Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the m...Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the multinational pharmaceutical companies were analyzed based on the requirements of regulations and laws.Results and Conclusion There are some gaps between local and multinational pharmaceutical companies in the construction of pharmacovigilance system.We can learn from the experience of multinational pharmaceutical companies to improve the pharmacovigilance system,which includes building a sound pharmacovigilance organizational structure,establishing a series of operational system files and cultivating professional talents.MAHs of China should improve the structure of enterprise pharmacovigilance system.Besides,members of Drug Safety Committee should be department managers with higher position so that they can fulfil the responsibilities of risk assessment.If MAHs possess a large variety and quantity of products,a Drug Safety Committee should be established to ensure the timely discovery of risks.In addition,MAHs should pay attention to the implementation of related regulations and laws on pharmacovigilance and establish compliant,effective and operatable files combing with the actual operation of pharmacovigilance system.Finally,MAHs should introduce and train pharmacovigilance talents,and hire pharmacovigilance experts as consultants to solve the problem of talent shortage.展开更多
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes...These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system.展开更多
User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Neverth...User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Nevertheless,it is not easy to utilize data without citizens’consent.In this study,we took a technological approach to these issues.Usermanaged access(UMA)is a well-known framework for delegating resource access rights to others on the Internet.In UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different domains.However,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart cities.In this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each other.The proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain technology.We implemented the proposed architecture as smart contracts and evaluated its processing performance.The resultant time required for delegating access rights and accessing resources was less than 500 ms.Furthermore,we found that the fluctuation in the processing time overhead was small.Based on these results,we concluded that performance degradation with the proposed architecture is minor.展开更多
This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of co...This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of computer science in different fields of study. The technique used in this paper is handling the inadequate Information for citation;it removes the problem of cold start, which is encountered by very many other recommender systems. In this paper, abstracts, the titles, and the Microsoft academic graphs have been used in coming up with the recommendation list for every document, which is used to combine the content-based approaches and the co-citations. Prioritization and the blending of every technique have been allowed by the tuning system parameters, allowing for the authority in results of recommendation versus the paper novelty. In the end, we do observe that there is a direct correlation between the similarity rankings that have been produced by the system and the scores of the participant. The results coming from the associated scrips of analysis and the user survey have been made available through the recommendation system. Managers must gain the required expertise to fully utilize the benefits that come with business intelligence systems [1]. Data mining has become an important tool for managers that provides insights about their daily operations and leverage the information provided by decision support systems to improve customer relationships [2]. Additionally, managers require business intelligence systems that can rank the output in the order of priority. Ranking algorithm can replace the traditional data mining algorithms that will be discussed in-depth in the literature review [3].展开更多
Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challen...Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme.展开更多
A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a...A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a privacy-preserving model.The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameterbased access control protection mechanism for digital privacy preservation.The enhanced capability combines multiple access control parameters:facial expression,resource,environment,location,and time.The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.The findings resulted in different facial expressions successfully triggering a person’s face to be blurred and a person’s privacy when using a real-time video conferencing service captured from a webcam or virtual webcam.A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system.A series of experiments exercising the enhanced,real-time multi-parameterbased system was shown as a viable path forward for preserving a person’s privacy while using a webcam or virtual webcam to capture,stream,and store videos.展开更多
In a world where there is constant data generation and processing, the need for an integrated system cannot be overemphasized. The systems that enable storage of large amounts of spatial data and must be made availabl...In a world where there is constant data generation and processing, the need for an integrated system cannot be overemphasized. The systems that enable storage of large amounts of spatial data and must be made available to multiple users in real time. Studies have shown that standalone desktop spatial systems are often rigid and inflexible to support multiple data processing or demands from multiple users. The integrated spatial management system was designed to address the above highlighted challenges by bringing enhanced possibilities of utilization of spatial data though improving accessibility, visualization, and processing spatial information. The present work employed a mixed approach of qualitative and quantitative techniques to obtain the desired result. Qualitative data collection tools were used to collect field data required to design the prototype. The research sought to establish whether the integrated systems are in use by the targeted institutions, the findings highlighted that 71.4% have no integrated spatial data systems while 28.6% have partial-integrated systems. An overview of the architecture of integrated spatial systems consists of a well distributed database linked to multiple tools and platforms to query both the spatial and non-spatial data. The WEB-GIS and Mobile GIS interfaces were developed to allow multiple users to access information through the web in real time and data collection, respectively.展开更多
Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine ...Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine under EUA,as well as the continuation of phase III clinical trials and pharmacovigilance plans were sorted out.And attention was paid to the safety surveillance actions and risk control measures of vaccines under EUA.Results and Conclusion The methods and policies for EUA and risk control of Pfizer-BioNTech vaccine were made clear and we could provide a reference for the pharmacovigilance action after the COVID-19 vaccines were put on the market in China.In the case of EUA,it is necessary to analyze the existing clinical safety data.Based on this,the risk control process should be confirmed at the time of formal marketing approval and after listing.Finally,the risk control should be adjusted at any time.展开更多
Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approa...Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing.展开更多
Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authoriti...Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authorities as an alternative to animal testing.For example,the Environmental Protection Agency aims to eliminate animal testi ng by 2035.展开更多
Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launche...Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs.展开更多
Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate...Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate article type from the list of options when making your submission.Authors contributing to special issues should ensure that they select the special issue article type from this list.展开更多
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat...General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
General.Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information...General.Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g....Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.展开更多
General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information...General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
BACKGROUND Hepatitis C virus(HCV)poses a significant quandary about public health.It is challenging to study the literature in a particular discipline comprehensively today.One solution is bibliometric analysis,which ...BACKGROUND Hepatitis C virus(HCV)poses a significant quandary about public health.It is challenging to study the literature in a particular discipline comprehensively today.One solution is bibliometric analysis,which is often used to track the attributes and evolutionary trajectories of scientific outputs.AIM To examine the 35-year scientific evolution of articles focused on HCV.METHODS This study examined the 35-year scientific evolution of articles focused on HCV.Our study utilized the Web of Science database.The study encompassed a total of 11930 articles.RESULTS Regarding the cumulative count of articles,the leading countries are the United States,Japan,and Italy.Rice CM is the author with the highest recorded H-index and G-index values.The journal with the highest recorded H-index and G-index values is the Journal of Virology.The Journal of Viral Hepatitis contributed 10.94%of the articles,whereas the Journal of Virology published 9.68%.According to the strategic diagram,the keywords most frequently used in 2020-2022 are HCV,epidemiology,and sofosbuvir.CONCLUSION This study provides valuable information about 40 years of academic knowledge on HCV.展开更多
Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of soc...Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences.展开更多
Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of soc...Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences.展开更多
Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of soc...Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences.展开更多
基金Integration Application Status and Problems Investigation of ICH Q8,Q9,Q10 across the Product Life Cycle(No.20210605).
文摘Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the multinational pharmaceutical companies were analyzed based on the requirements of regulations and laws.Results and Conclusion There are some gaps between local and multinational pharmaceutical companies in the construction of pharmacovigilance system.We can learn from the experience of multinational pharmaceutical companies to improve the pharmacovigilance system,which includes building a sound pharmacovigilance organizational structure,establishing a series of operational system files and cultivating professional talents.MAHs of China should improve the structure of enterprise pharmacovigilance system.Besides,members of Drug Safety Committee should be department managers with higher position so that they can fulfil the responsibilities of risk assessment.If MAHs possess a large variety and quantity of products,a Drug Safety Committee should be established to ensure the timely discovery of risks.In addition,MAHs should pay attention to the implementation of related regulations and laws on pharmacovigilance and establish compliant,effective and operatable files combing with the actual operation of pharmacovigilance system.Finally,MAHs should introduce and train pharmacovigilance talents,and hire pharmacovigilance experts as consultants to solve the problem of talent shortage.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(No.2022R1I1A3063257)supported by Electronics and Telecommunications Research Institute(ETRI)grant funded by the Korean Government[22ZR1300,Research on Intelligent Cyber Security and Trust Infra].
文摘These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system.
基金supported by JSPS KAKENHI(Grant Number JP19K11963,JP22K17881,JP18K04133,and JP22H00550).
文摘User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Nevertheless,it is not easy to utilize data without citizens’consent.In this study,we took a technological approach to these issues.Usermanaged access(UMA)is a well-known framework for delegating resource access rights to others on the Internet.In UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different domains.However,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart cities.In this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each other.The proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain technology.We implemented the proposed architecture as smart contracts and evaluated its processing performance.The resultant time required for delegating access rights and accessing resources was less than 500 ms.Furthermore,we found that the fluctuation in the processing time overhead was small.Based on these results,we concluded that performance degradation with the proposed architecture is minor.
文摘This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of computer science in different fields of study. The technique used in this paper is handling the inadequate Information for citation;it removes the problem of cold start, which is encountered by very many other recommender systems. In this paper, abstracts, the titles, and the Microsoft academic graphs have been used in coming up with the recommendation list for every document, which is used to combine the content-based approaches and the co-citations. Prioritization and the blending of every technique have been allowed by the tuning system parameters, allowing for the authority in results of recommendation versus the paper novelty. In the end, we do observe that there is a direct correlation between the similarity rankings that have been produced by the system and the scores of the participant. The results coming from the associated scrips of analysis and the user survey have been made available through the recommendation system. Managers must gain the required expertise to fully utilize the benefits that come with business intelligence systems [1]. Data mining has become an important tool for managers that provides insights about their daily operations and leverage the information provided by decision support systems to improve customer relationships [2]. Additionally, managers require business intelligence systems that can rank the output in the order of priority. Ranking algorithm can replace the traditional data mining algorithms that will be discussed in-depth in the literature review [3].
文摘Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme.
文摘A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a privacy-preserving model.The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameterbased access control protection mechanism for digital privacy preservation.The enhanced capability combines multiple access control parameters:facial expression,resource,environment,location,and time.The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.The findings resulted in different facial expressions successfully triggering a person’s face to be blurred and a person’s privacy when using a real-time video conferencing service captured from a webcam or virtual webcam.A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system.A series of experiments exercising the enhanced,real-time multi-parameterbased system was shown as a viable path forward for preserving a person’s privacy while using a webcam or virtual webcam to capture,stream,and store videos.
文摘In a world where there is constant data generation and processing, the need for an integrated system cannot be overemphasized. The systems that enable storage of large amounts of spatial data and must be made available to multiple users in real time. Studies have shown that standalone desktop spatial systems are often rigid and inflexible to support multiple data processing or demands from multiple users. The integrated spatial management system was designed to address the above highlighted challenges by bringing enhanced possibilities of utilization of spatial data though improving accessibility, visualization, and processing spatial information. The present work employed a mixed approach of qualitative and quantitative techniques to obtain the desired result. Qualitative data collection tools were used to collect field data required to design the prototype. The research sought to establish whether the integrated systems are in use by the targeted institutions, the findings highlighted that 71.4% have no integrated spatial data systems while 28.6% have partial-integrated systems. An overview of the architecture of integrated spatial systems consists of a well distributed database linked to multiple tools and platforms to query both the spatial and non-spatial data. The WEB-GIS and Mobile GIS interfaces were developed to allow multiple users to access information through the web in real time and data collection, respectively.
文摘Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine under EUA,as well as the continuation of phase III clinical trials and pharmacovigilance plans were sorted out.And attention was paid to the safety surveillance actions and risk control measures of vaccines under EUA.Results and Conclusion The methods and policies for EUA and risk control of Pfizer-BioNTech vaccine were made clear and we could provide a reference for the pharmacovigilance action after the COVID-19 vaccines were put on the market in China.In the case of EUA,it is necessary to analyze the existing clinical safety data.Based on this,the risk control process should be confirmed at the time of formal marketing approval and after listing.Finally,the risk control should be adjusted at any time.
文摘Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing.
文摘Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authorities as an alternative to animal testing.For example,the Environmental Protection Agency aims to eliminate animal testi ng by 2035.
文摘Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs.
文摘Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate article type from the list of options when making your submission.Authors contributing to special issues should ensure that they select the special issue article type from this list.
文摘General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
文摘General.Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
基金the support of Prince Sultan University for the Article Processing Charges(APC)of this publication。
文摘Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.
文摘General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
文摘BACKGROUND Hepatitis C virus(HCV)poses a significant quandary about public health.It is challenging to study the literature in a particular discipline comprehensively today.One solution is bibliometric analysis,which is often used to track the attributes and evolutionary trajectories of scientific outputs.AIM To examine the 35-year scientific evolution of articles focused on HCV.METHODS This study examined the 35-year scientific evolution of articles focused on HCV.Our study utilized the Web of Science database.The study encompassed a total of 11930 articles.RESULTS Regarding the cumulative count of articles,the leading countries are the United States,Japan,and Italy.Rice CM is the author with the highest recorded H-index and G-index values.The journal with the highest recorded H-index and G-index values is the Journal of Virology.The Journal of Viral Hepatitis contributed 10.94%of the articles,whereas the Journal of Virology published 9.68%.According to the strategic diagram,the keywords most frequently used in 2020-2022 are HCV,epidemiology,and sofosbuvir.CONCLUSION This study provides valuable information about 40 years of academic knowledge on HCV.
文摘Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences.
文摘Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences.
文摘Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences.