Health information spreads rapidly,which can effectively control epidemics.However,the swift dissemination of information also has potential negative impacts,which increasingly attracts attention.Message fatigue refer...Health information spreads rapidly,which can effectively control epidemics.However,the swift dissemination of information also has potential negative impacts,which increasingly attracts attention.Message fatigue refers to the psychological response characterized by feelings of boredom and anxiety that occur after receiving an excessive amount of similar information.This phenomenon can alter individual behaviors related to epidemic prevention.Additionally,recent studies indicate that pairwise interactions alone are insufficient to describe complex social transmission processes,and higher-order structures representing group interactions are crucial.To address this,we develop a novel epidemic model that investigates the interactions between information,behavioral responses,and epidemics.Our model incorporates the impact of message fatigue on the entire transmission system.The information layer is modeled using a static simplicial network to capture group interactions,while the disease layer uses a time-varying network based on activity-driven model with attractiveness to represent the self-protection behaviors of susceptible individuals and self-isolation behaviors of infected individuals.We theoretically describe the co-evolution equations using the microscopic Markov chain approach(MMCA)and get the epidemic threshold.Experimental results show that while the negative impact of message fatigue on epidemic transmission is limited,it significantly weakens the group interactions depicted by higher-order structures.Individual behavioral responses strongly inhibit the epidemic.Our simulations using the Monte Carlo(MC)method demonstrate that greater intensity in these responses leads to clustering of susceptible individuals in the disease layer.Finally,we apply the proposed model to real networks to verify its reliability.In summary,our research results enhance the understanding of the information-epidemic coupling dynamics,and we expect to provide valuable guidance for managing future emerging epidemics.展开更多
The China-ASEAN Expo(CAEXPO),held annually in Nanning City of Guangxi Zhuang Autonomous Region since 2004,has become a pivotal platform for economic and trade exchange between China,Vietnam,and other ASEAN member stat...The China-ASEAN Expo(CAEXPO),held annually in Nanning City of Guangxi Zhuang Autonomous Region since 2004,has become a pivotal platform for economic and trade exchange between China,Vietnam,and other ASEAN member states.Over the years,CAEXPO has proven to be a highly effective mechanism for fostering international cooperation,playing a vital role in establishing ASEAN as China’s largest trading partner and positioning China as the foremost trade partner of many ASEAN countries,including Vietnam.展开更多
In this paper,we focus on the channel estimation for multi-user MIMO-OFDM systems in rich scattering environments.We find that channel sparsity in the delay-angle domain is severely compromised in rich scattering envi...In this paper,we focus on the channel estimation for multi-user MIMO-OFDM systems in rich scattering environments.We find that channel sparsity in the delay-angle domain is severely compromised in rich scattering environments,so that most existing compressed sensing(CS)based techniques can harvest a very limited gain(if any)in reducing the channel estimation overhead.To address the problem,we propose the learning-based turbo message passing(LTMP)algorithm.Instead of exploiting the channel sparsity,LTMP is able to efficiently extract the channel feature via deep learning as well as to exploit the channel continuity in the frequency domain via block-wise linear modelling.More specifically,as a component of LTMP,we develop a multi-scale parallel dilated convolutional neural network(MPDCNN),which leverages frequency-space channel correlation in different scales for channel denoising.We evaluate the LTMP’s performance in MIMO-OFDM channels using the 3rd generation partnership project(3GPP)clustered delay line(CDL)channel models.Simulation results show that the proposed channel estimation method has more than 5 dB power gain than the existing algorithms when the normalized mean-square error of the channel estimation is-20 dB.The proposed algorithm also exhibits strong robustness in various environments.展开更多
The Cyber-Physical Systems (CPS) supported by Wireless Sensor Networks (WSN) helps factories collect data and achieve seamless communication between physical and virtual components. Sensor nodes are energy-constrained...The Cyber-Physical Systems (CPS) supported by Wireless Sensor Networks (WSN) helps factories collect data and achieve seamless communication between physical and virtual components. Sensor nodes are energy-constrained devices. Their energy consumption is typically correlated with the amount of data collection. The purpose of data aggregation is to reduce data transmission, lower energy consumption, and reduce network congestion. For large-scale WSN, data aggregation can greatly improve network efficiency. However, as many heterogeneous data is poured into a specific area at the same time, it sometimes causes data loss and then results in incompleteness and irregularity of production data. This paper proposes an information processing model that encompasses the Energy-Conserving Data Aggregation Algorithm (ECDA) and the Efficient Message Reception Algorithm (EMRA). ECDA is divided into two stages, Energy conservation based on the global cost and Data aggregation based on ant colony optimization. The EMRA comprises the Polling Message Reception Algorithm (PMRA), the Shortest Time Message Reception Algorithm (STMRA), and the Specific Condition Message Reception Algorithm (SCMRA). These algorithms are not only available for the regularity and directionality of sensor information transmission, but also satisfy the different requirements in small factory environments. To compare with the recent HPSO-ILEACH and E-PEGASIS, DCDA can effectively reduce energy consumption. Experimental results show that STMRA consumes 1.3 times the time of SCMRA. Both optimization algorithms exhibit higher time efficiency than PMRA. Furthermore, this paper also evaluates these three algorithms using AHP.展开更多
The development of deep learning has made non-biochemical methods for molecular property prediction screening a reality,which can increase the experimental speed and reduce the experimental cost of relevant experiment...The development of deep learning has made non-biochemical methods for molecular property prediction screening a reality,which can increase the experimental speed and reduce the experimental cost of relevant experiments.There are currently two main approaches to representing molecules:(a)representing molecules by fixing molecular descriptors,and(b)representing molecules by graph convolutional neural networks.Currently,both of these Representative methods have achieved some results in their respective experiments.Based on past efforts,we propose a Dual Self-attention Fusion Message Neural Network(DSFMNN).DSFMNN uses a combination of dual self-attention mechanism and graph convolutional neural network.Advantages of DSFMNN:(1)The dual self-attention mechanism focuses not only on the relationship between individual subunits in a molecule but also on the relationship between the atoms and chemical bonds contained in each subunit.(2)On the directed molecular graph,a message delivery approach centered on directed molecular bonds is used.We test the performance of the model on eight publicly available datasets and compare the performance with several models.Based on the current experimental results,DSFMNN has superior performance compared to previous models on the datasets applied in this paper.展开更多
If 2024 has taught me anything,it’s that digital is an irrefutable force for unity—a much-needed catalyst for global cooperation in an increasingly fragmented world.This truth has been on display all year long,somet...If 2024 has taught me anything,it’s that digital is an irrefutable force for unity—a much-needed catalyst for global cooperation in an increasingly fragmented world.This truth has been on display all year long,sometimes against the odds.And it’s evident in the adoption of the Pact for the Future and Global Digital Compact at the United Nations General Assembly,in the outcomes of the World Telecommunication Standardization Assembly(WTSA-24),and in the wide endorsement of the COP29 Declaration on Green Digital Action.展开更多
An improved Gaussian mixture model (GMM)- based clustering method is proposed for the difficult case where the true distribution of data is against the assumed GMM. First, an improved model selection criterion, the ...An improved Gaussian mixture model (GMM)- based clustering method is proposed for the difficult case where the true distribution of data is against the assumed GMM. First, an improved model selection criterion, the completed likelihood minimum message length criterion, is derived. It can measure both the goodness-of-fit of the candidate GMM to the data and the goodness-of-partition of the data. Secondly, by utilizing the proposed criterion as the clustering objective function, an improved expectation- maximization (EM) algorithm is developed, which can avoid poor local optimal solutions compared to the standard EM algorithm for estimating the model parameters. The experimental results demonstrate that the proposed method can rectify the over-fitting tendency of representative GMM-based clustering approaches and can robustly provide more accurate clustering results.展开更多
Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by ap...Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by applying the stylistic theory and employing the "Model of Analyzing Textual Function". The features of the two styles of messages are described and analyzed from the perspectives of their pronunciation, graphology, vocabulary, grammar, discourse, rhetoric, etc., and the stylistic features serve as the basis for discussing the translation principles and methods of English short messages.展开更多
Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here...Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here is spoofing attacks.Spoofing attacks make the positioning or timing results of BeiDou civilian receivers wrong.Such errors may cause a series of security problems,which lays a serious hidden danger for Bei-Dou satellite information security.This article proposes an anti-spoofing method for BeiDou navigation system based on the combination of SM commercial cryptographic algorithm and Timed Efficient Stream Loss-tolerant Authentication(TESLA)for spoofing attacks.In this solution,we use the SM3 algorithm to generate a TESLA key chain with time information,and then use the key in the key chain to generate the message authentication code for the BeiDou D2 navigation message.The message authentication code is inserted into a reserved bit of the D2 navigation message.In addition,this solution uses the SM2 algorithm to protect and encrypt time information in the TESLA key chain to prevent key replay attacks in TESLA.The experimental results tested on the experimental platform built in this paper show that this scheme reduces the possibility of the BeiDou navigation system being deceived and enhances the safety of the BeiDou navigation system.展开更多
Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protoc...Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange.展开更多
Message passing algorithms,whose iterative nature captures complicated interactions among interconnected variables in complex systems and extracts information from the fixed point of iterated messages,provide a powerf...Message passing algorithms,whose iterative nature captures complicated interactions among interconnected variables in complex systems and extracts information from the fixed point of iterated messages,provide a powerful toolkit in tackling hard computational tasks in optimization,inference,and learning problems.In the context of constraint satisfaction problems(CSPs),when a control parameter(such as constraint density)is tuned,multiple threshold phenomena emerge,signaling fundamental structural transitions in their solution space.Finding solutions around these transition points is exceedingly challenging for algorithm design,where message passing algorithms suffer from a large message fiuctuation far from convergence.Here we introduce a residual-based updating step into message passing algorithms,in which messages with large variation between consecutive steps are given high priority in the updating process.For the specific example of model RB(revised B),a typical prototype of random CSPs with growing domains,we show that our algorithm improves the convergence of message updating and increases the success probability in finding solutions around the satisfiability threshold with a low computational cost.Our approach to message passing algorithms should be of value for exploring their power in developing algorithms to find ground-state solutions and understand the detailed structure of solution space of hard optimization problems.展开更多
In order to meet the needs of Agricultural Meteorology business and research,an edition system of agricultural meteorology short message was established based on the Microsoft Access 2000 database and visualization de...In order to meet the needs of Agricultural Meteorology business and research,an edition system of agricultural meteorology short message was established based on the Microsoft Access 2000 database and visualization developing software Visual Basic 6.0 in Liaoning Province.The basic principles of agro-meteorological text editing and system optimization ideas were pointed out.The meteorological conditions of the main crops growth needed in material library were introduced.展开更多
Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step ...Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step in such a development, we have implemented a remote monitoring system of unitary air conditioners, using the manufacturing message specification (MMS). MMS is an OSI application protocol designed for the remote control and monitoring of real devices. The functions supported are those that an operator would do normally at the console of the unitary air conditioner. Due to the accomplishment of UMCS (Unitary air conditioner MMS Control System), there will be a leap of the application of MMS and the control technology of unitary air conditioner.展开更多
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s...Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.展开更多
The orthogonal time frequency space(OTFS)modulation has emerged as a promis⁃ing modulation scheme for wireless communications in high-mobility scenarios.An efficient detector is of paramount importance to harvesting t...The orthogonal time frequency space(OTFS)modulation has emerged as a promis⁃ing modulation scheme for wireless communications in high-mobility scenarios.An efficient detector is of paramount importance to harvesting the time and frequency diversities promised by OTFS.Recently,some message passing based detectors have been developed by exploiting the features of the OTFS channel matrices.In this paper,we provide an overview of some re⁃cent message passing based OTFS detectors,compare their performance,and shed some light on potential research on the design of message passing based OTFS receivers.展开更多
This study examined whether exposure to a firm's report of corporate social responsibility (CSR) activities affected attitudes toward the firm and increased behavioral intent to purchase products and services from ...This study examined whether exposure to a firm's report of corporate social responsibility (CSR) activities affected attitudes toward the firm and increased behavioral intent to purchase products and services from it. Findings showed that increased knowledge of a company's CSR deeds fosters positive attitudes and favorable purchase intentions toward the company. Reports that compared the firm's CSR activities to the competitor's activities favorably affected consumers' attitudes and purchase intentions positively. On the other hand, self-promotional reports affected neither attitudes nor purchase intentions significantly.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.72171136 and 72134004)Humanities and Social Science Research Project,Ministry of Education of China(Grant No.21YJC630157)+1 种基金the Natural Science Foundation of Shandong Province(Grant No.ZR2022MG008)Shandong Provincial Colleges and Universities Youth Innovation Technology of China(Grant No.2022RW066)。
文摘Health information spreads rapidly,which can effectively control epidemics.However,the swift dissemination of information also has potential negative impacts,which increasingly attracts attention.Message fatigue refers to the psychological response characterized by feelings of boredom and anxiety that occur after receiving an excessive amount of similar information.This phenomenon can alter individual behaviors related to epidemic prevention.Additionally,recent studies indicate that pairwise interactions alone are insufficient to describe complex social transmission processes,and higher-order structures representing group interactions are crucial.To address this,we develop a novel epidemic model that investigates the interactions between information,behavioral responses,and epidemics.Our model incorporates the impact of message fatigue on the entire transmission system.The information layer is modeled using a static simplicial network to capture group interactions,while the disease layer uses a time-varying network based on activity-driven model with attractiveness to represent the self-protection behaviors of susceptible individuals and self-isolation behaviors of infected individuals.We theoretically describe the co-evolution equations using the microscopic Markov chain approach(MMCA)and get the epidemic threshold.Experimental results show that while the negative impact of message fatigue on epidemic transmission is limited,it significantly weakens the group interactions depicted by higher-order structures.Individual behavioral responses strongly inhibit the epidemic.Our simulations using the Monte Carlo(MC)method demonstrate that greater intensity in these responses leads to clustering of susceptible individuals in the disease layer.Finally,we apply the proposed model to real networks to verify its reliability.In summary,our research results enhance the understanding of the information-epidemic coupling dynamics,and we expect to provide valuable guidance for managing future emerging epidemics.
文摘The China-ASEAN Expo(CAEXPO),held annually in Nanning City of Guangxi Zhuang Autonomous Region since 2004,has become a pivotal platform for economic and trade exchange between China,Vietnam,and other ASEAN member states.Over the years,CAEXPO has proven to be a highly effective mechanism for fostering international cooperation,playing a vital role in establishing ASEAN as China’s largest trading partner and positioning China as the foremost trade partner of many ASEAN countries,including Vietnam.
基金supported in part by the National Key Research and Development Program of China under Grant 2020YFB1804800.
文摘In this paper,we focus on the channel estimation for multi-user MIMO-OFDM systems in rich scattering environments.We find that channel sparsity in the delay-angle domain is severely compromised in rich scattering environments,so that most existing compressed sensing(CS)based techniques can harvest a very limited gain(if any)in reducing the channel estimation overhead.To address the problem,we propose the learning-based turbo message passing(LTMP)algorithm.Instead of exploiting the channel sparsity,LTMP is able to efficiently extract the channel feature via deep learning as well as to exploit the channel continuity in the frequency domain via block-wise linear modelling.More specifically,as a component of LTMP,we develop a multi-scale parallel dilated convolutional neural network(MPDCNN),which leverages frequency-space channel correlation in different scales for channel denoising.We evaluate the LTMP’s performance in MIMO-OFDM channels using the 3rd generation partnership project(3GPP)clustered delay line(CDL)channel models.Simulation results show that the proposed channel estimation method has more than 5 dB power gain than the existing algorithms when the normalized mean-square error of the channel estimation is-20 dB.The proposed algorithm also exhibits strong robustness in various environments.
基金Funds for High-Level Talents Programof Xi’an International University(Grant No.XAIU202411).
文摘The Cyber-Physical Systems (CPS) supported by Wireless Sensor Networks (WSN) helps factories collect data and achieve seamless communication between physical and virtual components. Sensor nodes are energy-constrained devices. Their energy consumption is typically correlated with the amount of data collection. The purpose of data aggregation is to reduce data transmission, lower energy consumption, and reduce network congestion. For large-scale WSN, data aggregation can greatly improve network efficiency. However, as many heterogeneous data is poured into a specific area at the same time, it sometimes causes data loss and then results in incompleteness and irregularity of production data. This paper proposes an information processing model that encompasses the Energy-Conserving Data Aggregation Algorithm (ECDA) and the Efficient Message Reception Algorithm (EMRA). ECDA is divided into two stages, Energy conservation based on the global cost and Data aggregation based on ant colony optimization. The EMRA comprises the Polling Message Reception Algorithm (PMRA), the Shortest Time Message Reception Algorithm (STMRA), and the Specific Condition Message Reception Algorithm (SCMRA). These algorithms are not only available for the regularity and directionality of sensor information transmission, but also satisfy the different requirements in small factory environments. To compare with the recent HPSO-ILEACH and E-PEGASIS, DCDA can effectively reduce energy consumption. Experimental results show that STMRA consumes 1.3 times the time of SCMRA. Both optimization algorithms exhibit higher time efficiency than PMRA. Furthermore, this paper also evaluates these three algorithms using AHP.
文摘The development of deep learning has made non-biochemical methods for molecular property prediction screening a reality,which can increase the experimental speed and reduce the experimental cost of relevant experiments.There are currently two main approaches to representing molecules:(a)representing molecules by fixing molecular descriptors,and(b)representing molecules by graph convolutional neural networks.Currently,both of these Representative methods have achieved some results in their respective experiments.Based on past efforts,we propose a Dual Self-attention Fusion Message Neural Network(DSFMNN).DSFMNN uses a combination of dual self-attention mechanism and graph convolutional neural network.Advantages of DSFMNN:(1)The dual self-attention mechanism focuses not only on the relationship between individual subunits in a molecule but also on the relationship between the atoms and chemical bonds contained in each subunit.(2)On the directed molecular graph,a message delivery approach centered on directed molecular bonds is used.We test the performance of the model on eight publicly available datasets and compare the performance with several models.Based on the current experimental results,DSFMNN has superior performance compared to previous models on the datasets applied in this paper.
文摘If 2024 has taught me anything,it’s that digital is an irrefutable force for unity—a much-needed catalyst for global cooperation in an increasingly fragmented world.This truth has been on display all year long,sometimes against the odds.And it’s evident in the adoption of the Pact for the Future and Global Digital Compact at the United Nations General Assembly,in the outcomes of the World Telecommunication Standardization Assembly(WTSA-24),and in the wide endorsement of the COP29 Declaration on Green Digital Action.
基金The National Natural Science Foundation of China(No.61105048,60972165)the Doctoral Fund of Ministry of Education of China(No.20110092120034)+2 种基金the Natural Science Foundation of Jiangsu Province(No.BK2010240)the Technology Foundation for Selected Overseas Chinese Scholar,Ministry of Human Resources and Social Security of China(No.6722000008)the Open Fund of Jiangsu Province Key Laboratory for Remote Measuring and Control(No.YCCK201005)
文摘An improved Gaussian mixture model (GMM)- based clustering method is proposed for the difficult case where the true distribution of data is against the assumed GMM. First, an improved model selection criterion, the completed likelihood minimum message length criterion, is derived. It can measure both the goodness-of-fit of the candidate GMM to the data and the goodness-of-partition of the data. Secondly, by utilizing the proposed criterion as the clustering objective function, an improved expectation- maximization (EM) algorithm is developed, which can avoid poor local optimal solutions compared to the standard EM algorithm for estimating the model parameters. The experimental results demonstrate that the proposed method can rectify the over-fitting tendency of representative GMM-based clustering approaches and can robustly provide more accurate clustering results.
文摘Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by applying the stylistic theory and employing the "Model of Analyzing Textual Function". The features of the two styles of messages are described and analyzed from the perspectives of their pronunciation, graphology, vocabulary, grammar, discourse, rhetoric, etc., and the stylistic features serve as the basis for discussing the translation principles and methods of English short messages.
基金supported in part by the Joint Foundation of National Natural Science Committee of China and Civil Aviation Administration of China under Grant U1933108in part by the Scientific Research Project of Tianjin Municipal Education Commission under Grant 2019KJ117.
文摘Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here is spoofing attacks.Spoofing attacks make the positioning or timing results of BeiDou civilian receivers wrong.Such errors may cause a series of security problems,which lays a serious hidden danger for Bei-Dou satellite information security.This article proposes an anti-spoofing method for BeiDou navigation system based on the combination of SM commercial cryptographic algorithm and Timed Efficient Stream Loss-tolerant Authentication(TESLA)for spoofing attacks.In this solution,we use the SM3 algorithm to generate a TESLA key chain with time information,and then use the key in the key chain to generate the message authentication code for the BeiDou D2 navigation message.The message authentication code is inserted into a reserved bit of the D2 navigation message.In addition,this solution uses the SM2 algorithm to protect and encrypt time information in the TESLA key chain to prevent key replay attacks in TESLA.The experimental results tested on the experimental platform built in this paper show that this scheme reduces the possibility of the BeiDou navigation system being deceived and enhances the safety of the BeiDou navigation system.
基金Supported by the National Natural Science Foundation of China(No.61401496)
文摘Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange.
基金supported by Guangdong Major Project of Basic and Applied Basic Research No.2020B0301030008Science and Technology Program of Guangzhou No.2019050001+2 种基金the Chinese Academy of Sciences Grant QYZDJ-SSWSYS018the National Natural Science Foundation of China(Grant No.12171479)supported by the National Natural Science Foundation of China(Grant Nos.11301339 and 11491240108)。
文摘Message passing algorithms,whose iterative nature captures complicated interactions among interconnected variables in complex systems and extracts information from the fixed point of iterated messages,provide a powerful toolkit in tackling hard computational tasks in optimization,inference,and learning problems.In the context of constraint satisfaction problems(CSPs),when a control parameter(such as constraint density)is tuned,multiple threshold phenomena emerge,signaling fundamental structural transitions in their solution space.Finding solutions around these transition points is exceedingly challenging for algorithm design,where message passing algorithms suffer from a large message fiuctuation far from convergence.Here we introduce a residual-based updating step into message passing algorithms,in which messages with large variation between consecutive steps are given high priority in the updating process.For the specific example of model RB(revised B),a typical prototype of random CSPs with growing domains,we show that our algorithm improves the convergence of message updating and increases the success probability in finding solutions around the satisfiability threshold with a low computational cost.Our approach to message passing algorithms should be of value for exploring their power in developing algorithms to find ground-state solutions and understand the detailed structure of solution space of hard optimization problems.
基金Supported by The Innovation Team in Liaoning Meteorological Technology Service Center
文摘In order to meet the needs of Agricultural Meteorology business and research,an edition system of agricultural meteorology short message was established based on the Microsoft Access 2000 database and visualization developing software Visual Basic 6.0 in Liaoning Province.The basic principles of agro-meteorological text editing and system optimization ideas were pointed out.The meteorological conditions of the main crops growth needed in material library were introduced.
文摘Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step in such a development, we have implemented a remote monitoring system of unitary air conditioners, using the manufacturing message specification (MMS). MMS is an OSI application protocol designed for the remote control and monitoring of real devices. The functions supported are those that an operator would do normally at the console of the unitary air conditioner. Due to the accomplishment of UMCS (Unitary air conditioner MMS Control System), there will be a leap of the application of MMS and the control technology of unitary air conditioner.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)the joint funds of National Natural Science Foundation of China and Civil Aviation Administration of China(No.U2133203).
文摘Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.
基金supported by the National Natural Science Foundation of Chi⁃na(61901417,U1804152,61801434)Science and Technology Re⁃search Project of Henan Province(212102210556,212102210566,212400410179).
文摘The orthogonal time frequency space(OTFS)modulation has emerged as a promis⁃ing modulation scheme for wireless communications in high-mobility scenarios.An efficient detector is of paramount importance to harvesting the time and frequency diversities promised by OTFS.Recently,some message passing based detectors have been developed by exploiting the features of the OTFS channel matrices.In this paper,we provide an overview of some re⁃cent message passing based OTFS detectors,compare their performance,and shed some light on potential research on the design of message passing based OTFS receivers.
文摘This study examined whether exposure to a firm's report of corporate social responsibility (CSR) activities affected attitudes toward the firm and increased behavioral intent to purchase products and services from it. Findings showed that increased knowledge of a company's CSR deeds fosters positive attitudes and favorable purchase intentions toward the company. Reports that compared the firm's CSR activities to the competitor's activities favorably affected consumers' attitudes and purchase intentions positively. On the other hand, self-promotional reports affected neither attitudes nor purchase intentions significantly.