Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To impro...Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To improve the capability of hiding huge data file in disk with high efficiency. In this paper, we propose a novel approach called CryptFS, which is achieved by utilizing the file access mechanism and modifying the cluster chain structure to hide data. CryptFS can quickly hide data file with G bytes size in less than 0.1s. The time used for hiding and recovering data is irrelevant to the size of data file, and the reliability of the hidden file is high, which will not be overlaid by new created file and disk defragment.展开更多
That the world is a global village is no longer news through the tremendous advancement in the Information Communication Technology (ICT). The metamorphosis of the human data storage and analysis from analogue through...That the world is a global village is no longer news through the tremendous advancement in the Information Communication Technology (ICT). The metamorphosis of the human data storage and analysis from analogue through the jaguars-loom mainframe computer to the present modern high power processing computers with sextillion bytes storage capacity has prompted discussion of Big Data concept as a tool in managing hitherto all human challenges of complex human system multiplier effects. The supply chain management (SCM) that deals with spatial service delivery that must be safe, efficient, reliable, cheap, transparent, and foreseeable to meet customers’ needs cannot but employ bid data tools in its operation. This study employs secondary data online to review the importance of big data in supply chain management and the levels of adoption in Nigeria. The study revealed that the application of big data tools in SCM and other industrial sectors is synonymous to human and national development. It is therefore recommended that both private and governmental bodies should key into e-transactions for easy data assemblage and analysis for profitable forecasting and policy formation.展开更多
In this paper we consider sequences of observations that irregularly space at infrequent time in-tervals. We will discuss about one of the most important issues of stochastic processes, named Markov chains. We would r...In this paper we consider sequences of observations that irregularly space at infrequent time in-tervals. We will discuss about one of the most important issues of stochastic processes, named Markov chains. We would reconstruct the collected imperfect data as a Markov chain and obtain an algorithm for finding maximum likelihood estimate of transition matrix. This approach is known as EM algorithm, which includes main optimum advantages among other approaches, and consists of two phases: phase (maximization of target function). Continue the phase E and M to achieve the sequence convergence of matrix. Its limit is the optimal estimator. This algorithm, in contrast with other optimum algorithms which could be used for this purpose, is practicable in maximum likelihood estimate, and unlike to the methods which involve mathematical, is executable by computer. At the end we will survey the theoretical outcomes with numerical computation by using R software.展开更多
目的探讨基于Markov Chain Monte Carlo(MCMC)模型的多重估算法在处理医院调查资料缺失数据中的应用。方法运用SAS9.2编写程序,在分析数据的分布类型和缺失机制的基础上,采用MCMC法对缺失数据进行多次填补和联合统计推断,分析多重估算...目的探讨基于Markov Chain Monte Carlo(MCMC)模型的多重估算法在处理医院调查资料缺失数据中的应用。方法运用SAS9.2编写程序,在分析数据的分布类型和缺失机制的基础上,采用MCMC法对缺失数据进行多次填补和联合统计推断,分析多重估算法的优势。结果数据服从多元正态分布与随机缺失,采用MCMC法填补10次所得的结果最佳。结论多重估算既可反映缺失数据的不确定性,又可充分利用现有资料的信息、提高统计效率、对模型的估计结果更加可信,是处理缺失数据的有效方法。展开更多
Type-I censoring mechanism arises when the number of units experiencing the event is random but the total duration of the study is fixed. There are a number of mathematical approaches developed to handle this type of ...Type-I censoring mechanism arises when the number of units experiencing the event is random but the total duration of the study is fixed. There are a number of mathematical approaches developed to handle this type of data. The purpose of the research was to estimate the three parameters of the Frechet distribution via the frequentist Maximum Likelihood and the Bayesian Estimators. In this paper, the maximum likelihood method (MLE) is not available of the three parameters in the closed forms;therefore, it was solved by the numerical methods. Similarly, the Bayesian estimators are implemented using Jeffreys and gamma priors with two loss functions, which are: squared error loss function and Linear Exponential Loss Function (LINEX). The parameters of the Frechet distribution via Bayesian cannot be obtained analytically and therefore Markov Chain Monte Carlo is used, where the full conditional distribution for the three parameters is obtained via Metropolis-Hastings algorithm. Comparisons of the estimators are obtained using Mean Square Errors (MSE) to determine the best estimator of the three parameters of the Frechet distribution. The results show that the Bayesian estimation under Linear Exponential Loss Function based on Type-I censored data is a better estimator for all the parameter estimates when the value of the loss parameter is positive.展开更多
In this paper, the stabilization problem for a class of networked control systems (NCSs) with data packet dropouts and transmission time delays is considered, where the delays are time-varying and uncertain, the dat...In this paper, the stabilization problem for a class of networked control systems (NCSs) with data packet dropouts and transmission time delays is considered, where the delays are time-varying and uncertain, the data packet dropout is modeled as a two-state Markov chain. To compensate the lost packet, a data packet dropout compensator is established. Thus a more realistic model for such NCSs is presented. Sufficient conditions for the stabilization of the new resulting system are derived in the form of linear matrix inequalities (LMIs). Numerical example illustrates the solvability and effectiveness of the results.展开更多
The industrial supply chain networks basically capture the circulation of social resource, dominating the stability and efficiency of the industrial system. In this paper, we provide an empirical study of the topology...The industrial supply chain networks basically capture the circulation of social resource, dominating the stability and efficiency of the industrial system. In this paper, we provide an empirical study of the topology of smartphone supply chain network. The supply chain network is constructed using open online data. Our experimental results show that the smartphone supply chain network has small-world feature with scale-free degree distribution, in which a few high degree nodes play a key role in the function and can effectively reduce the communication cost. We also detect the community structure to find the basic functional unit. It shows that information communication between nodes is crucial to improve the resource utilization. We should pay attention to the global resource configuration for such electronic production management.展开更多
Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Inf...Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Information Technology (IT) can reduce bullwhip effect by sharing the information among the enterprises in the supply chain.展开更多
基金Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA01Z434)the "Core Electronic Devices, High_End General Chip, and Fundamental Software" Major Project (2013JH00103)
文摘Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To improve the capability of hiding huge data file in disk with high efficiency. In this paper, we propose a novel approach called CryptFS, which is achieved by utilizing the file access mechanism and modifying the cluster chain structure to hide data. CryptFS can quickly hide data file with G bytes size in less than 0.1s. The time used for hiding and recovering data is irrelevant to the size of data file, and the reliability of the hidden file is high, which will not be overlaid by new created file and disk defragment.
文摘That the world is a global village is no longer news through the tremendous advancement in the Information Communication Technology (ICT). The metamorphosis of the human data storage and analysis from analogue through the jaguars-loom mainframe computer to the present modern high power processing computers with sextillion bytes storage capacity has prompted discussion of Big Data concept as a tool in managing hitherto all human challenges of complex human system multiplier effects. The supply chain management (SCM) that deals with spatial service delivery that must be safe, efficient, reliable, cheap, transparent, and foreseeable to meet customers’ needs cannot but employ bid data tools in its operation. This study employs secondary data online to review the importance of big data in supply chain management and the levels of adoption in Nigeria. The study revealed that the application of big data tools in SCM and other industrial sectors is synonymous to human and national development. It is therefore recommended that both private and governmental bodies should key into e-transactions for easy data assemblage and analysis for profitable forecasting and policy formation.
文摘In this paper we consider sequences of observations that irregularly space at infrequent time in-tervals. We will discuss about one of the most important issues of stochastic processes, named Markov chains. We would reconstruct the collected imperfect data as a Markov chain and obtain an algorithm for finding maximum likelihood estimate of transition matrix. This approach is known as EM algorithm, which includes main optimum advantages among other approaches, and consists of two phases: phase (maximization of target function). Continue the phase E and M to achieve the sequence convergence of matrix. Its limit is the optimal estimator. This algorithm, in contrast with other optimum algorithms which could be used for this purpose, is practicable in maximum likelihood estimate, and unlike to the methods which involve mathematical, is executable by computer. At the end we will survey the theoretical outcomes with numerical computation by using R software.
文摘目的探讨基于Markov Chain Monte Carlo(MCMC)模型的多重估算法在处理医院调查资料缺失数据中的应用。方法运用SAS9.2编写程序,在分析数据的分布类型和缺失机制的基础上,采用MCMC法对缺失数据进行多次填补和联合统计推断,分析多重估算法的优势。结果数据服从多元正态分布与随机缺失,采用MCMC法填补10次所得的结果最佳。结论多重估算既可反映缺失数据的不确定性,又可充分利用现有资料的信息、提高统计效率、对模型的估计结果更加可信,是处理缺失数据的有效方法。
文摘Type-I censoring mechanism arises when the number of units experiencing the event is random but the total duration of the study is fixed. There are a number of mathematical approaches developed to handle this type of data. The purpose of the research was to estimate the three parameters of the Frechet distribution via the frequentist Maximum Likelihood and the Bayesian Estimators. In this paper, the maximum likelihood method (MLE) is not available of the three parameters in the closed forms;therefore, it was solved by the numerical methods. Similarly, the Bayesian estimators are implemented using Jeffreys and gamma priors with two loss functions, which are: squared error loss function and Linear Exponential Loss Function (LINEX). The parameters of the Frechet distribution via Bayesian cannot be obtained analytically and therefore Markov Chain Monte Carlo is used, where the full conditional distribution for the three parameters is obtained via Metropolis-Hastings algorithm. Comparisons of the estimators are obtained using Mean Square Errors (MSE) to determine the best estimator of the three parameters of the Frechet distribution. The results show that the Bayesian estimation under Linear Exponential Loss Function based on Type-I censored data is a better estimator for all the parameter estimates when the value of the loss parameter is positive.
基金The work was supported in part by the National Natural Science Foundation of China (No. 60174010, 60404022)the Key Scientific ResearchProject of the Education Ministry (No. 204014)
文摘In this paper, the stabilization problem for a class of networked control systems (NCSs) with data packet dropouts and transmission time delays is considered, where the delays are time-varying and uncertain, the data packet dropout is modeled as a two-state Markov chain. To compensate the lost packet, a data packet dropout compensator is established. Thus a more realistic model for such NCSs is presented. Sufficient conditions for the stabilization of the new resulting system are derived in the form of linear matrix inequalities (LMIs). Numerical example illustrates the solvability and effectiveness of the results.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11547040 and 61703281)Guangdong Province Natural Science Foundation,China(Grant Nos.2016A030310051 and 2015KONCX143)+4 种基金Shenzhen Fundamental Research Foundation,China(Grant Nos.JCYJ20150625101524056 and JCYJ20160520162743717)SZU Student Innovation Fund,China,the PhD Start-up Fund of Natural Science Foundation of Guangdong Province,China(Grant No.2017A030310374)the Young Teachers Start-up Fund of Natural Science Foundation of Shenzhen University,Chinathe Natural Science Foundation of SZU,China(Grant No.2016-24)the Singapore Ministry of Education Academic Research Fund Tier 2(Grant No.MOE 2013-T2-2-033)
文摘The industrial supply chain networks basically capture the circulation of social resource, dominating the stability and efficiency of the industrial system. In this paper, we provide an empirical study of the topology of smartphone supply chain network. The supply chain network is constructed using open online data. Our experimental results show that the smartphone supply chain network has small-world feature with scale-free degree distribution, in which a few high degree nodes play a key role in the function and can effectively reduce the communication cost. We also detect the community structure to find the basic functional unit. It shows that information communication between nodes is crucial to improve the resource utilization. We should pay attention to the global resource configuration for such electronic production management.
文摘Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Information Technology (IT) can reduce bullwhip effect by sharing the information among the enterprises in the supply chain.