BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients...BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients undergoing laparoscopic surgical procedures.AIM To ascertain whether the combination of PH and GDFT improves clinical recovery indicators,reduces postoperative complications,and alleviates anxiety,depression,and inflammatory responses in this specific patient population.METHODS A total of 120 elderly patients who underwent laparoscopic surgery in our hospital from July 2023 to June 2024 were randomly allocated into two groups:A control group(n=60)and a study group(n=60).In the control group,conventional anesthesia ventilation and fluid management protocols were administered,while in the study group,PH(with intraoperative PaCO_(2) maintained between 45-55 mmHg)was combined with GDFT.Postoperative recovery indicators,including the time to first flatus,time to ambulation,and length of hospital stay,were compared between the groups.Additionally,complication rates,anxietydepression scores assessed via the Hospital Anxiety and Depression scale,and levels of inflammatory factors were analyzed to evaluate the outcomes.RESULTS When compared with the control group,the study group demonstrated significantly shorter time to first flatus[(48.3±6.2)hours vs(62.5±7.8)hours],time to ambulation[(28.4±4.2)hours vs(38.6±5.1)hours],and length of hospital stay[(5.2±1.1)days vs(7.4±1.3)days](P<0.05).A significantly lower postoperative complication rate was observed in the study group(8.3%vs 21.7%,P<0.05).Additionally,at 3 days postoperatively,significantly lower anxiety scores[(5.2±1.4)vs(7.8±1.6)]and depression scores[(4.8±1.2)vs(7.1±1.5)]were recorded in the study group compared to the control group(P<0.05);Furthermore,at 24 hours postoperatively,serum levels of interleukin-6,tumor necrosis factorα,and C-reactive protein were found to be significantly lower in the study group than in the control group(P<0.05).CONCLUSION Postoperative recovery is significantly expedited,postoperative complications are markedly reduced,anxietydepression status is substantially improved,and inflammatory response is notably diminished in elderly patients undergoing laparoscopic surgery when PH is combined with GDFT,thereby making it worthy of clinical application.展开更多
Virus identification is a prerequisite not only for the early diagnosis of viral infectious diseases but also for the effective prevention of epidemics.Successful cultivation is the gold standard for identifying a vir...Virus identification is a prerequisite not only for the early diagnosis of viral infectious diseases but also for the effective prevention of epidemics.Successful cultivation is the gold standard for identifying a virus,according to the Koch postulates.However,this requires screening for a permissive cell line,which is traditionally time-,reagent-and labor-intensive.Here,a simple and easy-to-operate microfluidic chip,formed by seeding a variety of cell lines and culturing them in parallel,is reported for use in virus cultivation and virus-permissive host-cell screening.The chip was tested by infection with two known viruses,enterovirus 71(EV71)and influenza virus H1N1.Infection with EV71 and H1N1 caused significant cytopathic effects(CPE)in RD and MDCK cells,respectively,demonstrating that virus cultivation based on this microfluidic cell chip can be used as a substitute for the traditional plate-based culture method and reproduce the typical CPE caused by virus infection.Using this microfluidic cell chip method for virus cultivation could make it possible to identify an emerging virus in a highthroughput,automatic,and unprecedentedly fast way.展开更多
'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, ...'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues.展开更多
It is well known that primates,including humans,hardly recover motor function after spinal cord injury(SCI)when compared with non-primate mammals such as rodents.This limited functional recovery is in part due to a ...It is well known that primates,including humans,hardly recover motor function after spinal cord injury(SCI)when compared with non-primate mammals such as rodents.This limited functional recovery is in part due to a non-permissive environment of the central nervous system(CNS)inhibiting axonal regrowth.展开更多
Heavy metal contamination from Artisanal and Small-Scale Gold Mining(ASGM)is increasingly recognized as a global issue,impacting soil quality and public health.In Tanzania,while ASGM activities significantly bolster l...Heavy metal contamination from Artisanal and Small-Scale Gold Mining(ASGM)is increasingly recognized as a global issue,impacting soil quality and public health.In Tanzania,while ASGM activities significantly bolster local economies,they also pose serious environmental risks.This study examined the levels and dispersion of heavy metals,specifically mercury(Hg),lead(Pb),arsenic(As),zinc(Zn),and cadmium(Cd)in the Chunya district.Soil samples were collected from both active and abandoned tailing heaps and analysed by Atomic Absorption Spectroscopy(AAS),with the results compared to the WHO/FAO(2008)guidelines for agricultural soils.The findings revealed alarming concentrations of Hg across all sampling points,ranging from 0.88 to 3.72 mg·kg^(−1).In contrast,48 out of 51 sampling points exhibited higher Cd levels between 0.98 and 4.42 mg/kg,exceeding the safe limits of 0.5 mg·kg^(−1)for Hg and 0.8 mg·kg^(−1)for Cd.In contrast,the negative control site showed much lower levels(0.03mg·kg^(−1)for Cd and 0.43 mg·kg^(−1)for Hg).A notable decrease in heavy metal concentrations was observed with increasing distance from the tailing heaps(0 m to 200 m).Soil pH and electrical conductivity significantly influenced the mobility of these contaminants,with higher concentrations found near lower tailing heaps.The elevated levels of Hg and Cd present substantial risks to human health and ecosystems,highlighting the urgent need for effective remediation strategies.Furthermore,the gold mining industry must innovate technologies that minimize heavy metal release during extraction processes to mitigate environmental harm.展开更多
In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness ...In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness of the evils of torture,while Problem 2 aims to find a suitable theory to balance the“intuitive rejection”and“intuition of exceptional cases”in the ticking bomb scenario.Existing mainstream approaches have generally failed to resolve these issues.However,Matthew Kramer’s view of torture addresses both aspects of these problems.For Problem 1,Kramer adopts a perpetrator-centered viewpoint,arguing that torture undermines the moral integrity of the perpetrator.Regarding Problem 2,he suggests that the situation we face is a moral conflict in which the use of torture is morally wrong but might be the best action in a given context,granting it a weaker form of permissibility.However,in terms of the evils of torture,Kramer fails to explain its uniqueness.His theory cannot apply to all types of torture,and his perpetrator-centered argument contains logical flaws.Regarding the permissibility of torture,while Kramer’s overall approach is correct,he does not provide a reasonable explanation of the moral obligation to“forbid torture”or the prima facie surrounding it.A correct view of torture should adhere to an inmate-centered viewpoint,understanding the evils of torture in an additive manner in Problem 1,and acknowledging the existence of moral conflict in Problem 2.It should not only demonstrate that,in some situations,the use of torture may be the morally best option,but also show that the moral obligation to prohibit torture is simply outweighed under these circumstances.展开更多
Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing sol...Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing solutions often suffer from centralized architectures,and exorbitant costs.To mitigate these issues,in this paper,we propose SecureVFL,a decentralized multi-party VFL scheme designed to enhance efficiency and trustworthiness while guaranteeing privacy.SecureVFL uses a permissioned blockchain and introduces a novel consensus algorithm,Proof of Feature Sharing(PoFS),to facilitate decentralized,trustworthy,and high-throughput federated training.SecureVFL introduces a verifiable and lightweight three-party Replicated Secret Sharing(RSS)protocol for feature intersection summation among overlapping users.Furthermore,we propose a(_(2)^(4))-sharing protocol to achieve federated training in a four-party VFL setting.This protocol involves only addition operations and exhibits robustness.SecureVFL not only enables anonymous interactions among participants but also safeguards their real identities,and provides mechanisms to unmask these identities when malicious activities are performed.We illustrate the proposed mechanism through a case study on VFL across four banks.Finally,our theoretical analysis proves the security of SecureVFL.Experiments demonstrated that SecureVFL outperformed existing multi-party VFL privacy-preserving schemes,such as MP-FedXGB,in terms of both overhead and model performance.展开更多
The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition base...The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition based on a deep convolutional neural network”(Data Science and Management,2024,7(1):25–34).https://doi.org/10.1016/j.dsm.2023.10.002.Ethics statement:The authors declare the Institutional Ethics Committee confirmed that no ethical review was required for this study.The authors have taken the participants’permission and consent to participate in this study.展开更多
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and...The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.展开更多
In this paper, an EOQ inventory model is developed for deteriorating items with variable rates of deterioration and conditions of grace periods when demand is a quadratic function of time. The deterioration rate consi...In this paper, an EOQ inventory model is developed for deteriorating items with variable rates of deterioration and conditions of grace periods when demand is a quadratic function of time. The deterioration rate considered here is a special type of Weibull distribution deterioration rate, i.e., a one-parameter Weibull distribution deterioration rate and it increases with respect to time. The quadratic demand precisely depicts of the demand of seasonal items, fashion apparels, cosmetics, and newly launched essential commodities like android mobiles, laptops, automobiles etc., coming to the market. The model is divided into three policies according to the occurrence of the grace periods. Shortages, backlogging and complete backlogging cases are not allowed to occur in the model. The proposed model is well-explained with the help of a simple solution procedure. The three numerical examples are taken to illustrate the effectiveness of the EOQ inventory model along with sensitivity analysis.展开更多
AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastri...AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastric volume, a procedure in which gastrointestinal continuity was reestablished while excluding the entire duodenum and proximal jejunal loop. We observed the procedural success rate, long-term survival, and histopathological sequelae associated with a number of technical modifications. These included: use of anatomical markers to precisely identify Treitz's ligament; careful dissection along surgical planes; careful attention to the choice of regional transection sites; reconstruction using full-thickness anastomoses; use of a minimally invasive procedure with prohemostatic pretreatment and hemorrhage control; prevention of hypo-thermic damage; reduction in the length of the procedure; and accelerated surgical recovery using fast-track surgical modalities such as perioperative permissive underfeeding and goal-directed volume therapy. RESULTS: The series of modif ications we adopted reduced operation time from 110.02 ± 12.34 min to 78.39 ± 7.26 min (P < 0.01), and the procedural success rate increased from 43.3% (13/30) to 90% (18/20) (P < 0.01), with a long-term survival of 83.3% (15/18) (P < 0.01). CONCLUSION: Using a number of fast-track and damage control surgical techniques, we have successfully established a stable model of gastric bypass in diabetic rats.展开更多
The present study explored the extent to which parent’s demographic characteristics,such as age,gender,education,place of residence,and family income have an influence on the parental style they adopt and consequentl...The present study explored the extent to which parent’s demographic characteristics,such as age,gender,education,place of residence,and family income have an influence on the parental style they adopt and consequently on their perception of their children’s psychological adjustment in regards to their family relationships,peer relationships,school performance,and the development of their self-esteem.Various studies conducted in the past as well as in recent years indicate that parental demographic characteristics are significantly linked with parenting behavior(parental styles)and predict the way parents perceive their children’s adjustment,development,and school achievement.The present study was quantitative and we applied three different self-report questionnaires,namely,a Personal Information Form(PIF)for the demographic data,the Parental Authority Styles(PAQ)Questionnaire,and the Questionnaire of Children’s Family Relations,School Performance,Social Competence,and Self-Esteem.We administered the instruments to 336 Cypriot parents(23%fathers and 77%mothers).Our results showed that parent’s demographics are significantly related to the parenting styles they adopt.Furthermore,authoritative parenting is significantly correlated with positive parental perceptions of children’school performance,family relationships,social skills,and self-esteem.On the contrary,authoritarian parenting is a significant negative predictor to parental perceptions of children’s adjustment in the aforementioned areas of development.展开更多
Left-turning traffic without a protected left-turn signal is one of the major safety concerns at urban intersections. Though an average of only l0% - 15% of all approaching traffic turns left, significantly a large pr...Left-turning traffic without a protected left-turn signal is one of the major safety concerns at urban intersections. Though an average of only l0% - 15% of all approaching traffic turns left, significantly a large proportion of left-turn crashes occur involving 21% of all intersection fatal crashes. Where traditional safety countermeasures of signal timing-phasing and use of flashing yellow light have reportedly failed to significantly reduce the rate of crashes, an in-vehicle advance collision warning message can be helpful to reduce left-turn collisions at intersections. In this study, an in-vehicle audio warning application has been designed by providing two safety warning messages (Advance Warning Message and Safe Left-turn Maneuver Message) under the vehicle to vehicle (V2V) communication system, which is triggered based on the acceptable gaps of oncoming opposing vehicles for a safe left-turn. A driving simulator test has been conducted with 30 participants to investigate the impacts of warning messages on performance measures such as speed and acceleration profiles, collision records, brake reaction distance, and intersection clearance time. Statistical results showed that with the help of these messages, all participants were able to reduce speeds and accelerations and chose suitable gaps without potential conflicts. Moreover, the results of questionnaire analysis provide a positive acceptability especially for the Safe Left-turn Maneuver Message. Based on the performance measurements, this type of safety warning messages can be recommended for possible real-road tests for practical applications.展开更多
基金Supported by the 2024 Hebei Medical Science Research Project,No.20241638Key Research and Development Program of Zhangjiakou City,No.2311041D.
文摘BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients undergoing laparoscopic surgical procedures.AIM To ascertain whether the combination of PH and GDFT improves clinical recovery indicators,reduces postoperative complications,and alleviates anxiety,depression,and inflammatory responses in this specific patient population.METHODS A total of 120 elderly patients who underwent laparoscopic surgery in our hospital from July 2023 to June 2024 were randomly allocated into two groups:A control group(n=60)and a study group(n=60).In the control group,conventional anesthesia ventilation and fluid management protocols were administered,while in the study group,PH(with intraoperative PaCO_(2) maintained between 45-55 mmHg)was combined with GDFT.Postoperative recovery indicators,including the time to first flatus,time to ambulation,and length of hospital stay,were compared between the groups.Additionally,complication rates,anxietydepression scores assessed via the Hospital Anxiety and Depression scale,and levels of inflammatory factors were analyzed to evaluate the outcomes.RESULTS When compared with the control group,the study group demonstrated significantly shorter time to first flatus[(48.3±6.2)hours vs(62.5±7.8)hours],time to ambulation[(28.4±4.2)hours vs(38.6±5.1)hours],and length of hospital stay[(5.2±1.1)days vs(7.4±1.3)days](P<0.05).A significantly lower postoperative complication rate was observed in the study group(8.3%vs 21.7%,P<0.05).Additionally,at 3 days postoperatively,significantly lower anxiety scores[(5.2±1.4)vs(7.8±1.6)]and depression scores[(4.8±1.2)vs(7.1±1.5)]were recorded in the study group compared to the control group(P<0.05);Furthermore,at 24 hours postoperatively,serum levels of interleukin-6,tumor necrosis factorα,and C-reactive protein were found to be significantly lower in the study group than in the control group(P<0.05).CONCLUSION Postoperative recovery is significantly expedited,postoperative complications are markedly reduced,anxietydepression status is substantially improved,and inflammatory response is notably diminished in elderly patients undergoing laparoscopic surgery when PH is combined with GDFT,thereby making it worthy of clinical application.
基金the Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20190057)the National Nature Science Foundation of China(No.81827804)+1 种基金the CAS Emergency Project of ASF Research(No.KJZDSW-L06-02)Applied Basic Research Program of Wuhan(No.2018060401011327)。
文摘Virus identification is a prerequisite not only for the early diagnosis of viral infectious diseases but also for the effective prevention of epidemics.Successful cultivation is the gold standard for identifying a virus,according to the Koch postulates.However,this requires screening for a permissive cell line,which is traditionally time-,reagent-and labor-intensive.Here,a simple and easy-to-operate microfluidic chip,formed by seeding a variety of cell lines and culturing them in parallel,is reported for use in virus cultivation and virus-permissive host-cell screening.The chip was tested by infection with two known viruses,enterovirus 71(EV71)and influenza virus H1N1.Infection with EV71 and H1N1 caused significant cytopathic effects(CPE)in RD and MDCK cells,respectively,demonstrating that virus cultivation based on this microfluidic cell chip can be used as a substitute for the traditional plate-based culture method and reproduce the typical CPE caused by virus infection.Using this microfluidic cell chip method for virus cultivation could make it possible to identify an emerging virus in a highthroughput,automatic,and unprecedentedly fast way.
基金supported by grants from the Canadian Institutes of Health Researchthe Mary Katz Claman Foundationthe Oberfeld Family Fund for Alzheimer Research
文摘'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues.
基金supported by a grant-in-aid from the Ministry of Education,Culture,Sports,Science and Technology of Japangrants for Research and Development project of Yokohama City University
文摘It is well known that primates,including humans,hardly recover motor function after spinal cord injury(SCI)when compared with non-primate mammals such as rodents.This limited functional recovery is in part due to a non-permissive environment of the central nervous system(CNS)inhibiting axonal regrowth.
文摘Heavy metal contamination from Artisanal and Small-Scale Gold Mining(ASGM)is increasingly recognized as a global issue,impacting soil quality and public health.In Tanzania,while ASGM activities significantly bolster local economies,they also pose serious environmental risks.This study examined the levels and dispersion of heavy metals,specifically mercury(Hg),lead(Pb),arsenic(As),zinc(Zn),and cadmium(Cd)in the Chunya district.Soil samples were collected from both active and abandoned tailing heaps and analysed by Atomic Absorption Spectroscopy(AAS),with the results compared to the WHO/FAO(2008)guidelines for agricultural soils.The findings revealed alarming concentrations of Hg across all sampling points,ranging from 0.88 to 3.72 mg·kg^(−1).In contrast,48 out of 51 sampling points exhibited higher Cd levels between 0.98 and 4.42 mg/kg,exceeding the safe limits of 0.5 mg·kg^(−1)for Hg and 0.8 mg·kg^(−1)for Cd.In contrast,the negative control site showed much lower levels(0.03mg·kg^(−1)for Cd and 0.43 mg·kg^(−1)for Hg).A notable decrease in heavy metal concentrations was observed with increasing distance from the tailing heaps(0 m to 200 m).Soil pH and electrical conductivity significantly influenced the mobility of these contaminants,with higher concentrations found near lower tailing heaps.The elevated levels of Hg and Cd present substantial risks to human health and ecosystems,highlighting the urgent need for effective remediation strategies.Furthermore,the gold mining industry must innovate technologies that minimize heavy metal release during extraction processes to mitigate environmental harm.
基金This text represents a periodic outcome of the Beijing Social Science Fund Youth Project(Project Approval Number 22FXC018).
文摘In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness of the evils of torture,while Problem 2 aims to find a suitable theory to balance the“intuitive rejection”and“intuition of exceptional cases”in the ticking bomb scenario.Existing mainstream approaches have generally failed to resolve these issues.However,Matthew Kramer’s view of torture addresses both aspects of these problems.For Problem 1,Kramer adopts a perpetrator-centered viewpoint,arguing that torture undermines the moral integrity of the perpetrator.Regarding Problem 2,he suggests that the situation we face is a moral conflict in which the use of torture is morally wrong but might be the best action in a given context,granting it a weaker form of permissibility.However,in terms of the evils of torture,Kramer fails to explain its uniqueness.His theory cannot apply to all types of torture,and his perpetrator-centered argument contains logical flaws.Regarding the permissibility of torture,while Kramer’s overall approach is correct,he does not provide a reasonable explanation of the moral obligation to“forbid torture”or the prima facie surrounding it.A correct view of torture should adhere to an inmate-centered viewpoint,understanding the evils of torture in an additive manner in Problem 1,and acknowledging the existence of moral conflict in Problem 2.It should not only demonstrate that,in some situations,the use of torture may be the morally best option,but also show that the moral obligation to prohibit torture is simply outweighed under these circumstances.
基金supported by Open Research Projects of Zhejiang Lab(No.2022QA0AB02)Natural Science Foundation of Sichuan Province(2022NSFSC0913)Sichuan Province Selected Funding for Postdoctoral Research Projects(TB2022032).
文摘Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing solutions often suffer from centralized architectures,and exorbitant costs.To mitigate these issues,in this paper,we propose SecureVFL,a decentralized multi-party VFL scheme designed to enhance efficiency and trustworthiness while guaranteeing privacy.SecureVFL uses a permissioned blockchain and introduces a novel consensus algorithm,Proof of Feature Sharing(PoFS),to facilitate decentralized,trustworthy,and high-throughput federated training.SecureVFL introduces a verifiable and lightweight three-party Replicated Secret Sharing(RSS)protocol for feature intersection summation among overlapping users.Furthermore,we propose a(_(2)^(4))-sharing protocol to achieve federated training in a four-party VFL setting.This protocol involves only addition operations and exhibits robustness.SecureVFL not only enables anonymous interactions among participants but also safeguards their real identities,and provides mechanisms to unmask these identities when malicious activities are performed.We illustrate the proposed mechanism through a case study on VFL across four banks.Finally,our theoretical analysis proves the security of SecureVFL.Experiments demonstrated that SecureVFL outperformed existing multi-party VFL privacy-preserving schemes,such as MP-FedXGB,in terms of both overhead and model performance.
文摘The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition based on a deep convolutional neural network”(Data Science and Management,2024,7(1):25–34).https://doi.org/10.1016/j.dsm.2023.10.002.Ethics statement:The authors declare the Institutional Ethics Committee confirmed that no ethical review was required for this study.The authors have taken the participants’permission and consent to participate in this study.
文摘The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.
文摘In this paper, an EOQ inventory model is developed for deteriorating items with variable rates of deterioration and conditions of grace periods when demand is a quadratic function of time. The deterioration rate considered here is a special type of Weibull distribution deterioration rate, i.e., a one-parameter Weibull distribution deterioration rate and it increases with respect to time. The quadratic demand precisely depicts of the demand of seasonal items, fashion apparels, cosmetics, and newly launched essential commodities like android mobiles, laptops, automobiles etc., coming to the market. The model is divided into three policies according to the occurrence of the grace periods. Shortages, backlogging and complete backlogging cases are not allowed to occur in the model. The proposed model is well-explained with the help of a simple solution procedure. The three numerical examples are taken to illustrate the effectiveness of the EOQ inventory model along with sensitivity analysis.
基金Supported by Scientific Research Fund of Heilongjiang Provincial Education Department, No. 11541200Harbin Medical University First Affi liated Hospital, No. 2007098
文摘AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastric volume, a procedure in which gastrointestinal continuity was reestablished while excluding the entire duodenum and proximal jejunal loop. We observed the procedural success rate, long-term survival, and histopathological sequelae associated with a number of technical modifications. These included: use of anatomical markers to precisely identify Treitz's ligament; careful dissection along surgical planes; careful attention to the choice of regional transection sites; reconstruction using full-thickness anastomoses; use of a minimally invasive procedure with prohemostatic pretreatment and hemorrhage control; prevention of hypo-thermic damage; reduction in the length of the procedure; and accelerated surgical recovery using fast-track surgical modalities such as perioperative permissive underfeeding and goal-directed volume therapy. RESULTS: The series of modif ications we adopted reduced operation time from 110.02 ± 12.34 min to 78.39 ± 7.26 min (P < 0.01), and the procedural success rate increased from 43.3% (13/30) to 90% (18/20) (P < 0.01), with a long-term survival of 83.3% (15/18) (P < 0.01). CONCLUSION: Using a number of fast-track and damage control surgical techniques, we have successfully established a stable model of gastric bypass in diabetic rats.
文摘The present study explored the extent to which parent’s demographic characteristics,such as age,gender,education,place of residence,and family income have an influence on the parental style they adopt and consequently on their perception of their children’s psychological adjustment in regards to their family relationships,peer relationships,school performance,and the development of their self-esteem.Various studies conducted in the past as well as in recent years indicate that parental demographic characteristics are significantly linked with parenting behavior(parental styles)and predict the way parents perceive their children’s adjustment,development,and school achievement.The present study was quantitative and we applied three different self-report questionnaires,namely,a Personal Information Form(PIF)for the demographic data,the Parental Authority Styles(PAQ)Questionnaire,and the Questionnaire of Children’s Family Relations,School Performance,Social Competence,and Self-Esteem.We administered the instruments to 336 Cypriot parents(23%fathers and 77%mothers).Our results showed that parent’s demographics are significantly related to the parenting styles they adopt.Furthermore,authoritative parenting is significantly correlated with positive parental perceptions of children’school performance,family relationships,social skills,and self-esteem.On the contrary,authoritarian parenting is a significant negative predictor to parental perceptions of children’s adjustment in the aforementioned areas of development.
文摘Left-turning traffic without a protected left-turn signal is one of the major safety concerns at urban intersections. Though an average of only l0% - 15% of all approaching traffic turns left, significantly a large proportion of left-turn crashes occur involving 21% of all intersection fatal crashes. Where traditional safety countermeasures of signal timing-phasing and use of flashing yellow light have reportedly failed to significantly reduce the rate of crashes, an in-vehicle advance collision warning message can be helpful to reduce left-turn collisions at intersections. In this study, an in-vehicle audio warning application has been designed by providing two safety warning messages (Advance Warning Message and Safe Left-turn Maneuver Message) under the vehicle to vehicle (V2V) communication system, which is triggered based on the acceptable gaps of oncoming opposing vehicles for a safe left-turn. A driving simulator test has been conducted with 30 participants to investigate the impacts of warning messages on performance measures such as speed and acceleration profiles, collision records, brake reaction distance, and intersection clearance time. Statistical results showed that with the help of these messages, all participants were able to reduce speeds and accelerations and chose suitable gaps without potential conflicts. Moreover, the results of questionnaire analysis provide a positive acceptability especially for the Safe Left-turn Maneuver Message. Based on the performance measurements, this type of safety warning messages can be recommended for possible real-road tests for practical applications.