Background:Acute suppurative terminal cholangitis(ASTC)is rarer than acute obstructive cholangitis and is not well studied.To explore this subtype of acute cholangitis,we described our clinical experience with ASTC.Me...Background:Acute suppurative terminal cholangitis(ASTC)is rarer than acute obstructive cholangitis and is not well studied.To explore this subtype of acute cholangitis,we described our clinical experience with ASTC.Methods:We performed a retrospective review of patients with ASTC admitted to our center from September 2014 to August 2020.We analyzed their clinical characteristics,including etiology,clinical manifestations,imaging features,treatment and prognosis.Results:A total of 32 ASTC patients were included in the analysis.The majority of the patients had a history of biliary operations,and clinical manifestations were occult and atypical.The positive rate of bacterial culture was 46.9%.All the patients had typical imaging features on computed tomography and magnetic resonance imaging.Treatment with effective antibiotics was provided as soon as diagnosis was established.After treatment,most patients had a good outcome.Elevated levels of total bilirubin,aspartate aminotransferase,procalcitonin and gamma-glutamyltransferase were the characteristics of critically ill patients and were associated with relatively poor prognosis.Conclusions:Our results demonstrated that ASTC should be recognized as a new subtype of acute cholangitis,and that earlier diagnosis and more personalized treatments are needed.展开更多
Machine learning(ML) is well suited for the prediction of high-complexity,high-dimensional problems such as those encountered in terminal ballistics.We evaluate the performance of four popular ML-based regression mode...Machine learning(ML) is well suited for the prediction of high-complexity,high-dimensional problems such as those encountered in terminal ballistics.We evaluate the performance of four popular ML-based regression models,extreme gradient boosting(XGBoost),artificial neural network(ANN),support vector regression(SVR),and Gaussian process regression(GP),on two common terminal ballistics’ problems:(a)predicting the V50ballistic limit of monolithic metallic armour impacted by small and medium calibre projectiles and fragments,and(b) predicting the depth to which a projectile will penetrate a target of semi-infinite thickness.To achieve this we utilise two datasets,each consisting of approximately 1000samples,collated from public release sources.We demonstrate that all four model types provide similarly excellent agreement when interpolating within the training data and diverge when extrapolating outside this range.Although extrapolation is not advisable for ML-based regression models,for applications such as lethality/survivability analysis,such capability is required.To circumvent this,we implement expert knowledge and physics-based models via enforced monotonicity,as a Gaussian prior mean,and through a modified loss function.The physics-informed models demonstrate improved performance over both classical physics-based models and the basic ML regression models,providing an ability to accurately fit experimental data when it is available and then revert to the physics-based model when not.The resulting models demonstrate high levels of predictive accuracy over a very wide range of projectile types,target materials and thicknesses,and impact conditions significantly more diverse than that achievable from any existing analytical approach.Compared with numerical analysis tools such as finite element solvers the ML models run orders of magnitude faster.We provide some general guidelines throughout for the development,application,and reporting of ML models in terminal ballistics problems.展开更多
Peripheral nerve injuries result in the rapid degeneration of distal nerve segments and immediate loss of motor and sensory functions;behavioral recovery is typically poor.We used a plasmalemmal fusogen,polyethylene g...Peripheral nerve injuries result in the rapid degeneration of distal nerve segments and immediate loss of motor and sensory functions;behavioral recovery is typically poor.We used a plasmalemmal fusogen,polyethylene glycol(PEG),to immediately fuse closely apposed open ends of severed proximal and distal axons in rat sciatic nerves.We have previously reported that sciatic nerve axons repaired by PEG-fusion do not undergo Wallerian degeneration,and PEG-fused animals exhibit rapid(within 2–6 weeks)and extensive locomotor recovery.Furthermore,our previous report showed that PEG-fusion of severed sciatic motor axons was non-specific,i.e.,spinal motoneurons in PEG-fused animals were found to project to appropriate as well as inappropriate target muscles.In this study,we examined the consequences of PEG-fusion for sensory axons of the sciatic nerve.Young adult male and female rats(Sprague–Dawley)received either a unilateral single cut or ablation injury to the sciatic nerve and subsequent repair with or without(Negative Control)the application of PEG.Compound action potentials recorded immediately after PEG-fusion repair confirmed conduction across the injury site.The success of PEG-fusion was confirmed through Sciatic Functional Index testing with PEG-fused animals showing improvement in locomotor function beginning at 35 days postoperatively.At 2–42 days postoperatively,we anterogradely labeled sensory afferents from the dorsal aspect of the hindpaw following bilateral intradermal injection of wheat germ agglutinin conjugated horseradish peroxidase.PEG-fusion repair reestablished axonal continuity.Compared to unoperated animals,labeled sensory afferents ipsilateral to the injury in PEG-fused animals were found in the appropriate area of the dorsal horn,as well as inappropriate mediolateral and rostrocaudal areas.Unexpectedly,despite having intact peripheral nerves,similar reorganizations of labeled sensory afferents were also observed contralateral to the injury and repair.This central reorganization may contribute to the improved behavioral recovery seen after PEG-fusion repair,supporting the use of this novel repair methodology over currently available treatments.展开更多
We investigate the behavior of edge modes in the presence of different edge terminations and long-range(LR)hopping.Here,we mainly focus on such model crystals with two different types of structures(type I:“…-P-Q-P-Q...We investigate the behavior of edge modes in the presence of different edge terminations and long-range(LR)hopping.Here,we mainly focus on such model crystals with two different types of structures(type I:“…-P-Q-P-Q-…”and type II:“…=P-Q=P-Q=…”),where P and Q represent crystal lines(CLs),while the symbols“-”and“=”denote the distance between the nearest neighbor(NN)CLs.Based on the lattice model Hamiltonian with LR hopping,the existence of edge modes is determined analytically by using the transfer matrix method(TMM)when different edge terminals are taken into consideration.Our findings are consistent with the numerical results obtained by the exact diagonalization method.We also notice that edge modes can exhibit different behaviors under different edge terminals.Our result is helpful in solving novel edge modes in honeycomb crystalline graphene and transition metal dichalcogenides with different edge terminals.展开更多
Intelligent personal assistants play a pivotal role in in-vehicle systems,significantly enhancing life efficiency,driving safety,and decision-making support.In this study,the multi-modal design elements of intelligent...Intelligent personal assistants play a pivotal role in in-vehicle systems,significantly enhancing life efficiency,driving safety,and decision-making support.In this study,the multi-modal design elements of intelligent personal assistants within the context of visual,auditory,and somatosensory interactions with drivers were discussed.Their impact on the driver’s psychological state through various modes such as visual imagery,voice interaction,and gesture interaction were explored.The study also introduced innovative designs for in-vehicle intelligent personal assistants,incorporating design principles such as driver-centricity,prioritizing passenger safety,and utilizing timely feedback as a criterion.Additionally,the study employed design methods like driver behavior research and driving situation analysis to enhance the emotional connection between drivers and their vehicles,ultimately improving driver satisfaction and trust.展开更多
Port and terminal efficiency are of utmost importance to the container shipping industry due to their significance in enhancing the competitive advantage of ports within a region. Consequently, there have always been ...Port and terminal efficiency are of utmost importance to the container shipping industry due to their significance in enhancing the competitive advantage of ports within a region. Consequently, there have always been notable variations of studies around it. This paper analyzes the impact of privatization on terminal efficiency using the Port of Tema as a Case Study. The main objective of this paper is to analyze the efficiency trends of the public and private terminals in the port over the years. To achieve this objective, DEA-CCR methodology was employed to calculate the annual technical efficiency trends of the private and public terminals using four input variables and three output variables. The main results of the paper indicated that the public and private terminals were efficient for multiple years. However, the efficiency scores over the years demonstrated inconsistency, exhibiting notable fluctuations. The findings of this study will aid policymakers across the region on policies relating to the efficiency and ownership structure of ports and terminals.展开更多
Improving the cooperative scheduling efficiency of equipment is the key for automated container terminals to copewith the development trend of large-scale ships. In order to improve the solution efficiency of the exis...Improving the cooperative scheduling efficiency of equipment is the key for automated container terminals to copewith the development trend of large-scale ships. In order to improve the solution efficiency of the existing spacetimenetwork (STN) model for the cooperative scheduling problem of yard cranes (YCs) and automated guidedvehicles (AGVs) and extend its application scenarios, two improved STN models are proposed. The flow balanceconstraints in the original model are decomposed, and the trajectory constraints of YCs and AGVs are added toacquire the model STN_A. The coupling constraint in STN_A is updated, and buffer constraints are added toSTN_A so that themodel STN_B is built.As the size of the problem increases, the solution speed of CPLEX becomesthe bottleneck. So a heuristic method containing three groups of heuristic rules is designed to obtain a near-optimalsolution quickly. Experimental results showthat the computation time of STN_A is shortened by 49.47% on averageand the gap is reduced by 1.69% on average compared with the original model. The gap between the solution ofthe heuristic rules and the solution of CPLEX is less than 3.50%, and the solution time of the heuristic rules is onaverage 99.85% less than the solution time of CPLEX. Compared with STN_A, the computation time for solvingSTN_B increases by 58.93% on average.展开更多
The low efficiency and high cost of fresh agricultural product terminal distribution directly restrict the operation of the entire supply network.To reduce costs and optimize the distribution network,we construct a mi...The low efficiency and high cost of fresh agricultural product terminal distribution directly restrict the operation of the entire supply network.To reduce costs and optimize the distribution network,we construct a mixed integer programmingmodel that comprehensively considers tominimize fixed,transportation,fresh-keeping,time,carbon emissions,and performance incentive costs.We analyzed the performance of traditional rider distribution and robot distribution modes in detail.In addition,the uncertainty of the actual market demand poses a huge threat to the stability of the terminal distribution network.In order to resist uncertain interference,we further extend the model to a robust counterpart form.The results of the simulation show that the instability of random parameters will lead to an increase in the cost.Compared with the traditional rider distribution mode,the robot distribution mode can save 12.7%on logistics costs,and the distribution efficiency is higher.Our research can provide support for the design of planning schemes for transportation enterprise managers.展开更多
Background: Perforations of the terminal ileum are a frequent clinical situation and a therapeutic challenge. Surgical treatment is controversial. Several surgical modalities have been proposed and postoperative morbi...Background: Perforations of the terminal ileum are a frequent clinical situation and a therapeutic challenge. Surgical treatment is controversial. Several surgical modalities have been proposed and postoperative morbidity and mortality remain high. The aim of this study was to review our experience in the surgical management of perforations of the terminal ileum. Patients and methods: This is a descriptive cross-sectional study with retrospective data collection from January 1, 2017 to December 31, 2021, in five hospitals in Cameroon. Patients’ demographic, clinical presentation, surgical findings and 30-days postoperative outcomes data were collected. Results: We collected 34 files. The sex ratio was 1.4 and the average age was 20.28 years. The average consultation time was 9.1 days. Abdominal pain was present in all our patients. Peritoneal irritation was present in 46 cases (88.5%). The mean time to treatment after admission was 17.5 hours. The perforation was unique in 40 cases (76.9%) and located between 6 and 10 cm from the ileocecal valve in 29 cases (55.8%). Typhoid was the most suspected etiology intraoperatively in 38 cases (73.1%). A simple suture was performed in 18 patients (34.6%), resection with anastomosis in 11 patients (21.2%) and an ileostomy in 5 patients (9.6%). The average length of hospitalization was 21.74 days. Postoperative morbidity and mortality were 32.7% and 17.3% respectively. Conclusion: Perforations of the terminal ileum are common and affect young people. Surgical procedures are varied. Reducing consultation and care times and respecting treatment principles could improve postoperative morbidity and mortality, which remain high.展开更多
As the number of automated guided vehicles(AGVs)within automated container terminals(ACT)continues to rise,conflicts have becomemore frequent.Addressing point and edge conflicts ofAGVs,amulti-AGVconflict-free path pla...As the number of automated guided vehicles(AGVs)within automated container terminals(ACT)continues to rise,conflicts have becomemore frequent.Addressing point and edge conflicts ofAGVs,amulti-AGVconflict-free path planning model has been formulated to minimize the total path length of AGVs between shore bridges and yards.For larger terminalmaps and complex environments,the grid method is employed to model AGVs’road networks.An improved bounded conflict-based search(IBCBS)algorithmtailored to ACT is proposed,leveraging the binary tree principle to resolve conflicts and employing focal search to expand the search range.Comparative experiments involving 60 AGVs indicate a reduction in computing time by 37.397%to 64.06%while maintaining the over cost within 1.019%.Numerical experiments validate the proposed algorithm’s efficacy in enhancing efficiency and ensuring solution quality.展开更多
BACKGROUND High-grade B-cell lymphoma(HGBL)is an unusual malignancy that includes myelocytomatosis viral oncogene(MYC),B-cell lymphoma-2(BCL-2),and/or BCL-6 rearrangements,termed double-hit or triple-hit lymphomas,and...BACKGROUND High-grade B-cell lymphoma(HGBL)is an unusual malignancy that includes myelocytomatosis viral oncogene(MYC),B-cell lymphoma-2(BCL-2),and/or BCL-6 rearrangements,termed double-hit or triple-hit lymphomas,and HGBL-not otherwise specific(HGBL-NOS),which are morphologically characteristic of HGBL but lack MYC,BCL-2,or BCL-6 rearrangements.HGBL is partially transformed by follicular lymphoma and other indolent lymphoma,with few cases of marginal zone lymphoma(MZL)transformation.HGBL often has a poor prognosis and intensive therapy is currently mainly advocated,but there is no good treatment for these patients who cannot tolerate chemotherapy.CASE SUMMARY We reported a case of MZL transformed into HGBL-NOS with TP53 mutation and terminal deoxynucleotidyl transferase expression.Gene analysis revealed the gene expression profile was identical in the pre-and post-transformed tissues,suggesting that the two diseases are homologous,not secondary tumors.The chemotherapy was ineffective and the side effect was severe,so we tried combination therapy including venetoclax and obinutuzumab.The patient tolerated treatment well,and reached partial response.The patient had recurrence of hepatocellular carcinoma and died of multifunctional organ failure.He survived for 12 months after diagnosis.CONCLUSION Venetoclax combined with obinutuzumab might improve the survival in some HGBL patients,who are unsuitable for chemotherapy.展开更多
Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics system.However,the efficiency of resource scheduling significantly influences the operation pe...Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics system.However,the efficiency of resource scheduling significantly influences the operation performance of MCT.To solve the practical resource scheduling problem(RSP)in MCT efficiently,this paper has contributions to both the problem model and the algorithm design.Firstly,in the problem model,different from most of the existing studies that only consider scheduling part of the resources in MCT,we propose a unified mathematical model for formulating an integrated RSP.The new integrated RSP model allocates and schedules multiple MCT resources simultaneously by taking the total cost minimization as the objective.Secondly,in the algorithm design,a pre-selection-based ant colony system(PACS)approach is proposed based on graphic structure solution representation and a pre-selection strategy.On the one hand,as the RSP can be formulated as the shortest path problem on the directed complete graph,the graphic structure is proposed to represent the solution encoding to consider multiple constraints and multiple factors of the RSP,which effectively avoids the generation of infeasible solutions.On the other hand,the pre-selection strategy aims to reduce the computational burden of PACS and to fast obtain a higher-quality solution.To evaluate the performance of the proposed novel PACS in solving the new integrated RSP model,a set of test cases with different sizes is conducted.Experimental results and comparisons show the effectiveness and efficiency of the PACS algorithm,which can significantly outperform other state-of-the-art algorithms.展开更多
GaN-based vertical P-i-N diode with mesa edge terminal structure due to electric field crowding effect, the breakdown voltage of the device is significantly reduced. This work investigates three terminal structures, i...GaN-based vertical P-i-N diode with mesa edge terminal structure due to electric field crowding effect, the breakdown voltage of the device is significantly reduced. This work investigates three terminal structures, including deeply etched, bevel, and stepped-mesas terminal structures, to suppress electric field crowding effects at the device and junction edges. Deeply-etched mesa terminal yields a breakdown voltage of 1205 V, i.e., 89% of the ideal voltage. The bevel-mesa terminal achieves about 89% of the ideal breakdown voltage, while the step-mesa terminal is less effective in mitigating electric field crowding, at about 32% of the ideal voltage. This work can provide an important reference for the design of high-power, high-voltage GaN-based P-i-N power devices, finding a terminal protection structure suitable for GaNPiN diodes to further enhance the breakdown performance of the device and to unleash the full potential of GaN semiconductor materials.展开更多
The most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an“acceptable level”of“safeness”mainly in the lin...The most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an“acceptable level”of“safeness”mainly in the lines of environmental,health and hygiene and port product issues.This paper examines security risk assessment approaches within the emerging role of ports.This paper contributes to the current literature by considering the ports of Greece as a case in point and by measuring the degree of its security risk orientation based on certain valid risk factors drawn from the current literature.Moreover,it presents a security risk assessment methodology into the domain of port container terminals.Their potential for ports were quantitatively and qualitatively assessed by discussing issues of security approaches within the maritime industry,in order to facilitate improvement strategies.A two-dimension empirical study was conducted,in a time range of ten years(2010-2020)in order to provide evidence regarding security risk assessment in the port container terminal of Thessaloniki,in Greece.The findings of this study have significant strategic policy implications and shed more light on the role of security risks in the overall risk orientation of container terminals in practice.Finally,further research directions in security risk in ports are proposed.展开更多
A new terminal guidance law is proposed based on a solid propellant pulse engine and an improved proportional navigation method to address the terminal guidance issue for kinetic interceptors.On this basis,the start-s...A new terminal guidance law is proposed based on a solid propellant pulse engine and an improved proportional navigation method to address the terminal guidance issue for kinetic interceptors.On this basis,the start-stop curve of the pulse motor during the terminal guidance process is designed,along with its start-up logic.The effectiveness of the proposed guidance strategy is verified through simulation.展开更多
The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for veh...The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for vehicle security,and the intrusion detection technology for CAN bus messages can effectively protect the invehicle network from unlawful attacks.Previous machine learning-based models are unable to effectively identify intrusive abnormal messages due to their inherent shortcomings.Hence,to address the shortcomings of the previous machine learning-based intrusion detection technique,we propose a novel method using Attention Mechanism and AutoEncoder for Intrusion Detection(AMAEID).The AMAEID model first converts the raw hexadecimal message data into binary format to obtain better input.Then the AMAEID model encodes and decodes the binary message data using a multi-layer denoising autoencoder model to obtain a hidden feature representation that can represent the potential features behind the message data at a deeper level.Finally,the AMAEID model uses the attention mechanism and the fully connected layer network to infer whether the message is an abnormal message or not.The experimental results with three evaluation metrics on a real in-vehicle CAN bus message dataset outperform some traditional machine learning algorithms,demonstrating the effectiveness of the AMAEID model.展开更多
With the vigorous development of automobile industry,in-vehicle network is also constantly upgraded to meet data transmission requirements of emerging applications.The main transmission requirements are low latency an...With the vigorous development of automobile industry,in-vehicle network is also constantly upgraded to meet data transmission requirements of emerging applications.The main transmission requirements are low latency and certainty especially for autonomous driving.Time sensitive networking(TSN)based on Ethernet gives a possible solution to these requirements.Previous surveys usually investigated TSN from a general perspective,which referred to TSN of various application fields.In this paper,we focus on the application of TSN to the in-vehicle networks.For in-vehicle networks,we discuss all related TSN standards specified by IEEE 802.1 work group up to now.We further overview and analyze recent literature on various aspects of TSN for automotive applications,including synchronization,resource reservation,scheduling,certainty,software and hardware.Application scenarios of TSN for in-vehicle networks are analyzed one by one.Since TSN of in-vehicle network is still at a very initial stage,this paper also gives insights on open issues,future research directions and possible solutions.展开更多
As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for term...As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for terminals,we propose a trust evaluation model based on equipment portraits for power terminals.First,we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic.Second,we propose an exception evaluation method based on syntax and semantics.The key fields of each message are extracted,and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal.Thus,by combining the network flow order,syntax,and semantic analysis,an equipment portrait can be constructed to guarantee security of the power network terminals.We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time.Finally,the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate,as well as a higher real-time performance,which is more suitable for power terminals.展开更多
基金This study was supported by a grant from the National Natural Science Foundation of China(81870457).
文摘Background:Acute suppurative terminal cholangitis(ASTC)is rarer than acute obstructive cholangitis and is not well studied.To explore this subtype of acute cholangitis,we described our clinical experience with ASTC.Methods:We performed a retrospective review of patients with ASTC admitted to our center from September 2014 to August 2020.We analyzed their clinical characteristics,including etiology,clinical manifestations,imaging features,treatment and prognosis.Results:A total of 32 ASTC patients were included in the analysis.The majority of the patients had a history of biliary operations,and clinical manifestations were occult and atypical.The positive rate of bacterial culture was 46.9%.All the patients had typical imaging features on computed tomography and magnetic resonance imaging.Treatment with effective antibiotics was provided as soon as diagnosis was established.After treatment,most patients had a good outcome.Elevated levels of total bilirubin,aspartate aminotransferase,procalcitonin and gamma-glutamyltransferase were the characteristics of critically ill patients and were associated with relatively poor prognosis.Conclusions:Our results demonstrated that ASTC should be recognized as a new subtype of acute cholangitis,and that earlier diagnosis and more personalized treatments are needed.
文摘Machine learning(ML) is well suited for the prediction of high-complexity,high-dimensional problems such as those encountered in terminal ballistics.We evaluate the performance of four popular ML-based regression models,extreme gradient boosting(XGBoost),artificial neural network(ANN),support vector regression(SVR),and Gaussian process regression(GP),on two common terminal ballistics’ problems:(a)predicting the V50ballistic limit of monolithic metallic armour impacted by small and medium calibre projectiles and fragments,and(b) predicting the depth to which a projectile will penetrate a target of semi-infinite thickness.To achieve this we utilise two datasets,each consisting of approximately 1000samples,collated from public release sources.We demonstrate that all four model types provide similarly excellent agreement when interpolating within the training data and diverge when extrapolating outside this range.Although extrapolation is not advisable for ML-based regression models,for applications such as lethality/survivability analysis,such capability is required.To circumvent this,we implement expert knowledge and physics-based models via enforced monotonicity,as a Gaussian prior mean,and through a modified loss function.The physics-informed models demonstrate improved performance over both classical physics-based models and the basic ML regression models,providing an ability to accurately fit experimental data when it is available and then revert to the physics-based model when not.The resulting models demonstrate high levels of predictive accuracy over a very wide range of projectile types,target materials and thicknesses,and impact conditions significantly more diverse than that achievable from any existing analytical approach.Compared with numerical analysis tools such as finite element solvers the ML models run orders of magnitude faster.We provide some general guidelines throughout for the development,application,and reporting of ML models in terminal ballistics problems.
基金supported by the Department of Defense AFIRMⅢW81XWH-20-2-0029 grant subcontractLone Star Paralysis gift,UT POC19-1774-13 grant+1 种基金Neuraptive Therapeutics Inc.26-7724-56 grantNational Institutes of Health R01-NS128086(all to GDB)。
文摘Peripheral nerve injuries result in the rapid degeneration of distal nerve segments and immediate loss of motor and sensory functions;behavioral recovery is typically poor.We used a plasmalemmal fusogen,polyethylene glycol(PEG),to immediately fuse closely apposed open ends of severed proximal and distal axons in rat sciatic nerves.We have previously reported that sciatic nerve axons repaired by PEG-fusion do not undergo Wallerian degeneration,and PEG-fused animals exhibit rapid(within 2–6 weeks)and extensive locomotor recovery.Furthermore,our previous report showed that PEG-fusion of severed sciatic motor axons was non-specific,i.e.,spinal motoneurons in PEG-fused animals were found to project to appropriate as well as inappropriate target muscles.In this study,we examined the consequences of PEG-fusion for sensory axons of the sciatic nerve.Young adult male and female rats(Sprague–Dawley)received either a unilateral single cut or ablation injury to the sciatic nerve and subsequent repair with or without(Negative Control)the application of PEG.Compound action potentials recorded immediately after PEG-fusion repair confirmed conduction across the injury site.The success of PEG-fusion was confirmed through Sciatic Functional Index testing with PEG-fused animals showing improvement in locomotor function beginning at 35 days postoperatively.At 2–42 days postoperatively,we anterogradely labeled sensory afferents from the dorsal aspect of the hindpaw following bilateral intradermal injection of wheat germ agglutinin conjugated horseradish peroxidase.PEG-fusion repair reestablished axonal continuity.Compared to unoperated animals,labeled sensory afferents ipsilateral to the injury in PEG-fused animals were found in the appropriate area of the dorsal horn,as well as inappropriate mediolateral and rostrocaudal areas.Unexpectedly,despite having intact peripheral nerves,similar reorganizations of labeled sensory afferents were also observed contralateral to the injury and repair.This central reorganization may contribute to the improved behavioral recovery seen after PEG-fusion repair,supporting the use of this novel repair methodology over currently available treatments.
基金supported by the National Natural Science Foundation of China(Grant No.11847061)Domestic Visiting Program for Young and Middle-aged Teachers in Shanghai Universities.
文摘We investigate the behavior of edge modes in the presence of different edge terminations and long-range(LR)hopping.Here,we mainly focus on such model crystals with two different types of structures(type I:“…-P-Q-P-Q-…”and type II:“…=P-Q=P-Q=…”),where P and Q represent crystal lines(CLs),while the symbols“-”and“=”denote the distance between the nearest neighbor(NN)CLs.Based on the lattice model Hamiltonian with LR hopping,the existence of edge modes is determined analytically by using the transfer matrix method(TMM)when different edge terminals are taken into consideration.Our findings are consistent with the numerical results obtained by the exact diagonalization method.We also notice that edge modes can exhibit different behaviors under different edge terminals.Our result is helpful in solving novel edge modes in honeycomb crystalline graphene and transition metal dichalcogenides with different edge terminals.
文摘Intelligent personal assistants play a pivotal role in in-vehicle systems,significantly enhancing life efficiency,driving safety,and decision-making support.In this study,the multi-modal design elements of intelligent personal assistants within the context of visual,auditory,and somatosensory interactions with drivers were discussed.Their impact on the driver’s psychological state through various modes such as visual imagery,voice interaction,and gesture interaction were explored.The study also introduced innovative designs for in-vehicle intelligent personal assistants,incorporating design principles such as driver-centricity,prioritizing passenger safety,and utilizing timely feedback as a criterion.Additionally,the study employed design methods like driver behavior research and driving situation analysis to enhance the emotional connection between drivers and their vehicles,ultimately improving driver satisfaction and trust.
文摘Port and terminal efficiency are of utmost importance to the container shipping industry due to their significance in enhancing the competitive advantage of ports within a region. Consequently, there have always been notable variations of studies around it. This paper analyzes the impact of privatization on terminal efficiency using the Port of Tema as a Case Study. The main objective of this paper is to analyze the efficiency trends of the public and private terminals in the port over the years. To achieve this objective, DEA-CCR methodology was employed to calculate the annual technical efficiency trends of the private and public terminals using four input variables and three output variables. The main results of the paper indicated that the public and private terminals were efficient for multiple years. However, the efficiency scores over the years demonstrated inconsistency, exhibiting notable fluctuations. The findings of this study will aid policymakers across the region on policies relating to the efficiency and ownership structure of ports and terminals.
基金National Natural Science Foundation of China(62073212).
文摘Improving the cooperative scheduling efficiency of equipment is the key for automated container terminals to copewith the development trend of large-scale ships. In order to improve the solution efficiency of the existing spacetimenetwork (STN) model for the cooperative scheduling problem of yard cranes (YCs) and automated guidedvehicles (AGVs) and extend its application scenarios, two improved STN models are proposed. The flow balanceconstraints in the original model are decomposed, and the trajectory constraints of YCs and AGVs are added toacquire the model STN_A. The coupling constraint in STN_A is updated, and buffer constraints are added toSTN_A so that themodel STN_B is built.As the size of the problem increases, the solution speed of CPLEX becomesthe bottleneck. So a heuristic method containing three groups of heuristic rules is designed to obtain a near-optimalsolution quickly. Experimental results showthat the computation time of STN_A is shortened by 49.47% on averageand the gap is reduced by 1.69% on average compared with the original model. The gap between the solution ofthe heuristic rules and the solution of CPLEX is less than 3.50%, and the solution time of the heuristic rules is onaverage 99.85% less than the solution time of CPLEX. Compared with STN_A, the computation time for solvingSTN_B increases by 58.93% on average.
文摘The low efficiency and high cost of fresh agricultural product terminal distribution directly restrict the operation of the entire supply network.To reduce costs and optimize the distribution network,we construct a mixed integer programmingmodel that comprehensively considers tominimize fixed,transportation,fresh-keeping,time,carbon emissions,and performance incentive costs.We analyzed the performance of traditional rider distribution and robot distribution modes in detail.In addition,the uncertainty of the actual market demand poses a huge threat to the stability of the terminal distribution network.In order to resist uncertain interference,we further extend the model to a robust counterpart form.The results of the simulation show that the instability of random parameters will lead to an increase in the cost.Compared with the traditional rider distribution mode,the robot distribution mode can save 12.7%on logistics costs,and the distribution efficiency is higher.Our research can provide support for the design of planning schemes for transportation enterprise managers.
文摘Background: Perforations of the terminal ileum are a frequent clinical situation and a therapeutic challenge. Surgical treatment is controversial. Several surgical modalities have been proposed and postoperative morbidity and mortality remain high. The aim of this study was to review our experience in the surgical management of perforations of the terminal ileum. Patients and methods: This is a descriptive cross-sectional study with retrospective data collection from January 1, 2017 to December 31, 2021, in five hospitals in Cameroon. Patients’ demographic, clinical presentation, surgical findings and 30-days postoperative outcomes data were collected. Results: We collected 34 files. The sex ratio was 1.4 and the average age was 20.28 years. The average consultation time was 9.1 days. Abdominal pain was present in all our patients. Peritoneal irritation was present in 46 cases (88.5%). The mean time to treatment after admission was 17.5 hours. The perforation was unique in 40 cases (76.9%) and located between 6 and 10 cm from the ileocecal valve in 29 cases (55.8%). Typhoid was the most suspected etiology intraoperatively in 38 cases (73.1%). A simple suture was performed in 18 patients (34.6%), resection with anastomosis in 11 patients (21.2%) and an ileostomy in 5 patients (9.6%). The average length of hospitalization was 21.74 days. Postoperative morbidity and mortality were 32.7% and 17.3% respectively. Conclusion: Perforations of the terminal ileum are common and affect young people. Surgical procedures are varied. Reducing consultation and care times and respecting treatment principles could improve postoperative morbidity and mortality, which remain high.
基金supported by National Natural Science Foundation of China(No.62073212)Shanghai Science and Technology Commission(No.23ZR1426600).
文摘As the number of automated guided vehicles(AGVs)within automated container terminals(ACT)continues to rise,conflicts have becomemore frequent.Addressing point and edge conflicts ofAGVs,amulti-AGVconflict-free path planning model has been formulated to minimize the total path length of AGVs between shore bridges and yards.For larger terminalmaps and complex environments,the grid method is employed to model AGVs’road networks.An improved bounded conflict-based search(IBCBS)algorithmtailored to ACT is proposed,leveraging the binary tree principle to resolve conflicts and employing focal search to expand the search range.Comparative experiments involving 60 AGVs indicate a reduction in computing time by 37.397%to 64.06%while maintaining the over cost within 1.019%.Numerical experiments validate the proposed algorithm’s efficacy in enhancing efficiency and ensuring solution quality.
基金Supported by The Lishui Science and Technology Planing Projects,No.2020SJZC048.
文摘BACKGROUND High-grade B-cell lymphoma(HGBL)is an unusual malignancy that includes myelocytomatosis viral oncogene(MYC),B-cell lymphoma-2(BCL-2),and/or BCL-6 rearrangements,termed double-hit or triple-hit lymphomas,and HGBL-not otherwise specific(HGBL-NOS),which are morphologically characteristic of HGBL but lack MYC,BCL-2,or BCL-6 rearrangements.HGBL is partially transformed by follicular lymphoma and other indolent lymphoma,with few cases of marginal zone lymphoma(MZL)transformation.HGBL often has a poor prognosis and intensive therapy is currently mainly advocated,but there is no good treatment for these patients who cannot tolerate chemotherapy.CASE SUMMARY We reported a case of MZL transformed into HGBL-NOS with TP53 mutation and terminal deoxynucleotidyl transferase expression.Gene analysis revealed the gene expression profile was identical in the pre-and post-transformed tissues,suggesting that the two diseases are homologous,not secondary tumors.The chemotherapy was ineffective and the side effect was severe,so we tried combination therapy including venetoclax and obinutuzumab.The patient tolerated treatment well,and reached partial response.The patient had recurrence of hepatocellular carcinoma and died of multifunctional organ failure.He survived for 12 months after diagnosis.CONCLUSION Venetoclax combined with obinutuzumab might improve the survival in some HGBL patients,who are unsuitable for chemotherapy.
基金This research was supported in part by the National Key Research and Development Program of China under Grant 2022YFB3305303in part by the National Natural Science Foundations of China(NSFC)under Grant 62106055+1 种基金in part by the Guangdong Natural Science Foundation under Grant 2022A1515011825in part by the Guangzhou Science and Technology Planning Project under Grants 2023A04J0388 and 2023A03J0662.
文摘Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics system.However,the efficiency of resource scheduling significantly influences the operation performance of MCT.To solve the practical resource scheduling problem(RSP)in MCT efficiently,this paper has contributions to both the problem model and the algorithm design.Firstly,in the problem model,different from most of the existing studies that only consider scheduling part of the resources in MCT,we propose a unified mathematical model for formulating an integrated RSP.The new integrated RSP model allocates and schedules multiple MCT resources simultaneously by taking the total cost minimization as the objective.Secondly,in the algorithm design,a pre-selection-based ant colony system(PACS)approach is proposed based on graphic structure solution representation and a pre-selection strategy.On the one hand,as the RSP can be formulated as the shortest path problem on the directed complete graph,the graphic structure is proposed to represent the solution encoding to consider multiple constraints and multiple factors of the RSP,which effectively avoids the generation of infeasible solutions.On the other hand,the pre-selection strategy aims to reduce the computational burden of PACS and to fast obtain a higher-quality solution.To evaluate the performance of the proposed novel PACS in solving the new integrated RSP model,a set of test cases with different sizes is conducted.Experimental results and comparisons show the effectiveness and efficiency of the PACS algorithm,which can significantly outperform other state-of-the-art algorithms.
文摘GaN-based vertical P-i-N diode with mesa edge terminal structure due to electric field crowding effect, the breakdown voltage of the device is significantly reduced. This work investigates three terminal structures, including deeply etched, bevel, and stepped-mesas terminal structures, to suppress electric field crowding effects at the device and junction edges. Deeply-etched mesa terminal yields a breakdown voltage of 1205 V, i.e., 89% of the ideal voltage. The bevel-mesa terminal achieves about 89% of the ideal breakdown voltage, while the step-mesa terminal is less effective in mitigating electric field crowding, at about 32% of the ideal voltage. This work can provide an important reference for the design of high-power, high-voltage GaN-based P-i-N power devices, finding a terminal protection structure suitable for GaNPiN diodes to further enhance the breakdown performance of the device and to unleash the full potential of GaN semiconductor materials.
文摘The most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an“acceptable level”of“safeness”mainly in the lines of environmental,health and hygiene and port product issues.This paper examines security risk assessment approaches within the emerging role of ports.This paper contributes to the current literature by considering the ports of Greece as a case in point and by measuring the degree of its security risk orientation based on certain valid risk factors drawn from the current literature.Moreover,it presents a security risk assessment methodology into the domain of port container terminals.Their potential for ports were quantitatively and qualitatively assessed by discussing issues of security approaches within the maritime industry,in order to facilitate improvement strategies.A two-dimension empirical study was conducted,in a time range of ten years(2010-2020)in order to provide evidence regarding security risk assessment in the port container terminal of Thessaloniki,in Greece.The findings of this study have significant strategic policy implications and shed more light on the role of security risks in the overall risk orientation of container terminals in practice.Finally,further research directions in security risk in ports are proposed.
基金The National Natural Science Foundation of China(Project No.52102436)The Natural Science Foundation of Shanghai(Project No.23ZR1462700)+3 种基金The National Key Laboratory Open Fund for Strength and Structural Integrity(Project No.ASSIKFJJ202304006)The Shanghai Aerospace Science and Technology Innovation Fund(Project No.SAST2022-031)The National Key Laboratory of Space Intelligent Control(Project No.2023-JCJQ-LB-006-14)The Shanghai Key Laboratory of Spacecraft Mechanism(Project No.YY-F805202210025)。
文摘A new terminal guidance law is proposed based on a solid propellant pulse engine and an improved proportional navigation method to address the terminal guidance issue for kinetic interceptors.On this basis,the start-stop curve of the pulse motor during the terminal guidance process is designed,along with its start-up logic.The effectiveness of the proposed guidance strategy is verified through simulation.
基金supported by Chongqing Big Data Engineering Laboratory for Children,Chongqing Electronics Engineering Technology Research Center for Interactive Learning,Project of Science and Technology Research Program of Chongqing Education Commission of China. (No.KJZD-K201801601).
文摘The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for vehicle security,and the intrusion detection technology for CAN bus messages can effectively protect the invehicle network from unlawful attacks.Previous machine learning-based models are unable to effectively identify intrusive abnormal messages due to their inherent shortcomings.Hence,to address the shortcomings of the previous machine learning-based intrusion detection technique,we propose a novel method using Attention Mechanism and AutoEncoder for Intrusion Detection(AMAEID).The AMAEID model first converts the raw hexadecimal message data into binary format to obtain better input.Then the AMAEID model encodes and decodes the binary message data using a multi-layer denoising autoencoder model to obtain a hidden feature representation that can represent the potential features behind the message data at a deeper level.Finally,the AMAEID model uses the attention mechanism and the fully connected layer network to infer whether the message is an abnormal message or not.The experimental results with three evaluation metrics on a real in-vehicle CAN bus message dataset outperform some traditional machine learning algorithms,demonstrating the effectiveness of the AMAEID model.
文摘With the vigorous development of automobile industry,in-vehicle network is also constantly upgraded to meet data transmission requirements of emerging applications.The main transmission requirements are low latency and certainty especially for autonomous driving.Time sensitive networking(TSN)based on Ethernet gives a possible solution to these requirements.Previous surveys usually investigated TSN from a general perspective,which referred to TSN of various application fields.In this paper,we focus on the application of TSN to the in-vehicle networks.For in-vehicle networks,we discuss all related TSN standards specified by IEEE 802.1 work group up to now.We further overview and analyze recent literature on various aspects of TSN for automotive applications,including synchronization,resource reservation,scheduling,certainty,software and hardware.Application scenarios of TSN for in-vehicle networks are analyzed one by one.Since TSN of in-vehicle network is still at a very initial stage,this paper also gives insights on open issues,future research directions and possible solutions.
基金supported by the National Key Research and Development Program of China(No.2021YFB2401200)。
文摘As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for terminals,we propose a trust evaluation model based on equipment portraits for power terminals.First,we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic.Second,we propose an exception evaluation method based on syntax and semantics.The key fields of each message are extracted,and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal.Thus,by combining the network flow order,syntax,and semantic analysis,an equipment portrait can be constructed to guarantee security of the power network terminals.We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time.Finally,the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate,as well as a higher real-time performance,which is more suitable for power terminals.