A simulation model was proposed to investigate the relationship between train delays and passenger delays and to predict the dynamic passenger distribution in a large-scale rail transit network. It was assumed that th...A simulation model was proposed to investigate the relationship between train delays and passenger delays and to predict the dynamic passenger distribution in a large-scale rail transit network. It was assumed that the time varying original-destination demand and passenger path choice probability were given. Passengers were assumed not to change their destinations and travel paths after delay occurs. CapaciW constraints of train and queue rules of alighting and boarding were taken into account. By using the time-driven simulation, the states of passengers, trains and other facilities in the network were updated every time step. The proposed methodology was also tested in a real network, for demonstration. The results reveal that short train delay does not necessarily result in passenger delays, while, on the contrary, some passengers may get benefits from the short delay. However, large initial train delay may result in not only knock-on train and passenger delays along the same line, but also the passenger delays across the entire rail transit network.展开更多
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ...Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.展开更多
This paper reviews the requirements for Software Defi ned Radio (SDR) systems for high-speed wireless applications and compares how well the different technology choices available-from ASICs, FPGAs to digital signal p...This paper reviews the requirements for Software Defi ned Radio (SDR) systems for high-speed wireless applications and compares how well the different technology choices available-from ASICs, FPGAs to digital signal processors (DSPs) and general purpose processors (GPPs) - meet them.展开更多
Viterbi decoding is widely used in many radio systems. Because of the large computation complexity, it is usually implemented with ASIC chips, FPGA chips, or optimized hardware accelerators. With the rapid development...Viterbi decoding is widely used in many radio systems. Because of the large computation complexity, it is usually implemented with ASIC chips, FPGA chips, or optimized hardware accelerators. With the rapid development of the multicore technology, multicore platforms become a reasonable choice for software radio (SR) systems. The Cell Broadband Engine processor is a state-of-art multi-core processor designed by Sony, Toshiba, and IBM. In this paper, we present a 64-state soft input Viterbi decoder for WiMAX SR Baseband system based on the Cell processor. With one Synergistic Processor Element (SPE) of a Cell Processor running at 3.2GHz, our Viterbi decoder can achieve the throughput up to 30Mb/s to decode the tail-biting convolutional code. The performance demonstrates that the proposed Viterbi decoding implementation is very efficient. Moreover, the Viterbi decoder can be easily integrated to the SR system and can provide a highly integrated SR solution. The optimization methodology in this module design can be extended to other modules on Cell platform.展开更多
Collaborative filtering(CF)methods are widely adopted by existing medical recommendation systems,which can help clinicians perform their work by seeking and recommending appropriate medical advice.However,privacy issu...Collaborative filtering(CF)methods are widely adopted by existing medical recommendation systems,which can help clinicians perform their work by seeking and recommending appropriate medical advice.However,privacy issue arises in this process as sensitive patient private data are collected by the recommendation server.Recently proposed privacy-preserving collaborative filtering methods,using computation-intensive cryptography techniques or data perturbation techniques are not appropriate in medical online service.The aim of this study is to address the privacy issues in the context of neighborhoodbased CF methods by proposing a Privacy Preserving Medical Recommendation(PPMR)algorithm,which can protect patients’treatment information and demographic information during online recommendation process without compromising recommendation accuracy and efficiency.The proposed algorithm includes two privacy preserving operations:Private Neighbor Selection and Neighborhood-based Differential Privacy Recommendation.Private Neighbor Selection is conducted on the basis of the notion of k-anonymity method,meaning that neighbors are privately selected for the target user according to his/her similarities with others.Neighborhood-based Differential Privacy Recommendation and a differential privacy mechanism are introduced in this operation to enhance the performance of recommendation.Our algorithm is evaluated using the real-world hospital EMRs dataset.Experimental results demonstrate that the proposed method achieves stable recommendation accuracy while providing comprehensive privacy for individual patients.展开更多
A batch-to-batch optimal iterative learning control (ILC) strategy for the tracking control of product quality in batch processes is presented. The linear time-varying perturbation (LTVP) model is built for produc...A batch-to-batch optimal iterative learning control (ILC) strategy for the tracking control of product quality in batch processes is presented. The linear time-varying perturbation (LTVP) model is built for product quality around the nominal trajectories. To address problems of model-plant mismatches, model prediction errors in the previous batch run are added to the model predictions for the current batch run. Then tracking error transition models can be built, and the ILC law with direct error feedback is explicitly obtained, A rigorous theorem is proposed, to prove the convergence of tracking error under ILC, The proposed methodology is illustrated on a typical batch reactor and the results show that the performance of trajectory tracking is gradually improved by the ILC.展开更多
We present a framework that couples a high-fidelity compositional reservoir simulator with Bayesian optimization(BO)for injection well scheduling optimization in geological carbon sequestration.This work represents on...We present a framework that couples a high-fidelity compositional reservoir simulator with Bayesian optimization(BO)for injection well scheduling optimization in geological carbon sequestration.This work represents one of the first at tempts to apply BO and high-fidelity physics models to geological carbon storage.The implicit parallel accurate reservoir simulator(IPARS)is utilized to accurately capture the underlying physical processes during CO_(2)sequestration.IPARS provides a framework for several flow and mechanics models and thus supports both stand-alone and coupled simulations.In this work,we use the compositional flow module to simulate the geological carbon storage process.The compositional flow model,which includes a hysteretic three-phase relative permeability model,accounts for three major CO_(2)trapping mechanisms:structural trapping,residual gas trapping,and solubility trapping.Furthermore,IPARS is coupled to the International Business Machines(IBM)Corporation Bayesian Optimization Accelerator(BOA)for parallel optimizations of CO_(2)injection strategies during field-scale CO_(2)sequestration.BO builds a probabilistic surrogate for the objective function using a Bayesian machine learning algorithm-the Gaussian process regression,and then uses an acquisition function that leverages the uncertainty in the surrogate to decide where to sample.The IBM BOA addresses the three weaknesses of standard BO that limits its scalability in that IBM BOA supports parallel(batch)executions,scales better for high-dimensional problems,and is more robust to initializations.We demonstrate these merits by applying the algorithm in the optimization of the CO_(2)injection schedule in the Cranfield site in Mississippi,USA,using field data.The optimized injection schedule achieves 16%more gas storage volume and 56%less water/surfactant usage compared with the baseline.The performance of BO is compared with that of a genetic algorithm(GA)and a covariance matrix adaptation(CMA)-evolution strategy(ES).The results demonstrate the superior performance of BO,in that it achieves a competitive objective function value with over 60%fewer forward model evaluations.展开更多
Aiming at the characteristic of the dependency between the application components and the application server platform, a rejuvenation strategy with two different levels of rejuvenation granularities is put forward in ...Aiming at the characteristic of the dependency between the application components and the application server platform, a rejuvenation strategy with two different levels of rejuvenation granularities is put forward in this paper including the application component reiuvenation and the application server system rejuvenation. The availability and maintenance cost functions are obtained by means of establishing the application server aging model and the boundary condition of the optimal rejuvenation time is analyzed. Theory analysis indicates that the two-level rejuvenation strategy is superior to the traditional single level one. Finally, evaluation experiments are carried out and numerical result shows that compared with the traditional rejuvenation policy, the rejuvenation strategy proposed in this paper can further increase availability of the application server and reduce maintenance cost.展开更多
The root system architecture(RSA) of a crop has a profound effect on the uptake of nutrients and consequently the potential yield. However, little is known about the genetic basis of RSA and resource adaptive response...The root system architecture(RSA) of a crop has a profound effect on the uptake of nutrients and consequently the potential yield. However, little is known about the genetic basis of RSA and resource adaptive responses in wheat(Triticum aestivum L.). Here, a high-throughput germination paper-based plant phenotyping system was used to identify seedling traits in a wheat doubled haploid mapping population, Savannah×Rialto. Significant genotypic and nitrate-N treatment variation was found across the population for seedling traits with distinct trait grouping for root size-related traits and root distribution-related traits. Quantitative trait locus(QTL) analysis identified a total of 59 seedling trait QTLs. Across two nitrate treatments, 27 root QTLs were specific to the nitrate treatment. Transcriptomic analyses for one of the QTLs on chromosome 2 D, which was found under low nitrate conditions, revealed gene enrichment in N-related biological processes and 28 differentially expressed genes with possible involvement in a root angle response. Together, these findings provide genetic insight into root system architecture and plant adaptive responses to nitrate, as well as targets that could help improve N capture in wheat.展开更多
An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-t...An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-trusted,it should place as little trust as necessary to allow it to perform the translations.In some applications such as distributed file system,it demands the adversary cannot identify the sender and recipient’s identities.However,none of the exiting IB-PRE schemes satisfy this requirement.In this work,we first define the security model of key-private IB-PRE.Finally,we propose the first key-private IB-PRE scheme.Our scheme is chosen plaintext secure(CPA)and collusion resistant in the standard model.展开更多
Over the last ten years artificial intelligence(AI)methods have begun to pervade even the most common everyday tasks such as email filtering and mobile banking.While the necessary quality and safety standards may have...Over the last ten years artificial intelligence(AI)methods have begun to pervade even the most common everyday tasks such as email filtering and mobile banking.While the necessary quality and safety standards may have understandably slowed the introduction of AI to healthcare when compared with other industries,we are now beginning to see AI methods becoming more available to the clinician in select settings.In this paper we discuss current AI methods as they pertain to gastrointestinal procedures including both gastroenterology and gastrointestinal surgery.The current state of the art for polyp detection in gastroenterology is explored with a particular focus on deep leaning,its strengths,as well as some of the factors that may limit its application to the field of surgery.The use of biophysics(utilizing physics to study and explain biological phenomena)in combination with more traditional machine learning is also discussed and proposed as an alternative approach that may solve some of the challenges associated with deep learning.Past and present uses of biophysics inspired AI methods,such as the use of fluorescence guided surgery to aid in the characterization of colorectal lesions,are used to illustrate the role biophysicsinspired AI can play in the exciting future of the gastrointestinal proceduralist.展开更多
Resonances in the reaction 19F (α ,p) 22Ne have been used to detect and depth profile 19F in solid targets. Incident alpha particles in the range 2100-2500 keV were used and protons were detected at θ=135° with...Resonances in the reaction 19F (α ,p) 22Ne have been used to detect and depth profile 19F in solid targets. Incident alpha particles in the range 2100-2500 keV were used and protons were detected at θ=135° with a large solid angle surface barrier detector covered to stop elastically scattered alpha particles. This technique is a simple, nuclide specific probe and is particularly useful in detecting 19F in the presence of heavy elements such as GaAs where conventional Rutherford backscattering is ineffective. Examples using this technique on epitaxially grown thin films containing LaF3 layers will be presented.展开更多
The systematic errors of wind field associated with the prediction of Asian summer monsoon and their impact on the monsoon circulation have been studied in this paper. The daily operational analyses and fore-casts (up...The systematic errors of wind field associated with the prediction of Asian summer monsoon and their impact on the monsoon circulation have been studied in this paper. The daily operational analyses and fore-casts (up to day-5) of the National Centre for Medium Range Weather Forecasting (NCMRWF), India, over the Asian summer monsoon domain for the period June, July and August of 1995 are made use for the purpose. The systematic errors associated with the low level flow delineate, reduction in the strength of trade winds leading to weakening of cross equatorial flow as well as westerly flow over Indian Ocean. The upper level errors connote weakening of Tibetan anticyclone and reduction in the strength of return flow into the Southern Hemisphere. Further, these errors evince growing tendency with increase in the forecast period. Apart from the general underestimation of kinetic energy budget terms, the model forecasts fail to represent the transient eddies. The forecasts show increasing trend in the conversion of eddy to mean kinetic energy. These errors enfeeble Asian summer monsoon circulation with increase in the forecast period. Key words Monsoon - Systematic errors - Kinetic energy budget The author is grateful to the NCMRWF for providing data and computing facilities to carry out the present study.展开更多
As human beings are deep into the information age, we have been witnessing the rapid development of Big Data. Security and privacy are the most concerned issues in Big Data. Big Data definitely desires the security an...As human beings are deep into the information age, we have been witnessing the rapid development of Big Data. Security and privacy are the most concerned issues in Big Data. Big Data definitely desires the security and privacy protection all through the collection, transmission and analysis procedures. The features of Big Data bring unprecedented challenges to security and privacy protection. To protect the confiden- tiality, integrity and availability, traditional security measures such as cryptography, event analysis, intrusion detection, prevention and access control have taken a new dimension. To protect the privacy, new pattern of measures such as privacy-preserved data analysis need to be explored. There is a lot of work to be done in this emerging field.展开更多
基金Project(51008229)supported by the National Natural Science Foundation of ChinaProject supported by Key Laboratory of Road and Traffic Engineering of Tongji University,China
文摘A simulation model was proposed to investigate the relationship between train delays and passenger delays and to predict the dynamic passenger distribution in a large-scale rail transit network. It was assumed that the time varying original-destination demand and passenger path choice probability were given. Passengers were assumed not to change their destinations and travel paths after delay occurs. CapaciW constraints of train and queue rules of alighting and boarding were taken into account. By using the time-driven simulation, the states of passengers, trains and other facilities in the network were updated every time step. The proposed methodology was also tested in a real network, for demonstration. The results reveal that short train delay does not necessarily result in passenger delays, while, on the contrary, some passengers may get benefits from the short delay. However, large initial train delay may result in not only knock-on train and passenger delays along the same line, but also the passenger delays across the entire rail transit network.
基金supported in part by the Natioual Natural Science Foundation of China(Grant No.60933003)the High Technical Research and Development Program of China(Grant No.2006AA01Z101)+1 种基金Shaanxi ISTC(Grant No.2008KW-02)IBM Joint Project
文摘Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.
文摘This paper reviews the requirements for Software Defi ned Radio (SDR) systems for high-speed wireless applications and compares how well the different technology choices available-from ASICs, FPGAs to digital signal processors (DSPs) and general purpose processors (GPPs) - meet them.
文摘Viterbi decoding is widely used in many radio systems. Because of the large computation complexity, it is usually implemented with ASIC chips, FPGA chips, or optimized hardware accelerators. With the rapid development of the multicore technology, multicore platforms become a reasonable choice for software radio (SR) systems. The Cell Broadband Engine processor is a state-of-art multi-core processor designed by Sony, Toshiba, and IBM. In this paper, we present a 64-state soft input Viterbi decoder for WiMAX SR Baseband system based on the Cell processor. With one Synergistic Processor Element (SPE) of a Cell Processor running at 3.2GHz, our Viterbi decoder can achieve the throughput up to 30Mb/s to decode the tail-biting convolutional code. The performance demonstrates that the proposed Viterbi decoding implementation is very efficient. Moreover, the Viterbi decoder can be easily integrated to the SR system and can provide a highly integrated SR solution. The optimization methodology in this module design can be extended to other modules on Cell platform.
文摘Collaborative filtering(CF)methods are widely adopted by existing medical recommendation systems,which can help clinicians perform their work by seeking and recommending appropriate medical advice.However,privacy issue arises in this process as sensitive patient private data are collected by the recommendation server.Recently proposed privacy-preserving collaborative filtering methods,using computation-intensive cryptography techniques or data perturbation techniques are not appropriate in medical online service.The aim of this study is to address the privacy issues in the context of neighborhoodbased CF methods by proposing a Privacy Preserving Medical Recommendation(PPMR)algorithm,which can protect patients’treatment information and demographic information during online recommendation process without compromising recommendation accuracy and efficiency.The proposed algorithm includes two privacy preserving operations:Private Neighbor Selection and Neighborhood-based Differential Privacy Recommendation.Private Neighbor Selection is conducted on the basis of the notion of k-anonymity method,meaning that neighbors are privately selected for the target user according to his/her similarities with others.Neighborhood-based Differential Privacy Recommendation and a differential privacy mechanism are introduced in this operation to enhance the performance of recommendation.Our algorithm is evaluated using the real-world hospital EMRs dataset.Experimental results demonstrate that the proposed method achieves stable recommendation accuracy while providing comprehensive privacy for individual patients.
基金Supported by the National Natural Science Foundation of China (60404012, 60674064), UK EPSRC (GR/N13319 and GR/R10875), the National High Technology Research and Development Program of China (2007AA04Z193), New Star of Science and Technology of Beijing City (2006A62), and IBM China Research Lab 2007 UR-Program.
文摘A batch-to-batch optimal iterative learning control (ILC) strategy for the tracking control of product quality in batch processes is presented. The linear time-varying perturbation (LTVP) model is built for product quality around the nominal trajectories. To address problems of model-plant mismatches, model prediction errors in the previous batch run are added to the model predictions for the current batch run. Then tracking error transition models can be built, and the ILC law with direct error feedback is explicitly obtained, A rigorous theorem is proposed, to prove the convergence of tracking error under ILC, The proposed methodology is illustrated on a typical batch reactor and the results show that the performance of trajectory tracking is gradually improved by the ILC.
基金supported under the Center for Subsurface Modeling Affiliates Program,United States of America and the National Science Foundation,United States of America(1911320,Collaborative Research:High-Fidelity Modeling of Poromechanics with Strong Discontinuities)。
文摘We present a framework that couples a high-fidelity compositional reservoir simulator with Bayesian optimization(BO)for injection well scheduling optimization in geological carbon sequestration.This work represents one of the first at tempts to apply BO and high-fidelity physics models to geological carbon storage.The implicit parallel accurate reservoir simulator(IPARS)is utilized to accurately capture the underlying physical processes during CO_(2)sequestration.IPARS provides a framework for several flow and mechanics models and thus supports both stand-alone and coupled simulations.In this work,we use the compositional flow module to simulate the geological carbon storage process.The compositional flow model,which includes a hysteretic three-phase relative permeability model,accounts for three major CO_(2)trapping mechanisms:structural trapping,residual gas trapping,and solubility trapping.Furthermore,IPARS is coupled to the International Business Machines(IBM)Corporation Bayesian Optimization Accelerator(BOA)for parallel optimizations of CO_(2)injection strategies during field-scale CO_(2)sequestration.BO builds a probabilistic surrogate for the objective function using a Bayesian machine learning algorithm-the Gaussian process regression,and then uses an acquisition function that leverages the uncertainty in the surrogate to decide where to sample.The IBM BOA addresses the three weaknesses of standard BO that limits its scalability in that IBM BOA supports parallel(batch)executions,scales better for high-dimensional problems,and is more robust to initializations.We demonstrate these merits by applying the algorithm in the optimization of the CO_(2)injection schedule in the Cranfield site in Mississippi,USA,using field data.The optimized injection schedule achieves 16%more gas storage volume and 56%less water/surfactant usage compared with the baseline.The performance of BO is compared with that of a genetic algorithm(GA)and a covariance matrix adaptation(CMA)-evolution strategy(ES).The results demonstrate the superior performance of BO,in that it achieves a competitive objective function value with over 60%fewer forward model evaluations.
基金Supported by the National Natural Foundation ofChina (60473098) IBMChina Research Lab Joint Project
文摘Aiming at the characteristic of the dependency between the application components and the application server platform, a rejuvenation strategy with two different levels of rejuvenation granularities is put forward in this paper including the application component reiuvenation and the application server system rejuvenation. The availability and maintenance cost functions are obtained by means of establishing the application server aging model and the boundary condition of the optimal rejuvenation time is analyzed. Theory analysis indicates that the two-level rejuvenation strategy is superior to the traditional single level one. Finally, evaluation experiments are carried out and numerical result shows that compared with the traditional rejuvenation policy, the rejuvenation strategy proposed in this paper can further increase availability of the application server and reduce maintenance cost.
基金supported by the Biotechnology and Biological Sciences Research Council,UK(BB/M001806/1,BB/L026848/1,BB/P026834/1,and BB/M019837/1)(MJB,DMW,and MPP)the Leverhulme Trust,UK(RPG-2016–409)(MJB and DMW)+1 种基金the European Research Council FUTUREROOTS Advanced Investigator Grant,UK(294729)to MG,JAA,DMW,and MJBthe University of Nottingham Future Food Beacon of Excellence,UK。
文摘The root system architecture(RSA) of a crop has a profound effect on the uptake of nutrients and consequently the potential yield. However, little is known about the genetic basis of RSA and resource adaptive responses in wheat(Triticum aestivum L.). Here, a high-throughput germination paper-based plant phenotyping system was used to identify seedling traits in a wheat doubled haploid mapping population, Savannah×Rialto. Significant genotypic and nitrate-N treatment variation was found across the population for seedling traits with distinct trait grouping for root size-related traits and root distribution-related traits. Quantitative trait locus(QTL) analysis identified a total of 59 seedling trait QTLs. Across two nitrate treatments, 27 root QTLs were specific to the nitrate treatment. Transcriptomic analyses for one of the QTLs on chromosome 2 D, which was found under low nitrate conditions, revealed gene enrichment in N-related biological processes and 28 differentially expressed genes with possible involvement in a root angle response. Together, these findings provide genetic insight into root system architecture and plant adaptive responses to nitrate, as well as targets that could help improve N capture in wheat.
基金This work is supported by the National Natural Science Foundation of China(Nos.61702236,61672270,61602216,61872181)Changzhou Sci&Tech Program(Grant No.CJ20179027).
文摘An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-trusted,it should place as little trust as necessary to allow it to perform the translations.In some applications such as distributed file system,it demands the adversary cannot identify the sender and recipient’s identities.However,none of the exiting IB-PRE schemes satisfy this requirement.In this work,we first define the security model of key-private IB-PRE.Finally,we propose the first key-private IB-PRE scheme.Our scheme is chosen plaintext secure(CPA)and collusion resistant in the standard model.
文摘Over the last ten years artificial intelligence(AI)methods have begun to pervade even the most common everyday tasks such as email filtering and mobile banking.While the necessary quality and safety standards may have understandably slowed the introduction of AI to healthcare when compared with other industries,we are now beginning to see AI methods becoming more available to the clinician in select settings.In this paper we discuss current AI methods as they pertain to gastrointestinal procedures including both gastroenterology and gastrointestinal surgery.The current state of the art for polyp detection in gastroenterology is explored with a particular focus on deep leaning,its strengths,as well as some of the factors that may limit its application to the field of surgery.The use of biophysics(utilizing physics to study and explain biological phenomena)in combination with more traditional machine learning is also discussed and proposed as an alternative approach that may solve some of the challenges associated with deep learning.Past and present uses of biophysics inspired AI methods,such as the use of fluorescence guided surgery to aid in the characterization of colorectal lesions,are used to illustrate the role biophysicsinspired AI can play in the exciting future of the gastrointestinal proceduralist.
文摘Resonances in the reaction 19F (α ,p) 22Ne have been used to detect and depth profile 19F in solid targets. Incident alpha particles in the range 2100-2500 keV were used and protons were detected at θ=135° with a large solid angle surface barrier detector covered to stop elastically scattered alpha particles. This technique is a simple, nuclide specific probe and is particularly useful in detecting 19F in the presence of heavy elements such as GaAs where conventional Rutherford backscattering is ineffective. Examples using this technique on epitaxially grown thin films containing LaF3 layers will be presented.
文摘The systematic errors of wind field associated with the prediction of Asian summer monsoon and their impact on the monsoon circulation have been studied in this paper. The daily operational analyses and fore-casts (up to day-5) of the National Centre for Medium Range Weather Forecasting (NCMRWF), India, over the Asian summer monsoon domain for the period June, July and August of 1995 are made use for the purpose. The systematic errors associated with the low level flow delineate, reduction in the strength of trade winds leading to weakening of cross equatorial flow as well as westerly flow over Indian Ocean. The upper level errors connote weakening of Tibetan anticyclone and reduction in the strength of return flow into the Southern Hemisphere. Further, these errors evince growing tendency with increase in the forecast period. Apart from the general underestimation of kinetic energy budget terms, the model forecasts fail to represent the transient eddies. The forecasts show increasing trend in the conversion of eddy to mean kinetic energy. These errors enfeeble Asian summer monsoon circulation with increase in the forecast period. Key words Monsoon - Systematic errors - Kinetic energy budget The author is grateful to the NCMRWF for providing data and computing facilities to carry out the present study.
文摘As human beings are deep into the information age, we have been witnessing the rapid development of Big Data. Security and privacy are the most concerned issues in Big Data. Big Data definitely desires the security and privacy protection all through the collection, transmission and analysis procedures. The features of Big Data bring unprecedented challenges to security and privacy protection. To protect the confiden- tiality, integrity and availability, traditional security measures such as cryptography, event analysis, intrusion detection, prevention and access control have taken a new dimension. To protect the privacy, new pattern of measures such as privacy-preserved data analysis need to be explored. There is a lot of work to be done in this emerging field.