The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved...The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section.展开更多
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu...With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.展开更多
This paper presents a cloud-based data-driven design optimization system,named DADOS,to help engineers and researchers improve a design or product easily and efficiently.DADOS has nearly 30 key algorithms,including th...This paper presents a cloud-based data-driven design optimization system,named DADOS,to help engineers and researchers improve a design or product easily and efficiently.DADOS has nearly 30 key algorithms,including the design of experiments,surrogate models,model validation and selection,prediction,optimization,and sensitivity analysis.Moreover,it also includes an exclusive ensemble surrogate modeling technique,the extended hybrid adaptive function,which can make use of the advantages of each surrogate and eliminate the effort of selecting the appropriate individual surrogate.To improve ease of use,DADOS provides a user-friendly graphical user interface and employed flow-based programming so that users can conduct design optimization just by dragging,dropping,and connecting algorithm blocks into a workflow instead of writing massive code.In addition,DADOS allows users to visualize the results to gain more insights into the design problems,allows multi-person collaborating on a project at the same time,and supports multi-disciplinary optimization.This paper also details the architecture and the user interface of DADOS.Two examples were employed to demonstrate how to use DADOS to conduct data-driven design optimization.Since DADOS is a cloud-based system,anyone can access DADOS at www.dados.com.cn using their web browser without the need for installation or powerful hardware.展开更多
Cloud-based satellite and terrestrial spectrum shared networks(CB-STSSN)combines the triple advantages of efficient and flexible net-work management of heterogeneous cloud access(H-CRAN),vast coverage of satellite net...Cloud-based satellite and terrestrial spectrum shared networks(CB-STSSN)combines the triple advantages of efficient and flexible net-work management of heterogeneous cloud access(H-CRAN),vast coverage of satellite networks,and good communication quality of terrestrial networks.Thanks to the complementary coverage characteristics,any-time and anywhere high-speed communications can be achieved to meet the various needs of users.The scarcity of spectrum resources is a common prob-lem in both satellite and terrestrial networks.In or-der to improve resource utilization,the spectrum is shared not only within each component but also be-tween satellite beams and terrestrial cells,which intro-duces inter-component interferences.To this end,this paper first proposes an analytical framework which considers the inter-component interferences induced by spectrum sharing(SS).An intelligent SS scheme based on radio map(RM)consisting of LSTM-based beam prediction(BP),transfer learning-based spec-trum prediction(SP)and joint non-preemptive prior-ity and preemptive priority(J-NPAP)-based propor-tional fair spectrum allocation is than proposed.The simulation result shows that the spectrum utilization rate of CB-STSSN is improved and user blocking rate and waiting probability are decreased by the proposed scheme.展开更多
An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio wa...An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time.展开更多
Mixed redundancy strategies are generally used in cloud-based systems,with different node switch mechanisms from traditional fault-tolerant strategies.Existing studies often concentrate on optimizing a single strategy...Mixed redundancy strategies are generally used in cloud-based systems,with different node switch mechanisms from traditional fault-tolerant strategies.Existing studies often concentrate on optimizing a single strategy in cloud computing environment and ignore the impact of mixed redundancy strategies.Therefore,a model is proposed to evaluate and optimize the reliability and performance of cloud-based degraded systems subject to a mixed active and cold standby redundancy strategy.In this strategy,node switching is triggered by a continual monitoring and detection mechanism when active nodes fail.To evaluate the transient availability and the expected job completion rate of systems with such kind of strategy,a continuous-time Markov chain model is built on the state transition process and a numerical method is used to solve the model.To choose the optimal redundancy for the mixed strategy under system constraints,a greedy search algorithm is proposed after sensitivity analysis.Illustrative examples were presented to explain the process of calculating the transient probability of each system state and in turn,the availability and performance of the whole system.It was shown that the near-optimal redundancy solution could be obtained using the optimizationmethod.The comparison with optimization of the traditional mixed redundancy strategy proved that the system behavior was different using different kinds of mixed strategies and less redundancy was assigned for the new type of mixed strategy under the same system constraint.展开更多
BACKGROUND The relation between orthodontic treatment and temporomandibular disorders(TMDs)is under debate;the management of TMD during orthodontic treatment has always been a challenge.If TMD symptoms occur during or...BACKGROUND The relation between orthodontic treatment and temporomandibular disorders(TMDs)is under debate;the management of TMD during orthodontic treatment has always been a challenge.If TMD symptoms occur during orthodontic treatment,an immediate pause of orthodontic adjustments is recommended;the treatment can resume when the symptoms are managed and stabilized.CASE SUMMARY This case report presents a patient(26-year-old,female)with angle class I,skeletal class II and TMDs.The treatment was a hybrid of clear aligners,fixed appliances and temporary anchorage devices(TADs).After 3 mo resting and treatment on her TMD,the patient’s TMD symptom alleviated,but her anterior occlusion displayed deep overbite.Therefore,the fixed appliances with TAD were used to correct the anterior deep-bite and level maxillary and mandibular deep curves.After the levelling,the patient showed dual bite with centric relation and maximum intercuspation discrepancy on her occlusion.After careful examination of temporomandibular joints(TMJ)position,the stable bite splint and Invisible Mandibular Advancement appliance were used to reconstruct her occlusion.Eventually,the improved facial appearance and relatively stable occlusion were achieved.The 1-year follow-up records showed there was no obvious change in TMJ morphology,and her occlusion was stable.CONCLUSION TMD screening and monitoring is of great clinical importance in the TMD susceptible patients.Hybrid treatment with clear aligners and fixed appliances and TADs is an effective treatment modality for the complex cases.展开更多
The study of machine learning has revealed that it can unleash new applications in a variety of disciplines.Many limitations limit their expressiveness,and researchers are working to overcome them to fully exploit the...The study of machine learning has revealed that it can unleash new applications in a variety of disciplines.Many limitations limit their expressiveness,and researchers are working to overcome them to fully exploit the power of data-driven machine learning(ML)and deep learning(DL)techniques.The data imbalance presents major hurdles for classification and prediction problems in machine learning,restricting data analytics and acquiring relevant insights in practically all real-world research domains.In visual learning,network information security,failure prediction,digital marketing,healthcare,and a variety of other domains,raw data suffers from a biased data distribution of one class over the other.This article aims to present a taxonomy of the approaches for handling imbalanced data problems and their comparative study on the classification metrics and their application areas.We have explored very recent trends of techniques employed for solutions to class imbalance problems in datasets and have also discussed their limitations.This article has also identified open challenges for further research in the direction of class data imbalance.展开更多
The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprin...The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.展开更多
Extensive numerical simulations and scaling analysis are performed to investigate competitive growth between the linear and nonlinear stochastic dynamic growth systems, which belong to the Edwards–Wilkinson(EW) and K...Extensive numerical simulations and scaling analysis are performed to investigate competitive growth between the linear and nonlinear stochastic dynamic growth systems, which belong to the Edwards–Wilkinson(EW) and Kardar–Parisi–Zhang(KPZ) universality classes, respectively. The linear growth systems include the EW equation and the model of random deposition with surface relaxation(RDSR), the nonlinear growth systems involve the KPZ equation and typical discrete models including ballistic deposition(BD), etching, and restricted solid on solid(RSOS). The scaling exponents are obtained in both the(1 + 1)-and(2 + 1)-dimensional competitive growth with the nonlinear growth probability p and the linear proportion 1-p. Our results show that, when p changes from 0 to 1, there exist non-trivial crossover effects from EW to KPZ universality classes based on different competitive growth rules. Furthermore, the growth rate and the porosity are also estimated within various linear and nonlinear growths of cooperation and competition.展开更多
This study analyzed the difference between using a downward breaststroke kick and a horizontal breaststroke kick in a sample of world class elite swimmers.We compared average muscle activity of the gluteus maximus,qua...This study analyzed the difference between using a downward breaststroke kick and a horizontal breaststroke kick in a sample of world class elite swimmers.We compared average muscle activity of the gluteus maximus,quadriceps femoris(vastus medialis and rectus femoris),hamstring/long head of the biceps femoris,gastrocnemius medialis,rectus abdominal,and erector spinae when using the downward breaststroke kick technique.We find that when this sample of swimmers utilized the downward breaststroke kick,max speed and velocity per stroke increased,measured by 12,788 EMG samples,where the results are highly correlated to duration of the aerodynamic buoyant force in breaststroke kick technique.The increases in performance observed from measuring the world class elite swimmers is highly correlated to the duration of the kick aerodynamic buoyant force.Among this sample of elite swimmers,the longer a swimmer demonstrates a buoyant force breaststroke kick,the lower the time in a 100 breaststroke.展开更多
BACKGROUND Severe skeletal class II malocclusion is the indication for combined orthodontic and orthognathic treatment.CASE SUMMARY A woman with a chief complaint of a protruding chin and an inability to close her lip...BACKGROUND Severe skeletal class II malocclusion is the indication for combined orthodontic and orthognathic treatment.CASE SUMMARY A woman with a chief complaint of a protruding chin and an inability to close her lips requested orthodontic camouflage.The treatment plan consisted of extracting the right upper third molar,right lower third molar,left lower second molar,and left upper third molar and moving the maxillary dentition distally using a convenient method involving microimplant nail anchors,push springs,long arm traction hooks,and elastic traction chains.After 52 months of treatment,her overbite and overjet were normal,and her facial profile was favorable.CONCLUSION This method can be used for distal movement of the maxillary dentition and to correct severe skeletal class II malocclusion in adults.展开更多
As an online course-teaching mode,Massive Open Online Course(MOOC)has drawn great attention from both teachers and students.It is necessary to give full play to the advantages of MOOC resources and to enhance teachers...As an online course-teaching mode,Massive Open Online Course(MOOC)has drawn great attention from both teachers and students.It is necessary to give full play to the advantages of MOOC resources and to enhance teachers’consciousness of“identity remodeling”in the process of Integrated Business English flipping classroom teaching.Combining the advantages of MOOC and flipped classroom teaching during before-,during-,and after-class will greatly help promote the overall quality of business English teaching in universities.展开更多
This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while ...This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter.展开更多
The professional and moral education of high school mathematics teachers will make classroom management work better,but their work pressure will also lead to classroom management problems.To do a good job in high scho...The professional and moral education of high school mathematics teachers will make classroom management work better,but their work pressure will also lead to classroom management problems.To do a good job in high school class teacher management and organically integrate it with mathematics teaching,we need to start from two aspects:mathematics teaching class teachers and class teacher work teaching,and penetrate mathematical thinking into daily classroom management,moral education,and classroom culture construction.Based on the attributes of the subject,we guide high school students to reflect after class to stimulate their self-management initiative through the cultivation of qualified class representatives.In addition,it is necessary to skillfully resolve classroom generative problems,change the roles of teachers and students,and integrate classroom management with mathematics teaching.展开更多
Based on the characteristics of College English teaching in minority classes,this paper analyzes the ideological and political teaching cases of College English courses in ethnic minority classes from four aspects:bef...Based on the characteristics of College English teaching in minority classes,this paper analyzes the ideological and political teaching cases of College English courses in ethnic minority classes from four aspects:before-class,in-class(flipped classroom teaching),after-class,and teaching design feedback(feedback on students’learning situation,teaching content and methods),starts from the three aspects of knowledge impartation,ability improvement,and value guidance,and integrates the course ideology and politics into the theme,language,and reality,so as to form a“one point and three sides”course ideological and political teaching model.展开更多
文摘The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section.
基金financially supported by the National Natural Science Foundation of China(No.61303216,No.61272457,No.U1401251,and No.61373172)the National High Technology Research and Development Program of China(863 Program)(No.2012AA013102)National 111 Program of China B16037 and B08038
文摘With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.
基金Supported by National Key Research and Development Program of China (Grant No.2018YFB1700704)National Natural Science Foundation of China (Grant No.52075068)。
文摘This paper presents a cloud-based data-driven design optimization system,named DADOS,to help engineers and researchers improve a design or product easily and efficiently.DADOS has nearly 30 key algorithms,including the design of experiments,surrogate models,model validation and selection,prediction,optimization,and sensitivity analysis.Moreover,it also includes an exclusive ensemble surrogate modeling technique,the extended hybrid adaptive function,which can make use of the advantages of each surrogate and eliminate the effort of selecting the appropriate individual surrogate.To improve ease of use,DADOS provides a user-friendly graphical user interface and employed flow-based programming so that users can conduct design optimization just by dragging,dropping,and connecting algorithm blocks into a workflow instead of writing massive code.In addition,DADOS allows users to visualize the results to gain more insights into the design problems,allows multi-person collaborating on a project at the same time,and supports multi-disciplinary optimization.This paper also details the architecture and the user interface of DADOS.Two examples were employed to demonstrate how to use DADOS to conduct data-driven design optimization.Since DADOS is a cloud-based system,anyone can access DADOS at www.dados.com.cn using their web browser without the need for installation or powerful hardware.
基金the National Nat-ural Science Foundation of China under Grants 61771163the Natural Science Foundation for Out-standing Young Scholars of Heilongjiang Province un-der Grant YQ2020F001the Science and Technol-ogy on Communication Networks Laboratory under Grants SXX19641X072 and SXX18641X028.(Cor-respondence author:Min Jia)。
文摘Cloud-based satellite and terrestrial spectrum shared networks(CB-STSSN)combines the triple advantages of efficient and flexible net-work management of heterogeneous cloud access(H-CRAN),vast coverage of satellite networks,and good communication quality of terrestrial networks.Thanks to the complementary coverage characteristics,any-time and anywhere high-speed communications can be achieved to meet the various needs of users.The scarcity of spectrum resources is a common prob-lem in both satellite and terrestrial networks.In or-der to improve resource utilization,the spectrum is shared not only within each component but also be-tween satellite beams and terrestrial cells,which intro-duces inter-component interferences.To this end,this paper first proposes an analytical framework which considers the inter-component interferences induced by spectrum sharing(SS).An intelligent SS scheme based on radio map(RM)consisting of LSTM-based beam prediction(BP),transfer learning-based spec-trum prediction(SP)and joint non-preemptive prior-ity and preemptive priority(J-NPAP)-based propor-tional fair spectrum allocation is than proposed.The simulation result shows that the spectrum utilization rate of CB-STSSN is improved and user blocking rate and waiting probability are decreased by the proposed scheme.
文摘An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time.
基金supported by the National Natural Science Foundation of China(Grant No.61309005)the Basic and Frontier Research Program of Chongqing(Grant No.cstc2014jcyj A40015)
文摘Mixed redundancy strategies are generally used in cloud-based systems,with different node switch mechanisms from traditional fault-tolerant strategies.Existing studies often concentrate on optimizing a single strategy in cloud computing environment and ignore the impact of mixed redundancy strategies.Therefore,a model is proposed to evaluate and optimize the reliability and performance of cloud-based degraded systems subject to a mixed active and cold standby redundancy strategy.In this strategy,node switching is triggered by a continual monitoring and detection mechanism when active nodes fail.To evaluate the transient availability and the expected job completion rate of systems with such kind of strategy,a continuous-time Markov chain model is built on the state transition process and a numerical method is used to solve the model.To choose the optimal redundancy for the mixed strategy under system constraints,a greedy search algorithm is proposed after sensitivity analysis.Illustrative examples were presented to explain the process of calculating the transient probability of each system state and in turn,the availability and performance of the whole system.It was shown that the near-optimal redundancy solution could be obtained using the optimizationmethod.The comparison with optimization of the traditional mixed redundancy strategy proved that the system behavior was different using different kinds of mixed strategies and less redundancy was assigned for the new type of mixed strategy under the same system constraint.
基金Natural Science Foundation of Jiangsu Province, No. SBK2021021787the Major Project of the Health Commission ofJiangsu Province, No. ZD2022025and the Key Project of the Nanjing Health Commission, No. ZKX20048.
文摘BACKGROUND The relation between orthodontic treatment and temporomandibular disorders(TMDs)is under debate;the management of TMD during orthodontic treatment has always been a challenge.If TMD symptoms occur during orthodontic treatment,an immediate pause of orthodontic adjustments is recommended;the treatment can resume when the symptoms are managed and stabilized.CASE SUMMARY This case report presents a patient(26-year-old,female)with angle class I,skeletal class II and TMDs.The treatment was a hybrid of clear aligners,fixed appliances and temporary anchorage devices(TADs).After 3 mo resting and treatment on her TMD,the patient’s TMD symptom alleviated,but her anterior occlusion displayed deep overbite.Therefore,the fixed appliances with TAD were used to correct the anterior deep-bite and level maxillary and mandibular deep curves.After the levelling,the patient showed dual bite with centric relation and maximum intercuspation discrepancy on her occlusion.After careful examination of temporomandibular joints(TMJ)position,the stable bite splint and Invisible Mandibular Advancement appliance were used to reconstruct her occlusion.Eventually,the improved facial appearance and relatively stable occlusion were achieved.The 1-year follow-up records showed there was no obvious change in TMJ morphology,and her occlusion was stable.CONCLUSION TMD screening and monitoring is of great clinical importance in the TMD susceptible patients.Hybrid treatment with clear aligners and fixed appliances and TADs is an effective treatment modality for the complex cases.
文摘The study of machine learning has revealed that it can unleash new applications in a variety of disciplines.Many limitations limit their expressiveness,and researchers are working to overcome them to fully exploit the power of data-driven machine learning(ML)and deep learning(DL)techniques.The data imbalance presents major hurdles for classification and prediction problems in machine learning,restricting data analytics and acquiring relevant insights in practically all real-world research domains.In visual learning,network information security,failure prediction,digital marketing,healthcare,and a variety of other domains,raw data suffers from a biased data distribution of one class over the other.This article aims to present a taxonomy of the approaches for handling imbalanced data problems and their comparative study on the classification metrics and their application areas.We have explored very recent trends of techniques employed for solutions to class imbalance problems in datasets and have also discussed their limitations.This article has also identified open challenges for further research in the direction of class data imbalance.
基金supported by National Key R&D Program of China(2019YFB2102303)National Natural Science Foundation of China(NSFC61971014,NSFC11675199)Young Backbone Teacher Training Program of Henan Colleges and Universities(2021GGJS170).
文摘The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.
基金supported by Undergraduate Training Program for Innovation and Entrepreneurship of China University of Mining and Technology (CUMT)(Grant No. 202110290059Z)Fundamental Research Funds for the Central Universities of CUMT (Grant No. 2020ZDPYMS33)。
文摘Extensive numerical simulations and scaling analysis are performed to investigate competitive growth between the linear and nonlinear stochastic dynamic growth systems, which belong to the Edwards–Wilkinson(EW) and Kardar–Parisi–Zhang(KPZ) universality classes, respectively. The linear growth systems include the EW equation and the model of random deposition with surface relaxation(RDSR), the nonlinear growth systems involve the KPZ equation and typical discrete models including ballistic deposition(BD), etching, and restricted solid on solid(RSOS). The scaling exponents are obtained in both the(1 + 1)-and(2 + 1)-dimensional competitive growth with the nonlinear growth probability p and the linear proportion 1-p. Our results show that, when p changes from 0 to 1, there exist non-trivial crossover effects from EW to KPZ universality classes based on different competitive growth rules. Furthermore, the growth rate and the porosity are also estimated within various linear and nonlinear growths of cooperation and competition.
文摘This study analyzed the difference between using a downward breaststroke kick and a horizontal breaststroke kick in a sample of world class elite swimmers.We compared average muscle activity of the gluteus maximus,quadriceps femoris(vastus medialis and rectus femoris),hamstring/long head of the biceps femoris,gastrocnemius medialis,rectus abdominal,and erector spinae when using the downward breaststroke kick technique.We find that when this sample of swimmers utilized the downward breaststroke kick,max speed and velocity per stroke increased,measured by 12,788 EMG samples,where the results are highly correlated to duration of the aerodynamic buoyant force in breaststroke kick technique.The increases in performance observed from measuring the world class elite swimmers is highly correlated to the duration of the kick aerodynamic buoyant force.Among this sample of elite swimmers,the longer a swimmer demonstrates a buoyant force breaststroke kick,the lower the time in a 100 breaststroke.
基金Supported by Medical Science Research Project Plan by Health Commission of the Hebei Province,No.20220063.
文摘BACKGROUND Severe skeletal class II malocclusion is the indication for combined orthodontic and orthognathic treatment.CASE SUMMARY A woman with a chief complaint of a protruding chin and an inability to close her lips requested orthodontic camouflage.The treatment plan consisted of extracting the right upper third molar,right lower third molar,left lower second molar,and left upper third molar and moving the maxillary dentition distally using a convenient method involving microimplant nail anchors,push springs,long arm traction hooks,and elastic traction chains.After 52 months of treatment,her overbite and overjet were normal,and her facial profile was favorable.CONCLUSION This method can be used for distal movement of the maxillary dentition and to correct severe skeletal class II malocclusion in adults.
基金“Provincial Online and Offline Hybrid First-Class Course-Integrated Business English 1-of Zhejiang Province in 2020”.
文摘As an online course-teaching mode,Massive Open Online Course(MOOC)has drawn great attention from both teachers and students.It is necessary to give full play to the advantages of MOOC resources and to enhance teachers’consciousness of“identity remodeling”in the process of Integrated Business English flipping classroom teaching.Combining the advantages of MOOC and flipped classroom teaching during before-,during-,and after-class will greatly help promote the overall quality of business English teaching in universities.
文摘This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter.
文摘The professional and moral education of high school mathematics teachers will make classroom management work better,but their work pressure will also lead to classroom management problems.To do a good job in high school class teacher management and organically integrate it with mathematics teaching,we need to start from two aspects:mathematics teaching class teachers and class teacher work teaching,and penetrate mathematical thinking into daily classroom management,moral education,and classroom culture construction.Based on the attributes of the subject,we guide high school students to reflect after class to stimulate their self-management initiative through the cultivation of qualified class representatives.In addition,it is necessary to skillfully resolve classroom generative problems,change the roles of teachers and students,and integrate classroom management with mathematics teaching.
基金Research Topic of Higher Education of Heilongjiang Higher Education Society(Research on Innovation of English Teaching Curriculum Construction System for Minority Classes in Colleges and Universities Under Digital Empowerment(Fund No.23GJYBJ022)Reform and Innovation Project of Foreign Language Education in Undergraduate Colleges in Heilongjiang Province(Research on the Construction of Ubiquitous Learning Mode of Integrating College English Humanistic Literacy and Language Skills Under the Background of New Engineering(Fund No.HWX2022004-A)Research on the Construction and Effectiveness of College English 4I Seminar Teaching Mode Under the Background of the General Project of Provincial Higher Education Teaching Reform in 2021“First-Class Undergraduate Course”(Fund No.SJGY20210164).
文摘Based on the characteristics of College English teaching in minority classes,this paper analyzes the ideological and political teaching cases of College English courses in ethnic minority classes from four aspects:before-class,in-class(flipped classroom teaching),after-class,and teaching design feedback(feedback on students’learning situation,teaching content and methods),starts from the three aspects of knowledge impartation,ability improvement,and value guidance,and integrates the course ideology and politics into the theme,language,and reality,so as to form a“one point and three sides”course ideological and political teaching model.