Aging is one of the greatest risk factors for morbidity caused by the coronavirus disease 2019(COVID19).In older individuals,a dysregulated immune response to severe acute respiratory syndrome coronavirus 2(SARS-CoV-2...Aging is one of the greatest risk factors for morbidity caused by the coronavirus disease 2019(COVID19).In older individuals,a dysregulated immune response to severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)infection contributes to disease severity;however,the underlying mechanism remains elusive.In this study,we established an aging mouse model of COVID-19,successfully replicating the development of a relatively severe disease in older adults.Further single-cell transcriptome analysis revealed a distinct immune cell landscape in the infected lungs,accompanied by an over-activated inflammatory response,especially in aging mice.Compared to young mice,aging mice showed extensive neutrophil activation,NETosis,and a dramatic decrease in the number of alveolar macrophages(AMs).Moreover,as important executors of efferocytosis,AMs exhibited a low efferocytotic gene signature and downregulation of multiple efferocytosis receptors in aged mice.Further analysis indicated that the efferocytosis of neutrophils,whether undergoing apoptosis or NETosis,was compromised after SARS-CoV-2 infection.Since efferocytosis is a key process in inflammatory resolution,impaired efferocytosis may contribute to hyperinflammation in aging lungs.Our study reveals the characteristics and role of efferocytosis in aging mice after SARS-CoV-2 infection and provides valuable insights for the potential treatment of COVID-19.展开更多
Oats, frequently incorporated into skincare formulations for their anti-inflammatory, moisturizing, and barrier-repairing properties, may present an overlooked risk to individuals with celiac disease, particularly whe...Oats, frequently incorporated into skincare formulations for their anti-inflammatory, moisturizing, and barrier-repairing properties, may present an overlooked risk to individuals with celiac disease, particularly when applied to compromised skin. Although pure oats are inherently gluten-free, the widespread contamination with gluten-containing grains like wheat, barley, or rye during agricultural and processing stages introduces the potential for gluten exposure through topical application. This raises important questions about whether gluten proteins, when applied to damaged skin, might penetrate the epidermal barrier and contribute to immune responses in genetically predisposed celiac patients, given that even minute amounts of gluten can trigger systemic symptoms. Emerging evidence suggests that transdermal absorption of gluten peptides through impaired skin integrity might bypass the gastrointestinal route, yet the precise mechanisms and clinical significance of this pathway remain poorly understood. The role of compromised skin in facilitating gluten absorption and the possible activation of CD4+ T-cells, mimicking gastrointestinal pathways, warrants further investigation. Additionally, the ability of gluten peptides to reach deeper dermal layers and potentially enter the systemic circulation remains speculative, though theoretically possible in severely disrupted skin barriers. Without clinical and molecular studies to determine the risk of topical gluten exposure, particularly in celiac patients with skin injuries, there remains a potential for undetected immune activation and subsequent adverse health outcomes in this sensitive population.展开更多
The paternally inherited Y chromosome has been widely used in forensics for personal identification, in anthropology and population genetics to understand origin and migration of human populations, and also in medical...The paternally inherited Y chromosome has been widely used in forensics for personal identification, in anthropology and population genetics to understand origin and migration of human populations, and also in medical and clinical studies (Wang and Li, 2013; Wang et al., 2014). There are two kinds of extremely useful markers in Y chromosome, single nucle- otide polymorphism (SNP) and short tandem repeats (STRs). With a very low mutation rate on the order of 3.0 x 10-8 mutations/nucleotide/generation (Xue et al., 2009), SNP markers have been used in constructing a robust phylogeny tree linking all the Y chromosome lineages from world pop- ulations (Karafet et al., 2008). Those lineages determined by the pattern of SNPs are called haplogroups. That is to say, we have to genotype an appropriate number of SNPs in order to assign a given Y chromosome to a haplogroup. Compared with SNPs, the mutation rates of STR markers are about four to five orders of magnitude higher (Gusmgo et al., 2005; Ballantyne et al., 2010). Typing STR has advantages of saving time and cost compared with typing SNPs in phylogenetic assignment of a Y chromosome (Wang et al., 2010). A set of STR values for an individual is called a haplotype. Because of the disparity in mutation rates between SNP and STR, one SNP haplogroup could actually comprise many STR haplotypes (Wang et al., 2010). It is most interesting that STR variability is clustered more by haplogroups than by populations (Bosch et al., 1999; Behar et al., 2004), which indicates that STR haplotypes could be used to infer the haplogroup information of a given Y chromosome. There has been increasing interest in this cost- effective strategy for predicting the haplogroup from a given STR haplotype when SNP data are unavailable. For instance, Vadim Urasin's YPredictor (http://predictor.ydna.ru/), Whit Atheys' haplogroup predictor (http://www.hprg.com/hapest5/) (Athey, 2005, 2006), and haplogroup classifier of Arizona University (Schlecht et al., 2008) have been widely employed in previous studies for haplogroup prediction (Larmuseau et al., 2010; Bembea et al., 2011; Larmuseau et al., 2012; Tarlykov et al., 2013).展开更多
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ...During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.展开更多
Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alter...Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.展开更多
An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes a...An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.展开更多
The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to st...The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface.展开更多
This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countr...This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method.展开更多
Coordination and consensus in collective behavior have attracted a lot of research interest.Although previous studies have investigated the role of compromisers in group consensus,they provide little insight into why ...Coordination and consensus in collective behavior have attracted a lot of research interest.Although previous studies have investigated the role of compromisers in group consensus,they provide little insight into why compromisers would allow such social arrangements to persist.In this study,the potential relationship between group movements and conflict management in Tibetan macaques in Anhui province,China,was investigated using hierarchical cluster analyses.Some members with higher social centrality or social rank often formed a front-runner cluster during group movements.They had higher leadership success than individuals outside the frontrunner cluster.Other members with lower social centrality or social rank often followed the group movements initiated by the front-runner cluster,and thus formed the compromiser cluster.Compromisers'proximity relations with front-runners increased with their following scores to front-runners.Compromisers had fewer events of being attacked when they followed group movements initiated by the front-runners.The compromising process made compromisers lose the choice of direction preference,but it could increase their individual safeties.This trade-off suggests that compromisers play a role of decision-maker in coordination and consensus scenarios among social animals.展开更多
The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This st...The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.展开更多
A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the res...A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the resulting decision process is modeled by a suitable scalar transformation (utility function). Each n-tuple of von Neumann-Morgenstern utilities is transformed into a nonnegative scalar value between 0 and 1. Any n-tuple yielding a largest scalar value determines an SE, which is always a pure strategy profile. SEs can be computed much faster than Nash equilibria, for example;and the decision criterion need not be based on the players’ selfishness. To illustrate the SE, we define a compromise equilibrium, establish its Pareto optimality, and present examples comparing it to other solution concepts.展开更多
This paper is an attempt to work out a compromise allocation to construct combined ratio estimates under multivariate double sampling design in presence of non-response when the population mean of the auxiliary variab...This paper is an attempt to work out a compromise allocation to construct combined ratio estimates under multivariate double sampling design in presence of non-response when the population mean of the auxiliary variable is unknown. The problem has been formulated as a multi-objective integer non-linear programming problem. Two solution procedures are developed using goal programming and fuzzy programming techniques. A numerical example is also worked out to illustrate the computational details. A comparison of the two methods is also carried out.展开更多
After six rounds of tough bargaining,Russia and the North Atlantic Treaty Or-ganization reached on May 14 an agreement,officially known as a“FoundingAct on Mutual Relations.Co-operation and Scurity between NATO and t...After six rounds of tough bargaining,Russia and the North Atlantic Treaty Or-ganization reached on May 14 an agreement,officially known as a“FoundingAct on Mutual Relations.Co-operation and Scurity between NATO and the RUS-sian Federation".The document was formally signed by Russian President BorisYeltsin on May 27 in Paris together with the leaders of the 16 NATO memberstates.The event signifies a temporary compromise between the two sides over theNATO’s eastward expansion.Soon after the accord was reached.展开更多
This paper, for the goal of revealing the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods, clarifies not only the background behind Japan's decis...This paper, for the goal of revealing the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods, clarifies not only the background behind Japan's decision of terminating development aid loan to China, but also the reason why the Chinese government decided to accept it. When countries agree on the need to collaborate but are in conflict regarding the specific method, like the case of Japan-China conflict over development aid, one country must always compromise regarding the specific method of coordination. This situation is known as the Battle of the Sexes (BoS) in game theory. It has been believed that countries do not have the incentive to withdraw from the initial agreement under such a situation. This case study, however, reveals that it is not always true. From the analysis of this study, it will be concluded that the agreement reached in the initial negotiation would not be always stable even in a situation where countries agree in general but disagree on coordination methods. In this case, "institution" and "consensus" are pointed out as incentives to make countries accept a specific coordination method.展开更多
Objective: The authors report a rare case of giant thoracic meningocele causing acute respiratory compromise, treated with a ventriculoperitoneal shunt. Case Report: We report the case of a 36-year-old with severe sco...Objective: The authors report a rare case of giant thoracic meningocele causing acute respiratory compromise, treated with a ventriculoperitoneal shunt. Case Report: We report the case of a 36-year-old with severe scoliosis status post repair over a decade ago, neurofibromatosis type I, and a known large meningocele in the left thoracic cavity, presenting with new acute respiratory compromise. She was taken to the operating room for a lumboperitoneal shunt, but the operation was aborted due to her severe spinal deformity. Two days later, she successfully underwent a procedure for ventriculoperitoneal shunt placement. Upon discharge a week later, the patient was hemodynamically stable, able to move all extremities with good strength, and demonstrated improved oxygenation. In the following 7 months, the patient demonstrated continued minimal requirement on nasal cannula, and MRI showed a stable left thoracic giant meningocele. Conclusion: Ventriculoperitoneal shunting is a method of treating and stabilizing acutely symptomatic giant meningoceles.展开更多
The aim of this paper is to reveal the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods. When players agree on the need to collaborate but are in c...The aim of this paper is to reveal the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods. When players agree on the need to collaborate but are in conflict regarding the specific method, one player must always compromise. This situation is known as the Battle of the Sexes in game theory. It has ever been believed that if an agreement is reached under such circumstances, the players do not have the incentive to withdraw from the agreement. However, this study shows that this belief is not always true if the players were able to revise the outcome of their negotiations later. The wide-ranging fields use game theories for their analysis frameworks to analyze the success or failure of coordination. However, comparing with the possibility of betrayal illustrated as a well-known Prisoner Dilemma, it has been rare to discuss conflict regarding the specific method of coordination, although such situations are often observed in today's interdependent real world. The repeated Battle of the Sexes games presented in this study would be a useful framework to analyze conflict regarding the specific method of coordination.展开更多
<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more ser...<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more serious among patients suffering from chronic disease and those who are on treatment which may af-fect their defense mechanism or immune-compromised patients who become more vulnerable to complications of COVID-19, and at high risk for morbidity and mortality with any bacterial or viral illness. <strong>Method: </strong>A retrospective, non-experimental research design was applied with a quantitative approach among patients with COVID-19 who were admitted to COVID-19 department at AVH with a total of 72 patients. Data were extracted from a patients’ elec-tronic medical record. <strong>Results:</strong> During COVID-19 outbreak 72 patients were admitted to COVID department at AVH, 54.2% were female and 33% of study participants were from Gaza governorate followed by Jerusalem 27%. Most participants 34.7% had first clinic visit after two days from the onset of COVID-19 symptoms. 45.8% were discharged to home while 13.9% died. All inflammatory markers that include ferritin, C-RP, IL-6 and D-dimer are in-creasing in all patients that were admitted to hospital;IL-6 and D-dimer were significant inflammatory markers in relation to the mortality rate. The study found the risk of mortality with IL-6 mean (218.5), and D-dimer mean (12). Furthermore there was a relation between increased risk of mortality and im-mune comprised. <strong>Conclusion:</strong> Mortality rate increased among COVID-19 pa-tients when IL-6 was higher than 218.5 and D-dimer higher than 12, and there was a relationship between increased risk of mortality and immune comprised.展开更多
Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC...Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.展开更多
The accessory gearbox is a crucial component of the power transmission system of an aero-engine.The current design of the accessory gearbox case heavily relies on engineering experience,resulting in a bulky and heavy ...The accessory gearbox is a crucial component of the power transmission system of an aero-engine.The current design of the accessory gearbox case heavily relies on engineering experience,resulting in a bulky and heavy structure.This makes it increasingly challenging to meet the design requirements of high-power density.This work proposes a multi-objective topology optimization method based on the compromise programming method for the aero-engine accessory gearbox case.By locally thinning the gearbox case wall thickness,the case weight is reduced by 12.7%,and the maximum Mises stress is also reduced by 19.7%compared to the initial design scheme.Furthermore,the maximum vibration acceleration amplitude is reduced by 23.9%.These results provide a new solution for the lightweight design of the aero-engine accessory gearbox case.展开更多
Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution ...Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms.Specifically,a new owner of a reassigned number can access the application account with which the number is associated,and may perform fraudulent activities.Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users.Thus,alternative solutions that depend on only the information of the applications are imperative.In this work,we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers.Our analysis on Meituan's real-world dataset shows that compromised accounts have unique statistical features and temporal patterns.Based on the observations,we propose a novel model called temporal pattern and statistical feature fusion model(TSF)to tackle the problem,which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features.Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines,demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.展开更多
基金supported by the National Key Research and Development Program of China(NKPs)(2022YFC2604101).
文摘Aging is one of the greatest risk factors for morbidity caused by the coronavirus disease 2019(COVID19).In older individuals,a dysregulated immune response to severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)infection contributes to disease severity;however,the underlying mechanism remains elusive.In this study,we established an aging mouse model of COVID-19,successfully replicating the development of a relatively severe disease in older adults.Further single-cell transcriptome analysis revealed a distinct immune cell landscape in the infected lungs,accompanied by an over-activated inflammatory response,especially in aging mice.Compared to young mice,aging mice showed extensive neutrophil activation,NETosis,and a dramatic decrease in the number of alveolar macrophages(AMs).Moreover,as important executors of efferocytosis,AMs exhibited a low efferocytotic gene signature and downregulation of multiple efferocytosis receptors in aged mice.Further analysis indicated that the efferocytosis of neutrophils,whether undergoing apoptosis or NETosis,was compromised after SARS-CoV-2 infection.Since efferocytosis is a key process in inflammatory resolution,impaired efferocytosis may contribute to hyperinflammation in aging lungs.Our study reveals the characteristics and role of efferocytosis in aging mice after SARS-CoV-2 infection and provides valuable insights for the potential treatment of COVID-19.
文摘Oats, frequently incorporated into skincare formulations for their anti-inflammatory, moisturizing, and barrier-repairing properties, may present an overlooked risk to individuals with celiac disease, particularly when applied to compromised skin. Although pure oats are inherently gluten-free, the widespread contamination with gluten-containing grains like wheat, barley, or rye during agricultural and processing stages introduces the potential for gluten exposure through topical application. This raises important questions about whether gluten proteins, when applied to damaged skin, might penetrate the epidermal barrier and contribute to immune responses in genetically predisposed celiac patients, given that even minute amounts of gluten can trigger systemic symptoms. Emerging evidence suggests that transdermal absorption of gluten peptides through impaired skin integrity might bypass the gastrointestinal route, yet the precise mechanisms and clinical significance of this pathway remain poorly understood. The role of compromised skin in facilitating gluten absorption and the possible activation of CD4+ T-cells, mimicking gastrointestinal pathways, warrants further investigation. Additionally, the ability of gluten peptides to reach deeper dermal layers and potentially enter the systemic circulation remains speculative, though theoretically possible in severely disrupted skin barriers. Without clinical and molecular studies to determine the risk of topical gluten exposure, particularly in celiac patients with skin injuries, there remains a potential for undetected immune activation and subsequent adverse health outcomes in this sensitive population.
基金supported by the National Excellent Youth Science Foundation of China(No.31222030)the National Natural Science Foundation of China(No.91131002)+3 种基金the Shanghai Rising-Star Program(No.12QA1400300)the China Ministry of Education Scientific Research Major Project(Nos. 311016 and 113022A)the MOE University Doctoral Research Supervisor's Funds(No.20120071110021)the Shanghai Professional Development Funding(No.2010001)
文摘The paternally inherited Y chromosome has been widely used in forensics for personal identification, in anthropology and population genetics to understand origin and migration of human populations, and also in medical and clinical studies (Wang and Li, 2013; Wang et al., 2014). There are two kinds of extremely useful markers in Y chromosome, single nucle- otide polymorphism (SNP) and short tandem repeats (STRs). With a very low mutation rate on the order of 3.0 x 10-8 mutations/nucleotide/generation (Xue et al., 2009), SNP markers have been used in constructing a robust phylogeny tree linking all the Y chromosome lineages from world pop- ulations (Karafet et al., 2008). Those lineages determined by the pattern of SNPs are called haplogroups. That is to say, we have to genotype an appropriate number of SNPs in order to assign a given Y chromosome to a haplogroup. Compared with SNPs, the mutation rates of STR markers are about four to five orders of magnitude higher (Gusmgo et al., 2005; Ballantyne et al., 2010). Typing STR has advantages of saving time and cost compared with typing SNPs in phylogenetic assignment of a Y chromosome (Wang et al., 2010). A set of STR values for an individual is called a haplotype. Because of the disparity in mutation rates between SNP and STR, one SNP haplogroup could actually comprise many STR haplotypes (Wang et al., 2010). It is most interesting that STR variability is clustered more by haplogroups than by populations (Bosch et al., 1999; Behar et al., 2004), which indicates that STR haplotypes could be used to infer the haplogroup information of a given Y chromosome. There has been increasing interest in this cost- effective strategy for predicting the haplogroup from a given STR haplotype when SNP data are unavailable. For instance, Vadim Urasin's YPredictor (http://predictor.ydna.ru/), Whit Atheys' haplogroup predictor (http://www.hprg.com/hapest5/) (Athey, 2005, 2006), and haplogroup classifier of Arizona University (Schlecht et al., 2008) have been widely employed in previous studies for haplogroup prediction (Larmuseau et al., 2010; Bembea et al., 2011; Larmuseau et al., 2012; Tarlykov et al., 2013).
文摘During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.
基金supported by the Humanities and Social Sciences Foundation of Ministry of Education of China(09YJC630229)Scientific Research Foundation of Guangxi University for Nationalities for Talent Introduction(200702YZ01)Science and Technology Project of State Ethnic Affairs Commission(09GX03)
文摘Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations.
基金supported by the National Natural Science Foundation of China (7087111770571086)
文摘An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications.
基金Supported by the Outstanding Overseas Research Team Project of the Chinese Academy of Sciences, the National Natural Science Foundation of China (20221603), and the Research Fund of Key Lab for Nanomaterials, Ministry of Education, China (2006-1).
文摘The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface.
文摘This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method.
基金supported by the Natural Science Foundation of China[Grant Nos.31801983,32070455,31971404,and 31772475]the Initial Foundation of Doctoral Scientific Research[Y040418135]the Program of Outstanding Young Teachers Training[Z010139011]in Anhui University and the China Scholarship Council.
文摘Coordination and consensus in collective behavior have attracted a lot of research interest.Although previous studies have investigated the role of compromisers in group consensus,they provide little insight into why compromisers would allow such social arrangements to persist.In this study,the potential relationship between group movements and conflict management in Tibetan macaques in Anhui province,China,was investigated using hierarchical cluster analyses.Some members with higher social centrality or social rank often formed a front-runner cluster during group movements.They had higher leadership success than individuals outside the frontrunner cluster.Other members with lower social centrality or social rank often followed the group movements initiated by the front-runner cluster,and thus formed the compromiser cluster.Compromisers'proximity relations with front-runners increased with their following scores to front-runners.Compromisers had fewer events of being attacked when they followed group movements initiated by the front-runners.The compromising process made compromisers lose the choice of direction preference,but it could increase their individual safeties.This trade-off suggests that compromisers play a role of decision-maker in coordination and consensus scenarios among social animals.
文摘The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.
文摘A scalar equilibrium (SE) is defined for n-person prescriptive games in normal form. When a decision criterion (notion of rationality) is either agreed upon by the players or prescribed by an external arbiter, the resulting decision process is modeled by a suitable scalar transformation (utility function). Each n-tuple of von Neumann-Morgenstern utilities is transformed into a nonnegative scalar value between 0 and 1. Any n-tuple yielding a largest scalar value determines an SE, which is always a pure strategy profile. SEs can be computed much faster than Nash equilibria, for example;and the decision criterion need not be based on the players’ selfishness. To illustrate the SE, we define a compromise equilibrium, establish its Pareto optimality, and present examples comparing it to other solution concepts.
文摘This paper is an attempt to work out a compromise allocation to construct combined ratio estimates under multivariate double sampling design in presence of non-response when the population mean of the auxiliary variable is unknown. The problem has been formulated as a multi-objective integer non-linear programming problem. Two solution procedures are developed using goal programming and fuzzy programming techniques. A numerical example is also worked out to illustrate the computational details. A comparison of the two methods is also carried out.
文摘After six rounds of tough bargaining,Russia and the North Atlantic Treaty Or-ganization reached on May 14 an agreement,officially known as a“FoundingAct on Mutual Relations.Co-operation and Scurity between NATO and the RUS-sian Federation".The document was formally signed by Russian President BorisYeltsin on May 27 in Paris together with the leaders of the 16 NATO memberstates.The event signifies a temporary compromise between the two sides over theNATO’s eastward expansion.Soon after the accord was reached.
文摘This paper, for the goal of revealing the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods, clarifies not only the background behind Japan's decision of terminating development aid loan to China, but also the reason why the Chinese government decided to accept it. When countries agree on the need to collaborate but are in conflict regarding the specific method, like the case of Japan-China conflict over development aid, one country must always compromise regarding the specific method of coordination. This situation is known as the Battle of the Sexes (BoS) in game theory. It has been believed that countries do not have the incentive to withdraw from the initial agreement under such a situation. This case study, however, reveals that it is not always true. From the analysis of this study, it will be concluded that the agreement reached in the initial negotiation would not be always stable even in a situation where countries agree in general but disagree on coordination methods. In this case, "institution" and "consensus" are pointed out as incentives to make countries accept a specific coordination method.
文摘Objective: The authors report a rare case of giant thoracic meningocele causing acute respiratory compromise, treated with a ventriculoperitoneal shunt. Case Report: We report the case of a 36-year-old with severe scoliosis status post repair over a decade ago, neurofibromatosis type I, and a known large meningocele in the left thoracic cavity, presenting with new acute respiratory compromise. She was taken to the operating room for a lumboperitoneal shunt, but the operation was aborted due to her severe spinal deformity. Two days later, she successfully underwent a procedure for ventriculoperitoneal shunt placement. Upon discharge a week later, the patient was hemodynamically stable, able to move all extremities with good strength, and demonstrated improved oxygenation. In the following 7 months, the patient demonstrated continued minimal requirement on nasal cannula, and MRI showed a stable left thoracic giant meningocele. Conclusion: Ventriculoperitoneal shunting is a method of treating and stabilizing acutely symptomatic giant meningoceles.
文摘The aim of this paper is to reveal the mechanism of compromise and change in coordination where players agree in general but disagree on coordination methods. When players agree on the need to collaborate but are in conflict regarding the specific method, one player must always compromise. This situation is known as the Battle of the Sexes in game theory. It has ever been believed that if an agreement is reached under such circumstances, the players do not have the incentive to withdraw from the agreement. However, this study shows that this belief is not always true if the players were able to revise the outcome of their negotiations later. The wide-ranging fields use game theories for their analysis frameworks to analyze the success or failure of coordination. However, comparing with the possibility of betrayal illustrated as a well-known Prisoner Dilemma, it has been rare to discuss conflict regarding the specific method of coordination, although such situations are often observed in today's interdependent real world. The repeated Battle of the Sexes games presented in this study would be a useful framework to analyze conflict regarding the specific method of coordination.
文摘<strong>Background: </strong>Coronavirus disease 2019 which is officially known as COVID-19 belongs to family viruses. COVID-19 manifestations vary among affected people. These symptoms may become more serious among patients suffering from chronic disease and those who are on treatment which may af-fect their defense mechanism or immune-compromised patients who become more vulnerable to complications of COVID-19, and at high risk for morbidity and mortality with any bacterial or viral illness. <strong>Method: </strong>A retrospective, non-experimental research design was applied with a quantitative approach among patients with COVID-19 who were admitted to COVID-19 department at AVH with a total of 72 patients. Data were extracted from a patients’ elec-tronic medical record. <strong>Results:</strong> During COVID-19 outbreak 72 patients were admitted to COVID department at AVH, 54.2% were female and 33% of study participants were from Gaza governorate followed by Jerusalem 27%. Most participants 34.7% had first clinic visit after two days from the onset of COVID-19 symptoms. 45.8% were discharged to home while 13.9% died. All inflammatory markers that include ferritin, C-RP, IL-6 and D-dimer are in-creasing in all patients that were admitted to hospital;IL-6 and D-dimer were significant inflammatory markers in relation to the mortality rate. The study found the risk of mortality with IL-6 mean (218.5), and D-dimer mean (12). Furthermore there was a relation between increased risk of mortality and im-mune comprised. <strong>Conclusion:</strong> Mortality rate increased among COVID-19 pa-tients when IL-6 was higher than 218.5 and D-dimer higher than 12, and there was a relationship between increased risk of mortality and immune comprised.
文摘Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.
基金supported by the Chongqing Outstanding Young Scientist Fund(Grant No.CSTB2023NSCQJQX0016)the National Natural Science Foundation of China(Grant No.52322504)。
文摘The accessory gearbox is a crucial component of the power transmission system of an aero-engine.The current design of the accessory gearbox case heavily relies on engineering experience,resulting in a bulky and heavy structure.This makes it increasingly challenging to meet the design requirements of high-power density.This work proposes a multi-objective topology optimization method based on the compromise programming method for the aero-engine accessory gearbox case.By locally thinning the gearbox case wall thickness,the case weight is reduced by 12.7%,and the maximum Mises stress is also reduced by 19.7%compared to the initial design scheme.Furthermore,the maximum vibration acceleration amplitude is reduced by 23.9%.These results provide a new solution for the lightweight design of the aero-engine accessory gearbox case.
基金supported by the National Natural Science Foundation of China(Nos.62072115,62202402,61971145,and 61602122)the Shanghai Science and Technology Innovation Action Plan Project(No.22510713600)+2 种基金the Guangdong Basic and Applied Basic Research Foundation,China(Nos.2022A1515011583 and 2023A1515011562)the One-off Tier 2 Start-up Grant(2020/2021)of Hong Kong Baptist University(Ref.RCOFSGT2/20-21/COMM/002)Startup Grant(Tier 1)for New Academics AY2020/21 of Hong Kong Baptist University and Germany/Hong Kong Joint Research Scheme sponsored by the Research Grants Council of Hong Kong,China,the German Academic Exchange Service of Germany(No.G-HKBU203/22),and Meituan。
文摘Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms.Specifically,a new owner of a reassigned number can access the application account with which the number is associated,and may perform fraudulent activities.Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users.Thus,alternative solutions that depend on only the information of the applications are imperative.In this work,we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers.Our analysis on Meituan's real-world dataset shows that compromised accounts have unique statistical features and temporal patterns.Based on the observations,we propose a novel model called temporal pattern and statistical feature fusion model(TSF)to tackle the problem,which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features.Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines,demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.