Hot carrier effects of p MOSFETs with different oxide thicknesses are studied in low gate voltage range.All electrical parameters follow a power law relationship with stress time,but degradation slope is dependent ...Hot carrier effects of p MOSFETs with different oxide thicknesses are studied in low gate voltage range.All electrical parameters follow a power law relationship with stress time,but degradation slope is dependent on gate voltage.For the devices with thicker oxides,saturated drain current degradation has a close relationship with the product of gate current and electron fluence.For small dimensional devices,saturated drain current degradation has a close relationship with the electron fluence.This degradation model is valid for p MOSFETs with 0 25μm channel length and different gate oxide thicknesses.展开更多
Chaos game representation (CGR) is an iterative mapping technique that processes sequences of units, such as nucleotides in a DNA sequence or amino acids in a protein, in order to determine the coordinates of their ...Chaos game representation (CGR) is an iterative mapping technique that processes sequences of units, such as nucleotides in a DNA sequence or amino acids in a protein, in order to determine the coordinates of their positions in a continuous space. This distribution of positions has two features: one is unique, and the other is source sequence that can be recovered from the coordinates so that the distance between positions may serve as a measure of similarity between the corresponding sequences. A CGR-walk model is proposed based on CGR coordinates for the DNA sequences. The CGR coordinates are converted into a time series, and a long-memory ARFIMA (p, d, q) model, where ARFIMA stands for autoregressive fractionally integrated moving average, is introduced into the DNA sequence analysis. This model is applied to simulating real CGR-walk sequence data of ten genomic sequences. Remarkably long-range correlations are uncovered in the data, and the results from these models are reasonably fitted with those from the ARFIMA (p, d, q) model.展开更多
The field experiments were carried out to investigate the dynamics and models of N, P and K absorption for the cotton plants with a lint of 3 000 kg ha-1 in Xinjiang. The main results were as follows: The contents of ...The field experiments were carried out to investigate the dynamics and models of N, P and K absorption for the cotton plants with a lint of 3 000 kg ha-1 in Xinjiang. The main results were as follows: The contents of N, P2O5, K2O in cotton leaves, stems, squares and bolls decreased obviously with the time over the whole growth duration and the falling extent was greater in high-yield cotton than in CK. Contents of N in leaves, squares and bolls, in particular in the leaves of fruit-bearing shoot was higher in high-yield cotton than in CK. Contents of P2O5 in squares and bolls and that of K2O in stems were higher in high-yield cotton than in CK during the whole growing period. The accumulations of N, P2O5 and K2O in the cotton plants could be described with a logistic curve equation. There was the fastest nutrient uptake at about 90 d for N, 92 d for P2O5 and 85 d for K2O after emergence, respectively. Total nutrient accumulation of N, P2O5 and K2O was 385.8, 244. 7 and 340.3 kg ha-1, respectively. Approximately 12. 5 kg N, 8. 0 kg P2O5 and 11.1 kg K2O were needed for producing 100 kg lint with the leaves and stems under the super high yield condition of 3 000 kg ha-1 in Xinjiang.展开更多
A new chaos game representation of protein sequences based on the detailed hydrophobic-hydrophilic (HP) model has been proposed by Yu et al (Physica A 337(2004) 171). A CGR-walk model is proposed based on the ne...A new chaos game representation of protein sequences based on the detailed hydrophobic-hydrophilic (HP) model has been proposed by Yu et al (Physica A 337(2004) 171). A CGR-walk model is proposed based on the new CGR coordinates for the protein sequences from complete genomes in the present paper. The new CCR coordinates based on the detailed HP model are converted into a time series, and a long-memory ARFIMA(p, d, q) model is introduced into the protein sequence analysis. This model is applied to simulating real CCR-walk sequence data of twelve protein sequences. Remarkably long-range correlations are uncovered in the data and the results obtained from these models are reasonably consistent with those available from the ARFIMA(p, d, q) model.展开更多
Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P b...Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P botnet. Then, the local stability at equilibria is carefully analyzed by considering the eigenvalues' distributed ranges of characteristic equations. Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic re- production number and time delay r. The results can help us to better understand the propagation behaviors of P2P botnet and design effective counter-botnet methods.展开更多
In this article we study the empirical likelihood inference for AR(p) model. We propose the moment restrictions, by which we get the empirical likelihood estimator of the model parametric, and we also propose an emp...In this article we study the empirical likelihood inference for AR(p) model. We propose the moment restrictions, by which we get the empirical likelihood estimator of the model parametric, and we also propose an empirical log-likelihood ratio base on this estimator. Our result shows that the EL estimator is asymptotically normal, and the empirical log-likelihood ratio is proved to be asymptotically standard chi-squared.展开更多
In this study,we systematically investigated the two-proton(2p)radioactivity half-lives from the excited state of nuclei near the proton drip line within the Gamowlike model(GLM)and modified Gamow-like model(MGLM).The...In this study,we systematically investigated the two-proton(2p)radioactivity half-lives from the excited state of nuclei near the proton drip line within the Gamowlike model(GLM)and modified Gamow-like model(MGLM).The calculated results were highly consistent with the theoretical values obtained using the unified fission model[Chin.Phys.C 45,124105(2021)],effective liquid drop model,and generalized liquid drop model[Acta Phys.Sin 71,062301(2022)].Furthermore,utilizing the GLM and MGLM,we predicted the 2p radioactivity halflives from the excited state for some nuclei that are not yet available experimentally.Simultaneously,by analyzing the calculated results from these theoretical models,it was found that the half-lives are strongly dependent on Qand l.展开更多
Taking the interaction between a DNA damage repair module, an ATM module, and a P53--MDM2 oscillation module into account, this paper presents a mathematical model of a P53 oscillation network triggered by a DNA damag...Taking the interaction between a DNA damage repair module, an ATM module, and a P53--MDM2 oscillation module into account, this paper presents a mathematical model of a P53 oscillation network triggered by a DNA damage signal in individual cells. The effects of the DNA damage signal and the delay time of P53-induced MDM2 expression on the behaviours of the P53 oscillation network are studied. In the oscillatory state of the P53--MDM2 oscillator, it is found that the pulse number of P53--P oscillation increases with the increase of the initial DNA damage signal, whereas the amplitude and the period of P53--P oscillation are fixed for different initial DNA damage signals, and the period numbers of P53--P oscillations decrease with the increase of time delay of MDM2 expression induced by P53. These theoretical predictions are consistent with previous experimental results. The combined negative feedback of P53--MDM2 with the time delay of P53-induced MDM2 expression causes oscillation behaviour in the P53 network.展开更多
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo...It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.展开更多
The Varzaghan district at the northwestern margin of the Urumieh–Dokhtar magmatic arc, is considered a promising area for the exploration of porphyry Cu deposits in Iran. In this study we identified mono-and multi-el...The Varzaghan district at the northwestern margin of the Urumieh–Dokhtar magmatic arc, is considered a promising area for the exploration of porphyry Cu deposits in Iran. In this study we identified mono-and multi-element geochemical anomalies associated with Cu–Au–Mo–Bi mineralization in the central parts of the Varzaghan district by applying the concentration–area fractal method. After mono-element geochemical investigations, principal component analysis was applied to ten selected elements in order to acquire a multi-element geochemical signature based on the mineralization-related component. Quantitative comparisons of the obtained fractal-based populations were carried out in accordance with known Cu occurrences using Student's t-values. Then,significant mono-and multi-element geochemical layers were separately combined with related geologic and structural layers to generate prospectivity models, using the fuzzy GAMMA approach. For quantitative evaluation of the effectiveness of different geochemical signatures in final prospectivity models, a prediction-area plot was adapted. The results show that the multi-element geochemical signature of principal component one(PC1) is more effective than mono-element layers in delimiting exploration targets related to porphyry Cu deposits.展开更多
Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received pa...Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate.展开更多
For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P...For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network, auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model.展开更多
An enriched environment is used as a behavio ral intervention therapy that applies sensory,motor,and social stimulation,and has been used in basic and clinical research of va rious neurological diseases.In this study,...An enriched environment is used as a behavio ral intervention therapy that applies sensory,motor,and social stimulation,and has been used in basic and clinical research of va rious neurological diseases.In this study,we established mouse models of photothrombotic stroke and,24 hours later,raised them in a standard,enriched,or isolated environment for 4 weeks.Compared with the mice raised in a standard environment,the cognitive function of mice raised in an enriched environment was better and the pathological damage in the hippocampal CA1 region was remarkably alleviated.Furthermore,protein expression levels of tumor necrosis factor receptor-associated factor 6,nuclear factorκB p65,interleukin-6,and tumor necrosis factorα,and the mRNA expression level of tumor necrosis factor receptor-associated factor 6 were greatly lower,while the expression level of miR-146a-5p was higher.Compared with the mice raised in a standard environment,changes in these indices in mice raised in an isolated environment were opposite to mice raised in an enriched environment.These findings suggest that different living environments affect the hippocampal inflammatory response and cognitive function in a mouse model of stro ke.An enriched environment can improve cognitive function following stroke through up-regulation of miR-146a-5p expression and a reduction in the inflammatory response.展开更多
Background:Online peer-to-peer lending(P2P lending)is booming as the popularity of e-finance.To develop a conceptual model for the P2P lending process is great valuable for managers to tack the issues of marketing,man...Background:Online peer-to-peer lending(P2P lending)is booming as the popularity of e-finance.To develop a conceptual model for the P2P lending process is great valuable for managers to tack the issues of marketing,management and operation.Methods:In this paper,we focus on the P2P lending process model and provide a comparative analysis comparing with traditional bank loan process.Results:Firstly,our model shows that the information flow in P2P lending is more frequent and transparent.Secondly,the model reveals that P2P lending uses a quite different credit audition method,which relies on information and the decision model in the P2P systems.Thirdly,the loan management is not complete normally in P2P lending,because most P2P companies do not have the post-loan records of borrowers.Conclusions:These findings inspire future studies and practices on P2P lending process and key technologies.展开更多
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat...With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.展开更多
文摘Hot carrier effects of p MOSFETs with different oxide thicknesses are studied in low gate voltage range.All electrical parameters follow a power law relationship with stress time,but degradation slope is dependent on gate voltage.For the devices with thicker oxides,saturated drain current degradation has a close relationship with the product of gate current and electron fluence.For small dimensional devices,saturated drain current degradation has a close relationship with the electron fluence.This degradation model is valid for p MOSFETs with 0 25μm channel length and different gate oxide thicknesses.
基金Project supported by the National Natural Science Foundation of China (Grant No 60575038)the Natural Science Foundation of Jiangnan University,China (Grant No 20070365)
文摘Chaos game representation (CGR) is an iterative mapping technique that processes sequences of units, such as nucleotides in a DNA sequence or amino acids in a protein, in order to determine the coordinates of their positions in a continuous space. This distribution of positions has two features: one is unique, and the other is source sequence that can be recovered from the coordinates so that the distance between positions may serve as a measure of similarity between the corresponding sequences. A CGR-walk model is proposed based on CGR coordinates for the DNA sequences. The CGR coordinates are converted into a time series, and a long-memory ARFIMA (p, d, q) model, where ARFIMA stands for autoregressive fractionally integrated moving average, is introduced into the DNA sequence analysis. This model is applied to simulating real CGR-walk sequence data of ten genomic sequences. Remarkably long-range correlations are uncovered in the data, and the results from these models are reasonably fitted with those from the ARFIMA (p, d, q) model.
基金supported by the National Key Technologies R&D Program in 10th Five-year Plan of China(2001BA507A)the National Natural Sicence Foundation of China(39760040).
文摘The field experiments were carried out to investigate the dynamics and models of N, P and K absorption for the cotton plants with a lint of 3 000 kg ha-1 in Xinjiang. The main results were as follows: The contents of N, P2O5, K2O in cotton leaves, stems, squares and bolls decreased obviously with the time over the whole growth duration and the falling extent was greater in high-yield cotton than in CK. Contents of N in leaves, squares and bolls, in particular in the leaves of fruit-bearing shoot was higher in high-yield cotton than in CK. Contents of P2O5 in squares and bolls and that of K2O in stems were higher in high-yield cotton than in CK during the whole growing period. The accumulations of N, P2O5 and K2O in the cotton plants could be described with a logistic curve equation. There was the fastest nutrient uptake at about 90 d for N, 92 d for P2O5 and 85 d for K2O after emergence, respectively. Total nutrient accumulation of N, P2O5 and K2O was 385.8, 244. 7 and 340.3 kg ha-1, respectively. Approximately 12. 5 kg N, 8. 0 kg P2O5 and 11.1 kg K2O were needed for producing 100 kg lint with the leaves and stems under the super high yield condition of 3 000 kg ha-1 in Xinjiang.
基金Project supported by the National Natural Science Foundation of China (Grant No 60575038)the Natural Science Foundation of Jiangnan University, China (Grant No 20070365)the Program for Innovative Research Team of Jiangnan University, China
文摘A new chaos game representation of protein sequences based on the detailed hydrophobic-hydrophilic (HP) model has been proposed by Yu et al (Physica A 337(2004) 171). A CGR-walk model is proposed based on the new CGR coordinates for the protein sequences from complete genomes in the present paper. The new CCR coordinates based on the detailed HP model are converted into a time series, and a long-memory ARFIMA(p, d, q) model is introduced into the protein sequence analysis. This model is applied to simulating real CCR-walk sequence data of twelve protein sequences. Remarkably long-range correlations are uncovered in the data and the results obtained from these models are reasonably consistent with those available from the ARFIMA(p, d, q) model.
基金National Natural Science Foundation of China(No.61379125)Program for Basic Research of Shanxi Province(No.2012011015-3)Higher School of Science and Technology Innovation Project of Shanxi Province(No.2013148)
文摘Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P botnet. Then, the local stability at equilibria is carefully analyzed by considering the eigenvalues' distributed ranges of characteristic equations. Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic re- production number and time delay r. The results can help us to better understand the propagation behaviors of P2P botnet and design effective counter-botnet methods.
文摘In this article we study the empirical likelihood inference for AR(p) model. We propose the moment restrictions, by which we get the empirical likelihood estimator of the model parametric, and we also propose an empirical log-likelihood ratio base on this estimator. Our result shows that the EL estimator is asymptotically normal, and the empirical log-likelihood ratio is proved to be asymptotically standard chi-squared.
基金supported by the National Natural Science Foundation of China(Nos.12175100 and 11975132)the Construct Program of the Key Discipline in Hunan Province+3 种基金the Research Foundation of the Education Bureau of Hunan Province,China(No.18A237)the Natural Science Foundation of Hunan Province,China(No.2018JJ2321)the Innovation Group of Nuclear and Particle Physics in USCthe Opening Project of the Cooperative Innovation Center for Nuclear Fuel Cycle Technology and Equipment,University of South China(No.2019KFZ10)。
文摘In this study,we systematically investigated the two-proton(2p)radioactivity half-lives from the excited state of nuclei near the proton drip line within the Gamowlike model(GLM)and modified Gamow-like model(MGLM).The calculated results were highly consistent with the theoretical values obtained using the unified fission model[Chin.Phys.C 45,124105(2021)],effective liquid drop model,and generalized liquid drop model[Acta Phys.Sin 71,062301(2022)].Furthermore,utilizing the GLM and MGLM,we predicted the 2p radioactivity halflives from the excited state for some nuclei that are not yet available experimentally.Simultaneously,by analyzing the calculated results from these theoretical models,it was found that the half-lives are strongly dependent on Qand l.
基金Project supported by the National Natural Science Foundation of China (Grant No. 10875049)the Key Project of Chinese Ministry of Education (Grant No. 108096)the Programme of Introducing Talents of Discipline to Universities (Grant No. B08033)
文摘Taking the interaction between a DNA damage repair module, an ATM module, and a P53--MDM2 oscillation module into account, this paper presents a mathematical model of a P53 oscillation network triggered by a DNA damage signal in individual cells. The effects of the DNA damage signal and the delay time of P53-induced MDM2 expression on the behaviours of the P53 oscillation network are studied. In the oscillatory state of the P53--MDM2 oscillator, it is found that the pulse number of P53--P oscillation increases with the increase of the initial DNA damage signal, whereas the amplitude and the period of P53--P oscillation are fixed for different initial DNA damage signals, and the period numbers of P53--P oscillations decrease with the increase of time delay of MDM2 expression induced by P53. These theoretical predictions are consistent with previous experimental results. The combined negative feedback of P53--MDM2 with the time delay of P53-induced MDM2 expression causes oscillation behaviour in the P53 network.
基金supported by National Natural Science Foundation of China (No.60873231)Research Fund for the Doctoral Program of Higher Education (No.20093223120001)+2 种基金Science and Technology Support Program of Jiangsu Province (No.BE2009158)Natural Science Fund of Higher Education of Jiangsu Province(No.09KJB520010)Special Fund for Fast Sharing of Science Paper in Net Era by CSTD (No.2009117)
文摘It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.
文摘The Varzaghan district at the northwestern margin of the Urumieh–Dokhtar magmatic arc, is considered a promising area for the exploration of porphyry Cu deposits in Iran. In this study we identified mono-and multi-element geochemical anomalies associated with Cu–Au–Mo–Bi mineralization in the central parts of the Varzaghan district by applying the concentration–area fractal method. After mono-element geochemical investigations, principal component analysis was applied to ten selected elements in order to acquire a multi-element geochemical signature based on the mineralization-related component. Quantitative comparisons of the obtained fractal-based populations were carried out in accordance with known Cu occurrences using Student's t-values. Then,significant mono-and multi-element geochemical layers were separately combined with related geologic and structural layers to generate prospectivity models, using the fuzzy GAMMA approach. For quantitative evaluation of the effectiveness of different geochemical signatures in final prospectivity models, a prediction-area plot was adapted. The results show that the multi-element geochemical signature of principal component one(PC1) is more effective than mono-element layers in delimiting exploration targets related to porphyry Cu deposits.
文摘Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate.
文摘For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network, auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model.
基金financially the National Natural Science Foundation of China,No.82072533the China Postdoctoral Science Foundation,No.2017M621675+1 种基金Huxin Foundation of Jiangsu Key Laboratory of Zoonosis of China,No.HX2003Yangzhou Science and Technology Development Plan Project of China,No.YZ2020201(all to XW)。
文摘An enriched environment is used as a behavio ral intervention therapy that applies sensory,motor,and social stimulation,and has been used in basic and clinical research of va rious neurological diseases.In this study,we established mouse models of photothrombotic stroke and,24 hours later,raised them in a standard,enriched,or isolated environment for 4 weeks.Compared with the mice raised in a standard environment,the cognitive function of mice raised in an enriched environment was better and the pathological damage in the hippocampal CA1 region was remarkably alleviated.Furthermore,protein expression levels of tumor necrosis factor receptor-associated factor 6,nuclear factorκB p65,interleukin-6,and tumor necrosis factorα,and the mRNA expression level of tumor necrosis factor receptor-associated factor 6 were greatly lower,while the expression level of miR-146a-5p was higher.Compared with the mice raised in a standard environment,changes in these indices in mice raised in an isolated environment were opposite to mice raised in an enriched environment.These findings suggest that different living environments affect the hippocampal inflammatory response and cognitive function in a mouse model of stro ke.An enriched environment can improve cognitive function following stroke through up-regulation of miR-146a-5p expression and a reduction in the inflammatory response.
基金supported by a grant from the Shenzhen Municipal Science and Technology R&D Funding—Basic Research Program(Project No.JCYJ20140417105742712).
文摘Background:Online peer-to-peer lending(P2P lending)is booming as the popularity of e-finance.To develop a conceptual model for the P2P lending process is great valuable for managers to tack the issues of marketing,management and operation.Methods:In this paper,we focus on the P2P lending process model and provide a comparative analysis comparing with traditional bank loan process.Results:Firstly,our model shows that the information flow in P2P lending is more frequent and transparent.Secondly,the model reveals that P2P lending uses a quite different credit audition method,which relies on information and the decision model in the P2P systems.Thirdly,the loan management is not complete normally in P2P lending,because most P2P companies do not have the post-loan records of borrowers.Conclusions:These findings inspire future studies and practices on P2P lending process and key technologies.
文摘With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.