Patients with complete spinal cord injury retain the potential for volitional muscle activity in muscles located below the spinal injury level.However,because of prolonged inactivity,initial attempts to activate these...Patients with complete spinal cord injury retain the potential for volitional muscle activity in muscles located below the spinal injury level.However,because of prolonged inactivity,initial attempts to activate these muscles may not effectively engage any of the remaining neurons in the descending pathway.A previous study unexpectedly found that a brief clinical round of passive activity significantly increased volitional muscle activation,as measured by surface electromyography.In this study,we further explored the effect of passive activity on surface electromyographic signals during volitional control tasks among individuals with complete spinal cord injury.Eleven patients with chronic complete thoracic spinal cord injury were recruited.Surface electromyography data from eight major leg muscles were acquired and compared before and after the passive activity protocol.The results indicated that the passive activity led to an increased number of activated volitional muscles and an increased frequency of activation.Although the cumulative root mean square of surface electromyography amplitude for volitional control of movement showed a slight increase after passive activity,the difference was not statistically significant.These findings suggest that brief passive activity may enhance the ability to initiate volitional muscle activity during surface electromyography tasks and underscore the potential of passive activity for improving residual motor control among patients with motor complete spinal cord injury.展开更多
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods,which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,we propos...In order to address the shortcomings of traditional anonymity network anonymity evaluation methods,which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes,network behavior,and program security monitoring.The anonymity of evaluation nodes is assessed based on stable intervals and behavior baselines defined according to their normal operating status.The anonymity of the network is evaluated using an improved normalized information entropy method that refines anonymity evaluation to the anonymity of each node and expands the dimensionality of evaluation features.This paper compares the effectiveness of our proposed method with static framework information entropy and single indicator methods by evaluating the degree of anonymity provided by a self-built Tor anonymous network under multiple operating scenarios including normal and under attack.Our approach utilizes dynamically changing network anonymity based on multiple anonymous attributes and better reflects the degree of anonymity in anonymous systems.展开更多
基金supported by the Fundamental Research Funds for Central Public Welfare Research Institute,No.2020CZ-5(to WS and GS)the National Natural Science Foundation of China,No.31970970(to JSR)Fundamental Research Funds for the Central Universities,No.YWF-23-YG-QB-010(to JSR)。
文摘Patients with complete spinal cord injury retain the potential for volitional muscle activity in muscles located below the spinal injury level.However,because of prolonged inactivity,initial attempts to activate these muscles may not effectively engage any of the remaining neurons in the descending pathway.A previous study unexpectedly found that a brief clinical round of passive activity significantly increased volitional muscle activation,as measured by surface electromyography.In this study,we further explored the effect of passive activity on surface electromyographic signals during volitional control tasks among individuals with complete spinal cord injury.Eleven patients with chronic complete thoracic spinal cord injury were recruited.Surface electromyography data from eight major leg muscles were acquired and compared before and after the passive activity protocol.The results indicated that the passive activity led to an increased number of activated volitional muscles and an increased frequency of activation.Although the cumulative root mean square of surface electromyography amplitude for volitional control of movement showed a slight increase after passive activity,the difference was not statistically significant.These findings suggest that brief passive activity may enhance the ability to initiate volitional muscle activity during surface electromyography tasks and underscore the potential of passive activity for improving residual motor control among patients with motor complete spinal cord injury.
基金supported by the Tianjin Education Commission Research Program Project No.2019KJ024.
文摘In order to address the shortcomings of traditional anonymity network anonymity evaluation methods,which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes,network behavior,and program security monitoring.The anonymity of evaluation nodes is assessed based on stable intervals and behavior baselines defined according to their normal operating status.The anonymity of the network is evaluated using an improved normalized information entropy method that refines anonymity evaluation to the anonymity of each node and expands the dimensionality of evaluation features.This paper compares the effectiveness of our proposed method with static framework information entropy and single indicator methods by evaluating the degree of anonymity provided by a self-built Tor anonymous network under multiple operating scenarios including normal and under attack.Our approach utilizes dynamically changing network anonymity based on multiple anonymous attributes and better reflects the degree of anonymity in anonymous systems.