期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Internet Gaming Disorder and Mental Health of Children in China:A Latent Profile Analysis
1
作者 Md Zahir Ahmed Oli Ahmed +2 位作者 Lingfeng Gao Mary C.Jobe Weijian Li 《International Journal of Mental Health Promotion》 2024年第7期517-529,共13页
In recent years,speculation of an increase in Internet Gaming Disorder(IGD)has surfaced with the growing popularity of internet gaming among Chinese children and adolescents.The detrimental impact of IGD on mental hea... In recent years,speculation of an increase in Internet Gaming Disorder(IGD)has surfaced with the growing popularity of internet gaming among Chinese children and adolescents.The detrimental impact of IGD on mental health cannot be denied,even though only a small portion of the screen-dependent population exhibits psychopathological and behavioral symptoms.The present study aimed to explore a latent profile analysis(LPA)of Internet Gaming Disorder on the mental health of Chinese school students.The data were collected from a sample of 1005 Chinese school students(49.8%male;age M=13.32,SD=1.34 years)using a paper-pencil survey through convenience sampling.LPA explored three latent profiles of internet gamers:regular gamers(62.4%),moderate gamers(28.1%),and probable disordered gamers(9.4%).Results showed that the probable disordered gamers had significantly higher levels of depression,anxiety,emotional and conduct problems,hyperactivity,and peer problem symptoms as well as lower life satisfaction,and pro-social symptoms compared to regular and moderate gamers(p<0.05).This study would be helpful to mental health professionals in designing interventions for gamers who present IGD symptoms.Future longitudinal studies should also be undertaken to assess whether mental health worsens for probable disordered gamers. 展开更多
关键词 Internet gaming disorder latent profile analysis mental health children and adolescents China
下载PDF
Numerical Analysis of the Influence of the Impinging Distance on the Scouring Efficiency of Submerged Jets
2
作者 Hao Chen Xianbin Teng +3 位作者 Zhibin Zhang Faxin Zhu Jie Wang Zhaohao Zhang 《Fluid Dynamics & Materials Processing》 EI 2024年第2期429-445,共17页
Water jet technology is widely used in submerged buried pipes as a non-traditional trenching process,often invol-ving a complex sediment response.An important adjustable and influential engineering variable in this tec... Water jet technology is widely used in submerged buried pipes as a non-traditional trenching process,often invol-ving a complex sediment response.An important adjustable and influential engineering variable in this technol-ogy is represented by the impinging distance.In this study,the FLOW-3D software was used to simulate the jet scouring of sand beds in a submerged environment.In particular,four sets of experimental conditions were con-sidered to discern the relationship between the maximum scour depth and mass and the impinging distance.As shown by the results,a critical impinging distance h0 exists by which the static scour depth can be maximized;the scour mass ratio between dynamic and static conditions decreases as the impinging distance increases.Moreover,the profile contours are similar when the erosion parameter Ec is in the range 0.35<Ec<2.Empirical equations applicable for predicting the jet trenching contour under both dynamic and static scour modes are also provided in this study. 展开更多
关键词 Submerged jet impinging distance numerical simulation scour depth scour profile
下载PDF
The Wellbore Temperature and Pressure Behavior during the Flow Testing of Ultra-Deepwater Gas Wells
3
作者 Xingbin Zhao Neng Yang +3 位作者 Hao Liang Mingqiang Wei Benteng Ma Dongling Qiu 《Fluid Dynamics & Materials Processing》 EI 2024年第11期2523-2540,共18页
The transientflow testing of ultra-deepwater gas wells is greatly impacted by the low temperatures of seawater encountered over extended distances.This leads to a redistribution of temperature within the wellbore,which... The transientflow testing of ultra-deepwater gas wells is greatly impacted by the low temperatures of seawater encountered over extended distances.This leads to a redistribution of temperature within the wellbore,which in turn influences theflow behavior.To accurately predict such a temperature distribution,in this study a comprehensive model of theflowing temperature and pressurefields is developed.This model is based on principles offluid mechanics,heat transfer,mass conservation,and energy conservation and relies on the Runge-Kutta method for accurate integration in time of the resulting equations.The analysis includes the examination of the influence of various factors,such as gasflow production rate,thermal diffusivity of the formation,and thermal diffusivity of seawater,on the temperature and pressure profiles of the wellbore.The keyfindings can be summarized as follows:1.Higher production rates during testing lead to increasedflowing temperatures and decreased pressures within the wellbore.However,in the presence of a seawater thermocline,a crossover inflowing temperature is observed.2.An increase in wellbore pressure is associated with larger pipe diameters.3.Greater thermal diffusivity of the formation results in more rapid heat transfer from the wellbore to the formation,which causes lowerflowing temperatures within the wellbore.4.In an isothermal layer,higher thermal diffusivity of seawater leads to increased wellboreflowing temperatures.Conversely,in thermocline and mixed layer segments,lower temperatures are noted.5.Production test data from a representative deep-water gas well in the South China Sea,used to calculate the bottom-seafloor-wellhead temperature and pressurefields across three operating modes,indicate that the average error in temperature prediction is 2.18%,while the average error in pressure prediction is 5.26%,thereby confirming the reliability of the theoretical model. 展开更多
关键词 Ultra-deepwater gas well wellboreflowing temperature-pressure profile heat transfer production testing
下载PDF
基于Python+SQLite的文件整理软件设计与实现 被引量:1
4
作者 李瑞洋 周全兴 《现代信息科技》 2024年第1期28-31,38,共5页
针对计算机中存储的文件日渐繁多,用于整理归纳的时间逐年上升的问题,采用Python中自带的os、date time、SQLite3、threading、hashlib和tkinter等数据库设计一款文件整理软件。该软件主要提供处理重复文件、提取目录下文件并重命名文... 针对计算机中存储的文件日渐繁多,用于整理归纳的时间逐年上升的问题,采用Python中自带的os、date time、SQLite3、threading、hashlib和tkinter等数据库设计一款文件整理软件。该软件主要提供处理重复文件、提取目录下文件并重命名文件等功能。测试结果表明,该文件整理软件操作便捷,其整理效率远远高于传统整理方式,尤其是文件量大的情况下效果更明显。 展开更多
关键词 PYTHON SQLITE数据库 文件整理
下载PDF
Enhanced Rsa (Ersa): An Advanced Mechanism for Improving the Security
5
作者 S.Castro R.PushpaLakshmi 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2267-2279,共13页
Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The maj... Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The major concern in big data is security threats.Security concerns create a negative impact on the user on the aspect of trust.In big data still,security threats exist as com-monly known as DDOS(Distributed-Denial-of-Service)attacks,data loss,Inade-quate Data Backups,System Vulnerabilities,and Phishing as well as Social Engineering Attacks.In our work,we have taken the data loss and Inadequate Data Backups issues into consideration.We analyze that RSA(Rivest,Shamir,&Adleman)is the most secure cryptography mechanism.In cloud computing,user authentication is the weaker section to be secured.Generally,the cryptogra-phy mechanism is done in the authentication section only.We implemented our new idea of registration with selected images and pins for processing RSA.By valid authentication approval earned by the proposed mechanism,the user is allowed to use the cloud database,encryption,decryption,etc.To prove the effi-ciency level of our proposed system,a comparison work is conducted between DSSE(Digital Signature Standard Encryption)and EFSSA(Efficient framework for securely sharing afile using asymmetric key distribution management).The experimental work is carried out and the performance evaluation is done using encryption time and decryption time analysis,throughput,and processing time.On this observation,the security level attained by ERSA is far better in compar-ison to DSSE and EFSSA with the maximum throughput attained by the proposed E-RSA being 500 Mb/Min and encryption time of 3.2 s,thus ensuring the user trust in using the cloud environment. 展开更多
关键词 Cloud computing ENCRYPTION DECRYPTION file sharing RSA key generation
下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
6
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
下载PDF
A Novel Big Data Storage Reduction Model for Drill Down Search 被引量:3
7
作者 N.Ragavan C.Yesubai Rubavathi 《Computer Systems Science & Engineering》 SCIE EI 2022年第4期373-387,共15页
Multi-level searching is called Drill down search.Right now,no drill down search feature is available in the existing search engines like Google,Yahoo,Bing and Baidu.Drill down search is very much useful for the end u... Multi-level searching is called Drill down search.Right now,no drill down search feature is available in the existing search engines like Google,Yahoo,Bing and Baidu.Drill down search is very much useful for the end user tofind the exact search results among the huge paginated search results.Higher level of drill down search with category based search feature leads to get the most accurate search results but it increases the number and size of thefile system.The purpose of this manuscript is to implement a big data storage reduction binaryfile system model for category based drill down search engine that offers fast multi-levelfiltering capability.The basic methodology of the proposed model stores the search engine data in the binaryfile system model.To verify the effectiveness of the proposedfile system model,5 million unique keyword data are stored into a binaryfile,thereby analysing the proposedfile system with efficiency.Some experimental results are also provided based on real data that show our storage model speed and superiority.Experiments demonstrated that ourfile system expansion ratio is constant and it reduces the disk storage space up to 30%with conventional database/file system and it also increases the search performance for any levels of search.To discuss deeply,the paper starts with the short introduction of drill down search followed by the discussion of important technologies used to implement big data storage reduction system in detail. 展开更多
关键词 Big data drill down search storage reduction model binaryfile system
下载PDF
基于“四重境界”的“互联网 + 档案”建设策略
8
作者 李映坤 《中国高新科技》 2021年第24期150-151,共2页
文章着重分析互联网视域下档案信息化建设的方式方法,了解其中的问题,并提出具体优化策略,旨在更好地提高档案信息化建设水平。
关键词 四重境界 互联网+ 档案管理
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部