期刊文献+
共找到10,925篇文章
< 1 2 250 >
每页显示 20 50 100
Two-Sided Stable Matching Decision-Making Method Considering Matching Intention under a Hesitant Fuzzy Environment
1
作者 Qi Yue Zhibin Deng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第5期1603-1623,共21页
In this paper,a stable two-sided matching(TSM)method considering the matching intention of agents under a hesitant fuzzy environment is proposed.The method uses a hesitant fuzzy element(HFE)as its basis.First,the HFE ... In this paper,a stable two-sided matching(TSM)method considering the matching intention of agents under a hesitant fuzzy environment is proposed.The method uses a hesitant fuzzy element(HFE)as its basis.First,the HFE preference matrix is transformed into the normalized HFE preference matrix.On this basis,the distance and the projection of the normalized HFEs on positive and negative ideal solutions are calculated.Then,the normalized HFEs are transformed into agent satisfactions.Considering the stable matching constraints,a multiobjective programming model with the objective of maximizing the satisfactions of two-sided agents is constructed.Based on the agent satisfaction matrix,the matching intention matrix of two-sided agents is built.According to the agent satisfaction matrix and matching intention matrix,the comprehensive satisfaction matrix is set up.Furthermore,the multiobjective programming model based on satisfactions is transformed into a multiobjective programming model based on comprehensive satisfactions.Using the G-S algorithm,the multiobjective programming model based on comprehensive satisfactions is solved,and then the best TSM scheme is obtained.Finally,a terminal distribution example is used to verify the feasibility and effectiveness of the proposed method. 展开更多
关键词 two-sided matching stable matching hesitant fuzzy element matching intention programming model
下载PDF
Two-Sided Matching Decision Making with Multi-Attribute Probabilistic Hesitant Fuzzy Sets
2
作者 Peichen Zhao Qi Yue Zhibin Deng 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期849-873,共25页
In previous research on two-sided matching(TSM)decision,agents’preferences were often given in the form of exact values of ordinal numbers and linguistic phrase term sets.Nowdays,the matching agent cannot perform the... In previous research on two-sided matching(TSM)decision,agents’preferences were often given in the form of exact values of ordinal numbers and linguistic phrase term sets.Nowdays,the matching agent cannot perform the exact evaluation in the TSM situations due to the great fuzziness of human thought and the complexity of reality.Probability hesitant fuzzy sets,however,have grown in popularity due to their advantages in communicating complex information.Therefore,this paper develops a TSM decision-making approach with multi-attribute probability hesitant fuzzy sets and unknown attribute weight information.The agent attribute weight vector should be obtained by using the maximum deviation method and Hamming distance.The probabilistic hesitancy fuzzy information matrix of each agent is then arranged to determine the comprehensive evaluation of two matching agent sets.The agent satisfaction degree is calculated using the technique for order preference by similarity to ideal solution(TOPSIS).Additionally,the multi-object programming technique is used to establish a TSM method with the objective of maximizing the agent satisfaction of two-sided agents,and the matching schemes are then established by solving the built model.The study concludes by providing a real-world supply-demand scenario to illustrate the effectiveness of the proposed method.The proposed method is more flexible than prior research since it expresses evaluation information using probability hesitating fuzzy sets and can be used in scenarios when attribute weight information is unclear. 展开更多
关键词 two-sided matching decision-making(TSMDM) probabilistic hesitant fuzzy set(PHFS) the technique for order preference by similarity to ideal solution(TOPSIS) MULTI-ATTRIBUTE
下载PDF
Message from Editors
3
作者 Shiqi Ji 《CES Transactions on Electrical Machines and Systems》 EI CSCD 2024年第1期1-2,共2页
IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have b... IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have been developed every year.First,the research of motors in new and extreme fields have constantly brought amazing progress to achieve better performance through new technologies such as digitalization,etc.Meanwhile,the fast development of power electronics in recent decades has also changed the overall system to be more flexible,and widely extent our boundary of research area.What is more. 展开更多
关键词 EXTREME messagE constantly
下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
4
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
Anti-Spoofing:Integrated Information Authentication of BeiDou-ⅡCivil Navigation Message
5
作者 Wu Zhijun Liang Cheng +2 位作者 Zhang Yun Liu Rusen Yue Meng 《China Communications》 SCIE CSCD 2024年第9期242-261,共20页
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le... The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication. 展开更多
关键词 anti-spoofing AUTHENTICATION BeiDou-II civil navigation message(BDII-CNAV) SIGNATURE spoofing attack
下载PDF
Effectiveness of Short Message Service Support on Adherence to Chemotherapy Treatment among Patients Attending Cancer Treatment Facilities in Kenya
6
作者 Nebert Kiguhe Mchidi John P. Oyore Gordon Ogweno 《Open Journal of Nursing》 2024年第3期93-113,共21页
Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhe... Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhere to treatment to improve survival and quality of life. Methods: This multisite Cluster Randomized Trial (CRT) evaluated the effectiveness of mobile phone Short Message Service (SMS) support on the adherence to treatment schedules among adult cancer patients in Kenya. Data was collected using questionnaires. Ethical approvals were obtained from relevant Ethical Review Boards (ERBs). Results: The mean adherence was 83%. There was a significant difference between treatment arms in relation to the adherence. The intervention arm had a higher mean adherence difference, M = 3.913, 95% CI 2.632-5.193, t (402) = 6.006, p ≤ 0.001), with Cohen’s d = 0.60. Although not significant, (χ<sup>2</sup>dd = 0.151, df = 1, p = 2.064), more women were perfect adheres than males. Perfect adherers were satisfied with SMS support (χ<sup>2</sup>dd = 7.620, df = 1, p = 0.06), were in the intervention arm (χ<sup>2</sup>dd = 22.942, df = 1, p ≤ 0.001), and had trust in the care provider (χ<sup>2</sup>dd = 10.591 p ≤ 0.001). SMS support was not significant in the multivariate analysis but had an estimated effect size of 0.958 (z = 1.424, p = 0.154, CI = 0.242-3.781), indicating that mean adherence was slightly better in the presence of the intervention. Conclusions: SMS-support intervention has demonstrated superiority in influencing adherence. Further, health system-related factors have a significant influence on the adherence to chemotherapy treatment. Interventions to re-design health systems that are responsive to unmet care needs of cancer patients must be explored. . 展开更多
关键词 ADHERENCE Cancer Symptom Distress Quality of Life Medication Posses-sion Ratio Short message Service SURVIVORSHIP
下载PDF
Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment
7
作者 Qiping Zou Zhong Ruan Huaning Song 《Computer Systems Science & Engineering》 2024年第5期1301-1328,共28页
As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’trav... As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’travel routes,and improve travel efficiency.However,in the IoV system,there are always malicious vehicle nodes publishing false information.Therefore,it is essential to ensure the legitimacy of the source.In addition,during the peak period of vehicle travel,the vehicle releases a large number of messages,and IoV authentication efficiency is prone to performance bottlenecks.Most existing authentication schemes have the problem of low authentication efficiency in the scenario.To address the above problems,this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic.Here,our scheme uses blockchain and elliptic curve cryptography(ECC)to design authentication algorithms for message authentication between vehicles and roadside units(RSU).Additionally,we introduce the idea of edge computing into the scheme,RSU will select themost suitable vehicle as the edge computing node for message authentication.In addition,we used the ProVerif tool for Internet security protocols and applications to test its security,ensuring that it is secure under different network attacks.In the simulation experiment,we compare our scheme with other existing works.Our scheme has a significant improvement in computational overhead,authentication efficiency and packet loss rate,and is suitable for traffic scenarios with large message volume. 展开更多
关键词 Internet of Vehicles messages authentication edge computing blockchain elliptic curve cryptography
下载PDF
Turbo Message Passing Based Burst Interference Cancellation for Data Detection in Massive MIMO-OFDM Systems
8
作者 Wenjun Jiang Zhihao Ou +1 位作者 Xiaojun Yuan Li Wang 《China Communications》 SCIE CSCD 2024年第2期143-154,共12页
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte... This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound. 展开更多
关键词 burst interference cancellation data detection massive multiple-input multiple-output(MIMO) message passing orthogonal frequency division multiplexing(OFDM)
下载PDF
Stylistic features of cell-phone short messages in English and their translation 被引量:2
9
作者 吕文澎 张军历 《Sino-US English Teaching》 2007年第11期60-65,共6页
Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by ap... Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by applying the stylistic theory and employing the "Model of Analyzing Textual Function". The features of the two styles of messages are described and analyzed from the perspectives of their pronunciation, graphology, vocabulary, grammar, discourse, rhetoric, etc., and the stylistic features serve as the basis for discussing the translation principles and methods of English short messages. 展开更多
关键词 cell-phone short messages in English stylistic features TRANSLATION
下载PDF
不同电子病历系统间的数据交换—通过HL7messages交换MML(MedicalMarkup Language)3.0医疗文档 被引量:7
10
作者 郭锦秋 高田彰 +6 位作者 田中亨治 佐藤纯三 铃木斋王 铃木利明 中岛裕生 荒木贤二 吉原博幸 《医学信息(医学与计算机应用)》 2004年第6期313-319,共7页
MML (Medical Markup L anguage) ,作为一套不同医疗信息系统之间的交换规格于 1995年在日本被开发。 1999年正式公布版本 2 .2 1,使用 XML作为标记语言。之后随着大规模的实证实验 ,版本 2 .2 1被进一步修改 ,2 0 0 1年升级为包含 12... MML (Medical Markup L anguage) ,作为一套不同医疗信息系统之间的交换规格于 1995年在日本被开发。 1999年正式公布版本 2 .2 1,使用 XML作为标记语言。之后随着大规模的实证实验 ,版本 2 .2 1被进一步修改 ,2 0 0 1年升级为包含 12个模块的版本 2 .3。而最新版本 3.0是在 HL 7Clinical Docum ent Architecture (CDA)基础上开发而成 ,它将版本 2 .3的结构分割并重新定义 ,以便于用 MML记述的信息能在 HL 7CDAL evel One中表达。开发的结果表明 ,采用 MML版本 3.0形式记述的医疗文档可以通过 HL 7m essages来进行信息交换。 MML完整的规格及有关数据由日本非营利组织 Med XML委员会公开和管理 ,具体可参照 http:/ / www.m edxm l.net/。目前 ,我们正在进行 MML 3.0的中国本地化作业 ,主要包括 MML中所参照的表格的追加和修改以及医疗保险模块等的制作。 展开更多
关键词 电子病历系统 数据交换 HL7messages MML 医疗文档 CDA HL7 XML
下载PDF
Novel high torque bearingless two-sided rotary ultrasonic motor 被引量:7
11
作者 LI Xia CHEN Wei-shan XIE +1 位作者 Tao LIU Jun-kao 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第5期786-792,共7页
Applications are limited at present because the currently available ultrasonic motors (USMs) do not provide suffi-ciently high torque and power. The conventional travelling-wave USM needs the bearing to support, which... Applications are limited at present because the currently available ultrasonic motors (USMs) do not provide suffi-ciently high torque and power. The conventional travelling-wave USM needs the bearing to support, which required lubricant. To solve the above problem, a bearingless travelling-wave USM is designed. First, a novel structure of the two-sided USM consisting of a two-sided teeth stator and two disk-type rotors is designed. And the excitation principle of the two-sided travelling-wave USM is analyzed. Then, using ANSYS software, we set up the model of the stator to predict the excitation frequency and modal response of the stator. The shape of the vibration mode was obtained. Last, the load characteristics of the USM are measured using ex-perimental method. The maximum stall torque and the no-load speed were obtained. The results showed that the characteristics of the two-sided USM are better than those of the conventional one-sided USM. 展开更多
关键词 two-sided Ultrasonic motor (USM) Piezoelectric motor Travelling-wave BEARINGLESS
下载PDF
Nonlinear vibration analysis of a circular micro-plate in two-sided NEMS/MEMS capacitive system by using harmonic balance method 被引量:4
12
作者 Milad Saadatmand Alireza Shooshtari 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2019年第1期129-143,I0004,共16页
In this study, forced nonlinear vibration of a circular micro-plate under two-sided electrostatic, two-sided Casimir and external harmonic forces is investigated analytically. For this purpose, at first, von Karman pl... In this study, forced nonlinear vibration of a circular micro-plate under two-sided electrostatic, two-sided Casimir and external harmonic forces is investigated analytically. For this purpose, at first, von Karman plate theory including geometrical nonlinearity is used to obtain the deflection of the micro-plate. Galerkin decomposition method is then employed, and nonlinear ordinary differential equations (ODEs) of motion are determined. A harmonic balance method (HBM) is applied to equations and analytical relation for nonlineaT frequency response (F-R) curves are derived for two categories (including and neglecting Casimir force) separately. The analytical results for three cases:(1) semi-linear vibration;(2) weakly nonlinear vibration;(3) highly non linear vibration, are validated by comparing with the numerical solutio ns. After validation, the effects of the voltage and Casimir force on the natural frequency of two-sided capacitor system are investigated. It is shown that by assuming Casimir force in small gap distances, reduction of the natural frequency is considerable. The influences of the applied voltage, damping, micro-plate thickness and Casimir force on the frequency response curves have been presented too. The results of this study can be useful for modeling circular parallel-plates in nano /microelectromechanical transducers such as microphones and pressure sensors. 展开更多
关键词 NONLINEAR vibration two-sided MEMS CAPACITOR CIRCULAR PLATE Harmonic balance method
下载PDF
Effective Hybrid Teaching-learning-based Optimization Algorithm for Balancing Two-sided Assembly Lines with Multiple Constraints 被引量:8
13
作者 TANG Qiuhua LI Zixiang +2 位作者 ZHANG Liping FLOUDAS C A CAO Xiaojun 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2015年第5期1067-1079,共13页
Due to the NP-hardness of the two-sided assembly line balancing (TALB) problem, multiple constraints existing in real applications are less studied, especially when one task is involved with several constraints. In ... Due to the NP-hardness of the two-sided assembly line balancing (TALB) problem, multiple constraints existing in real applications are less studied, especially when one task is involved with several constraints. In this paper, an effective hybrid algorithm is proposed to address the TALB problem with multiple constraints (TALB-MC). Considering the discrete attribute of TALB-MC and the continuous attribute of the standard teaching-learning-based optimization (TLBO) algorithm, the random-keys method is hired in task permutation representation, for the purpose of bridging the gap between them. Subsequently, a special mechanism for handling multiple constraints is developed. In the mechanism, the directions constraint of each task is ensured by the direction check and adjustment. The zoning constraints and the synchronism constraints are satisfied by teasing out the hidden correlations among constraints. The positional constraint is allowed to be violated to some extent in decoding and punished in cost fimction. Finally, with the TLBO seeking for the global optimum, the variable neighborhood search (VNS) is further hybridized to extend the local search space. The experimental results show that the proposed hybrid algorithm outperforms the late acceptance hill-climbing algorithm (LAHC) for TALB-MC in most cases, especially for large-size problems with multiple constraints, and demonstrates well balance between the exploration and the exploitation. This research proposes an effective and efficient algorithm for solving TALB-MC problem by hybridizing the TLBO and VNS. 展开更多
关键词 two-sided assembly line balancing teaching-learning-based optimization algorithm variable neighborhood search positional constraints zoning constraints synchronism constraints
下载PDF
A Heuristic Method for Two-sided Assembly Line Balancing Problem 被引量:5
14
作者 秦杏敏 金烨 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第1期61-65,共5页
A two-sided assembly line is typically found in plants producing large-sized products. Its advantages over a one-sided line and the difficulties faced in two-sided line balancing problems were discussed. A mathematica... A two-sided assembly line is typically found in plants producing large-sized products. Its advantages over a one-sided line and the difficulties faced in two-sided line balancing problems were discussed. A mathematical model for two-ALB problem was suggested. A modification of the “ranked positional weight” method, namely two-ALB RPW for two-ALB problems was developed. Experiments were carried out to verify the performance of the proposed method and the results show that it is effective in solving two-sided assembly line balancing problems. 展开更多
关键词 two-sided assembly lines assembly line balancing(ALB) task delay ranked positional weight(RPW)
下载PDF
OTT Messages Modeling and Classification Based on Recurrent Neural Networks 被引量:3
15
作者 Guangyong Yang Jianqiu Zeng +3 位作者 Mengke Yang Yifei Wei Xiangqing Wang Zulfiqar Hussain Pathan 《Computers, Materials & Continua》 SCIE EI 2020年第5期769-785,共17页
A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectivel... A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages.In this paper,we propose a nine-rectangle-grid information model according to the information value and privacy,and then present information use policies based on the rough set theory.Recurrent neural networks were employed to classify OTT messages.The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages,ending with a reliable trained classification model.Experimental results showed that the proposed method yielded an accurate classification performance and hence can be used for effective distribution and control of OTT messages. 展开更多
关键词 OTT messages information privacy nine-rectangle-grid hierarchical classification recurrent neural networks
下载PDF
Laboratory Research on Effective Test Area of Short-Crested Waves Generated by Two-Sided Segmented Wavemakers 被引量:1
16
作者 李俊 陈刚 +1 位作者 杨建民 彭涛 《China Ocean Engineering》 SCIE EI CSCD 2014年第2期181-192,共12页
The size and shape of the effective test area are crucial to consider when short-crested waves are created by segmented wavemakers. The range of the effective test area of short-crested waves simulated by two-sided se... The size and shape of the effective test area are crucial to consider when short-crested waves are created by segmented wavemakers. The range of the effective test area of short-crested waves simulated by two-sided segmented wavemakers is analyzed in this paper. The experimental investigation on the wave field distribution of short-crested waves generated by two-sided segmented wavemakers is conducted by using an array of wave gauges. Wave spectra and directional spreading function are analyzed and the results show that when the main direction is at a certain angle with the normal line of wave generators, the wave field of 3D short-crested waves generated by two-sided segmented wavemakers has good spatial uniformity within the model test area. The effective test area can provide good wave environments for seakeeping model tests of various ocean engineering structures in the deep ocean engineering basin. 展开更多
关键词 wave simulation 3D short-crested wave effective test area two-sided segmented wavemakers
下载PDF
Two-Sided First Exit Problem for Jump Diffusion Distribution Processes Having Jumps with a Mixture of Erlang 被引量:1
17
作者 Yuzhen Wen Chuancun Yin 《Applied Mathematics》 2013年第8期1142-1153,共12页
In this paper, we consider the two-sided first exit problem for jump diffusion processes having jumps with rational Laplace transforms. We investigate the probabilistic property of conditional memorylessness, and driv... In this paper, we consider the two-sided first exit problem for jump diffusion processes having jumps with rational Laplace transforms. We investigate the probabilistic property of conditional memorylessness, and drive the joint distribution of the first exit time from an interval and the overshoot over the boundary at the exit time. 展开更多
关键词 FIRST EXIT Time two-sided JUMPS Jump Diffusion Process OVERSHOOT
下载PDF
Identifying Smartphone Based Intelligent Messages for Worker’s Crossing in Work Zones 被引量:1
18
作者 Fengxiang Qiao Ruksana Rahman +1 位作者 Qing Li Lei Yu 《Journal of Transportation Technologies》 2016年第2期76-85,共10页
A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety i... A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety in work zones. Three different warning message systems, including sound, male voice and female voice, were designed to alert drivers. Twenty-four subjects were recruited for a total of ninety-six rounds driving simulator test in a work zone to investigate the impacts of smartphone-based warning messages on subjects’ driving performance, in terms of driving speed, speed variation, acceleration, and brake reaction distance. The outcome showed that, with the assistance of the sound and voice (either female or male) warning messages, drivers could effectively reduce their accelerations and speeds. Meanwhile, such a warning system can induce subjects to shorten their brake reaction distances for worker crossings. All participants found that this warning system is applicable to enhance their defensive driving behaviors while driving through a work zone. 展开更多
关键词 Simulator Test Smartphone messages Vehicle-to-Infrastructure (V2I) Work Zones
下载PDF
Digital communication of two-dimensional messages in a chaotic optical system
19
作者 周云 吴亮 朱士群 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2196-2201,共6页
The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity differ... The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly. 展开更多
关键词 digital communication multi-mode laser two-dimensional messages chaotic synchronization
下载PDF
Secure authentication of classical messages with single photons
20
作者 王天银 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3189-3192,共4页
This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid me... This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. 展开更多
关键词 message authentication codes single photons hash function
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部