Everyone experiences learning new things in their lives,and I am no exception.Today,I want to share my journey of learning how to skateboard.I still remember the summer vacation when I was seven years old.One day,I sa...Everyone experiences learning new things in their lives,and I am no exception.Today,I want to share my journey of learning how to skateboard.I still remember the summer vacation when I was seven years old.One day,I saw some older kids skating in our neighborhood,zooming back and forth on their skateboards.“Wow!They look so cool!”I thought to myself.I immediately decided that I wanted to try it too,so I begged-level my mom to buy me a beginner-level skateboard.展开更多
Through analyzing the cases of Xiao Zhijun and the Yulin maternal jumping incident,the authors found significant disputes between the requests for non-indicated cesarean section and medical risk prevention,as well as ...Through analyzing the cases of Xiao Zhijun and the Yulin maternal jumping incident,the authors found significant disputes between the requests for non-indicated cesarean section and medical risk prevention,as well as between the psychology of avoiding childbirth pain and surgical responsibility.Currently,based on people’s current awareness and the responsibility orientation of expert opinions in disputes,medical institutions tend to satisfy family members’surgical requirements after fulfilling their obligation to fully inform about risks,to reduce the risk of losing disputes.This phenomenon actually reflects the contradiction between the demands of patients’families and the responsibilities of medical staff in medical decision-making.To balance the responsibilities of medical staff and the demands of patients’families,the authors believe that multiple governance paths need to be constructed:first,optimizing the level of medical staff’s communication;second,strengthening medical risk science popularization relying on modern information technology to improve patients’risk cognition ability;and third,raising society’s correct understanding of cesarean section through multiple channels.These measures can help to enhance patients’trust in hospital diagnosis and treatment results and promote harmonious development of doctor-patient relationships.展开更多
Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin ...Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin in CC’s performance,the Cloud Service Broker(CSB),orchestrates DC selection.Failure to adroitly route user requests with suitable DCs transforms the CSB into a bottleneck,endangering service quality.To tackle this,deploying an efficient CSB policy becomes imperative,optimizing DC selection to meet stringent Qualityof-Service(QoS)demands.Amidst numerous CSB policies,their implementation grapples with challenges like costs and availability.This article undertakes a holistic review of diverse CSB policies,concurrently surveying the predicaments confronted by current policies.The foremost objective is to pinpoint research gaps and remedies to invigorate future policy development.Additionally,it extensively clarifies various DC selection methodologies employed in CC,enriching practitioners and researchers alike.Employing synthetic analysis,the article systematically assesses and compares myriad DC selection techniques.These analytical insights equip decision-makers with a pragmatic framework to discern the apt technique for their needs.In summation,this discourse resoundingly underscores the paramount importance of adept CSB policies in DC selection,highlighting the imperative role of efficient CSB policies in optimizing CC performance.By emphasizing the significance of these policies and their modeling implications,the article contributes to both the general modeling discourse and its practical applications in the CC domain.展开更多
Discovering floating wastes,especially bottles on water,is a crucial research problem in environmental hygiene.Nevertheless,real-world applications often face challenges such as interference from irrelevant objects an...Discovering floating wastes,especially bottles on water,is a crucial research problem in environmental hygiene.Nevertheless,real-world applications often face challenges such as interference from irrelevant objects and the high cost associated with data collection.Consequently,devising algorithms capable of accurately localizing specific objects within a scene in scenarios where annotated data is limited remains a formidable challenge.To solve this problem,this paper proposes an object discovery by request problem setting and a corresponding algorithmic framework.The proposed problem setting aims to identify specified objects in scenes,and the associated algorithmic framework comprises pseudo data generation and object discovery by request network.Pseudo-data generation generates images resembling natural scenes through various data augmentation rules,using a small number of object samples and scene images.The network structure of object discovery by request utilizes the pre-trained Vision Transformer(ViT)model as the backbone,employs object-centric methods to learn the latent representations of foreground objects,and applies patch-level reconstruction constraints to the model.During the validation phase,we use the generated pseudo datasets as training sets and evaluate the performance of our model on the original test sets.Experiments have proved that our method achieves state-of-the-art performance on Unmanned Aerial Vehicles-Bottle Detection(UAV-BD)dataset and self-constructed dataset Bottle,especially in multi-object scenarios.展开更多
The publisher would like to draw the reader's attention to the following errors.Ethics approval statements were not included in the published version of the following articles that appeared in previous issues of G...The publisher would like to draw the reader's attention to the following errors.Ethics approval statements were not included in the published version of the following articles that appeared in previous issues of Grain&Oil Science and Technology.The authors were contacted after publication to request ethical approval statements for the following articles.展开更多
Biological tests provide information on the medical analysis requested by both the patient and the prescriber. It is a communication link between the prescriber and the laboratory staff. The lack of some information o...Biological tests provide information on the medical analysis requested by both the patient and the prescriber. It is a communication link between the prescriber and the laboratory staff. The lack of some information on request forms not only affects the drafting quality of the test and patient care, but could also make thousands of data produced by healthcare centers unusable. The aim of this study was to assess the drafting quality of request forms submitted to the Malaria and Parasitology Units at the Institut Pasteur de Côte d’Ivoire. Methods: It was a descriptive cross-sectional study to assess the drafting quality of request forms of various prescribers received at the Institut Pasteur de Côte d’Ivoire. This study was conducted at the Malaria and Parasitology Units, department of Parasitology and Mycology (Institut Pasteur de Côte d’Ivoire), from 6<sup>th</sup> December 2020 to 6<sup>th</sup> December 2021. The information on each request forms was recorded on a data collection form designed for this purpose. Each data collection form corresponds to a request forms and each test to a patient. Results: Out of a total of 1990 request forms received, the patient’s age and sex were missing on 18% and 26.8% of the tests respectively. More than half (51.80%) of request forms did not indicate the patient’s place of residence. Clinical information was not provided on 45.90% of the tests. Prescribers omitting their signatures were 51%, stamps were 50.3% and contacts were 71.2%. Only 5.4% of request forms were of good drafting quality. Providing all the required information on the forms could facilitate the use and analysis of data and samples.展开更多
Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for ...Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats.展开更多
Conflict of interest statements were not included in the published version of the following articles,that appeared in the Volume 1 and Volume 2 of Advanced Agrochem.The authors were contacted after publication to requ...Conflict of interest statements were not included in the published version of the following articles,that appeared in the Volume 1 and Volume 2 of Advanced Agrochem.The authors were contacted after publication to request Conflict of interest statements for the following articles.展开更多
In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa...In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.展开更多
文摘Everyone experiences learning new things in their lives,and I am no exception.Today,I want to share my journey of learning how to skateboard.I still remember the summer vacation when I was seven years old.One day,I saw some older kids skating in our neighborhood,zooming back and forth on their skateboards.“Wow!They look so cool!”I thought to myself.I immediately decided that I wanted to try it too,so I begged-level my mom to buy me a beginner-level skateboard.
文摘Through analyzing the cases of Xiao Zhijun and the Yulin maternal jumping incident,the authors found significant disputes between the requests for non-indicated cesarean section and medical risk prevention,as well as between the psychology of avoiding childbirth pain and surgical responsibility.Currently,based on people’s current awareness and the responsibility orientation of expert opinions in disputes,medical institutions tend to satisfy family members’surgical requirements after fulfilling their obligation to fully inform about risks,to reduce the risk of losing disputes.This phenomenon actually reflects the contradiction between the demands of patients’families and the responsibilities of medical staff in medical decision-making.To balance the responsibilities of medical staff and the demands of patients’families,the authors believe that multiple governance paths need to be constructed:first,optimizing the level of medical staff’s communication;second,strengthening medical risk science popularization relying on modern information technology to improve patients’risk cognition ability;and third,raising society’s correct understanding of cesarean section through multiple channels.These measures can help to enhance patients’trust in hospital diagnosis and treatment results and promote harmonious development of doctor-patient relationships.
文摘Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin in CC’s performance,the Cloud Service Broker(CSB),orchestrates DC selection.Failure to adroitly route user requests with suitable DCs transforms the CSB into a bottleneck,endangering service quality.To tackle this,deploying an efficient CSB policy becomes imperative,optimizing DC selection to meet stringent Qualityof-Service(QoS)demands.Amidst numerous CSB policies,their implementation grapples with challenges like costs and availability.This article undertakes a holistic review of diverse CSB policies,concurrently surveying the predicaments confronted by current policies.The foremost objective is to pinpoint research gaps and remedies to invigorate future policy development.Additionally,it extensively clarifies various DC selection methodologies employed in CC,enriching practitioners and researchers alike.Employing synthetic analysis,the article systematically assesses and compares myriad DC selection techniques.These analytical insights equip decision-makers with a pragmatic framework to discern the apt technique for their needs.In summation,this discourse resoundingly underscores the paramount importance of adept CSB policies in DC selection,highlighting the imperative role of efficient CSB policies in optimizing CC performance.By emphasizing the significance of these policies and their modeling implications,the article contributes to both the general modeling discourse and its practical applications in the CC domain.
文摘Discovering floating wastes,especially bottles on water,is a crucial research problem in environmental hygiene.Nevertheless,real-world applications often face challenges such as interference from irrelevant objects and the high cost associated with data collection.Consequently,devising algorithms capable of accurately localizing specific objects within a scene in scenarios where annotated data is limited remains a formidable challenge.To solve this problem,this paper proposes an object discovery by request problem setting and a corresponding algorithmic framework.The proposed problem setting aims to identify specified objects in scenes,and the associated algorithmic framework comprises pseudo data generation and object discovery by request network.Pseudo-data generation generates images resembling natural scenes through various data augmentation rules,using a small number of object samples and scene images.The network structure of object discovery by request utilizes the pre-trained Vision Transformer(ViT)model as the backbone,employs object-centric methods to learn the latent representations of foreground objects,and applies patch-level reconstruction constraints to the model.During the validation phase,we use the generated pseudo datasets as training sets and evaluate the performance of our model on the original test sets.Experiments have proved that our method achieves state-of-the-art performance on Unmanned Aerial Vehicles-Bottle Detection(UAV-BD)dataset and self-constructed dataset Bottle,especially in multi-object scenarios.
文摘The publisher would like to draw the reader's attention to the following errors.Ethics approval statements were not included in the published version of the following articles that appeared in previous issues of Grain&Oil Science and Technology.The authors were contacted after publication to request ethical approval statements for the following articles.
文摘Biological tests provide information on the medical analysis requested by both the patient and the prescriber. It is a communication link between the prescriber and the laboratory staff. The lack of some information on request forms not only affects the drafting quality of the test and patient care, but could also make thousands of data produced by healthcare centers unusable. The aim of this study was to assess the drafting quality of request forms submitted to the Malaria and Parasitology Units at the Institut Pasteur de Côte d’Ivoire. Methods: It was a descriptive cross-sectional study to assess the drafting quality of request forms of various prescribers received at the Institut Pasteur de Côte d’Ivoire. This study was conducted at the Malaria and Parasitology Units, department of Parasitology and Mycology (Institut Pasteur de Côte d’Ivoire), from 6<sup>th</sup> December 2020 to 6<sup>th</sup> December 2021. The information on each request forms was recorded on a data collection form designed for this purpose. Each data collection form corresponds to a request forms and each test to a patient. Results: Out of a total of 1990 request forms received, the patient’s age and sex were missing on 18% and 26.8% of the tests respectively. More than half (51.80%) of request forms did not indicate the patient’s place of residence. Clinical information was not provided on 45.90% of the tests. Prescribers omitting their signatures were 51%, stamps were 50.3% and contacts were 71.2%. Only 5.4% of request forms were of good drafting quality. Providing all the required information on the forms could facilitate the use and analysis of data and samples.
文摘Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats.
文摘Conflict of interest statements were not included in the published version of the following articles,that appeared in the Volume 1 and Volume 2 of Advanced Agrochem.The authors were contacted after publication to request Conflict of interest statements for the following articles.
文摘In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.