Individuals with special needs learn more slowly than their peers and they need repetitions to be permanent.However,in crowded classrooms,it is dif-ficult for a teacher to deal with each student individually.This probl...Individuals with special needs learn more slowly than their peers and they need repetitions to be permanent.However,in crowded classrooms,it is dif-ficult for a teacher to deal with each student individually.This problem can be overcome by using supportive education applications.However,the majority of such applications are not designed for special education and therefore they are not efficient as expected.Special education students differ from their peers in terms of their development,characteristics,and educational qualifications.The handwriting skills of individuals with special needs are lower than their peers.This makes the task of Handwriting Recognition(HWR)more difficult.To over-come this problem,we propose a new personalized handwriting verification sys-tem that validates digits from the handwriting of special education students.The system uses a Convolutional Neural Network(CNN)created and trained from scratch.The data set used is obtained by collecting the handwriting of the students with the help of a tablet.A special education center is visited and the handwrittenfigures of the students are collected under the supervision of special education tea-chers.The system is designed as a person-dependent system as every student has their writing style.Overall,the system achieves promising results,reaching a recognition accuracy of about 94%.Overall,the system can verify special educa-tion students’handwriting digits with high accuracy and is ready to integrate with a mobile application that is designed to teach digits to special education students.展开更多
In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered with.Therefore,maintaining data security is one of the most i...In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered with.Therefore,maintaining data security is one of the most important issues in network data communication.Because the timestamp is the most impor-tant way to authenticate data in information interaction,it is very necessary to pro-vide timestamp service in the data communication system.However,the existing centralized timestamp mechanism is difficult to provide credible timestamp ser-vice,and users can conspire with timestamping servers to forge timestamps.Therefore,this paper designs a distributed timestamp mechanism based on contin-uous verifiable delay functions.It utilizes multiple independent timestamp servers to provide timestamp services in a distributed model and appends the timestamp to the data once the data is generated.Thus,it can prove that the data already exists at a certain time and ensure the accuracy of the timestamp.Moreover,a digital blind signature based on elliptic curve cryptography is utilized to solve the problem of timestamp forgery in timestamp service.Finally,the security ana-lysis of the scheme ensures the data security of data communication system and the concurrency rate of timestamp.The experimental results also show that the scheme greatly improves the efficiency of digital signatures.展开更多
Held every four years,the International Workshop on Tropical Cyclone(IWTC)organized by the World Meteorological Organization has been a global leading conference in thefield of tropical cyclone.In preparation for the 1...Held every four years,the International Workshop on Tropical Cyclone(IWTC)organized by the World Meteorological Organization has been a global leading conference in thefield of tropical cyclone.In preparation for the 10th IWTC(IWTC-10)in December 2022,a summary of research advances of landfalling tropical cyclone(LTC)rainfall during past four years of 2019–2022 has been prepared.Some of the latest research advances has been summarized in Lamers et al.(2023),which reviewed the latest forecast and disaster prevention methods related to TC precipitation.As a supplement,this article mainly focuses on the recent advances in LTC asymmetric rainfall evolution mechanisms and forecast verification results over China.Some newfindings have been made in the LTC inner-core size relationship with the asymmetric rainfall distri-bution.Some major advances focused on asymmetric microphysical characteristics in the TC rainbands.Current simulation and forecast per-formances of LTC precipitation have been analyzed,and different forecast error sources for rainfall during different landfall stages of TC were compared.To estimate the risk of TC rainfall hazards in China,a parameterized Tropical Cyclone Precipitation Model was reviewed as well in this article.展开更多
目的探究二妙玄府方联合三黄散外敷治疗急性痛风性关节炎(AGA)患者临床疗效及对外周血Beclin-1、超长链脂肪酸延伸酶6(ELOVL6)的影响。方法选取2022年6月-2023年12月甘肃酒泉市人民医院收治的116例AGA患者作为研究对象,按照随机数字表...目的探究二妙玄府方联合三黄散外敷治疗急性痛风性关节炎(AGA)患者临床疗效及对外周血Beclin-1、超长链脂肪酸延伸酶6(ELOVL6)的影响。方法选取2022年6月-2023年12月甘肃酒泉市人民医院收治的116例AGA患者作为研究对象,按照随机数字表法分为常规组(58例)和中西联合组(58例),常规组接受常规西医治疗,中西联合组在常规组的基础上加用二妙玄府方联合三黄散外敷治疗。比较两组患者临床疗效、中医症状积分,治疗前后关节疼痛视觉模拟评分(VAS)、血尿酸(BUA)、24 h尿酸排出量(24 h UUA)、外周血Beclin-1、ELOVL6、血清炎症因子[白细胞介素-6(IL-6)、肿瘤坏死因子-α(TNF-α)、C反应蛋白(CRP)]及不良反应。结果中西联合组治疗总有效率[93.10%(54/58)vs 79.31%(46/58)]高于常规组(P<0.05);治疗后,两组关节红肿、热痛、屈曲受限、发热口渴、口苦口黏评分均下降(P<0.05),且治疗后中西联合组低于常规组(P<0.05);治疗后,两组VAS评分均下降(P<0.05),且治疗后中西联合组低于常规组(P<0.05);治疗后,两组BUA均下降(P<0.05),24 h UUA均升高(P<0.05),且治疗后组间比较差异具有统计学意义(P<0.05);治疗后,两组Beclin-1、ELOVL6均升高(P<0.05),且治疗后中西联合组高于常规组(P<0.05);治疗后,两组IL-6、CRP、TNF-α均下降(P<0.05),且治疗后中西联合组低于常规组(P<0.05);两组患者试验期间均未见严重恶心呕吐、胃痛、头晕、腹泻等不良反应。结论二妙玄府方联合三黄散外敷治疗AGA临床效果显著,可较好抑制机体炎症反应,缓解疾病进程,且安全可靠。展开更多
A program construction method based on Gamma language is proposed. The problemto be solved is specified by first-order predicate logic and a semantic verification program isconstructed directly from the specification....A program construction method based on Gamma language is proposed. The problemto be solved is specified by first-order predicate logic and a semantic verification program isconstructed directly from the specification. Ways for improving efficiency of the program arealso studied. The method differs from the one proposed by Manna and Waldinger, where aprogram is extracted from the proof of the existence of an object meeting the given specification.On the other hand, it also differs from the classical one used for deriving Gamma programsof Banatre and Le Metayer, which consists in decomposing the specification into an invariantand a termination condition.展开更多
文摘Individuals with special needs learn more slowly than their peers and they need repetitions to be permanent.However,in crowded classrooms,it is dif-ficult for a teacher to deal with each student individually.This problem can be overcome by using supportive education applications.However,the majority of such applications are not designed for special education and therefore they are not efficient as expected.Special education students differ from their peers in terms of their development,characteristics,and educational qualifications.The handwriting skills of individuals with special needs are lower than their peers.This makes the task of Handwriting Recognition(HWR)more difficult.To over-come this problem,we propose a new personalized handwriting verification sys-tem that validates digits from the handwriting of special education students.The system uses a Convolutional Neural Network(CNN)created and trained from scratch.The data set used is obtained by collecting the handwriting of the students with the help of a tablet.A special education center is visited and the handwrittenfigures of the students are collected under the supervision of special education tea-chers.The system is designed as a person-dependent system as every student has their writing style.Overall,the system achieves promising results,reaching a recognition accuracy of about 94%.Overall,the system can verify special educa-tion students’handwriting digits with high accuracy and is ready to integrate with a mobile application that is designed to teach digits to special education students.
基金supported by National Key R&D Program of China(Grant Nos.2021YF B2700503,2020YF B1005900)supported by the National Natural Science Foundation of China(No.62072249)。
文摘In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered with.Therefore,maintaining data security is one of the most important issues in network data communication.Because the timestamp is the most impor-tant way to authenticate data in information interaction,it is very necessary to pro-vide timestamp service in the data communication system.However,the existing centralized timestamp mechanism is difficult to provide credible timestamp ser-vice,and users can conspire with timestamping servers to forge timestamps.Therefore,this paper designs a distributed timestamp mechanism based on contin-uous verifiable delay functions.It utilizes multiple independent timestamp servers to provide timestamp services in a distributed model and appends the timestamp to the data once the data is generated.Thus,it can prove that the data already exists at a certain time and ensure the accuracy of the timestamp.Moreover,a digital blind signature based on elliptic curve cryptography is utilized to solve the problem of timestamp forgery in timestamp service.Finally,the security ana-lysis of the scheme ensures the data security of data communication system and the concurrency rate of timestamp.The experimental results also show that the scheme greatly improves the efficiency of digital signatures.
基金supported by the National Natural Science Foundation of China (U2142206)National Key Research and Development Program of China (2021YFC3000804)+2 种基金Ningbo Key R&D Program (2023Z139)Scientific Research Program of Shanghai Science and Technology Commission (23DZ1204701)CMA Innovation and Development Project (CXFZ2023J015).
文摘Held every four years,the International Workshop on Tropical Cyclone(IWTC)organized by the World Meteorological Organization has been a global leading conference in thefield of tropical cyclone.In preparation for the 10th IWTC(IWTC-10)in December 2022,a summary of research advances of landfalling tropical cyclone(LTC)rainfall during past four years of 2019–2022 has been prepared.Some of the latest research advances has been summarized in Lamers et al.(2023),which reviewed the latest forecast and disaster prevention methods related to TC precipitation.As a supplement,this article mainly focuses on the recent advances in LTC asymmetric rainfall evolution mechanisms and forecast verification results over China.Some newfindings have been made in the LTC inner-core size relationship with the asymmetric rainfall distri-bution.Some major advances focused on asymmetric microphysical characteristics in the TC rainbands.Current simulation and forecast per-formances of LTC precipitation have been analyzed,and different forecast error sources for rainfall during different landfall stages of TC were compared.To estimate the risk of TC rainfall hazards in China,a parameterized Tropical Cyclone Precipitation Model was reviewed as well in this article.
文摘目的探究二妙玄府方联合三黄散外敷治疗急性痛风性关节炎(AGA)患者临床疗效及对外周血Beclin-1、超长链脂肪酸延伸酶6(ELOVL6)的影响。方法选取2022年6月-2023年12月甘肃酒泉市人民医院收治的116例AGA患者作为研究对象,按照随机数字表法分为常规组(58例)和中西联合组(58例),常规组接受常规西医治疗,中西联合组在常规组的基础上加用二妙玄府方联合三黄散外敷治疗。比较两组患者临床疗效、中医症状积分,治疗前后关节疼痛视觉模拟评分(VAS)、血尿酸(BUA)、24 h尿酸排出量(24 h UUA)、外周血Beclin-1、ELOVL6、血清炎症因子[白细胞介素-6(IL-6)、肿瘤坏死因子-α(TNF-α)、C反应蛋白(CRP)]及不良反应。结果中西联合组治疗总有效率[93.10%(54/58)vs 79.31%(46/58)]高于常规组(P<0.05);治疗后,两组关节红肿、热痛、屈曲受限、发热口渴、口苦口黏评分均下降(P<0.05),且治疗后中西联合组低于常规组(P<0.05);治疗后,两组VAS评分均下降(P<0.05),且治疗后中西联合组低于常规组(P<0.05);治疗后,两组BUA均下降(P<0.05),24 h UUA均升高(P<0.05),且治疗后组间比较差异具有统计学意义(P<0.05);治疗后,两组Beclin-1、ELOVL6均升高(P<0.05),且治疗后中西联合组高于常规组(P<0.05);治疗后,两组IL-6、CRP、TNF-α均下降(P<0.05),且治疗后中西联合组低于常规组(P<0.05);两组患者试验期间均未见严重恶心呕吐、胃痛、头晕、腹泻等不良反应。结论二妙玄府方联合三黄散外敷治疗AGA临床效果显著,可较好抑制机体炎症反应,缓解疾病进程,且安全可靠。
文摘A program construction method based on Gamma language is proposed. The problemto be solved is specified by first-order predicate logic and a semantic verification program isconstructed directly from the specification. Ways for improving efficiency of the program arealso studied. The method differs from the one proposed by Manna and Waldinger, where aprogram is extracted from the proof of the existence of an object meeting the given specification.On the other hand, it also differs from the classical one used for deriving Gamma programsof Banatre and Le Metayer, which consists in decomposing the specification into an invariantand a termination condition.