期刊文献+
共找到153,780篇文章
< 1 2 250 >
每页显示 20 50 100
Tackling Key Technological Problems and Advancing 5G Technology Application in Railway
1
作者 ZHOU Li ZHENG Mingda 《Chinese Railways》 2023年第1期3-12,共10页
The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technica... The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technical routes of railway next-generation mobile communication determined by China State Railway Group Co.,Ltd.From the aspects of work objectives,principles,technical routes and innovative working methods,the paper elaborates the ideas of railway 5G scientific and technological research,puts forward the contents and plans of scientific and technological research on railway 5G private network,systematically organizes the achievements in the scientific and technological research stage of railway 5G private network,and sets forth the key contents of next-step scientific and technological research. 展开更多
关键词 railway mobile communication system railway 5G private network tackling key problems in science and technology on 5G private network
下载PDF
Association of preschool children behavior and emotional problems with the parenting behavior of both parents 被引量:1
2
作者 Su-Mei Wang Shuang-Qin Yan +4 位作者 Fang-Fang Xie Zhi-Ling Cai Guo-Peng Gao Ting-Ting Weng Fang-Biao Tao 《World Journal of Clinical Cases》 SCIE 2024年第6期1084-1093,共10页
BACKGROUND Parental behaviors are key in shaping children’s psychological and behavioral development,crucial for early identification and prevention of mental health issues,reducing psychological trauma in childhood.... BACKGROUND Parental behaviors are key in shaping children’s psychological and behavioral development,crucial for early identification and prevention of mental health issues,reducing psychological trauma in childhood.AIM To investigate the relationship between parenting behaviors and behavioral and emotional issues in preschool children.METHODS From October 2017 to May 2018,7 kindergartens in Ma’anshan City were selected to conduct a parent self-filled questionnaire-Health Development Survey of Preschool Children.Children’s Strength and Difficulties Questionnaire(Parent Version)was applied to measures the children’s behavioral and emotional performance.Parenting behavior was evaluated using the Parental Behavior Inventory.Binomial logistic regression model was used to analyze the association between the detection rate of preschool children’s behavior and emotional problems and their parenting behaviors.RESULTS High level of parental support/participation was negatively correlated with conduct problems,abnormal hyperactivity,abnormal total difficulty scores and abnormal prosocial behavior problems.High level of maternal support/participation was negatively correlated with abnormal emotional symptoms and abnormal peer interaction in children.High level of parental hostility/coercion was positively correlated with abnormal emotional symptoms,abnormal conduct problems,abnormal hyperactivity,abnormal peer interaction,and abnormal total difficulty scores in children(all P<0.05).Moreover,paternal parenting behaviors had similarly effects on behavior and emotional problems of preschool children compared with maternal parenting behaviors(all P>0.05),after calculating ratio of odds ratio values.CONCLUSION Our study found that parenting behaviors are associated with behavioral and emotional issues in preschool children.Overall,the more supportive or involved the parents are,the fewer behavioral and emotional problems the children experience;conversely,the more hostile or controlling the parents are,the more behavioral and emotional problems the children face.Moreover,the impact of fathers’parenting behaviors on preschool children’s behavior and emotions is no less significant than that of mothers’parenting behaviors. 展开更多
关键词 CHILDREN Preschool age PARENTING BEHAVIORAL Parenting problems
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
3
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
A new quantum key distribution resource allocation and routing optimization scheme
4
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
A Key to Solving the Angle Trisection Problem
5
作者 Lyndon O. Barton 《Advances in Pure Mathematics》 2023年第9期625-634,共10页
This paper describes the methodology (or approach) that was key to the solution of the angle trisection problem published earlier in article entitled, “A Procedure For Trisecting An Acute Angle.” It was an approach ... This paper describes the methodology (or approach) that was key to the solution of the angle trisection problem published earlier in article entitled, “A Procedure For Trisecting An Acute Angle.” It was an approach that required first, designing a working model of a trisector mechanism, second, studying the motion of key elements of the mechanism and third, applying the fundamental principles of kinematics to arrive at the desired results. In presenting these results, since there was no requirement to provide a detailed analysis of the final construction, this information was not included. However, now that the publication is out, it is considered appropriate as well as instructive to explain more fully the mechanism analysis of the trisector in graphical detail, as covered in Section 3 of this paper, that formed the basis of the long sought solution to the age-old Angle Trisection Problem. 展开更多
关键词 Archimedes’ Construction College Geometry College Mathematics Angle Trisection Trisector Famous problems in Mathematics History of Mathematics Mechanism Analysis Kinematics Geometer’s Sketch Pad
下载PDF
Enhancing Critical Path Problem in Neutrosophic Environment Using Python
6
作者 M.Navya Pratyusha Ranjan Kumar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2957-2976,共20页
In the real world,one of the most common problems in project management is the unpredictability of resources and timelines.An efficient way to resolve uncertainty problems and overcome such obstacles is through an ext... In the real world,one of the most common problems in project management is the unpredictability of resources and timelines.An efficient way to resolve uncertainty problems and overcome such obstacles is through an extended fuzzy approach,often known as neutrosophic logic.Our rigorous proposed model has led to the creation of an advanced technique for computing the triangular single-valued neutrosophic number.This innovative approach evaluates the inherent uncertainty in project durations of the planning phase,which enhances the potential significance of the decision-making process in the project.Our proposed method,for the first time in the neutrosophic set literature,not only solves existing problems but also introduces a new set of problems not yet explored in previous research.A comparative study using Python programming was conducted to examine the effectiveness of responsive and adaptive planning,as well as their differences from other existing models such as the classical critical path problem and the fuzzy critical path problem.The study highlights the use of neutrosophic logic in handling complex projects by illustrating an innovative dynamic programming framework that is robust and flexible,according to the derived results,and sets the stage for future discussions on its scalability and application across different industries. 展开更多
关键词 Classical critical path problem fuzzy critical path problem uncertainty neutrosophic triangular single-valued neutrosophic number neutrosophic critical path problem python programming languag
下载PDF
A Comparative Study of Metaheuristic Optimization Algorithms for Solving Real-World Engineering Design Problems
7
作者 Elif Varol Altay Osman Altay Yusuf Ovik 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期1039-1094,共56页
Real-world engineering design problems with complex objective functions under some constraints are relatively difficult problems to solve.Such design problems are widely experienced in many engineering fields,such as ... Real-world engineering design problems with complex objective functions under some constraints are relatively difficult problems to solve.Such design problems are widely experienced in many engineering fields,such as industry,automotive,construction,machinery,and interdisciplinary research.However,there are established optimization techniques that have shown effectiveness in addressing these types of issues.This research paper gives a comparative study of the implementation of seventeen new metaheuristic methods in order to optimize twelve distinct engineering design issues.The algorithms used in the study are listed as:transient search optimization(TSO),equilibrium optimizer(EO),grey wolf optimizer(GWO),moth-flame optimization(MFO),whale optimization algorithm(WOA),slimemould algorithm(SMA),harris hawks optimization(HHO),chimp optimization algorithm(COA),coot optimization algorithm(COOT),multi-verse optimization(MVO),arithmetic optimization algorithm(AOA),aquila optimizer(AO),sine cosine algorithm(SCA),smell agent optimization(SAO),and seagull optimization algorithm(SOA),pelican optimization algorithm(POA),and coati optimization algorithm(CA).As far as we know,there is no comparative analysis of recent and popular methods against the concrete conditions of real-world engineering problems.Hence,a remarkable research guideline is presented in the study for researchersworking in the fields of engineering and artificial intelligence,especiallywhen applying the optimization methods that have emerged recently.Future research can rely on this work for a literature search on comparisons of metaheuristic optimization methods in real-world problems under similar conditions. 展开更多
关键词 Metaheuristic optimization algorithms real-world engineering design problems multidisciplinary design optimization problems
下载PDF
An Effective Meshless Approach for Inverse Cauchy Problems in 2D and 3D Electroelastic Piezoelectric Structures
8
作者 Ziqiang Bai Wenzhen Qu Guanghua Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2955-2972,共18页
In the past decade,notable progress has been achieved in the development of the generalized finite difference method(GFDM).The underlying principle of GFDM involves dividing the domain into multiple sub-domains.Within... In the past decade,notable progress has been achieved in the development of the generalized finite difference method(GFDM).The underlying principle of GFDM involves dividing the domain into multiple sub-domains.Within each sub-domain,explicit formulas for the necessary partial derivatives of the partial differential equations(PDEs)can be obtained through the application of Taylor series expansion and moving-least square approximation methods.Consequently,the method generates a sparse coefficient matrix,exhibiting a banded structure,making it highly advantageous for large-scale engineering computations.In this study,we present the application of the GFDM to numerically solve inverse Cauchy problems in two-and three-dimensional piezoelectric structures.Through our preliminary numerical experiments,we demonstrate that the proposed GFDMapproach shows great promise for accurately simulating coupled electroelastic equations in inverse problems,even with 3%errors added to the input data. 展开更多
关键词 Generalized finite difference method meshless method inverse Cauchy problems piezoelectric problems electroelastic analysis
下载PDF
Security analysis of satellite-to-ground reference-frame-independent quantum key distribution with beam wandering
9
作者 周淳 赵燕美 +11 位作者 杨晓亮 陆宜飞 周雨 姜晓磊 汪海涛 汪洋 李家骥 江木生 汪翔 张海龙 李宏伟 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期192-201,共10页
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance... The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks. 展开更多
关键词 quantum key distribution satellite-to-ground beam wandering
下载PDF
Reference-frame-independent quantum key distribution with two-way classical communication
10
作者 Chun Zhou Hai-Tao Wang +9 位作者 Yi-Fei Lu Xiao-Lei Jiang Yan-Mei Zhao Yu Zhou Yang Wang Jia-Ji Li Yan-Yang Zhou Xiang Wang Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期146-152,共7页
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In... The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest. 展开更多
关键词 quantum key distribution reference-frame-independent two-way classical communication
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
11
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
12
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
13
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 key nodes dynamic model industrial control network SIMULATION
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
14
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Highly Accurate Golden Section Search Algorithms and Fictitious Time Integration Method for Solving Nonlinear Eigenvalue Problems
15
作者 Chein-Shan Liu Jian-Hung Shen +1 位作者 Chung-Lun Kuo Yung-Wei Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1317-1335,共19页
This study sets up two new merit functions,which are minimized for the detection of real eigenvalue and complex eigenvalue to address nonlinear eigenvalue problems.For each eigen-parameter the vector variable is solve... This study sets up two new merit functions,which are minimized for the detection of real eigenvalue and complex eigenvalue to address nonlinear eigenvalue problems.For each eigen-parameter the vector variable is solved from a nonhomogeneous linear system obtained by reducing the number of eigen-equation one less,where one of the nonzero components of the eigenvector is normalized to the unit and moves the column containing that component to the right-hand side as a nonzero input vector.1D and 2D golden section search algorithms are employed to minimize the merit functions to locate real and complex eigenvalues.Simultaneously,the real and complex eigenvectors can be computed very accurately.A simpler approach to the nonlinear eigenvalue problems is proposed,which implements a normalization condition for the uniqueness of the eigenvector into the eigenequation directly.The real eigenvalues can be computed by the fictitious time integration method(FTIM),which saves computational costs compared to the one-dimensional golden section search algorithm(1D GSSA).The simpler method is also combined with the Newton iterationmethod,which is convergent very fast.All the proposed methods are easily programmed to compute the eigenvalue and eigenvector with high accuracy and efficiency. 展开更多
关键词 Nonlinear eigenvalue problem quadratic eigenvalue problem two new merit functions golden section search algorithm fictitious time integration method
下载PDF
Linking 24-h Movement Behavior Guidelines to Cognitive Difficulties,Internalizing and Externalizing Problems in Preterm Youth
16
作者 Zhihui Cheng Ailikute Aikeremu +6 位作者 Yanping Gao Zhihao Zhang Anthony G.Delli Paoli Paolo Marcello Cunha Alyx Taylor Fabian Herold Liye Zou 《International Journal of Mental Health Promotion》 2024年第8期651-662,共12页
Background:Given the heightened risk of developmental challenges associated with preterm birth,it is crucial to explore interventions that may ameliorate potential adverse outcomes.This study aimed to examine whether ... Background:Given the heightened risk of developmental challenges associated with preterm birth,it is crucial to explore interventions that may ameliorate potential adverse outcomes.This study aimed to examine whether meeting the 24-h movement behavior(24-HMB)guidelines,which include recommendations on physical activity(PA),screen time(ST),and sleep(SL),is related to indicators of cognitive difficulties,internalizing problems(e.g.,depression and anxiety),and externalizing problems(e.g.,difficulties in making friends and arguing)in a sample of preterm youth(children and adolescents born preterm).Methods:In this cross-sectional study,data from 3410 preterm youth(aged 6 to 17 years)were included for data analyses.Multivariable logistic regression was used to investigate associations between meeting the 24-HMB guidelines and the above-mentioned health outcomes,while controlling for sociodemographic and health-related factors.Results:The prevalence of meeting 24-HMB guidelines varied across independent and integrated components of the 24-HMB guidelines.Meeting the ST guideline alone(p<0.05)and integrated guidelines(i.e.,ST+SL and ST+SL+PA)were associated with fewer cognitive difficulties and reduced internalizing and externalizing problems(p<0.05).Specifically,meeting the SL guideline alone and integrated guidelines(i.e.,SL+ST)were associated with lower odds of depression and anxiety(p<0.01).Additionally,meeting independent,and integrated(PA and/or ST)guidelines were associated with less pronounced difficulties in making friends and arguing(p<0.05).Meeting 24-HMB guidelines in an isolated and integrated manner are linked to better cognitive performance and fewer internalizing and externalizing problems in preterm youth.Conclusion:Results suggest that advocating for the implementation of the 24-HMB guidelines may reduce cognitive challenges and behavioral issues,which is of high relevance for improving public health.Future longitudinal studies in preterm youth should investigate how modifying specific 24-HMB behaviors,especially ST,influence cognitive difficulties,internalizing and externalizing problems in this vulnerable population. 展开更多
关键词 Cognitive difficulties externalizing problems internalizing problems physical activity preterm youth
下载PDF
Identifying multidisciplinary problems from scientific publications based on a text generation method
17
作者 Ziyan Xu Hongqi Han +2 位作者 Linna Li Junsheng Zhang Zexu Zhou 《Journal of Data and Information Science》 CSCD 2024年第3期213-237,共25页
Purpose:A text generation based multidisciplinary problem identification method is proposed,which does not rely on a large amount of data annotation.Design/methodology/approach:The proposed method first identifies the... Purpose:A text generation based multidisciplinary problem identification method is proposed,which does not rely on a large amount of data annotation.Design/methodology/approach:The proposed method first identifies the research objective types and disciplinary labels of papers using a text classification technique;second,it generates abstractive titles for each paper based on abstract and research objective types using a generative pre-trained language model;third,it extracts problem phrases from generated titles according to regular expression rules;fourth,it creates problem relation networks and identifies the same problems by exploiting a weighted community detection algorithm;finally,it identifies multidisciplinary problems based on the disciplinary labels of papers.Findings:Experiments in the“Carbon Peaking and Carbon Neutrality”field show that the proposed method can effectively identify multidisciplinary research problems.The disciplinary distribution of the identified problems is consistent with our understanding of multidisciplinary collaboration in the field.Research limitations:It is necessary to use the proposed method in other multidisciplinary fields to validate its effectiveness.Practical implications:Multidisciplinary problem identification helps to gather multidisciplinary forces to solve complex real-world problems for the governments,fund valuable multidisciplinary problems for research management authorities,and borrow ideas from other disciplines for researchers.Originality/value:This approach proposes a novel multidisciplinary problem identification method based on text generation,which identifies multidisciplinary problems based on generative abstractive titles of papers without data annotation required by standard sequence labeling techniques. 展开更多
关键词 problem identification MULTIDISCIPLINARY Text generation Text classification
下载PDF
Optimal Shape Factor and Fictitious Radius in the MQ-RBF:Solving Ill-Posed Laplacian Problems
18
作者 Chein-Shan Liu Chung-Lun Kuo Chih-Wen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3189-3208,共20页
To solve the Laplacian problems,we adopt a meshless method with the multiquadric radial basis function(MQRBF)as a basis whose center is distributed inside a circle with a fictitious radius.A maximal projection techniq... To solve the Laplacian problems,we adopt a meshless method with the multiquadric radial basis function(MQRBF)as a basis whose center is distributed inside a circle with a fictitious radius.A maximal projection technique is developed to identify the optimal shape factor and fictitious radius by minimizing a merit function.A sample function is interpolated by theMQ-RBF to provide a trial coefficient vector to compute the merit function.We can quickly determine the optimal values of the parameters within a preferred rage using the golden section search algorithm.The novel method provides the optimal values of parameters and,hence,an optimal MQ-RBF;the performance of the method is validated in numerical examples.Moreover,nonharmonic problems are transformed to the Poisson equation endowed with a homogeneous boundary condition;this can overcome the problem of these problems being ill-posed.The optimal MQ-RBF is extremely accurate.We further propose a novel optimal polynomial method to solve the nonharmonic problems,which achieves high precision up to an order of 10^(−11). 展开更多
关键词 Laplace equation nonharmonic boundary value problem Ill-posed problem maximal projection optimal shape factor and fictitious radius optimal MQ-RBF optimal polynomial method
下载PDF
Oscillation properties of eigenfunctions for Sturm-Liouville problems with interface conditions via Prufer transformation
19
作者 LI Zhi-yu LI Kun +2 位作者 CAI Jin-ming QIN Jian-fang ZHENG Zhao-wen 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2024年第2期191-200,共10页
A class of Sturm-Liouville problems with discontinuity is studied in this paper.The oscillation properties of eigenfunctions for Sturm-Liouville problems with interface conditions are obtained.The main method used in ... A class of Sturm-Liouville problems with discontinuity is studied in this paper.The oscillation properties of eigenfunctions for Sturm-Liouville problems with interface conditions are obtained.The main method used in this paper is based on Prufer transformation,which is different from the classical ones.Moreover,we give two examples to verify our main results. 展开更多
关键词 Sturm-Liouville problem interface condition oscillatory solution
下载PDF
ON THE CAUCHY PROBLEM FOR THE GENERALIZED BOUSSINESQ EQUATION WITH A DAMPED TERM
20
作者 Xiao SU Shubin WANG 《Acta Mathematica Scientia》 SCIE CSCD 2024年第5期1766-1786,共21页
This paper is devoted to the Cauchy problem for the generalized damped Boussinesq equation with a nonlinear source term in the natural energy space.With the help of linear time-space estimates,we establish the local e... This paper is devoted to the Cauchy problem for the generalized damped Boussinesq equation with a nonlinear source term in the natural energy space.With the help of linear time-space estimates,we establish the local existence and uniqueness of solutions by means of the contraction mapping principle.The global existence and blow-up of the solutions at both subcritical and critical initial energy levels are obtained.Moreover,we construct the sufficient conditions of finite time blow-up of the solutions with arbitrary positive initial energy. 展开更多
关键词 damped Boussinesq equation Cauchy problem global solutions BLOW-UP
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部