A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety i...A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety in work zones. Three different warning message systems, including sound, male voice and female voice, were designed to alert drivers. Twenty-four subjects were recruited for a total of ninety-six rounds driving simulator test in a work zone to investigate the impacts of smartphone-based warning messages on subjects’ driving performance, in terms of driving speed, speed variation, acceleration, and brake reaction distance. The outcome showed that, with the assistance of the sound and voice (either female or male) warning messages, drivers could effectively reduce their accelerations and speeds. Meanwhile, such a warning system can induce subjects to shorten their brake reaction distances for worker crossings. All participants found that this warning system is applicable to enhance their defensive driving behaviors while driving through a work zone.展开更多
The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity differ...The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly.展开更多
A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectivel...A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages.In this paper,we propose a nine-rectangle-grid information model according to the information value and privacy,and then present information use policies based on the rough set theory.Recurrent neural networks were employed to classify OTT messages.The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages,ending with a reliable trained classification model.Experimental results showed that the proposed method yielded an accurate classification performance and hence can be used for effective distribution and control of OTT messages.展开更多
Ayurveda is one of the most ancient medical prac-tice in the world with a history of 5000 years. Vajikaranais a branch of Ayurveda dealing with male potency andfertility. Almost all male diseases and therapeutic mea-s...Ayurveda is one of the most ancient medical prac-tice in the world with a history of 5000 years. Vajikaranais a branch of Ayurveda dealing with male potency andfertility. Almost all male diseases and therapeutic mea-sures have been described here. In the International Symposium on Ayurveda andOther Traditional Medicines, two scientific Sessions wereexclusively devoted to Rasayana (rejuvenation) and Va-jikarana, conducted on January 5- 6, 2000 at GujaratAyurved University, Jamnagar under the patronship ofthe Honorable Vice-Chancellor, Dr. P. N. V. Kurup.Besides the Indian specialists, scientists from Australia,展开更多
Superposition of signals in DNA molecule is a sufficiently general principle of information coding. The necessary re-quirement for such superposition is the degeneracy of the code, which allows placing different messa...Superposition of signals in DNA molecule is a sufficiently general principle of information coding. The necessary re-quirement for such superposition is the degeneracy of the code, which allows placing different messages on the same DNA fragment. Code words that are equivalent in the informational sense (i.e., synonyms) form synonymous group and the entire set of code words is partitioned into synonymous groups. This paper is dedicated to constructing and analyzing the model of synonymous coding. We evaluate some characteristics of synonymous coding as applied to code words of length two although many definitions may be extended for words of arbitrary length.展开更多
Generic Object Oriented Substation Event (GOOSE) Messages face a great challenge in its communication requirements especially in latency point of view. The appearance of the Long-Term Evolution (LTE) has opened a new ...Generic Object Oriented Substation Event (GOOSE) Messages face a great challenge in its communication requirements especially in latency point of view. The appearance of the Long-Term Evolution (LTE) has opened a new way that can be used due to its great performance, compared with previous wireless technologies. In order to use LTE technology within the GOOSE message transfer, several points must be put into consideration, and additional requirements need to be within both LTE User Equipment (UE) side and network side. In this paper, we are going to adapt part of the LTE standards to fulfil the requirements of GOOSE messages which needs latency more than or equal to 20 ms, using an experimental approach. The results show that LTE can satisfy the target requirements of latency within the acceptable Bit Error Rate (BER).展开更多
The phenomenon of car-following is special in traffic operations. Traditional car-following models can well describe the reactions of the movements between two concessive vehicles in the same lane within a certain dis...The phenomenon of car-following is special in traffic operations. Traditional car-following models can well describe the reactions of the movements between two concessive vehicles in the same lane within a certain distance. With the invention of connected vehicle technologies, more and more advisory messages are in development and applied in our daily lives, some of which are related to the measures and warnings of speed and headway distance between the two concessive vehicles. Such warnings may change the conventional car-following mechanisms. This paper intends to consider the possible impacts of in-vehicle warning messages to improve the traditional car-following models, including the General Motor (GM) Model and the Linear (Helly) Model, by calibrating model parameters using field data from an arterial road in Houston, Texas, U.S.A. The safety messages were provided by a tablet/smartphone application. One exponent was applied to the GM model, while another one applied to the Linear (Helly) model, both were on the stimuli term “difference in velocity between two concessive vehicles”. The calibration and validation were separately conducted for deceleration and acceleration conditions. Results showed that, the parameters of the traditional GM model failed to be properly calibrated with the interference of in-vehicle safety messages, and the parameters calibrated from the traditional Linear (Helly) Model with no in-vehicle messages could not be directly used in the case with such messages. However, both updated models can be well calibrated even if those messages were provided. The entire research process, as well as the calibrated models and parameters could be a reference in the on-going connected vehicle program and micro/macroscopic traffic simulations.展开更多
Bulgaria Dear Chinese Friends, It is a true honor for me to use the pages of china's Foreign Trade and ad- dress this Chinese Lunar New Year wishes to you and your families on my behalf and on behalf of the people...Bulgaria Dear Chinese Friends, It is a true honor for me to use the pages of china's Foreign Trade and ad- dress this Chinese Lunar New Year wishes to you and your families on my behalf and on behalf of the people of Bulgaria. I am aware of the significance of this year of'ox',when the working peo- ple in China can take weeks of holidays so that they can ioin the company展开更多
As the Chinese people are celebrating the 55th anniversary of the founding of the People's Republic of China, the Chinese government has taken important steps toward political, social, economical, and cultural dev...As the Chinese people are celebrating the 55th anniversary of the founding of the People's Republic of China, the Chinese government has taken important steps toward political, social, economical, and cultural developments and has made it possible for its people to live in prosperity and as part of a peaceful society. The people of China are proud of their cultural heritage and the positive contributions they have made to world civilization over the past 4000 years.展开更多
All-China Federation of Trade Unions On this occasion of the 30th anniversary of the Chinese Association for International Understanding (CAFIU), the All-China Federation of Trade Unions would like to send its warmest...All-China Federation of Trade Unions On this occasion of the 30th anniversary of the Chinese Association for International Understanding (CAFIU), the All-China Federation of Trade Unions would like to send its warmest congratulations. Since its founding, CAFIU展开更多
There is a message in each step on the path. Gathered in the bold stones and softened by the moss, Rising to meet you in the leaf that sprouts from the crack,
Embassy of the United States Of America Beijing,China Dear friends, On behalf of the United States Government and especially the men and women of the United States Embassy in Beijing,I wish to extend to the staff,memb...Embassy of the United States Of America Beijing,China Dear friends, On behalf of the United States Government and especially the men and women of the United States Embassy in Beijing,I wish to extend to the staff,members and readers of China's For- eign Trade our warmest wishes and greetings for holiday season. 2007 was a great year for United States-Chinese展开更多
Your Excellency Mr. Jacob Gedleyihlekisa Zuma, President of the Republic of South Africa. Thanks to the concerted efforts of our two sides, following the success of the Year of South Africa in China in 2014. the Year ...Your Excellency Mr. Jacob Gedleyihlekisa Zuma, President of the Republic of South Africa. Thanks to the concerted efforts of our two sides, following the success of the Year of South Africa in China in 2014. the Year of China in South Africa 2015 is now solemnly launched in the beautiful city of Pretoria. On behalf of the Chinese Government and people, I would like to extend to you our warm congratulations. I have designated Mr. Luo Shugang. Minister of Culture, to attend the opening ceremony as the repre-sentative of the Chinese Government.展开更多
The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kind...The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kinds of energy:such as: Electrical, Magnetic, Electromagnetic,Chemical, Thermic, Gravity & antigravity, Light,Sound vibration and motor, etc. These messages are sent by specialized cells(transmitters)through the communication system tospecialized receptors which can perform the transformation and the transportation and code modifica-tion of the message energy and the message to another energy and code understandable by the masterof the human body "the Brain". "The Brain" will analyse the message and responds accordingly by sending order messages to dif-ferent parts of the body following the same role, i. e., by an electrical messages which can be trans-formed to another type of energy messages, like, chemical, motor, thermal, etc. by special receptorsand transmitters in the organ or the related tissues.展开更多
This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid me...This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical.展开更多
Vehicular ad-hoc networks(VANETs)play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities.Direction-based greedy protocols pick the ne...Vehicular ad-hoc networks(VANETs)play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities.Direction-based greedy protocols pick the next route vehicle for transmitting emergency messages(EMs)depending upon the present location of adjacent vehicles towards sink vehicles by using an optimal uni-directional road traffic approach.Nevertheless,such protocols suffer performance degradation by ignoring the moving directions of vehicles in bi-directional road traffic where topological changes happen continuously.Due to the high number of vehicles,it is essential to broadcast EMs to all vehicles to prevent traffic delays and collisions.A cluster-based EM transmitting technique is proposed in this paper.For urban VANETs,this paper pioneers the clustering of bi-directional road traffic for robust and efficient routing of EMs.In this regard,this paper introduces a routing protocol,namely,the bi-directional urban routing protocol(BURP).In addition to the paths and relative locations of vehicles,BURP takes account of the distance parameter by using the Hamming distance function to determine the direction ofmotion of vehicles and communicates EMs through the cluster head(CH).Amodified k-medoids algorithm is presented for the clustering of bi-directional road traffic.A median method is presented for selecting CH to ensure the longrunning of a cluster.Simulation results show that BURP provides enhanced throughput,a maximized packet delivery ratio,low energy consumption,and network delay relative to eminent routing protocols.展开更多
Work-zone crashes have always drawn public attention. A number of fatalities are recorded every year nationwide within work zone areas. Most existing countermeasures have been dedicated more to the advance warning are...Work-zone crashes have always drawn public attention. A number of fatalities are recorded every year nationwide within work zone areas. Most existing countermeasures have been dedicated more to the advance warning areas, transition areas, and activity areas of work zone, than the termination areas, where drivers might play less attention to safety threats. In this study, the vehicle-to-vehicle communication based left turn warning system was applied at a work zone termination area, which is immediately followed by a T-intersection. The work-zone is located on the minor road side, while left turn vehicles will be appearing from the major street through the said T-intersection. A smart phone application was designed using Android coding system to provide several types of warning messages to drivers. Corresponding scenarios were designed in a driving simulator, and 20 subjects were recruited to participate in the simulation test followed by a questionnaire survey. The subjects received a warning message when driving to the termination area of a work zone on the coming left turn vehicles. Twenty test drivers’ driving speed, acceleration rates, and break reaction distance to the warning messages were studied in four different scenarios. Results show that the smartphone application has a great impact on driving behaviors, especially the female voice and the beep tone warning, which are recommended for possible field tests. Besides, the developed smartphone applications can be further updated for practical applications of similar needs.展开更多
Innovative uses of punctuation in online communication have become increasingly visible in research and public awareness since the 2000s,whereas studies on the innovative use of tildes("~")in digital use rem...Innovative uses of punctuation in online communication have become increasingly visible in research and public awareness since the 2000s,whereas studies on the innovative use of tildes("~")in digital use remain scarce.Drawing on a data set of 543 Chinese WeChat messages with sentence-final tildes,this article investigates the uses and functions of innovative tildes in online communication using quantitative data and follow-up interviews.The findings suggest that:(1)The innovative tildes are deployed in messages implying sounds and performing speech acts in online communication,and they are more frequently used in speech acts(e.g.,expressives and directives in particular).(2)The innovative tildes convey sound extension,ie.,to compensate for the loss of audio information in online communication and reproduce elongated sounds;pragmatic function,i.e.,to enhance or mitigate the illocutionary forces of speech acts;and entertaining function,i.e.,to make messages informal,vivid,joyful,and interesting.(3)The innovative tildes are pragmalicalized as a result of their semiotic features and politeness motivation of messengers for maintaining rapport and achieving successful online communication.展开更多
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-II civil navigation message(BDII-CNAV)are vulnerable to spoofing attack and replay attack.To solve this problem,we present a se...Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-II civil navigation message(BDII-CNAV)are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM)series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDII-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism)to protect the integrity of the BDII-CNAV,adopts the SM2 algorithm(Public key cryptosystem)to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm)to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDII-CNAV.展开更多
文摘A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety in work zones. Three different warning message systems, including sound, male voice and female voice, were designed to alert drivers. Twenty-four subjects were recruited for a total of ninety-six rounds driving simulator test in a work zone to investigate the impacts of smartphone-based warning messages on subjects’ driving performance, in terms of driving speed, speed variation, acceleration, and brake reaction distance. The outcome showed that, with the assistance of the sound and voice (either female or male) warning messages, drivers could effectively reduce their accelerations and speeds. Meanwhile, such a warning system can induce subjects to shorten their brake reaction distances for worker crossings. All participants found that this warning system is applicable to enhance their defensive driving behaviors while driving through a work zone.
基金Project supported by the Natural Science Foundation of Jiangsu Province, China (Grant No BK2001138).
文摘The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly.
基金This work is supported by the Research on Big Data in Application for Education of BUPT(No.2018Y0403)Fundamental Research Funds of BUPT(No.2018XKJC07,2018RC27)the National Natural Science Foundation of China(No.61571059).
文摘A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages.In this paper,we propose a nine-rectangle-grid information model according to the information value and privacy,and then present information use policies based on the rough set theory.Recurrent neural networks were employed to classify OTT messages.The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages,ending with a reliable trained classification model.Experimental results showed that the proposed method yielded an accurate classification performance and hence can be used for effective distribution and control of OTT messages.
文摘Ayurveda is one of the most ancient medical prac-tice in the world with a history of 5000 years. Vajikaranais a branch of Ayurveda dealing with male potency andfertility. Almost all male diseases and therapeutic mea-sures have been described here. In the International Symposium on Ayurveda andOther Traditional Medicines, two scientific Sessions wereexclusively devoted to Rasayana (rejuvenation) and Va-jikarana, conducted on January 5- 6, 2000 at GujaratAyurved University, Jamnagar under the patronship ofthe Honorable Vice-Chancellor, Dr. P. N. V. Kurup.Besides the Indian specialists, scientists from Australia,
文摘Superposition of signals in DNA molecule is a sufficiently general principle of information coding. The necessary re-quirement for such superposition is the degeneracy of the code, which allows placing different messages on the same DNA fragment. Code words that are equivalent in the informational sense (i.e., synonyms) form synonymous group and the entire set of code words is partitioned into synonymous groups. This paper is dedicated to constructing and analyzing the model of synonymous coding. We evaluate some characteristics of synonymous coding as applied to code words of length two although many definitions may be extended for words of arbitrary length.
文摘Generic Object Oriented Substation Event (GOOSE) Messages face a great challenge in its communication requirements especially in latency point of view. The appearance of the Long-Term Evolution (LTE) has opened a new way that can be used due to its great performance, compared with previous wireless technologies. In order to use LTE technology within the GOOSE message transfer, several points must be put into consideration, and additional requirements need to be within both LTE User Equipment (UE) side and network side. In this paper, we are going to adapt part of the LTE standards to fulfil the requirements of GOOSE messages which needs latency more than or equal to 20 ms, using an experimental approach. The results show that LTE can satisfy the target requirements of latency within the acceptable Bit Error Rate (BER).
文摘The phenomenon of car-following is special in traffic operations. Traditional car-following models can well describe the reactions of the movements between two concessive vehicles in the same lane within a certain distance. With the invention of connected vehicle technologies, more and more advisory messages are in development and applied in our daily lives, some of which are related to the measures and warnings of speed and headway distance between the two concessive vehicles. Such warnings may change the conventional car-following mechanisms. This paper intends to consider the possible impacts of in-vehicle warning messages to improve the traditional car-following models, including the General Motor (GM) Model and the Linear (Helly) Model, by calibrating model parameters using field data from an arterial road in Houston, Texas, U.S.A. The safety messages were provided by a tablet/smartphone application. One exponent was applied to the GM model, while another one applied to the Linear (Helly) model, both were on the stimuli term “difference in velocity between two concessive vehicles”. The calibration and validation were separately conducted for deceleration and acceleration conditions. Results showed that, the parameters of the traditional GM model failed to be properly calibrated with the interference of in-vehicle safety messages, and the parameters calibrated from the traditional Linear (Helly) Model with no in-vehicle messages could not be directly used in the case with such messages. However, both updated models can be well calibrated even if those messages were provided. The entire research process, as well as the calibrated models and parameters could be a reference in the on-going connected vehicle program and micro/macroscopic traffic simulations.
文摘Bulgaria Dear Chinese Friends, It is a true honor for me to use the pages of china's Foreign Trade and ad- dress this Chinese Lunar New Year wishes to you and your families on my behalf and on behalf of the people of Bulgaria. I am aware of the significance of this year of'ox',when the working peo- ple in China can take weeks of holidays so that they can ioin the company
文摘As the Chinese people are celebrating the 55th anniversary of the founding of the People's Republic of China, the Chinese government has taken important steps toward political, social, economical, and cultural developments and has made it possible for its people to live in prosperity and as part of a peaceful society. The people of China are proud of their cultural heritage and the positive contributions they have made to world civilization over the past 4000 years.
文摘All-China Federation of Trade Unions On this occasion of the 30th anniversary of the Chinese Association for International Understanding (CAFIU), the All-China Federation of Trade Unions would like to send its warmest congratulations. Since its founding, CAFIU
文摘There is a message in each step on the path. Gathered in the bold stones and softened by the moss, Rising to meet you in the leaf that sprouts from the crack,
文摘Embassy of the United States Of America Beijing,China Dear friends, On behalf of the United States Government and especially the men and women of the United States Embassy in Beijing,I wish to extend to the staff,members and readers of China's For- eign Trade our warmest wishes and greetings for holiday season. 2007 was a great year for United States-Chinese
文摘Your Excellency Mr. Jacob Gedleyihlekisa Zuma, President of the Republic of South Africa. Thanks to the concerted efforts of our two sides, following the success of the Year of South Africa in China in 2014. the Year of China in South Africa 2015 is now solemnly launched in the beautiful city of Pretoria. On behalf of the Chinese Government and people, I would like to extend to you our warm congratulations. I have designated Mr. Luo Shugang. Minister of Culture, to attend the opening ceremony as the repre-sentative of the Chinese Government.
文摘The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kinds of energy:such as: Electrical, Magnetic, Electromagnetic,Chemical, Thermic, Gravity & antigravity, Light,Sound vibration and motor, etc. These messages are sent by specialized cells(transmitters)through the communication system tospecialized receptors which can perform the transformation and the transportation and code modifica-tion of the message energy and the message to another energy and code understandable by the masterof the human body "the Brain". "The Brain" will analyse the message and responds accordingly by sending order messages to dif-ferent parts of the body following the same role, i. e., by an electrical messages which can be trans-formed to another type of energy messages, like, chemical, motor, thermal, etc. by special receptorsand transmitters in the organ or the related tissues.
基金supported by the National Natural Science Foundation of China (Grant Nos 60873191 and 60821001)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No 200800131016)+5 种基金Beijing Nova Program (Grant No2008B51)Key Project of the Chinese Ministry of Education (Grant No 109014)the Natural Science Foundation of Beijing (Grant No 4072020)the National Laboratory for Modern Communications Science Foundation of China (Grant No 9140C1101010601)the Natural Science Foundation of Education Bureau of Henan Province (Grant No 2008B120005)the Youth Foundation of Luoyang Normal University
文摘This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical.
文摘Vehicular ad-hoc networks(VANETs)play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities.Direction-based greedy protocols pick the next route vehicle for transmitting emergency messages(EMs)depending upon the present location of adjacent vehicles towards sink vehicles by using an optimal uni-directional road traffic approach.Nevertheless,such protocols suffer performance degradation by ignoring the moving directions of vehicles in bi-directional road traffic where topological changes happen continuously.Due to the high number of vehicles,it is essential to broadcast EMs to all vehicles to prevent traffic delays and collisions.A cluster-based EM transmitting technique is proposed in this paper.For urban VANETs,this paper pioneers the clustering of bi-directional road traffic for robust and efficient routing of EMs.In this regard,this paper introduces a routing protocol,namely,the bi-directional urban routing protocol(BURP).In addition to the paths and relative locations of vehicles,BURP takes account of the distance parameter by using the Hamming distance function to determine the direction ofmotion of vehicles and communicates EMs through the cluster head(CH).Amodified k-medoids algorithm is presented for the clustering of bi-directional road traffic.A median method is presented for selecting CH to ensure the longrunning of a cluster.Simulation results show that BURP provides enhanced throughput,a maximized packet delivery ratio,low energy consumption,and network delay relative to eminent routing protocols.
文摘Work-zone crashes have always drawn public attention. A number of fatalities are recorded every year nationwide within work zone areas. Most existing countermeasures have been dedicated more to the advance warning areas, transition areas, and activity areas of work zone, than the termination areas, where drivers might play less attention to safety threats. In this study, the vehicle-to-vehicle communication based left turn warning system was applied at a work zone termination area, which is immediately followed by a T-intersection. The work-zone is located on the minor road side, while left turn vehicles will be appearing from the major street through the said T-intersection. A smart phone application was designed using Android coding system to provide several types of warning messages to drivers. Corresponding scenarios were designed in a driving simulator, and 20 subjects were recruited to participate in the simulation test followed by a questionnaire survey. The subjects received a warning message when driving to the termination area of a work zone on the coming left turn vehicles. Twenty test drivers’ driving speed, acceleration rates, and break reaction distance to the warning messages were studied in four different scenarios. Results show that the smartphone application has a great impact on driving behaviors, especially the female voice and the beep tone warning, which are recommended for possible field tests. Besides, the developed smartphone applications can be further updated for practical applications of similar needs.
基金This work was supported by the Fundamental Research Funds for the Central Universities under Grant number 2022jx012.
文摘Innovative uses of punctuation in online communication have become increasingly visible in research and public awareness since the 2000s,whereas studies on the innovative use of tildes("~")in digital use remain scarce.Drawing on a data set of 543 Chinese WeChat messages with sentence-final tildes,this article investigates the uses and functions of innovative tildes in online communication using quantitative data and follow-up interviews.The findings suggest that:(1)The innovative tildes are deployed in messages implying sounds and performing speech acts in online communication,and they are more frequently used in speech acts(e.g.,expressives and directives in particular).(2)The innovative tildes convey sound extension,ie.,to compensate for the loss of audio information in online communication and reproduce elongated sounds;pragmatic function,i.e.,to enhance or mitigate the illocutionary forces of speech acts;and entertaining function,i.e.,to make messages informal,vivid,joyful,and interesting.(3)The innovative tildes are pragmalicalized as a result of their semiotic features and politeness motivation of messengers for maintaining rapport and achieving successful online communication.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)the joint funds of National Natural Science Foundation of China and Civil Aviation Administration of China(No.U2133203).
文摘Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-II civil navigation message(BDII-CNAV)are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM)series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDII-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism)to protect the integrity of the BDII-CNAV,adopts the SM2 algorithm(Public key cryptosystem)to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm)to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDII-CNAV.