Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC...Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.展开更多
The main purpose of this paper is to build a new approach for solving a fuzzy linear multi-criterion problem by defining a function called “error function”. For this end, the concept of level set is used to co...The main purpose of this paper is to build a new approach for solving a fuzzy linear multi-criterion problem by defining a function called “error function”. For this end, the concept of level set is used to construct the error function. In addition, we introduce the concept of deviation variable in the definition of the error function. The algorithm of the new approach is summarized in three main steps: first, we transform the original fuzzy problem into a deterministic one by choosing a specific level . second, we solve separately each uni-criteria problem and we compute the error function for each criteria. Finally, we minimize the sum of error functions in order to obtain the desired compromise solution. A numerical example is done for a comparative study with some existing approaches to show the effectiveness of the new approach.展开更多
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ...During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.展开更多
We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intraverteb...We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intravertebral cleft at L1 accompanying an epidural hematoma posteriorly.Immediate pain relief was achieved after percutaneous vertebroplasty.Complete resolution of hematoma was noted three months after procedure.We theorized that intravertebral stability after treatment might have played a role in this patient.展开更多
Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alter...Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.展开更多
The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the co...The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the conventional VIKOR techniques used to integrate group judgments and the information loss arising from defuzzification are problematic and distort final outcomes. An improved integration method, which is optimization-based, is proposed. And it can handle fuzzy criteria values and weights. The precondition for accurately defuzzifying triangular fuzzy num- bers is identified. Several effective defuzzification procedures are proposed to improve the extant VIKOR, and a comprehensive evaluation framework is offered to aid multi-criteria group decision making. Finally, a numerical example is provided to illustrate the practicability of the proposed method.展开更多
An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes a...An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.展开更多
The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to st...The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface.展开更多
AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectivel...AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectively documented demographic parameters, medical history and clinical symptoms were ascertained. Pre-operative radiographs were examined for the extent of their pathology. The details of the operative procedure were discerned.RESULTS Eight hundred and eighty patients received anterioror combined anterior-posterior cervical surgery from 2008-2013. Nine patients(1.02%) required emergent reintubation. The interval between extubation to reintubation was 6.2 h [1-12]. Patients were kept intubated after reintubation for 2.3 d [2-3]. Seven patients displayed moderate postoperative edema. One patient was diagnosed with a compressive hematoma whichwas subsequently evacuated in the OR. Another patient was diagnosed with a pulmonary effusion and treated with diuretics. One patient received a late debridement for an infected hematoma. Six patients reported residual symptoms and three patients made a complete recovery. CONCLUSION Respiratory compromise is a rare but potentially life threatening complication following cervical surgery. Patients at increased risk should be monitored closely for extended periods of time post-operatively. If the airway is restored adequately in a timely manner through emergent re-intubation, the outcome of the patients is generally favorable.展开更多
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie...In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.展开更多
A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigat...A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigate changes of immune-competent cells that commonly utilized FBT, including after administration of immno-suppressed animals, the effects by FBT on the regulated effect on the cells were evaluated. Our results showed that FBT augmented the level of lymphocytes in number, while FBT regulated the level of granulocytes in both number and function. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio suggesting their constitution as neutral in peripheral blood were increased significantly 30 days after the administration of FBT in rodents, and compromised host was prepared with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against intracellular parasite, and that FBT augmented intercellular pathogen through humoral immunity. We discussed the significance and mechanism of FBT on the level of leukocyte subsets in number and function that were considered to be potential indicators for the activation of the compromised host. We also proposed an idea that FBT exhibited tonic effects via activating complement components. The evidences were shown by immune-electrophoretic method. Moreover, we tried to access further to the anti-oxidative activities of this FBT. This modification brought to the significant lift up for antibody producing cells and anti-oxidative activity for phagocytic cells.展开更多
A method for ranking complementary judgment matrixes with traspezoidal fuzzy numbers based on Hausdorff metric distance and fuzzy compromise decision approach is proposed. With regard to fuzzy number complementary jud...A method for ranking complementary judgment matrixes with traspezoidal fuzzy numbers based on Hausdorff metric distance and fuzzy compromise decision approach is proposed. With regard to fuzzy number complementary judgment matrixes given by a decider group whose members have various weights, the expert's information was aggregated first by means of simple weight average(SWA) method and Bonissone calculational method. Hence a matrix including all the experts' preference information was got. Then the matrix' column members were added up and the fuzzy evaluation values of the alternatives were got. Lastly, the Hausdorff metric distance and fuzzy compromise decision approach were used to rank the fuzzy evaluation values and then the ranking values of all the alternatives were got. Because exact numbers and triangular fuzzy numbers could all be transformed into trapezoidal fuzzy numbers, the method developed can rank complementary judgment matrixes with trapezoidal fuzzy numbers, triangular fuzzy numbers and exact numbers as well. An illustrative example is also given to verify the developed method and to demonstrate its feasibility and practicality.展开更多
This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countr...This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method.展开更多
A series of 2D direct numerical simulations were performed with an accurate level set method for single drop impacts.The adopted ACLS method was validated to be efficient with perfect mass conservation in both normal ...A series of 2D direct numerical simulations were performed with an accurate level set method for single drop impacts.The adopted ACLS method was validated to be efficient with perfect mass conservation in both normal and oblique impacts.A square-root correction for neck bases was modified in accuracy as well as scope of applications.In addition,process of jet formation and evolution was studied to reveal internal dynamics in drop impacts.It's found that pressure gradient and vortex are coexisting and completive reasons for jet topology while the inclined angle has a significant effect on them.Mechanisms of jet formation and evolution are different in the front and back necks.With the help of PDF distribution and correction calculation,a compromise in the competition is observed.This work lays a solid foundation for further studies of dynamics in gas-liquid flows.展开更多
A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-...A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-competent cells that commonly utilized f-Chlorella including after administration of immno-suppressed animals. The effects by f-Chlorella on the regurational effect to the host were measured. Our results showed that f-Chlorella regulated the level of lymphocytes, while conventional-Chlorella worked to adjust the level of granulocytes. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in the peripheral blood. In rodents, immune-compromised host as well as normal animal were prepared with cancer chemotherapeutic agent (Mytomycin-C), and then tried to rescue the immune-competent rebel. Our observations showed that both Chlorella derivatives regulated in number and functions. The effect was more prominent in f-Chlorella than that of conventional one. We discussed the significance and mechanism of f-Chlorella on the level of leukocyte subsets in number and function. These effects were considered to bring the potential elevation of antibody secreting cell by the localized heamolysis in gel method. We also proposed an idea that exhibited tonic effects were brought via activating the complement components in the serum. Moreover, we tried to access further to the anti-oxidative activities of this f-Chlorella. This modification brought to the significant lifted up for immune competent cells and anti-oxidative activity for phagocytic cells.展开更多
Key facts Synonyms:dysfunction of renal transplant due to renal artery stenosis.Classic imaging appearance:narrowing of the transplant renal artery Renal artery stenosis most common vascular complication,.venous ste...Key facts Synonyms:dysfunction of renal transplant due to renal artery stenosis.Classic imaging appearance:narrowing of the transplant renal artery Renal artery stenosis most common vascular complication,.venous stenosis may also be responsible for renal dysfunction.展开更多
Introduction Twisted arteries and veins disrupt normal blood flow and elevate the risk for clinical complications such as thrombosis,heart attack,stroke,and organ dysfunction.Veins should remain mechanically stable fo...Introduction Twisted arteries and veins disrupt normal blood flow and elevate the risk for clinical complications such as thrombosis,heart attack,stroke,and organ dysfunction.Veins should remain mechanically stable for normal function.However,compared to arteries,veins are more vulnerable to collapse because they are thin-walled and under lower lumen pressure.Twisted veins have been shown to occur with head turning or after inadvertent twist during various vascular surgeries.In vivo and cadaver studies have demonstrated that turning the head to one side can result in torsion and compression of the internal jugular vein and can compromise cranial drain-展开更多
The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This st...The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.展开更多
文摘Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.
文摘The main purpose of this paper is to build a new approach for solving a fuzzy linear multi-criterion problem by defining a function called “error function”. For this end, the concept of level set is used to construct the error function. In addition, we introduce the concept of deviation variable in the definition of the error function. The algorithm of the new approach is summarized in three main steps: first, we transform the original fuzzy problem into a deterministic one by choosing a specific level . second, we solve separately each uni-criteria problem and we compute the error function for each criteria. Finally, we minimize the sum of error functions in order to obtain the desired compromise solution. A numerical example is done for a comparative study with some existing approaches to show the effectiveness of the new approach.
文摘During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.
文摘We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intravertebral cleft at L1 accompanying an epidural hematoma posteriorly.Immediate pain relief was achieved after percutaneous vertebroplasty.Complete resolution of hematoma was noted three months after procedure.We theorized that intravertebral stability after treatment might have played a role in this patient.
基金supported by the Humanities and Social Sciences Foundation of Ministry of Education of China(09YJC630229)Scientific Research Foundation of Guangxi University for Nationalities for Talent Introduction(200702YZ01)Science and Technology Project of State Ethnic Affairs Commission(09GX03)
文摘Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.
基金supported by the National Natural Science Foundation of China(71271116)
文摘The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the conventional VIKOR techniques used to integrate group judgments and the information loss arising from defuzzification are problematic and distort final outcomes. An improved integration method, which is optimization-based, is proposed. And it can handle fuzzy criteria values and weights. The precondition for accurately defuzzifying triangular fuzzy num- bers is identified. Several effective defuzzification procedures are proposed to improve the extant VIKOR, and a comprehensive evaluation framework is offered to aid multi-criteria group decision making. Finally, a numerical example is provided to illustrate the practicability of the proposed method.
基金supported by the National Natural Science Foundation of China (7087111770571086)
文摘An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.
基金Supported by the Outstanding Overseas Research Team Project of the Chinese Academy of Sciences, the National Natural Science Foundation of China (20221603), and the Research Fund of Key Lab for Nanomaterials, Ministry of Education, China (2006-1).
文摘The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface.
文摘AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectively documented demographic parameters, medical history and clinical symptoms were ascertained. Pre-operative radiographs were examined for the extent of their pathology. The details of the operative procedure were discerned.RESULTS Eight hundred and eighty patients received anterioror combined anterior-posterior cervical surgery from 2008-2013. Nine patients(1.02%) required emergent reintubation. The interval between extubation to reintubation was 6.2 h [1-12]. Patients were kept intubated after reintubation for 2.3 d [2-3]. Seven patients displayed moderate postoperative edema. One patient was diagnosed with a compressive hematoma whichwas subsequently evacuated in the OR. Another patient was diagnosed with a pulmonary effusion and treated with diuretics. One patient received a late debridement for an infected hematoma. Six patients reported residual symptoms and three patients made a complete recovery. CONCLUSION Respiratory compromise is a rare but potentially life threatening complication following cervical surgery. Patients at increased risk should be monitored closely for extended periods of time post-operatively. If the airway is restored adequately in a timely manner through emergent re-intubation, the outcome of the patients is generally favorable.
基金Projects(61173169,61103203,70921001)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0798)supported by Program for New Century Excellent Talents in University of China
文摘In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.
文摘A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigate changes of immune-competent cells that commonly utilized FBT, including after administration of immno-suppressed animals, the effects by FBT on the regulated effect on the cells were evaluated. Our results showed that FBT augmented the level of lymphocytes in number, while FBT regulated the level of granulocytes in both number and function. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio suggesting their constitution as neutral in peripheral blood were increased significantly 30 days after the administration of FBT in rodents, and compromised host was prepared with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against intracellular parasite, and that FBT augmented intercellular pathogen through humoral immunity. We discussed the significance and mechanism of FBT on the level of leukocyte subsets in number and function that were considered to be potential indicators for the activation of the compromised host. We also proposed an idea that FBT exhibited tonic effects via activating complement components. The evidences were shown by immune-electrophoretic method. Moreover, we tried to access further to the anti-oxidative activities of this FBT. This modification brought to the significant lift up for antibody producing cells and anti-oxidative activity for phagocytic cells.
文摘A method for ranking complementary judgment matrixes with traspezoidal fuzzy numbers based on Hausdorff metric distance and fuzzy compromise decision approach is proposed. With regard to fuzzy number complementary judgment matrixes given by a decider group whose members have various weights, the expert's information was aggregated first by means of simple weight average(SWA) method and Bonissone calculational method. Hence a matrix including all the experts' preference information was got. Then the matrix' column members were added up and the fuzzy evaluation values of the alternatives were got. Lastly, the Hausdorff metric distance and fuzzy compromise decision approach were used to rank the fuzzy evaluation values and then the ranking values of all the alternatives were got. Because exact numbers and triangular fuzzy numbers could all be transformed into trapezoidal fuzzy numbers, the method developed can rank complementary judgment matrixes with trapezoidal fuzzy numbers, triangular fuzzy numbers and exact numbers as well. An illustrative example is also given to verify the developed method and to demonstrate its feasibility and practicality.
文摘This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method.
基金Supported by the National Natural Science Foundation of China(91541202,51276163)
文摘A series of 2D direct numerical simulations were performed with an accurate level set method for single drop impacts.The adopted ACLS method was validated to be efficient with perfect mass conservation in both normal and oblique impacts.A square-root correction for neck bases was modified in accuracy as well as scope of applications.In addition,process of jet formation and evolution was studied to reveal internal dynamics in drop impacts.It's found that pressure gradient and vortex are coexisting and completive reasons for jet topology while the inclined angle has a significant effect on them.Mechanisms of jet formation and evolution are different in the front and back necks.With the help of PDF distribution and correction calculation,a compromise in the competition is observed.This work lays a solid foundation for further studies of dynamics in gas-liquid flows.
文摘A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-competent cells that commonly utilized f-Chlorella including after administration of immno-suppressed animals. The effects by f-Chlorella on the regurational effect to the host were measured. Our results showed that f-Chlorella regulated the level of lymphocytes, while conventional-Chlorella worked to adjust the level of granulocytes. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in the peripheral blood. In rodents, immune-compromised host as well as normal animal were prepared with cancer chemotherapeutic agent (Mytomycin-C), and then tried to rescue the immune-competent rebel. Our observations showed that both Chlorella derivatives regulated in number and functions. The effect was more prominent in f-Chlorella than that of conventional one. We discussed the significance and mechanism of f-Chlorella on the level of leukocyte subsets in number and function. These effects were considered to bring the potential elevation of antibody secreting cell by the localized heamolysis in gel method. We also proposed an idea that exhibited tonic effects were brought via activating the complement components in the serum. Moreover, we tried to access further to the anti-oxidative activities of this f-Chlorella. This modification brought to the significant lifted up for immune competent cells and anti-oxidative activity for phagocytic cells.
文摘Key facts Synonyms:dysfunction of renal transplant due to renal artery stenosis.Classic imaging appearance:narrowing of the transplant renal artery Renal artery stenosis most common vascular complication,.venous stenosis may also be responsible for renal dysfunction.
基金supported by a CAREER award(0644646)from NSFa research grant (R01HL095852)and an MBRS-RISE fellowship(5R25GM060655-12)from the NIHa collaboration grant (11229202)from NNSF of China
文摘Introduction Twisted arteries and veins disrupt normal blood flow and elevate the risk for clinical complications such as thrombosis,heart attack,stroke,and organ dysfunction.Veins should remain mechanically stable for normal function.However,compared to arteries,veins are more vulnerable to collapse because they are thin-walled and under lower lumen pressure.Twisted veins have been shown to occur with head turning or after inadvertent twist during various vascular surgeries.In vivo and cadaver studies have demonstrated that turning the head to one side can result in torsion and compression of the internal jugular vein and can compromise cranial drain-
文摘The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.