Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC...Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.展开更多
In 2022,four earthquakes with M_(S)≥6.0 including the Menyuan M_(S)6.9 and Luding M_(S)6.8 earthquakes occurred in the North-South Seismic Zone(NSSZ),which demonstrated high and strong seismicity.Pattern Informatics(...In 2022,four earthquakes with M_(S)≥6.0 including the Menyuan M_(S)6.9 and Luding M_(S)6.8 earthquakes occurred in the North-South Seismic Zone(NSSZ),which demonstrated high and strong seismicity.Pattern Informatics(PI)method,as an effective long and medium term earthquake forecasting method,has been applied to the strong earthquake forecasting in Chinese mainland and results have shown the positive performance.The earthquake catalog with magnitude above M_(S)3.0 since 1970 provided by China Earthquake Networks Center was employed in this study and the Receiver Operating Characteristic(ROC)method was applied to test the forecasting efficiency of the PI method in each selected region related to the North-South Seismic Zone systematically.Based on this,we selected the area with the best ROC testing result and analyzed the evolution process of the PI hotspot map reflecting the small seismic activity pattern prior to the Menyuan M_(S)6.9 and Luding M_(S)6.8 earthquakes.A“forward”forecast for the area was carried out to assess seismic risk.The study shows the following.1)PI forecasting has higher forecasting efficiency in the selected study region where the difference of seismicity in any place of the region is smaller.2)In areas with smaller differences of seismicity,the activity pattern of small earthquakes prior to the Menyuan M_(S)6.9 and Luding M_(S)6.8 earthquakes can be obtained by analyzing the spatio-temporal evolution process of the PI hotspot map.3)The hotspot evolution in and around the southern Tazang fault in the study area is similar to that prior to the strong earthquakes,which suggests the possible seismic hazard in the future.This study could provide some ideas to the seismic hazard assessment in other regions with high seismicity,such as Japan,Californi,Turkey,and Indonesia.展开更多
Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alter...Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.展开更多
An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes a...An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.展开更多
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ...During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.展开更多
The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to st...The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface.展开更多
This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countr...This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method.展开更多
A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the res...A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the resulting decision process is modeled by a suitable scalar transformation (utility function). Each n-tuple of von Neumann-Morgenstern utilities is transformed into a nonnegative scalar value between 0 and 1. Any n-tuple yielding a largest scalar value determines an SE, which is always a pure strategy profile. SEs can be computed much faster than Nash equilibria, for example;and the decision criterion need not be based on the players’ selfishness. To illustrate the SE, we define a compromise equilibrium, establish its Pareto optimality, and present examples comparing it to other solution concepts.展开更多
This paper is an attempt to work out a compromise allocation to construct combined ratio estimates under multivariate double sampling design in presence of non-response when the population mean of the auxiliary variab...This paper is an attempt to work out a compromise allocation to construct combined ratio estimates under multivariate double sampling design in presence of non-response when the population mean of the auxiliary variable is unknown. The problem has been formulated as a multi-objective integer non-linear programming problem. Two solution procedures are developed using goal programming and fuzzy programming techniques. A numerical example is also worked out to illustrate the computational details. A comparison of the two methods is also carried out.展开更多
The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This st...The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.展开更多
<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more ser...<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more serious among patients suffering from chronic disease and those who are on treatment which may af-fect their defense mechanism or immune-compromised patients who become more vulnerable to complications of COVID-19, and at high risk for morbidity and mortality with any bacterial or viral illness. <strong>Method: </strong>A retrospective, non-experimental research design was applied with a quantitative approach among patients with COVID-19 who were admitted to COVID-19 department at AVH with a total of 72 patients. Data were extracted from a patients’ elec-tronic medical record. <strong>Results:</strong> During COVID-19 outbreak 72 patients were admitted to COVID department at AVH, 54.2% were female and 33% of study participants were from Gaza governorate followed by Jerusalem 27%. Most participants 34.7% had first clinic visit after two days from the onset of COVID-19 symptoms. 45.8% were discharged to home while 13.9% died. All inflammatory markers that include ferritin, C-RP, IL-6 and D-dimer are in-creasing in all patients that were admitted to hospital;IL-6 and D-dimer were significant inflammatory markers in relation to the mortality rate. The study found the risk of mortality with IL-6 mean (218.5), and D-dimer mean (12). Furthermore there was a relation between increased risk of mortality and im-mune comprised. <strong>Conclusion:</strong> Mortality rate increased among COVID-19 pa-tients when IL-6 was higher than 218.5 and D-dimer higher than 12, and there was a relationship between increased risk of mortality and immune comprised.展开更多
Objective: The authors report a rare case of giant thoracic meningocele causing acute respiratory compromise, treated with a ventriculoperitoneal shunt. Case Report: We report the case of a 36-year-old with severe sco...Objective: The authors report a rare case of giant thoracic meningocele causing acute respiratory compromise, treated with a ventriculoperitoneal shunt. Case Report: We report the case of a 36-year-old with severe scoliosis status post repair over a decade ago, neurofibromatosis type I, and a known large meningocele in the left thoracic cavity, presenting with new acute respiratory compromise. She was taken to the operating room for a lumboperitoneal shunt, but the operation was aborted due to her severe spinal deformity. Two days later, she successfully underwent a procedure for ventriculoperitoneal shunt placement. Upon discharge a week later, the patient was hemodynamically stable, able to move all extremities with good strength, and demonstrated improved oxygenation. In the following 7 months, the patient demonstrated continued minimal requirement on nasal cannula, and MRI showed a stable left thoracic giant meningocele. Conclusion: Ventriculoperitoneal shunting is a method of treating and stabilizing acutely symptomatic giant meningoceles.展开更多
After six rounds of tough bargaining,Russia and the North Atlantic Treaty Or-ganization reached on May 14 an agreement,officially known as a“FoundingAct on Mutual Relations.Co-operation and Scurity between NATO and t...After six rounds of tough bargaining,Russia and the North Atlantic Treaty Or-ganization reached on May 14 an agreement,officially known as a“FoundingAct on Mutual Relations.Co-operation and Scurity between NATO and the RUS-sian Federation".The document was formally signed by Russian President BorisYeltsin on May 27 in Paris together with the leaders of the 16 NATO memberstates.The event signifies a temporary compromise between the two sides over theNATO’s eastward expansion.Soon after the accord was reached.展开更多
This paper, for the goal of revealing the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods, clarifies not only the background behind Japan's decis...This paper, for the goal of revealing the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods, clarifies not only the background behind Japan's decision of terminating development aid loan to China, but also the reason why the Chinese government decided to accept it. When countries agree on the need to collaborate but are in conflict regarding the specific method, like the case of Japan-China conflict over development aid, one country must always compromise regarding the specific method of coordination. This situation is known as the Battle of the Sexes (BoS) in game theory. It has been believed that countries do not have the incentive to withdraw from the initial agreement under such a situation. This case study, however, reveals that it is not always true. From the analysis of this study, it will be concluded that the agreement reached in the initial negotiation would not be always stable even in a situation where countries agree in general but disagree on coordination methods. In this case, "institution" and "consensus" are pointed out as incentives to make countries accept a specific coordination method.展开更多
The aim of this paper is to reveal the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods. When players agree on the need to collaborate but are in c...The aim of this paper is to reveal the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods. When players agree on the need to collaborate but are in conflict regarding the specific method, one player must always compromise. This situation is known as the Battle of the Sexes in game theory. It has ever been believed that if an agreement is reached under such circumstances, the players do not have the incentive to withdraw from the agreement. However, this study shows that this belief is not always true if the players were able to revise the outcome of their negotiations later. The wide-ranging fields use game theories for their analysis frameworks to analyze the success or failure of coordination. However, comparing with the possibility of betrayal illustrated as a well-known Prisoner Dilemma, it has been rare to discuss conflict regarding the specific method of coordination, although such situations are often observed in today's interdependent real world. The repeated Battle of the Sexes games presented in this study would be a useful framework to analyze conflict regarding the specific method of coordination.展开更多
文摘Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.
基金the National Natural Science Foundation of China Study on the Theory and Methods of Deterministic-Probabilistic(No.U2039207)the National Key Research and Development Program of China‘CSEP China in the Context of China Seismic Experimental Site’(No.2018YFE0109700).
文摘In 2022,four earthquakes with M_(S)≥6.0 including the Menyuan M_(S)6.9 and Luding M_(S)6.8 earthquakes occurred in the North-South Seismic Zone(NSSZ),which demonstrated high and strong seismicity.Pattern Informatics(PI)method,as an effective long and medium term earthquake forecasting method,has been applied to the strong earthquake forecasting in Chinese mainland and results have shown the positive performance.The earthquake catalog with magnitude above M_(S)3.0 since 1970 provided by China Earthquake Networks Center was employed in this study and the Receiver Operating Characteristic(ROC)method was applied to test the forecasting efficiency of the PI method in each selected region related to the North-South Seismic Zone systematically.Based on this,we selected the area with the best ROC testing result and analyzed the evolution process of the PI hotspot map reflecting the small seismic activity pattern prior to the Menyuan M_(S)6.9 and Luding M_(S)6.8 earthquakes.A“forward”forecast for the area was carried out to assess seismic risk.The study shows the following.1)PI forecasting has higher forecasting efficiency in the selected study region where the difference of seismicity in any place of the region is smaller.2)In areas with smaller differences of seismicity,the activity pattern of small earthquakes prior to the Menyuan M_(S)6.9 and Luding M_(S)6.8 earthquakes can be obtained by analyzing the spatio-temporal evolution process of the PI hotspot map.3)The hotspot evolution in and around the southern Tazang fault in the study area is similar to that prior to the strong earthquakes,which suggests the possible seismic hazard in the future.This study could provide some ideas to the seismic hazard assessment in other regions with high seismicity,such as Japan,Californi,Turkey,and Indonesia.
基金supported by the Humanities and Social Sciences Foundation of Ministry of Education of China(09YJC630229)Scientific Research Foundation of Guangxi University for Nationalities for Talent Introduction(200702YZ01)Science and Technology Project of State Ethnic Affairs Commission(09GX03)
文摘Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.
基金supported by the National Natural Science Foundation of China (7087111770571086)
文摘An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.
文摘During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.
基金Supported by the Outstanding Overseas Research Team Project of the Chinese Academy of Sciences, the National Natural Science Foundation of China (20221603), and the Research Fund of Key Lab for Nanomaterials, Ministry of Education, China (2006-1).
文摘The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface.
文摘This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method.
文摘A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the resulting decision process is modeled by a suitable scalar transformation (utility function). Each n-tuple of von Neumann-Morgenstern utilities is transformed into a nonnegative scalar value between 0 and 1. Any n-tuple yielding a largest scalar value determines an SE, which is always a pure strategy profile. SEs can be computed much faster than Nash equilibria, for example;and the decision criterion need not be based on the players’ selfishness. To illustrate the SE, we define a compromise equilibrium, establish its Pareto optimality, and present examples comparing it to other solution concepts.
文摘This paper is an attempt to work out a compromise allocation to construct combined ratio estimates under multivariate double sampling design in presence of non-response when the population mean of the auxiliary variable is unknown. The problem has been formulated as a multi-objective integer non-linear programming problem. Two solution procedures are developed using goal programming and fuzzy programming techniques. A numerical example is also worked out to illustrate the computational details. A comparison of the two methods is also carried out.
文摘The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.
文摘<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more serious among patients suffering from chronic disease and those who are on treatment which may af-fect their defense mechanism or immune-compromised patients who become more vulnerable to complications of COVID-19, and at high risk for morbidity and mortality with any bacterial or viral illness. <strong>Method: </strong>A retrospective, non-experimental research design was applied with a quantitative approach among patients with COVID-19 who were admitted to COVID-19 department at AVH with a total of 72 patients. Data were extracted from a patients’ elec-tronic medical record. <strong>Results:</strong> During COVID-19 outbreak 72 patients were admitted to COVID department at AVH, 54.2% were female and 33% of study participants were from Gaza governorate followed by Jerusalem 27%. Most participants 34.7% had first clinic visit after two days from the onset of COVID-19 symptoms. 45.8% were discharged to home while 13.9% died. All inflammatory markers that include ferritin, C-RP, IL-6 and D-dimer are in-creasing in all patients that were admitted to hospital;IL-6 and D-dimer were significant inflammatory markers in relation to the mortality rate. The study found the risk of mortality with IL-6 mean (218.5), and D-dimer mean (12). Furthermore there was a relation between increased risk of mortality and im-mune comprised. <strong>Conclusion:</strong> Mortality rate increased among COVID-19 pa-tients when IL-6 was higher than 218.5 and D-dimer higher than 12, and there was a relationship between increased risk of mortality and immune comprised.
文摘Objective: The authors report a rare case of giant thoracic meningocele causing acute respiratory compromise, treated with a ventriculoperitoneal shunt. Case Report: We report the case of a 36-year-old with severe scoliosis status post repair over a decade ago, neurofibromatosis type I, and a known large meningocele in the left thoracic cavity, presenting with new acute respiratory compromise. She was taken to the operating room for a lumboperitoneal shunt, but the operation was aborted due to her severe spinal deformity. Two days later, she successfully underwent a procedure for ventriculoperitoneal shunt placement. Upon discharge a week later, the patient was hemodynamically stable, able to move all extremities with good strength, and demonstrated improved oxygenation. In the following 7 months, the patient demonstrated continued minimal requirement on nasal cannula, and MRI showed a stable left thoracic giant meningocele. Conclusion: Ventriculoperitoneal shunting is a method of treating and stabilizing acutely symptomatic giant meningoceles.
文摘After six rounds of tough bargaining,Russia and the North Atlantic Treaty Or-ganization reached on May 14 an agreement,officially known as a“FoundingAct on Mutual Relations.Co-operation and Scurity between NATO and the RUS-sian Federation".The document was formally signed by Russian President BorisYeltsin on May 27 in Paris together with the leaders of the 16 NATO memberstates.The event signifies a temporary compromise between the two sides over theNATO’s eastward expansion.Soon after the accord was reached.
文摘This paper, for the goal of revealing the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods, clarifies not only the background behind Japan's decision of terminating development aid loan to China, but also the reason why the Chinese government decided to accept it. When countries agree on the need to collaborate but are in conflict regarding the specific method, like the case of Japan-China conflict over development aid, one country must always compromise regarding the specific method of coordination. This situation is known as the Battle of the Sexes (BoS) in game theory. It has been believed that countries do not have the incentive to withdraw from the initial agreement under such a situation. This case study, however, reveals that it is not always true. From the analysis of this study, it will be concluded that the agreement reached in the initial negotiation would not be always stable even in a situation where countries agree in general but disagree on coordination methods. In this case, "institution" and "consensus" are pointed out as incentives to make countries accept a specific coordination method.
文摘The aim of this paper is to reveal the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods. When players agree on the need to collaborate but are in conflict regarding the specific method, one player must always compromise. This situation is known as the Battle of the Sexes in game theory. It has ever been believed that if an agreement is reached under such circumstances, the players do not have the incentive to withdraw from the agreement. However, this study shows that this belief is not always true if the players were able to revise the outcome of their negotiations later. The wide-ranging fields use game theories for their analysis frameworks to analyze the success or failure of coordination. However, comparing with the possibility of betrayal illustrated as a well-known Prisoner Dilemma, it has been rare to discuss conflict regarding the specific method of coordination, although such situations are often observed in today's interdependent real world. The repeated Battle of the Sexes games presented in this study would be a useful framework to analyze conflict regarding the specific method of coordination.
文摘对计及经济、环境因素的电力系统发电调度问题(Economic Environmental Dispatching,EED)进行研究,提出一种采用改进多目标灰狼算法的发电调度规划方案。构建基于发电燃料成本、污染气体排放量和节点电压偏移量等指标的多目标EED模型,并采用改进的多目标灰狼算法进行求解,以得到更优的Pareto前沿和折中解。设计多度量自适应FCM算法对灰狼算法(Gray Wolf Algorithm,GWA)种群多样性进行分析,重新定义狼群层级结构和Pareto前沿规模控制策略,并在此基础上提出反向学习和变异进化策略,以提升GWA全局收敛性能。仿真结果表明,改进的GWA具有优秀全局寻优能力,而且基于改进多目标灰狼算法得到的Pareto前沿和折中解更具可行性和优越性。