This paper discusses the steps about how to design and implement software based on lightning location system data and its localization map.The system contains four major modules such as real-time lightning monitoring,...This paper discusses the steps about how to design and implement software based on lightning location system data and its localization map.The system contains four major modules such as real-time lightning monitoring,historical query,lightning intensity zoning,lightning disaster statistics,etc.The system is able to automatically generate real-time lightning monitoring image,lightning animation,and lightning intensity zoning image,which contributes to the high accuracy of the calculation results and the efficiency of data analysis.The paper also points out the deficiencies of software life cycle management and proposes actionable solutions.展开更多
This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of co...This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of computer science in different fields of study. The technique used in this paper is handling the inadequate Information for citation;it removes the problem of cold start, which is encountered by very many other recommender systems. In this paper, abstracts, the titles, and the Microsoft academic graphs have been used in coming up with the recommendation list for every document, which is used to combine the content-based approaches and the co-citations. Prioritization and the blending of every technique have been allowed by the tuning system parameters, allowing for the authority in results of recommendation versus the paper novelty. In the end, we do observe that there is a direct correlation between the similarity rankings that have been produced by the system and the scores of the participant. The results coming from the associated scrips of analysis and the user survey have been made available through the recommendation system. Managers must gain the required expertise to fully utilize the benefits that come with business intelligence systems [1]. Data mining has become an important tool for managers that provides insights about their daily operations and leverage the information provided by decision support systems to improve customer relationships [2]. Additionally, managers require business intelligence systems that can rank the output in the order of priority. Ranking algorithm can replace the traditional data mining algorithms that will be discussed in-depth in the literature review [3].展开更多
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac...This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.展开更多
In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchr...In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations.展开更多
Complex repairable system is composed of thousands of components.Some maintenance management and decision problems in maintenance management and decision need to classify a set of components into several classes based...Complex repairable system is composed of thousands of components.Some maintenance management and decision problems in maintenance management and decision need to classify a set of components into several classes based on data mining.Furthermore,with the complexity of industrial equipment increasing,the managers should pay more attention to the key components and carry out the lean management is very important.Therefore,the idea"customer segmentation"of"precise marketing"can be used in the maintenance management of the multi-component system.Following the idea of segmentation,the components of multicomponent systems should be subdivied into groups based on specific attributes relevant to maintenance,such as maintenance cost,mean time between failures,and failure frequency.For the target specific groups of parts,the optimal maintenance policy,health assessment and maintenance scheduling can be determined.The proposed analysis framework will be given out.In order to illustrate the effectiveness of this method,a numerical example is given out.展开更多
Multidatabase systems are designed to achieve schema integration and data interoperation among distributed and heterogeneous database systems. But data model heterogeneity and schema heterogeneity make this a challeng...Multidatabase systems are designed to achieve schema integration and data interoperation among distributed and heterogeneous database systems. But data model heterogeneity and schema heterogeneity make this a challenging task. A multidatabase common data model is firstly introduced based on XML, named XML-based Integration Data Model (XIDM), which is suitable for integrating different types of schemas. Then an approach of schema mappings based on XIDM in multidatabase systems has been presented. The mappings include global mappings, dealing with horizontal and vertical partitioning between global schemas and export schemas, and local mappings, processing the transformation between export schemas and local schemas. Finally, the illustration and implementation of schema mappings in a multidatabase prototype - Panorama system are also discussed. The implementation results demonstrate that the XIDM is an efficient model for managing multiple heterogeneous data sources and the approaches of schema mapping based on XIDM behave very well when integrating relational, object-oriented database systems and other file systems.展开更多
Computer simulation for materials processing needs a huge database containing a great deal of various physical properties of materials. In order to employ the accumulated large data on materials heat treatment in the ...Computer simulation for materials processing needs a huge database containing a great deal of various physical properties of materials. In order to employ the accumulated large data on materials heat treatment in the past years, it is significant to develop an intelligent database system. Based on the data mining technology for data analysis, an intelligent database web tool system of computer simulation for heat treatment process named as IndBASEweb-HT was built up. The architecture and the arithmetic of this system as well as its application were introduced.展开更多
AIM: To determine whether contrast-enhanced ultrasound(CEUS) can improve the precision of breast imaging reporting and data system(BI-RADS) categorization. METHODS: A total of 230 patients with 235 solid breast lesion...AIM: To determine whether contrast-enhanced ultrasound(CEUS) can improve the precision of breast imaging reporting and data system(BI-RADS) categorization. METHODS: A total of 230 patients with 235 solid breast lesions classified as BI-RADS 4 on conventional ultrasound were evaluated. CEUS was performed within one week before core needle biopsy or surgical resection and a revised BI-RADS classification was assigned based on 10 CEUS imaging characteristics. Receiver operating characteristic curve analysis was then conducted to evaluate the diagnostic performance of CEUS-based BI-RADS assignment with pathological examination as reference criteria. RESULTS: The CEUS-based BI-RADS evaluation classified 116/235(49.36%) lesions into category 3, 20(8.51%), 13(5.53%) and 12(5.11%) lesions into categories 4A, 4B and 4C, respectively, and 74(31.49%) into category 5. Selecting CEUS-based BI-RADS category 4A as an appropriate cut-off gave sensitivity and specificity values of 85.4% and 87.8%, respectively, for the diagnosisof malignant disease. The cancer-to-biopsy yield was 73.11% with CEUS-based BI-RADS 4A selected as the biopsy threshold compared with 40.85% otherwise, while the biopsy rate was only 42.13% compared with 100% otherwise. Overall, only 4.68% of invasive cancers were misdiagnosed.CONCLUSION: This pilot study suggests that evaluation of BI-RADS 4 breast lesions with CEUS results in reduced biopsy rates and increased cancer-to-biopsy yields.展开更多
The lifting technique is now the most popular tool for dealing with sampled-data controlsystems. However, for the robust stability problem the system norm is not preserved by the liftingas expected. And the result is ...The lifting technique is now the most popular tool for dealing with sampled-data controlsystems. However, for the robust stability problem the system norm is not preserved by the liftingas expected. And the result is generally conservative under the small gain condition. The reason forthe norm di?erence by the lifting is that the state transition operator in the lifted system is zero inthis case. A new approach to the robust stability analysis is proposed. It is to use an equivalentdiscrete-time uncertainty to replace the continuous-time uncertainty. Then the general discretizedmethod can be used for the robust stability problem, and it is not conservative. Examples are givenin the paper.展开更多
The China Seismo-Electromagnetic Satellite, launched into orbit from Jiuquan Satellite Launch Centre on February 2 nd, 2018, is China's first space satellite dedicated to geophysical exporation. The satellite carr...The China Seismo-Electromagnetic Satellite, launched into orbit from Jiuquan Satellite Launch Centre on February 2 nd, 2018, is China's first space satellite dedicated to geophysical exporation. The satellite carries eight scientific payloads including high-precision magnetometers to detect electromagnetic changes in space, in particular changes associated with global earthquake disasters. In order to encourage and facilitate use by geophysical scientists of data from the satellite's payloads, this paper introduces the application systems developed for the China Seismo-Electromagnetic Satellite by the Institute of Crustal Dynamics, China Earthquake Administration;these include platform construction, data classification, data storage, data format, and data access and acquisition.展开更多
AIM: To build and evaluate predictive models for contrast-enhanced ultrasound(CEUS) of the breast to distinguish between benign and malignant lesions. METHODS: A total of 235 breast imaging reporting and data system(B...AIM: To build and evaluate predictive models for contrast-enhanced ultrasound(CEUS) of the breast to distinguish between benign and malignant lesions. METHODS: A total of 235 breast imaging reporting and data system(BI-RADS) 4 solid breast lesions were imaged via CEUS before core needle biopsy or surgical resection. CEUS results were analyzed on 10 enhancing patterns to evaluate diagnostic performance of three benign and three malignant CEUS models, with pathological results used as the gold standard. A logistic regression model was developed basing on the CEUS results, and then evaluated with receiver operating curve(ROC). RESULTS: Except in cases of enhanced homogeneity, the rest of the 9 enhancement appearances were statistically significant(P < 0.05). These 9 enhancement patterns were selected in the final step of the logistic regression analysis, with diagnostic sensitivity and specificity of 84.4% and 82.7%, respectively, and the area under the ROC curve of 0.911. Diagnostic sensitivity, specificity, and accuracy of the malignant vs benign CEUS models were 84.38%, 87.77%, 86.38% and 86.46%, 81.29% and 83.40%, respectively. CONCLUSION: The breast CEUS models can predict risk of malignant breast lesions more accurately, decrease false-positive biopsy, and provide accurate BIRADS classification.展开更多
A data service system plays an indispensable role in HT-7 Tokamak experiment. Since the former system doesn’t provide the function of timely data procession and analysis, and all client software are based on Windows,...A data service system plays an indispensable role in HT-7 Tokamak experiment. Since the former system doesn’t provide the function of timely data procession and analysis, and all client software are based on Windows, it can’t fulfill virtual fusion laboratory for remote researchers. Therefore, a new system which is simplified by three kinds of data servers and one data analysis and visualization software tool has been developed. The data servers in-clude a data acquisition server based on file system, an MDSplus server used as the central repository for analysis data, and a web server. Users who prefer the convenience of application that can be run in a Web Browser can easily access the experiment data without knowing X-Windows. In order to adjust instruments to control experiment the operators need to plot data duly as soon as they are gathered. To satisfy their requirement, an upgraded data analysis and visualization software GT-7 is developed. It not only makes 2D data visualization more efficient, but also it can be capable of processing, analyzing and displaying interactive 2D and 3D graph of raw, analyzed data by the format of ASCII, LZO and MDSplus.展开更多
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d...The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.展开更多
Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics data...Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics database, gravity database, geochemistry database and remote sensing database, is very significant. We developed national important mining zone database (NIMZDB) to manage 14 national important mining zone databases to support a new round prediction of ore deposit. We found that attention should be paid to the following issues: ① data accuracy: integrity, logic consistency, attribute, spatial and time accuracy; ② management of both attribute and spatial data in the same system;③ transforming data between MapGIS and ArcGIS; ④ data sharing and security; ⑤ data searches that can query both attribute and spatial data. Accuracy of input data is guaranteed and the search, analysis and translation of data between MapGIS and ArcGIS has been made convenient via the development of a checking data module and a managing data module based on MapGIS and ArcGIS. Using AreSDE, we based data sharing on a client/server system, and attribute and spatial data are also managed in the same system.展开更多
The initial motivation of the lifting technique is to solve the H∞control problems. However, the conventional weighted H∞design does not meet the conditions required by lifting, so the result often leads to a misjud...The initial motivation of the lifting technique is to solve the H∞control problems. However, the conventional weighted H∞design does not meet the conditions required by lifting, so the result often leads to a misjudgement of the design. Two conditions required by using the lifting technique are presented based on the basic formulae of the lifting. It is pointed out that only the H∞disturbance attenuation problem with no weighting functions can meet these conditions, hence, the application of the lifting technique is quite limited.展开更多
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac...In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.展开更多
Hepatocellular carcinoma (HCC) usually develops in the setting of chronic liver disease. In the adequate clinical context, both multiphasic contrast-enhanced CT and magnetic resonance imaging are non-invasive modaliti...Hepatocellular carcinoma (HCC) usually develops in the setting of chronic liver disease. In the adequate clinical context, both multiphasic contrast-enhanced CT and magnetic resonance imaging are non-invasive modalities that allow accurate diagnosis and staging of HCC, although the latter demonstrates greater sensitivity and specificity. Imaging criteria for HCC diagnosis rely on hemodynamic features such as hyperenhancement in the arterial phase and washout in the portal or equilibrium phase. However, imaging performance drops considerably for small (< 20 mm) nodules because their tendency to exhibit atypical enhancement patterns. In order to improve accuracy in the diagnosis and staging of HCC, particularly in cases of atypical nodules, ancillary features, i.e., imaging characteristics that modify the likelihood of HCC, have been described and incorporated into clinical reports, especially in Liver Imaging Reporting and Data System. In this paper, ancillary imaging features will be reviewed and illustrated.展开更多
基金Supported by 2018 Construction Project of Meteorological Guarantee Project for Prevention and Control of Mountain Torrents,Heilongjiang Meteorological Disaster Prevention Technology Center(HGZ2018G0035)
文摘This paper discusses the steps about how to design and implement software based on lightning location system data and its localization map.The system contains four major modules such as real-time lightning monitoring,historical query,lightning intensity zoning,lightning disaster statistics,etc.The system is able to automatically generate real-time lightning monitoring image,lightning animation,and lightning intensity zoning image,which contributes to the high accuracy of the calculation results and the efficiency of data analysis.The paper also points out the deficiencies of software life cycle management and proposes actionable solutions.
文摘This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of computer science in different fields of study. The technique used in this paper is handling the inadequate Information for citation;it removes the problem of cold start, which is encountered by very many other recommender systems. In this paper, abstracts, the titles, and the Microsoft academic graphs have been used in coming up with the recommendation list for every document, which is used to combine the content-based approaches and the co-citations. Prioritization and the blending of every technique have been allowed by the tuning system parameters, allowing for the authority in results of recommendation versus the paper novelty. In the end, we do observe that there is a direct correlation between the similarity rankings that have been produced by the system and the scores of the participant. The results coming from the associated scrips of analysis and the user survey have been made available through the recommendation system. Managers must gain the required expertise to fully utilize the benefits that come with business intelligence systems [1]. Data mining has become an important tool for managers that provides insights about their daily operations and leverage the information provided by decision support systems to improve customer relationships [2]. Additionally, managers require business intelligence systems that can rank the output in the order of priority. Ranking algorithm can replace the traditional data mining algorithms that will be discussed in-depth in the literature review [3].
文摘This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.
基金supported by General Program (No. 60774022)State Key Program (No. 60834001) of National Natural Science Foundation of China
文摘In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations.
基金National Natural Science Foundations of China(No.71501103)Natural Science Foundation of Inner Mongolia,China(No.2015BS0705)the Program of Higher-Level Talents of Inner Mongolia University,China(No.20700-5145131)
文摘Complex repairable system is composed of thousands of components.Some maintenance management and decision problems in maintenance management and decision need to classify a set of components into several classes based on data mining.Furthermore,with the complexity of industrial equipment increasing,the managers should pay more attention to the key components and carry out the lean management is very important.Therefore,the idea"customer segmentation"of"precise marketing"can be used in the maintenance management of the multi-component system.Following the idea of segmentation,the components of multicomponent systems should be subdivied into groups based on specific attributes relevant to maintenance,such as maintenance cost,mean time between failures,and failure frequency.For the target specific groups of parts,the optimal maintenance policy,health assessment and maintenance scheduling can be determined.The proposed analysis framework will be given out.In order to illustrate the effectiveness of this method,a numerical example is given out.
文摘Multidatabase systems are designed to achieve schema integration and data interoperation among distributed and heterogeneous database systems. But data model heterogeneity and schema heterogeneity make this a challenging task. A multidatabase common data model is firstly introduced based on XML, named XML-based Integration Data Model (XIDM), which is suitable for integrating different types of schemas. Then an approach of schema mappings based on XIDM in multidatabase systems has been presented. The mappings include global mappings, dealing with horizontal and vertical partitioning between global schemas and export schemas, and local mappings, processing the transformation between export schemas and local schemas. Finally, the illustration and implementation of schema mappings in a multidatabase prototype - Panorama system are also discussed. The implementation results demonstrate that the XIDM is an efficient model for managing multiple heterogeneous data sources and the approaches of schema mapping based on XIDM behave very well when integrating relational, object-oriented database systems and other file systems.
文摘Computer simulation for materials processing needs a huge database containing a great deal of various physical properties of materials. In order to employ the accumulated large data on materials heat treatment in the past years, it is significant to develop an intelligent database system. Based on the data mining technology for data analysis, an intelligent database web tool system of computer simulation for heat treatment process named as IndBASEweb-HT was built up. The architecture and the arithmetic of this system as well as its application were introduced.
文摘AIM: To determine whether contrast-enhanced ultrasound(CEUS) can improve the precision of breast imaging reporting and data system(BI-RADS) categorization. METHODS: A total of 230 patients with 235 solid breast lesions classified as BI-RADS 4 on conventional ultrasound were evaluated. CEUS was performed within one week before core needle biopsy or surgical resection and a revised BI-RADS classification was assigned based on 10 CEUS imaging characteristics. Receiver operating characteristic curve analysis was then conducted to evaluate the diagnostic performance of CEUS-based BI-RADS assignment with pathological examination as reference criteria. RESULTS: The CEUS-based BI-RADS evaluation classified 116/235(49.36%) lesions into category 3, 20(8.51%), 13(5.53%) and 12(5.11%) lesions into categories 4A, 4B and 4C, respectively, and 74(31.49%) into category 5. Selecting CEUS-based BI-RADS category 4A as an appropriate cut-off gave sensitivity and specificity values of 85.4% and 87.8%, respectively, for the diagnosisof malignant disease. The cancer-to-biopsy yield was 73.11% with CEUS-based BI-RADS 4A selected as the biopsy threshold compared with 40.85% otherwise, while the biopsy rate was only 42.13% compared with 100% otherwise. Overall, only 4.68% of invasive cancers were misdiagnosed.CONCLUSION: This pilot study suggests that evaluation of BI-RADS 4 breast lesions with CEUS results in reduced biopsy rates and increased cancer-to-biopsy yields.
文摘The lifting technique is now the most popular tool for dealing with sampled-data controlsystems. However, for the robust stability problem the system norm is not preserved by the liftingas expected. And the result is generally conservative under the small gain condition. The reason forthe norm di?erence by the lifting is that the state transition operator in the lifted system is zero inthis case. A new approach to the robust stability analysis is proposed. It is to use an equivalentdiscrete-time uncertainty to replace the continuous-time uncertainty. Then the general discretizedmethod can be used for the robust stability problem, and it is not conservative. Examples are givenin the paper.
基金supported by the Civil Space Research project (ZH1 data validation: Ionospheric observatory theory)NFSC grant 41574139 and 41874174
文摘The China Seismo-Electromagnetic Satellite, launched into orbit from Jiuquan Satellite Launch Centre on February 2 nd, 2018, is China's first space satellite dedicated to geophysical exporation. The satellite carries eight scientific payloads including high-precision magnetometers to detect electromagnetic changes in space, in particular changes associated with global earthquake disasters. In order to encourage and facilitate use by geophysical scientists of data from the satellite's payloads, this paper introduces the application systems developed for the China Seismo-Electromagnetic Satellite by the Institute of Crustal Dynamics, China Earthquake Administration;these include platform construction, data classification, data storage, data format, and data access and acquisition.
文摘AIM: To build and evaluate predictive models for contrast-enhanced ultrasound(CEUS) of the breast to distinguish between benign and malignant lesions. METHODS: A total of 235 breast imaging reporting and data system(BI-RADS) 4 solid breast lesions were imaged via CEUS before core needle biopsy or surgical resection. CEUS results were analyzed on 10 enhancing patterns to evaluate diagnostic performance of three benign and three malignant CEUS models, with pathological results used as the gold standard. A logistic regression model was developed basing on the CEUS results, and then evaluated with receiver operating curve(ROC). RESULTS: Except in cases of enhanced homogeneity, the rest of the 9 enhancement appearances were statistically significant(P < 0.05). These 9 enhancement patterns were selected in the final step of the logistic regression analysis, with diagnostic sensitivity and specificity of 84.4% and 82.7%, respectively, and the area under the ROC curve of 0.911. Diagnostic sensitivity, specificity, and accuracy of the malignant vs benign CEUS models were 84.38%, 87.77%, 86.38% and 86.46%, 81.29% and 83.40%, respectively. CONCLUSION: The breast CEUS models can predict risk of malignant breast lesions more accurately, decrease false-positive biopsy, and provide accurate BIRADS classification.
基金Supported by National Natural Science Foundation of China (No.19981303)
文摘A data service system plays an indispensable role in HT-7 Tokamak experiment. Since the former system doesn’t provide the function of timely data procession and analysis, and all client software are based on Windows, it can’t fulfill virtual fusion laboratory for remote researchers. Therefore, a new system which is simplified by three kinds of data servers and one data analysis and visualization software tool has been developed. The data servers in-clude a data acquisition server based on file system, an MDSplus server used as the central repository for analysis data, and a web server. Users who prefer the convenience of application that can be run in a Web Browser can easily access the experiment data without knowing X-Windows. In order to adjust instruments to control experiment the operators need to plot data duly as soon as they are gathered. To satisfy their requirement, an upgraded data analysis and visualization software GT-7 is developed. It not only makes 2D data visualization more efficient, but also it can be capable of processing, analyzing and displaying interactive 2D and 3D graph of raw, analyzed data by the format of ASCII, LZO and MDSplus.
文摘The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.
基金This paper is financially supported by the National I mportant MiningZone Database ( No .200210000004)Prediction and Assessment ofMineral Resources and Social Service (No .1212010331402) .
文摘Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics database, gravity database, geochemistry database and remote sensing database, is very significant. We developed national important mining zone database (NIMZDB) to manage 14 national important mining zone databases to support a new round prediction of ore deposit. We found that attention should be paid to the following issues: ① data accuracy: integrity, logic consistency, attribute, spatial and time accuracy; ② management of both attribute and spatial data in the same system;③ transforming data between MapGIS and ArcGIS; ④ data sharing and security; ⑤ data searches that can query both attribute and spatial data. Accuracy of input data is guaranteed and the search, analysis and translation of data between MapGIS and ArcGIS has been made convenient via the development of a checking data module and a managing data module based on MapGIS and ArcGIS. Using AreSDE, we based data sharing on a client/server system, and attribute and spatial data are also managed in the same system.
基金Supported by State Key Program of National Natural Science Foundation of China (60934009) National Natural Science Foundations of China (60801048 60974062)
基金Supported by the Harbin Engineering University Fund for Basic Projects (heuft06041)
文摘The initial motivation of the lifting technique is to solve the H∞control problems. However, the conventional weighted H∞design does not meet the conditions required by lifting, so the result often leads to a misjudgement of the design. Two conditions required by using the lifting technique are presented based on the basic formulae of the lifting. It is pointed out that only the H∞disturbance attenuation problem with no weighting functions can meet these conditions, hence, the application of the lifting technique is quite limited.
基金supported by the National Natural Science Fandation of China (6067208960772075)
文摘In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.
文摘Hepatocellular carcinoma (HCC) usually develops in the setting of chronic liver disease. In the adequate clinical context, both multiphasic contrast-enhanced CT and magnetic resonance imaging are non-invasive modalities that allow accurate diagnosis and staging of HCC, although the latter demonstrates greater sensitivity and specificity. Imaging criteria for HCC diagnosis rely on hemodynamic features such as hyperenhancement in the arterial phase and washout in the portal or equilibrium phase. However, imaging performance drops considerably for small (< 20 mm) nodules because their tendency to exhibit atypical enhancement patterns. In order to improve accuracy in the diagnosis and staging of HCC, particularly in cases of atypical nodules, ancillary features, i.e., imaging characteristics that modify the likelihood of HCC, have been described and incorporated into clinical reports, especially in Liver Imaging Reporting and Data System. In this paper, ancillary imaging features will be reviewed and illustrated.