Objective:The purpose of this study was to determine the effectiveness of brisk walking as an intervention for self-care agency and care dependency in patients with permanent colorectal cancer stoma.Method:This study ...Objective:The purpose of this study was to determine the effectiveness of brisk walking as an intervention for self-care agency and care dependency in patients with permanent colorectal cancer stoma.Method:This study adopted a quasi-experimental research design,specifically a non-equivalent control group pre-test and post-test design.Utilizing the Exercise of Self-Care Agency Scale(ESCA)and Care Dependency Scale(CDS),a survey was administered to 64 patients from a hospital in Shandong Province.The statistical methods used for analyzing data included frequency,mean,standard deviation(SD),independent t-test,P-value calculation,and dependent t-test.Result:After two months of a brisk walking exercise program,participants in the experimental group had a higher level of self-care agency than before the experiment(P<0.05),and their level of care dependency was significantly reduced(P<0.05).Participants in the control group also showed higher levels of self-care agency(P<0.05)and lower levels of care dependency(P<0.05)after two months compared to their levels before the two months.Conclusion:The brisk walking program had a positive impact on patients’self-care agency and reduced their care dependency.展开更多
Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more t...Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more than 40 million smart contracts are running,is frequently challenged by smart contract vulnerabilities.What’s worse,since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies,a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum.However,little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected.Thus,we first present the contract dependency graph(CDG)to perform a vulnerability analysis for Ethereum smart contracts,where CDG characterizes inter-contract dependencies formed by DELEGATECALL-type internal transaction in Ethereum.Then,three generic definitions of security violations against CDG are given for finding respective potential victim contracts affected by different types of vulnerable contracts.Further,we construct the CDG with 195,247 smart contracts active in the latest blocks of the Ethereum and verify the above security violations against CDG by detecting three representative known vulnerabilities.Compared to previous large-scale vulnerability analysis,our analysis scheme marks potential victim contracts that can be affected by different types of vulnerable contracts,and identify their possible risks based on the type of security violation actually occurring.The analysis results show that the proportion of potential victim contracts reaches 14.7%,far more than that of corresponding vulnerable contracts(less than 0.02%)in CDG.展开更多
Marxist political economy provides a perspective for grasping the root cause of the China-US trade war.The international relations of production,which stem from the international division of labor,shape the distributi...Marxist political economy provides a perspective for grasping the root cause of the China-US trade war.The international relations of production,which stem from the international division of labor,shape the distribution of international economic interests and the political status of countries.Traditionally,developing countries have been subjected to the“periphery”in the international division of labor.In the new global value chain,developing countries have remained in a subordinate position characterized by“technological-market”dependence.To achieve the goal of building a strong modern nation,China must escape the“technological-market”dependence.Yet China’s efforts and achievements in escaping dependent development are deemed as a threat to US vested interests in the international markets.To preserve the economic foundation of its hegemony,the US has resorted to a trade war to contain China’s development.展开更多
Degradation and overstress failures occur in many electronic systems in which the operation load and environmental conditions are complex.The dependency of them called dependent competing failure process(DCFP),has bee...Degradation and overstress failures occur in many electronic systems in which the operation load and environmental conditions are complex.The dependency of them called dependent competing failure process(DCFP),has been widely studied.Electronic system may experience mutual effects of degradation and shocks,they are considered to be interdependent.Both the degradation and the shock processes will decrease the limit of system and cause cumulative effect.Finally,the competition of hard and soft failure will cause the system failure.Based on the failure mechanism accumulation theory,this paper constructs the shock-degradation acceleration and the threshold descent model,and a system reliability model established by using these two models.The mutually DCFP effect of electronic system interaction has been decomposed into physical correlation of failure,including acceleration,accumulation and competition.As a case,a reliability of electronic system in aeronautical system has been analyzed with the proposed method.The method proposed is based on failure physical evaluation,and could provide important reference for quantitative evaluation and design improvement of the newly designed system in case of data deficiency.展开更多
This study aims to investigate the phenomenon of technological gadget usage among pre-university students,which include the time spent using them,as well as their purpose and influence.A descriptive research design was...This study aims to investigate the phenomenon of technological gadget usage among pre-university students,which include the time spent using them,as well as their purpose and influence.A descriptive research design was adopted in this study.131 pre-university students were randomly selected to answer a structured questionnaire.They were informed two weeks earlier to keep track on their time spent on technological devices,before answering the questionnaire.Findings showed that 99.2%of the respondents owned at least two technological gadgets,and all respondents own a smartphone.The main two gadgets that respondents spend at least 4 h a day on are smartphones(65.6%)and computers/laptops(21.4%).This indicates that smartphones are commonly used and owned among the respondents.The majority of the respondents are moderately nomophobia and moderately dependent on smartphones(70.2%and 66.4%,respectively).Correlation analysis demonstrates that the total time spent on gadgets in a day has a significant positive correlation with gadget dependency and total number of gadgets owned.Meanwhile,logistic regression was conducted to estimate the probability of nomophobia and dependency using total time spent and total number of technological gadgets.From thefindings,it was demonstrated that when the total time spent on using technological gadgets increasing,there is greater probability that the respondents develop nomophobia and dependency.This indicates that nomophobia and dependency to technological gadgets can be used to predict lifestyle profiles.The use of technological gadgets can bring both benefit and harm to its user.In light of this,user has to remain rational in order to derive maximum benefit from it.展开更多
Read-write dependency is an important factor restricting software efficiency.Timing Speculative(TS)is a processing architecture aiming to improve energy efficiency of microprocessors.Timing error rate,influenced by th...Read-write dependency is an important factor restricting software efficiency.Timing Speculative(TS)is a processing architecture aiming to improve energy efficiency of microprocessors.Timing error rate,influenced by the read-write dependency,bottlenecks the voltage down-scaling and so the energy efficiency of TS processors.We proposed a method called Read-Write Dependency Aware Register Allocation.It is based on the Read-Write Dependency aware Interference Graph(RWDIG)conception.Registers are reallocated to loosen the read-write dependencies,so resulting in a reduction of timing errors.The traditional no operation(Nop)padding method is also redesigned to increase the distance value to above 2.We analyzed the dependencies of registers and maximized the average distance value of read and write dependencies.Experimental results showed that we can reduce all read-write dependency by Nop padding,as well as the overhead timing errors.An energy saving of approximately 7%was achieved.展开更多
We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phas...We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phase transition behaviors and parameter thresholds of this model under random attacks are analyzed theoretically on both random regular(RR)networks and Erd¨os-Renyi(ER)networks,and computer simulations are performed to verify the results.In this EINDDL model,a fractionβof connectivity links within network B depends on network A and a fraction(1-β)of connectivity links within network A depends on network B.It is found that randomly removing a fraction(1-p)of connectivity links in network A at the initial state,network A exhibits different types of phase transitions(first order,second order and hybrid).Network B is rarely affected by cascading failure whenβis small,and network B will gradually converge from the first-order to the second-order phase transition asβincreases.We present the critical values ofβfor the phase change process of networks A and B,and give the critical values of p andβfor network B at the critical point of collapse.Furthermore,a cascading prevention strategy is proposed.The findings are of great significance for understanding the robustness of EINDDLs.展开更多
文摘Objective:The purpose of this study was to determine the effectiveness of brisk walking as an intervention for self-care agency and care dependency in patients with permanent colorectal cancer stoma.Method:This study adopted a quasi-experimental research design,specifically a non-equivalent control group pre-test and post-test design.Utilizing the Exercise of Self-Care Agency Scale(ESCA)and Care Dependency Scale(CDS),a survey was administered to 64 patients from a hospital in Shandong Province.The statistical methods used for analyzing data included frequency,mean,standard deviation(SD),independent t-test,P-value calculation,and dependent t-test.Result:After two months of a brisk walking exercise program,participants in the experimental group had a higher level of self-care agency than before the experiment(P<0.05),and their level of care dependency was significantly reduced(P<0.05).Participants in the control group also showed higher levels of self-care agency(P<0.05)and lower levels of care dependency(P<0.05)after two months compared to their levels before the two months.Conclusion:The brisk walking program had a positive impact on patients’self-care agency and reduced their care dependency.
基金supported by the Key R and D Programs of Zhejiang Province under Grant No.2022C01018the Natural Science Foundation of Zhejiang Province under Grant No.LQ20F020019.
文摘Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more than 40 million smart contracts are running,is frequently challenged by smart contract vulnerabilities.What’s worse,since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies,a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum.However,little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected.Thus,we first present the contract dependency graph(CDG)to perform a vulnerability analysis for Ethereum smart contracts,where CDG characterizes inter-contract dependencies formed by DELEGATECALL-type internal transaction in Ethereum.Then,three generic definitions of security violations against CDG are given for finding respective potential victim contracts affected by different types of vulnerable contracts.Further,we construct the CDG with 195,247 smart contracts active in the latest blocks of the Ethereum and verify the above security violations against CDG by detecting three representative known vulnerabilities.Compared to previous large-scale vulnerability analysis,our analysis scheme marks potential victim contracts that can be affected by different types of vulnerable contracts,and identify their possible risks based on the type of security violation actually occurring.The analysis results show that the proportion of potential victim contracts reaches 14.7%,far more than that of corresponding vulnerable contracts(less than 0.02%)in CDG.
基金This study is funded by Major Research Program on Philosophy and Social Sciences of Jiangsu Education Department(The Education of Marxism International View in Colleges and Universities for a New Era,No.2022SJZDSZ001)Green Research Program of Nanjing University of Aeronautics and Astronautics(China-US Science and Technology Competition from the Perspective of Marxism,No.1023-YAH21032).
文摘Marxist political economy provides a perspective for grasping the root cause of the China-US trade war.The international relations of production,which stem from the international division of labor,shape the distribution of international economic interests and the political status of countries.Traditionally,developing countries have been subjected to the“periphery”in the international division of labor.In the new global value chain,developing countries have remained in a subordinate position characterized by“technological-market”dependence.To achieve the goal of building a strong modern nation,China must escape the“technological-market”dependence.Yet China’s efforts and achievements in escaping dependent development are deemed as a threat to US vested interests in the international markets.To preserve the economic foundation of its hegemony,the US has resorted to a trade war to contain China’s development.
基金supported by the National Natural Science Foundation of China(61503014,62073009)。
文摘Degradation and overstress failures occur in many electronic systems in which the operation load and environmental conditions are complex.The dependency of them called dependent competing failure process(DCFP),has been widely studied.Electronic system may experience mutual effects of degradation and shocks,they are considered to be interdependent.Both the degradation and the shock processes will decrease the limit of system and cause cumulative effect.Finally,the competition of hard and soft failure will cause the system failure.Based on the failure mechanism accumulation theory,this paper constructs the shock-degradation acceleration and the threshold descent model,and a system reliability model established by using these two models.The mutually DCFP effect of electronic system interaction has been decomposed into physical correlation of failure,including acceleration,accumulation and competition.As a case,a reliability of electronic system in aeronautical system has been analyzed with the proposed method.The method proposed is based on failure physical evaluation,and could provide important reference for quantitative evaluation and design improvement of the newly designed system in case of data deficiency.
基金the Universiti Kebangsaan Malaysia,Geran Galakan Penyelidikan,GGP-2020-040.
文摘This study aims to investigate the phenomenon of technological gadget usage among pre-university students,which include the time spent using them,as well as their purpose and influence.A descriptive research design was adopted in this study.131 pre-university students were randomly selected to answer a structured questionnaire.They were informed two weeks earlier to keep track on their time spent on technological devices,before answering the questionnaire.Findings showed that 99.2%of the respondents owned at least two technological gadgets,and all respondents own a smartphone.The main two gadgets that respondents spend at least 4 h a day on are smartphones(65.6%)and computers/laptops(21.4%).This indicates that smartphones are commonly used and owned among the respondents.The majority of the respondents are moderately nomophobia and moderately dependent on smartphones(70.2%and 66.4%,respectively).Correlation analysis demonstrates that the total time spent on gadgets in a day has a significant positive correlation with gadget dependency and total number of gadgets owned.Meanwhile,logistic regression was conducted to estimate the probability of nomophobia and dependency using total time spent and total number of technological gadgets.From thefindings,it was demonstrated that when the total time spent on using technological gadgets increasing,there is greater probability that the respondents develop nomophobia and dependency.This indicates that nomophobia and dependency to technological gadgets can be used to predict lifestyle profiles.The use of technological gadgets can bring both benefit and harm to its user.In light of this,user has to remain rational in order to derive maximum benefit from it.
基金This work was supported by the Project of Hunan Social Science Achievement Evaluation Committee(XSP20YBZ090,Sheng Xiao,2020).
文摘Read-write dependency is an important factor restricting software efficiency.Timing Speculative(TS)is a processing architecture aiming to improve energy efficiency of microprocessors.Timing error rate,influenced by the read-write dependency,bottlenecks the voltage down-scaling and so the energy efficiency of TS processors.We proposed a method called Read-Write Dependency Aware Register Allocation.It is based on the Read-Write Dependency aware Interference Graph(RWDIG)conception.Registers are reallocated to loosen the read-write dependencies,so resulting in a reduction of timing errors.The traditional no operation(Nop)padding method is also redesigned to increase the distance value to above 2.We analyzed the dependencies of registers and maximized the average distance value of read and write dependencies.Experimental results showed that we can reduce all read-write dependency by Nop padding,as well as the overhead timing errors.An energy saving of approximately 7%was achieved.
基金the National Natural Science Foundation of China(Grant Nos.61973118,51741902,11761033,12075088,and 11835003)Project in JiangXi Province Department of Science and Technology(Grant Nos.20212BBE51010 and 20182BCB22009)the Natural Science Foundation of Zhejiang Province(Grant No.Y22F035316)。
文摘We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phase transition behaviors and parameter thresholds of this model under random attacks are analyzed theoretically on both random regular(RR)networks and Erd¨os-Renyi(ER)networks,and computer simulations are performed to verify the results.In this EINDDL model,a fractionβof connectivity links within network B depends on network A and a fraction(1-β)of connectivity links within network A depends on network B.It is found that randomly removing a fraction(1-p)of connectivity links in network A at the initial state,network A exhibits different types of phase transitions(first order,second order and hybrid).Network B is rarely affected by cascading failure whenβis small,and network B will gradually converge from the first-order to the second-order phase transition asβincreases.We present the critical values ofβfor the phase change process of networks A and B,and give the critical values of p andβfor network B at the critical point of collapse.Furthermore,a cascading prevention strategy is proposed.The findings are of great significance for understanding the robustness of EINDDLs.