1,697 research outputs found

    Research on Implementation Modes of Ideological and Political Courses in Pediatric Nursing

    Get PDF
    with the continuous advancement of socialist modernization, China needs more and more talents, in particular the talents who are not only high in professional techniques, but also high in ideological and moral level and thinking ability, thus producing ideological and political courses. Along with the constant development of education cause, the professional education starts to concern on ideological and political work and integrate ideological and political courses into professional teaching. To this end, the paper explores the specific implementation path of ideological and political course mode from the perspective of pediatric nursing, describes ideological and political courses in detail and points out the requirements on the construction of ideological and political courses of pediatric nursing so as to provide reference for education of pediatric nursing and improvement of students’ comprehensive quality

    When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks?

    Full text link
    Relay transmission can enhance coverage and throughput, while it can be vulnerable to eavesdropping attacks due to the additional transmission of the source message at the relay. Thus, whether or not one should use relay transmission for secure communication is an interesting and important problem. In this paper, we consider the transmission of a confidential message from a source to a destination in a decentralized wireless network in the presence of randomly distributed eavesdroppers. The source-destination pair can be potentially assisted by randomly distributed relays. For an arbitrary relay, we derive exact expressions of secure connection probability for both colluding and non-colluding eavesdroppers. We further obtain lower bound expressions on the secure connection probability, which are accurate when the eavesdropper density is small. By utilizing these lower bound expressions, we propose a relay selection strategy to improve the secure connection probability. By analytically comparing the secure connection probability for direct transmission and relay transmission, we address the important problem of whether or not to relay and discuss the condition for relay transmission in terms of the relay density and source-destination distance. These analytical results are accurate in the small eavesdropper density regime.Comment: Accepted for publication in IEEE Transactions On Information Forensics and Securit

    Network On Network for Tabular Data Classification in Real-world Applications

    Full text link
    Tabular data is the most common data format adopted by our customers ranging from retail, finance to E-commerce, and tabular data classification plays an essential role to their businesses. In this paper, we present Network On Network (NON), a practical tabular data classification model based on deep neural network to provide accurate predictions. Various deep methods have been proposed and promising progress has been made. However, most of them use operations like neural network and factorization machines to fuse the embeddings of different features directly, and linearly combine the outputs of those operations to get the final prediction. As a result, the intra-field information and the non-linear interactions between those operations (e.g. neural network and factorization machines) are ignored. Intra-field information is the information that features inside each field belong to the same field. NON is proposed to take full advantage of intra-field information and non-linear interactions. It consists of three components: field-wise network at the bottom to capture the intra-field information, across field network in the middle to choose suitable operations data-drivenly, and operation fusion network on the top to fuse outputs of the chosen operations deeply. Extensive experiments on six real-world datasets demonstrate NON can outperform the state-of-the-art models significantly. Furthermore, both qualitative and quantitative study of the features in the embedding space show NON can capture intra-field information effectively

    Current-induced instability of domain walls in cylindrical nanowires

    Full text link
    We study the current-driven domain wall (DW) motion in cylindrical nanowires using micromagnetic simulations by implementing the Landau-Lifshitz-Gilbert equation with nonlocal spin-transfer torque in a finite difference micromagnetic package. We find that in the presence of DW Gaussian wave packets (spin waves) will be generated when the charge current is applied to the system suddenly. And this effect is excluded when using the local spin-transfer torque. The existence of spin waves emission indicates that transverse domain walls can not move arbitrarily fast in cylindrical nanowires although they are free from the Walker limit. We establish an upper-velocity limit for the DW motion by analyzing the stability of Gaussian wave packets using the local spin-transfer torque. Micromagnetic simulations show that the stable region obtained by using nonlocal spin-transfer torque is smaller than that by using its local counterpart. This limitation is essential for multiple domain walls since the instability of Gaussian wave packets will break the structure of multiple domain walls.Comment: 5 pages, 6 figure

    The Role of Waste Glass Powder During the Hydration Process of Composite Cementitious Materials

    Get PDF
    The role of waste glass powder (GP) during the hydration process of composite cementitious materials was investigated by using mercury intrusion porosimetry (MIP), X-ray diffraction (XRD) and scanning electron microscopy (SEM) techniques. The compressive strength was also tested. The results indicate that the chemical activity of GP is low. But the pozzolanic reactivity of GP greatly improves with its fineness and the elevated curing temperature, which contributes to improving the mechanical strength. The hydration process of composite cementitious material containing GP is similar to that of pure cement. With the increase of GP content in the composite cement, the occurring time of second exothermic improves, but the value of second exothermic peak and the cumulative hydration heat reduce. The characteristic pore size of pastes containing GP decreases over curing age, which significantly improves their strength. GP does not modify the type of hydration products of composite cementitious material. The microstructure of hardened pastes containing GP is dense due to the generation of C-S-H gel with a low Ca/Si ratio. There is a reaction ring along GP with high fineness, which can enhance the interfacial transition zone to avoid ASR

    Efficiently Disassemble-and-Pack for Mechanism

    Full text link
    In this paper, we present a disassemble-and-pack approach for a mechanism to seek a box which contains total mechanical parts with high space utilization. Its key feature is that mechanism contains not only geometric shapes but also internal motion structures which can be calculated to adjust geometric shapes of the mechanical parts. Our system consists of two steps: disassemble mechanical object into a group set and pack them within a box efficiently. The first step is to create a hierarchy of possible group set of parts which is generated by disconnecting the selected joints and adjust motion structures of parts in groups. The aim of this step is seeking total minimum volume of each group. The second step is to exploit the hierarchy based on breadth-first-search to obtain a group set. Every group in the set is inserted into specified box from maximum volume to minimum based on our packing strategy. Until an approximated result with satisfied efficiency is accepted, our approach finish exploiting the hierarchy.Comment: 2 pages, 2 figure
    corecore