Objective:Adverse surgical events are a major cause of morbidity,mortality,and disability worldw ide.The cause of many such events can be attributed to interruptions in the operating room(OR),muli-tasking by surgeons,...Objective:Adverse surgical events are a major cause of morbidity,mortality,and disability worldw ide.The cause of many such events can be attributed to interruptions in the operating room(OR),muli-tasking by surgeons,etc.The objective of this study was to observe the types and frequency of intra-operative wor kflow interruptions in our ORs.Method:This ccoss-sectional study was conducted from March Do April of 2023.An observational approach using an audio-video recording device was employed to record OR flow disr uptions.One elective OR and one emergency OR under the Department of General Surgery were selected for the study.All open and laparoscopic surger ies conducted in the selected ORs were included.An Internet Protocol camera'was installed in the selec ted ORS with a view of the entire room,including the anesthesia station.Audio-video recording was started after the first indsion and stopped after closure of the surgical site.Result:Of the 51 cases that were studied,45(88.2%)were elective,and 18(35.3%)were laparoscopic cases.They could be classified into 8 types of open procedures and 4 types of lapar oscopic procedures.The mean maximum headcount inside the OR was 15.5土3.6 and doors opened on average of 15.8土6.0 times during a procedure.Other interruptions were surgeons attending phone calls(24,47.1%),leaving the sterile area(21,41.2%),technical disturbances(32,62.7%),anesthetic interruptions(18,35.3%),and faulty instruments(29,56.9%)Elective procedures had a signifcandy higher average number of in-terruptions per operating hour than emergency procedures(175±8.6vs.7.1±2.9,p<0.01).Condusion:Preventable factors such as faulty instruments,anesthetic interruption,and attending phone calls by the surgeon are commonly observed in ORs.They need to be addressed by timely surgical audits or the adoption of continued sureillance methods that can help take measures to minimize their occurrence.展开更多
The xanthan fermentation data in the stationary phase was analyzed using the black box and the metabolic network models. The data consistency is checked through the elemental balance in the black box model. In the met...The xanthan fermentation data in the stationary phase was analyzed using the black box and the metabolic network models. The data consistency is checked through the elemental balance in the black box model. In the metabolic network model, the metabolic flux distribution in the cell is calculated using the metabolic flux analysis method, then the maintenance coefficients is calculated.展开更多
Concept of black box, condition of modeling and control methods were introduced. Taking high purity silica brick as an example, the silica brick featured with high purity, low porosity, low true density and high stren...Concept of black box, condition of modeling and control methods were introduced. Taking high purity silica brick as an example, the silica brick featured with high purity, low porosity, low true density and high strength was developed through problem analysis, test design, modeling and optimization. Using information technology to upgrade refractories industry was discussed.展开更多
On the basis of analyzing the connotation and function of black box of science and technology,this article expounds the necessity of cultivating modern and new farmers in China at present,and points out that with ince...On the basis of analyzing the connotation and function of black box of science and technology,this article expounds the necessity of cultivating modern and new farmers in China at present,and points out that with incessant progress of science and technology,the modern agriculture based on black box of science and technology will continue to grow,which requires a large number of new farmers who can learn and improve black box of agricultural science and technology.Finally,the recommendations are put forward for cultivation of new farmers:improving farmers' training system;enhancing rural financial support,so that the farmers benefit from black box of science and technology;strengthening the cultivation of the practical ability,and promoting farmers' management capacity;strengthening the cultivation of innovative ability,and nurturing innovative farmers.展开更多
Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of diffe...Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of differential pressure produced by natural gas expansion.By using the exergy analysis theory,the black box-gray box hierarchical exergy analysis models of three differential pressure power generation technologies are established respectively.Firstly,the“black box”analysis models of main energy consuming equipment are established,and then the“gray box”analysis model of the total system is established.Based on the calculation results of exergy analysis indexes,the weak energy consumption equipment in the whole power generation process is accurately located.Taking a gas field in southwest China as an example,the comprehensive energy consumption evaluation of the three power generation technologies is carried out,and the technology with the best energy consumption condition among the three technologies is determined.Finally,the rationalization improvement measures are put forward from improving the air tightness,replacing the deflector and reducing the flow loss.展开更多
Notable for the completeness with which it surrenders formally and artistically to the textual dictates of Twitter, Jennifer Egan's 2012 short science fiction Black Box is one of the most triumphant and fully-fledged...Notable for the completeness with which it surrenders formally and artistically to the textual dictates of Twitter, Jennifer Egan's 2012 short science fiction Black Box is one of the most triumphant and fully-fledged fictions written in the form of new media. This paper explores the Twitter narrative employed in Black Box, pointing out that the serialized tweeting format of the story released via computer, mobile phone, or other electronic equipments brings readers immediate reading experience, allowing readers to sense the same feelings as the protagonist does. Through the experimental serialization of"Twitter" narrative, Egan expresses her concerns and worries about the security of the American security as well as the whole world in the post-"9.11" period and at the same time she embraces the virtues and pleasures of traditional storytelling delivered through a wholly new digital format. This paper concludes that Black Box is perhaps one of the boldest experiments of narrative form and is direct exploration into the contemporary image culture.展开更多
With the advancement of technology in recent years, effective fault diagnosis became a necessity to verify the performance and ensure the quality of complex systems. In this paper, an original verification methodology...With the advancement of technology in recent years, effective fault diagnosis became a necessity to verify the performance and ensure the quality of complex systems. In this paper, an original verification methodology for complex consumer electronic devices is presented. Verification of the system which consists of hardware (integrated circuit) and corresponding software within a flat panel TV set is in the focus. Proposed methodology provides reliable functional failure detection using the concept of black box testing. Further, the approach is fully automated, improving the reliability and speed of failure detection. The methodology effectiveness has been experimentally evaluated and the analysis results have been reported.展开更多
In this paper, Black Box approach is presented for behavioral modeling of a non linear power amplifier with memory effects. Large signal parameters of a Motorola LDMOS power amplifier driven by a WCDMA signal were ext...In this paper, Black Box approach is presented for behavioral modeling of a non linear power amplifier with memory effects. Large signal parameters of a Motorola LDMOS power amplifier driven by a WCDMA signal were extracted while taking into considerations the power amplifier’s bandwidth. The proposed model was validated based on the simulated data. Some validation results are presented both in the time and frequency domains, using WCDMA signal.展开更多
Deep neural network(DNN)has strong representation learning ability,but it is vulnerable and easy to be fooled by adversarial examples.In order to handle the vulnerability of DNN,many methods have been proposed.The gen...Deep neural network(DNN)has strong representation learning ability,but it is vulnerable and easy to be fooled by adversarial examples.In order to handle the vulnerability of DNN,many methods have been proposed.The general idea of existing methods is to reduce the chance of DNN models being fooled by observing some designed adversarial examples,which are generated by adding perturbations to the original images.In this paper,we propose a novel adversarial example generation method,called DCVAE-adv.Different from the existing methods,DCVAE-adv constructs adversarial examples by mixing both explicit and implicit perturbations without using original images.Furthermore,the proposed method can be applied to both white box and black box attacks.In addition,in the inference stage,the adversarial examples can be generated without loading the original images into memory,which greatly reduces the memory overhead.We compared DCVAE-adv with three most advanced adversarial attack algorithms:FGSM,AdvGAN,and AdvGAN++.The experimental results demonstrate that DCVAE-adv is superior to these state-of-the-art methods in terms of attack success rate and transfer ability for targeted attack.Our code is available at https://github.com/xzforeverlove/DCVAE-adv.展开更多
One concern about the application of medical artificial intelligence(AI)regards the“black box”feature which can only be viewed in terms of itsinputs and outputs,with no way to understand the AI’s algorithm.Thisis p...One concern about the application of medical artificial intelligence(AI)regards the“black box”feature which can only be viewed in terms of itsinputs and outputs,with no way to understand the AI’s algorithm.Thisis problematic because patients,physicians,and even designers,do not understand why or how a treatment recommendation is produced by AI technologies.One view claims that the worry about black-box medicine is unreasonable because AI systems outperform human doctors in identifying the disease.Furthermore,under the medical AI-physicianpatient model,the physician can undertake the responsibility of interpreting the medical AI’s diagnosis.In this study,we focus on the potential harm caused by the unexplainability feature of medical AI and try to show that such possible harm is underestimated.We will seek to contribute to the literature from three aspects.First,we appealed to a thought experiment to show that although the medical AI systems perform better on accuracy,the harm caused by medical AI’s misdiagnoses may be more serious than that caused by human doctors’misdiagnoses in some cases.Second,in patient-centered medicine,physicians were obligated to provide adequate information to their patients in medical decision-making.However,the unexplainability feature of medical AI systems would limit the patient’s autonomy.Last,we tried to illustrate the psychological and financial burdens that may be caused by the unexplainablity feature of medical AI systems,which seems to be ignored by the previous ethical discussions.展开更多
For the 64 most basic ways to construct a hash function H:{0,1} → {0,1}n from a block cipher E:{0,1}n × {0,1}n → {0,1}n, Black et al.provided a formal and quantitative treatment of the 64 constructions, and pro...For the 64 most basic ways to construct a hash function H:{0,1} → {0,1}n from a block cipher E:{0,1}n × {0,1}n → {0,1}n, Black et al.provided a formal and quantitative treatment of the 64 constructions, and proved that 20 schemes are collision resistant.This paper improves the upper and lower bounds and make contrast with a hash constructed from a random oracle.These 20 schemes have only one kind of collision resistance upper and lower bounds.In addition, we present new advantages for finding second preimages.展开更多
Reliability-based design optimization (RBDO) is intrinsically a double-loop procedure since it involves an overall optimization and an iterative reliability assessment at each search point. Due to the double-loop pr...Reliability-based design optimization (RBDO) is intrinsically a double-loop procedure since it involves an overall optimization and an iterative reliability assessment at each search point. Due to the double-loop procedure, the computational expense of RBDO is normally very high. Current RBDO research focuses on problems with explicitly expressed performance functions and readily available gradients. This paper addresses a more challenging type of RBDO problem in which the performance functions are computation intensive. These computation intensive functions are often considered as a "black-box" and their gradients are not available or not reliable. On the basis of the reliable design space (RDS) concept proposed earlier by the authors, this paper proposes a Reliable Space Pursuing (RSP) approach, in which RDS is first identified and then gradually refined while optimization is performed. It fundamentally avoids the nested optimization and probabilistic assessment loop. Three well known RBDO problems from the literature are used for testing and demonstrating the effectiveness of the proposed RSP method.展开更多
The multiplicity distribution (P(nch)) of charged particles produced in a high energy collision is a key quantity to understand the mechanism of multiparticle production. This paper describes the novel application of ...The multiplicity distribution (P(nch)) of charged particles produced in a high energy collision is a key quantity to understand the mechanism of multiparticle production. This paper describes the novel application of an artificial neural network (ANN) black-box modeling approach based on the cascade correlation (CC) algorithm formulated to calculate and predict multiplicity distribution of proton-proton (antiproton) (PP and PP ) inelastic interactions full phase space at a wide range of center-mass of energy . In addition, the formulated cascade correlation neural network (CCNN) model is used to empirically calculate the average multiplicity distribution nch> as a function of . The CCNN model was designed based on available experimental data for = 30.4 GeV, 44.5 GeV, 52.6 GeV, 62.2 GeV, 200 GeV, 300 GeV, 540 GeV, 900 GeV, 1000 GeV, 1800 GeV, and 7 TeV. Our obtained empirical results for P(nch), as well as nch> for (PP and PP) collisions are compared with the corresponding theoretical ones which obtained from other models. This comparison shows a good agreement with the available experimental data (up to 7 TeV) and other theoretical ones. At full large hadron collider (LHC) energy ( = 14 TeV) we have predicted P(nch) and nch> which also, show a good agreement with different theoretical models.展开更多
文摘Objective:Adverse surgical events are a major cause of morbidity,mortality,and disability worldw ide.The cause of many such events can be attributed to interruptions in the operating room(OR),muli-tasking by surgeons,etc.The objective of this study was to observe the types and frequency of intra-operative wor kflow interruptions in our ORs.Method:This ccoss-sectional study was conducted from March Do April of 2023.An observational approach using an audio-video recording device was employed to record OR flow disr uptions.One elective OR and one emergency OR under the Department of General Surgery were selected for the study.All open and laparoscopic surger ies conducted in the selected ORs were included.An Internet Protocol camera'was installed in the selec ted ORS with a view of the entire room,including the anesthesia station.Audio-video recording was started after the first indsion and stopped after closure of the surgical site.Result:Of the 51 cases that were studied,45(88.2%)were elective,and 18(35.3%)were laparoscopic cases.They could be classified into 8 types of open procedures and 4 types of lapar oscopic procedures.The mean maximum headcount inside the OR was 15.5土3.6 and doors opened on average of 15.8土6.0 times during a procedure.Other interruptions were surgeons attending phone calls(24,47.1%),leaving the sterile area(21,41.2%),technical disturbances(32,62.7%),anesthetic interruptions(18,35.3%),and faulty instruments(29,56.9%)Elective procedures had a signifcandy higher average number of in-terruptions per operating hour than emergency procedures(175±8.6vs.7.1±2.9,p<0.01).Condusion:Preventable factors such as faulty instruments,anesthetic interruption,and attending phone calls by the surgeon are commonly observed in ORs.They need to be addressed by timely surgical audits or the adoption of continued sureillance methods that can help take measures to minimize their occurrence.
基金Supported by the National Natural Science Foundation of China(No.29776035).
文摘The xanthan fermentation data in the stationary phase was analyzed using the black box and the metabolic network models. The data consistency is checked through the elemental balance in the black box model. In the metabolic network model, the metabolic flux distribution in the cell is calculated using the metabolic flux analysis method, then the maintenance coefficients is calculated.
基金This paper is funded by National 11th " Five-Year-Plan" Major Supporting Projects for Scientific and Technology. Its item name is "Green Manufacturing Processes and Equipment" with subject number of 2006BAF02A26.
文摘Concept of black box, condition of modeling and control methods were introduced. Taking high purity silica brick as an example, the silica brick featured with high purity, low porosity, low true density and high strength was developed through problem analysis, test design, modeling and optimization. Using information technology to upgrade refractories industry was discussed.
文摘On the basis of analyzing the connotation and function of black box of science and technology,this article expounds the necessity of cultivating modern and new farmers in China at present,and points out that with incessant progress of science and technology,the modern agriculture based on black box of science and technology will continue to grow,which requires a large number of new farmers who can learn and improve black box of agricultural science and technology.Finally,the recommendations are put forward for cultivation of new farmers:improving farmers' training system;enhancing rural financial support,so that the farmers benefit from black box of science and technology;strengthening the cultivation of the practical ability,and promoting farmers' management capacity;strengthening the cultivation of innovative ability,and nurturing innovative farmers.
基金financially supported by the National Natural Science Foundation of China(52074089 and 51534004)Natural Science Foundation of Heilongjiang Province of China(LH2019E019)。
文摘Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of differential pressure produced by natural gas expansion.By using the exergy analysis theory,the black box-gray box hierarchical exergy analysis models of three differential pressure power generation technologies are established respectively.Firstly,the“black box”analysis models of main energy consuming equipment are established,and then the“gray box”analysis model of the total system is established.Based on the calculation results of exergy analysis indexes,the weak energy consumption equipment in the whole power generation process is accurately located.Taking a gas field in southwest China as an example,the comprehensive energy consumption evaluation of the three power generation technologies is carried out,and the technology with the best energy consumption condition among the three technologies is determined.Finally,the rationalization improvement measures are put forward from improving the air tightness,replacing the deflector and reducing the flow loss.
文摘Notable for the completeness with which it surrenders formally and artistically to the textual dictates of Twitter, Jennifer Egan's 2012 short science fiction Black Box is one of the most triumphant and fully-fledged fictions written in the form of new media. This paper explores the Twitter narrative employed in Black Box, pointing out that the serialized tweeting format of the story released via computer, mobile phone, or other electronic equipments brings readers immediate reading experience, allowing readers to sense the same feelings as the protagonist does. Through the experimental serialization of"Twitter" narrative, Egan expresses her concerns and worries about the security of the American security as well as the whole world in the post-"9.11" period and at the same time she embraces the virtues and pleasures of traditional storytelling delivered through a wholly new digital format. This paper concludes that Black Box is perhaps one of the boldest experiments of narrative form and is direct exploration into the contemporary image culture.
文摘With the advancement of technology in recent years, effective fault diagnosis became a necessity to verify the performance and ensure the quality of complex systems. In this paper, an original verification methodology for complex consumer electronic devices is presented. Verification of the system which consists of hardware (integrated circuit) and corresponding software within a flat panel TV set is in the focus. Proposed methodology provides reliable functional failure detection using the concept of black box testing. Further, the approach is fully automated, improving the reliability and speed of failure detection. The methodology effectiveness has been experimentally evaluated and the analysis results have been reported.
文摘In this paper, Black Box approach is presented for behavioral modeling of a non linear power amplifier with memory effects. Large signal parameters of a Motorola LDMOS power amplifier driven by a WCDMA signal were extracted while taking into considerations the power amplifier’s bandwidth. The proposed model was validated based on the simulated data. Some validation results are presented both in the time and frequency domains, using WCDMA signal.
基金supported by the Key R&D Program of Science and Technology Foundation of Hebei Province(No.19210310D)the Natural Science Foundation of Hebei Province(No.F2021201020).
文摘Deep neural network(DNN)has strong representation learning ability,but it is vulnerable and easy to be fooled by adversarial examples.In order to handle the vulnerability of DNN,many methods have been proposed.The general idea of existing methods is to reduce the chance of DNN models being fooled by observing some designed adversarial examples,which are generated by adding perturbations to the original images.In this paper,we propose a novel adversarial example generation method,called DCVAE-adv.Different from the existing methods,DCVAE-adv constructs adversarial examples by mixing both explicit and implicit perturbations without using original images.Furthermore,the proposed method can be applied to both white box and black box attacks.In addition,in the inference stage,the adversarial examples can be generated without loading the original images into memory,which greatly reduces the memory overhead.We compared DCVAE-adv with three most advanced adversarial attack algorithms:FGSM,AdvGAN,and AdvGAN++.The experimental results demonstrate that DCVAE-adv is superior to these state-of-the-art methods in terms of attack success rate and transfer ability for targeted attack.Our code is available at https://github.com/xzforeverlove/DCVAE-adv.
基金the Young Scholars Program of the National Social Science Fund of China(Grant No.22CZX019).
文摘One concern about the application of medical artificial intelligence(AI)regards the“black box”feature which can only be viewed in terms of itsinputs and outputs,with no way to understand the AI’s algorithm.Thisis problematic because patients,physicians,and even designers,do not understand why or how a treatment recommendation is produced by AI technologies.One view claims that the worry about black-box medicine is unreasonable because AI systems outperform human doctors in identifying the disease.Furthermore,under the medical AI-physicianpatient model,the physician can undertake the responsibility of interpreting the medical AI’s diagnosis.In this study,we focus on the potential harm caused by the unexplainability feature of medical AI and try to show that such possible harm is underestimated.We will seek to contribute to the literature from three aspects.First,we appealed to a thought experiment to show that although the medical AI systems perform better on accuracy,the harm caused by medical AI’s misdiagnoses may be more serious than that caused by human doctors’misdiagnoses in some cases.Second,in patient-centered medicine,physicians were obligated to provide adequate information to their patients in medical decision-making.However,the unexplainability feature of medical AI systems would limit the patient’s autonomy.Last,we tried to illustrate the psychological and financial burdens that may be caused by the unexplainablity feature of medical AI systems,which seems to be ignored by the previous ethical discussions.
基金the National Natural Science Foundation of China (No. 60573028)
文摘For the 64 most basic ways to construct a hash function H:{0,1} → {0,1}n from a block cipher E:{0,1}n × {0,1}n → {0,1}n, Black et al.provided a formal and quantitative treatment of the 64 constructions, and proved that 20 schemes are collision resistant.This paper improves the upper and lower bounds and make contrast with a hash constructed from a random oracle.These 20 schemes have only one kind of collision resistance upper and lower bounds.In addition, we present new advantages for finding second preimages.
基金supported by Natural Science and Engineering Research Council (NSERC) of Canada
文摘Reliability-based design optimization (RBDO) is intrinsically a double-loop procedure since it involves an overall optimization and an iterative reliability assessment at each search point. Due to the double-loop procedure, the computational expense of RBDO is normally very high. Current RBDO research focuses on problems with explicitly expressed performance functions and readily available gradients. This paper addresses a more challenging type of RBDO problem in which the performance functions are computation intensive. These computation intensive functions are often considered as a "black-box" and their gradients are not available or not reliable. On the basis of the reliable design space (RDS) concept proposed earlier by the authors, this paper proposes a Reliable Space Pursuing (RSP) approach, in which RDS is first identified and then gradually refined while optimization is performed. It fundamentally avoids the nested optimization and probabilistic assessment loop. Three well known RBDO problems from the literature are used for testing and demonstrating the effectiveness of the proposed RSP method.
文摘The multiplicity distribution (P(nch)) of charged particles produced in a high energy collision is a key quantity to understand the mechanism of multiparticle production. This paper describes the novel application of an artificial neural network (ANN) black-box modeling approach based on the cascade correlation (CC) algorithm formulated to calculate and predict multiplicity distribution of proton-proton (antiproton) (PP and PP ) inelastic interactions full phase space at a wide range of center-mass of energy . In addition, the formulated cascade correlation neural network (CCNN) model is used to empirically calculate the average multiplicity distribution nch> as a function of . The CCNN model was designed based on available experimental data for = 30.4 GeV, 44.5 GeV, 52.6 GeV, 62.2 GeV, 200 GeV, 300 GeV, 540 GeV, 900 GeV, 1000 GeV, 1800 GeV, and 7 TeV. Our obtained empirical results for P(nch), as well as nch> for (PP and PP) collisions are compared with the corresponding theoretical ones which obtained from other models. This comparison shows a good agreement with the available experimental data (up to 7 TeV) and other theoretical ones. At full large hadron collider (LHC) energy ( = 14 TeV) we have predicted P(nch) and nch> which also, show a good agreement with different theoretical models.