Simultaneous extraction of the coal and gas is an effective method of eliminating coal mine gas disasters while safely exploiting the coal and achieving efficient gas drainage in China, which is widely accepted by the...Simultaneous extraction of the coal and gas is an effective method of eliminating coal mine gas disasters while safely exploiting the coal and achieving efficient gas drainage in China, which is widely accepted by the main coal-producing countries around the world. However, the concrete definition of simultaneous extraction is vague and there is little accurate theoretical support for the simultaneous extraction of coal and gas, which makes it difficult to determine an efficient gas drainage method appropriate to the features of coal seams. Based on theoretical analysis, laboratory tests and field observations, a specific definition of simultaneous extraction of coal and gas is proposed after analyzing the characteristics of coal seam occurrences in China, and we developed the mechanism of mining-enhanced permeability and established the corresponding theoretical model. This comprises a process of fracture network formation, in which the original fractures are opened and new fractures are produced by unloading damage. According to the theoretical model, the engineering approaches and their quantitative parameters of 'unloading by borehole drilling' for single coal seams and 'unloading by protective seam mining' for groups of coal seams are proposed, and the construction principles for coal exploitation and gas-drainage systems for different conditions are given. These methods were applied successfully in the Tunlan Coal Mine in Shanxi Province and the Panyi Coal Mine in Anhui Province and could assure safe and efficient simultaneous extraction of coal and gas in these outburst coal mines.展开更多
This study is aimed to assess the long-term healthrelated quality of life (HRQL) of patients after esophagectomy for esophageal cancer in comparison with established norms, and to evaluate changes in HRQL during the...This study is aimed to assess the long-term healthrelated quality of life (HRQL) of patients after esophagectomy for esophageal cancer in comparison with established norms, and to evaluate changes in HRQL during the different stages of follow-up after esophageal resection. A systematic review was performed by searching medical databases (Medline, Embase and the Cochrane Library) for potentially relevant studies that appeared between January 1975 and March 2011. Studies were included if they addressed the question of HRQL after esophageal resection for esophageal cancer. Two researchers independently performed the study selection, data extraction and analysis processes. Twenty-one observational studies were included with a total of 1282 (12-355) patients. Five studies were performed with short form-36 (SF-36) and 16 with European Organization for Research and Treatment of Cancer (EORTC) QLQ c30 (14 of them also utilized the disease-specific OESI8 or its previous version OES24).The analysis of long-term generic HRQL with SF-36 showed pooled scores for physical, role and social function after esophagectomy similar to United States norms, but lower pooled scores for physical function, vitality and general health perception. The analysis of HRQL conducted using the Global EORTC C30 global scale during a 6-mo follow-up showed that global scale and physical function were better at the baseline. The symptom scales indicated worsened fatigue, dyspnea and diarrhea 6 mo after esophagectomy. In contrast, however, emotional function had significantly improved after 6 mo. In conclusion, short- and long-term HRQL is deeply affected after esophagectomy for cancer. The impairment of physical function may be a long-term consequence of esophagectomy involving either the respiratory system or the alimentary tract. The short- and long-term improvement in the emotional function of patients who have undergone successful operations may be attributed to the impression that they have survived a near-death experience.展开更多
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in...Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony.展开更多
The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to stu...The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to study. The likelihood of occurrence and the magnitude of risk for each of these surgical safety events are undefined. Many providers may never have a personal experience with one of these events and training and education on these topics are sparse. These circumstances lead to faulty thinking that a provider won't ever have an event or if one does occur the provider will intuitively know what to do. Surgeons are not preoccupied with failure and tend to usually consider good outcomes, which leads them to ignore or diminish the importance of implementing and following simple safety practices. These circumstances contribute to the persistent low level occurrence of these three events and to the difficulty in generating sufficient interest to resource solutions. Individual facilities rarely have the time or talent to understand these events and develop lasting solutions. More often than not, even the most well meaning internal review results in a new line to a policy and some rigorous enforcement mandate. This approach routinely fails and is another reason why these problems are so persistent. Vigilance actions alone havebeen unsuccessful so hospitals now have to take a systematic approach to implementing safer processes and providing the resources for surgeons and other stake-holders to optimize the OR environment. This article discusses standardized processes of care for mitigation of injury or outright prevention of wrong site surgery, RSI and surgical fires in an action-oriented framework illustrating the strategic elements important in each event and focusing on the responsibilities for each of the three major OR agents-anesthesiologists, surgeons and nurses. A Surgical Patient Safety Checklist is discussed that incorporates the necessary elements to bring these team members together and influence the emergence of a safer OR.展开更多
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si...In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented.展开更多
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new ch...Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.展开更多
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ...This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.展开更多
A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural n...A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural network (GRNN) with incorporation of feature extraction method using principle component analysis. In the risk based security assessment formulation, the failure rate associated to weather condition of each line was used to compute the probability of line outage for a given weather condition and the extent of security violation was represented by a severity function. For low voltage and line overload, continuous severity function was considered due to its ability to zoom in into the effect of near violating contingency. New severity function for voltage collapse using the voltage collapse prediction index was proposed. To reduce the computational burden, a new contingency screening method was proposed using the risk factor so as to select the critical line outages. The risk based security assessment method using GRNN was implemented on a large scale 87-bus power system and the results show that the risk prediction results obtained using GRNN with the incorporation of principal component analysis give better performance in terms of accuracy.展开更多
Hepatic computed tomography(CT) images with Gabor function were analyzed.Then a threshold-based classification scheme was proposed using Gabor features and proceeded with the retrieval of the hepatic CT images.In our ...Hepatic computed tomography(CT) images with Gabor function were analyzed.Then a threshold-based classification scheme was proposed using Gabor features and proceeded with the retrieval of the hepatic CT images.In our experiments, a batch of hepatic CT images containing several types of CT findings was used and compared with the Zhao's image classification scheme, support vector machines(SVM) scheme and threshold-based scheme.展开更多
To match human perception, extracting perceptual features effectively plays an important role in image quality assessment. In contrast to most existing methods that use linear transformations or models to represent im...To match human perception, extracting perceptual features effectively plays an important role in image quality assessment. In contrast to most existing methods that use linear transformations or models to represent images, we employ a complex mathematical expression of high dimensionality to reveal the statistical characteristics of the images. Furthermore, by introducing kernel methods to transform the linear problem into a nonlinear one, a full-reference image quality assessment method is proposed based on high-dimensional nonlinear feature extraction. Experiments on the LIVE, TID2008, and CSIQ databases demonstrate that nonlinear features offer competitive performance for image inherent quality representation and the proposed method achieves a promising performance that is consistent with human subjective evaluation.展开更多
The output characteristics of nonlinear optical fiber-loop mirror are analyzed in detail when the pump pulses with the same wavelength are input in the both directions for recovering the clock component of the signal ...The output characteristics of nonlinear optical fiber-loop mirror are analyzed in detail when the pump pulses with the same wavelength are input in the both directions for recovering the clock component of the signal spectrum.It is found that the double output pulses are produced in the transmission port of the nonlinear optical fiber-loop mirror.The output pulse peaks are located in time domain at the rising and falling edges of the pump pulses.It is demonstrated that the rising and falling edges of the pump pulse can be directly extracted by this method.Through numerical simulation,the effects of therelative delay of pump pulses and the dispersion of fiber on the characteristics of output pulses are studied.By spectrum analysis,it is found that the spectrum of output pulse sequence includes the clock components of the pump pulse sequence,and a new idea is provided for all-optical clock extraction.展开更多
With the development of the global economy, interaction among different economic entities from one region is intensifying, which makes it significant to consider such interaction when constructing composite index for ...With the development of the global economy, interaction among different economic entities from one region is intensifying, which makes it significant to consider such interaction when constructing composite index for each country from one region. Recent advances in signal extraction and time series analysis have made such consideration feasible and practical. Singular spectrum analysis (SSA) is a well-developed technique for time series analysis and proven to be a powerful tool for signal extraction. The present study aims to introduce the usage of the SSA technique for multi-country business cycle analysis. The multivariate SSA (MSSA) is employed to construct a model-based composite index and the two dimensional SSA (2D-SSA) is employed to establish the multi-country composite index. Empirical results performed on Chinese economy demonstrate the accuracy and stability of MSSA-based composite index, and the 2D-SSA based composite indices for Asian countries confirm the efficiency of the technique in capturing the interaction among different countries.展开更多
基金Acknowledgments This research was supported by the National Program on Key Basic Research Project of China (973 Program) (2011CB201204), the Visitor Foundation of the State Key Laboratory of Coal Mine Disaster Dynamics and Control (Chongqing University) (2011DA105287-FW201405), the National Natural Science Foundation of China (51374204 and 51304204), and a project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘Simultaneous extraction of the coal and gas is an effective method of eliminating coal mine gas disasters while safely exploiting the coal and achieving efficient gas drainage in China, which is widely accepted by the main coal-producing countries around the world. However, the concrete definition of simultaneous extraction is vague and there is little accurate theoretical support for the simultaneous extraction of coal and gas, which makes it difficult to determine an efficient gas drainage method appropriate to the features of coal seams. Based on theoretical analysis, laboratory tests and field observations, a specific definition of simultaneous extraction of coal and gas is proposed after analyzing the characteristics of coal seam occurrences in China, and we developed the mechanism of mining-enhanced permeability and established the corresponding theoretical model. This comprises a process of fracture network formation, in which the original fractures are opened and new fractures are produced by unloading damage. According to the theoretical model, the engineering approaches and their quantitative parameters of 'unloading by borehole drilling' for single coal seams and 'unloading by protective seam mining' for groups of coal seams are proposed, and the construction principles for coal exploitation and gas-drainage systems for different conditions are given. These methods were applied successfully in the Tunlan Coal Mine in Shanxi Province and the Panyi Coal Mine in Anhui Province and could assure safe and efficient simultaneous extraction of coal and gas in these outburst coal mines.
文摘This study is aimed to assess the long-term healthrelated quality of life (HRQL) of patients after esophagectomy for esophageal cancer in comparison with established norms, and to evaluate changes in HRQL during the different stages of follow-up after esophageal resection. A systematic review was performed by searching medical databases (Medline, Embase and the Cochrane Library) for potentially relevant studies that appeared between January 1975 and March 2011. Studies were included if they addressed the question of HRQL after esophageal resection for esophageal cancer. Two researchers independently performed the study selection, data extraction and analysis processes. Twenty-one observational studies were included with a total of 1282 (12-355) patients. Five studies were performed with short form-36 (SF-36) and 16 with European Organization for Research and Treatment of Cancer (EORTC) QLQ c30 (14 of them also utilized the disease-specific OESI8 or its previous version OES24).The analysis of long-term generic HRQL with SF-36 showed pooled scores for physical, role and social function after esophagectomy similar to United States norms, but lower pooled scores for physical function, vitality and general health perception. The analysis of HRQL conducted using the Global EORTC C30 global scale during a 6-mo follow-up showed that global scale and physical function were better at the baseline. The symptom scales indicated worsened fatigue, dyspnea and diarrhea 6 mo after esophagectomy. In contrast, however, emotional function had significantly improved after 6 mo. In conclusion, short- and long-term HRQL is deeply affected after esophagectomy for cancer. The impairment of physical function may be a long-term consequence of esophagectomy involving either the respiratory system or the alimentary tract. The short- and long-term improvement in the emotional function of patients who have undergone successful operations may be attributed to the impression that they have survived a near-death experience.
文摘Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony.
文摘The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to study. The likelihood of occurrence and the magnitude of risk for each of these surgical safety events are undefined. Many providers may never have a personal experience with one of these events and training and education on these topics are sparse. These circumstances lead to faulty thinking that a provider won't ever have an event or if one does occur the provider will intuitively know what to do. Surgeons are not preoccupied with failure and tend to usually consider good outcomes, which leads them to ignore or diminish the importance of implementing and following simple safety practices. These circumstances contribute to the persistent low level occurrence of these three events and to the difficulty in generating sufficient interest to resource solutions. Individual facilities rarely have the time or talent to understand these events and develop lasting solutions. More often than not, even the most well meaning internal review results in a new line to a policy and some rigorous enforcement mandate. This approach routinely fails and is another reason why these problems are so persistent. Vigilance actions alone havebeen unsuccessful so hospitals now have to take a systematic approach to implementing safer processes and providing the resources for surgeons and other stake-holders to optimize the OR environment. This article discusses standardized processes of care for mitigation of injury or outright prevention of wrong site surgery, RSI and surgical fires in an action-oriented framework illustrating the strategic elements important in each event and focusing on the responsibilities for each of the three major OR agents-anesthesiologists, surgeons and nurses. A Surgical Patient Safety Checklist is discussed that incorporates the necessary elements to bring these team members together and influence the emergence of a safer OR.
基金Project(2007AA01Z241-2) supported by the National High-tech Research and Development Program of ChinaProject(2006XM002) supported by Beijing Jiaotong University Science Foundation,ChinaProject(0910KYZY55) supported by the Fundamental Research Funds for the Central University in China
文摘In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented.
基金the National Natural Science Foundation of China,the National Basic Research Program of China ("973" Program) the National High Technology Research and Development Program of China ("863" Program)
文摘Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.
基金supported by National Natural Science Foundation of China(No.U 1405254, 61472092)China Postdoctoral Science Foundation(No.2015M581101)National Science and Technology SupportingFoundation of China(No.2014BAH41B00)
文摘This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.
文摘A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural network (GRNN) with incorporation of feature extraction method using principle component analysis. In the risk based security assessment formulation, the failure rate associated to weather condition of each line was used to compute the probability of line outage for a given weather condition and the extent of security violation was represented by a severity function. For low voltage and line overload, continuous severity function was considered due to its ability to zoom in into the effect of near violating contingency. New severity function for voltage collapse using the voltage collapse prediction index was proposed. To reduce the computational burden, a new contingency screening method was proposed using the risk factor so as to select the critical line outages. The risk based security assessment method using GRNN was implemented on a large scale 87-bus power system and the results show that the risk prediction results obtained using GRNN with the incorporation of principal component analysis give better performance in terms of accuracy.
基金the National Natural Science Foundation of China (No. 30770589)
文摘Hepatic computed tomography(CT) images with Gabor function were analyzed.Then a threshold-based classification scheme was proposed using Gabor features and proceeded with the retrieval of the hepatic CT images.In our experiments, a batch of hepatic CT images containing several types of CT findings was used and compared with the Zhao's image classification scheme, support vector machines(SVM) scheme and threshold-based scheme.
基金Project supported by the National High-Tech R&D Program (863) of China (No. 2015AA016704c), the National Science Technology Support Program of China (No. 2013BAH03B01), and the Zhejiang Provincial Natural Science Foundation of China (No. LY14F020028)
文摘To match human perception, extracting perceptual features effectively plays an important role in image quality assessment. In contrast to most existing methods that use linear transformations or models to represent images, we employ a complex mathematical expression of high dimensionality to reveal the statistical characteristics of the images. Furthermore, by introducing kernel methods to transform the linear problem into a nonlinear one, a full-reference image quality assessment method is proposed based on high-dimensional nonlinear feature extraction. Experiments on the LIVE, TID2008, and CSIQ databases demonstrate that nonlinear features offer competitive performance for image inherent quality representation and the proposed method achieves a promising performance that is consistent with human subjective evaluation.
基金supported by the National High Technology Research and Development Program of China(No.2009AA01Z216)the Major State Basic Research and Development Program of China(No.2011CB301703)
文摘The output characteristics of nonlinear optical fiber-loop mirror are analyzed in detail when the pump pulses with the same wavelength are input in the both directions for recovering the clock component of the signal spectrum.It is found that the double output pulses are produced in the transmission port of the nonlinear optical fiber-loop mirror.The output pulse peaks are located in time domain at the rising and falling edges of the pump pulses.It is demonstrated that the rising and falling edges of the pump pulse can be directly extracted by this method.Through numerical simulation,the effects of therelative delay of pump pulses and the dispersion of fiber on the characteristics of output pulses are studied.By spectrum analysis,it is found that the spectrum of output pulse sequence includes the clock components of the pump pulse sequence,and a new idea is provided for all-optical clock extraction.
基金supported by the National Science Foundation of China under Grant No.71101142Presidential Award of Chinese Academy of Sciences
文摘With the development of the global economy, interaction among different economic entities from one region is intensifying, which makes it significant to consider such interaction when constructing composite index for each country from one region. Recent advances in signal extraction and time series analysis have made such consideration feasible and practical. Singular spectrum analysis (SSA) is a well-developed technique for time series analysis and proven to be a powerful tool for signal extraction. The present study aims to introduce the usage of the SSA technique for multi-country business cycle analysis. The multivariate SSA (MSSA) is employed to construct a model-based composite index and the two dimensional SSA (2D-SSA) is employed to establish the multi-country composite index. Empirical results performed on Chinese economy demonstrate the accuracy and stability of MSSA-based composite index, and the 2D-SSA based composite indices for Asian countries confirm the efficiency of the technique in capturing the interaction among different countries.