Objective:The purpose of this study was to determine the effectiveness of brisk walking as an intervention for self-care agency and care dependency in patients with permanent colorectal cancer stoma.Method:This study ...Objective:The purpose of this study was to determine the effectiveness of brisk walking as an intervention for self-care agency and care dependency in patients with permanent colorectal cancer stoma.Method:This study adopted a quasi-experimental research design,specifically a non-equivalent control group pre-test and post-test design.Utilizing the Exercise of Self-Care Agency Scale(ESCA)and Care Dependency Scale(CDS),a survey was administered to 64 patients from a hospital in Shandong Province.The statistical methods used for analyzing data included frequency,mean,standard deviation(SD),independent t-test,P-value calculation,and dependent t-test.Result:After two months of a brisk walking exercise program,participants in the experimental group had a higher level of self-care agency than before the experiment(P<0.05),and their level of care dependency was significantly reduced(P<0.05).Participants in the control group also showed higher levels of self-care agency(P<0.05)and lower levels of care dependency(P<0.05)after two months compared to their levels before the two months.Conclusion:The brisk walking program had a positive impact on patients’self-care agency and reduced their care dependency.展开更多
Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more t...Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more than 40 million smart contracts are running,is frequently challenged by smart contract vulnerabilities.What’s worse,since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies,a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum.However,little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected.Thus,we first present the contract dependency graph(CDG)to perform a vulnerability analysis for Ethereum smart contracts,where CDG characterizes inter-contract dependencies formed by DELEGATECALL-type internal transaction in Ethereum.Then,three generic definitions of security violations against CDG are given for finding respective potential victim contracts affected by different types of vulnerable contracts.Further,we construct the CDG with 195,247 smart contracts active in the latest blocks of the Ethereum and verify the above security violations against CDG by detecting three representative known vulnerabilities.Compared to previous large-scale vulnerability analysis,our analysis scheme marks potential victim contracts that can be affected by different types of vulnerable contracts,and identify their possible risks based on the type of security violation actually occurring.The analysis results show that the proportion of potential victim contracts reaches 14.7%,far more than that of corresponding vulnerable contracts(less than 0.02%)in CDG.展开更多
Degradation and overstress failures occur in many electronic systems in which the operation load and environmental conditions are complex.The dependency of them called dependent competing failure process(DCFP),has bee...Degradation and overstress failures occur in many electronic systems in which the operation load and environmental conditions are complex.The dependency of them called dependent competing failure process(DCFP),has been widely studied.Electronic system may experience mutual effects of degradation and shocks,they are considered to be interdependent.Both the degradation and the shock processes will decrease the limit of system and cause cumulative effect.Finally,the competition of hard and soft failure will cause the system failure.Based on the failure mechanism accumulation theory,this paper constructs the shock-degradation acceleration and the threshold descent model,and a system reliability model established by using these two models.The mutually DCFP effect of electronic system interaction has been decomposed into physical correlation of failure,including acceleration,accumulation and competition.As a case,a reliability of electronic system in aeronautical system has been analyzed with the proposed method.The method proposed is based on failure physical evaluation,and could provide important reference for quantitative evaluation and design improvement of the newly designed system in case of data deficiency.展开更多
We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phas...We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phase transition behaviors and parameter thresholds of this model under random attacks are analyzed theoretically on both random regular(RR)networks and Erd¨os-Renyi(ER)networks,and computer simulations are performed to verify the results.In this EINDDL model,a fractionβof connectivity links within network B depends on network A and a fraction(1-β)of connectivity links within network A depends on network B.It is found that randomly removing a fraction(1-p)of connectivity links in network A at the initial state,network A exhibits different types of phase transitions(first order,second order and hybrid).Network B is rarely affected by cascading failure whenβis small,and network B will gradually converge from the first-order to the second-order phase transition asβincreases.We present the critical values ofβfor the phase change process of networks A and B,and give the critical values of p andβfor network B at the critical point of collapse.Furthermore,a cascading prevention strategy is proposed.The findings are of great significance for understanding the robustness of EINDDLs.展开更多
Marxist political economy provides a perspective for grasping the root cause of the China-US trade war.The international relations of production,which stem from the international division of labor,shape the distributi...Marxist political economy provides a perspective for grasping the root cause of the China-US trade war.The international relations of production,which stem from the international division of labor,shape the distribution of international economic interests and the political status of countries.Traditionally,developing countries have been subjected to the“periphery”in the international division of labor.In the new global value chain,developing countries have remained in a subordinate position characterized by“technological-market”dependence.To achieve the goal of building a strong modern nation,China must escape the“technological-market”dependence.Yet China’s efforts and achievements in escaping dependent development are deemed as a threat to US vested interests in the international markets.To preserve the economic foundation of its hegemony,the US has resorted to a trade war to contain China’s development.展开更多
This study aims to investigate the phenomenon of technological gadget usage among pre-university students,which include the time spent using them,as well as their purpose and influence.A descriptive research design was...This study aims to investigate the phenomenon of technological gadget usage among pre-university students,which include the time spent using them,as well as their purpose and influence.A descriptive research design was adopted in this study.131 pre-university students were randomly selected to answer a structured questionnaire.They were informed two weeks earlier to keep track on their time spent on technological devices,before answering the questionnaire.Findings showed that 99.2%of the respondents owned at least two technological gadgets,and all respondents own a smartphone.The main two gadgets that respondents spend at least 4 h a day on are smartphones(65.6%)and computers/laptops(21.4%).This indicates that smartphones are commonly used and owned among the respondents.The majority of the respondents are moderately nomophobia and moderately dependent on smartphones(70.2%and 66.4%,respectively).Correlation analysis demonstrates that the total time spent on gadgets in a day has a significant positive correlation with gadget dependency and total number of gadgets owned.Meanwhile,logistic regression was conducted to estimate the probability of nomophobia and dependency using total time spent and total number of technological gadgets.From thefindings,it was demonstrated that when the total time spent on using technological gadgets increasing,there is greater probability that the respondents develop nomophobia and dependency.This indicates that nomophobia and dependency to technological gadgets can be used to predict lifestyle profiles.The use of technological gadgets can bring both benefit and harm to its user.In light of this,user has to remain rational in order to derive maximum benefit from it.展开更多
Read-write dependency is an important factor restricting software efficiency.Timing Speculative(TS)is a processing architecture aiming to improve energy efficiency of microprocessors.Timing error rate,influenced by th...Read-write dependency is an important factor restricting software efficiency.Timing Speculative(TS)is a processing architecture aiming to improve energy efficiency of microprocessors.Timing error rate,influenced by the read-write dependency,bottlenecks the voltage down-scaling and so the energy efficiency of TS processors.We proposed a method called Read-Write Dependency Aware Register Allocation.It is based on the Read-Write Dependency aware Interference Graph(RWDIG)conception.Registers are reallocated to loosen the read-write dependencies,so resulting in a reduction of timing errors.The traditional no operation(Nop)padding method is also redesigned to increase the distance value to above 2.We analyzed the dependencies of registers and maximized the average distance value of read and write dependencies.Experimental results showed that we can reduce all read-write dependency by Nop padding,as well as the overhead timing errors.An energy saving of approximately 7%was achieved.展开更多
Log-linear models and more recently neural network models used forsupervised relation extraction requires substantial amounts of training data andtime, limiting the portability to new relations and domains. To this en...Log-linear models and more recently neural network models used forsupervised relation extraction requires substantial amounts of training data andtime, limiting the portability to new relations and domains. To this end, we propose a training representation based on the dependency paths between entities in adependency tree which we call lexicalized dependency paths (LDPs). We showthat this representation is fast, efficient and transparent. We further propose representations utilizing entity types and its subtypes to refine our model and alleviatethe data sparsity problem. We apply lexicalized dependency paths to supervisedlearning using the ACE corpus and show that it can achieve similar performancelevel to other state-of-the-art methods and even surpass them on severalcategories.展开更多
Knowledge graph(KG)conflict resolution is to solve knowledge conflicts problem in the construction of KG.Aiming at the problem of KG conflict resolution,a KG conflict resolution algorithm NGDcrm is proposed,which is a...Knowledge graph(KG)conflict resolution is to solve knowledge conflicts problem in the construction of KG.Aiming at the problem of KG conflict resolution,a KG conflict resolution algorithm NGDcrm is proposed,which is a numeric graph dependency-based conflict resolution method.NGDcrm utilizes the dependency graph to perform arithmetic calculation and predicate comparison of numerical entity knowledge in the KG.NGDcrm first uses a parallel segmentation method to segment the KG;then,it extracts the features of the KG according to KG embedding;finally,it uses numerical graph dependencies to detect and correct the wrong facts in the KG based on the extracted features.The experimental results on real data show that NGDcrm is better than the state-of-the-art knowledge conflict resolution method.Among them,the AUC value of NGDcrm on the DBpedia dataset is 15.4%higher than the state-of-the-art method.展开更多
BACKGROUND The pathogenesis of gastroesophageal reflux disease(GERD)is closely associated with the intestinal bacteria composition and their metabolites.AIM To investigate whether washed microbiota transplantation(WMT...BACKGROUND The pathogenesis of gastroesophageal reflux disease(GERD)is closely associated with the intestinal bacteria composition and their metabolites.AIM To investigate whether washed microbiota transplantation(WMT)improves symptoms of nonerosive reflux disease(NERD)with proton pump inhibitor(PPI)dependency.METHODS Patients with recurrent NERD and PPI dependency at the First Affiliated Hospital of Guangdong Pharmaceutical University from 2017 to 2018 were included and divided into a WMT or PPI group treated with PPI with/without WMT.The endpoint was NERD symptom frequency evaluated 1 mo after WMT using reflux disease questionnaire(RDQ)and GERD questionnaire(GERDQ)scores,remission time,PPI dose,and the examination of intestinal mucosal barrier function.RESULTS In the WMT(n=15)and PPI(n=12)groups,the total remission rate at 1 mo after treatment was 93.3%vs 41.7%.Compared with the PPI group,the WMT group showed better results in GERDQ(P=0.004)and RDQ(P=0.003)and in remission months(8 vs 2,P=0.002).The PPI dose was reduced to some extent for 80%of patients in the WMT group and 33.3%in the PPI group.In 24 patients,intestinal mucosal barrier function was examined before treatment,and changes in the degree of damage were observed in 13 of these patients after treatment.Only one of the 15 patients had minor side effects,including a mushy stool two or three times a day,which resolved on their own after 1 wk.CONCLUSION This study is the first to demonstrate that WMT may be safe and effective for relieving NERD symptoms and reducing PPI dependency and recurrence.展开更多
Solution-cast films of shape memory polyurethane have been investigated.Differential scanning calorimetry, DMA, tensile test, water vapor permeability and the shape memory effect were carried out to characterize these...Solution-cast films of shape memory polyurethane have been investigated.Differential scanning calorimetry, DMA, tensile test, water vapor permeability and the shape memory effect were carried out to characterize these polyurethane membranes. Samples cast at higher temperatures contained more hard segment in the crystalline state than a sample cast at lower temperature. The change in the water vapor permeability (WVP) of SMPU films with respect to the temperature follows an S-shaped curve, and increases abruptly at T m of the soft segment for the fractional free volume (FFV, the ratio of free volume and specific volume in polymers) increased linearly with temperature. The water vapor permeability dependency of the temperature and humidity contribute to the result of the change of diffusion and solubility with the surrounding air condition. The diffusion coefficient (D) are the function of temperature and show good fit the Arrhenius form but show different parameter values when above and below T g. The crystalline state hard-segment is necessary for the good shape memory展开更多
Purpose: This study aimed to evaluate the psychometric properties of the Indonesian version of the Care Dependency Scale (CDS) among stroke survivors.Methods: The study was undertaken in four hospitals.We analysed dat...Purpose: This study aimed to evaluate the psychometric properties of the Indonesian version of the Care Dependency Scale (CDS) among stroke survivors.Methods: The study was undertaken in four hospitals.We analysed datasets obtained from 109 stroke survivors on inpatient wards and in outpatient clinics,who were rated by nurses to determine the CDS reliability coefficients.The Cronbach's α and Cohen's kappa coefficients were applied.Concurrent validity was conducted for the data on care dependency,which werecollected from 49 of these 109 participants on inpatient wards by nurses using the CDS and the Barthel Index.A Spearman's rank correlation analysis was conducted to measure the association between the CDS and the Barthel Index results.Results: An analysis of the results of the CDS tested on the inpatient ward and in the outpatient clinic revealed a high level of internal consistency.The reliability analysis yielded the same Cronbach's α coefficient of 0.98 for both the inpatient and outpatient data.A significant,moderate correlation was observed between the CDS and Barthel Index results.Conclusion: The CDS can be recommended for use as a tool for the assessment and evaluation of stroke survivors who are receiving acute or long-term care.展开更多
Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks i...Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical.展开更多
Since the early 1970s tremendous growth has been seen in the research of software reliability growth modeling. In general, software reliability growth models (SRGMs) are applicable to the late stages of testing in s...Since the early 1970s tremendous growth has been seen in the research of software reliability growth modeling. In general, software reliability growth models (SRGMs) are applicable to the late stages of testing in software development and they can provide useful information about how to improve the reliability of software products. A number of SRGMs have been proposed in the literature to represent time-dependent fault identification / removal phenomenon; still new models are being proposed that could fit a greater number of reliability growth curves. Often, it is assumed that detected faults are immediately corrected when mathematical models are developed. This assumption may not be realistic in practice because the time to remove a detected fault depends on the complexity of the fault, the skill and experience of the personnel, the size of the debugging team, the technique, and so on. Thus, the detected fault need not be immediately removed, and it may lag the fault detection process by a delay effect factor. In this paper, we first review how different software reliability growth models have been developed, where fault detection process is dependent not only on the number of residual fault content but also on the testing time, and see how these models can be reinterpreted as the delayed fault detection model by using a delay effect factor. Based on the power function of the testing time concept, we propose four new SRGMs that assume the presence of two types of faults in the software: leading and dependent faults. Leading faults are those that can be removed upon a failure being observed. However, dependent faults are masked by leading faults and can only be removed after the corresponding leading fault has been removed with a debugging time lag. These models have been tested on real software error data to show its goodness of fit, predictive validity and applicability.展开更多
Background Available data regarding clinical profile and management of elderly patients with atrial fibrillation (AF) according to dependency, fragility and cognitive impairment are scarce. The objective of the stud...Background Available data regarding clinical profile and management of elderly patients with atrial fibrillation (AF) according to dependency, fragility and cognitive impairment are scarce. The objective of the study was to analyze the biodemographic data, clinical profile and antithrombotic treatment according to dependency, fragility and cognitive impairment in elderly AF patients. Methods Cross- sectional and multi-center study performed in consecutive AF patients ≥ 75 years treated with oral anticoagulants ≥ 3 months attended in Internal Medicine Departments in Spain. Results A total of 837 patients (83.0 ± 5.0 years; CHA2DS2-VASc: 5.0 ± 1.4; HAS-BLED: 2.1 ± 0.9) were included. 44.4% of patients had some degree of dependency, 43.3% were fragile, and 32.3% had cognitive impairment. Patients with any of these conditions were older, had a worse clinical profile, with more comorbidities and higher risks of thromboembolic and bleeding events. All these conditions were independently associated among them. Overall, 70.8% of patients were taking vitamin K antagonists, the remaining 29.2% direct oral anticoagulants and 9.7% oral antiplatelets. This distribution was independent of the presence of dependency or fragility, but there was a trend to a higher prescription of vitamin K antagonists in those patients with cognitive impairment (75.2% vs. 68.8%; P = 0.05). Conclusions Approximately 32%-44% of elderly anticoagulated AF patients attended have some degree of dependency, fragility and/or cognitive impairment. Patients with any of these conditions are older and have a worse clinical profile. Ap?proximately 71% of patients are taking vitamin K antagonists, regardless dependency or frailty, but with a trend to higher prescription in patients with cognitive impairment.展开更多
Recently dependency information has been used in different ways to improve neural machine translation.For example,add dependency labels to the hidden states of source words.Or the contiguous information of a source wo...Recently dependency information has been used in different ways to improve neural machine translation.For example,add dependency labels to the hidden states of source words.Or the contiguous information of a source word would be found according to the dependency tree and then be learned independently and be added into Neural Machine Translation(NMT)model as a unit in various ways.However,these works are all limited to the use of dependency information to enrich the hidden states of source words.Since many works in Statistical Machine Translation(SMT)and NMT have proven the validity and potential of using dependency information.We believe that there are still many ways to apply dependency information in the NMT structure.In this paper,we explore a new way to use dependency information to improve NMT.Based on the theory of local attention mechanism,we present Dependency-based Local Attention Approach(DLAA),a new attention mechanism that allowed the NMT model to trace the dependency words related to the current translating words.Our work also indicates that dependency information could help to supervise attention mechanism.Experiment results on WMT 17 Chineseto-English translation task shared training datasets show that our model is effective and perform distinctively on long sentence translation.展开更多
This paper explores the application of term dependency in information retrieval (IR) and proposes a novel dependency retrieval model. This retrieval model suggests an extension to the existing language modeling (LM) a...This paper explores the application of term dependency in information retrieval (IR) and proposes a novel dependency retrieval model. This retrieval model suggests an extension to the existing language modeling (LM) approach to IR by introducing dependency models for both query and document. Relevance between document and query is then evaluated by reference to the Kullback-Leibler divergence between their dependency models. This paper introduces a novel hybrid dependency structure, which allows integration of various forms of dependency within a single framework. A pseudo relevance feedback based method is also introduced for constructing query dependency model. The basic idea is to use query-relevant top-ranking sentences extracted from the top documents at retrieval time as the augmented representation of query, from which the relationships between query terms are identified. A Markov Random Field (MRF) based approach is presented to ensure the relevance of the extracted sentences, which utilizes the association features between query terms within a sentence to evaluate the relevance of each sentence. This dependency retrieval model was compared with other traditional retrieval models. Experiments indicated that it produces significant improvements in retrieval effectiveness.展开更多
In Chinese, dependency analysis has been shown to be a powerful syntactic parser because the order of phrases in a sentence is relatively free compared with English. Conventional dependency parsers require a number of...In Chinese, dependency analysis has been shown to be a powerful syntactic parser because the order of phrases in a sentence is relatively free compared with English. Conventional dependency parsers require a number of sophisticated rules that have to be handcrafted by linguists, and are too cumbersome to maintain. To solve the problem, a parser using SVM (Support Vector Machine) is introduced. First, a new strategy of dependency analysis is proposed. Then some chosen feature types are used for learning and for creating the modification matrix using SVM. Finally, the dependency of phrases in the sentence is generated. Experiments conducted to analyze how each type of feature affects parsing accuracy, showed that the model can increase accuracy of the dependency parser by 9.2%.展开更多
Test selection is to select the test set with the least total cost or the least total number from the alternative test set on the premise of meeting the required testability indicators.The existing models and methods ...Test selection is to select the test set with the least total cost or the least total number from the alternative test set on the premise of meeting the required testability indicators.The existing models and methods are not suitable for system level test selection.The first problem is the lack of detailed data of the units’fault set and the test set,which makes it impossible to establish a traditional dependency matrix for the system level.The second problem is that the system level fault detection rate and the fault isolation rate(referred to as"two rates")are not enough to describe the fault diagnostic ability of the system level tests.An innovative dependency matrix(called combinatorial dependency matrix)composed of three submatrices is presented.The first problem is solved by simplifying the submatrix between the units’fault and the test,and the second problem is solved by establishing the system level fault detection rate,the fault isolation rate and the integrated fault detection rate(referred to as"three rates")based on the new matrix.The mathematical model of the system level test selection problem is constructed,and the binary genetic algorithm is applied to solve the problem,which achieves the goal of system level test selection.展开更多
文摘Objective:The purpose of this study was to determine the effectiveness of brisk walking as an intervention for self-care agency and care dependency in patients with permanent colorectal cancer stoma.Method:This study adopted a quasi-experimental research design,specifically a non-equivalent control group pre-test and post-test design.Utilizing the Exercise of Self-Care Agency Scale(ESCA)and Care Dependency Scale(CDS),a survey was administered to 64 patients from a hospital in Shandong Province.The statistical methods used for analyzing data included frequency,mean,standard deviation(SD),independent t-test,P-value calculation,and dependent t-test.Result:After two months of a brisk walking exercise program,participants in the experimental group had a higher level of self-care agency than before the experiment(P<0.05),and their level of care dependency was significantly reduced(P<0.05).Participants in the control group also showed higher levels of self-care agency(P<0.05)and lower levels of care dependency(P<0.05)after two months compared to their levels before the two months.Conclusion:The brisk walking program had a positive impact on patients’self-care agency and reduced their care dependency.
基金supported by the Key R and D Programs of Zhejiang Province under Grant No.2022C01018the Natural Science Foundation of Zhejiang Province under Grant No.LQ20F020019.
文摘Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more than 40 million smart contracts are running,is frequently challenged by smart contract vulnerabilities.What’s worse,since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies,a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum.However,little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected.Thus,we first present the contract dependency graph(CDG)to perform a vulnerability analysis for Ethereum smart contracts,where CDG characterizes inter-contract dependencies formed by DELEGATECALL-type internal transaction in Ethereum.Then,three generic definitions of security violations against CDG are given for finding respective potential victim contracts affected by different types of vulnerable contracts.Further,we construct the CDG with 195,247 smart contracts active in the latest blocks of the Ethereum and verify the above security violations against CDG by detecting three representative known vulnerabilities.Compared to previous large-scale vulnerability analysis,our analysis scheme marks potential victim contracts that can be affected by different types of vulnerable contracts,and identify their possible risks based on the type of security violation actually occurring.The analysis results show that the proportion of potential victim contracts reaches 14.7%,far more than that of corresponding vulnerable contracts(less than 0.02%)in CDG.
基金supported by the National Natural Science Foundation of China(61503014,62073009)。
文摘Degradation and overstress failures occur in many electronic systems in which the operation load and environmental conditions are complex.The dependency of them called dependent competing failure process(DCFP),has been widely studied.Electronic system may experience mutual effects of degradation and shocks,they are considered to be interdependent.Both the degradation and the shock processes will decrease the limit of system and cause cumulative effect.Finally,the competition of hard and soft failure will cause the system failure.Based on the failure mechanism accumulation theory,this paper constructs the shock-degradation acceleration and the threshold descent model,and a system reliability model established by using these two models.The mutually DCFP effect of electronic system interaction has been decomposed into physical correlation of failure,including acceleration,accumulation and competition.As a case,a reliability of electronic system in aeronautical system has been analyzed with the proposed method.The method proposed is based on failure physical evaluation,and could provide important reference for quantitative evaluation and design improvement of the newly designed system in case of data deficiency.
基金the National Natural Science Foundation of China(Grant Nos.61973118,51741902,11761033,12075088,and 11835003)Project in JiangXi Province Department of Science and Technology(Grant Nos.20212BBE51010 and 20182BCB22009)the Natural Science Foundation of Zhejiang Province(Grant No.Y22F035316)。
文摘We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phase transition behaviors and parameter thresholds of this model under random attacks are analyzed theoretically on both random regular(RR)networks and Erd¨os-Renyi(ER)networks,and computer simulations are performed to verify the results.In this EINDDL model,a fractionβof connectivity links within network B depends on network A and a fraction(1-β)of connectivity links within network A depends on network B.It is found that randomly removing a fraction(1-p)of connectivity links in network A at the initial state,network A exhibits different types of phase transitions(first order,second order and hybrid).Network B is rarely affected by cascading failure whenβis small,and network B will gradually converge from the first-order to the second-order phase transition asβincreases.We present the critical values ofβfor the phase change process of networks A and B,and give the critical values of p andβfor network B at the critical point of collapse.Furthermore,a cascading prevention strategy is proposed.The findings are of great significance for understanding the robustness of EINDDLs.
基金This study is funded by Major Research Program on Philosophy and Social Sciences of Jiangsu Education Department(The Education of Marxism International View in Colleges and Universities for a New Era,No.2022SJZDSZ001)Green Research Program of Nanjing University of Aeronautics and Astronautics(China-US Science and Technology Competition from the Perspective of Marxism,No.1023-YAH21032).
文摘Marxist political economy provides a perspective for grasping the root cause of the China-US trade war.The international relations of production,which stem from the international division of labor,shape the distribution of international economic interests and the political status of countries.Traditionally,developing countries have been subjected to the“periphery”in the international division of labor.In the new global value chain,developing countries have remained in a subordinate position characterized by“technological-market”dependence.To achieve the goal of building a strong modern nation,China must escape the“technological-market”dependence.Yet China’s efforts and achievements in escaping dependent development are deemed as a threat to US vested interests in the international markets.To preserve the economic foundation of its hegemony,the US has resorted to a trade war to contain China’s development.
基金the Universiti Kebangsaan Malaysia,Geran Galakan Penyelidikan,GGP-2020-040.
文摘This study aims to investigate the phenomenon of technological gadget usage among pre-university students,which include the time spent using them,as well as their purpose and influence.A descriptive research design was adopted in this study.131 pre-university students were randomly selected to answer a structured questionnaire.They were informed two weeks earlier to keep track on their time spent on technological devices,before answering the questionnaire.Findings showed that 99.2%of the respondents owned at least two technological gadgets,and all respondents own a smartphone.The main two gadgets that respondents spend at least 4 h a day on are smartphones(65.6%)and computers/laptops(21.4%).This indicates that smartphones are commonly used and owned among the respondents.The majority of the respondents are moderately nomophobia and moderately dependent on smartphones(70.2%and 66.4%,respectively).Correlation analysis demonstrates that the total time spent on gadgets in a day has a significant positive correlation with gadget dependency and total number of gadgets owned.Meanwhile,logistic regression was conducted to estimate the probability of nomophobia and dependency using total time spent and total number of technological gadgets.From thefindings,it was demonstrated that when the total time spent on using technological gadgets increasing,there is greater probability that the respondents develop nomophobia and dependency.This indicates that nomophobia and dependency to technological gadgets can be used to predict lifestyle profiles.The use of technological gadgets can bring both benefit and harm to its user.In light of this,user has to remain rational in order to derive maximum benefit from it.
基金This work was supported by the Project of Hunan Social Science Achievement Evaluation Committee(XSP20YBZ090,Sheng Xiao,2020).
文摘Read-write dependency is an important factor restricting software efficiency.Timing Speculative(TS)is a processing architecture aiming to improve energy efficiency of microprocessors.Timing error rate,influenced by the read-write dependency,bottlenecks the voltage down-scaling and so the energy efficiency of TS processors.We proposed a method called Read-Write Dependency Aware Register Allocation.It is based on the Read-Write Dependency aware Interference Graph(RWDIG)conception.Registers are reallocated to loosen the read-write dependencies,so resulting in a reduction of timing errors.The traditional no operation(Nop)padding method is also redesigned to increase the distance value to above 2.We analyzed the dependencies of registers and maximized the average distance value of read and write dependencies.Experimental results showed that we can reduce all read-write dependency by Nop padding,as well as the overhead timing errors.An energy saving of approximately 7%was achieved.
文摘Log-linear models and more recently neural network models used forsupervised relation extraction requires substantial amounts of training data andtime, limiting the portability to new relations and domains. To this end, we propose a training representation based on the dependency paths between entities in adependency tree which we call lexicalized dependency paths (LDPs). We showthat this representation is fast, efficient and transparent. We further propose representations utilizing entity types and its subtypes to refine our model and alleviatethe data sparsity problem. We apply lexicalized dependency paths to supervisedlearning using the ACE corpus and show that it can achieve similar performancelevel to other state-of-the-art methods and even surpass them on severalcategories.
基金Supported by the Henan Province Science and Technology Department Foundation(No.202102310237,192102210133,202102310295)the Doctoral Research Fund of Zhengzhou University of Light Industry(No.2018BSJJ039)the Internet Medical and Health Service Henan Collaborative Innovation Center Open Project Fund(No.IH2019006).
文摘Knowledge graph(KG)conflict resolution is to solve knowledge conflicts problem in the construction of KG.Aiming at the problem of KG conflict resolution,a KG conflict resolution algorithm NGDcrm is proposed,which is a numeric graph dependency-based conflict resolution method.NGDcrm utilizes the dependency graph to perform arithmetic calculation and predicate comparison of numerical entity knowledge in the KG.NGDcrm first uses a parallel segmentation method to segment the KG;then,it extracts the features of the KG according to KG embedding;finally,it uses numerical graph dependencies to detect and correct the wrong facts in the KG based on the extracted features.The experimental results on real data show that NGDcrm is better than the state-of-the-art knowledge conflict resolution method.Among them,the AUC value of NGDcrm on the DBpedia dataset is 15.4%higher than the state-of-the-art method.
文摘BACKGROUND The pathogenesis of gastroesophageal reflux disease(GERD)is closely associated with the intestinal bacteria composition and their metabolites.AIM To investigate whether washed microbiota transplantation(WMT)improves symptoms of nonerosive reflux disease(NERD)with proton pump inhibitor(PPI)dependency.METHODS Patients with recurrent NERD and PPI dependency at the First Affiliated Hospital of Guangdong Pharmaceutical University from 2017 to 2018 were included and divided into a WMT or PPI group treated with PPI with/without WMT.The endpoint was NERD symptom frequency evaluated 1 mo after WMT using reflux disease questionnaire(RDQ)and GERD questionnaire(GERDQ)scores,remission time,PPI dose,and the examination of intestinal mucosal barrier function.RESULTS In the WMT(n=15)and PPI(n=12)groups,the total remission rate at 1 mo after treatment was 93.3%vs 41.7%.Compared with the PPI group,the WMT group showed better results in GERDQ(P=0.004)and RDQ(P=0.003)and in remission months(8 vs 2,P=0.002).The PPI dose was reduced to some extent for 80%of patients in the WMT group and 33.3%in the PPI group.In 24 patients,intestinal mucosal barrier function was examined before treatment,and changes in the degree of damage were observed in 13 of these patients after treatment.Only one of the 15 patients had minor side effects,including a mushy stool two or three times a day,which resolved on their own after 1 wk.CONCLUSION This study is the first to demonstrate that WMT may be safe and effective for relieving NERD symptoms and reducing PPI dependency and recurrence.
基金TheHongKongPolytechnicUniversity (A .14 .37.PB5 3)
文摘Solution-cast films of shape memory polyurethane have been investigated.Differential scanning calorimetry, DMA, tensile test, water vapor permeability and the shape memory effect were carried out to characterize these polyurethane membranes. Samples cast at higher temperatures contained more hard segment in the crystalline state than a sample cast at lower temperature. The change in the water vapor permeability (WVP) of SMPU films with respect to the temperature follows an S-shaped curve, and increases abruptly at T m of the soft segment for the fractional free volume (FFV, the ratio of free volume and specific volume in polymers) increased linearly with temperature. The water vapor permeability dependency of the temperature and humidity contribute to the result of the change of diffusion and solubility with the surrounding air condition. The diffusion coefficient (D) are the function of temperature and show good fit the Arrhenius form but show different parameter values when above and below T g. The crystalline state hard-segment is necessary for the good shape memory
文摘Purpose: This study aimed to evaluate the psychometric properties of the Indonesian version of the Care Dependency Scale (CDS) among stroke survivors.Methods: The study was undertaken in four hospitals.We analysed datasets obtained from 109 stroke survivors on inpatient wards and in outpatient clinics,who were rated by nurses to determine the CDS reliability coefficients.The Cronbach's α and Cohen's kappa coefficients were applied.Concurrent validity was conducted for the data on care dependency,which werecollected from 49 of these 109 participants on inpatient wards by nurses using the CDS and the Barthel Index.A Spearman's rank correlation analysis was conducted to measure the association between the CDS and the Barthel Index results.Results: An analysis of the results of the CDS tested on the inpatient ward and in the outpatient clinic revealed a high level of internal consistency.The reliability analysis yielded the same Cronbach's α coefficient of 0.98 for both the inpatient and outpatient data.A significant,moderate correlation was observed between the CDS and Barthel Index results.Conclusion: The CDS can be recommended for use as a tool for the assessment and evaluation of stroke survivors who are receiving acute or long-term care.
基金supported by National Key Basic Research Program of China (No.2014CB340600)partially supported by National Natural Science Foundation of China (Grant Nos.61332019,61672531)partially supported by National Social Science Foundation of China (Grant No.14GJ003-152)
文摘Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical.
文摘Since the early 1970s tremendous growth has been seen in the research of software reliability growth modeling. In general, software reliability growth models (SRGMs) are applicable to the late stages of testing in software development and they can provide useful information about how to improve the reliability of software products. A number of SRGMs have been proposed in the literature to represent time-dependent fault identification / removal phenomenon; still new models are being proposed that could fit a greater number of reliability growth curves. Often, it is assumed that detected faults are immediately corrected when mathematical models are developed. This assumption may not be realistic in practice because the time to remove a detected fault depends on the complexity of the fault, the skill and experience of the personnel, the size of the debugging team, the technique, and so on. Thus, the detected fault need not be immediately removed, and it may lag the fault detection process by a delay effect factor. In this paper, we first review how different software reliability growth models have been developed, where fault detection process is dependent not only on the number of residual fault content but also on the testing time, and see how these models can be reinterpreted as the delayed fault detection model by using a delay effect factor. Based on the power function of the testing time concept, we propose four new SRGMs that assume the presence of two types of faults in the software: leading and dependent faults. Leading faults are those that can be removed upon a failure being observed. However, dependent faults are masked by leading faults and can only be removed after the corresponding leading fault has been removed with a debugging time lag. These models have been tested on real software error data to show its goodness of fit, predictive validity and applicability.
文摘Background Available data regarding clinical profile and management of elderly patients with atrial fibrillation (AF) according to dependency, fragility and cognitive impairment are scarce. The objective of the study was to analyze the biodemographic data, clinical profile and antithrombotic treatment according to dependency, fragility and cognitive impairment in elderly AF patients. Methods Cross- sectional and multi-center study performed in consecutive AF patients ≥ 75 years treated with oral anticoagulants ≥ 3 months attended in Internal Medicine Departments in Spain. Results A total of 837 patients (83.0 ± 5.0 years; CHA2DS2-VASc: 5.0 ± 1.4; HAS-BLED: 2.1 ± 0.9) were included. 44.4% of patients had some degree of dependency, 43.3% were fragile, and 32.3% had cognitive impairment. Patients with any of these conditions were older, had a worse clinical profile, with more comorbidities and higher risks of thromboembolic and bleeding events. All these conditions were independently associated among them. Overall, 70.8% of patients were taking vitamin K antagonists, the remaining 29.2% direct oral anticoagulants and 9.7% oral antiplatelets. This distribution was independent of the presence of dependency or fragility, but there was a trend to a higher prescription of vitamin K antagonists in those patients with cognitive impairment (75.2% vs. 68.8%; P = 0.05). Conclusions Approximately 32%-44% of elderly anticoagulated AF patients attended have some degree of dependency, fragility and/or cognitive impairment. Patients with any of these conditions are older and have a worse clinical profile. Ap?proximately 71% of patients are taking vitamin K antagonists, regardless dependency or frailty, but with a trend to higher prescription in patients with cognitive impairment.
基金This research was funded in part by the National Natural Science Foundation of China(61871140,61872100,61572153,U1636215,61572492,61672020)the National Key research and Development Plan(Grant No.2018YFB0803504)Open Fund of Beijing Key Laboratory of IOT Information Security Technology(J6V0011104).
文摘Recently dependency information has been used in different ways to improve neural machine translation.For example,add dependency labels to the hidden states of source words.Or the contiguous information of a source word would be found according to the dependency tree and then be learned independently and be added into Neural Machine Translation(NMT)model as a unit in various ways.However,these works are all limited to the use of dependency information to enrich the hidden states of source words.Since many works in Statistical Machine Translation(SMT)and NMT have proven the validity and potential of using dependency information.We believe that there are still many ways to apply dependency information in the NMT structure.In this paper,we explore a new way to use dependency information to improve NMT.Based on the theory of local attention mechanism,we present Dependency-based Local Attention Approach(DLAA),a new attention mechanism that allowed the NMT model to trace the dependency words related to the current translating words.Our work also indicates that dependency information could help to supervise attention mechanism.Experiment results on WMT 17 Chineseto-English translation task shared training datasets show that our model is effective and perform distinctively on long sentence translation.
基金Project (No. 2006CB303000) supported in part by the National Basic Research Program (973) of China
文摘This paper explores the application of term dependency in information retrieval (IR) and proposes a novel dependency retrieval model. This retrieval model suggests an extension to the existing language modeling (LM) approach to IR by introducing dependency models for both query and document. Relevance between document and query is then evaluated by reference to the Kullback-Leibler divergence between their dependency models. This paper introduces a novel hybrid dependency structure, which allows integration of various forms of dependency within a single framework. A pseudo relevance feedback based method is also introduced for constructing query dependency model. The basic idea is to use query-relevant top-ranking sentences extracted from the top documents at retrieval time as the augmented representation of query, from which the relationships between query terms are identified. A Markov Random Field (MRF) based approach is presented to ensure the relevance of the extracted sentences, which utilizes the association features between query terms within a sentence to evaluate the relevance of each sentence. This dependency retrieval model was compared with other traditional retrieval models. Experiments indicated that it produces significant improvements in retrieval effectiveness.
文摘In Chinese, dependency analysis has been shown to be a powerful syntactic parser because the order of phrases in a sentence is relatively free compared with English. Conventional dependency parsers require a number of sophisticated rules that have to be handcrafted by linguists, and are too cumbersome to maintain. To solve the problem, a parser using SVM (Support Vector Machine) is introduced. First, a new strategy of dependency analysis is proposed. Then some chosen feature types are used for learning and for creating the modification matrix using SVM. Finally, the dependency of phrases in the sentence is generated. Experiments conducted to analyze how each type of feature affects parsing accuracy, showed that the model can increase accuracy of the dependency parser by 9.2%.
基金supported by the National Natural Science Foundation of China(51605482)the Equipment Pre-research Project(41403020101).
文摘Test selection is to select the test set with the least total cost or the least total number from the alternative test set on the premise of meeting the required testability indicators.The existing models and methods are not suitable for system level test selection.The first problem is the lack of detailed data of the units’fault set and the test set,which makes it impossible to establish a traditional dependency matrix for the system level.The second problem is that the system level fault detection rate and the fault isolation rate(referred to as"two rates")are not enough to describe the fault diagnostic ability of the system level tests.An innovative dependency matrix(called combinatorial dependency matrix)composed of three submatrices is presented.The first problem is solved by simplifying the submatrix between the units’fault and the test,and the second problem is solved by establishing the system level fault detection rate,the fault isolation rate and the integrated fault detection rate(referred to as"three rates")based on the new matrix.The mathematical model of the system level test selection problem is constructed,and the binary genetic algorithm is applied to solve the problem,which achieves the goal of system level test selection.