Wireless Sensor Networks(WSNs)are a major element of Internet of Things(IoT)networks which offer seamless sensing and wireless connectivity.Disaster management in smart cities can be considered as a safety critical ap...Wireless Sensor Networks(WSNs)are a major element of Internet of Things(IoT)networks which offer seamless sensing and wireless connectivity.Disaster management in smart cities can be considered as a safety critical application.Therefore,it becomes essential in ensuring network accessibility by improving the lifetime of IoT assisted WSN.Clustering and multihop routing are considered beneficial solutions to accomplish energy efficiency in IoT networks.This article designs an IoT enabled energy aware metaheuristic clustering with routing protocol for real time disaster management(EAMCR-RTDM).The proposed EAMCR-RTDM technique mainly intends to manage the energy utilization of nodes with the consideration of the features of the disaster region.To achieve this,EAMCR-RTDM technique primarily designs a yellow saddle goatfish based clustering(YSGF-C)technique to elect cluster heads(CHs)and organize clusters.In addition,enhanced cockroach swarm optimization(ECSO)based multihop routing(ECSO-MHR)approach was derived for optimal route selection.The YSGF-C and ECSO-MHR techniques compute fitness functions using different input variables for achieving improved energy efficiency and network lifetime.The design of YSGF-C and ECSO-MHR techniques for disaster management in IoT networks shows the novelty of the work.For examining the improved outcomes of the EAMCR-RTDM system,a wide range of simulations were performed and the extensive results are assessed in terms of different measures.The comparative outcomes highlighted the enhanced outcomes of the EAMCRRTDM algorithm over the existing approaches.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac...In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates.展开更多
Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violat...Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violated w ay is one of most important issues to take into account. In this paper, a novel and efficient authorization and authentication Digital Rights Management (DRM) s chema is proposed firstly for secure multimedia delivery, then based on the sche ma, a real-time digital signature algorithm built on Elliptic Curve Cryptograph y (ECC) is adopted for fast authentication and verification of licensing managem ent, thus secure multimedia delivery via TCP/RTP can efficiently work with real -time transaction response and high Quality of Service (QoS) . Performance eval uations manifest the proposed schema is secure, available for real-time media s tream authentication and authorization without much effected of QoS. The propose d schema is not only available for Client/Server media service but can be easily extended to P2P and broadcasting network for trusted rights management.展开更多
Real-Time Pricing (RTP) is proposed as an effective Demand-Side Management (DSM) to adjust the load curve in order to achieve the peak load shifting. At the same time, the RTP mechanism can also raise the revenue of t...Real-Time Pricing (RTP) is proposed as an effective Demand-Side Management (DSM) to adjust the load curve in order to achieve the peak load shifting. At the same time, the RTP mechanism can also raise the revenue of the supply-side and reduce the electricity expenses of consumers to achieve a win-win situation. In this paper, a real-time pricing algorithm based on price elasticity theory is proposed to analyze the energy consumption and the response of the consumers in smart grid structure. We consider a smart grid equipped with smart meters and two-way communication system. By using real data to simulate the proposed model, some characteristics of RTP are summarized as follows: 1) Under the condition of the real data, the adjustment of load curve and reducing the expenses of consumers is obviously. But the profit of power supplier is difficult to ensure. If we balance the profits of both sides, the supplier and consumers, the profits of both sides and the adjustment of load curve will be relatively limited. 2) If assuming the response degree of consumers to real-time prices is high enough, the RTP mechanism can achieve the expected effect. 3, If the cost of supply-side (day-ahead price) fluctuates dramatically, the profits of both sides can be ensured to achieve the expected effect.展开更多
The coordination problem of a supply chain comprising one supplier and one retailer under market demand disruption is studied in this article. A novel exponential demand function is adopted, and the penalty cost is in...The coordination problem of a supply chain comprising one supplier and one retailer under market demand disruption is studied in this article. A novel exponential demand function is adopted, and the penalty cost is introduced explicitly to capture the deviation production cost caused by the market demand disruption. The optimal strategies are obtained for different disruption scale under the centralized mode. For the decentralized mode, it is proved that the supply chain can be fully coordinated by adjusting the price discount policy appropriately when disruption occurs. Furthermore, the authors point out that similar results can be established for more general demand functions that represent different market circumstances if certain assumptions are satisfied.展开更多
Although computer architectures incorporate fast processing hardware resources, high performance real-time implementation of a complex control algorithm requires an efficient design and software coding of the algorith...Although computer architectures incorporate fast processing hardware resources, high performance real-time implementation of a complex control algorithm requires an efficient design and software coding of the algorithm so as to exploit special features of the hardware and avoid associated architecture shortcomings. This paper presents an investigation into the analysis and design mechanisms that will lead to reduction in the execution time in implementing real-time control algorithms. The proposed mechanisms are exemplified by means of one algorithm, which demonstrates their applicability to real-time applications. An active vibration control (AVC) algorithm for a flexible beam system simulated using the finite difference (FD) method is considered to demonstrate the effectiveness of the proposed methods. A comparative performance evaluation of the proposed design mechanisms is presented and discussed through a set of experiments.展开更多
The methodology of visual simulation for a tunnel engineering construction schedule is presented. Visualization of simulation model, calculation and result of construction schedule simulation is realized, and the cons...The methodology of visual simulation for a tunnel engineering construction schedule is presented. Visualization of simulation model, calculation and result of construction schedule simulation is realized, and the construction simulation and the resource optimization of tunnel engineering are made. A risk analysis and a decision-making method of tunnel engineering construction schedule based on visual simulation are presented. Furthermore, using S curve theory and schedule management method, the real-time management and control method of tunnel engineering construction based on visual simulation is presented. The application to the tunnel engineering construction schedule analysis and management shows the feasibility and effectiveness of the method presented in this paper.展开更多
The energy consumption of the information and communication technology sector has become a significant portion of the total global energy consumption, warranting research efforts to attempt to reduce it. The pre-requi...The energy consumption of the information and communication technology sector has become a significant portion of the total global energy consumption, warranting research efforts to attempt to reduce it. The pre-requisite for effectual energy management is the availability of the current power consumption values from network devices. Previous works have attempted to estimate and model the consumption values or have measured it using intrusive approaches such as using an in-line power meter. Recent trends suggest that information models are being increasingly used in all aspects of network management. This paper presents a framework developed for enabling the collection of real-time power consumption information from the next generation of networking hardware non-intrusively by employing information models. The experiment results indicate that it is feasible to gather power consumption data using standardized IETF information models, or non-standard customized information models, or through abstracting and exposing the information in a uniform format when no support for the required information models exists. Functional validation of the proposed framework is performed and the results from this research could be leveraged to make energy-efficient network management decisions.展开更多
The high penetration of distributed energy resources (DERs) will significantly challenge the power system operation and control due to their stochastic, intermittent, and fluctuation characteristics. This enhances the...The high penetration of distributed energy resources (DERs) will significantly challenge the power system operation and control due to their stochastic, intermittent, and fluctuation characteristics. This enhances the difficulty of congestion management of power systems in cross-border electricity market among different regions. For handling this, the Real-Time Market is proposed for balancing capacity trading against congestions. Several strategies for Real-Time Market dealing with congestions are proposed. The strategy of two-stage crossborder markets in Day-ahead, Intra-day and Real Time Market are introduced with the congestion constraints complied. Pre-Contingency strategy is proposed as the advance preparation for the future congestion, and In-Day redispatch is used for regulation. Accordingly, the requirements on facilities considering telemetry and remote control in a fast manner are discussed at last.展开更多
By combining fault-tolerance with power management, this paper developed a new method for aperiodic task set for the problem of task scheduling and voltage allocation in embedded real-time systems. The scbedulability ...By combining fault-tolerance with power management, this paper developed a new method for aperiodic task set for the problem of task scheduling and voltage allocation in embedded real-time systems. The scbedulability of the system was analyzed through checkpointing and the energy saving was considered via dynamic voltage and frequency scaling. Simulation results showed that the proposed algorithm had better performance compared with the existing voltage allocation techniques. The proposed technique saves 51.5% energy over FT-Only and 19.9% over FT + EC on average. Therefore, the proposed method was more appropriate for aperiodic tasks in embedded real-time systems.展开更多
Poor nitrogen use efficiency in rice production is a critical issue in China. Site-specific N managements (SSNM) such as real-time N management (RTNM) and fixed-time adjustable-dose N management (FTNM) improve f...Poor nitrogen use efficiency in rice production is a critical issue in China. Site-specific N managements (SSNM) such as real-time N management (RTNM) and fixed-time adjustable-dose N management (FTNM) improve fertilizer-N use efficiency of irrigated rice. This study was aimed to compare the different nitrogen (N) rates and application methods (FFP, SSNM, and RTNM methods) under with- and without-fungicide application conditions on grain yield, yield components, solar radiation use efficiency (RUE), agronomic-nitrogen use efficiency (AEN), and sheath blight disease intensity. Field experiments were carried out at Liuyang County, Hunan Province, China, during 2006 and 2007. A super hybrid rice Liangyou 293 (LY293) was used as experimental material. The results showed that RTNM and SSNM have great potential for improving agronomic-nitrogen use efficiency without sacrificing the grain yield. There were significant differences in light interception rate, sheath blight disease incidence (DI) and the disease index (ShBI), and total dry matter among the different nitrogen management methods. The radiation use efficiency was increased in a certain level of applied N. But, the harvest index (HI) decreased with the increase in applied N. There is a quadratic curve relationship between grain yield and applied N rates. With the same N fertilizer rate, different fertilizer-N application methods affected the RUE and grain yield. The fungicide application not only improved the canopy light interception rate, RUE, grain filling, and harvest index, but also reduced the degree of sheath blight disease. The treatment of RTNM under the SPAD threshold value 40 obtained the highest yield. While the treatment of SSNM led to the highest nitrogen agronomic efficiency and higher rice yield, and decreased the infestation of sheath blight disease dramatically as well. Nitrogen application regimes and diseases control in rice caused obvious effects on light interception rate, RUE, and HI. Optimal N rate is helpful to get higher light interception rate, RUE, and HI. Disease control with fungicide application decreased and delayed the negative effects of the high N on rice yield formation. SSNM and RTNM under the proper SPAD threshold value obtained high-yield with high efficiency and could alleviate environmental pollution in rice production.展开更多
An integrated intelligent management is presented to help organizations manage many heterogeneous resources in their information system. A general architecture of management for information system reliability is propo...An integrated intelligent management is presented to help organizations manage many heterogeneous resources in their information system. A general architecture of management for information system reliability is proposed, and the architecture from two aspects, process model and hierarchical model, described. Data mining techniques are used in data analysis. A data analysis system applicable to real-time data analysis is developed by improved data mining on the critical processes. The framework of the integrated management for information system reliability based on real-time data mining is illustrated, and the development of integrated and intelligent management of information system discussed.展开更多
Efficient radio resource management is essential in Quality-of-Service (QoS) provisioning for wireless communication networks. In this paper, we propose a novel priority-based packet scheduling algorithm for downlink ...Efficient radio resource management is essential in Quality-of-Service (QoS) provisioning for wireless communication networks. In this paper, we propose a novel priority-based packet scheduling algorithm for downlink OFDMA systems. The proposed algorithm is designed to support heterogeneous applications consisting of both real-time (RT) and non-real-time (NRT) traffics with the objective to increase the spectrum efficiency while satisfying diverse QoS requirements. It tightly couples the subchannel allocation and packet scheduling together through an integrated cross-layer approach in which each packet is assigned a priority value based on both the instantaneous channel conditions as well as the QoS constraints. An efficient suboptimal heuristic algorithm is proposed to reduce the computational complexity with marginal performance degradation compared to the optimal solution. Simulation results show that the proposed algorithm can significantly improve the system performance in terms of high spectral efficiency and low outage probability compared to conventional packet scheduling algorithms, thus is very suitable for the downlink of current OFDMA systems.展开更多
China Meteorological Administration (CMA) has a long history of using High Performance Computing System (HPCS) for over three decades. CMA HPCS investment provides reliable HPC capabilities essential to run Numerical ...China Meteorological Administration (CMA) has a long history of using High Performance Computing System (HPCS) for over three decades. CMA HPCS investment provides reliable HPC capabilities essential to run Numerical Weather Prediction (NWP) models and climate models, generating millions of weather guidance products daily and providing support for Coupled Model Inter-comparison Project Phase 5 (CMIP5). Monitoring the HPCS and analyzing the resource usage can improve the performance and reliability for our users, which require a good understanding of failure characteristics. Large-scale studies of failures in real production systems are scarce. This paper collects, analyzes and studies all the failures occurring during the HPC operation period, especially focusing on studying the relationship between HPCS and NWP applications. Also, we present the challenges for a more effective monitoring system development and summarize the useful maintenance strategies. This step may have considerable effects on the performance of online failure prediction of HPC and better performance in future.展开更多
The aim of this study was to characterize CYP1A1 and CYP3A in liver of the Kafue lechwe from Lochnivar and Blue Lagoon GMAs and to determine their mRNA expression levels as potential biomarkers of pollution. Increasin...The aim of this study was to characterize CYP1A1 and CYP3A in liver of the Kafue lechwe from Lochnivar and Blue Lagoon GMAs and to determine their mRNA expression levels as potential biomarkers of pollution. Increasing attention is paid to the problem of pesticide pollution by people. Risk assessment of pesticide should not be only based on the chemical analysis of environmental samples, since this method could not truly distinguish whether the pesticide was harmful to environment. Thus, biological assessment should be established.展开更多
基金This research has been funded by Dirección General de Investigaciones of Universidad Santiago de Cali under call No.01–2021.
文摘Wireless Sensor Networks(WSNs)are a major element of Internet of Things(IoT)networks which offer seamless sensing and wireless connectivity.Disaster management in smart cities can be considered as a safety critical application.Therefore,it becomes essential in ensuring network accessibility by improving the lifetime of IoT assisted WSN.Clustering and multihop routing are considered beneficial solutions to accomplish energy efficiency in IoT networks.This article designs an IoT enabled energy aware metaheuristic clustering with routing protocol for real time disaster management(EAMCR-RTDM).The proposed EAMCR-RTDM technique mainly intends to manage the energy utilization of nodes with the consideration of the features of the disaster region.To achieve this,EAMCR-RTDM technique primarily designs a yellow saddle goatfish based clustering(YSGF-C)technique to elect cluster heads(CHs)and organize clusters.In addition,enhanced cockroach swarm optimization(ECSO)based multihop routing(ECSO-MHR)approach was derived for optimal route selection.The YSGF-C and ECSO-MHR techniques compute fitness functions using different input variables for achieving improved energy efficiency and network lifetime.The design of YSGF-C and ECSO-MHR techniques for disaster management in IoT networks shows the novelty of the work.For examining the improved outcomes of the EAMCR-RTDM system,a wide range of simulations were performed and the extensive results are assessed in terms of different measures.The comparative outcomes highlighted the enhanced outcomes of the EAMCRRTDM algorithm over the existing approaches.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates.
文摘Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violated w ay is one of most important issues to take into account. In this paper, a novel and efficient authorization and authentication Digital Rights Management (DRM) s chema is proposed firstly for secure multimedia delivery, then based on the sche ma, a real-time digital signature algorithm built on Elliptic Curve Cryptograph y (ECC) is adopted for fast authentication and verification of licensing managem ent, thus secure multimedia delivery via TCP/RTP can efficiently work with real -time transaction response and high Quality of Service (QoS) . Performance eval uations manifest the proposed schema is secure, available for real-time media s tream authentication and authorization without much effected of QoS. The propose d schema is not only available for Client/Server media service but can be easily extended to P2P and broadcasting network for trusted rights management.
文摘Real-Time Pricing (RTP) is proposed as an effective Demand-Side Management (DSM) to adjust the load curve in order to achieve the peak load shifting. At the same time, the RTP mechanism can also raise the revenue of the supply-side and reduce the electricity expenses of consumers to achieve a win-win situation. In this paper, a real-time pricing algorithm based on price elasticity theory is proposed to analyze the energy consumption and the response of the consumers in smart grid structure. We consider a smart grid equipped with smart meters and two-way communication system. By using real data to simulate the proposed model, some characteristics of RTP are summarized as follows: 1) Under the condition of the real data, the adjustment of load curve and reducing the expenses of consumers is obviously. But the profit of power supplier is difficult to ensure. If we balance the profits of both sides, the supplier and consumers, the profits of both sides and the adjustment of load curve will be relatively limited. 2) If assuming the response degree of consumers to real-time prices is high enough, the RTP mechanism can achieve the expected effect. 3, If the cost of supply-side (day-ahead price) fluctuates dramatically, the profits of both sides can be ensured to achieve the expected effect.
基金This research was supported by National Science Foundation of China (60274048)
文摘The coordination problem of a supply chain comprising one supplier and one retailer under market demand disruption is studied in this article. A novel exponential demand function is adopted, and the penalty cost is introduced explicitly to capture the deviation production cost caused by the market demand disruption. The optimal strategies are obtained for different disruption scale under the centralized mode. For the decentralized mode, it is proved that the supply chain can be fully coordinated by adjusting the price discount policy appropriately when disruption occurs. Furthermore, the authors point out that similar results can be established for more general demand functions that represent different market circumstances if certain assumptions are satisfied.
文摘Although computer architectures incorporate fast processing hardware resources, high performance real-time implementation of a complex control algorithm requires an efficient design and software coding of the algorithm so as to exploit special features of the hardware and avoid associated architecture shortcomings. This paper presents an investigation into the analysis and design mechanisms that will lead to reduction in the execution time in implementing real-time control algorithms. The proposed mechanisms are exemplified by means of one algorithm, which demonstrates their applicability to real-time applications. An active vibration control (AVC) algorithm for a flexible beam system simulated using the finite difference (FD) method is considered to demonstrate the effectiveness of the proposed methods. A comparative performance evaluation of the proposed design mechanisms is presented and discussed through a set of experiments.
基金Supported by National Natural Science Foundation of China (No.50539120)Natural Fund for Distinguished Young Scholars of China(No.50525927)
文摘The methodology of visual simulation for a tunnel engineering construction schedule is presented. Visualization of simulation model, calculation and result of construction schedule simulation is realized, and the construction simulation and the resource optimization of tunnel engineering are made. A risk analysis and a decision-making method of tunnel engineering construction schedule based on visual simulation are presented. Furthermore, using S curve theory and schedule management method, the real-time management and control method of tunnel engineering construction based on visual simulation is presented. The application to the tunnel engineering construction schedule analysis and management shows the feasibility and effectiveness of the method presented in this paper.
文摘The energy consumption of the information and communication technology sector has become a significant portion of the total global energy consumption, warranting research efforts to attempt to reduce it. The pre-requisite for effectual energy management is the availability of the current power consumption values from network devices. Previous works have attempted to estimate and model the consumption values or have measured it using intrusive approaches such as using an in-line power meter. Recent trends suggest that information models are being increasingly used in all aspects of network management. This paper presents a framework developed for enabling the collection of real-time power consumption information from the next generation of networking hardware non-intrusively by employing information models. The experiment results indicate that it is feasible to gather power consumption data using standardized IETF information models, or non-standard customized information models, or through abstracting and exposing the information in a uniform format when no support for the required information models exists. Functional validation of the proposed framework is performed and the results from this research could be leveraged to make energy-efficient network management decisions.
文摘The high penetration of distributed energy resources (DERs) will significantly challenge the power system operation and control due to their stochastic, intermittent, and fluctuation characteristics. This enhances the difficulty of congestion management of power systems in cross-border electricity market among different regions. For handling this, the Real-Time Market is proposed for balancing capacity trading against congestions. Several strategies for Real-Time Market dealing with congestions are proposed. The strategy of two-stage crossborder markets in Day-ahead, Intra-day and Real Time Market are introduced with the congestion constraints complied. Pre-Contingency strategy is proposed as the advance preparation for the future congestion, and In-Day redispatch is used for regulation. Accordingly, the requirements on facilities considering telemetry and remote control in a fast manner are discussed at last.
基金The National Natural Science Foundationof China(No.60873030 )the National High-Tech Research and Development Plan of China(863 Program)(No.2007AA01Z309)
文摘By combining fault-tolerance with power management, this paper developed a new method for aperiodic task set for the problem of task scheduling and voltage allocation in embedded real-time systems. The scbedulability of the system was analyzed through checkpointing and the energy saving was considered via dynamic voltage and frequency scaling. Simulation results showed that the proposed algorithm had better performance compared with the existing voltage allocation techniques. The proposed technique saves 51.5% energy over FT-Only and 19.9% over FT + EC on average. Therefore, the proposed method was more appropriate for aperiodic tasks in embedded real-time systems.
基金the National Natural Science Foundation of China (30671219)the Ministry of Science and Technology of China (2009CB118 603)
文摘Poor nitrogen use efficiency in rice production is a critical issue in China. Site-specific N managements (SSNM) such as real-time N management (RTNM) and fixed-time adjustable-dose N management (FTNM) improve fertilizer-N use efficiency of irrigated rice. This study was aimed to compare the different nitrogen (N) rates and application methods (FFP, SSNM, and RTNM methods) under with- and without-fungicide application conditions on grain yield, yield components, solar radiation use efficiency (RUE), agronomic-nitrogen use efficiency (AEN), and sheath blight disease intensity. Field experiments were carried out at Liuyang County, Hunan Province, China, during 2006 and 2007. A super hybrid rice Liangyou 293 (LY293) was used as experimental material. The results showed that RTNM and SSNM have great potential for improving agronomic-nitrogen use efficiency without sacrificing the grain yield. There were significant differences in light interception rate, sheath blight disease incidence (DI) and the disease index (ShBI), and total dry matter among the different nitrogen management methods. The radiation use efficiency was increased in a certain level of applied N. But, the harvest index (HI) decreased with the increase in applied N. There is a quadratic curve relationship between grain yield and applied N rates. With the same N fertilizer rate, different fertilizer-N application methods affected the RUE and grain yield. The fungicide application not only improved the canopy light interception rate, RUE, grain filling, and harvest index, but also reduced the degree of sheath blight disease. The treatment of RTNM under the SPAD threshold value 40 obtained the highest yield. While the treatment of SSNM led to the highest nitrogen agronomic efficiency and higher rice yield, and decreased the infestation of sheath blight disease dramatically as well. Nitrogen application regimes and diseases control in rice caused obvious effects on light interception rate, RUE, and HI. Optimal N rate is helpful to get higher light interception rate, RUE, and HI. Disease control with fungicide application decreased and delayed the negative effects of the high N on rice yield formation. SSNM and RTNM under the proper SPAD threshold value obtained high-yield with high efficiency and could alleviate environmental pollution in rice production.
文摘An integrated intelligent management is presented to help organizations manage many heterogeneous resources in their information system. A general architecture of management for information system reliability is proposed, and the architecture from two aspects, process model and hierarchical model, described. Data mining techniques are used in data analysis. A data analysis system applicable to real-time data analysis is developed by improved data mining on the critical processes. The framework of the integrated management for information system reliability based on real-time data mining is illustrated, and the development of integrated and intelligent management of information system discussed.
文摘Efficient radio resource management is essential in Quality-of-Service (QoS) provisioning for wireless communication networks. In this paper, we propose a novel priority-based packet scheduling algorithm for downlink OFDMA systems. The proposed algorithm is designed to support heterogeneous applications consisting of both real-time (RT) and non-real-time (NRT) traffics with the objective to increase the spectrum efficiency while satisfying diverse QoS requirements. It tightly couples the subchannel allocation and packet scheduling together through an integrated cross-layer approach in which each packet is assigned a priority value based on both the instantaneous channel conditions as well as the QoS constraints. An efficient suboptimal heuristic algorithm is proposed to reduce the computational complexity with marginal performance degradation compared to the optimal solution. Simulation results show that the proposed algorithm can significantly improve the system performance in terms of high spectral efficiency and low outage probability compared to conventional packet scheduling algorithms, thus is very suitable for the downlink of current OFDMA systems.
文摘China Meteorological Administration (CMA) has a long history of using High Performance Computing System (HPCS) for over three decades. CMA HPCS investment provides reliable HPC capabilities essential to run Numerical Weather Prediction (NWP) models and climate models, generating millions of weather guidance products daily and providing support for Coupled Model Inter-comparison Project Phase 5 (CMIP5). Monitoring the HPCS and analyzing the resource usage can improve the performance and reliability for our users, which require a good understanding of failure characteristics. Large-scale studies of failures in real production systems are scarce. This paper collects, analyzes and studies all the failures occurring during the HPC operation period, especially focusing on studying the relationship between HPCS and NWP applications. Also, we present the challenges for a more effective monitoring system development and summarize the useful maintenance strategies. This step may have considerable effects on the performance of online failure prediction of HPC and better performance in future.
文摘The aim of this study was to characterize CYP1A1 and CYP3A in liver of the Kafue lechwe from Lochnivar and Blue Lagoon GMAs and to determine their mRNA expression levels as potential biomarkers of pollution. Increasing attention is paid to the problem of pesticide pollution by people. Risk assessment of pesticide should not be only based on the chemical analysis of environmental samples, since this method could not truly distinguish whether the pesticide was harmful to environment. Thus, biological assessment should be established.