期刊文献+
共找到6,470篇文章
< 1 2 250 >
每页显示 20 50 100
Morbi-Mortality Linked to Unsafe Abortions—Difficulties in Accessing Safe Abortions in Cameroon: Meta-Analysis and Systematic Review
1
作者 Florent Ymele Fouelifack Mosman Anyimbi Ofeh +5 位作者 Jenny Ornella Manewoun Nsen Abeng Christophe Saha Lontsi Mvong Vendeline Amaelle Goretti Guy Sadeu Wafeu Robinson Enow Mbu 《Open Journal of Obstetrics and Gynecology》 CAS 2023年第2期342-359,共18页
Background: Unsafe abortions are one of the leading causes of maternal mortality, especially in developing countries. In Cameroon, the maternal mortality rate remains high, and the scarcity of data on abortions leads ... Background: Unsafe abortions are one of the leading causes of maternal mortality, especially in developing countries. In Cameroon, the maternal mortality rate remains high, and the scarcity of data on abortions leads to a lack of solid evidence to advocate on the extent of the abortions related complications. Our objective was to evaluate the unsafe abortions related complications, and to assess the difficulties of accessing safe abortions in our setting. Methods: We carried out a meta-analytic and systematic review in the biomedical databases MEDLINE (Pubmed), Google Scholar and African Journal Online concerning unsafe abortions and/or difficulties in accessing safe abortions in Cameroon. The keywords used for the search are seen in table I. Selection of studies was simultaneously done by two authors. Data were extracted through a form designed on Google Form. We used a random-effect model for proportion estimation, and The I<sup>2</sup> and Q statistics to assess the extent of heterogeneity. Results: A total of 430 studies were identified, from which 28 were included and analysed. About 5% (95% CI: 3 - 7) of unsafe abortions leads to death. The contribution of unsafe abortions in maternal deaths was 23% (95% CI: 20 - 27). The rate of severe bleeding and/or anemia were 40% (95% CI: 18 - 63) and the rate of infection was 17% (95% CI: 7 - 28), dominated by pelvic infections, pelviperitonitis, severe sepsis, and septic shock. Case reports described uterine perforations, uterine rupture during the following pregnancy. Abortion was performed in the practitioner’s or patient’s home in 41.4% of cases, in a health center in 35.1% of cases, in a private clinic in 21.2% of cases, drugs selling places and in traditional healer clinics. The restriction of abortion laws, the stigma surrounding abortion and its consequences at any level of the society, lead to the underreporting of unsafe abortions and a deep reluctance to advocate for safe abortion services. Conclusion: The strengthening of awareness campaigns for provider behavior change communication, family planning, the de-stigmatization of abortions, the training of health personnel in post-abortion care, a multidisciplinary and multicentric action would contribute to the reduction in morbidity and mortality due to abortions. 展开更多
关键词 Morbi-Mortality Unsafe DIFFICULTIES Access SAFE ABORTION Cameroon
下载PDF
Cluster-Based Massive Access for Massive MIMO Systems
2
作者 Shiyu Liang Wei Chen +2 位作者 Zhongwen Sun Ao Chen Bo Ai 《China Communications》 SCIE CSCD 2024年第1期24-33,共10页
Massive machine type communication aims to support the connection of massive devices,which is still an important scenario in 6G.In this paper,a novel cluster-based massive access method is proposed for massive multipl... Massive machine type communication aims to support the connection of massive devices,which is still an important scenario in 6G.In this paper,a novel cluster-based massive access method is proposed for massive multiple input multiple output systems.By exploiting the angular domain characteristics,devices are separated into multiple clusters with a learned cluster-specific dictionary,which enhances the identification of active devices.For detected active devices whose data recovery fails,power domain nonorthogonal multiple access with successive interference cancellation is employed to recover their data via re-transmission.Simulation results show that the proposed scheme and algorithm achieve improved performance on active user detection and data recovery. 展开更多
关键词 compressive sensing dictionary learning multiuser detection random access
下载PDF
Resource Allocation for Cognitive Network Slicing in PD-SCMA System Based on Two-Way Deep Reinforcement Learning
3
作者 Zhang Zhenyu Zhang Yong +1 位作者 Yuan Siyu Cheng Zhenjie 《China Communications》 SCIE CSCD 2024年第6期53-68,共16页
In this paper,we propose the Two-way Deep Reinforcement Learning(DRL)-Based resource allocation algorithm,which solves the problem of resource allocation in the cognitive downlink network based on the underlay mode.Se... In this paper,we propose the Two-way Deep Reinforcement Learning(DRL)-Based resource allocation algorithm,which solves the problem of resource allocation in the cognitive downlink network based on the underlay mode.Secondary users(SUs)in the cognitive network are multiplexed by a new Power Domain Sparse Code Multiple Access(PD-SCMA)scheme,and the physical resources of the cognitive base station are virtualized into two types of slices:enhanced mobile broadband(eMBB)slice and ultrareliable low latency communication(URLLC)slice.We design the Double Deep Q Network(DDQN)network output the optimal codebook assignment scheme and simultaneously use the Deep Deterministic Policy Gradient(DDPG)network output the optimal power allocation scheme.The objective is to jointly optimize the spectral efficiency of the system and the Quality of Service(QoS)of SUs.Simulation results show that the proposed algorithm outperforms the CNDDQN algorithm and modified JEERA algorithm in terms of spectral efficiency and QoS satisfaction.Additionally,compared with the Power Domain Non-orthogonal Multiple Access(PD-NOMA)slices and the Sparse Code Multiple Access(SCMA)slices,the PD-SCMA slices can dramatically enhance spectral efficiency and increase the number of accessible users. 展开更多
关键词 cognitive radio deep reinforcement learning network slicing power-domain non-orthogonal multiple access resource allocation
下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
4
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
关键词 multi-source geological data SQL Server accessing data through network
下载PDF
A TDMA Approach for OFDM-Based Multiuser RadCom Systems 被引量:2
5
作者 Yixuan Huang Su Hu Gang Wu 《China Communications》 SCIE CSCD 2023年第5期93-103,共11页
This paper is focused on the multiuser implementation of fusion of radar and communication(RadCom)in internet-of-vehicles(IoV)scenarios.Traditional time-division multiple access(TDMA)technology degrades the velocity d... This paper is focused on the multiuser implementation of fusion of radar and communication(RadCom)in internet-of-vehicles(IoV)scenarios.Traditional time-division multiple access(TDMA)technology degrades the velocity detection performance of orthogonal frequency-division multiplexing(OFDM)-based RadCom systems.We propose a new TDMA approach for OFDM-based RadCom systems,where multiuser communication and radar detection are completed synchronously.We consider a continuous-wave TDMA OFDM structure in which random user data or Zadoff-Chu(ZC)sequences are transmitted in one symbol duration to ensure detection performance.As an application of interference cancellation method,user data demodulation and environment sensing can be simultaneously accomplished by our proposed approach.We carry out numerical evaluation and show wireless communication and radar detection performance over the continuous-wave TDMA OFDM-based RadCom approach. 展开更多
关键词 RadCom time-division multiple access(TDMA) orthogonal frequency-division multiplexing(OFDM) internet-of-vehicles(IoV)
下载PDF
Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation 被引量:1
6
作者 Yuzheng Yang Zhe Tu +1 位作者 Ying Liu Huachun Zhou 《Computers, Materials & Continua》 SCIE EI 2023年第12期3163-3184,共22页
Currently,data security and privacy protection are becoming more and more important.Access control is a method of authorization for users through predefined policies.Token-based access control(TBAC)enhances the manage... Currently,data security and privacy protection are becoming more and more important.Access control is a method of authorization for users through predefined policies.Token-based access control(TBAC)enhances the manageability of authorization through the token.However,traditional access control policies lack the ability to dynamically adjust based on user access behavior.Incorporating user reputation evaluation into access control can provide valuable feedback to enhance system security and flexibility.As a result,this paper proposes a blockchain-empowered TBAC system and introduces a user reputation evaluation module to provide feedback on access control.The TBAC system divides the access control process into three stages:policy upload,token request,and resource request.The user reputation evaluation module evaluates the user’s token reputation and resource reputation for the token request and resource request stages of the TBAC system.The proposed system is implemented using the Hyperledger Fabric blockchain.The TBAC system is evaluated to prove that it has high processing performance.The user reputation evaluation model is proved to be more conservative and sensitive by comparative study with other methods.In addition,the security analysis shows that the TBAC system has a certain anti-attack ability and can maintain stable operation under the Distributed Denial of Service(DDoS)attack environment. 展开更多
关键词 Access control reputation evaluation feedback blockchain
下载PDF
Morbidity and Mortality Linked to Unsafe Abortions in Cameroon—Difficulties in Accessing Safe Abortions: Systematic Review and Meta-Analysis. A Study Proposal
7
作者 Florent Ymele Fouelifack Ako William Takang +4 位作者 Mosman Anyimbi Ofeh Jenny Ornella Manewoun Nsen Abeng Guy Sadeu Wafeu Christophe Lontsi Saha 《Open Journal of Obstetrics and Gynecology》 CAS 2022年第10期1102-1112,共11页
Unsafe abortions constitute a public health problem. It is one of the causes of maternal mortality in the world and particularly in developing countries. Despite the progress made, maternal mortality remains high in C... Unsafe abortions constitute a public health problem. It is one of the causes of maternal mortality in the world and particularly in developing countries. Despite the progress made, maternal mortality remains high in Cameroon. The scarcity and disparity of data on abortions lead to a lack of strong evidence to advocate to decision-makers on the extent of the problems associated with abortions in Cameroon. Our objective is to estimate the rates of mortalities and complications related to unsafe abortions, as well as the difficulties of accessing safe abortions in Cameroon. We will carry out a systematic and meta-analytical review in the biomedical databases MEDLINE (Pubmed), Google Scholar and African Journal Online (AJOL) concerning unsafe abortions and/or difficulties in accessing safe abortions in Cameroon, without date or language restriction. Gray literature will be also consulted. Two authors will simultaneously select the studies and data extraction will be done using a Google Form. Proportions will be estimated on a random-effect model. The I<sup>2</sup> and Q statistics will be used to assess the extent of heterogeneity across the studies. The outcome of both the quantitative and qualitative parts of the study will be commented. Death and morbidity due to abortions can be prevented. A concerted multidisciplinary and multicentric action would be essential. 展开更多
关键词 MORTALITY MORBIDITY DIFFICULTIES Access Unsafe Abortion Cameroon
下载PDF
EduASAC:A Blockchain-Based Education Archive Sharing and Access Control System
8
作者 Ronglei Hu Chuce He +4 位作者 Yaping Chi Xiaoyi Duan Xiaohong Fan Ping Xu Wenbin Gao 《Computers, Materials & Continua》 SCIE EI 2023年第12期3387-3422,共36页
In the education archive sharing system,when performing homomorphic ciphertext retrieval on the storage server,there are problems such as low security of shared data,confusing parameter management,and weak access cont... In the education archive sharing system,when performing homomorphic ciphertext retrieval on the storage server,there are problems such as low security of shared data,confusing parameter management,and weak access control.This paper proposes an Education Archives Sharing and Access Control(EduASAC)system to solve these problems.The system research goal is to realize the sharing of security parameters,the execution of access control,and the recording of system behaviors based on the blockchain network,ensuring the legitimacy of shared membership and the security of education archives.At the same time,the system can be combined with most homomorphic ciphertext retrieval schemes running on the storage server,making the homomorphic ciphertext retrieval mechanism controllable.This paper focuses on the blockchain access control framework and specifically designs smart contracts that conform to the business logic of the EduASAC system.The former adopts a dual-mode access control mechanism combining Discretionary Access Control(DAC)and Mandatory Access Control(MAC)and improves the tagging mode after user permission verification based on the Authentication and Authorization for Constrained Environments(ACE)authorization framework of Open Authorization(OAuth)2.0;the latter is used in the system to vote on nodes to join requests,define access control policies,execute permission verification processes,store,and share system parameters,and standardize the behavior of member nodes.Finally,the EduASAC system realizes the encryption,storage,retrieval,sharing,and access control processes of education archives.To verify the performance of the system,simulation experiments were conducted.The results show that the EduASAC system can meet the high security needs of education archive sharing and ensure the system’s high throughput,low latency,fast decision-making,and fine-grained access control ability. 展开更多
关键词 Blockchain data security access control smart contract
下载PDF
A Privacy-Preserving System Design for Digital Presence Protection
9
作者 Eric Yocam Ahmad Alomari +1 位作者 Amjad Gawanmeh Wathiq Mansoor 《Computers, Materials & Continua》 SCIE EI 2023年第5期3091-3110,共20页
A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a... A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a privacy-preserving model.The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameterbased access control protection mechanism for digital privacy preservation.The enhanced capability combines multiple access control parameters:facial expression,resource,environment,location,and time.The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.The findings resulted in different facial expressions successfully triggering a person’s face to be blurred and a person’s privacy when using a real-time video conferencing service captured from a webcam or virtual webcam.A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system.A series of experiments exercising the enhanced,real-time multi-parameterbased system was shown as a viable path forward for preserving a person’s privacy while using a webcam or virtual webcam to capture,stream,and store videos. 展开更多
关键词 Attribute-based access control authentication AUTHORIZATION BIOMETRICS facial recognition IDENTITY PRIVACY machine learning deep learning
下载PDF
Multi-Objective Optimization for NOMA-Based Mobile Edge Computing Offloading by Maximizing System Utility
10
作者 Hong Qin Haitao Du +2 位作者 Huahua Wang Li Su Yunfeng Peng 《China Communications》 SCIE CSCD 2023年第12期156-165,共10页
Mobile Edge Computing(MEC)is a technology for the fifth-generation(5G)wireless communications to enable User Equipment(UE)to offload tasks to servers deployed at the edge of network.However,taking both delay and energ... Mobile Edge Computing(MEC)is a technology for the fifth-generation(5G)wireless communications to enable User Equipment(UE)to offload tasks to servers deployed at the edge of network.However,taking both delay and energy consumption into consideration in the 5G MEC system is usually complex and contradictory.Non-orthogonal multiple access(NOMA)enable more UEs to offload their computing tasks to MEC servers using the same spectrum resources to enhance the spectrum efficiency for 5G,which makes the problem even more complex in the NOMA-MEC system.In this work,a system utility maximization model is present to NOMA-MEC system,and two optimization algorithms based on Newton method and greedy algorithm respectively are proposed to jointly optimize the computing resource allocation,SIC order,transmission time slot allocation,which can easily achieve a better trade-off between the delay and energy consumption.The simulation results prove that the proposed method is effective for NOMA-MEC systems. 展开更多
关键词 computation offloading mobile edge computing non-orthogonal multiple access resource allocation
下载PDF
Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems:A Zero-Sum Game Approach
11
作者 Yanqiu Chen Xiaopeng Ji 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期531-553,共23页
Non-orthogonal multiple access technology(NOMA),as a potentially promising technology in the 5G/B5G era,suffers fromubiquitous security threats due to the broadcast nature of the wirelessmedium.In this paper,we focus ... Non-orthogonal multiple access technology(NOMA),as a potentially promising technology in the 5G/B5G era,suffers fromubiquitous security threats due to the broadcast nature of the wirelessmedium.In this paper,we focus on artificial-signal-assisted and relay-assisted secure downlink transmission schemes against external eavesdropping in the context of physical layer security,respectively.To characterize the non-cooperative confrontation around the secrecy rate between the legitimate communication party and the eavesdropper,their interactions are modeled as a two-person zero-sum game.The existence of the Nash equilibrium of the proposed game models is proved,and the pure strategyNash equilibriumand mixed-strategyNash equilibriumprofiles in the two schemes are solved and analyzed,respectively.The numerical simulations are conducted to validate the analytical results,and showthat the two schemes improve the secrecy rate and further enhance the physical layer security performance of NOMA systems. 展开更多
关键词 Non-orthogonalmultiple access technology(NOMA) physical layer security game theory nash equilibrium zerosum game
下载PDF
Malaria Illness and Accessing Healthcare in an African Indigenous Population: A Qualitative Study of the Lived Experiences of Uganda’s Batwa in Kanungu District
12
作者 Didacus B. Namanya Everd M. Bikaitwoha +4 位作者 Lea Berrang-Ford Shuiaib Lwasa Charity Kesande Sabastian Twesigomwe Ronald Nyakol 《Journal of Biosciences and Medicines》 CAS 2023年第5期212-232,共21页
Purpose: Malaria continues to be a public health threat, especially in sub-Saharan Africa, including Uganda. While Batwa Indigenous People (IPs) face a higher burden of malaria, there is limited understanding of their... Purpose: Malaria continues to be a public health threat, especially in sub-Saharan Africa, including Uganda. While Batwa Indigenous People (IPs) face a higher burden of malaria, there is limited understanding of their malaria-lived experiences. We assessed and characterized malaria illness and accessing healthcare lived experiences of the Batwa in Kanungu district to inform contextually and culturally appropriate public health interventions. Methods: An exploratory qualitative study was conducted in 5 Batwa settlements where 5 Focus Group Discussions (n = 36) and 13 Key Informant Interviews (n = 13) were held. Data were collected using printed guides and voice recorders in April 2018. Transcripts from the data that captured the lived experiences of the symptoms, prevention, treatment and barriers to accessing formal healthcare services were applied to Atlas.ti a qualitative data analysis software and condensed into codes, categories, and themes. Results: Many Batwa have experienced malaria in their households, and they know its causes and risk factors, like not sleeping under insecticide-treated mosquito nets (ITNs), living near water bodies, prevention measures like the use of ITNs, and vector management. The lived experiences demonstrate malaria management by an Indigenous population in a rural setting and comprised detecting malaria symptoms, use of herbs as first line of treatment, buying medicines from drug shops, and village health teams (VHTs) treatment. For many Batwa accessing formal healthcare is normally a second option. Barriers for malaria treatment included: long distances to health facilities, geographically difficult terrain, economic constraints, irregular health outreaches, and stockouts of malaria medicines at health facilities. Conclusion: This study characterized Batwa’s malaria illness lived experiences and access to healthcare in rural remote settings. These experiences are essential in appreciating the ways in which Indigenous populations understand and manage common illnesses and how appropriate policies and interventions can be developed. 展开更多
关键词 accessing Healthcare Batwa IPs Lived Experiences Malaria Illness Uganda
下载PDF
User scheduling and power allocation for downlink multi-cell multi-carrier NOMA systems
13
作者 Abuzar B.M.Adam Xiaoyu Wan Zhengqiang Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期252-263,共12页
In Non-Orthogonal Multiple Access(NOMA),the best way to fully exploit the benefits of the system is the efficient resource allocation.For the NOMA power domain,the allocation of power and spectrum require solving the ... In Non-Orthogonal Multiple Access(NOMA),the best way to fully exploit the benefits of the system is the efficient resource allocation.For the NOMA power domain,the allocation of power and spectrum require solving the mixed-integer nonlinear programming NP-hard problem.In this paper,we investigate user scheduling and power allocation in Multi-Cell Multi-Carrier NOMA(MCMC-NOMA)networks.To achieve that,we consider Weighted Sum Rate Maximization(WSRM)and Weighted Sum Energy Efficiency Maximization(WSEEM)problems.First,we tackle the problem of user scheduling for fixed power using Fractional Programming(FP),the Lagrange dual method,and the decomposition method.Then,we consider Successive Pseudo-Convex Approximation(SPCA)to deal with the WSRM problem.Finally,for the WSEEM problem,SPCA is utilized to convert the problem into separable scalar problems,which can be parallelly solved.Thus,the Dinkelbach algorithm and constraints relaxation are used to characterize the closed-form solution for power allocation.Extensive simulations have been implemented to show the efficiency of the proposed framework and its superiority over other existing schemes. 展开更多
关键词 Weighted sum rate Weighted energy efficiency Non-orthogonal multiple access Successive pseudo-convex approximation Fractional programming
下载PDF
Intelligent reflecting surface-assisted cognitive radio-inspired rate-splitting multiple access systems
14
作者 Peixu Liu Gang Jing +2 位作者 Hongwu Liu Liang Yang Theodoros A.Tsiftsis 《Digital Communications and Networks》 SCIE CSCD 2023年第3期655-666,共12页
Intelligent reflecting surface(IRS)has been widely regarded as a promising technology for configuring wireless propagation environments.In this paper,we utilize IRS to assist transmission of a secondary user(SU)in a c... Intelligent reflecting surface(IRS)has been widely regarded as a promising technology for configuring wireless propagation environments.In this paper,we utilize IRS to assist transmission of a secondary user(SU)in a cognitive radio-inspired rate-splitting multiple access(CR-RSMA)system in which a primary user's(PU's)quality of service(QoS)requirements must be guaranteed.Without introducing intolerable interference to deteriorate the PU's outage performance,the SU conducts rate-splitting to transmit its signal to the base-station through the direct link and IRS reflecting channels.For the IRS-assisted CR-RSMA(IRS-CR-RSMA)scheme,we derive the optimal transmit power allocation,target rate allocation,and successive interference cancellation decoding order to enhance the outage performance of the SU.The closed-form expression for the SU's outage probability achieved by the IRS-CR-RSMA scheme is derived.Various simulation results are presented to clarify the enhanced outage performance achieved by the proposed IRS-CR-RSMA scheme over the CR-RSMA scheme. 展开更多
关键词 Rate-splitting multiple access(RSMA) Intelligent reflecting surface(IRS) Successive interference cancellation(SIC) Cognitive radio
下载PDF
Resource allocation for uplink grant-free access in beam-hopping based LEO satellite systems
15
作者 张梦莹 YANG Xiumei BU Zhiyong 《High Technology Letters》 EI CAS 2023年第2期140-147,共8页
The low earth orbit(LEO) satellite system provides a promising solution for the global coverage of Internet of Things(IoT) services.Confronted with the sporadic uplink transmission from massive IoT terminals, this wor... The low earth orbit(LEO) satellite system provides a promising solution for the global coverage of Internet of Things(IoT) services.Confronted with the sporadic uplink transmission from massive IoT terminals, this work investigates the grant-free access scheme and resource allocation algorithm for the beam-hopping(BH) based LEO satellite systems.To improve the packet success rate, the time slots are pre-allocated to each cell according to the number of terrestrial terminals and the probability of packet arrival.When the packets arrive, the terrestrial terminals perform contention-free or contention-based grant-free access with packet repetition in the time slots allocated to their cells.The analytical expression of the packet collision probability for the grant-free access scheme is derived to provide reference for the resource allocation.To reduce the computational complexity, a heuristic resource allocation algorithm is proposed to minimize the maximum cell packet collision probability in the system.Simulation results show that the proposed resource allocation scheme achieves lower packet collision probability and higher resource utilization ratio when compared with the uniform resource allocation scheme. 展开更多
关键词 low earth orbit(LEO)satellite system grant-free access beam-hopping(BH) resource allocation collision
下载PDF
Performance evaluation of NeuMoDx 96 system for hepatitis B and C viral load
16
作者 Gagan Chooramani Jasmine Samal +6 位作者 Nitiksha Rani Gaurav Singh Reshu Agarwal Meenu Bajpai Manoj Kumar Manya Prasad Ekta Gupta 《World Journal of Virology》 2023年第4期233-241,共9页
BACKGROUND Hepatitis B virus(HBV)and hepatitis C virus(HCV)viral load(VL)estimation is essential for the management of both HBV and HCV infections.Due to a longer turnaround time for VL estimation,many patients drop o... BACKGROUND Hepatitis B virus(HBV)and hepatitis C virus(HCV)viral load(VL)estimation is essential for the management of both HBV and HCV infections.Due to a longer turnaround time for VL estimation,many patients drop out from the cascade of care.To achieve the global goals of reducing morbidity and mortality due to HBV/HCV and moving towards their elimination by 2030,molecular diagnostic platforms with faster and random(i.e.single sample)access are needed.AIM To evaluate the performance of the recently launched NeuMoDx 96 random access system with the conventional COBAS^(■)AmpliPrep/COBAS TaqMan system for HBV and HCV VL estimation.METHODS Archived once-thawed plasma samples were retrieved and tested on both platforms.Correlation between the assays was determined by linear regression and Bland-Altman analysis.The study included samples from 186 patients,99 for HBV of which 49 were true infected HBV cases(hepatitis B surface antigen,antihepatitis B core antibody,and HBV DNA-positive)and 87 for HCV assay in which 39 were true positives for HCV infection(anti-HCV and HCV RNA-positive).RESULTS The median VL detected by NeuMoDx for HBV was 2.9(interquartile range[IQR]:2.0-4.3)log_(10)IU/mL and by COBAS it was 3.70(IQR:2.28-4.56)log_(10)IU/mL,with excellent correlation(R2=0.98).In HCV,the median VL detected by NeuMoDx was 4.9(IQR:4.2-5.4)log_(10)IU/mL and by COBAS it was 5.10(IQR:4.07-5.80)log_(10)IU/mL with good correlation(R2=0.96).CONCLUSION The overall concordance between both the systems was 100%for both HBV and HCV VL estimation.Moreover,no genotype-specific bias for HBV/HCV VL quantification was seen in both the systems.Our findings reveal that NeuMoDx HBV and HCV quantitative assays have shown overall good clinical performance and provide faster results with 100%sensitivity and specificity compared to the COBAS AmpliPrep/COBAS TaqMan system. 展开更多
关键词 Hepatitis B Hepatitis C NeuMoDx Random access Viral load COBAS AmpliPrep
下载PDF
Introduction of PIC/S Accession Procedure and Suggestions for Establishing a Unified Quality Management System in China
17
作者 Hu Shigao Wu Zhiang 《Asian Journal of Social Pharmacy》 2023年第4期345-351,共7页
Objective To introduce the accession procedure and evaluation of PIC/S,and help relevant departments in China to understand the requirements of PIC/S in detail,and to promote the process of China’s entry into PIC/S.M... Objective To introduce the accession procedure and evaluation of PIC/S,and help relevant departments in China to understand the requirements of PIC/S in detail,and to promote the process of China’s entry into PIC/S.Methods The procedures and steps of joining PIC/S,the evaluation process of PIC/S,and the experience of several countries in joining PIC/S were introduced and analyzed,which could help the relevant personnel in China understand the specific contents.Results and Conclusion According to the requirements of PIC/S,it is necessary to establish a unified GMP quality management system. 展开更多
关键词 PIC/S GMP accession procedure quality management system
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
18
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model Internet access rural China
下载PDF
基于C#的微波器件自动校准系统的设计与实现
19
作者 张东云 任松 +1 位作者 张佳颖 刘圣 《计量与测试技术》 2024年第5期49-53,共5页
针对校准时,微波器件存在人工操作量大、存在读数误差等问题,本文采用C#面向对象语言,设计了一款模块化自动校准软件。该软件采用SCPI命令控制仪器;基于ACCESS数据库,实现基本信息和数据的处理存储;将图形数据转化成二进制流实现测量图... 针对校准时,微波器件存在人工操作量大、存在读数误差等问题,本文采用C#面向对象语言,设计了一款模块化自动校准软件。该软件采用SCPI命令控制仪器;基于ACCESS数据库,实现基本信息和数据的处理存储;将图形数据转化成二进制流实现测量图形导出。同时,运用Word文档自动生成原始记录和校准证书。试验表明:该软件运行稳定、数据处理准确,满足使用要求,可实现微波器件的自动校准,提高工作效率。 展开更多
关键词 微波器件 自动校准 ACCESS数据库 图形导出 证书制作
下载PDF
Which Neighborhoods Have Easier Access to Online Home Delivery Services?A Spatiotemporal Accessibility Analysis in Nanjing,China
20
作者 KONG Yu ZHEN Feng +1 位作者 ZHANG Shanqi SHEN Lizhen 《Chinese Geographical Science》 SCIE CSCD 2024年第4期722-738,共17页
The rise in online home delivery services(OHDS)has had a significant impact on how urban services are supplied and used in recent years.Studies on the spatial accessibility of OHDS are emerging,but few is known about ... The rise in online home delivery services(OHDS)has had a significant impact on how urban services are supplied and used in recent years.Studies on the spatial accessibility of OHDS are emerging,but few is known about the temporal dimension of OHDS accessibility as well as the geographic and socioeconomic differences in the spatiotemporal accessibility of OHDS.This study measures the spatiotemporal accessibility of four types of OHDS,namely leisure,fresh and convenient,medical,and catering services.The geographic and socioeconomic disparities in the spatiotemporal accessibility of these four types of OHDS are then identified using spatial statistical methods and the Kruskal-Wallis test(K-W test).The case study in Nanjing,China,suggests that:1)spatiotemporal accessibility better reflects the temporal variation of OHDS accessibility and avoids overestimation of OHDS accessibility when only considering its spatial dimension.2)The spatiotemporal accessibility of OHDS varies geographically and socioeconomically.Neighborhoods located in the main city or neighborhoods with higher housing prices,higher population density,and higher point of interest(POI)mix have better OHDS spatiotemporal accessibility.Our study contributes to the understanding of OHDS accessibility from a spatiotemporal perspective,and the empirical insights can assist policymakers in creating intervention plans that take into account variations in OHDS spatiotemporal accessibility. 展开更多
关键词 online home delivery services(OHDS) spatiotemporal accessibility neighborhoods accessibility differences Nanjing City China
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部