To achieve high performance and reliability in video streaming over wireless local area networks (WLANs), one must jointly consider both optimized association to access points (APs) and handover management based o...To achieve high performance and reliability in video streaming over wireless local area networks (WLANs), one must jointly consider both optimized association to access points (APs) and handover management based on dynamic scanning of alternate APs. In this article, we propose a new architecture within the software-defined networking (SDN) framework, which allows stations to be connected to several APs simultaneously and to switch fast between them. We evaluate our system in a real-time testbed and demonstrate that our SDN-based handover mechanism significantly reduces the number and duration of video freeze events and allows for smaller playout buffers.展开更多
Metaverse technology is an advanced form of virtual reality and augmented technologies. It merges the digital world with the real world, thus benefitting healthcare services. Medical informatics is promising in the me...Metaverse technology is an advanced form of virtual reality and augmented technologies. It merges the digital world with the real world, thus benefitting healthcare services. Medical informatics is promising in the metaverse. Despite the increasing adoption of the metaverse in commercial applications, a considerable research gap remains in the academic domain, which hinders the comprehensive delineation of research prospects for the metaverse in healthcare. This study employs text-mining methods to investigate the prevalence and trends of the metaverse in healthcare;in particular, more than 34,000 academic articles and news reports are analyzed. Subsequently, the topic prevalence, similarity, and correlation are measured using topic-modeling methods. Based on bibliometric analysis, this study proposes a theoretical framework from the perspectives of knowledge, socialization, digitization, and intelligence. This study provides insights into its application in healthcare via an extensive literature review. The key to promoting the metaverse in healthcare is to perform technological upgrades in computer science, telecommunications, healthcare services, and computational biology. Digitization, virtualization, and hyperconnectivity technologies are crucial in advancing healthcare systems. Realizing their full potential necessitates collective support and concerted effort toward the transformation of relevant service providers, the establishment of a digital economy value system, and the reshaping of social governance and health concepts. The results elucidate the current state of research and offer guidance for the advancement of the metaverse in healthcare.展开更多
After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group ...After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group events to upgrade and expand the scope of harm. It is difficult to deal. So public opinion control is very important. In this paper, we establish an influence model for spreading of public opinion based on SIR model. Through the political analysis, this paper finds that the network group events will subside, but the influence scope, time and ability of event cannot be ignored. As a result of this study, the corresponding strategies are put forward in this paper.展开更多
Ocular artifacts in Electroencephalography(EEG)recordings lead to inaccurate results in signal analysis and process.Variational Mode Decomposition(VMD)is an adaptive and completely nonrecursive signal processing metho...Ocular artifacts in Electroencephalography(EEG)recordings lead to inaccurate results in signal analysis and process.Variational Mode Decomposition(VMD)is an adaptive and completely nonrecursive signal processing method.There are two parameters in VMD that have a great influence on the result of signal decomposition.Thus,this paper studies a signal decomposition by improving VMD based on squirrel search algorithm(SSA).It’s improved with abilities of global optimal guidance and opposition based learning.The original seasonal monitoring condition in SSA is modified.The feedback of whether the optimal solution is successfully updated is used to establish new seasonal monitoring conditions.Opposition-based learning is introduced to reposition the position of the population in this stage.It is applied to optimize the important parameters of VMD.GOSSA-VMD model is established to remove ocular artifacts from EEG recording.We have verified the effectiveness of our proposal in a public dataset compared with other methods.The proposed method improves the SNR of the dataset from-2.03 to 2.30.展开更多
Life expectancy of the elderly is a significant problem in China, and it changes not only the health care, but also the pension. This study used tracking data from the Chinese Urban and Rural Elderly Population Survey...Life expectancy of the elderly is a significant problem in China, and it changes not only the health care, but also the pension. This study used tracking data from the Chinese Urban and Rural Elderly Population Survey to calculate the age-specific Active Life Expectancy (ALE) of the Chinese elderly population aged 60 years and over. For analysis, this population was divided into different sub-populations according to gender, census register and region. The main conclusions of our study are as follows: 1) The quality of life for elderly males may be greater than that for elderly females;2) There were significant differences in Active Life Expectancy (ALE) and Inactive Life Expectancy (ILE) between urban and rural elderly;3) The differences in ALE between the eastern, central and western regions of China were not significant;and 4) The increased remaining life expectancy of the elderly was mainly attributed to the extended ALE in the lower age group and the expanded ILE in the higher age group. This study expands the knowledge of Chinese elderly’s life expectancy in different health status.展开更多
The inspection activities are often carried out to detect possible indication of failures in plant systems.This paper considers a single unit system subject to two types of failures, where one failure mode is the trad...The inspection activities are often carried out to detect possible indication of failures in plant systems.This paper considers a single unit system subject to two types of failures, where one failure mode is the traditional0-1 logic failure and the other failure mode is described by a two-stage failure process. Adjustable inspections are used to detect the defective stage of the latter. We assume that the inspection duration gets shorter and shorter with a constant ratio. At the same time, preventive replacement is used to avoid the possible failure due to the former failure mode. The renewal process of this system is analyzed and the expected long-run cost per unit time(ELRCUT) is derived. The optimal inspection period and the preventive replacement interval to minimize ELRCUT are studied. At last, a numerical example is presented to illustrate the proposed model.展开更多
In order to know about the essence of service employees' innovation behavior, the service employees' innovation behavior scale based on their unique characteristics is designed. Data were collected from high-s...In order to know about the essence of service employees' innovation behavior, the service employees' innovation behavior scale based on their unique characteristics is designed. Data were collected from high-star hospitalities. Through the issuance and the collection of questionnaires, the scale is verified to have good reliability and validity by SPSS software analysis. Meanwhile,the structural equation model( SEM) is suited for testing structural dimensions of service employees' innovation behavior. The results showed that service employees' innovation behavior could be decomposed into a four-dimensional structure,namely innovation orientation, ideas generation, innovation implementation and innovation practice. In addition,there are significant differences in service employees' innovation behavior about subjects' gender,position,education background and years of working.展开更多
We construct a complete-connective regular network based on Self-replication Space and the structural principles of cantor set and Koch curve. A new definition of dimension is proposed in the paper, and we also invest...We construct a complete-connective regular network based on Self-replication Space and the structural principles of cantor set and Koch curve. A new definition of dimension is proposed in the paper, and we also investigate a simplified method to calculate the dimension of two regular networks. By the study results, we can get a extension: the formation of Euclidean space may be built by the process of the Big Bang's continuously growing at a constant rate of three times.展开更多
This paper screens five pairs of call walTants/put warrants with the same listing date and final exercise date from domestic delisted wattant, and collects and processes relevant statistic in warrant market and stock ...This paper screens five pairs of call walTants/put warrants with the same listing date and final exercise date from domestic delisted wattant, and collects and processes relevant statistic in warrant market and stock market. Because inconformity of strike price between call warrants/put warrants in domestic warrant market, and regarding the strike price of put warrants as standard, this paper takes advantage of BSM formula recalculates the price of call warrants, and carries out verification of option parity relations by regression analysis and Wilcoxon's Sign Rank Test. From a theoretical point of view, homogenous call warrants/put warrants should satisfy the parity relations. However, due to the lack of short sales mechanism in domestic warrant market and stock market, the empirical results indicate that domestic warrant market can' t meet the option parity relations.展开更多
In this paper, a QP-free feasible method with piecewise NCP functions is proposed for nonlinear inequality constrained optimization problems. The new NCP functions are piecewise linear-rational, regular pseudo-smooth...In this paper, a QP-free feasible method with piecewise NCP functions is proposed for nonlinear inequality constrained optimization problems. The new NCP functions are piecewise linear-rational, regular pseudo-smooth and have nice properties. This method is based on the solutions of linear systems of equation reformulation of KKT optimality conditions, by using the piecewise NCP functions. This method is implementable and globally convergent without assuming the strict complementarity condition, the isolatedness of accumulation points. Purr thermore, the gradients of active constraints are not requested to be linearly independent. The submatrix which may be obtained by quasi-Newton methods, is not requested to be uniformly positive definite. Preliminary numerical results indicate that this new QP-free method is quite promising.展开更多
The proximal-based decomposition method was originally proposed by Chen and Teboulle (Math. Programming, 1994, 64:81-101 for solving corrvex minimization problems. This paper extends it to solving monotone variation...The proximal-based decomposition method was originally proposed by Chen and Teboulle (Math. Programming, 1994, 64:81-101 for solving corrvex minimization problems. This paper extends it to solving monotone variational inequalities associated with separable structures with the improvements that the restrictive assumptions on the involved parameters are much relaxed, and thus makes it practical to solve the subproblems easily. Without additional assumptions, global convergence of the new method is proved under the same mild assumptions on the problem's data as the original method.展开更多
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have va...E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have varying levels of understanding when it comes to securing an online application.Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the OpenWeb Application Security Project(OWASP)for its 2017 Top Ten List Cross Site Scripting(XSS).An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws.Many published articles focused on these attacks’binary classification.This article described a novel deep-learning approach for detecting SQL injection and XSS attacks.The datasets for SQL injection and XSS payloads are combined into a single dataset.The dataset is labeledmanually into three labels,each representing a kind of attack.This work implements some pre-processing algorithms,including Porter stemming,one-hot encoding,and the word-embedding method to convert a word’s text into a vector.Our model used bidirectional long short-term memory(BiLSTM)to extract features automatically,train,and test the payload dataset.The payloads were classified into three types by BiLSTM:XSS,SQL injection attacks,and normal.The outcomes demonstrated excellent performance in classifying payloads into XSS attacks,injection attacks,and non-malicious payloads.BiLSTM’s high performance was demonstrated by its accuracy of 99.26%.展开更多
Corporate restructuring was identified as a new industrial force that has great impact on economic values and that therefore has become central in daily financial decision making. This article investigates the optimal...Corporate restructuring was identified as a new industrial force that has great impact on economic values and that therefore has become central in daily financial decision making. This article investigates the optimal restructuring strategies under different dynamic factors and their numerous impacts on firm value. The concept of quasi-leverage is introduced and valuation models are built for corporate debt and equity under imperfect market conditions. The model’s input variables include the quasi-leverage and other firm-specific parameters, the output variables include multiple corporate security values. The restruc- turing cost is formulated in the form of exponential function, which allows us to observe the sensitivity of the variation in security values. The unified model and its analytical solution developed in this research allow us to examine the continuous changes of security values by dynamically changing the coupon rates, riskless interest rate, bankruptcy cost, quasi-leverage, personal tax rate, corporate taxes rate, transaction cost, firm risk, etc., so that the solutions provide useful guidance for financing and restructuring decisions.展开更多
A kind of feed forward neural network with three layers was applied to detect conveyor belt fire faster. And backward propagation (BP) algorithm was used to train the network parameters. The appropriate parameters and...A kind of feed forward neural network with three layers was applied to detect conveyor belt fire faster. And backward propagation (BP) algorithm was used to train the network parameters. The appropriate parameters and architecture of network were ob- tained after training with 81 pair of data. Matlab was used to simulate and the experi- ment result shows training time is least and error reduces most rapidly when ten neu- rons were in hidden layer and momentum coefficient is equal to 0.95. Temperature, rate of temperature change, dense of carbon monoxide and rate of carbon monoxide dense change were considered as four parameters to detect the PVC belt fire in this paper. It is indicated that the network can give alarm as fire takes place about 350 s. The network can effectively detect the fire at the early stage of conveyor belt fire. At the same time, the reliability of alarm can be increased and the anti-interference capability can be en- hanced when using this network.展开更多
A great deal of scientific research in the world aims at discovering the facts about the world so that we understand it better and find solutions to problems. Data enabling technology plays an important role in modern...A great deal of scientific research in the world aims at discovering the facts about the world so that we understand it better and find solutions to problems. Data enabling technology plays an important role in modern scientific discovery and technologic advancement. The importance of good information was long recognized by prominent leaders such as Sun Tzu and Napoleon. Factual data enables managers to measure, to understand their businesses, and to directly translate that knowledge into improved decision making and performance. This position paper argues that data analytics is ready to change engineering management in the following areas: 1) by making relevant historical data available to the manager at the time when it's needed; 2) by filtering out actionable intelligence from the ocean of data; and 3) by integrating useful data from multiple sources to support quantitative decision-making. Considering the unique need for engineering management, the paper proposes researchable topics in the two broad areas of data acquisition and data analytics. The purpose of the paper is to provoke discussion from peers and to encourage research activity.展开更多
Consistent high-quality and defect-free production is the demand of the day. The product recall not only increases engineering and manufacturing cost but also affects the quality and the reliability of the product in ...Consistent high-quality and defect-free production is the demand of the day. The product recall not only increases engineering and manufacturing cost but also affects the quality and the reliability of the product in the eye of users. The monitoring and improvement of a manufacturing process are the strength of statistical process control. In this article we propose a process monitoring memory-based scheme for continuous data under the assumption of normality to detect small non-random shift patterns in any manufacturing or service process.The control limits for the proposed scheme are constructed. The in-control and out-of-control average run length(AVL) expressions have been derived for the performance evaluation of the proposed scheme. Robustness to non-normality has been tested after simulation study of the run length distribution of the proposed scheme, and the comparisons with Shewhart and exponentially weighted moving average(EWMA) schemes are presented for various gamma and t-distributions. The proposed scheme is effective and attractive as it has one design parameter which differentiates it from the traditional schemes. Finally, some suggestions and recommendations are made for the future work.展开更多
This study conducts an in-depth review and Bowtie analysis of automation bias in AI-driven Clinical Decision Support Systems (CDSSs) within healthcare settings. Automation bias, the tendency of human operators to over...This study conducts an in-depth review and Bowtie analysis of automation bias in AI-driven Clinical Decision Support Systems (CDSSs) within healthcare settings. Automation bias, the tendency of human operators to over-rely on automated systems, poses a critical challenge in implementing AI-driven technologies. To address this challenge, Bowtie analysis is employed to examine the causes and consequences of automation bias affected by over-reliance on AI-driven systems in healthcare. Furthermore, this study proposes preventive measures to address automation bias during the design phase of AI model development for CDSSs, along with effective mitigation strategies post-deployment. The findings highlight the imperative role of a systems approach, integrating technological advancements, regulatory frameworks, and collaborative endeavors between AI developers and healthcare practitioners to diminish automation bias in AI-driven CDSSs. We further identify future research directions, proposing quantitative evaluations of the mitigation and preventative measures.展开更多
This paper presents a comparative study of evolutionary algorithms which are considered to be effective in solving the multilevel lot-sizing problem in material requirement planning(MRP)systems.Three evolutionary algo...This paper presents a comparative study of evolutionary algorithms which are considered to be effective in solving the multilevel lot-sizing problem in material requirement planning(MRP)systems.Three evolutionary algorithms(simulated annealing(SA),particle swarm optimization(PSO)and genetic algorithm(GA))are provided.For evaluating the performances of algorithms,the distribution of total cost(objective function)and the average computational time are compared.As a result,both GA and PSO have better cost performances with lower average total costs and smaller standard deviations.When the scale of the multilevel lot-sizing problem becomes larger,PSO is of a shorter computational time.展开更多
Utilizing artificial intelligence(AI)to protect smart coastal cities has become a novel vision for scientific and industrial institutions.One of these AI technologies is using efficient and secure multi-environment Un...Utilizing artificial intelligence(AI)to protect smart coastal cities has become a novel vision for scientific and industrial institutions.One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles(UVs)for anti-submarine attacks.This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy.The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach,and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution.The research’s noteworthy findings demonstrate UVs’logistical capability to promptly detect the target and address the problem while securely keeping the drone’s geographical information.The results suggest that detecting the submarine early increases the likelihood of averting a collision.The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency.Securing communication between Unmanned Aerial Vehicles(UAVs)improves the level of secrecy necessary for the task.The swarm navigation is based on a peer-to-peer system,which allows each UAV to access information from its peers.This,in turn,helps the UAVs to determine the best route to take and to avoid collisions with other UAVs.The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.展开更多
In this paper a class of large supergames, i.e., infinitely repeated games played by many players are studied. The players located on the vertex set of planar rectangle lattice play several basic games with his neighb...In this paper a class of large supergames, i.e., infinitely repeated games played by many players are studied. The players located on the vertex set of planar rectangle lattice play several basic games with his neighbors. The basic game is two-person prisoners’ dilemma game with asymmetric payoffs. Under the conditions of the pre-specified updating rules and the transition probabilities, the relevant stochastic process of strategy evolution forms a Markovian process. The simulation results about the long-run behavior are provided.展开更多
文摘To achieve high performance and reliability in video streaming over wireless local area networks (WLANs), one must jointly consider both optimized association to access points (APs) and handover management based on dynamic scanning of alternate APs. In this article, we propose a new architecture within the software-defined networking (SDN) framework, which allows stations to be connected to several APs simultaneously and to switch fast between them. We evaluate our system in a real-time testbed and demonstrate that our SDN-based handover mechanism significantly reduces the number and duration of video freeze events and allows for smaller playout buffers.
基金supported by the National Natural Science Foundation of China(Grant No.:62102087)Fundamental Research Funds for the Central Universities in UIBE(Grant No.:22PY055-62102087)Scientific Research Laboratory of AI Technology and Applications,UIBE.
文摘Metaverse technology is an advanced form of virtual reality and augmented technologies. It merges the digital world with the real world, thus benefitting healthcare services. Medical informatics is promising in the metaverse. Despite the increasing adoption of the metaverse in commercial applications, a considerable research gap remains in the academic domain, which hinders the comprehensive delineation of research prospects for the metaverse in healthcare. This study employs text-mining methods to investigate the prevalence and trends of the metaverse in healthcare;in particular, more than 34,000 academic articles and news reports are analyzed. Subsequently, the topic prevalence, similarity, and correlation are measured using topic-modeling methods. Based on bibliometric analysis, this study proposes a theoretical framework from the perspectives of knowledge, socialization, digitization, and intelligence. This study provides insights into its application in healthcare via an extensive literature review. The key to promoting the metaverse in healthcare is to perform technological upgrades in computer science, telecommunications, healthcare services, and computational biology. Digitization, virtualization, and hyperconnectivity technologies are crucial in advancing healthcare systems. Realizing their full potential necessitates collective support and concerted effort toward the transformation of relevant service providers, the establishment of a digital economy value system, and the reshaping of social governance and health concepts. The results elucidate the current state of research and offer guidance for the advancement of the metaverse in healthcare.
文摘After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group events to upgrade and expand the scope of harm. It is difficult to deal. So public opinion control is very important. In this paper, we establish an influence model for spreading of public opinion based on SIR model. Through the political analysis, this paper finds that the network group events will subside, but the influence scope, time and ability of event cannot be ignored. As a result of this study, the corresponding strategies are put forward in this paper.
基金supported in part by the Science and Technology Major Project of Anhui Province(Grant No.17030901037)in part by the Humanities and Social Science Fund of Ministry of Education of China(Grant No.19YJAZH098)+2 种基金in part by the Program for Synergy Innovation in the Anhui Higher Education Institutions of China(Grant Nos.GXXT-2020-012,GXXT-2021-044)in part by Science and Technology Planning Project of Wuhu City,Anhui Province,China(Grant No.2021jc1-2)part by Research Start-Up Fund for Introducing Talents from Anhui Polytechnic University(Grant No.2021YQQ066).
文摘Ocular artifacts in Electroencephalography(EEG)recordings lead to inaccurate results in signal analysis and process.Variational Mode Decomposition(VMD)is an adaptive and completely nonrecursive signal processing method.There are two parameters in VMD that have a great influence on the result of signal decomposition.Thus,this paper studies a signal decomposition by improving VMD based on squirrel search algorithm(SSA).It’s improved with abilities of global optimal guidance and opposition based learning.The original seasonal monitoring condition in SSA is modified.The feedback of whether the optimal solution is successfully updated is used to establish new seasonal monitoring conditions.Opposition-based learning is introduced to reposition the position of the population in this stage.It is applied to optimize the important parameters of VMD.GOSSA-VMD model is established to remove ocular artifacts from EEG recording.We have verified the effectiveness of our proposal in a public dataset compared with other methods.The proposed method improves the SNR of the dataset from-2.03 to 2.30.
文摘Life expectancy of the elderly is a significant problem in China, and it changes not only the health care, but also the pension. This study used tracking data from the Chinese Urban and Rural Elderly Population Survey to calculate the age-specific Active Life Expectancy (ALE) of the Chinese elderly population aged 60 years and over. For analysis, this population was divided into different sub-populations according to gender, census register and region. The main conclusions of our study are as follows: 1) The quality of life for elderly males may be greater than that for elderly females;2) There were significant differences in Active Life Expectancy (ALE) and Inactive Life Expectancy (ILE) between urban and rural elderly;3) The differences in ALE between the eastern, central and western regions of China were not significant;and 4) The increased remaining life expectancy of the elderly was mainly attributed to the extended ALE in the lower age group and the expanded ILE in the higher age group. This study expands the knowledge of Chinese elderly’s life expectancy in different health status.
基金the National Natural Science Foundation of China(Nos.71231001,71301009 and71420107023)Ministry of Education Doctor of Philosophy Supervisor Fund of China(No.20120006110025)the Fundamental Research Funds for the Central Universities of China(No.Fl TR-TP-15-031A3)
文摘The inspection activities are often carried out to detect possible indication of failures in plant systems.This paper considers a single unit system subject to two types of failures, where one failure mode is the traditional0-1 logic failure and the other failure mode is described by a two-stage failure process. Adjustable inspections are used to detect the defective stage of the latter. We assume that the inspection duration gets shorter and shorter with a constant ratio. At the same time, preventive replacement is used to avoid the possible failure due to the former failure mode. The renewal process of this system is analyzed and the expected long-run cost per unit time(ELRCUT) is derived. The optimal inspection period and the preventive replacement interval to minimize ELRCUT are studied. At last, a numerical example is presented to illustrate the proposed model.
基金Shanghai University of Engineering Science's Research Cultivation Fund Project,China(No.A25001201194)National Natural Science Foundation,China(No.71301100)+1 种基金the Fundamental Research Funds for the Central Universities,China(No.JB-SK1204)China Postdoctoral Science Foundation(No.2014M561655)
文摘In order to know about the essence of service employees' innovation behavior, the service employees' innovation behavior scale based on their unique characteristics is designed. Data were collected from high-star hospitalities. Through the issuance and the collection of questionnaires, the scale is verified to have good reliability and validity by SPSS software analysis. Meanwhile,the structural equation model( SEM) is suited for testing structural dimensions of service employees' innovation behavior. The results showed that service employees' innovation behavior could be decomposed into a four-dimensional structure,namely innovation orientation, ideas generation, innovation implementation and innovation practice. In addition,there are significant differences in service employees' innovation behavior about subjects' gender,position,education background and years of working.
文摘We construct a complete-connective regular network based on Self-replication Space and the structural principles of cantor set and Koch curve. A new definition of dimension is proposed in the paper, and we also investigate a simplified method to calculate the dimension of two regular networks. By the study results, we can get a extension: the formation of Euclidean space may be built by the process of the Big Bang's continuously growing at a constant rate of three times.
文摘This paper screens five pairs of call walTants/put warrants with the same listing date and final exercise date from domestic delisted wattant, and collects and processes relevant statistic in warrant market and stock market. Because inconformity of strike price between call warrants/put warrants in domestic warrant market, and regarding the strike price of put warrants as standard, this paper takes advantage of BSM formula recalculates the price of call warrants, and carries out verification of option parity relations by regression analysis and Wilcoxon's Sign Rank Test. From a theoretical point of view, homogenous call warrants/put warrants should satisfy the parity relations. However, due to the lack of short sales mechanism in domestic warrant market and stock market, the empirical results indicate that domestic warrant market can' t meet the option parity relations.
基金supported by the Natural science Foundation of China(10371089,10571137)
文摘In this paper, a QP-free feasible method with piecewise NCP functions is proposed for nonlinear inequality constrained optimization problems. The new NCP functions are piecewise linear-rational, regular pseudo-smooth and have nice properties. This method is based on the solutions of linear systems of equation reformulation of KKT optimality conditions, by using the piecewise NCP functions. This method is implementable and globally convergent without assuming the strict complementarity condition, the isolatedness of accumulation points. Purr thermore, the gradients of active constraints are not requested to be linearly independent. The submatrix which may be obtained by quasi-Newton methods, is not requested to be uniformly positive definite. Preliminary numerical results indicate that this new QP-free method is quite promising.
基金the National Natural Science Foundation of China(No.70671024)the Na-tional High-Tech Research and Development Program of China(863 Program)(No.2006AA11Z209)
文摘The proximal-based decomposition method was originally proposed by Chen and Teboulle (Math. Programming, 1994, 64:81-101 for solving corrvex minimization problems. This paper extends it to solving monotone variational inequalities associated with separable structures with the improvements that the restrictive assumptions on the involved parameters are much relaxed, and thus makes it practical to solve the subproblems easily. Without additional assumptions, global convergence of the new method is proved under the same mild assumptions on the problem's data as the original method.
基金funded byResearchers Supporting Project Number(RSP2023R476)King Saud University,Riyadh,Saudi Arabia。
文摘E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have varying levels of understanding when it comes to securing an online application.Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the OpenWeb Application Security Project(OWASP)for its 2017 Top Ten List Cross Site Scripting(XSS).An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws.Many published articles focused on these attacks’binary classification.This article described a novel deep-learning approach for detecting SQL injection and XSS attacks.The datasets for SQL injection and XSS payloads are combined into a single dataset.The dataset is labeledmanually into three labels,each representing a kind of attack.This work implements some pre-processing algorithms,including Porter stemming,one-hot encoding,and the word-embedding method to convert a word’s text into a vector.Our model used bidirectional long short-term memory(BiLSTM)to extract features automatically,train,and test the payload dataset.The payloads were classified into three types by BiLSTM:XSS,SQL injection attacks,and normal.The outcomes demonstrated excellent performance in classifying payloads into XSS attacks,injection attacks,and non-malicious payloads.BiLSTM’s high performance was demonstrated by its accuracy of 99.26%.
文摘Corporate restructuring was identified as a new industrial force that has great impact on economic values and that therefore has become central in daily financial decision making. This article investigates the optimal restructuring strategies under different dynamic factors and their numerous impacts on firm value. The concept of quasi-leverage is introduced and valuation models are built for corporate debt and equity under imperfect market conditions. The model’s input variables include the quasi-leverage and other firm-specific parameters, the output variables include multiple corporate security values. The restruc- turing cost is formulated in the form of exponential function, which allows us to observe the sensitivity of the variation in security values. The unified model and its analytical solution developed in this research allow us to examine the continuous changes of security values by dynamically changing the coupon rates, riskless interest rate, bankruptcy cost, quasi-leverage, personal tax rate, corporate taxes rate, transaction cost, firm risk, etc., so that the solutions provide useful guidance for financing and restructuring decisions.
文摘A kind of feed forward neural network with three layers was applied to detect conveyor belt fire faster. And backward propagation (BP) algorithm was used to train the network parameters. The appropriate parameters and architecture of network were ob- tained after training with 81 pair of data. Matlab was used to simulate and the experi- ment result shows training time is least and error reduces most rapidly when ten neu- rons were in hidden layer and momentum coefficient is equal to 0.95. Temperature, rate of temperature change, dense of carbon monoxide and rate of carbon monoxide dense change were considered as four parameters to detect the PVC belt fire in this paper. It is indicated that the network can give alarm as fire takes place about 350 s. The network can effectively detect the fire at the early stage of conveyor belt fire. At the same time, the reliability of alarm can be increased and the anti-interference capability can be en- hanced when using this network.
文摘A great deal of scientific research in the world aims at discovering the facts about the world so that we understand it better and find solutions to problems. Data enabling technology plays an important role in modern scientific discovery and technologic advancement. The importance of good information was long recognized by prominent leaders such as Sun Tzu and Napoleon. Factual data enables managers to measure, to understand their businesses, and to directly translate that knowledge into improved decision making and performance. This position paper argues that data analytics is ready to change engineering management in the following areas: 1) by making relevant historical data available to the manager at the time when it's needed; 2) by filtering out actionable intelligence from the ocean of data; and 3) by integrating useful data from multiple sources to support quantitative decision-making. Considering the unique need for engineering management, the paper proposes researchable topics in the two broad areas of data acquisition and data analytics. The purpose of the paper is to provoke discussion from peers and to encourage research activity.
文摘Consistent high-quality and defect-free production is the demand of the day. The product recall not only increases engineering and manufacturing cost but also affects the quality and the reliability of the product in the eye of users. The monitoring and improvement of a manufacturing process are the strength of statistical process control. In this article we propose a process monitoring memory-based scheme for continuous data under the assumption of normality to detect small non-random shift patterns in any manufacturing or service process.The control limits for the proposed scheme are constructed. The in-control and out-of-control average run length(AVL) expressions have been derived for the performance evaluation of the proposed scheme. Robustness to non-normality has been tested after simulation study of the run length distribution of the proposed scheme, and the comparisons with Shewhart and exponentially weighted moving average(EWMA) schemes are presented for various gamma and t-distributions. The proposed scheme is effective and attractive as it has one design parameter which differentiates it from the traditional schemes. Finally, some suggestions and recommendations are made for the future work.
文摘This study conducts an in-depth review and Bowtie analysis of automation bias in AI-driven Clinical Decision Support Systems (CDSSs) within healthcare settings. Automation bias, the tendency of human operators to over-rely on automated systems, poses a critical challenge in implementing AI-driven technologies. To address this challenge, Bowtie analysis is employed to examine the causes and consequences of automation bias affected by over-reliance on AI-driven systems in healthcare. Furthermore, this study proposes preventive measures to address automation bias during the design phase of AI model development for CDSSs, along with effective mitigation strategies post-deployment. The findings highlight the imperative role of a systems approach, integrating technological advancements, regulatory frameworks, and collaborative endeavors between AI developers and healthcare practitioners to diminish automation bias in AI-driven CDSSs. We further identify future research directions, proposing quantitative evaluations of the mitigation and preventative measures.
基金the National Natural Science Foundation of China(No.70971017)the Humanities and Social Sciences Project of Ministry of Education(No.10YJC630009)+1 种基金the Social Science Fund of Zhejiang Province(No.10CGGL21YBQ)the Natural Science Foundation of Zhejiang Province(No.Y1100854)
文摘This paper presents a comparative study of evolutionary algorithms which are considered to be effective in solving the multilevel lot-sizing problem in material requirement planning(MRP)systems.Three evolutionary algorithms(simulated annealing(SA),particle swarm optimization(PSO)and genetic algorithm(GA))are provided.For evaluating the performances of algorithms,the distribution of total cost(objective function)and the average computational time are compared.As a result,both GA and PSO have better cost performances with lower average total costs and smaller standard deviations.When the scale of the multilevel lot-sizing problem becomes larger,PSO is of a shorter computational time.
基金This work was funded by the research center of the Future University in Egypt,in 2023.
文摘Utilizing artificial intelligence(AI)to protect smart coastal cities has become a novel vision for scientific and industrial institutions.One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles(UVs)for anti-submarine attacks.This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy.The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach,and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution.The research’s noteworthy findings demonstrate UVs’logistical capability to promptly detect the target and address the problem while securely keeping the drone’s geographical information.The results suggest that detecting the submarine early increases the likelihood of averting a collision.The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency.Securing communication between Unmanned Aerial Vehicles(UAVs)improves the level of secrecy necessary for the task.The swarm navigation is based on a peer-to-peer system,which allows each UAV to access information from its peers.This,in turn,helps the UAVs to determine the best route to take and to avoid collisions with other UAVs.The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.
文摘In this paper a class of large supergames, i.e., infinitely repeated games played by many players are studied. The players located on the vertex set of planar rectangle lattice play several basic games with his neighbors. The basic game is two-person prisoners’ dilemma game with asymmetric payoffs. Under the conditions of the pre-specified updating rules and the transition probabilities, the relevant stochastic process of strategy evolution forms a Markovian process. The simulation results about the long-run behavior are provided.