The minimum rolling thickness in asymmetrical rolling was analyzed compared with that in symmetrical rolling. The differential equilibrium equations on forces were established to calculate the asymmetrical rolling for...The minimum rolling thickness in asymmetrical rolling was analyzed compared with that in symmetrical rolling. The differential equilibrium equations on forces were established to calculate the asymmetrical rolling force equation by slab method. An implicit expression of the minimum rolling thickness was then derived from the rolling force equation and Hitehcock equation. The results show that permissible minimum rolling thickness of asymmetrical rolling only exists within a specific range of cross-shear ratio, which is termed the cross-shear zone proportion of the whole de- formation zone. Numerical computation was carried out to obtain a discrete solution of the minimum rolling thick- ness. Experiments were designed to investigate the influence factors on cross-shear ratio. Finally, experimental re- sults prove the correctness of the improved formula given.展开更多
Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well a...Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well as for traveling patterns with a small unmanned aerial vehicle.The efficient direct collection approach based on the Runge-Kutta integrator is used to solve the optimization problem.The fast convergence of the optimization process leads to the potential for real-time applications.Based on the results of trajectory optimizations,the general permissible wind conditions which involve the allowable power law exponents and feasible reference wind strengths supporting dynamic soaring are proposed.Increasing the smallest allowable wingtip clearance to trade for robustness and safety of the vehicle system and improving the maximum traveling speed results in shrunken permissible domain of wind conditions for loitering and traveling dynamic soaring respectively.Sensitivity analyses of vehicle model parameters show that properly reducing the wingspan and increasing the maximum lift-to-drag ratio and the wing loading can enlarge the permissible domain.Permissible domains for different traveling directions show that the downwind dynamic soaring benefitting from the drift is more efficient than the upwind traveling pattern in terms of permissible domain size and net traveling speed.展开更多
The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in th...The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in the inventory is subject to constant deterioration rate, demand rate is quadratic function of time and salvage value is associated with the deteriorated units. Shortages in the system are not allowed to occur. A mathematical formulation is developed when the supplier offers a permissible delay period to the customers under two circumstances: 1) when delay period is less than the cycle of time;and 2) when delay period is greater than the cycle of time. The method is suitable for the items like state-of-the-art aircrafts, super computers, laptops, android mobiles, seasonal items and machines and their spare parts. A solution procedure algorithm is given for finding the optimal order quantity which minimizes the total cost of an inventory system. The article includes numerical examples to support the effectiveness of the developed model. Finally, sensitivity analysis on some parameters on optimal solution is provided.展开更多
We have formulated 3 permissible levels of respiratory resistance for aircraft oxygen equipment in China based on a comprehensive analysis of the results of human pkysiological experiments and feasibility of technolog...We have formulated 3 permissible levels of respiratory resistance for aircraft oxygen equipment in China based on a comprehensive analysis of the results of human pkysiological experiments and feasibility of technological design and performance with reference to existing standards and data. The ideal level can be used as a basic human physiological criterion. The applied permissible level is a criterion that must be followed in the process of design and production. The permissible level during maximum flow rate is presented as an extended allowable criterion for possible exceeding of the stable level for a short time.展开更多
The purpose of this inventory model is to investigate the retailer’s optimal replenishment policy under permissible delay in payments. In this paper, we assume that the supplier would offer the retailer partially per...The purpose of this inventory model is to investigate the retailer’s optimal replenishment policy under permissible delay in payments. In this paper, we assume that the supplier would offer the retailer partially permissible delay in payments when the order quantity is smaller than a predetermined quantity (W). The most inventory systems are usually formed without considering the effect of deterioration of items which deteriorate continuously like fresh fruits, vegetables etc. Here we consider the loss due to deterioration. In real world situation, the demand of some items varies with change of seasons and occasions. So it is more significant if the loss of deterioration is time dependent. Considering all these facts, this inventory model has been developed to make more realistic and flexible marketing policy to the retailer, also establish the result by ANOVA analysis by treating different model parameters as factors.展开更多
This work presents the hydrologic estimations of the hydraulic underground arched culvert channel (UACC) in Sabinal Basin, Chiapas, México and the hydrological problems associated with it, such as the erosion phe...This work presents the hydrologic estimations of the hydraulic underground arched culvert channel (UACC) in Sabinal Basin, Chiapas, México and the hydrological problems associated with it, such as the erosion phenomenon and abrasion cavity formation in it. On the other hand, the maximum flows that the UACC could transport were analyzed, concluding that it no longer has the hydraulic capacity to transport the flow rate associated to return periods equal to or greater than five years and that maximum permissible velocity UACC’s bottom is 3 m/s.展开更多
Laboratory tests revealed that the behavior of brick masonry under compressive cyclic loading is characterized by three distinct stress-strain curves. These three curves are termed as envelope curve, common point curv...Laboratory tests revealed that the behavior of brick masonry under compressive cyclic loading is characterized by three distinct stress-strain curves. These three curves are termed as envelope curve, common point curve and stability point curve. The envelope curve is obtained by superimposing the cyclic peaks on the monotonic stress-strain curve. The common point curve is the locus of intersection points of loading and unloading curves of the cycles. If for the same cycle, the loading and unloading are repeated several times, the intersection points of loading and unloading paths will stabilize at a lower bound. The locus of these stabilized points (lower bound points) of all cycles form the stability point curve. Therefore, the stability point curve can be used as a measure for the allowable stress for masonry under cyclic loadings. The proposed cyclic allowable stress level is associated with the accumulation of residual (plastic) strain levels as a result of cyclic loading history. The permissible stress level was found to be about two thirds of the cyclic peak stress of the specimen.展开更多
Kenya like most of sub-Saharan Africa is reliant predominantly on agriculture and natural resources;which include land, water, minerals and fisheries, but the most dominant of which are wildlife and forestry. Unlike m...Kenya like most of sub-Saharan Africa is reliant predominantly on agriculture and natural resources;which include land, water, minerals and fisheries, but the most dominant of which are wildlife and forestry. Unlike minerals which are by law vested in the government and can only be extracted by it and not the citizenry, wildlife and forestry are resources that the citizens may utilize in their day to day lives to meet their needs. Apart from their consumptive uses, there are also non-consumptive uses and values of wild animals and forests;such as their intrinsic ecological value as gene banks, as well as their scenic value for viewing. These are essentially conventional values and uses. They are largely formal and universal ones that are universally obtaining across the world irrespective of the levels of civilization or cultural identity, and are even compatible with modernity. Apart from these, there are some wildlife and forestry uses which are unique to the typical African way of life as part of old traditional customs that have existed from earlier times. These are what are in this paper referred to as “traditional customary uses”. These uses are largely informal, rudimentary and archaic. They are nevertheless critical in the endemic African way of life and represent the inextricable rudimentary technologically bereft relationship between the African people and their natural resources. Under the country’s existing laws, some of these uses are prohibited and criminal sanctions prescribed to enforce their proscription, hence cannot be enjoyed or practiced. There are however others that the law has either expressly allowed, or not prohibited, hence may be lawfully enjoyed or practiced. These are what this paper has referred to as the legally permissible traditional customary uses;and are the ones that are its subject. As for wildlife, in the year 1977, the Kenya Government by a Legal Notice in the Kenya Gazette imposed a ban on all forms of hunting of wildlife. The ban is still in force. This therefore means that hunting is illegal, as legal prohibition has in effect prohibited all and any form of off-take or killing of wildlife. By implication therefore, under Kenyan law, only non-consumptive uses of wildlife may be enjoyed, and not the consumptive ones. These include viewing as well as socio-cultural and spiritual uses. In Kenya therefore, the only permissible traditional customary use of wildlife is its non-consumptive use for socio-cultural and spiritual purposes;subject of course to the existing legal prohibition on witchcraft under the Witchcraft Act <span style="color:#943634;">(<a href="#ref53">Cap 67 Laws of Kenya<a href="file:///C:/Users/test.scirp/Desktop/%E6%96%B0%E5%BB%BA%20Microsoft%20Word%20%E6%96%87%E6%A1%A3.docx#R53">). This piece of legislation has prohibited the practice and promotion of witchcraft. This in effect means that the socio-cultural and spiritual uses of wildlife though legally permissible, will be enjoyed, provided it is not for witchcraft purposes. With regard to forests, this author has identified the following five as their legally permissible traditional customary uses under Kenyan law: Socio-cultural and spiritual (consumptive and non-consumptive) use, other than for witchcraft;use in herbal folk medicine, other than for witchcraft;use for human food and livestock fodder;use for firewood;and use as raw material in construction and traditional craft. Notably, in Kenya, traditional customary use is subject to the existing legal prohibition on witchcraft. Further, while it is the legally permissible use category that is the focus of this paper, the author nevertheless discusses the prohibited traditional customary uses as well. This paper is based on literature survey as well as data obtained from the author’s previous research whose primary data and findings have been published in recent times. It also draws from the documented research and diverse documented views of other commentators on the subject.展开更多
BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients...BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients undergoing laparoscopic surgical procedures.AIM To ascertain whether the combination of PH and GDFT improves clinical recovery indicators,reduces postoperative complications,and alleviates anxiety,depression,and inflammatory responses in this specific patient population.METHODS A total of 120 elderly patients who underwent laparoscopic surgery in our hospital from July 2023 to June 2024 were randomly allocated into two groups:A control group(n=60)and a study group(n=60).In the control group,conventional anesthesia ventilation and fluid management protocols were administered,while in the study group,PH(with intraoperative PaCO_(2) maintained between 45-55 mmHg)was combined with GDFT.Postoperative recovery indicators,including the time to first flatus,time to ambulation,and length of hospital stay,were compared between the groups.Additionally,complication rates,anxietydepression scores assessed via the Hospital Anxiety and Depression scale,and levels of inflammatory factors were analyzed to evaluate the outcomes.RESULTS When compared with the control group,the study group demonstrated significantly shorter time to first flatus[(48.3±6.2)hours vs(62.5±7.8)hours],time to ambulation[(28.4±4.2)hours vs(38.6±5.1)hours],and length of hospital stay[(5.2±1.1)days vs(7.4±1.3)days](P<0.05).A significantly lower postoperative complication rate was observed in the study group(8.3%vs 21.7%,P<0.05).Additionally,at 3 days postoperatively,significantly lower anxiety scores[(5.2±1.4)vs(7.8±1.6)]and depression scores[(4.8±1.2)vs(7.1±1.5)]were recorded in the study group compared to the control group(P<0.05);Furthermore,at 24 hours postoperatively,serum levels of interleukin-6,tumor necrosis factorα,and C-reactive protein were found to be significantly lower in the study group than in the control group(P<0.05).CONCLUSION Postoperative recovery is significantly expedited,postoperative complications are markedly reduced,anxietydepression status is substantially improved,and inflammatory response is notably diminished in elderly patients undergoing laparoscopic surgery when PH is combined with GDFT,thereby making it worthy of clinical application.展开更多
In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness ...In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness of the evils of torture,while Problem 2 aims to find a suitable theory to balance the“intuitive rejection”and“intuition of exceptional cases”in the ticking bomb scenario.Existing mainstream approaches have generally failed to resolve these issues.However,Matthew Kramer’s view of torture addresses both aspects of these problems.For Problem 1,Kramer adopts a perpetrator-centered viewpoint,arguing that torture undermines the moral integrity of the perpetrator.Regarding Problem 2,he suggests that the situation we face is a moral conflict in which the use of torture is morally wrong but might be the best action in a given context,granting it a weaker form of permissibility.However,in terms of the evils of torture,Kramer fails to explain its uniqueness.His theory cannot apply to all types of torture,and his perpetrator-centered argument contains logical flaws.Regarding the permissibility of torture,while Kramer’s overall approach is correct,he does not provide a reasonable explanation of the moral obligation to“forbid torture”or the prima facie surrounding it.A correct view of torture should adhere to an inmate-centered viewpoint,understanding the evils of torture in an additive manner in Problem 1,and acknowledging the existence of moral conflict in Problem 2.It should not only demonstrate that,in some situations,the use of torture may be the morally best option,but also show that the moral obligation to prohibit torture is simply outweighed under these circumstances.展开更多
Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing sol...Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing solutions often suffer from centralized architectures,and exorbitant costs.To mitigate these issues,in this paper,we propose SecureVFL,a decentralized multi-party VFL scheme designed to enhance efficiency and trustworthiness while guaranteeing privacy.SecureVFL uses a permissioned blockchain and introduces a novel consensus algorithm,Proof of Feature Sharing(PoFS),to facilitate decentralized,trustworthy,and high-throughput federated training.SecureVFL introduces a verifiable and lightweight three-party Replicated Secret Sharing(RSS)protocol for feature intersection summation among overlapping users.Furthermore,we propose a(_(2)^(4))-sharing protocol to achieve federated training in a four-party VFL setting.This protocol involves only addition operations and exhibits robustness.SecureVFL not only enables anonymous interactions among participants but also safeguards their real identities,and provides mechanisms to unmask these identities when malicious activities are performed.We illustrate the proposed mechanism through a case study on VFL across four banks.Finally,our theoretical analysis proves the security of SecureVFL.Experiments demonstrated that SecureVFL outperformed existing multi-party VFL privacy-preserving schemes,such as MP-FedXGB,in terms of both overhead and model performance.展开更多
The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition base...The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition based on a deep convolutional neural network”(Data Science and Management,2024,7(1):25–34).https://doi.org/10.1016/j.dsm.2023.10.002.Ethics statement:The authors declare the Institutional Ethics Committee confirmed that no ethical review was required for this study.The authors have taken the participants’permission and consent to participate in this study.展开更多
In this paper, an EOQ inventory model is developed for deteriorating items with variable rates of deterioration and conditions of grace periods when demand is a quadratic function of time. The deterioration rate consi...In this paper, an EOQ inventory model is developed for deteriorating items with variable rates of deterioration and conditions of grace periods when demand is a quadratic function of time. The deterioration rate considered here is a special type of Weibull distribution deterioration rate, i.e., a one-parameter Weibull distribution deterioration rate and it increases with respect to time. The quadratic demand precisely depicts of the demand of seasonal items, fashion apparels, cosmetics, and newly launched essential commodities like android mobiles, laptops, automobiles etc., coming to the market. The model is divided into three policies according to the occurrence of the grace periods. Shortages, backlogging and complete backlogging cases are not allowed to occur in the model. The proposed model is well-explained with the help of a simple solution procedure. The three numerical examples are taken to illustrate the effectiveness of the EOQ inventory model along with sensitivity analysis.展开更多
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and...The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.展开更多
The Tumen River had failed to meet Grade Ⅲ and Ⅳ levels in the environmental quality standard for surface water, and had exceeded Grade Ⅴ level. Surface water pollution is serious. The major excessive standard poll...The Tumen River had failed to meet Grade Ⅲ and Ⅳ levels in the environmental quality standard for surface water, and had exceeded Grade Ⅴ level. Surface water pollution is serious. The major excessive standard pollutants were COD Mn and SS. After taking effective treatment steps, the worsening trend of water pollution will be basically under control. But the change of runoff in the Tumen River is large in a year, especially during as long as five month freezing period, smaller flow and lower temperature of river waters led to weak dilution and self purification capacity. The water quality of the Tumen River will not reach the appoint functional water quality standards, even if sewage meets discharge standard, which will influence water resources utilization in the lower reaches of the Tumen River and regional economic development. Therefore water pollution has become the major restrictive factor of the development of the Tumen River area.展开更多
Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and t...Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils.展开更多
This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to redu...This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit.展开更多
基金Sponsored by National Natural Science Foundation of China(50974039)
文摘The minimum rolling thickness in asymmetrical rolling was analyzed compared with that in symmetrical rolling. The differential equilibrium equations on forces were established to calculate the asymmetrical rolling force equation by slab method. An implicit expression of the minimum rolling thickness was then derived from the rolling force equation and Hitehcock equation. The results show that permissible minimum rolling thickness of asymmetrical rolling only exists within a specific range of cross-shear ratio, which is termed the cross-shear zone proportion of the whole de- formation zone. Numerical computation was carried out to obtain a discrete solution of the minimum rolling thick- ness. Experiments were designed to investigate the influence factors on cross-shear ratio. Finally, experimental re- sults prove the correctness of the improved formula given.
文摘Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well as for traveling patterns with a small unmanned aerial vehicle.The efficient direct collection approach based on the Runge-Kutta integrator is used to solve the optimization problem.The fast convergence of the optimization process leads to the potential for real-time applications.Based on the results of trajectory optimizations,the general permissible wind conditions which involve the allowable power law exponents and feasible reference wind strengths supporting dynamic soaring are proposed.Increasing the smallest allowable wingtip clearance to trade for robustness and safety of the vehicle system and improving the maximum traveling speed results in shrunken permissible domain of wind conditions for loitering and traveling dynamic soaring respectively.Sensitivity analyses of vehicle model parameters show that properly reducing the wingspan and increasing the maximum lift-to-drag ratio and the wing loading can enlarge the permissible domain.Permissible domains for different traveling directions show that the downwind dynamic soaring benefitting from the drift is more efficient than the upwind traveling pattern in terms of permissible domain size and net traveling speed.
文摘The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in the inventory is subject to constant deterioration rate, demand rate is quadratic function of time and salvage value is associated with the deteriorated units. Shortages in the system are not allowed to occur. A mathematical formulation is developed when the supplier offers a permissible delay period to the customers under two circumstances: 1) when delay period is less than the cycle of time;and 2) when delay period is greater than the cycle of time. The method is suitable for the items like state-of-the-art aircrafts, super computers, laptops, android mobiles, seasonal items and machines and their spare parts. A solution procedure algorithm is given for finding the optimal order quantity which minimizes the total cost of an inventory system. The article includes numerical examples to support the effectiveness of the developed model. Finally, sensitivity analysis on some parameters on optimal solution is provided.
文摘We have formulated 3 permissible levels of respiratory resistance for aircraft oxygen equipment in China based on a comprehensive analysis of the results of human pkysiological experiments and feasibility of technological design and performance with reference to existing standards and data. The ideal level can be used as a basic human physiological criterion. The applied permissible level is a criterion that must be followed in the process of design and production. The permissible level during maximum flow rate is presented as an extended allowable criterion for possible exceeding of the stable level for a short time.
文摘The purpose of this inventory model is to investigate the retailer’s optimal replenishment policy under permissible delay in payments. In this paper, we assume that the supplier would offer the retailer partially permissible delay in payments when the order quantity is smaller than a predetermined quantity (W). The most inventory systems are usually formed without considering the effect of deterioration of items which deteriorate continuously like fresh fruits, vegetables etc. Here we consider the loss due to deterioration. In real world situation, the demand of some items varies with change of seasons and occasions. So it is more significant if the loss of deterioration is time dependent. Considering all these facts, this inventory model has been developed to make more realistic and flexible marketing policy to the retailer, also establish the result by ANOVA analysis by treating different model parameters as factors.
文摘This work presents the hydrologic estimations of the hydraulic underground arched culvert channel (UACC) in Sabinal Basin, Chiapas, México and the hydrological problems associated with it, such as the erosion phenomenon and abrasion cavity formation in it. On the other hand, the maximum flows that the UACC could transport were analyzed, concluding that it no longer has the hydraulic capacity to transport the flow rate associated to return periods equal to or greater than five years and that maximum permissible velocity UACC’s bottom is 3 m/s.
文摘Laboratory tests revealed that the behavior of brick masonry under compressive cyclic loading is characterized by three distinct stress-strain curves. These three curves are termed as envelope curve, common point curve and stability point curve. The envelope curve is obtained by superimposing the cyclic peaks on the monotonic stress-strain curve. The common point curve is the locus of intersection points of loading and unloading curves of the cycles. If for the same cycle, the loading and unloading are repeated several times, the intersection points of loading and unloading paths will stabilize at a lower bound. The locus of these stabilized points (lower bound points) of all cycles form the stability point curve. Therefore, the stability point curve can be used as a measure for the allowable stress for masonry under cyclic loadings. The proposed cyclic allowable stress level is associated with the accumulation of residual (plastic) strain levels as a result of cyclic loading history. The permissible stress level was found to be about two thirds of the cyclic peak stress of the specimen.
文摘Kenya like most of sub-Saharan Africa is reliant predominantly on agriculture and natural resources;which include land, water, minerals and fisheries, but the most dominant of which are wildlife and forestry. Unlike minerals which are by law vested in the government and can only be extracted by it and not the citizenry, wildlife and forestry are resources that the citizens may utilize in their day to day lives to meet their needs. Apart from their consumptive uses, there are also non-consumptive uses and values of wild animals and forests;such as their intrinsic ecological value as gene banks, as well as their scenic value for viewing. These are essentially conventional values and uses. They are largely formal and universal ones that are universally obtaining across the world irrespective of the levels of civilization or cultural identity, and are even compatible with modernity. Apart from these, there are some wildlife and forestry uses which are unique to the typical African way of life as part of old traditional customs that have existed from earlier times. These are what are in this paper referred to as “traditional customary uses”. These uses are largely informal, rudimentary and archaic. They are nevertheless critical in the endemic African way of life and represent the inextricable rudimentary technologically bereft relationship between the African people and their natural resources. Under the country’s existing laws, some of these uses are prohibited and criminal sanctions prescribed to enforce their proscription, hence cannot be enjoyed or practiced. There are however others that the law has either expressly allowed, or not prohibited, hence may be lawfully enjoyed or practiced. These are what this paper has referred to as the legally permissible traditional customary uses;and are the ones that are its subject. As for wildlife, in the year 1977, the Kenya Government by a Legal Notice in the Kenya Gazette imposed a ban on all forms of hunting of wildlife. The ban is still in force. This therefore means that hunting is illegal, as legal prohibition has in effect prohibited all and any form of off-take or killing of wildlife. By implication therefore, under Kenyan law, only non-consumptive uses of wildlife may be enjoyed, and not the consumptive ones. These include viewing as well as socio-cultural and spiritual uses. In Kenya therefore, the only permissible traditional customary use of wildlife is its non-consumptive use for socio-cultural and spiritual purposes;subject of course to the existing legal prohibition on witchcraft under the Witchcraft Act <span style="color:#943634;">(<a href="#ref53">Cap 67 Laws of Kenya<a href="file:///C:/Users/test.scirp/Desktop/%E6%96%B0%E5%BB%BA%20Microsoft%20Word%20%E6%96%87%E6%A1%A3.docx#R53">). This piece of legislation has prohibited the practice and promotion of witchcraft. This in effect means that the socio-cultural and spiritual uses of wildlife though legally permissible, will be enjoyed, provided it is not for witchcraft purposes. With regard to forests, this author has identified the following five as their legally permissible traditional customary uses under Kenyan law: Socio-cultural and spiritual (consumptive and non-consumptive) use, other than for witchcraft;use in herbal folk medicine, other than for witchcraft;use for human food and livestock fodder;use for firewood;and use as raw material in construction and traditional craft. Notably, in Kenya, traditional customary use is subject to the existing legal prohibition on witchcraft. Further, while it is the legally permissible use category that is the focus of this paper, the author nevertheless discusses the prohibited traditional customary uses as well. This paper is based on literature survey as well as data obtained from the author’s previous research whose primary data and findings have been published in recent times. It also draws from the documented research and diverse documented views of other commentators on the subject.
基金Supported by the 2024 Hebei Medical Science Research Project,No.20241638Key Research and Development Program of Zhangjiakou City,No.2311041D.
文摘BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients undergoing laparoscopic surgical procedures.AIM To ascertain whether the combination of PH and GDFT improves clinical recovery indicators,reduces postoperative complications,and alleviates anxiety,depression,and inflammatory responses in this specific patient population.METHODS A total of 120 elderly patients who underwent laparoscopic surgery in our hospital from July 2023 to June 2024 were randomly allocated into two groups:A control group(n=60)and a study group(n=60).In the control group,conventional anesthesia ventilation and fluid management protocols were administered,while in the study group,PH(with intraoperative PaCO_(2) maintained between 45-55 mmHg)was combined with GDFT.Postoperative recovery indicators,including the time to first flatus,time to ambulation,and length of hospital stay,were compared between the groups.Additionally,complication rates,anxietydepression scores assessed via the Hospital Anxiety and Depression scale,and levels of inflammatory factors were analyzed to evaluate the outcomes.RESULTS When compared with the control group,the study group demonstrated significantly shorter time to first flatus[(48.3±6.2)hours vs(62.5±7.8)hours],time to ambulation[(28.4±4.2)hours vs(38.6±5.1)hours],and length of hospital stay[(5.2±1.1)days vs(7.4±1.3)days](P<0.05).A significantly lower postoperative complication rate was observed in the study group(8.3%vs 21.7%,P<0.05).Additionally,at 3 days postoperatively,significantly lower anxiety scores[(5.2±1.4)vs(7.8±1.6)]and depression scores[(4.8±1.2)vs(7.1±1.5)]were recorded in the study group compared to the control group(P<0.05);Furthermore,at 24 hours postoperatively,serum levels of interleukin-6,tumor necrosis factorα,and C-reactive protein were found to be significantly lower in the study group than in the control group(P<0.05).CONCLUSION Postoperative recovery is significantly expedited,postoperative complications are markedly reduced,anxietydepression status is substantially improved,and inflammatory response is notably diminished in elderly patients undergoing laparoscopic surgery when PH is combined with GDFT,thereby making it worthy of clinical application.
基金This text represents a periodic outcome of the Beijing Social Science Fund Youth Project(Project Approval Number 22FXC018).
文摘In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness of the evils of torture,while Problem 2 aims to find a suitable theory to balance the“intuitive rejection”and“intuition of exceptional cases”in the ticking bomb scenario.Existing mainstream approaches have generally failed to resolve these issues.However,Matthew Kramer’s view of torture addresses both aspects of these problems.For Problem 1,Kramer adopts a perpetrator-centered viewpoint,arguing that torture undermines the moral integrity of the perpetrator.Regarding Problem 2,he suggests that the situation we face is a moral conflict in which the use of torture is morally wrong but might be the best action in a given context,granting it a weaker form of permissibility.However,in terms of the evils of torture,Kramer fails to explain its uniqueness.His theory cannot apply to all types of torture,and his perpetrator-centered argument contains logical flaws.Regarding the permissibility of torture,while Kramer’s overall approach is correct,he does not provide a reasonable explanation of the moral obligation to“forbid torture”or the prima facie surrounding it.A correct view of torture should adhere to an inmate-centered viewpoint,understanding the evils of torture in an additive manner in Problem 1,and acknowledging the existence of moral conflict in Problem 2.It should not only demonstrate that,in some situations,the use of torture may be the morally best option,but also show that the moral obligation to prohibit torture is simply outweighed under these circumstances.
基金supported by Open Research Projects of Zhejiang Lab(No.2022QA0AB02)Natural Science Foundation of Sichuan Province(2022NSFSC0913)Sichuan Province Selected Funding for Postdoctoral Research Projects(TB2022032).
文摘Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing solutions often suffer from centralized architectures,and exorbitant costs.To mitigate these issues,in this paper,we propose SecureVFL,a decentralized multi-party VFL scheme designed to enhance efficiency and trustworthiness while guaranteeing privacy.SecureVFL uses a permissioned blockchain and introduces a novel consensus algorithm,Proof of Feature Sharing(PoFS),to facilitate decentralized,trustworthy,and high-throughput federated training.SecureVFL introduces a verifiable and lightweight three-party Replicated Secret Sharing(RSS)protocol for feature intersection summation among overlapping users.Furthermore,we propose a(_(2)^(4))-sharing protocol to achieve federated training in a four-party VFL setting.This protocol involves only addition operations and exhibits robustness.SecureVFL not only enables anonymous interactions among participants but also safeguards their real identities,and provides mechanisms to unmask these identities when malicious activities are performed.We illustrate the proposed mechanism through a case study on VFL across four banks.Finally,our theoretical analysis proves the security of SecureVFL.Experiments demonstrated that SecureVFL outperformed existing multi-party VFL privacy-preserving schemes,such as MP-FedXGB,in terms of both overhead and model performance.
文摘The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition based on a deep convolutional neural network”(Data Science and Management,2024,7(1):25–34).https://doi.org/10.1016/j.dsm.2023.10.002.Ethics statement:The authors declare the Institutional Ethics Committee confirmed that no ethical review was required for this study.The authors have taken the participants’permission and consent to participate in this study.
文摘In this paper, an EOQ inventory model is developed for deteriorating items with variable rates of deterioration and conditions of grace periods when demand is a quadratic function of time. The deterioration rate considered here is a special type of Weibull distribution deterioration rate, i.e., a one-parameter Weibull distribution deterioration rate and it increases with respect to time. The quadratic demand precisely depicts of the demand of seasonal items, fashion apparels, cosmetics, and newly launched essential commodities like android mobiles, laptops, automobiles etc., coming to the market. The model is divided into three policies according to the occurrence of the grace periods. Shortages, backlogging and complete backlogging cases are not allowed to occur in the model. The proposed model is well-explained with the help of a simple solution procedure. The three numerical examples are taken to illustrate the effectiveness of the EOQ inventory model along with sensitivity analysis.
文摘The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.
文摘The Tumen River had failed to meet Grade Ⅲ and Ⅳ levels in the environmental quality standard for surface water, and had exceeded Grade Ⅴ level. Surface water pollution is serious. The major excessive standard pollutants were COD Mn and SS. After taking effective treatment steps, the worsening trend of water pollution will be basically under control. But the change of runoff in the Tumen River is large in a year, especially during as long as five month freezing period, smaller flow and lower temperature of river waters led to weak dilution and self purification capacity. The water quality of the Tumen River will not reach the appoint functional water quality standards, even if sewage meets discharge standard, which will influence water resources utilization in the lower reaches of the Tumen River and regional economic development. Therefore water pollution has become the major restrictive factor of the development of the Tumen River area.
基金supported by the International Science & Technology Cooperation Program of China(2010DFA92720)the Department of Ecology in Kazakh Research Institute of Soil Science and Agrochemistry named after Uspanov, Almaty, Kazakhstan
文摘Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils.
文摘This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit.