In recent years,speculation of an increase in Internet Gaming Disorder(IGD)has surfaced with the growing popularity of internet gaming among Chinese children and adolescents.The detrimental impact of IGD on mental hea...In recent years,speculation of an increase in Internet Gaming Disorder(IGD)has surfaced with the growing popularity of internet gaming among Chinese children and adolescents.The detrimental impact of IGD on mental health cannot be denied,even though only a small portion of the screen-dependent population exhibits psychopathological and behavioral symptoms.The present study aimed to explore a latent profile analysis(LPA)of Internet Gaming Disorder on the mental health of Chinese school students.The data were collected from a sample of 1005 Chinese school students(49.8%male;age M=13.32,SD=1.34 years)using a paper-pencil survey through convenience sampling.LPA explored three latent profiles of internet gamers:regular gamers(62.4%),moderate gamers(28.1%),and probable disordered gamers(9.4%).Results showed that the probable disordered gamers had significantly higher levels of depression,anxiety,emotional and conduct problems,hyperactivity,and peer problem symptoms as well as lower life satisfaction,and pro-social symptoms compared to regular and moderate gamers(p<0.05).This study would be helpful to mental health professionals in designing interventions for gamers who present IGD symptoms.Future longitudinal studies should also be undertaken to assess whether mental health worsens for probable disordered gamers.展开更多
Water jet technology is widely used in submerged buried pipes as a non-traditional trenching process,often invol-ving a complex sediment response.An important adjustable and influential engineering variable in this tec...Water jet technology is widely used in submerged buried pipes as a non-traditional trenching process,often invol-ving a complex sediment response.An important adjustable and influential engineering variable in this technol-ogy is represented by the impinging distance.In this study,the FLOW-3D software was used to simulate the jet scouring of sand beds in a submerged environment.In particular,four sets of experimental conditions were con-sidered to discern the relationship between the maximum scour depth and mass and the impinging distance.As shown by the results,a critical impinging distance h0 exists by which the static scour depth can be maximized;the scour mass ratio between dynamic and static conditions decreases as the impinging distance increases.Moreover,the profile contours are similar when the erosion parameter Ec is in the range 0.35<Ec<2.Empirical equations applicable for predicting the jet trenching contour under both dynamic and static scour modes are also provided in this study.展开更多
The transientflow testing of ultra-deepwater gas wells is greatly impacted by the low temperatures of seawater encountered over extended distances.This leads to a redistribution of temperature within the wellbore,which...The transientflow testing of ultra-deepwater gas wells is greatly impacted by the low temperatures of seawater encountered over extended distances.This leads to a redistribution of temperature within the wellbore,which in turn influences theflow behavior.To accurately predict such a temperature distribution,in this study a comprehensive model of theflowing temperature and pressurefields is developed.This model is based on principles offluid mechanics,heat transfer,mass conservation,and energy conservation and relies on the Runge-Kutta method for accurate integration in time of the resulting equations.The analysis includes the examination of the influence of various factors,such as gasflow production rate,thermal diffusivity of the formation,and thermal diffusivity of seawater,on the temperature and pressure profiles of the wellbore.The keyfindings can be summarized as follows:1.Higher production rates during testing lead to increasedflowing temperatures and decreased pressures within the wellbore.However,in the presence of a seawater thermocline,a crossover inflowing temperature is observed.2.An increase in wellbore pressure is associated with larger pipe diameters.3.Greater thermal diffusivity of the formation results in more rapid heat transfer from the wellbore to the formation,which causes lowerflowing temperatures within the wellbore.4.In an isothermal layer,higher thermal diffusivity of seawater leads to increased wellboreflowing temperatures.Conversely,in thermocline and mixed layer segments,lower temperatures are noted.5.Production test data from a representative deep-water gas well in the South China Sea,used to calculate the bottom-seafloor-wellhead temperature and pressurefields across three operating modes,indicate that the average error in temperature prediction is 2.18%,while the average error in pressure prediction is 5.26%,thereby confirming the reliability of the theoretical model.展开更多
Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The maj...Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The major concern in big data is security threats.Security concerns create a negative impact on the user on the aspect of trust.In big data still,security threats exist as com-monly known as DDOS(Distributed-Denial-of-Service)attacks,data loss,Inade-quate Data Backups,System Vulnerabilities,and Phishing as well as Social Engineering Attacks.In our work,we have taken the data loss and Inadequate Data Backups issues into consideration.We analyze that RSA(Rivest,Shamir,&Adleman)is the most secure cryptography mechanism.In cloud computing,user authentication is the weaker section to be secured.Generally,the cryptogra-phy mechanism is done in the authentication section only.We implemented our new idea of registration with selected images and pins for processing RSA.By valid authentication approval earned by the proposed mechanism,the user is allowed to use the cloud database,encryption,decryption,etc.To prove the effi-ciency level of our proposed system,a comparison work is conducted between DSSE(Digital Signature Standard Encryption)and EFSSA(Efficient framework for securely sharing afile using asymmetric key distribution management).The experimental work is carried out and the performance evaluation is done using encryption time and decryption time analysis,throughput,and processing time.On this observation,the security level attained by ERSA is far better in compar-ison to DSSE and EFSSA with the maximum throughput attained by the proposed E-RSA being 500 Mb/Min and encryption time of 3.2 s,thus ensuring the user trust in using the cloud environment.展开更多
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces...Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.展开更多
Multi-level searching is called Drill down search.Right now,no drill down search feature is available in the existing search engines like Google,Yahoo,Bing and Baidu.Drill down search is very much useful for the end u...Multi-level searching is called Drill down search.Right now,no drill down search feature is available in the existing search engines like Google,Yahoo,Bing and Baidu.Drill down search is very much useful for the end user tofind the exact search results among the huge paginated search results.Higher level of drill down search with category based search feature leads to get the most accurate search results but it increases the number and size of thefile system.The purpose of this manuscript is to implement a big data storage reduction binaryfile system model for category based drill down search engine that offers fast multi-levelfiltering capability.The basic methodology of the proposed model stores the search engine data in the binaryfile system model.To verify the effectiveness of the proposedfile system model,5 million unique keyword data are stored into a binaryfile,thereby analysing the proposedfile system with efficiency.Some experimental results are also provided based on real data that show our storage model speed and superiority.Experiments demonstrated that ourfile system expansion ratio is constant and it reduces the disk storage space up to 30%with conventional database/file system and it also increases the search performance for any levels of search.To discuss deeply,the paper starts with the short introduction of drill down search followed by the discussion of important technologies used to implement big data storage reduction system in detail.展开更多
基金supported by the Postdoctoral Research Fund of School of Psychology,Zhejiang Normal University(No.ZC304022990).
文摘In recent years,speculation of an increase in Internet Gaming Disorder(IGD)has surfaced with the growing popularity of internet gaming among Chinese children and adolescents.The detrimental impact of IGD on mental health cannot be denied,even though only a small portion of the screen-dependent population exhibits psychopathological and behavioral symptoms.The present study aimed to explore a latent profile analysis(LPA)of Internet Gaming Disorder on the mental health of Chinese school students.The data were collected from a sample of 1005 Chinese school students(49.8%male;age M=13.32,SD=1.34 years)using a paper-pencil survey through convenience sampling.LPA explored three latent profiles of internet gamers:regular gamers(62.4%),moderate gamers(28.1%),and probable disordered gamers(9.4%).Results showed that the probable disordered gamers had significantly higher levels of depression,anxiety,emotional and conduct problems,hyperactivity,and peer problem symptoms as well as lower life satisfaction,and pro-social symptoms compared to regular and moderate gamers(p<0.05).This study would be helpful to mental health professionals in designing interventions for gamers who present IGD symptoms.Future longitudinal studies should also be undertaken to assess whether mental health worsens for probable disordered gamers.
基金supported by the Research on the Prediction Mechanism of Corrosion for High Strength Steel in Deep Sea Service Driven by Multi-Scale,High-Dimension and Small-Sample Data(C2301002635)Research on the Influence of Nozzle Structure on the Scouring Effect of Submerged Water Jet(2023R411045)+1 种基金the Zhejiang Ocean University Outstanding Master’s Thesis Cultivation Project(ZJOUYJS20230018)the Scientific Research Project of Zhejiang Graduate Education Society in 2022(2022-021)which was gained by Chen.
文摘Water jet technology is widely used in submerged buried pipes as a non-traditional trenching process,often invol-ving a complex sediment response.An important adjustable and influential engineering variable in this technol-ogy is represented by the impinging distance.In this study,the FLOW-3D software was used to simulate the jet scouring of sand beds in a submerged environment.In particular,four sets of experimental conditions were con-sidered to discern the relationship between the maximum scour depth and mass and the impinging distance.As shown by the results,a critical impinging distance h0 exists by which the static scour depth can be maximized;the scour mass ratio between dynamic and static conditions decreases as the impinging distance increases.Moreover,the profile contours are similar when the erosion parameter Ec is in the range 0.35<Ec<2.Empirical equations applicable for predicting the jet trenching contour under both dynamic and static scour modes are also provided in this study.
文摘The transientflow testing of ultra-deepwater gas wells is greatly impacted by the low temperatures of seawater encountered over extended distances.This leads to a redistribution of temperature within the wellbore,which in turn influences theflow behavior.To accurately predict such a temperature distribution,in this study a comprehensive model of theflowing temperature and pressurefields is developed.This model is based on principles offluid mechanics,heat transfer,mass conservation,and energy conservation and relies on the Runge-Kutta method for accurate integration in time of the resulting equations.The analysis includes the examination of the influence of various factors,such as gasflow production rate,thermal diffusivity of the formation,and thermal diffusivity of seawater,on the temperature and pressure profiles of the wellbore.The keyfindings can be summarized as follows:1.Higher production rates during testing lead to increasedflowing temperatures and decreased pressures within the wellbore.However,in the presence of a seawater thermocline,a crossover inflowing temperature is observed.2.An increase in wellbore pressure is associated with larger pipe diameters.3.Greater thermal diffusivity of the formation results in more rapid heat transfer from the wellbore to the formation,which causes lowerflowing temperatures within the wellbore.4.In an isothermal layer,higher thermal diffusivity of seawater leads to increased wellboreflowing temperatures.Conversely,in thermocline and mixed layer segments,lower temperatures are noted.5.Production test data from a representative deep-water gas well in the South China Sea,used to calculate the bottom-seafloor-wellhead temperature and pressurefields across three operating modes,indicate that the average error in temperature prediction is 2.18%,while the average error in pressure prediction is 5.26%,thereby confirming the reliability of the theoretical model.
文摘Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The major concern in big data is security threats.Security concerns create a negative impact on the user on the aspect of trust.In big data still,security threats exist as com-monly known as DDOS(Distributed-Denial-of-Service)attacks,data loss,Inade-quate Data Backups,System Vulnerabilities,and Phishing as well as Social Engineering Attacks.In our work,we have taken the data loss and Inadequate Data Backups issues into consideration.We analyze that RSA(Rivest,Shamir,&Adleman)is the most secure cryptography mechanism.In cloud computing,user authentication is the weaker section to be secured.Generally,the cryptogra-phy mechanism is done in the authentication section only.We implemented our new idea of registration with selected images and pins for processing RSA.By valid authentication approval earned by the proposed mechanism,the user is allowed to use the cloud database,encryption,decryption,etc.To prove the effi-ciency level of our proposed system,a comparison work is conducted between DSSE(Digital Signature Standard Encryption)and EFSSA(Efficient framework for securely sharing afile using asymmetric key distribution management).The experimental work is carried out and the performance evaluation is done using encryption time and decryption time analysis,throughput,and processing time.On this observation,the security level attained by ERSA is far better in compar-ison to DSSE and EFSSA with the maximum throughput attained by the proposed E-RSA being 500 Mb/Min and encryption time of 3.2 s,thus ensuring the user trust in using the cloud environment.
文摘Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.
文摘Multi-level searching is called Drill down search.Right now,no drill down search feature is available in the existing search engines like Google,Yahoo,Bing and Baidu.Drill down search is very much useful for the end user tofind the exact search results among the huge paginated search results.Higher level of drill down search with category based search feature leads to get the most accurate search results but it increases the number and size of thefile system.The purpose of this manuscript is to implement a big data storage reduction binaryfile system model for category based drill down search engine that offers fast multi-levelfiltering capability.The basic methodology of the proposed model stores the search engine data in the binaryfile system model.To verify the effectiveness of the proposedfile system model,5 million unique keyword data are stored into a binaryfile,thereby analysing the proposedfile system with efficiency.Some experimental results are also provided based on real data that show our storage model speed and superiority.Experiments demonstrated that ourfile system expansion ratio is constant and it reduces the disk storage space up to 30%with conventional database/file system and it also increases the search performance for any levels of search.To discuss deeply,the paper starts with the short introduction of drill down search followed by the discussion of important technologies used to implement big data storage reduction system in detail.