RompecPC is a computerized program designed to create and assemble jigsaw puzzles. The program automatically records the solver’s responses as the number of pieces positioned correctly, the number of correct and inco...RompecPC is a computerized program designed to create and assemble jigsaw puzzles. The program automatically records the solver’s responses as the number of pieces positioned correctly, the number of correct and incorrect movements, the number of times that she/he attempts to move a piece to the same place (perseverations), and the latency and place to which each piece is moved or attempted to be moved. These features facilitate the implementation and evaluation of puzzles while also reducing human error. Therefore, RompePC is a useful tool for the neuropsychological assessment of visuospatial skills in both clinical and experimental research.展开更多
I wish to explore the idea that thought experiments are best accounted for as a special case of a narrative that features an interplay between puzzles and paradoxes. Furthermore, I believe the more successfully though...I wish to explore the idea that thought experiments are best accounted for as a special case of a narrative that features an interplay between puzzles and paradoxes. Furthermore, I believe the more successfully thought experiments manage to combine puzzles and paradoxes the more insightful and instructive they become. I suggest the latter kind of thought experiments also use the technique of mental variation.展开更多
Background:Reconstruction of large scalp defects after tumor resection is common and challenging.Free skin grafting or free flap transfer is always performed.However,these techniques can result in poor functional and ...Background:Reconstruction of large scalp defects after tumor resection is common and challenging.Free skin grafting or free flap transfer is always performed.However,these techniques can result in poor functional and cosmetic outcomes.Methods:In the Second Affiliated Hospital of Soochow University and the Second Affiliated Hospital of Chengdu Medical College,35 patients underwent jigsaw puzzle flap procedures based on a free-style perforator to repair large scalp defects after tumor resection from May 2013 to November 2022.The key to this procedure was to divide a large defect into several smaller parts that correspond to adjacent free-style perforators around the scalp defect.The free-style perforator flaps were designed in different ways,such as propeller flaps,rotation flaps,and V-Y advancement flaps,which were pedicled with free-style perforators.All of the small flaps were then mobilized to the defect and sutured to each other to create a new,large jigsaw puzzle-like flap to cover the large scalp defect.Finally,all the donor sites were closed directly.Results:Overall,35 patients were treated.The average defect size was 72 cm^(2)(range,25-91 cm^(2)).All flaps had a satisfactory appearance after follow-up periods of 6 months-10 years.Local tumor recurrence occurred in one case.Conclusion:The application of a jigsaw puzzle flap based on a free-style perforator is a suitable option for the reconstruction of large scalp defects after resection,yielding satisfactory functional and cosmetic results.展开更多
Guided by the ternary leadership theory from the perspective of social psychology,this paper explores the impacts of authoritarian,benevolent,and moral leadership on the top design of the Grand Canal of China in terms...Guided by the ternary leadership theory from the perspective of social psychology,this paper explores the impacts of authoritarian,benevolent,and moral leadership on the top design of the Grand Canal of China in terms of its water management practice,while providing reference for resolving the“Matteo Ricci Puzzle”.The research findings are threefold:first,authoritarian as it is,the central government of China formulates relevant laws and regulations to provide legal system insurance for the construction of the Grand Canal Cultural Belt,thus providing the blueprint for constructing the“bright cultural belt,green ecological belt and colorful tourism belt of the Grand Canal”.Second,led by the Central Government,sticking to benevolent and moral leadership,China advocates scientific water management concepts and methods,and gives long-term and comprehensive care to the well-being of the people along the banks of the Grand Canal.Finally,the top-level design of the Grand Canal of China is based on the ternary leadership theory rooted in social psychology and has formulated a set of properly-scheduled,reasonably-coordinated,and flexibly-operated management system for the fundamental interests of the people and long-term goals of the country.展开更多
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ...Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography.展开更多
文摘RompecPC is a computerized program designed to create and assemble jigsaw puzzles. The program automatically records the solver’s responses as the number of pieces positioned correctly, the number of correct and incorrect movements, the number of times that she/he attempts to move a piece to the same place (perseverations), and the latency and place to which each piece is moved or attempted to be moved. These features facilitate the implementation and evaluation of puzzles while also reducing human error. Therefore, RompePC is a useful tool for the neuropsychological assessment of visuospatial skills in both clinical and experimental research.
文摘I wish to explore the idea that thought experiments are best accounted for as a special case of a narrative that features an interplay between puzzles and paradoxes. Furthermore, I believe the more successfully thought experiments manage to combine puzzles and paradoxes the more insightful and instructive they become. I suggest the latter kind of thought experiments also use the technique of mental variation.
基金supported by the National Natural Science Foundation of China(grant nos.32071238,82073477,and 82103773)Natural Science Project of Chengdu Medical College(grant nos.CYZZD20-01 and CYZ19-31)+3 种基金Science and Technology Project of Health Commission of Sichuan Province(grant no.21PJ158)Scientific Research Fund Project of China Baoyuan Investment Co.,Ltd.(grant no.CBYI202104)Nuclear Medical Science and Technology Innovation Project of China National Nuclear Corporation Medical Industry Management Co.,Ltd.(grant no.ZHYLTD2021002)Young Talent Project of China National Nuclear Corporation.
文摘Background:Reconstruction of large scalp defects after tumor resection is common and challenging.Free skin grafting or free flap transfer is always performed.However,these techniques can result in poor functional and cosmetic outcomes.Methods:In the Second Affiliated Hospital of Soochow University and the Second Affiliated Hospital of Chengdu Medical College,35 patients underwent jigsaw puzzle flap procedures based on a free-style perforator to repair large scalp defects after tumor resection from May 2013 to November 2022.The key to this procedure was to divide a large defect into several smaller parts that correspond to adjacent free-style perforators around the scalp defect.The free-style perforator flaps were designed in different ways,such as propeller flaps,rotation flaps,and V-Y advancement flaps,which were pedicled with free-style perforators.All of the small flaps were then mobilized to the defect and sutured to each other to create a new,large jigsaw puzzle-like flap to cover the large scalp defect.Finally,all the donor sites were closed directly.Results:Overall,35 patients were treated.The average defect size was 72 cm^(2)(range,25-91 cm^(2)).All flaps had a satisfactory appearance after follow-up periods of 6 months-10 years.Local tumor recurrence occurred in one case.Conclusion:The application of a jigsaw puzzle flap based on a free-style perforator is a suitable option for the reconstruction of large scalp defects after resection,yielding satisfactory functional and cosmetic results.
基金the research funding from the National Planning Office of Philosophy and Social Science Grant of P.R.China(18BGJ086).
文摘Guided by the ternary leadership theory from the perspective of social psychology,this paper explores the impacts of authoritarian,benevolent,and moral leadership on the top design of the Grand Canal of China in terms of its water management practice,while providing reference for resolving the“Matteo Ricci Puzzle”.The research findings are threefold:first,authoritarian as it is,the central government of China formulates relevant laws and regulations to provide legal system insurance for the construction of the Grand Canal Cultural Belt,thus providing the blueprint for constructing the“bright cultural belt,green ecological belt and colorful tourism belt of the Grand Canal”.Second,led by the Central Government,sticking to benevolent and moral leadership,China advocates scientific water management concepts and methods,and gives long-term and comprehensive care to the well-being of the people along the banks of the Grand Canal.Finally,the top-level design of the Grand Canal of China is based on the ternary leadership theory rooted in social psychology and has formulated a set of properly-scheduled,reasonably-coordinated,and flexibly-operated management system for the fundamental interests of the people and long-term goals of the country.
基金国家自然科学基金项目(6074100160871092)+3 种基金黑龙江省杰出青年科学基金项目(JC200611)黑龙江省自然科学基金重点项目(ZJG0705)哈尔滨工业大学校基金项目(HIT.2003.53)the High-Tech Research and Development Program of China(2007AA01Z171)~~
基金This work was supported by the Defense Industrial Technology Development Program(Grant No.JCKY2021208B036).
文摘Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography.