Background: Diffuse large B-cell lymphomas of the central nervous system (DLBCL CNS) represent less than 1% of all lymphomas and between 2% and 3% of all cerebral tumors. They occur in adults of 60 years of age or mor...Background: Diffuse large B-cell lymphomas of the central nervous system (DLBCL CNS) represent less than 1% of all lymphomas and between 2% and 3% of all cerebral tumors. They occur in adults of 60 years of age or more. The objective of this work is to describe the clinical-pathological characteristics, the immunophenotype and the differential diagnosis. Clinical Case: From the files of the surgical pathology unit we found four cases of primary diffuse large B cell lymphoma of the central nervous system in a 6-year period. Three corresponded to women over 47 years of age and the other to a 42-year-old man. The time of evolution was between 2 and 4 months. The symptoms were headache, blurred vision, hemiparesis, and seizures. Localization was in the pineal region, the frontal, parietal regions, and the right thalamus. Morphologically, large lymphoid cells with a diffuse growth pattern and necrosis were observed. Immunohistochemical markers, such as CD 20 and bcl2 were positive, one was positive to CD3. Expression of bcl6 and CD 10 was positive in one case, and MUM-1 was positive in three cases. All the cases were negative for Epstein-Barr virus. Conclusions: The diffuse large-B cell lymphoma of the central nervous system is rare. Its average age of presentation is at 60 years or older. The localization is in the pineal, frontal, parietal and thalamic regions. Three cases were originated by activated B lymphocyte (MUM-1 expression) and other from the Germinal Center (GC) (CD 10 expression). The clinical course was bad. The four patients died shortly after the diagnosis.展开更多
The linear phenomenological relations in the atmospheric boundary layer are proved indirectly using observational facts to combine linear thermodynamic theory and similarity theory in the boundary layer. Furthermore, ...The linear phenomenological relations in the atmospheric boundary layer are proved indirectly using observational facts to combine linear thermodynamic theory and similarity theory in the boundary layer. Furthermore, it is proved that Ihe turbulent transport coefficients are in proportion to Ihe corresponding linear phenomenological coefficients. But the experimental facts show that the linear phenomenological relations are not (tenable in the atmospheric mixing layer because the turbulenl transport process is an intense non-linear process in the mixing layer. Hence the convection boundary layer is a thermodynamic stale in a non-linear region far from the equilibrium state. The geostrophic wind is a special cross-coupling phenomenon between the dynamic process and the thermodynamic process in the atmospheric system. It is a practical exemplification of a cross-coupling phenomenon in the atmospheric system.展开更多
The objective of this paper is to develop a variable learning rate for neural modeling of multivariable nonlinear stochastic system. The corresponding parameter is obtained by gradient descent method optimization. The...The objective of this paper is to develop a variable learning rate for neural modeling of multivariable nonlinear stochastic system. The corresponding parameter is obtained by gradient descent method optimization. The effectiveness of the suggested algorithm applied to the identification of behavior of two nonlinear stochastic systems is demonstrated by simulation experiments.展开更多
Objectives This randomized study was designed to compare the safety and efficacy of intravenous diltiazem versus intravenous cedilanid-D (deslanoside) for ventricular rate control in patients with atrial fibrillati...Objectives This randomized study was designed to compare the safety and efficacy of intravenous diltiazem versus intravenous cedilanid-D (deslanoside) for ventricular rate control in patients with atrial fibrillation (AF). Analysis of the effect on conduction system of these drugs was also performed. Methods Forty three patients with AF were randomly assigned to receive intravenous therapy with 0.25mg/kg diltiazem (n = 21) or 0.4rag cedilanid-D (n = 22). If not effective at 120 minutes (〈 20% decrease in pretreatment ventricular rate or can not convert to sinus rhythm= another dose of diltiazem or 0.2mg cedilanid-D was administered. Blood pressure and electrocardiographic recordings were performed before and after 5, 10, 20, 30, 60 minutes of drug administration. Further recordings were performed at 120 minutes in noneffective patients, and at 180 minutes in patients who received second time drug administration. To evaluate the effect on conduction system of these two drugs by measuring PA, AH and HV intervals using His bundle electrogram test another nineteen sinus rhythm patients were randomized to dihiazem (n=9) and cedilanid (n= 10) group. His bundle electrogram recordings were performed before and after 5, 10, 20 and 30 minutes of drug administration. Statistical significance was assessed with the use of t test, Fisher's exact test, ANOVA and LSD methodology. Results At baseline and after 5, 10, 20, 30, 60 minutes of drug administration the heart rates (mean±SD) were(133±15), (92±20), (87±22), (85 ±20), (85±21), (85 ±23)beats/minute in diltiazem group respectively and( 140±21 ), ( 122±24), (118±25), (110±26), (112±25), (110±28) beats/ minute in cedilanid-D group respectively. Heart rate reduction was higher in diltiazem group than cedilanid group during 5 (41±20 vs 17±14,P 〈 0.01); 10 (46±21 vs 22±20, P〈0.01); 20 (48±21 vs 29±22, P〈0.01 ) ; 30(48±22 vs 27±22,P〈0.01 )and 60 minutes (48±23 vs 29±24, P〈 0.05). Both drugs had no effect on both systolic and diastolic blood pressure (P 〉0.05) and no major side effects were noticed. Diltiazem maintained effective ventrieular rate in 20 patients, whereas eedilanid-D maintained in 15 patients within 180 minutes (95.2%vs 68.2%,P〈 0.05). There were no statistical significance in baseline heart rate, age and weight between the two groups. Both diltiazem and cedilanid-D can increase AH interval, but have no effect on HV and PA intervals in sinus rhythm patients. Conclusions Both dihiazem and eedilanid-D decrease ventrieular heart rate, but heart rate reduction is significantly higher in diltiazem group, thus should be considered as a drug of choice for emergency control of ventrieular rate. Under clinical monitoring this dose of diltiazem seems to be safe and applicable in AF patients with congestive heart failure. Both drugs have no effect on PA and HV intervals but increase the AH interval thereby can reduce ventricular rate.展开更多
This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity fa...This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.展开更多
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.展开更多
The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the di...The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the digital level of the university to new students. With the expansion of the enrollment scale of universities, improving the efficiency of welcoming work has become an urgent problem to be solved. This article analyzes the characteristics and existing problems of the welcoming work, combined with the main technical methods of information system construction, and based on the comprehensive situation of information systems in our university, proposes the construction goals and ideas of the welcoming information system, summarizes the construction process and operation results of the welcome system, and explores possible directions for future optimization.展开更多
The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines ...The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.展开更多
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s...Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.展开更多
The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this stud...The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.展开更多
Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for manag...Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for managing the supply chain of these commodities. This study aimed to evaluate the effectiveness of LMIS in ensuring the availability of essential medicines and medical supplies in public hospitals in the Copperbelt Province of Zambia. Materials and Methods: From February to April 2022, a cross-sectional study was conducted in 12 public hospitals across the Copperbelt Province. Data were collected using structured questionnaires, checklists, and stock control cards. The study assessed LMIS availability, training, and knowledge among pharmacy personnel, as well as data accuracy, product availability, and order fill rates. Descriptive statistics were used to analyse the data. Results: All surveyed hospitals had LMIS implemented and were using eLMIS as the primary LMIS. Only 47% and 48% of pharmacy personnel received training in eLMIS and Essential Medicines Logistics Improvement Program (EMLIP), respectively. Most personnel demonstrated good knowledge of LMIS, with 77.7% able to log in to eLMIS Facility Edition, 76.6% able to locate stock control cards in the system, and 78.7% able to perform transactions. However, data accuracy from physical and electronic records varied from 0% to 60%, and product availability ranged from 50% to 80%. Order fill rates from Zambia Medicines and Medical Supplies Agency (ZAMMSA) were consistently below 30%. Discrepancies were observed between physical stock counts and eLMIS records. Conclusion: This study found that most hospitals in the Copperbelt Province of Zambia have implemented LMIS use. While LMIS implementation is high in the Copperbelt Province of Zambia, challenges such as low training levels, data inaccuracies, low product availability, and order fill rates persist. Addressing these issues requires a comprehensive approach, including capacity building, data quality improvement, supply chain coordination, and investment in infrastructure and human resources. Strengthening LMIS effectiveness is crucial for improving healthcare delivery and patient outcomes in Zambia.展开更多
Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptibl...Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.展开更多
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ...The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.展开更多
文摘Background: Diffuse large B-cell lymphomas of the central nervous system (DLBCL CNS) represent less than 1% of all lymphomas and between 2% and 3% of all cerebral tumors. They occur in adults of 60 years of age or more. The objective of this work is to describe the clinical-pathological characteristics, the immunophenotype and the differential diagnosis. Clinical Case: From the files of the surgical pathology unit we found four cases of primary diffuse large B cell lymphoma of the central nervous system in a 6-year period. Three corresponded to women over 47 years of age and the other to a 42-year-old man. The time of evolution was between 2 and 4 months. The symptoms were headache, blurred vision, hemiparesis, and seizures. Localization was in the pineal region, the frontal, parietal regions, and the right thalamus. Morphologically, large lymphoid cells with a diffuse growth pattern and necrosis were observed. Immunohistochemical markers, such as CD 20 and bcl2 were positive, one was positive to CD3. Expression of bcl6 and CD 10 was positive in one case, and MUM-1 was positive in three cases. All the cases were negative for Epstein-Barr virus. Conclusions: The diffuse large-B cell lymphoma of the central nervous system is rare. Its average age of presentation is at 60 years or older. The localization is in the pineal, frontal, parietal and thalamic regions. Three cases were originated by activated B lymphocyte (MUM-1 expression) and other from the Germinal Center (GC) (CD 10 expression). The clinical course was bad. The four patients died shortly after the diagnosis.
基金This work was supported by the National Natural Science Foundation of China under GrantNos
文摘The linear phenomenological relations in the atmospheric boundary layer are proved indirectly using observational facts to combine linear thermodynamic theory and similarity theory in the boundary layer. Furthermore, it is proved that Ihe turbulent transport coefficients are in proportion to Ihe corresponding linear phenomenological coefficients. But the experimental facts show that the linear phenomenological relations are not (tenable in the atmospheric mixing layer because the turbulenl transport process is an intense non-linear process in the mixing layer. Hence the convection boundary layer is a thermodynamic stale in a non-linear region far from the equilibrium state. The geostrophic wind is a special cross-coupling phenomenon between the dynamic process and the thermodynamic process in the atmospheric system. It is a practical exemplification of a cross-coupling phenomenon in the atmospheric system.
文摘The objective of this paper is to develop a variable learning rate for neural modeling of multivariable nonlinear stochastic system. The corresponding parameter is obtained by gradient descent method optimization. The effectiveness of the suggested algorithm applied to the identification of behavior of two nonlinear stochastic systems is demonstrated by simulation experiments.
文摘Objectives This randomized study was designed to compare the safety and efficacy of intravenous diltiazem versus intravenous cedilanid-D (deslanoside) for ventricular rate control in patients with atrial fibrillation (AF). Analysis of the effect on conduction system of these drugs was also performed. Methods Forty three patients with AF were randomly assigned to receive intravenous therapy with 0.25mg/kg diltiazem (n = 21) or 0.4rag cedilanid-D (n = 22). If not effective at 120 minutes (〈 20% decrease in pretreatment ventricular rate or can not convert to sinus rhythm= another dose of diltiazem or 0.2mg cedilanid-D was administered. Blood pressure and electrocardiographic recordings were performed before and after 5, 10, 20, 30, 60 minutes of drug administration. Further recordings were performed at 120 minutes in noneffective patients, and at 180 minutes in patients who received second time drug administration. To evaluate the effect on conduction system of these two drugs by measuring PA, AH and HV intervals using His bundle electrogram test another nineteen sinus rhythm patients were randomized to dihiazem (n=9) and cedilanid (n= 10) group. His bundle electrogram recordings were performed before and after 5, 10, 20 and 30 minutes of drug administration. Statistical significance was assessed with the use of t test, Fisher's exact test, ANOVA and LSD methodology. Results At baseline and after 5, 10, 20, 30, 60 minutes of drug administration the heart rates (mean±SD) were(133±15), (92±20), (87±22), (85 ±20), (85±21), (85 ±23)beats/minute in diltiazem group respectively and( 140±21 ), ( 122±24), (118±25), (110±26), (112±25), (110±28) beats/ minute in cedilanid-D group respectively. Heart rate reduction was higher in diltiazem group than cedilanid group during 5 (41±20 vs 17±14,P 〈 0.01); 10 (46±21 vs 22±20, P〈0.01); 20 (48±21 vs 29±22, P〈0.01 ) ; 30(48±22 vs 27±22,P〈0.01 )and 60 minutes (48±23 vs 29±24, P〈 0.05). Both drugs had no effect on both systolic and diastolic blood pressure (P 〉0.05) and no major side effects were noticed. Diltiazem maintained effective ventrieular rate in 20 patients, whereas eedilanid-D maintained in 15 patients within 180 minutes (95.2%vs 68.2%,P〈 0.05). There were no statistical significance in baseline heart rate, age and weight between the two groups. Both diltiazem and cedilanid-D can increase AH interval, but have no effect on HV and PA intervals in sinus rhythm patients. Conclusions Both dihiazem and eedilanid-D decrease ventrieular heart rate, but heart rate reduction is significantly higher in diltiazem group, thus should be considered as a drug of choice for emergency control of ventrieular rate. Under clinical monitoring this dose of diltiazem seems to be safe and applicable in AF patients with congestive heart failure. Both drugs have no effect on PA and HV intervals but increase the AH interval thereby can reduce ventricular rate.
文摘This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.
文摘It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.
文摘The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the digital level of the university to new students. With the expansion of the enrollment scale of universities, improving the efficiency of welcoming work has become an urgent problem to be solved. This article analyzes the characteristics and existing problems of the welcoming work, combined with the main technical methods of information system construction, and based on the comprehensive situation of information systems in our university, proposes the construction goals and ideas of the welcoming information system, summarizes the construction process and operation results of the welcome system, and explores possible directions for future optimization.
文摘The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.
文摘Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.
文摘The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.
文摘Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for managing the supply chain of these commodities. This study aimed to evaluate the effectiveness of LMIS in ensuring the availability of essential medicines and medical supplies in public hospitals in the Copperbelt Province of Zambia. Materials and Methods: From February to April 2022, a cross-sectional study was conducted in 12 public hospitals across the Copperbelt Province. Data were collected using structured questionnaires, checklists, and stock control cards. The study assessed LMIS availability, training, and knowledge among pharmacy personnel, as well as data accuracy, product availability, and order fill rates. Descriptive statistics were used to analyse the data. Results: All surveyed hospitals had LMIS implemented and were using eLMIS as the primary LMIS. Only 47% and 48% of pharmacy personnel received training in eLMIS and Essential Medicines Logistics Improvement Program (EMLIP), respectively. Most personnel demonstrated good knowledge of LMIS, with 77.7% able to log in to eLMIS Facility Edition, 76.6% able to locate stock control cards in the system, and 78.7% able to perform transactions. However, data accuracy from physical and electronic records varied from 0% to 60%, and product availability ranged from 50% to 80%. Order fill rates from Zambia Medicines and Medical Supplies Agency (ZAMMSA) were consistently below 30%. Discrepancies were observed between physical stock counts and eLMIS records. Conclusion: This study found that most hospitals in the Copperbelt Province of Zambia have implemented LMIS use. While LMIS implementation is high in the Copperbelt Province of Zambia, challenges such as low training levels, data inaccuracies, low product availability, and order fill rates persist. Addressing these issues requires a comprehensive approach, including capacity building, data quality improvement, supply chain coordination, and investment in infrastructure and human resources. Strengthening LMIS effectiveness is crucial for improving healthcare delivery and patient outcomes in Zambia.
文摘Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.
文摘The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.