Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s...Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.展开更多
BACKGROUND Bone metastasis has various negative impacts.Activities of daily living(ADL)and quality of life(QOL)can be significantly decreased,survival may be impacted,and medical expenses may increase.It is estimated ...BACKGROUND Bone metastasis has various negative impacts.Activities of daily living(ADL)and quality of life(QOL)can be significantly decreased,survival may be impacted,and medical expenses may increase.It is estimated that at least 5%cancer patients might be suffering from bone metastases.In 2016,we published the Comprehensive Guidelines for the Diagnosis and Treatment of Bone Metastasis.Since then,the therapeutic outcomes for patients have gradually improved.As life expectancy is a major determinant of surgical intervention,the strategy should be modified if the prolongation of survival is to be achieved.AIM To monitor how bone metastasis treatment has changed before and after launch of our guidelines for bone metastasis.METHODS For advanced cancer patients with bone metastasis who visited the Department of Clinical Oncology at Akita University hospital between 2012 and 2023,parameters including the site and number of bone metastases,laboratory data,and survival time,were extracted from electronic medical records and the Katagiri score was calculated.The association with survival was determined for each factor.RESULTS Data from 136 patients were obtained.The 1-year survival rate for the poor prognosis group with a higher Katagiri score was 20.0%in this study,which was 6%and an apparent improvement from 2014 when the scoring system was developed.Other factors significantly affecting survival included five or more bone metastases than less(P=0.0080),and treatment with chemotherapy(P<0.001),bone modifying agents(P=0.0175)and immune checkpoint inhibitors(P=0.0128).In recent years,advances in various treatment methods have extended the survival period for patients with advanced cancer.It is necessary not only to simply extend survival time,but also to maintain ADL and improve QOL.CONCLUSION Various therapeutic interventions including surgical approach for bone metastasis,which is a disorder of locomotor organs,are increasingly required.Guidelines and scoring system for prognosis need to be revised promptly.展开更多
Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be v...Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be valid for some products but spurious for others.In this paper,we found that spurious products are primarily due to the failure states,which correspond to the spurious counterexamples.The violated products correspond to the real counterexamples.Hence,identifying counterexamples is a critical problem in detecting violated products.In our approach,we obtain the violated products through the genuine counterexamples,which have no failure state,to avoid the tedious computation of identifying spurious products dealt with by the existing algorithm.This can be executed in parallel to improve the efficiency further.Experimental results showthat our approach performswell,varying with the growth of the system scale.By analyzing counterexamples in the abstract model,we observed that spurious products occur in the failure state.The approach helps in identifying whether a counterexample is spurious or genuine.The approach also helps to check whether a failure state exists in the counterexample.The performance evaluation shows that the proposed approach helps significantly in improving the efficiency of abstraction-based SPL model checking.展开更多
A multi-agent based transport system is modeled by timed automata model extended with clock variables. The correctness properties of safety and liveness of this model are verified by timed automata based UPPAAL. Agent...A multi-agent based transport system is modeled by timed automata model extended with clock variables. The correctness properties of safety and liveness of this model are verified by timed automata based UPPAAL. Agents have a degree of control on their own actions, have their own threads of control, and under some circumstances they are also able to take decisions. Therefore they are autonomous. The multi-agent system is modeled as a network of timed automata based agents supported by clock variables. The representation of agent requirements based on mathematics is helpful in precise and unambiguous specifications, thereby ensuring correctness. This formal representation of requirements provides a way for logical reasoning about the artifacts produced. We can be systematic and precise in assessing correctness by rigorously specifying the functional requirements.展开更多
Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is f...Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is finding ways to make software more reliable. This review provides an overview of techniques developed over time in the field of software model checking to solve the problem of detecting errors in program code. In addition, the challenges posed by this technology are discussed and ways to mitigate them in future research and applications are proposed. A comprehensive examination of the various model verification methods used to detect program code errors is intended to lay the foundation for future research in this area.展开更多
In this paper, the interference checking of three-dimensional objects within a plant is discussed and accomplished, which offers an automated solution to the design problems inherent in multi-user, multi-model environ...In this paper, the interference checking of three-dimensional objects within a plant is discussed and accomplished, which offers an automated solution to the design problems inherent in multi-user, multi-model environments. Also, the collision detection among moving objects is presented and discussed, and some new ideas are proposed. These methods are successfully applied in our Plant Design System (PDS) and are proven to be very practical and efficient.展开更多
The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader th...The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature.展开更多
BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychologi...BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities.展开更多
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int...In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.展开更多
Introduction: Mechanical or physical restraint is an exceptional therapeutic resource to immobilize a subject and thus guarantee the safety of the patient and/or third parties in the face of high-risk behaviors, but i...Introduction: Mechanical or physical restraint is an exceptional therapeutic resource to immobilize a subject and thus guarantee the safety of the patient and/or third parties in the face of high-risk behaviors, but it entails multiple crossings (bioethical, philosophical, medical, psychological, legal). Framed in the so-called “safety culture” developed by the WHO, based on the Protocol for its implementation of the CABA and attentive to its frequent use in CABA by different hospital services (medical clinic, geriatrics, intensive care and medical guards) we consider it necessary its study in terms of compliance with the risks it entails and its management. Objectives: Identify regulatory compliance with the GCABA Mechanical restraint (MR) Protocol from a patient safety perspective, as well as describe the clinical and medicolegal aspects, and propose the usefulness of a tool for its management and control. Methodology: Observational, descriptive, transversal and prospective work through the analysis of Clinical Records with indication of MR using a rubric-type form. 177 cases were analyzed between September-November 2023 from three hospitals of the Government of the City of Buenos Aires, statistical parameters were applied and graphs were made. Results: Only 12.99% complied with the Protocol. In the mental health specialized hospital compliance was almost 5 times greater than in the general one, and in the emergency services compliance was 12 times greater than in Inpatient services. We found that the start or end time of MR was not recorded and only 43% described the causes/justifications for the indication (mostly in Emergency and Specialized hospitals), with the MR average time being shorter in Emergency. Conclusions: Only 1.3 out of 10 patients reliably completed the Protocol and it was mostly in the mental health specialized hospital and the emergency services. The results show non-compliance behavior in the application and management of the risk that the use of mechanical restraints entails, being causes for criminal litigation. We consider that the checklists are useful to complete the Protocol and thus provide security to patients and professionals.展开更多
The relentless march of a highly pathogenic avian influenza virus(HPAIV)strain,known as H5N1,to become an unprecedented panzootic continues unchecked.The leap of H5N1 clade 2.3.4.4b from Eurasia and Africa to North Am...The relentless march of a highly pathogenic avian influenza virus(HPAIV)strain,known as H5N1,to become an unprecedented panzootic continues unchecked.The leap of H5N1 clade 2.3.4.4b from Eurasia and Africa to North America in 2021 and its further spread to South America and the Antarctic have exposed new avian and mammalian populations to the virus and led to outbreaks on an unrivaled scale.The virus has infected wild birds across vast geographic regions and caused wildlife deaths in some of the world's most biodiverse ecosystems.展开更多
为提高船舶设计质量管理水平,以某满足《协调共同结构规范》(Harmonized Common Structure Rule,HCSR)的巴拿马型散货船为研究对象,利用计划、执行、检查、处理(Plan,Do,Check,Act,PDCA)循环法基本原则对设计质量进行管控,并建立同一船...为提高船舶设计质量管理水平,以某满足《协调共同结构规范》(Harmonized Common Structure Rule,HCSR)的巴拿马型散货船为研究对象,利用计划、执行、检查、处理(Plan,Do,Check,Act,PDCA)循环法基本原则对设计质量进行管控,并建立同一船型设计质量管理体系。此外,对船舶能效指数(Energy Efficiency Design Index,EEDI)提升和结构轻量化设计的研讨方法进行分析。研究成果可为船舶设计质量管理提供一定参考。展开更多
In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC compon...In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC component code. Firstly, the sub-channel capacities of MLCM systems is analyzed and discussed, based on which the optimal component code rate can be obtained. Secondly, an extrinsic information transfer chart based two-stage searching algorithm is proposed to find the good irregular QC-LDPC code ensembles with optimal component code rates for their corresponding sub-channels. Finally, by constructing the irregular QC-LDPC component codes from the designed ensembles with the aim of possibly enlarging the girth and reducing the number of the shortest cycles, the designed irregular QC-LDPC code based 16QAM and 64QAM MLCM systems can achieve 0.4 dB and 1.2 dB net coding gain, respectively, compared with the recently proposed regular QC-LDPC code based 16QAM and 64QAM MLCM systems.展开更多
The dynamics differential equations are constructed, and the initial conditions are also given. Simulation shows the following conclusions: The water pressure in cylinder has great instantaneous pulsation and phase s...The dynamics differential equations are constructed, and the initial conditions are also given. Simulation shows the following conclusions: The water pressure in cylinder has great instantaneous pulsation and phase step when outlet valve or inlet valve opens, but is more gently in other time; The volume efficiency is influenced by the output pressure slightly, and decreases as the working rotational speed increases; When the inherent frequency of the valves is integer multiple of the working frequency, the volume efficiency of system will decrease evidently.展开更多
Reliability enhancement testing(RET) is an accelerated testing which hastens the performance degradation process to surface its inherent defects of design and manufacture. It is an important hypothesis that the degrad...Reliability enhancement testing(RET) is an accelerated testing which hastens the performance degradation process to surface its inherent defects of design and manufacture. It is an important hypothesis that the degradation mechanism of the RET is the same as the one of the normal stress condition. In order to check the consistency of two mechanisms, we conduct two enhancement tests with a missile servo system as an object of the study, and preprocess two sets of test data to establish the accelerated degradation models regarding the temperature change rate that is assumed to be the main applied stress of the servo system during the natural storage. Based on the accelerated degradation models and natural storage profile of the servo system, we provide and demonstrate a procedure to check the consistency of two mechanisms by checking the correlation and difference of two sets of degradation data. The results indicate that the two degradation mechanisms are significantly consistent with each other.展开更多
A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagra...A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria.展开更多
The soundness is a very important criterion for the correctness of the workflow. Specifying the soundness with Computation Tree Logic (CTL) allows us to verify the soundness with symbolic model checkers. Therefore t...The soundness is a very important criterion for the correctness of the workflow. Specifying the soundness with Computation Tree Logic (CTL) allows us to verify the soundness with symbolic model checkers. Therefore the state explosion problem in verifying soundness can be overcome efficiently. When the property is not satisfied by the system, model checking can give a counter-example, which can guide us to correct the workflow. In addition, relaxed soundness is another important criterion for the workflow. We also prove that Computation Tree Logic * (CTL * ) can be used to character the relaxed soundness of the workflow.展开更多
In many hospitals,prescription checks are conducted by 2 or 3 individual pharmacists at each step of prescription checking,dispensing,and final checking to maintain the safety and efficacy of pharmaceutical therapies ...In many hospitals,prescription checks are conducted by 2 or 3 individual pharmacists at each step of prescription checking,dispensing,and final checking to maintain the safety and efficacy of pharmaceutical therapies in Japan[1,2].In Gunma University Hospital,we also check all prescriptions by 3 pharmacists at each step of dispensing(3 step prescription check system)with the exception of night time.In this study,to assess the significance of our 3 step prescription check system for managing safety of pharmaceutical therapies,we investigated prescriptions that needed the confirmation of questionable points and prescription corrections.展开更多
Probabilistic model checking has been widely applied to quantitative analysis of stochastic systems, e.g., analyzing the performance, reliability and survivability of computer and communication systems. In this paper,...Probabilistic model checking has been widely applied to quantitative analysis of stochastic systems, e.g., analyzing the performance, reliability and survivability of computer and communication systems. In this paper, we extend the application of probabilistic model checking to the vehicle to vehicle(V2V) networks. We first develop a continuous-time Markov chain(CTMC) model for the considered V2V network, after that, the PRISM language is adopted to describe the CTMC model, and continuous-time stochastic logic is used to describe the objective survivability properties. In the analysis, two typical failures are considered, namely the node failure and the link failure, respectively induced by external malicious attacks on a target V2V node, and interrupt in a communication link. Considering these failures, their impacts on the network survivability are demonstrated. It is shown that with increasing failure strength, the network survivability is reduced. On the other hand, the network survivability can be improved with increasing repair rate. The proposed probabilistic model checking-based approach can be effectively used in survivability analysis for the V2V networks, moreover, it is anticipated that the approach can be conveniently extended to other networks.展开更多
基金The work is partially supported by Natural Science Foundation of Ningxia(Grant No.AAC03300)National Natural Science Foundation of China(Grant No.61962001)Graduate Innovation Project of North Minzu University(Grant No.YCX23152).
文摘Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.
文摘BACKGROUND Bone metastasis has various negative impacts.Activities of daily living(ADL)and quality of life(QOL)can be significantly decreased,survival may be impacted,and medical expenses may increase.It is estimated that at least 5%cancer patients might be suffering from bone metastases.In 2016,we published the Comprehensive Guidelines for the Diagnosis and Treatment of Bone Metastasis.Since then,the therapeutic outcomes for patients have gradually improved.As life expectancy is a major determinant of surgical intervention,the strategy should be modified if the prolongation of survival is to be achieved.AIM To monitor how bone metastasis treatment has changed before and after launch of our guidelines for bone metastasis.METHODS For advanced cancer patients with bone metastasis who visited the Department of Clinical Oncology at Akita University hospital between 2012 and 2023,parameters including the site and number of bone metastases,laboratory data,and survival time,were extracted from electronic medical records and the Katagiri score was calculated.The association with survival was determined for each factor.RESULTS Data from 136 patients were obtained.The 1-year survival rate for the poor prognosis group with a higher Katagiri score was 20.0%in this study,which was 6%and an apparent improvement from 2014 when the scoring system was developed.Other factors significantly affecting survival included five or more bone metastases than less(P=0.0080),and treatment with chemotherapy(P<0.001),bone modifying agents(P=0.0175)and immune checkpoint inhibitors(P=0.0128).In recent years,advances in various treatment methods have extended the survival period for patients with advanced cancer.It is necessary not only to simply extend survival time,but also to maintain ADL and improve QOL.CONCLUSION Various therapeutic interventions including surgical approach for bone metastasis,which is a disorder of locomotor organs,are increasingly required.Guidelines and scoring system for prognosis need to be revised promptly.
基金supported by the Fund of ExcellentYouth Scientific and Technological Innovation Team of Hubei’s Universities(Project No:T201818)Science and Technology Research Program of Hubei Provincial Education Department(Project No:Q20143005)Guiding project of scientific research plan of Hubei Provincial Department of Education(Project No:B2021261).
文摘Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be valid for some products but spurious for others.In this paper,we found that spurious products are primarily due to the failure states,which correspond to the spurious counterexamples.The violated products correspond to the real counterexamples.Hence,identifying counterexamples is a critical problem in detecting violated products.In our approach,we obtain the violated products through the genuine counterexamples,which have no failure state,to avoid the tedious computation of identifying spurious products dealt with by the existing algorithm.This can be executed in parallel to improve the efficiency further.Experimental results showthat our approach performswell,varying with the growth of the system scale.By analyzing counterexamples in the abstract model,we observed that spurious products occur in the failure state.The approach helps in identifying whether a counterexample is spurious or genuine.The approach also helps to check whether a failure state exists in the counterexample.The performance evaluation shows that the proposed approach helps significantly in improving the efficiency of abstraction-based SPL model checking.
文摘A multi-agent based transport system is modeled by timed automata model extended with clock variables. The correctness properties of safety and liveness of this model are verified by timed automata based UPPAAL. Agents have a degree of control on their own actions, have their own threads of control, and under some circumstances they are also able to take decisions. Therefore they are autonomous. The multi-agent system is modeled as a network of timed automata based agents supported by clock variables. The representation of agent requirements based on mathematics is helpful in precise and unambiguous specifications, thereby ensuring correctness. This formal representation of requirements provides a way for logical reasoning about the artifacts produced. We can be systematic and precise in assessing correctness by rigorously specifying the functional requirements.
文摘Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is finding ways to make software more reliable. This review provides an overview of techniques developed over time in the field of software model checking to solve the problem of detecting errors in program code. In addition, the challenges posed by this technology are discussed and ways to mitigate them in future research and applications are proposed. A comprehensive examination of the various model verification methods used to detect program code errors is intended to lay the foundation for future research in this area.
文摘In this paper, the interference checking of three-dimensional objects within a plant is discussed and accomplished, which offers an automated solution to the design problems inherent in multi-user, multi-model environments. Also, the collision detection among moving objects is presented and discussed, and some new ideas are proposed. These methods are successfully applied in our Plant Design System (PDS) and are proven to be very practical and efficient.
基金the FederalMinistry of Education and Research of Germany under Grant Numbers 16ES1131 and 16ES1128K.
文摘The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature.
文摘BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities.
文摘In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.
文摘Introduction: Mechanical or physical restraint is an exceptional therapeutic resource to immobilize a subject and thus guarantee the safety of the patient and/or third parties in the face of high-risk behaviors, but it entails multiple crossings (bioethical, philosophical, medical, psychological, legal). Framed in the so-called “safety culture” developed by the WHO, based on the Protocol for its implementation of the CABA and attentive to its frequent use in CABA by different hospital services (medical clinic, geriatrics, intensive care and medical guards) we consider it necessary its study in terms of compliance with the risks it entails and its management. Objectives: Identify regulatory compliance with the GCABA Mechanical restraint (MR) Protocol from a patient safety perspective, as well as describe the clinical and medicolegal aspects, and propose the usefulness of a tool for its management and control. Methodology: Observational, descriptive, transversal and prospective work through the analysis of Clinical Records with indication of MR using a rubric-type form. 177 cases were analyzed between September-November 2023 from three hospitals of the Government of the City of Buenos Aires, statistical parameters were applied and graphs were made. Results: Only 12.99% complied with the Protocol. In the mental health specialized hospital compliance was almost 5 times greater than in the general one, and in the emergency services compliance was 12 times greater than in Inpatient services. We found that the start or end time of MR was not recorded and only 43% described the causes/justifications for the indication (mostly in Emergency and Specialized hospitals), with the MR average time being shorter in Emergency. Conclusions: Only 1.3 out of 10 patients reliably completed the Protocol and it was mostly in the mental health specialized hospital and the emergency services. The results show non-compliance behavior in the application and management of the risk that the use of mechanical restraints entails, being causes for criminal litigation. We consider that the checklists are useful to complete the Protocol and thus provide security to patients and professionals.
文摘The relentless march of a highly pathogenic avian influenza virus(HPAIV)strain,known as H5N1,to become an unprecedented panzootic continues unchecked.The leap of H5N1 clade 2.3.4.4b from Eurasia and Africa to North America in 2021 and its further spread to South America and the Antarctic have exposed new avian and mammalian populations to the virus and led to outbreaks on an unrivaled scale.The virus has infected wild birds across vast geographic regions and caused wildlife deaths in some of the world's most biodiverse ecosystems.
基金supported by National Natural Science Foundation of China(No.61571061)
文摘In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC component code. Firstly, the sub-channel capacities of MLCM systems is analyzed and discussed, based on which the optimal component code rate can be obtained. Secondly, an extrinsic information transfer chart based two-stage searching algorithm is proposed to find the good irregular QC-LDPC code ensembles with optimal component code rates for their corresponding sub-channels. Finally, by constructing the irregular QC-LDPC component codes from the designed ensembles with the aim of possibly enlarging the girth and reducing the number of the shortest cycles, the designed irregular QC-LDPC code based 16QAM and 64QAM MLCM systems can achieve 0.4 dB and 1.2 dB net coding gain, respectively, compared with the recently proposed regular QC-LDPC code based 16QAM and 64QAM MLCM systems.
基金This project is supported by National Natural Science Foundation of China(No.10342003).
文摘The dynamics differential equations are constructed, and the initial conditions are also given. Simulation shows the following conclusions: The water pressure in cylinder has great instantaneous pulsation and phase step when outlet valve or inlet valve opens, but is more gently in other time; The volume efficiency is influenced by the output pressure slightly, and decreases as the working rotational speed increases; When the inherent frequency of the valves is integer multiple of the working frequency, the volume efficiency of system will decrease evidently.
基金supported by the Natural Science Foundation of Hunan Province(2018JJ2282)
文摘Reliability enhancement testing(RET) is an accelerated testing which hastens the performance degradation process to surface its inherent defects of design and manufacture. It is an important hypothesis that the degradation mechanism of the RET is the same as the one of the normal stress condition. In order to check the consistency of two mechanisms, we conduct two enhancement tests with a missile servo system as an object of the study, and preprocess two sets of test data to establish the accelerated degradation models regarding the temperature change rate that is assumed to be the main applied stress of the servo system during the natural storage. Based on the accelerated degradation models and natural storage profile of the servo system, we provide and demonstrate a procedure to check the consistency of two mechanisms by checking the correlation and difference of two sets of degradation data. The results indicate that the two degradation mechanisms are significantly consistent with each other.
基金Supported by the National Natural Science Foundation of China (60673115)the National Basic Research Program of China (973 Program) (2002CB312001)the Open Foundation of State Key Laboratory of Soft-ware Engineering (SKLSE05-13)
文摘A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria.
基金Supported by the National Natural Science Foun-dation of China (60573046)
文摘The soundness is a very important criterion for the correctness of the workflow. Specifying the soundness with Computation Tree Logic (CTL) allows us to verify the soundness with symbolic model checkers. Therefore the state explosion problem in verifying soundness can be overcome efficiently. When the property is not satisfied by the system, model checking can give a counter-example, which can guide us to correct the workflow. In addition, relaxed soundness is another important criterion for the workflow. We also prove that Computation Tree Logic * (CTL * ) can be used to character the relaxed soundness of the workflow.
文摘In many hospitals,prescription checks are conducted by 2 or 3 individual pharmacists at each step of prescription checking,dispensing,and final checking to maintain the safety and efficacy of pharmaceutical therapies in Japan[1,2].In Gunma University Hospital,we also check all prescriptions by 3 pharmacists at each step of dispensing(3 step prescription check system)with the exception of night time.In this study,to assess the significance of our 3 step prescription check system for managing safety of pharmaceutical therapies,we investigated prescriptions that needed the confirmation of questionable points and prescription corrections.
基金supported by the National Natural Science Foundation of China under Grant no. 61371113 and 61401240Graduate Student Research Innovation Program Foundation of Jiangsu Province no. YKC16006+1 种基金Graduate Student Research Innovation Program Foundation of Nantong University no. KYZZ160354Top-notch Academic Programs Project of Jiangsu Higher Education Institutions (PPZY2015B135)
文摘Probabilistic model checking has been widely applied to quantitative analysis of stochastic systems, e.g., analyzing the performance, reliability and survivability of computer and communication systems. In this paper, we extend the application of probabilistic model checking to the vehicle to vehicle(V2V) networks. We first develop a continuous-time Markov chain(CTMC) model for the considered V2V network, after that, the PRISM language is adopted to describe the CTMC model, and continuous-time stochastic logic is used to describe the objective survivability properties. In the analysis, two typical failures are considered, namely the node failure and the link failure, respectively induced by external malicious attacks on a target V2V node, and interrupt in a communication link. Considering these failures, their impacts on the network survivability are demonstrated. It is shown that with increasing failure strength, the network survivability is reduced. On the other hand, the network survivability can be improved with increasing repair rate. The proposed probabilistic model checking-based approach can be effectively used in survivability analysis for the V2V networks, moreover, it is anticipated that the approach can be conveniently extended to other networks.