Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-proce...Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-procedural ultrasound scan of the lumbar spine has been shown to be of benefit in guiding lumbar epidural insertion in obstetric patients. Information on the use of real-time ultrasound (RUS) guided SAB, to date, been limited. This study compared RUS guided SAB to traditional landmark guided technique in patients undergoing spinal anesthesia for different surgical procedures. Methods: This was a prospective, single center, comparative observational study conducted in the department of anesthesiology at our center. 560 patients who underwent spinal anesthesia either by landmark based technique or real-time ultrasound-guided methods. The primary outcome was the first attempt success rate of dural puncture when employing the two methods. Results: Baseline characteristics were similar in the two study groups. The first attempt success rate of dural puncture in landmark guided group was 64.3% compared to 72.6% in the ultrasound guided group. This difference was not statistically significant. The procedure performance time was significantly shorter with landmark palpation compared to use of real-time ultrasound guided method. Conclusion: Use of RUS-guided technique does not significantly improve the first attempt success rate of SAB dural puncture during spinal anesthesia compared to the traditional landmark-guided technique.展开更多
Timely acquisition of rescue target information is critical for emergency response after a flood disaster.Unmanned Aerial Vehicles(UAVs)equipped with remote sensing capabilities offer distinct advantages,including hig...Timely acquisition of rescue target information is critical for emergency response after a flood disaster.Unmanned Aerial Vehicles(UAVs)equipped with remote sensing capabilities offer distinct advantages,including high-resolution imagery and exceptional mobility,making them well suited for monitoring flood extent and identifying rescue targets during floods.However,there are some challenges in interpreting rescue information in real time from flood images captured by UAVs,such as the complexity of the scenarios of UAV images,the lack of flood rescue target detection datasets and the limited real-time processing capabilities of the airborne on-board platform.Thus,we propose a real-time rescue target detection method for UAVs that is capable of efficiently delineating flood extent and identifying rescue targets(i.e.,pedestrians and vehicles trapped by floods).The proposed method achieves real-time rescue information extraction for UAV platforms by lightweight processing and fusion of flood extent extraction model and target detection model.The flood inundation range is extracted by the proposed method in real time and detects targets such as people and vehicles to be rescued based on this layer.Our experimental results demonstrate that the Intersection over Union(IoU)for flood water extraction reaches an impressive 80%,and the IoU for real-time flood water extraction stands at a commendable 76.4%.The information on flood stricken targets extracted by this method in real time can be used for flood emergency rescue.展开更多
Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The m...Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
Handling sentiment drifts in real time twitter data streams are a challen-ging task while performing sentiment classifications,because of the changes that occur in the sentiments of twitter users,with respect to time....Handling sentiment drifts in real time twitter data streams are a challen-ging task while performing sentiment classifications,because of the changes that occur in the sentiments of twitter users,with respect to time.The growing volume of tweets with sentiment drifts has led to the need for devising an adaptive approach to detect and handle this drift in real time.This work proposes an adap-tive learning algorithm-based framework,Twitter Sentiment Drift Analysis-Bidir-ectional Encoder Representations from Transformers(TSDA-BERT),which introduces a sentiment drift measure to detect drifts and a domain impact score to adaptively retrain the classification model with domain relevant data in real time.The framework also works on static data by converting them to data streams using the Kafka tool.The experiments conducted on real time and simulated tweets of sports,health care andfinancial topics show that the proposed system is able to detect sentiment drifts and maintain the performance of the classification model,with accuracies of 91%,87%and 90%,respectively.Though the results have been provided only for a few topics,as a proof of concept,this framework can be applied to detect sentiment drifts and perform sentiment classification on real time data streams of any topic.展开更多
With the advancement of technology and the increase in user demands, gesture recognition played a pivotal role in the field of human-computer interaction. Among various sensing devices, Time-of-Flight (ToF) sensors we...With the advancement of technology and the increase in user demands, gesture recognition played a pivotal role in the field of human-computer interaction. Among various sensing devices, Time-of-Flight (ToF) sensors were widely applied due to their low cost. This paper explored the implementation of a human hand posture recognition system using ToF sensors and residual neural networks. Firstly, this paper reviewed the typical applications of human hand recognition. Secondly, this paper designed a hand gesture recognition system using a ToF sensor VL53L5. Subsequently, data preprocessing was conducted, followed by training the constructed residual neural network. Then, the recognition results were analyzed, indicating that gesture recognition based on the residual neural network achieved an accuracy of 98.5% in a 5-class classification scenario. Finally, the paper discussed existing issues and future research directions.展开更多
We consider a real time data acquisition and processing multiserver system with identical servers (such as unmanned aerial vehicles, machine controllers, overhearing devices, medical monitoring devices, etc.) which ca...We consider a real time data acquisition and processing multiserver system with identical servers (such as unmanned aerial vehicles, machine controllers, overhearing devices, medical monitoring devices, etc.) which can be maintained/programmed for different kinds of activities (e.g. passive or active). This system provides a service for real time tasks arriving via several channels (such as surveillance regions, assembly lines, communication channels, etc.) and involves maintenance. We focus on the worst case analysis of the system with ample maintenance facilities exponentially distributed time to failure and maintenance times. We consider two kinds of models (with and without nonpreemptive priorities) and provide balance equations for steady state probabilities and various performance measures, when both operation and maintenance times are exponentially distributed.展开更多
Nuclear security usually requires the simultaneous detection of neutrons and gamma rays.With the development of crystalline materials in recent years,Cs2LiLaBr6(CLLB)dual-readout detectors have attracted extensive att...Nuclear security usually requires the simultaneous detection of neutrons and gamma rays.With the development of crystalline materials in recent years,Cs2LiLaBr6(CLLB)dual-readout detectors have attracted extensive attention from researchers,where real-time neutron/gamma pulse discrimination is the critical factor among detector performance parameters.This study investigated the discrimination performance of the charge comparison,amplitude comparison,time comparison,and pulse gradient_(m)ethods and the effects of a Sallen–Key filter on their performance.Experimental results show that the figure of merit(FOM)of all four methods is improved by proper filtering.Among them,the charge comparison method exhibits excellent noise resistance;moreover,it is the most_(s)uitable method of real-time discrimination for CLLB detectors.However,its discrimination performance depends on the parameters t_(s),t_(m),and t_(e).When t_(s)corresponds to the moment at which the pulse is at 10%of its peak value,t_(e)requires a delay of only 640–740 ns compared to t_(s),at which time the potentially optimal FOM of the charge comparison method at 3.1–3.3 MeV is greater than 1.46.The FOM obtained using the t_(m)value calculated by a proposed maximized discrimination difference model(MDDM)and the potentially optimal FOM differ by less than 3.9%,indicating that the model can provide good guidance for parameter selection in the charge comparison method.展开更多
文摘Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-procedural ultrasound scan of the lumbar spine has been shown to be of benefit in guiding lumbar epidural insertion in obstetric patients. Information on the use of real-time ultrasound (RUS) guided SAB, to date, been limited. This study compared RUS guided SAB to traditional landmark guided technique in patients undergoing spinal anesthesia for different surgical procedures. Methods: This was a prospective, single center, comparative observational study conducted in the department of anesthesiology at our center. 560 patients who underwent spinal anesthesia either by landmark based technique or real-time ultrasound-guided methods. The primary outcome was the first attempt success rate of dural puncture when employing the two methods. Results: Baseline characteristics were similar in the two study groups. The first attempt success rate of dural puncture in landmark guided group was 64.3% compared to 72.6% in the ultrasound guided group. This difference was not statistically significant. The procedure performance time was significantly shorter with landmark palpation compared to use of real-time ultrasound guided method. Conclusion: Use of RUS-guided technique does not significantly improve the first attempt success rate of SAB dural puncture during spinal anesthesia compared to the traditional landmark-guided technique.
基金National Natural Science Foundation of China(No.42271416)Guangxi Science and Technology Major Project(No.AA22068072)Shennongjia National Park Resources Comprehensive Investigation Research Project(No.SNJNP2023015).
文摘Timely acquisition of rescue target information is critical for emergency response after a flood disaster.Unmanned Aerial Vehicles(UAVs)equipped with remote sensing capabilities offer distinct advantages,including high-resolution imagery and exceptional mobility,making them well suited for monitoring flood extent and identifying rescue targets during floods.However,there are some challenges in interpreting rescue information in real time from flood images captured by UAVs,such as the complexity of the scenarios of UAV images,the lack of flood rescue target detection datasets and the limited real-time processing capabilities of the airborne on-board platform.Thus,we propose a real-time rescue target detection method for UAVs that is capable of efficiently delineating flood extent and identifying rescue targets(i.e.,pedestrians and vehicles trapped by floods).The proposed method achieves real-time rescue information extraction for UAV platforms by lightweight processing and fusion of flood extent extraction model and target detection model.The flood inundation range is extracted by the proposed method in real time and detects targets such as people and vehicles to be rescued based on this layer.Our experimental results demonstrate that the Intersection over Union(IoU)for flood water extraction reaches an impressive 80%,and the IoU for real-time flood water extraction stands at a commendable 76.4%.The information on flood stricken targets extracted by this method in real time can be used for flood emergency rescue.
文摘Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘Handling sentiment drifts in real time twitter data streams are a challen-ging task while performing sentiment classifications,because of the changes that occur in the sentiments of twitter users,with respect to time.The growing volume of tweets with sentiment drifts has led to the need for devising an adaptive approach to detect and handle this drift in real time.This work proposes an adap-tive learning algorithm-based framework,Twitter Sentiment Drift Analysis-Bidir-ectional Encoder Representations from Transformers(TSDA-BERT),which introduces a sentiment drift measure to detect drifts and a domain impact score to adaptively retrain the classification model with domain relevant data in real time.The framework also works on static data by converting them to data streams using the Kafka tool.The experiments conducted on real time and simulated tweets of sports,health care andfinancial topics show that the proposed system is able to detect sentiment drifts and maintain the performance of the classification model,with accuracies of 91%,87%and 90%,respectively.Though the results have been provided only for a few topics,as a proof of concept,this framework can be applied to detect sentiment drifts and perform sentiment classification on real time data streams of any topic.
文摘With the advancement of technology and the increase in user demands, gesture recognition played a pivotal role in the field of human-computer interaction. Among various sensing devices, Time-of-Flight (ToF) sensors were widely applied due to their low cost. This paper explored the implementation of a human hand posture recognition system using ToF sensors and residual neural networks. Firstly, this paper reviewed the typical applications of human hand recognition. Secondly, this paper designed a hand gesture recognition system using a ToF sensor VL53L5. Subsequently, data preprocessing was conducted, followed by training the constructed residual neural network. Then, the recognition results were analyzed, indicating that gesture recognition based on the residual neural network achieved an accuracy of 98.5% in a 5-class classification scenario. Finally, the paper discussed existing issues and future research directions.
文摘We consider a real time data acquisition and processing multiserver system with identical servers (such as unmanned aerial vehicles, machine controllers, overhearing devices, medical monitoring devices, etc.) which can be maintained/programmed for different kinds of activities (e.g. passive or active). This system provides a service for real time tasks arriving via several channels (such as surveillance regions, assembly lines, communication channels, etc.) and involves maintenance. We focus on the worst case analysis of the system with ample maintenance facilities exponentially distributed time to failure and maintenance times. We consider two kinds of models (with and without nonpreemptive priorities) and provide balance equations for steady state probabilities and various performance measures, when both operation and maintenance times are exponentially distributed.
基金supported by cooperation projects between an enterprise(CNPE)and a research institute(ASIPP)(Y15HX16706).
文摘Nuclear security usually requires the simultaneous detection of neutrons and gamma rays.With the development of crystalline materials in recent years,Cs2LiLaBr6(CLLB)dual-readout detectors have attracted extensive attention from researchers,where real-time neutron/gamma pulse discrimination is the critical factor among detector performance parameters.This study investigated the discrimination performance of the charge comparison,amplitude comparison,time comparison,and pulse gradient_(m)ethods and the effects of a Sallen–Key filter on their performance.Experimental results show that the figure of merit(FOM)of all four methods is improved by proper filtering.Among them,the charge comparison method exhibits excellent noise resistance;moreover,it is the most_(s)uitable method of real-time discrimination for CLLB detectors.However,its discrimination performance depends on the parameters t_(s),t_(m),and t_(e).When t_(s)corresponds to the moment at which the pulse is at 10%of its peak value,t_(e)requires a delay of only 640–740 ns compared to t_(s),at which time the potentially optimal FOM of the charge comparison method at 3.1–3.3 MeV is greater than 1.46.The FOM obtained using the t_(m)value calculated by a proposed maximized discrimination difference model(MDDM)and the potentially optimal FOM differ by less than 3.9%,indicating that the model can provide good guidance for parameter selection in the charge comparison method.