Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC...Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.展开更多
The main purpose of this paper is to build a new approach for solving a fuzzy linear multi-criterion problem by defining a function called “error function”. For this end, the concept of level set is used to co...The main purpose of this paper is to build a new approach for solving a fuzzy linear multi-criterion problem by defining a function called “error function”. For this end, the concept of level set is used to construct the error function. In addition, we introduce the concept of deviation variable in the definition of the error function. The algorithm of the new approach is summarized in three main steps: first, we transform the original fuzzy problem into a deterministic one by choosing a specific level . second, we solve separately each uni-criteria problem and we compute the error function for each criteria. Finally, we minimize the sum of error functions in order to obtain the desired compromise solution. A numerical example is done for a comparative study with some existing approaches to show the effectiveness of the new approach.展开更多
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ...During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.展开更多
We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intraverteb...We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intravertebral cleft at L1 accompanying an epidural hematoma posteriorly.Immediate pain relief was achieved after percutaneous vertebroplasty.Complete resolution of hematoma was noted three months after procedure.We theorized that intravertebral stability after treatment might have played a role in this patient.展开更多
Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alter...Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.展开更多
The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the co...The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the conventional VIKOR techniques used to integrate group judgments and the information loss arising from defuzzification are problematic and distort final outcomes. An improved integration method, which is optimization-based, is proposed. And it can handle fuzzy criteria values and weights. The precondition for accurately defuzzifying triangular fuzzy num- bers is identified. Several effective defuzzification procedures are proposed to improve the extant VIKOR, and a comprehensive evaluation framework is offered to aid multi-criteria group decision making. Finally, a numerical example is provided to illustrate the practicability of the proposed method.展开更多
An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes a...An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.展开更多
AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectivel...AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectively documented demographic parameters, medical history and clinical symptoms were ascertained. Pre-operative radiographs were examined for the extent of their pathology. The details of the operative procedure were discerned.RESULTS Eight hundred and eighty patients received anterioror combined anterior-posterior cervical surgery from 2008-2013. Nine patients(1.02%) required emergent reintubation. The interval between extubation to reintubation was 6.2 h [1-12]. Patients were kept intubated after reintubation for 2.3 d [2-3]. Seven patients displayed moderate postoperative edema. One patient was diagnosed with a compressive hematoma whichwas subsequently evacuated in the OR. Another patient was diagnosed with a pulmonary effusion and treated with diuretics. One patient received a late debridement for an infected hematoma. Six patients reported residual symptoms and three patients made a complete recovery. CONCLUSION Respiratory compromise is a rare but potentially life threatening complication following cervical surgery. Patients at increased risk should be monitored closely for extended periods of time post-operatively. If the airway is restored adequately in a timely manner through emergent re-intubation, the outcome of the patients is generally favorable.展开更多
A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigat...A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigate changes of immune-competent cells that commonly utilized FBT, including after administration of immno-suppressed animals, the effects by FBT on the regulated effect on the cells were evaluated. Our results showed that FBT augmented the level of lymphocytes in number, while FBT regulated the level of granulocytes in both number and function. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio suggesting their constitution as neutral in peripheral blood were increased significantly 30 days after the administration of FBT in rodents, and compromised host was prepared with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against intracellular parasite, and that FBT augmented intercellular pathogen through humoral immunity. We discussed the significance and mechanism of FBT on the level of leukocyte subsets in number and function that were considered to be potential indicators for the activation of the compromised host. We also proposed an idea that FBT exhibited tonic effects via activating complement components. The evidences were shown by immune-electrophoretic method. Moreover, we tried to access further to the anti-oxidative activities of this FBT. This modification brought to the significant lift up for antibody producing cells and anti-oxidative activity for phagocytic cells.展开更多
A method for ranking complementary judgment matrixes with traspezoidal fuzzy numbers based on Hausdorff metric distance and fuzzy compromise decision approach is proposed. With regard to fuzzy number complementary jud...A method for ranking complementary judgment matrixes with traspezoidal fuzzy numbers based on Hausdorff metric distance and fuzzy compromise decision approach is proposed. With regard to fuzzy number complementary judgment matrixes given by a decider group whose members have various weights, the expert's information was aggregated first by means of simple weight average(SWA) method and Bonissone calculational method. Hence a matrix including all the experts' preference information was got. Then the matrix' column members were added up and the fuzzy evaluation values of the alternatives were got. Lastly, the Hausdorff metric distance and fuzzy compromise decision approach were used to rank the fuzzy evaluation values and then the ranking values of all the alternatives were got. Because exact numbers and triangular fuzzy numbers could all be transformed into trapezoidal fuzzy numbers, the method developed can rank complementary judgment matrixes with trapezoidal fuzzy numbers, triangular fuzzy numbers and exact numbers as well. An illustrative example is also given to verify the developed method and to demonstrate its feasibility and practicality.展开更多
A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-...A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-competent cells that commonly utilized f-Chlorella including after administration of immno-suppressed animals. The effects by f-Chlorella on the regurational effect to the host were measured. Our results showed that f-Chlorella regulated the level of lymphocytes, while conventional-Chlorella worked to adjust the level of granulocytes. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in the peripheral blood. In rodents, immune-compromised host as well as normal animal were prepared with cancer chemotherapeutic agent (Mytomycin-C), and then tried to rescue the immune-competent rebel. Our observations showed that both Chlorella derivatives regulated in number and functions. The effect was more prominent in f-Chlorella than that of conventional one. We discussed the significance and mechanism of f-Chlorella on the level of leukocyte subsets in number and function. These effects were considered to bring the potential elevation of antibody secreting cell by the localized heamolysis in gel method. We also proposed an idea that exhibited tonic effects were brought via activating the complement components in the serum. Moreover, we tried to access further to the anti-oxidative activities of this f-Chlorella. This modification brought to the significant lifted up for immune competent cells and anti-oxidative activity for phagocytic cells.展开更多
Key facts Synonyms:dysfunction of renal transplant due to renal artery stenosis.Classic imaging appearance:narrowing of the transplant renal artery Renal artery stenosis most common vascular complication,.venous ste...Key facts Synonyms:dysfunction of renal transplant due to renal artery stenosis.Classic imaging appearance:narrowing of the transplant renal artery Renal artery stenosis most common vascular complication,.venous stenosis may also be responsible for renal dysfunction.展开更多
Introduction Twisted arteries and veins disrupt normal blood flow and elevate the risk for clinical complications such as thrombosis,heart attack,stroke,and organ dysfunction.Veins should remain mechanically stable fo...Introduction Twisted arteries and veins disrupt normal blood flow and elevate the risk for clinical complications such as thrombosis,heart attack,stroke,and organ dysfunction.Veins should remain mechanically stable for normal function.However,compared to arteries,veins are more vulnerable to collapse because they are thin-walled and under lower lumen pressure.Twisted veins have been shown to occur with head turning or after inadvertent twist during various vascular surgeries.In vivo and cadaver studies have demonstrated that turning the head to one side can result in torsion and compression of the internal jugular vein and can compromise cranial drain-展开更多
The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This st...The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.展开更多
Gastric necrosis is a rare condition because of the rich blood supply and the extensive submucosal vascular network of the stomach. "Gas-bloat" syndrome is a well known Nissen fundoplication postoperative co...Gastric necrosis is a rare condition because of the rich blood supply and the extensive submucosal vascular network of the stomach. "Gas-bloat" syndrome is a well known Nissen fundoplication postoperative complica-tion. It may cause severe gastric dilatation, but very rarely an ischemic compromise of the organ. Other factors, such as gastric outlet obstruction, may concur to cause an intraluminal pressure enough to blockade venous return and ultimately arterial blood supply and oxygen deliver, leading to ischaemia. We report a case of a 63-year-old women, who presented a total gastric necrosis following laparoscopic Nissen fundoplication and a pyloric phytobezoar which was the trigger event. No preexisting gastric motility disorders were present by the time of surgery, as demonstrated in the preop-erative barium swallow, thus a poor mastication(patient needed no dentures) of a high fiber meal(cabbage) may have been predisposing factors for the develop-ment of a bezoar in an otherwise healthy women at the onset of old age. A total gastrectomy with esophagojejunostomy was performed and patient was discharged home after a 7-d hospital stay with no immediate com-plications. We also discuss some technical aspects of the procedure that might be important to reduce the incidence of this complication.展开更多
Autoimmune disease is a condition that occurs due to the loss of immunological tolerance to the self-antigens and results in the production of antibodies.The excess production of these antibodies causes specific organ...Autoimmune disease is a condition that occurs due to the loss of immunological tolerance to the self-antigens and results in the production of antibodies.The excess production of these antibodies causes specific organ damage and systemic compromise[1].Sjögren’s syndrome is a chronic auto-immune disease characterized by the lymphocytic infiltrations of the exocrine gland and the production of antibodies.It is categorized into primary Sjögren’s syndrome and secondary Sjögren’s syndrome.The primary Sjögren’s syndrome is outlined by xeropthalmia(dry eyes)and xerostomia(dry mouth)without any connective tissue damage,and secondary Sjögren’s syndrome is associated with connective tissue disease and other auto-immune diseases like systemic lupus erythematosus,rheumatoid arthritis,systemic sclerosis and less frequently multiple sclerosis.展开更多
In this paper, 60 samples (30 male and 30 female) with normal occlusion in permanent dentition were selected. 60 lateral radiographic cephalograms were taken. By mean of Steiner analysis, means, standard deviations we...In this paper, 60 samples (30 male and 30 female) with normal occlusion in permanent dentition were selected. 60 lateral radiographic cephalograms were taken. By mean of Steiner analysis, means, standard deviations were calculated. Acceptable compromises for individual use were established. Comparison these data with Beijing and Korean were made. Thus the characteristics of craniofacial morphology and denture patterns of Shanghai adult were observed.展开更多
A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the res...A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the resulting decision process is modeled by a suitable scalar transformation (utility function). Each n-tuple of von Neumann-Morgenstern utilities is transformed into a nonnegative scalar value between 0 and 1. Any n-tuple yielding a largest scalar value determines an SE, which is always a pure strategy profile. SEs can be computed much faster than Nash equilibria, for example;and the decision criterion need not be based on the players’ selfishness. To illustrate the SE, we define a compromise equilibrium, establish its Pareto optimality, and present examples comparing it to other solution concepts.展开更多
文摘Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.
文摘The main purpose of this paper is to build a new approach for solving a fuzzy linear multi-criterion problem by defining a function called “error function”. For this end, the concept of level set is used to construct the error function. In addition, we introduce the concept of deviation variable in the definition of the error function. The algorithm of the new approach is summarized in three main steps: first, we transform the original fuzzy problem into a deterministic one by choosing a specific level . second, we solve separately each uni-criteria problem and we compute the error function for each criteria. Finally, we minimize the sum of error functions in order to obtain the desired compromise solution. A numerical example is done for a comparative study with some existing approaches to show the effectiveness of the new approach.
文摘During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.
文摘We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intravertebral cleft at L1 accompanying an epidural hematoma posteriorly.Immediate pain relief was achieved after percutaneous vertebroplasty.Complete resolution of hematoma was noted three months after procedure.We theorized that intravertebral stability after treatment might have played a role in this patient.
基金supported by the Humanities and Social Sciences Foundation of Ministry of Education of China(09YJC630229)Scientific Research Foundation of Guangxi University for Nationalities for Talent Introduction(200702YZ01)Science and Technology Project of State Ethnic Affairs Commission(09GX03)
文摘Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.
基金supported by the National Natural Science Foundation of China(71271116)
文摘The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the conventional VIKOR techniques used to integrate group judgments and the information loss arising from defuzzification are problematic and distort final outcomes. An improved integration method, which is optimization-based, is proposed. And it can handle fuzzy criteria values and weights. The precondition for accurately defuzzifying triangular fuzzy num- bers is identified. Several effective defuzzification procedures are proposed to improve the extant VIKOR, and a comprehensive evaluation framework is offered to aid multi-criteria group decision making. Finally, a numerical example is provided to illustrate the practicability of the proposed method.
基金supported by the National Natural Science Foundation of China (7087111770571086)
文摘An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.
文摘AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectively documented demographic parameters, medical history and clinical symptoms were ascertained. Pre-operative radiographs were examined for the extent of their pathology. The details of the operative procedure were discerned.RESULTS Eight hundred and eighty patients received anterioror combined anterior-posterior cervical surgery from 2008-2013. Nine patients(1.02%) required emergent reintubation. The interval between extubation to reintubation was 6.2 h [1-12]. Patients were kept intubated after reintubation for 2.3 d [2-3]. Seven patients displayed moderate postoperative edema. One patient was diagnosed with a compressive hematoma whichwas subsequently evacuated in the OR. Another patient was diagnosed with a pulmonary effusion and treated with diuretics. One patient received a late debridement for an infected hematoma. Six patients reported residual symptoms and three patients made a complete recovery. CONCLUSION Respiratory compromise is a rare but potentially life threatening complication following cervical surgery. Patients at increased risk should be monitored closely for extended periods of time post-operatively. If the airway is restored adequately in a timely manner through emergent re-intubation, the outcome of the patients is generally favorable.
文摘A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigate changes of immune-competent cells that commonly utilized FBT, including after administration of immno-suppressed animals, the effects by FBT on the regulated effect on the cells were evaluated. Our results showed that FBT augmented the level of lymphocytes in number, while FBT regulated the level of granulocytes in both number and function. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio suggesting their constitution as neutral in peripheral blood were increased significantly 30 days after the administration of FBT in rodents, and compromised host was prepared with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against intracellular parasite, and that FBT augmented intercellular pathogen through humoral immunity. We discussed the significance and mechanism of FBT on the level of leukocyte subsets in number and function that were considered to be potential indicators for the activation of the compromised host. We also proposed an idea that FBT exhibited tonic effects via activating complement components. The evidences were shown by immune-electrophoretic method. Moreover, we tried to access further to the anti-oxidative activities of this FBT. This modification brought to the significant lift up for antibody producing cells and anti-oxidative activity for phagocytic cells.
文摘A method for ranking complementary judgment matrixes with traspezoidal fuzzy numbers based on Hausdorff metric distance and fuzzy compromise decision approach is proposed. With regard to fuzzy number complementary judgment matrixes given by a decider group whose members have various weights, the expert's information was aggregated first by means of simple weight average(SWA) method and Bonissone calculational method. Hence a matrix including all the experts' preference information was got. Then the matrix' column members were added up and the fuzzy evaluation values of the alternatives were got. Lastly, the Hausdorff metric distance and fuzzy compromise decision approach were used to rank the fuzzy evaluation values and then the ranking values of all the alternatives were got. Because exact numbers and triangular fuzzy numbers could all be transformed into trapezoidal fuzzy numbers, the method developed can rank complementary judgment matrixes with trapezoidal fuzzy numbers, triangular fuzzy numbers and exact numbers as well. An illustrative example is also given to verify the developed method and to demonstrate its feasibility and practicality.
文摘A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-competent cells that commonly utilized f-Chlorella including after administration of immno-suppressed animals. The effects by f-Chlorella on the regurational effect to the host were measured. Our results showed that f-Chlorella regulated the level of lymphocytes, while conventional-Chlorella worked to adjust the level of granulocytes. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in the peripheral blood. In rodents, immune-compromised host as well as normal animal were prepared with cancer chemotherapeutic agent (Mytomycin-C), and then tried to rescue the immune-competent rebel. Our observations showed that both Chlorella derivatives regulated in number and functions. The effect was more prominent in f-Chlorella than that of conventional one. We discussed the significance and mechanism of f-Chlorella on the level of leukocyte subsets in number and function. These effects were considered to bring the potential elevation of antibody secreting cell by the localized heamolysis in gel method. We also proposed an idea that exhibited tonic effects were brought via activating the complement components in the serum. Moreover, we tried to access further to the anti-oxidative activities of this f-Chlorella. This modification brought to the significant lifted up for immune competent cells and anti-oxidative activity for phagocytic cells.
文摘Key facts Synonyms:dysfunction of renal transplant due to renal artery stenosis.Classic imaging appearance:narrowing of the transplant renal artery Renal artery stenosis most common vascular complication,.venous stenosis may also be responsible for renal dysfunction.
基金supported by a CAREER award(0644646)from NSFa research grant (R01HL095852)and an MBRS-RISE fellowship(5R25GM060655-12)from the NIHa collaboration grant (11229202)from NNSF of China
文摘Introduction Twisted arteries and veins disrupt normal blood flow and elevate the risk for clinical complications such as thrombosis,heart attack,stroke,and organ dysfunction.Veins should remain mechanically stable for normal function.However,compared to arteries,veins are more vulnerable to collapse because they are thin-walled and under lower lumen pressure.Twisted veins have been shown to occur with head turning or after inadvertent twist during various vascular surgeries.In vivo and cadaver studies have demonstrated that turning the head to one side can result in torsion and compression of the internal jugular vein and can compromise cranial drain-
文摘The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.
文摘Gastric necrosis is a rare condition because of the rich blood supply and the extensive submucosal vascular network of the stomach. "Gas-bloat" syndrome is a well known Nissen fundoplication postoperative complica-tion. It may cause severe gastric dilatation, but very rarely an ischemic compromise of the organ. Other factors, such as gastric outlet obstruction, may concur to cause an intraluminal pressure enough to blockade venous return and ultimately arterial blood supply and oxygen deliver, leading to ischaemia. We report a case of a 63-year-old women, who presented a total gastric necrosis following laparoscopic Nissen fundoplication and a pyloric phytobezoar which was the trigger event. No preexisting gastric motility disorders were present by the time of surgery, as demonstrated in the preop-erative barium swallow, thus a poor mastication(patient needed no dentures) of a high fiber meal(cabbage) may have been predisposing factors for the develop-ment of a bezoar in an otherwise healthy women at the onset of old age. A total gastrectomy with esophagojejunostomy was performed and patient was discharged home after a 7-d hospital stay with no immediate com-plications. We also discuss some technical aspects of the procedure that might be important to reduce the incidence of this complication.
文摘Autoimmune disease is a condition that occurs due to the loss of immunological tolerance to the self-antigens and results in the production of antibodies.The excess production of these antibodies causes specific organ damage and systemic compromise[1].Sjögren’s syndrome is a chronic auto-immune disease characterized by the lymphocytic infiltrations of the exocrine gland and the production of antibodies.It is categorized into primary Sjögren’s syndrome and secondary Sjögren’s syndrome.The primary Sjögren’s syndrome is outlined by xeropthalmia(dry eyes)and xerostomia(dry mouth)without any connective tissue damage,and secondary Sjögren’s syndrome is associated with connective tissue disease and other auto-immune diseases like systemic lupus erythematosus,rheumatoid arthritis,systemic sclerosis and less frequently multiple sclerosis.
文摘In this paper, 60 samples (30 male and 30 female) with normal occlusion in permanent dentition were selected. 60 lateral radiographic cephalograms were taken. By mean of Steiner analysis, means, standard deviations were calculated. Acceptable compromises for individual use were established. Comparison these data with Beijing and Korean were made. Thus the characteristics of craniofacial morphology and denture patterns of Shanghai adult were observed.
文摘A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the resulting decision process is modeled by a suitable scalar transformation (utility function). Each n-tuple of von Neumann-Morgenstern utilities is transformed into a nonnegative scalar value between 0 and 1. Any n-tuple yielding a largest scalar value determines an SE, which is always a pure strategy profile. SEs can be computed much faster than Nash equilibria, for example;and the decision criterion need not be based on the players’ selfishness. To illustrate the SE, we define a compromise equilibrium, establish its Pareto optimality, and present examples comparing it to other solution concepts.