83 research outputs found

    Can Web Forum Provide Valuable Information a Case Study on Chinese Stock Web Forum

    Get PDF
    Web forum has become a major information sharing platform for the individual investor where may include much valuable information. In this paper, we apply automatic sentiment extraction methods to assess the public opinions on Chinese stock forms. A case study is conducted with Chinese stock Web forum. The case study shows that web forum can provide valuable information about the stock market and the discussion sentiment characteristic is significant correlated with stock market activities. Result of regression analysis shows the differences in investor sentiment has more power than sentiment index and message volume in prediction to stock index in China

    Energy Efficient Power Allocation for Distributed Antenna System over Shadowed Nakagami Fading Channel

    Get PDF
    In this paper, the energy efficiency (EE) of downlink distributed antenna system (DAS) with multiple receive antennas is investigated over composite fading channel that takes the path loss, shadow fading and Nakagami-m fading into account. Our aim is to maximize EE which is defined as the ratio of the transmission rate to the total consumed power under the constraints of maximum transmit power of each remote antenna. According to the definition of EE and using the upper bound of average EE, the optimized objective function is provided. Based on this, utilizing Karush-Kuhn-Tucker (KKT) conditions and mathematical derivation, a suboptimal energy efficient power allocation (PA) scheme is developed, and closed-form PA coefficients are obtained. The developed scheme has the EE performance close to the existing optimal scheme. Moreover, it has relatively lower complexity than the existing scheme because only the statistic channel information and less iteration are required. Besides, it includes the scheme in composite Rayleigh channel as a special case. Simulation results show the effectiveness of the developed scheme

    Optimal preventive strike strategy vs. optimal attack strategy in a defense-attack game

    Get PDF
    This paper analyzes an attack-defense game between one defender and one attacker. Among, the defender moves first and allocates its resources to three different methods: employing a preventive strike, founding false targets, and protecting its genuine object. The preventive strike may expose the genuine object, and different from previous literature, a false target may also be detected to be false. The attacker, observing the actions taken by the defender and allocating its resources to three methods: protecting its own base from the preventive strike, founding false bases, and attacking the defender's genuine object. Similarly, a false base may be correctly identified. Different from previous methods in evaluating the potential outcome, for each of the defender's given strategies, the attacker tries to maximize its cumulative prospect value considering different possible outcomes. Similarly, the defender maximizes its cumulative prospect value, assuming that the attacker chooses the strategy to maximize the attacker's cumulative prospect value. Numerical examples are presented to illustrate the optimal number of bases to attack by preventive strike, and the optimal number of targets to attack by attacker

    Role of transcription factors in porcine reproductive and respiratory syndrome virus infection: A review

    Get PDF
    Porcine reproductive and respiratory syndrome (PRRS) is an infectious disease caused by the PRRS virus that leads to reproductive disorders and severe dyspnoea in pigs, which has serious economic impacts. One of the reasons PRRSV cannot be effectively controlled is that it has developed countermeasures against the host immune response, allowing it to survive and replicate for long periods. Transcription Factors acts as a bridge in the interactions between the host and PRRSV. PRRSV can create an environment conducive to PRRSV replication through transcription factors acting on miRNAs, inflammatory factors, and immune cells. Conversely, some transcription factors also inhibit PRRSV proliferation in the host. In this review, we systematically described how PRRSV uses host transcription factors such as SP1, CEBPB, STATs, and AP-1 to escape the host immune system. Determining the role of transcription factors in immune evasion and understanding the pathogenesis of PRRSV will help to develop new treatments for PRRSV

    Optimal defence-attack strategies between one defender and two attackers

    Get PDF
    This paper analyses the optimal strategies for one defender and two attackers in a defence-attack game, where a) the defender allocates its resource into defending against and attacking the two attackers, and b) the two attackers, after observing the action of the defender, allocate their resources into attacking and defending against the defender, on either a cooperative or non-cooperative basis. On a cooperative basis, for each of the defender’s given strategies, the two attackers work together to maximise the sum of their cumulative prospect values while anticipating the eight possible game outcomes. On a non-cooperative basis, for each of the defender’s given strategies, each attacker simultaneously yet independently tries to maximise their own cumulative prospect value. In both cases, the defender maximises its cumulative prospect value while anticipating the attackers’ actions. Backward induction is employed to obtain the optimal defence and attack strategies for all scenarios. Numerical examples are performed to illustrate the applications of the strategies. In general, we find two opposing effects considering the attackers’ strategies and analyse the alteration of strategies for the participants under two different risk preferences: risk-averse and risk seeking. The reasons for the alteration are also performed to illustrate the practical applications

    Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets

    Get PDF
    This paper analyzes the optimal strategies for the attacker and the defender in an attack–defense game, considering the risk attitudes of both parties. The defender moves first, allocating its limited resources to three different measures: launching a proactive strike or preventive strike, building false targets, and protecting its genuine object. It is assumed that (a) launching a proactive strike has limited effectiveness on its rival and does not expose the genuine object itself, (b) a false target might be correctly identified as false, and (c) launching a preventive strike consumes less resources than a proactive strike and might expose the genuine object. The attacker moves after observing the defender's movements, allocating its limited resources to three measures: protecting its own base from a proactive strike or preventive strike, building false bases, and attacking the defender's genuine object. For each of the defender's given strategies, the attacker chooses the attack strategy that maximizes its cumulative prospect value, which accounts for the players’ risk attitudes. Similarly, the defender maximizes its cumulative prospect value by anticipating that the attacker will always choose the strategy combination that maximizes its own cumulative prospect value. Backward induction is used to obtain the optimal defense, attack strategies, and their corresponding cumulative prospect values. Our results show that the introduction of risk attitudes leads the game to a lose-lose situation under some circumstances and benefits one party in other cases

    A new perspective for assessing water transport and associated retention effects in a large reservoir

    Get PDF
    Author Posting. © American Geophysical Union, 2018. This article is posted here by permission of American Geophysical Union for personal use, not for redistribution. The definitive version was published in Geophysical Research Letters 45 (2018): 9642-9650, doi:10.1029/2018GL079687.Radioactive tracer techniques may be useful for assessing water transport and the overall effects of concurrent biogeochemical processes in river‐reservoir systems. In this study, we show that radium isotopes can assess the hydrodynamics and sediment/nutrient retention in the Xiaolangdi Reservoir, the largest impoundment along the Yellow River, China. Activity ratios of 224Ra/226Ra and 223Ra/226Ra were used for water mass age calculations in the riverine, transition, and lentic reaches of the reservoir. Water ages were combined with the length scale of three river‐reservoir zones to determine water transport rates of 3.6 ± 1.2, 1.3 ± 0.3, and 0.16 ± 0.14 km/day, respectively. Radium ages were also used to quantify the net retention of sediment and nutrients in different parts of the river‐reservoir system. Suspended sediment was removed at a rate of 1.4 ± 0.6 g/m3/day, mainly in the riverine zone. Nutrient dynamics were more complicated, with addition or removal at different rates within the three zones.Ministry of Education of the People's Republic of China Grant Number: MS2014ZGHY028; Qingdao National Laboratory for Marine Science and Technology Grant Number: 2016ASKJ02; National Science Foundation of China Grant Numbers: 41521064, 41876075, 41576075; Ministry of Science and Technology of the People's Republic of China Grant Number: 2016YFA06009022019-03-2

    Threats to the Soil Resource Base of Food Security in China and Europe. A report from the Sino-EU Panel on Land and Soil

    Get PDF
    To secure adequate food supply is the major challenge for humanity in the 21st century. Growing world population and its urbanization put pressure on this basic need, which is further threatened by the constant loss of fertile land. The assessment of sustainability of food supply under increasing pressure on land resources has been selected as one of the most important priority topics of the activities of Sino-EU Panel on Land and Soil (SEPLS). The Panel has performed a number of related researches and discussed the results on a scientific seminar in January 2012 in Nanjing, China. This report is an output of this seminar with a summary of the structured discussions on the below issues. 1. Urban and peri-urban development (soil sealing and loss of land functions) Urbanization and the linked spread of infrastructural development mean sealing of soil surfaces. Soil sealing is the most rapidly growing limitation for soil functions (including biomass production function) both in China and Europe. Soil sealing in China has been taking dramatic degree in the last two decades and the process is estimated to continue in the coming period as well. While urban and peri-urban development is looked as a necessity for social development, its negative effect on natural resources are inevitable. 2. Land degradation Despite the widely recognized importance of land degradation in the unsustainability of economic development and implementation of various policies to halt degradation (e.g. green for grain programme in China; cross-compliance measures in the EU), loss of land productivity by degradation is an ongoing process both in China and the EU. Major forms of soil degradation (erosion, desertification, landslides etc.) are similar in both regions. Assessment of the causes and consequences of soil degradation processes in relation to policy actions is highlighted among the priorities of the SEPLS. 3. Intensive agriculture and multi-function management of land resources Intensification and extensification in agriculture can be considered as the main changes in land use in rural areas in both EU and China. While agricultural intensification is one of the greatest threats to the soil and environment and then hampers the sustainable development of agriculture and food security. To meet this challenge, sustainable management of multi-functionality of land resources is undoubtedly an effective strategy, in which the EU has a good expertise. Bilateral exchange of the experience and knowledge benefits the sustainable management of land resources.JRC.H.5-Land Resources Managemen

    Asymmetric Chiral Coupling in a Topological Resonator

    Full text link
    Chiral light-matter interactions supported by topological edge modes at the interface of valley photonic crystals provide a robust method to implement the unidirectional spin transfer. The valley topological photonic crystals possess a pair of counterpropagating edge modes. The edge modes are robust against the sharp bend of 60∘60^{\circ} and 120∘120^{\circ}, which can form a resonator with whispering gallery modes. Here, we demonstrate the asymmetric emission of chiral coupling from single quantum dots in a topological resonator by tuning the coupling between a quantum emitter and a resonator mode. Under a magnetic field in Faraday configuration, the exciton state from a single quantum dot splits into two exciton spin states with opposite circularly polarized emissions due to Zeeman effect. Two branches of the quantum dot emissions couple to a resonator mode in different degrees, resulting in an asymmetric chiral emission. Without the demanding of site-control of quantum emitters for chiral quantum optics, an extra degree of freedom to tune the chiral contrast with a topological resonator could be useful for the development of on-chip integrated photonic circuits.Comment: 13 pages, 4 figure

    Postural balance in individuals with knee osteoarthritis during stand-to-sit task

    Get PDF
    Objective: Stand-to-sit task is an important daily function, but there is a lack of research evidence on whether knee osteoarthritis (knee OA) affects the postural balance during the task. This study aimed to compare individuals with knee OA and asymptomatic controls in postural balance and identify kinematic and lower extremity muscle activity characteristics in individuals with knee OA during the stand-to-sit task. Methods: In total, 30 individuals with knee OA and 30 age-matched asymptomatic controls performed the 30-s Chair Stand Test (30sCST) at self-selected speeds. Motion analysis data and surface electromyography (sEMG) were collected while participants performed the 30sCST. To quantify postural balance, the displacement of the center of mass (CoM) and the peak instantaneous velocity of the CoM were calculated. The kinematic data included forward lean angles of the trunk and pelvic, range of motion (RoM) of the hip, knee, and ankle joints in the sagittal plane. The averaged activation levels of gluteus maximus, vastus lateralis, vastus medialis, rectus femoris, biceps femoris (BF), tibialis anterior (TA), and medial head of gastrocnemius muscles were indicated by the normalized root mean square amplitudes. Results: Compared with the asymptomatic control group, the knee OA group prolonged the duration of the stand-to-sit task, demonstrated significantly larger CoM displacement and peak instantaneous CoM velocity in the anterior-posterior direction, reduced ankle dorsiflexion RoM, greater anterior pelvic tilt RoM, and lower quadriceps femoris and muscles activation level coupled with higher BF muscle activation level during the stand-to-sit task. Conclusion: This study indicates that individuals with knee OA adopt greater pelvic forward lean RoM and higher BF muscle activation level during the stand-to-sit task. However, these individuals exist greater CoM excursion in the anterior-posterior direction and take more time to complete the task. This daily functional activity should be added to the rehabilitation goals for individuals with knee OA. The knee OA group performs reduced ankle dorsiflexion RoM, quadriceps femoris, and TA activation deficit. In the future, the rehabilitation programs targeting these impairments could be beneficial for restoring the functional transfer in individuals with knee OA
    • 

    corecore