Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge ...Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge with an inten-tion to protect the sensitive details of the patients over getting published in open domain.To solve this problem,Multi Attribute Case based Privacy Preservation(MACPP)technique is proposed in this study to enhance the security of privacy-preserving data.Private information can be any attribute information which is categorized as sensitive logs in a patient’s records.The semantic relation between transactional patient records and access rights is estimated based on the mean average value to distinguish sensitive and non-sensitive information.In addition to this,crypto hidden policy is also applied here to encrypt the sensitive data through symmetric standard key log verification that protects the personalized sensitive information.Further,linear integrity verification provides authentication rights to verify the data,improves the performance of privacy preserving techni-que against intruders and assures high security in healthcare setting.展开更多
Remaining useful life(RUL) prediction is one of the most crucial elements in prognostics and health management(PHM). Aiming at the imperfect prior information, this paper proposes an RUL prediction method based on a n...Remaining useful life(RUL) prediction is one of the most crucial elements in prognostics and health management(PHM). Aiming at the imperfect prior information, this paper proposes an RUL prediction method based on a nonlinear random coefficient regression(RCR) model with fusing failure time data.Firstly, some interesting natures of parameters estimation based on the nonlinear RCR model are given. Based on these natures,the failure time data can be fused as the prior information reasonably. Specifically, the fixed parameters are calculated by the field degradation data of the evaluated equipment and the prior information of random coefficient is estimated with fusing the failure time data of congeneric equipment. Then, the prior information of the random coefficient is updated online under the Bayesian framework, the probability density function(PDF) of the RUL with considering the limitation of the failure threshold is performed. Finally, two case studies are used for experimental verification. Compared with the traditional Bayesian method, the proposed method can effectively reduce the influence of imperfect prior information and improve the accuracy of RUL prediction.展开更多
This paper proposes a personalized headrelated transfer function(HRTF)prediction method based on Light GBM using anthropometric data.Considering the overfitting problems of the current training-based prediction method...This paper proposes a personalized headrelated transfer function(HRTF)prediction method based on Light GBM using anthropometric data.Considering the overfitting problems of the current training-based prediction methods,we use Light GBM and a specific network structure to prevent over-fitting and enhance the prediction performance.By decomposing and combining the data to be predicted,we set up 90 Light GBM models to separately predict the 90instants of HRTF in log domain.At the same time,the method of 10-fold cross-validation is used to score the accuracy of the model.For models with scores below 80 points,Bayesian optimization is used to adjust model hyperparameters to obtain a better model structure.The results obtained by Light GBM are evaluated with spectral distortion(SD)which can show the fitting error between the prediction and the original data.The mean SD values of both ears on the whole test set are 2.32 d B and 2.28 d B respectively.Compared with the non-linear regression method and the latest method,SD value of Light GBM-based method relatively decreases by 83.8%and 48.5%.展开更多
With the increasing number of remote sensing satellites,the diversification of observation modals,and the continuous advancement of artificial intelligence algorithms,historically opportunities have been brought to th...With the increasing number of remote sensing satellites,the diversification of observation modals,and the continuous advancement of artificial intelligence algorithms,historically opportunities have been brought to the applications of earth observation and information retrieval,including climate change monitoring,natural resource investigation,ecological environment protection,and territorial space planning.Over the past decade,artificial intelligence technology represented by deep learning has made significant contributions to the field of Earth observation.Therefore,this review will focus on the bottlenecks and development process of using deep learning methods for land use/land cover mapping of the Earth’s surface.Firstly,it introduces the basic framework of semantic segmentation network models for land use/land cover mapping.Then,we summarize the development of semantic segmentation models in geographical field,focusing on spatial and semantic feature extraction,context relationship perception,multi-scale effects modelling,and the transferability of models under geographical differences.Then,the application of semantic segmentation models in agricultural management,building boundary extraction,single tree segmentation and inter-species classification are reviewed.Finally,we discuss the future development prospects of deep learning technology in the context of remote sensing big data.展开更多
Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through e...Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.展开更多
The recent increase in the use of artificial intelligence has led to fundamental changes in the development of training and teaching methods for executive education. However, the success of artificial intelligence in ...The recent increase in the use of artificial intelligence has led to fundamental changes in the development of training and teaching methods for executive education. However, the success of artificial intelligence in regional centers for teaching and training professions will depend on the acceptance of this technology by young executive trainees. This article discusses the potential benefits of adopting AI in executive training institutions in Morocco, specifically focusing on CRMEF Casablanca Settat. Based on the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al., 2003), this study proposes a model to identify the factors influencing the acceptance of artificial intelligence in regional centers for teaching professions and training in Morocco. To achieve this, a structural equation modeling approach was used to quantitatively describe the impact of each factor on AI adoption, utilizing data collected from 173 young executive trainees. The results indicate that perceived ease of use, perceived usefulness, trainer influence, and personal innovativeness influence the intention to use artificial intelligence. Our research provides managers of CRMEFs with a set of practical recommendations to enhance the implementation conditions of an artificial intelligence system. It aims to understand which factors should be considered in designing an artificial intelligence system within regional centers for teaching professions and training (CRMEFs).展开更多
This paper explores the opportunities and challenges of college mental health education from the perspective of big data.Firstly,through literature review,the importance of mental health education and the current issu...This paper explores the opportunities and challenges of college mental health education from the perspective of big data.Firstly,through literature review,the importance of mental health education and the current issues are elucidated.Then,from the perspective of big data,the potential opportunities of big data in college mental health education are analyzed,including data-driven personalized education,real-time monitoring and warning systems,and interdisciplinary research and collaboration.At the same time,the challenges faced by college mental health education under the perspective of big data are also pointed out,such as data privacy and security issues,insufficient data analysis and interpretation capabilities,and inadequate technical facilities and talent support.Lastly,the research content of this paper is summarized,and directions and suggestions for future research are proposed.展开更多
Progress in developing robust therapies for spinal cord injury (SCI), trau- matic brain injury (TBI) and peripheral nerve injury has been slow. A great deal has been learned over the past 30 years regarding both t...Progress in developing robust therapies for spinal cord injury (SCI), trau- matic brain injury (TBI) and peripheral nerve injury has been slow. A great deal has been learned over the past 30 years regarding both the intrinsic factors and the environmental factors that regulate axon growth, but this large body of information has not yet resulted in clinically available thera- peutics. This therapeutic bottleneck has many root causes, but a consensus is emerging that one contributing factor is a lack of standards for experi- mental design and reporting. The absence of reporting standards, and even of commonly accepted definitions of key words, also make data mining and bioinformatics analysis of neural plasticity and regeneration difficult, if not impossible. This short review will consider relevant background and poten- tial solutions to this problem in the axon regeneration domain.展开更多
Commentary Most would agree that providing comprehensive detail in scientific reporting is critical for the development of mean- ingful therapies and treatments for diseases. Such stellar practices 1) allow for repro...Commentary Most would agree that providing comprehensive detail in scientific reporting is critical for the development of mean- ingful therapies and treatments for diseases. Such stellar practices 1) allow for reproduction of experiments to con- firm results, 2) promote thorough analyses of data, and 3) foster the incremental advancement of valid approaches. Unfortunately, most would also agree we have far to go to reach this vital goal (Hackam and Redelmeier, 2006; Prinz et al., 2011; Baker et al., 2014).展开更多
Recently, use of mobile communicational devices in field data collection is increasing such as smart phones and cellular phones due to emergence of embedded Global Position System GPS and Wi-Fi Internet access. Accura...Recently, use of mobile communicational devices in field data collection is increasing such as smart phones and cellular phones due to emergence of embedded Global Position System GPS and Wi-Fi Internet access. Accurate timely and handy field data collection is required for disaster management and emergency quick responses. In this article, we introduce web-based GIS system to collect the field data by personal mobile phone through Post Office Protocol POP3 mail server. The main objective of this work is to demonstrate real-time field data collection method to the students using their mobile phone to collect field data by timely and handy manners, either individual or group survey in local or global scale research.展开更多
Hyperspectral remote sensing is now a frontier of the remote sensing technology. Airborne hyperspectral remote sensing data have hundreds of narrow bands to obtain complete and continuous ground-object spectra. Theref...Hyperspectral remote sensing is now a frontier of the remote sensing technology. Airborne hyperspectral remote sensing data have hundreds of narrow bands to obtain complete and continuous ground-object spectra. Therefore, they can be effectively used to identify these grotmd objects which are difficult to discriminate by using wide-band data, and show much promise in geological survey. At the height of 1500 m, have 36 bands in visible to the CASI hyperspectral data near-infrared spectral range, with a spectral resolution of 19 nm and a space resolution of 0.9 m. The SASI data have 101 bands in the shortwave infrared spectral range, with a spectral resolution of 15 nm and a space resolution of 2.25 m. In 2010, China Geological Survey deployed an airborne CASI/SASI hyperspectral measurement project, and selected the Liuyuan and Fangshankou areas in the Beishan metallogenic belt of Gansu Province, and the Nachitai area of East Kunlun metallogenic belt in Qinghai Province to conduct geological survey. The work period of this project was three years.展开更多
In recent years,intelligent data-driven prognostic methods have been successfully developed,and good machinery health assessment performance has been achieved through explorations of data from multiple sensors.However...In recent years,intelligent data-driven prognostic methods have been successfully developed,and good machinery health assessment performance has been achieved through explorations of data from multiple sensors.However,existing datafusion prognostic approaches generally rely on the data availability of all sensors,and are vulnerable to potential sensor malfunctions,which are likely to occur in real industries especially for machines in harsh operating environments.In this paper,a deep learning-based remaining useful life(RUL)prediction method is proposed to address the sensor malfunction problem.A global feature extraction scheme is adopted to fully exploit information of different sensors.Adversarial learning is further introduced to extract generalized sensor-invariant features.Through explorations of both global and shared features,promising and robust RUL prediction performance can be achieved by the proposed method in the testing scenarios with sensor malfunctions.The experimental results suggest the proposed approach is well suited for real industrial applications.展开更多
In this paper, three techniques, line run coding, quadtree DF (Depth-First) representation and H coding for compressing classified satellite cloud images with no distortion are presented. In these three codings, the f...In this paper, three techniques, line run coding, quadtree DF (Depth-First) representation and H coding for compressing classified satellite cloud images with no distortion are presented. In these three codings, the first two were invented by other persons and the third one, by ourselves. As a result, the comparison among their compression rates is. given at the end of this paper. Further application of these image compression technique to satellite data and other meteorological data looks promising.展开更多
The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, b...The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our proposed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.展开更多
Objectives To explore the challenges of secondary use of routinely collected data for analyzing nursing-sensitive outcomes in Austrian acute care hospitals.Method A convergent parallel mixed methods design was perform...Objectives To explore the challenges of secondary use of routinely collected data for analyzing nursing-sensitive outcomes in Austrian acute care hospitals.Method A convergent parallel mixed methods design was performed.We conducted a quantitative representative survey with nursing managers from 32 Austrian general acute care hospitals and 11 qualitative semi-structured interviews with nursing quality management experts.Both results were first analyzed independently and afterward merged in the discussion.Results On average,76%of nursing documentation is already electronically supported in the surveyed Austrian hospitals.However,existing nursing data is seldom used for secondary purposes such as nursing-sensitive outcome analyses.This is due to four major reasons:First,hospitals often do not have a data strategy for the secondary use of routine data.Second,hospitals partly lack the use of standardized and uniform nursing terminologies,especially for nursing evaluation.Third,routine nursing data is often not documented correctly and completely.Fourth,data on nursing-sensitive outcomes is usually collected in specific documentation forms not integrated into routine documentation.Conclusion The awareness of the possibilities for secondary use of nursing data for nursing-sensitive outcome analyses in Austrian hospitals is still in its infancy.Therefore,nursing staff and nursing management must be trained to understand how to collect and process nursing data for nursing-sensitive outcome analyses.Further studies would be interesting in order to determine the factors that influence the decision-making processes for the secondary use of nursing data for outcome analyses.展开更多
ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the ...ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the performances of these methods in detecting oceanic features for both noise free and noise contaminated AVHRR (Advanced Very High Resolution Radiometer) IR image with Kuroshio. Also, practical experiments in detecting the eddy of Kuroshio with these methods are carried out for comparison. Results show that the ICSED algorithm has more advantages than other methods in detecting mesoscale features of ocean. Finally, the effectiveness of window size of ICSED method to oceanic features detection is quantitatively discussed.展开更多
In this paper, on the basis of experimental data of two kinds of chemical explosions, the piston-pushing model of spherical blast-waves and the second-order Godunov-type scheme of finite difference methods with high i...In this paper, on the basis of experimental data of two kinds of chemical explosions, the piston-pushing model of spherical blast-waves and the second-order Godunov-type scheme of finite difference methods with high identification to discontinuity are used to the numerical reconstruction of part of an actual hemispherical blast-wave flow field by properly adjusting the moving bounary conditions of a piston. This method is simple and reliable. It is suitable to the evaluation of effects of the blast-wave flow field away from the explosion center.展开更多
Based on the research on the diffusion of suspended sediments discharged outside of Yangtze River estuary and the landuse of Shanghai using Landsat MSS images in several years, the authors analysed the characteristics...Based on the research on the diffusion of suspended sediments discharged outside of Yangtze River estuary and the landuse of Shanghai using Landsat MSS images in several years, the authors analysed the characteristics of TM CCT data of Shanghai scene, pointed out concrete range of maximum turbidity and growth of urban boundary of Shanghai through the information extraction.The feature vector combination method is used in the research process. The result is getting nice.展开更多
The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°...The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°52'5''W) a town with 3000 inhabitants. Both weather stations are 30 km from each other in the Chiapas State, México. 54 years of daily records of the series of maximum (<em>t</em><sub>max</sub>) and minimum temperatures (<em>t</em><sub>min</sub>) of the weather station 07205 Comitan that is on top of a house and 30 years of daily records of the weather station 07374 La Esperanza were analyzed. The objective is to analyze the evidence of climate change in the Comitan valley. 2.07% and 19.04% of missing data were filled, respectively, with the WS method. In order to verify homogeneity three methods were used: Standard Normal Homogeneity Test (SNHT), the Von Neumann method and the Buishand method. The heterogeneous series were homogenized using climatol. The trends of <em>t</em><sub>max</sub> and <em>t</em><sub>min</sub> for both weather stations were analyzed by simple linear regression, Sperman’s rho and Mann-Kendall tests. The Mann-Kendal test method confirmed the warming trend at the Comitan station for both variables with <em>Z<sub>MK</sub></em> statistic values equal to 1.57 (statistically not significant) and 4.64 (statistically significant). However, for the Esperanza station, it determined a cooling trend for tmin and a slight non-significant warming for <em>t</em><sub>max</sub> with a <em>Z</em><sub><em>MK</em></sub> statistic of -2.27 (statistically significant) and 1.16 (statistically not significant), for a significance level <em>α</em> = 0.05.展开更多
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver sett...Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain.展开更多
文摘Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge with an inten-tion to protect the sensitive details of the patients over getting published in open domain.To solve this problem,Multi Attribute Case based Privacy Preservation(MACPP)technique is proposed in this study to enhance the security of privacy-preserving data.Private information can be any attribute information which is categorized as sensitive logs in a patient’s records.The semantic relation between transactional patient records and access rights is estimated based on the mean average value to distinguish sensitive and non-sensitive information.In addition to this,crypto hidden policy is also applied here to encrypt the sensitive data through symmetric standard key log verification that protects the personalized sensitive information.Further,linear integrity verification provides authentication rights to verify the data,improves the performance of privacy preserving techni-que against intruders and assures high security in healthcare setting.
基金supported by National Natural Science Foundation of China (61703410,61873175,62073336,61873273,61773386,61922089)。
文摘Remaining useful life(RUL) prediction is one of the most crucial elements in prognostics and health management(PHM). Aiming at the imperfect prior information, this paper proposes an RUL prediction method based on a nonlinear random coefficient regression(RCR) model with fusing failure time data.Firstly, some interesting natures of parameters estimation based on the nonlinear RCR model are given. Based on these natures,the failure time data can be fused as the prior information reasonably. Specifically, the fixed parameters are calculated by the field degradation data of the evaluated equipment and the prior information of random coefficient is estimated with fusing the failure time data of congeneric equipment. Then, the prior information of the random coefficient is updated online under the Bayesian framework, the probability density function(PDF) of the RUL with considering the limitation of the failure threshold is performed. Finally, two case studies are used for experimental verification. Compared with the traditional Bayesian method, the proposed method can effectively reduce the influence of imperfect prior information and improve the accuracy of RUL prediction.
基金supported by the cooperation between BIT and Ericssonpartially supported by the National Natural Science Foundation of China under Grants No.62071039。
文摘This paper proposes a personalized headrelated transfer function(HRTF)prediction method based on Light GBM using anthropometric data.Considering the overfitting problems of the current training-based prediction methods,we use Light GBM and a specific network structure to prevent over-fitting and enhance the prediction performance.By decomposing and combining the data to be predicted,we set up 90 Light GBM models to separately predict the 90instants of HRTF in log domain.At the same time,the method of 10-fold cross-validation is used to score the accuracy of the model.For models with scores below 80 points,Bayesian optimization is used to adjust model hyperparameters to obtain a better model structure.The results obtained by Light GBM are evaluated with spectral distortion(SD)which can show the fitting error between the prediction and the original data.The mean SD values of both ears on the whole test set are 2.32 d B and 2.28 d B respectively.Compared with the non-linear regression method and the latest method,SD value of Light GBM-based method relatively decreases by 83.8%and 48.5%.
基金National Natural Science Foundation of China(Nos.42371406,42071441,42222106,61976234).
文摘With the increasing number of remote sensing satellites,the diversification of observation modals,and the continuous advancement of artificial intelligence algorithms,historically opportunities have been brought to the applications of earth observation and information retrieval,including climate change monitoring,natural resource investigation,ecological environment protection,and territorial space planning.Over the past decade,artificial intelligence technology represented by deep learning has made significant contributions to the field of Earth observation.Therefore,this review will focus on the bottlenecks and development process of using deep learning methods for land use/land cover mapping of the Earth’s surface.Firstly,it introduces the basic framework of semantic segmentation network models for land use/land cover mapping.Then,we summarize the development of semantic segmentation models in geographical field,focusing on spatial and semantic feature extraction,context relationship perception,multi-scale effects modelling,and the transferability of models under geographical differences.Then,the application of semantic segmentation models in agricultural management,building boundary extraction,single tree segmentation and inter-species classification are reviewed.Finally,we discuss the future development prospects of deep learning technology in the context of remote sensing big data.
基金the current result of the “research on the basic category system of contemporary Chinese digital law” (23&ZD154), a major project of the National Social Science Fund of China.
文摘Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.
文摘The recent increase in the use of artificial intelligence has led to fundamental changes in the development of training and teaching methods for executive education. However, the success of artificial intelligence in regional centers for teaching and training professions will depend on the acceptance of this technology by young executive trainees. This article discusses the potential benefits of adopting AI in executive training institutions in Morocco, specifically focusing on CRMEF Casablanca Settat. Based on the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al., 2003), this study proposes a model to identify the factors influencing the acceptance of artificial intelligence in regional centers for teaching professions and training in Morocco. To achieve this, a structural equation modeling approach was used to quantitatively describe the impact of each factor on AI adoption, utilizing data collected from 173 young executive trainees. The results indicate that perceived ease of use, perceived usefulness, trainer influence, and personal innovativeness influence the intention to use artificial intelligence. Our research provides managers of CRMEFs with a set of practical recommendations to enhance the implementation conditions of an artificial intelligence system. It aims to understand which factors should be considered in designing an artificial intelligence system within regional centers for teaching professions and training (CRMEFs).
文摘This paper explores the opportunities and challenges of college mental health education from the perspective of big data.Firstly,through literature review,the importance of mental health education and the current issues are elucidated.Then,from the perspective of big data,the potential opportunities of big data in college mental health education are analyzed,including data-driven personalized education,real-time monitoring and warning systems,and interdisciplinary research and collaboration.At the same time,the challenges faced by college mental health education under the perspective of big data are also pointed out,such as data privacy and security issues,insufficient data analysis and interpretation capabilities,and inadequate technical facilities and talent support.Lastly,the research content of this paper is summarized,and directions and suggestions for future research are proposed.
基金Research in the Lemmon/Bixby lab is supported by NIH grants NS080145 and NS059866by the Miami Project to Cure Paralysis
文摘Progress in developing robust therapies for spinal cord injury (SCI), trau- matic brain injury (TBI) and peripheral nerve injury has been slow. A great deal has been learned over the past 30 years regarding both the intrinsic factors and the environmental factors that regulate axon growth, but this large body of information has not yet resulted in clinically available thera- peutics. This therapeutic bottleneck has many root causes, but a consensus is emerging that one contributing factor is a lack of standards for experi- mental design and reporting. The absence of reporting standards, and even of commonly accepted definitions of key words, also make data mining and bioinformatics analysis of neural plasticity and regeneration difficult, if not impossible. This short review will consider relevant background and poten- tial solutions to this problem in the axon regeneration domain.
文摘Commentary Most would agree that providing comprehensive detail in scientific reporting is critical for the development of mean- ingful therapies and treatments for diseases. Such stellar practices 1) allow for reproduction of experiments to con- firm results, 2) promote thorough analyses of data, and 3) foster the incremental advancement of valid approaches. Unfortunately, most would also agree we have far to go to reach this vital goal (Hackam and Redelmeier, 2006; Prinz et al., 2011; Baker et al., 2014).
文摘Recently, use of mobile communicational devices in field data collection is increasing such as smart phones and cellular phones due to emergence of embedded Global Position System GPS and Wi-Fi Internet access. Accurate timely and handy field data collection is required for disaster management and emergency quick responses. In this article, we introduce web-based GIS system to collect the field data by personal mobile phone through Post Office Protocol POP3 mail server. The main objective of this work is to demonstrate real-time field data collection method to the students using their mobile phone to collect field data by timely and handy manners, either individual or group survey in local or global scale research.
基金funded by China Geological Survey (grant no.1212011120899)the Department of Geology & Mining, China National Nuclear Corporation (grant no.201498)
文摘Hyperspectral remote sensing is now a frontier of the remote sensing technology. Airborne hyperspectral remote sensing data have hundreds of narrow bands to obtain complete and continuous ground-object spectra. Therefore, they can be effectively used to identify these grotmd objects which are difficult to discriminate by using wide-band data, and show much promise in geological survey. At the height of 1500 m, have 36 bands in visible to the CASI hyperspectral data near-infrared spectral range, with a spectral resolution of 19 nm and a space resolution of 0.9 m. The SASI data have 101 bands in the shortwave infrared spectral range, with a spectral resolution of 15 nm and a space resolution of 2.25 m. In 2010, China Geological Survey deployed an airborne CASI/SASI hyperspectral measurement project, and selected the Liuyuan and Fangshankou areas in the Beishan metallogenic belt of Gansu Province, and the Nachitai area of East Kunlun metallogenic belt in Qinghai Province to conduct geological survey. The work period of this project was three years.
基金supported by the National Science Fund for Distinguished Young Scholars of China(52025056)Fundamental Research Funds for the Central Universities(xzy012022062)。
文摘In recent years,intelligent data-driven prognostic methods have been successfully developed,and good machinery health assessment performance has been achieved through explorations of data from multiple sensors.However,existing datafusion prognostic approaches generally rely on the data availability of all sensors,and are vulnerable to potential sensor malfunctions,which are likely to occur in real industries especially for machines in harsh operating environments.In this paper,a deep learning-based remaining useful life(RUL)prediction method is proposed to address the sensor malfunction problem.A global feature extraction scheme is adopted to fully exploit information of different sensors.Adversarial learning is further introduced to extract generalized sensor-invariant features.Through explorations of both global and shared features,promising and robust RUL prediction performance can be achieved by the proposed method in the testing scenarios with sensor malfunctions.The experimental results suggest the proposed approach is well suited for real industrial applications.
文摘In this paper, three techniques, line run coding, quadtree DF (Depth-First) representation and H coding for compressing classified satellite cloud images with no distortion are presented. In these three codings, the first two were invented by other persons and the third one, by ourselves. As a result, the comparison among their compression rates is. given at the end of this paper. Further application of these image compression technique to satellite data and other meteorological data looks promising.
文摘The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our proposed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.
文摘Objectives To explore the challenges of secondary use of routinely collected data for analyzing nursing-sensitive outcomes in Austrian acute care hospitals.Method A convergent parallel mixed methods design was performed.We conducted a quantitative representative survey with nursing managers from 32 Austrian general acute care hospitals and 11 qualitative semi-structured interviews with nursing quality management experts.Both results were first analyzed independently and afterward merged in the discussion.Results On average,76%of nursing documentation is already electronically supported in the surveyed Austrian hospitals.However,existing nursing data is seldom used for secondary purposes such as nursing-sensitive outcome analyses.This is due to four major reasons:First,hospitals often do not have a data strategy for the secondary use of routine data.Second,hospitals partly lack the use of standardized and uniform nursing terminologies,especially for nursing evaluation.Third,routine nursing data is often not documented correctly and completely.Fourth,data on nursing-sensitive outcomes is usually collected in specific documentation forms not integrated into routine documentation.Conclusion The awareness of the possibilities for secondary use of nursing data for nursing-sensitive outcome analyses in Austrian hospitals is still in its infancy.Therefore,nursing staff and nursing management must be trained to understand how to collect and process nursing data for nursing-sensitive outcome analyses.Further studies would be interesting in order to determine the factors that influence the decision-making processes for the secondary use of nursing data for outcome analyses.
文摘ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the performances of these methods in detecting oceanic features for both noise free and noise contaminated AVHRR (Advanced Very High Resolution Radiometer) IR image with Kuroshio. Also, practical experiments in detecting the eddy of Kuroshio with these methods are carried out for comparison. Results show that the ICSED algorithm has more advantages than other methods in detecting mesoscale features of ocean. Finally, the effectiveness of window size of ICSED method to oceanic features detection is quantitatively discussed.
文摘In this paper, on the basis of experimental data of two kinds of chemical explosions, the piston-pushing model of spherical blast-waves and the second-order Godunov-type scheme of finite difference methods with high identification to discontinuity are used to the numerical reconstruction of part of an actual hemispherical blast-wave flow field by properly adjusting the moving bounary conditions of a piston. This method is simple and reliable. It is suitable to the evaluation of effects of the blast-wave flow field away from the explosion center.
文摘Based on the research on the diffusion of suspended sediments discharged outside of Yangtze River estuary and the landuse of Shanghai using Landsat MSS images in several years, the authors analysed the characteristics of TM CCT data of Shanghai scene, pointed out concrete range of maximum turbidity and growth of urban boundary of Shanghai through the information extraction.The feature vector combination method is used in the research process. The result is getting nice.
文摘The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°52'5''W) a town with 3000 inhabitants. Both weather stations are 30 km from each other in the Chiapas State, México. 54 years of daily records of the series of maximum (<em>t</em><sub>max</sub>) and minimum temperatures (<em>t</em><sub>min</sub>) of the weather station 07205 Comitan that is on top of a house and 30 years of daily records of the weather station 07374 La Esperanza were analyzed. The objective is to analyze the evidence of climate change in the Comitan valley. 2.07% and 19.04% of missing data were filled, respectively, with the WS method. In order to verify homogeneity three methods were used: Standard Normal Homogeneity Test (SNHT), the Von Neumann method and the Buishand method. The heterogeneous series were homogenized using climatol. The trends of <em>t</em><sub>max</sub> and <em>t</em><sub>min</sub> for both weather stations were analyzed by simple linear regression, Sperman’s rho and Mann-Kendall tests. The Mann-Kendal test method confirmed the warming trend at the Comitan station for both variables with <em>Z<sub>MK</sub></em> statistic values equal to 1.57 (statistically not significant) and 4.64 (statistically significant). However, for the Esperanza station, it determined a cooling trend for tmin and a slight non-significant warming for <em>t</em><sub>max</sub> with a <em>Z</em><sub><em>MK</em></sub> statistic of -2.27 (statistically significant) and 1.16 (statistically not significant), for a significance level <em>α</em> = 0.05.
基金supported by the Youth Doctoral Foundation of Gansu Education Committee under Grant No.2022QB-176.
文摘Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain.