Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-proce...Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-procedural ultrasound scan of the lumbar spine has been shown to be of benefit in guiding lumbar epidural insertion in obstetric patients. Information on the use of real-time ultrasound (RUS) guided SAB, to date, been limited. This study compared RUS guided SAB to traditional landmark guided technique in patients undergoing spinal anesthesia for different surgical procedures. Methods: This was a prospective, single center, comparative observational study conducted in the department of anesthesiology at our center. 560 patients who underwent spinal anesthesia either by landmark based technique or real-time ultrasound-guided methods. The primary outcome was the first attempt success rate of dural puncture when employing the two methods. Results: Baseline characteristics were similar in the two study groups. The first attempt success rate of dural puncture in landmark guided group was 64.3% compared to 72.6% in the ultrasound guided group. This difference was not statistically significant. The procedure performance time was significantly shorter with landmark palpation compared to use of real-time ultrasound guided method. Conclusion: Use of RUS-guided technique does not significantly improve the first attempt success rate of SAB dural puncture during spinal anesthesia compared to the traditional landmark-guided technique.展开更多
To optimize the self-organization network, self-adaptation, real-time monitoring, remote management capability, and equipment reuse level of the meteorological station supporting the portable groundwater circulation w...To optimize the self-organization network, self-adaptation, real-time monitoring, remote management capability, and equipment reuse level of the meteorological station supporting the portable groundwater circulation wells, and to provide real-time and effective technical services and environmental data support for groundwater remediation, a real-time monitoring system design of the meteorological station supporting the portable groundwater circulation wells based on the existing equipment is proposed. A variety of environmental element information is collected and transmitted to the embedded web server by the intelligent weather transmitter, and then processed by the algorithm and stored internally, displayed locally, and published on the web. The system monitoring algorithm and user interface are designed in the CNWSCADA development environment to realize real-time processing and analysis of environmental data and monitoring, control, management, and maintenance of the system status. The PLC-controlled photovoltaic power generating panels and lithium battery packs are in line with the concept of energy saving and emission reduction, and at the same time, as an emergency power supply to guarantee the safety of equipment and data when the utility power fails to meet the requirements. The experiment proves that the system has the characteristics of remote control, real-time interaction, simple station deployment, reliable operation, convenient maintenance, and green environment protection, which is conducive to improving the comprehensive utilization efficiency of various types of environmental information and providing reliable data support, theoretical basis and guidance suggestions for the research of groundwater remediation technology and its disciplines, and the research and development of the movable groundwater cycling well monitoring system.展开更多
Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The m...Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
With the advancement of technology and the increase in user demands, gesture recognition played a pivotal role in the field of human-computer interaction. Among various sensing devices, Time-of-Flight (ToF) sensors we...With the advancement of technology and the increase in user demands, gesture recognition played a pivotal role in the field of human-computer interaction. Among various sensing devices, Time-of-Flight (ToF) sensors were widely applied due to their low cost. This paper explored the implementation of a human hand posture recognition system using ToF sensors and residual neural networks. Firstly, this paper reviewed the typical applications of human hand recognition. Secondly, this paper designed a hand gesture recognition system using a ToF sensor VL53L5. Subsequently, data preprocessing was conducted, followed by training the constructed residual neural network. Then, the recognition results were analyzed, indicating that gesture recognition based on the residual neural network achieved an accuracy of 98.5% in a 5-class classification scenario. Finally, the paper discussed existing issues and future research directions.展开更多
文摘Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-procedural ultrasound scan of the lumbar spine has been shown to be of benefit in guiding lumbar epidural insertion in obstetric patients. Information on the use of real-time ultrasound (RUS) guided SAB, to date, been limited. This study compared RUS guided SAB to traditional landmark guided technique in patients undergoing spinal anesthesia for different surgical procedures. Methods: This was a prospective, single center, comparative observational study conducted in the department of anesthesiology at our center. 560 patients who underwent spinal anesthesia either by landmark based technique or real-time ultrasound-guided methods. The primary outcome was the first attempt success rate of dural puncture when employing the two methods. Results: Baseline characteristics were similar in the two study groups. The first attempt success rate of dural puncture in landmark guided group was 64.3% compared to 72.6% in the ultrasound guided group. This difference was not statistically significant. The procedure performance time was significantly shorter with landmark palpation compared to use of real-time ultrasound guided method. Conclusion: Use of RUS-guided technique does not significantly improve the first attempt success rate of SAB dural puncture during spinal anesthesia compared to the traditional landmark-guided technique.
文摘To optimize the self-organization network, self-adaptation, real-time monitoring, remote management capability, and equipment reuse level of the meteorological station supporting the portable groundwater circulation wells, and to provide real-time and effective technical services and environmental data support for groundwater remediation, a real-time monitoring system design of the meteorological station supporting the portable groundwater circulation wells based on the existing equipment is proposed. A variety of environmental element information is collected and transmitted to the embedded web server by the intelligent weather transmitter, and then processed by the algorithm and stored internally, displayed locally, and published on the web. The system monitoring algorithm and user interface are designed in the CNWSCADA development environment to realize real-time processing and analysis of environmental data and monitoring, control, management, and maintenance of the system status. The PLC-controlled photovoltaic power generating panels and lithium battery packs are in line with the concept of energy saving and emission reduction, and at the same time, as an emergency power supply to guarantee the safety of equipment and data when the utility power fails to meet the requirements. The experiment proves that the system has the characteristics of remote control, real-time interaction, simple station deployment, reliable operation, convenient maintenance, and green environment protection, which is conducive to improving the comprehensive utilization efficiency of various types of environmental information and providing reliable data support, theoretical basis and guidance suggestions for the research of groundwater remediation technology and its disciplines, and the research and development of the movable groundwater cycling well monitoring system.
文摘Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘With the advancement of technology and the increase in user demands, gesture recognition played a pivotal role in the field of human-computer interaction. Among various sensing devices, Time-of-Flight (ToF) sensors were widely applied due to their low cost. This paper explored the implementation of a human hand posture recognition system using ToF sensors and residual neural networks. Firstly, this paper reviewed the typical applications of human hand recognition. Secondly, this paper designed a hand gesture recognition system using a ToF sensor VL53L5. Subsequently, data preprocessing was conducted, followed by training the constructed residual neural network. Then, the recognition results were analyzed, indicating that gesture recognition based on the residual neural network achieved an accuracy of 98.5% in a 5-class classification scenario. Finally, the paper discussed existing issues and future research directions.