本文全面解读了中医药团体标准评价体系(System of Consortium Standards Rating and Evaluation of Traditional Chinese Medicine,SCORE-TCM)。SCORE-TCM是结合定性与定量评价,全面评估中医药团体标准在制定主体、文本编写、技术内容...本文全面解读了中医药团体标准评价体系(System of Consortium Standards Rating and Evaluation of Traditional Chinese Medicine,SCORE-TCM)。SCORE-TCM是结合定性与定量评价,全面评估中医药团体标准在制定主体、文本编写、技术内容、推广应用和实施效益等几方面特征的综合评价工具。文中详述了SCORE-TCM的构建目的、定义和构建过程,解释了评价指标体系中的各项指标,并对每项指标的评价材料进行介绍。本文旨在帮助中医药团体标准的制定者、第三方评价机构和其他相关方更好地理解SCORE-TCM各评价条目的含义,更有效地运用于中医药团体标准的自评价或第三方评价,SCORE-TCM将为《中医药团体标准管理办法》的贯彻实施,以及中医药团体标准的高质量发展提供技术支持。展开更多
The albumin-bilirubin(ALBI)score,which was proposed to assess the prognosis of patients with hepatocellular carcinoma,has gradually been extended to other liver diseases in recent years,including primary biliary chola...The albumin-bilirubin(ALBI)score,which was proposed to assess the prognosis of patients with hepatocellular carcinoma,has gradually been extended to other liver diseases in recent years,including primary biliary cholangitis,liver cirrhosis,hepatitis,liver transplantation,and liver injury.The ALBI score is often compared with classical scores such as the Child-Pugh and model for end-stage liver disease scores or other noninvasive prediction models.It is widely employed because of its immunity to subjective evaluation indicators and ease of obtaining detection indicators.An increasing number of studies have confirmed that it is highly accurate for assessing the prognosis of patients with chronic liver disease;additionally,it has demonstrated good predictive performance for outcomes beyond survival in patients with liver diseases,such as decompensation events.This article presents a review of the application of ALBI scores in various non-malignant liver diseases.展开更多
Unmanned autonomous helicopter(UAH)path planning problem is an important component of the UAH mission planning system.Aiming to reduce the influence of non-complete ground threat information on UAH path planning,a gro...Unmanned autonomous helicopter(UAH)path planning problem is an important component of the UAH mission planning system.Aiming to reduce the influence of non-complete ground threat information on UAH path planning,a ground threat prediction-based path planning method is proposed based on artificial bee colony(ABC)algorithm by collaborative thinking strategy.Firstly,a dynamic threat distribution probability model is developed based on the characteristics of typical ground threats.The dynamic no-fly zone of the UAH is simulated and established by calculating the distribution probability of ground threats in real time.Then,a dynamic path planning method for UAH is designed in complex environment based on the real-time prediction of ground threats.By adding the collision warning mechanism to the path planning model,the flight path could be dynamically adjusted according to changing no-fly zones.Furthermore,a hybrid enhanced ABC algorithm is proposed based on collaborative thinking strategy.The proposed algorithm applies the leader-member thinking mechanism to guide the direction of population evolution,and reduces the negative impact of local optimal solutions caused by collaborative learning update strategy,which makes the optimization performance of ABC algorithm more controllable and efficient.Finally,simulation results verify the feasibility and effectiveness of the proposed ground threat prediction path planning method.展开更多
BACKGROUND Radiomics is a promising tool that may increase the value of magnetic resonance imaging(MRI)for different tasks related to the management of patients with hepatocellular carcinoma(HCC).However,its implement...BACKGROUND Radiomics is a promising tool that may increase the value of magnetic resonance imaging(MRI)for different tasks related to the management of patients with hepatocellular carcinoma(HCC).However,its implementation in clinical practice is still far,with many issues related to the methodological quality of radiomic studies.AIM To systematically review the current status of MRI radiomic studies concerning HCC using the Radiomics Quality Score(RQS).METHODS A systematic literature search of PubMed,Google Scholar,and Web of Science databases was performed to identify original articles focusing on the use of MRI radiomics for HCC management published between 2017 and 2023.The methodological quality of radiomic studies was assessed using the RQS tool.Spearman’s correlation(ρ)analysis was performed to explore if RQS was correlated with journal metrics and characteristics of the studies.The level of statistical significance was set at P<0.05.RESULTS One hundred and twenty-seven articles were included,of which 43 focused on HCC prognosis,39 on prediction of pathological findings,16 on prediction of the expression of molecular markers outcomes,18 had a diagnostic purpose,and 11 had multiple purposes.The mean RQS was 8±6.22,and the corresponding percentage was 24.15%±15.25%(ranging from 0.0% to 58.33%).RQS was positively correlated with journal impact factor(IF;ρ=0.36,P=2.98×10^(-5)),5-years IF(ρ=0.33,P=1.56×10^(-4)),number of patients included in the study(ρ=0.51,P<9.37×10^(-10))and number of radiomics features extracted in the study(ρ=0.59,P<4.59×10^(-13)),and time of publication(ρ=-0.23,P<0.0072).CONCLUSION Although MRI radiomics in HCC represents a promising tool to develop adequate personalized treatment as a noninvasive approach in HCC patients,our study revealed that studies in this field still lack the quality required to allow its introduction into clinical practice.展开更多
For ulcerative colitis(UC),the variability in inflammatory activity along the colon poses a challenge in management.The focus on achieving endoscopic healing in UC is evident,where the UC Endoscopic Index of Severity ...For ulcerative colitis(UC),the variability in inflammatory activity along the colon poses a challenge in management.The focus on achieving endoscopic healing in UC is evident,where the UC Endoscopic Index of Severity and Mayo Endoscopic Subscore are commonly used for evaluation.However,these indices primarily consider the most severely affected region.Liu et al recent study validates the Toronto Inflammatory Bowel Disease Global Endoscopic Reporting(TIGER)score offering a comprehensive assessment of inflammatory activity across diverse segments of the colon and rectum and a reliable index correlating strongly with UC Endoscopic Index of Severity and moderately with Mayo Endoscopic Subscore(MES).Despite recommendation,certain aspects warrant further invest-igation.Fecal calprotectin,an intermediate target,correlates with TIGER and should be explored.Determining TIGER scores defining endoscopic remission and response,evaluating agreement with histological activity,and assessing inter-endoscopist agreement for TIGER require scrutiny.Exploring the correlation between TIGER and intestinal ultrasound,akin to MES,adds value.展开更多
The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated...The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats.展开更多
Managing inflammatory bowel disease(IBD)is becoming increasingly complex and personalized,considering the advent of new advanced therapies with distinct mechanisms of action.Achieving mucosal healing(MH)is a pivotal t...Managing inflammatory bowel disease(IBD)is becoming increasingly complex and personalized,considering the advent of new advanced therapies with distinct mechanisms of action.Achieving mucosal healing(MH)is a pivotal therapeutic goal in IBD management and can prevent IBD progression and reduce flares,hospitalization,surgery,intestinal damage,and colorectal cancer.Employing proactive disease and therapy assessment is essential to achieve better control of intestinal inflammation,even if subclinical,to alter the natural course of IBD.Periodic monitoring of fecal calprotectin(FC)levels and interval endoscopic evaluations are cornerstones for evaluating response/remission to advanced therapies targeting IBD,assessing MH,and detecting subclinical recurrence.Here,we comment on the article by Ishida et al Moreover,this editorial aimed to review the role of FC and endoscopic scores in predicting MH in patients with IBD.Furthermore,we intend to present some evidence on the role of these markers in future targets,such as histological and transmural healing.Additional prospective multicenter studies with a stricter MH criterion,standardized endoscopic and histopathological analyses,and virtual chromoscopy,potentially including artificial intelligence and other biomarkers,are desired.展开更多
BACKGROUND The success of liver resection relies on the ability of the remnant liver to regenerate.Most of the knowledge regarding the pathophysiological basis of liver regeneration comes from rodent studies,and data ...BACKGROUND The success of liver resection relies on the ability of the remnant liver to regenerate.Most of the knowledge regarding the pathophysiological basis of liver regeneration comes from rodent studies,and data on humans are scarce.Additionally,there is limited knowledge about the preoperative factors that influence postoperative regeneration.AIM To quantify postoperative remnant liver volume by the latest volumetric software and investigate perioperative factors that affect posthepatectomy liver regenera-tion.METHODS A total of 268 patients who received partial hepatectomy were enrolled.Patients were grouped into right hepatectomy/trisegmentectomy(RH/Tri),left hepa-tectomy(LH),segmentectomy(Seg),and subsegmentectomy/nonanatomical hepatectomy(Sub/Non)groups.The regeneration index(RI)and late rege-neration rate were defined as(postoperative liver volume)/[total functional liver volume(TFLV)]×100 and(RI at 6-months-RI at 3-months)/RI at 6-months,respectively.The lower 25th percentile of RI and the higher 25th percentile of late regeneration rate in each group were defined as“low regeneration”and“delayed regeneration”.“Restoration to the original size”was defined as regeneration of the liver volume by more than 90%of the TFLV at 12 months postsurgery.RESULTS The numbers of patients in the RH/Tri,LH,Seg,and Sub/Non groups were 41,53,99 and 75,respectively.The RI plateaued at 3 months in the LH,Seg,and Sub/Non groups,whereas the RI increased until 12 months in the RH/Tri group.According to our multivariate analysis,the preoperative albumin-bilirubin(ALBI)score was an independent factor for low regeneration at 3 months[odds ratio(OR)95%CI=2.80(1.17-6.69),P=0.02;per 1.0 up]and 12 months[OR=2.27(1.01-5.09),P=0.04;per 1.0 up].Multivariate analysis revealed that only liver resection percentage[OR=1.03(1.00-1.05),P=0.04]was associated with delayed regeneration.Furthermore,multivariate analysis demonstrated that the preoperative ALBI score[OR=2.63(1.00-1.05),P=0.02;per 1.0 up]and liver resection percentage[OR=1.02(1.00-1.05),P=0.04;per 1.0 up]were found to be independent risk factors associated with volume restoration failure.CONCLUSION Liver regeneration posthepatectomy was determined by the resection percentage and preoperative ALBI score.This knowledge helps surgeons decide the timing and type of rehepatectomy for recurrent cases.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
The Internet of Wearable Things(IoWT)or Wearable Internet of Things(WIoT)is a new paradigm that combines IoT and wearable technology.Advances in IoT technology have enabled the miniaturization of sensors embedded in w...The Internet of Wearable Things(IoWT)or Wearable Internet of Things(WIoT)is a new paradigm that combines IoT and wearable technology.Advances in IoT technology have enabled the miniaturization of sensors embedded in wearable devices and the ability to communicate data and access real-time information over low-power mobile networks.IoWT devices are highly interdependent with mobile devices.However,due to their limited processing power and bandwidth,IoWT devices are vulnerable to cyberattacks due to their low level of security.Threat modeling and frameworks for analyzing cyber threats against existing IoT or low-power protocols have been actively researched.The threat analysis framework used in existing studies was limited to specific protocols and did not target IoWT devices.In addition,In the literature surveyed to date,no cyber threat analysis framework is targeting IoWT.Therefore,the threat model presented in the existing research on cyber threat analysis and modeling for IoWT is specialized for specific devices.In addition,because it does not present standardized attack tactics and techniques,there is a limitation in that it is difficult to identify attacks quickly.In this paper,we propose an Internet of Wearable Things threat analysis frameWork(IWTW)framework that can derive security threats through systematic analysis of IoWT attack cases and possible security threats and perform cyber threat analysis based on them.The methodology for developing the IWTW framework consists of three steps:Analysis,Standardization,and Compilation.IoWT attack cases and potential security threats are analyzed in the analysis stage.In the standardization stage,attack tactics and techniques derived from the analysis of attack cases and potential security threats are standardized,resulting in 3 attack categories,18 attack tactics,and 68 attack techniques.In the compilation stage,standardized security threats are combined to develop the IWTW framework ultimately.We present four case studies targeting MiBand 2,Fitbit Charge HR/Surge,Samsung Gear 3,Xiaomi Amazifit,Honor Band 5,Honor Watch ES,and Senbono CF-58 devices to validate the proposed IWTW framework.We analyzed the attack process through a case study and applied the IWTW framework to derive standardized attack categories,tactics,and techniques effectively.By applying the IWTW framework to cyber threat analysis targeting IoWT,security threats can be standardized,and the attack process can be quickly derived,enabling effective attack analysis on IoWT.展开更多
目前,各社会团体积极参与中医药标准的制定和发布,特别是“十四五”以来,中医药团体标准化工作更是迎来了提质增效的关键阶段。深入评估社会团体发布的中医药标准质量,是推进中医药团体标准工作的关键环节和重点任务。前期已研制并形成...目前,各社会团体积极参与中医药标准的制定和发布,特别是“十四五”以来,中医药团体标准化工作更是迎来了提质增效的关键阶段。深入评估社会团体发布的中医药标准质量,是推进中医药团体标准工作的关键环节和重点任务。前期已研制并形成了中医药团体标准评价体系(System of Consortium Standards Rating and Evaluation of Traditional Chinese Medicine, SCORETCM)。在上述背景下,本研究通过专家共识法,设计了一套基于SCORE-TCM的中医药团体标准抽样评价方案,应用场景为对于特定社会团体发布的标准,或各团体发布的特定技术类别的标准进行快速评估。该方案涵盖了标准抽样、材料收集、标准评价、结果解读的完整流程,为中医药团体标准的抽样评价工作提供了参考方案。展开更多
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s...Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.展开更多
The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advan...The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advanced tools and techniques for attacking targets with specific goals.Even countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted attack.APT is a sophisticated attack that involves multiple stages and specific strategies.Besides,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security system.However,APTs are generally implemented in multiple stages.If one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack failure.The detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing challenges.This survey paper will provide knowledge about APT attacks and their essential steps.This follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the work.Data used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.展开更多
Considering the increased anthropogenic impacts,species with a limited range and low detectability often lack fundamental information and conservation actions,placing them at a high risk of endangerment.The Chinting a...Considering the increased anthropogenic impacts,species with a limited range and low detectability often lack fundamental information and conservation actions,placing them at a high risk of endangerment.The Chinting alpine toad Scutiger chintingensis is a rare mountain amphibian endemic to the eastern margin of the Qinghai-Xizang Plateau in China.Within its whole distribution range,only three known populations(Wolong,Emei,and Wawu)exist and no recent population status report has been documented for this species over the past two decades.From 2020 to 2023,we investigated the species distribution,and assessed the risk factors for the main populations.We recorded this species in all distribution areas,and updated a new distribution site with a lower elevation limit.The relative population density was 0.024±0.012 ind./m^(2)on Mount Emei,whereas only 0.008±0.017 ind./m^(2)on Mount Wawu.No significant difference was observed in the number of individuals between the two populations;however,the relative population density was significantly different.Sewage and waste discharge resulting from the construction of scenic areas,as well as disturbances from tourism,were the primary anthropogenic factors that influenced the survival of this species.Our results provide the updated information on the distribution and population status of the Chinting alpine toad,and suggest that unrecorded populations,as well as a wider elevation range,may exist for this species.Our findings emphasise the importance of timely updates of species distribution and population information and offer a basis for the future conservation of endangered amphibians.展开更多
In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,t...In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods.展开更多
The main aim of this opinion review is to comment on the recent article published by Garg et al in the World Journal of Gastroenterology 2023;29:4593–4603.The authors in the published article developed a new scoring ...The main aim of this opinion review is to comment on the recent article published by Garg et al in the World Journal of Gastroenterology 2023;29:4593–4603.The authors in the published article developed a new scoring system,Garg incon-tinence scores(GIS),for fecal incontinence(FI).FI is a chronic debilitating disease that has a severe negative impact on the quality of life of the patients.Rome IV criteria define FI as multiple episodes of solid or liquid stool passed into the clothes at least twice a month.The associated social stigmatization often leads to significant under-reporting of the condition,which further impairs management.An important point is that the complexity and vagueness of the disease make it difficult for the patients to properly define and report the magnitude of the problem to their physicians.Due to this,the management becomes even more difficult.This issue is resolved up to a considerable extent by a scoring ques-tionnaire.There were several scoring systems in use for the last three decades.The prominent of them were the Cleveland Clinic scoring system or the Wexner scoring system,St.Marks Hospital or Vaizey’s scores,and the FI severity index.However,there were several shortcomings in these scoring systems.In the opinion review,we tried to analyze the strength of GIS and compare it to the existing scoring systems.The main pitfalls in the existing scoring systems were that most of them gave equal weightage to different types of FI(solid,liquid,flatus,etc.),were not comprehensive,and took only the surgeon’s perception of FI into view.In GIS,almost all shortcomings of previous scoring systems had been addressed:different weights were assigned to different types of FI by a robust statistical methodology;the scoring system was made comprehensive by including all types of FI that were previously omitted(urge,stress and mucus FI)and gave priority to patients’rather than the physicians’perceptions while developing the scoring system.Due to this,GIS indeed looked like a paradigm shift in the evaluation of FI.However,it is too early to conclude this,as GIS needs to be validated for accuracy and simplicity in future studies.展开更多
文摘本文全面解读了中医药团体标准评价体系(System of Consortium Standards Rating and Evaluation of Traditional Chinese Medicine,SCORE-TCM)。SCORE-TCM是结合定性与定量评价,全面评估中医药团体标准在制定主体、文本编写、技术内容、推广应用和实施效益等几方面特征的综合评价工具。文中详述了SCORE-TCM的构建目的、定义和构建过程,解释了评价指标体系中的各项指标,并对每项指标的评价材料进行介绍。本文旨在帮助中医药团体标准的制定者、第三方评价机构和其他相关方更好地理解SCORE-TCM各评价条目的含义,更有效地运用于中医药团体标准的自评价或第三方评价,SCORE-TCM将为《中医药团体标准管理办法》的贯彻实施,以及中医药团体标准的高质量发展提供技术支持。
文摘The albumin-bilirubin(ALBI)score,which was proposed to assess the prognosis of patients with hepatocellular carcinoma,has gradually been extended to other liver diseases in recent years,including primary biliary cholangitis,liver cirrhosis,hepatitis,liver transplantation,and liver injury.The ALBI score is often compared with classical scores such as the Child-Pugh and model for end-stage liver disease scores or other noninvasive prediction models.It is widely employed because of its immunity to subjective evaluation indicators and ease of obtaining detection indicators.An increasing number of studies have confirmed that it is highly accurate for assessing the prognosis of patients with chronic liver disease;additionally,it has demonstrated good predictive performance for outcomes beyond survival in patients with liver diseases,such as decompensation events.This article presents a review of the application of ALBI scores in various non-malignant liver diseases.
文摘Unmanned autonomous helicopter(UAH)path planning problem is an important component of the UAH mission planning system.Aiming to reduce the influence of non-complete ground threat information on UAH path planning,a ground threat prediction-based path planning method is proposed based on artificial bee colony(ABC)algorithm by collaborative thinking strategy.Firstly,a dynamic threat distribution probability model is developed based on the characteristics of typical ground threats.The dynamic no-fly zone of the UAH is simulated and established by calculating the distribution probability of ground threats in real time.Then,a dynamic path planning method for UAH is designed in complex environment based on the real-time prediction of ground threats.By adding the collision warning mechanism to the path planning model,the flight path could be dynamically adjusted according to changing no-fly zones.Furthermore,a hybrid enhanced ABC algorithm is proposed based on collaborative thinking strategy.The proposed algorithm applies the leader-member thinking mechanism to guide the direction of population evolution,and reduces the negative impact of local optimal solutions caused by collaborative learning update strategy,which makes the optimization performance of ABC algorithm more controllable and efficient.Finally,simulation results verify the feasibility and effectiveness of the proposed ground threat prediction path planning method.
基金Supported by the“Ricerca Corrente”Grant from Italian Ministry of Health,No.IRCCS SYNLAB SDN.
文摘BACKGROUND Radiomics is a promising tool that may increase the value of magnetic resonance imaging(MRI)for different tasks related to the management of patients with hepatocellular carcinoma(HCC).However,its implementation in clinical practice is still far,with many issues related to the methodological quality of radiomic studies.AIM To systematically review the current status of MRI radiomic studies concerning HCC using the Radiomics Quality Score(RQS).METHODS A systematic literature search of PubMed,Google Scholar,and Web of Science databases was performed to identify original articles focusing on the use of MRI radiomics for HCC management published between 2017 and 2023.The methodological quality of radiomic studies was assessed using the RQS tool.Spearman’s correlation(ρ)analysis was performed to explore if RQS was correlated with journal metrics and characteristics of the studies.The level of statistical significance was set at P<0.05.RESULTS One hundred and twenty-seven articles were included,of which 43 focused on HCC prognosis,39 on prediction of pathological findings,16 on prediction of the expression of molecular markers outcomes,18 had a diagnostic purpose,and 11 had multiple purposes.The mean RQS was 8±6.22,and the corresponding percentage was 24.15%±15.25%(ranging from 0.0% to 58.33%).RQS was positively correlated with journal impact factor(IF;ρ=0.36,P=2.98×10^(-5)),5-years IF(ρ=0.33,P=1.56×10^(-4)),number of patients included in the study(ρ=0.51,P<9.37×10^(-10))and number of radiomics features extracted in the study(ρ=0.59,P<4.59×10^(-13)),and time of publication(ρ=-0.23,P<0.0072).CONCLUSION Although MRI radiomics in HCC represents a promising tool to develop adequate personalized treatment as a noninvasive approach in HCC patients,our study revealed that studies in this field still lack the quality required to allow its introduction into clinical practice.
文摘For ulcerative colitis(UC),the variability in inflammatory activity along the colon poses a challenge in management.The focus on achieving endoscopic healing in UC is evident,where the UC Endoscopic Index of Severity and Mayo Endoscopic Subscore are commonly used for evaluation.However,these indices primarily consider the most severely affected region.Liu et al recent study validates the Toronto Inflammatory Bowel Disease Global Endoscopic Reporting(TIGER)score offering a comprehensive assessment of inflammatory activity across diverse segments of the colon and rectum and a reliable index correlating strongly with UC Endoscopic Index of Severity and moderately with Mayo Endoscopic Subscore(MES).Despite recommendation,certain aspects warrant further invest-igation.Fecal calprotectin,an intermediate target,correlates with TIGER and should be explored.Determining TIGER scores defining endoscopic remission and response,evaluating agreement with histological activity,and assessing inter-endoscopist agreement for TIGER require scrutiny.Exploring the correlation between TIGER and intestinal ultrasound,akin to MES,adds value.
文摘The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats.
文摘Managing inflammatory bowel disease(IBD)is becoming increasingly complex and personalized,considering the advent of new advanced therapies with distinct mechanisms of action.Achieving mucosal healing(MH)is a pivotal therapeutic goal in IBD management and can prevent IBD progression and reduce flares,hospitalization,surgery,intestinal damage,and colorectal cancer.Employing proactive disease and therapy assessment is essential to achieve better control of intestinal inflammation,even if subclinical,to alter the natural course of IBD.Periodic monitoring of fecal calprotectin(FC)levels and interval endoscopic evaluations are cornerstones for evaluating response/remission to advanced therapies targeting IBD,assessing MH,and detecting subclinical recurrence.Here,we comment on the article by Ishida et al Moreover,this editorial aimed to review the role of FC and endoscopic scores in predicting MH in patients with IBD.Furthermore,we intend to present some evidence on the role of these markers in future targets,such as histological and transmural healing.Additional prospective multicenter studies with a stricter MH criterion,standardized endoscopic and histopathological analyses,and virtual chromoscopy,potentially including artificial intelligence and other biomarkers,are desired.
文摘BACKGROUND The success of liver resection relies on the ability of the remnant liver to regenerate.Most of the knowledge regarding the pathophysiological basis of liver regeneration comes from rodent studies,and data on humans are scarce.Additionally,there is limited knowledge about the preoperative factors that influence postoperative regeneration.AIM To quantify postoperative remnant liver volume by the latest volumetric software and investigate perioperative factors that affect posthepatectomy liver regenera-tion.METHODS A total of 268 patients who received partial hepatectomy were enrolled.Patients were grouped into right hepatectomy/trisegmentectomy(RH/Tri),left hepa-tectomy(LH),segmentectomy(Seg),and subsegmentectomy/nonanatomical hepatectomy(Sub/Non)groups.The regeneration index(RI)and late rege-neration rate were defined as(postoperative liver volume)/[total functional liver volume(TFLV)]×100 and(RI at 6-months-RI at 3-months)/RI at 6-months,respectively.The lower 25th percentile of RI and the higher 25th percentile of late regeneration rate in each group were defined as“low regeneration”and“delayed regeneration”.“Restoration to the original size”was defined as regeneration of the liver volume by more than 90%of the TFLV at 12 months postsurgery.RESULTS The numbers of patients in the RH/Tri,LH,Seg,and Sub/Non groups were 41,53,99 and 75,respectively.The RI plateaued at 3 months in the LH,Seg,and Sub/Non groups,whereas the RI increased until 12 months in the RH/Tri group.According to our multivariate analysis,the preoperative albumin-bilirubin(ALBI)score was an independent factor for low regeneration at 3 months[odds ratio(OR)95%CI=2.80(1.17-6.69),P=0.02;per 1.0 up]and 12 months[OR=2.27(1.01-5.09),P=0.04;per 1.0 up].Multivariate analysis revealed that only liver resection percentage[OR=1.03(1.00-1.05),P=0.04]was associated with delayed regeneration.Furthermore,multivariate analysis demonstrated that the preoperative ALBI score[OR=2.63(1.00-1.05),P=0.02;per 1.0 up]and liver resection percentage[OR=1.02(1.00-1.05),P=0.04;per 1.0 up]were found to be independent risk factors associated with volume restoration failure.CONCLUSION Liver regeneration posthepatectomy was determined by the resection percentage and preoperative ALBI score.This knowledge helps surgeons decide the timing and type of rehepatectomy for recurrent cases.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金supported by Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2021-II210493,5G Massive Next Generation Cyber Attack Deception Technology Development,90%)the Gachon University research fund of 2022(GCU-202300750001,10%).
文摘The Internet of Wearable Things(IoWT)or Wearable Internet of Things(WIoT)is a new paradigm that combines IoT and wearable technology.Advances in IoT technology have enabled the miniaturization of sensors embedded in wearable devices and the ability to communicate data and access real-time information over low-power mobile networks.IoWT devices are highly interdependent with mobile devices.However,due to their limited processing power and bandwidth,IoWT devices are vulnerable to cyberattacks due to their low level of security.Threat modeling and frameworks for analyzing cyber threats against existing IoT or low-power protocols have been actively researched.The threat analysis framework used in existing studies was limited to specific protocols and did not target IoWT devices.In addition,In the literature surveyed to date,no cyber threat analysis framework is targeting IoWT.Therefore,the threat model presented in the existing research on cyber threat analysis and modeling for IoWT is specialized for specific devices.In addition,because it does not present standardized attack tactics and techniques,there is a limitation in that it is difficult to identify attacks quickly.In this paper,we propose an Internet of Wearable Things threat analysis frameWork(IWTW)framework that can derive security threats through systematic analysis of IoWT attack cases and possible security threats and perform cyber threat analysis based on them.The methodology for developing the IWTW framework consists of three steps:Analysis,Standardization,and Compilation.IoWT attack cases and potential security threats are analyzed in the analysis stage.In the standardization stage,attack tactics and techniques derived from the analysis of attack cases and potential security threats are standardized,resulting in 3 attack categories,18 attack tactics,and 68 attack techniques.In the compilation stage,standardized security threats are combined to develop the IWTW framework ultimately.We present four case studies targeting MiBand 2,Fitbit Charge HR/Surge,Samsung Gear 3,Xiaomi Amazifit,Honor Band 5,Honor Watch ES,and Senbono CF-58 devices to validate the proposed IWTW framework.We analyzed the attack process through a case study and applied the IWTW framework to derive standardized attack categories,tactics,and techniques effectively.By applying the IWTW framework to cyber threat analysis targeting IoWT,security threats can be standardized,and the attack process can be quickly derived,enabling effective attack analysis on IoWT.
文摘目前,各社会团体积极参与中医药标准的制定和发布,特别是“十四五”以来,中医药团体标准化工作更是迎来了提质增效的关键阶段。深入评估社会团体发布的中医药标准质量,是推进中医药团体标准工作的关键环节和重点任务。前期已研制并形成了中医药团体标准评价体系(System of Consortium Standards Rating and Evaluation of Traditional Chinese Medicine, SCORETCM)。在上述背景下,本研究通过专家共识法,设计了一套基于SCORE-TCM的中医药团体标准抽样评价方案,应用场景为对于特定社会团体发布的标准,或各团体发布的特定技术类别的标准进行快速评估。该方案涵盖了标准抽样、材料收集、标准评价、结果解读的完整流程,为中医药团体标准的抽样评价工作提供了参考方案。
基金funded by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skłodowska-Curie Action(MSCA)grant agreement No.101109961.
文摘Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
文摘The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advanced tools and techniques for attacking targets with specific goals.Even countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted attack.APT is a sophisticated attack that involves multiple stages and specific strategies.Besides,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security system.However,APTs are generally implemented in multiple stages.If one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack failure.The detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing challenges.This survey paper will provide knowledge about APT attacks and their essential steps.This follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the work.Data used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.
基金supported by the National Natural Science Foundation of China(32271737,32071544)the Interdisciplinary Innovation Team of the Chinese Academy of Sciences(CAS)“Light of West China”Program(xbzg-zdsys-202207)+1 种基金the Shenzhen Zhilan Foundation(2021070451A)Nature Science Foundation of Sichuan Province(2022NSFSC0125).
文摘Considering the increased anthropogenic impacts,species with a limited range and low detectability often lack fundamental information and conservation actions,placing them at a high risk of endangerment.The Chinting alpine toad Scutiger chintingensis is a rare mountain amphibian endemic to the eastern margin of the Qinghai-Xizang Plateau in China.Within its whole distribution range,only three known populations(Wolong,Emei,and Wawu)exist and no recent population status report has been documented for this species over the past two decades.From 2020 to 2023,we investigated the species distribution,and assessed the risk factors for the main populations.We recorded this species in all distribution areas,and updated a new distribution site with a lower elevation limit.The relative population density was 0.024±0.012 ind./m^(2)on Mount Emei,whereas only 0.008±0.017 ind./m^(2)on Mount Wawu.No significant difference was observed in the number of individuals between the two populations;however,the relative population density was significantly different.Sewage and waste discharge resulting from the construction of scenic areas,as well as disturbances from tourism,were the primary anthropogenic factors that influenced the survival of this species.Our results provide the updated information on the distribution and population status of the Chinting alpine toad,and suggest that unrecorded populations,as well as a wider elevation range,may exist for this species.Our findings emphasise the importance of timely updates of species distribution and population information and offer a basis for the future conservation of endangered amphibians.
基金Supported by the National Natural Science Foundation of China(No.62203390)the Science and Technology Project of China TobaccoZhejiang Industrial Co.,Ltd(No.ZJZY2022E004)。
文摘In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods.
文摘The main aim of this opinion review is to comment on the recent article published by Garg et al in the World Journal of Gastroenterology 2023;29:4593–4603.The authors in the published article developed a new scoring system,Garg incon-tinence scores(GIS),for fecal incontinence(FI).FI is a chronic debilitating disease that has a severe negative impact on the quality of life of the patients.Rome IV criteria define FI as multiple episodes of solid or liquid stool passed into the clothes at least twice a month.The associated social stigmatization often leads to significant under-reporting of the condition,which further impairs management.An important point is that the complexity and vagueness of the disease make it difficult for the patients to properly define and report the magnitude of the problem to their physicians.Due to this,the management becomes even more difficult.This issue is resolved up to a considerable extent by a scoring ques-tionnaire.There were several scoring systems in use for the last three decades.The prominent of them were the Cleveland Clinic scoring system or the Wexner scoring system,St.Marks Hospital or Vaizey’s scores,and the FI severity index.However,there were several shortcomings in these scoring systems.In the opinion review,we tried to analyze the strength of GIS and compare it to the existing scoring systems.The main pitfalls in the existing scoring systems were that most of them gave equal weightage to different types of FI(solid,liquid,flatus,etc.),were not comprehensive,and took only the surgeon’s perception of FI into view.In GIS,almost all shortcomings of previous scoring systems had been addressed:different weights were assigned to different types of FI by a robust statistical methodology;the scoring system was made comprehensive by including all types of FI that were previously omitted(urge,stress and mucus FI)and gave priority to patients’rather than the physicians’perceptions while developing the scoring system.Due to this,GIS indeed looked like a paradigm shift in the evaluation of FI.However,it is too early to conclude this,as GIS needs to be validated for accuracy and simplicity in future studies.