The stamping-out strategy has been used to control highly pathogenic avian influenza viruses in many countries,driven by the belief that vaccination would not be successful against such viruses and fears that avian in...The stamping-out strategy has been used to control highly pathogenic avian influenza viruses in many countries,driven by the belief that vaccination would not be successful against such viruses and fears that avian influenza virus in vaccinated birds would evolve more rapidly and pose a greater risk to humans.In this review,we summarize the successes in controlling highly pathogenic avian influenza in China and make suggestions regarding the requirements for vaccine selection and effectiveness.In addition,we present evidence that vaccination of poultry not only eliminates human infection with avian influenza virus,but also significantly reduces and abolishes some harmful characteristics of avian influenza virus.展开更多
The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access cont...The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices.展开更多
As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS...As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS-CNT) are becoming increasingly critical. Traditional power distribution networks, often limited by unidirectional flow capabilities and inflexibility, struggle to meet the complex demands of modern energy systems. The CCS-CNT system offers a transformative approach by enabling bidirectional power flow between high-voltage transmission lines and local distribution networks, a feature that is essential for integrating renewable energy sources and ensuring reliable electrification in underserved regions. This paper presents a detailed mathematical representation of power flow within the CCS-CNT system, emphasizing the control of both active and reactive power through the adjustment of voltage levels and phase angles. A control algorithm is developed to dynamically manage power flow, ensuring optimal performance by minimizing losses and maintaining voltage stability across the network. The proposed CCS-CNT system demonstrates significant potential in enhancing the efficiency and reliability of power distribution, making it particularly suited for rural electrification and other applications where traditional methods fall short. The findings underscore the system's capability to adapt to varying operational conditions, offering a robust solution for modern power distribution challenges.展开更多
In this paper, the matrix Riccati equation is considered. There is no general way for solving the matrix Riccati equation despite the many fields to which it applies. While scalar Riccati equation has been studied tho...In this paper, the matrix Riccati equation is considered. There is no general way for solving the matrix Riccati equation despite the many fields to which it applies. While scalar Riccati equation has been studied thoroughly, matrix Riccati equation of which scalar Riccati equations is a particular case, is much less investigated. This article proposes a change of variable that allows to find explicit solution of the Matrix Riccati equation. We then apply this solution to Optimal Control.展开更多
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly...Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies.展开更多
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve...With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability.展开更多
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy...Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources.展开更多
Human agency has become increasingly limited in complex systems with increasingly automated decision-making capabilities.For instance,human occupants are passengers and do not have direct vehicle control in fully auto...Human agency has become increasingly limited in complex systems with increasingly automated decision-making capabilities.For instance,human occupants are passengers and do not have direct vehicle control in fully automated cars(i.e.,driverless cars).An interesting question is whether users are responsible for the accidents of these cars.Normative ethical and legal analyses frequently argue that individuals should not bear responsibility for harm beyond their control.Here,we consider human judgment of responsibility for accidents involving fully automated cars through three studies with seven experiments(N=2668).We compared the responsibility attributed to the occupants in three conditions:an owner in his private fully automated car,a passenger in a driverless robotaxi,and a passenger in a conventional taxi,where none of these three occupants have direct vehicle control over the involved vehicles that cause identical pedestrian injury.In contrast to normative analyses,we show that the occupants of driverless cars(private cars and robotaxis)are attributed more responsibility than conventional taxi passengers.This dilemma is robust across different contexts(e.g.,participants from China vs the Republic of Korea,participants with first-vs third-person perspectives,and occupant presence vs absence).Furthermore,we observe that this is not due to the perception that these occupants have greater control over driving but because they are more expected to foresee the potential consequences of using driverless cars.Our findings suggest that when driverless vehicles(private cars and taxis)cause harm,their users may face more social pressure,which public discourse and legal regulations should manage appropriately.展开更多
Geothermal is a clean energy source that is freely available in the subsurface. The exploitation of this vital resource needs intensive exploration in order to identify and quantify its occurrence. The three parameter...Geothermal is a clean energy source that is freely available in the subsurface. The exploitation of this vital resource needs intensive exploration in order to identify and quantify its occurrence. The three parameters considered when assessing the viability of a geothermal system include;heat source, fractures and fluids. Geological structures are important in transportation of fluids to and from the heat source aiding in recharge of the geothermal system and enhancing productivity. Remote sensing method was applied in mapping the structures at Barrier Volcanic Complex (BVC) by using hill shading technique which utilized four illumination angles of the sun (azimuth) i.e. 45°, 90°, 150°, and 315°, constant elevation of 45° and exaggeration of 10. The data used was Shuttle Radar Topographic Mission (SRTM) Satellite Imagery. ArcGIS Software was used for lineaments delineation and density mapping, PCI Geomatica was used to generate major faults, while Georose and Rockworks 17 were used to generate the rose diagrams. Geological structural analysis was done by delineating lineaments, determining the density distribution of lineaments and finally determining the structural trends of lineaments. The generated major faults in the area and the location of the occurrence of surface manifestations were compared with the generated lineaments. A total of 260 lineaments were generated whereby at 45° there was a total of 60 lineaments, at 90° 95 lineaments, at 150° 61 lineaments, and at 315° 44 lineaments. The results of structural analysis in the area as shown by the rose diagrams indicate an NNE-SSW and N-S trending of structures. In conclusion, the study area is highly fractured as indicated by the presence of numerous lineaments. These lineaments provide good recharge to the geothermal system and enhance the geothermal reservoir in the area.展开更多
Unmanned Aerial Vehicle(UAV)ad hoc network has achieved significant growth for its flexibility,extensibility,and high deployability in recent years.The application of clustering scheme for UAV ad hoc network is impera...Unmanned Aerial Vehicle(UAV)ad hoc network has achieved significant growth for its flexibility,extensibility,and high deployability in recent years.The application of clustering scheme for UAV ad hoc network is imperative to enhance the performance of throughput and energy efficiency.In conventional clustering scheme,a single cluster head(CH)is always assigned in each cluster.However,this method has some weaknesses such as overload and premature death of CH when the number of UAVs increased.In order to solve this problem,we propose a dual-cluster-head based medium access control(DCHMAC)scheme for large-scale UAV networks.In DCHMAC,two CHs are elected to manage resource allocation and data forwarding cooperatively.Specifically,two CHs work on different channels.One of CH is used for intra-cluster communication and the other one is for inter-cluster communication.A Markov chain model is developed to analyse the throughput of the network.Simulation result shows that compared with FM-MAC(flying ad hoc networks multi-channel MAC,FM-MAC),DCHMAC improves the throughput by approximately 20%~50%and prolongs the network lifetime by approximately 40%.展开更多
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw...A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model.展开更多
Strong evidence has accumulated to show a correlation between depression symptoms and inflammatory responses.Moreover,anti-inflammatory treatment has shown partial effectiveness in alleviating depression symptoms.Lyci...Strong evidence has accumulated to show a correlation between depression symptoms and inflammatory responses.Moreover,anti-inflammatory treatment has shown partial effectiveness in alleviating depression symptoms.Lycium barbarum polysaccharide(LBP),derived from Goji berries,exhibits notable antioxidative and anti-inflammatory properties.In our recent double-blinded randomized placebo-controlled trial,we found that LBP significantly reduced depressive symptoms in adolescents with subthreshold depression.It is presumed that the antidepressant effect of LBP may be associated with its influence on inflammatory cytokines.In the double-blinded randomized controlled trial,we enrolled 29 adolescents with subthreshold depression and randomly divided them into an LBP group and a placebo group.In the LBP group,adolescents were given 300 mg/d LBP.A 6-week follow up was completed by 24 adolescents,comprising 14 adolescents from the LBP group(15.36±2.06 years,3 men and 11 women)and 10 adolescents from the placebo group(14.9±1.6 years,2 men and 8 women).Our results showed that after 6 weeks of treatment,the interleukin-17A level in the LBP group was lower than that in the placebo group.Network analysis showed that LBP reduced the correlations and connectivity between inflammatory factors,which were associated with the improvement in depressive symptoms.These findings suggest that 6-week administration of LBP suppresses the immune response by reducing interleukin-17A level,thereby exerting an antidepressant effect.展开更多
In this article, the transmission dynamics of a Hand-Foot-Mouth disease model with treatment and vaccination interventions are studied. We calculated the basic reproduction number and proved the global stability of di...In this article, the transmission dynamics of a Hand-Foot-Mouth disease model with treatment and vaccination interventions are studied. We calculated the basic reproduction number and proved the global stability of disease-free equilibrium when R0 R0 > 1. Meanwhile, we obtained the optimal control strategies minimizing the cost of intervention and minimizing the infected person. We also give some numerical simulations to verify our theoretical results.展开更多
This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hos...This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment.展开更多
基金This work was supported by the National Key Research andDevelopment Programof China(2021YFD1800200 and2021YFC2301700).
文摘The stamping-out strategy has been used to control highly pathogenic avian influenza viruses in many countries,driven by the belief that vaccination would not be successful against such viruses and fears that avian influenza virus in vaccinated birds would evolve more rapidly and pose a greater risk to humans.In this review,we summarize the successes in controlling highly pathogenic avian influenza in China and make suggestions regarding the requirements for vaccine selection and effectiveness.In addition,we present evidence that vaccination of poultry not only eliminates human infection with avian influenza virus,but also significantly reduces and abolishes some harmful characteristics of avian influenza virus.
文摘The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices.
文摘As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS-CNT) are becoming increasingly critical. Traditional power distribution networks, often limited by unidirectional flow capabilities and inflexibility, struggle to meet the complex demands of modern energy systems. The CCS-CNT system offers a transformative approach by enabling bidirectional power flow between high-voltage transmission lines and local distribution networks, a feature that is essential for integrating renewable energy sources and ensuring reliable electrification in underserved regions. This paper presents a detailed mathematical representation of power flow within the CCS-CNT system, emphasizing the control of both active and reactive power through the adjustment of voltage levels and phase angles. A control algorithm is developed to dynamically manage power flow, ensuring optimal performance by minimizing losses and maintaining voltage stability across the network. The proposed CCS-CNT system demonstrates significant potential in enhancing the efficiency and reliability of power distribution, making it particularly suited for rural electrification and other applications where traditional methods fall short. The findings underscore the system's capability to adapt to varying operational conditions, offering a robust solution for modern power distribution challenges.
文摘In this paper, the matrix Riccati equation is considered. There is no general way for solving the matrix Riccati equation despite the many fields to which it applies. While scalar Riccati equation has been studied thoroughly, matrix Riccati equation of which scalar Riccati equations is a particular case, is much less investigated. This article proposes a change of variable that allows to find explicit solution of the Matrix Riccati equation. We then apply this solution to Optimal Control.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(No.2022R1I1A3063257)supported by the MSIT(Ministry of Science and ICT),Korea,under the Special R&D Zone Development Project(R&D)—Development of R&D Innovation Valley Support Program(2023-DD-RD-0152)supervised by the Innovation Foundation.
文摘Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies.
基金supported by National Key Research and Development Plan in China(Grant No.2020YFB1005500)Beijing Natural Science Foundation(Grant No.M21034)BUPT Excellent Ph.D Students Foundation(Grant No.CX2023218)。
文摘With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability.
基金Key Research and Development and Promotion Program of Henan Province(No.222102210069)Zhongyuan Science and Technology Innovation Leading Talent Project(224200510003)National Natural Science Foundation of China(No.62102449).
文摘Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources.
基金supported by the National Natural Science Foundation of China(72071143)。
文摘Human agency has become increasingly limited in complex systems with increasingly automated decision-making capabilities.For instance,human occupants are passengers and do not have direct vehicle control in fully automated cars(i.e.,driverless cars).An interesting question is whether users are responsible for the accidents of these cars.Normative ethical and legal analyses frequently argue that individuals should not bear responsibility for harm beyond their control.Here,we consider human judgment of responsibility for accidents involving fully automated cars through three studies with seven experiments(N=2668).We compared the responsibility attributed to the occupants in three conditions:an owner in his private fully automated car,a passenger in a driverless robotaxi,and a passenger in a conventional taxi,where none of these three occupants have direct vehicle control over the involved vehicles that cause identical pedestrian injury.In contrast to normative analyses,we show that the occupants of driverless cars(private cars and robotaxis)are attributed more responsibility than conventional taxi passengers.This dilemma is robust across different contexts(e.g.,participants from China vs the Republic of Korea,participants with first-vs third-person perspectives,and occupant presence vs absence).Furthermore,we observe that this is not due to the perception that these occupants have greater control over driving but because they are more expected to foresee the potential consequences of using driverless cars.Our findings suggest that when driverless vehicles(private cars and taxis)cause harm,their users may face more social pressure,which public discourse and legal regulations should manage appropriately.
文摘Geothermal is a clean energy source that is freely available in the subsurface. The exploitation of this vital resource needs intensive exploration in order to identify and quantify its occurrence. The three parameters considered when assessing the viability of a geothermal system include;heat source, fractures and fluids. Geological structures are important in transportation of fluids to and from the heat source aiding in recharge of the geothermal system and enhancing productivity. Remote sensing method was applied in mapping the structures at Barrier Volcanic Complex (BVC) by using hill shading technique which utilized four illumination angles of the sun (azimuth) i.e. 45°, 90°, 150°, and 315°, constant elevation of 45° and exaggeration of 10. The data used was Shuttle Radar Topographic Mission (SRTM) Satellite Imagery. ArcGIS Software was used for lineaments delineation and density mapping, PCI Geomatica was used to generate major faults, while Georose and Rockworks 17 were used to generate the rose diagrams. Geological structural analysis was done by delineating lineaments, determining the density distribution of lineaments and finally determining the structural trends of lineaments. The generated major faults in the area and the location of the occurrence of surface manifestations were compared with the generated lineaments. A total of 260 lineaments were generated whereby at 45° there was a total of 60 lineaments, at 90° 95 lineaments, at 150° 61 lineaments, and at 315° 44 lineaments. The results of structural analysis in the area as shown by the rose diagrams indicate an NNE-SSW and N-S trending of structures. In conclusion, the study area is highly fractured as indicated by the presence of numerous lineaments. These lineaments provide good recharge to the geothermal system and enhance the geothermal reservoir in the area.
基金supported in part by the Beijing Natural Science Foundation under Grant L192031the National Key Research and Development Program under Grant 2020YFA0711303。
文摘Unmanned Aerial Vehicle(UAV)ad hoc network has achieved significant growth for its flexibility,extensibility,and high deployability in recent years.The application of clustering scheme for UAV ad hoc network is imperative to enhance the performance of throughput and energy efficiency.In conventional clustering scheme,a single cluster head(CH)is always assigned in each cluster.However,this method has some weaknesses such as overload and premature death of CH when the number of UAVs increased.In order to solve this problem,we propose a dual-cluster-head based medium access control(DCHMAC)scheme for large-scale UAV networks.In DCHMAC,two CHs are elected to manage resource allocation and data forwarding cooperatively.Specifically,two CHs work on different channels.One of CH is used for intra-cluster communication and the other one is for inter-cluster communication.A Markov chain model is developed to analyse the throughput of the network.Simulation result shows that compared with FM-MAC(flying ad hoc networks multi-channel MAC,FM-MAC),DCHMAC improves the throughput by approximately 20%~50%and prolongs the network lifetime by approximately 40%.
基金supported by the National Natural Science Foundation of China Project(No.62302540)The Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020)+2 种基金Natural Science Foundation of Henan Province Project(No.232300420422)The Natural Science Foundation of Zhongyuan University of Technology(No.K2023QN018)Key Research and Promotion Project of Henan Province in 2021(No.212102310480).
文摘A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model.
基金supported by the National Natural Science Foundation of China,No.81671347(to KL)the Science and Technology Program of Guangzhou of China,No.202007030012(to KFS and KL)the Science and Technology Program of Guangzhou of China,No 202102020735(to RW).
文摘Strong evidence has accumulated to show a correlation between depression symptoms and inflammatory responses.Moreover,anti-inflammatory treatment has shown partial effectiveness in alleviating depression symptoms.Lycium barbarum polysaccharide(LBP),derived from Goji berries,exhibits notable antioxidative and anti-inflammatory properties.In our recent double-blinded randomized placebo-controlled trial,we found that LBP significantly reduced depressive symptoms in adolescents with subthreshold depression.It is presumed that the antidepressant effect of LBP may be associated with its influence on inflammatory cytokines.In the double-blinded randomized controlled trial,we enrolled 29 adolescents with subthreshold depression and randomly divided them into an LBP group and a placebo group.In the LBP group,adolescents were given 300 mg/d LBP.A 6-week follow up was completed by 24 adolescents,comprising 14 adolescents from the LBP group(15.36±2.06 years,3 men and 11 women)and 10 adolescents from the placebo group(14.9±1.6 years,2 men and 8 women).Our results showed that after 6 weeks of treatment,the interleukin-17A level in the LBP group was lower than that in the placebo group.Network analysis showed that LBP reduced the correlations and connectivity between inflammatory factors,which were associated with the improvement in depressive symptoms.These findings suggest that 6-week administration of LBP suppresses the immune response by reducing interleukin-17A level,thereby exerting an antidepressant effect.
文摘In this article, the transmission dynamics of a Hand-Foot-Mouth disease model with treatment and vaccination interventions are studied. We calculated the basic reproduction number and proved the global stability of disease-free equilibrium when R0 R0 > 1. Meanwhile, we obtained the optimal control strategies minimizing the cost of intervention and minimizing the infected person. We also give some numerical simulations to verify our theoretical results.
文摘This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment.