In order to solve the failure of electricity anti-stealing detection device triggered by the noise mixed in high-frequency electricity stealing signals,a denoising method based on variational mode decomposition(VMD)an...In order to solve the failure of electricity anti-stealing detection device triggered by the noise mixed in high-frequency electricity stealing signals,a denoising method based on variational mode decomposition(VMD)and wavelet threshold denoising(WTD)was applied to extract the effective high-frequency electricity stealing signals.First,the signal polluted by noise was pre-decomposed using the VMD algorithm,the instantaneous frequency means of each pre-decomposed components was analyzed,so as to determine the optimal K value.The optimal K value was used to decompose the polluted signal into K intrinsic mode components,and the sensitive mode components were determined through the cross-correlation function.Next,each sensitive mode was reconstructed.Finally,the reconstructed signal denoised using the wavelet threshold to obtain the denoised signal.The simulation analysis and experimental results show that the proposed method is superior to the traditional VMD method,FFT method and EMD method,as it can effectively eliminate the noise and enhance the reliability of high-frequency electricity stealing signal detection.展开更多
Intrusion detection systems are increasingly using machine learning.While machine learning has shown excellent performance in identifying malicious traffic,it may increase the risk of privacy leakage.This paper focuse...Intrusion detection systems are increasingly using machine learning.While machine learning has shown excellent performance in identifying malicious traffic,it may increase the risk of privacy leakage.This paper focuses on imple-menting a model stealing attack on intrusion detection systems.Existing model stealing attacks are hard to imple-ment in practical network environments,as they either need private data of the victim dataset or frequent access to the victim model.In this paper,we propose a novel solution called Fast Model Stealing Attack(FMSA)to address the problem in the field of model stealing attacks.We also highlight the risks of using ML-NIDS in network security.First,meta-learning frameworks are introduced into the model stealing algorithm to clone the victim model in a black-box state.Then,the number of accesses to the target model is used as an optimization term,resulting in minimal queries to achieve model stealing.Finally,adversarial training is used to simulate the data distribution of the target model and achieve the recovery of privacy data.Through experiments on multiple public datasets,compared to existing state-of-the-art algorithms,FMSA reduces the number of accesses to the target model and improves the accuracy of the clone model on the test dataset to 88.9%and the similarity with the target model to 90.1%.We can demonstrate the successful execution of model stealing attacks on the ML-NIDS system even with protective measures in place to limit the number of anomalous queries.展开更多
BACKGROUND Portal vein arterialization(PVA)has been used in liver transplantation(LT)to maximize oxygen delivery when arterial circulation is compromised or has been used as an alternative reperfusion technique for co...BACKGROUND Portal vein arterialization(PVA)has been used in liver transplantation(LT)to maximize oxygen delivery when arterial circulation is compromised or has been used as an alternative reperfusion technique for complex portal vein thrombosis(PVT).The effect of PVA on portal perfusion and primary graft dysfunction(PGD)has not been assessed.All patients receiving PVA and LT at the Fundacion Santa Fe de Bogota between 2011 and 2022 were analyzed.To account for the time-sensitive effects of graft perfusion,patients were classified into two groups:prereperfusion(pre-PVA),if the arterioportal anastomosis was performed before graft revascularization,and postreperfusion(post-PVA),if PVA was performed afterward.The pre-PVA rationale contemplated poor portal hemodynamics,severe vascular steal,or PVT.Post-PVA was considered if graft hypoperfusion became evident.Conservative interventions were attempted before PVA.展开更多
The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its ...The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.展开更多
This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web...This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that requiresmart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart card. The approach uses proxies and card reader code to provide this capability to the requesting device.Previous work with remote or shared smart card use either requires continuous access to the smart card machine or specific client software. The approach in this paper works for any device and browser that has proxy settings, creates minimal network traffic and computation on the smart card machine, and allows the client to transfer from one network to another while maintaining connectivity to a server. This paper describes the smart card sharing approach, implementation and validation of the approach using real systems, and security implications for an enterprise using smart cards.展开更多
作连词用的before,其基本含义是“在……之前”(earlier than the time when),但译成汉语时可作不同处理。1.常常译作“在……之前”。例如:You are expected to sitting on your seatbefore the play begins.请在话剧开演之前在自己的...作连词用的before,其基本含义是“在……之前”(earlier than the time when),但译成汉语时可作不同处理。1.常常译作“在……之前”。例如:You are expected to sitting on your seatbefore the play begins.请在话剧开演之前在自己的座位上坐好。2.在A before B的句式中,A表示时间,B表示行动,如果硬译为“A发生在B之前”,不合汉语习惯,译成“A之后才发生B”就比较得体。例如:展开更多
The koala^1 is a cutie,but does it steal^2 too much of the limelight^3?A new study adds quantitative detail to an ongoing debate over whether such"conservation mascots^4"receive publicity and funding to the detrime...The koala^1 is a cutie,but does it steal^2 too much of the limelight^3?A new study adds quantitative detail to an ongoing debate over whether such"conservation mascots^4"receive publicity and funding to the detriment of^5 animals typically deemed less attractive.展开更多
steal one’s thunder乍看不太合乎逻辑,thunder(雷声)怎么能会被steal(偷)呢?其实这是一条英国的成语。它的历史十分悠久。现在这条成语在英国及美国使用得都很普遍。它表达的含义为:spoil one’s attempt to impress byanticipating h...steal one’s thunder乍看不太合乎逻辑,thunder(雷声)怎么能会被steal(偷)呢?其实这是一条英国的成语。它的历史十分悠久。现在这条成语在英国及美国使用得都很普遍。它表达的含义为:spoil one’s attempt to impress byanticipating him,detracting from what he is say-ing,doing,etc.汉语就是“趁人不备,捷足先登,抢在某人之前或贬低某人的言行使之不受他人注意”。展开更多
Coronary subclavian steal syndrome (CSSS) has been recognized lately as an unusual clinical entity,giving rise to angina but rarely causing an acute coronary syndrome (ACS). The prerequisites for the appearance of CSS...Coronary subclavian steal syndrome (CSSS) has been recognized lately as an unusual clinical entity,giving rise to angina but rarely causing an acute coronary syndrome (ACS). The prerequisites for the appearance of CSSS are both a patent left internal mammary artery (LIMA) graft and severe stenosis of the left subclavian artery (LSA). However,LSA is often overlooked in the diagnostic evaluation of patients with angina,who have underwent coronary artery bypass grafting (CABG). We report an unusual case of non-ST-segment elevation myocardial infarction (NSTEMI) caused by subtotal occlusion of proximal LSA.展开更多
Arterial supply of an intralobar pulmonary sequestration(IPS) from the coronary circulation is extremely rare. A significant coronary steal does not occur because of dual or triple sources of blood supply to sequestra...Arterial supply of an intralobar pulmonary sequestration(IPS) from the coronary circulation is extremely rare. A significant coronary steal does not occur because of dual or triple sources of blood supply to sequestrated lung tissue. We present a 60-year-old woman who presented to us with repeated episodes of monomorphic ventricular tachycardia(VT) in last 3 mo. Radio frequency ablation was ineffective. On evaluation, she had right lower lobe IPS with dual arterial blood supply, i.e., right pulmonary artery and the systemic arterial supply from the right coronary artery(RCA). Stress myocardial perfusion scan revealed significant inducible ischemia in the RCA territory. Coronary angiogram revealed critical stenosis of proximal RCA just after the origin of the systemic artery supplying IPS. The critical stenosis in the RCA was stented. At 12 mo follow-up, she had no further episodes of VT or angina.展开更多
In patients with history of coronary artery disease angina pectoris is usually attributed to the progression of atherosclerotic lesions. However,in patients with previous coronary artery bypass graft operation(CABG) u...In patients with history of coronary artery disease angina pectoris is usually attributed to the progression of atherosclerotic lesions. However,in patients with previous coronary artery bypass graft operation(CABG) using internal mammary artery grafts,great vessel disease should also be considered. Herein we present two patients with history of CABG whose symptoms were suspicious for coronary ischemia. During cardiac catheterization reverse blood flow was observed from the left artery disease to the left internal mammary artery(LIMA) graft in both cases. After angioplasty and stent implantation of the left subclavian artery antegrade flow was restored in the LIMA grafts and both patients had complete resolution of symptoms.展开更多
The microstructure evolution has been investigated for hot rolling of advanced low carbon steels containing Nb, Ti, V and Cu. The critical processing step to develop the properties of hot rolled steels is cooling afte...The microstructure evolution has been investigated for hot rolling of advanced low carbon steels containing Nb, Ti, V and Cu. The critical processing step to develop the properties of hot rolled steels is cooling after rolling when the austenite-to-ferrite transformation as well as precipitation takes place thereby determining the final mi- crostructure. Thus, the modelling work emphasizes the kinetics of errite formation. Ferrite growth rates can adequately be described by taking into account a solute-drag- like effect of Mn and Nb. The emphasis of the model is to predict the phase transfor- mation kinetics for the industrial practice of accelerated cooling. The ferrite grain size is essentially determined at the early stages of transformation and can be correlated to the trunsformation start temperature. Pcarbides and nitrides of Nb, Ti and V is controlled by Ostwald ripening of these particles. The ageing behaviour can then be described based on the Shercliff-Ashby model for precipitation hardening. The situa- tion is more complex for Cu precipitation where the ageing response is also related to a sequence of different precipitation types.展开更多
Through the comparison study on cutting force, cutting temperature andmachined surface quality with the sub-dry cutting traditional cooling method, it is shown thatsub-dry cutting can retard the wear of the tooled par...Through the comparison study on cutting force, cutting temperature andmachined surface quality with the sub-dry cutting traditional cooling method, it is shown thatsub-dry cutting can retard the wear of the tooled parts. It is beneficial to realize the productionwithout pollution and meet the demand of clean environment.展开更多
BACKGROUND We report a rare case of numbness in the right hand,finally diagnosed as bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome and ...BACKGROUND We report a rare case of numbness in the right hand,finally diagnosed as bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome and explain the cause of these diseases.CASE SUMMARY The patient was a 65-year-old woman.She complained of dizziness,numbness and weakness of the right hand for 6 mo.She was diagnosed with bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome by ultrasound,enhanced computed tomography,computed tomography angiography and other examinations.Considering the surgical risks,the patient refused the aberrant right subclavian artery stent implantation and was discharged.We hypothesize that these two kinds of deformity and right subclavian steal syndrome may not occur by accident and result from multiple malformations.CONCLUSION Bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome is rare.This case reminds interventional radiologists of the possibility of these abnormalities before surgery.展开更多
On a local level, thermomechanical states during the passing of hot metallic material through the de- formation volume in a process of plane rolling with smooth rools were analysed by an experimental-nu- merical met...On a local level, thermomechanical states during the passing of hot metallic material through the de- formation volume in a process of plane rolling with smooth rools were analysed by an experimental-nu- merical method. These states,which are markedly inhomogeneous in the length as well as in the height of the deformation zone,were taken as the basis for physical simulation of rolling the material at a certain lavel(i. e. stream line) of the deformation zone.Their influences on local yield stresses and on the development of the microstructure were checked.The efficiency of physical simulation of rolling with the Gleeble 1500 simulating equipment was examined.The states at which the transport of metallic material through the deformation zone between smooth rolls takes place were analysed by a visioplastic method,while physical simulation of rolling was made by thermomechanically controlled cylindrical compression tests.The tests were made with industrially manufactrued X5Grni8.9 austenitic stainless steel.展开更多
基金supported by China Southern Power Grid Corporation,GrantNo.GDKJXM20185800the National Natural Science Foundation of China,Grant No.62073084.
文摘In order to solve the failure of electricity anti-stealing detection device triggered by the noise mixed in high-frequency electricity stealing signals,a denoising method based on variational mode decomposition(VMD)and wavelet threshold denoising(WTD)was applied to extract the effective high-frequency electricity stealing signals.First,the signal polluted by noise was pre-decomposed using the VMD algorithm,the instantaneous frequency means of each pre-decomposed components was analyzed,so as to determine the optimal K value.The optimal K value was used to decompose the polluted signal into K intrinsic mode components,and the sensitive mode components were determined through the cross-correlation function.Next,each sensitive mode was reconstructed.Finally,the reconstructed signal denoised using the wavelet threshold to obtain the denoised signal.The simulation analysis and experimental results show that the proposed method is superior to the traditional VMD method,FFT method and EMD method,as it can effectively eliminate the noise and enhance the reliability of high-frequency electricity stealing signal detection.
基金supported by Grant Nos.U22A2036,HIT.OCEF.2021007,2020YFB1406902,2020B0101360001.
文摘Intrusion detection systems are increasingly using machine learning.While machine learning has shown excellent performance in identifying malicious traffic,it may increase the risk of privacy leakage.This paper focuses on imple-menting a model stealing attack on intrusion detection systems.Existing model stealing attacks are hard to imple-ment in practical network environments,as they either need private data of the victim dataset or frequent access to the victim model.In this paper,we propose a novel solution called Fast Model Stealing Attack(FMSA)to address the problem in the field of model stealing attacks.We also highlight the risks of using ML-NIDS in network security.First,meta-learning frameworks are introduced into the model stealing algorithm to clone the victim model in a black-box state.Then,the number of accesses to the target model is used as an optimization term,resulting in minimal queries to achieve model stealing.Finally,adversarial training is used to simulate the data distribution of the target model and achieve the recovery of privacy data.Through experiments on multiple public datasets,compared to existing state-of-the-art algorithms,FMSA reduces the number of accesses to the target model and improves the accuracy of the clone model on the test dataset to 88.9%and the similarity with the target model to 90.1%.We can demonstrate the successful execution of model stealing attacks on the ML-NIDS system even with protective measures in place to limit the number of anomalous queries.
文摘BACKGROUND Portal vein arterialization(PVA)has been used in liver transplantation(LT)to maximize oxygen delivery when arterial circulation is compromised or has been used as an alternative reperfusion technique for complex portal vein thrombosis(PVT).The effect of PVA on portal perfusion and primary graft dysfunction(PGD)has not been assessed.All patients receiving PVA and LT at the Fundacion Santa Fe de Bogota between 2011 and 2022 were analyzed.To account for the time-sensitive effects of graft perfusion,patients were classified into two groups:prereperfusion(pre-PVA),if the arterioportal anastomosis was performed before graft revascularization,and postreperfusion(post-PVA),if PVA was performed afterward.The pre-PVA rationale contemplated poor portal hemodynamics,severe vascular steal,or PVT.Post-PVA was considered if graft hypoperfusion became evident.Conservative interventions were attempted before PVA.
基金Supported by the Foundation of National Labora-tory for Modern Communications(51436050505KG0101)
文摘The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.
文摘This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that requiresmart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart card. The approach uses proxies and card reader code to provide this capability to the requesting device.Previous work with remote or shared smart card use either requires continuous access to the smart card machine or specific client software. The approach in this paper works for any device and browser that has proxy settings, creates minimal network traffic and computation on the smart card machine, and allows the client to transfer from one network to another while maintaining connectivity to a server. This paper describes the smart card sharing approach, implementation and validation of the approach using real systems, and security implications for an enterprise using smart cards.
文摘作连词用的before,其基本含义是“在……之前”(earlier than the time when),但译成汉语时可作不同处理。1.常常译作“在……之前”。例如:You are expected to sitting on your seatbefore the play begins.请在话剧开演之前在自己的座位上坐好。2.在A before B的句式中,A表示时间,B表示行动,如果硬译为“A发生在B之前”,不合汉语习惯,译成“A之后才发生B”就比较得体。例如:
文摘The koala^1 is a cutie,but does it steal^2 too much of the limelight^3?A new study adds quantitative detail to an ongoing debate over whether such"conservation mascots^4"receive publicity and funding to the detriment of^5 animals typically deemed less attractive.
文摘steal one’s thunder乍看不太合乎逻辑,thunder(雷声)怎么能会被steal(偷)呢?其实这是一条英国的成语。它的历史十分悠久。现在这条成语在英国及美国使用得都很普遍。它表达的含义为:spoil one’s attempt to impress byanticipating him,detracting from what he is say-ing,doing,etc.汉语就是“趁人不备,捷足先登,抢在某人之前或贬低某人的言行使之不受他人注意”。
基金supported by grants from National Key R&D Program of China (2016 YFC1300304)
文摘Coronary subclavian steal syndrome (CSSS) has been recognized lately as an unusual clinical entity,giving rise to angina but rarely causing an acute coronary syndrome (ACS). The prerequisites for the appearance of CSSS are both a patent left internal mammary artery (LIMA) graft and severe stenosis of the left subclavian artery (LSA). However,LSA is often overlooked in the diagnostic evaluation of patients with angina,who have underwent coronary artery bypass grafting (CABG). We report an unusual case of non-ST-segment elevation myocardial infarction (NSTEMI) caused by subtotal occlusion of proximal LSA.
文摘Arterial supply of an intralobar pulmonary sequestration(IPS) from the coronary circulation is extremely rare. A significant coronary steal does not occur because of dual or triple sources of blood supply to sequestrated lung tissue. We present a 60-year-old woman who presented to us with repeated episodes of monomorphic ventricular tachycardia(VT) in last 3 mo. Radio frequency ablation was ineffective. On evaluation, she had right lower lobe IPS with dual arterial blood supply, i.e., right pulmonary artery and the systemic arterial supply from the right coronary artery(RCA). Stress myocardial perfusion scan revealed significant inducible ischemia in the RCA territory. Coronary angiogram revealed critical stenosis of proximal RCA just after the origin of the systemic artery supplying IPS. The critical stenosis in the RCA was stented. At 12 mo follow-up, she had no further episodes of VT or angina.
文摘In patients with history of coronary artery disease angina pectoris is usually attributed to the progression of atherosclerotic lesions. However,in patients with previous coronary artery bypass graft operation(CABG) using internal mammary artery grafts,great vessel disease should also be considered. Herein we present two patients with history of CABG whose symptoms were suspicious for coronary ischemia. During cardiac catheterization reverse blood flow was observed from the left artery disease to the left internal mammary artery(LIMA) graft in both cases. After angioplasty and stent implantation of the left subclavian artery antegrade flow was restored in the LIMA grafts and both patients had complete resolution of symptoms.
文摘The microstructure evolution has been investigated for hot rolling of advanced low carbon steels containing Nb, Ti, V and Cu. The critical processing step to develop the properties of hot rolled steels is cooling after rolling when the austenite-to-ferrite transformation as well as precipitation takes place thereby determining the final mi- crostructure. Thus, the modelling work emphasizes the kinetics of errite formation. Ferrite growth rates can adequately be described by taking into account a solute-drag- like effect of Mn and Nb. The emphasis of the model is to predict the phase transfor- mation kinetics for the industrial practice of accelerated cooling. The ferrite grain size is essentially determined at the early stages of transformation and can be correlated to the trunsformation start temperature. Pcarbides and nitrides of Nb, Ti and V is controlled by Ostwald ripening of these particles. The ageing behaviour can then be described based on the Shercliff-Ashby model for precipitation hardening. The situa- tion is more complex for Cu precipitation where the ageing response is also related to a sequence of different precipitation types.
基金Foundation of East China Shipbuilding Institute(No.Y98205).
文摘Through the comparison study on cutting force, cutting temperature andmachined surface quality with the sub-dry cutting traditional cooling method, it is shown thatsub-dry cutting can retard the wear of the tooled parts. It is beneficial to realize the productionwithout pollution and meet the demand of clean environment.
基金Supported by Fujian Province Medical Innovation Project,No.2016-CXB-13
文摘BACKGROUND We report a rare case of numbness in the right hand,finally diagnosed as bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome and explain the cause of these diseases.CASE SUMMARY The patient was a 65-year-old woman.She complained of dizziness,numbness and weakness of the right hand for 6 mo.She was diagnosed with bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome by ultrasound,enhanced computed tomography,computed tomography angiography and other examinations.Considering the surgical risks,the patient refused the aberrant right subclavian artery stent implantation and was discharged.We hypothesize that these two kinds of deformity and right subclavian steal syndrome may not occur by accident and result from multiple malformations.CONCLUSION Bilateral common carotid artery common trunk with aberrant right subclavian artery combined with right subclavian steal syndrome is rare.This case reminds interventional radiologists of the possibility of these abnormalities before surgery.
文摘On a local level, thermomechanical states during the passing of hot metallic material through the de- formation volume in a process of plane rolling with smooth rools were analysed by an experimental-nu- merical method. These states,which are markedly inhomogeneous in the length as well as in the height of the deformation zone,were taken as the basis for physical simulation of rolling the material at a certain lavel(i. e. stream line) of the deformation zone.Their influences on local yield stresses and on the development of the microstructure were checked.The efficiency of physical simulation of rolling with the Gleeble 1500 simulating equipment was examined.The states at which the transport of metallic material through the deformation zone between smooth rolls takes place were analysed by a visioplastic method,while physical simulation of rolling was made by thermomechanically controlled cylindrical compression tests.The tests were made with industrially manufactrued X5Grni8.9 austenitic stainless steel.