This paper explores strategies to cultivate high-level technical talents in vocational undergraduate colleges by analyzing their development,the essence of such talents,and proposing several key measures.Strategies in...This paper explores strategies to cultivate high-level technical talents in vocational undergraduate colleges by analyzing their development,the essence of such talents,and proposing several key measures.Strategies include optimizing professional settings and curricula,enhancing school-enterprise cooperation and the integration of industry-university-research,improving teaching staff quality and educational standards,and expanding international cooperation.The importance of policy support and funding and establishing robust quality assurance systems is emphasized for effectively cultivating skilled talents in vocational undergraduate colleges.展开更多
BACKGROUND One of the main characteristics of oral squamous cell carcinoma(OSCC)is that it metastasizes to cervical lymph nodes frequently with a high degree of local invasiveness.A primary feature of malignant tumors...BACKGROUND One of the main characteristics of oral squamous cell carcinoma(OSCC)is that it metastasizes to cervical lymph nodes frequently with a high degree of local invasiveness.A primary feature of malignant tumors is their penetration of neighboring tissues,such as lymphatic and blood arteries,due to the tumor cells'capacity to break down the extracellular matrix(ECM).Matrix metalloproteinases(MMPs)constitute a family of proteolytic enzymes that facilitate tissue remo-deling and the degradation of the ECM.MMP-9 and MMP-13 belong to the group of extracellular matrix degrading enzymes and their expression has been studied in OSCC because of their specific functions.MMP-13,a collagenase family member,is thought to play an essential role in the MMP activation cascade by breaking down the fibrillar collagens,whereas MMP-9 is thought to accelerate the growth of tumors.Elevated MMP-13 expression has been associated with tumor behavior and patient prognosis in a number of malignant cases.The authors wish to thank Jadhav KB for his valuable opinion during the preparation of the manuscript.展开更多
This study explores the perspectives and challenges faced by family members providing mental support to cancer patients in Beijing,China.The primary objective is to understand the emotional and practical roles family ...This study explores the perspectives and challenges faced by family members providing mental support to cancer patients in Beijing,China.The primary objective is to understand the emotional and practical roles family members undertake and the difficulties they encounter.Utilizing a qualitative research design,data were collected through semi-structured interviews with family caregivers of cancer patients.Thematic analysis revealed several key themes:the dual burden of emotional support and caregiving responsibilities,the impact on daily life and personal well-being,the role and effectiveness of external support systems,perceptions of medical staff support,and the common challenges and conflicts faced in caregiving.The findings highlight the critical need for comprehensive support systems that address both the emotional and practical needs of family caregivers.Recommendations for enhancing family-centered support programs in oncology settings are discussed.展开更多
Hu et al explored the impact of comprehensive nursing model on swallowing function and quality of life in patients with ischemic stroke.They divided 172 patients into the control group(routine care)and the research gr...Hu et al explored the impact of comprehensive nursing model on swallowing function and quality of life in patients with ischemic stroke.They divided 172 patients into the control group(routine care)and the research group(comprehensive care),and used standard scales to evaluate the swallowing function,neurological deficit,anxiety and depression,daily living ability,and exercise of the two groups of patients before and after care.Changes in indicators of function,quality of life,and compliance.The results showed that compared with the control group,patients in the study group achieved significant improvements in various indicators,with a lower incidence of adverse reactions and higher satisfaction with care.These data suggest that the comprehensive nursing model can significantly improve the swallowing function,quality of life and satisfaction of patients with ischemic stroke.In the future,the development of comprehensive nursing models needs to focus on technological innovation,humanized services,continuing education and training,multi-disciplinary collaboration,optimal allocation of resources,standardized practice and evaluation,etc.,in order to improve nursing effects and promote the improvement of medical service quality.展开更多
With the rapid development of the economy and society and the progress of science and technology,the traditional concept of employment has been gradually broken,and more and more college students hope to realize their...With the rapid development of the economy and society and the progress of science and technology,the traditional concept of employment has been gradually broken,and more and more college students hope to realize their life value through independent entrepreneurship or employment in innovative enterprises.Based on the significance of innovation and entrepreneurship education to improve students’employability,this paper will sort out the development status of domestic college students’employability,analyze the current difficulties of innovation and entrepreneurship education,and try to put forward the optimization strategy of innovation and entrepreneurship education management to improve students’employability.展开更多
This paper discusses the creation strategies of picture books for children’s cognitive and imaginative development,and proposes that picture book creation should closely focus on the needs of children’s cognitive an...This paper discusses the creation strategies of picture books for children’s cognitive and imaginative development,and proposes that picture book creation should closely focus on the needs of children’s cognitive and imaginative development.Through analysis,this paper summarizes the effective strategies in the creation of picture books,aiming to provide theoretical reference and practical guidance for the design of children’s picture books,and further promote the comprehensive development of children’s cognitive and imaginative abilities.展开更多
Fibroids, also called leiomyomas or myomas, are communal tumors of the muscle or uterine wall that affect about 20% of females who are of reproductive age. They can look as if singly or in clusters, and they often cea...Fibroids, also called leiomyomas or myomas, are communal tumors of the muscle or uterine wall that affect about 20% of females who are of reproductive age. They can look as if singly or in clusters, and they often cease to grow after menopause. Fibroids can be classified as intramural, sub serosal, pedunculated, or submucosal based on where they are positioned in the uterus. Although fibroids are benign, they can grow quickly and cause a range of symptoms, such as pelvic pressure, heavy menstrual flow, and infertility. As a result, fibroids are a main reason behind hysterectomy surgeries. The majority of cases of breast cancer are ductal and lobular cancers, making it the second utmost common cancer in women international. Gene mutations like those in BRCA1 or BRCA2 knowingly raise the risk of breast and other cancers, typically with an earlier cancer onset. Cancer risk is influenced by a complex interplay of genetic abnormalities, environmental factors, and lifestyle selections. Further research into these relations is domineering. Although they are common in uterine leiomyomas, especially multiple leiomyomas, MED12 mutations do not significantly correlate with tumor size. These mutations have also been noticed in smooth muscle tumors and leiomyosarcomas, two other types of uterine cancer. The identification of MED12 mutations as the sole genetic abnormality originates in leiomyomas raises the opportunity of a role in the genesis of cancer. 10% - 15% of women who are of reproductive age have endometriosis, which grants serious difficulties because of its chronic nature and range of clinical symptoms. Even after effective surgeries, issues reoccur often, adding to the enormous financial burden. The effects of MED12 mutations have been experiential in recent studies examining the molecular causes of endometriosis-associated infertility, which have shown anomalies in cellular connections and signaling cascades. Computational techniques were used in this study to investigate LifeGreenTM’s potential to prevent uterine fibroids and breast cancer. The efficacy of LifeGreenTM as a preventive measure or a treatment for common gynecological matters was examined and modeled. We investigated the mechanisms underlying LifeGreenTM’s benefits in the treatment of uterine fibroids and breast cancer using computational techniques. Our research contributes to our understanding of its potential therapeutic benefits for women’s health.展开更多
Background:Physical inactivity is a major public health problem worldwide that results in physical and mental health problems.One major issue for physical inactivity is weight stigma(WS),especially perceived WS,which ...Background:Physical inactivity is a major public health problem worldwide that results in physical and mental health problems.One major issue for physical inactivity is weight stigma(WS),especially perceived WS,which could lead to a tendency to avoid physical activity(PA).To better understand the association between perceived WS and PA,knowledge of the likely mediators in this association such as weight bias internalization(WBI)and psychological distress were investigated in the present study.Methods:Using a two-wave longitudinal study and convenient sampling,388 Taiwan residents participants(55%females;mean age=29.7 years[SD±6.3])completed two surveys six months apart.Body mass index(BMI),Perceived Weight Stigma Scale(PWSS),Weight Bias Internalization Scale(WBIS),Depression,Anxiety,Stress Scale(DASS-21),and Tendency to Avoid Physical Activity and Sport Scale(TAPAS)were assessed.Results:A mediation model controlling for age,gender,and BMI with 5000 bootstrapping resamples was performed.Perceived WS exerted significant direct effects on WBI(β=0.25;p<0.001),psychological distress(β=0.15;p=0.003),and tendency to avoid PA(β=0.10;p=0.027);WBI exerted a significant direct effect on tendency to avoid PA(β=0.47;p<0.001).Standardized indirect effects of WBI and psychological distress on the association between perceived WS and tendency to avoid PA were 0.12 and 0.01,respectively.Conclusion:Given the direct association of perceived WS on the tendency to avoid PA and the mediating role of WBI in this association,interventions addressing perceived WS and WBI may contribute to promoting PA.Therefore,health interventionists(both when planning and executing PA programs)need to consider weight stigmawhen encouraging physical activity.展开更多
In recent years,several studies have reported positive outcomes of cell-based therapies despite insufficient engraftment of transplanted cells.These findings have created a huge interest in the regenerative potential ...In recent years,several studies have reported positive outcomes of cell-based therapies despite insufficient engraftment of transplanted cells.These findings have created a huge interest in the regenerative potential of paracrine factors released from transplanted stem or progenitor cells.Interestingly,this notion has also led scientists to question the role of proteins in the secretome produced by cells,tissues or organisms under certain conditions or at a particular time of regenerative therapy.Further studies have revealed that the secretomes derived from different cell types contain paracrine factors that could help to prevent apoptosis and induce proliferation of cells residing within the tissues of affected organs.This could also facilitate the migration of immune,progenitor and stem cells within the body to the site of inflammation.Of these different paracrine factors present within the secretome,researchers have given proper consideration to stromal cell-derived factor-1(SDF1)that plays a vital role in tissue-specific migration of the cells needed for regeneration.Recently researchers recognized that SDF1 could facilitate site-specific migration of cells by regulating SDF1-CXCR4 and/or HMGB1-SDF1-CXCR4 pathways which is vital for tissue regeneration.Hence in this study,we have attempted to describe the role of different types of cells within the body in facilitating regeneration while emphasizing the HMGB1-SDF1-CXCR4 pathway that orchestrates the migration of cells to the site where regeneration is needed.展开更多
A series of Al-6Si-3Cu-(0.3-2)Mg alloys were produced by a conventional casting process.Cooling slope technique wasemployed to produce feedstocks before they were thixoformed at50%liquid fraction.The effect of Mg on t...A series of Al-6Si-3Cu-(0.3-2)Mg alloys were produced by a conventional casting process.Cooling slope technique wasemployed to produce feedstocks before they were thixoformed at50%liquid fraction.The effect of Mg on the microstructure ofAl-Si-Cu aluminium alloys under as-cast and semisolid conditions was investigated.It was found that by adding Mg to Al-Si-Cualloy,some of the Al2Cu phase and silicon were consumed to form Al5Cu2Mg3Si5and Mg2Si phases.The needle-likeβ-Al5FeSi phasetransformed to Chinese-script-likeπ-Al8Mg3FeSi6with the addition of Mg.In the as-cast alloys,the primaryα(Al)was dendritic,butas the Mg content increased,the phase became less dendritic.Moreover,the Mg addition considerably modified the size of theα(Al)phase,but it had no significant effect on the silicon morphology.In the thixoformed alloys,the microstructure showed a fine globularprimary phase surrounded by uniformly distributed silicon and fragmented intermetallic phases.The eutectic silicon was modifiedfrom a flaky and acicular shape to fine fibrous particles.The effect of Mg on eutectic silicon during semisolid processing wasevident.The primary Mg2Si particles were modified from big polygonal particles to become smaller and more globular,whereas themorphology of the Chinese-script-likeπ-Al8Mg3FeSi6changed to a compact shape.The results also exhibit that as the Mg content inthe A319alloy increased,the hardness,yield strength and ultimate tensile strength of the thixoformed alloys significantly improved,but the elongation to fracture dropped.展开更多
An Intrusion Detection System (IDS) provides a front-line defensemechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a...An Intrusion Detection System (IDS) provides a front-line defensemechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a week.A well-known ICS is the Supervisory Control and Data Acquisition (SCADA)system. It supervises the physical process from sensor data and performs remotemonitoring control and diagnostic functions in critical infrastructures. The ICScyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets,suitable for intrusion detection of cyber-attacks in SCADA systems, as the firstline of defense, have been detailed. The machine learning algorithms have beenperformed with labeled output for prediction classification. The activity trafficbetween ICS components is analyzed and packet inspection of the dataset is performed for the ICS network. The features of flow-based network traffic areextracted for behavior analysis with port-wise profiling based on the data baseline,and anomaly detection classification and prediction using machine learning algorithms are performed.展开更多
This paper gives performance analysis of a three phase Permanent Magnet Synchronous Generator (PMSG) connected to a Vertical Axis Wind Turbine (VAWT). Low speed wind condition (less than 5 m/s) is taken in considerati...This paper gives performance analysis of a three phase Permanent Magnet Synchronous Generator (PMSG) connected to a Vertical Axis Wind Turbine (VAWT). Low speed wind condition (less than 5 m/s) is taken in consideration and the entire simulation is carried in Matlab/Simulink environment. The rated power for the generator is fixed at 1.5 KW and number of pole at 20. It is observed under low wind speed of6 m/s, a turbine having approximately1 mof radius and2.6 mof height develops 150 Nm mechanical torque that can generate power up to 1.5 KW. The generator is designed using modeling tool and is fabricated. The fabricated generator is tested in the laboratory with the simulation result for the error analysis. The range of error is about 5%-27% for the same output power value. The limitations and possible causes for error are presented and discussed.展开更多
With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of...With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of the network traffic data and access points.Recently,researchers have suggested deep learning(DL)algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks.However,due to the high dynamics and imbalanced nature of the data,the existing DL classifiers are not completely effective at distinguishing between abnormal and normal behavior line connections for modern networks.Therefore,it is important to design a self-adaptive model for an intrusion detection system(IDS)to improve the detection of attacks.Consequently,in this paper,a novel hybrid weighted deep belief network(HW-DBN)algorithm is proposed for building an efficient and reliable IDS(DeepIoT.IDS)model to detect existing and novel cyberattacks.The HW-DBN algorithm integrates an improved Gaussian–Bernoulli restricted Boltzmann machine(Deep GB-RBM)feature learning operator with a weighted deep neural networks(WDNN)classifier.The CICIDS2017 dataset is selected to evaluate the DeepIoT.IDS model as it contains multiple types of attacks,complex data patterns,noise values,and imbalanced classes.We have compared the performance of the DeepIoT.IDS model with three recent models.The results show the DeepIoT.IDS model outperforms the three other models by achieving a higher detection accuracy of 99.38%and 99.99%for web attack and bot attack scenarios,respectively.Furthermore,it can detect the occurrence of low-frequency attacks that are undetectable by other models.展开更多
In Software-Dened Networks(SDN),the divergence of the control interface from the data plane provides a unique platform to develop a programmable and exible network.A single controller,due to heavy load trafc triggered...In Software-Dened Networks(SDN),the divergence of the control interface from the data plane provides a unique platform to develop a programmable and exible network.A single controller,due to heavy load trafc triggered by different intelligent devices can not handle due to it’s restricted capability.To manage this,it is necessary to implement multiple controllers on the control plane to achieve quality network performance and robustness.The ow of data through the multiple controllers also varies,resulting in an unequal distribution of load between different controllers.One major drawback of the multiple controllers is their constant conguration of the mapping of the switch-controller,quickly allowing unequal distribution of load between controllers.To overcome this drawback,Software-Dened Vehicular Networking(SDVN)has evolved as a congurable and scalable network,that has quickly achieved attraction in wireless communications from research groups,businesses,and industries administration.In this paper,we have proposed a load balancing algorithm based on latency for multiple SDN controllers.It acknowledges the evolving characteristics of real-time latency vs.controller loads.By choosing the required latency and resolving multiple overloads simultaneously,our proposed algorithm solves the loadbalancing problems with multiple overloaded controllers in the SDN control plane.In addition to the migration,our algorithm has improved 25%latency as compared to the existing algorithms.展开更多
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion detection.Wireless-specific traff...Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion detection.Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks.This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis techniques.This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions.Specifically,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement methods.The main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless environment.Intrusion detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural complexities.So this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless environment.The main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these networks.So it is very crucial to design an IDS specifically to target on the wireless networks.展开更多
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).T...Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications.展开更多
An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most o...An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it.During data sharing,security is an important concern in such networks as they are prone to many threats,of which the deadliest is the wormhole attack.These attacks are launched without acquiring the vital information of the network and they highly compromise the communication,security,and performance of the network.In the IoT-based network environment,its mitigation becomes more challenging because of the low resource availability in the sensing devices.We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology.The analysis of literature has motivated our research.In this paper,we developed the ESWI technique for detecting the wormhole attack while improving the performance and security.This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation.The simulation results of our technique show competitive results for the detection rate and packet delivery ratio.It also gives an increased throughput,a decreased end-to-end delay,and a much-reduced consumption of energy.展开更多
The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades.Consequently,there has been a huge paradigm shift in the manufacturing and production sectors.Howev...The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades.Consequently,there has been a huge paradigm shift in the manufacturing and production sectors.However,this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting(various pillars of)industry 4.0.However,before providing a concrete solution certain aspect need to be researched,for instance,cybersecurity threats and privacy issues in the industry.To fill this gap,this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks and countermeasures(in detail).In particular,the focus of the paper is on investigating the possible cyber-attacks targeting 4 layers of IIoT that is one of the key pillars of Industry 4.0.Based on a detailed review of existing literature,in this study,we have identified possible cyber threats,their consequences,and countermeasures.Further,we have provided a comprehensive framework based on an analysis of cybersecurity and privacy challenges.The suggested framework provides for a deeper understanding of the current state of cybersecurity and sets out directions for future research and applications.展开更多
The Internet of Things(IoT)is gaining attention because of its broad applicability,especially by integrating smart devices for massive communication during sensing tasks.IoT-assisted Wireless Sensor Networks(WSN)are s...The Internet of Things(IoT)is gaining attention because of its broad applicability,especially by integrating smart devices for massive communication during sensing tasks.IoT-assisted Wireless Sensor Networks(WSN)are suitable for various applications like industrial monitoring,agriculture,and transportation.In this regard,routing is challenging to nd an efcient path using smart devices for transmitting the packets towards big data repositories while ensuring efcient energy utilization.This paper presents the Robust Cluster Based Routing Protocol(RCBRP)to identify the routing paths where less energy is consumed to enhances the network lifespan.The scheme is presented in six phases to explore ow and communication.We propose the two algorithms:(i)energy-efcient clustering and routing algorithm and (ii)distance and energy consumption calculation algorithm.The scheme consumes less energy and balances the load by clustering the smart devices.Our work is validated through extensive simulation using Matlab.Results elucidate the dominance of the proposed scheme is compared to counterparts in terms of energy consumption,the number of packets received at BS and the number of active and dead nodes.In the future,we shall consider edge computing to analyze the performance of robust clustering.展开更多
Pressure injury is a common postoperative complication of wheelchair users. It has a high incidence rate and can induce sepsis and even death. The fabrics that touch patients’ skin directly have a profound impact on ...Pressure injury is a common postoperative complication of wheelchair users. It has a high incidence rate and can induce sepsis and even death. The fabrics that touch patients’ skin directly have a profound impact on their skin surfaces. This review summarizes the research in the last five years on the relationship between pressure injuries and fabrics. Following the preferred reporting items for systematic reviews and meta-analyses(PRISMA) statement, a systematic literature search is conducted in nine databases, including SCI(Web of Science), IEEE, ASTM, Taylor & Francis, ProQuest, Wiley, SpringerLink, PubMed and SAGE. The research objects, experimental equipment and survey results are investigated in this review, in which twenty-four different textiles and seven different test methodologies are involved. The test methodologies include five kinds of performance tests and two kinds of observational studies. Two studies showed that the particular fabric was helpful to reduce the pressure on the skin surface, and twelve studies revealed that the multi-layer fabric with good air permeability, heat dissipation and moisture dissipation was helpful to prevent pressure injury. This review confirms the correlation between the fabric properties and the occurrence of postoperative pressure injury in wheelchair users. Further experiments are needed to reasonably integrate the fabric characteristics of pressure injury prevention into the mass-produced pressure injury prevention clothes for wheelchair users.展开更多
文摘This paper explores strategies to cultivate high-level technical talents in vocational undergraduate colleges by analyzing their development,the essence of such talents,and proposing several key measures.Strategies include optimizing professional settings and curricula,enhancing school-enterprise cooperation and the integration of industry-university-research,improving teaching staff quality and educational standards,and expanding international cooperation.The importance of policy support and funding and establishing robust quality assurance systems is emphasized for effectively cultivating skilled talents in vocational undergraduate colleges.
文摘BACKGROUND One of the main characteristics of oral squamous cell carcinoma(OSCC)is that it metastasizes to cervical lymph nodes frequently with a high degree of local invasiveness.A primary feature of malignant tumors is their penetration of neighboring tissues,such as lymphatic and blood arteries,due to the tumor cells'capacity to break down the extracellular matrix(ECM).Matrix metalloproteinases(MMPs)constitute a family of proteolytic enzymes that facilitate tissue remo-deling and the degradation of the ECM.MMP-9 and MMP-13 belong to the group of extracellular matrix degrading enzymes and their expression has been studied in OSCC because of their specific functions.MMP-13,a collagenase family member,is thought to play an essential role in the MMP activation cascade by breaking down the fibrillar collagens,whereas MMP-9 is thought to accelerate the growth of tumors.Elevated MMP-13 expression has been associated with tumor behavior and patient prognosis in a number of malignant cases.The authors wish to thank Jadhav KB for his valuable opinion during the preparation of the manuscript.
文摘This study explores the perspectives and challenges faced by family members providing mental support to cancer patients in Beijing,China.The primary objective is to understand the emotional and practical roles family members undertake and the difficulties they encounter.Utilizing a qualitative research design,data were collected through semi-structured interviews with family caregivers of cancer patients.Thematic analysis revealed several key themes:the dual burden of emotional support and caregiving responsibilities,the impact on daily life and personal well-being,the role and effectiveness of external support systems,perceptions of medical staff support,and the common challenges and conflicts faced in caregiving.The findings highlight the critical need for comprehensive support systems that address both the emotional and practical needs of family caregivers.Recommendations for enhancing family-centered support programs in oncology settings are discussed.
基金Natural Science Research Project of Anhui Universities,No.2023AH040411.
文摘Hu et al explored the impact of comprehensive nursing model on swallowing function and quality of life in patients with ischemic stroke.They divided 172 patients into the control group(routine care)and the research group(comprehensive care),and used standard scales to evaluate the swallowing function,neurological deficit,anxiety and depression,daily living ability,and exercise of the two groups of patients before and after care.Changes in indicators of function,quality of life,and compliance.The results showed that compared with the control group,patients in the study group achieved significant improvements in various indicators,with a lower incidence of adverse reactions and higher satisfaction with care.These data suggest that the comprehensive nursing model can significantly improve the swallowing function,quality of life and satisfaction of patients with ischemic stroke.In the future,the development of comprehensive nursing models needs to focus on technological innovation,humanized services,continuing education and training,multi-disciplinary collaboration,optimal allocation of resources,standardized practice and evaluation,etc.,in order to improve nursing effects and promote the improvement of medical service quality.
文摘With the rapid development of the economy and society and the progress of science and technology,the traditional concept of employment has been gradually broken,and more and more college students hope to realize their life value through independent entrepreneurship or employment in innovative enterprises.Based on the significance of innovation and entrepreneurship education to improve students’employability,this paper will sort out the development status of domestic college students’employability,analyze the current difficulties of innovation and entrepreneurship education,and try to put forward the optimization strategy of innovation and entrepreneurship education management to improve students’employability.
文摘This paper discusses the creation strategies of picture books for children’s cognitive and imaginative development,and proposes that picture book creation should closely focus on the needs of children’s cognitive and imaginative development.Through analysis,this paper summarizes the effective strategies in the creation of picture books,aiming to provide theoretical reference and practical guidance for the design of children’s picture books,and further promote the comprehensive development of children’s cognitive and imaginative abilities.
文摘Fibroids, also called leiomyomas or myomas, are communal tumors of the muscle or uterine wall that affect about 20% of females who are of reproductive age. They can look as if singly or in clusters, and they often cease to grow after menopause. Fibroids can be classified as intramural, sub serosal, pedunculated, or submucosal based on where they are positioned in the uterus. Although fibroids are benign, they can grow quickly and cause a range of symptoms, such as pelvic pressure, heavy menstrual flow, and infertility. As a result, fibroids are a main reason behind hysterectomy surgeries. The majority of cases of breast cancer are ductal and lobular cancers, making it the second utmost common cancer in women international. Gene mutations like those in BRCA1 or BRCA2 knowingly raise the risk of breast and other cancers, typically with an earlier cancer onset. Cancer risk is influenced by a complex interplay of genetic abnormalities, environmental factors, and lifestyle selections. Further research into these relations is domineering. Although they are common in uterine leiomyomas, especially multiple leiomyomas, MED12 mutations do not significantly correlate with tumor size. These mutations have also been noticed in smooth muscle tumors and leiomyosarcomas, two other types of uterine cancer. The identification of MED12 mutations as the sole genetic abnormality originates in leiomyomas raises the opportunity of a role in the genesis of cancer. 10% - 15% of women who are of reproductive age have endometriosis, which grants serious difficulties because of its chronic nature and range of clinical symptoms. Even after effective surgeries, issues reoccur often, adding to the enormous financial burden. The effects of MED12 mutations have been experiential in recent studies examining the molecular causes of endometriosis-associated infertility, which have shown anomalies in cellular connections and signaling cascades. Computational techniques were used in this study to investigate LifeGreenTM’s potential to prevent uterine fibroids and breast cancer. The efficacy of LifeGreenTM as a preventive measure or a treatment for common gynecological matters was examined and modeled. We investigated the mechanisms underlying LifeGreenTM’s benefits in the treatment of uterine fibroids and breast cancer using computational techniques. Our research contributes to our understanding of its potential therapeutic benefits for women’s health.
基金funded by the Ministry of Science and Technology,Taiwan(MOST 110-2410-H-006-115,MOST 111-2410-H-006-100,NSTC 112-2410-H-006-089-SS2)E-Da Hospital(EDAHS112032,EDAHS113021 and EDAHS113036)the Higher Education Sprout Project,Ministry of Education to the Headquarters of University Advancement at National Cheng Kung University(NCKU).
文摘Background:Physical inactivity is a major public health problem worldwide that results in physical and mental health problems.One major issue for physical inactivity is weight stigma(WS),especially perceived WS,which could lead to a tendency to avoid physical activity(PA).To better understand the association between perceived WS and PA,knowledge of the likely mediators in this association such as weight bias internalization(WBI)and psychological distress were investigated in the present study.Methods:Using a two-wave longitudinal study and convenient sampling,388 Taiwan residents participants(55%females;mean age=29.7 years[SD±6.3])completed two surveys six months apart.Body mass index(BMI),Perceived Weight Stigma Scale(PWSS),Weight Bias Internalization Scale(WBIS),Depression,Anxiety,Stress Scale(DASS-21),and Tendency to Avoid Physical Activity and Sport Scale(TAPAS)were assessed.Results:A mediation model controlling for age,gender,and BMI with 5000 bootstrapping resamples was performed.Perceived WS exerted significant direct effects on WBI(β=0.25;p<0.001),psychological distress(β=0.15;p=0.003),and tendency to avoid PA(β=0.10;p=0.027);WBI exerted a significant direct effect on tendency to avoid PA(β=0.47;p<0.001).Standardized indirect effects of WBI and psychological distress on the association between perceived WS and tendency to avoid PA were 0.12 and 0.01,respectively.Conclusion:Given the direct association of perceived WS on the tendency to avoid PA and the mediating role of WBI in this association,interventions addressing perceived WS and WBI may contribute to promoting PA.Therefore,health interventionists(both when planning and executing PA programs)need to consider weight stigmawhen encouraging physical activity.
基金Supported by MAHSA University Grant,No.RP158-05/19.
文摘In recent years,several studies have reported positive outcomes of cell-based therapies despite insufficient engraftment of transplanted cells.These findings have created a huge interest in the regenerative potential of paracrine factors released from transplanted stem or progenitor cells.Interestingly,this notion has also led scientists to question the role of proteins in the secretome produced by cells,tissues or organisms under certain conditions or at a particular time of regenerative therapy.Further studies have revealed that the secretomes derived from different cell types contain paracrine factors that could help to prevent apoptosis and induce proliferation of cells residing within the tissues of affected organs.This could also facilitate the migration of immune,progenitor and stem cells within the body to the site of inflammation.Of these different paracrine factors present within the secretome,researchers have given proper consideration to stromal cell-derived factor-1(SDF1)that plays a vital role in tissue-specific migration of the cells needed for regeneration.Recently researchers recognized that SDF1 could facilitate site-specific migration of cells by regulating SDF1-CXCR4 and/or HMGB1-SDF1-CXCR4 pathways which is vital for tissue regeneration.Hence in this study,we have attempted to describe the role of different types of cells within the body in facilitating regeneration while emphasizing the HMGB1-SDF1-CXCR4 pathway that orchestrates the migration of cells to the site where regeneration is needed.
基金Universiti Kebangsaan Malaysia(UKM)and the Ministry of Higher Education(MOHE),Malaysia,for financial support under research grants AP-2012-014 and FRGS/1/2014/TK01/UKM/01/2
文摘A series of Al-6Si-3Cu-(0.3-2)Mg alloys were produced by a conventional casting process.Cooling slope technique wasemployed to produce feedstocks before they were thixoformed at50%liquid fraction.The effect of Mg on the microstructure ofAl-Si-Cu aluminium alloys under as-cast and semisolid conditions was investigated.It was found that by adding Mg to Al-Si-Cualloy,some of the Al2Cu phase and silicon were consumed to form Al5Cu2Mg3Si5and Mg2Si phases.The needle-likeβ-Al5FeSi phasetransformed to Chinese-script-likeπ-Al8Mg3FeSi6with the addition of Mg.In the as-cast alloys,the primaryα(Al)was dendritic,butas the Mg content increased,the phase became less dendritic.Moreover,the Mg addition considerably modified the size of theα(Al)phase,but it had no significant effect on the silicon morphology.In the thixoformed alloys,the microstructure showed a fine globularprimary phase surrounded by uniformly distributed silicon and fragmented intermetallic phases.The eutectic silicon was modifiedfrom a flaky and acicular shape to fine fibrous particles.The effect of Mg on eutectic silicon during semisolid processing wasevident.The primary Mg2Si particles were modified from big polygonal particles to become smaller and more globular,whereas themorphology of the Chinese-script-likeπ-Al8Mg3FeSi6changed to a compact shape.The results also exhibit that as the Mg content inthe A319alloy increased,the hardness,yield strength and ultimate tensile strength of the thixoformed alloys significantly improved,but the elongation to fracture dropped.
基金This work was conducted at the IoT and wireless communication protocols laboratory,International Islamic University Malaysia and is partially sponsored by the Publication-Research initiative grant scheme no.P-RIGS18-003-0003.
文摘An Intrusion Detection System (IDS) provides a front-line defensemechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a week.A well-known ICS is the Supervisory Control and Data Acquisition (SCADA)system. It supervises the physical process from sensor data and performs remotemonitoring control and diagnostic functions in critical infrastructures. The ICScyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets,suitable for intrusion detection of cyber-attacks in SCADA systems, as the firstline of defense, have been detailed. The machine learning algorithms have beenperformed with labeled output for prediction classification. The activity trafficbetween ICS components is analyzed and packet inspection of the dataset is performed for the ICS network. The features of flow-based network traffic areextracted for behavior analysis with port-wise profiling based on the data baseline,and anomaly detection classification and prediction using machine learning algorithms are performed.
文摘This paper gives performance analysis of a three phase Permanent Magnet Synchronous Generator (PMSG) connected to a Vertical Axis Wind Turbine (VAWT). Low speed wind condition (less than 5 m/s) is taken in consideration and the entire simulation is carried in Matlab/Simulink environment. The rated power for the generator is fixed at 1.5 KW and number of pole at 20. It is observed under low wind speed of6 m/s, a turbine having approximately1 mof radius and2.6 mof height develops 150 Nm mechanical torque that can generate power up to 1.5 KW. The generator is designed using modeling tool and is fabricated. The fabricated generator is tested in the laboratory with the simulation result for the error analysis. The range of error is about 5%-27% for the same output power value. The limitations and possible causes for error are presented and discussed.
基金This work was partially funded by the Industry Grant Scheme from Jaycorp Berhad in cooperation with UNITAR International University.The authors would like to thank INSFORNET,the Center for Advanced Computing Technology(C-ACT)at Universiti Teknikal Malaysia Melaka(UTeM),and the Center of Intelligent and Autonomous Systems(CIAS)at Universiti Tun Hussein Onn Malaysia(UTHM)for supporting this work.
文摘With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of the network traffic data and access points.Recently,researchers have suggested deep learning(DL)algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks.However,due to the high dynamics and imbalanced nature of the data,the existing DL classifiers are not completely effective at distinguishing between abnormal and normal behavior line connections for modern networks.Therefore,it is important to design a self-adaptive model for an intrusion detection system(IDS)to improve the detection of attacks.Consequently,in this paper,a novel hybrid weighted deep belief network(HW-DBN)algorithm is proposed for building an efficient and reliable IDS(DeepIoT.IDS)model to detect existing and novel cyberattacks.The HW-DBN algorithm integrates an improved Gaussian–Bernoulli restricted Boltzmann machine(Deep GB-RBM)feature learning operator with a weighted deep neural networks(WDNN)classifier.The CICIDS2017 dataset is selected to evaluate the DeepIoT.IDS model as it contains multiple types of attacks,complex data patterns,noise values,and imbalanced classes.We have compared the performance of the DeepIoT.IDS model with three recent models.The results show the DeepIoT.IDS model outperforms the three other models by achieving a higher detection accuracy of 99.38%and 99.99%for web attack and bot attack scenarios,respectively.Furthermore,it can detect the occurrence of low-frequency attacks that are undetectable by other models.
基金The authors are thankful for the support of Taif University Researchers Supporting Project No.(TURSP-2020/10),Taif University,Taif,Saudi Arabia.Taif University Researchers Supporting Project No.(TURSP-2020/10),Taif University,Taif,Saudi Arabia.
文摘In Software-Dened Networks(SDN),the divergence of the control interface from the data plane provides a unique platform to develop a programmable and exible network.A single controller,due to heavy load trafc triggered by different intelligent devices can not handle due to it’s restricted capability.To manage this,it is necessary to implement multiple controllers on the control plane to achieve quality network performance and robustness.The ow of data through the multiple controllers also varies,resulting in an unequal distribution of load between different controllers.One major drawback of the multiple controllers is their constant conguration of the mapping of the switch-controller,quickly allowing unequal distribution of load between controllers.To overcome this drawback,Software-Dened Vehicular Networking(SDVN)has evolved as a congurable and scalable network,that has quickly achieved attraction in wireless communications from research groups,businesses,and industries administration.In this paper,we have proposed a load balancing algorithm based on latency for multiple SDN controllers.It acknowledges the evolving characteristics of real-time latency vs.controller loads.By choosing the required latency and resolving multiple overloads simultaneously,our proposed algorithm solves the loadbalancing problems with multiple overloaded controllers in the SDN control plane.In addition to the migration,our algorithm has improved 25%latency as compared to the existing algorithms.
基金The authors acknowledge Jouf University,Saudi Arabia for his funding support.
文摘Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion detection.Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks.This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis techniques.This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions.Specifically,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement methods.The main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless environment.Intrusion detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural complexities.So this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless environment.The main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these networks.So it is very crucial to design an IDS specifically to target on the wireless networks.
文摘Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications.
文摘An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it.During data sharing,security is an important concern in such networks as they are prone to many threats,of which the deadliest is the wormhole attack.These attacks are launched without acquiring the vital information of the network and they highly compromise the communication,security,and performance of the network.In the IoT-based network environment,its mitigation becomes more challenging because of the low resource availability in the sensing devices.We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology.The analysis of literature has motivated our research.In this paper,we developed the ESWI technique for detecting the wormhole attack while improving the performance and security.This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation.The simulation results of our technique show competitive results for the detection rate and packet delivery ratio.It also gives an increased throughput,a decreased end-to-end delay,and a much-reduced consumption of energy.
基金The author(s)acknowledge Jouf University,Saudi Arabia for his funding support.
文摘The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades.Consequently,there has been a huge paradigm shift in the manufacturing and production sectors.However,this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting(various pillars of)industry 4.0.However,before providing a concrete solution certain aspect need to be researched,for instance,cybersecurity threats and privacy issues in the industry.To fill this gap,this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks and countermeasures(in detail).In particular,the focus of the paper is on investigating the possible cyber-attacks targeting 4 layers of IIoT that is one of the key pillars of Industry 4.0.Based on a detailed review of existing literature,in this study,we have identified possible cyber threats,their consequences,and countermeasures.Further,we have provided a comprehensive framework based on an analysis of cybersecurity and privacy challenges.The suggested framework provides for a deeper understanding of the current state of cybersecurity and sets out directions for future research and applications.
文摘The Internet of Things(IoT)is gaining attention because of its broad applicability,especially by integrating smart devices for massive communication during sensing tasks.IoT-assisted Wireless Sensor Networks(WSN)are suitable for various applications like industrial monitoring,agriculture,and transportation.In this regard,routing is challenging to nd an efcient path using smart devices for transmitting the packets towards big data repositories while ensuring efcient energy utilization.This paper presents the Robust Cluster Based Routing Protocol(RCBRP)to identify the routing paths where less energy is consumed to enhances the network lifespan.The scheme is presented in six phases to explore ow and communication.We propose the two algorithms:(i)energy-efcient clustering and routing algorithm and (ii)distance and energy consumption calculation algorithm.The scheme consumes less energy and balances the load by clustering the smart devices.Our work is validated through extensive simulation using Matlab.Results elucidate the dominance of the proposed scheme is compared to counterparts in terms of energy consumption,the number of packets received at BS and the number of active and dead nodes.In the future,we shall consider edge computing to analyze the performance of robust clustering.
文摘Pressure injury is a common postoperative complication of wheelchair users. It has a high incidence rate and can induce sepsis and even death. The fabrics that touch patients’ skin directly have a profound impact on their skin surfaces. This review summarizes the research in the last five years on the relationship between pressure injuries and fabrics. Following the preferred reporting items for systematic reviews and meta-analyses(PRISMA) statement, a systematic literature search is conducted in nine databases, including SCI(Web of Science), IEEE, ASTM, Taylor & Francis, ProQuest, Wiley, SpringerLink, PubMed and SAGE. The research objects, experimental equipment and survey results are investigated in this review, in which twenty-four different textiles and seven different test methodologies are involved. The test methodologies include five kinds of performance tests and two kinds of observational studies. Two studies showed that the particular fabric was helpful to reduce the pressure on the skin surface, and twelve studies revealed that the multi-layer fabric with good air permeability, heat dissipation and moisture dissipation was helpful to prevent pressure injury. This review confirms the correlation between the fabric properties and the occurrence of postoperative pressure injury in wheelchair users. Further experiments are needed to reasonably integrate the fabric characteristics of pressure injury prevention into the mass-produced pressure injury prevention clothes for wheelchair users.