Objective:Adverse surgical events are a major cause of morbidity,mortality,and disability worldw ide.The cause of many such events can be attributed to interruptions in the operating room(OR),muli-tasking by surgeons,...Objective:Adverse surgical events are a major cause of morbidity,mortality,and disability worldw ide.The cause of many such events can be attributed to interruptions in the operating room(OR),muli-tasking by surgeons,etc.The objective of this study was to observe the types and frequency of intra-operative wor kflow interruptions in our ORs.Method:This ccoss-sectional study was conducted from March Do April of 2023.An observational approach using an audio-video recording device was employed to record OR flow disr uptions.One elective OR and one emergency OR under the Department of General Surgery were selected for the study.All open and laparoscopic surger ies conducted in the selected ORs were included.An Internet Protocol camera'was installed in the selec ted ORS with a view of the entire room,including the anesthesia station.Audio-video recording was started after the first indsion and stopped after closure of the surgical site.Result:Of the 51 cases that were studied,45(88.2%)were elective,and 18(35.3%)were laparoscopic cases.They could be classified into 8 types of open procedures and 4 types of lapar oscopic procedures.The mean maximum headcount inside the OR was 15.5土3.6 and doors opened on average of 15.8土6.0 times during a procedure.Other interruptions were surgeons attending phone calls(24,47.1%),leaving the sterile area(21,41.2%),technical disturbances(32,62.7%),anesthetic interruptions(18,35.3%),and faulty instruments(29,56.9%)Elective procedures had a signifcandy higher average number of in-terruptions per operating hour than emergency procedures(175±8.6vs.7.1±2.9,p<0.01).Condusion:Preventable factors such as faulty instruments,anesthetic interruption,and attending phone calls by the surgeon are commonly observed in ORs.They need to be addressed by timely surgical audits or the adoption of continued sureillance methods that can help take measures to minimize their occurrence.展开更多
With the advancement of technology in recent years, effective fault diagnosis became a necessity to verify the performance and ensure the quality of complex systems. In this paper, an original verification methodology...With the advancement of technology in recent years, effective fault diagnosis became a necessity to verify the performance and ensure the quality of complex systems. In this paper, an original verification methodology for complex consumer electronic devices is presented. Verification of the system which consists of hardware (integrated circuit) and corresponding software within a flat panel TV set is in the focus. Proposed methodology provides reliable functional failure detection using the concept of black box testing. Further, the approach is fully automated, improving the reliability and speed of failure detection. The methodology effectiveness has been experimentally evaluated and the analysis results have been reported.展开更多
The xanthan fermentation data in the stationary phase was analyzed using the black box and the metabolic network models. The data consistency is checked through the elemental balance in the black box model. In the met...The xanthan fermentation data in the stationary phase was analyzed using the black box and the metabolic network models. The data consistency is checked through the elemental balance in the black box model. In the metabolic network model, the metabolic flux distribution in the cell is calculated using the metabolic flux analysis method, then the maintenance coefficients is calculated.展开更多
The pupil recognition method is helpful in many real-time systems,including ophthalmology testing devices,wheelchair assistance,and so on.The pupil detection system is a very difficult process in a wide range of datas...The pupil recognition method is helpful in many real-time systems,including ophthalmology testing devices,wheelchair assistance,and so on.The pupil detection system is a very difficult process in a wide range of datasets due to problems caused by varying pupil size,occlusion of eyelids,and eyelashes.Deep Convolutional Neural Networks(DCNN)are being used in pupil recognition systems and have shown promising results in terms of accuracy.To improve accuracy and cope with larger datasets,this research work proposes BOC(BAT Optimized CNN)-IrisNet,which consists of optimizing input weights and hidden layers of DCNN using the evolutionary BAT algorithm to efficiently find the human eye pupil region.The proposed method is based on very deep architecture and many tricks from recently developed popular CNNs.Experiment results show that the BOC-IrisNet proposal can efficiently model iris microstructures and provides a stable discriminating iris representation that is lightweight,easy to implement,and of cutting-edge accuracy.Finally,the region-based black box method for determining pupil center coordinates was introduced.The proposed architecture was tested using various IRIS databases,including the CASIA(Chinese academy of the scientific research institute of automation)Iris V4 dataset,which has 99.5%sensitivity and 99.75%accuracy,and the IIT(Indian Institute of Technology)Delhi dataset,which has 99.35%specificity and MMU(Multimedia University)99.45%accuracy,which is higher than the existing architectures.展开更多
Concept of black box, condition of modeling and control methods were introduced. Taking high purity silica brick as an example, the silica brick featured with high purity, low porosity, low true density and high stren...Concept of black box, condition of modeling and control methods were introduced. Taking high purity silica brick as an example, the silica brick featured with high purity, low porosity, low true density and high strength was developed through problem analysis, test design, modeling and optimization. Using information technology to upgrade refractories industry was discussed.展开更多
Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of diffe...Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of differential pressure produced by natural gas expansion.By using the exergy analysis theory,the black box-gray box hierarchical exergy analysis models of three differential pressure power generation technologies are established respectively.Firstly,the“black box”analysis models of main energy consuming equipment are established,and then the“gray box”analysis model of the total system is established.Based on the calculation results of exergy analysis indexes,the weak energy consumption equipment in the whole power generation process is accurately located.Taking a gas field in southwest China as an example,the comprehensive energy consumption evaluation of the three power generation technologies is carried out,and the technology with the best energy consumption condition among the three technologies is determined.Finally,the rationalization improvement measures are put forward from improving the air tightness,replacing the deflector and reducing the flow loss.展开更多
On the basis of analyzing the connotation and function of black box of science and technology,this article expounds the necessity of cultivating modern and new farmers in China at present,and points out that with ince...On the basis of analyzing the connotation and function of black box of science and technology,this article expounds the necessity of cultivating modern and new farmers in China at present,and points out that with incessant progress of science and technology,the modern agriculture based on black box of science and technology will continue to grow,which requires a large number of new farmers who can learn and improve black box of agricultural science and technology.Finally,the recommendations are put forward for cultivation of new farmers:improving farmers' training system;enhancing rural financial support,so that the farmers benefit from black box of science and technology;strengthening the cultivation of the practical ability,and promoting farmers' management capacity;strengthening the cultivation of innovative ability,and nurturing innovative farmers.展开更多
Notable for the completeness with which it surrenders formally and artistically to the textual dictates of Twitter, Jennifer Egan's 2012 short science fiction Black Box is one of the most triumphant and fully-fledged...Notable for the completeness with which it surrenders formally and artistically to the textual dictates of Twitter, Jennifer Egan's 2012 short science fiction Black Box is one of the most triumphant and fully-fledged fictions written in the form of new media. This paper explores the Twitter narrative employed in Black Box, pointing out that the serialized tweeting format of the story released via computer, mobile phone, or other electronic equipments brings readers immediate reading experience, allowing readers to sense the same feelings as the protagonist does. Through the experimental serialization of"Twitter" narrative, Egan expresses her concerns and worries about the security of the American security as well as the whole world in the post-"9.11" period and at the same time she embraces the virtues and pleasures of traditional storytelling delivered through a wholly new digital format. This paper concludes that Black Box is perhaps one of the boldest experiments of narrative form and is direct exploration into the contemporary image culture.展开更多
Deep neural network(DNN)has strong representation learning ability,but it is vulnerable and easy to be fooled by adversarial examples.In order to handle the vulnerability of DNN,many methods have been proposed.The gen...Deep neural network(DNN)has strong representation learning ability,but it is vulnerable and easy to be fooled by adversarial examples.In order to handle the vulnerability of DNN,many methods have been proposed.The general idea of existing methods is to reduce the chance of DNN models being fooled by observing some designed adversarial examples,which are generated by adding perturbations to the original images.In this paper,we propose a novel adversarial example generation method,called DCVAE-adv.Different from the existing methods,DCVAE-adv constructs adversarial examples by mixing both explicit and implicit perturbations without using original images.Furthermore,the proposed method can be applied to both white box and black box attacks.In addition,in the inference stage,the adversarial examples can be generated without loading the original images into memory,which greatly reduces the memory overhead.We compared DCVAE-adv with three most advanced adversarial attack algorithms:FGSM,AdvGAN,and AdvGAN++.The experimental results demonstrate that DCVAE-adv is superior to these state-of-the-art methods in terms of attack success rate and transfer ability for targeted attack.Our code is available at https://github.com/xzforeverlove/DCVAE-adv.展开更多
Traditional analytical approaches for stability assessment of inverter-based resources(IBRs),often requiring detailed knowledge of IBR internals,become impractical due to IBRs’proprietary nature.Admittance measuremen...Traditional analytical approaches for stability assessment of inverter-based resources(IBRs),often requiring detailed knowledge of IBR internals,become impractical due to IBRs’proprietary nature.Admittance measurements,relying on electromagnetic transient simulation or laboratory settings,are not only time-intensive but also operationally inflexible,since various non-linear control loops make IBRs’admittance models operating-point dependent.Therefore,such admittance measurements must be performed repeatedly when operating point changes.To avoid time-consuming and cumbersome measurements,admittance estimation for arbitrary operating points is highly desirable.However,existing admittance estimation algorithms usually face challenges in versatility,data demands,and accuracy.Addressing this challenge,this letter presents a simple and efficient admittance estimation method for blackboxed IBRs,by utilizing a minimal set of seven operating points to solve a homogeneous linear equation system.Case studies demonstrate this proposed method ensures high accuracy across various types of IBRs.Estimation accuracy is satisfying even when non-negligible measurement errors exist.展开更多
This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)models.We employ an embedding network to integrate the watermark int...This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)models.We employ an embedding network to integrate the watermark into the images within the training set.Then,theNeRFmodel is utilized for 3Dmodeling.For copyright verification,a secret image is generated by inputting a confidential viewpoint into NeRF.On this basis,design an extraction network to extract embedded watermark images fromconfidential viewpoints.In the event of suspicion regarding the unauthorized usage of NeRF in a black-box scenario,the verifier can extract the watermark from the confidential viewpoint to authenticate the model’s copyright.The experimental results demonstrate not only the production of visually appealing watermarks but also robust resistance against various types of noise attacks,thereby substantiating the effectiveness of our approach in safeguarding NeRF.展开更多
One concern about the application of medical artificial intelligence(AI)regards the“black box”feature which can only be viewed in terms of itsinputs and outputs,with no way to understand the AI’s algorithm.Thisis p...One concern about the application of medical artificial intelligence(AI)regards the“black box”feature which can only be viewed in terms of itsinputs and outputs,with no way to understand the AI’s algorithm.Thisis problematic because patients,physicians,and even designers,do not understand why or how a treatment recommendation is produced by AI technologies.One view claims that the worry about black-box medicine is unreasonable because AI systems outperform human doctors in identifying the disease.Furthermore,under the medical AI-physicianpatient model,the physician can undertake the responsibility of interpreting the medical AI’s diagnosis.In this study,we focus on the potential harm caused by the unexplainability feature of medical AI and try to show that such possible harm is underestimated.We will seek to contribute to the literature from three aspects.First,we appealed to a thought experiment to show that although the medical AI systems perform better on accuracy,the harm caused by medical AI’s misdiagnoses may be more serious than that caused by human doctors’misdiagnoses in some cases.Second,in patient-centered medicine,physicians were obligated to provide adequate information to their patients in medical decision-making.However,the unexplainability feature of medical AI systems would limit the patient’s autonomy.Last,we tried to illustrate the psychological and financial burdens that may be caused by the unexplainablity feature of medical AI systems,which seems to be ignored by the previous ethical discussions.展开更多
文摘Objective:Adverse surgical events are a major cause of morbidity,mortality,and disability worldw ide.The cause of many such events can be attributed to interruptions in the operating room(OR),muli-tasking by surgeons,etc.The objective of this study was to observe the types and frequency of intra-operative wor kflow interruptions in our ORs.Method:This ccoss-sectional study was conducted from March Do April of 2023.An observational approach using an audio-video recording device was employed to record OR flow disr uptions.One elective OR and one emergency OR under the Department of General Surgery were selected for the study.All open and laparoscopic surger ies conducted in the selected ORs were included.An Internet Protocol camera'was installed in the selec ted ORS with a view of the entire room,including the anesthesia station.Audio-video recording was started after the first indsion and stopped after closure of the surgical site.Result:Of the 51 cases that were studied,45(88.2%)were elective,and 18(35.3%)were laparoscopic cases.They could be classified into 8 types of open procedures and 4 types of lapar oscopic procedures.The mean maximum headcount inside the OR was 15.5土3.6 and doors opened on average of 15.8土6.0 times during a procedure.Other interruptions were surgeons attending phone calls(24,47.1%),leaving the sterile area(21,41.2%),technical disturbances(32,62.7%),anesthetic interruptions(18,35.3%),and faulty instruments(29,56.9%)Elective procedures had a signifcandy higher average number of in-terruptions per operating hour than emergency procedures(175±8.6vs.7.1±2.9,p<0.01).Condusion:Preventable factors such as faulty instruments,anesthetic interruption,and attending phone calls by the surgeon are commonly observed in ORs.They need to be addressed by timely surgical audits or the adoption of continued sureillance methods that can help take measures to minimize their occurrence.
文摘With the advancement of technology in recent years, effective fault diagnosis became a necessity to verify the performance and ensure the quality of complex systems. In this paper, an original verification methodology for complex consumer electronic devices is presented. Verification of the system which consists of hardware (integrated circuit) and corresponding software within a flat panel TV set is in the focus. Proposed methodology provides reliable functional failure detection using the concept of black box testing. Further, the approach is fully automated, improving the reliability and speed of failure detection. The methodology effectiveness has been experimentally evaluated and the analysis results have been reported.
基金Supported by the National Natural Science Foundation of China(No.29776035).
文摘The xanthan fermentation data in the stationary phase was analyzed using the black box and the metabolic network models. The data consistency is checked through the elemental balance in the black box model. In the metabolic network model, the metabolic flux distribution in the cell is calculated using the metabolic flux analysis method, then the maintenance coefficients is calculated.
文摘The pupil recognition method is helpful in many real-time systems,including ophthalmology testing devices,wheelchair assistance,and so on.The pupil detection system is a very difficult process in a wide range of datasets due to problems caused by varying pupil size,occlusion of eyelids,and eyelashes.Deep Convolutional Neural Networks(DCNN)are being used in pupil recognition systems and have shown promising results in terms of accuracy.To improve accuracy and cope with larger datasets,this research work proposes BOC(BAT Optimized CNN)-IrisNet,which consists of optimizing input weights and hidden layers of DCNN using the evolutionary BAT algorithm to efficiently find the human eye pupil region.The proposed method is based on very deep architecture and many tricks from recently developed popular CNNs.Experiment results show that the BOC-IrisNet proposal can efficiently model iris microstructures and provides a stable discriminating iris representation that is lightweight,easy to implement,and of cutting-edge accuracy.Finally,the region-based black box method for determining pupil center coordinates was introduced.The proposed architecture was tested using various IRIS databases,including the CASIA(Chinese academy of the scientific research institute of automation)Iris V4 dataset,which has 99.5%sensitivity and 99.75%accuracy,and the IIT(Indian Institute of Technology)Delhi dataset,which has 99.35%specificity and MMU(Multimedia University)99.45%accuracy,which is higher than the existing architectures.
基金This paper is funded by National 11th " Five-Year-Plan" Major Supporting Projects for Scientific and Technology. Its item name is "Green Manufacturing Processes and Equipment" with subject number of 2006BAF02A26.
文摘Concept of black box, condition of modeling and control methods were introduced. Taking high purity silica brick as an example, the silica brick featured with high purity, low porosity, low true density and high strength was developed through problem analysis, test design, modeling and optimization. Using information technology to upgrade refractories industry was discussed.
基金financially supported by the National Natural Science Foundation of China(52074089 and 51534004)Natural Science Foundation of Heilongjiang Province of China(LH2019E019)。
文摘Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of differential pressure produced by natural gas expansion.By using the exergy analysis theory,the black box-gray box hierarchical exergy analysis models of three differential pressure power generation technologies are established respectively.Firstly,the“black box”analysis models of main energy consuming equipment are established,and then the“gray box”analysis model of the total system is established.Based on the calculation results of exergy analysis indexes,the weak energy consumption equipment in the whole power generation process is accurately located.Taking a gas field in southwest China as an example,the comprehensive energy consumption evaluation of the three power generation technologies is carried out,and the technology with the best energy consumption condition among the three technologies is determined.Finally,the rationalization improvement measures are put forward from improving the air tightness,replacing the deflector and reducing the flow loss.
文摘On the basis of analyzing the connotation and function of black box of science and technology,this article expounds the necessity of cultivating modern and new farmers in China at present,and points out that with incessant progress of science and technology,the modern agriculture based on black box of science and technology will continue to grow,which requires a large number of new farmers who can learn and improve black box of agricultural science and technology.Finally,the recommendations are put forward for cultivation of new farmers:improving farmers' training system;enhancing rural financial support,so that the farmers benefit from black box of science and technology;strengthening the cultivation of the practical ability,and promoting farmers' management capacity;strengthening the cultivation of innovative ability,and nurturing innovative farmers.
文摘Notable for the completeness with which it surrenders formally and artistically to the textual dictates of Twitter, Jennifer Egan's 2012 short science fiction Black Box is one of the most triumphant and fully-fledged fictions written in the form of new media. This paper explores the Twitter narrative employed in Black Box, pointing out that the serialized tweeting format of the story released via computer, mobile phone, or other electronic equipments brings readers immediate reading experience, allowing readers to sense the same feelings as the protagonist does. Through the experimental serialization of"Twitter" narrative, Egan expresses her concerns and worries about the security of the American security as well as the whole world in the post-"9.11" period and at the same time she embraces the virtues and pleasures of traditional storytelling delivered through a wholly new digital format. This paper concludes that Black Box is perhaps one of the boldest experiments of narrative form and is direct exploration into the contemporary image culture.
基金supported by the Key R&D Program of Science and Technology Foundation of Hebei Province(No.19210310D)the Natural Science Foundation of Hebei Province(No.F2021201020).
文摘Deep neural network(DNN)has strong representation learning ability,but it is vulnerable and easy to be fooled by adversarial examples.In order to handle the vulnerability of DNN,many methods have been proposed.The general idea of existing methods is to reduce the chance of DNN models being fooled by observing some designed adversarial examples,which are generated by adding perturbations to the original images.In this paper,we propose a novel adversarial example generation method,called DCVAE-adv.Different from the existing methods,DCVAE-adv constructs adversarial examples by mixing both explicit and implicit perturbations without using original images.Furthermore,the proposed method can be applied to both white box and black box attacks.In addition,in the inference stage,the adversarial examples can be generated without loading the original images into memory,which greatly reduces the memory overhead.We compared DCVAE-adv with three most advanced adversarial attack algorithms:FGSM,AdvGAN,and AdvGAN++.The experimental results demonstrate that DCVAE-adv is superior to these state-of-the-art methods in terms of attack success rate and transfer ability for targeted attack.Our code is available at https://github.com/xzforeverlove/DCVAE-adv.
基金funded by the Australian Research for Global Power System Transformation(Stage 2)Topic 2 and partially funded by the Australian Renewable Energy Agency(Grant No.:2023/ARP010)。
文摘Traditional analytical approaches for stability assessment of inverter-based resources(IBRs),often requiring detailed knowledge of IBR internals,become impractical due to IBRs’proprietary nature.Admittance measurements,relying on electromagnetic transient simulation or laboratory settings,are not only time-intensive but also operationally inflexible,since various non-linear control loops make IBRs’admittance models operating-point dependent.Therefore,such admittance measurements must be performed repeatedly when operating point changes.To avoid time-consuming and cumbersome measurements,admittance estimation for arbitrary operating points is highly desirable.However,existing admittance estimation algorithms usually face challenges in versatility,data demands,and accuracy.Addressing this challenge,this letter presents a simple and efficient admittance estimation method for blackboxed IBRs,by utilizing a minimal set of seven operating points to solve a homogeneous linear equation system.Case studies demonstrate this proposed method ensures high accuracy across various types of IBRs.Estimation accuracy is satisfying even when non-negligible measurement errors exist.
基金supported by the National Natural Science Foundation of China,with Fund Number 62272478.
文摘This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)models.We employ an embedding network to integrate the watermark into the images within the training set.Then,theNeRFmodel is utilized for 3Dmodeling.For copyright verification,a secret image is generated by inputting a confidential viewpoint into NeRF.On this basis,design an extraction network to extract embedded watermark images fromconfidential viewpoints.In the event of suspicion regarding the unauthorized usage of NeRF in a black-box scenario,the verifier can extract the watermark from the confidential viewpoint to authenticate the model’s copyright.The experimental results demonstrate not only the production of visually appealing watermarks but also robust resistance against various types of noise attacks,thereby substantiating the effectiveness of our approach in safeguarding NeRF.
基金the Young Scholars Program of the National Social Science Fund of China(Grant No.22CZX019).
文摘One concern about the application of medical artificial intelligence(AI)regards the“black box”feature which can only be viewed in terms of itsinputs and outputs,with no way to understand the AI’s algorithm.Thisis problematic because patients,physicians,and even designers,do not understand why or how a treatment recommendation is produced by AI technologies.One view claims that the worry about black-box medicine is unreasonable because AI systems outperform human doctors in identifying the disease.Furthermore,under the medical AI-physicianpatient model,the physician can undertake the responsibility of interpreting the medical AI’s diagnosis.In this study,we focus on the potential harm caused by the unexplainability feature of medical AI and try to show that such possible harm is underestimated.We will seek to contribute to the literature from three aspects.First,we appealed to a thought experiment to show that although the medical AI systems perform better on accuracy,the harm caused by medical AI’s misdiagnoses may be more serious than that caused by human doctors’misdiagnoses in some cases.Second,in patient-centered medicine,physicians were obligated to provide adequate information to their patients in medical decision-making.However,the unexplainability feature of medical AI systems would limit the patient’s autonomy.Last,we tried to illustrate the psychological and financial burdens that may be caused by the unexplainablity feature of medical AI systems,which seems to be ignored by the previous ethical discussions.