Traditional Chinese medicines (TCMs) have been used in China for thousands of years for the treatment of various diseases, highly treated as the Chinese cultural heritage. It has played the pivotal role in maintaini...Traditional Chinese medicines (TCMs) have been used in China for thousands of years for the treatment of various diseases, highly treated as the Chinese cultural heritage. It has played the pivotal role in maintaining the health of Chinese people and even the entire globe.展开更多
Half of the 2015 Nobel Prize in Physiology or Medicine was awarded to Chinese scientist Youyou Tu in recognition of her pioneering work on the antimalarial artemisinin,extracted from Artemisia annua,a traditional Chin...Half of the 2015 Nobel Prize in Physiology or Medicine was awarded to Chinese scientist Youyou Tu in recognition of her pioneering work on the antimalarial artemisinin,extracted from Artemisia annua,a traditional Chinese herbal remedy used to treat fever.This is clearly a great encouragement for scientists who engage traditional medicine research.As Youyou Tu stated in her Nobel Prize awarding lecture,artemisinin is a gift from traditional Chinese展开更多
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori...Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.展开更多
The aim of this study was to investigate the inter-fraction variations, patient comfort and knowledge at Charlotte Maxeke Johannesburg Academic Hospital (CMJAH). The differences in set-up that occurred between treatme...The aim of this study was to investigate the inter-fraction variations, patient comfort and knowledge at Charlotte Maxeke Johannesburg Academic Hospital (CMJAH). The differences in set-up that occurred between treatment sessions for the left sided breast patients were observed and recorded. Measurements of routine set-up variation for 24 patients were performed by matching the cone beam computed tomography (CBCT) and the planning computed tomography (CT). Scans of all five fractions per patient were used to quantify the setup variations with standard deviation (SD) in all the three directions (anterior posterior, left right, and superior inferior). The patients DIBH comfort and knowledge was also evaluated. The average translational errors for the anterior posterior (AP, z), left-right (LR, x), and Superior-inferior (SI, y) directions were 0.40 cm, 0.40 cm, and 0.40 cm, respectively. The translation variation of the three directions showed statistical significance (P < 0.05). On comfort and knowledge investigation, among all participants, 80% moderately agreed that the therapist’s instructions for operating the deep inspiration breath hold (DIBH) technique were easy to understand, and 63.33% indicated that their comfort with the DIBH technique was neutral or average. The inter-fraction variations in patients with left-sided breast cancer were qualitatively analyzed. Significant shifts between CBCT and planning CT images were observed. The daily treatment verification could assist accurate dose delivery.展开更多
文摘Traditional Chinese medicines (TCMs) have been used in China for thousands of years for the treatment of various diseases, highly treated as the Chinese cultural heritage. It has played the pivotal role in maintaining the health of Chinese people and even the entire globe.
文摘Half of the 2015 Nobel Prize in Physiology or Medicine was awarded to Chinese scientist Youyou Tu in recognition of her pioneering work on the antimalarial artemisinin,extracted from Artemisia annua,a traditional Chinese herbal remedy used to treat fever.This is clearly a great encouragement for scientists who engage traditional medicine research.As Youyou Tu stated in her Nobel Prize awarding lecture,artemisinin is a gift from traditional Chinese
文摘Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.
文摘The aim of this study was to investigate the inter-fraction variations, patient comfort and knowledge at Charlotte Maxeke Johannesburg Academic Hospital (CMJAH). The differences in set-up that occurred between treatment sessions for the left sided breast patients were observed and recorded. Measurements of routine set-up variation for 24 patients were performed by matching the cone beam computed tomography (CBCT) and the planning computed tomography (CT). Scans of all five fractions per patient were used to quantify the setup variations with standard deviation (SD) in all the three directions (anterior posterior, left right, and superior inferior). The patients DIBH comfort and knowledge was also evaluated. The average translational errors for the anterior posterior (AP, z), left-right (LR, x), and Superior-inferior (SI, y) directions were 0.40 cm, 0.40 cm, and 0.40 cm, respectively. The translation variation of the three directions showed statistical significance (P < 0.05). On comfort and knowledge investigation, among all participants, 80% moderately agreed that the therapist’s instructions for operating the deep inspiration breath hold (DIBH) technique were easy to understand, and 63.33% indicated that their comfort with the DIBH technique was neutral or average. The inter-fraction variations in patients with left-sided breast cancer were qualitatively analyzed. Significant shifts between CBCT and planning CT images were observed. The daily treatment verification could assist accurate dose delivery.