Two 1-methyl-1H-benzo[d]imidazole derivatives, C_(18)H_(14)CuN_4O_4·C_4H_8O_2(1) and C_9H_9N_3O(2), have been synthesized and characterized by NMR, MS, FT-IR, elementary analysis and X-ray single-crystal ...Two 1-methyl-1H-benzo[d]imidazole derivatives, C_(18)H_(14)CuN_4O_4·C_4H_8O_2(1) and C_9H_9N_3O(2), have been synthesized and characterized by NMR, MS, FT-IR, elementary analysis and X-ray single-crystal diffraction. Compound 1 crystallizes in monoclinic, space group P2_1/n with a = 9.6888(3), b = 7.3772(2), c = 14.3277(4)A, β = 95.819(3)°, V = 1018.81(5) A3, M_r = 501.98, Z = 2, D_c = 1.636 g/cm^3, F(000) = 518, μ = 1.123 mm^(-1), MoKα radiation(λ = 0.71073 A), the final R = 0.0325 and wR = 0.0859 for 1821 observed reflections with I 〉 2σ(I). Compound 2 crystallizes in monoclinic, space group C2/c with a = 14.2908(14), b = 14.4268(13), c = 8.4802(6) A, β = 108.513(9)o, V = 1657.9(3) A3, M_r = 175.19, Z = 8, D_c = 1.404 g/cm^3, F(000) = 736, μ = 0.097 mm^(-1), Mo Kα radiation(λ = 0.71073 A), the final R = 0.0563 and wR = 0.1531 for 1231 observed reflections with I 〉 2σ(I). Intermolecular(N-H···N, N-H···O) and intramolecular(N-H···N, C-H···O) hydrogen bonds, as well as C-H···π and π-π stacking interactions, help to stabilize the crystal structure of compound 2.展开更多
Carotid artery stenting (CAS) is an alternative treatment for patients with severe carotid artery stenosis, especially those with prohibitively high surgical risks.……
AIM To investigate the effects of direct to colonoscopy pathways on information seeking behaviors and anxiety among colonoscopy-na?ve patients.METHODS Colonoscopy-na?ve patients at two tertiary care hospitals complete...AIM To investigate the effects of direct to colonoscopy pathways on information seeking behaviors and anxiety among colonoscopy-na?ve patients.METHODS Colonoscopy-na?ve patients at two tertiary care hospitals completed a survey immediately prior to their scheduled outpatient procedure and before receiving sedation.Survey items included clinical pathway(direct or consult),procedure indication(cancer screening or symptom investigation),telephone and written contact from the physician endoscopist office,information sources,and pre-procedure anxiety.Participants reported pre-procedure anxiety using a 10 point scale anchored by "very relaxed"(1) and "very nervous"(10).At least three months following the procedure,patient medical records were reviewed to determine sedative dose,procedure indications and any adverse events.The primary comparison was between the direct and consult pathways.Given the very different implications,a secondary analysis considering the patient-reported indication for the procedure(symptoms or screening).Effects of pathway(direct vs consult) were compared both within and between the screening and symptom subgroups.RESULTS Of 409 patients who completed the survey,34% followed a direct pathway.Indications for colonoscopy were similar in each group.The majority of the participants were women(58%),married(61%),and internet users(81%).The most important information source was family physicians(Direct) and specialist physicians(Consult).Use of other information sources,including the internet(20% vs 18%) and Direct family and friends(64% vs 53%),was similar in the Direct and Consult groups,respectively.Only 31% of the 81% who were internet users accessed internet health information.Most sought fundamental information such as what a colonoscopy is or why it is done.Pre-procedure anxiety did not differ between care pathways.Those undergoing colonoscopy for symptoms reported greater anxiety [mean 5.3,95%CI: 5.0-5.7(10 point Likert scale)] than those for screening colonoscopy(4.3,95%CI: 3.9-4.7).CONCLUSION Procedure indication(cancer screening or symptom investigation) was more closely associated with information seeking behaviors and pre-procedure anxiety than care pathway.展开更多
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put...To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.展开更多
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ...5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.展开更多
For decreasing the multiple access interference of weaker signal acquisition in direct sequence spread spectrum(DSSS) systems,a new single decision algorithm is presented.The maximum value of correlation results is ...For decreasing the multiple access interference of weaker signal acquisition in direct sequence spread spectrum(DSSS) systems,a new single decision algorithm is presented.The maximum value of correlation results is conventionally detected.However,there may be not only one strong peak among correlation results when the cross-correlation noise is strong enough to affect the correlation results.The proposed algorithm decreases the false alarm probability through the decision of the ratio of the maximum value and the second maximum value of the correlation results.Theoretical analysis and simulation results indicate that the proposed algorithm effectively suppresses the acquisition problem of multiple access interference in DSSS system.展开更多
A CAD approach which can optimize and automate the parting direction determination is presented. The approach is based on the geometrical and topological information of the solid modelling of the plastic moulded part ...A CAD approach which can optimize and automate the parting direction determination is presented. The approach is based on the geometrical and topological information of the solid modelling of the plastic moulded part in order to select a pair of optimal parting directions of a two plate mould which minimizes the number of side cores. The shell of a part is divided into inter influential regions and non influential faces in the mould design point of view. Through analyzing and computing the accessibility direction cones of the inter influential regions, the optimal parting directions can be determined automatically.展开更多
目前数据中心规模迅速扩大和网络带宽大幅度提升,传统软件网络协议栈的处理器开销较大,并且难以满足众多数据中心应用程序在吞吐、延迟等方面的需求.远程直接内存访问(remote direct memory access,RDMA)技术采用零拷贝、内核旁路和处...目前数据中心规模迅速扩大和网络带宽大幅度提升,传统软件网络协议栈的处理器开销较大,并且难以满足众多数据中心应用程序在吞吐、延迟等方面的需求.远程直接内存访问(remote direct memory access,RDMA)技术采用零拷贝、内核旁路和处理器功能卸载等思想,能够高带宽、低延迟地读写远端主机内存数据.兼容以太网的RDMA技术正在数据中心领域展开应用,以太网RDMA网卡作为主要功能承载设备,对其部署发挥重要作用.综述从架构、优化和实现评估3个方面进行分析:1)对以太网RDMA网卡的通用架构进行了总结,并对其关键功能部件进行了介绍;2)重点阐述了存储资源、可靠传输和应用相关3方面的优化技术,包括面向网卡缓存资源的连接可扩展性和面向主机内存资源的注册访问优化,面向有损以太网实现可靠传输的拥塞控制、流量控制和重传机制优化,面向分布式存储中不同存储类型、数据库系统、云存储系统以及面向数据中心应用的多租户性能隔离、安全性、可编程性等方面的优化工作;3)调研了不同实现方式、评估方式.最后,给出总结和展望.展开更多
基金Supported by the National Natural Science Foundation of China(No.31370373 and 21102084)Natural Science Foundation of Hubei Province(No.2012FKC14401)
文摘Two 1-methyl-1H-benzo[d]imidazole derivatives, C_(18)H_(14)CuN_4O_4·C_4H_8O_2(1) and C_9H_9N_3O(2), have been synthesized and characterized by NMR, MS, FT-IR, elementary analysis and X-ray single-crystal diffraction. Compound 1 crystallizes in monoclinic, space group P2_1/n with a = 9.6888(3), b = 7.3772(2), c = 14.3277(4)A, β = 95.819(3)°, V = 1018.81(5) A3, M_r = 501.98, Z = 2, D_c = 1.636 g/cm^3, F(000) = 518, μ = 1.123 mm^(-1), MoKα radiation(λ = 0.71073 A), the final R = 0.0325 and wR = 0.0859 for 1821 observed reflections with I 〉 2σ(I). Compound 2 crystallizes in monoclinic, space group C2/c with a = 14.2908(14), b = 14.4268(13), c = 8.4802(6) A, β = 108.513(9)o, V = 1657.9(3) A3, M_r = 175.19, Z = 8, D_c = 1.404 g/cm^3, F(000) = 736, μ = 0.097 mm^(-1), Mo Kα radiation(λ = 0.71073 A), the final R = 0.0563 and wR = 0.1531 for 1231 observed reflections with I 〉 2σ(I). Intermolecular(N-H···N, N-H···O) and intramolecular(N-H···N, C-H···O) hydrogen bonds, as well as C-H···π and π-π stacking interactions, help to stabilize the crystal structure of compound 2.
文摘 Carotid artery stenting (CAS) is an alternative treatment for patients with severe carotid artery stenosis, especially those with prohibitively high surgical risks.……
基金Health Sciences Centre Medical Staff Council Resident Research Award
文摘AIM To investigate the effects of direct to colonoscopy pathways on information seeking behaviors and anxiety among colonoscopy-na?ve patients.METHODS Colonoscopy-na?ve patients at two tertiary care hospitals completed a survey immediately prior to their scheduled outpatient procedure and before receiving sedation.Survey items included clinical pathway(direct or consult),procedure indication(cancer screening or symptom investigation),telephone and written contact from the physician endoscopist office,information sources,and pre-procedure anxiety.Participants reported pre-procedure anxiety using a 10 point scale anchored by "very relaxed"(1) and "very nervous"(10).At least three months following the procedure,patient medical records were reviewed to determine sedative dose,procedure indications and any adverse events.The primary comparison was between the direct and consult pathways.Given the very different implications,a secondary analysis considering the patient-reported indication for the procedure(symptoms or screening).Effects of pathway(direct vs consult) were compared both within and between the screening and symptom subgroups.RESULTS Of 409 patients who completed the survey,34% followed a direct pathway.Indications for colonoscopy were similar in each group.The majority of the participants were women(58%),married(61%),and internet users(81%).The most important information source was family physicians(Direct) and specialist physicians(Consult).Use of other information sources,including the internet(20% vs 18%) and Direct family and friends(64% vs 53%),was similar in the Direct and Consult groups,respectively.Only 31% of the 81% who were internet users accessed internet health information.Most sought fundamental information such as what a colonoscopy is or why it is done.Pre-procedure anxiety did not differ between care pathways.Those undergoing colonoscopy for symptoms reported greater anxiety [mean 5.3,95%CI: 5.0-5.7(10 point Likert scale)] than those for screening colonoscopy(4.3,95%CI: 3.9-4.7).CONCLUSION Procedure indication(cancer screening or symptom investigation) was more closely associated with information seeking behaviors and pre-procedure anxiety than care pathway.
基金Supported by the National Natural Science Foundation of China(No.60872041,61072066)Fundamental Research Funds for the Central Universities(JYI0000903001,JYI0000901034)
文摘To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.
文摘5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.
基金supported by the National High Technology ResearchDevelopment Program of China (863 Program) (2008AA0248)
文摘For decreasing the multiple access interference of weaker signal acquisition in direct sequence spread spectrum(DSSS) systems,a new single decision algorithm is presented.The maximum value of correlation results is conventionally detected.However,there may be not only one strong peak among correlation results when the cross-correlation noise is strong enough to affect the correlation results.The proposed algorithm decreases the false alarm probability through the decision of the ratio of the maximum value and the second maximum value of the correlation results.Theoretical analysis and simulation results indicate that the proposed algorithm effectively suppresses the acquisition problem of multiple access interference in DSSS system.
文摘A CAD approach which can optimize and automate the parting direction determination is presented. The approach is based on the geometrical and topological information of the solid modelling of the plastic moulded part in order to select a pair of optimal parting directions of a two plate mould which minimizes the number of side cores. The shell of a part is divided into inter influential regions and non influential faces in the mould design point of view. Through analyzing and computing the accessibility direction cones of the inter influential regions, the optimal parting directions can be determined automatically.
文摘目前数据中心规模迅速扩大和网络带宽大幅度提升,传统软件网络协议栈的处理器开销较大,并且难以满足众多数据中心应用程序在吞吐、延迟等方面的需求.远程直接内存访问(remote direct memory access,RDMA)技术采用零拷贝、内核旁路和处理器功能卸载等思想,能够高带宽、低延迟地读写远端主机内存数据.兼容以太网的RDMA技术正在数据中心领域展开应用,以太网RDMA网卡作为主要功能承载设备,对其部署发挥重要作用.综述从架构、优化和实现评估3个方面进行分析:1)对以太网RDMA网卡的通用架构进行了总结,并对其关键功能部件进行了介绍;2)重点阐述了存储资源、可靠传输和应用相关3方面的优化技术,包括面向网卡缓存资源的连接可扩展性和面向主机内存资源的注册访问优化,面向有损以太网实现可靠传输的拥塞控制、流量控制和重传机制优化,面向分布式存储中不同存储类型、数据库系统、云存储系统以及面向数据中心应用的多租户性能隔离、安全性、可编程性等方面的优化工作;3)调研了不同实现方式、评估方式.最后,给出总结和展望.