Background:The purpose of this study was to analyze and classify adverse drug events(ADEs)related to ceftazidime/avibactam reported in the Food and Drug Administration Adverse Event Reporting System(FAERS)database and...Background:The purpose of this study was to analyze and classify adverse drug events(ADEs)related to ceftazidime/avibactam reported in the Food and Drug Administration Adverse Event Reporting System(FAERS)database and to evaluate their potential safety signals since the drug’s market introduction.Methods:This analysis systematically extracted and filtered FAERS data for ceftazidime/avibactam from its market launch in 2015 to the last quarter of 2024,utilizing the Medical Dictionary for Regulatory Activities(MedDRA)terminology for ADE recoding.The analysis employed the reporting odds ratio(ROR)method to assess the strength of ADE signals and to identify significant diseases associated with infections,the hepatobiliary system,the urinary system,and the nervous system.Results:A review of 540 adverse reaction reports revealed significant signals of adverse effects related to infections,hepatobiliary disorders,urinary system issues,and neurological impairments,including pathogen resistance,liver and kidney function impairment,encephalopathy,thrombocytopenia,and toxic epidermal necrolysis.However,these issues require further clinical attention.Conclusion:Ceftazidime/avibactam is associated with a range of adverse reactions,necessitating enhanced clinical monitoring,particularly in patients with underlying liver or kidney dysfunction.Continuous risk assessment and vigilant monitoring are critical for its clinical use.However,this study is limited by inherent reporting biases and confounders associated with the spontaneous reporting database(FAERS).Future research should validate these signals through prospective cohort and mechanistic studies and explore personalized risk management strategies for high-risk populations.展开更多
An Oracle8i-based approach is proposed to manage the integrated databases oflarge CyberCity.This approach consists of three schemes:①a special R+-tree index is designed toaccelerate spatial retrieving,in which the bo...An Oracle8i-based approach is proposed to manage the integrated databases oflarge CyberCity.This approach consists of three schemes:①a special R+-tree index is designed toaccelerate spatial retrieving,in which the bounding boxes of local regions have no intersection andall leaf nodes of the R+-tree(geometry records)have no repetition;②different data compressionalgorithms are adopted to compress the digital elevation models,3D vector models and images,suchas LZ77 lossless compression algorithm for compression of vector data and JPEG compressionalgorithms for texture images;③in order to communicate with Oracle8i database,a CyberCity GIS.spatial database engine(SDE)is designed.On the basis of this SDE prototype a case study is done.展开更多
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm...Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.展开更多
This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of...This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of some special views of ORACLE DATA DICTIONARY to track the security records of a database system.展开更多
Research into metamorphism plays a pivotal role in reconstructing the evolution of continent,particularly through the study of ancient rocks that are highly susceptible to metamorphic alterations due to multiple tecto...Research into metamorphism plays a pivotal role in reconstructing the evolution of continent,particularly through the study of ancient rocks that are highly susceptible to metamorphic alterations due to multiple tectonic activities.In the big data era,the establishment of new data platforms and the application of big data methods have become a focus for metamorphic rocks.Significant progress has been made in creating specialized databases,compiling comprehensive datasets,and utilizing data analytics to address complex scientific questions.However,many existing databases are inadequate in meeting the specific requirements of metamorphic research,resulting from a substantial amount of valuable data remaining uncollected.Therefore,constructing new databases that can cope with the development of the data era is necessary.This article provides an extensive review of existing databases related to metamorphic rocks and discusses data-driven studies in this.Accordingly,several crucial factors that need to be taken into consideration in the establishment of specialized metamorphic databases are identified,aiming to leverage data-driven applications to achieve broader scientific objectives in metamorphic research.展开更多
With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become ...With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness.展开更多
基金Intramural Project of The First Affiliated Hospital of Guangxi University of Chinese Medicine(2018QN008).
文摘Background:The purpose of this study was to analyze and classify adverse drug events(ADEs)related to ceftazidime/avibactam reported in the Food and Drug Administration Adverse Event Reporting System(FAERS)database and to evaluate their potential safety signals since the drug’s market introduction.Methods:This analysis systematically extracted and filtered FAERS data for ceftazidime/avibactam from its market launch in 2015 to the last quarter of 2024,utilizing the Medical Dictionary for Regulatory Activities(MedDRA)terminology for ADE recoding.The analysis employed the reporting odds ratio(ROR)method to assess the strength of ADE signals and to identify significant diseases associated with infections,the hepatobiliary system,the urinary system,and the nervous system.Results:A review of 540 adverse reaction reports revealed significant signals of adverse effects related to infections,hepatobiliary disorders,urinary system issues,and neurological impairments,including pathogen resistance,liver and kidney function impairment,encephalopathy,thrombocytopenia,and toxic epidermal necrolysis.However,these issues require further clinical attention.Conclusion:Ceftazidime/avibactam is associated with a range of adverse reactions,necessitating enhanced clinical monitoring,particularly in patients with underlying liver or kidney dysfunction.Continuous risk assessment and vigilant monitoring are critical for its clinical use.However,this study is limited by inherent reporting biases and confounders associated with the spontaneous reporting database(FAERS).Future research should validate these signals through prospective cohort and mechanistic studies and explore personalized risk management strategies for high-risk populations.
基金Project supported by the National Key Basic Research and Development Program(No.2002CB312101)the National Natural Science Foundation of China(No.40001017).
文摘An Oracle8i-based approach is proposed to manage the integrated databases oflarge CyberCity.This approach consists of three schemes:①a special R+-tree index is designed toaccelerate spatial retrieving,in which the bounding boxes of local regions have no intersection andall leaf nodes of the R+-tree(geometry records)have no repetition;②different data compressionalgorithms are adopted to compress the digital elevation models,3D vector models and images,suchas LZ77 lossless compression algorithm for compression of vector data and JPEG compressionalgorithms for texture images;③in order to communicate with Oracle8i database,a CyberCity GIS.spatial database engine(SDE)is designed.On the basis of this SDE prototype a case study is done.
文摘Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.
文摘This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of some special views of ORACLE DATA DICTIONARY to track the security records of a database system.
基金funded by the National Natural Science Foundation of China(No.42220104008)。
文摘Research into metamorphism plays a pivotal role in reconstructing the evolution of continent,particularly through the study of ancient rocks that are highly susceptible to metamorphic alterations due to multiple tectonic activities.In the big data era,the establishment of new data platforms and the application of big data methods have become a focus for metamorphic rocks.Significant progress has been made in creating specialized databases,compiling comprehensive datasets,and utilizing data analytics to address complex scientific questions.However,many existing databases are inadequate in meeting the specific requirements of metamorphic research,resulting from a substantial amount of valuable data remaining uncollected.Therefore,constructing new databases that can cope with the development of the data era is necessary.This article provides an extensive review of existing databases related to metamorphic rocks and discusses data-driven studies in this.Accordingly,several crucial factors that need to be taken into consideration in the establishment of specialized metamorphic databases are identified,aiming to leverage data-driven applications to achieve broader scientific objectives in metamorphic research.
基金supported by the National Natural Science Foundation of China(Grant No.62102449)the Central Plains Talent Program under Grant No.224200510003.
文摘With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness.