The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the a...The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.展开更多
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ...In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.展开更多
Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.Howeve...Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies.展开更多
Prior research has generally focused on models involving a single or multiple retailers with independent demands. The value of demand information sharing is analyzed in a two-level supply chain involving one supplier-...Prior research has generally focused on models involving a single or multiple retailers with independent demands. The value of demand information sharing is analyzed in a two-level supply chain involving one supplier-multiple retailer model in which retailer demands may be correlated. Each member in the supply chain forecasts its demand using an AR (1) demand process. Two conditions of the information sharing are considered (1) Without the information sharing, the retailers only communicate their orders to the supplier. (2) With the information sharing, retailers communicate their orders and forecasting models to the supplier. Analyses showthat the reductions of supplier's average inventory and average costs are substantial with the information sharing. However, the retailers donot get direct benefit from the information sharing. The retailers may ask the supplier to reduce the replenishment leadtime, so that the retailers will obtain substantial cost savings and inventory reduction. Both partners may obtain benefits when information sharing and leadtime reduction are implemented together.展开更多
To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This pape...To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This paper investigates the reduction of the delay in edge information sharing for V2V links while satisfying the delay requirements of the V2I links.Specifically,a mean delay minimization problem and a maximum individual delay minimization problem are formulated to improve the global network performance and ensure the fairness of a single user,respectively.A multi-agent reinforcement learning framework is designed to solve these two problems,where a new reward function is proposed to evaluate the utilities of the two optimization objectives in a unified framework.Thereafter,a proximal policy optimization approach is proposed to enable each V2V user to learn its policy using the shared global network reward.The effectiveness of the proposed approach is finally validated by comparing the obtained results with those of the other baseline approaches through extensive simulation experiments.展开更多
The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organ...The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, ( 1 ) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible.展开更多
With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision su...With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision support systems (DSS). To give an improved support to mobile business professionals, it is necessary to go further than just allowing a simple remote access to a Business Intelligence platform. In this paper, the need for actual context-aware mobile Geospatial Business Intelligence (GeoBI) systems that can help capture, filter, organize and structure the user mobile context is exposed and justified. Furthermore, since capturing, structuring, and modeling mobile contextual information is still a research issue, a wide inventory of existing research work on context and mobile context is provided. Then, step by step, we methodologically identify relevant contextual information to capture for mobility purposes as well as for BI needs, organize them into context-dimensions, and build a hierarchical mobile GeoBI context model which (1) is geo-spatial-extended, (2) fits with human perception of mobility, (3) takes into account the local context interactions and information-sharing with remote contexts, and (4) matches with the usual hierarchical aggregated structure of BI data.展开更多
In the age of big data,plenty of valuable data have been shared to enhance scientific innovation,which,however,may disclose unexpected privacy leakage.Although numerous privacy preservation techniques have been propos...In the age of big data,plenty of valuable data have been shared to enhance scientific innovation,which,however,may disclose unexpected privacy leakage.Although numerous privacy preservation techniques have been proposed to conceal sensitive information,it is usually at the cost of the application utility reduction.In this paper,we present a data sharing scheme,which balances the application utility and privacy leakage for specific data sharing.To illustrate our scheme,smartphones’acceleration data have been adopted as an illustrative example.Experimental study has shown that sampling frequency play dominant roles in reducing privacy leakage with much less reduction on utility.展开更多
In this paper we extend the one-on-one stochastic duel model with searching to the many-on-one case based on information-sharing. We have derived the probability density function of the time to kill the target in many...In this paper we extend the one-on-one stochastic duel model with searching to the many-on-one case based on information-sharing. We have derived the probability density function of the time to kill the target in many-on-one model. It is illustrated by an example in which the firing time and the searching time are of different exponential distributions.展开更多
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret...The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest, Shamir, Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols.展开更多
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a...Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.展开更多
This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable priv...This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable privacy creation tool for the authentication of real-life complex platforms.This research adjusts embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the images.The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality.The paper experimentation performance analysis shows that this improved image watermarking authentication(capacity)is averagely better by 33%–67%than other related exclusive-OR oriented and octagon approaches.Interestingly,these measurement improvements did not degrade the robustness and security of the system,inspiring our research for opening novel track of related future counting-based secret-sharing authentication progresses to come.展开更多
Since the first publication describing the identification of prostate-specific antigen (PSA) in the 1960s, much progress has been made. The PSA test changed from being initially a monitoring tool to being also used ...Since the first publication describing the identification of prostate-specific antigen (PSA) in the 1960s, much progress has been made. The PSA test changed from being initially a monitoring tool to being also used as a diagnostic tool. Over time, the test has been heavily debated due to its lack of sensitivity and specificity. However, up to now the PSA test is still the only biomarker for the detection and monitoring of prostate cancer. PSA-based screening for prostate cancer is associated with a high proportion of unnecessary testing and overdiagnosis with subsequent overtreatment. In the early years of screening for prostate cancer, high rates of uptake were very important. However, over time the opinion on PSA-based screening has shifted towards the notion of informed choice. Nowadays, it is thought to be unethical to screen men without them being aware of the pros and cons of PSA testing, as well as the fact that an informed choice is related to better patient outcomes. Now, as the results of three major screening studies have been presented and the downsides of screening are becoming better understood, informed choice is becoming more relevant.展开更多
In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedbac...In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedback control information from the primary user is analyzed. An improved spectrum sharing algorithm based on the combination of the feedback control information and the optimization algorithm is proposed. The relaxation method is used to achieve the approximate spectrum sharing model, and the spectrum sharing strategy that satisfies the individual outage probability constraints can be obtained iteratively with the observed outage probability. Simulation results show that the proposed spectrum sharing algorithm can achieve the spectrum sharing strategy that satisfies the outage probability constraints and reduce the average outage probability without causing maximum transmission rate reduction of the secondary user.展开更多
More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Ur...More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Urban air pollution is a serious environmental issue that poses adverse impacts on the health of people and the environment in most metropolitan areas. In this paper,we propose a geoinformatics augmented framework of environmental modelling and information sharing for supporting effective urban air pollution control and management. This framework is out-lined in terms of its key components and processes including: 1) an integrated,adaptive network of sensors for envi-ronmental monitoring; 2) a set of distributed,interoperable databases for data management; 3) a set of intelligent,robust algorithms and models for environmental modelling; 4) a set of flexible,efficient user interfaces for data access and in-formation sharing; and 5) a reliable,high capacity,high performance computing and communication infrastructure for integrating and supporting other framework components and processes.展开更多
In the current paper, the authors investigate empirically the relationship between the share price volatility and the amount of voluntary information disclosed in the corporate annual report. The authors use the data ...In the current paper, the authors investigate empirically the relationship between the share price volatility and the amount of voluntary information disclosed in the corporate annual report. The authors use the data envelopment analysis (DEA) and the stochastic frontier analysis (SFA) models on a sample of 50 listed French firms belonging to the Soci6t6s des Bourses Fran^aises (SBF250) index from 2004 to 2008. The authors focus on the extent of voluntary disclosure in the annual reports that have been measure by using a composite disclosure index. Then, the authors study the relevance of disclosure policies through the ability of the voluntary disclosure level to effectively reduce the share price volatility. The findings of DEA and SFA provide, in average, highly efficient scores of the sample, reveal the several dispositions taken by the French Exchange Market authorities and the initiative of French firms to improve the market stability. In addition, the findings highlight, in average, stability of the firms' efficiency scores over the studied period. The authors explain these findings by the stability of corporate disclosure policy as suggested in previous literature (e.g., Botosan, 1997). However, there are some differences between the findings of SFA and DEA models.展开更多
With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterpris...With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterprise arises at the historic moment. The cooperation is a process which advantages the temporary enterprise resources each other. Therefore, the virtual enterprise must encounter the problem that how to realize the virtual enterprises’ information resources sharing and improve the efficiency of enterprise cooperation. This paper uses the cloud computing’s advantage to solve the problem of virtual enterprise information resources sharing. Then enterprise is able to share the information of different regions,different computing environment and improve the efficiency of virtual enterprise cooperation.展开更多
文摘The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.
文摘In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.
基金supported by Hainan Province Basic and Applied Basic Research Program(Natural Science Field)High-level Talent Project(Grant No.2019RC044).
文摘Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies.
文摘Prior research has generally focused on models involving a single or multiple retailers with independent demands. The value of demand information sharing is analyzed in a two-level supply chain involving one supplier-multiple retailer model in which retailer demands may be correlated. Each member in the supply chain forecasts its demand using an AR (1) demand process. Two conditions of the information sharing are considered (1) Without the information sharing, the retailers only communicate their orders to the supplier. (2) With the information sharing, retailers communicate their orders and forecasting models to the supplier. Analyses showthat the reductions of supplier's average inventory and average costs are substantial with the information sharing. However, the retailers donot get direct benefit from the information sharing. The retailers may ask the supplier to reduce the replenishment leadtime, so that the retailers will obtain substantial cost savings and inventory reduction. Both partners may obtain benefits when information sharing and leadtime reduction are implemented together.
基金supported in part by the National Natural Science Foundation of China under grants 61901078,61771082,61871062,and U20A20157in part by the Science and Technology Research Program of Chongqing Municipal Education Commission under grant KJQN201900609+2 种基金in part by the Natural Science Foundation of Chongqing under grant cstc2020jcyj-zdxmX0024in part by University Innovation Research Group of Chongqing under grant CXQT20017in part by the China University Industry-University-Research Collaborative Innovation Fund(Future Network Innovation Research and Application Project)under grant 2021FNA04008.
文摘To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This paper investigates the reduction of the delay in edge information sharing for V2V links while satisfying the delay requirements of the V2I links.Specifically,a mean delay minimization problem and a maximum individual delay minimization problem are formulated to improve the global network performance and ensure the fairness of a single user,respectively.A multi-agent reinforcement learning framework is designed to solve these two problems,where a new reward function is proposed to evaluate the utilities of the two optimization objectives in a unified framework.Thereafter,a proximal policy optimization approach is proposed to enable each V2V user to learn its policy using the shared global network reward.The effectiveness of the proposed approach is finally validated by comparing the obtained results with those of the other baseline approaches through extensive simulation experiments.
基金This project was supported by the National Natural Science Foundation of China (60172012) Hunan Provincial NaturalScience Foundation of China (03JJY3110) .
文摘The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, ( 1 ) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible.
文摘With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision support systems (DSS). To give an improved support to mobile business professionals, it is necessary to go further than just allowing a simple remote access to a Business Intelligence platform. In this paper, the need for actual context-aware mobile Geospatial Business Intelligence (GeoBI) systems that can help capture, filter, organize and structure the user mobile context is exposed and justified. Furthermore, since capturing, structuring, and modeling mobile contextual information is still a research issue, a wide inventory of existing research work on context and mobile context is provided. Then, step by step, we methodologically identify relevant contextual information to capture for mobility purposes as well as for BI needs, organize them into context-dimensions, and build a hierarchical mobile GeoBI context model which (1) is geo-spatial-extended, (2) fits with human perception of mobility, (3) takes into account the local context interactions and information-sharing with remote contexts, and (4) matches with the usual hierarchical aggregated structure of BI data.
文摘In the age of big data,plenty of valuable data have been shared to enhance scientific innovation,which,however,may disclose unexpected privacy leakage.Although numerous privacy preservation techniques have been proposed to conceal sensitive information,it is usually at the cost of the application utility reduction.In this paper,we present a data sharing scheme,which balances the application utility and privacy leakage for specific data sharing.To illustrate our scheme,smartphones’acceleration data have been adopted as an illustrative example.Experimental study has shown that sampling frequency play dominant roles in reducing privacy leakage with much less reduction on utility.
文摘In this paper we extend the one-on-one stochastic duel model with searching to the many-on-one case based on information-sharing. We have derived the probability density function of the time to kill the target in many-on-one model. It is illustrated by an example in which the firing time and the searching time are of different exponential distributions.
基金Supported by the National Natural Science Foun-dation of China (60403005 ,60573026)
文摘The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest, Shamir, Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols.
基金The National Natural Science Foundation of China(No.71371050)
文摘Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.
文摘This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable privacy creation tool for the authentication of real-life complex platforms.This research adjusts embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the images.The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality.The paper experimentation performance analysis shows that this improved image watermarking authentication(capacity)is averagely better by 33%–67%than other related exclusive-OR oriented and octagon approaches.Interestingly,these measurement improvements did not degrade the robustness and security of the system,inspiring our research for opening novel track of related future counting-based secret-sharing authentication progresses to come.
文摘Since the first publication describing the identification of prostate-specific antigen (PSA) in the 1960s, much progress has been made. The PSA test changed from being initially a monitoring tool to being also used as a diagnostic tool. Over time, the test has been heavily debated due to its lack of sensitivity and specificity. However, up to now the PSA test is still the only biomarker for the detection and monitoring of prostate cancer. PSA-based screening for prostate cancer is associated with a high proportion of unnecessary testing and overdiagnosis with subsequent overtreatment. In the early years of screening for prostate cancer, high rates of uptake were very important. However, over time the opinion on PSA-based screening has shifted towards the notion of informed choice. Nowadays, it is thought to be unethical to screen men without them being aware of the pros and cons of PSA testing, as well as the fact that an informed choice is related to better patient outcomes. Now, as the results of three major screening studies have been presented and the downsides of screening are becoming better understood, informed choice is becoming more relevant.
基金supported by the National Natural Science Foundation of China (61073183)the Natural Science Foundation for the Youth of Heilongjiang Province (QC2012C070)
文摘In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedback control information from the primary user is analyzed. An improved spectrum sharing algorithm based on the combination of the feedback control information and the optimization algorithm is proposed. The relaxation method is used to achieve the approximate spectrum sharing model, and the spectrum sharing strategy that satisfies the individual outage probability constraints can be obtained iteratively with the observed outage probability. Simulation results show that the proposed spectrum sharing algorithm can achieve the spectrum sharing strategy that satisfies the outage probability constraints and reduce the average outage probability without causing maximum transmission rate reduction of the secondary user.
文摘More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Urban air pollution is a serious environmental issue that poses adverse impacts on the health of people and the environment in most metropolitan areas. In this paper,we propose a geoinformatics augmented framework of environmental modelling and information sharing for supporting effective urban air pollution control and management. This framework is out-lined in terms of its key components and processes including: 1) an integrated,adaptive network of sensors for envi-ronmental monitoring; 2) a set of distributed,interoperable databases for data management; 3) a set of intelligent,robust algorithms and models for environmental modelling; 4) a set of flexible,efficient user interfaces for data access and in-formation sharing; and 5) a reliable,high capacity,high performance computing and communication infrastructure for integrating and supporting other framework components and processes.
文摘In the current paper, the authors investigate empirically the relationship between the share price volatility and the amount of voluntary information disclosed in the corporate annual report. The authors use the data envelopment analysis (DEA) and the stochastic frontier analysis (SFA) models on a sample of 50 listed French firms belonging to the Soci6t6s des Bourses Fran^aises (SBF250) index from 2004 to 2008. The authors focus on the extent of voluntary disclosure in the annual reports that have been measure by using a composite disclosure index. Then, the authors study the relevance of disclosure policies through the ability of the voluntary disclosure level to effectively reduce the share price volatility. The findings of DEA and SFA provide, in average, highly efficient scores of the sample, reveal the several dispositions taken by the French Exchange Market authorities and the initiative of French firms to improve the market stability. In addition, the findings highlight, in average, stability of the firms' efficiency scores over the studied period. The authors explain these findings by the stability of corporate disclosure policy as suggested in previous literature (e.g., Botosan, 1997). However, there are some differences between the findings of SFA and DEA models.
文摘With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterprise arises at the historic moment. The cooperation is a process which advantages the temporary enterprise resources each other. Therefore, the virtual enterprise must encounter the problem that how to realize the virtual enterprises’ information resources sharing and improve the efficiency of enterprise cooperation. This paper uses the cloud computing’s advantage to solve the problem of virtual enterprise information resources sharing. Then enterprise is able to share the information of different regions,different computing environment and improve the efficiency of virtual enterprise cooperation.