To achieve high performance and reliability in video streaming over wireless local area networks (WLANs), one must jointly consider both optimized association to access points (APs) and handover management based o...To achieve high performance and reliability in video streaming over wireless local area networks (WLANs), one must jointly consider both optimized association to access points (APs) and handover management based on dynamic scanning of alternate APs. In this article, we propose a new architecture within the software-defined networking (SDN) framework, which allows stations to be connected to several APs simultaneously and to switch fast between them. We evaluate our system in a real-time testbed and demonstrate that our SDN-based handover mechanism significantly reduces the number and duration of video freeze events and allows for smaller playout buffers.展开更多
Metaverse technology is an advanced form of virtual reality and augmented technologies. It merges the digital world with the real world, thus benefitting healthcare services. Medical informatics is promising in the me...Metaverse technology is an advanced form of virtual reality and augmented technologies. It merges the digital world with the real world, thus benefitting healthcare services. Medical informatics is promising in the metaverse. Despite the increasing adoption of the metaverse in commercial applications, a considerable research gap remains in the academic domain, which hinders the comprehensive delineation of research prospects for the metaverse in healthcare. This study employs text-mining methods to investigate the prevalence and trends of the metaverse in healthcare;in particular, more than 34,000 academic articles and news reports are analyzed. Subsequently, the topic prevalence, similarity, and correlation are measured using topic-modeling methods. Based on bibliometric analysis, this study proposes a theoretical framework from the perspectives of knowledge, socialization, digitization, and intelligence. This study provides insights into its application in healthcare via an extensive literature review. The key to promoting the metaverse in healthcare is to perform technological upgrades in computer science, telecommunications, healthcare services, and computational biology. Digitization, virtualization, and hyperconnectivity technologies are crucial in advancing healthcare systems. Realizing their full potential necessitates collective support and concerted effort toward the transformation of relevant service providers, the establishment of a digital economy value system, and the reshaping of social governance and health concepts. The results elucidate the current state of research and offer guidance for the advancement of the metaverse in healthcare.展开更多
We construct a complete-connective regular network based on Self-replication Space and the structural principles of cantor set and Koch curve. A new definition of dimension is proposed in the paper, and we also invest...We construct a complete-connective regular network based on Self-replication Space and the structural principles of cantor set and Koch curve. A new definition of dimension is proposed in the paper, and we also investigate a simplified method to calculate the dimension of two regular networks. By the study results, we can get a extension: the formation of Euclidean space may be built by the process of the Big Bang's continuously growing at a constant rate of three times.展开更多
Ocular artifacts in Electroencephalography(EEG)recordings lead to inaccurate results in signal analysis and process.Variational Mode Decomposition(VMD)is an adaptive and completely nonrecursive signal processing metho...Ocular artifacts in Electroencephalography(EEG)recordings lead to inaccurate results in signal analysis and process.Variational Mode Decomposition(VMD)is an adaptive and completely nonrecursive signal processing method.There are two parameters in VMD that have a great influence on the result of signal decomposition.Thus,this paper studies a signal decomposition by improving VMD based on squirrel search algorithm(SSA).It’s improved with abilities of global optimal guidance and opposition based learning.The original seasonal monitoring condition in SSA is modified.The feedback of whether the optimal solution is successfully updated is used to establish new seasonal monitoring conditions.Opposition-based learning is introduced to reposition the position of the population in this stage.It is applied to optimize the important parameters of VMD.GOSSA-VMD model is established to remove ocular artifacts from EEG recording.We have verified the effectiveness of our proposal in a public dataset compared with other methods.The proposed method improves the SNR of the dataset from-2.03 to 2.30.展开更多
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have va...E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have varying levels of understanding when it comes to securing an online application.Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the OpenWeb Application Security Project(OWASP)for its 2017 Top Ten List Cross Site Scripting(XSS).An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws.Many published articles focused on these attacks’binary classification.This article described a novel deep-learning approach for detecting SQL injection and XSS attacks.The datasets for SQL injection and XSS payloads are combined into a single dataset.The dataset is labeledmanually into three labels,each representing a kind of attack.This work implements some pre-processing algorithms,including Porter stemming,one-hot encoding,and the word-embedding method to convert a word’s text into a vector.Our model used bidirectional long short-term memory(BiLSTM)to extract features automatically,train,and test the payload dataset.The payloads were classified into three types by BiLSTM:XSS,SQL injection attacks,and normal.The outcomes demonstrated excellent performance in classifying payloads into XSS attacks,injection attacks,and non-malicious payloads.BiLSTM’s high performance was demonstrated by its accuracy of 99.26%.展开更多
After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group ...After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group events to upgrade and expand the scope of harm. It is difficult to deal. So public opinion control is very important. In this paper, we establish an influence model for spreading of public opinion based on SIR model. Through the political analysis, this paper finds that the network group events will subside, but the influence scope, time and ability of event cannot be ignored. As a result of this study, the corresponding strategies are put forward in this paper.展开更多
Life expectancy of the elderly is a significant problem in China, and it changes not only the health care, but also the pension. This study used tracking data from the Chinese Urban and Rural Elderly Population Survey...Life expectancy of the elderly is a significant problem in China, and it changes not only the health care, but also the pension. This study used tracking data from the Chinese Urban and Rural Elderly Population Survey to calculate the age-specific Active Life Expectancy (ALE) of the Chinese elderly population aged 60 years and over. For analysis, this population was divided into different sub-populations according to gender, census register and region. The main conclusions of our study are as follows: 1) The quality of life for elderly males may be greater than that for elderly females;2) There were significant differences in Active Life Expectancy (ALE) and Inactive Life Expectancy (ILE) between urban and rural elderly;3) The differences in ALE between the eastern, central and western regions of China were not significant;and 4) The increased remaining life expectancy of the elderly was mainly attributed to the extended ALE in the lower age group and the expanded ILE in the higher age group. This study expands the knowledge of Chinese elderly’s life expectancy in different health status.展开更多
In order to know about the essence of service employees' innovation behavior, the service employees' innovation behavior scale based on their unique characteristics is designed. Data were collected from high-s...In order to know about the essence of service employees' innovation behavior, the service employees' innovation behavior scale based on their unique characteristics is designed. Data were collected from high-star hospitalities. Through the issuance and the collection of questionnaires, the scale is verified to have good reliability and validity by SPSS software analysis. Meanwhile,the structural equation model( SEM) is suited for testing structural dimensions of service employees' innovation behavior. The results showed that service employees' innovation behavior could be decomposed into a four-dimensional structure,namely innovation orientation, ideas generation, innovation implementation and innovation practice. In addition,there are significant differences in service employees' innovation behavior about subjects' gender,position,education background and years of working.展开更多
Utilizing artificial intelligence(AI)to protect smart coastal cities has become a novel vision for scientific and industrial institutions.One of these AI technologies is using efficient and secure multi-environment Un...Utilizing artificial intelligence(AI)to protect smart coastal cities has become a novel vision for scientific and industrial institutions.One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles(UVs)for anti-submarine attacks.This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy.The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach,and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution.The research’s noteworthy findings demonstrate UVs’logistical capability to promptly detect the target and address the problem while securely keeping the drone’s geographical information.The results suggest that detecting the submarine early increases the likelihood of averting a collision.The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency.Securing communication between Unmanned Aerial Vehicles(UAVs)improves the level of secrecy necessary for the task.The swarm navigation is based on a peer-to-peer system,which allows each UAV to access information from its peers.This,in turn,helps the UAVs to determine the best route to take and to avoid collisions with other UAVs.The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.展开更多
This paper screens five pairs of call walTants/put warrants with the same listing date and final exercise date from domestic delisted wattant, and collects and processes relevant statistic in warrant market and stock ...This paper screens five pairs of call walTants/put warrants with the same listing date and final exercise date from domestic delisted wattant, and collects and processes relevant statistic in warrant market and stock market. Because inconformity of strike price between call warrants/put warrants in domestic warrant market, and regarding the strike price of put warrants as standard, this paper takes advantage of BSM formula recalculates the price of call warrants, and carries out verification of option parity relations by regression analysis and Wilcoxon's Sign Rank Test. From a theoretical point of view, homogenous call warrants/put warrants should satisfy the parity relations. However, due to the lack of short sales mechanism in domestic warrant market and stock market, the empirical results indicate that domestic warrant market can' t meet the option parity relations.展开更多
A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive col...A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive collectors as well as a binding price ceiling of the commodities.By utilizing the credibility measure of fuzzy event,variational inequality and Lagrange dual theory,the optimum behaviors of manufactures,retailers,collectors and consumers are described.Therefore,the supply chain network equilibrium model is established.Numerical examples were given to illustrate the impact of production capacity constraints and price ceiling on the network equilibrium pattern.The results show that the shortage of commodities in consumer market will be more serious,the wholesale price of product and purchase price of waste products rise,the profits of retailers decrease,the profits of manufacturers and collectors increase as the government gradually reduce the binding price ceiling on competitive markets,and the trend will be more obvious in the existence of production capacity constraints at same time.展开更多
In this paper, a QP-free feasible method with piecewise NCP functions is proposed for nonlinear inequality constrained optimization problems. The new NCP functions are piecewise linear-rational, regular pseudo-smooth...In this paper, a QP-free feasible method with piecewise NCP functions is proposed for nonlinear inequality constrained optimization problems. The new NCP functions are piecewise linear-rational, regular pseudo-smooth and have nice properties. This method is based on the solutions of linear systems of equation reformulation of KKT optimality conditions, by using the piecewise NCP functions. This method is implementable and globally convergent without assuming the strict complementarity condition, the isolatedness of accumulation points. Purr thermore, the gradients of active constraints are not requested to be linearly independent. The submatrix which may be obtained by quasi-Newton methods, is not requested to be uniformly positive definite. Preliminary numerical results indicate that this new QP-free method is quite promising.展开更多
We study symmetric tensor spaces and cones arising from polynomial optimization and physical sciences.We prove a decomposition invariance theorem for linear operators over the symmetric tensor space,which leads to sev...We study symmetric tensor spaces and cones arising from polynomial optimization and physical sciences.We prove a decomposition invariance theorem for linear operators over the symmetric tensor space,which leads to several other interesting properties in symmetric tensor spaces.We then consider the positive semidefiniteness of linear operators which deduces the convexity of the Frobenius norm function of a symmetric tensor.Furthermore,we characterize the symmetric positive semidefinite tensor(SDT)cone by employing the properties of linear operators,design some face structures of its dual cone,and analyze its relationship to many other tensor cones.In particular,we show that the cone is self-dual if and only if the polynomial is quadratic,give specific characterizations of tensors that are in the primal cone but not in the dual for higher order cases,and develop a complete relationship map among the tensor cones appeared in the literature.展开更多
Drawing on resource dependence theory, this paper develops and empirically tests a model for understanding how the implementation of building information modeling(BIM) in construction projects impacts the performance ...Drawing on resource dependence theory, this paper develops and empirically tests a model for understanding how the implementation of building information modeling(BIM) in construction projects impacts the performance of different project participating organizations through improving their interorganizational collaboration capabilities. Based on two sets of survey data collected from designers and general contractors in BIMbased construction projects in China, the results from partial least squares analysis and bootstrapping mediation test provide clear evidence that BIM-enabled capabilities of information sharing and collaborative decision-making as a whole play a significant role in determining BIMenabled efficiency and effectiveness benefits for both designers and general contractors. The results further reveal that designers and general contractors benefit from project BIM implementation activities significantly nonequivalently, and that this non-equivalence closely relates to the different roles played by designers and general contractors in BIM-enabled interorganizational resource exchange processes. The findings validate the resource dependence theory perspective of BIM as a boundary spanning tool to manage interorganizational resource dependence in construction projects, and contribute todeepened understandings of how and why project participating organizations benefit differently from the implementation of interorganizational information technologies like BIM.展开更多
The proximal-based decomposition method was originally proposed by Chen and Teboulle (Math. Programming, 1994, 64:81-101 for solving corrvex minimization problems. This paper extends it to solving monotone variation...The proximal-based decomposition method was originally proposed by Chen and Teboulle (Math. Programming, 1994, 64:81-101 for solving corrvex minimization problems. This paper extends it to solving monotone variational inequalities associated with separable structures with the improvements that the restrictive assumptions on the involved parameters are much relaxed, and thus makes it practical to solve the subproblems easily. Without additional assumptions, global convergence of the new method is proved under the same mild assumptions on the problem's data as the original method.展开更多
An accurate estimation of the sensor systematic error is significant for improving the performance of target tracking system. The existing methods usually append the bias states directly to the variable states to form...An accurate estimation of the sensor systematic error is significant for improving the performance of target tracking system. The existing methods usually append the bias states directly to the variable states to form augmented state vectors and utilize the conventional Kalman estimator to achieve state vectors estimate. So doing is expensive in computation, and much work is devoted to decoupling variable states and systematic error. But the decentralied estimation of systematic errors and reduction of the amount of computation as well as decentralied track fusion are far from being realized. This paper addresses distributed track fusion problem in multi-sensor tracking system in the presence of sensor bias. By this method, variable states and systematic error is decoupled. Decentralized systematic error estimation and track fusion are achieved. Simulation results verify that this method can get accurate estimation of systematic error and state vector.展开更多
Corporate restructuring was identified as a new industrial force that has great impact on economic values and that therefore has become central in daily financial decision making. This article investigates the optimal...Corporate restructuring was identified as a new industrial force that has great impact on economic values and that therefore has become central in daily financial decision making. This article investigates the optimal restructuring strategies under different dynamic factors and their numerous impacts on firm value. The concept of quasi-leverage is introduced and valuation models are built for corporate debt and equity under imperfect market conditions. The model’s input variables include the quasi-leverage and other firm-specific parameters, the output variables include multiple corporate security values. The restruc- turing cost is formulated in the form of exponential function, which allows us to observe the sensitivity of the variation in security values. The unified model and its analytical solution developed in this research allow us to examine the continuous changes of security values by dynamically changing the coupon rates, riskless interest rate, bankruptcy cost, quasi-leverage, personal tax rate, corporate taxes rate, transaction cost, firm risk, etc., so that the solutions provide useful guidance for financing and restructuring decisions.展开更多
A great deal of scientific research in the world aims at discovering the facts about the world so that we understand it better and find solutions to problems. Data enabling technology plays an important role in modern...A great deal of scientific research in the world aims at discovering the facts about the world so that we understand it better and find solutions to problems. Data enabling technology plays an important role in modern scientific discovery and technologic advancement. The importance of good information was long recognized by prominent leaders such as Sun Tzu and Napoleon. Factual data enables managers to measure, to understand their businesses, and to directly translate that knowledge into improved decision making and performance. This position paper argues that data analytics is ready to change engineering management in the following areas: 1) by making relevant historical data available to the manager at the time when it's needed; 2) by filtering out actionable intelligence from the ocean of data; and 3) by integrating useful data from multiple sources to support quantitative decision-making. Considering the unique need for engineering management, the paper proposes researchable topics in the two broad areas of data acquisition and data analytics. The purpose of the paper is to provoke discussion from peers and to encourage research activity.展开更多
In this paper,we consider the strategic interaction between the normal and sharp traders in a dynamic limit-order security market and its impact on the Chinese security market at different market volatility levels.We ...In this paper,we consider the strategic interaction between the normal and sharp traders in a dynamic limit-order security market and its impact on the Chinese security market at different market volatility levels.We find that when the proportion of sharp traders is less than a threshold in an orderdriven market,the sharp traders who submit limit orders will get more returns than the normal traders.The participation of sharp traders in the market can increase the total social welfare of all the traders.In addition,we show that:(1)when the market volatility level is generally low,the short-term sharp traders benefit from larger volatility;(2)when the market volatility level is generally high,the insider/cheating sharp traders with high-frequent trading rather than the short-term sharp traders benefit from extreme high volatility;(3)when the market volatility level is moderate,the sharp traders can increase market liquidity.展开更多
The inspection activities are often carried out to detect possible indication of failures in plant systems.This paper considers a single unit system subject to two types of failures, where one failure mode is the trad...The inspection activities are often carried out to detect possible indication of failures in plant systems.This paper considers a single unit system subject to two types of failures, where one failure mode is the traditional0-1 logic failure and the other failure mode is described by a two-stage failure process. Adjustable inspections are used to detect the defective stage of the latter. We assume that the inspection duration gets shorter and shorter with a constant ratio. At the same time, preventive replacement is used to avoid the possible failure due to the former failure mode. The renewal process of this system is analyzed and the expected long-run cost per unit time(ELRCUT) is derived. The optimal inspection period and the preventive replacement interval to minimize ELRCUT are studied. At last, a numerical example is presented to illustrate the proposed model.展开更多
文摘To achieve high performance and reliability in video streaming over wireless local area networks (WLANs), one must jointly consider both optimized association to access points (APs) and handover management based on dynamic scanning of alternate APs. In this article, we propose a new architecture within the software-defined networking (SDN) framework, which allows stations to be connected to several APs simultaneously and to switch fast between them. We evaluate our system in a real-time testbed and demonstrate that our SDN-based handover mechanism significantly reduces the number and duration of video freeze events and allows for smaller playout buffers.
基金supported by the National Natural Science Foundation of China(Grant No.:62102087)Fundamental Research Funds for the Central Universities in UIBE(Grant No.:22PY055-62102087)Scientific Research Laboratory of AI Technology and Applications,UIBE.
文摘Metaverse technology is an advanced form of virtual reality and augmented technologies. It merges the digital world with the real world, thus benefitting healthcare services. Medical informatics is promising in the metaverse. Despite the increasing adoption of the metaverse in commercial applications, a considerable research gap remains in the academic domain, which hinders the comprehensive delineation of research prospects for the metaverse in healthcare. This study employs text-mining methods to investigate the prevalence and trends of the metaverse in healthcare;in particular, more than 34,000 academic articles and news reports are analyzed. Subsequently, the topic prevalence, similarity, and correlation are measured using topic-modeling methods. Based on bibliometric analysis, this study proposes a theoretical framework from the perspectives of knowledge, socialization, digitization, and intelligence. This study provides insights into its application in healthcare via an extensive literature review. The key to promoting the metaverse in healthcare is to perform technological upgrades in computer science, telecommunications, healthcare services, and computational biology. Digitization, virtualization, and hyperconnectivity technologies are crucial in advancing healthcare systems. Realizing their full potential necessitates collective support and concerted effort toward the transformation of relevant service providers, the establishment of a digital economy value system, and the reshaping of social governance and health concepts. The results elucidate the current state of research and offer guidance for the advancement of the metaverse in healthcare.
文摘We construct a complete-connective regular network based on Self-replication Space and the structural principles of cantor set and Koch curve. A new definition of dimension is proposed in the paper, and we also investigate a simplified method to calculate the dimension of two regular networks. By the study results, we can get a extension: the formation of Euclidean space may be built by the process of the Big Bang's continuously growing at a constant rate of three times.
基金supported in part by the Science and Technology Major Project of Anhui Province(Grant No.17030901037)in part by the Humanities and Social Science Fund of Ministry of Education of China(Grant No.19YJAZH098)+2 种基金in part by the Program for Synergy Innovation in the Anhui Higher Education Institutions of China(Grant Nos.GXXT-2020-012,GXXT-2021-044)in part by Science and Technology Planning Project of Wuhu City,Anhui Province,China(Grant No.2021jc1-2)part by Research Start-Up Fund for Introducing Talents from Anhui Polytechnic University(Grant No.2021YQQ066).
文摘Ocular artifacts in Electroencephalography(EEG)recordings lead to inaccurate results in signal analysis and process.Variational Mode Decomposition(VMD)is an adaptive and completely nonrecursive signal processing method.There are two parameters in VMD that have a great influence on the result of signal decomposition.Thus,this paper studies a signal decomposition by improving VMD based on squirrel search algorithm(SSA).It’s improved with abilities of global optimal guidance and opposition based learning.The original seasonal monitoring condition in SSA is modified.The feedback of whether the optimal solution is successfully updated is used to establish new seasonal monitoring conditions.Opposition-based learning is introduced to reposition the position of the population in this stage.It is applied to optimize the important parameters of VMD.GOSSA-VMD model is established to remove ocular artifacts from EEG recording.We have verified the effectiveness of our proposal in a public dataset compared with other methods.The proposed method improves the SNR of the dataset from-2.03 to 2.30.
基金funded byResearchers Supporting Project Number(RSP2023R476)King Saud University,Riyadh,Saudi Arabia。
文摘E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have varying levels of understanding when it comes to securing an online application.Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the OpenWeb Application Security Project(OWASP)for its 2017 Top Ten List Cross Site Scripting(XSS).An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws.Many published articles focused on these attacks’binary classification.This article described a novel deep-learning approach for detecting SQL injection and XSS attacks.The datasets for SQL injection and XSS payloads are combined into a single dataset.The dataset is labeledmanually into three labels,each representing a kind of attack.This work implements some pre-processing algorithms,including Porter stemming,one-hot encoding,and the word-embedding method to convert a word’s text into a vector.Our model used bidirectional long short-term memory(BiLSTM)to extract features automatically,train,and test the payload dataset.The payloads were classified into three types by BiLSTM:XSS,SQL injection attacks,and normal.The outcomes demonstrated excellent performance in classifying payloads into XSS attacks,injection attacks,and non-malicious payloads.BiLSTM’s high performance was demonstrated by its accuracy of 99.26%.
文摘After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group events to upgrade and expand the scope of harm. It is difficult to deal. So public opinion control is very important. In this paper, we establish an influence model for spreading of public opinion based on SIR model. Through the political analysis, this paper finds that the network group events will subside, but the influence scope, time and ability of event cannot be ignored. As a result of this study, the corresponding strategies are put forward in this paper.
文摘Life expectancy of the elderly is a significant problem in China, and it changes not only the health care, but also the pension. This study used tracking data from the Chinese Urban and Rural Elderly Population Survey to calculate the age-specific Active Life Expectancy (ALE) of the Chinese elderly population aged 60 years and over. For analysis, this population was divided into different sub-populations according to gender, census register and region. The main conclusions of our study are as follows: 1) The quality of life for elderly males may be greater than that for elderly females;2) There were significant differences in Active Life Expectancy (ALE) and Inactive Life Expectancy (ILE) between urban and rural elderly;3) The differences in ALE between the eastern, central and western regions of China were not significant;and 4) The increased remaining life expectancy of the elderly was mainly attributed to the extended ALE in the lower age group and the expanded ILE in the higher age group. This study expands the knowledge of Chinese elderly’s life expectancy in different health status.
基金Shanghai University of Engineering Science's Research Cultivation Fund Project,China(No.A25001201194)National Natural Science Foundation,China(No.71301100)+1 种基金the Fundamental Research Funds for the Central Universities,China(No.JB-SK1204)China Postdoctoral Science Foundation(No.2014M561655)
文摘In order to know about the essence of service employees' innovation behavior, the service employees' innovation behavior scale based on their unique characteristics is designed. Data were collected from high-star hospitalities. Through the issuance and the collection of questionnaires, the scale is verified to have good reliability and validity by SPSS software analysis. Meanwhile,the structural equation model( SEM) is suited for testing structural dimensions of service employees' innovation behavior. The results showed that service employees' innovation behavior could be decomposed into a four-dimensional structure,namely innovation orientation, ideas generation, innovation implementation and innovation practice. In addition,there are significant differences in service employees' innovation behavior about subjects' gender,position,education background and years of working.
基金This work was funded by the research center of the Future University in Egypt,in 2023.
文摘Utilizing artificial intelligence(AI)to protect smart coastal cities has become a novel vision for scientific and industrial institutions.One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles(UVs)for anti-submarine attacks.This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy.The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach,and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution.The research’s noteworthy findings demonstrate UVs’logistical capability to promptly detect the target and address the problem while securely keeping the drone’s geographical information.The results suggest that detecting the submarine early increases the likelihood of averting a collision.The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency.Securing communication between Unmanned Aerial Vehicles(UAVs)improves the level of secrecy necessary for the task.The swarm navigation is based on a peer-to-peer system,which allows each UAV to access information from its peers.This,in turn,helps the UAVs to determine the best route to take and to avoid collisions with other UAVs.The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.
文摘This paper screens five pairs of call walTants/put warrants with the same listing date and final exercise date from domestic delisted wattant, and collects and processes relevant statistic in warrant market and stock market. Because inconformity of strike price between call warrants/put warrants in domestic warrant market, and regarding the strike price of put warrants as standard, this paper takes advantage of BSM formula recalculates the price of call warrants, and carries out verification of option parity relations by regression analysis and Wilcoxon's Sign Rank Test. From a theoretical point of view, homogenous call warrants/put warrants should satisfy the parity relations. However, due to the lack of short sales mechanism in domestic warrant market and stock market, the empirical results indicate that domestic warrant market can' t meet the option parity relations.
基金study by the National Natural Science Foundation of China,Shandong province by the National Science Foundation Project,Project number:71202142,ZR2012GM002
文摘A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive collectors as well as a binding price ceiling of the commodities.By utilizing the credibility measure of fuzzy event,variational inequality and Lagrange dual theory,the optimum behaviors of manufactures,retailers,collectors and consumers are described.Therefore,the supply chain network equilibrium model is established.Numerical examples were given to illustrate the impact of production capacity constraints and price ceiling on the network equilibrium pattern.The results show that the shortage of commodities in consumer market will be more serious,the wholesale price of product and purchase price of waste products rise,the profits of retailers decrease,the profits of manufacturers and collectors increase as the government gradually reduce the binding price ceiling on competitive markets,and the trend will be more obvious in the existence of production capacity constraints at same time.
基金supported by the Natural science Foundation of China(10371089,10571137)
文摘In this paper, a QP-free feasible method with piecewise NCP functions is proposed for nonlinear inequality constrained optimization problems. The new NCP functions are piecewise linear-rational, regular pseudo-smooth and have nice properties. This method is based on the solutions of linear systems of equation reformulation of KKT optimality conditions, by using the piecewise NCP functions. This method is implementable and globally convergent without assuming the strict complementarity condition, the isolatedness of accumulation points. Purr thermore, the gradients of active constraints are not requested to be linearly independent. The submatrix which may be obtained by quasi-Newton methods, is not requested to be uniformly positive definite. Preliminary numerical results indicate that this new QP-free method is quite promising.
基金supported by National Natural Science Foundation of China(Grant No.11301022)the State Key Laboratory of Rail Traffic Control and Safety,Beijing Jiaotong University(Grant Nos.RCS2014ZT20 and RCS2014ZZ001)+1 种基金Beijing Natural Science Foundation(Grant No.9144031)the Hong Kong Research Grant Council(Grant Nos.Poly U 501909,502510,502111 and 501212)
文摘We study symmetric tensor spaces and cones arising from polynomial optimization and physical sciences.We prove a decomposition invariance theorem for linear operators over the symmetric tensor space,which leads to several other interesting properties in symmetric tensor spaces.We then consider the positive semidefiniteness of linear operators which deduces the convexity of the Frobenius norm function of a symmetric tensor.Furthermore,we characterize the symmetric positive semidefinite tensor(SDT)cone by employing the properties of linear operators,design some face structures of its dual cone,and analyze its relationship to many other tensor cones.In particular,we show that the cone is self-dual if and only if the polynomial is quadratic,give specific characterizations of tensors that are in the primal cone but not in the dual for higher order cases,and develop a complete relationship map among the tensor cones appeared in the literature.
基金supported by the Public Policy Research Funding Scheme in Hong Kong (Grant No. 2014. A6.054.15B)the National Natural Science Foundation of China (Grant No. 71272046)
文摘Drawing on resource dependence theory, this paper develops and empirically tests a model for understanding how the implementation of building information modeling(BIM) in construction projects impacts the performance of different project participating organizations through improving their interorganizational collaboration capabilities. Based on two sets of survey data collected from designers and general contractors in BIMbased construction projects in China, the results from partial least squares analysis and bootstrapping mediation test provide clear evidence that BIM-enabled capabilities of information sharing and collaborative decision-making as a whole play a significant role in determining BIMenabled efficiency and effectiveness benefits for both designers and general contractors. The results further reveal that designers and general contractors benefit from project BIM implementation activities significantly nonequivalently, and that this non-equivalence closely relates to the different roles played by designers and general contractors in BIM-enabled interorganizational resource exchange processes. The findings validate the resource dependence theory perspective of BIM as a boundary spanning tool to manage interorganizational resource dependence in construction projects, and contribute todeepened understandings of how and why project participating organizations benefit differently from the implementation of interorganizational information technologies like BIM.
基金the National Natural Science Foundation of China(No.70671024)the Na-tional High-Tech Research and Development Program of China(863 Program)(No.2006AA11Z209)
文摘The proximal-based decomposition method was originally proposed by Chen and Teboulle (Math. Programming, 1994, 64:81-101 for solving corrvex minimization problems. This paper extends it to solving monotone variational inequalities associated with separable structures with the improvements that the restrictive assumptions on the involved parameters are much relaxed, and thus makes it practical to solve the subproblems easily. Without additional assumptions, global convergence of the new method is proved under the same mild assumptions on the problem's data as the original method.
基金This work was supported by the Special Fund of Excellent Doctor'Degree Dissertation in China and the Basic Research Fund of National University of Defense Technology in China.
文摘An accurate estimation of the sensor systematic error is significant for improving the performance of target tracking system. The existing methods usually append the bias states directly to the variable states to form augmented state vectors and utilize the conventional Kalman estimator to achieve state vectors estimate. So doing is expensive in computation, and much work is devoted to decoupling variable states and systematic error. But the decentralied estimation of systematic errors and reduction of the amount of computation as well as decentralied track fusion are far from being realized. This paper addresses distributed track fusion problem in multi-sensor tracking system in the presence of sensor bias. By this method, variable states and systematic error is decoupled. Decentralized systematic error estimation and track fusion are achieved. Simulation results verify that this method can get accurate estimation of systematic error and state vector.
文摘Corporate restructuring was identified as a new industrial force that has great impact on economic values and that therefore has become central in daily financial decision making. This article investigates the optimal restructuring strategies under different dynamic factors and their numerous impacts on firm value. The concept of quasi-leverage is introduced and valuation models are built for corporate debt and equity under imperfect market conditions. The model’s input variables include the quasi-leverage and other firm-specific parameters, the output variables include multiple corporate security values. The restruc- turing cost is formulated in the form of exponential function, which allows us to observe the sensitivity of the variation in security values. The unified model and its analytical solution developed in this research allow us to examine the continuous changes of security values by dynamically changing the coupon rates, riskless interest rate, bankruptcy cost, quasi-leverage, personal tax rate, corporate taxes rate, transaction cost, firm risk, etc., so that the solutions provide useful guidance for financing and restructuring decisions.
文摘A great deal of scientific research in the world aims at discovering the facts about the world so that we understand it better and find solutions to problems. Data enabling technology plays an important role in modern scientific discovery and technologic advancement. The importance of good information was long recognized by prominent leaders such as Sun Tzu and Napoleon. Factual data enables managers to measure, to understand their businesses, and to directly translate that knowledge into improved decision making and performance. This position paper argues that data analytics is ready to change engineering management in the following areas: 1) by making relevant historical data available to the manager at the time when it's needed; 2) by filtering out actionable intelligence from the ocean of data; and 3) by integrating useful data from multiple sources to support quantitative decision-making. Considering the unique need for engineering management, the paper proposes researchable topics in the two broad areas of data acquisition and data analytics. The purpose of the paper is to provoke discussion from peers and to encourage research activity.
基金supported in part by the National Natural Science Foundation of China(NSFC)under grant numbers 71901027the China Postdoctoral Science Foundation 2019M660509+2 种基金the Science and Technology Innovation Program of Beijing Forestry Unlversity(BLX201829)the National Natural Science Foundation of China(NSFC)under Grant Nos.71661167009 and 71711530714NSFC/Research Grants Council under Grant No.3-RAA7.
文摘In this paper,we consider the strategic interaction between the normal and sharp traders in a dynamic limit-order security market and its impact on the Chinese security market at different market volatility levels.We find that when the proportion of sharp traders is less than a threshold in an orderdriven market,the sharp traders who submit limit orders will get more returns than the normal traders.The participation of sharp traders in the market can increase the total social welfare of all the traders.In addition,we show that:(1)when the market volatility level is generally low,the short-term sharp traders benefit from larger volatility;(2)when the market volatility level is generally high,the insider/cheating sharp traders with high-frequent trading rather than the short-term sharp traders benefit from extreme high volatility;(3)when the market volatility level is moderate,the sharp traders can increase market liquidity.
基金the National Natural Science Foundation of China(Nos.71231001,71301009 and71420107023)Ministry of Education Doctor of Philosophy Supervisor Fund of China(No.20120006110025)the Fundamental Research Funds for the Central Universities of China(No.Fl TR-TP-15-031A3)
文摘The inspection activities are often carried out to detect possible indication of failures in plant systems.This paper considers a single unit system subject to two types of failures, where one failure mode is the traditional0-1 logic failure and the other failure mode is described by a two-stage failure process. Adjustable inspections are used to detect the defective stage of the latter. We assume that the inspection duration gets shorter and shorter with a constant ratio. At the same time, preventive replacement is used to avoid the possible failure due to the former failure mode. The renewal process of this system is analyzed and the expected long-run cost per unit time(ELRCUT) is derived. The optimal inspection period and the preventive replacement interval to minimize ELRCUT are studied. At last, a numerical example is presented to illustrate the proposed model.