首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到8条相似文献,搜索用时 0 毫秒
1.
The economy is a system of complex interactions. The COVID-19 pandemic strongly influenced economies, particularly through introduced restrictions, which formed a completely new economic environment. The present work focuses on the changes induced by the COVID-19 epidemic on the correlation network structure. The analysis is performed on a representative set of USA companies—the S&P500 components. Four different network structures are constructed (strong, weak, typically, and significantly connected networks), and the rank entropy, cycle entropy, averaged clustering coefficient, and transitivity evolution are established and discussed. Based on the mentioned structural parameters, four different stages have been distinguished during the COVID-19-induced crisis. The proposed network properties and their applicability to a crisis-distinguishing problem are discussed. Moreover, the optimal time window problem is analysed.  相似文献   

2.
Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance in the complex communication environments. Here we investigate the security of the system under the effects of the fluctuating channel transmittance, where the transmittance is regarded as a fixed value related to communication distance in theory. We first discuss the parameter estimation in fluctuating channel transmittance based on these establishing of channel models, which has an obvious deviation compared with the estimated parameters in the ideal case. Then, we show the evaluated results when the channel transmittance respectively obeys the two-point distribution and the uniform distribution. In particular, the two distributions can be easily realized under the manipulation of eavesdroppers. Finally, we analyze the secret key rate of the system when the channel transmittance obeys the above distributions. The simulation analysis indicates that a slight fluctuation of the channel transmittance may seriously reduce the performance of the system, especially in the extreme asymmetric case. Furthermore, the communication between Alice, Bob and Charlie may be immediately interrupted. Therefore, eavesdroppers can manipulate the channel transmittance to complete a denial-of-service attack in a practical CV-MDI QKD system. To resist this attack, the Gaussian post-selection method can be exploited to calibrate the parameter estimation to reduce the deterioration of performance of the system.  相似文献   

3.
Inter-domain routing systems is an important complex network in the Internet. Research on the vulnerability of inter-domain routing network nodes is of great support to the stable operation of the Internet. For the problem of node vulnerability, we proposed a method for identifying key nodes in inter-domain routing systems based on cascading failures (IKN-CF). Firstly, we analyzed the topology of inter-domain routing network and proposed an optimal valid path discovery algorithm considering business relationships. Then, the reason and propagation mechanism of cascading failure in the inter-domain routing network were analyzed, and we proposed two cascading indicators, which can approximate the impact of node failure on the network. After that, we established a key node identification model based on improved entropy weight TOPSIS (EWT), and the key node sequence in the network can be obtained through EWT calculation. We compared the existing three methods in two real inter-domain routing networks. The results indicate that the ranking results of IKN-CF are high accuracy, strong stability, and wide applicability. The accuracy of the top 100 nodes of the ranking result can reach 83.6%, which is at least 12.8% higher than the average accuracy of the existing three methods.  相似文献   

4.
Many persons with Parkinson's disease (PD) will eventually experience vocal impairment as their condition advances. Using standard perturbation analyses (parameters like jitter and shimmer) to measure fluctuations in phonatory signal may inhibit researchers from recognizing severely disordered patterns that seem to be present in the voices of some PD patients. Nonlinear dynamic analysis can quantify these aperiodic patterns, which indicate severe pathology that is usually characterized perceptually by hoarseness. Here, sustained vowel phonations of a heterogeneous group of PD subjects (20 women and 21 men) were compared with those of a control group (22 women and 18 men) based on results of nonlinear dynamic analyses (D(2)) and perturbation analyses. Results showed PD subjects as a whole to have significantly higher D(2) values than control subjects (P = 0.016), which indicates increased signal complexity in PD vocal pathology. Differences in the comparison of these two groups were significant in jitter (P = 0.014) but nonsignificant in shimmer (P = 0.695). Furthermore, the performance on these three measures was affected by subject sex. Nonlinear dynamic analysis showed significantly higher D(2) in the female PD group than in the female control group (P = 0.001), but jitter and shimmer did not show such a difference. The male PD group had statistically higher jitter than the male control group (P = 0.036), but these groups did not differ in D(2) or shimmer. Overall, nonlinear dynamic analysis may be a valuable method for the diagnosis of Parkinsonian laryngeal pathology.  相似文献   

5.
Insecure applications (apps) are increasingly used to steal users’ location information for illegal purposes, which has aroused great concern in recent years. Although the existing methods, i.e., static and dynamic taint analysis, have shown great merit for identifying such apps, which mainly rely on statically analyzing source code or dynamically monitoring the location data flow, identification accuracy is still under research, since the analysis results contain a certain false positive or true negative rate. In order to improve the accuracy and reduce the misjudging rate in the process of vetting suspicious apps, this paper proposes SAMLDroid, a combined method of static code analysis and machine learning for identifying Android apps with location privacy leakage, which can effectively improve the identification rate compared with existing methods. SAMLDroid first uses static analysis to scrutinize source code to investigate apps with location acquiring intentions. Then it exploits a well-trained classifier and integrates an app’s multiple features to dynamically analyze the pattern and deliver the final verdict about the app’s property. Finally, it is proved by conducting experiments, that the accuracy rate of SAMLDroid is up to 98.4%, which is nearly 20% higher than Apparecium.  相似文献   

6.
The effect of noise on computer-derived samples of voice was compared across three different hardware/software configurations. The hardware/software systems included a stand-alone A/D converter (CSL Module 4300B) coupled to a custom Pentium PC used in conjunction with the Multi-Dimensional Voice Program (MDVP) software, and a Creative Labs A/D converter coupled to the same custom PC under software control of MDVP/Multispeech and CSpeechSP. Voice samples were taken from 10 female subjects, then mixed with computer fan noise creating three different signal-to-noise (S/N) levels. Mixed signals were analyzed on the three hardware/software systems. Results revealed that fundamental frequency was most resistant to the degradation effect of noise across systems; jitter and shimmer values, however, were more variable across all configurations. Jitter and shimmer values were significantly higher under certain S/N levels for the MDVP 4300B based system as compared to MDVP for Multi-Speech and CSpeechSP. The findings punctuate the need for sensitivity to recording environments, careful selection of hardware/software equipment arrays, and the establishment of minimal recording conditions (>25 dBA S/N) for voice sampling and analysis using computer-assisted methods.  相似文献   

7.
Background: We developed CEPS as an open access MATLAB® GUI (graphical user interface) for the analysis of Complexity and Entropy in Physiological Signals (CEPS), and demonstrate its use with an example data set that shows the effects of paced breathing (PB) on variability of heart, pulse and respiration rates. CEPS is also sufficiently adaptable to be used for other time series physiological data such as EEG (electroencephalography), postural sway or temperature measurements. Methods: Data were collected from a convenience sample of nine healthy adults in a pilot for a larger study investigating the effects on vagal tone of breathing paced at various different rates, part of a development programme for a home training stress reduction system. Results: The current version of CEPS focuses on those complexity and entropy measures that appear most frequently in the literature, together with some recently introduced entropy measures which may have advantages over those that are more established. Ten methods of estimating data complexity are currently included, and some 28 entropy measures. The GUI also includes a section for data pre-processing and standard ancillary methods to enable parameter estimation of embedding dimension m and time delay τ (‘tau’) where required. The software is freely available under version 3 of the GNU Lesser General Public License (LGPLv3) for non-commercial users. CEPS can be downloaded from Bitbucket. In our illustration on PB, most complexity and entropy measures decreased significantly in response to breathing at 7 breaths per minute, differentiating more clearly than conventional linear, time- and frequency-domain measures between breathing states. In contrast, Higuchi fractal dimension increased during paced breathing. Conclusions: We have developed CEPS software as a physiological data visualiser able to integrate state of the art techniques. The interface is designed for clinical research and has a structure designed for integrating new tools. The aim is to strengthen collaboration between clinicians and the biomedical community, as demonstrated here by using CEPS to analyse various physiological responses to paced breathing.  相似文献   

8.
A method has been developed allowing structural and binding parameters to be recovered by global analysis of two-dimensional array of steady-state RET data in the special case where energy acceptors distribute between aqueous and lipid phases while donors are embedded in the membrane at a known depth. To test the validity of this approach, correlation and error analyses have been performed using simulated data. To exemplify the method application to the membrane studies, energy transfer from anthrylvinyl-labeled phosphatidylcholine incorporated into mixed phosphatidylcholine/cardiolipin unilamellar vesicles to heme group of cytochrome c is analyzed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号