64 research outputs found

    Efficient Routing Protection Algorithm Based on Optimized Network Topology

    Get PDF
    Network failures are unavoidable and occur frequently. When the network fails, intra-domain routing protocols deploying on the Internet need to undergo a long convergence process. During this period, a large number of messages are discarded, which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers (ISP). Therefore, improving the availability of intra-domain routing is a trending research question to be solved. Industry usually employs routing protection algorithms to improve intra-domain routing availability. However, existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures, which increases the cost of the network and impedes the methods deployed in practice. To address the issues, this study proposes an efficient routing protection algorithm based on optimized network topology (ERPBONT). ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source purposes. Firstly, the backup path with the minimum path coincidence with the shortest path is described as an integer programming problem. Then the simulated annealing algorithm ERPBONT is used to find the optimal solution. Finally, the algorithm is tested on the simulated topology and the real topology. The experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path, and significantly improves the routing availability

    The signal pathways and treatment of cytokine storm in COVID-19

    Get PDF
    The Coronavirus Disease 2019 (COVID-19) pandemic has become a global crisis and is more devastating than any other previous infectious disease. It has affected a significant proportion of the global population both physically and mentally, and destroyed businesses and societies. Current evidence suggested that immunopathology may be responsible for COVID-19 pathogenesis, including lymphopenia, neutrophilia, dysregulation of monocytes and macrophages, reduced or delayed type I interferon (IFN-I) response, antibody-dependent enhancement, and especially, cytokine storm (CS). The CS is characterized by hyperproduction of an array of pro-inflammatory cytokines and is closely associated with poor prognosis. These excessively secreted pro-inflammatory cytokines initiate different inflammatory signaling pathways via their receptors on immune and tissue cells, resulting in complicated medical symptoms including fever, capillary leak syndrome, disseminated intravascular coagulation, acute respiratory distress syndrome, and multiorgan failure, ultimately leading to death in the most severe cases. Therefore, it is clinically important to understand the initiation and signaling pathways of CS to develop more effective treatment strategies for COVID-19. Herein, we discuss the latest developments in the immunopathological characteristics of COVID-19 and focus on CS including the current research status of the different cytokines involved. We also discuss the induction, function, downstream signaling, and existing and potential interventions for targeting these cytokines or related signal pathways. We believe that a comprehensive understanding of CS in COVID-19 will help to develop better strategies to effectively control immunopathology in this disease and other infectious and inflammatory diseases

    Profile and risk factors in farmer injuries: a review based on Haddon matrix and 5 E’s risk reduction strategy

    Get PDF
    Farmers are considered a high-risk group for intentional and unintentional injuries. This review identified significant risk factors for agricultural injuries in farmers and explored injury prevention countermeasures based on the literature. Therefore, CiteSpace software was used to analyze the relevant literature in this field. Additionally, we identified both key risk factors and countermeasures using the Haddon matrix and the 5 E’s risk reduction strategies conceptual framework, respectively. The risk factors were identified from four categories (host, agent, physical environment, and social environment) corresponding to three phases (pre-event, event, and post-event). Interventions of 5 E’s risk reduction strategies including education, engineering, enforcement, economic, and emergency response have been proven effective in preventing injuries or reducing their severity. Our findings provide a comprehensive foundation and research direction for the study and prevention of injuries among farmers

    Positioning Religion in International Relations: The Performative, Discursive, and Relational Dimension of Religious Soft Power

    No full text
    Amidst the global religious resurgence in the post-secular world, the field of international relations finds itself unwilling or unable to situate religion back to theoretical paradigms subject to the Westphalian–Enlightenment prejudice. Advocates of religion’s theoretical and empirical significance often turn to religious soft power, a burgeoning theory that gradually becomes the anchorage of discussion but still suffers from conceptual ambiguity and limited explanatory capacity. This essay endeavors to fill in this lacuna by presenting the interdisciplinary attempt to integrate soft power in IR with the three dimensions of power in sociology, which results in a typology of performative, discursive, and relational dimensions of religious soft power. The explanatory and predictive capacity of this model is tested in the empirical case of the evangelical group’s influence on US foreign policy of the post 9/11 Global War on Terror. A process-level historical account based on archival sources furthers scholars’ knowledge of transnational religious actors’ ability to seize both systematic transformations at the international level and contentious dynamics in the domestic environment, which generates a reorientation in norms, identities, and values that contributes to the outcome of foreign policy, thereby answering the un-addressed question of how religion influences domestic and international politics. The bridging of IR, sociology, and historical sociology, three fields often intertwined, suggests a future direction for not only the religious return to IR but also the overcoming of the “intellectual autism” of this discipline, which needs to be better prepared for continuous challenges of soaring populism, nationalism, and clash of civilizations in the twenty-first century

    Self-Supervised Tracking via Target-Aware Data Synthesis

    Full text link
    While deep-learning based tracking methods have achieved substantial progress, they entail large-scale and high-quality annotated data for sufficient training. To eliminate expensive and exhaustive annotation, we study self-supervised learning for visual tracking. In this work, we develop the Crop-Transform-Paste operation, which is able to synthesize sufficient training data by simulating various appearance variations during tracking, including appearance variations of objects and background interference. Since the target state is known in all synthesized data, existing deep trackers can be trained in routine ways using the synthesized data without human annotation. The proposed target-aware data-synthesis method adapts existing tracking approaches within a self-supervised learning framework without algorithmic changes. Thus, the proposed self-supervised learning mechanism can be seamlessly integrated into existing tracking frameworks to perform training. Extensive experiments show that our method 1) achieves favorable performance against supervised learning schemes under the cases with limited annotations; 2) helps deal with various tracking challenges such as object deformation, occlusion, or background clutter due to its manipulability; 3) performs favorably against state-of-the-art unsupervised tracking methods; 4) boosts the performance of various state-of-the-art supervised learning frameworks, including SiamRPN++, DiMP, and TransT (based on Transformer).Comment: 11 pages, 7 figure

    Predicting Short-Term Electricity Demand by Combining the Advantages of ARMA and XGBoost in Fog Computing Environment

    No full text
    With the rapid development of IoT, the disadvantages of Cloud framework have been exposed, such as high latency, network congestion, and low reliability. Therefore, the Fog Computing framework has emerged, with an extended Fog Layer between the Cloud and terminals. In order to address the real-time prediction on electricity demand, we propose an approach based on XGBoost and ARMA in Fog Computing environment. By taking the advantages of Fog Computing framework, we first propose a prototype-based clustering algorithm to divide enterprise users into several categories based on their total electricity consumption; we then propose a model selection approach by analyzing users’ historical records of electricity consumption and identifying the most important features. Generally speaking, if the historical records pass the test of stationarity and white noise, ARMA is used to model the user’s electricity consumption in time sequence; otherwise, if the historical records do not pass the test, and some discrete features are the most important, such as weather and whether it is weekend, XGBoost will be used. The experiment results show that our proposed approach by combining the advantage of ARMA and XGBoost is more accurate than the classical models
    • …
    corecore