These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes...These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system.展开更多
Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challen...Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme.展开更多
Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine ...Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine under EUA,as well as the continuation of phase III clinical trials and pharmacovigilance plans were sorted out.And attention was paid to the safety surveillance actions and risk control measures of vaccines under EUA.Results and Conclusion The methods and policies for EUA and risk control of Pfizer-BioNTech vaccine were made clear and we could provide a reference for the pharmacovigilance action after the COVID-19 vaccines were put on the market in China.In the case of EUA,it is necessary to analyze the existing clinical safety data.Based on this,the risk control process should be confirmed at the time of formal marketing approval and after listing.Finally,the risk control should be adjusted at any time.展开更多
Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is ...Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that a authenticated user has the authority to perform a operation,which is more fine-grained.In most classical schemes,the authority management center(AMC)manages the resources permissions for all network nodes within the jurisdiction.However,the existence of AMC may be the weakest link of the whole scheme.In this paper,a protocol for QAM without AMC is proposed based on entanglement swapping.In this protocol,Bob(the owner of resources)authenticates the legality of Alice(the user)and then shares the right key for the resources with Alice.Compared with the other existed QAM protocols,this protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.The authority division is extended to fin-grained rights division.The security is analyzed from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols.展开更多
Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor.This paper pro-poses a digitalized power system based on synthetical transmission carrier which makes the power system al...Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor.This paper pro-poses a digitalized power system based on synthetical transmission carrier which makes the power system also serves as a data communication system with the same structure.Loads get authorized before powered on,so their behaviour is predictable.Digitalized power system includes such basic units as digital power source,hub and load.Their concepts are explained,their behaviour and implements are also described in detail.Real time distribution of residual power is applied,which makes prompt authorization possible.Communication protocol and load address assignments are also presented in this paper.A prototype is built and the results verify the effect of the new proposed power system.展开更多
Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (...Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (Quality of Service) are two critical factors during global mobility, so how to get a smooth and fast handover based on a user privacy protected infrastructure is our focus. Based on a user-centric vir-tual identity defined by EU IST project Daidalos, this paper firstly proposes an effective infrastructure which protects the context-driven access policies for online services in order to avoid attacks by malicious eaves-droppers. In the proposed infrastructure, SMAL and Diameter are used to securely protect and deliver au-thenticated and authorized entities and XACML is used to authorize the user-level privacy policy. On the basis of it, a dynamic fast authentication and authorization handover mechanism is proposed which can save one trip communication time consummation between administrative domains.展开更多
Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to ...Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to data delivering and real time information adjourning. This kind of capability could be well ex-ploited by Peer-To-Peer (P2P) systems, Internet-wide as long as private ones, like in Public Safety or Civil Protection Communication Systems;but Pub/Sub specifications, and DDS/RTPS (Real Time Publish Sub-scribe) as well, usually do not provide Authentication & Authorization (AA) mechanisms. In the present work two important novelties are assessed: a possible scheme to implement AA in DDS/RTPS networks and a time performance evaluation study about embedded Authentication in RTPS.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclu-sively to the editorial department of Meteorological and Environmental Research the digital
Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the m...Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the multinational pharmaceutical companies were analyzed based on the requirements of regulations and laws.Results and Conclusion There are some gaps between local and multinational pharmaceutical companies in the construction of pharmacovigilance system.We can learn from the experience of multinational pharmaceutical companies to improve the pharmacovigilance system,which includes building a sound pharmacovigilance organizational structure,establishing a series of operational system files and cultivating professional talents.MAHs of China should improve the structure of enterprise pharmacovigilance system.Besides,members of Drug Safety Committee should be department managers with higher position so that they can fulfil the responsibilities of risk assessment.If MAHs possess a large variety and quantity of products,a Drug Safety Committee should be established to ensure the timely discovery of risks.In addition,MAHs should pay attention to the implementation of related regulations and laws on pharmacovigilance and establish compliant,effective and operatable files combing with the actual operation of pharmacovigilance system.Finally,MAHs should introduce and train pharmacovigilance talents,and hire pharmacovigilance experts as consultants to solve the problem of talent shortage.展开更多
User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Neverth...User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Nevertheless,it is not easy to utilize data without citizens’consent.In this study,we took a technological approach to these issues.Usermanaged access(UMA)is a well-known framework for delegating resource access rights to others on the Internet.In UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different domains.However,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart cities.In this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each other.The proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain technology.We implemented the proposed architecture as smart contracts and evaluated its processing performance.The resultant time required for delegating access rights and accessing resources was less than 500 ms.Furthermore,we found that the fluctuation in the processing time overhead was small.Based on these results,we concluded that performance degradation with the proposed architecture is minor.展开更多
With the rapid development of cyberspace and smart home technology, human life is changing to a new virtual dimension with several promises for improving its quality. Moreover, the heterogeneous, dynamic, and internet...With the rapid development of cyberspace and smart home technology, human life is changing to a new virtual dimension with several promises for improving its quality. Moreover, the heterogeneous, dynamic, and internet-connected nature of smart homes brings many privacy and security difficulties. Unauthorized access to the smart home system is one of the most harmful actions and can cause several trust problems and relationship conflicts between family members and invoke home privacy issues. Access control is one of the best solutions for handling this threat, and it has been used to protect smart homes and other Internet of Things domains for many years. This survey reviews existing access control schemes for smart homes, which concern the essential authorization requirements and challenges that need to be considered while designing an authorization framework for smart homes. Furthermore, we note the most critical challenges that other access control solutions neglect for smart homes.展开更多
Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authoriti...Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authorities as an alternative to animal testing.For example,the Environmental Protection Agency aims to eliminate animal testi ng by 2035.展开更多
Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launche...Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs.展开更多
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat...General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g....Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.展开更多
BACKGROUND Heart failure(HF),a common cardiovascular condition,is characterized by significant morbidity and mortality.While traditional Chinese medicine(TCM)is often used as a complementary approach in HF management,...BACKGROUND Heart failure(HF),a common cardiovascular condition,is characterized by significant morbidity and mortality.While traditional Chinese medicine(TCM)is often used as a complementary approach in HF management,systematic evalua-tions of its impact on clinical outcomes,TCM syndrome scores,and B-type natriuretic peptide(BNP)levels are lacking.This study fills this gap through a comprehensive analysis of randomized controlled trials(RCTs)focusing on TCM for HF treatment.It encompasses an assessment of methodological quality,a meta-analysis,and an evaluation of evidence quality based on established standards.The results offer crucial insights into the potential advantages and constraints of TCM in HF management.RCTs on TCM for HF treatment published since the establishment of the database were searched in four Chinese and English databases,including China National Knowledge Infrastructure,Wanfang,VIP Information Chinese Science and Technology Journal,and PubMed.Methodological quality was assessed for the included studies with the Cochrane risk-of-bias assessment tool,and the meta-analysis and publication bias assessment was performed with the RevMan5.3 software.Finally,the quality of evidence was rated according to the GRADE criteria.RESULTS A total of 1098 RCTs were initially retrieved.After screening,16 RCTs were finally included in our study,which were published between 2020 and 2023.These RCTs involved 1660 HF patients,including 832 in the TCM group[TCM combined with conventional Western medicine(CMW)treatment]and 828 in the CWM group(CWM treatment).The course of treatments varied from 1 wk to 3 months.TCM syndrome differentiation was analyzed in 11 of the included RCTs.In all included RCTs,outcome indicators included comprehensive clinical outcomes,TCM syndrome scores,and BNP levels.The meta-analysis results showed significant differences between the TCM and CWM groups in terms of comprehensive clinical outcomes[risk ratio=-0.54;95%confidence interval(CI)=-0.61,-0.47;P<0.00001],TCM syndrome scores[weighted mean difference(WMD)=-142.07;95%CI=-147.56,-136.57;P<0.00001],and BNP levels(WMD=-142.07;95%CI=-147.56,-136.57;P<0.00001).According to the GRADE criteria,RCTs where"TCM improves clinical comprehensive outcomes"were rated as low-quality evidence,and RCTs where"TCM reduces TCM syndrome scores"or"TCM decreases BNP levels"were rated as medium-quality evidence.CONCLUSION TCM combined with CWM treatment effectively improves comprehensive clinical outcomes and diminishes TCM syndrome scores and BNP levels in HF patients.Given the low and medium quality of the included RCTs,the application of these results should be cautious.展开更多
China's Trade with other BRICS Members up 11.3%in Q1China's trade with other BRICS members hit RMB 1.49 trillion (USD209.7 billion) in the first quarter,up 11.3%year-on-year,according to customs authorities.Th...China's Trade with other BRICS Members up 11.3%in Q1China's trade with other BRICS members hit RMB 1.49 trillion (USD209.7 billion) in the first quarter,up 11.3%year-on-year,according to customs authorities.The trade value accounted for 14.7%of the nation's total foreign trade value during the same period,said the General Administration of Customs(GAC).展开更多
General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover ...General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover letter be included in submissions.A cover letter should explain why this topic is important,why these results are significant and what the novelty of this work is.展开更多
The passenger flow in Moroccan airports reached a record high of over 27 million trips in 2023,increasing by 32 percent year on year,the Moroccan Airports Authority(ONDA)said on 15 January.
The data of this research was mainly collected from the Web of Science (WOS) and Incites database platform, which was filtered and cataloged according to the different platforms. For tracing the change in scientific r...The data of this research was mainly collected from the Web of Science (WOS) and Incites database platform, which was filtered and cataloged according to the different platforms. For tracing the change in scientific research at Shanghai Ocean University, make use of Bibliometric analysis to get the image and table of highly cited papers and hot papers. In this study, the scientific aspects in highly cited papers and hot papers, published in the last year in the core collection of Web of Science, were taken as objects, and office software was used as the main tool to carry out bibliometric and figure analysis. From the four aspects to find the difference in these fields, the production of specific fields and cited times is inconsistent. And suggest the department and management adjust the policy and method via elastic personnel and rewards to prompt the advancement of the research fields.展开更多
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(No.2022R1I1A3063257)supported by Electronics and Telecommunications Research Institute(ETRI)grant funded by the Korean Government[22ZR1300,Research on Intelligent Cyber Security and Trust Infra].
文摘These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system.
文摘Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme.
文摘Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine under EUA,as well as the continuation of phase III clinical trials and pharmacovigilance plans were sorted out.And attention was paid to the safety surveillance actions and risk control measures of vaccines under EUA.Results and Conclusion The methods and policies for EUA and risk control of Pfizer-BioNTech vaccine were made clear and we could provide a reference for the pharmacovigilance action after the COVID-19 vaccines were put on the market in China.In the case of EUA,it is necessary to analyze the existing clinical safety data.Based on this,the risk control process should be confirmed at the time of formal marketing approval and after listing.Finally,the risk control should be adjusted at any time.
文摘Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that a authenticated user has the authority to perform a operation,which is more fine-grained.In most classical schemes,the authority management center(AMC)manages the resources permissions for all network nodes within the jurisdiction.However,the existence of AMC may be the weakest link of the whole scheme.In this paper,a protocol for QAM without AMC is proposed based on entanglement swapping.In this protocol,Bob(the owner of resources)authenticates the legality of Alice(the user)and then shares the right key for the resources with Alice.Compared with the other existed QAM protocols,this protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.The authority division is extended to fin-grained rights division.The security is analyzed from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols.
文摘Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor.This paper pro-poses a digitalized power system based on synthetical transmission carrier which makes the power system also serves as a data communication system with the same structure.Loads get authorized before powered on,so their behaviour is predictable.Digitalized power system includes such basic units as digital power source,hub and load.Their concepts are explained,their behaviour and implements are also described in detail.Real time distribution of residual power is applied,which makes prompt authorization possible.Communication protocol and load address assignments are also presented in this paper.A prototype is built and the results verify the effect of the new proposed power system.
文摘Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (Quality of Service) are two critical factors during global mobility, so how to get a smooth and fast handover based on a user privacy protected infrastructure is our focus. Based on a user-centric vir-tual identity defined by EU IST project Daidalos, this paper firstly proposes an effective infrastructure which protects the context-driven access policies for online services in order to avoid attacks by malicious eaves-droppers. In the proposed infrastructure, SMAL and Diameter are used to securely protect and deliver au-thenticated and authorized entities and XACML is used to authorize the user-level privacy policy. On the basis of it, a dynamic fast authentication and authorization handover mechanism is proposed which can save one trip communication time consummation between administrative domains.
文摘Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to data delivering and real time information adjourning. This kind of capability could be well ex-ploited by Peer-To-Peer (P2P) systems, Internet-wide as long as private ones, like in Public Safety or Civil Protection Communication Systems;but Pub/Sub specifications, and DDS/RTPS (Real Time Publish Sub-scribe) as well, usually do not provide Authentication & Authorization (AA) mechanisms. In the present work two important novelties are assessed: a possible scheme to implement AA in DDS/RTPS networks and a time performance evaluation study about embedded Authentication in RTPS.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclu-sively to the editorial department of Meteorological and Environmental Research the digital
基金Integration Application Status and Problems Investigation of ICH Q8,Q9,Q10 across the Product Life Cycle(No.20210605).
文摘Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the multinational pharmaceutical companies were analyzed based on the requirements of regulations and laws.Results and Conclusion There are some gaps between local and multinational pharmaceutical companies in the construction of pharmacovigilance system.We can learn from the experience of multinational pharmaceutical companies to improve the pharmacovigilance system,which includes building a sound pharmacovigilance organizational structure,establishing a series of operational system files and cultivating professional talents.MAHs of China should improve the structure of enterprise pharmacovigilance system.Besides,members of Drug Safety Committee should be department managers with higher position so that they can fulfil the responsibilities of risk assessment.If MAHs possess a large variety and quantity of products,a Drug Safety Committee should be established to ensure the timely discovery of risks.In addition,MAHs should pay attention to the implementation of related regulations and laws on pharmacovigilance and establish compliant,effective and operatable files combing with the actual operation of pharmacovigilance system.Finally,MAHs should introduce and train pharmacovigilance talents,and hire pharmacovigilance experts as consultants to solve the problem of talent shortage.
基金supported by JSPS KAKENHI(Grant Number JP19K11963,JP22K17881,JP18K04133,and JP22H00550).
文摘User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Nevertheless,it is not easy to utilize data without citizens’consent.In this study,we took a technological approach to these issues.Usermanaged access(UMA)is a well-known framework for delegating resource access rights to others on the Internet.In UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different domains.However,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart cities.In this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each other.The proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain technology.We implemented the proposed architecture as smart contracts and evaluated its processing performance.The resultant time required for delegating access rights and accessing resources was less than 500 ms.Furthermore,we found that the fluctuation in the processing time overhead was small.Based on these results,we concluded that performance degradation with the proposed architecture is minor.
文摘With the rapid development of cyberspace and smart home technology, human life is changing to a new virtual dimension with several promises for improving its quality. Moreover, the heterogeneous, dynamic, and internet-connected nature of smart homes brings many privacy and security difficulties. Unauthorized access to the smart home system is one of the most harmful actions and can cause several trust problems and relationship conflicts between family members and invoke home privacy issues. Access control is one of the best solutions for handling this threat, and it has been used to protect smart homes and other Internet of Things domains for many years. This survey reviews existing access control schemes for smart homes, which concern the essential authorization requirements and challenges that need to be considered while designing an authorization framework for smart homes. Furthermore, we note the most critical challenges that other access control solutions neglect for smart homes.
文摘Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authorities as an alternative to animal testing.For example,the Environmental Protection Agency aims to eliminate animal testi ng by 2035.
文摘Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs.
文摘General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
基金the support of Prince Sultan University for the Article Processing Charges(APC)of this publication。
文摘Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.
文摘BACKGROUND Heart failure(HF),a common cardiovascular condition,is characterized by significant morbidity and mortality.While traditional Chinese medicine(TCM)is often used as a complementary approach in HF management,systematic evalua-tions of its impact on clinical outcomes,TCM syndrome scores,and B-type natriuretic peptide(BNP)levels are lacking.This study fills this gap through a comprehensive analysis of randomized controlled trials(RCTs)focusing on TCM for HF treatment.It encompasses an assessment of methodological quality,a meta-analysis,and an evaluation of evidence quality based on established standards.The results offer crucial insights into the potential advantages and constraints of TCM in HF management.RCTs on TCM for HF treatment published since the establishment of the database were searched in four Chinese and English databases,including China National Knowledge Infrastructure,Wanfang,VIP Information Chinese Science and Technology Journal,and PubMed.Methodological quality was assessed for the included studies with the Cochrane risk-of-bias assessment tool,and the meta-analysis and publication bias assessment was performed with the RevMan5.3 software.Finally,the quality of evidence was rated according to the GRADE criteria.RESULTS A total of 1098 RCTs were initially retrieved.After screening,16 RCTs were finally included in our study,which were published between 2020 and 2023.These RCTs involved 1660 HF patients,including 832 in the TCM group[TCM combined with conventional Western medicine(CMW)treatment]and 828 in the CWM group(CWM treatment).The course of treatments varied from 1 wk to 3 months.TCM syndrome differentiation was analyzed in 11 of the included RCTs.In all included RCTs,outcome indicators included comprehensive clinical outcomes,TCM syndrome scores,and BNP levels.The meta-analysis results showed significant differences between the TCM and CWM groups in terms of comprehensive clinical outcomes[risk ratio=-0.54;95%confidence interval(CI)=-0.61,-0.47;P<0.00001],TCM syndrome scores[weighted mean difference(WMD)=-142.07;95%CI=-147.56,-136.57;P<0.00001],and BNP levels(WMD=-142.07;95%CI=-147.56,-136.57;P<0.00001).According to the GRADE criteria,RCTs where"TCM improves clinical comprehensive outcomes"were rated as low-quality evidence,and RCTs where"TCM reduces TCM syndrome scores"or"TCM decreases BNP levels"were rated as medium-quality evidence.CONCLUSION TCM combined with CWM treatment effectively improves comprehensive clinical outcomes and diminishes TCM syndrome scores and BNP levels in HF patients.Given the low and medium quality of the included RCTs,the application of these results should be cautious.
文摘China's Trade with other BRICS Members up 11.3%in Q1China's trade with other BRICS members hit RMB 1.49 trillion (USD209.7 billion) in the first quarter,up 11.3%year-on-year,according to customs authorities.The trade value accounted for 14.7%of the nation's total foreign trade value during the same period,said the General Administration of Customs(GAC).
文摘General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover letter be included in submissions.A cover letter should explain why this topic is important,why these results are significant and what the novelty of this work is.
文摘The passenger flow in Moroccan airports reached a record high of over 27 million trips in 2023,increasing by 32 percent year on year,the Moroccan Airports Authority(ONDA)said on 15 January.
文摘The data of this research was mainly collected from the Web of Science (WOS) and Incites database platform, which was filtered and cataloged according to the different platforms. For tracing the change in scientific research at Shanghai Ocean University, make use of Bibliometric analysis to get the image and table of highly cited papers and hot papers. In this study, the scientific aspects in highly cited papers and hot papers, published in the last year in the core collection of Web of Science, were taken as objects, and office software was used as the main tool to carry out bibliometric and figure analysis. From the four aspects to find the difference in these fields, the production of specific fields and cited times is inconsistent. And suggest the department and management adjust the policy and method via elastic personnel and rewards to prompt the advancement of the research fields.