As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Informatio...As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Information-Centric Networking(ICN)came into being.From a technical point of view,ICN is a promising future network architecture.Researching and customizing a reasonable pricing mechanism plays a positive role in promoting the deployment of ICN.The current research on ICN pricing mechanism is focused on paid content.Therefore,we study an ICN pricing model for free content,which uses game theory based on Nash equilibrium to analysis.In this work,advertisers are considered,and an advertiser model is established to describe the economic interaction between advertisers and ICN entities.This solution can formulate the best pricing strategy for all ICN entities and maximize the benefits of each entity.Our extensive analysis and numerical results show that the proposed pricing framework is significantly better than existing solutions when it comes to free content.展开更多
The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data....The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.展开更多
Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching metho...Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.展开更多
Information-Centric Networking(ICN), an alternative architecture to the current Internet infrastructure, focuses on the distribution and retrieval of content by employing caches in a network to reduce network traffic....Information-Centric Networking(ICN), an alternative architecture to the current Internet infrastructure, focuses on the distribution and retrieval of content by employing caches in a network to reduce network traffic. The employment of caches may be accomplished using graph-based and content-based criteria such as the position of a node in a network and content popularity. The contribution of this paper lies on the characterization of content popularity for on-path in-network caching. To this end, four dynamic approaches for identifying content popularity are evaluated via simulations. Content popularity may be determined per chunk or per object, calculated by the number of requests for a content against the sum of requests or the maximum number of requests. Based on the results, chunk-based approaches provide 23% more accurate content popularity calculations than object-based approaches. In addition, approaches that are based on the comparison of a content against the maximum number of requests have been shown to be more accurate than the alternatives.展开更多
The recent evolution of the Internet towards "Information-centric" transfer modes has renewed the interest in exploiting proxies to enhance seamless mobility. In this work, we focus on the case of multiple l...The recent evolution of the Internet towards "Information-centric" transfer modes has renewed the interest in exploiting proxies to enhance seamless mobility. In this work, we focus on the case of multiple levels of proxies in ICN architectures, in which content requests from mobile subscribers and the corresponding items are proactively cached to these proxies at different levels. Specifically, we present a multiple-level proactive caching model that selects the appropriate subset of proxies at different levels and supports distributed online decision procedures in terms of the tradeoff between delay and cache cost. We show via extensive simulations the reduction of up to 31.63% in the total cost relative to Full Caching, in which caching in all 1-level neighbor proxies is performed, and up to 84.21% relative to No Caching, in which no caching is used. Moreover, the proposed model outperforms other approaches with a flat cache structure in terms of the total cost.展开更多
Publish/subscribe(pub/sub) paradigm is the main communication model for Information-Centric Network(ICN) proposals.A key issue for pub/sub system is how to route the content objects to the correct subscribers,and ICN ...Publish/subscribe(pub/sub) paradigm is the main communication model for Information-Centric Network(ICN) proposals.A key issue for pub/sub system is how to route the content objects to the correct subscribers,and ICN is no exception.ICN network would be divided into core domain and many edge domains as today's internet does.HHR(Hierarchy Hybrid Routing scheme) is presented for ICN:A Chord-like routing scheme is used in core domain,while edge domains routing structure can be classified into three categories,Local Routing(LR),Delivery of Local Publication to Core domain(DLPC),and Remote Publication Routing into edge domain(RPR).LR can be decided by each edge domain,which determined by many factors,such as locality characteristic for pub/sub information and local policies.A hierarchical routing algorithm is proposed to solve DLPC and RPR simultaneously.Simulation results demonstrate that HHR can be fast deployed,and can be applied in large scale network or dynamic subscription environment.展开更多
Information-Centric Networking (ICN) is an innovative paradigm for the future internet architecture, which addresses IP network limitations in supporting content distribution and information access by decoupling conte...Information-Centric Networking (ICN) is an innovative paradigm for the future internet architecture, which addresses IP network limitations in supporting content distribution and information access by decoupling content from hosts and providing the ability to retrieve a content object by its name (identifier), rather than its storage location (IP address). Name resolution and routing is critical for content retrieval in ICN networks. In this research, we perform a comparative study of two widely used classes of ICN name resolution and routing schemes, namely flooding and Distributed Hash Table (DHT). We consider the flooding-based routing in Content-Centric Networks due to its wide acceptance. For the DHT scheme, we design a multi-level DHT that takes into account the underlying network topology and uses name aggregation to further reduce control overhead and improve network efficiency. Then, we compare the characteristics and performance of these two classes of name resolution and routing through extensive simulations. The evaluation results show that the performances of these two approaches are reliant on several factors, including network size, content location dynamics, and content popularity. Our study reveals insights into the design tradeoffs and offers guidelines for design strategies.展开更多
The current Internet is based on host-centric networking, and a user needs to know the host address before reaching a data target in the network. The new architecture of information-centric networking (ICN) facilitate...The current Internet is based on host-centric networking, and a user needs to know the host address before reaching a data target in the network. The new architecture of information-centric networking (ICN) facilitates users to locate data targets by giving their data names without any information about host addresses. In-network caching is one of the prominent features in ICN, which allows network routers to cache data contents. In this paper, we emphasize the management of in-network cache storage, and this includes the mechanisms of cache replacement and cache replication. A new cost function is then proposed to evaluate each cache content and the least valuable content is evicted when cache is full. To increase cache utilization, a cooperative caching policy among neighboring routers is proposed. The proper network locations to cache data contents are also discussed in the paper. Experimental results show the superiority of the proposed caching policy than some traditional caching polices.展开更多
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger infotainment.However,the con...Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger infotainment.However,the continuous dissemination of information fromvehicles and their one-hop neighbor nodes,Road Side Units(RSUs),and VANET infrastructures can lead to performance degradation of VANETs in the existing hostcentric IP-based network.Therefore,Information Centric Networks(ICN)are being explored as an alternative architecture for vehicular communication to achieve robust content distribution in highly mobile,dynamic,and errorprone domains.In ICN-based Vehicular-IoT networks,consumer mobility is implicitly supported,but producer mobility may result in redundant data transmission and caching inefficiency at intermediate vehicular nodes.This paper proposes an efficient redundant transmission control algorithm based on network coding to reduce data redundancy and accelerate the efficiency of information dissemination.The proposed protocol,called Network Cording Multiple Solutions Scheduling(NCMSS),is receiver-driven collaborative scheduling between requesters and information sources that uses a global parameter expectation deadline to effectively manage the transmission of encoded data packets and control the selection of information sources.Experimental results for the proposed NCMSS protocol is demonstrated to analyze the performance of ICN-vehicular-IoT networks in terms of caching,data retrieval delay,and end-to-end application throughput.The end-to-end throughput in proposed NCMSS is 22%higher(for 1024 byte data)than existing solutions whereas delay in NCMSS is reduced by 5%in comparison with existing solutions.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
In-network caching is a fundamental mechanism advocated by information-centric networks (ICNs) for efficient content delivery. However, this new mechanism also brings serious privacy risks due to cache snooping atta...In-network caching is a fundamental mechanism advocated by information-centric networks (ICNs) for efficient content delivery. However, this new mechanism also brings serious privacy risks due to cache snooping attacks. One effective solution to this problem is random-cache, where the cache in a router randomly mimics a cache hit or a cache miss for each content request/probe. In this paper, we investigate the effectiveness of using multiple random-caches to protect cache privacy in a multi-path ICN. We propose models for characterizing the privacy of multi-path ICNs with random-caches, and analyze two different attack scenarios: 1) prefix-based attacks and 2) suffix-based attacks. Both homogeneous and heterogeneous caches are considered. Our analysis shows that in a multi-path ICN an adversary can potentially gain more privacy information by adopting prefix-based attacks. Furthermore, heterogeneous caches provide much better privacy protection than homogeneous ones under both attacks. The effect of different parameters on the privacy of multi-path random-caches is further investigated, and the comparison with its single-path counterpart is carried out based on numerical evaluations. The analysis and results in this paper provide insights in designing and evaluating multi-path ICNs when we take privacy into consideration.展开更多
This paper proposes the Content Diffusion Model(CDM)for modeling the content diffusion process in information-centric networking(ICN).CDM is inspired by the epidemic model and it provides a method of theoretical quant...This paper proposes the Content Diffusion Model(CDM)for modeling the content diffusion process in information-centric networking(ICN).CDM is inspired by the epidemic model and it provides a method of theoretical quantitative analysis for the content diffusion process in ICN.Specifically,CDM introduces the key functions to formalize the key factors that influence the content diffusion process,and thus it can construct the model via a simple but efficient way.Further,we derive CDM by using different combinations of those key factors and put them into several typical ICN scenarios,to analyze the characteristics during the diffusion process such as diffusion speed,diffusion scope,average fetching hops,changing and final state,which can greatly help to analyze the network performance and application design.A series of experiments are conducted to evaluate the efficacy and accuracy of CDM.The results show that CDM can accurately illustrate and model the content diffusion process in ICN.展开更多
Immune changes and inflammatory responses have been identified as central events in the pathological process of spinal co rd injury.They can greatly affect nerve regeneration and functional recovery.However,there is s...Immune changes and inflammatory responses have been identified as central events in the pathological process of spinal co rd injury.They can greatly affect nerve regeneration and functional recovery.However,there is still limited understanding of the peripheral immune inflammato ry response in spinal cord inju ry.In this study.we obtained microRNA expression profiles from the peripheral blood of patients with spinal co rd injury using high-throughput sequencing.We also obtained the mRNA expression profile of spinal cord injury patients from the Gene Expression Omnibus(GEO)database(GSE151371).We identified 54 differentially expressed microRNAs and 1656 diffe rentially expressed genes using bioinformatics approaches.Functional enrichment analysis revealed that various common immune and inflammation-related signaling pathways,such as neutrophil extracellular trap formation pathway,T cell receptor signaling pathway,and nuclear factor-κB signal pathway,we re abnormally activated or inhibited in spinal cord inju ry patient samples.We applied an integrated strategy that combines weighted gene co-expression network analysis,LASSO logistic regression,and SVM-RFE algorithm and identified three biomarke rs associated with spinal cord injury:ANO10,BST1,and ZFP36L2.We verified the expression levels and diagnostic perfo rmance of these three genes in the original training dataset and clinical samples through the receiver operating characteristic curve.Quantitative polymerase chain reaction results showed that ANO20 and BST1 mRNA levels were increased and ZFP36L2 mRNA was decreased in the peripheral blood of spinal cord injury patients.We also constructed a small RNA-mRNA interaction network using Cytoscape.Additionally,we evaluated the proportion of 22 types of immune cells in the peripheral blood of spinal co rd injury patients using the CIBERSORT tool.The proportions of naive B cells,plasma cells,monocytes,and neutrophils were increased while the proportions of memory B cells,CD8^(+)T cells,resting natural killer cells,resting dendritic cells,and eosinophils were markedly decreased in spinal cord injury patients increased compared with healthy subjects,and ANO10,BST1 and ZFP26L2we re closely related to the proportion of certain immune cell types.The findings from this study provide new directions for the development of treatment strategies related to immune inflammation in spinal co rd inju ry and suggest that ANO10,BST2,and ZFP36L2 are potential biomarkers for spinal cord injury.The study was registe red in the Chinese Clinical Trial Registry(registration No.ChiCTR2200066985,December 12,2022).展开更多
Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been c...Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been considered as one of the powerful tools in promoting the fields of imaging processing and object recognition.However,the existing optical system architecture cannot be reconstructed to the realization of multi-functional artificial intelligence systems simultaneously.To push the development of this issue,we propose the pluggable diffractive neural networks(P-DNN),a general paradigm resorting to the cascaded metasurfaces,which can be applied to recognize various tasks by switching internal plug-ins.As the proof-of-principle,the recognition functions of six types of handwritten digits and six types of fashions are numerical simulated and experimental demonstrated at near-infrared regimes.Encouragingly,the proposed paradigm not only improves the flexibility of the optical neural networks but paves the new route for achieving high-speed,low-power and versatile artificial intelligence systems.展开更多
Background In early adolescence,youth are highly prone to suicidal behaviours.Identifying modifiable risk factors during this critical phase is a priority to inform effective suicide prevention strategies.Aims To expl...Background In early adolescence,youth are highly prone to suicidal behaviours.Identifying modifiable risk factors during this critical phase is a priority to inform effective suicide prevention strategies.Aims To explore the risk and protective factors of suicidal behaviours(ie,suicidal ideation,plans and attempts)in early adolescence in China using a social-ecological perspective.Methods Using data from the cross-sectional project‘Healthy and Risky Behaviours Among Middle School Students in Anhui Province,China',stratified random cluster sampling was used to select 5724 middle school students who had completed self-report questionnaires in November 2020.Network analysis was employed to examine the correlates of suicidal ideation,plans and attempts at four levels,namely individual(sex,academic performance,serious physical llness/disability,history of self-harm,depression,impulsivity,sleep problems,resilience),family(family economic status,relationship with mother,relationship with father,family violence,childhood abuse,parental mental illness),school(relationship with teachers,relationship with classmates,school-bullying victimisation and perpetration)and social(social support,satisfaction with society).Results In total,37.9%,19.0%and 5.5%of the students reported suicidal ideation,plans and attempts in the past 6 months,respectively.The estimated network revealed that suicidal ideation,plans and attempts were collectively associated with a history of self-harm,sleep problems,childhood abuse,school bullying and victimisation.Centrality analysis indicated that the most influential nodes in the network were history of self-harm and childhood abuse.Notably,the network also showed unique correlates of suicidal ideation(sex,weight=0.60;impulsivity,weight=0.24;family violence,weight=0.17;relationship with teachers,weight=-0.03;school-bullying perpetration,weight=0.22),suicidal plans(social support,weight=-0.15)and suicidal attempts(relationship with mother,weight=-0.10;parental mental llness,weight=0.61).Conclusions This study identified the correlates of suicidal ideation,plans and attempts,and provided practical implications for suicide prevention for young adolescents in China.Firstly,this study highlighted the importance of joint interventions across multiple departments.Secondly,the common risk factors of suicidal ideation,plans and attempts were elucidated.Thirdly,this study proposed target interventions to address the unique influencing factors of suicidal ideation,plans and attempts.展开更多
Convolutional neural networks depend on deep network architectures to extract accurate information for image super‐resolution.However,obtained information of these con-volutional neural networks cannot completely exp...Convolutional neural networks depend on deep network architectures to extract accurate information for image super‐resolution.However,obtained information of these con-volutional neural networks cannot completely express predicted high‐quality images for complex scenes.A dynamic network for image super‐resolution(DSRNet)is presented,which contains a residual enhancement block,wide enhancement block,feature refine-ment block and construction block.The residual enhancement block is composed of a residual enhanced architecture to facilitate hierarchical features for image super‐resolution.To enhance robustness of obtained super‐resolution model for complex scenes,a wide enhancement block achieves a dynamic architecture to learn more robust information to enhance applicability of an obtained super‐resolution model for varying scenes.To prevent interference of components in a wide enhancement block,a refine-ment block utilises a stacked architecture to accurately learn obtained features.Also,a residual learning operation is embedded in the refinement block to prevent long‐term dependency problem.Finally,a construction block is responsible for reconstructing high‐quality images.Designed heterogeneous architecture can not only facilitate richer structural information,but also be lightweight,which is suitable for mobile digital devices.Experimental results show that our method is more competitive in terms of performance,recovering time of image super‐resolution and complexity.The code of DSRNet can be obtained at https://github.com/hellloxiaotian/DSRNet.展开更多
Accurately predicting fluid forces acting on the sur-face of a structure is crucial in engineering design.However,this task becomes particularly challenging in turbulent flow,due to the complex and irregular changes i...Accurately predicting fluid forces acting on the sur-face of a structure is crucial in engineering design.However,this task becomes particularly challenging in turbulent flow,due to the complex and irregular changes in the flow field.In this study,we propose a novel deep learning method,named mapping net-work-coordinated stacked gated recurrent units(MSU),for pre-dicting pressure on a circular cylinder from velocity data.Specifi-cally,our coordinated learning strategy is designed to extract the most critical velocity point for prediction,a process that has not been explored before.In our experiments,MSU extracts one point from a velocity field containing 121 points and utilizes this point to accurately predict 100 pressure points on the cylinder.This method significantly reduces the workload of data measure-ment in practical engineering applications.Our experimental results demonstrate that MSU predictions are highly similar to the real turbulent data in both spatio-temporal and individual aspects.Furthermore,the comparison results show that MSU predicts more precise results,even outperforming models that use all velocity field points.Compared with state-of-the-art methods,MSU has an average improvement of more than 45%in various indicators such as root mean square error(RMSE).Through comprehensive and authoritative physical verification,we estab-lished that MSU’s prediction results closely align with pressure field data obtained in real turbulence fields.This confirmation underscores the considerable potential of MSU for practical applications in real engineering scenarios.The code is available at https://github.com/zhangzm0128/MSU.展开更多
The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedd...The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedded devices.In order to reduce the complexity and overhead of deploying neural networks on Integeronly hardware,most current quantization methods use a symmetric quantization mapping strategy to quantize a floating-point neural network into an integer network.However,although symmetric quantization has the advantage of easier implementation,it is sub-optimal for cases where the range could be skewed and not symmetric.This often comes at the cost of lower accuracy.This paper proposed an activation redistribution-based hybrid asymmetric quantizationmethod for neural networks.The proposedmethod takes data distribution into consideration and can resolve the contradiction between the quantization accuracy and the ease of implementation,balance the trade-off between clipping range and quantization resolution,and thus improve the accuracy of the quantized neural network.The experimental results indicate that the accuracy of the proposed method is 2.02%and 5.52%higher than the traditional symmetric quantization method for classification and detection tasks,respectively.The proposed method paves the way for computationally intensive neural network models to be deployed on devices with limited computing resources.Codes will be available on https://github.com/ycjcy/Hybrid-Asymmetric-Quantization.展开更多
BACKGROUND Currently,traditional Chinese medicine(TCM)formulas are commonly being used as adjunctive therapy for ulcerative colitis in China.Network meta-analysis,a quantitative and comprehensive analytical method,can...BACKGROUND Currently,traditional Chinese medicine(TCM)formulas are commonly being used as adjunctive therapy for ulcerative colitis in China.Network meta-analysis,a quantitative and comprehensive analytical method,can systematically compare the effects of different adjunctive treatment options for ulcerative colitis,providing scientific evidence for clinical decision-making.AIM To evaluate the clinical efficacy and safety of commonly used TCM for the treatment of ulcerative colitis(UC)in clinical practice through a network metaanalysis.METHODS Clinical randomized controlled trials of these TCM formulas used for the adjuvant treatment of UC were searched from the establishment of the databases to July 1,2022.Studies that met the inclusion criteria were screened and evaluated for literature quality and risk of bias according to the Cochrane 5.1 standard.The methodological quality of the studies was assessed using ReviewManager(RevMan)5.4,and a funnel plot was constructed to test for publication bias.ADDIS 1.16 statistical software was used to perform statistical analysis of the treatment measures and derive the network relationship and ranking diagrams of the various intervention measures.RESULTS A total of 64 randomized controlled trials involving 5456 patients with UC were included in this study.The adjuvant treatment of UC using five TCM formulations was able to improve the clinical outcome of the patients.Adjuvant treatment with Baitouweng decoction(BTWT)showed a significant effect[mean difference=36.22,95%confidence interval(CI):7.63 to 65.76].For the reduction of tumor necrosis factor in patients with UC,adjunctive therapy with BTWT(mean difference=−9.55,95%CI:−17.89 to−1.41),Shenlingbaizhu powder[SLBZS;odds ratio(OR)=0.19,95%CI:0.08 to 0.39],and Shaoyao decoction(OR=−23.02,95%CI:−33.64 to−13.14)was effective.Shaoyao decoction was more effective than BTWT(OR=0.12,95%CI:0.03 to 0.39),SLBZS(OR=0.19,95%CI:0.08 to 0.39),and Xi Lei powder(OR=0.34,95%CI:0.13 to 0.81)in reducing tumor necrosis factor and the recurrence rate of UC.CONCLUSION TCM combined with mesalazine is more effective than mesalazine alone in the treatment of UC.展开更多
AIM:To figure out whether various atropine dosages may slow the progression of myopia in Chinese kids and teenagers and to determine the optimal atropine concentration for effectively slowing the progression of myopia...AIM:To figure out whether various atropine dosages may slow the progression of myopia in Chinese kids and teenagers and to determine the optimal atropine concentration for effectively slowing the progression of myopia.METHODS:A systematic search was conducted across the Cochrane Library,PubMed,Web of Science,EMBASE,CNKI,CBM,VIP,and Wanfang database,encompassing literature on slowing progression of myopia with varying atropine concentrations from database inception to January 17,2024.Data extraction and quality assessment were performed,and a network Meta-analysis was executed using Stata version 14.0 Software.Results were visually represented through graphs.RESULTS:Fourteen papers comprising 2475 cases were included;five different concentrations of atropine solution were used.The network Meta-analysis,along with the surface under the cumulative ranking curve(SUCRA),showed that 1%atropine(100%)>0.05%atropine(74.9%)>0.025%atropine(51.6%)>0.02%atropine(47.9%)>0.01%atropine(25.6%)>control in refraction change and 1%atropine(98.7%)>0.05%atropine(70.4%)>0.02%atropine(61.4%)>0.025%atropine(42%)>0.01%atropine(27.4%)>control in axial length(AL)change.CONCLUSION:In Chinese children and teenagers,the five various concentrations of atropine can reduce the progression of myopia.Although the network Meta-analysis showed that 1%atropine is the best one for controlling refraction and AL change,there is a high incidence of adverse effects with the use of 1%atropine.Therefore,we suggest that 0.05%atropine is optimal for Chinese children to slow myopia progression.展开更多
基金supported by the Key R&D Program of Anhui Province in 2020 under Grant No.202004a05020078China Environment for Network Innovations(CENI)under Grant No.2016-000052-73-01-000515.
文摘As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Information-Centric Networking(ICN)came into being.From a technical point of view,ICN is a promising future network architecture.Researching and customizing a reasonable pricing mechanism plays a positive role in promoting the deployment of ICN.The current research on ICN pricing mechanism is focused on paid content.Therefore,we study an ICN pricing model for free content,which uses game theory based on Nash equilibrium to analysis.In this work,advertisers are considered,and an advertiser model is established to describe the economic interaction between advertisers and ICN entities.This solution can formulate the best pricing strategy for all ICN entities and maximize the benefits of each entity.Our extensive analysis and numerical results show that the proposed pricing framework is significantly better than existing solutions when it comes to free content.
基金supported by the National High-tech R&D Program("863"Program)of China(No.2013AA013505)the National Science Foundation of China(No.61472213)State Scholarship Fund from China Scholarship Council(No.201406210270)
文摘The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.
基金supported in part by The National High Technology Research and Development Program of China (863 Program) under Grant No. 2015AA016101The National Natural Science Foundation of China under Grant No. 61501042+1 种基金Beijing Nova Program under Grant No. Z151100000315078BUPT Special Program for Youth Scientific Research Innovation under Grant No. 2015RC10
文摘Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.
基金funded by the Higher Education Authority (HEA)co-funded under the European Regional Development Fund (ERDF)
文摘Information-Centric Networking(ICN), an alternative architecture to the current Internet infrastructure, focuses on the distribution and retrieval of content by employing caches in a network to reduce network traffic. The employment of caches may be accomplished using graph-based and content-based criteria such as the position of a node in a network and content popularity. The contribution of this paper lies on the characterization of content popularity for on-path in-network caching. To this end, four dynamic approaches for identifying content popularity are evaluated via simulations. Content popularity may be determined per chunk or per object, calculated by the number of requests for a content against the sum of requests or the maximum number of requests. Based on the results, chunk-based approaches provide 23% more accurate content popularity calculations than object-based approaches. In addition, approaches that are based on the comparison of a content against the maximum number of requests have been shown to be more accurate than the alternatives.
基金supported by National Natural Science Foundation of China (Grant Nos. 61302078 and 61372108)National High-tech R&D Program of China (863 Program) (Grant Nos. 2011AA01A102)+1 种基金National S&T Major Project (Grant Nos. 2011ZX 03005-004-02)Beijing Higher Education Young Elite Teacher Project (Grant Nos. YETP0476)
文摘The recent evolution of the Internet towards "Information-centric" transfer modes has renewed the interest in exploiting proxies to enhance seamless mobility. In this work, we focus on the case of multiple levels of proxies in ICN architectures, in which content requests from mobile subscribers and the corresponding items are proactively cached to these proxies at different levels. Specifically, we present a multiple-level proactive caching model that selects the appropriate subset of proxies at different levels and supports distributed online decision procedures in terms of the tradeoff between delay and cache cost. We show via extensive simulations the reduction of up to 31.63% in the total cost relative to Full Caching, in which caching in all 1-level neighbor proxies is performed, and up to 84.21% relative to No Caching, in which no caching is used. Moreover, the proposed model outperforms other approaches with a flat cache structure in terms of the total cost.
基金supported by 973 Program(2013CB329103)NSFC Fund (61271165,61301153)Program for Changjiang Scholars and Innovative Research Team (PCSIRT) in University and the 111 Project B14039
文摘Publish/subscribe(pub/sub) paradigm is the main communication model for Information-Centric Network(ICN) proposals.A key issue for pub/sub system is how to route the content objects to the correct subscribers,and ICN is no exception.ICN network would be divided into core domain and many edge domains as today's internet does.HHR(Hierarchy Hybrid Routing scheme) is presented for ICN:A Chord-like routing scheme is used in core domain,while edge domains routing structure can be classified into three categories,Local Routing(LR),Delivery of Local Publication to Core domain(DLPC),and Remote Publication Routing into edge domain(RPR).LR can be decided by each edge domain,which determined by many factors,such as locality characteristic for pub/sub information and local policies.A hierarchical routing algorithm is proposed to solve DLPC and RPR simultaneously.Simulation results demonstrate that HHR can be fast deployed,and can be applied in large scale network or dynamic subscription environment.
文摘Information-Centric Networking (ICN) is an innovative paradigm for the future internet architecture, which addresses IP network limitations in supporting content distribution and information access by decoupling content from hosts and providing the ability to retrieve a content object by its name (identifier), rather than its storage location (IP address). Name resolution and routing is critical for content retrieval in ICN networks. In this research, we perform a comparative study of two widely used classes of ICN name resolution and routing schemes, namely flooding and Distributed Hash Table (DHT). We consider the flooding-based routing in Content-Centric Networks due to its wide acceptance. For the DHT scheme, we design a multi-level DHT that takes into account the underlying network topology and uses name aggregation to further reduce control overhead and improve network efficiency. Then, we compare the characteristics and performance of these two classes of name resolution and routing through extensive simulations. The evaluation results show that the performances of these two approaches are reliant on several factors, including network size, content location dynamics, and content popularity. Our study reveals insights into the design tradeoffs and offers guidelines for design strategies.
文摘The current Internet is based on host-centric networking, and a user needs to know the host address before reaching a data target in the network. The new architecture of information-centric networking (ICN) facilitates users to locate data targets by giving their data names without any information about host addresses. In-network caching is one of the prominent features in ICN, which allows network routers to cache data contents. In this paper, we emphasize the management of in-network cache storage, and this includes the mechanisms of cache replacement and cache replication. A new cost function is then proposed to evaluate each cache content and the least valuable content is evicted when cache is full. To increase cache utilization, a cooperative caching policy among neighboring routers is proposed. The proper network locations to cache data contents are also discussed in the paper. Experimental results show the superiority of the proposed caching policy than some traditional caching polices.
基金funded by Wenzhou Kean University under the IRSP Program“Hop by Hop Resource Reservation based Scheduling Function for Deterministic IoT networks”.
文摘Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger infotainment.However,the continuous dissemination of information fromvehicles and their one-hop neighbor nodes,Road Side Units(RSUs),and VANET infrastructures can lead to performance degradation of VANETs in the existing hostcentric IP-based network.Therefore,Information Centric Networks(ICN)are being explored as an alternative architecture for vehicular communication to achieve robust content distribution in highly mobile,dynamic,and errorprone domains.In ICN-based Vehicular-IoT networks,consumer mobility is implicitly supported,but producer mobility may result in redundant data transmission and caching inefficiency at intermediate vehicular nodes.This paper proposes an efficient redundant transmission control algorithm based on network coding to reduce data redundancy and accelerate the efficiency of information dissemination.The proposed protocol,called Network Cording Multiple Solutions Scheduling(NCMSS),is receiver-driven collaborative scheduling between requesters and information sources that uses a global parameter expectation deadline to effectively manage the transmission of encoded data packets and control the selection of information sources.Experimental results for the proposed NCMSS protocol is demonstrated to analyze the performance of ICN-vehicular-IoT networks in terms of caching,data retrieval delay,and end-to-end application throughput.The end-to-end throughput in proposed NCMSS is 22%higher(for 1024 byte data)than existing solutions whereas delay in NCMSS is reduced by 5%in comparison with existing solutions.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
基金The work was supported by the Young Scientists Fund of the National Natural Science Foundation of China under Grant No. 61502393 and the Aeronautical Science Foundation of China under Grant No. 2014ZD53049.
文摘In-network caching is a fundamental mechanism advocated by information-centric networks (ICNs) for efficient content delivery. However, this new mechanism also brings serious privacy risks due to cache snooping attacks. One effective solution to this problem is random-cache, where the cache in a router randomly mimics a cache hit or a cache miss for each content request/probe. In this paper, we investigate the effectiveness of using multiple random-caches to protect cache privacy in a multi-path ICN. We propose models for characterizing the privacy of multi-path ICNs with random-caches, and analyze two different attack scenarios: 1) prefix-based attacks and 2) suffix-based attacks. Both homogeneous and heterogeneous caches are considered. Our analysis shows that in a multi-path ICN an adversary can potentially gain more privacy information by adopting prefix-based attacks. Furthermore, heterogeneous caches provide much better privacy protection than homogeneous ones under both attacks. The effect of different parameters on the privacy of multi-path random-caches is further investigated, and the comparison with its single-path counterpart is carried out based on numerical evaluations. The analysis and results in this paper provide insights in designing and evaluating multi-path ICNs when we take privacy into consideration.
基金supported by the Science Fund for Creative Research Groups of National Natural Science Foundation of China(NSFC)under Grant No.61921003the National Natural Science Foundation of China under Grant Nos.61722201 and 61632008+1 种基金the Fund for International Cooperation and Exchange of NSFC under Grant No.61720106007the Fundamental Research Funds for the Central Universities of China under Grant No.2019RC40.
文摘This paper proposes the Content Diffusion Model(CDM)for modeling the content diffusion process in information-centric networking(ICN).CDM is inspired by the epidemic model and it provides a method of theoretical quantitative analysis for the content diffusion process in ICN.Specifically,CDM introduces the key functions to formalize the key factors that influence the content diffusion process,and thus it can construct the model via a simple but efficient way.Further,we derive CDM by using different combinations of those key factors and put them into several typical ICN scenarios,to analyze the characteristics during the diffusion process such as diffusion speed,diffusion scope,average fetching hops,changing and final state,which can greatly help to analyze the network performance and application design.A series of experiments are conducted to evaluate the efficacy and accuracy of CDM.The results show that CDM can accurately illustrate and model the content diffusion process in ICN.
基金supported by the Notional Natural Science Foundation of China,No.81960417 (to JX)Guangxi Key Research and Development Program,No.GuiKeA B20159027 (to JX)the Natural Science Foundation of Guangxi Zhuang Autonomous Region,No.2022GXNSFBA035545 (to YG)。
文摘Immune changes and inflammatory responses have been identified as central events in the pathological process of spinal co rd injury.They can greatly affect nerve regeneration and functional recovery.However,there is still limited understanding of the peripheral immune inflammato ry response in spinal cord inju ry.In this study.we obtained microRNA expression profiles from the peripheral blood of patients with spinal co rd injury using high-throughput sequencing.We also obtained the mRNA expression profile of spinal cord injury patients from the Gene Expression Omnibus(GEO)database(GSE151371).We identified 54 differentially expressed microRNAs and 1656 diffe rentially expressed genes using bioinformatics approaches.Functional enrichment analysis revealed that various common immune and inflammation-related signaling pathways,such as neutrophil extracellular trap formation pathway,T cell receptor signaling pathway,and nuclear factor-κB signal pathway,we re abnormally activated or inhibited in spinal cord inju ry patient samples.We applied an integrated strategy that combines weighted gene co-expression network analysis,LASSO logistic regression,and SVM-RFE algorithm and identified three biomarke rs associated with spinal cord injury:ANO10,BST1,and ZFP36L2.We verified the expression levels and diagnostic perfo rmance of these three genes in the original training dataset and clinical samples through the receiver operating characteristic curve.Quantitative polymerase chain reaction results showed that ANO20 and BST1 mRNA levels were increased and ZFP36L2 mRNA was decreased in the peripheral blood of spinal cord injury patients.We also constructed a small RNA-mRNA interaction network using Cytoscape.Additionally,we evaluated the proportion of 22 types of immune cells in the peripheral blood of spinal co rd injury patients using the CIBERSORT tool.The proportions of naive B cells,plasma cells,monocytes,and neutrophils were increased while the proportions of memory B cells,CD8^(+)T cells,resting natural killer cells,resting dendritic cells,and eosinophils were markedly decreased in spinal cord injury patients increased compared with healthy subjects,and ANO10,BST1 and ZFP26L2we re closely related to the proportion of certain immune cell types.The findings from this study provide new directions for the development of treatment strategies related to immune inflammation in spinal co rd inju ry and suggest that ANO10,BST2,and ZFP36L2 are potential biomarkers for spinal cord injury.The study was registe red in the Chinese Clinical Trial Registry(registration No.ChiCTR2200066985,December 12,2022).
基金The authors acknowledge the funding provided by the National Key R&D Program of China(2021YFA1401200)Beijing Outstanding Young Scientist Program(BJJWZYJH01201910007022)+2 种基金National Natural Science Foundation of China(No.U21A20140,No.92050117,No.62005017)programBeijing Municipal Science&Technology Commission,Administrative Commission of Zhongguancun Science Park(No.Z211100004821009)This work was supported by the Synergetic Extreme Condition User Facility(SECUF).
文摘Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been considered as one of the powerful tools in promoting the fields of imaging processing and object recognition.However,the existing optical system architecture cannot be reconstructed to the realization of multi-functional artificial intelligence systems simultaneously.To push the development of this issue,we propose the pluggable diffractive neural networks(P-DNN),a general paradigm resorting to the cascaded metasurfaces,which can be applied to recognize various tasks by switching internal plug-ins.As the proof-of-principle,the recognition functions of six types of handwritten digits and six types of fashions are numerical simulated and experimental demonstrated at near-infrared regimes.Encouragingly,the proposed paradigm not only improves the flexibility of the optical neural networks but paves the new route for achieving high-speed,low-power and versatile artificial intelligence systems.
文摘Background In early adolescence,youth are highly prone to suicidal behaviours.Identifying modifiable risk factors during this critical phase is a priority to inform effective suicide prevention strategies.Aims To explore the risk and protective factors of suicidal behaviours(ie,suicidal ideation,plans and attempts)in early adolescence in China using a social-ecological perspective.Methods Using data from the cross-sectional project‘Healthy and Risky Behaviours Among Middle School Students in Anhui Province,China',stratified random cluster sampling was used to select 5724 middle school students who had completed self-report questionnaires in November 2020.Network analysis was employed to examine the correlates of suicidal ideation,plans and attempts at four levels,namely individual(sex,academic performance,serious physical llness/disability,history of self-harm,depression,impulsivity,sleep problems,resilience),family(family economic status,relationship with mother,relationship with father,family violence,childhood abuse,parental mental illness),school(relationship with teachers,relationship with classmates,school-bullying victimisation and perpetration)and social(social support,satisfaction with society).Results In total,37.9%,19.0%and 5.5%of the students reported suicidal ideation,plans and attempts in the past 6 months,respectively.The estimated network revealed that suicidal ideation,plans and attempts were collectively associated with a history of self-harm,sleep problems,childhood abuse,school bullying and victimisation.Centrality analysis indicated that the most influential nodes in the network were history of self-harm and childhood abuse.Notably,the network also showed unique correlates of suicidal ideation(sex,weight=0.60;impulsivity,weight=0.24;family violence,weight=0.17;relationship with teachers,weight=-0.03;school-bullying perpetration,weight=0.22),suicidal plans(social support,weight=-0.15)and suicidal attempts(relationship with mother,weight=-0.10;parental mental llness,weight=0.61).Conclusions This study identified the correlates of suicidal ideation,plans and attempts,and provided practical implications for suicide prevention for young adolescents in China.Firstly,this study highlighted the importance of joint interventions across multiple departments.Secondly,the common risk factors of suicidal ideation,plans and attempts were elucidated.Thirdly,this study proposed target interventions to address the unique influencing factors of suicidal ideation,plans and attempts.
基金the TCL Science and Technology Innovation Fundthe Youth Science and Technology Talent Promotion Project of Jiangsu Association for Science and Technology,Grant/Award Number:JSTJ‐2023‐017+4 种基金Shenzhen Municipal Science and Technology Innovation Council,Grant/Award Number:JSGG20220831105002004National Natural Science Foundation of China,Grant/Award Number:62201468Postdoctoral Research Foundation of China,Grant/Award Number:2022M722599the Fundamental Research Funds for the Central Universities,Grant/Award Number:D5000210966the Guangdong Basic and Applied Basic Research Foundation,Grant/Award Number:2021A1515110079。
文摘Convolutional neural networks depend on deep network architectures to extract accurate information for image super‐resolution.However,obtained information of these con-volutional neural networks cannot completely express predicted high‐quality images for complex scenes.A dynamic network for image super‐resolution(DSRNet)is presented,which contains a residual enhancement block,wide enhancement block,feature refine-ment block and construction block.The residual enhancement block is composed of a residual enhanced architecture to facilitate hierarchical features for image super‐resolution.To enhance robustness of obtained super‐resolution model for complex scenes,a wide enhancement block achieves a dynamic architecture to learn more robust information to enhance applicability of an obtained super‐resolution model for varying scenes.To prevent interference of components in a wide enhancement block,a refine-ment block utilises a stacked architecture to accurately learn obtained features.Also,a residual learning operation is embedded in the refinement block to prevent long‐term dependency problem.Finally,a construction block is responsible for reconstructing high‐quality images.Designed heterogeneous architecture can not only facilitate richer structural information,but also be lightweight,which is suitable for mobile digital devices.Experimental results show that our method is more competitive in terms of performance,recovering time of image super‐resolution and complexity.The code of DSRNet can be obtained at https://github.com/hellloxiaotian/DSRNet.
基金supported by the Japan Society for the Promotion of Science(JSPS)KAKENHI(JP22H03643)Japan Science and Technology Agency(JST)Support for Pioneering Research Initiated by the Next Generation(SPRING)(JPMJSP2145)+2 种基金JST Through the Establishment of University Fellowships Towards the Creation of Science Technology Innovation(JPMJFS2115)the National Natural Science Foundation of China(52078382)the State Key Laboratory of Disaster Reduction in Civil Engineering(CE19-A-01)。
文摘Accurately predicting fluid forces acting on the sur-face of a structure is crucial in engineering design.However,this task becomes particularly challenging in turbulent flow,due to the complex and irregular changes in the flow field.In this study,we propose a novel deep learning method,named mapping net-work-coordinated stacked gated recurrent units(MSU),for pre-dicting pressure on a circular cylinder from velocity data.Specifi-cally,our coordinated learning strategy is designed to extract the most critical velocity point for prediction,a process that has not been explored before.In our experiments,MSU extracts one point from a velocity field containing 121 points and utilizes this point to accurately predict 100 pressure points on the cylinder.This method significantly reduces the workload of data measure-ment in practical engineering applications.Our experimental results demonstrate that MSU predictions are highly similar to the real turbulent data in both spatio-temporal and individual aspects.Furthermore,the comparison results show that MSU predicts more precise results,even outperforming models that use all velocity field points.Compared with state-of-the-art methods,MSU has an average improvement of more than 45%in various indicators such as root mean square error(RMSE).Through comprehensive and authoritative physical verification,we estab-lished that MSU’s prediction results closely align with pressure field data obtained in real turbulence fields.This confirmation underscores the considerable potential of MSU for practical applications in real engineering scenarios.The code is available at https://github.com/zhangzm0128/MSU.
基金The Qian Xuesen Youth Innovation Foundation from China Aerospace Science and Technology Corporation(Grant Number 2022JY51).
文摘The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedded devices.In order to reduce the complexity and overhead of deploying neural networks on Integeronly hardware,most current quantization methods use a symmetric quantization mapping strategy to quantize a floating-point neural network into an integer network.However,although symmetric quantization has the advantage of easier implementation,it is sub-optimal for cases where the range could be skewed and not symmetric.This often comes at the cost of lower accuracy.This paper proposed an activation redistribution-based hybrid asymmetric quantizationmethod for neural networks.The proposedmethod takes data distribution into consideration and can resolve the contradiction between the quantization accuracy and the ease of implementation,balance the trade-off between clipping range and quantization resolution,and thus improve the accuracy of the quantized neural network.The experimental results indicate that the accuracy of the proposed method is 2.02%and 5.52%higher than the traditional symmetric quantization method for classification and detection tasks,respectively.The proposed method paves the way for computationally intensive neural network models to be deployed on devices with limited computing resources.Codes will be available on https://github.com/ycjcy/Hybrid-Asymmetric-Quantization.
文摘BACKGROUND Currently,traditional Chinese medicine(TCM)formulas are commonly being used as adjunctive therapy for ulcerative colitis in China.Network meta-analysis,a quantitative and comprehensive analytical method,can systematically compare the effects of different adjunctive treatment options for ulcerative colitis,providing scientific evidence for clinical decision-making.AIM To evaluate the clinical efficacy and safety of commonly used TCM for the treatment of ulcerative colitis(UC)in clinical practice through a network metaanalysis.METHODS Clinical randomized controlled trials of these TCM formulas used for the adjuvant treatment of UC were searched from the establishment of the databases to July 1,2022.Studies that met the inclusion criteria were screened and evaluated for literature quality and risk of bias according to the Cochrane 5.1 standard.The methodological quality of the studies was assessed using ReviewManager(RevMan)5.4,and a funnel plot was constructed to test for publication bias.ADDIS 1.16 statistical software was used to perform statistical analysis of the treatment measures and derive the network relationship and ranking diagrams of the various intervention measures.RESULTS A total of 64 randomized controlled trials involving 5456 patients with UC were included in this study.The adjuvant treatment of UC using five TCM formulations was able to improve the clinical outcome of the patients.Adjuvant treatment with Baitouweng decoction(BTWT)showed a significant effect[mean difference=36.22,95%confidence interval(CI):7.63 to 65.76].For the reduction of tumor necrosis factor in patients with UC,adjunctive therapy with BTWT(mean difference=−9.55,95%CI:−17.89 to−1.41),Shenlingbaizhu powder[SLBZS;odds ratio(OR)=0.19,95%CI:0.08 to 0.39],and Shaoyao decoction(OR=−23.02,95%CI:−33.64 to−13.14)was effective.Shaoyao decoction was more effective than BTWT(OR=0.12,95%CI:0.03 to 0.39),SLBZS(OR=0.19,95%CI:0.08 to 0.39),and Xi Lei powder(OR=0.34,95%CI:0.13 to 0.81)in reducing tumor necrosis factor and the recurrence rate of UC.CONCLUSION TCM combined with mesalazine is more effective than mesalazine alone in the treatment of UC.
基金Supported by the National Key R&D Plan“Intergovernmental International Scientific and Technological Innovation Cooperation”(No.2022YFE0132600)Shenzhen Fund for Guangdong Provincial High-level Clinical Key Specialties(No.SZGSP014)+1 种基金Sanming Project of Medicine in Shenzhen(No.SZSM202311012)Shenzhen Science and Technology Program(No.KCXFZ20211020163814021).
文摘AIM:To figure out whether various atropine dosages may slow the progression of myopia in Chinese kids and teenagers and to determine the optimal atropine concentration for effectively slowing the progression of myopia.METHODS:A systematic search was conducted across the Cochrane Library,PubMed,Web of Science,EMBASE,CNKI,CBM,VIP,and Wanfang database,encompassing literature on slowing progression of myopia with varying atropine concentrations from database inception to January 17,2024.Data extraction and quality assessment were performed,and a network Meta-analysis was executed using Stata version 14.0 Software.Results were visually represented through graphs.RESULTS:Fourteen papers comprising 2475 cases were included;five different concentrations of atropine solution were used.The network Meta-analysis,along with the surface under the cumulative ranking curve(SUCRA),showed that 1%atropine(100%)>0.05%atropine(74.9%)>0.025%atropine(51.6%)>0.02%atropine(47.9%)>0.01%atropine(25.6%)>control in refraction change and 1%atropine(98.7%)>0.05%atropine(70.4%)>0.02%atropine(61.4%)>0.025%atropine(42%)>0.01%atropine(27.4%)>control in axial length(AL)change.CONCLUSION:In Chinese children and teenagers,the five various concentrations of atropine can reduce the progression of myopia.Although the network Meta-analysis showed that 1%atropine is the best one for controlling refraction and AL change,there is a high incidence of adverse effects with the use of 1%atropine.Therefore,we suggest that 0.05%atropine is optimal for Chinese children to slow myopia progression.