Runge-Kutta scheme is one of the versatile numerical tools for the simulation of engineering systems. Despite its wide and acceptable engineering use, there is dearth of relevant literature bordering on visual impress...Runge-Kutta scheme is one of the versatile numerical tools for the simulation of engineering systems. Despite its wide and acceptable engineering use, there is dearth of relevant literature bordering on visual impression possibility among different schemes coefficients which is the strong motivation for the present investigation of the third and fourth order schemes. The present study capitalise on results of tedious computation involving Taylor series expansion equivalent supplemented with Butcher assumptions and constraint equations of well-known works which captures the essential relationship between the coefficients. The simulation proceeds from random but valid specification of two out of the total coefficients possible per scheme. However the remaining coefficients are evaluated with application of appropriate function relationship. Eight and thirteen unknown coefficients were simulated respectively for third and fourth schemes over a total of five thousand cases each for relevant distribution statistics and scatter plots analysis for the purpose of scheme comparison and visual import. The respective three and four coefficients of the slope estimate for the third and fourth schemes have mix sign for large number of simulated cases. However, none of the two schemes have above three of these coefficients lesser than zero. The percentages of simulation results with two coefficients lesser than zero dominate and are respectively 56.88 and 77.10 for third and fourth schemes. It was observed that both popular third and fourth schemes belong to none of the coefficients being zero classification with respective percentage of 0.72 and 3.28 intotal simulated cases. The comparisons of corresponding scatter plots are visually exciting. The overall difference between corresponding scatter plots and distribution results can be used to justify the accuracy of fourth scheme over its counterpart third scheme.展开更多
The car-following behavior can be influenced by its driver’s backward-looking effect.Especially in traffic congestion,if vehicles adjust the headway by considering backward-looking effect,the stability of traffic flo...The car-following behavior can be influenced by its driver’s backward-looking effect.Especially in traffic congestion,if vehicles adjust the headway by considering backward-looking effect,the stability of traffic flow can be enhanced.A model of car-following behavior considering backward-looking effect was built using visual information as a stimulus.The critical stability conditions were derived by linear and nonlinear stability analyses.The results of parameter sensitivity analysis indicate that the stability of traffic flow was enhanced by considering the backward-looking effect.The spatiotemporal evolution of traffic flow of different truck ratios and varying degrees of backward-looking effect was determined by numerical simulation.This study lays a foundation for exploring the complex feature of car-following behavior and making the intelligent network vehicles control rules more consistent with human driver habits.展开更多
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi...Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.展开更多
The evaluation index of camouflage patterns is important in the field of military application.It is the goal that researchers have always pursued to make the computable evaluation indicators more in line with the huma...The evaluation index of camouflage patterns is important in the field of military application.It is the goal that researchers have always pursued to make the computable evaluation indicators more in line with the human visual mechanism.In order to make the evaluation method more computationally intelligent,a Multi-Feature Camouflage Fused Index(MF-CFI)is proposed based on the comparison of grayscale,color and texture features between the target and the background.In order to verify the effectiveness of the proposed index,eye movement experiments are conducted to compare the proposed index with existing indexes including Universal Image Quality Index(UIQI),Camouflage Similarity Index(CSI)and Structural Similarity(SSIM).Twenty-four different simulated targets are designed in a grassland background,28 observers participate in the experiment and record the eye movement data during the observation process.The results show that the highest Pearson correlation coefficient is observed between MF-CFI and the eye movement data,both in the designed digital camouflage patterns and largespot camouflage patterns.Since MF-CFI is more in line with the detection law of camouflage targets in human visual perception,the proposed index can be used for the comparison and parameter optimization of camouflage design algorithms.展开更多
BACKGROUND Many studies have focused on the femoral tunnel technique and fixation method,but few studies have involved the tibial tunnel technique and fixation method.The all-inside technique is one of the new techniq...BACKGROUND Many studies have focused on the femoral tunnel technique and fixation method,but few studies have involved the tibial tunnel technique and fixation method.The all-inside technique is one of the new techniques that has been described in recent years.All-inside anterior cruciate ligament(ACL)reconstruction is based on a tibial socket instead of a full tunnel.This method has many potential advantages.AIM To compare clinical outcomes of knee ACL autograft reconstruction using allinside quadrupled semitendinosus(AIST)and traditional hamstring tendon(TBT)techniques.METHODS From January 2017 to October 2019,the clinical data of 80 patients with ACL reconstruction were retrospectively analyzed,including 67 males and 13 females.The patients had an average age of 24.3±3.1 years(age range:18-33 years).The AIST technique was used in 42 patients and the TBT technique was used in 38 patients.The time between operation and injury,operative duration,postoperative visual analogue scale(VAS)score and knee functional recovery were recorded and compared between the two groups.The International Knee Documentation Committee(IKDC)and Lysholm scoring system were used to comprehensively evaluate clinical efficacy.RESULTS Eighty patients were followed for 24-36 mo,with an average follow-up duration of 27.5±1.8 mo.There were no significant differences in the time between surgery and injury,operative duration,IKDC and Lysholm scores of the affected knee at the last follow-up evaluation between the two groups.There were significant differences in VAS scores 1 d,3 d,7 d,2 wk and 1 mo after surgery(P<0.05).There was no significant difference in VAS score at 3 mo,6 mo and 1 year after operation.CONCLUSION The efficacy of the AIST ACL reconstruction technique was comparable to the TBT technique,but the postoperative pain was less with the AIST technique.Thus,the AIST technique is an ideal treatment choice for ACL reconstruction.展开更多
文摘Runge-Kutta scheme is one of the versatile numerical tools for the simulation of engineering systems. Despite its wide and acceptable engineering use, there is dearth of relevant literature bordering on visual impression possibility among different schemes coefficients which is the strong motivation for the present investigation of the third and fourth order schemes. The present study capitalise on results of tedious computation involving Taylor series expansion equivalent supplemented with Butcher assumptions and constraint equations of well-known works which captures the essential relationship between the coefficients. The simulation proceeds from random but valid specification of two out of the total coefficients possible per scheme. However the remaining coefficients are evaluated with application of appropriate function relationship. Eight and thirteen unknown coefficients were simulated respectively for third and fourth schemes over a total of five thousand cases each for relevant distribution statistics and scatter plots analysis for the purpose of scheme comparison and visual import. The respective three and four coefficients of the slope estimate for the third and fourth schemes have mix sign for large number of simulated cases. However, none of the two schemes have above three of these coefficients lesser than zero. The percentages of simulation results with two coefficients lesser than zero dominate and are respectively 56.88 and 77.10 for third and fourth schemes. It was observed that both popular third and fourth schemes belong to none of the coefficients being zero classification with respective percentage of 0.72 and 3.28 intotal simulated cases. The comparisons of corresponding scatter plots are visually exciting. The overall difference between corresponding scatter plots and distribution results can be used to justify the accuracy of fourth scheme over its counterpart third scheme.
基金We gratefully acknowledge the financial support of the National Natural Science Foundation of China (Grants 51374213 and 51674251), National Natural Science Fund for Distinguished Young Scholars of China (Grant 51125017), Science Fund for Creative Research Groups of the National Natural Science Foundation of China (Grant 51421003), Fund for Innovative Research and Development Group Program of Jiangsu Province (Grant 2014-27), and the Priority Academic Program Development of Jiangsu Higher Education Institutions (Grant PAPD 2014).
基金Project supported by the National Key Research and Development Program of China(Grant No.2018YFB1601000)the National Natural Science Foundation of China(Grant Nos.61773337,61773338,and 61722113)the Key Research and Development Program of Shandong Province,China(Grant No.2019TSLH0203).
文摘The car-following behavior can be influenced by its driver’s backward-looking effect.Especially in traffic congestion,if vehicles adjust the headway by considering backward-looking effect,the stability of traffic flow can be enhanced.A model of car-following behavior considering backward-looking effect was built using visual information as a stimulus.The critical stability conditions were derived by linear and nonlinear stability analyses.The results of parameter sensitivity analysis indicate that the stability of traffic flow was enhanced by considering the backward-looking effect.The spatiotemporal evolution of traffic flow of different truck ratios and varying degrees of backward-looking effect was determined by numerical simulation.This study lays a foundation for exploring the complex feature of car-following behavior and making the intelligent network vehicles control rules more consistent with human driver habits.
基金Project supported by the National Natural Science Foundation of China(Grant No.62061014)the Natural Science Foundation of Liaoning province of China(Grant No.2020-MS-274).
文摘Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.
基金Natural Science Foundation of Jiangsu Province&Key Laboratory Foundation,grant number is BK20180579&6142206180204 respectively.
文摘The evaluation index of camouflage patterns is important in the field of military application.It is the goal that researchers have always pursued to make the computable evaluation indicators more in line with the human visual mechanism.In order to make the evaluation method more computationally intelligent,a Multi-Feature Camouflage Fused Index(MF-CFI)is proposed based on the comparison of grayscale,color and texture features between the target and the background.In order to verify the effectiveness of the proposed index,eye movement experiments are conducted to compare the proposed index with existing indexes including Universal Image Quality Index(UIQI),Camouflage Similarity Index(CSI)and Structural Similarity(SSIM).Twenty-four different simulated targets are designed in a grassland background,28 observers participate in the experiment and record the eye movement data during the observation process.The results show that the highest Pearson correlation coefficient is observed between MF-CFI and the eye movement data,both in the designed digital camouflage patterns and largespot camouflage patterns.Since MF-CFI is more in line with the detection law of camouflage targets in human visual perception,the proposed index can be used for the comparison and parameter optimization of camouflage design algorithms.
文摘BACKGROUND Many studies have focused on the femoral tunnel technique and fixation method,but few studies have involved the tibial tunnel technique and fixation method.The all-inside technique is one of the new techniques that has been described in recent years.All-inside anterior cruciate ligament(ACL)reconstruction is based on a tibial socket instead of a full tunnel.This method has many potential advantages.AIM To compare clinical outcomes of knee ACL autograft reconstruction using allinside quadrupled semitendinosus(AIST)and traditional hamstring tendon(TBT)techniques.METHODS From January 2017 to October 2019,the clinical data of 80 patients with ACL reconstruction were retrospectively analyzed,including 67 males and 13 females.The patients had an average age of 24.3±3.1 years(age range:18-33 years).The AIST technique was used in 42 patients and the TBT technique was used in 38 patients.The time between operation and injury,operative duration,postoperative visual analogue scale(VAS)score and knee functional recovery were recorded and compared between the two groups.The International Knee Documentation Committee(IKDC)and Lysholm scoring system were used to comprehensively evaluate clinical efficacy.RESULTS Eighty patients were followed for 24-36 mo,with an average follow-up duration of 27.5±1.8 mo.There were no significant differences in the time between surgery and injury,operative duration,IKDC and Lysholm scores of the affected knee at the last follow-up evaluation between the two groups.There were significant differences in VAS scores 1 d,3 d,7 d,2 wk and 1 mo after surgery(P<0.05).There was no significant difference in VAS score at 3 mo,6 mo and 1 year after operation.CONCLUSION The efficacy of the AIST ACL reconstruction technique was comparable to the TBT technique,but the postoperative pain was less with the AIST technique.Thus,the AIST technique is an ideal treatment choice for ACL reconstruction.