The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and...The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.展开更多
AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastri...AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastric volume, a procedure in which gastrointestinal continuity was reestablished while excluding the entire duodenum and proximal jejunal loop. We observed the procedural success rate, long-term survival, and histopathological sequelae associated with a number of technical modifications. These included: use of anatomical markers to precisely identify Treitz's ligament; careful dissection along surgical planes; careful attention to the choice of regional transection sites; reconstruction using full-thickness anastomoses; use of a minimally invasive procedure with prohemostatic pretreatment and hemorrhage control; prevention of hypo-thermic damage; reduction in the length of the procedure; and accelerated surgical recovery using fast-track surgical modalities such as perioperative permissive underfeeding and goal-directed volume therapy. RESULTS: The series of modif ications we adopted reduced operation time from 110.02 ± 12.34 min to 78.39 ± 7.26 min (P < 0.01), and the procedural success rate increased from 43.3% (13/30) to 90% (18/20) (P < 0.01), with a long-term survival of 83.3% (15/18) (P < 0.01). CONCLUSION: Using a number of fast-track and damage control surgical techniques, we have successfully established a stable model of gastric bypass in diabetic rats.展开更多
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th...Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.展开更多
The Tumen River had failed to meet Grade Ⅲ and Ⅳ levels in the environmental quality standard for surface water, and had exceeded Grade Ⅴ level. Surface water pollution is serious. The major excessive standard poll...The Tumen River had failed to meet Grade Ⅲ and Ⅳ levels in the environmental quality standard for surface water, and had exceeded Grade Ⅴ level. Surface water pollution is serious. The major excessive standard pollutants were COD Mn and SS. After taking effective treatment steps, the worsening trend of water pollution will be basically under control. But the change of runoff in the Tumen River is large in a year, especially during as long as five month freezing period, smaller flow and lower temperature of river waters led to weak dilution and self purification capacity. The water quality of the Tumen River will not reach the appoint functional water quality standards, even if sewage meets discharge standard, which will influence water resources utilization in the lower reaches of the Tumen River and regional economic development. Therefore water pollution has become the major restrictive factor of the development of the Tumen River area.展开更多
'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, ...'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues.展开更多
Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well a...Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well as for traveling patterns with a small unmanned aerial vehicle.The efficient direct collection approach based on the Runge-Kutta integrator is used to solve the optimization problem.The fast convergence of the optimization process leads to the potential for real-time applications.Based on the results of trajectory optimizations,the general permissible wind conditions which involve the allowable power law exponents and feasible reference wind strengths supporting dynamic soaring are proposed.Increasing the smallest allowable wingtip clearance to trade for robustness and safety of the vehicle system and improving the maximum traveling speed results in shrunken permissible domain of wind conditions for loitering and traveling dynamic soaring respectively.Sensitivity analyses of vehicle model parameters show that properly reducing the wingspan and increasing the maximum lift-to-drag ratio and the wing loading can enlarge the permissible domain.Permissible domains for different traveling directions show that the downwind dynamic soaring benefitting from the drift is more efficient than the upwind traveling pattern in terms of permissible domain size and net traveling speed.展开更多
Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare ind...Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally.However,the existing EHR systems mostly lack in providing appropriate security,entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures.Objective:To solve this delicate problem,we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems.Methodology:In our EHR blockchain system,Peer nodes from various organizations(stakeholders)create a ledger network,where channels are created to enable secure and private communication between different stakeholders on the ledger network.Individual patients and other stakeholders are identified and registered on the network by unique digital certificates issued by membership service provider(MSP)component of the fabric architecture.Results:We created and implemented different Chaincodes to handle the business logic for executing separate EHR transactions on the network.The proposed fabric architecture provides a secure,transparent and immutable mechanism to store,share and exchange EHRs in a peer-to-peer network of different healthcare stakeholders.It ensures interoperability,scalability and availability in adapting the existing EHRs for strengthening and providing an effective and secure method to integrate and manage patient records among medical institutions in the healthcare ecosystem.展开更多
Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and t...Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils.展开更多
This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to redu...This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit.展开更多
Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a ...Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a fine-grained and flexible access control mechanism.The main idea of this paper is to let the owner classify his data and then authorizes others according to categories.The cloud server maintains a permission matrix,which will be used to verify whether a trapdoor is valid or not.In this way we can achieve access control and narrow the search range at the same time.We prove that our scheme can achieve index and trapdoor indistinguishability under chosen keywords attack security in the random oracles.展开更多
The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in th...The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in the inventory is subject to constant deterioration rate, demand rate is quadratic function of time and salvage value is associated with the deteriorated units. Shortages in the system are not allowed to occur. A mathematical formulation is developed when the supplier offers a permissible delay period to the customers under two circumstances: 1) when delay period is less than the cycle of time;and 2) when delay period is greater than the cycle of time. The method is suitable for the items like state-of-the-art aircrafts, super computers, laptops, android mobiles, seasonal items and machines and their spare parts. A solution procedure algorithm is given for finding the optimal order quantity which minimizes the total cost of an inventory system. The article includes numerical examples to support the effectiveness of the developed model. Finally, sensitivity analysis on some parameters on optimal solution is provided.展开更多
Power Supply and Smart Grid represent specific business,which must be managed by permissioned(private)blockchain.Despite its disadvantages-time consuming,expensive,and losing from network effect-the permissioned block...Power Supply and Smart Grid represent specific business,which must be managed by permissioned(private)blockchain.Despite its disadvantages-time consuming,expensive,and losing from network effect-the permissioned blockchain offers balance,guarantees stability,and provides physical limitations for usage of validating nodes only in the network.The management of permissioned blockchain is necessary for tracing the processes in it.The author has represented the moment following topics:the idea for applying blockchain in business environment,blockchain technology-as a linked list with a new key on each step,node structure and information models for node management with a large granularity,detail models for node management with accent on configuration and performance and managed objects classes for installation of blockchain network with accent on security and performance,models for blockchain network management and five scenarios for blockchain transactions management.The paper represents a stage of project Blockchain in Smart Grid:describing of Managed Objects classes for functional areas of blockchain life cycle:Provision,Configuration,Maintenance,Security(developed),Accounting,Performance,and Subscriber control.The author uses the life cycle of telecommunications networks as a reference.The models are designed for user interface developers,university professors,and students.展开更多
文摘The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.
基金Supported by Scientific Research Fund of Heilongjiang Provincial Education Department, No. 11541200Harbin Medical University First Affi liated Hospital, No. 2007098
文摘AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastric volume, a procedure in which gastrointestinal continuity was reestablished while excluding the entire duodenum and proximal jejunal loop. We observed the procedural success rate, long-term survival, and histopathological sequelae associated with a number of technical modifications. These included: use of anatomical markers to precisely identify Treitz's ligament; careful dissection along surgical planes; careful attention to the choice of regional transection sites; reconstruction using full-thickness anastomoses; use of a minimally invasive procedure with prohemostatic pretreatment and hemorrhage control; prevention of hypo-thermic damage; reduction in the length of the procedure; and accelerated surgical recovery using fast-track surgical modalities such as perioperative permissive underfeeding and goal-directed volume therapy. RESULTS: The series of modif ications we adopted reduced operation time from 110.02 ± 12.34 min to 78.39 ± 7.26 min (P < 0.01), and the procedural success rate increased from 43.3% (13/30) to 90% (18/20) (P < 0.01), with a long-term survival of 83.3% (15/18) (P < 0.01). CONCLUSION: Using a number of fast-track and damage control surgical techniques, we have successfully established a stable model of gastric bypass in diabetic rats.
基金Project(61003140) supported by the National Natural Science Foundation of ChinaProject(013/2010/A) supported by Macao Science and Technology Development FundProject(10YJC630236) supported by Social Science Foundation for the Youth Scholars of Ministry of Education of China
文摘Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.
文摘The Tumen River had failed to meet Grade Ⅲ and Ⅳ levels in the environmental quality standard for surface water, and had exceeded Grade Ⅴ level. Surface water pollution is serious. The major excessive standard pollutants were COD Mn and SS. After taking effective treatment steps, the worsening trend of water pollution will be basically under control. But the change of runoff in the Tumen River is large in a year, especially during as long as five month freezing period, smaller flow and lower temperature of river waters led to weak dilution and self purification capacity. The water quality of the Tumen River will not reach the appoint functional water quality standards, even if sewage meets discharge standard, which will influence water resources utilization in the lower reaches of the Tumen River and regional economic development. Therefore water pollution has become the major restrictive factor of the development of the Tumen River area.
基金supported by grants from the Canadian Institutes of Health Researchthe Mary Katz Claman Foundationthe Oberfeld Family Fund for Alzheimer Research
文摘'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues.
文摘Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well as for traveling patterns with a small unmanned aerial vehicle.The efficient direct collection approach based on the Runge-Kutta integrator is used to solve the optimization problem.The fast convergence of the optimization process leads to the potential for real-time applications.Based on the results of trajectory optimizations,the general permissible wind conditions which involve the allowable power law exponents and feasible reference wind strengths supporting dynamic soaring are proposed.Increasing the smallest allowable wingtip clearance to trade for robustness and safety of the vehicle system and improving the maximum traveling speed results in shrunken permissible domain of wind conditions for loitering and traveling dynamic soaring respectively.Sensitivity analyses of vehicle model parameters show that properly reducing the wingspan and increasing the maximum lift-to-drag ratio and the wing loading can enlarge the permissible domain.Permissible domains for different traveling directions show that the downwind dynamic soaring benefitting from the drift is more efficient than the upwind traveling pattern in terms of permissible domain size and net traveling speed.
基金funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.
文摘Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally.However,the existing EHR systems mostly lack in providing appropriate security,entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures.Objective:To solve this delicate problem,we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems.Methodology:In our EHR blockchain system,Peer nodes from various organizations(stakeholders)create a ledger network,where channels are created to enable secure and private communication between different stakeholders on the ledger network.Individual patients and other stakeholders are identified and registered on the network by unique digital certificates issued by membership service provider(MSP)component of the fabric architecture.Results:We created and implemented different Chaincodes to handle the business logic for executing separate EHR transactions on the network.The proposed fabric architecture provides a secure,transparent and immutable mechanism to store,share and exchange EHRs in a peer-to-peer network of different healthcare stakeholders.It ensures interoperability,scalability and availability in adapting the existing EHRs for strengthening and providing an effective and secure method to integrate and manage patient records among medical institutions in the healthcare ecosystem.
基金supported by the International Science & Technology Cooperation Program of China(2010DFA92720)the Department of Ecology in Kazakh Research Institute of Soil Science and Agrochemistry named after Uspanov, Almaty, Kazakhstan
文摘Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils.
文摘This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit.
基金This work is partially supported by the Fundamental Research Funds for the Central Universities(No.30918012204)。
文摘Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a fine-grained and flexible access control mechanism.The main idea of this paper is to let the owner classify his data and then authorizes others according to categories.The cloud server maintains a permission matrix,which will be used to verify whether a trapdoor is valid or not.In this way we can achieve access control and narrow the search range at the same time.We prove that our scheme can achieve index and trapdoor indistinguishability under chosen keywords attack security in the random oracles.
文摘The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in the inventory is subject to constant deterioration rate, demand rate is quadratic function of time and salvage value is associated with the deteriorated units. Shortages in the system are not allowed to occur. A mathematical formulation is developed when the supplier offers a permissible delay period to the customers under two circumstances: 1) when delay period is less than the cycle of time;and 2) when delay period is greater than the cycle of time. The method is suitable for the items like state-of-the-art aircrafts, super computers, laptops, android mobiles, seasonal items and machines and their spare parts. A solution procedure algorithm is given for finding the optimal order quantity which minimizes the total cost of an inventory system. The article includes numerical examples to support the effectiveness of the developed model. Finally, sensitivity analysis on some parameters on optimal solution is provided.
文摘Power Supply and Smart Grid represent specific business,which must be managed by permissioned(private)blockchain.Despite its disadvantages-time consuming,expensive,and losing from network effect-the permissioned blockchain offers balance,guarantees stability,and provides physical limitations for usage of validating nodes only in the network.The management of permissioned blockchain is necessary for tracing the processes in it.The author has represented the moment following topics:the idea for applying blockchain in business environment,blockchain technology-as a linked list with a new key on each step,node structure and information models for node management with a large granularity,detail models for node management with accent on configuration and performance and managed objects classes for installation of blockchain network with accent on security and performance,models for blockchain network management and five scenarios for blockchain transactions management.The paper represents a stage of project Blockchain in Smart Grid:describing of Managed Objects classes for functional areas of blockchain life cycle:Provision,Configuration,Maintenance,Security(developed),Accounting,Performance,and Subscriber control.The author uses the life cycle of telecommunications networks as a reference.The models are designed for user interface developers,university professors,and students.