The investors’ market participation willingness plays a vital role in the decision-making process of asset allocation. With the newly emerged dataset of investors’ market participation willingness, this paper provides the first evidence on the dynamic relationship between market participation willingness and the market dynamics in the Chinese stock market. We select four typical Chinese stock market indices, i.e., SSE50 Index, CSI300 Index, Small and Medium Enterprise Market Index, and Growth Enterprise Market Index, to represent different aspects of the Chinese stock (...) market. Moreover, we use mutual information to measure the overall dependence between market participation willingness and stock market and employ the DCCA cross-correlation coefficient and MF-DCCA to investigate the cross-correlation between market participation willingness and market dynamics. We find that there exist overall dependence and power-law cross-correlation between market participation willingness and the Chinese stock market, and the cross-correlations are significantly multifractal. (shrink)
It has been recognized that stress perturbations in sediments induced by salt bodies can cause elastic-wave velocity changes and seismic anisotropy through changing their elastic parameters, thus leading to difficulties in salt imaging. To investigate seismic velocity changes and seismic anisotropy by near-salt stress perturbations and their impacts on salt imaging, taking the Kuqa depression as an example, we have applied a 2D plane-strain static geomechanical finite-element model to simulate stress perturbations and calculate the associated seismic velocity changes and seismic (...) anisotropy; then we used the reverse time migration and imaging method to image the salt structure by excluding and including the stress-induced seismic velocity changes. Our model results indicate that near-salt stresses are largely perturbed due to salt stress relaxation, and the stress perturbations lead to significant changes of the seismic velocities and seismic anisotropy near the salt structure: The maximum seismic velocity changes can reach approximately 20% and the maximum seismic anisotropy can reach approximately 10%. The significant changes of seismic velocities due to stress perturbations largely impact salt imaging: The salt imaging is unclear, distorted, or even failed if we exclude near-salt seismic velocity changes from the preliminary velocity structure, but the salt can be better imaged if the preliminary velocity structure is modified by near-salt seismic velocity changes. We find that the locations where salt imaging tends to fail usually occur where large seismic velocity changes happen, and these locations are clearly related to the geometric characteristics of salt bodies. To accurately image the salt, people need to integrate results of geomechanical models and stress-induced seismic velocity changes into the imaging approach. The results provide petroleum geologists with scientific insights into the link between near-salt stress perturbations and their induced seismic velocity changes and help exploration geophysicists build better seismic velocity models in salt basins and image salt accurately. (shrink)
The medical data in the intelligent cloud collaborative management system have multidimensional heterogeneous interference, and there are problems such as low data information update rate and poor push results in the push process. Therefore, a method for multidimensional heterogeneous medical data push was proposed. First of all, the logical architecture of the multidimensional heterogeneous data push system was determined, and the data push function was designed; secondly, redundant data removal and noise reduction preprocessing were conducted against the push data, correlation (...) rules were used to integrate multidimensional heterogeneous medical data, the weight of medical data was calculated, the heterogeneous data matrix was constructed, and the integrated medical data were weighted to eliminate multidimensional heterogeneous interference. The results show that the data update rate of the proposed method is faster, the user retention and communication rate are high, the data push precision rate is over 80%, and the recall rate is as high as 76%. Therefore, its performance is significantly better than traditional methods. (shrink)
To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval method based on k-anonymity mechanism is proposed. First, the Dirichlet graph model is introduced, the same kind of information points is analyzed by using the characteristics of Dirichlet graph, and the anonymous set of users is generated and sent to LBS server. Second, the relationship matrix is generated, and the proximity relationship between the user (...) position and the target information point is obtained by calculation. Then, the private information retrieval model is applied to ensure the privacy of users’ target information points. Finally, the experimental results show that the KPDR method not only satisfies the diversity of l 3 / 4, but also increases the anonymous space, reduces the communication overhead, ensures the anonymous success rate of users, and effectively prevents the disclosure of user privacy. (shrink)
Mobile health services have been widely used in medical services and health management through mobile devices and multiple channels, such as smartphones, wearable equipment, healthcare applications, and medical platforms. However, the number of the users who are currently receiving the mHealth services is small. In China, more than 70% of internet users have never used mHealth services. Such imbalanced situation could be attributed to users’ traditional concept of medical treatment, psychological factors and privacy concerns. The purpose of this study is (...) to explore the direct and indirect effects of mHealth users’ self-efficacy and privacy concerns on their intention to adopt mHealth services, providing guidelines for mHealth service providers to enhance users’ intention of adoption. A questionnaire was designed by the research team and 386 valid responses were collected from domestic participants in China. Based on the unified theory of acceptance and use of technology model, a research model integrated self-efficacy and privacy concerns was constructed to investigate their effects on users’ intention to adopt mobile mHealth services. The results show that self-efficacy could facilitate users’ intention to adopt mHealth services, and had a significantly positive effect on perceived ubiquity, effort expectancy, performance expectancy and subjective norm. This study verifies the direct and indirect effects of self-efficacy and privacy concerns on users’ intention to adopt mHealth services, providing a different perspective for studying mHealth adoption behavior. The findings could provide guidelines for mHealth service providers to improve their service quality and enhance users’ intention of adoption. (shrink)
The tourism and accommodation industry has long been a fertile field for digital entrepreneurial activities. However, sharing accommodation entrepreneurs have been ignored, whether in digital entrepreneurship or the sharing economy. This empirical study explored the relationship between start-up age and host growth based on the entrepreneurship learning theory to bridge the gap. In total, 348 hosts’ balanced panel data for 5 years were collected from the Airbnb platform. The results shown that there was a curvilinear relationship between start-up age and (...) host growth; a critical primary growth strategy significantly moderated the curvilinear relationship such that the inverted U-shaped relationship is less pronounced when the level of product supply is high. This study is helpful to understand digital entrepreneurs in the sharing accommodation and offers management suggestions for host growth. (shrink)
Exploring the dynamics feature of robust chaotic system is an attractive yet recent topic of interest. In this paper, we introduce a three-dimensional fractional-order chaotic system. The important finding by analysis is that the position of signalx3descends at the speed of 1/cas the parameterbincreases, and the signal amplitude ofx1,x2can be controlled by the parametermin terms of the power function with the index −1/2. What is more, the dynamics remains constant with the variation of parametersbandm. Consequently, this system can provide rich (...) encoding keys for chaotic communication. By considering the properties of amplitude and position modulation, the partial projective synchronization and partial phase synchronization are realized with linear control scheme. The distribution map of optimal synchronization region in the control-parameter space is charted by defining the power consumption of controller. Numerical simulations are executed to confirm the theoretical analysis. (shrink)
This paper reports an autonomous dynamical system, and it finds that one nonhyperbolic zero equilibrium and two hyperbolic nonzero equilibria coexist in this system. Thus, it is difficult to demonstrate the existence of chaos by Šil’nikov theorem. Consequently, the topological horseshoe theory is adopted to rigorously prove the chaotic behaviors of the system in the phase space of Poincaré map. Then, a single control scheme is designed to stabilize the dynamical system to its zero-equilibrium point. Besides, to verify the theoretical (...) analyses physically, the attractor and stabilization scheme are further realized via DSP-based technique. (shrink)
China apparel customization brands have been recently growing in massive quantities despite being in their infancy stages of brand value building. Although scholars have proven brand value’s importance in sustainable brand growth, studies on the specific context of CACBs are still limited. This research proposes a conceptual framework of CACBs’ brand value measured dimension based on previous studies and divides brand value into both general and specific dimensions. Accordingly, qualitative and quantitative studies were conducted from the perspectives of practitioners and (...) consumers. Ultimately, a scale of 30 items with nine dimensions was generated. Results reveal that brand association in the general dimensions and brand service in the special dimensions were the largest promoters of CACB brand value. Hence, practitioners should pay more attention to dimensions of cognitive conflicts. Practical suggestions for apparel customization marketers are proposed to build and enhance brand value. (shrink)
The Newton Au-Ag deposit is an intermediate sulfidation state epithermal system in British Columbia, Canada. Multiple types of geophysical data are interpreted and evaluated with drillcore petrophysical, geochemical, and geologic observations to better understand the geophysical signature of the Newton epithermal system. Airborne [Formula: see text]-ray data sets indicate elevated emission counts of K, eTh, and eU over the Newton epithermal system, which are caused by hydrothermal alteration. Drillcore [Formula: see text]-ray measurements also indicate high potassium concentrations related to the (...) K-rich phyllosilicates in the form of argillic and quartz-sericite alteration assemblages. Magnetization vector inversion is used to recover an unconstrained 3D magnetization vector model of the system on regional and deposit scales. The regional MVI has resolved a deep concentric-shaped low magnetic zone that is interpreted as a porphyry system beneath the epithermal deposit. At the deposit scale, 3D direct current resistivity and induced polarization inversion, and unconstrained MVI revealed finer details of the epithermal system architecture. Cooperative DC/IP and magnetic inversion, at the deposit scale, constrained the magnetic susceptibility model and recovered a more precise susceptibility image of the epithermal system that is well-matched with borehole geology. The integrated geophysical interpretation helped to resolve several 3D latent geologic features in places without direct access to drillcore samples. We identified four petrophysical domains based on the three cooperatively inverted physical properties, including electrical resistivity, IP chargeability, and magnetic susceptibility. The combined geophysical models differentiated porphyritic intrusions, disseminated sulfides, a Cu-rich zone in mafic volcanic rocks, and an Au-Ag-Cu-rich zone with silicification in felsic volcanic rocks. These petrophysical domains also provide useful exploration vectors for identification of similar epithermal systems. (shrink)
The processes in construction are more likely than others to breed unsafe behaviors, and the consequences of these actions can be serious. This paper first reviews the research status on unsafe behavior in construction teams. It then analyzes the complex mechanisms that lead to unsafe behavior and constructs a three-layer structural model based on agent-based modeling technology. This modeling deals with complexity and elaborates on key points and potential research ideas in the study of unsafe behavior in construction teams. Using (...) the ABM method, the effects of different incentive strategies on the safe behavior of construction teams under different management scenarios were studied. The results showed that when members have a fair perception of the situation, the effect of the excess performance reward distribution, according to the member’s safety awareness level, is better than the average distribution effect. This is the case whether the member’s safety behavior level is positively or negatively related to the member’s safety awareness level. This study proves the feasibility, validity, and universality of the three-layer structural model. It also reaches certain management conclusions and ideas for further development. The purpose of this paper is to provide a reference for research on the containment and prevention of unsafe behavior in construction teams. (shrink)
The integrated scheduling algorithm of process sequence time-selective strategy is an advanced algorithm in the field of integrated scheduling. The proposed algorithm points out the shortcomings of the process sequence time-selective strategy. Generally, there are too many “trial scheduling” times. The authors propose that there is no need to make “trial scheduling” at every “quasi-scheduling time point.” In fact, the process scheduling scheme can be obtained by trial scheduling on some “quasi-scheduling time points.” The scheduling result is the same as (...) that of the sequence timing strategy. The proposed algorithm reduces the runtime of scheduling algorithm and improves the performance of the algorithm without reducing the optimization effect. (shrink)
Fractal coding techniques are an effective tool for describing image textures. Considering the shortcomings of the existing image super-resolution method, the large-scale factor reconstruction performance is poor and the texture details are incomplete. In this paper, we propose an SR method based on error compensation and fractal coding. First, quadtree coding is performed on the image, and the similarity between the range block and the domain block is established to determine the fractal code. Then, through this similarity relationship, the attractor (...) is reconstructed by super-resolution fractal decoding to obtain an interpolated image. Finally, the fractal error of the fractal code is estimated by the depth residual network, and the estimated version of the error image is added as an error compensation term to the interpolation image to obtain the final reconstructed image. The network structure is jointly trained by a deep network and a shallow network. Residual learning is introduced to greatly improve the convergence speed and reconstruction accuracy of the network. Experiments with other state-of-the-art methods on the benchmark datasets Set5, Set14, B100, and Urban100 show that our algorithm achieves competitive performance quantitatively and qualitatively, with subtle edges and vivid textures. Large-scale factor images can also be reconstructed better. (shrink)
"Reason and faith," the encyclical the starting point and focus on that grid has a bit of basic human dignity, which raise the status of the people there are things on top of everything else, and make absolutely privileged, that is, beyond the freedom to pursue of the privilege. Hella Cleveland Meadows said: "I have tried to know myself."敎were the interpretation of this motto and there is a coincidence site lattice theory: "" You should be aware of their own, "and (...) this motto is inscribed in Carbondale non-temple frieze on the bottom of the beams. a truth of this maxim that any one person, if you want the creature, the highlights were the reason why the nature of man, you have to pursue the truth. "and that philosophy is" to understand people's there is a fundamental truth of the way. " Like two wings of faith and reason, to enhance people's contemplative truth of the spirit. "Encyclical" God distinguished from the road leading to human and human-path leading to God, but not to separate the two, because down the road and up the road to cycle between the role and complementary role. Man up the road leading to God's being responded to Aristotle in "Metaphysics," said the first sentence: "Everyone has a natural desire for knowledge", while the highest activity of this knowledge refers permit the existence of God and its main properties . For this reason, the encyclical were敎praise Greek philosophy, metaphysics because it is certainly faith is bound to open. And open to the faith or philosophy of the first tasks required to re-find it in the "explore the full significance of life and the wisdom of last rate", the second request or task is "to understand certain people have the ability to find the truth", and the first three requirements or task more emphasis on "a philosophy based on the physical is necessary.". (shrink)
A novel technique is proposed in this paper for shared aperture multibeam forming in a complex time-modulated linear array. First, a uniform line array is interleaved randomly to form two sparse array subarrays. Subsequently, the theory of time modulation for linear arrays is applied in the constructed subarrays. In the meantime, the switch-on time sequences for each element of the two subarrays are optimized by an optimized differential evolution algorithm, i.e., the scaling factor of the sinusoidal iterative chaotic system and (...) the adaptive crossover probability factor are used to enhance the diversity of the population. Lastly, the feasibility of the new technique is verified by the comparison between this technique and the basic multibeam algorithm in a shared aperture and the algorithm of iterative FFT. The results of simulations confirm that the proposed algorithm can form more desired beams, and it is superior to other similar approaches. (shrink)
The depth of detection, which is an important concept in logging data interpretation, describes the detection capability of the borehole measurements. We have extended the definition of DOD for azimuthal information, namely, the geosignal delivered by azimuthal resistivity tools, to resistivity logs in logging-while-drilling applications. Instead of using the radial geometric factor, the detection thresholds in predicting a geologic boundary are used to describe the DOD of a measurement. This definition unifies the criteria to evaluate the detectability of different borehole (...) measurements, such as LWD resistivity measurements and geosignals. It also can be generalized to other kinds of well logging methods in LWD applications. Using the proposed definition, we analyze the detection capability of the LWD resistivity measurements in looking-around and looking-ahead applications; they provide more tangible descriptions. In vertical or near-vertical wells, the definition provides an indicator to evaluate the capability and reliability of looking ahead of deep/ultradeep LWD resistivity tools. The investigations on the influence of the DOD on the distance-to-boundary inversion, which can help in developing a robust and accurate inversion scheme, also are presented and discussed. (shrink)
In this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the original image is partitioned into 64 × 64 pixel image blocks and then randomly revolved and shifted under control sequences which are generated by the hyperchaotic Lorenz system whose initial conditions are calculated by original image and keys. Therefore, the preprocessing (...) is sensitive to plain image against differential attacks. In the encryption process, the after-preprocessing image is partitioned into 32 × 32 pixel image blocks; next they are randomly revolved and encrypted by control sequence and key blocks which are generated by the skew tent map. In postprocessing, the after-encryption image is partitioned into 16 × 16 pixels’ image blocks, and they are randomly revolved and shifted again under control sequences which are related with encrypted image and keys. The postprocessing further increases the diffusion characteristics. Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance. (shrink)
The position of immoralism in analytic aesthetics and the philosophy of art holds that a work's moral defects can sometimes contribute to its artistic value. This position has suffered massive criticism in recent years. In support of immoralism, I present in this paper a new argument by examining immorality in the artistic genre of transgressive art. I argue that in the category of transgressive art, due to the nature of immorality that is a transgressive and liberating force against morality's authority, (...) being immoral can contribute directly to an artwork's artistic value by contributing to the realization of its artistic aim. (shrink)