Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility o...Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility of EMS has received considerable attention in health and transport geography studies.^([3])One of the optimal gauges for evaluating the accessibility of EMS is the response time,which is defined as the time from receiving an emergency call to the arrival of an ambulance.^([4])Beijing has already reduced the response time to approximately12 min,and the next goal is to ensure that the response time across Beijing does not exceed 12 min (the information comes from the Beijing Emergency Medical Center).展开更多
Due to the complexity of soil-structure interaction, simple constitutive models typically used for interface elements in general computer programs cannot satisfy the requirements of discontinuous deformation analysis ...Due to the complexity of soil-structure interaction, simple constitutive models typically used for interface elements in general computer programs cannot satisfy the requirements of discontinuous deformation analysis of structures that contain different interfaces. In order to simulate the strain-softening characteristics of interfaces, a nonlinear strain-softening interface constitutive model was incorporated into fast Lagrange analysis of continua in three dimensions (FLAC3D) through a user-defined program in the FISH environment. A numerical simulation of a direct shear test for geosynthetic interfaces was conducted to verify that the interface model was implemented correctly. Results of the numerical tests show good agreement with the results obtained from theoretical calculations, indicating that the model incorporated into FLAC3D can simulate the nonlinear strain-softening behavior of interfaces involving geosynthetic materials. The results confirmed the validity and reliability of the improved interface model. The procedure and method of implementing an interface constitutive model into a commercial computer program also provide a reference for implementation of a new interface constitutive model in FLAC3D.展开更多
Assembling paradigms programming are based on the reuses in any programming language (PL) with the passport data of their settings in WSDL. The method of assembling is formal and secures co-operation of the different ...Assembling paradigms programming are based on the reuses in any programming language (PL) with the passport data of their settings in WSDL. The method of assembling is formal and secures co-operation of the different reuses (module, object, component, service and so on) being developed. A formal means of these paradigms creation with help of interfaces is presented. Interface IDL (Stub, Skeleton) is containing data and operations for transmission data to other standard elements linked and describes in the standard language IDL. Assembling will be realized by integration of reuses elements in these paradigms on the instrumental-technological complex (ITC).展开更多
The emergence of software-defined vehicles(SDVs),combined with autonomous driving technologies,has en-abled a new era of vehicle computing(VC),where vehicles serve as a mobile computing platform.However,the interdisci...The emergence of software-defined vehicles(SDVs),combined with autonomous driving technologies,has en-abled a new era of vehicle computing(VC),where vehicles serve as a mobile computing platform.However,the interdisci-plinary complexities of automotive systems and diverse technological requirements make developing applications for au-tonomous vehicles challenging.To simplify the development of applications running on SDVs,we propose a comprehen-sive suite of vehicle programming interfaces(VPIs).In this study,we rigorously explore the nuanced requirements for ap-plication development within the realm of VC,centering our analysis on the architectural intricacies of the Open Vehicu-lar Data Analytics Platform(OpenVDAP).We then detail our creation of a comprehensive suite of standardized VPIs,spanning five critical categories:Hardware,Data,Computation,Service,and Management,to address these evolving pro-gramming requirements.To validate the design of VPIs,we conduct experiments using the indoor autonomous vehicle,Ze-bra,and develop the OpenVDAP prototype system.By comparing it with the industry-influential AUTOSAR interface,our VPIs demonstrate significant enhancements in programming efficiency,marking an important advancement in the field of SDV application development.We also show a case study and evaluate its performance.Our work highlights that VPIs significantly enhance the efficiency of developing applications on VC.They meet both current and future technologi-cal demands and propel the software-defined automotive industry toward a more interconnected and intelligent future.展开更多
在万物互联的云时代,云应用程序编程接口(API)是数字经济建设和服务化软件开发的关键数字基础设施。然而,云API数量的持续增长给用户决策和推广带来挑战,设计有效的推荐方法成为亟待解决的重要问题。现有研究多利用调用偏好、搜索关键...在万物互联的云时代,云应用程序编程接口(API)是数字经济建设和服务化软件开发的关键数字基础设施。然而,云API数量的持续增长给用户决策和推广带来挑战,设计有效的推荐方法成为亟待解决的重要问题。现有研究多利用调用偏好、搜索关键词或二者结合进行建模,主要解决为给定Mashup推荐合适云API的问题,未考虑开发者对个性化高阶互补云API的实际需求。该文提出一种基于个性化张量分解的高阶互补云API推荐方法(Personalized Tensor Decomposition based High-order Complementary cloud API Recommendation,PTDHCR)。首先,将Mashup与云API之间的调用关系,以及云API与云API之间的互补关系建模为三维张量,并利用RECAL张量分解技术对这两种关系进行共同学习,以挖掘云API之间的个性化非对称互补关系。然后,考虑到不同互补关系对推荐结果的影响程度不同,构建个性化高阶互补感知网络,充分利用Mashup、查询云API以及候选云API的多模态特征,动态计算Mashup对不同查询和候选云API之间互补关系的关注程度。在此基础上,将个性化互补关系拓展到高阶,得到候选云API与查询云API集合的整体个性化互补性。最后,利用两个真实云API数据集进行实验,结果表明,相较于传统方法,PTDHCR在挖掘个性化互补关系和推荐方面具有较大的优势。展开更多
Ransomware,particularly crypto-ransomware,remains a significant cybersecurity challenge,encrypting victim data and demanding a ransom,often leaving the data irretrievable even if payment is made.This study proposes an...Ransomware,particularly crypto-ransomware,remains a significant cybersecurity challenge,encrypting victim data and demanding a ransom,often leaving the data irretrievable even if payment is made.This study proposes an early detection approach to mitigate such threats by identifying ransomware activity before the encryption process begins.The approach employs a two-tiered approach:a signature-based method using hashing techniques to match known threats and a dynamic behavior-based analysis leveraging Cuckoo Sandbox and machine learning algorithms.A critical feature is the integration of the most effective Application Programming Interface call monitoring,which analyzes system-level interactions such as file encryption,key generation,and registry modifications.This enables the detection of both known and zero-day ransomware variants,overcoming limitations of traditional methods.The proposed technique was evaluated using classifiers such as Random Forest,Support Vector Machine,and K-Nearest Neighbors,achieving a detection accuracy of 98%based on 26 key ransomware attributes with an 80:20 training-to-testing ratio and 10-fold cross-validation.By combining minimal feature sets with robust behavioral analysis,the proposed method outperforms existing solutions and addresses current challenges in ransomware detection,thereby enhancing cybersecurity resilience.展开更多
In a crumbling tech hub near the marginal coastline,young Angolan developers,despite the challenges of unreliable Internet and dependence on foreign APIs(application programming interfaces),are tapping on donated lapt...In a crumbling tech hub near the marginal coastline,young Angolan developers,despite the challenges of unreliable Internet and dependence on foreign APIs(application programming interfaces),are tapping on donated laptops,debugging health apps that alert rural clinics of disease outbreaks.Their resilience and determination in the face of such obstacles are not just a source of innovation,but also of inspiration and hope.展开更多
基金supported by National Key Research & Development Program of China (2022YFC3006201)。
文摘Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility of EMS has received considerable attention in health and transport geography studies.^([3])One of the optimal gauges for evaluating the accessibility of EMS is the response time,which is defined as the time from receiving an emergency call to the arrival of an ambulance.^([4])Beijing has already reduced the response time to approximately12 min,and the next goal is to ensure that the response time across Beijing does not exceed 12 min (the information comes from the Beijing Emergency Medical Center).
基金supported by the National Natural Science Foundation of China (Grant No.51079047)
文摘Due to the complexity of soil-structure interaction, simple constitutive models typically used for interface elements in general computer programs cannot satisfy the requirements of discontinuous deformation analysis of structures that contain different interfaces. In order to simulate the strain-softening characteristics of interfaces, a nonlinear strain-softening interface constitutive model was incorporated into fast Lagrange analysis of continua in three dimensions (FLAC3D) through a user-defined program in the FISH environment. A numerical simulation of a direct shear test for geosynthetic interfaces was conducted to verify that the interface model was implemented correctly. Results of the numerical tests show good agreement with the results obtained from theoretical calculations, indicating that the model incorporated into FLAC3D can simulate the nonlinear strain-softening behavior of interfaces involving geosynthetic materials. The results confirmed the validity and reliability of the improved interface model. The procedure and method of implementing an interface constitutive model into a commercial computer program also provide a reference for implementation of a new interface constitutive model in FLAC3D.
文摘Assembling paradigms programming are based on the reuses in any programming language (PL) with the passport data of their settings in WSDL. The method of assembling is formal and secures co-operation of the different reuses (module, object, component, service and so on) being developed. A formal means of these paradigms creation with help of interfaces is presented. Interface IDL (Stub, Skeleton) is containing data and operations for transmission data to other standard elements linked and describes in the standard language IDL. Assembling will be realized by integration of reuses elements in these paradigms on the instrumental-technological complex (ITC).
基金Bao-Fu Wu,Jian Wan,and Ji-Lin Zhang were supported by the National Natural Science Foundation of China under Grant No.62072146the Key Research and Development Program of Zhejiang Province of China under Grant Nos.2023C03194,2021C03187,and 2023C01044the National Natural Science Foundation of China(Youth Fund)under Grant No.62302133.
文摘The emergence of software-defined vehicles(SDVs),combined with autonomous driving technologies,has en-abled a new era of vehicle computing(VC),where vehicles serve as a mobile computing platform.However,the interdisci-plinary complexities of automotive systems and diverse technological requirements make developing applications for au-tonomous vehicles challenging.To simplify the development of applications running on SDVs,we propose a comprehen-sive suite of vehicle programming interfaces(VPIs).In this study,we rigorously explore the nuanced requirements for ap-plication development within the realm of VC,centering our analysis on the architectural intricacies of the Open Vehicu-lar Data Analytics Platform(OpenVDAP).We then detail our creation of a comprehensive suite of standardized VPIs,spanning five critical categories:Hardware,Data,Computation,Service,and Management,to address these evolving pro-gramming requirements.To validate the design of VPIs,we conduct experiments using the indoor autonomous vehicle,Ze-bra,and develop the OpenVDAP prototype system.By comparing it with the industry-influential AUTOSAR interface,our VPIs demonstrate significant enhancements in programming efficiency,marking an important advancement in the field of SDV application development.We also show a case study and evaluate its performance.Our work highlights that VPIs significantly enhance the efficiency of developing applications on VC.They meet both current and future technologi-cal demands and propel the software-defined automotive industry toward a more interconnected and intelligent future.
文摘在万物互联的云时代,云应用程序编程接口(API)是数字经济建设和服务化软件开发的关键数字基础设施。然而,云API数量的持续增长给用户决策和推广带来挑战,设计有效的推荐方法成为亟待解决的重要问题。现有研究多利用调用偏好、搜索关键词或二者结合进行建模,主要解决为给定Mashup推荐合适云API的问题,未考虑开发者对个性化高阶互补云API的实际需求。该文提出一种基于个性化张量分解的高阶互补云API推荐方法(Personalized Tensor Decomposition based High-order Complementary cloud API Recommendation,PTDHCR)。首先,将Mashup与云API之间的调用关系,以及云API与云API之间的互补关系建模为三维张量,并利用RECAL张量分解技术对这两种关系进行共同学习,以挖掘云API之间的个性化非对称互补关系。然后,考虑到不同互补关系对推荐结果的影响程度不同,构建个性化高阶互补感知网络,充分利用Mashup、查询云API以及候选云API的多模态特征,动态计算Mashup对不同查询和候选云API之间互补关系的关注程度。在此基础上,将个性化互补关系拓展到高阶,得到候选云API与查询云API集合的整体个性化互补性。最后,利用两个真实云API数据集进行实验,结果表明,相较于传统方法,PTDHCR在挖掘个性化互补关系和推荐方面具有较大的优势。
基金funded by the National University of Sciences and Technology(NUST)supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF),funded by the Ministry of Education(2021R1IIA3049788).
文摘Ransomware,particularly crypto-ransomware,remains a significant cybersecurity challenge,encrypting victim data and demanding a ransom,often leaving the data irretrievable even if payment is made.This study proposes an early detection approach to mitigate such threats by identifying ransomware activity before the encryption process begins.The approach employs a two-tiered approach:a signature-based method using hashing techniques to match known threats and a dynamic behavior-based analysis leveraging Cuckoo Sandbox and machine learning algorithms.A critical feature is the integration of the most effective Application Programming Interface call monitoring,which analyzes system-level interactions such as file encryption,key generation,and registry modifications.This enables the detection of both known and zero-day ransomware variants,overcoming limitations of traditional methods.The proposed technique was evaluated using classifiers such as Random Forest,Support Vector Machine,and K-Nearest Neighbors,achieving a detection accuracy of 98%based on 26 key ransomware attributes with an 80:20 training-to-testing ratio and 10-fold cross-validation.By combining minimal feature sets with robust behavioral analysis,the proposed method outperforms existing solutions and addresses current challenges in ransomware detection,thereby enhancing cybersecurity resilience.
文摘In a crumbling tech hub near the marginal coastline,young Angolan developers,despite the challenges of unreliable Internet and dependence on foreign APIs(application programming interfaces),are tapping on donated laptops,debugging health apps that alert rural clinics of disease outbreaks.Their resilience and determination in the face of such obstacles are not just a source of innovation,but also of inspiration and hope.