Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s...Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.展开更多
BACKGROUND Bone metastasis has various negative impacts.Activities of daily living(ADL)and quality of life(QOL)can be significantly decreased,survival may be impacted,and medical expenses may increase.It is estimated ...BACKGROUND Bone metastasis has various negative impacts.Activities of daily living(ADL)and quality of life(QOL)can be significantly decreased,survival may be impacted,and medical expenses may increase.It is estimated that at least 5%cancer patients might be suffering from bone metastases.In 2016,we published the Comprehensive Guidelines for the Diagnosis and Treatment of Bone Metastasis.Since then,the therapeutic outcomes for patients have gradually improved.As life expectancy is a major determinant of surgical intervention,the strategy should be modified if the prolongation of survival is to be achieved.AIM To monitor how bone metastasis treatment has changed before and after launch of our guidelines for bone metastasis.METHODS For advanced cancer patients with bone metastasis who visited the Department of Clinical Oncology at Akita University hospital between 2012 and 2023,parameters including the site and number of bone metastases,laboratory data,and survival time,were extracted from electronic medical records and the Katagiri score was calculated.The association with survival was determined for each factor.RESULTS Data from 136 patients were obtained.The 1-year survival rate for the poor prognosis group with a higher Katagiri score was 20.0%in this study,which was 6%and an apparent improvement from 2014 when the scoring system was developed.Other factors significantly affecting survival included five or more bone metastases than less(P=0.0080),and treatment with chemotherapy(P<0.001),bone modifying agents(P=0.0175)and immune checkpoint inhibitors(P=0.0128).In recent years,advances in various treatment methods have extended the survival period for patients with advanced cancer.It is necessary not only to simply extend survival time,but also to maintain ADL and improve QOL.CONCLUSION Various therapeutic interventions including surgical approach for bone metastasis,which is a disorder of locomotor organs,are increasingly required.Guidelines and scoring system for prognosis need to be revised promptly.展开更多
BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychologi...BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities.展开更多
The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader th...The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature.展开更多
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int...In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.展开更多
The relentless march of a highly pathogenic avian influenza virus(HPAIV)strain,known as H5N1,to become an unprecedented panzootic continues unchecked.The leap of H5N1 clade 2.3.4.4b from Eurasia and Africa to North Am...The relentless march of a highly pathogenic avian influenza virus(HPAIV)strain,known as H5N1,to become an unprecedented panzootic continues unchecked.The leap of H5N1 clade 2.3.4.4b from Eurasia and Africa to North America in 2021 and its further spread to South America and the Antarctic have exposed new avian and mammalian populations to the virus and led to outbreaks on an unrivaled scale.The virus has infected wild birds across vast geographic regions and caused wildlife deaths in some of the world's most biodiverse ecosystems.展开更多
Introduction: Mechanical or physical restraint is an exceptional therapeutic resource to immobilize a subject and thus guarantee the safety of the patient and/or third parties in the face of high-risk behaviors, but i...Introduction: Mechanical or physical restraint is an exceptional therapeutic resource to immobilize a subject and thus guarantee the safety of the patient and/or third parties in the face of high-risk behaviors, but it entails multiple crossings (bioethical, philosophical, medical, psychological, legal). Framed in the so-called “safety culture” developed by the WHO, based on the Protocol for its implementation of the CABA and attentive to its frequent use in CABA by different hospital services (medical clinic, geriatrics, intensive care and medical guards) we consider it necessary its study in terms of compliance with the risks it entails and its management. Objectives: Identify regulatory compliance with the GCABA Mechanical restraint (MR) Protocol from a patient safety perspective, as well as describe the clinical and medicolegal aspects, and propose the usefulness of a tool for its management and control. Methodology: Observational, descriptive, transversal and prospective work through the analysis of Clinical Records with indication of MR using a rubric-type form. 177 cases were analyzed between September-November 2023 from three hospitals of the Government of the City of Buenos Aires, statistical parameters were applied and graphs were made. Results: Only 12.99% complied with the Protocol. In the mental health specialized hospital compliance was almost 5 times greater than in the general one, and in the emergency services compliance was 12 times greater than in Inpatient services. We found that the start or end time of MR was not recorded and only 43% described the causes/justifications for the indication (mostly in Emergency and Specialized hospitals), with the MR average time being shorter in Emergency. Conclusions: Only 1.3 out of 10 patients reliably completed the Protocol and it was mostly in the mental health specialized hospital and the emergency services. The results show non-compliance behavior in the application and management of the risk that the use of mechanical restraints entails, being causes for criminal litigation. We consider that the checklists are useful to complete the Protocol and thus provide security to patients and professionals.展开更多
为提高船舶设计质量管理水平,以某满足《协调共同结构规范》(Harmonized Common Structure Rule,HCSR)的巴拿马型散货船为研究对象,利用计划、执行、检查、处理(Plan,Do,Check,Act,PDCA)循环法基本原则对设计质量进行管控,并建立同一船...为提高船舶设计质量管理水平,以某满足《协调共同结构规范》(Harmonized Common Structure Rule,HCSR)的巴拿马型散货船为研究对象,利用计划、执行、检查、处理(Plan,Do,Check,Act,PDCA)循环法基本原则对设计质量进行管控,并建立同一船型设计质量管理体系。此外,对船舶能效指数(Energy Efficiency Design Index,EEDI)提升和结构轻量化设计的研讨方法进行分析。研究成果可为船舶设计质量管理提供一定参考。展开更多
In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC compon...In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC component code. Firstly, the sub-channel capacities of MLCM systems is analyzed and discussed, based on which the optimal component code rate can be obtained. Secondly, an extrinsic information transfer chart based two-stage searching algorithm is proposed to find the good irregular QC-LDPC code ensembles with optimal component code rates for their corresponding sub-channels. Finally, by constructing the irregular QC-LDPC component codes from the designed ensembles with the aim of possibly enlarging the girth and reducing the number of the shortest cycles, the designed irregular QC-LDPC code based 16QAM and 64QAM MLCM systems can achieve 0.4 dB and 1.2 dB net coding gain, respectively, compared with the recently proposed regular QC-LDPC code based 16QAM and 64QAM MLCM systems.展开更多
The dynamics differential equations are constructed, and the initial conditions are also given. Simulation shows the following conclusions: The water pressure in cylinder has great instantaneous pulsation and phase s...The dynamics differential equations are constructed, and the initial conditions are also given. Simulation shows the following conclusions: The water pressure in cylinder has great instantaneous pulsation and phase step when outlet valve or inlet valve opens, but is more gently in other time; The volume efficiency is influenced by the output pressure slightly, and decreases as the working rotational speed increases; When the inherent frequency of the valves is integer multiple of the working frequency, the volume efficiency of system will decrease evidently.展开更多
Reliability enhancement testing(RET) is an accelerated testing which hastens the performance degradation process to surface its inherent defects of design and manufacture. It is an important hypothesis that the degrad...Reliability enhancement testing(RET) is an accelerated testing which hastens the performance degradation process to surface its inherent defects of design and manufacture. It is an important hypothesis that the degradation mechanism of the RET is the same as the one of the normal stress condition. In order to check the consistency of two mechanisms, we conduct two enhancement tests with a missile servo system as an object of the study, and preprocess two sets of test data to establish the accelerated degradation models regarding the temperature change rate that is assumed to be the main applied stress of the servo system during the natural storage. Based on the accelerated degradation models and natural storage profile of the servo system, we provide and demonstrate a procedure to check the consistency of two mechanisms by checking the correlation and difference of two sets of degradation data. The results indicate that the two degradation mechanisms are significantly consistent with each other.展开更多
This paper proposes a scheme to construct time- frequency codes based on protograph low density parity check (LDPC) codes in orthogonal frequency division multiplexing (OFDM) communication systems. This approach s...This paper proposes a scheme to construct time- frequency codes based on protograph low density parity check (LDPC) codes in orthogonal frequency division multiplexing (OFDM) communication systems. This approach synthesizes two techniques: protograph LDPC codes and OFDM. One symbol of encoded information by protograph LDPC codes corresponds to one sub-carrier, namely the length of encoded information equals to the number of sub-carriers. The design of good protograph LDPC codes with short lengths is given, and the proposed proto- graph LDPC codes can be of fast encoding, which can reduce the encoding complexity and simplify encoder hardware implementa- tion. The proposed approach provides a higher coding gain in the Rayleigh fading channel. The simulation results in the Rayleigh fading channel show that the bit error rate (BER) performance of the proposed time-frequency codes is as good as random LDPC- OFDM codes and is better than Tanner LDPC-OFDM codes under the condition of different fading coefficients.展开更多
Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics data...Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics database, gravity database, geochemistry database and remote sensing database, is very significant. We developed national important mining zone database (NIMZDB) to manage 14 national important mining zone databases to support a new round prediction of ore deposit. We found that attention should be paid to the following issues: ① data accuracy: integrity, logic consistency, attribute, spatial and time accuracy; ② management of both attribute and spatial data in the same system;③ transforming data between MapGIS and ArcGIS; ④ data sharing and security; ⑤ data searches that can query both attribute and spatial data. Accuracy of input data is guaranteed and the search, analysis and translation of data between MapGIS and ArcGIS has been made convenient via the development of a checking data module and a managing data module based on MapGIS and ArcGIS. Using AreSDE, we based data sharing on a client/server system, and attribute and spatial data are also managed in the same system.展开更多
The 16-ary quadrature amplitude modulation (16QAM) is a high spectral efficient scheme for high-speed transmission systems. To remove the phase ambiguity in the coherent detection system, differential-encoded 16QAM ...The 16-ary quadrature amplitude modulation (16QAM) is a high spectral efficient scheme for high-speed transmission systems. To remove the phase ambiguity in the coherent detection system, differential-encoded 16QAM (DE-16QAM) is usually used, however, it will cause performance degradation about 3 dB as compared to the conventional 16QAM. To overcome the performance loss, a serial concatenated system with outer low density parity check (LDPC) codes and inner DE-16QAM is proposed. At the receiver, joint iterative differential demodulation and decoding (ID) is carried out to approach the maximum likelihood performance. Moreover, a genetic evolution algorithm based on the extrinsic information transfer chart is proposed to optimize the degree distribution of the outer LDPC codes. Both theoretical analyses and simulation results indicate that this algorithm not only compensates the performance loss, but also obtains a significant performance gain, which is up to 1 dB as compared to the conventional non-DE-16QAM.展开更多
Railway transportation system is a critical sector where design methods and techniques are defined by international standards in order to reduce possible risks to an acceptable minimum level. CENELEC 50128 strongly re...Railway transportation system is a critical sector where design methods and techniques are defined by international standards in order to reduce possible risks to an acceptable minimum level. CENELEC 50128 strongly recommends the utilization of finite state machines during system modelling stage and formal proof methods during the verifi- cation and testing stages of control algorithms. Due to the high importance of interlocking table at the design state of a sig- nalization system, the modelling and verification of inter- locking tables are examined in this work. For this purpose, abstract state machines are used as a modelling tool. The developed models have been performed in a generalized structure such that the model control can be done automatically for the interlocking systems. In this study, NuSMV is used at the verification state. Also, the consistency of the developed models has been supervised through fault injection. The developed models and software components are applied on a real railway station operated by Metro Istanbul Co.展开更多
Stability perturbation bounds problem for systems with mixed uncertainties is discussed. It is supposed that the linear part in the forward loop is of parametric uncertainties described by interval perturbation mode, ...Stability perturbation bounds problem for systems with mixed uncertainties is discussed. It is supposed that the linear part in the forward loop is of parametric uncertainties described by interval perturbation mode, and that the nonlinear part in the feedback loop is characterized by an integral quadratic constraint (IQC). The definition of stability margin under the interval perturbation mode is given by using the Minkowski functional. The infinite stability checking problem of the mixed uncertain system can be converted to finite or one dimensional stability checking for different structures of the IQC multipliers based on the concepts of biconvex and convex-concave junctions and their properties. The result is illustrated to be efficient through an example.展开更多
Rigorous modeling could ensure correctness and could verify a reduced cost in embedded real-time system development for models. Software methods are needed for rigorous modeling of embedded real-time systems. PVS is a...Rigorous modeling could ensure correctness and could verify a reduced cost in embedded real-time system development for models. Software methods are needed for rigorous modeling of embedded real-time systems. PVS is a formal method with precise syntax and semantics defined. System modeled by PVS specification could be verified by tools. Combining the widely used UML with PVS, this paper provides a novel modeling and verification approach for embedded real-time systems. In this approach, we provide 1) a time-extended UML statechart for modeling dynamic behavior of an embedded real-time system; 2) an approach to capture timed automata based semantics from a timed statechart; and 3) an algorithm to generate a finite state model expressed in PVS specification for model checking. The benefits of our approach include flexibility and user friendliness in modeling, extendability in formalization and verification content, and better performance. Time constraints are modeled and verified and is a highlight of this paper.展开更多
Rigorous modeling could improve the correctness and reduce cost in embedded real-time system development for models could be verified. Tools are needed for rigorous modeling of embedded real-time system. UML is an ind...Rigorous modeling could improve the correctness and reduce cost in embedded real-time system development for models could be verified. Tools are needed for rigorous modeling of embedded real-time system. UML is an industrial standard modeling language which provides a powerful expressi-veness, intuitive and easy to use interface to model. UML is widely accepted by software developer. However, for lack of precisely defined semantics, especially on the dynamic diagrams, UML model is hard to be verified. PVS is a general formal method which provides a high-order logic specification language and integrated with model checking and theorem proving tools. Combining the widely used UML with PVS, this paper provides a novel modeling and verification approach for embedded real-time system. In this approach, we provide 1) a timed extended UML statechart for modeling dynamic behavior of an embedded real-time system; 2) an approach to capture timed automata based semantics from timed statechart; and 3) an algorithm to generate a finite state model expressed in PVS specification for model checking. The benefits of our approach include flexible and friendly in modeling, extendable in forma-lization and verification content, and better performance. Time constraints are modeled and verified and it’s a highlight of this paper.展开更多
In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into o...In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source.展开更多
Supposing a typical case of mismatch between human actions and given situation,the appropriate driver support function was investigated in this paper. It was processed by calculating the conditional expectation of dam...Supposing a typical case of mismatch between human actions and given situation,the appropriate driver support function was investigated in this paper. It was processed by calculating the conditional expectation of damage under different degrees of automation. The typical case was that the situation was detected to be in threat while the driver was detected not to take any corresponding action. Considering various realistic factors,preference order among different levels of automation was probabilistically analyzed. Different levels of automation under action type support were differentiated by human's reactions to the autonomous safety control actions which were taken by the computer.展开更多
基金The work is partially supported by Natural Science Foundation of Ningxia(Grant No.AAC03300)National Natural Science Foundation of China(Grant No.61962001)Graduate Innovation Project of North Minzu University(Grant No.YCX23152).
文摘Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.
文摘BACKGROUND Bone metastasis has various negative impacts.Activities of daily living(ADL)and quality of life(QOL)can be significantly decreased,survival may be impacted,and medical expenses may increase.It is estimated that at least 5%cancer patients might be suffering from bone metastases.In 2016,we published the Comprehensive Guidelines for the Diagnosis and Treatment of Bone Metastasis.Since then,the therapeutic outcomes for patients have gradually improved.As life expectancy is a major determinant of surgical intervention,the strategy should be modified if the prolongation of survival is to be achieved.AIM To monitor how bone metastasis treatment has changed before and after launch of our guidelines for bone metastasis.METHODS For advanced cancer patients with bone metastasis who visited the Department of Clinical Oncology at Akita University hospital between 2012 and 2023,parameters including the site and number of bone metastases,laboratory data,and survival time,were extracted from electronic medical records and the Katagiri score was calculated.The association with survival was determined for each factor.RESULTS Data from 136 patients were obtained.The 1-year survival rate for the poor prognosis group with a higher Katagiri score was 20.0%in this study,which was 6%and an apparent improvement from 2014 when the scoring system was developed.Other factors significantly affecting survival included five or more bone metastases than less(P=0.0080),and treatment with chemotherapy(P<0.001),bone modifying agents(P=0.0175)and immune checkpoint inhibitors(P=0.0128).In recent years,advances in various treatment methods have extended the survival period for patients with advanced cancer.It is necessary not only to simply extend survival time,but also to maintain ADL and improve QOL.CONCLUSION Various therapeutic interventions including surgical approach for bone metastasis,which is a disorder of locomotor organs,are increasingly required.Guidelines and scoring system for prognosis need to be revised promptly.
文摘BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities.
基金the FederalMinistry of Education and Research of Germany under Grant Numbers 16ES1131 and 16ES1128K.
文摘The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature.
文摘In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.
文摘The relentless march of a highly pathogenic avian influenza virus(HPAIV)strain,known as H5N1,to become an unprecedented panzootic continues unchecked.The leap of H5N1 clade 2.3.4.4b from Eurasia and Africa to North America in 2021 and its further spread to South America and the Antarctic have exposed new avian and mammalian populations to the virus and led to outbreaks on an unrivaled scale.The virus has infected wild birds across vast geographic regions and caused wildlife deaths in some of the world's most biodiverse ecosystems.
文摘Introduction: Mechanical or physical restraint is an exceptional therapeutic resource to immobilize a subject and thus guarantee the safety of the patient and/or third parties in the face of high-risk behaviors, but it entails multiple crossings (bioethical, philosophical, medical, psychological, legal). Framed in the so-called “safety culture” developed by the WHO, based on the Protocol for its implementation of the CABA and attentive to its frequent use in CABA by different hospital services (medical clinic, geriatrics, intensive care and medical guards) we consider it necessary its study in terms of compliance with the risks it entails and its management. Objectives: Identify regulatory compliance with the GCABA Mechanical restraint (MR) Protocol from a patient safety perspective, as well as describe the clinical and medicolegal aspects, and propose the usefulness of a tool for its management and control. Methodology: Observational, descriptive, transversal and prospective work through the analysis of Clinical Records with indication of MR using a rubric-type form. 177 cases were analyzed between September-November 2023 from three hospitals of the Government of the City of Buenos Aires, statistical parameters were applied and graphs were made. Results: Only 12.99% complied with the Protocol. In the mental health specialized hospital compliance was almost 5 times greater than in the general one, and in the emergency services compliance was 12 times greater than in Inpatient services. We found that the start or end time of MR was not recorded and only 43% described the causes/justifications for the indication (mostly in Emergency and Specialized hospitals), with the MR average time being shorter in Emergency. Conclusions: Only 1.3 out of 10 patients reliably completed the Protocol and it was mostly in the mental health specialized hospital and the emergency services. The results show non-compliance behavior in the application and management of the risk that the use of mechanical restraints entails, being causes for criminal litigation. We consider that the checklists are useful to complete the Protocol and thus provide security to patients and professionals.
基金supported by National Natural Science Foundation of China(No.61571061)
文摘In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC component code. Firstly, the sub-channel capacities of MLCM systems is analyzed and discussed, based on which the optimal component code rate can be obtained. Secondly, an extrinsic information transfer chart based two-stage searching algorithm is proposed to find the good irregular QC-LDPC code ensembles with optimal component code rates for their corresponding sub-channels. Finally, by constructing the irregular QC-LDPC component codes from the designed ensembles with the aim of possibly enlarging the girth and reducing the number of the shortest cycles, the designed irregular QC-LDPC code based 16QAM and 64QAM MLCM systems can achieve 0.4 dB and 1.2 dB net coding gain, respectively, compared with the recently proposed regular QC-LDPC code based 16QAM and 64QAM MLCM systems.
基金This project is supported by National Natural Science Foundation of China(No.10342003).
文摘The dynamics differential equations are constructed, and the initial conditions are also given. Simulation shows the following conclusions: The water pressure in cylinder has great instantaneous pulsation and phase step when outlet valve or inlet valve opens, but is more gently in other time; The volume efficiency is influenced by the output pressure slightly, and decreases as the working rotational speed increases; When the inherent frequency of the valves is integer multiple of the working frequency, the volume efficiency of system will decrease evidently.
基金supported by the Natural Science Foundation of Hunan Province(2018JJ2282)
文摘Reliability enhancement testing(RET) is an accelerated testing which hastens the performance degradation process to surface its inherent defects of design and manufacture. It is an important hypothesis that the degradation mechanism of the RET is the same as the one of the normal stress condition. In order to check the consistency of two mechanisms, we conduct two enhancement tests with a missile servo system as an object of the study, and preprocess two sets of test data to establish the accelerated degradation models regarding the temperature change rate that is assumed to be the main applied stress of the servo system during the natural storage. Based on the accelerated degradation models and natural storage profile of the servo system, we provide and demonstrate a procedure to check the consistency of two mechanisms by checking the correlation and difference of two sets of degradation data. The results indicate that the two degradation mechanisms are significantly consistent with each other.
基金supported by the Beijing Natural Science Foundation of China (4102050)the National Natural Science of Foundation of China (NSFC)-Korea Science and Engineering Foundation (KOSF) Joint Research Project of China and Korea (60811140343)
文摘This paper proposes a scheme to construct time- frequency codes based on protograph low density parity check (LDPC) codes in orthogonal frequency division multiplexing (OFDM) communication systems. This approach synthesizes two techniques: protograph LDPC codes and OFDM. One symbol of encoded information by protograph LDPC codes corresponds to one sub-carrier, namely the length of encoded information equals to the number of sub-carriers. The design of good protograph LDPC codes with short lengths is given, and the proposed proto- graph LDPC codes can be of fast encoding, which can reduce the encoding complexity and simplify encoder hardware implementa- tion. The proposed approach provides a higher coding gain in the Rayleigh fading channel. The simulation results in the Rayleigh fading channel show that the bit error rate (BER) performance of the proposed time-frequency codes is as good as random LDPC- OFDM codes and is better than Tanner LDPC-OFDM codes under the condition of different fading coefficients.
基金This paper is financially supported by the National I mportant MiningZone Database ( No .200210000004)Prediction and Assessment ofMineral Resources and Social Service (No .1212010331402) .
文摘Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics database, gravity database, geochemistry database and remote sensing database, is very significant. We developed national important mining zone database (NIMZDB) to manage 14 national important mining zone databases to support a new round prediction of ore deposit. We found that attention should be paid to the following issues: ① data accuracy: integrity, logic consistency, attribute, spatial and time accuracy; ② management of both attribute and spatial data in the same system;③ transforming data between MapGIS and ArcGIS; ④ data sharing and security; ⑤ data searches that can query both attribute and spatial data. Accuracy of input data is guaranteed and the search, analysis and translation of data between MapGIS and ArcGIS has been made convenient via the development of a checking data module and a managing data module based on MapGIS and ArcGIS. Using AreSDE, we based data sharing on a client/server system, and attribute and spatial data are also managed in the same system.
基金supported by the National Natural Science Foundation of China(61171101)the State Major Science and Technology Special Projects(2009ZX03003-011-03)
文摘The 16-ary quadrature amplitude modulation (16QAM) is a high spectral efficient scheme for high-speed transmission systems. To remove the phase ambiguity in the coherent detection system, differential-encoded 16QAM (DE-16QAM) is usually used, however, it will cause performance degradation about 3 dB as compared to the conventional 16QAM. To overcome the performance loss, a serial concatenated system with outer low density parity check (LDPC) codes and inner DE-16QAM is proposed. At the receiver, joint iterative differential demodulation and decoding (ID) is carried out to approach the maximum likelihood performance. Moreover, a genetic evolution algorithm based on the extrinsic information transfer chart is proposed to optimize the degree distribution of the outer LDPC codes. Both theoretical analyses and simulation results indicate that this algorithm not only compensates the performance loss, but also obtains a significant performance gain, which is up to 1 dB as compared to the conventional non-DE-16QAM.
文摘Railway transportation system is a critical sector where design methods and techniques are defined by international standards in order to reduce possible risks to an acceptable minimum level. CENELEC 50128 strongly recommends the utilization of finite state machines during system modelling stage and formal proof methods during the verifi- cation and testing stages of control algorithms. Due to the high importance of interlocking table at the design state of a sig- nalization system, the modelling and verification of inter- locking tables are examined in this work. For this purpose, abstract state machines are used as a modelling tool. The developed models have been performed in a generalized structure such that the model control can be done automatically for the interlocking systems. In this study, NuSMV is used at the verification state. Also, the consistency of the developed models has been supervised through fault injection. The developed models and software components are applied on a real railway station operated by Metro Istanbul Co.
文摘Stability perturbation bounds problem for systems with mixed uncertainties is discussed. It is supposed that the linear part in the forward loop is of parametric uncertainties described by interval perturbation mode, and that the nonlinear part in the feedback loop is characterized by an integral quadratic constraint (IQC). The definition of stability margin under the interval perturbation mode is given by using the Minkowski functional. The infinite stability checking problem of the mixed uncertain system can be converted to finite or one dimensional stability checking for different structures of the IQC multipliers based on the concepts of biconvex and convex-concave junctions and their properties. The result is illustrated to be efficient through an example.
文摘Rigorous modeling could ensure correctness and could verify a reduced cost in embedded real-time system development for models. Software methods are needed for rigorous modeling of embedded real-time systems. PVS is a formal method with precise syntax and semantics defined. System modeled by PVS specification could be verified by tools. Combining the widely used UML with PVS, this paper provides a novel modeling and verification approach for embedded real-time systems. In this approach, we provide 1) a time-extended UML statechart for modeling dynamic behavior of an embedded real-time system; 2) an approach to capture timed automata based semantics from a timed statechart; and 3) an algorithm to generate a finite state model expressed in PVS specification for model checking. The benefits of our approach include flexibility and user friendliness in modeling, extendability in formalization and verification content, and better performance. Time constraints are modeled and verified and is a highlight of this paper.
文摘Rigorous modeling could improve the correctness and reduce cost in embedded real-time system development for models could be verified. Tools are needed for rigorous modeling of embedded real-time system. UML is an industrial standard modeling language which provides a powerful expressi-veness, intuitive and easy to use interface to model. UML is widely accepted by software developer. However, for lack of precisely defined semantics, especially on the dynamic diagrams, UML model is hard to be verified. PVS is a general formal method which provides a high-order logic specification language and integrated with model checking and theorem proving tools. Combining the widely used UML with PVS, this paper provides a novel modeling and verification approach for embedded real-time system. In this approach, we provide 1) a timed extended UML statechart for modeling dynamic behavior of an embedded real-time system; 2) an approach to capture timed automata based semantics from timed statechart; and 3) an algorithm to generate a finite state model expressed in PVS specification for model checking. The benefits of our approach include flexible and friendly in modeling, extendable in forma-lization and verification content, and better performance. Time constraints are modeled and verified and it’s a highlight of this paper.
文摘In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source.
基金National Natural Science Foundation of China(No.51379179)the Open Research Subject of Key Laboratory(Research Base)of China(No szjj2014-046)Key Scientific Research Fund Project of Xihua University,China(No.Z1320406)
文摘Supposing a typical case of mismatch between human actions and given situation,the appropriate driver support function was investigated in this paper. It was processed by calculating the conditional expectation of damage under different degrees of automation. The typical case was that the situation was detected to be in threat while the driver was detected not to take any corresponding action. Considering various realistic factors,preference order among different levels of automation was probabilistically analyzed. Different levels of automation under action type support were differentiated by human's reactions to the autonomous safety control actions which were taken by the computer.