Before-after study with the empirical Bayes(EB)method is the state-of-the-art approach for estimating crash modification factors(CMFs).The EB method not only addresses the regression-to-the-mean bias,but also improves...Before-after study with the empirical Bayes(EB)method is the state-of-the-art approach for estimating crash modification factors(CMFs).The EB method not only addresses the regression-to-the-mean bias,but also improves accuracy.However,the performance of the CMFs derived from the EB method has never been fully investigated.This study aims to examine the accuracy of CMFs estimated with the EB method.Artificial realistic data(ARD)and real crash data are used to evaluate the CMFs.The results indicate that:1)The CMFs derived from the EB before-after method are nearly the same as the true values.2)The estimated CMF standard errors do not reflect the true values.The estimation remains at the same level regardless of the pre-assumed CMF standard error.The EB before-after study is not sensitive to the variation of CMF among sites.3)The analyses with real-world traffic and crash data with a dummy treatment indicate that the EB method tends to underestimate the standard error of the CMF.Safety researchers should recognize that the CMF variance may be biased when evaluating safety effectiveness by the EB method.It is necessary to revisit the algorithm for estimating CMF variance with the EB method.展开更多
The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the s...The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed.展开更多
For the supply of fish and shellfish to consumers in fresh condition, clean handling after catch from the sea is essential. According to HACCP (Hazard Analysis and Critical Control Points), it is important to meet s...For the supply of fish and shellfish to consumers in fresh condition, clean handling after catch from the sea is essential. According to HACCP (Hazard Analysis and Critical Control Points), it is important to meet such requirement by keeping fish and shellfish under a certain low temperature and clean conditions after catching. The deep ocean water (DOW) characterized by low temperature and cleanliness has been chosen for fish and shellfish handlings, particularly for salmon, cod, and sea urchin in Town 'Rausu' in Hokkaido, Japan. DOW below 2.9℃ of an amount of nearly 5 000 m^3 is planned to be pumped up every day from a depth of about 350 m, and temporarily stored in a large simulated tank on land. DOW is then supplied to fish boats through hydrants distributed throughout the harbor and used for keeping salmon in clean and cold conditions. Ice made from DOW is also used for lowering temperature if necessary. DOW and ice made from DOW are also used during the transportation of fish and shellfish. The entire system is scheduled to be completed by the summer of 2005.展开更多
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c...In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information.展开更多
基金Project(51978082)supported by the National Natural Science Foundation of ChinaProject(19B022)supported by the Outstanding Youth Foundation of Hunan Education Department,ChinaProject(2019QJCZ056)supported by the Young Teacher Development Foundation of Changsha University of Science&Technology,China。
文摘Before-after study with the empirical Bayes(EB)method is the state-of-the-art approach for estimating crash modification factors(CMFs).The EB method not only addresses the regression-to-the-mean bias,but also improves accuracy.However,the performance of the CMFs derived from the EB method has never been fully investigated.This study aims to examine the accuracy of CMFs estimated with the EB method.Artificial realistic data(ARD)and real crash data are used to evaluate the CMFs.The results indicate that:1)The CMFs derived from the EB before-after method are nearly the same as the true values.2)The estimated CMF standard errors do not reflect the true values.The estimation remains at the same level regardless of the pre-assumed CMF standard error.The EB before-after study is not sensitive to the variation of CMF among sites.3)The analyses with real-world traffic and crash data with a dummy treatment indicate that the EB method tends to underestimate the standard error of the CMF.Safety researchers should recognize that the CMF variance may be biased when evaluating safety effectiveness by the EB method.It is necessary to revisit the algorithm for estimating CMF variance with the EB method.
文摘The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed.
文摘For the supply of fish and shellfish to consumers in fresh condition, clean handling after catch from the sea is essential. According to HACCP (Hazard Analysis and Critical Control Points), it is important to meet such requirement by keeping fish and shellfish under a certain low temperature and clean conditions after catching. The deep ocean water (DOW) characterized by low temperature and cleanliness has been chosen for fish and shellfish handlings, particularly for salmon, cod, and sea urchin in Town 'Rausu' in Hokkaido, Japan. DOW below 2.9℃ of an amount of nearly 5 000 m^3 is planned to be pumped up every day from a depth of about 350 m, and temporarily stored in a large simulated tank on land. DOW is then supplied to fish boats through hydrants distributed throughout the harbor and used for keeping salmon in clean and cold conditions. Ice made from DOW is also used for lowering temperature if necessary. DOW and ice made from DOW are also used during the transportation of fish and shellfish. The entire system is scheduled to be completed by the summer of 2005.
基金Supported by the High Technology Research and Development Program of China (863 Program,2011AA01A107)Beijing Municipal Special Fund for Cultural and Creative Industries(2009)the Beijing Municipal Natural Science Foundation (4112052)
文摘In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information.