Foam drilling is increasingly used to develop low pressure reservoirs or highly depleted mature reservoirs because of minimizing the formation damage and potential hazardous drilling problems. Prediction of the cuttin...Foam drilling is increasingly used to develop low pressure reservoirs or highly depleted mature reservoirs because of minimizing the formation damage and potential hazardous drilling problems. Prediction of the cuttings concentration in the wellbore annulus as a function of operational drilling parameters such as wellbore geometry, pumping rate, drilling fluid rheology and density and maximum drilling rate is very important for optimizing these parameters. This paper describes a simple and more reliable artificial neural network (ANN) method and multiple linear regression (MLR) to predict cuttings concentration during foam drilling operation. This model is applicable for various borehole conditions using some critical parameters associated with foam velocity, foam quality, hole geometry, subsurface condition (pressure and temperature) and pipe rotation. The average absolute percent relative error (AAPE) between the experimental cuttings concentration and ANN model is less than 6%, and using MLR, AAPE is less than 9%. A comparison of the ANN and mechanistic model was done. The AAPE values for all datasets in this study were 3.2%, 8.5% and 10.3% for ANN model, MLR model and mechanistic model respectively. The results show high ability of ANN in prediction with respect to statistical methods.展开更多
AIM:To compare the outcomes of four adjuvants used for internal limiting membrane(ILM)peeling in macular hole surgery,including indocyanine green(ICG),brilliant blue G(BBG),triamcinolone(TA)and trypan blue(TB),through...AIM:To compare the outcomes of four adjuvants used for internal limiting membrane(ILM)peeling in macular hole surgery,including indocyanine green(ICG),brilliant blue G(BBG),triamcinolone(TA)and trypan blue(TB),through systematic review and random-effects Bayesian network Meta-analysis.METHODS:PubMed,Cochrane library databases and Web of Science were searched until August 2018 for clinical trials comparing the above four adjuvants.ORs for postoperative best corrected visual acuity(BCVA)improvement and primary macular hole closure rates were compared between the different adjuvants.RESULTS:Twenty-seven eligible articles were included.For postoperative BCVA improvement,results of BBGassisted peeling were significantly more favorable than those of ICG(WMD 0.08,95%credible interval 0.01-0.16)and TA ranked highest.No significant differences were found between any other two groups in postoperative BCVA improvement.For postoperative primary macular hole closure rates,BBG ranked highest.However,no significant differences were shown between any two groups.CONCLUSION:TA and BBG are the optimum adjuvants for achieving postoperative BCVA improvement macular hole surgery with adjuvant-assisted ILM peeling.Among all adjuvants,the use of BBG is associated with the highest postoperative macular hole closure rate.展开更多
The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can dis...The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can disrupt the services of this layer. This paper takes a look at some important detection and mitigation techniques and presents the drawbacks. After analysis of current mechanisms, the paper proposes RID-AODV, a security solution for multiple black-hole attack in wireless mesh networks. Based on the backbone of AODV, RID-AODV combines the ability of route skipping of IDSAODV and route failure correction using reverse route establishment of RAODV. The enhanced protocol RID-AODV, AODV, IDSAODV, and RAODV are implemented in a simulated environment using ns-2.35 simulator. The networks for each protocol are bombarded with up to ten black-hole nodes starting from zero. The results obtained are then analyzed and compared and a discussion is presented.展开更多
Based on patent cooperation data,this study used a range of city network analysis approaches in order to explore the structure of the Chinese city network which is driven by technological knowledge flows.The results r...Based on patent cooperation data,this study used a range of city network analysis approaches in order to explore the structure of the Chinese city network which is driven by technological knowledge flows.The results revealed the spatial structure,composition structure,hierarchical structure,group structure,and control structure of Chinese city network,as well as its dynamic factors.The major findings are:1) the spatial pattern presents a diamond structure,in which Wuhan is the central city;2) although the invention patent knowledge network is the main part of the broader inter-city innovative cooperation network,it is weaker than the utility model patent;3) as the senior level cities,Beijing,Shanghai and the cities in the Zhujiang(Pearl) River Delta Region show a strong capability of both spreading and controlling technological knowledge;4) whilst a national technology alliance has preliminarily formed,regional alliances have not been adequately established;5) even though the cooperation level amongst weak connection cities is not high,such cities still play an important role in the network as a result of their location within ′structural holes′ in the network;and 6) the major driving forces facilitating inter-city technological cooperation are geographical proximity,hierarchical proximity and technological proximity.展开更多
There are two opposing viewpoints on which kind of network configuration provides a more competitive advantage, namely,network closure or structural holes, with the latter occupying the dominant position in the litera...There are two opposing viewpoints on which kind of network configuration provides a more competitive advantage, namely,network closure or structural holes, with the latter occupying the dominant position in the literature. Using social network analysis and negative binomial regression methods, we graph the co-patent network of Dongying's petroleum equipment industry in China and explore its impact on enterprise innovation. The analysis is based on 17 face-to-face interviews, 31 enterprise questionnaires, and 354 co-patent records from the China State Intellectual Property Office identifying cooperative innovation for the years 1988–2013. We find that this network is closed, controlled by state-owned enterprises, and its closure has positive effects on enterprise innovation performance. This may be related to China's unique industrial development history, state system and policies, regional culture and circumstances, and enterprise characteristics. Therefore, for some industries in specific regions, the advantages usually attributed to structural holes and open innovation may not necessarily apply.展开更多
This work proposes a geographic routing protocol for UWSNs based on the construction of a 3D virtual grid structure, called Void-Avoidance Grid-based Multipath Position-based Routing (VA-GMPR). It consists of two main...This work proposes a geographic routing protocol for UWSNs based on the construction of a 3D virtual grid structure, called Void-Avoidance Grid-based Multipath Position-based Routing (VA-GMPR). It consists of two main components, the multipath routing scheme and the grid-based void avoidance (GVA) mechanism for handling routing holes. The multipath routing scheme adopts node-disjoint routes from the source to the sink in order to enhance network reliability and load balancing. While the GVA mechanism handles the problem of holes in 3D virtual grid structure based on three techniques: Hole bypass, path diversion, and path backtracking. The performance evaluation of the VA-GMPR protocol was compared to a recently proposed grid-based routing protocol for UWSNs, called Energy-efficient Multipath Geographic Grid-based Routing (EMGGR). The results showed that the VA-GMPR protocol outperformed the EMGGR protocol in terms of packet delivery ratio, and end-to end-delay. However, the results also showed that the VA-GMPR protocol exhibited higher energy consumption compared to EMGGR.展开更多
Problem: A common assumption is that students prefer to select their friends for group-work. The prime goal of this study was to understand the impact of two group selection methods on how students from diverse cultur...Problem: A common assumption is that students prefer to select their friends for group-work. The prime goal of this study was to understand the impact of two group selection methods on how students from diverse cultural backgrounds build learning and work relations. Method: Social Network Analysis in a pre-post test manner in a quasi-experimental design of 81 vs. 70 third-year students. Solution: In this study, we “disrupted” this group selection process after Day 1 by balancing students from different parts of the social network together. In one condition the students were “balanced” into groups by staff to encourage structural hole formation, and in the other condition students were allowed to self-select their group members to encourage network closure. Results: Students in the self-selected condition primarily selected their friends from a similar cultural background. In both conditions the learning networks after 11 weeks were primarily predicted by the group allocation and initial friendships. However, students in the balanced condition developed more cross-cultural learning links. These results indicate that teachers can actively intervene in the cross-cultural dynamics in- and outside the classroom.展开更多
针对高动态无人机自组网中节点之间链路生存时间(Link Live Time,LLT)短和节点遭遇路由空洞次数多的问题,提出了一种基于空洞节点检测的可靠无人机自组网路由协议——GPSR-HND(Greedy Perimeter Stateless Routing Based on Hollow Node...针对高动态无人机自组网中节点之间链路生存时间(Link Live Time,LLT)短和节点遭遇路由空洞次数多的问题,提出了一种基于空洞节点检测的可靠无人机自组网路由协议——GPSR-HND(Greedy Perimeter Stateless Routing Based on Hollow Node Detection)。GPSR-HND协议中,转发节点通过空洞节点检测机制检测邻居节点状态,将有效邻居节点加入待选邻居节点集;然后基于层次分析法(Analytic Hierarchy Process,AHP)的多度量下一跳节点选择机制从待选邻居节点集中选择权重最大的邻居节点贪婪转发数据;如果待选邻居节点集为空,则从空洞邻居节点集中选择权重最大的空洞节点启动改进的周边转发机制,寻找可恢复贪婪转发模式的节点。与GPSR-NS协议和GPSR协议相比,GPSR-HND协议表现出了更好的性能,包括平均端到端时延和丢包率的改善,以及吞吐量的提高。展开更多
The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptograp...The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptography techniques can ensure confidentiality, integrity and authentication. However, wireless sensor network also needs to deal with inside and outside attackers. To deal with outside attackers, attacks by compromised or malicious nodes, trust management system is suggested by many researchers in the area of wireless sensor network. Trust management system can be implemented in various applications for security management such as secure data aggregation, secure cluster head selection, trusted routing, access control, etc. Many researchers provide different kind of solutions for these secure applications based on trust management. However, to incorporate, all such applications on a single sensor node in the network, it is essential to design and develop a trust management system, which considers various aspects and applications of wireless sensor network. As a result, in this paper, we would like to propose a parameter and trust factor based secure communication framework and design a trust management system for wireless sensor networks. Our main contribution is to identify various parameters and trust factors which influences on trust in wireless sensor network and developing a framework for a trust management system based on various parameters and trust factors. The working of the proposed model is shown by simulation experiments conducted in MATLAB for the application of secure communication, data aggregation and intrusion detection in wireless sensor networks.展开更多
Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smar...Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.展开更多
文摘Foam drilling is increasingly used to develop low pressure reservoirs or highly depleted mature reservoirs because of minimizing the formation damage and potential hazardous drilling problems. Prediction of the cuttings concentration in the wellbore annulus as a function of operational drilling parameters such as wellbore geometry, pumping rate, drilling fluid rheology and density and maximum drilling rate is very important for optimizing these parameters. This paper describes a simple and more reliable artificial neural network (ANN) method and multiple linear regression (MLR) to predict cuttings concentration during foam drilling operation. This model is applicable for various borehole conditions using some critical parameters associated with foam velocity, foam quality, hole geometry, subsurface condition (pressure and temperature) and pipe rotation. The average absolute percent relative error (AAPE) between the experimental cuttings concentration and ANN model is less than 6%, and using MLR, AAPE is less than 9%. A comparison of the ANN and mechanistic model was done. The AAPE values for all datasets in this study were 3.2%, 8.5% and 10.3% for ANN model, MLR model and mechanistic model respectively. The results show high ability of ANN in prediction with respect to statistical methods.
文摘AIM:To compare the outcomes of four adjuvants used for internal limiting membrane(ILM)peeling in macular hole surgery,including indocyanine green(ICG),brilliant blue G(BBG),triamcinolone(TA)and trypan blue(TB),through systematic review and random-effects Bayesian network Meta-analysis.METHODS:PubMed,Cochrane library databases and Web of Science were searched until August 2018 for clinical trials comparing the above four adjuvants.ORs for postoperative best corrected visual acuity(BCVA)improvement and primary macular hole closure rates were compared between the different adjuvants.RESULTS:Twenty-seven eligible articles were included.For postoperative BCVA improvement,results of BBGassisted peeling were significantly more favorable than those of ICG(WMD 0.08,95%credible interval 0.01-0.16)and TA ranked highest.No significant differences were found between any other two groups in postoperative BCVA improvement.For postoperative primary macular hole closure rates,BBG ranked highest.However,no significant differences were shown between any two groups.CONCLUSION:TA and BBG are the optimum adjuvants for achieving postoperative BCVA improvement macular hole surgery with adjuvant-assisted ILM peeling.Among all adjuvants,the use of BBG is associated with the highest postoperative macular hole closure rate.
文摘The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can disrupt the services of this layer. This paper takes a look at some important detection and mitigation techniques and presents the drawbacks. After analysis of current mechanisms, the paper proposes RID-AODV, a security solution for multiple black-hole attack in wireless mesh networks. Based on the backbone of AODV, RID-AODV combines the ability of route skipping of IDSAODV and route failure correction using reverse route establishment of RAODV. The enhanced protocol RID-AODV, AODV, IDSAODV, and RAODV are implemented in a simulated environment using ns-2.35 simulator. The networks for each protocol are bombarded with up to ten black-hole nodes starting from zero. The results obtained are then analyzed and compared and a discussion is presented.
基金Under the auspices of Major Project of National Social Science Foundation of China(No.13&ZD027)National Natural Science Foundation of China(No.41201128,71433008)
文摘Based on patent cooperation data,this study used a range of city network analysis approaches in order to explore the structure of the Chinese city network which is driven by technological knowledge flows.The results revealed the spatial structure,composition structure,hierarchical structure,group structure,and control structure of Chinese city network,as well as its dynamic factors.The major findings are:1) the spatial pattern presents a diamond structure,in which Wuhan is the central city;2) although the invention patent knowledge network is the main part of the broader inter-city innovative cooperation network,it is weaker than the utility model patent;3) as the senior level cities,Beijing,Shanghai and the cities in the Zhujiang(Pearl) River Delta Region show a strong capability of both spreading and controlling technological knowledge;4) whilst a national technology alliance has preliminarily formed,regional alliances have not been adequately established;5) even though the cooperation level amongst weak connection cities is not high,such cities still play an important role in the network as a result of their location within ′structural holes′ in the network;and 6) the major driving forces facilitating inter-city technological cooperation are geographical proximity,hierarchical proximity and technological proximity.
基金Under the auspices of National Natural Science Foundation of China(No.41771143)Philosophy and Social Sciences Planning Project of Shanghai(No.2018EJL002)
文摘There are two opposing viewpoints on which kind of network configuration provides a more competitive advantage, namely,network closure or structural holes, with the latter occupying the dominant position in the literature. Using social network analysis and negative binomial regression methods, we graph the co-patent network of Dongying's petroleum equipment industry in China and explore its impact on enterprise innovation. The analysis is based on 17 face-to-face interviews, 31 enterprise questionnaires, and 354 co-patent records from the China State Intellectual Property Office identifying cooperative innovation for the years 1988–2013. We find that this network is closed, controlled by state-owned enterprises, and its closure has positive effects on enterprise innovation performance. This may be related to China's unique industrial development history, state system and policies, regional culture and circumstances, and enterprise characteristics. Therefore, for some industries in specific regions, the advantages usually attributed to structural holes and open innovation may not necessarily apply.
文摘This work proposes a geographic routing protocol for UWSNs based on the construction of a 3D virtual grid structure, called Void-Avoidance Grid-based Multipath Position-based Routing (VA-GMPR). It consists of two main components, the multipath routing scheme and the grid-based void avoidance (GVA) mechanism for handling routing holes. The multipath routing scheme adopts node-disjoint routes from the source to the sink in order to enhance network reliability and load balancing. While the GVA mechanism handles the problem of holes in 3D virtual grid structure based on three techniques: Hole bypass, path diversion, and path backtracking. The performance evaluation of the VA-GMPR protocol was compared to a recently proposed grid-based routing protocol for UWSNs, called Energy-efficient Multipath Geographic Grid-based Routing (EMGGR). The results showed that the VA-GMPR protocol outperformed the EMGGR protocol in terms of packet delivery ratio, and end-to end-delay. However, the results also showed that the VA-GMPR protocol exhibited higher energy consumption compared to EMGGR.
文摘Problem: A common assumption is that students prefer to select their friends for group-work. The prime goal of this study was to understand the impact of two group selection methods on how students from diverse cultural backgrounds build learning and work relations. Method: Social Network Analysis in a pre-post test manner in a quasi-experimental design of 81 vs. 70 third-year students. Solution: In this study, we “disrupted” this group selection process after Day 1 by balancing students from different parts of the social network together. In one condition the students were “balanced” into groups by staff to encourage structural hole formation, and in the other condition students were allowed to self-select their group members to encourage network closure. Results: Students in the self-selected condition primarily selected their friends from a similar cultural background. In both conditions the learning networks after 11 weeks were primarily predicted by the group allocation and initial friendships. However, students in the balanced condition developed more cross-cultural learning links. These results indicate that teachers can actively intervene in the cross-cultural dynamics in- and outside the classroom.
文摘针对高动态无人机自组网中节点之间链路生存时间(Link Live Time,LLT)短和节点遭遇路由空洞次数多的问题,提出了一种基于空洞节点检测的可靠无人机自组网路由协议——GPSR-HND(Greedy Perimeter Stateless Routing Based on Hollow Node Detection)。GPSR-HND协议中,转发节点通过空洞节点检测机制检测邻居节点状态,将有效邻居节点加入待选邻居节点集;然后基于层次分析法(Analytic Hierarchy Process,AHP)的多度量下一跳节点选择机制从待选邻居节点集中选择权重最大的邻居节点贪婪转发数据;如果待选邻居节点集为空,则从空洞邻居节点集中选择权重最大的空洞节点启动改进的周边转发机制,寻找可恢复贪婪转发模式的节点。与GPSR-NS协议和GPSR协议相比,GPSR-HND协议表现出了更好的性能,包括平均端到端时延和丢包率的改善,以及吞吐量的提高。
文摘The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptography techniques can ensure confidentiality, integrity and authentication. However, wireless sensor network also needs to deal with inside and outside attackers. To deal with outside attackers, attacks by compromised or malicious nodes, trust management system is suggested by many researchers in the area of wireless sensor network. Trust management system can be implemented in various applications for security management such as secure data aggregation, secure cluster head selection, trusted routing, access control, etc. Many researchers provide different kind of solutions for these secure applications based on trust management. However, to incorporate, all such applications on a single sensor node in the network, it is essential to design and develop a trust management system, which considers various aspects and applications of wireless sensor network. As a result, in this paper, we would like to propose a parameter and trust factor based secure communication framework and design a trust management system for wireless sensor networks. Our main contribution is to identify various parameters and trust factors which influences on trust in wireless sensor network and developing a framework for a trust management system based on various parameters and trust factors. The working of the proposed model is shown by simulation experiments conducted in MATLAB for the application of secure communication, data aggregation and intrusion detection in wireless sensor networks.
文摘Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.