Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s...Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security.展开更多
Parkinson’s disease can affect not only motor functions but also cognitive abilities,leading to cognitive impairment.One common issue in Parkinson’s disease with cognitive dysfunction is the difficulty in executive ...Parkinson’s disease can affect not only motor functions but also cognitive abilities,leading to cognitive impairment.One common issue in Parkinson’s disease with cognitive dysfunction is the difficulty in executive functioning.Executive functions help us plan,organize,and control our actions based on our goals.The brain area responsible for executive functions is called the prefrontal co rtex.It acts as the command center for the brain,especially when it comes to regulating executive functions.The role of the prefrontal cortex in cognitive processes is influenced by a chemical messenger called dopamine.However,little is known about how dopamine affects the cognitive functions of patients with Parkinson’s disease.In this article,the authors review the latest research on this topic.They start by looking at how the dopaminergic syste m,is alte red in Parkinson’s disease with executive dysfunction.Then,they explore how these changes in dopamine impact the synaptic structure,electrical activity,and connection components of the prefrontal cortex.The authors also summarize the relationship between Parkinson’s disease and dopamine-related cognitive issues.This information may offer valuable insights and directions for further research and improvement in the clinical treatment of cognitive impairment in Parkinson’s disease.展开更多
The present study aims to establish a literature review on intervention programs for executive functions(EFs)through the use of fundamental motor skills,from a neuropsychopedagogical perspective in subjects with Devel...The present study aims to establish a literature review on intervention programs for executive functions(EFs)through the use of fundamental motor skills,from a neuropsychopedagogical perspective in subjects with Developmental Coordination Disorder(DCD).An exploratory study was carried out through an integrative literature review.The research was carried out in the Scientific databases Electronic Library Online(SciELO),Latin American and Caribbean Literature in Health Sciences(LILACS),Virtual Health Library-Psychology Brazil(BVSPSI),Electronic Journals of Psychology(PePSIC),in the periodicals available in the Brazilian Digital Library of Theses and Dissertations(BDTD)and on the website of the Coordination for the Improvement of Higher Education Personnel(CAPES).The covering publications took place from 2018 to 2023,14 articles were selected for analysis.This literature review made it possible to create strategies for stimulating EF and Visuomotor Functions so that educators and other professionals can better deal with students with DCD.It was perceived the need to carry out and develop more empirical research regarding the intervention of EFs and Visuomotor Functions by educators and professionals,with a greater sampling amplitude,to increase the number of studies that enable interventions both in children and in teenagers with DCD.展开更多
The recent increase in the use of artificial intelligence has led to fundamental changes in the development of training and teaching methods for executive education. However, the success of artificial intelligence in ...The recent increase in the use of artificial intelligence has led to fundamental changes in the development of training and teaching methods for executive education. However, the success of artificial intelligence in regional centers for teaching and training professions will depend on the acceptance of this technology by young executive trainees. This article discusses the potential benefits of adopting AI in executive training institutions in Morocco, specifically focusing on CRMEF Casablanca Settat. Based on the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al., 2003), this study proposes a model to identify the factors influencing the acceptance of artificial intelligence in regional centers for teaching professions and training in Morocco. To achieve this, a structural equation modeling approach was used to quantitatively describe the impact of each factor on AI adoption, utilizing data collected from 173 young executive trainees. The results indicate that perceived ease of use, perceived usefulness, trainer influence, and personal innovativeness influence the intention to use artificial intelligence. Our research provides managers of CRMEFs with a set of practical recommendations to enhance the implementation conditions of an artificial intelligence system. It aims to understand which factors should be considered in designing an artificial intelligence system within regional centers for teaching professions and training (CRMEFs).展开更多
BACKGROUND Intracerebral hemorrhage mainly occurs in middle-aged and elderly patients with hypertension,and surgery is currently the main treatment for hypertensive cerebral hemorrhage,but the bleeding caused by surge...BACKGROUND Intracerebral hemorrhage mainly occurs in middle-aged and elderly patients with hypertension,and surgery is currently the main treatment for hypertensive cerebral hemorrhage,but the bleeding caused by surgery will cause damage to the patient's nerve cells,resulting in cognitive and motor dysfunction,resulting in a decline in the patient's quality of life.AIM To investigate associations between cerebral arterial blood flow and executive and cognitive functions in depressed patients after acute hypertensive cerebral hemorrhage.METHODS Eighty-nine patients with depression after acute hypertensive cerebral hemorrhage who were admitted to our hospital between January 2019 and July 2021 were selected as the observation group,while 100 patients without depression who had acute hypertensive cerebral hemorrhage were selected as the control group.The attention span of the patients was assessed using the Paddle Pin Test while executive function was assessed using the Wisconsin Card Sorting Test(WCST)and cognitive function was assessed using the Montreal Cognitive Assessment Scale(MoCA).The Hamilton Depression Rating Scale(HAMD-24)was used to evaluate the severity of depression of involved patients.Cerebral arterial blood flow was measured in both groups.RESULTS The MoCA score,net scores I,II,III,IV,and the total net score of the scratch test in the observation group were significantly lower than those in the control group(P<0.05).Concurrently,the total number of responses,number of incorrect responses,number of persistent errors,and number of completed responses of the first classification in the WCST test were significantly higher in the observation group than those in the control group(P<0.05).Blood flow in the basilar artery,left middle cerebral artery,right middle cerebral artery,left anterior cerebral artery,and right anterior cerebral artery was significantly lower in the observation group than in the control group(P<0.05).The basilar artery,left middle cerebral artery,right middle cerebral artery,left anterior cerebral artery,and right anterior cerebral artery were positively correlated with the net and total net scores of each part of the Paddle Pin test and the MoCA score(P<0.05),and negatively correlated with each part of the WCST test(P<0.05).In the observation group,the post-treatment improvement was more prominent in the Paddle Pin test,WCST test,HAMD-24 score,and MoCA score compared with those in the pre-treatment period(P<0.05).Blood flow in the basilar artery,left middle cerebral artery,right middle cerebral artery,left anterior cerebral artery,and right anterior cerebral artery significantly improved in the observation group after treatment(P<0.05).CONCLUSION Impaired attention,and executive and cognitive functions are correlated with cerebral artery blood flow in patients with depression after acute hypertensive cerebral hemorrhage and warrant further study.展开更多
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins...The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.展开更多
Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, d...Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) .展开更多
Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal ba...Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data.展开更多
In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case select...In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case selection method for web application regression testing based on the control flow graph.This method is safe enough to the test case selection.On the base of features of request sequence in web application,the minimization technique and the priority of test cases are taken into consideration in the process of execution of test cases in regression testing for web application.The improved greedy algorithm is also raised resulting in optimization of execution of test cases.The experiments indicate that the number of test cases which need to be retested is reduced,and the efficiency of execution of test cases is also improved.展开更多
The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and produ...The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and production information management system. The functions andthe web-based architecture of the MES in the extended enterprise are introduced. Using thecooperating system models of object-oriented and distributed agents and CORBA, all objects keep touniform interface standards and are easily inserted to object request broker. The utilization ofdistributed MES in extended enterprise can adapt fast change of manufacturing environment andresource. It also can improve the independent management capability of manufacturing cell and theenterprise response capability to global economic competition.展开更多
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle...Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM.展开更多
The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow m...The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow model with the production processes. A dynamic material-flow model is proposed in this paper after an analysis of the material-flow characteristics of the production process in a petrochemical industry. The main material-flow events are described, including the movement, storage, shifting, recycling, and elimination of the materials. The spatial and temporal characters of the material-flow events are described, and the material-flow model is constructed. The dynamic material-flow model introduced herein is the basis for other subsystems in the MES. In addition, it is the subsystem with the least scale in MES. The dynamic-modeling method of material flow has been applied in the development of the SinoMES model. It helps the petrochemical plant to manage the entire flow information related to tanks and equipments from the aspects of measurement, storage, movement, and the remaining balance of the material. As a result, it matches the production process by error elimination and data reconciliation. In addition, it facilitates the integration of application modules into the MES and guarantees the potential development of SinoMES in future applications.展开更多
As data volume grows, many enterprises are considering using MapReduce for its simplicity. However, how to evaluate the performance improvement before deployment is still an issue. Current researches of MapReduce perf...As data volume grows, many enterprises are considering using MapReduce for its simplicity. However, how to evaluate the performance improvement before deployment is still an issue. Current researches of MapReduce performance are mainly based on monitoring and simulation, and lack mathematical models. In this paper, we present a simple but powerful performance model for the prediction of the execution time of a MapReduce program with limited resources. We study each component of MapReduce framework, and analyze the relation between the overall performance and the number of mappers and reducers based on our model. Two typical MapReduce programs are evaluated in a small cluster with 13 nodes. Experimental results show that the mathematical performance model can estimate the execution time of MapReduce programs reliably. According to our model, number of mappers and reducers can be tuned to form a better execution pipeline and lead to better performance. The model also points out potential bottlenecks of the framework and future improvement.展开更多
The first floating platform concept design work for South China Sea is undergoing in DMAR's office now. This tension leg platform has potential to become the first advanced floating production platform project. Pr...The first floating platform concept design work for South China Sea is undergoing in DMAR's office now. This tension leg platform has potential to become the first advanced floating production platform project. Project execution is always a challenge for floating system. This paper focuses on the critical elements of project execution for tension leg platform,and studies potential implications to future oil and gas exploration in South China Sea. There are many factors affecting successful execution of floating system project,including technical issues, engineering management,interface management,etc. There are also failure examples of project execution in the industry. The author has participated 28 large detailed projects and has gained extensive experience on floating projects,with ample hands-on project experiences. A detailed tension leg platform project study example and discussions in depth are presented for future project execution in China deepwater development.展开更多
Mold manufacturing Extended Enterprise (EE) has the following characteristics: distributed in locality, tight cooperation and frequent information exchange. It needs a collaborative, highly efficient, reliable and ...Mold manufacturing Extended Enterprise (EE) has the following characteristics: distributed in locality, tight cooperation and frequent information exchange. It needs a collaborative, highly efficient, reliable and intelligent manufacturing management system. The background of the Collaborative Manufacturing is introduced. A mold Collaborative Manufacturing Execution System (c-MES) is proposed. The feature of Web Service platform is analyzed. The necessity and feasibility of importing the Web Service to mold c-MES are discussed. Based on Web Service, the model of mold c-MES is built. Every module' s function is described in detail, including the functions it supplies and the mechanism of information interaction among them. The feasibility of mold c-MES model is validated by a real mold manufacturing case.展开更多
Agile manufacturing execution systems (AMES) are used to help manufacturers optimize shop floor production in an agile way. And the modeling of AMES is the key issue of realizing AMES. This paper presents an agent-bas...Agile manufacturing execution systems (AMES) are used to help manufacturers optimize shop floor production in an agile way. And the modeling of AMES is the key issue of realizing AMES. This paper presents an agent-based approach to AMES modeling. Firstly, the characteristics of AMES and its requirements on modeling are discussed. Secondly, a comparative analysis of modeling methods is carried out, and AMES modeling using an agent-based approach is put forward. Agent-based modeling method not only inherit the favorable features of traditional object-oriented modeling method such as data encapsulation, modularity and so on, but also has the ability to construct intelligent, rational and autonomous agent which can cooperate together to realize the goal of agile operation. A general agent architecture used in AMES modeling is described. Under this architecture, an agent can be divided into domain-independent components and domain-specific components which helps solve problems such as information overload, incomplete information handling and soft decision-making. Furthermore, an AMES model using four types of agents, i.e., interface agent, information agent, resource agent and management agent, is established. Thirdly, a snapshot of AMES model is provided in the case study. Especially, an agent-based cooperating process of task scheduling in AMES is illustrated in detail. Finally, the advantages and disadvantages of this modeling approach are discussed as well.展开更多
We present a trading execution model that describes the behaviour of a big trader and of a multitude of retail traders operating on the shares of a risky asset. The retail traders are modeled as a population of “cons...We present a trading execution model that describes the behaviour of a big trader and of a multitude of retail traders operating on the shares of a risky asset. The retail traders are modeled as a population of “conservative” investors that: 1) behave in a similar way, 2) try to avoid abrupt changes in their trading strategies, 3) want to limit the risk due to the fact of having open positions on the asset shares, 4) in the long run want to have a given position on the asset shares. The big trader wants to maximize the revenue resulting from the action of buying or selling a (large) block of asset shares in a given time interval. The behaviour of the retail traders and of the big trader is modeled using respectively a mean field game model and an optimal control problem. These models are coupled by the asset share price dynamic equation. The trading execution strategy adopted by the retail traders is obtained solving the mean field game model. This strategy is used to formulate the optimal control problem that determines the behaviour of the big trader. The previous mathematical models are solved using the dynamic programming principle. In some special cases explicit solutions of the previous models are found. An extensive numerical study of the trading execution model proposed is presented. The interested reader is referred to the website: http://www.econ.univpm.it/recchioni/finance/w19 to find material including animations, an interactive application and an app that helps the understanding of the paper. A general reference to the work of the authors and of their coauthors in mathematical finance is the website:?http://www.econ.univpm.it/recchioni/finance.展开更多
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend ag...As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend against known and even unknown vulnerability-based attacks without relying on attack feature information.However,variants generated with software diversity technologies will introduce new vulnerabilities when they execute in parallel.First,we analyze the security of MVX theory from the perspective of formal description.Then we summarize the general forms and techniques for attacks against MVX,and analyze the new vulnerabilities arising from the combination of variant generation technologies.We propose SecMVX,a secure MVX architecture and variant generation technology.Experimental evaluations based on CVEs and SPEC 2006 benchmark show that SecMVX introduces 11.29%of the average time overhead,and avoids vulnerabilities caused by the improper combination of variant generation technologies while keeping the defensive ability of MVX.展开更多
In order to solve some deficiencies in tentacle execution, an improved execution method of tentacle algo- rithm is presented. The method uses a short trajectory to match the curvature between the path of vehicle and t...In order to solve some deficiencies in tentacle execution, an improved execution method of tentacle algo- rithm is presented. The method uses a short trajectory to match the curvature between the path of vehicle and ten- tacle, rather than computing a whole steady state. To control vehicle motion via wheel force and steering angle, two parameters should be discretized under certain area and these discrete values can form 18 5〈 20 groups. Then the curvature between the trajectory and tentacle should be matched, and the corresponding group of wheel force and steering angle can be found. The flow chart of the improved execution method is given, and simulation is per- formed on a platform named "pro-sivic". The simulation results show that the improved method can maintain the advantage of the tentacle algorithm in terms of computation speed, and avoid the errors such as endless loop and data overflow, which proves the method more efficient.展开更多
This paper presents the notion of the global execution context of a task as a representational construct for analysing complexity in software evolution. Based on this notion a visual notation and a supporting tool are...This paper presents the notion of the global execution context of a task as a representational construct for analysing complexity in software evolution. Based on this notion a visual notation and a supporting tool are presented to support specification of a system’s global execution context. A system’s global execution context is conceived as an evolving network of use scenarios depicted by nodes and links designating semantic relationships between scenarios. A node represents either a base or a growth scenario. Directed links characterize the transition from one node to another by means of semantic scenario relationships. Each growth scenario is generated following a critique (or screening) of one or more base or reference scenarios. Subsequently, representative growth scenarios are compiled and consolidated in the global execution context graph. The paper describes the stages of this process, presents the tool designed to facilitate the construction of the global execution context graph and elaborates on recent practice and experience.展开更多
基金This work was partly supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea Government(MSIT),(No.2020-0-00952,Development of 5G edge security technology for ensuring 5G+service stability and availability,50%)the Institute of Information and Communications Technology Planning and Evaluation(IITP)grant funded by the MSIT(Ministry of Science and ICT),Korea(No.IITP-2022-2020-0-01602,ITRC(Information Technology Research Center)support program,50%).
文摘Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security.
基金supported by the National Natural Science Foundation of China,No.82101263Jiangsu Province Science Foundation for Youths,No.BK20210903Research Foundation for Talented Scholars of Xuzhou Medical University,No.RC20552114(all to CT)。
文摘Parkinson’s disease can affect not only motor functions but also cognitive abilities,leading to cognitive impairment.One common issue in Parkinson’s disease with cognitive dysfunction is the difficulty in executive functioning.Executive functions help us plan,organize,and control our actions based on our goals.The brain area responsible for executive functions is called the prefrontal co rtex.It acts as the command center for the brain,especially when it comes to regulating executive functions.The role of the prefrontal cortex in cognitive processes is influenced by a chemical messenger called dopamine.However,little is known about how dopamine affects the cognitive functions of patients with Parkinson’s disease.In this article,the authors review the latest research on this topic.They start by looking at how the dopaminergic syste m,is alte red in Parkinson’s disease with executive dysfunction.Then,they explore how these changes in dopamine impact the synaptic structure,electrical activity,and connection components of the prefrontal cortex.The authors also summarize the relationship between Parkinson’s disease and dopamine-related cognitive issues.This information may offer valuable insights and directions for further research and improvement in the clinical treatment of cognitive impairment in Parkinson’s disease.
文摘The present study aims to establish a literature review on intervention programs for executive functions(EFs)through the use of fundamental motor skills,from a neuropsychopedagogical perspective in subjects with Developmental Coordination Disorder(DCD).An exploratory study was carried out through an integrative literature review.The research was carried out in the Scientific databases Electronic Library Online(SciELO),Latin American and Caribbean Literature in Health Sciences(LILACS),Virtual Health Library-Psychology Brazil(BVSPSI),Electronic Journals of Psychology(PePSIC),in the periodicals available in the Brazilian Digital Library of Theses and Dissertations(BDTD)and on the website of the Coordination for the Improvement of Higher Education Personnel(CAPES).The covering publications took place from 2018 to 2023,14 articles were selected for analysis.This literature review made it possible to create strategies for stimulating EF and Visuomotor Functions so that educators and other professionals can better deal with students with DCD.It was perceived the need to carry out and develop more empirical research regarding the intervention of EFs and Visuomotor Functions by educators and professionals,with a greater sampling amplitude,to increase the number of studies that enable interventions both in children and in teenagers with DCD.
文摘The recent increase in the use of artificial intelligence has led to fundamental changes in the development of training and teaching methods for executive education. However, the success of artificial intelligence in regional centers for teaching and training professions will depend on the acceptance of this technology by young executive trainees. This article discusses the potential benefits of adopting AI in executive training institutions in Morocco, specifically focusing on CRMEF Casablanca Settat. Based on the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al., 2003), this study proposes a model to identify the factors influencing the acceptance of artificial intelligence in regional centers for teaching professions and training in Morocco. To achieve this, a structural equation modeling approach was used to quantitatively describe the impact of each factor on AI adoption, utilizing data collected from 173 young executive trainees. The results indicate that perceived ease of use, perceived usefulness, trainer influence, and personal innovativeness influence the intention to use artificial intelligence. Our research provides managers of CRMEFs with a set of practical recommendations to enhance the implementation conditions of an artificial intelligence system. It aims to understand which factors should be considered in designing an artificial intelligence system within regional centers for teaching professions and training (CRMEFs).
文摘BACKGROUND Intracerebral hemorrhage mainly occurs in middle-aged and elderly patients with hypertension,and surgery is currently the main treatment for hypertensive cerebral hemorrhage,but the bleeding caused by surgery will cause damage to the patient's nerve cells,resulting in cognitive and motor dysfunction,resulting in a decline in the patient's quality of life.AIM To investigate associations between cerebral arterial blood flow and executive and cognitive functions in depressed patients after acute hypertensive cerebral hemorrhage.METHODS Eighty-nine patients with depression after acute hypertensive cerebral hemorrhage who were admitted to our hospital between January 2019 and July 2021 were selected as the observation group,while 100 patients without depression who had acute hypertensive cerebral hemorrhage were selected as the control group.The attention span of the patients was assessed using the Paddle Pin Test while executive function was assessed using the Wisconsin Card Sorting Test(WCST)and cognitive function was assessed using the Montreal Cognitive Assessment Scale(MoCA).The Hamilton Depression Rating Scale(HAMD-24)was used to evaluate the severity of depression of involved patients.Cerebral arterial blood flow was measured in both groups.RESULTS The MoCA score,net scores I,II,III,IV,and the total net score of the scratch test in the observation group were significantly lower than those in the control group(P<0.05).Concurrently,the total number of responses,number of incorrect responses,number of persistent errors,and number of completed responses of the first classification in the WCST test were significantly higher in the observation group than those in the control group(P<0.05).Blood flow in the basilar artery,left middle cerebral artery,right middle cerebral artery,left anterior cerebral artery,and right anterior cerebral artery was significantly lower in the observation group than in the control group(P<0.05).The basilar artery,left middle cerebral artery,right middle cerebral artery,left anterior cerebral artery,and right anterior cerebral artery were positively correlated with the net and total net scores of each part of the Paddle Pin test and the MoCA score(P<0.05),and negatively correlated with each part of the WCST test(P<0.05).In the observation group,the post-treatment improvement was more prominent in the Paddle Pin test,WCST test,HAMD-24 score,and MoCA score compared with those in the pre-treatment period(P<0.05).Blood flow in the basilar artery,left middle cerebral artery,right middle cerebral artery,left anterior cerebral artery,and right anterior cerebral artery significantly improved in the observation group after treatment(P<0.05).CONCLUSION Impaired attention,and executive and cognitive functions are correlated with cerebral artery blood flow in patients with depression after acute hypertensive cerebral hemorrhage and warrant further study.
文摘The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.
基金The National Natural Science Foundation of China (59990470).
文摘Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) .
基金The National Natural Science Foundation of China(No.61070170)the Natural Science Foundation of Higher Education Institutions of Jiangsu Province(No.11KJB520017)Suzhou Application Foundation Research Project(No.SYG201238)
文摘Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data.
基金The National Natural Science Foundation of China(No.60503020,60503033,60703086)Opening Foundation of Jiangsu Key Laboratory of Computer Information Processing Technology in Soochow University(No.KJS0714)
文摘In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case selection method for web application regression testing based on the control flow graph.This method is safe enough to the test case selection.On the base of features of request sequence in web application,the minimization technique and the priority of test cases are taken into consideration in the process of execution of test cases in regression testing for web application.The improved greedy algorithm is also raised resulting in optimization of execution of test cases.The experiments indicate that the number of test cases which need to be retested is reduced,and the efficiency of execution of test cases is also improved.
文摘The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and production information management system. The functions andthe web-based architecture of the MES in the extended enterprise are introduced. Using thecooperating system models of object-oriented and distributed agents and CORBA, all objects keep touniform interface standards and are easily inserted to object request broker. The utilization ofdistributed MES in extended enterprise can adapt fast change of manufacturing environment andresource. It also can improve the independent management capability of manufacturing cell and theenterprise response capability to global economic competition.
文摘Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM.
基金the National High Technology Research and Development Program of China (No.2007AA04Z191).
文摘The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow model with the production processes. A dynamic material-flow model is proposed in this paper after an analysis of the material-flow characteristics of the production process in a petrochemical industry. The main material-flow events are described, including the movement, storage, shifting, recycling, and elimination of the materials. The spatial and temporal characters of the material-flow events are described, and the material-flow model is constructed. The dynamic material-flow model introduced herein is the basis for other subsystems in the MES. In addition, it is the subsystem with the least scale in MES. The dynamic-modeling method of material flow has been applied in the development of the SinoMES model. It helps the petrochemical plant to manage the entire flow information related to tanks and equipments from the aspects of measurement, storage, movement, and the remaining balance of the material. As a result, it matches the production process by error elimination and data reconciliation. In addition, it facilitates the integration of application modules into the MES and guarantees the potential development of SinoMES in future applications.
基金supported by CHB Project "Unstructured Data Management System" under Grant No.2010ZX01042-002-003
文摘As data volume grows, many enterprises are considering using MapReduce for its simplicity. However, how to evaluate the performance improvement before deployment is still an issue. Current researches of MapReduce performance are mainly based on monitoring and simulation, and lack mathematical models. In this paper, we present a simple but powerful performance model for the prediction of the execution time of a MapReduce program with limited resources. We study each component of MapReduce framework, and analyze the relation between the overall performance and the number of mappers and reducers based on our model. Two typical MapReduce programs are evaluated in a small cluster with 13 nodes. Experimental results show that the mathematical performance model can estimate the execution time of MapReduce programs reliably. According to our model, number of mappers and reducers can be tuned to form a better execution pipeline and lead to better performance. The model also points out potential bottlenecks of the framework and future improvement.
文摘The first floating platform concept design work for South China Sea is undergoing in DMAR's office now. This tension leg platform has potential to become the first advanced floating production platform project. Project execution is always a challenge for floating system. This paper focuses on the critical elements of project execution for tension leg platform,and studies potential implications to future oil and gas exploration in South China Sea. There are many factors affecting successful execution of floating system project,including technical issues, engineering management,interface management,etc. There are also failure examples of project execution in the industry. The author has participated 28 large detailed projects and has gained extensive experience on floating projects,with ample hands-on project experiences. A detailed tension leg platform project study example and discussions in depth are presented for future project execution in China deepwater development.
文摘Mold manufacturing Extended Enterprise (EE) has the following characteristics: distributed in locality, tight cooperation and frequent information exchange. It needs a collaborative, highly efficient, reliable and intelligent manufacturing management system. The background of the Collaborative Manufacturing is introduced. A mold Collaborative Manufacturing Execution System (c-MES) is proposed. The feature of Web Service platform is analyzed. The necessity and feasibility of importing the Web Service to mold c-MES are discussed. Based on Web Service, the model of mold c-MES is built. Every module' s function is described in detail, including the functions it supplies and the mechanism of information interaction among them. The feasibility of mold c-MES model is validated by a real mold manufacturing case.
文摘Agile manufacturing execution systems (AMES) are used to help manufacturers optimize shop floor production in an agile way. And the modeling of AMES is the key issue of realizing AMES. This paper presents an agent-based approach to AMES modeling. Firstly, the characteristics of AMES and its requirements on modeling are discussed. Secondly, a comparative analysis of modeling methods is carried out, and AMES modeling using an agent-based approach is put forward. Agent-based modeling method not only inherit the favorable features of traditional object-oriented modeling method such as data encapsulation, modularity and so on, but also has the ability to construct intelligent, rational and autonomous agent which can cooperate together to realize the goal of agile operation. A general agent architecture used in AMES modeling is described. Under this architecture, an agent can be divided into domain-independent components and domain-specific components which helps solve problems such as information overload, incomplete information handling and soft decision-making. Furthermore, an AMES model using four types of agents, i.e., interface agent, information agent, resource agent and management agent, is established. Thirdly, a snapshot of AMES model is provided in the case study. Especially, an agent-based cooperating process of task scheduling in AMES is illustrated in detail. Finally, the advantages and disadvantages of this modeling approach are discussed as well.
文摘We present a trading execution model that describes the behaviour of a big trader and of a multitude of retail traders operating on the shares of a risky asset. The retail traders are modeled as a population of “conservative” investors that: 1) behave in a similar way, 2) try to avoid abrupt changes in their trading strategies, 3) want to limit the risk due to the fact of having open positions on the asset shares, 4) in the long run want to have a given position on the asset shares. The big trader wants to maximize the revenue resulting from the action of buying or selling a (large) block of asset shares in a given time interval. The behaviour of the retail traders and of the big trader is modeled using respectively a mean field game model and an optimal control problem. These models are coupled by the asset share price dynamic equation. The trading execution strategy adopted by the retail traders is obtained solving the mean field game model. This strategy is used to formulate the optimal control problem that determines the behaviour of the big trader. The previous mathematical models are solved using the dynamic programming principle. In some special cases explicit solutions of the previous models are found. An extensive numerical study of the trading execution model proposed is presented. The interested reader is referred to the website: http://www.econ.univpm.it/recchioni/finance/w19 to find material including animations, an interactive application and an app that helps the understanding of the paper. A general reference to the work of the authors and of their coauthors in mathematical finance is the website:?http://www.econ.univpm.it/recchioni/finance.
基金National Key Research and Development Program of China(Grant No.2018YF0804003)the National Key Research and Development Program of China under Grant No.2017YFB0803204.
文摘As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend against known and even unknown vulnerability-based attacks without relying on attack feature information.However,variants generated with software diversity technologies will introduce new vulnerabilities when they execute in parallel.First,we analyze the security of MVX theory from the perspective of formal description.Then we summarize the general forms and techniques for attacks against MVX,and analyze the new vulnerabilities arising from the combination of variant generation technologies.We propose SecMVX,a secure MVX architecture and variant generation technology.Experimental evaluations based on CVEs and SPEC 2006 benchmark show that SecMVX introduces 11.29%of the average time overhead,and avoids vulnerabilities caused by the improper combination of variant generation technologies while keeping the defensive ability of MVX.
文摘In order to solve some deficiencies in tentacle execution, an improved execution method of tentacle algo- rithm is presented. The method uses a short trajectory to match the curvature between the path of vehicle and ten- tacle, rather than computing a whole steady state. To control vehicle motion via wheel force and steering angle, two parameters should be discretized under certain area and these discrete values can form 18 5〈 20 groups. Then the curvature between the trajectory and tentacle should be matched, and the corresponding group of wheel force and steering angle can be found. The flow chart of the improved execution method is given, and simulation is per- formed on a platform named "pro-sivic". The simulation results show that the improved method can maintain the advantage of the tentacle algorithm in terms of computation speed, and avoid the errors such as endless loop and data overflow, which proves the method more efficient.
文摘This paper presents the notion of the global execution context of a task as a representational construct for analysing complexity in software evolution. Based on this notion a visual notation and a supporting tool are presented to support specification of a system’s global execution context. A system’s global execution context is conceived as an evolving network of use scenarios depicted by nodes and links designating semantic relationships between scenarios. A node represents either a base or a growth scenario. Directed links characterize the transition from one node to another by means of semantic scenario relationships. Each growth scenario is generated following a critique (or screening) of one or more base or reference scenarios. Subsequently, representative growth scenarios are compiled and consolidated in the global execution context graph. The paper describes the stages of this process, presents the tool designed to facilitate the construction of the global execution context graph and elaborates on recent practice and experience.