Background -This prospective clinical study evaluates the feasibility and eff icacy of combined linear mitral isthmus ablation and pulmonary vein(PV) isolatio n in patients with paroxysmal atrial fibrillation(AF). Met...Background -This prospective clinical study evaluates the feasibility and eff icacy of combined linear mitral isthmus ablation and pulmonary vein(PV) isolatio n in patients with paroxysmal atrial fibrillation(AF). Methods and Results -One hundred consecutive patients(13 women; age 55±10 years)-with drug-refractory , symptomatic paroxysmal AF underwent PV isolation and linear ablation of the ca votricuspid isthmus and the mitral isthmus(lateral mitral annulus to the left in ferior PV). They were compared with 100 consecutive patients(14 women; age, 52± 10 years) undergoing PV isolation and cavotricuspid ablation without mitral isth mus ablation. Bidirectional mitral isthmus block was confirmed by demonstrating( 1) a parallel corridor of double potentials during coronary sinus(CS) pacing,(2) an activation detour by pacing either side of the line, and(3) differential pac ing techniques. Isolation of all PVs and cavotricuspid isthmus ablation were per formed successfully in all. Mitral isthmus block was achieved in 92 patients aft er 20±10 minutes of endocardial radiofrequency application and an additional 5 ±4 minutes of epicardial radiofrequency application from within the CS in 68, r esulting in a conduction delay of 151±26 ms during CS pacing. Thirty-two patie nts with mitral isthmus ablation compared with 49 without had recurrent atrial a rrhythmia (P=0.02) requiring further ablation. At 1 year after the last procedur e, 87 patients with mitral isthmus ablation and 69 without(P=0.002) were arrhyth mia free without antiarrhythmic drugs, mitral isthmus ablation being the only fa ctor associated with long-term success(RR for AF recurrence, 0.2; CI, 0.1 to 0. 4; P< 0.001). Conclusions -Catheter ablation of the mitral isthmus results cons istently in demonstrable conduction block and is associated with a high cure rat e for paroxysmal AF.展开更多
As it is well known,it is difficult to identify a nonlinear time varying system using traditional identification approaches,especially under unknown nonlinear function.Neural networks have recently emerged as a succes...As it is well known,it is difficult to identify a nonlinear time varying system using traditional identification approaches,especially under unknown nonlinear function.Neural networks have recently emerged as a successful tool in the area of identification and control of time invariant nonlinear systems.However,it is still difficult to apply them to complicated time varying system identification.In this paper we present a learning algorithm for identification of the nonlinear time varying system using feedforward neural networks.The main idea of this approach is that we regard the weights of the network as a state of a time varying system,then use a Kalman filter to estimate the state.Thus the network implements nonlinear and time varying mapping.We derived both the global and local learning algorithms.Simulation results demonstrate the effectiveness of this approach.展开更多
Liver fibrosis is an important pathological precondition for hepatocellular carcinoma.The degree of hepatic fibrosis is positively correlated with liver cancer.Liver fibrosis is a series of pathological and physiologi...Liver fibrosis is an important pathological precondition for hepatocellular carcinoma.The degree of hepatic fibrosis is positively correlated with liver cancer.Liver fibrosis is a series of pathological and physiological process related to liver cell necrosis and degeneration after chronic liver injury,which finally leads to extracellular matrix and collagen deposition.The early detection and precise staging of fibrosis and cirrhosis are very important for early diagnosis and timely initiation of appropriate therapeutic regimens.The risk of severe liver fibrosis finally progressing to liver carcinoma is&gt;50%.It is known that biopsy is the gold standard for the diagnosis and staging of liver fibrosis.However,this method has some limitations,such as the potential for pain,sampling variability,and low patient acceptance.Furthermore,the necessity of obtaining a tissue diagnosis of liver fibrosis still remains controversial.An increasing number of reliable non-invasive approaches are now available that are widely applied in clinical practice,mostly in cases of viral hepatitis,resulting in a significantly decreased need for liver biopsy.In fact,the noninvasive detection and evaluation of liver cirrhosis now has good accuracy due to current serum markers,ultrasound imaging,and magnetic resonance imaging quantification techniques.A prominent advantage of the non-invasive detection and assessment of liver fibrosis is that liver fibrosis can be monitored repeatedly and easily in the same patient.Serum biomarkers have the advantages of high applicability(〉95%)and good reproducibility.However,their results can be influenced by different patient conditions because none of these markers are liver-specific.The most promising techniques appear to be transient elastography and magnetic resonance elastography because they provide reliable results for the detection of fibrosis in the advanced stages,and future developments promise to increase the reliability and accuracy of the staging of hepatic fibrosis.This article aims to describe the recent progress in the development of non-invasive assessment methods for the staging of liver fibrosis,with a special emphasize on computer-aided quantitative and deep learning methods.展开更多
We present a 9×9 S-matrix and E-matrix.A representation of specialized Birman-Wenzl-Murakami algebra is obtained.Starting from the given braid group representation S-matrix,we obtain the trigonometric solution of...We present a 9×9 S-matrix and E-matrix.A representation of specialized Birman-Wenzl-Murakami algebra is obtained.Starting from the given braid group representation S-matrix,we obtain the trigonometric solution of Yang-Baxter equation.A unitary matrix R(x,φ1,φ2)is generated via the Yang-Baxterization approach.Then we construct a Yang-Baxter Hamiltonian through the unitary matrix R(x,φ1,φ2).Berry phase of this Yang-Baxter system is investigated in detail.展开更多
Two novel adaptive distributed target detectors, the range frequency domain-Rao (RFD-Rao) and range frequency domain-Wald (RFD-Wald) tests are proposed in this work. The application methods for these tests conside...Two novel adaptive distributed target detectors, the range frequency domain-Rao (RFD-Rao) and range frequency domain-Wald (RFD-Wald) tests are proposed in this work. The application methods for these tests consider a partially homogeneous disturbance environment and a target range walking effect in a coherent processing interval (CPI). The asymptotic performance of the detectors is analyzed, and the constant false alarm rate (CFAR) properties with respect to the clutter covariance matrix and power level are shown. The performances of the proposed adaptive detectors are assessed through Monte-Carlo simulations, and the results are presented to demonstrate the effectiveness of the proposed detection algorithms compared to those of similar existing detectors.展开更多
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In...Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.展开更多
Recently,scrambling index and competition index are widely applied to stochastic matrices and food webs. By analyzing the relationship of scrambling index and 2-competition index,n-「d/2」+ 1 was proved to be an upper...Recently,scrambling index and competition index are widely applied to stochastic matrices and food webs. By analyzing the relationship of scrambling index and 2-competition index,n-「d/2」+ 1 was proved to be an upper bound of the 2-competition2 index of a primitive digraph with exact d loops in this article.Moreover,the maximum index problem and the index set problem for the 2-competition index of primitive digraphs with minimally strong digraphs were settled.展开更多
The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distanc...The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey M-estimator.Firstly,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor model.The influence of attack profiles on the recommendation results is reduced through adjusting similarities among users.Then,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature matrix.Finally,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization model.Experimental results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness.展开更多
This paper gives the rank of matrix and equalities and inequalities of the difference number of non-zero eigenvalue, and discuss the equivalent description of multi angle of equalities for upper and lower bounds of th...This paper gives the rank of matrix and equalities and inequalities of the difference number of non-zero eigenvalue, and discuss the equivalent description of multi angle of equalities for upper and lower bounds of the inequality.展开更多
There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection...There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection that can provide rigorous and quantitative protection. Concerning the application of differential privacy in social networks,this paper analyzes current trends of research and provides some background information including privacy protection standards and noise mechanisms.Focusing on the privacy protection of social network data publishing,a graph-publishing model is designed to provide differential privacy in social networks via three steps: Firstly,according to the features of social network where two nodes that possess certain common properties are associated with a higher probability,a raw graph is divided into several disconnected sub-graphs,and correspondingly dense adjacent matrixes and the number of bridges are obtained. Secondly,taking the advantage of quad-trees,dense region exploration of the adjacent matrixes is conducted. Finally,using an exponential mechanism and leaf nodes of quad-trees,an adjacent matrix of the sanitized graph is reconstructed. In addition,a set of experiments is conducted to evaluate its feasibility,availability and strengths using three analysis techniques: degree distribution,shortest path,and clustering coefficients.展开更多
This review will focus on the more abundant eggshell specific matrix proteins localized in the chicken eggshell (cuticle layer eggshell matrix and shell membranes) that are involved in eggshell mineralization and pr...This review will focus on the more abundant eggshell specific matrix proteins localized in the chicken eggshell (cuticle layer eggshell matrix and shell membranes) that are involved in eggshell mineralization and protecting the egg against microbial contamination, including ovocalyxin-36, ovocleidin-17, ovocalyxin-32 and ovocalyxin-25. Further understanding of these proteins and their mechanisms in egg defence could lead to the development of novel neutraceuticals for human health, additives to animal feed for healthy flocks, or enhanced eggs for human consumption.展开更多
Higher mathematics is more extensive, profound and abstract than elementary mathematics; it is the development and sublimation of elementary mathematics. They have a deep connection, determinant and matrix theories or...Higher mathematics is more extensive, profound and abstract than elementary mathematics; it is the development and sublimation of elementary mathematics. They have a deep connection, determinant and matrix theories originated in Elementary Mathematics, in tum, they also can be used as tools to solve related problems, and they have important roles in guiding the study of elementary mathematics. This paper will introduce the methods of solving some recursive sequence problems by constructing determinants and matrices.展开更多
This paper first elaborates the research situation and progress of Laplace characteristics and the eigenvalues value of graphs. The second is given an upper bound of characteristic value of a kind of special graph usi...This paper first elaborates the research situation and progress of Laplace characteristics and the eigenvalues value of graphs. The second is given an upper bound of characteristic value of a kind of special graph using the properties of similar matrices. At the same time, a new upper bound of Laplace characteristic values are given using properties of Laplace matrix and the similarity matrix, to improve the existing results. Then, we use the example of the upper bound of our results are more precise than some previous results. Finally the use Laplace non- zero eigenvalues of graph properties to give a bound expressions using the degree of square with a number of edges and the graph of the number, number of connected component expression map, it reflected the relationship between eigenvalues and the amount of Laplace.展开更多
With common borders of the population, total area, and GDP (PPP-based) of Economic Cooperation Organization (ECO) member states are estimated as 416 million persons, 7.9 million m2, and US$2.7 trillion respective...With common borders of the population, total area, and GDP (PPP-based) of Economic Cooperation Organization (ECO) member states are estimated as 416 million persons, 7.9 million m2, and US$2.7 trillion respectively (2010 data). Although heterogeneous in the extent, there is economic development, overall, with serious energy and transport-transit relations among countries that is reflected in growing trade turnover year-by-year. However, there are still rather unused resources and capacity in such areas of cooperation among countries as exchange of energy, transport services, agricultural and industrial goods, use of opportunities for tourism, promoting investment and innovation processes and other areas. Certainly, maximum and optimal use of these resources calls for availability of analytical means capable of accounting for relations both within member states and among them. The implementation of computable general equilibrium (CGE) modeling in each member state would thus be of great significance in resolution of these problems both in terms of accounting for input-output linkages within the countries as well as enabling impact of main trading partners and goods and services among countries. The analysis carried out indicates that there are a number of problems in application of CGE model in most of the member states. As such, input-output tables are not compiled in some countries, while in others despite the fact that these tables are compiled, there are no attempts to build the model, yet in other countries, even if the CGE model is implemented, there are difficulties in taking into account the real results in the face of serious problems related to improving national accounts system database. Summarizing these problems, it is possible to conclude that to ensure the application of a CGE model,there is a great need to work out procedures of compilation of a social accounts matrix (SAM) that lies on the basis of this model, for which the relevant statistics of a member state must be improved. Considering the above-mentioned, the presented research, makes procedures and proposals on compilation of SAM, improves statistical data for researching the extent of application of CGE Model in ECO member states, and identifies the degree of availability and organization of relevant data to develop input-output tables and respective SAM.展开更多
文摘Background -This prospective clinical study evaluates the feasibility and eff icacy of combined linear mitral isthmus ablation and pulmonary vein(PV) isolatio n in patients with paroxysmal atrial fibrillation(AF). Methods and Results -One hundred consecutive patients(13 women; age 55±10 years)-with drug-refractory , symptomatic paroxysmal AF underwent PV isolation and linear ablation of the ca votricuspid isthmus and the mitral isthmus(lateral mitral annulus to the left in ferior PV). They were compared with 100 consecutive patients(14 women; age, 52± 10 years) undergoing PV isolation and cavotricuspid ablation without mitral isth mus ablation. Bidirectional mitral isthmus block was confirmed by demonstrating( 1) a parallel corridor of double potentials during coronary sinus(CS) pacing,(2) an activation detour by pacing either side of the line, and(3) differential pac ing techniques. Isolation of all PVs and cavotricuspid isthmus ablation were per formed successfully in all. Mitral isthmus block was achieved in 92 patients aft er 20±10 minutes of endocardial radiofrequency application and an additional 5 ±4 minutes of epicardial radiofrequency application from within the CS in 68, r esulting in a conduction delay of 151±26 ms during CS pacing. Thirty-two patie nts with mitral isthmus ablation compared with 49 without had recurrent atrial a rrhythmia (P=0.02) requiring further ablation. At 1 year after the last procedur e, 87 patients with mitral isthmus ablation and 69 without(P=0.002) were arrhyth mia free without antiarrhythmic drugs, mitral isthmus ablation being the only fa ctor associated with long-term success(RR for AF recurrence, 0.2; CI, 0.1 to 0. 4; P< 0.001). Conclusions -Catheter ablation of the mitral isthmus results cons istently in demonstrable conduction block and is associated with a high cure rat e for paroxysmal AF.
基金National Natural Science Foundation of China!(No.6 97740 33)
文摘As it is well known,it is difficult to identify a nonlinear time varying system using traditional identification approaches,especially under unknown nonlinear function.Neural networks have recently emerged as a successful tool in the area of identification and control of time invariant nonlinear systems.However,it is still difficult to apply them to complicated time varying system identification.In this paper we present a learning algorithm for identification of the nonlinear time varying system using feedforward neural networks.The main idea of this approach is that we regard the weights of the network as a state of a time varying system,then use a Kalman filter to estimate the state.Thus the network implements nonlinear and time varying mapping.We derived both the global and local learning algorithms.Simulation results demonstrate the effectiveness of this approach.
文摘Liver fibrosis is an important pathological precondition for hepatocellular carcinoma.The degree of hepatic fibrosis is positively correlated with liver cancer.Liver fibrosis is a series of pathological and physiological process related to liver cell necrosis and degeneration after chronic liver injury,which finally leads to extracellular matrix and collagen deposition.The early detection and precise staging of fibrosis and cirrhosis are very important for early diagnosis and timely initiation of appropriate therapeutic regimens.The risk of severe liver fibrosis finally progressing to liver carcinoma is&gt;50%.It is known that biopsy is the gold standard for the diagnosis and staging of liver fibrosis.However,this method has some limitations,such as the potential for pain,sampling variability,and low patient acceptance.Furthermore,the necessity of obtaining a tissue diagnosis of liver fibrosis still remains controversial.An increasing number of reliable non-invasive approaches are now available that are widely applied in clinical practice,mostly in cases of viral hepatitis,resulting in a significantly decreased need for liver biopsy.In fact,the noninvasive detection and evaluation of liver cirrhosis now has good accuracy due to current serum markers,ultrasound imaging,and magnetic resonance imaging quantification techniques.A prominent advantage of the non-invasive detection and assessment of liver fibrosis is that liver fibrosis can be monitored repeatedly and easily in the same patient.Serum biomarkers have the advantages of high applicability(〉95%)and good reproducibility.However,their results can be influenced by different patient conditions because none of these markers are liver-specific.The most promising techniques appear to be transient elastography and magnetic resonance elastography because they provide reliable results for the detection of fibrosis in the advanced stages,and future developments promise to increase the reliability and accuracy of the staging of hepatic fibrosis.This article aims to describe the recent progress in the development of non-invasive assessment methods for the staging of liver fibrosis,with a special emphasize on computer-aided quantitative and deep learning methods.
基金Supported by National Natural Science Foundation of China under Grants No.10875026
文摘We present a 9×9 S-matrix and E-matrix.A representation of specialized Birman-Wenzl-Murakami algebra is obtained.Starting from the given braid group representation S-matrix,we obtain the trigonometric solution of Yang-Baxter equation.A unitary matrix R(x,φ1,φ2)is generated via the Yang-Baxterization approach.Then we construct a Yang-Baxter Hamiltonian through the unitary matrix R(x,φ1,φ2).Berry phase of this Yang-Baxter system is investigated in detail.
基金Project(61771367) supported by the National Natural Science Foundation of China
文摘Two novel adaptive distributed target detectors, the range frequency domain-Rao (RFD-Rao) and range frequency domain-Wald (RFD-Wald) tests are proposed in this work. The application methods for these tests consider a partially homogeneous disturbance environment and a target range walking effect in a coherent processing interval (CPI). The asymptotic performance of the detectors is analyzed, and the constant false alarm rate (CFAR) properties with respect to the clutter covariance matrix and power level are shown. The performances of the proposed adaptive detectors are assessed through Monte-Carlo simulations, and the results are presented to demonstrate the effectiveness of the proposed detection algorithms compared to those of similar existing detectors.
基金Supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)the National Natural Science Foundation of China (No.60903181)Nanjing University of Posts and Telecommunications Funds (No.NY208072)
文摘Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
基金National Natural Science Foundations of China(No.11272100,No.50865001)
文摘Recently,scrambling index and competition index are widely applied to stochastic matrices and food webs. By analyzing the relationship of scrambling index and 2-competition index,n-「d/2」+ 1 was proved to be an upper bound of the 2-competition2 index of a primitive digraph with exact d loops in this article.Moreover,the maximum index problem and the index set problem for the 2-competition index of primitive digraphs with minimally strong digraphs were settled.
基金National Natural Science Foundation of China under Grant No.61379116,Natural Science Foundation of Hebei Province under Grant No.F2015203046 and No.F2013203124,Key Program of Research on Science and Technology of Higher Education Institutions of Hebei Province under Grant No.ZH2012028
文摘The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey M-estimator.Firstly,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor model.The influence of attack profiles on the recommendation results is reduced through adjusting similarities among users.Then,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature matrix.Finally,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization model.Experimental results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness.
文摘This paper gives the rank of matrix and equalities and inequalities of the difference number of non-zero eigenvalue, and discuss the equivalent description of multi angle of equalities for upper and lower bounds of the inequality.
基金Supported by the National Natural Science Foundation of China(No.61105047)the National High Technology Research and Development Program of China(No.2015IM030300)+1 种基金the Science and Technology Committee of Shanghai Support Project(No.14JC1405800)the Project of the Central Universities Fundamental Research of Tongji University
文摘There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection that can provide rigorous and quantitative protection. Concerning the application of differential privacy in social networks,this paper analyzes current trends of research and provides some background information including privacy protection standards and noise mechanisms.Focusing on the privacy protection of social network data publishing,a graph-publishing model is designed to provide differential privacy in social networks via three steps: Firstly,according to the features of social network where two nodes that possess certain common properties are associated with a higher probability,a raw graph is divided into several disconnected sub-graphs,and correspondingly dense adjacent matrixes and the number of bridges are obtained. Secondly,taking the advantage of quad-trees,dense region exploration of the adjacent matrixes is conducted. Finally,using an exponential mechanism and leaf nodes of quad-trees,an adjacent matrix of the sanitized graph is reconstructed. In addition,a set of experiments is conducted to evaluate its feasibility,availability and strengths using three analysis techniques: degree distribution,shortest path,and clustering coefficients.
文摘This review will focus on the more abundant eggshell specific matrix proteins localized in the chicken eggshell (cuticle layer eggshell matrix and shell membranes) that are involved in eggshell mineralization and protecting the egg against microbial contamination, including ovocalyxin-36, ovocleidin-17, ovocalyxin-32 and ovocalyxin-25. Further understanding of these proteins and their mechanisms in egg defence could lead to the development of novel neutraceuticals for human health, additives to animal feed for healthy flocks, or enhanced eggs for human consumption.
文摘Higher mathematics is more extensive, profound and abstract than elementary mathematics; it is the development and sublimation of elementary mathematics. They have a deep connection, determinant and matrix theories originated in Elementary Mathematics, in tum, they also can be used as tools to solve related problems, and they have important roles in guiding the study of elementary mathematics. This paper will introduce the methods of solving some recursive sequence problems by constructing determinants and matrices.
文摘This paper first elaborates the research situation and progress of Laplace characteristics and the eigenvalues value of graphs. The second is given an upper bound of characteristic value of a kind of special graph using the properties of similar matrices. At the same time, a new upper bound of Laplace characteristic values are given using properties of Laplace matrix and the similarity matrix, to improve the existing results. Then, we use the example of the upper bound of our results are more precise than some previous results. Finally the use Laplace non- zero eigenvalues of graph properties to give a bound expressions using the degree of square with a number of edges and the graph of the number, number of connected component expression map, it reflected the relationship between eigenvalues and the amount of Laplace.
文摘With common borders of the population, total area, and GDP (PPP-based) of Economic Cooperation Organization (ECO) member states are estimated as 416 million persons, 7.9 million m2, and US$2.7 trillion respectively (2010 data). Although heterogeneous in the extent, there is economic development, overall, with serious energy and transport-transit relations among countries that is reflected in growing trade turnover year-by-year. However, there are still rather unused resources and capacity in such areas of cooperation among countries as exchange of energy, transport services, agricultural and industrial goods, use of opportunities for tourism, promoting investment and innovation processes and other areas. Certainly, maximum and optimal use of these resources calls for availability of analytical means capable of accounting for relations both within member states and among them. The implementation of computable general equilibrium (CGE) modeling in each member state would thus be of great significance in resolution of these problems both in terms of accounting for input-output linkages within the countries as well as enabling impact of main trading partners and goods and services among countries. The analysis carried out indicates that there are a number of problems in application of CGE model in most of the member states. As such, input-output tables are not compiled in some countries, while in others despite the fact that these tables are compiled, there are no attempts to build the model, yet in other countries, even if the CGE model is implemented, there are difficulties in taking into account the real results in the face of serious problems related to improving national accounts system database. Summarizing these problems, it is possible to conclude that to ensure the application of a CGE model,there is a great need to work out procedures of compilation of a social accounts matrix (SAM) that lies on the basis of this model, for which the relevant statistics of a member state must be improved. Considering the above-mentioned, the presented research, makes procedures and proposals on compilation of SAM, improves statistical data for researching the extent of application of CGE Model in ECO member states, and identifies the degree of availability and organization of relevant data to develop input-output tables and respective SAM.