In this paper,a stable two-sided matching(TSM)method considering the matching intention of agents under a hesitant fuzzy environment is proposed.The method uses a hesitant fuzzy element(HFE)as its basis.First,the HFE ...In this paper,a stable two-sided matching(TSM)method considering the matching intention of agents under a hesitant fuzzy environment is proposed.The method uses a hesitant fuzzy element(HFE)as its basis.First,the HFE preference matrix is transformed into the normalized HFE preference matrix.On this basis,the distance and the projection of the normalized HFEs on positive and negative ideal solutions are calculated.Then,the normalized HFEs are transformed into agent satisfactions.Considering the stable matching constraints,a multiobjective programming model with the objective of maximizing the satisfactions of two-sided agents is constructed.Based on the agent satisfaction matrix,the matching intention matrix of two-sided agents is built.According to the agent satisfaction matrix and matching intention matrix,the comprehensive satisfaction matrix is set up.Furthermore,the multiobjective programming model based on satisfactions is transformed into a multiobjective programming model based on comprehensive satisfactions.Using the G-S algorithm,the multiobjective programming model based on comprehensive satisfactions is solved,and then the best TSM scheme is obtained.Finally,a terminal distribution example is used to verify the feasibility and effectiveness of the proposed method.展开更多
In previous research on two-sided matching(TSM)decision,agents’preferences were often given in the form of exact values of ordinal numbers and linguistic phrase term sets.Nowdays,the matching agent cannot perform the...In previous research on two-sided matching(TSM)decision,agents’preferences were often given in the form of exact values of ordinal numbers and linguistic phrase term sets.Nowdays,the matching agent cannot perform the exact evaluation in the TSM situations due to the great fuzziness of human thought and the complexity of reality.Probability hesitant fuzzy sets,however,have grown in popularity due to their advantages in communicating complex information.Therefore,this paper develops a TSM decision-making approach with multi-attribute probability hesitant fuzzy sets and unknown attribute weight information.The agent attribute weight vector should be obtained by using the maximum deviation method and Hamming distance.The probabilistic hesitancy fuzzy information matrix of each agent is then arranged to determine the comprehensive evaluation of two matching agent sets.The agent satisfaction degree is calculated using the technique for order preference by similarity to ideal solution(TOPSIS).Additionally,the multi-object programming technique is used to establish a TSM method with the objective of maximizing the agent satisfaction of two-sided agents,and the matching schemes are then established by solving the built model.The study concludes by providing a real-world supply-demand scenario to illustrate the effectiveness of the proposed method.The proposed method is more flexible than prior research since it expresses evaluation information using probability hesitating fuzzy sets and can be used in scenarios when attribute weight information is unclear.展开更多
IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have b...IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have been developed every year.First,the research of motors in new and extreme fields have constantly brought amazing progress to achieve better performance through new technologies such as digitalization,etc.Meanwhile,the fast development of power electronics in recent decades has also changed the overall system to be more flexible,and widely extent our boundary of research area.What is more.展开更多
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s...Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.展开更多
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le...The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.展开更多
Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhe...Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhere to treatment to improve survival and quality of life. Methods: This multisite Cluster Randomized Trial (CRT) evaluated the effectiveness of mobile phone Short Message Service (SMS) support on the adherence to treatment schedules among adult cancer patients in Kenya. Data was collected using questionnaires. Ethical approvals were obtained from relevant Ethical Review Boards (ERBs). Results: The mean adherence was 83%. There was a significant difference between treatment arms in relation to the adherence. The intervention arm had a higher mean adherence difference, M = 3.913, 95% CI 2.632-5.193, t (402) = 6.006, p ≤ 0.001), with Cohen’s d = 0.60. Although not significant, (χ<sup>2</sup>dd = 0.151, df = 1, p = 2.064), more women were perfect adheres than males. Perfect adherers were satisfied with SMS support (χ<sup>2</sup>dd = 7.620, df = 1, p = 0.06), were in the intervention arm (χ<sup>2</sup>dd = 22.942, df = 1, p ≤ 0.001), and had trust in the care provider (χ<sup>2</sup>dd = 10.591 p ≤ 0.001). SMS support was not significant in the multivariate analysis but had an estimated effect size of 0.958 (z = 1.424, p = 0.154, CI = 0.242-3.781), indicating that mean adherence was slightly better in the presence of the intervention. Conclusions: SMS-support intervention has demonstrated superiority in influencing adherence. Further, health system-related factors have a significant influence on the adherence to chemotherapy treatment. Interventions to re-design health systems that are responsive to unmet care needs of cancer patients must be explored. .展开更多
As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’trav...As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’travel routes,and improve travel efficiency.However,in the IoV system,there are always malicious vehicle nodes publishing false information.Therefore,it is essential to ensure the legitimacy of the source.In addition,during the peak period of vehicle travel,the vehicle releases a large number of messages,and IoV authentication efficiency is prone to performance bottlenecks.Most existing authentication schemes have the problem of low authentication efficiency in the scenario.To address the above problems,this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic.Here,our scheme uses blockchain and elliptic curve cryptography(ECC)to design authentication algorithms for message authentication between vehicles and roadside units(RSU).Additionally,we introduce the idea of edge computing into the scheme,RSU will select themost suitable vehicle as the edge computing node for message authentication.In addition,we used the ProVerif tool for Internet security protocols and applications to test its security,ensuring that it is secure under different network attacks.In the simulation experiment,we compare our scheme with other existing works.Our scheme has a significant improvement in computational overhead,authentication efficiency and packet loss rate,and is suitable for traffic scenarios with large message volume.展开更多
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte...This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound.展开更多
Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by ap...Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by applying the stylistic theory and employing the "Model of Analyzing Textual Function". The features of the two styles of messages are described and analyzed from the perspectives of their pronunciation, graphology, vocabulary, grammar, discourse, rhetoric, etc., and the stylistic features serve as the basis for discussing the translation principles and methods of English short messages.展开更多
Applications are limited at present because the currently available ultrasonic motors (USMs) do not provide suffi-ciently high torque and power. The conventional travelling-wave USM needs the bearing to support, which...Applications are limited at present because the currently available ultrasonic motors (USMs) do not provide suffi-ciently high torque and power. The conventional travelling-wave USM needs the bearing to support, which required lubricant. To solve the above problem, a bearingless travelling-wave USM is designed. First, a novel structure of the two-sided USM consisting of a two-sided teeth stator and two disk-type rotors is designed. And the excitation principle of the two-sided travelling-wave USM is analyzed. Then, using ANSYS software, we set up the model of the stator to predict the excitation frequency and modal response of the stator. The shape of the vibration mode was obtained. Last, the load characteristics of the USM are measured using ex-perimental method. The maximum stall torque and the no-load speed were obtained. The results showed that the characteristics of the two-sided USM are better than those of the conventional one-sided USM.展开更多
In this study, forced nonlinear vibration of a circular micro-plate under two-sided electrostatic, two-sided Casimir and external harmonic forces is investigated analytically. For this purpose, at first, von Karman pl...In this study, forced nonlinear vibration of a circular micro-plate under two-sided electrostatic, two-sided Casimir and external harmonic forces is investigated analytically. For this purpose, at first, von Karman plate theory including geometrical nonlinearity is used to obtain the deflection of the micro-plate. Galerkin decomposition method is then employed, and nonlinear ordinary differential equations (ODEs) of motion are determined. A harmonic balance method (HBM) is applied to equations and analytical relation for nonlineaT frequency response (F-R) curves are derived for two categories (including and neglecting Casimir force) separately. The analytical results for three cases:(1) semi-linear vibration;(2) weakly nonlinear vibration;(3) highly non linear vibration, are validated by comparing with the numerical solutio ns. After validation, the effects of the voltage and Casimir force on the natural frequency of two-sided capacitor system are investigated. It is shown that by assuming Casimir force in small gap distances, reduction of the natural frequency is considerable. The influences of the applied voltage, damping, micro-plate thickness and Casimir force on the frequency response curves have been presented too. The results of this study can be useful for modeling circular parallel-plates in nano /microelectromechanical transducers such as microphones and pressure sensors.展开更多
Due to the NP-hardness of the two-sided assembly line balancing (TALB) problem, multiple constraints existing in real applications are less studied, especially when one task is involved with several constraints. In ...Due to the NP-hardness of the two-sided assembly line balancing (TALB) problem, multiple constraints existing in real applications are less studied, especially when one task is involved with several constraints. In this paper, an effective hybrid algorithm is proposed to address the TALB problem with multiple constraints (TALB-MC). Considering the discrete attribute of TALB-MC and the continuous attribute of the standard teaching-learning-based optimization (TLBO) algorithm, the random-keys method is hired in task permutation representation, for the purpose of bridging the gap between them. Subsequently, a special mechanism for handling multiple constraints is developed. In the mechanism, the directions constraint of each task is ensured by the direction check and adjustment. The zoning constraints and the synchronism constraints are satisfied by teasing out the hidden correlations among constraints. The positional constraint is allowed to be violated to some extent in decoding and punished in cost fimction. Finally, with the TLBO seeking for the global optimum, the variable neighborhood search (VNS) is further hybridized to extend the local search space. The experimental results show that the proposed hybrid algorithm outperforms the late acceptance hill-climbing algorithm (LAHC) for TALB-MC in most cases, especially for large-size problems with multiple constraints, and demonstrates well balance between the exploration and the exploitation. This research proposes an effective and efficient algorithm for solving TALB-MC problem by hybridizing the TLBO and VNS.展开更多
A two-sided assembly line is typically found in plants producing large-sized products. Its advantages over a one-sided line and the difficulties faced in two-sided line balancing problems were discussed. A mathematica...A two-sided assembly line is typically found in plants producing large-sized products. Its advantages over a one-sided line and the difficulties faced in two-sided line balancing problems were discussed. A mathematical model for two-ALB problem was suggested. A modification of the “ranked positional weight” method, namely two-ALB RPW for two-ALB problems was developed. Experiments were carried out to verify the performance of the proposed method and the results show that it is effective in solving two-sided assembly line balancing problems.展开更多
A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectivel...A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages.In this paper,we propose a nine-rectangle-grid information model according to the information value and privacy,and then present information use policies based on the rough set theory.Recurrent neural networks were employed to classify OTT messages.The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages,ending with a reliable trained classification model.Experimental results showed that the proposed method yielded an accurate classification performance and hence can be used for effective distribution and control of OTT messages.展开更多
The size and shape of the effective test area are crucial to consider when short-crested waves are created by segmented wavemakers. The range of the effective test area of short-crested waves simulated by two-sided se...The size and shape of the effective test area are crucial to consider when short-crested waves are created by segmented wavemakers. The range of the effective test area of short-crested waves simulated by two-sided segmented wavemakers is analyzed in this paper. The experimental investigation on the wave field distribution of short-crested waves generated by two-sided segmented wavemakers is conducted by using an array of wave gauges. Wave spectra and directional spreading function are analyzed and the results show that when the main direction is at a certain angle with the normal line of wave generators, the wave field of 3D short-crested waves generated by two-sided segmented wavemakers has good spatial uniformity within the model test area. The effective test area can provide good wave environments for seakeeping model tests of various ocean engineering structures in the deep ocean engineering basin.展开更多
In this paper, we consider the two-sided first exit problem for jump diffusion processes having jumps with rational Laplace transforms. We investigate the probabilistic property of conditional memorylessness, and driv...In this paper, we consider the two-sided first exit problem for jump diffusion processes having jumps with rational Laplace transforms. We investigate the probabilistic property of conditional memorylessness, and drive the joint distribution of the first exit time from an interval and the overshoot over the boundary at the exit time.展开更多
A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety i...A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety in work zones. Three different warning message systems, including sound, male voice and female voice, were designed to alert drivers. Twenty-four subjects were recruited for a total of ninety-six rounds driving simulator test in a work zone to investigate the impacts of smartphone-based warning messages on subjects’ driving performance, in terms of driving speed, speed variation, acceleration, and brake reaction distance. The outcome showed that, with the assistance of the sound and voice (either female or male) warning messages, drivers could effectively reduce their accelerations and speeds. Meanwhile, such a warning system can induce subjects to shorten their brake reaction distances for worker crossings. All participants found that this warning system is applicable to enhance their defensive driving behaviors while driving through a work zone.展开更多
The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity differ...The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly.展开更多
This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid me...This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical.展开更多
基金supported by the National Natural Science Foundation of China (Grant No.71861015)the Humanities and Social Science Foundation of the Ministry of Education of China (Grant No.18YJA630047)the Distinguished Young Scholar Talent of Jiangxi Province (Grant No.20192BCBL23008).
文摘In this paper,a stable two-sided matching(TSM)method considering the matching intention of agents under a hesitant fuzzy environment is proposed.The method uses a hesitant fuzzy element(HFE)as its basis.First,the HFE preference matrix is transformed into the normalized HFE preference matrix.On this basis,the distance and the projection of the normalized HFEs on positive and negative ideal solutions are calculated.Then,the normalized HFEs are transformed into agent satisfactions.Considering the stable matching constraints,a multiobjective programming model with the objective of maximizing the satisfactions of two-sided agents is constructed.Based on the agent satisfaction matrix,the matching intention matrix of two-sided agents is built.According to the agent satisfaction matrix and matching intention matrix,the comprehensive satisfaction matrix is set up.Furthermore,the multiobjective programming model based on satisfactions is transformed into a multiobjective programming model based on comprehensive satisfactions.Using the G-S algorithm,the multiobjective programming model based on comprehensive satisfactions is solved,and then the best TSM scheme is obtained.Finally,a terminal distribution example is used to verify the feasibility and effectiveness of the proposed method.
基金supported by the National Natural Science Foundation in China(Yue Qi,Project No.71861015).
文摘In previous research on two-sided matching(TSM)decision,agents’preferences were often given in the form of exact values of ordinal numbers and linguistic phrase term sets.Nowdays,the matching agent cannot perform the exact evaluation in the TSM situations due to the great fuzziness of human thought and the complexity of reality.Probability hesitant fuzzy sets,however,have grown in popularity due to their advantages in communicating complex information.Therefore,this paper develops a TSM decision-making approach with multi-attribute probability hesitant fuzzy sets and unknown attribute weight information.The agent attribute weight vector should be obtained by using the maximum deviation method and Hamming distance.The probabilistic hesitancy fuzzy information matrix of each agent is then arranged to determine the comprehensive evaluation of two matching agent sets.The agent satisfaction degree is calculated using the technique for order preference by similarity to ideal solution(TOPSIS).Additionally,the multi-object programming technique is used to establish a TSM method with the objective of maximizing the agent satisfaction of two-sided agents,and the matching schemes are then established by solving the built model.The study concludes by providing a real-world supply-demand scenario to illustrate the effectiveness of the proposed method.The proposed method is more flexible than prior research since it expresses evaluation information using probability hesitating fuzzy sets and can be used in scenarios when attribute weight information is unclear.
文摘IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have been developed every year.First,the research of motors in new and extreme fields have constantly brought amazing progress to achieve better performance through new technologies such as digitalization,etc.Meanwhile,the fast development of power electronics in recent decades has also changed the overall system to be more flexible,and widely extent our boundary of research area.What is more.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)the joint funds of National Natural Science Foundation of China and Civil Aviation Administration of China(No.U2133203).
文摘Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.
文摘Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhere to treatment to improve survival and quality of life. Methods: This multisite Cluster Randomized Trial (CRT) evaluated the effectiveness of mobile phone Short Message Service (SMS) support on the adherence to treatment schedules among adult cancer patients in Kenya. Data was collected using questionnaires. Ethical approvals were obtained from relevant Ethical Review Boards (ERBs). Results: The mean adherence was 83%. There was a significant difference between treatment arms in relation to the adherence. The intervention arm had a higher mean adherence difference, M = 3.913, 95% CI 2.632-5.193, t (402) = 6.006, p ≤ 0.001), with Cohen’s d = 0.60. Although not significant, (χ<sup>2</sup>dd = 0.151, df = 1, p = 2.064), more women were perfect adheres than males. Perfect adherers were satisfied with SMS support (χ<sup>2</sup>dd = 7.620, df = 1, p = 0.06), were in the intervention arm (χ<sup>2</sup>dd = 22.942, df = 1, p ≤ 0.001), and had trust in the care provider (χ<sup>2</sup>dd = 10.591 p ≤ 0.001). SMS support was not significant in the multivariate analysis but had an estimated effect size of 0.958 (z = 1.424, p = 0.154, CI = 0.242-3.781), indicating that mean adherence was slightly better in the presence of the intervention. Conclusions: SMS-support intervention has demonstrated superiority in influencing adherence. Further, health system-related factors have a significant influence on the adherence to chemotherapy treatment. Interventions to re-design health systems that are responsive to unmet care needs of cancer patients must be explored. .
基金funded by Guangxi Natural Science Foundation General Project—Research on Visual Positioning and Navigation Robot Based on Deep Learning,Project Number:2023GXNSFAA026025.
文摘As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’travel routes,and improve travel efficiency.However,in the IoV system,there are always malicious vehicle nodes publishing false information.Therefore,it is essential to ensure the legitimacy of the source.In addition,during the peak period of vehicle travel,the vehicle releases a large number of messages,and IoV authentication efficiency is prone to performance bottlenecks.Most existing authentication schemes have the problem of low authentication efficiency in the scenario.To address the above problems,this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic.Here,our scheme uses blockchain and elliptic curve cryptography(ECC)to design authentication algorithms for message authentication between vehicles and roadside units(RSU).Additionally,we introduce the idea of edge computing into the scheme,RSU will select themost suitable vehicle as the edge computing node for message authentication.In addition,we used the ProVerif tool for Internet security protocols and applications to test its security,ensuring that it is secure under different network attacks.In the simulation experiment,we compare our scheme with other existing works.Our scheme has a significant improvement in computational overhead,authentication efficiency and packet loss rate,and is suitable for traffic scenarios with large message volume.
基金supported by the National Key Laboratory of Wireless Communications Foundation,China (IFN20230204)。
文摘This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound.
文摘Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by applying the stylistic theory and employing the "Model of Analyzing Textual Function". The features of the two styles of messages are described and analyzed from the perspectives of their pronunciation, graphology, vocabulary, grammar, discourse, rhetoric, etc., and the stylistic features serve as the basis for discussing the translation principles and methods of English short messages.
基金Project (No. 50175018) supported by the National Natural ScienceFoundation of China
文摘Applications are limited at present because the currently available ultrasonic motors (USMs) do not provide suffi-ciently high torque and power. The conventional travelling-wave USM needs the bearing to support, which required lubricant. To solve the above problem, a bearingless travelling-wave USM is designed. First, a novel structure of the two-sided USM consisting of a two-sided teeth stator and two disk-type rotors is designed. And the excitation principle of the two-sided travelling-wave USM is analyzed. Then, using ANSYS software, we set up the model of the stator to predict the excitation frequency and modal response of the stator. The shape of the vibration mode was obtained. Last, the load characteristics of the USM are measured using ex-perimental method. The maximum stall torque and the no-load speed were obtained. The results showed that the characteristics of the two-sided USM are better than those of the conventional one-sided USM.
文摘In this study, forced nonlinear vibration of a circular micro-plate under two-sided electrostatic, two-sided Casimir and external harmonic forces is investigated analytically. For this purpose, at first, von Karman plate theory including geometrical nonlinearity is used to obtain the deflection of the micro-plate. Galerkin decomposition method is then employed, and nonlinear ordinary differential equations (ODEs) of motion are determined. A harmonic balance method (HBM) is applied to equations and analytical relation for nonlineaT frequency response (F-R) curves are derived for two categories (including and neglecting Casimir force) separately. The analytical results for three cases:(1) semi-linear vibration;(2) weakly nonlinear vibration;(3) highly non linear vibration, are validated by comparing with the numerical solutio ns. After validation, the effects of the voltage and Casimir force on the natural frequency of two-sided capacitor system are investigated. It is shown that by assuming Casimir force in small gap distances, reduction of the natural frequency is considerable. The influences of the applied voltage, damping, micro-plate thickness and Casimir force on the frequency response curves have been presented too. The results of this study can be useful for modeling circular parallel-plates in nano /microelectromechanical transducers such as microphones and pressure sensors.
基金Supported by National Natural Science Foundation of China(Grant Nos.51275366,50875190,51305311)Specialized Research Fund for the Doctoral Program of Higher Education of China(Grant No.20134219110002)
文摘Due to the NP-hardness of the two-sided assembly line balancing (TALB) problem, multiple constraints existing in real applications are less studied, especially when one task is involved with several constraints. In this paper, an effective hybrid algorithm is proposed to address the TALB problem with multiple constraints (TALB-MC). Considering the discrete attribute of TALB-MC and the continuous attribute of the standard teaching-learning-based optimization (TLBO) algorithm, the random-keys method is hired in task permutation representation, for the purpose of bridging the gap between them. Subsequently, a special mechanism for handling multiple constraints is developed. In the mechanism, the directions constraint of each task is ensured by the direction check and adjustment. The zoning constraints and the synchronism constraints are satisfied by teasing out the hidden correlations among constraints. The positional constraint is allowed to be violated to some extent in decoding and punished in cost fimction. Finally, with the TLBO seeking for the global optimum, the variable neighborhood search (VNS) is further hybridized to extend the local search space. The experimental results show that the proposed hybrid algorithm outperforms the late acceptance hill-climbing algorithm (LAHC) for TALB-MC in most cases, especially for large-size problems with multiple constraints, and demonstrates well balance between the exploration and the exploitation. This research proposes an effective and efficient algorithm for solving TALB-MC problem by hybridizing the TLBO and VNS.
基金Key Projectof Scientific and TechnologicalCommittee of Shanghai(No.0 3 11110 0 5 )
文摘A two-sided assembly line is typically found in plants producing large-sized products. Its advantages over a one-sided line and the difficulties faced in two-sided line balancing problems were discussed. A mathematical model for two-ALB problem was suggested. A modification of the “ranked positional weight” method, namely two-ALB RPW for two-ALB problems was developed. Experiments were carried out to verify the performance of the proposed method and the results show that it is effective in solving two-sided assembly line balancing problems.
基金This work is supported by the Research on Big Data in Application for Education of BUPT(No.2018Y0403)Fundamental Research Funds of BUPT(No.2018XKJC07,2018RC27)the National Natural Science Foundation of China(No.61571059).
文摘A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages.In this paper,we propose a nine-rectangle-grid information model according to the information value and privacy,and then present information use policies based on the rough set theory.Recurrent neural networks were employed to classify OTT messages.The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages,ending with a reliable trained classification model.Experimental results showed that the proposed method yielded an accurate classification performance and hence can be used for effective distribution and control of OTT messages.
基金financially supported by the National Natural Science Foundation of China(Grant No.51239007)
文摘The size and shape of the effective test area are crucial to consider when short-crested waves are created by segmented wavemakers. The range of the effective test area of short-crested waves simulated by two-sided segmented wavemakers is analyzed in this paper. The experimental investigation on the wave field distribution of short-crested waves generated by two-sided segmented wavemakers is conducted by using an array of wave gauges. Wave spectra and directional spreading function are analyzed and the results show that when the main direction is at a certain angle with the normal line of wave generators, the wave field of 3D short-crested waves generated by two-sided segmented wavemakers has good spatial uniformity within the model test area. The effective test area can provide good wave environments for seakeeping model tests of various ocean engineering structures in the deep ocean engineering basin.
文摘In this paper, we consider the two-sided first exit problem for jump diffusion processes having jumps with rational Laplace transforms. We investigate the probabilistic property of conditional memorylessness, and drive the joint distribution of the first exit time from an interval and the overshoot over the boundary at the exit time.
文摘A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety in work zones. Three different warning message systems, including sound, male voice and female voice, were designed to alert drivers. Twenty-four subjects were recruited for a total of ninety-six rounds driving simulator test in a work zone to investigate the impacts of smartphone-based warning messages on subjects’ driving performance, in terms of driving speed, speed variation, acceleration, and brake reaction distance. The outcome showed that, with the assistance of the sound and voice (either female or male) warning messages, drivers could effectively reduce their accelerations and speeds. Meanwhile, such a warning system can induce subjects to shorten their brake reaction distances for worker crossings. All participants found that this warning system is applicable to enhance their defensive driving behaviors while driving through a work zone.
基金Project supported by the Natural Science Foundation of Jiangsu Province, China (Grant No BK2001138).
文摘The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly.
基金supported by the National Natural Science Foundation of China (Grant Nos 60873191 and 60821001)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No 200800131016)+5 种基金Beijing Nova Program (Grant No2008B51)Key Project of the Chinese Ministry of Education (Grant No 109014)the Natural Science Foundation of Beijing (Grant No 4072020)the National Laboratory for Modern Communications Science Foundation of China (Grant No 9140C1101010601)the Natural Science Foundation of Education Bureau of Henan Province (Grant No 2008B120005)the Youth Foundation of Luoyang Normal University
文摘This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical.