<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more ser...<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more serious among patients suffering from chronic disease and those who are on treatment which may af-fect their defense mechanism or immune-compromised patients who become more vulnerable to complications of COVID-19, and at high risk for morbidity and mortality with any bacterial or viral illness. <strong>Method: </strong>A retrospective, non-experimental research design was applied with a quantitative approach among patients with COVID-19 who were admitted to COVID-19 department at AVH with a total of 72 patients. Data were extracted from a patients’ elec-tronic medical record. <strong>Results:</strong> During COVID-19 outbreak 72 patients were admitted to COVID department at AVH, 54.2% were female and 33% of study participants were from Gaza governorate followed by Jerusalem 27%. Most participants 34.7% had first clinic visit after two days from the onset of COVID-19 symptoms. 45.8% were discharged to home while 13.9% died. All inflammatory markers that include ferritin, C-RP, IL-6 and D-dimer are in-creasing in all patients that were admitted to hospital;IL-6 and D-dimer were significant inflammatory markers in relation to the mortality rate. The study found the risk of mortality with IL-6 mean (218.5), and D-dimer mean (12). Furthermore there was a relation between increased risk of mortality and im-mune comprised. <strong>Conclusion:</strong> Mortality rate increased among COVID-19 pa-tients when IL-6 was higher than 218.5 and D-dimer higher than 12, and there was a relationship between increased risk of mortality and immune comprised.展开更多
Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution ...Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms.Specifically,a new owner of a reassigned number can access the application account with which the number is associated,and may perform fraudulent activities.Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users.Thus,alternative solutions that depend on only the information of the applications are imperative.In this work,we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers.Our analysis on Meituan's real-world dataset shows that compromised accounts have unique statistical features and temporal patterns.Based on the observations,we propose a novel model called temporal pattern and statistical feature fusion model(TSF)to tackle the problem,which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features.Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines,demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.展开更多
The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where ema...The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where email accounts have only a few interaction events(sending and receiving).To address the issue of insufficient features,we propose a novel approach to detecting compromised accounts by combining time zone differences and alternate logins to identify abnormal behavior.Based on this approach,we propose a compromised email account detection framework that relies on widely available and less sensitive login logs and does not require labels.Our framework characterizes login behaviors to identify logins that do not belong to the account owner and outputs a list of account-subnet pairs ranked by their likelihood of having abnormal login relationships.This approach reduces the number of account-subnet pairs that need to be investigated and provides a reference for investigation priority.Our evaluation demonstrates that our method can detect most email accounts that have been accessed by disclosed malicious IP addresses and outperforms similar research.Additionally,our framework has the capability to uncover undisclosed malicious IP addresses.展开更多
Background Radical lung resection is the best chance for cure in patients with anatomically resectable non-small cell lung cancer. A retrospective study was performed in an attempt to investigate general rules of majo...Background Radical lung resection is the best chance for cure in patients with anatomically resectable non-small cell lung cancer. A retrospective study was performed in an attempt to investigate general rules of major lung resection for non-small cell lung cancer in patients with compromised pulmonary function. Methods Between June 2002 and December 2008, major lung resection was performed in 127 non-small cell lung cancer patients at our institution, who met the criteria of compromised pulmonary function defined as preoperative forced vital capacity 〈50% of prediction or preoperative forced expiratory volume in one second 〈50% of prediction. Clinical data of the patients were retrospectively reviewed. Results The patients consisted of 108 males (85.0%) and 19 females (15.0%) with a mean age of 61.7 years. The morbidity rate was 44.1% (56/127) and the mortality rate was 4.7% (6/127). Multivariate analysis identified PaCO2 (P=0.023, OR=2.959, 95% Cl 1.164-7.522), the percent predicted postoperative diffusing capacity of the lung for carbon monoxide (P=0.001, OR=0.176, 95% Cl 0.064-0.480) and comprehensive preoperative preparation (P=0.048, OR=0.417, 95% Cl 0.176-0.993) as the independent predictors of postoperative cardiopulmonary complications that were found in 45 cases. Overall 1-, 3- and 5-year survival rates were 90%, 55% and 37% respectively. For overall survival, multivariate analysis revealed that TNM staging (P=0.004, OR=1.585, 95% Cl 1.154-2.178) was the only independent prognostic factor. Conclusions On the premise of integrated preoperative evaluation and comprehensive preoperative preparation, major lung resection provides an optimal therapeutic for selected non-small cell lung cancer patients with compromised pulmonary function. Hypercapnea and the percent predicted postoperative diffusing capacity of the lung for carbon monoxide 〈40% could be considered as the independent predictive factors for operative risk in those Datients.展开更多
A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigat...A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigate changes of immune-competent cells that commonly utilized FBT, including after administration of immno-suppressed animals, the effects by FBT on the regulated effect on the cells were evaluated. Our results showed that FBT augmented the level of lymphocytes in number, while FBT regulated the level of granulocytes in both number and function. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio suggesting their constitution as neutral in peripheral blood were increased significantly 30 days after the administration of FBT in rodents, and compromised host was prepared with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against intracellular parasite, and that FBT augmented intercellular pathogen through humoral immunity. We discussed the significance and mechanism of FBT on the level of leukocyte subsets in number and function that were considered to be potential indicators for the activation of the compromised host. We also proposed an idea that FBT exhibited tonic effects via activating complement components. The evidences were shown by immune-electrophoretic method. Moreover, we tried to access further to the anti-oxidative activities of this FBT. This modification brought to the significant lift up for antibody producing cells and anti-oxidative activity for phagocytic cells.展开更多
A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-...A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-competent cells that commonly utilized f-Chlorella including after administration of immno-suppressed animals. The effects by f-Chlorella on the regurational effect to the host were measured. Our results showed that f-Chlorella regulated the level of lymphocytes, while conventional-Chlorella worked to adjust the level of granulocytes. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in the peripheral blood. In rodents, immune-compromised host as well as normal animal were prepared with cancer chemotherapeutic agent (Mytomycin-C), and then tried to rescue the immune-competent rebel. Our observations showed that both Chlorella derivatives regulated in number and functions. The effect was more prominent in f-Chlorella than that of conventional one. We discussed the significance and mechanism of f-Chlorella on the level of leukocyte subsets in number and function. These effects were considered to bring the potential elevation of antibody secreting cell by the localized heamolysis in gel method. We also proposed an idea that exhibited tonic effects were brought via activating the complement components in the serum. Moreover, we tried to access further to the anti-oxidative activities of this f-Chlorella. This modification brought to the significant lifted up for immune competent cells and anti-oxidative activity for phagocytic cells.展开更多
A hemopoietic formula (HF) in traditional Chinese medicine (TCM) usually consists of more than six single herbs. We seek to look into changes of immune-competent cells by two commonly utilized HF, including Shi-Quan-D...A hemopoietic formula (HF) in traditional Chinese medicine (TCM) usually consists of more than six single herbs. We seek to look into changes of immune-competent cells by two commonly utilized HF, including Shi-Quan-Da-Bu-Tang (SDT) and Bu-Zong-Ye-Qi-Tang (BYT). However, the effects of both formulae on levels of leukocyte subsets are not yet defied. After administration of immno-suppressant to animals, the effects by HFs on the augmentation for subsets of leukocytes, CD positive cell counts of lymphocytes, and the cytokine-producing cells are measured. Our results show that SDT augments the level of lymphocytes, while BYT increases the level of granulocytes. In our clinical study with 15 healthy volunteers, positive cells for CD2, CD11b, CD14, IL-4, IL-1β and IFN-γ in peripheral blood are increased significantly 15 days after the ingestion of HFs. In rodents, compromised host as well as normal animal is administered with cancer chemotherapeutic agent (Mytomycin-C). Our observations show that SDT regulates phagocyte activities of the immune system, introducing it against intracellular parasite, and that BYT augments intercellular pathogen through humoral immunity. We discuss the significance and mechanism of HFs on the level of leukocyte subsets in number and function that are considered to be potential indicators for the evaluation of TCM modalities. We also propose an idea that TCM exhibits tonic effects via enhancing the ability to fight against infection and bacteria, as well as turning the multi-drug resistant bacteria to the sensitive ones. Together with these evidences, we suggest an ideal remedy for the compromised to fight host against pathogens. Moreover, we try to modify these hemopoietic formulae to more digestive forms. This modification brings to the significant lifted up for antibody producing cells and anti-oxidative activity for phagocytic cells.展开更多
A plant material consisted by Family Poaceae was fermented by Yeast and Lactobaccilli (U-164). This material was proved by as safe in animal safety experiment for oral administration. In order to prove the effect of U...A plant material consisted by Family Poaceae was fermented by Yeast and Lactobaccilli (U-164). This material was proved by as safe in animal safety experiment for oral administration. In order to prove the effect of U-164 against physiological function, the animal and human trials were set up to look into mainly leukocyte functions. In animal experiment, anti-oxidative effect and antibody response in immune-compromised host and diabetes meritus were made up. For human use, peripheral lymphocyte in number and subset ratio were followed up to one month after administration. In order to understand its effect, human complement component analysis was made by immune-electrophoresis. Our results showed that U-164 augmented the level of lymphocytes, while U-164 down regulated the level of granulocytes. In our clinical study with 19 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in peripheral blood being increased significantly 30 days after the ingestion of U-164. In experimental animal study, the compromised host as well as normal animal was administered with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against antibody producing cell, this material recovered the antibody production in the host compromising the immure responsiveness. We also proposed an idea that U-164 exhibited tonic effects via activating complement components. Moreover, we tried to access further to the anti-oxidative activities of this U-164. This modification brought to the significant lifted up for anti-oxidative activity for phagocytic cell.展开更多
<strong>Background</strong>: Redo aortic valve replacement for prosthetic valve endocarditis is a challenge for surgeons. Echocardiography is occasionally not an effective modality for the detection of inf...<strong>Background</strong>: Redo aortic valve replacement for prosthetic valve endocarditis is a challenge for surgeons. Echocardiography is occasionally not an effective modality for the detection of infectious signs in prosthetic valve endocarditis. <strong>Case presentation</strong>: Herein, we report the case of a patient whose prosthetic valve endocarditis was detected by multidetector computed tomography and who successfully underwent redo aortic valve replacement. Preoperative echocardiography revealed no remarkable findings related to endocarditis such as perivalvular leakage or vegetation;however, multidetector computed tomography revealed a thickened right coronary cusp. Intraoperatively, the right coronary cusp was confirmed to be covered with thick infected tissue. The pathological findings revealed broad destruction due to infection of the right coronary cusp. <strong>Conclusion</strong>: Multidetector computed tomography was useful in detecting infectious signs in prosthetic valves.展开更多
In this paper, a fish farm was modeled using the Lexicographic linear goal programming approach due to incommensurability in objectives. The study considered the fish farming plan with two sizes of catfish from stocki...In this paper, a fish farm was modeled using the Lexicographic linear goal programming approach due to incommensurability in objectives. The study considered the fish farming plan with two sizes of catfish from stocking to harvesting at four-month intervals. The multi-objective goals developed are required raw materials feed, water, light (resource utilization), sales revenue, profit realized, labor utilization, production costs, and pond utilization. The developed model was tested using related data collected from the farm records with the use of TORA 2007 software. The compromised solution from the results showed that the developed model is an efficient tool for decision-making process in the fish farm business organization.展开更多
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ...During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.展开更多
We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intraverteb...We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intravertebral cleft at L1 accompanying an epidural hematoma posteriorly.Immediate pain relief was achieved after percutaneous vertebroplasty.Complete resolution of hematoma was noted three months after procedure.We theorized that intravertebral stability after treatment might have played a role in this patient.展开更多
Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alter...Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.展开更多
The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the co...The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the conventional VIKOR techniques used to integrate group judgments and the information loss arising from defuzzification are problematic and distort final outcomes. An improved integration method, which is optimization-based, is proposed. And it can handle fuzzy criteria values and weights. The precondition for accurately defuzzifying triangular fuzzy num- bers is identified. Several effective defuzzification procedures are proposed to improve the extant VIKOR, and a comprehensive evaluation framework is offered to aid multi-criteria group decision making. Finally, a numerical example is provided to illustrate the practicability of the proposed method.展开更多
An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes a...An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.展开更多
The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to st...The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface.展开更多
AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectivel...AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectively documented demographic parameters, medical history and clinical symptoms were ascertained. Pre-operative radiographs were examined for the extent of their pathology. The details of the operative procedure were discerned.RESULTS Eight hundred and eighty patients received anterioror combined anterior-posterior cervical surgery from 2008-2013. Nine patients(1.02%) required emergent reintubation. The interval between extubation to reintubation was 6.2 h [1-12]. Patients were kept intubated after reintubation for 2.3 d [2-3]. Seven patients displayed moderate postoperative edema. One patient was diagnosed with a compressive hematoma whichwas subsequently evacuated in the OR. Another patient was diagnosed with a pulmonary effusion and treated with diuretics. One patient received a late debridement for an infected hematoma. Six patients reported residual symptoms and three patients made a complete recovery. CONCLUSION Respiratory compromise is a rare but potentially life threatening complication following cervical surgery. Patients at increased risk should be monitored closely for extended periods of time post-operatively. If the airway is restored adequately in a timely manner through emergent re-intubation, the outcome of the patients is generally favorable.展开更多
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie...In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.展开更多
文摘<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more serious among patients suffering from chronic disease and those who are on treatment which may af-fect their defense mechanism or immune-compromised patients who become more vulnerable to complications of COVID-19, and at high risk for morbidity and mortality with any bacterial or viral illness. <strong>Method: </strong>A retrospective, non-experimental research design was applied with a quantitative approach among patients with COVID-19 who were admitted to COVID-19 department at AVH with a total of 72 patients. Data were extracted from a patients’ elec-tronic medical record. <strong>Results:</strong> During COVID-19 outbreak 72 patients were admitted to COVID department at AVH, 54.2% were female and 33% of study participants were from Gaza governorate followed by Jerusalem 27%. Most participants 34.7% had first clinic visit after two days from the onset of COVID-19 symptoms. 45.8% were discharged to home while 13.9% died. All inflammatory markers that include ferritin, C-RP, IL-6 and D-dimer are in-creasing in all patients that were admitted to hospital;IL-6 and D-dimer were significant inflammatory markers in relation to the mortality rate. The study found the risk of mortality with IL-6 mean (218.5), and D-dimer mean (12). Furthermore there was a relation between increased risk of mortality and im-mune comprised. <strong>Conclusion:</strong> Mortality rate increased among COVID-19 pa-tients when IL-6 was higher than 218.5 and D-dimer higher than 12, and there was a relationship between increased risk of mortality and immune comprised.
基金supported by the National Natural Science Foundation of China(Nos.62072115,62202402,61971145,and 61602122)the Shanghai Science and Technology Innovation Action Plan Project(No.22510713600)+2 种基金the Guangdong Basic and Applied Basic Research Foundation,China(Nos.2022A1515011583 and 2023A1515011562)the One-off Tier 2 Start-up Grant(2020/2021)of Hong Kong Baptist University(Ref.RCOFSGT2/20-21/COMM/002)Startup Grant(Tier 1)for New Academics AY2020/21 of Hong Kong Baptist University and Germany/Hong Kong Joint Research Scheme sponsored by the Research Grants Council of Hong Kong,China,the German Academic Exchange Service of Germany(No.G-HKBU203/22),and Meituan。
文摘Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms.Specifically,a new owner of a reassigned number can access the application account with which the number is associated,and may perform fraudulent activities.Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users.Thus,alternative solutions that depend on only the information of the applications are imperative.In this work,we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers.Our analysis on Meituan's real-world dataset shows that compromised accounts have unique statistical features and temporal patterns.Based on the observations,we propose a novel model called temporal pattern and statistical feature fusion model(TSF)to tackle the problem,which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features.Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines,demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.
基金supported by the Youth Innovation Promotion Association CAS(No.2019163)the Strategic Priority Research Program of Chinese Academy of Sciences(No.XDC02040100)the Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network security and Protection Technology.
文摘The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where email accounts have only a few interaction events(sending and receiving).To address the issue of insufficient features,we propose a novel approach to detecting compromised accounts by combining time zone differences and alternate logins to identify abnormal behavior.Based on this approach,we propose a compromised email account detection framework that relies on widely available and less sensitive login logs and does not require labels.Our framework characterizes login behaviors to identify logins that do not belong to the account owner and outputs a list of account-subnet pairs ranked by their likelihood of having abnormal login relationships.This approach reduces the number of account-subnet pairs that need to be investigated and provides a reference for investigation priority.Our evaluation demonstrates that our method can detect most email accounts that have been accessed by disclosed malicious IP addresses and outperforms similar research.Additionally,our framework has the capability to uncover undisclosed malicious IP addresses.
文摘Background Radical lung resection is the best chance for cure in patients with anatomically resectable non-small cell lung cancer. A retrospective study was performed in an attempt to investigate general rules of major lung resection for non-small cell lung cancer in patients with compromised pulmonary function. Methods Between June 2002 and December 2008, major lung resection was performed in 127 non-small cell lung cancer patients at our institution, who met the criteria of compromised pulmonary function defined as preoperative forced vital capacity 〈50% of prediction or preoperative forced expiratory volume in one second 〈50% of prediction. Clinical data of the patients were retrospectively reviewed. Results The patients consisted of 108 males (85.0%) and 19 females (15.0%) with a mean age of 61.7 years. The morbidity rate was 44.1% (56/127) and the mortality rate was 4.7% (6/127). Multivariate analysis identified PaCO2 (P=0.023, OR=2.959, 95% Cl 1.164-7.522), the percent predicted postoperative diffusing capacity of the lung for carbon monoxide (P=0.001, OR=0.176, 95% Cl 0.064-0.480) and comprehensive preoperative preparation (P=0.048, OR=0.417, 95% Cl 0.176-0.993) as the independent predictors of postoperative cardiopulmonary complications that were found in 45 cases. Overall 1-, 3- and 5-year survival rates were 90%, 55% and 37% respectively. For overall survival, multivariate analysis revealed that TNM staging (P=0.004, OR=1.585, 95% Cl 1.154-2.178) was the only independent prognostic factor. Conclusions On the premise of integrated preoperative evaluation and comprehensive preoperative preparation, major lung resection provides an optimal therapeutic for selected non-small cell lung cancer patients with compromised pulmonary function. Hypercapnea and the percent predicted postoperative diffusing capacity of the lung for carbon monoxide 〈40% could be considered as the independent predictive factors for operative risk in those Datients.
文摘A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigate changes of immune-competent cells that commonly utilized FBT, including after administration of immno-suppressed animals, the effects by FBT on the regulated effect on the cells were evaluated. Our results showed that FBT augmented the level of lymphocytes in number, while FBT regulated the level of granulocytes in both number and function. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio suggesting their constitution as neutral in peripheral blood were increased significantly 30 days after the administration of FBT in rodents, and compromised host was prepared with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against intracellular parasite, and that FBT augmented intercellular pathogen through humoral immunity. We discussed the significance and mechanism of FBT on the level of leukocyte subsets in number and function that were considered to be potential indicators for the activation of the compromised host. We also proposed an idea that FBT exhibited tonic effects via activating complement components. The evidences were shown by immune-electrophoretic method. Moreover, we tried to access further to the anti-oxidative activities of this FBT. This modification brought to the significant lift up for antibody producing cells and anti-oxidative activity for phagocytic cells.
文摘A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-competent cells that commonly utilized f-Chlorella including after administration of immno-suppressed animals. The effects by f-Chlorella on the regurational effect to the host were measured. Our results showed that f-Chlorella regulated the level of lymphocytes, while conventional-Chlorella worked to adjust the level of granulocytes. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in the peripheral blood. In rodents, immune-compromised host as well as normal animal were prepared with cancer chemotherapeutic agent (Mytomycin-C), and then tried to rescue the immune-competent rebel. Our observations showed that both Chlorella derivatives regulated in number and functions. The effect was more prominent in f-Chlorella than that of conventional one. We discussed the significance and mechanism of f-Chlorella on the level of leukocyte subsets in number and function. These effects were considered to bring the potential elevation of antibody secreting cell by the localized heamolysis in gel method. We also proposed an idea that exhibited tonic effects were brought via activating the complement components in the serum. Moreover, we tried to access further to the anti-oxidative activities of this f-Chlorella. This modification brought to the significant lifted up for immune competent cells and anti-oxidative activity for phagocytic cells.
文摘A hemopoietic formula (HF) in traditional Chinese medicine (TCM) usually consists of more than six single herbs. We seek to look into changes of immune-competent cells by two commonly utilized HF, including Shi-Quan-Da-Bu-Tang (SDT) and Bu-Zong-Ye-Qi-Tang (BYT). However, the effects of both formulae on levels of leukocyte subsets are not yet defied. After administration of immno-suppressant to animals, the effects by HFs on the augmentation for subsets of leukocytes, CD positive cell counts of lymphocytes, and the cytokine-producing cells are measured. Our results show that SDT augments the level of lymphocytes, while BYT increases the level of granulocytes. In our clinical study with 15 healthy volunteers, positive cells for CD2, CD11b, CD14, IL-4, IL-1β and IFN-γ in peripheral blood are increased significantly 15 days after the ingestion of HFs. In rodents, compromised host as well as normal animal is administered with cancer chemotherapeutic agent (Mytomycin-C). Our observations show that SDT regulates phagocyte activities of the immune system, introducing it against intracellular parasite, and that BYT augments intercellular pathogen through humoral immunity. We discuss the significance and mechanism of HFs on the level of leukocyte subsets in number and function that are considered to be potential indicators for the evaluation of TCM modalities. We also propose an idea that TCM exhibits tonic effects via enhancing the ability to fight against infection and bacteria, as well as turning the multi-drug resistant bacteria to the sensitive ones. Together with these evidences, we suggest an ideal remedy for the compromised to fight host against pathogens. Moreover, we try to modify these hemopoietic formulae to more digestive forms. This modification brings to the significant lifted up for antibody producing cells and anti-oxidative activity for phagocytic cells.
文摘A plant material consisted by Family Poaceae was fermented by Yeast and Lactobaccilli (U-164). This material was proved by as safe in animal safety experiment for oral administration. In order to prove the effect of U-164 against physiological function, the animal and human trials were set up to look into mainly leukocyte functions. In animal experiment, anti-oxidative effect and antibody response in immune-compromised host and diabetes meritus were made up. For human use, peripheral lymphocyte in number and subset ratio were followed up to one month after administration. In order to understand its effect, human complement component analysis was made by immune-electrophoresis. Our results showed that U-164 augmented the level of lymphocytes, while U-164 down regulated the level of granulocytes. In our clinical study with 19 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in peripheral blood being increased significantly 30 days after the ingestion of U-164. In experimental animal study, the compromised host as well as normal animal was administered with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against antibody producing cell, this material recovered the antibody production in the host compromising the immure responsiveness. We also proposed an idea that U-164 exhibited tonic effects via activating complement components. Moreover, we tried to access further to the anti-oxidative activities of this U-164. This modification brought to the significant lifted up for anti-oxidative activity for phagocytic cell.
文摘<strong>Background</strong>: Redo aortic valve replacement for prosthetic valve endocarditis is a challenge for surgeons. Echocardiography is occasionally not an effective modality for the detection of infectious signs in prosthetic valve endocarditis. <strong>Case presentation</strong>: Herein, we report the case of a patient whose prosthetic valve endocarditis was detected by multidetector computed tomography and who successfully underwent redo aortic valve replacement. Preoperative echocardiography revealed no remarkable findings related to endocarditis such as perivalvular leakage or vegetation;however, multidetector computed tomography revealed a thickened right coronary cusp. Intraoperatively, the right coronary cusp was confirmed to be covered with thick infected tissue. The pathological findings revealed broad destruction due to infection of the right coronary cusp. <strong>Conclusion</strong>: Multidetector computed tomography was useful in detecting infectious signs in prosthetic valves.
文摘In this paper, a fish farm was modeled using the Lexicographic linear goal programming approach due to incommensurability in objectives. The study considered the fish farming plan with two sizes of catfish from stocking to harvesting at four-month intervals. The multi-objective goals developed are required raw materials feed, water, light (resource utilization), sales revenue, profit realized, labor utilization, production costs, and pond utilization. The developed model was tested using related data collected from the farm records with the use of TORA 2007 software. The compromised solution from the results showed that the developed model is an efficient tool for decision-making process in the fish farm business organization.
文摘During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.
文摘We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intravertebral cleft at L1 accompanying an epidural hematoma posteriorly.Immediate pain relief was achieved after percutaneous vertebroplasty.Complete resolution of hematoma was noted three months after procedure.We theorized that intravertebral stability after treatment might have played a role in this patient.
基金supported by the Humanities and Social Sciences Foundation of Ministry of Education of China(09YJC630229)Scientific Research Foundation of Guangxi University for Nationalities for Talent Introduction(200702YZ01)Science and Technology Project of State Ethnic Affairs Commission(09GX03)
文摘Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.
基金supported by the National Natural Science Foundation of China(71271116)
文摘The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the conventional VIKOR techniques used to integrate group judgments and the information loss arising from defuzzification are problematic and distort final outcomes. An improved integration method, which is optimization-based, is proposed. And it can handle fuzzy criteria values and weights. The precondition for accurately defuzzifying triangular fuzzy num- bers is identified. Several effective defuzzification procedures are proposed to improve the extant VIKOR, and a comprehensive evaluation framework is offered to aid multi-criteria group decision making. Finally, a numerical example is provided to illustrate the practicability of the proposed method.
基金supported by the National Natural Science Foundation of China (7087111770571086)
文摘An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.
基金Supported by the Outstanding Overseas Research Team Project of the Chinese Academy of Sciences, the National Natural Science Foundation of China (20221603), and the Research Fund of Key Lab for Nanomaterials, Ministry of Education, China (2006-1).
文摘The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface.
文摘AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectively documented demographic parameters, medical history and clinical symptoms were ascertained. Pre-operative radiographs were examined for the extent of their pathology. The details of the operative procedure were discerned.RESULTS Eight hundred and eighty patients received anterioror combined anterior-posterior cervical surgery from 2008-2013. Nine patients(1.02%) required emergent reintubation. The interval between extubation to reintubation was 6.2 h [1-12]. Patients were kept intubated after reintubation for 2.3 d [2-3]. Seven patients displayed moderate postoperative edema. One patient was diagnosed with a compressive hematoma whichwas subsequently evacuated in the OR. Another patient was diagnosed with a pulmonary effusion and treated with diuretics. One patient received a late debridement for an infected hematoma. Six patients reported residual symptoms and three patients made a complete recovery. CONCLUSION Respiratory compromise is a rare but potentially life threatening complication following cervical surgery. Patients at increased risk should be monitored closely for extended periods of time post-operatively. If the airway is restored adequately in a timely manner through emergent re-intubation, the outcome of the patients is generally favorable.
基金Projects(61173169,61103203,70921001)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0798)supported by Program for New Century Excellent Talents in University of China
文摘In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.