Objective:Nurse-led virtual outpatient clinics are now a familiar component of healthcare delivery across many disciplines,including cancer care,or thopedics,rheumatology,and gastroenterology.However,establishing a nu...Objective:Nurse-led virtual outpatient clinics are now a familiar component of healthcare delivery across many disciplines,including cancer care,or thopedics,rheumatology,and gastroenterology.However,establishing a nurse-led vir tual clinic is challenging for nursing management,par ticularly regarding resources.We aimed to investigate nursing practices and processes and patient experiences in relation to vir tual outpatient clinics.Methods:This was a cross-sectional,descriptive study using mixed data collection methods.Patients(n=324)from 4 specialist clinics completed the Virtual Clinics Patient Satisfaction Questionnaire(VCSQ)survey.Five Nurse Specialists participated in a focus group interview.Results:Most participants(86.3%)reported being satisfied/very satisfied with the virtual clinics,particularly those that were nurse-led.Nurse specialists identified electronic health records(EHRs)and additional IT and administrative support as important for efficiency and effectiveness of the clinics.Conclusions:Nurse-led virtual clinics can be an effective and efficient way to provide care to patients.Nurse managers need to ensure supportive structures are in place,for example,dedicated administrators,IT support and infrastructure,education/training,and relevant policies/procedures.The success of nurse-led virtual services requires key infrastructure to support nursing staff and sustain this service.展开更多
Unequal virtual water transfer may aggravate local water scarcity risk.However,the quantitative confirmation of a clear geographic convergence between virtual water transfer and water scarcity risk remains undetermine...Unequal virtual water transfer may aggravate local water scarcity risk.However,the quantitative confirmation of a clear geographic convergence between virtual water transfer and water scarcity risk remains undetermined.We present an analytical framework that reveals the spatial matching between global water scarcity risk and virtual water trade inequality.This framework integrates a three-dimensional water scarcity risk assessment,hybrid input-output analysis,pollution trade term construction,and geographic convergence identification.The framework is applied to 123 countries for long-term validation from 1991 to 2021.We show that despite global improvements in water efficiency and security,countries exceeding the maximum water vulnerability threshold have increased by 50%.South Asia is the largest net exporter of virtual water.Central Asia exhibits the most pronounced virtual water trade inequality.To achieve the same economic growth,Central Asia needs to pay several times the local water consumption costs of developed regions(15.9−83.6 times,2021).In the past 30 years,the average geographic convergence index exceeded 0.8.Countries facing severe water scarcity also exhibit pronounced inequalities in virtual water trade,indicating that a significant geographic convergence relationship exists.Effectively responding to this unsustainable relationship necessitates balancing both domestic resource risk management and global virtual water trade regulation.展开更多
Latest digital advancements have intensified the necessity for adaptive,data-driven and socially-centered learning ecosystems.This paper presents the formulation of a cross-platform,innovative,gamified and personalize...Latest digital advancements have intensified the necessity for adaptive,data-driven and socially-centered learning ecosystems.This paper presents the formulation of a cross-platform,innovative,gamified and personalized Learning Ecosystem,which integrates 3D/VR environments,as well as machine learning algorithms,and business intelligence frameworks to enhance learner-centered education and inferenced decision-making.This Learning System makes use of immersive,analytically assessed virtual learning spaces,therefore facilitating real-time monitoring of not just learning performance,but also overall engagement and behavioral patterns,via a comprehensive set of sustainability-oriented ESG-aligned Key Performance Indicators(KPIs).Machine learning models support predictive analysis,personalized feedback,and hybrid recommendation mechanisms,whilst dedicated dashboards translate complex educational data into actionable insights for all Use Cases of the System(Educational Institutions,Educators and Learners).Additionally,the presented Learning System introduces a structured Mentoring and Consulting Subsystem,thence reinforcing human-centered guidance alongside automated intelligence.The Platform’s modular architecture and simulation-centered evaluation approach actively support personalized,and continuously optimized learning pathways.Thence,it exemplifies a mature,adaptive Learning Ecosystem,supporting immersive technologies,analytics,and pedagogical support,hence,contributing to contemporary digital learning innovation and sociotechnical transformation in education.展开更多
In real-world autonomous driving tests,unexpected events such as pedestrians or wild animals suddenly entering the driving path can occur.Conducting actual test drives under various weather conditions may also lead to...In real-world autonomous driving tests,unexpected events such as pedestrians or wild animals suddenly entering the driving path can occur.Conducting actual test drives under various weather conditions may also lead to dangerous situations.Furthermore,autonomous vehicles may operate abnormally in bad weather due to limitations of their sensors and GPS.Driving simulators,which replicate driving conditions nearly identical to those in the real world,can drastically reduce the time and cost required for market entry validation;consequently,they have become widely used.In this paper,we design a virtual driving test environment capable of collecting and verifying SiLS data under adverse weather conditions using multi-source images.The proposed method generates a virtual testing environment that incorporates various events,including weather,time of day,and moving objects,that cannot be easily verified in real-world autonomous driving tests.By setting up scenario-based virtual environment events,multi-source image analysis and verification using real-world DCUs(Data Concentrator Units)with V2X-Car edge cloud can effectively address risk factors that may arise in real-world situations.We tested and validated the proposed method with scenarios employing V2X communication and multi-source image analysis.展开更多
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t...In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well.展开更多
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati...The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.展开更多
Cloud computing can provide a great capacity for massive computing, storage as well as processing. The capacity comes from the cloud computing system itself, which can be likened to a virtualized resource pool that su...Cloud computing can provide a great capacity for massive computing, storage as well as processing. The capacity comes from the cloud computing system itself, which can be likened to a virtualized resource pool that supports virtualization applications as well as load migration. Based on the existing technologies, the paper proposes a resource virtualization model (RVM) utilizing a hybrid-graph structure. The hybrid-graph structure can formally represent the critical entities such as private clouds, nodes within the private clouds, and resource including its type and quantity. It also provides a clear description of the logical relationship and the dynamic expansion among them as well. Moreover, based on the RVM, a resource converging algorithm and a maintaining algorithm of the resource pool which can timely reflect the dynamic variation of the private cloud and resource are presented. The algorithms collect resources and put them into the private cloud resource pools and global resource pools, and enable a real-time maintenance for the dynamic variation of resource to ensure the continuity and reliability. Both of the algorithms use a queue structure to accomplish functions of resource converging. Finally, a simulation platform of cloud computing is designed to test the algorithms proposed in the paper. The results show the correctness and the reliability of the algorithms.展开更多
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role...Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.展开更多
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani...Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.展开更多
Histopathological analysis of chronic wounds is crucial for clinicians to accurately assess wound healing progress and detect potential malignancy.However,traditional pathological tissue sections require specific stai...Histopathological analysis of chronic wounds is crucial for clinicians to accurately assess wound healing progress and detect potential malignancy.However,traditional pathological tissue sections require specific staining procedures involving carcinogenic chemicals.This study proposes an interdisciplinary approach merging materials science,medicine,and artificial intelligence(AI)to develop a virtual staining technique and intelligent evaluation model based on deep learning for chronic wound tissue pathology.This innovation aims to enhance clinical diagnosis and treatment by offering personalized AI-driven therapeutic strategies.By establishing a mouse model of chronic wounds and using a series of hydrogel wound dressings,tissue pathology sections were periodically collected for manual staining and healing assessment.We focused on leveraging the pix2pix image translation framework within deep learning networks.Through CNN models implemented in Python using PyTorch,our study involves learning and feature extraction for region segmentation of pathological slides.Comparative analysis between virtual staining and manual staining results,along with healing diagnosis conclusions,aims to optimize AI models.Ultimately,this approach integrates new metrics such as image recognition,quantitative analysis,and digital diagnostics to formulate an intelligent wound assessment model,facilitating smart monitoring and personalized treatment of wounds.In blind evaluation by pathologists,minimal disparities were found between virtual and conventional histologically stained images of murine wound tissue.The evaluation used pathologists’average scores on real stained images as a benchmark.The scores for virtual stained images were 71.1%for cellular features,75.4%for tissue structures,and 77.8%for overall assessment.Metrics such as PSNR(20.265)and SSIM(0.634)demonstrated our algorithms’superior performance over existing networks.Eight pathological features such as epidermis,hair follicles,and granulation tissue can be accurately identified,and the images were found to be more faithful to the actual tissue feature distribution when compared to manually annotated data.展开更多
This work presents a method for the three-dimensional localization of individual shallow NV center in diamond,leveraging the near-field quenching effect of a gold tip.Our experimental setup involves the use of an atom...This work presents a method for the three-dimensional localization of individual shallow NV center in diamond,leveraging the near-field quenching effect of a gold tip.Our experimental setup involves the use of an atomic force microscope to precisely move the gold tip close to the NV center,while simultaneously employing a home-made confocal microscope to monitor the fluorescence of the NV center.This approach allows for lateral super-resolution,achieving a full width at half maximum(FWHM)of 38.0 nm and a location uncertainty of 0.7 nm.Additionally,we show the potential of this method for determining the depth of the NV centers.We also attempt to determine the depth of the NV centers in combination with finite-difference time-domain(FDTD)simulations.Compared to other depth determination methods,this approach allows for simultaneous lateral and longitudinal localization of individual NV centers,and holds promise for facilitating manipulation of the local environment surrounding the NV center.展开更多
基金supported by Nursing and Midwifery Practice Development Unit(NMPDU),Dublin South,Kildare,and Wicklow,Nurses preparedness for end of life conversations(No.P210537)。
文摘Objective:Nurse-led virtual outpatient clinics are now a familiar component of healthcare delivery across many disciplines,including cancer care,or thopedics,rheumatology,and gastroenterology.However,establishing a nurse-led vir tual clinic is challenging for nursing management,par ticularly regarding resources.We aimed to investigate nursing practices and processes and patient experiences in relation to vir tual outpatient clinics.Methods:This was a cross-sectional,descriptive study using mixed data collection methods.Patients(n=324)from 4 specialist clinics completed the Virtual Clinics Patient Satisfaction Questionnaire(VCSQ)survey.Five Nurse Specialists participated in a focus group interview.Results:Most participants(86.3%)reported being satisfied/very satisfied with the virtual clinics,particularly those that were nurse-led.Nurse specialists identified electronic health records(EHRs)and additional IT and administrative support as important for efficiency and effectiveness of the clinics.Conclusions:Nurse-led virtual clinics can be an effective and efficient way to provide care to patients.Nurse managers need to ensure supportive structures are in place,for example,dedicated administrators,IT support and infrastructure,education/training,and relevant policies/procedures.The success of nurse-led virtual services requires key infrastructure to support nursing staff and sustain this service.
基金supported by National Natural Science Foundation of China(Grant No.52279027)National Key R&D Program of China(Grant No.2021YFC3200201)+1 种基金Key Research Project on Decision Consultation of the Strategic Development Department of China Association for Science and Technology(Grant No.2023070615CG111504)China Engineering Science and Technology Development Strategy Henan Research Institute Strategic Consulting Research Project(Grant No.2024HENYB01).
文摘Unequal virtual water transfer may aggravate local water scarcity risk.However,the quantitative confirmation of a clear geographic convergence between virtual water transfer and water scarcity risk remains undetermined.We present an analytical framework that reveals the spatial matching between global water scarcity risk and virtual water trade inequality.This framework integrates a three-dimensional water scarcity risk assessment,hybrid input-output analysis,pollution trade term construction,and geographic convergence identification.The framework is applied to 123 countries for long-term validation from 1991 to 2021.We show that despite global improvements in water efficiency and security,countries exceeding the maximum water vulnerability threshold have increased by 50%.South Asia is the largest net exporter of virtual water.Central Asia exhibits the most pronounced virtual water trade inequality.To achieve the same economic growth,Central Asia needs to pay several times the local water consumption costs of developed regions(15.9−83.6 times,2021).In the past 30 years,the average geographic convergence index exceeded 0.8.Countries facing severe water scarcity also exhibit pronounced inequalities in virtual water trade,indicating that a significant geographic convergence relationship exists.Effectively responding to this unsustainable relationship necessitates balancing both domestic resource risk management and global virtual water trade regulation.
文摘Latest digital advancements have intensified the necessity for adaptive,data-driven and socially-centered learning ecosystems.This paper presents the formulation of a cross-platform,innovative,gamified and personalized Learning Ecosystem,which integrates 3D/VR environments,as well as machine learning algorithms,and business intelligence frameworks to enhance learner-centered education and inferenced decision-making.This Learning System makes use of immersive,analytically assessed virtual learning spaces,therefore facilitating real-time monitoring of not just learning performance,but also overall engagement and behavioral patterns,via a comprehensive set of sustainability-oriented ESG-aligned Key Performance Indicators(KPIs).Machine learning models support predictive analysis,personalized feedback,and hybrid recommendation mechanisms,whilst dedicated dashboards translate complex educational data into actionable insights for all Use Cases of the System(Educational Institutions,Educators and Learners).Additionally,the presented Learning System introduces a structured Mentoring and Consulting Subsystem,thence reinforcing human-centered guidance alongside automated intelligence.The Platform’s modular architecture and simulation-centered evaluation approach actively support personalized,and continuously optimized learning pathways.Thence,it exemplifies a mature,adaptive Learning Ecosystem,supporting immersive technologies,analytics,and pedagogical support,hence,contributing to contemporary digital learning innovation and sociotechnical transformation in education.
基金supported by Institute of Information and Communications Technology Planning and Evaluation(IITP)grant funded by the Korean government(MSIT)(No.2019-0-01842,Artificial Intelligence Graduate School Program(GIST))supported by Korea Planning&Evaluation Institute of Industrial Technology(KEIT)grant funded by the Ministry of Trade,Industry&Energy(MOTIE,Republic of Korea)(RS-2025-25448249+1 种基金Automotive Industry Technology Development(R&D)Program)supported by the Regional Innovation System&Education(RISE)programthrough the(Gwangju RISE Center),funded by the Ministry of Education(MOE)and the Gwangju Metropolitan City,Republic of Korea(2025-RISE-05-001).
文摘In real-world autonomous driving tests,unexpected events such as pedestrians or wild animals suddenly entering the driving path can occur.Conducting actual test drives under various weather conditions may also lead to dangerous situations.Furthermore,autonomous vehicles may operate abnormally in bad weather due to limitations of their sensors and GPS.Driving simulators,which replicate driving conditions nearly identical to those in the real world,can drastically reduce the time and cost required for market entry validation;consequently,they have become widely used.In this paper,we design a virtual driving test environment capable of collecting and verifying SiLS data under adverse weather conditions using multi-source images.The proposed method generates a virtual testing environment that incorporates various events,including weather,time of day,and moving objects,that cannot be easily verified in real-world autonomous driving tests.By setting up scenario-based virtual environment events,multi-source image analysis and verification using real-world DCUs(Data Concentrator Units)with V2X-Car edge cloud can effectively address risk factors that may arise in real-world situations.We tested and validated the proposed method with scenarios employing V2X communication and multi-source image analysis.
基金Supported by the National Basic Research Program of China(973 Program)(2014CB340600)the National Natural Science Foundation of China(61173138,61103628,61103220)the Intel Collaborative Research Project
文摘In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well.
文摘The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.
基金supported by National Natural Science Foundation of China(No.61101139)Natural Science Foundation of Fujian Province(Nos.2012J01244 and 2012J01243)Hunan Provincial Project of Science and Technology(No.2013FJ3090)
文摘Cloud computing can provide a great capacity for massive computing, storage as well as processing. The capacity comes from the cloud computing system itself, which can be likened to a virtualized resource pool that supports virtualization applications as well as load migration. Based on the existing technologies, the paper proposes a resource virtualization model (RVM) utilizing a hybrid-graph structure. The hybrid-graph structure can formally represent the critical entities such as private clouds, nodes within the private clouds, and resource including its type and quantity. It also provides a clear description of the logical relationship and the dynamic expansion among them as well. Moreover, based on the RVM, a resource converging algorithm and a maintaining algorithm of the resource pool which can timely reflect the dynamic variation of the private cloud and resource are presented. The algorithms collect resources and put them into the private cloud resource pools and global resource pools, and enable a real-time maintenance for the dynamic variation of resource to ensure the continuity and reliability. Both of the algorithms use a queue structure to accomplish functions of resource converging. Finally, a simulation platform of cloud computing is designed to test the algorithms proposed in the paper. The results show the correctness and the reliability of the algorithms.
文摘Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.
基金supported in part by National Natural Science Foundation of China(NSFC)under Grant No.61100228 and 61202479the National High-tech R&D Program of China under Grant No.2012AA013101+1 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030601 and XDA06010701Open Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province Grant No.2015IOT03
文摘Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.
基金supported by the Fundamental Research Funds for the Central Universities(No.20720230037)the National Natural Science Foundation of China(No.52273305)+2 种基金Natural Science Foundation of Fujian Province of China(No.2023J05012)State Key Laboratory of Vaccines for Infectious Diseases,Xiang An Biomedicine Laboratory(Nos.2023XAKJ0103071,2023XAKJ0102061)Natural Science Foundation of Xiamen,China(No.3502Z20227010).
文摘Histopathological analysis of chronic wounds is crucial for clinicians to accurately assess wound healing progress and detect potential malignancy.However,traditional pathological tissue sections require specific staining procedures involving carcinogenic chemicals.This study proposes an interdisciplinary approach merging materials science,medicine,and artificial intelligence(AI)to develop a virtual staining technique and intelligent evaluation model based on deep learning for chronic wound tissue pathology.This innovation aims to enhance clinical diagnosis and treatment by offering personalized AI-driven therapeutic strategies.By establishing a mouse model of chronic wounds and using a series of hydrogel wound dressings,tissue pathology sections were periodically collected for manual staining and healing assessment.We focused on leveraging the pix2pix image translation framework within deep learning networks.Through CNN models implemented in Python using PyTorch,our study involves learning and feature extraction for region segmentation of pathological slides.Comparative analysis between virtual staining and manual staining results,along with healing diagnosis conclusions,aims to optimize AI models.Ultimately,this approach integrates new metrics such as image recognition,quantitative analysis,and digital diagnostics to formulate an intelligent wound assessment model,facilitating smart monitoring and personalized treatment of wounds.In blind evaluation by pathologists,minimal disparities were found between virtual and conventional histologically stained images of murine wound tissue.The evaluation used pathologists’average scores on real stained images as a benchmark.The scores for virtual stained images were 71.1%for cellular features,75.4%for tissue structures,and 77.8%for overall assessment.Metrics such as PSNR(20.265)and SSIM(0.634)demonstrated our algorithms’superior performance over existing networks.Eight pathological features such as epidermis,hair follicles,and granulation tissue can be accurately identified,and the images were found to be more faithful to the actual tissue feature distribution when compared to manually annotated data.
基金supported by the National Natural Science Foundation of China(T2325023,92265204,12104447)the National Key R&D Program of China(2023YFF0718400)+1 种基金the Innovation Program for Quantum Science and Technology(2021ZD0302200)the Fundamental Research Funds for the Central Universities。
文摘This work presents a method for the three-dimensional localization of individual shallow NV center in diamond,leveraging the near-field quenching effect of a gold tip.Our experimental setup involves the use of an atomic force microscope to precisely move the gold tip close to the NV center,while simultaneously employing a home-made confocal microscope to monitor the fluorescence of the NV center.This approach allows for lateral super-resolution,achieving a full width at half maximum(FWHM)of 38.0 nm and a location uncertainty of 0.7 nm.Additionally,we show the potential of this method for determining the depth of the NV centers.We also attempt to determine the depth of the NV centers in combination with finite-difference time-domain(FDTD)simulations.Compared to other depth determination methods,this approach allows for simultaneous lateral and longitudinal localization of individual NV centers,and holds promise for facilitating manipulation of the local environment surrounding the NV center.