Objective Despite the adoption of various permeability enhancement technologies,the low permeability of coal reservoir has not been fundamentally improved for the development of coalbed methane(CBM)on the ground or ...Objective Despite the adoption of various permeability enhancement technologies,the low permeability of coal reservoir has not been fundamentally improved for the development of coalbed methane(CBM)on the ground or the control of gas underground.展开更多
As emerging technologies have advanced,some countries have issued reports on human performance enhancement efforts in recent years.Human performance enhancement is a prominent theme in the military field.As a type of ...As emerging technologies have advanced,some countries have issued reports on human performance enhancement efforts in recent years.Human performance enhancement is a prominent theme in the military field.As a type of potentially disruptive technology,human performance enhancement technology(HPET)is of vital importance in promoting military combat effectiveness,developing national defense science and technology,and transforming military medicine.This paper analyzes the current development status of critical HPETs,examines challenges facing such development,and points out existing problems in the field.Finally,future development directions of HPET are suggested.We hope this review will be of interest to scientists and engineers,who should carefully develop this technology to maximize human potential and focus on our social security.展开更多
Background and Objective:Social media(SoMe)has emerged as a tool in health professions education(HPE),particularly amidst the challenges posed by the coronavirus disease 2019(COVID-19)pandemic.Despite the academia’s ...Background and Objective:Social media(SoMe)has emerged as a tool in health professions education(HPE),particularly amidst the challenges posed by the coronavirus disease 2019(COVID-19)pandemic.Despite the academia’s initial skepticism SoMe has been gaining traction in supporting learning communities,and offering opportunities for innovation in HPE.Our study aims to explore the integration of SoMe in HPE.Four key components were outlined as necessary for a successful integration,and include designing learning experiences,defining educator roles,selecting appropriate platforms,and establishing educational objectives.Methods:This article stemmed from the online Teaching Skills Series module on SoMe in education from the Ophthalmology Foundation,and drew upon evidence supporting learning theories relevant to SoMe integration and models of education.Additionally,we conducted a literature review considering Englishlanguage articles on the application of SoMe in ophthalmology from PubMed over the past decade.Key Content and Findings:Early adopters of SoMe platforms in HPE have leveraged these tools to enhance learning experiences through interaction,dialogue,content sharing,and active learning strategies.By integrating SoMe into educational programs,both online and in-person,educators can overcome time and geographical constraints,fostering more diverse and inclusive learning communities.Careful consideration is,however,necessary to address potential limitations within HPE.Conclusions:This article lays groundwork for expanding SoMe integration in HPE design,emphasizing the supportive scaffold of various learning theories,and the need of furthering robust research on examining its advantages over traditional educational formats.Our literature review underscores an ongoing multifaceted,random application of SoMe platforms in ophthalmology education.We advocate for an effective incorporation of SoMe in HPE education,with the need to comply with good educational practice.展开更多
Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, renderin...Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, rendering many existing defences ineffective. This study performs a large-scale measurement of online tracking mechanisms across a large pool of websites using the OpenWPM (Open Web Privacy Measurement) platform. It systematically evaluates the effectiveness of several ad blockers and underlying Privacy Enhancing Technologies (PET) that are primarily used to mitigate different tracking techniques. By quantifying the strengths and limitations of these tools against modern tracking methods, the findings highlight gaps in existing privacy protections. Actionable recommendations are provided to enhance user privacy defences, guide tool developers and inform policymakers on addressing invasive online tracking practices.展开更多
Artificial intelligence (AI) has garnered significant interest within the educational domain over the past decade, promising to revolutionise teaching and learning. This paper provides a comprehensive overview of syst...Artificial intelligence (AI) has garnered significant interest within the educational domain over the past decade, promising to revolutionise teaching and learning. This paper provides a comprehensive overview of systematic reviews conducted from 2010 to 2023 on the implementation of AI in K-12 education. By synthesising findings from ten selected systematic reviews, this study explores the multifaceted opportunities and challenges posed by AI in education. The analysis reveals several key findings: AI’s potential to personalise learning, enhance student motivation, and improve teaching efficiency are highlighted as major strengths. However, the study also identifies critical concerns, including teacher resistance, high implementation costs, ethical considerations, and the need for extensive teacher training. These findings represent the most significant insights from the analysis, while additional findings further underscore the complexity and scope of AI integration in educational settings. The study employs a SWOT analysis to summarise these insights, identifying key areas for future research and policy development. This review aims to guide educators, policymakers, and researchers in effectively leveraging AI to enhance educational outcomes while addressing its inherent challenges.展开更多
Within the seven years’ period from 1987 to 1994. the total installed capacity of China’s electric power industry doubled from 100 GW to 200 GW. This high rate of growth has imposed new and more stringent requiremen...Within the seven years’ period from 1987 to 1994. the total installed capacity of China’s electric power industry doubled from 100 GW to 200 GW. This high rate of growth has imposed new and more stringent requirements on all the branches in the展开更多
A new gas hydrate reservoir stimulation method of in-situ fracturing with transient heating is proposed, in line with analysis of the technological bottlenecks faced by marine gas hydrate production. This method injec...A new gas hydrate reservoir stimulation method of in-situ fracturing with transient heating is proposed, in line with analysis of the technological bottlenecks faced by marine gas hydrate production. This method injects the developed chemical reagents into a hydrate reservoir through hydraulic fracturing, releasing heat during the chemical reaction to increase the hydrate decomposition rate. The chemical reaction product furthermore has a honeycomb structure to support fractures and increase reservoir permeability. Based on the geological model of natural gas hydrate in the South China Sea, three development methods are simulated to evaluate hydrate production capacity, consisting of horizontal well, fractured horizontal well and in-situ fracturing with transient heating well. Compared with the horizontal well, the simulation results show that the cumulative gas production of the fractured horizontal well in one year is 7 times that of the horizontal well, while the cumulative gas production of in-situ fracturing with transient heating well is 12 times that of the horizontal well, which significantly improves daily efficiency and cumulative gas production. In addition, the variation patterns of hydrate saturation and temperature-pressure fields with production time for the three exploitation plans are presented, it being found that three sensitive parameters of fracture conductivity, fracture half-length and fracture number are positively correlated with hydrate production enhancement. Through the simulations, basic data and theoretical support for the optimization of gas hydrate reservoir stimulation scheme has been provided.展开更多
BACKGROUND It was shown in previous studies that high definition endoscopy, high magnification endoscopy and image enhancement technologies, such as chromoendoscopy and digital chromoendoscopy [narrow-band imaging(NBI...BACKGROUND It was shown in previous studies that high definition endoscopy, high magnification endoscopy and image enhancement technologies, such as chromoendoscopy and digital chromoendoscopy [narrow-band imaging(NBI), iScan] facilitate the detection and classification of colonic polyps during endoscopic sessions. However, there are no comprehensive studies so far that analyze which endoscopic imaging modalities facilitate the automated classification of colonic polyps. In this work, we investigate the impact of endoscopic imaging modalities on the results of computer-assisted diagnosis systems for colonic polyp staging.AIM To assess which endoscopic imaging modalities are best suited for the computerassisted staging of colonic polyps.METHODS In our experiments, we apply twelve state-of-the-art feature extraction methods for the classification of colonic polyps to five endoscopic image databases of colonic lesions. For this purpose, we employ a specifically designed experimental setup to avoid biases in the outcomes caused by differing numbers of images per image database. The image databases were obtained using different imaging modalities. Two databases were obtained by high-definition endoscopy in combination with i-Scan technology(one with chromoendoscopy and one without chromoendoscopy). Three databases were obtained by highmagnification endoscopy(two databases using narrow band imaging and one using chromoendoscopy). The lesions are categorized into non-neoplastic and neoplastic according to the histological diagnosis.RESULTS Generally, it is feature-dependent which imaging modalities achieve high results and which do not. For the high-definition image databases, we achieved overall classification rates of up to 79.2% with chromoendoscopy and 88.9% without chromoendoscopy. In the case of the database obtained by high-magnification chromoendoscopy, the classification rates were up to 81.4%. For the combination of high-magnification endoscopy with NBI, results of up to 97.4% for one database and up to 84% for the other were achieved. Non-neoplastic lesions were classified more accurately in general than non-neoplastic lesions. It was shown that the image recording conditions highly affect the performance of automated diagnosis systems and partly contribute to a stronger effect on the staging results than the used imaging modality.CONCLUSION Chromoendoscopy has a negative impact on the results of the methods. NBI is better suited than chromoendoscopy. High-definition and high-magnification endoscopy are equally suited.展开更多
We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After e...We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After executing the queries,the content of the server's set remains secret.One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy-preserving way.We apply the Bloom filter and the Cuckoo filter in the membership test procedure.In order to achieve privacy properties,we present a novel protocol based on some homomorphic encryption schemes.In our protocol,we rearrange the data in the set into N-dimensional hypercubes.We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company.The evaluation shows that our method is feasible for real-world applications.We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions:2-dimensional,3-dimensional,and 4-dimensional hypercubes.We present formulas to estimate the cost of computation and communication in our protocol.展开更多
In recent years,the enabling role of technology has been widely recognized in second language teaching and learning.Using a co-word analysis approach,this study aims to present the state-ofthe-art current literature i...In recent years,the enabling role of technology has been widely recognized in second language teaching and learning.Using a co-word analysis approach,this study aims to present the state-ofthe-art current literature in technology enhanced language learning.The analysis results show that most popular research themes from 2010 to 2020 are CMC,L2 writing,teacher education,L2 motivation,students’attitudes,SLA,L2 vocabulary learning,L2 reading,EFL,and L2 learners.Compared with these key themes,publications on technology enhanced teaching Chinese as a foreign language focus more on the investigation of the effectiveness of the use of latest technologies such as smart phones,virtual reality,intelligent tools,and gamification.Based on the findings of these investigations,the latest developments in these areas are synthesized and presented accordingly.In addition,newly-emerged key themes about the co-word analysis are also reported and their contributions to future investigations is briefly discussed.The implications for future research in technology enhanced teaching Chinese as a foreign language is also discussed.展开更多
Physical objects are getting connected to the Internet at an exceptional rate,making the idea of the Internet of Things(IoT)a reality.The IoT ecosystem is evident everywhere in the form of smart homes,health care syst...Physical objects are getting connected to the Internet at an exceptional rate,making the idea of the Internet of Things(IoT)a reality.The IoT ecosystem is evident everywhere in the form of smart homes,health care systems,wearables,connected vehicles,and industries.This has given rise to risks associated with the privacy and security of systems.Security issues and cyber attacks on IoT devices may potentially hinder the growth of IoT products due to deficiencies in the architecture.To counter these issues,we need to implement privacy and security right from the building blocks of IoT.The IoT architecture has evolved over the years,improving the stack of architecture with new solutions such as scalability,management,interoperability,and extensibility.This emphasizes the need to standardize and organize the IoT reference architecture in federation with privacy and security concerns.In this study,we examine and analyze 12 existing IoT reference architectures to identify their shortcomings on the basis of the requirements addressed in the standards.We propose an architecture,the privacy-federated IoT security reference architecture(PF-IoT-SRA),which interprets all the involved privacy metrics and counters major threats and attacks in the IoT communication environment.It is a step toward the standardization of the domain architecture.We effectively validate our proposed reference architecture using the architecture trade-off analysis method(ATAM),an industry-recognized scenario-based approach.展开更多
In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce una...In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce unauthorized use of software while keeping the privacy of users. To the best of our knowledge, this is the first system that the privacy of users is guaranteed in software registration. Our system enjoys a modular design and can be implemented by any secure ID-based partially blind signature scheme. Furthermore, the proposal allows flexible registration information definition. This feature makes our scheme flexible and practical for more software registration applications.展开更多
基金financially supported by the National Natural Sciences Foundation of China(grant No.NSFC 41472127)
文摘Objective Despite the adoption of various permeability enhancement technologies,the low permeability of coal reservoir has not been fundamentally improved for the development of coalbed methane(CBM)on the ground or the control of gas underground.
基金This work was supported by the Independent Project of the Key Laboratory of Human Factors Engineering(SYFD160051806)the Foundation of the Key Laboratory for Equipment Advanced Research(6142222180204)+1 种基金the Foundation Project in the field of Equipment Advanced Research(61400020402)the Military Science and Technology Commission National Defense Science and Technology Innovation Zone Project(1716312ZT00212101).
文摘As emerging technologies have advanced,some countries have issued reports on human performance enhancement efforts in recent years.Human performance enhancement is a prominent theme in the military field.As a type of potentially disruptive technology,human performance enhancement technology(HPET)is of vital importance in promoting military combat effectiveness,developing national defense science and technology,and transforming military medicine.This paper analyzes the current development status of critical HPETs,examines challenges facing such development,and points out existing problems in the field.Finally,future development directions of HPET are suggested.We hope this review will be of interest to scientists and engineers,who should carefully develop this technology to maximize human potential and focus on our social security.
文摘Background and Objective:Social media(SoMe)has emerged as a tool in health professions education(HPE),particularly amidst the challenges posed by the coronavirus disease 2019(COVID-19)pandemic.Despite the academia’s initial skepticism SoMe has been gaining traction in supporting learning communities,and offering opportunities for innovation in HPE.Our study aims to explore the integration of SoMe in HPE.Four key components were outlined as necessary for a successful integration,and include designing learning experiences,defining educator roles,selecting appropriate platforms,and establishing educational objectives.Methods:This article stemmed from the online Teaching Skills Series module on SoMe in education from the Ophthalmology Foundation,and drew upon evidence supporting learning theories relevant to SoMe integration and models of education.Additionally,we conducted a literature review considering Englishlanguage articles on the application of SoMe in ophthalmology from PubMed over the past decade.Key Content and Findings:Early adopters of SoMe platforms in HPE have leveraged these tools to enhance learning experiences through interaction,dialogue,content sharing,and active learning strategies.By integrating SoMe into educational programs,both online and in-person,educators can overcome time and geographical constraints,fostering more diverse and inclusive learning communities.Careful consideration is,however,necessary to address potential limitations within HPE.Conclusions:This article lays groundwork for expanding SoMe integration in HPE design,emphasizing the supportive scaffold of various learning theories,and the need of furthering robust research on examining its advantages over traditional educational formats.Our literature review underscores an ongoing multifaceted,random application of SoMe platforms in ophthalmology education.We advocate for an effective incorporation of SoMe in HPE education,with the need to comply with good educational practice.
文摘Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, rendering many existing defences ineffective. This study performs a large-scale measurement of online tracking mechanisms across a large pool of websites using the OpenWPM (Open Web Privacy Measurement) platform. It systematically evaluates the effectiveness of several ad blockers and underlying Privacy Enhancing Technologies (PET) that are primarily used to mitigate different tracking techniques. By quantifying the strengths and limitations of these tools against modern tracking methods, the findings highlight gaps in existing privacy protections. Actionable recommendations are provided to enhance user privacy defences, guide tool developers and inform policymakers on addressing invasive online tracking practices.
文摘Artificial intelligence (AI) has garnered significant interest within the educational domain over the past decade, promising to revolutionise teaching and learning. This paper provides a comprehensive overview of systematic reviews conducted from 2010 to 2023 on the implementation of AI in K-12 education. By synthesising findings from ten selected systematic reviews, this study explores the multifaceted opportunities and challenges posed by AI in education. The analysis reveals several key findings: AI’s potential to personalise learning, enhance student motivation, and improve teaching efficiency are highlighted as major strengths. However, the study also identifies critical concerns, including teacher resistance, high implementation costs, ethical considerations, and the need for extensive teacher training. These findings represent the most significant insights from the analysis, while additional findings further underscore the complexity and scope of AI integration in educational settings. The study employs a SWOT analysis to summarise these insights, identifying key areas for future research and policy development. This review aims to guide educators, policymakers, and researchers in effectively leveraging AI to enhance educational outcomes while addressing its inherent challenges.
文摘Within the seven years’ period from 1987 to 1994. the total installed capacity of China’s electric power industry doubled from 100 GW to 200 GW. This high rate of growth has imposed new and more stringent requirements on all the branches in the
基金funded by the National Key Research and Development Program of China(Grant No.2018YFE0208200)the National Natural Science Foundation of China(Grant No.42102352)。
文摘A new gas hydrate reservoir stimulation method of in-situ fracturing with transient heating is proposed, in line with analysis of the technological bottlenecks faced by marine gas hydrate production. This method injects the developed chemical reagents into a hydrate reservoir through hydraulic fracturing, releasing heat during the chemical reaction to increase the hydrate decomposition rate. The chemical reaction product furthermore has a honeycomb structure to support fractures and increase reservoir permeability. Based on the geological model of natural gas hydrate in the South China Sea, three development methods are simulated to evaluate hydrate production capacity, consisting of horizontal well, fractured horizontal well and in-situ fracturing with transient heating well. Compared with the horizontal well, the simulation results show that the cumulative gas production of the fractured horizontal well in one year is 7 times that of the horizontal well, while the cumulative gas production of in-situ fracturing with transient heating well is 12 times that of the horizontal well, which significantly improves daily efficiency and cumulative gas production. In addition, the variation patterns of hydrate saturation and temperature-pressure fields with production time for the three exploitation plans are presented, it being found that three sensitive parameters of fracture conductivity, fracture half-length and fracture number are positively correlated with hydrate production enhancement. Through the simulations, basic data and theoretical support for the optimization of gas hydrate reservoir stimulation scheme has been provided.
文摘BACKGROUND It was shown in previous studies that high definition endoscopy, high magnification endoscopy and image enhancement technologies, such as chromoendoscopy and digital chromoendoscopy [narrow-band imaging(NBI), iScan] facilitate the detection and classification of colonic polyps during endoscopic sessions. However, there are no comprehensive studies so far that analyze which endoscopic imaging modalities facilitate the automated classification of colonic polyps. In this work, we investigate the impact of endoscopic imaging modalities on the results of computer-assisted diagnosis systems for colonic polyp staging.AIM To assess which endoscopic imaging modalities are best suited for the computerassisted staging of colonic polyps.METHODS In our experiments, we apply twelve state-of-the-art feature extraction methods for the classification of colonic polyps to five endoscopic image databases of colonic lesions. For this purpose, we employ a specifically designed experimental setup to avoid biases in the outcomes caused by differing numbers of images per image database. The image databases were obtained using different imaging modalities. Two databases were obtained by high-definition endoscopy in combination with i-Scan technology(one with chromoendoscopy and one without chromoendoscopy). Three databases were obtained by highmagnification endoscopy(two databases using narrow band imaging and one using chromoendoscopy). The lesions are categorized into non-neoplastic and neoplastic according to the histological diagnosis.RESULTS Generally, it is feature-dependent which imaging modalities achieve high results and which do not. For the high-definition image databases, we achieved overall classification rates of up to 79.2% with chromoendoscopy and 88.9% without chromoendoscopy. In the case of the database obtained by high-magnification chromoendoscopy, the classification rates were up to 81.4%. For the combination of high-magnification endoscopy with NBI, results of up to 97.4% for one database and up to 84% for the other were achieved. Non-neoplastic lesions were classified more accurately in general than non-neoplastic lesions. It was shown that the image recording conditions highly affect the performance of automated diagnosis systems and partly contribute to a stronger effect on the staging results than the used imaging modality.CONCLUSION Chromoendoscopy has a negative impact on the results of the methods. NBI is better suited than chromoendoscopy. High-definition and high-magnification endoscopy are equally suited.
基金This work was supported in part by Tekes project"Cloudassisted Security Services"grant number 3887/31/2016 and by the Academy of Finland project"Cloud Security Services"(283135).
文摘We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After executing the queries,the content of the server's set remains secret.One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy-preserving way.We apply the Bloom filter and the Cuckoo filter in the membership test procedure.In order to achieve privacy properties,we present a novel protocol based on some homomorphic encryption schemes.In our protocol,we rearrange the data in the set into N-dimensional hypercubes.We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company.The evaluation shows that our method is feasible for real-world applications.We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions:2-dimensional,3-dimensional,and 4-dimensional hypercubes.We present formulas to estimate the cost of computation and communication in our protocol.
基金The 2016 major project of one hundred key research bases of Humanities and Social Sciences of the Ministry of Education Fund 16JJD740004 China。
文摘In recent years,the enabling role of technology has been widely recognized in second language teaching and learning.Using a co-word analysis approach,this study aims to present the state-ofthe-art current literature in technology enhanced language learning.The analysis results show that most popular research themes from 2010 to 2020 are CMC,L2 writing,teacher education,L2 motivation,students’attitudes,SLA,L2 vocabulary learning,L2 reading,EFL,and L2 learners.Compared with these key themes,publications on technology enhanced teaching Chinese as a foreign language focus more on the investigation of the effectiveness of the use of latest technologies such as smart phones,virtual reality,intelligent tools,and gamification.Based on the findings of these investigations,the latest developments in these areas are synthesized and presented accordingly.In addition,newly-emerged key themes about the co-word analysis are also reported and their contributions to future investigations is briefly discussed.The implications for future research in technology enhanced teaching Chinese as a foreign language is also discussed.
文摘Physical objects are getting connected to the Internet at an exceptional rate,making the idea of the Internet of Things(IoT)a reality.The IoT ecosystem is evident everywhere in the form of smart homes,health care systems,wearables,connected vehicles,and industries.This has given rise to risks associated with the privacy and security of systems.Security issues and cyber attacks on IoT devices may potentially hinder the growth of IoT products due to deficiencies in the architecture.To counter these issues,we need to implement privacy and security right from the building blocks of IoT.The IoT architecture has evolved over the years,improving the stack of architecture with new solutions such as scalability,management,interoperability,and extensibility.This emphasizes the need to standardize and organize the IoT reference architecture in federation with privacy and security concerns.In this study,we examine and analyze 12 existing IoT reference architectures to identify their shortcomings on the basis of the requirements addressed in the standards.We propose an architecture,the privacy-federated IoT security reference architecture(PF-IoT-SRA),which interprets all the involved privacy metrics and counters major threats and attacks in the IoT communication environment.It is a step toward the standardization of the domain architecture.We effectively validate our proposed reference architecture using the architecture trade-off analysis method(ATAM),an industry-recognized scenario-based approach.
基金Supported by the National High Technology Research and Development Program of China (863 Program) (2006AA01Z442)the Spanish Government through Projects (E-AEGIS) (TSI2007- 65406-C03-01)+1 种基金(ARES) CONSOLIDER INGENIO 2010 (CSD2007- 00004)the Government of Catalonia (2005 SGR 00446)
文摘In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce unauthorized use of software while keeping the privacy of users. To the best of our knowledge, this is the first system that the privacy of users is guaranteed in software registration. Our system enjoys a modular design and can be implemented by any secure ID-based partially blind signature scheme. Furthermore, the proposal allows flexible registration information definition. This feature makes our scheme flexible and practical for more software registration applications.