In order to improve crash occurrence models to account for the influence of various contributing factors, a conditional autoregressive negative binomial (CAR-NB) model is employed to allow for overdispersion (tackl...In order to improve crash occurrence models to account for the influence of various contributing factors, a conditional autoregressive negative binomial (CAR-NB) model is employed to allow for overdispersion (tackled by the NB component), unobserved heterogeneity and spatial autocorrelation (captured by the CAR process), using Markov chain Monte Carlo methods and the Gibbs sampler. Statistical tests suggest that the CAR-NB model is preferred over the CAR-Poisson, NB, zero-inflated Poisson, zero-inflated NB models, due to its lower prediction errors and more robust parameter inference. The study results show that crash frequency and fatalities are positively associated with the number of lanes, curve length, annual average daily traffic (AADT) per lane, as well as rainfall. Speed limit and the distances to the nearest hospitals have negative associations with segment-based crash counts but positive associations with fatality counts, presumably as a result of worsened collision impacts at higher speed and time loss during transporting crash victims.展开更多
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici...Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents.展开更多
The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to stu...The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to study. The likelihood of occurrence and the magnitude of risk for each of these surgical safety events are undefined. Many providers may never have a personal experience with one of these events and training and education on these topics are sparse. These circumstances lead to faulty thinking that a provider won't ever have an event or if one does occur the provider will intuitively know what to do. Surgeons are not preoccupied with failure and tend to usually consider good outcomes, which leads them to ignore or diminish the importance of implementing and following simple safety practices. These circumstances contribute to the persistent low level occurrence of these three events and to the difficulty in generating sufficient interest to resource solutions. Individual facilities rarely have the time or talent to understand these events and develop lasting solutions. More often than not, even the most well meaning internal review results in a new line to a policy and some rigorous enforcement mandate. This approach routinely fails and is another reason why these problems are so persistent. Vigilance actions alone havebeen unsuccessful so hospitals now have to take a systematic approach to implementing safer processes and providing the resources for surgeons and other stake-holders to optimize the OR environment. This article discusses standardized processes of care for mitigation of injury or outright prevention of wrong site surgery, RSI and surgical fires in an action-oriented framework illustrating the strategic elements important in each event and focusing on the responsibilities for each of the three major OR agents-anesthesiologists, surgeons and nurses. A Surgical Patient Safety Checklist is discussed that incorporates the necessary elements to bring these team members together and influence the emergence of a safer OR.展开更多
This study investigates the impact of global warming on drought/flood patterns in China at the end of the 21st century based on the simulations of 22 global climate models and a regional climate model(RegCM3) under th...This study investigates the impact of global warming on drought/flood patterns in China at the end of the 21st century based on the simulations of 22 global climate models and a regional climate model(RegCM3) under the SRES(Special Report on Emissions Scenarios) A1B scenario.The standardized precipitation index(SPI),which has well performance in monitoring the drought/flood characteristics(in terms of their intensity,duration,and spatial extent) in China,is used in this study.The projected results of 22 coupled models and the RegCM3 simulation are consistent.These models project a decrease in the frequency of droughts in most parts of northern China and a slight increase in the frequency in some parts of southern China.Considering China as a whole,the spatial extents of droughts are projected to be significantly reduced.In contrast,future flood events over most parts of China are projected to occur more frequently with stronger intensity and longer duration than those prevalent currently.Additionally,the spatial extents of flood events are projected to significantly increase.展开更多
Based on the transmitting theory of "smoke ring effect", the transient electromagnetism technique was used in coal mines to detect abnormal areas of aquiferous structures in both roofs and floors of coal sea...Based on the transmitting theory of "smoke ring effect", the transient electromagnetism technique was used in coal mines to detect abnormal areas of aquiferous structures in both roofs and floors of coal seams and in front of excavated roadways. Survey devices, working methods and techniques as well as data processing and interpretation are discussed systematically. In addition, the direction of mini-wireframe emission electromagnetic wave of the full space transient electromagnetism technique was verified by an underground borehole for water detection and drainage. The result indicates that this technique can detect both horizontal and vertical development rules of abnormal water bodies to a certain depth below the floor of coal seams and can also detect the abnormal, low resistance water bodies within a certain distance of roofs. Furthermore, it can detect such abnormal bodies in ahead of the excavated roadway front. Limited by the underground environment, the full space transient electromagnetism technique can detect to a depth of only 120 m or so.展开更多
Demonstrating theoretically the possibility that the financial market, albeit incomplete, has equilibrium and that this equilibrium is efficient and has been an important topic at the frontier of the research on gener...Demonstrating theoretically the possibility that the financial market, albeit incomplete, has equilibrium and that this equilibrium is efficient and has been an important topic at the frontier of the research on general equilibrium for financial markets. The paper examines the asymptotic properties of incomplete financial markets taking into accounting the asset structure. The paper deals with a case in which a structure of securities relates to the asymptotic inefficiency.展开更多
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani...Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.展开更多
Compared with roundabouts the main advantages of turbo-roundabouts are the reduction in the number of potential conflicting points and the lower speed of vehicles passing through the intersection, they both can improv...Compared with roundabouts the main advantages of turbo-roundabouts are the reduction in the number of potential conflicting points and the lower speed of vehicles passing through the intersection, they both can improve safety conditions at the .junction. Moreover, the physical delimitation among lanes limits the side-by-side accident risk. These aspects make turbo-roundabouts more appropriate than roundabouts when a higher level of safety has to be guaranteed, particularly in presence of relevant pedestrian and two-wheels traffic volumes. The present paper has three main objectives: (1) to discuss general design criteria and functional principles of turbo roundabouts, (2) to give the geometric design principles of the central island and circulating lanes and (3) to present three case studies from real world concerning the conversion of existing roundabouts into turbo roundabouts.展开更多
In recent years, we have entered a period of increasing impact of world affairs on national politics and international security. Notwithstanding, the present debate on national security and nuclear proliferation, Angl...In recent years, we have entered a period of increasing impact of world affairs on national politics and international security. Notwithstanding, the present debate on national security and nuclear proliferation, Anglo-American "special relations" continue to be a subject of vigorous discussion influenced by the impact of new international emergencies as unstable countries acquire nuclear power and refuse "to reign" in their nuclear programmes (The Globe and Mail, 12 January 2012). Along these lines the 71st anniversary of the Anglo-American Manhattan Project presents a unique opportunity to reappraise the Anglo-American wartime collaboration (or lack of) in atomic energy developments that resulted in the tragedy of nuclear weapons escalation. The Quebec Agreements of 1943-1944 were crafted to address the controlled flow of scientific information. But did this mean a trend toward more effective collaboration or toward greater American control of the atomic project? This study explores the subject of nuclear politics from an unique vantage point of Anglo-Canadian and American-Canadian atomic diplomacy. In doing so, it will show that both the American and British atomic policy makers violated the Quebec Agreements. It seeks to demonstrate that (1) in the tangle of competition replacing cooperation, Canada was more important to the American atomic monopolists than the Anglo-AmcTican partnership, (2) the US-Canada Trade and Defence Agreements contributed to United States retaining exclusive control of the "absolute weapon", and that (3) their post-war nuclear energy agenda delayed Britain's atomic venture and isolated Britain from full participation in Arctic research. In practical terms, the emerging atomic policy in Washington boiled down to maintaining the American edge, come what may, and reducing British prestige in the post-war world. The article concludes by raising the question: did the United States, Britain, and Canada really work for atomic control?展开更多
After the era of globalization, religious diversity increases in most of the countries all over the world. Therefore, the main goal of this article is to discuss the necessity of teaching pupils about the different re...After the era of globalization, religious diversity increases in most of the countries all over the world. Therefore, the main goal of this article is to discuss the necessity of teaching pupils about the different religions at schools in order for increasing their religious awareness about their own religion as well as improving their sensitivity towards other religions. Hence, such awareness and sensitivity may contribute to open the channels of dialogue among the new generations and prevent more violence from happening, as a result. In doing so, it will display the level of religious diversity around the world and the number of expected religious groups by 2050 as found by Pew Research Center (2015). It will also briefly review the Islamic principles that are related to dealing with other religious groups. Moreover, it will present possible ways of how multiple religions can be taught in schools in order to transform pupils from religiocentric phases to religiorelative stages.展开更多
基金The National Science Foundation by Changjiang Scholarship of Ministry of Education of China(No.BCS-0527508)the Joint Research Fund for Overseas Natural Science of China(No.51250110075)+1 种基金the Natural Science Foundation of Jiangsu Province(No.SBK200910046)the Postdoctoral Science Foundation of Jiangsu Province(No.0901005C)
文摘In order to improve crash occurrence models to account for the influence of various contributing factors, a conditional autoregressive negative binomial (CAR-NB) model is employed to allow for overdispersion (tackled by the NB component), unobserved heterogeneity and spatial autocorrelation (captured by the CAR process), using Markov chain Monte Carlo methods and the Gibbs sampler. Statistical tests suggest that the CAR-NB model is preferred over the CAR-Poisson, NB, zero-inflated Poisson, zero-inflated NB models, due to its lower prediction errors and more robust parameter inference. The study results show that crash frequency and fatalities are positively associated with the number of lanes, curve length, annual average daily traffic (AADT) per lane, as well as rainfall. Speed limit and the distances to the nearest hospitals have negative associations with segment-based crash counts but positive associations with fatality counts, presumably as a result of worsened collision impacts at higher speed and time loss during transporting crash victims.
基金supported in part by the National High Technology Research and Development Program of China ("863" Program) (No.2007AA010502)
文摘Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents.
文摘The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to study. The likelihood of occurrence and the magnitude of risk for each of these surgical safety events are undefined. Many providers may never have a personal experience with one of these events and training and education on these topics are sparse. These circumstances lead to faulty thinking that a provider won't ever have an event or if one does occur the provider will intuitively know what to do. Surgeons are not preoccupied with failure and tend to usually consider good outcomes, which leads them to ignore or diminish the importance of implementing and following simple safety practices. These circumstances contribute to the persistent low level occurrence of these three events and to the difficulty in generating sufficient interest to resource solutions. Individual facilities rarely have the time or talent to understand these events and develop lasting solutions. More often than not, even the most well meaning internal review results in a new line to a policy and some rigorous enforcement mandate. This approach routinely fails and is another reason why these problems are so persistent. Vigilance actions alone havebeen unsuccessful so hospitals now have to take a systematic approach to implementing safer processes and providing the resources for surgeons and other stake-holders to optimize the OR environment. This article discusses standardized processes of care for mitigation of injury or outright prevention of wrong site surgery, RSI and surgical fires in an action-oriented framework illustrating the strategic elements important in each event and focusing on the responsibilities for each of the three major OR agents-anesthesiologists, surgeons and nurses. A Surgical Patient Safety Checklist is discussed that incorporates the necessary elements to bring these team members together and influence the emergence of a safer OR.
基金supported by the National Basic Research Program of China (Grant No. 2012CB955401)the National Natural Science Foundation of China (Grant No. 41275078)supported by the "Strategic Priority Research Program-Climate Change:Carbon Budget and Relevant Issues" of the Chinese Academy of Sciences (Grant No. XDA05090306)
文摘This study investigates the impact of global warming on drought/flood patterns in China at the end of the 21st century based on the simulations of 22 global climate models and a regional climate model(RegCM3) under the SRES(Special Report on Emissions Scenarios) A1B scenario.The standardized precipitation index(SPI),which has well performance in monitoring the drought/flood characteristics(in terms of their intensity,duration,and spatial extent) in China,is used in this study.The projected results of 22 coupled models and the RegCM3 simulation are consistent.These models project a decrease in the frequency of droughts in most parts of northern China and a slight increase in the frequency in some parts of southern China.Considering China as a whole,the spatial extents of droughts are projected to be significantly reduced.In contrast,future flood events over most parts of China are projected to occur more frequently with stronger intensity and longer duration than those prevalent currently.Additionally,the spatial extents of flood events are projected to significantly increase.
文摘Based on the transmitting theory of "smoke ring effect", the transient electromagnetism technique was used in coal mines to detect abnormal areas of aquiferous structures in both roofs and floors of coal seams and in front of excavated roadways. Survey devices, working methods and techniques as well as data processing and interpretation are discussed systematically. In addition, the direction of mini-wireframe emission electromagnetic wave of the full space transient electromagnetism technique was verified by an underground borehole for water detection and drainage. The result indicates that this technique can detect both horizontal and vertical development rules of abnormal water bodies to a certain depth below the floor of coal seams and can also detect the abnormal, low resistance water bodies within a certain distance of roofs. Furthermore, it can detect such abnormal bodies in ahead of the excavated roadway front. Limited by the underground environment, the full space transient electromagnetism technique can detect to a depth of only 120 m or so.
文摘Demonstrating theoretically the possibility that the financial market, albeit incomplete, has equilibrium and that this equilibrium is efficient and has been an important topic at the frontier of the research on general equilibrium for financial markets. The paper examines the asymptotic properties of incomplete financial markets taking into accounting the asset structure. The paper deals with a case in which a structure of securities relates to the asymptotic inefficiency.
基金supported in part by National Natural Science Foundation of China(NSFC)under Grant No.61100228 and 61202479the National High-tech R&D Program of China under Grant No.2012AA013101+1 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030601 and XDA06010701Open Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province Grant No.2015IOT03
文摘Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.
文摘Compared with roundabouts the main advantages of turbo-roundabouts are the reduction in the number of potential conflicting points and the lower speed of vehicles passing through the intersection, they both can improve safety conditions at the .junction. Moreover, the physical delimitation among lanes limits the side-by-side accident risk. These aspects make turbo-roundabouts more appropriate than roundabouts when a higher level of safety has to be guaranteed, particularly in presence of relevant pedestrian and two-wheels traffic volumes. The present paper has three main objectives: (1) to discuss general design criteria and functional principles of turbo roundabouts, (2) to give the geometric design principles of the central island and circulating lanes and (3) to present three case studies from real world concerning the conversion of existing roundabouts into turbo roundabouts.
文摘In recent years, we have entered a period of increasing impact of world affairs on national politics and international security. Notwithstanding, the present debate on national security and nuclear proliferation, Anglo-American "special relations" continue to be a subject of vigorous discussion influenced by the impact of new international emergencies as unstable countries acquire nuclear power and refuse "to reign" in their nuclear programmes (The Globe and Mail, 12 January 2012). Along these lines the 71st anniversary of the Anglo-American Manhattan Project presents a unique opportunity to reappraise the Anglo-American wartime collaboration (or lack of) in atomic energy developments that resulted in the tragedy of nuclear weapons escalation. The Quebec Agreements of 1943-1944 were crafted to address the controlled flow of scientific information. But did this mean a trend toward more effective collaboration or toward greater American control of the atomic project? This study explores the subject of nuclear politics from an unique vantage point of Anglo-Canadian and American-Canadian atomic diplomacy. In doing so, it will show that both the American and British atomic policy makers violated the Quebec Agreements. It seeks to demonstrate that (1) in the tangle of competition replacing cooperation, Canada was more important to the American atomic monopolists than the Anglo-AmcTican partnership, (2) the US-Canada Trade and Defence Agreements contributed to United States retaining exclusive control of the "absolute weapon", and that (3) their post-war nuclear energy agenda delayed Britain's atomic venture and isolated Britain from full participation in Arctic research. In practical terms, the emerging atomic policy in Washington boiled down to maintaining the American edge, come what may, and reducing British prestige in the post-war world. The article concludes by raising the question: did the United States, Britain, and Canada really work for atomic control?
文摘After the era of globalization, religious diversity increases in most of the countries all over the world. Therefore, the main goal of this article is to discuss the necessity of teaching pupils about the different religions at schools in order for increasing their religious awareness about their own religion as well as improving their sensitivity towards other religions. Hence, such awareness and sensitivity may contribute to open the channels of dialogue among the new generations and prevent more violence from happening, as a result. In doing so, it will display the level of religious diversity around the world and the number of expected religious groups by 2050 as found by Pew Research Center (2015). It will also briefly review the Islamic principles that are related to dealing with other religious groups. Moreover, it will present possible ways of how multiple religions can be taught in schools in order to transform pupils from religiocentric phases to religiorelative stages.