With ever-increasing market competition and advances in technology, more and more countries are prioritizing advanced manufacturing technology as their top priority for economic growth. Germany announced the Industry ...With ever-increasing market competition and advances in technology, more and more countries are prioritizing advanced manufacturing technology as their top priority for economic growth. Germany announced the Industry 4.0 strategy in 2013. The US government launched the Advanced Manufacturing Partnership (AMP) in 2011 and the National Network for Manufacturing Innovation (NNMI) in 2014. Most recently, the Manufacturing USA initiative was officially rolled out to further "leverage existing resources... to nurture manufacturing innovation and accelerate commercialization" by fostering close collaboration between industry, academia, and government partners. In 2015, the Chinese government officially published a 10- year plan and roadmap toward manufacturing: Made in China 2025. In all these national initiatives, the core technology development and implementation is in the area of advanced manufacturing systems. A new manufacturing paradigm is emerging, which can be characterized by two unique features: integrated manufacturing and intelligent manufacturing. This trend is in line with the progress of industrial revolutions, in which higher efficiency in production systems is being continuously pursued. To this end, 10 major technologies can be identified for the new manufacturing paradigm. This paper describes the rationales and needs for integrated and intelligent manufacturing (i2M) systems. Related technologies from different fields are also described. In particular, key technological enablers, such as the Intemet of Things and Services (IoTS), cyber-physical systems (CPSs), and cloud computing are discussed. Challenges are addressed with applica- tions that are based on commercially available platforms such as General Electric (GE)'s Predix and PTC's ThingWorx.展开更多
In the age of online workload explosion,cloud users are increasing exponentialy.Therefore,large scale data centers are required in cloud environment that leads to high energy consumption.Hence,optimal resource utiliza...In the age of online workload explosion,cloud users are increasing exponentialy.Therefore,large scale data centers are required in cloud environment that leads to high energy consumption.Hence,optimal resource utilization is essential to improve energy efficiency of cloud data center.Although,most of the existing literature focuses on virtual machine(VM)consolidation for increasing energy efficiency at the cost of service level agreement degradation.In order to improve the existing approaches,load aware three-gear THReshold(LATHR)as well as modified best fit decreasing(MBFD)algorithm is proposed for minimizing total energy consumption while improving the quality of service in terms of SLA.It offers promising results under dynamic workload and variable number of VMs(1-290)allocated on individual host.The outcomes of the proposed work are measured in terms of SLA,energy consumption,instruction energy ratio(IER)and the number of migrations against the varied numbers of VMs.From experimental results it has been concluded that the proposed technique reduced the SLA violations(55%,26%and 39%)and energy consumption(17%,12%and 6%)as compared to median absolute deviation(MAD),inter quartile range(IQR)and double threshold(THR)overload detection policies,respectively.展开更多
Due to the increasing number of cloud applications,the amount of data in the cloud shows signs of growing faster than ever before.The nature of cloud computing requires cloud data processing systems that can handle hu...Due to the increasing number of cloud applications,the amount of data in the cloud shows signs of growing faster than ever before.The nature of cloud computing requires cloud data processing systems that can handle huge volumes of data and have high performance.However,most cloud storage systems currently adopt a hash-like approach to retrieving data that only supports simple keyword-based enquiries,but lacks various forms of information search.Therefore,a scalable and efficient indexing scheme is clearly required.In this paper,we present a skip list-based cloud index,called SLC-index,which is a novel,scalable skip list-based indexing for cloud data processing.The SLC-index offers a two-layered architecture for extending indexing scope and facilitating better throughput.Dynamic load-balancing for the SLC-index is achieved by online migration of index nodes between servers.Furthermore,it is a flexible system due to its dynamic addition and removal of servers.The SLC-index is efficient for both point and range queries.Experimental results show the efficiency of the SLC-index and its usefulness as an alternative approach for cloud-suitable data structures.展开更多
To satisfy mobile terminals ’( MTs) offloading requirements and reduce MTs’ cost,a joint cloud and wireless resource allocation scheme based on the evolutionary game( JRA-EG) is proposed for overlapping heterogeneou...To satisfy mobile terminals ’( MTs) offloading requirements and reduce MTs’ cost,a joint cloud and wireless resource allocation scheme based on the evolutionary game( JRA-EG) is proposed for overlapping heterogeneous networks in mobile edge computing environments. MTs that have tasks offloading requirements in the same service area form a population. MTs in one population acquire different wireless and computation resources by selecting different service providers( SPs). An evolutionary game is formulated to model the SP selection and resource allocation of the MTs. The cost function of the game consists of energy consumption,time delay and monetary cost. The solutions of evolutionary equilibrium( EE) include the centralized algorithm based on replicator dynamics and the distributed algorithm based on Q-learning.Simulation results show that both algorithms can converge to the EE rapidly. The differences between them are the convergence speed and trajectory stability. Compared with the existing schemes,the JRA-EG scheme can save more energy and have a smaller time delay when the data size becomes larger. The proposed scheme can schedule the wireless and computation resources reasonably so that the offloading cost is reduced efficiently.展开更多
Matrix porosity calculations of fractured and vuggy reservoirs, such as volcanics and weathered dolomite, are one of the problems urgently needed to solve in well-log evaluation. In this paper, we first compare the an...Matrix porosity calculations of fractured and vuggy reservoirs, such as volcanics and weathered dolomite, are one of the problems urgently needed to solve in well-log evaluation. In this paper, we first compare the an empirical formula for porosity calculation from full diameter rhyolite core experiments with the matrix porosity formulas commonly used. We discuss the applicability of the empirical formula in fractured and vuggy reservoirs, such as intermediate-basic volcanics and weathered dolomite. Based on core analysis data, the error distribution of the calculated porosity of our empirical formula and the other porosity formulas in these reservoirs are given. The statistical error analysis indicates that the our empirical formula provides a higher precision than the other porosity formulas. When the porosity is between 1.5% and 15%, the acoustic experiment formula can be used not only for acidic volcanics but also in other fractured and vuggy reservoirs, such as intermediate-basic volcanics and weathered dolomite. Moreover, the formula can reduce the effects of borehole enlargement and rock alteration on porosity computation.展开更多
The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the cod...The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the coding-based scheme (COS) and the encryption-based scheme (EnS) have vulnerabilities on integrity. The corresponding attacks on these vulnerabilities are given. Then, the improved protocols such as the secure sharing-based protocol (SShP), the secure coding-based protocol (SCoP) and the secure encryption- based protocol (SEnP), are proposed to overcome these vulnerabilities. The core elements are protected through public key encryptions and digital signatures. Security analyses show that the confidentiality and the integrity of the improved protocols are guaranteed. Meanwhile, the improved protocols can keep the frame of the former schemes and have higher security. The simulation results illustrate that compared with the existing protocols, the communication overhead of the improved protocols is not significantly increased.展开更多
For the cloud computing system,combined wth the memory function and incomplete matching of the biological immune system,a formal modeling and analysis method of the cloud computing system survivability is proposed by ...For the cloud computing system,combined wth the memory function and incomplete matching of the biological immune system,a formal modeling and analysis method of the cloud computing system survivability is proposed by analyzing the survival situation of critical cloud services.First,on the basis of the SAIR(susceptible,active,infected,recovered)model,the SEIRS(susceptible,exposed,infected,recovered,susceptible)model and the vulnerability diffusion model of the distributed virtual system,the evolution state of the virus is divided into six types,and then the diffusion rules of the virus in the service domain of the cloud computing system and the propagation rules between service domains are analyzee.Finally,on the basis of Bio-PEPA(biological-performance evaluation process algebra),the formalized modeling of the survivability evolution of critical cloud services is made,and the SLIRAS(susceptible,latent,infected,recovered,antidotal,susceptible)model is obtained.Based on the stochastic simulation and the ODEs(ordinary differential equations)simulation of the Bio-PEPA model,the sensitivity parameters of the model are analyzed from three aspects,namely,the virus propagation speed of inter-domain,recovery ability and memory ability.The results showthat the proposed model has high approximate fitting degree to the actual cloud computing system,and it can well reflect the survivable change of the system.展开更多
Arctic clouds strongly influence the regional radiation balance, temperature, melting of sea ice, and freezing of sea water. Despite their importance, there is a lack of systematic and reliabie observations of Arctic ...Arctic clouds strongly influence the regional radiation balance, temperature, melting of sea ice, and freezing of sea water. Despite their importance, there is a lack of systematic and reliabie observations of Arctic clouds. The CloudSat satellite launched in 2006 with a 94GHz Cloud Profiling Radar (CPR) may contribute to close this gap. Here we compare one of the key parameters, the cloud liquid water path (LWP) retrieved from CloudSat observations and from microwave radiometer (MWR) data taken during the ASCOS (Arctic Summer Cloud Ocean Study) cruise of the research vessel Oden from August to September 2008. Over the 45 days of the ASCOS cruise, collocations closer than 3 h and 100 km were found in only 9 d, and collocations closer than 1 h and 30 km in only 2 d. The poor correlations in the scatter plots of the two LWP retrievals can be explained by the patchiness of the cloud cover in these two days (August 5th and September 7th), as confirmed by coincident MODIS (Moderate-resolution Imaging Spectroradiome- ter) images. The averages of Oden-observed LWP values are systematically higher (40-70 g m-2) than the corresponding CloudSat observations (0-50 g m2). These are cases of generally low LWP with presumably small droplets, and may be explained by the little sensitivity of the CPR to small droplets or by the surface clutter.展开更多
The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the...The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the mode of traditional accounting in manual has been replaced by a computerized accounting. A computer can do all the financial work from accounting to reporting. Efficient and convenient accounting work allows financial personnel have more energy and time in enterprise management and decision-making, and the core of financial work has shifted to management. Therefore, more and more enterprises realize management accounting's value and importance. Management accounting includes information collection, analysis, storage and transfer, as well as data processing and analysis, making information system essential. Thus, management accounting information system will be an indispensable tool for enterprise value management. In the study, based on management accounting information, application of management accounting information in mid and large-size enterprises in China was reviewed to analyze existing problems and propose countermeasures with consideration of financial cloud model and business intelligence.展开更多
There are four main vitality states of human body in Traditional Chinese Medicine (TCM). Eye is the most important part on face for TCM doctors to diagnose patient. In this paper,we present several methods of eye quan...There are four main vitality states of human body in Traditional Chinese Medicine (TCM). Eye is the most important part on face for TCM doctors to diagnose patient. In this paper,we present several methods of eye quantification. We quantify eye movement,venation in white part of eye,tears in eye and the shape of upper eyelid,and then use cloud model to deduce volunteers' vitality condition by these measurements. We collect more than one thousand face images and dozens of face videos of patients',and some rules we mined with the highest support and interesting scores are right correspond to TCM diagnosis.展开更多
The Corona Virus Disease 2019(COVID-19) pandemic has taught us many valuable lessons regarding the importance of our physical and mental health. Even with so many technological advancements, we still lag in developing...The Corona Virus Disease 2019(COVID-19) pandemic has taught us many valuable lessons regarding the importance of our physical and mental health. Even with so many technological advancements, we still lag in developing a system that can fully digitalize the medical data of each individual and make it readily accessible for both the patient and health worker at any point in time. Moreover, there are also no ways for the government to identify the legitimacy of a particular clinic. This study merges modern technology with traditional approaches,thereby highlighting a scenario where artificial intelligence(AI) merges with traditional Chinese medicine(TCM), proposing a way to advance the conventional approaches. The main objective of our research is to provide a one-stop platform for the government, doctors,nurses, and patients to access their data effortlessly. The proposed portal will also check the doctors’ authenticity. Data is one of the most critical assets of an organization, so a breach of data can risk users’ lives. Data security is of primary importance and must be prioritized. The proposed methodology is based on cloud computing technology which assures the security of the data and avoids any kind of breach. The study also accounts for the difficulties encountered in creating such an infrastructure in the cloud and overcomes the hurdles faced during the project, keeping enough room for possible future innovations. To summarize, this study focuses on the digitalization of medical data and suggests some possible ways to achieve it. Moreover, it also focuses on some related aspects like security and potential digitalization difficulties.展开更多
This study examines the effects of cumulus parameterizations and microphysics schemes on the track forecast of typhoon Nabi using the Weather Research Forecast model. The study found that the effects of cumulus parame...This study examines the effects of cumulus parameterizations and microphysics schemes on the track forecast of typhoon Nabi using the Weather Research Forecast model. The study found that the effects of cumulus parameterizations on typhoon track forecast were comparatively strong and the typhoon track forecast of Kain-Fritsch (KF) was superior to that of Betts-Miller (BM). When KF was selected, the simulated results would be improved if microphysics schemes were selected than otherwise. The results from Ferrier, WSM6, and Lin were very close to those in the best track. KF performed well with the simulations of the western extension and eastern contraction changes of a North Pacific high as well as the distribution and strength of the typhoon wind field.展开更多
Copper smelting is a significant source of SO2 emission. It is important to quantify SO2 emissions from combustion sources for regulatory and control purposes in relation to air quality. The characteristics of SO2 emi...Copper smelting is a significant source of SO2 emission. It is important to quantify SO2 emissions from combustion sources for regulatory and control purposes in relation to air quality. The characteristics of SO2 emissions from copper smelting industry in Yurman Province, China, were examined. Analysis based on the present situation, material balance and measuring method were used to confirm SO2 emission factors of copper smelting industry. Results show that SO2 emission factors for Isa system, side blown-continuous converting system (SB-CC), blast furnace-continuous converting systems (B-CC) and blast furnace-converter blowing (B-C) are 11.69-18.64, 62.44--101.4, 19.43-37.88 and 45.48-81.03 kg/t(blister copper), respectively. The comprehensive emission factor based on all smelting plants is found to be in the range of 23-39.99 kg-SO2/t(blister copper) for Yunnan Province, China. The results are compared with those for discharge coefficients of industrial pollutants in the First National General Survey of Pollution Sources and the emission factor of the total amount of major pollutants. It is observed that there are some differences among emission factors.展开更多
Based on the monthly precipitation data of 126 observation stations from 1961 to 2000 in Yunnan Province, the interannual and decadal variability of precipitation in rainy seasons are studied by using wavelet analysis...Based on the monthly precipitation data of 126 observation stations from 1961 to 2000 in Yunnan Province, the interannual and decadal variability of precipitation in rainy seasons are studied by using wavelet analysis. It is shown that there is a 2-6 year oscillation at the interannual time scales and a quasi-30 year oscillation at the decadal time scales. These periodic oscillations relate to the distribution of tropical heat content. When the precipitation is much more (less) than normal, the upper seawater is colder (warmer) in almost all the tropical Indian Ocean, and warmer (colder) in the western Pacific as well as colder (warmer) in the eastern Pacific. The key areas of the anomaly heat content distribution that have significant correlation to the Yunnan precipitation in rainy season are in the southern hemispheric Indian Ocean with a dipole pattern in the winter as well as in the deep basin of the South China Sea (SCS) before the Yunnan rainy season begins. Therefore, the anomalous distributions of the heat content in the southern Indian Ocean and the SCS In winter are good indicators for predicting drought or flood in Yunnan Province in the following rainy season.展开更多
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft...Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally.展开更多
文摘With ever-increasing market competition and advances in technology, more and more countries are prioritizing advanced manufacturing technology as their top priority for economic growth. Germany announced the Industry 4.0 strategy in 2013. The US government launched the Advanced Manufacturing Partnership (AMP) in 2011 and the National Network for Manufacturing Innovation (NNMI) in 2014. Most recently, the Manufacturing USA initiative was officially rolled out to further "leverage existing resources... to nurture manufacturing innovation and accelerate commercialization" by fostering close collaboration between industry, academia, and government partners. In 2015, the Chinese government officially published a 10- year plan and roadmap toward manufacturing: Made in China 2025. In all these national initiatives, the core technology development and implementation is in the area of advanced manufacturing systems. A new manufacturing paradigm is emerging, which can be characterized by two unique features: integrated manufacturing and intelligent manufacturing. This trend is in line with the progress of industrial revolutions, in which higher efficiency in production systems is being continuously pursued. To this end, 10 major technologies can be identified for the new manufacturing paradigm. This paper describes the rationales and needs for integrated and intelligent manufacturing (i2M) systems. Related technologies from different fields are also described. In particular, key technological enablers, such as the Intemet of Things and Services (IoTS), cyber-physical systems (CPSs), and cloud computing are discussed. Challenges are addressed with applica- tions that are based on commercially available platforms such as General Electric (GE)'s Predix and PTC's ThingWorx.
文摘In the age of online workload explosion,cloud users are increasing exponentialy.Therefore,large scale data centers are required in cloud environment that leads to high energy consumption.Hence,optimal resource utilization is essential to improve energy efficiency of cloud data center.Although,most of the existing literature focuses on virtual machine(VM)consolidation for increasing energy efficiency at the cost of service level agreement degradation.In order to improve the existing approaches,load aware three-gear THReshold(LATHR)as well as modified best fit decreasing(MBFD)algorithm is proposed for minimizing total energy consumption while improving the quality of service in terms of SLA.It offers promising results under dynamic workload and variable number of VMs(1-290)allocated on individual host.The outcomes of the proposed work are measured in terms of SLA,energy consumption,instruction energy ratio(IER)and the number of migrations against the varied numbers of VMs.From experimental results it has been concluded that the proposed technique reduced the SLA violations(55%,26%and 39%)and energy consumption(17%,12%and 6%)as compared to median absolute deviation(MAD),inter quartile range(IQR)and double threshold(THR)overload detection policies,respectively.
基金Projects(61363021,61540061,61663047)supported by the National Natural Science Foundation of ChinaProject(2017SE206)supported by the Open Foundation of Key Laboratory in Software Engineering of Yunnan Province,China
文摘Due to the increasing number of cloud applications,the amount of data in the cloud shows signs of growing faster than ever before.The nature of cloud computing requires cloud data processing systems that can handle huge volumes of data and have high performance.However,most cloud storage systems currently adopt a hash-like approach to retrieving data that only supports simple keyword-based enquiries,but lacks various forms of information search.Therefore,a scalable and efficient indexing scheme is clearly required.In this paper,we present a skip list-based cloud index,called SLC-index,which is a novel,scalable skip list-based indexing for cloud data processing.The SLC-index offers a two-layered architecture for extending indexing scope and facilitating better throughput.Dynamic load-balancing for the SLC-index is achieved by online migration of index nodes between servers.Furthermore,it is a flexible system due to its dynamic addition and removal of servers.The SLC-index is efficient for both point and range queries.Experimental results show the efficiency of the SLC-index and its usefulness as an alternative approach for cloud-suitable data structures.
基金The National Natural Science Foundation of China(No.61741102,61471164)
文摘To satisfy mobile terminals ’( MTs) offloading requirements and reduce MTs’ cost,a joint cloud and wireless resource allocation scheme based on the evolutionary game( JRA-EG) is proposed for overlapping heterogeneous networks in mobile edge computing environments. MTs that have tasks offloading requirements in the same service area form a population. MTs in one population acquire different wireless and computation resources by selecting different service providers( SPs). An evolutionary game is formulated to model the SP selection and resource allocation of the MTs. The cost function of the game consists of energy consumption,time delay and monetary cost. The solutions of evolutionary equilibrium( EE) include the centralized algorithm based on replicator dynamics and the distributed algorithm based on Q-learning.Simulation results show that both algorithms can converge to the EE rapidly. The differences between them are the convergence speed and trajectory stability. Compared with the existing schemes,the JRA-EG scheme can save more energy and have a smaller time delay when the data size becomes larger. The proposed scheme can schedule the wireless and computation resources reasonably so that the offloading cost is reduced efficiently.
基金sponsored by the Science Research and Technology Development Project of Petrochina Company Limited "Well Logging Interpretation and Integrative Evaluation of the Complex Lithology"(Grant No.2008A-2705)
文摘Matrix porosity calculations of fractured and vuggy reservoirs, such as volcanics and weathered dolomite, are one of the problems urgently needed to solve in well-log evaluation. In this paper, we first compare the an empirical formula for porosity calculation from full diameter rhyolite core experiments with the matrix porosity formulas commonly used. We discuss the applicability of the empirical formula in fractured and vuggy reservoirs, such as intermediate-basic volcanics and weathered dolomite. Based on core analysis data, the error distribution of the calculated porosity of our empirical formula and the other porosity formulas in these reservoirs are given. The statistical error analysis indicates that the our empirical formula provides a higher precision than the other porosity formulas. When the porosity is between 1.5% and 15%, the acoustic experiment formula can be used not only for acidic volcanics but also in other fractured and vuggy reservoirs, such as intermediate-basic volcanics and weathered dolomite. Moreover, the formula can reduce the effects of borehole enlargement and rock alteration on porosity computation.
基金The National Natural Science Foundation of China( No. 60902008)the Key Laboratory Hi-Tech Program of Changzhou City( No. CM20103003)+1 种基金the Key Laboratory Program of Information Network Security of Ministry of Public Security (No. C12602)the Science and Technology Supporting Project of Changzhou City ( No. CE20120030)
文摘The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the coding-based scheme (COS) and the encryption-based scheme (EnS) have vulnerabilities on integrity. The corresponding attacks on these vulnerabilities are given. Then, the improved protocols such as the secure sharing-based protocol (SShP), the secure coding-based protocol (SCoP) and the secure encryption- based protocol (SEnP), are proposed to overcome these vulnerabilities. The core elements are protected through public key encryptions and digital signatures. Security analyses show that the confidentiality and the integrity of the improved protocols are guaranteed. Meanwhile, the improved protocols can keep the frame of the former schemes and have higher security. The simulation results illustrate that compared with the existing protocols, the communication overhead of the improved protocols is not significantly increased.
基金The National Natural Science Foundation of China(No.61202458,61403109)the Natural Science Foundation of Heilongjiang Province of China(No.F2017021)Harbin Science and Technology Innovation Research Funds(No.2016RAQXJ036)
文摘For the cloud computing system,combined wth the memory function and incomplete matching of the biological immune system,a formal modeling and analysis method of the cloud computing system survivability is proposed by analyzing the survival situation of critical cloud services.First,on the basis of the SAIR(susceptible,active,infected,recovered)model,the SEIRS(susceptible,exposed,infected,recovered,susceptible)model and the vulnerability diffusion model of the distributed virtual system,the evolution state of the virus is divided into six types,and then the diffusion rules of the virus in the service domain of the cloud computing system and the propagation rules between service domains are analyzee.Finally,on the basis of Bio-PEPA(biological-performance evaluation process algebra),the formalized modeling of the survivability evolution of critical cloud services is made,and the SLIRAS(susceptible,latent,infected,recovered,antidotal,susceptible)model is obtained.Based on the stochastic simulation and the ODEs(ordinary differential equations)simulation of the Bio-PEPA model,the sensitivity parameters of the model are analyzed from three aspects,namely,the virus propagation speed of inter-domain,recovery ability and memory ability.The results showthat the proposed model has high approximate fitting degree to the actual cloud computing system,and it can well reflect the survivable change of the system.
基金ASCOS was made possible by grants from DAMOCLES and the Knut and Alice Wallenberg Foundation,and was organized by the Swedish Polar Research Secretariat
文摘Arctic clouds strongly influence the regional radiation balance, temperature, melting of sea ice, and freezing of sea water. Despite their importance, there is a lack of systematic and reliabie observations of Arctic clouds. The CloudSat satellite launched in 2006 with a 94GHz Cloud Profiling Radar (CPR) may contribute to close this gap. Here we compare one of the key parameters, the cloud liquid water path (LWP) retrieved from CloudSat observations and from microwave radiometer (MWR) data taken during the ASCOS (Arctic Summer Cloud Ocean Study) cruise of the research vessel Oden from August to September 2008. Over the 45 days of the ASCOS cruise, collocations closer than 3 h and 100 km were found in only 9 d, and collocations closer than 1 h and 30 km in only 2 d. The poor correlations in the scatter plots of the two LWP retrievals can be explained by the patchiness of the cloud cover in these two days (August 5th and September 7th), as confirmed by coincident MODIS (Moderate-resolution Imaging Spectroradiome- ter) images. The averages of Oden-observed LWP values are systematically higher (40-70 g m-2) than the corresponding CloudSat observations (0-50 g m2). These are cases of generally low LWP with presumably small droplets, and may be explained by the little sensitivity of the CPR to small droplets or by the surface clutter.
基金Supported by Education Reform,Innovation and Guidance Program for Teachers in Universities of Tian Jin Agricultural University(20170405)~~
文摘The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the mode of traditional accounting in manual has been replaced by a computerized accounting. A computer can do all the financial work from accounting to reporting. Efficient and convenient accounting work allows financial personnel have more energy and time in enterprise management and decision-making, and the core of financial work has shifted to management. Therefore, more and more enterprises realize management accounting's value and importance. Management accounting includes information collection, analysis, storage and transfer, as well as data processing and analysis, making information system essential. Thus, management accounting information system will be an indispensable tool for enterprise value management. In the study, based on management accounting information, application of management accounting information in mid and large-size enterprises in China was reviewed to analyze existing problems and propose countermeasures with consideration of financial cloud model and business intelligence.
基金National Natural Science Foundations of China (No.60873179, No.60672018)
文摘There are four main vitality states of human body in Traditional Chinese Medicine (TCM). Eye is the most important part on face for TCM doctors to diagnose patient. In this paper,we present several methods of eye quantification. We quantify eye movement,venation in white part of eye,tears in eye and the shape of upper eyelid,and then use cloud model to deduce volunteers' vitality condition by these measurements. We collect more than one thousand face images and dozens of face videos of patients',and some rules we mined with the highest support and interesting scores are right correspond to TCM diagnosis.
文摘The Corona Virus Disease 2019(COVID-19) pandemic has taught us many valuable lessons regarding the importance of our physical and mental health. Even with so many technological advancements, we still lag in developing a system that can fully digitalize the medical data of each individual and make it readily accessible for both the patient and health worker at any point in time. Moreover, there are also no ways for the government to identify the legitimacy of a particular clinic. This study merges modern technology with traditional approaches,thereby highlighting a scenario where artificial intelligence(AI) merges with traditional Chinese medicine(TCM), proposing a way to advance the conventional approaches. The main objective of our research is to provide a one-stop platform for the government, doctors,nurses, and patients to access their data effortlessly. The proposed portal will also check the doctors’ authenticity. Data is one of the most critical assets of an organization, so a breach of data can risk users’ lives. Data security is of primary importance and must be prioritized. The proposed methodology is based on cloud computing technology which assures the security of the data and avoids any kind of breach. The study also accounts for the difficulties encountered in creating such an infrastructure in the cloud and overcomes the hurdles faced during the project, keeping enough room for possible future innovations. To summarize, this study focuses on the digitalization of medical data and suggests some possible ways to achieve it. Moreover, it also focuses on some related aspects like security and potential digitalization difficulties.
基金National Basic Research Program of China (2009CB421502)National Natural Science Foundation of China (40475018)Research and Development Program of KMA of Korea (NIMR-2010-B-6)
文摘This study examines the effects of cumulus parameterizations and microphysics schemes on the track forecast of typhoon Nabi using the Weather Research Forecast model. The study found that the effects of cumulus parameterizations on typhoon track forecast were comparatively strong and the typhoon track forecast of Kain-Fritsch (KF) was superior to that of Betts-Miller (BM). When KF was selected, the simulated results would be improved if microphysics schemes were selected than otherwise. The results from Ferrier, WSM6, and Lin were very close to those in the best track. KF performed well with the simulations of the western extension and eastern contraction changes of a North Pacific high as well as the distribution and strength of the typhoon wind field.
基金Projects(KKK0201022137,KKK0201122183) supported by the Special Research Foundation of Yunnan Provincial Environmental Protection Bureau,China
文摘Copper smelting is a significant source of SO2 emission. It is important to quantify SO2 emissions from combustion sources for regulatory and control purposes in relation to air quality. The characteristics of SO2 emissions from copper smelting industry in Yurman Province, China, were examined. Analysis based on the present situation, material balance and measuring method were used to confirm SO2 emission factors of copper smelting industry. Results show that SO2 emission factors for Isa system, side blown-continuous converting system (SB-CC), blast furnace-continuous converting systems (B-CC) and blast furnace-converter blowing (B-C) are 11.69-18.64, 62.44--101.4, 19.43-37.88 and 45.48-81.03 kg/t(blister copper), respectively. The comprehensive emission factor based on all smelting plants is found to be in the range of 23-39.99 kg-SO2/t(blister copper) for Yunnan Province, China. The results are compared with those for discharge coefficients of industrial pollutants in the First National General Survey of Pollution Sources and the emission factor of the total amount of major pollutants. It is observed that there are some differences among emission factors.
文摘Based on the monthly precipitation data of 126 observation stations from 1961 to 2000 in Yunnan Province, the interannual and decadal variability of precipitation in rainy seasons are studied by using wavelet analysis. It is shown that there is a 2-6 year oscillation at the interannual time scales and a quasi-30 year oscillation at the decadal time scales. These periodic oscillations relate to the distribution of tropical heat content. When the precipitation is much more (less) than normal, the upper seawater is colder (warmer) in almost all the tropical Indian Ocean, and warmer (colder) in the western Pacific as well as colder (warmer) in the eastern Pacific. The key areas of the anomaly heat content distribution that have significant correlation to the Yunnan precipitation in rainy season are in the southern hemispheric Indian Ocean with a dipole pattern in the winter as well as in the deep basin of the South China Sea (SCS) before the Yunnan rainy season begins. Therefore, the anomalous distributions of the heat content in the southern Indian Ocean and the SCS In winter are good indicators for predicting drought or flood in Yunnan Province in the following rainy season.
基金Projects(61202004,61272084)supported by the National Natural Science Foundation of ChinaProjects(2011M500095,2012T50514)supported by the China Postdoctoral Science Foundation+2 种基金Projects(BK2011754,BK2009426)supported by the Natural Science Foundation of Jiangsu Province,ChinaProject(12KJB520007)supported by the Natural Science Fund of Higher Education of Jiangsu Province,ChinaProject(yx002001)supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions,China
文摘Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally.