111 research outputs found

    Proof of User Similarity: the Spatial Measurer of Blockchain

    Full text link
    Although proof of work (PoW) consensus dominates the current blockchain-based systems mostly, it has always been criticized for the uneconomic brute-force calculation. As alternatives, energy-conservation and energy-recycling mechanisms heaved in sight. In this paper, we propose proof of user similarity (PoUS), a distinct energy-recycling consensus mechanism, harnessing the valuable computing power to calculate the similarities of users, and enact the calculation results into the packing rule. However, the expensive calculation required in PoUS challenges miners in participating, and may induce plagiarism and lying risks. To resolve these issues, PoUS embraces the best-effort schema by allowing miners to compute partially. Besides, a voting mechanism based on the two-parties computation and Bayesian truth serum is proposed to guarantee privacy-preserved voting and truthful reports. Noticeably, PoUS distinguishes itself in recycling the computing power back to blockchain since it turns the resource wastage to facilitate refined cohort analysis of users, serving as the spatial measurer and enabling a searchable blockchain. We build a prototype of PoUS and compare its performance with PoW. The results show that PoUS outperforms PoW in achieving an average TPS improvement of 24.01% and an average confirmation latency reduction of 43.64%. Besides, PoUS functions well in mirroring the spatial information of users, with negligible computation time and communication cost.Comment: 12 pages,10 figure

    Therapeutic effect of a combination of montelukast and vitamins A and D drops in children with bronchial asthma, and its influence on quality of life

    Get PDF
    Purpose: To investigate the efficacy of a combination of montelukast and vitamins A and D drops in bronchial asthma children, and its effect on quality of life.Methods: Sixty bronchial asthma children from June 2018 to June 2020 were collected and randomized into study group and control group (30 cases in each group). Control group received montelukast sodium (chewable tablets), while the study group received vitamins A and D drops (capsules) plus. Clinical efficacy, lung function, serum inflammatory factors, and quality of life were evaluated and compared.Results: Compared with control group, total treatment effectiveness was higher and the symptom remission period was shorter in the study group (p < 0.05). Post-treatment, the parameters of FEV1 and FVC increased in both groups, but higher in the study group (p < 0.05). Serum levels of CRP and IL-4 in both groups decreased after treatment, while serum IL-10 levels were significantly up-regulated. Compared with control group, the levels of these indicators were improved in the study group (p < 0.05). Post-treatment Chinese Version of Pediatric Quality of Life Asthma Specific Scale (PedSQL) score was higher than before treatment, with higher values (for all indicators) in the study group (p < 0.05).Conclusion: The combination therapy of montelukast and vitamins A and D drops produces good clinical efficacy in children with bronchial asthma. It significantly shortens the time taken for relief of clinical symptoms, improves lung function, reduces inflammatory response, controls asthma, and improves the quality of life of the patients

    Spatial Crowdsourcing Task Allocation Scheme for Massive Data with Spatial Heterogeneity

    Full text link
    Spatial crowdsourcing (SC) engages large worker pools for location-based tasks, attracting growing research interest. However, prior SC task allocation approaches exhibit limitations in computational efficiency, balanced matching, and participation incentives. To address these challenges, we propose a graph-based allocation framework optimized for massive heterogeneous spatial data. The framework first clusters similar tasks and workers separately to reduce allocation scale. Next, it constructs novel non-crossing graph structures to model balanced adjacencies between unevenly distributed tasks and workers. Based on the graphs, a bidirectional worker-task matching scheme is designed to produce allocations optimized for mutual interests. Extensive experiments on real-world datasets analyze the performance under various parameter settings

    Privacy-aware Data Trading

    Get PDF
    The growing threat of personal data breach in data trading pinpoints an urgent need to develop countermeasures for preserving individual privacy. The state-of-the-art work either endows the data collector with the responsibility of data privacy or reports only a privacy-preserving version of the data. The basic assumption of the former approach that the data collector is trustworthy does not always hold true in reality, whereas the latter approach reduces the value of data. In this paper, we investigate the privacy leakage issue from the root source. Specifically, we take a fresh look to reverse the inferior position of the data provider by making her dominate the game with the collector to solve the dilemma in data trading. To that aim, we propose the noisy-sequentially zero-determinant (NSZD) strategies by tailoring the classical zero-determinant strategies, originally designed for the simultaneous-move game, to adapt to the noisy sequential game. NSZD strategies can empower the data provider to unilaterally set the expected payoff of the data collector or enforce a positive relationship between her and the data collector's expected payoffs. Both strategies can stimulate a rational data collector to behave honestly, boosting a healthy data trading market. Numerical simulations are used to examine the impacts of key parameters and the feasible region where the data provider can be an NSZD player. Finally, we prove that the data collector cannot employ NSZD to further dominate the data market for deteriorating privacy leakage.Comment: 10 pages, 11 figure

    Exploratory Study on the Methodology of Fast Imaging of Unilateral Stroke Lesions by Electrical Impedance Asymmetry in Human Heads

    Get PDF
    Stroke has a high mortality and disability rate and should be rapidly diagnosed to improve prognosis. Diagnosing stroke is not a problem for hospitals with CT, MRI, and other imaging devices but is difficult for community hospitals without these devices. Based on the mechanism that the electrical impedance of the two hemispheres of a normal human head is basically symmetrical and a stroke can alter this symmetry, a fast electrical impedance imaging method called symmetrical electrical impedance tomography (SEIT) is proposed. In this technique, electrical impedance tomography (EIT) data measured from the undamaged craniocerebral hemisphere (CCH) is regarded as reference data for the remaining EIT data measured from the other CCH for difference imaging to identify the differences in resistivity distribution between the two CCHs. The results of SEIT imaging based on simulation data from the 2D human head finite element model and that from the physical phantom of human head verified this method in detection of unilateral stroke

    Translation of Political Terminology From Chinese Into Russian

    Get PDF
    В статье рассматривается политическая терминология в русском переводе выступления Си Цзиньпина в 2022 г.Terminological vocabulary is an integral part of the speech of state leaders at international events, so its translation is very important for relevant understanding of the ideology and opinions of the state leader by other actors in the international community.The article focuses on the study of the peculiarities of the political translation terminology from Chinese into Russian. The object of the study is the translation strategies used in translating political terms. The purpose of the article is to analyze the specific features of the terms of political translation. The research methodology is based on the principles of cognitive linguistics, interdisciplinarity and comprehensive analysis. Based on the principles of cognitive translation, the article explores political terminology in the Russian translation of President Xi Jinping's speech at the World Economic Forum in 2022 and analyzes the translation strategies used

    Spiro­[cyclo­pentane-1,2′(1′H)-pyrido[2,3-d]pyrimidin]-4′(3′H)-one

    Get PDF
    The title compound, C11H13N2O, was obtained by cyclo­condensation of 2-amino­pyridine-3-carbonitrile with cyclo­penta­none. The mol­ecule is built up from two fused six-membered rings and one five-membered ring linked through a spiro C atom. Both the pyrimidine and the cyclo­pentane rings adopt envelope conformations. In the crystal structure, mol­ecules are linked by inter­molecular N—H⋯O hydrogen bonds

    Synthesis, Characterization, and Adsorptive Properties of Fe 3

    Get PDF
    A magnetic Fe3O4/GO composite with potential for rapid solid-liquid separation through a magnetic field was synthesized using GO (graphene oxide) and Fe3O4 (ferriferous oxide). Characterization of Fe3O4/GO used scanning electron microscope (SEM), X-ray diffractometer (XRD), Fourier transform infrared spectrometer (FT-IR), and Vibrating Sample Magnetometer (VSM). A number of factors such as pH and coexisting ions on adsorbent dose were tested in a series of batch experiments. The results showed that GO and Fe3O4 are strongly integrated. For pH values in the range of 3.0~9.0, the removal efficiency of Sb(III) using the synthesized Fe3O4/GO remained high (95%). The adsorption showed good fit to a pseudo-second-order and Langmiur model, with the maximum adsorption capacity of 9.59 mg/g maintained across pH 3.0–9.0. Thermodynamic parameters revealed that the adsorption process was spontaneous and endothermic. Analysis by X-ray photoelectron spectroscopy (XPS) showed that the adsorption process is accompanied by a redox reaction

    Privacy-Aware Data Trading

    Get PDF
    The growing threat of personal data breach in data trading pinpoints an urgent need to develop countermeasures for preserving individual privacy. The state-of-the-art work either endows the data collector with the responsibility of data privacy or reports only a privacy-preserving version of the data. The basic assumption of the former approach that the data collector is trustworthy does not always hold true in reality, whereas the latter approach reduces the value of data. In this paper, we investigate the privacy leakage issue from the root source. Specifically, we take a fresh look to reverse the inferior position of the data provider by making her dominate the game with the collector to solve the dilemma in data trading. To that aim, we propose the noisy-sequentially zero-determinant (NSZD) strategies by tailoring the classical zero-determinant strategies, originally designed for the simultaneous-move game, to adapt to the noisy sequential game. NSZD strategies can empower the data provider to unilaterally set the expected payoff of the data collector or enforce a positive relationship between her and the data collector's expected payoffs. Both strategies can stimulate a rational data collector to behave honestly, boosting a healthy data trading market. Numerical simulations are used to examine the impacts of key parameters and the feasible region where the data provider can be an NSZD player. Finally, we prove that the data collector cannot employ NSZD to further dominate the data market for deteriorating privacy leakage
    corecore