.048).In our study,overweight and obese patients had a higher risk of harboring multiple prostate cancer lymph node metastases and lower TT levels when compared to patients with normal BMI.展开更多
The nervous system orchestrates diverse behaviors such as reproduction, sleep, feeding, and aggression, and selects a single behavior for execution at any given time. This requires neural mechanisms for behavioral sel...The nervous system orchestrates diverse behaviors such as reproduction, sleep, feeding, and aggression, and selects a single behavior for execution at any given time. This requires neural mechanisms for behavioral selection sensitive to both internal physiological states and external environmental conditions. For example, hungry animals展开更多
Ⅰ. ISSUES PUT FORWARDWe have published some reports on a star type LAN which has multiple access capability (LAN<sub>1</sub> for short ). It has the superiority as follows: (ⅰ)The characteristics of ...Ⅰ. ISSUES PUT FORWARDWe have published some reports on a star type LAN which has multiple access capability (LAN<sub>1</sub> for short ). It has the superiority as follows: (ⅰ)The characteristics of topology structure can be fully shown, i.e. it is quite simple to control the展开更多
This paper presents a novel trust model based on multiple decision factor theory (MDFT) and a trust routing algorithm based on MDFT to exactly evaluate routing node trust and establish a trustworthy routing path. MD...This paper presents a novel trust model based on multiple decision factor theory (MDFT) and a trust routing algorithm based on MDFT to exactly evaluate routing node trust and establish a trustworthy routing path. MDFT integrates four dimensional trust decision factors including behavior, state, recommend and node liveness to realize an exactly finer-grained trust evaluation. On the basis of MDFT, a trust routing algorithm is presented and validated in open shortest path first (OSPF) protocol. Simulation resuRs show that the algorithm can reflect the routing node trust accurately and has better dynamic response ability. Under the circumstance of existing deceptive nodes, the algorithm has better anti-deception performance and higher attack node detection rate than conventional algorithm.展开更多
The dynamics of a single strain HIV model is studied. The basic reproduction number R0 used as a bifurcation parameter shows that the system undergoes transcritical and saddle-node bifurcations. The usual threshold un...The dynamics of a single strain HIV model is studied. The basic reproduction number R0 used as a bifurcation parameter shows that the system undergoes transcritical and saddle-node bifurcations. The usual threshold unit value of R0 does not completely determine the eradication of the disease in an HIV infected person. In particular, a sub-threshold value Rc is established which determines the system's number of endemic states: multiple if Rc 〈 Ro 〈 1, only one if Rc=Ro = 1, and none if R0 〈 Rc 〈 1.展开更多
基金supported in part by the Joint Fund of Science and Technology Department of Liaoning Province and State Key Laboratory of Robotics,China under Grant 2021-KF-22-08in part by the Basic Research Program of Science and Technology of Shenzhen,China under Grant JCYJ20190809161805508in part by the National Natural Science Foundation of China under Grant 62271423 and Grant 41976178.
文摘As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this paper,a cooperative security monitoring mechanism aided by multiple slave cluster heads(SCHs)is proposed to keep track of the data security of a CH.By designing a low complexity“equilateral triangle algorithm(ETA)”,the optimal SCHs(named as ETA-based multiple SCHs)are selected from the candidate SCHs so as to improve the dispersion and coverage of SCHs and achieve largescale data security monitoring.In addition,by analyzing the entire monitoring process,the close form expression of the probability of the failure attack identification for the SCHs with respect to the probability of attack launched by ordinary nodes is deduced.The simulation results show that the proposed optimal ETA-based multiple SCH cooperation scheme has lower probability of the failure attack identification than that of the existing schemes.In addition,the numerical simulation results are consistent with the theoretical analysis results,thus verifying the effectiveness of the proposed scheme.
文摘We study the problem of multiple node upset (MNU) using three-dimensional device simulation. The results show the transient floating node and charge lateral diffusion are the key reasons for MNU. We compare the MNU with multiple bit upset (MBU),and find that their characteristics are different. Methods to avoid MNU are also discussed.
基金supported in part by 973 Program(2010CB328204)NSFC project(60932004)RFDP Project(20090005110013)
文摘Because of explosive growth in Internet traffic and high complexity of heterogeneous networks, improving the routing and wavelength assignment (RWA) algorithm in underlying optical networks has become very important. Where there are multiple links between different the node pairs, a traditional wavelength-assignment algorithm may be invalid for a wavelength-switched optical networks (WSON) that has directional blocking constraints. Also, impairments in network nodes and subsequent degradation of optical signals may cause modulation failure in the optical network. In this paper, we propose an RWA algorithm based on a novel evaluation model for a WSQN that has multiple constraints. The algorithm includes comprehensive evaluation model (CEM) and directional blocking constraint RWA based on CEM (DB-RWA). Diverse constraints are abstracted into various constraint conditions in order to better assign routing and wavelength. We propose using the novel CEM to optimize routing according to an assessed value of constraints on transmission performance. This eliminates the effects of physical transmission impairments in a WSON. DB-RWA based on CEM abstracts directional blocking conditions in multiple links between network nodes into directional blocking constraints. It also satisfies rigorous network specifications and provides flexibility, scalability, and first-fit rate for the backbone, especially in multiple links between WSON nodes.
基金supported by the Serbian Ministry of Education,Science and Technological Development(Research Project:Methods of Numerical and Nonlinear Analysis with Applications)(Grant No.174002)
文摘Three kinds of effective error bounds of the quadrature formulas with multiple nodes that are generalizations of the well-known Micchelli-Rivlin quadrature formula, when the integrand is a function analytic in the regions bounded by confocal ellipses, are given. A numerical example which illustrates the calculation of these error bounds is included.
文摘Our aim is to evaluate the association between body mass index(BMI)and preoperative total testosterone(TT)levels with the risk of single and multiple metastatic lymph node invasion(LNI)in prostate cancer patients undergoing radical prostatectomy and extended pelvic lymph node dissection.Preoperative BMI,basal levels of TT,and prostate-specific antigen(PSA)were evaluated in 361 consecutive patients undergoing radical prostatectomy with extended pelvic lymph node dissection between 2014 and 2017・Patients were grouped into either nonmetastatic,one,or more than one metastatic lymph node invasion groups.The association among clinical factors and LNI was evaluated.LNI was detected in 52(14.4%)patients:28(7.8%)cases had one metastatic node and 24(6.6%)had more than one metastatic node.In the overall study population,BMI correlated inversely with TT(r=-0.256;P<0.0001).In patients without metastases,BMI inversely correlated with TT(r=-0.282;P<0.0001).In patients with metastasis,this correlation was lost.In the overall study population,BMI(odds ratio[OR]=1.268;P=0.005)was the only in dependent clinical factor associated with the risk of multiple metastatic LNI compared to cases with one metastatic node.In the nonmetastatic group,TT was lower in patients with BMI>28 kg m^2(P<0.0001).In patients with any LNI,this association was lost(P=0.232).The median number of positive nodes was higher in patients with BMI>28 kg m^2(P-0.048).In our study,overweight and obese patients had a higher risk of harboring multiple prostate cancer lymph node metastases and lower TT levels when compared to patients with normal BMI.
文摘The nervous system orchestrates diverse behaviors such as reproduction, sleep, feeding, and aggression, and selects a single behavior for execution at any given time. This requires neural mechanisms for behavioral selection sensitive to both internal physiological states and external environmental conditions. For example, hungry animals
基金Part of this research is supported by the National Science Foundation of Gangsu Province.
文摘Ⅰ. ISSUES PUT FORWARDWe have published some reports on a star type LAN which has multiple access capability (LAN<sub>1</sub> for short ). It has the superiority as follows: (ⅰ)The characteristics of topology structure can be fully shown, i.e. it is quite simple to control the
基金supported by the National Natural Science Foundation of China (61121061, 61161140320)The National Key Technology R&D Program (2012BAH38B02)
文摘This paper presents a novel trust model based on multiple decision factor theory (MDFT) and a trust routing algorithm based on MDFT to exactly evaluate routing node trust and establish a trustworthy routing path. MDFT integrates four dimensional trust decision factors including behavior, state, recommend and node liveness to realize an exactly finer-grained trust evaluation. On the basis of MDFT, a trust routing algorithm is presented and validated in open shortest path first (OSPF) protocol. Simulation resuRs show that the algorithm can reflect the routing node trust accurately and has better dynamic response ability. Under the circumstance of existing deceptive nodes, the algorithm has better anti-deception performance and higher attack node detection rate than conventional algorithm.
文摘The dynamics of a single strain HIV model is studied. The basic reproduction number R0 used as a bifurcation parameter shows that the system undergoes transcritical and saddle-node bifurcations. The usual threshold unit value of R0 does not completely determine the eradication of the disease in an HIV infected person. In particular, a sub-threshold value Rc is established which determines the system's number of endemic states: multiple if Rc 〈 Ro 〈 1, only one if Rc=Ro = 1, and none if R0 〈 Rc 〈 1.