Cross-document relation extraction(RE),as an extension of information extraction,requires integrating information from multiple documents retrieved from open domains with a large number of irrelevant or confusing nois...Cross-document relation extraction(RE),as an extension of information extraction,requires integrating information from multiple documents retrieved from open domains with a large number of irrelevant or confusing noisy texts.Previous studies focus on the attention mechanism to construct the connection between different text features through semantic similarity.However,similarity-based methods cannot distinguish valid information from highly similar retrieved documents well.How to design an effective algorithm to implement aggregated reasoning in confusing information with similar features still remains an open issue.To address this problem,we design a novel local-toglobal causal reasoning(LGCR)network for cross-document RE,which enables efficient distinguishing,filtering and global reasoning on complex information from a causal perspective.Specifically,we propose a local causal estimation algorithm to estimate the causal effect,which is the first trial to use the causal reasoning independent of feature similarity to distinguish between confusing and valid information in cross-document RE.Furthermore,based on the causal effect,we propose a causality guided global reasoning algorithm to filter the confusing information and achieve global reasoning.Experimental results under the closed and the open settings of the large-scale dataset Cod RED demonstrate our LGCR network significantly outperforms the state-ofthe-art methods and validate the effectiveness of causal reasoning in confusing information processing.展开更多
Cable fire is one of the most important events for operation and maintenance(O&M)safety in underground utility tunnels(UUTs).Since there are limited studies about cable fire risk assessment,a comprehensive assessm...Cable fire is one of the most important events for operation and maintenance(O&M)safety in underground utility tunnels(UUTs).Since there are limited studies about cable fire risk assessment,a comprehensive assessment model is proposed to evaluate the cable fire risk in different UUT sections and improve O&M efficiency.Considering the uncertainties in the risk assessment,an evidential reasoning(ER)approach is used to combine quantitative sensor data and qualitative expert judgments.Meanwhile,a data transformation technique is contributed to transform continuous data into a five-grade distributed assessment.Then,a case study demonstrates how the model and the ER approach are established.The results show that in Shenzhen,China,the cable fire risk in District 8,B Road is the lowest,while more resources should be paid in District 3,C Road and District 25,C Road,which are selected as comparative roads.Based on the model,a data-driven O&M process is proposed to improve the O&M effectiveness,compared with traditional methods.This study contributes an effective ER-based cable fire evaluation model to improve the O&M efficiency of cable fire in UUTs.展开更多
Railway Point System(RPS)is an important infrastructure in railway industry and its faults may have significant impacts on the safety and efficiency of train operations.For the fault diagnosis of RPS,most existing met...Railway Point System(RPS)is an important infrastructure in railway industry and its faults may have significant impacts on the safety and efficiency of train operations.For the fault diagnosis of RPS,most existing methods assume that sufficient samples of each failure mode are available,which may be unrealistic,especially for those modes of low occurrence frequency but with high risk.To address this issue,this work proposes a novel fault diagnosis method that only requires the power signals generated under normal RPS operations in the training stage.Specifically,the failure modes of RPS are distinguished through constructing a reasoning diagram,whose nodes are either binary logic problems or those that can be decomposed into the problems of the binary logic.Then,an unsupervised method for the signal segmentation and a fault detection method are combined to make decisions for each binary logic problem.Based on the results of decisions,the diagnostic rules are established to identify the failure modes.Finally,the data collected from multiple real-world RPSs are used for validation and the results demonstrate that the proposed method outperforms the benchmark in identifying the faults of RPSs.展开更多
Karyotype prescription is based on clinical signs (or reasons for karyotype prescription) which are phenotypic manifestations associated with chromosomal abnormalities. The aim of this study was to establish a corresp...Karyotype prescription is based on clinical signs (or reasons for karyotype prescription) which are phenotypic manifestations associated with chromosomal abnormalities. The aim of this study was to establish a correspondence between karyotype indications and their results in patients. This was a retrospective study that was carried out in the Histology-Embryology-Cytogenetics laboratory of the University Hospital of Cocody-Abidjan from 2014 to 2019. 58 patient files were identified and included the indication or reason for prescribing a constitutional karyotype and the biological result obtained. An individual data sheet was used to collect the data. 17 reasons for prescription were identified and divided into 2 groups. Sexual ambiguity was the most frequent reason (29.3%). The first group (G1) represented the 10 reasons for which the karyotype results were normal. The second group (G2) corresponded of the 7 motives with normal or abnormal karyotype results. Several anomalies were listed according to these reasons: inversions, mosaics (anomalies of number and structure) and trisomy 21. The last was the most frequent chromosomal anomaly (69.24%). It was found in several reasons for karyotype prescription: malformations, neurological disorders, suspected trisomy and cardiac pathology. Several factors could explain these results, among which are the limits of the karyotype and the non-genetic causes that can induce these abnormal phenotypes. Complementary examinations to the karyotype are molecular cytogenetic techniques, notably fluorescence in situ hybridization (FISH) and array comparative genomic hybridization (Array-CGH).展开更多
Objective: To determine the reasons for admission of elderly subjects and the prognosis in general intensive care. Patients and Methods: Observational descriptive and analytical study with prospective collection of da...Objective: To determine the reasons for admission of elderly subjects and the prognosis in general intensive care. Patients and Methods: Observational descriptive and analytical study with prospective collection of data over a period of one year from January 1 to December 31, 2021. Patients aged 65 or over were included. Abstract: During the study period, 223 cases were collected out of 587 patients admitted, giving a prevalence of 37.9%. The average age was 74.127.39 ± years with extremes of 65 and 96 years and a male predominance (58.7%). The comorbidities were dominated by arterial hypertension (71.3%). The patients were: transferred from medical and surgical emergencies (75.8%). The average admission time was 48.8 ± 29.8 hours. One hundred and eight patients had a Glasgow score between 3 and 7. The reasons for admission were dominated by vascular causes (51.6%). Strokes of any type accounted for 43.9% of these reasons for admission. The average time for carrying out the biological assessments and imaging was 41.8 ± 27.3 hours with the extremes of 3 and 89 hours, 37.2% had a complete assessment within 24 hours. The average duration of hospitalization was 7.10 ± 8.87 days with extremes of 1 and 72 days. The mortality rate was 71.7%. Conclusion: This study has made it possible to take stock of the reasons for the admission of elderly subjects to intensive care. It appears that vascular causes are the main reasons for admission with heavy comorbidities which results in high mortality.展开更多
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest...The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.展开更多
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec...Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions.展开更多
Purpose:The notable increase in retraction papers has attracted considerable attention from diverse stakeholders.Various sources are now offering information related to research integrity,including concerns voiced on ...Purpose:The notable increase in retraction papers has attracted considerable attention from diverse stakeholders.Various sources are now offering information related to research integrity,including concerns voiced on social media,disclosed lists of paper mills,and retraction notices accessible through journal websites.However,despite the availability of such resources,there remains a lack of a unified platform to consolidate this information,thereby hindering efficient searching and cross-referencing.Thus,it is imperative to develop a comprehensive platform for retracted papers and related concerns.This article aims to introduce“Amend,”a platform designed to integrate information on research integrity from diverse sources.Design/methodology/approach:The Amend platform consolidates concerns and lists of problematic articles sourced from social media platforms(e.g.,PubPeer,For Better Science),retraction notices from journal websites,and citation databases(e.g.,Web of Science,CrossRef).Moreover,Amend includes investigation and punishment announcements released by administrative agencies(e.g.,NSFC,MOE,MOST,CAS).Each related paper is marked and can be traced back to its information source via a provided link.Furthermore,the Amend database incorporates various attributes of retracted articles,including citation topics,funding details,open access status,and more.The reasons for retraction are identified and classified as either academic misconduct or honest errors,with detailed subcategories provided for further clarity.Findings:Within the Amend platform,a total of 32,515 retracted papers indexed in SCI,SSCI,and ESCI between 1980 and 2023 were identified.Of these,26,620(81.87%)were associated with academic misconduct.The retraction rate stands at 6.64 per 10,000 articles.Notably,the retraction rate for non-gold open access articles significantly differs from that for gold open access articles,with this disparity progressively widening over the years.Furthermore,the reasons for retractions have shifted from traditional individual behaviors like falsification,fabrication,plagiarism,and duplication to more organized large-scale fraudulent practices,including Paper Mills,Fake Peer-review,and Artificial Intelligence Generated Content(AIGC).Research limitations:The Amend platform may not fully capture all retracted and concerning papers,thereby impacting its comprehensiveness.Additionally,inaccuracies in retraction notices may lead to errors in tagged reasons.Practical implications:Amend provides an integrated platform for stakeholders to enhance monitoring,analysis,and research on academic misconduct issues.Ultimately,the Amend database can contribute to upholding scientific integrity.Originality/value:This study introduces a globally integrated platform for retracted and concerning papers,along with a preliminary analysis of the evolutionary trends in retracted papers.展开更多
Theα-universal triple I(α-UTI)method is a recognized scheme in the field of fuzzy reasoning,whichwas proposed by our research group previously.The robustness of fuzzy reasoning determines the quality of reasoning al...Theα-universal triple I(α-UTI)method is a recognized scheme in the field of fuzzy reasoning,whichwas proposed by our research group previously.The robustness of fuzzy reasoning determines the quality of reasoning algorithms to a large extent,which is quantified by calculating the disparity between the output of fuzzy reasoning with interference and the output without interference.Therefore,in this study,the interval robustness(embodied as the interval stability)of theα-UTI method is explored in the interval-valued fuzzy environment.To begin with,the stability of theα-UTI method is explored for the case of an individual rule,and the upper and lower bounds of its results are estimated,using four kinds of unified interval implications(including the R-interval implication,the S-interval implication,the QL-interval implication and the interval t-norm implication).Through analysis,it is found that theα-UTI method exhibits good interval stability for an individual rule.Moreover,the stability of theα-UTI method is revealed in the case of multiple rules,and the upper and lower bounds of its outcomes are estimated.The results show that theα-UTI method is stable for multiple rules when four kinds of unified interval implications are used,respectively.Lastly,theα-UTI reasoning chain method is presented,which contains a chain structure with multiple layers.The corresponding solutions and their interval perturbations are investigated.It is found that theα-UTI reasoning chain method is stable in the case of chain reasoning.Two application examples in affective computing are given to verify the stability of theα-UTImethod.In summary,through theoretical proof and example verification,it is found that theα-UTImethod has good interval robustness with four kinds of unified interval implications aiming at the situations of an individual rule,multi-rule and reasoning chain.展开更多
Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events,we propose an Independent Recurr...Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events,we propose an Independent Recurrent Temporal Graph Convolution Networks(IndRT-GCNets)framework to efficiently and accurately capture event attribute information.The framework models the knowledge graph sequences to learn the evolutionary represen-tations of entities and relations within each period.Firstly,by utilizing the temporal graph convolution module in the evolutionary representation unit,the framework captures the structural dependency relationships within the knowledge graph in each period.Meanwhile,to achieve better event representation and establish effective correlations,an independent recurrent neural network is employed to implement auto-regressive modeling.Furthermore,static attributes of entities in the entity-relation events are constrained andmerged using a static graph constraint to obtain optimal entity representations.Finally,the evolution of entity and relation representations is utilized to predict events in the next subsequent step.On multiple real-world datasets such as Freebase13(FB13),Freebase 15k(FB15K),WordNet11(WN11),WordNet18(WN18),FB15K-237,WN18RR,YAGO3-10,and Nell-995,the results of multiple evaluation indicators show that our proposed IndRT-GCNets framework outperforms most existing models on knowledge reasoning tasks,which validates the effectiveness and robustness.展开更多
The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy r...The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy rights was not enough to meet the practical needs of governance.However;due to the ambiguity in the application of the“reasonable”processing requirements,the direct protection model centered on Article 27 of the Personal Information Protection Law also is not enough to effectively respond to practical disputes.The essence of the problem is to resolve the tension between informa-tion circulation and risk control and reshape the legal order for the protection of personal information disclosed according to the law.The determination of“reasonable”should be centered on the scenario theory and holism interpretation and carried out by using the interpre-tation technique of the dynamic system under Article 998 of the Civil Code.With the support of scenario-based discussions and comparative propositions,the crawling and tag extraction of personal information.disclosed according to the law should be considered as reasonable processing;profiling and automated decision-making should not be covered in the scope of reasonable processing,in principle;for behav-iors such as correlation analysis,elements like information subject,identifiability and sensitivity should be comprehensively considered to draw open and inclusive conclusions in individual cases.展开更多
The disposal of contaminated water from Japan’s Fukushima nuclear power plant is a significant international nuclear safety issue with considerable cross-border implications.This matter requires compliance not only w...The disposal of contaminated water from Japan’s Fukushima nuclear power plant is a significant international nuclear safety issue with considerable cross-border implications.This matter requires compliance not only with the law of the sea but also with the principles of nuclear safety under international law.These principles serve as the overarching tenet of international and China’s domestic nuclear laws,applicable to nuclear facilities and activities.The principle of safety in nuclear activities is fully recognized in international and domestic laws,carrying broad legal binding force.Japan’s discharge of nuclear-contaminated water into the sea violates its obligations under the principle of safety in nuclear activities,including commitments to optimum protection,as low as reasonably practicable,and prevention.The Japanese government and the International Atomic Energy Agency(IAEA)have breached the obligation of optimum protection by restricting the scope of assessments,substituting core concepts,and shielding dissenting views.In the absence of clear radiation standards,they have acted unilaterally without fulfilling the obligation as low as reasonably practicable principle.The discharge of Fukushima nuclear-contaminated water poses an imminent and unpredictable risk to all countries worldwide,including Japanese residents.Japan and the IAEA should fulfill their obligations under international law regarding disposal,adhering to the principles of nuclear safety,including optimum protection,the obligation as low as reasonably practicable,and prevention through multilateral cooperation.Specifically,the obligation to provide optimum protection should be implemented by re-evaluating the most reliable disposal technologies and methods currently available and comprehensively assessing various options.The standard of the obligation as low as reasonably practicable requires that the minimization of negative impacts on human health,livelihoods,and the environment should not be subordinated to considerations of cutting costs and expenses.Multilateral cooperation should be promoted through the establishment of sound multilateral long-term monitoring mechanisms for the discharge of nuclear-contaminated water,notification and consultation obligations,and periodic assessments.These obligations under international law were fulfilled after the accidents at the Three Mile Island and Chernobyl nuclear power plants.The implications of the principles of nuclear safety align with the concept of building a community of shared future for nuclear safety advocated by China.In cases of violations of international law regarding the disposal of nuclear-contaminated water that jeopardize the concept of a community of a shared future for nuclear safety,China can also rely on its own strength to promote the implementation of due obligations through self-help.展开更多
TEFL in Thailand is still not successful compared with other countries in Asia.On the basis of literature and study of the relevant official documents,the present paper makes an analysis on the reasons for the failure...TEFL in Thailand is still not successful compared with other countries in Asia.On the basis of literature and study of the relevant official documents,the present paper makes an analysis on the reasons for the failure of TEFL in Thailand.It is revealed that the main reason for the failure of TEFL in Thailand is lack of qualified teachers.Some solutions to the failure of TEFL are also proposed in the paper.展开更多
All social phenomena are,to some extent,determined by economy,and language is also under the leverage of economic factor.With the development of society,economy,science and economy,human interpretation and consciousne...All social phenomena are,to some extent,determined by economy,and language is also under the leverage of economic factor.With the development of society,economy,science and economy,human interpretation and consciousness of their language have been greatly enhanced.The exploration of catchword can be developed from its definition,its characteristics and reasons for its emergence.展开更多
Human beings’ intellection is the characteristic of a distinct hierarchy and can be taken to construct a heuristic in the shortest path algorithms.It is detailed in this paper how to utilize the hierarchical reasonin...Human beings’ intellection is the characteristic of a distinct hierarchy and can be taken to construct a heuristic in the shortest path algorithms.It is detailed in this paper how to utilize the hierarchical reasoning on the basis of greedy and directional strategy to establish a spatial heuristic,so as to improve running efficiency and suitability of shortest path algorithm for traffic network.The authors divide urban traffic network into three hierarchies and set forward a new node hierarchy division rule to avoid the unreliable solution of shortest path.It is argued that the shortest path,no matter distance shortest or time shortest,is usually not the favorite of drivers in practice.Some factors difficult to expect or quantify influence the drivers’ choice greatly.It makes the drivers prefer choosing a less shortest,but more reliable or flexible path to travel on.The presented optimum path algorithm,in addition to the improvement of the running efficiency of shortest path algorithms up to several times,reduces the emergence of those factors,conforms to the intellection characteristic of human beings,and is more easily accepted by drivers.Moreover,it does not require the completeness of networks in the lowest hierarchy and the applicability and fault tolerance of the algorithm have improved.The experiment result shows the advantages of the presented algorithm.The authors argued that the algorithm has great potential application for navigation systems of large_scale traffic networks.展开更多
The aim of this paper is to discuss the approximate rea- soning problems with interval-valued fuzzy environments based on the fully implicational idea. First, this paper constructs a class of interval-valued fuzzy imp...The aim of this paper is to discuss the approximate rea- soning problems with interval-valued fuzzy environments based on the fully implicational idea. First, this paper constructs a class of interval-valued fuzzy implications by means of a type of impli- cations and a parameter on the unit interval, then uses them to establish fully implicational reasoning methods for interval-valued fuzzy modus ponens (IFMP) and interval-valued fuzzy modus tel- lens (IFMT) problems. At the same time the reversibility properties of these methods are analyzed and the reversible conditions are given. It is shown that the existing unified forms of α-triple I (the abbreviation of triple implications) methods for FMP and FMT can be seen as the particular cases of our methods for IFMP and IFMT.展开更多
In order to realize the intelligent management of data mining (DM) domain knowledge, this paper presents an architecture for DM knowledge management based on ontology. Using ontology database, this architecture can ...In order to realize the intelligent management of data mining (DM) domain knowledge, this paper presents an architecture for DM knowledge management based on ontology. Using ontology database, this architecture can realize intelligent knowledge retrieval and automatic accomplishment of DM tasks by means of ontology services. Its key features include:①Describing DM ontology and meta-data using ontology based on Web ontology language (OWL).② Ontology reasoning function. Based on the existing concepts and relations, the hidden knowledge in ontology can be obtained using the reasoning engine. This paper mainly focuses on the construction of DM ontology and the reasoning of DM ontology based on OWL DL(s).展开更多
基金supported in part by the National Key Research and Development Program of China(2022ZD0116405)the Strategic Priority Research Program of the Chinese Academy of Sciences(XDA27030300)the Key Research Program of the Chinese Academy of Sciences(ZDBS-SSW-JSC006)。
文摘Cross-document relation extraction(RE),as an extension of information extraction,requires integrating information from multiple documents retrieved from open domains with a large number of irrelevant or confusing noisy texts.Previous studies focus on the attention mechanism to construct the connection between different text features through semantic similarity.However,similarity-based methods cannot distinguish valid information from highly similar retrieved documents well.How to design an effective algorithm to implement aggregated reasoning in confusing information with similar features still remains an open issue.To address this problem,we design a novel local-toglobal causal reasoning(LGCR)network for cross-document RE,which enables efficient distinguishing,filtering and global reasoning on complex information from a causal perspective.Specifically,we propose a local causal estimation algorithm to estimate the causal effect,which is the first trial to use the causal reasoning independent of feature similarity to distinguish between confusing and valid information in cross-document RE.Furthermore,based on the causal effect,we propose a causality guided global reasoning algorithm to filter the confusing information and achieve global reasoning.Experimental results under the closed and the open settings of the large-scale dataset Cod RED demonstrate our LGCR network significantly outperforms the state-ofthe-art methods and validate the effectiveness of causal reasoning in confusing information processing.
基金Airport New City Utility Tunnel PhaseⅡProject,China。
文摘Cable fire is one of the most important events for operation and maintenance(O&M)safety in underground utility tunnels(UUTs).Since there are limited studies about cable fire risk assessment,a comprehensive assessment model is proposed to evaluate the cable fire risk in different UUT sections and improve O&M efficiency.Considering the uncertainties in the risk assessment,an evidential reasoning(ER)approach is used to combine quantitative sensor data and qualitative expert judgments.Meanwhile,a data transformation technique is contributed to transform continuous data into a five-grade distributed assessment.Then,a case study demonstrates how the model and the ER approach are established.The results show that in Shenzhen,China,the cable fire risk in District 8,B Road is the lowest,while more resources should be paid in District 3,C Road and District 25,C Road,which are selected as comparative roads.Based on the model,a data-driven O&M process is proposed to improve the O&M effectiveness,compared with traditional methods.This study contributes an effective ER-based cable fire evaluation model to improve the O&M efficiency of cable fire in UUTs.
基金supported by National Key R&D Program of China(2022YFB2602203)Talent Fund of Beijing Jiaotong University(2021RC274,I22L00131)National Natural Science Foundation of China(U1934219,52202392,52022010,U22A2046,52172322,62271486,62120106011,52172323)。
文摘Railway Point System(RPS)is an important infrastructure in railway industry and its faults may have significant impacts on the safety and efficiency of train operations.For the fault diagnosis of RPS,most existing methods assume that sufficient samples of each failure mode are available,which may be unrealistic,especially for those modes of low occurrence frequency but with high risk.To address this issue,this work proposes a novel fault diagnosis method that only requires the power signals generated under normal RPS operations in the training stage.Specifically,the failure modes of RPS are distinguished through constructing a reasoning diagram,whose nodes are either binary logic problems or those that can be decomposed into the problems of the binary logic.Then,an unsupervised method for the signal segmentation and a fault detection method are combined to make decisions for each binary logic problem.Based on the results of decisions,the diagnostic rules are established to identify the failure modes.Finally,the data collected from multiple real-world RPSs are used for validation and the results demonstrate that the proposed method outperforms the benchmark in identifying the faults of RPSs.
文摘Karyotype prescription is based on clinical signs (or reasons for karyotype prescription) which are phenotypic manifestations associated with chromosomal abnormalities. The aim of this study was to establish a correspondence between karyotype indications and their results in patients. This was a retrospective study that was carried out in the Histology-Embryology-Cytogenetics laboratory of the University Hospital of Cocody-Abidjan from 2014 to 2019. 58 patient files were identified and included the indication or reason for prescribing a constitutional karyotype and the biological result obtained. An individual data sheet was used to collect the data. 17 reasons for prescription were identified and divided into 2 groups. Sexual ambiguity was the most frequent reason (29.3%). The first group (G1) represented the 10 reasons for which the karyotype results were normal. The second group (G2) corresponded of the 7 motives with normal or abnormal karyotype results. Several anomalies were listed according to these reasons: inversions, mosaics (anomalies of number and structure) and trisomy 21. The last was the most frequent chromosomal anomaly (69.24%). It was found in several reasons for karyotype prescription: malformations, neurological disorders, suspected trisomy and cardiac pathology. Several factors could explain these results, among which are the limits of the karyotype and the non-genetic causes that can induce these abnormal phenotypes. Complementary examinations to the karyotype are molecular cytogenetic techniques, notably fluorescence in situ hybridization (FISH) and array comparative genomic hybridization (Array-CGH).
文摘Objective: To determine the reasons for admission of elderly subjects and the prognosis in general intensive care. Patients and Methods: Observational descriptive and analytical study with prospective collection of data over a period of one year from January 1 to December 31, 2021. Patients aged 65 or over were included. Abstract: During the study period, 223 cases were collected out of 587 patients admitted, giving a prevalence of 37.9%. The average age was 74.127.39 ± years with extremes of 65 and 96 years and a male predominance (58.7%). The comorbidities were dominated by arterial hypertension (71.3%). The patients were: transferred from medical and surgical emergencies (75.8%). The average admission time was 48.8 ± 29.8 hours. One hundred and eight patients had a Glasgow score between 3 and 7. The reasons for admission were dominated by vascular causes (51.6%). Strokes of any type accounted for 43.9% of these reasons for admission. The average time for carrying out the biological assessments and imaging was 41.8 ± 27.3 hours with the extremes of 3 and 89 hours, 37.2% had a complete assessment within 24 hours. The average duration of hospitalization was 7.10 ± 8.87 days with extremes of 1 and 72 days. The mortality rate was 71.7%. Conclusion: This study has made it possible to take stock of the reasons for the admission of elderly subjects to intensive care. It appears that vascular causes are the main reasons for admission with heavy comorbidities which results in high mortality.
文摘The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.
基金the National Natural Science Foundation of China(Nos.61562026,61962020)Academic and Technical Leaders of Major Disciplines in Jiangxi Province(No.20172BCB22015)+1 种基金Special Fund Project for Postgraduate Innovation in Jiangxi Province(No.YC2020-B1141)Jiangxi Provincial Natural Science Foundation(No.20224ACB202006).
文摘Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions.
基金NSFC(No.71974017)LIS Outstanding Talents Introducing Program,Bureau of Development and Planning of CAS(2022).
文摘Purpose:The notable increase in retraction papers has attracted considerable attention from diverse stakeholders.Various sources are now offering information related to research integrity,including concerns voiced on social media,disclosed lists of paper mills,and retraction notices accessible through journal websites.However,despite the availability of such resources,there remains a lack of a unified platform to consolidate this information,thereby hindering efficient searching and cross-referencing.Thus,it is imperative to develop a comprehensive platform for retracted papers and related concerns.This article aims to introduce“Amend,”a platform designed to integrate information on research integrity from diverse sources.Design/methodology/approach:The Amend platform consolidates concerns and lists of problematic articles sourced from social media platforms(e.g.,PubPeer,For Better Science),retraction notices from journal websites,and citation databases(e.g.,Web of Science,CrossRef).Moreover,Amend includes investigation and punishment announcements released by administrative agencies(e.g.,NSFC,MOE,MOST,CAS).Each related paper is marked and can be traced back to its information source via a provided link.Furthermore,the Amend database incorporates various attributes of retracted articles,including citation topics,funding details,open access status,and more.The reasons for retraction are identified and classified as either academic misconduct or honest errors,with detailed subcategories provided for further clarity.Findings:Within the Amend platform,a total of 32,515 retracted papers indexed in SCI,SSCI,and ESCI between 1980 and 2023 were identified.Of these,26,620(81.87%)were associated with academic misconduct.The retraction rate stands at 6.64 per 10,000 articles.Notably,the retraction rate for non-gold open access articles significantly differs from that for gold open access articles,with this disparity progressively widening over the years.Furthermore,the reasons for retractions have shifted from traditional individual behaviors like falsification,fabrication,plagiarism,and duplication to more organized large-scale fraudulent practices,including Paper Mills,Fake Peer-review,and Artificial Intelligence Generated Content(AIGC).Research limitations:The Amend platform may not fully capture all retracted and concerning papers,thereby impacting its comprehensiveness.Additionally,inaccuracies in retraction notices may lead to errors in tagged reasons.Practical implications:Amend provides an integrated platform for stakeholders to enhance monitoring,analysis,and research on academic misconduct issues.Ultimately,the Amend database can contribute to upholding scientific integrity.Originality/value:This study introduces a globally integrated platform for retracted and concerning papers,along with a preliminary analysis of the evolutionary trends in retracted papers.
基金the National Natural Science Foundation of China under Grants 62176083,62176084,61877016,and 61976078the Key Research and Development Program of Anhui Province under Grant 202004d07020004the Natural Science Foundation of Anhui Province under Grant 2108085MF203.
文摘Theα-universal triple I(α-UTI)method is a recognized scheme in the field of fuzzy reasoning,whichwas proposed by our research group previously.The robustness of fuzzy reasoning determines the quality of reasoning algorithms to a large extent,which is quantified by calculating the disparity between the output of fuzzy reasoning with interference and the output without interference.Therefore,in this study,the interval robustness(embodied as the interval stability)of theα-UTI method is explored in the interval-valued fuzzy environment.To begin with,the stability of theα-UTI method is explored for the case of an individual rule,and the upper and lower bounds of its results are estimated,using four kinds of unified interval implications(including the R-interval implication,the S-interval implication,the QL-interval implication and the interval t-norm implication).Through analysis,it is found that theα-UTI method exhibits good interval stability for an individual rule.Moreover,the stability of theα-UTI method is revealed in the case of multiple rules,and the upper and lower bounds of its outcomes are estimated.The results show that theα-UTI method is stable for multiple rules when four kinds of unified interval implications are used,respectively.Lastly,theα-UTI reasoning chain method is presented,which contains a chain structure with multiple layers.The corresponding solutions and their interval perturbations are investigated.It is found that theα-UTI reasoning chain method is stable in the case of chain reasoning.Two application examples in affective computing are given to verify the stability of theα-UTImethod.In summary,through theoretical proof and example verification,it is found that theα-UTImethod has good interval robustness with four kinds of unified interval implications aiming at the situations of an individual rule,multi-rule and reasoning chain.
基金the National Natural Science Founda-tion of China(62062062)hosted by Gulila Altenbek.
文摘Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events,we propose an Independent Recurrent Temporal Graph Convolution Networks(IndRT-GCNets)framework to efficiently and accurately capture event attribute information.The framework models the knowledge graph sequences to learn the evolutionary represen-tations of entities and relations within each period.Firstly,by utilizing the temporal graph convolution module in the evolutionary representation unit,the framework captures the structural dependency relationships within the knowledge graph in each period.Meanwhile,to achieve better event representation and establish effective correlations,an independent recurrent neural network is employed to implement auto-regressive modeling.Furthermore,static attributes of entities in the entity-relation events are constrained andmerged using a static graph constraint to obtain optimal entity representations.Finally,the evolution of entity and relation representations is utilized to predict events in the next subsequent step.On multiple real-world datasets such as Freebase13(FB13),Freebase 15k(FB15K),WordNet11(WN11),WordNet18(WN18),FB15K-237,WN18RR,YAGO3-10,and Nell-995,the results of multiple evaluation indicators show that our proposed IndRT-GCNets framework outperforms most existing models on knowledge reasoning tasks,which validates the effectiveness and robustness.
文摘The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy rights was not enough to meet the practical needs of governance.However;due to the ambiguity in the application of the“reasonable”processing requirements,the direct protection model centered on Article 27 of the Personal Information Protection Law also is not enough to effectively respond to practical disputes.The essence of the problem is to resolve the tension between informa-tion circulation and risk control and reshape the legal order for the protection of personal information disclosed according to the law.The determination of“reasonable”should be centered on the scenario theory and holism interpretation and carried out by using the interpre-tation technique of the dynamic system under Article 998 of the Civil Code.With the support of scenario-based discussions and comparative propositions,the crawling and tag extraction of personal information.disclosed according to the law should be considered as reasonable processing;profiling and automated decision-making should not be covered in the scope of reasonable processing,in principle;for behav-iors such as correlation analysis,elements like information subject,identifiability and sensitivity should be comprehensively considered to draw open and inclusive conclusions in individual cases.
基金funded by the Research on National Greenhouse Gas Emission Reduction Obligations under the Carbon Peak and Carbon Neutral Commitment,General Program of Humanities and Social Sciences,Ministry of Education of China[Grant No.21YJA820010].
文摘The disposal of contaminated water from Japan’s Fukushima nuclear power plant is a significant international nuclear safety issue with considerable cross-border implications.This matter requires compliance not only with the law of the sea but also with the principles of nuclear safety under international law.These principles serve as the overarching tenet of international and China’s domestic nuclear laws,applicable to nuclear facilities and activities.The principle of safety in nuclear activities is fully recognized in international and domestic laws,carrying broad legal binding force.Japan’s discharge of nuclear-contaminated water into the sea violates its obligations under the principle of safety in nuclear activities,including commitments to optimum protection,as low as reasonably practicable,and prevention.The Japanese government and the International Atomic Energy Agency(IAEA)have breached the obligation of optimum protection by restricting the scope of assessments,substituting core concepts,and shielding dissenting views.In the absence of clear radiation standards,they have acted unilaterally without fulfilling the obligation as low as reasonably practicable principle.The discharge of Fukushima nuclear-contaminated water poses an imminent and unpredictable risk to all countries worldwide,including Japanese residents.Japan and the IAEA should fulfill their obligations under international law regarding disposal,adhering to the principles of nuclear safety,including optimum protection,the obligation as low as reasonably practicable,and prevention through multilateral cooperation.Specifically,the obligation to provide optimum protection should be implemented by re-evaluating the most reliable disposal technologies and methods currently available and comprehensively assessing various options.The standard of the obligation as low as reasonably practicable requires that the minimization of negative impacts on human health,livelihoods,and the environment should not be subordinated to considerations of cutting costs and expenses.Multilateral cooperation should be promoted through the establishment of sound multilateral long-term monitoring mechanisms for the discharge of nuclear-contaminated water,notification and consultation obligations,and periodic assessments.These obligations under international law were fulfilled after the accidents at the Three Mile Island and Chernobyl nuclear power plants.The implications of the principles of nuclear safety align with the concept of building a community of shared future for nuclear safety advocated by China.In cases of violations of international law regarding the disposal of nuclear-contaminated water that jeopardize the concept of a community of a shared future for nuclear safety,China can also rely on its own strength to promote the implementation of due obligations through self-help.
文摘TEFL in Thailand is still not successful compared with other countries in Asia.On the basis of literature and study of the relevant official documents,the present paper makes an analysis on the reasons for the failure of TEFL in Thailand.It is revealed that the main reason for the failure of TEFL in Thailand is lack of qualified teachers.Some solutions to the failure of TEFL are also proposed in the paper.
文摘All social phenomena are,to some extent,determined by economy,and language is also under the leverage of economic factor.With the development of society,economy,science and economy,human interpretation and consciousness of their language have been greatly enhanced.The exploration of catchword can be developed from its definition,its characteristics and reasons for its emergence.
文摘Human beings’ intellection is the characteristic of a distinct hierarchy and can be taken to construct a heuristic in the shortest path algorithms.It is detailed in this paper how to utilize the hierarchical reasoning on the basis of greedy and directional strategy to establish a spatial heuristic,so as to improve running efficiency and suitability of shortest path algorithm for traffic network.The authors divide urban traffic network into three hierarchies and set forward a new node hierarchy division rule to avoid the unreliable solution of shortest path.It is argued that the shortest path,no matter distance shortest or time shortest,is usually not the favorite of drivers in practice.Some factors difficult to expect or quantify influence the drivers’ choice greatly.It makes the drivers prefer choosing a less shortest,but more reliable or flexible path to travel on.The presented optimum path algorithm,in addition to the improvement of the running efficiency of shortest path algorithms up to several times,reduces the emergence of those factors,conforms to the intellection characteristic of human beings,and is more easily accepted by drivers.Moreover,it does not require the completeness of networks in the lowest hierarchy and the applicability and fault tolerance of the algorithm have improved.The experiment result shows the advantages of the presented algorithm.The authors argued that the algorithm has great potential application for navigation systems of large_scale traffic networks.
基金supported by the National Natural Science Foundation of China(60774100)the Natural Science Foundation of Shandong Province of China(Y2007A15)
文摘The aim of this paper is to discuss the approximate rea- soning problems with interval-valued fuzzy environments based on the fully implicational idea. First, this paper constructs a class of interval-valued fuzzy implications by means of a type of impli- cations and a parameter on the unit interval, then uses them to establish fully implicational reasoning methods for interval-valued fuzzy modus ponens (IFMP) and interval-valued fuzzy modus tel- lens (IFMT) problems. At the same time the reversibility properties of these methods are analyzed and the reversible conditions are given. It is shown that the existing unified forms of α-triple I (the abbreviation of triple implications) methods for FMP and FMT can be seen as the particular cases of our methods for IFMP and IFMT.
基金the Natural Science Foundation of Chongqing (CSTC2005BB2190)
文摘In order to realize the intelligent management of data mining (DM) domain knowledge, this paper presents an architecture for DM knowledge management based on ontology. Using ontology database, this architecture can realize intelligent knowledge retrieval and automatic accomplishment of DM tasks by means of ontology services. Its key features include:①Describing DM ontology and meta-data using ontology based on Web ontology language (OWL).② Ontology reasoning function. Based on the existing concepts and relations, the hidden knowledge in ontology can be obtained using the reasoning engine. This paper mainly focuses on the construction of DM ontology and the reasoning of DM ontology based on OWL DL(s).