This mini-review presents the authors' vision on the current status and future trends in the development of neuroprotective agents working via activation of nuclear factor erythroid 2-related factor 2 (Nrf2), and i...This mini-review presents the authors' vision on the current status and future trends in the development of neuroprotective agents working via activation of nuclear factor erythroid 2-related factor 2 (Nrf2), and in particular, via disruption of Nrf2-Keap 1 interaction. There are two opposite "chemical" mechanisms underlying such activation: the first one is a non-specific covalent modification of Keapl thiols, resulting in side effects of varied severity, and the second one is the shift of the Nrf2-Kelch-like ECH associated protein-1 (Keapl) binding equilibrium in the presence of a competitive and chemically benign displacement agent. At this point, no displacement activators exhibit sufficient biological activity in comparison with common Nrf2 activators working via Keapl thiol modification. Hence, the hope in therapeutics is now linked to the FDA approved dimethylfumarate, whose derivative, monomethylfumarate, as we demonstrated recently, is much less toxic but equally biologically potent and an ideal candidate for clinical trials right now. A newly emerging player is a nuclear inhibitor of Nrf2, BTB domain and CNC homolog 1 (Bach1). The commercially developed Bachl inhibitors are currently under investigation in our laboratory showing promising results. In our viewpoint, the perfect future drug will present the combination of a displacement activator and Bach 1 inhibitor to insure safety and efficiency of Nrf2 activation.展开更多
Nowadays, smart agriculture using wireless communication is replacing the wired system which was difficult to install and manage. Then, this paper introduces a new design for IoT application on the greenhouse, which u...Nowadays, smart agriculture using wireless communication is replacing the wired system which was difficult to install and manage. Then, this paper introduces a new design for IoT application on the greenhouse, which utilizes different technologies to present a new model for practical implementation in the IoT concept. This design can settle a new method to solve problems in Market Demand, Precision in Operation and supervision. Furthermore, this design can be used in many cases and assist farmers, cropper and planted people to develop their business.展开更多
Migration is contentious. Regardless if the migrants are Rohingya refugees fleeing horrific persecution, or if themigrants are household and construction workers filling labor gaps, we are at a moment in time when cou...Migration is contentious. Regardless if the migrants are Rohingya refugees fleeing horrific persecution, or if themigrants are household and construction workers filling labor gaps, we are at a moment in time when countriesview migration as undesirable and in need of regulation and limits. Southeast Asia has seen significant flows ofmigrants before. In some instances, it has been a peaceful process, but currently, it is a source of considerabletension and conflict. During colonial rule, workers from China and India were embedded into the political economyof subjected territories. During the VietnamWar, refugees from Vietnam and Cambodia were (reluctantly) acceptedby neighboring countries and later immigrated to the US. Why do we see variation in responses to migration? Thispaper looks at two possible answers: First, the politicization of race, ethnicity, religion, and identity has madeimmigration more problematic for both receiving and sending countries. Second, we see dramatic shifts in attitudesand interests about immigration from great powers. In the 1970s, Southeast Asian countries accepted refugees fromVietnam and Cambodia because the US promised that these refugees would be resettled outside Southeast Asia inthe US and her allies. As Rohingya flee ethnic cleansing in Myanmar, no such promise of resettlement has beenforthcoming from wealthy countries. So, neighboring countries have little willingness to help the Rohingya on theirown. Hegemonic stability theory posits that a hegemon can foster and promote cooperation on a wide variety ofinternational problems, when a hegemon refuses to behave in this way;we are less likely to see cooperation onproblems like migration. This paper will explore both the domestic politicization of immigration and at globaldemonization of migration, which affects conditions in Southeast Asia.展开更多
Background:We investigate whether the success of contrarian investment strategies can be attributed to differences in the relative illiquidity of stocks categorized as value investments versus those categorized as gla...Background:We investigate whether the success of contrarian investment strategies can be attributed to differences in the relative illiquidity of stocks categorized as value investments versus those categorized as glamour portfolios.Methods:Following Lakonishok et al.(J Financ 49:1541–1578,1994),we assess the illiquidity characteristics of portfolios that underlie contrarian investment strategies that are based on the level of stock’s book to market.Results:We find strong evidence that those portfolios characterized as value investments are associated with dramatically greater levels of illiquidity than glamour portfolios.We further demonstrate that strategies based on the illiquidity in the year prior to portfolio formation result in return characteristic of ostensibly contrarian strategies.Conclusions:These results suggest that the higher returns associated with contrarian investment strategies are the result of the higher illiquidity associated with value portfolios and represent compensation that the investor receives for accepting illiquidity.They also suggest that researchers should be cautious before attributing apparent anomalies to behavior-driven expectational errors rather than to other attributes unrelated to behavior,such as illiquidity.展开更多
This paper explores the idea of“Chinese social work 2.0”by reviewing the situation,issues,and needs of Chinese social work for further advancement in historical and comparative perspectives.The“10 years of Chinese ...This paper explores the idea of“Chinese social work 2.0”by reviewing the situation,issues,and needs of Chinese social work for further advancement in historical and comparative perspectives.The“10 years of Chinese social work(2006-2016)”vs.a 30-year history of rebuilding social work in the Chinese mainland can be explained with the transition of GPP(general public policy).This helps to understand the various pitfalls and seeming downturns in Chinese social work over the past years and to understand the major decisions of the 19th National Congress of the Communist Party of China(CPC)by understanding the historical backdrop and theoretical rationale of“seeking balance”meaning that China formally parts with its“GDP first”doctrine and withdraws its“economic state”GPP from the historical stage,and“seeking sufficiency”meaning that China continues to base its public policy on economic construction rather than to follow a welfare state GPP.Chinese social work professionals should take advantage of the 19th National Congress of the Communist Party of China(CPC)by highlighting the core issue of“balanced”development and play a leading role in promoting social fairness and justice.The precondition for fulfilling this role is that social work must be placed among the main disciplinary categories(“Group I subject of social science and humanities”)in China with the enhancement of research and faculty competence via well-designed(doctoral)social work education.展开更多
The way investors, banks and constituents rely on rating agencies will drastically change with the implementation of the Dodd-Frank Act. The historical background of rating agencies including potential changes in the ...The way investors, banks and constituents rely on rating agencies will drastically change with the implementation of the Dodd-Frank Act. The historical background of rating agencies including potential changes in the process of issuing their reports after the Dodd-Frank act is explored by the authors. CPAs (Certified Public Accountant) audit the financial statements of Securities and Exchange Commission [SEC] regulated issuers and are subject to the provisions of the Dodd-Frank act. Accountants may have new potential liabilities with clients that rely on credit agencies representations in financial statements. Analysis is made and conclusions are drawn on the effects of new credit rating agency responsibilities and that of auditors.展开更多
This research examines industry-based dissertation research in a doctoralcomputing program through the lens of machine learning algorithms todetermine if natural language processing-based categorization on abstractsal...This research examines industry-based dissertation research in a doctoralcomputing program through the lens of machine learning algorithms todetermine if natural language processing-based categorization on abstractsalone is adequate for classification. This research categorizes dissertationby both their abstracts and by their full-text using the GraphLabCreate library from Apple’s Turi to identify if abstract analysis is anadequate measure of content categorization, which we found was not. Wealso compare the dissertation categorizations using IBM’s Watson Discoverydeep machine learning tool. Our research provides perspectiveson the practicality of the manual classification of technical documents;and, it provides insights into the: (1) categories of academic work createdby experienced fulltime working professionals in a Computing doctoralprogram, (2) viability and performance of automated categorization of theabstract analysis against the fulltext dissertation analysis, and (3) natuallanguage processing versus human manual text classification abstraction.展开更多
This article presents two designs,the Transaction Serial Format(TSF)and the Transaction Array Model(TAM).Together,they provide full,efficient,transaction serialization facilities for devices with limited onboard energ...This article presents two designs,the Transaction Serial Format(TSF)and the Transaction Array Model(TAM).Together,they provide full,efficient,transaction serialization facilities for devices with limited onboard energy,such as those in an Internet of Things(IoT)network.TSF provides a compact,non-parsed,format that requires minimal processing for transaction deserialization.TAM provides an internal data structure that needs minimal dynamic storage and directly uses the elements of TSF.The simple lexical units of TSF do not require parsing.The lexical units contain enough information to allocate the internal TAM data structure efficiently.TSF generality is equivalent to XML and JSON.TSF represents any XML document or JSON object without loss of information,including whitespace.The XML equivalence provides a foundation for the performance comparisons.A performance comparison of a C reference implementation of TSF and TAM to the popular Expat XML library,also written in C,shows that TSF reduces deserialization processor time by more than 80%.展开更多
As the tsunami of data has emerged,search engines have become the most powerful tool for obtaining scattered information on the internet.The traditional search engines return the organized results by using ranking alg...As the tsunami of data has emerged,search engines have become the most powerful tool for obtaining scattered information on the internet.The traditional search engines return the organized results by using ranking algorithm such as term frequency,link analysis(PageRank algorithm and HITS algorithm)etc.However,these algorithms must combine the keyword frequency to determine the relevance between user’s query and the data in the computer system or internet.Moreover,we expect the search engines could understand users’searching by content meanings rather than literal strings.Semantic Web is an intelligent network and it could understand human’s language more semantically and make the communication easier between human and computers.But,the current technology for the semantic search is hard to apply.Because some meta data should be annotated to each web pages,then the search engine will have the ability to understand the users intend.However,annotate every web page is very time-consuming and leads to inefficiency.So,this study designed an ontology-based approach to improve the current traditional keyword-based search and emulate the effects of semantic search.And let the search engine can understand users more semantically when it gets the knowledge.展开更多
Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologi...Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection,mitigation,and prevention.This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project(OWASP).OWASP maintains lists of the top ten security threats to web and mobile applications.We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.We analyze 200+healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten mobile threats,the threat of“Insecure Data Storage.”We find that many of the applications are storing personally identifying information(PII)in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.展开更多
The use of clicker technology as a tool for promoting learning, let along deep learning, is hotly debated and has its proponents and opponents. With the question still open, this paper examines the use of this technol...The use of clicker technology as a tool for promoting learning, let along deep learning, is hotly debated and has its proponents and opponents. With the question still open, this paper examines the use of this technology in fostering critical thinking and other higher-order learning and team-building skills, in the context of two entry-level psychology courses. The results obtained indicate that from the perspectives of both the student and the instructor, the integration of this technology was positively perceived to enhance the learning process and the acquisition of these skills. It would seem these concepts are, after all, not antithetical.展开更多
In the United States, approximately one in eight (13 percent, or 30 million)individuals aged 12 years or older has bilateral hearing loss. Whenunaddressed and untreated, hearing loss is associated with and contributes...In the United States, approximately one in eight (13 percent, or 30 million)individuals aged 12 years or older has bilateral hearing loss. Whenunaddressed and untreated, hearing loss is associated with and contributesto other significant health issues;specifically, social isolation, depression,stress, and anxiety, incidental falls, dementia and impaired cognition, andreduced quality of life. This is a public health concern. Health and primarycare providers are in a unique position to have a positive impact by probingthe hearing of the patients they see, providing information, and makingappropriate referrals to reduce deleterious effects when this impairmentoccurs.Abbreviations: Hertz (Hz);High frequency hearing loss (HFHL);Personallistening devices (PLDs);Sensorineural hearing loss (SNHL)Format: Small group discussion, classroom and clinical practicum settings.Target audience: The student and practicing health professions (e.g.occupational and physical therapy, psychologists, physician assistants,nursing, and medical) involved and the relevant point in their training andpractice.展开更多
The continued evolution of bacterial and fungal species poses a significant difficulty for the treatment of disease of microbial origin. Given this situation, the prevention of transmission of such microbial diseases ...The continued evolution of bacterial and fungal species poses a significant difficulty for the treatment of disease of microbial origin. Given this situation, the prevention of transmission of such microbial diseases becomes of increasing importance. Efforts of this laboratory have been directed toward the destruction of microbial species on environmental surfaces as a prophylaxis toward infection, and we herein report on the efficacy of a system that demonstrates activity against both Gram-positive and Gram-negative bacteria, as well as fungi. We report specifically herein on the use of fabric materials so activated for the destruction of these microbial species, useful for a variety of surfaces within hospital and related settings wherein transmission of microbial disease is a major problem, while these approaches are also applicable for a variety of other types of surfaces.展开更多
Quick Quantum Circuit Simulation(QQCS)is a software system for computing the result of a quantum circuit using a notation that derives directly from the circuit,expressed in a single input line.Quantum circuits begin ...Quick Quantum Circuit Simulation(QQCS)is a software system for computing the result of a quantum circuit using a notation that derives directly from the circuit,expressed in a single input line.Quantum circuits begin with an initial quantum state of one or more qubits,which are the quantum analog to classical bits.The initial state is modified by a sequence of quantum gates,quantum machine language instructions,to get the final state.Measurements are made of the final state and displayed as a classical binary result.Measurements are postponed to the end of the circuit because a quantum state collapses when measured and produces probabilistic results,a consequence of quantum uncertainty.A circuit may be run many times on a quantum computer to refine the probabilistic result.Mathematically,quantum states are 2n-dimensional vectors over the complex number field,where n is the number of qubits.A gate is a 2n×2n unitary matrix of complex values.Matrix multiplication models the application of a gate to a quantum state.QQCS is a mathematical rendering of each step of a quantum algorithm represented as a circuit,and as such,can present a trace of the quantum state of the circuit after each gate,compute gate equivalents for each circuit step,and perform measurements at any point in the circuit without state collapse.Output displays are in vector coefficients or Dirac bra-ket notation.It is an easy-to-use educational tool for students new to quantum computing.展开更多
Mobile devices are being deployed rapidly for both private and professional reasons.One area of that has been growing is in releasing healthcare applications into the mobile marketplaces for health management.These ap...Mobile devices are being deployed rapidly for both private and professional reasons.One area of that has been growing is in releasing healthcare applications into the mobile marketplaces for health management.These applications help individuals track their own biorhythms and contain sensitive information.This case study examines the source code of mobile applications released to GitHub for the Risk of Insufficient Cryptography in the Top Ten Mobile Open Web Application Security Project risks.We first develop and justify a mobile OWASP Cryptographic knowledge-graph for detecting security weaknesses specific to mobile applications which can be extended to other domains involving cryptography.We then analyze the source code of 203 open source healthcare mobile applications and report on their usage of cryptography in the applications.Our findings show that none of the open source healthcare applications correctly applied cryptography in all elements of their applications.As humans adopt healthcare applications for managing their health routines,it is essential that they consider the privacy and security risks they are accepting when sharing their data.Furthermore,many open source applications and developers have certain environmental parameters which do not mandate adherence to regulations.In addition to creating new free tools for security risk identifications during software development such as standalone or compiler-embedded,the article suggests awareness and training modules for developers prior to marketplace software release.展开更多
This article reflects on the need for psychosomatic medicine research in the field of surgery by complementing psychological/psychiatrist approaches with a physician’s(particularly surgeon’s)point of view.Focusing o...This article reflects on the need for psychosomatic medicine research in the field of surgery by complementing psychological/psychiatrist approaches with a physician’s(particularly surgeon’s)point of view.Focusing on esthetic/cosmetic surgery,a broader notion of“psychosomatic surgery”is also used regarding plastic surgery as well as examples of vascular and general surgery.Relevant literature reviews are utilized to gain a more comprehensive bio-psycho-social perspective.By providing a deeper understanding in the specialty areas,it makes a case for evidence-based practice by shedding light on psychosomatic medicine research on surgery in the United States with cross-cultural implications.展开更多
Hurricanes cause significant damage to tropical forests;however,little is known of their effects on decomposition and decomposer communities.This study demonstrated that canopy debris deposited during Hurricane Otto s...Hurricanes cause significant damage to tropical forests;however,little is known of their effects on decomposition and decomposer communities.This study demonstrated that canopy debris deposited during Hurricane Otto stimulated sequential changes in soil carbon(C)and nitrogen(N)components,and decomposer microbial communities over 5 years.The initial response phase occurred within 2 years post-hurricane and appeared associated with decomposition of the labile canopy debris,suggested by:increased DNA sequences(MPS)of the Acidobacterial community(as common decomposers of labile plant material),decreases in total organic C(TOC),increased biomass C,respiration,and NH_(4)^(+),conversion of organic C in biomass,and decreased MPS of complex organic C decomposing(CCD_(ec))Fungal community.After 3 years post-hurricane,the later response phase appeared associated with decomposition of the more stable components of the canopy debris,suggested by:increased MPS of the Fungal CCDec community,TOC,stabilized Respiration,decreased Biomass C,the return to pre-hurricane levels of the conversion of organic C to biomass,and decreased MPS of Acidobacterial community.These changes in the microbial community compositions resulted in progressive decomposition of the hurricane-deposited canopy material within 5 years,resulting several potential indicators of different stages of decomposition and soil recovery post-disturbance.展开更多
基金supported in part by grants from NIH NS062165,NS060885,Michael J Fox Foundation for Parkinson’s ResearchParfore Parkinson,National Parkinson Foundation(CSRA chapter) to BT+1 种基金Winifred Masterson Burke FoundationThomas Hartman Foundat ion for Parkinson’s disease to IGG
文摘This mini-review presents the authors' vision on the current status and future trends in the development of neuroprotective agents working via activation of nuclear factor erythroid 2-related factor 2 (Nrf2), and in particular, via disruption of Nrf2-Keap 1 interaction. There are two opposite "chemical" mechanisms underlying such activation: the first one is a non-specific covalent modification of Keapl thiols, resulting in side effects of varied severity, and the second one is the shift of the Nrf2-Kelch-like ECH associated protein-1 (Keapl) binding equilibrium in the presence of a competitive and chemically benign displacement agent. At this point, no displacement activators exhibit sufficient biological activity in comparison with common Nrf2 activators working via Keapl thiol modification. Hence, the hope in therapeutics is now linked to the FDA approved dimethylfumarate, whose derivative, monomethylfumarate, as we demonstrated recently, is much less toxic but equally biologically potent and an ideal candidate for clinical trials right now. A newly emerging player is a nuclear inhibitor of Nrf2, BTB domain and CNC homolog 1 (Bach1). The commercially developed Bachl inhibitors are currently under investigation in our laboratory showing promising results. In our viewpoint, the perfect future drug will present the combination of a displacement activator and Bach 1 inhibitor to insure safety and efficiency of Nrf2 activation.
文摘Nowadays, smart agriculture using wireless communication is replacing the wired system which was difficult to install and manage. Then, this paper introduces a new design for IoT application on the greenhouse, which utilizes different technologies to present a new model for practical implementation in the IoT concept. This design can settle a new method to solve problems in Market Demand, Precision in Operation and supervision. Furthermore, this design can be used in many cases and assist farmers, cropper and planted people to develop their business.
文摘Migration is contentious. Regardless if the migrants are Rohingya refugees fleeing horrific persecution, or if themigrants are household and construction workers filling labor gaps, we are at a moment in time when countriesview migration as undesirable and in need of regulation and limits. Southeast Asia has seen significant flows ofmigrants before. In some instances, it has been a peaceful process, but currently, it is a source of considerabletension and conflict. During colonial rule, workers from China and India were embedded into the political economyof subjected territories. During the VietnamWar, refugees from Vietnam and Cambodia were (reluctantly) acceptedby neighboring countries and later immigrated to the US. Why do we see variation in responses to migration? Thispaper looks at two possible answers: First, the politicization of race, ethnicity, religion, and identity has madeimmigration more problematic for both receiving and sending countries. Second, we see dramatic shifts in attitudesand interests about immigration from great powers. In the 1970s, Southeast Asian countries accepted refugees fromVietnam and Cambodia because the US promised that these refugees would be resettled outside Southeast Asia inthe US and her allies. As Rohingya flee ethnic cleansing in Myanmar, no such promise of resettlement has beenforthcoming from wealthy countries. So, neighboring countries have little willingness to help the Rohingya on theirown. Hegemonic stability theory posits that a hegemon can foster and promote cooperation on a wide variety ofinternational problems, when a hegemon refuses to behave in this way;we are less likely to see cooperation onproblems like migration. This paper will explore both the domestic politicization of immigration and at globaldemonization of migration, which affects conditions in Southeast Asia.
文摘Background:We investigate whether the success of contrarian investment strategies can be attributed to differences in the relative illiquidity of stocks categorized as value investments versus those categorized as glamour portfolios.Methods:Following Lakonishok et al.(J Financ 49:1541–1578,1994),we assess the illiquidity characteristics of portfolios that underlie contrarian investment strategies that are based on the level of stock’s book to market.Results:We find strong evidence that those portfolios characterized as value investments are associated with dramatically greater levels of illiquidity than glamour portfolios.We further demonstrate that strategies based on the illiquidity in the year prior to portfolio formation result in return characteristic of ostensibly contrarian strategies.Conclusions:These results suggest that the higher returns associated with contrarian investment strategies are the result of the higher illiquidity associated with value portfolios and represent compensation that the investor receives for accepting illiquidity.They also suggest that researchers should be cautious before attributing apparent anomalies to behavior-driven expectational errors rather than to other attributes unrelated to behavior,such as illiquidity.
文摘This paper explores the idea of“Chinese social work 2.0”by reviewing the situation,issues,and needs of Chinese social work for further advancement in historical and comparative perspectives.The“10 years of Chinese social work(2006-2016)”vs.a 30-year history of rebuilding social work in the Chinese mainland can be explained with the transition of GPP(general public policy).This helps to understand the various pitfalls and seeming downturns in Chinese social work over the past years and to understand the major decisions of the 19th National Congress of the Communist Party of China(CPC)by understanding the historical backdrop and theoretical rationale of“seeking balance”meaning that China formally parts with its“GDP first”doctrine and withdraws its“economic state”GPP from the historical stage,and“seeking sufficiency”meaning that China continues to base its public policy on economic construction rather than to follow a welfare state GPP.Chinese social work professionals should take advantage of the 19th National Congress of the Communist Party of China(CPC)by highlighting the core issue of“balanced”development and play a leading role in promoting social fairness and justice.The precondition for fulfilling this role is that social work must be placed among the main disciplinary categories(“Group I subject of social science and humanities”)in China with the enhancement of research and faculty competence via well-designed(doctoral)social work education.
文摘The way investors, banks and constituents rely on rating agencies will drastically change with the implementation of the Dodd-Frank Act. The historical background of rating agencies including potential changes in the process of issuing their reports after the Dodd-Frank act is explored by the authors. CPAs (Certified Public Accountant) audit the financial statements of Securities and Exchange Commission [SEC] regulated issuers and are subject to the provisions of the Dodd-Frank act. Accountants may have new potential liabilities with clients that rely on credit agencies representations in financial statements. Analysis is made and conclusions are drawn on the effects of new credit rating agency responsibilities and that of auditors.
文摘This research examines industry-based dissertation research in a doctoralcomputing program through the lens of machine learning algorithms todetermine if natural language processing-based categorization on abstractsalone is adequate for classification. This research categorizes dissertationby both their abstracts and by their full-text using the GraphLabCreate library from Apple’s Turi to identify if abstract analysis is anadequate measure of content categorization, which we found was not. Wealso compare the dissertation categorizations using IBM’s Watson Discoverydeep machine learning tool. Our research provides perspectiveson the practicality of the manual classification of technical documents;and, it provides insights into the: (1) categories of academic work createdby experienced fulltime working professionals in a Computing doctoralprogram, (2) viability and performance of automated categorization of theabstract analysis against the fulltext dissertation analysis, and (3) natuallanguage processing versus human manual text classification abstraction.
文摘This article presents two designs,the Transaction Serial Format(TSF)and the Transaction Array Model(TAM).Together,they provide full,efficient,transaction serialization facilities for devices with limited onboard energy,such as those in an Internet of Things(IoT)network.TSF provides a compact,non-parsed,format that requires minimal processing for transaction deserialization.TAM provides an internal data structure that needs minimal dynamic storage and directly uses the elements of TSF.The simple lexical units of TSF do not require parsing.The lexical units contain enough information to allocate the internal TAM data structure efficiently.TSF generality is equivalent to XML and JSON.TSF represents any XML document or JSON object without loss of information,including whitespace.The XML equivalence provides a foundation for the performance comparisons.A performance comparison of a C reference implementation of TSF and TAM to the popular Expat XML library,also written in C,shows that TSF reduces deserialization processor time by more than 80%.
文摘As the tsunami of data has emerged,search engines have become the most powerful tool for obtaining scattered information on the internet.The traditional search engines return the organized results by using ranking algorithm such as term frequency,link analysis(PageRank algorithm and HITS algorithm)etc.However,these algorithms must combine the keyword frequency to determine the relevance between user’s query and the data in the computer system or internet.Moreover,we expect the search engines could understand users’searching by content meanings rather than literal strings.Semantic Web is an intelligent network and it could understand human’s language more semantically and make the communication easier between human and computers.But,the current technology for the semantic search is hard to apply.Because some meta data should be annotated to each web pages,then the search engine will have the ability to understand the users intend.However,annotate every web page is very time-consuming and leads to inefficiency.So,this study designed an ontology-based approach to improve the current traditional keyword-based search and emulate the effects of semantic search.And let the search engine can understand users more semantically when it gets the knowledge.
文摘Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection,mitigation,and prevention.This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project(OWASP).OWASP maintains lists of the top ten security threats to web and mobile applications.We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.We analyze 200+healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten mobile threats,the threat of“Insecure Data Storage.”We find that many of the applications are storing personally identifying information(PII)in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.
文摘The use of clicker technology as a tool for promoting learning, let along deep learning, is hotly debated and has its proponents and opponents. With the question still open, this paper examines the use of this technology in fostering critical thinking and other higher-order learning and team-building skills, in the context of two entry-level psychology courses. The results obtained indicate that from the perspectives of both the student and the instructor, the integration of this technology was positively perceived to enhance the learning process and the acquisition of these skills. It would seem these concepts are, after all, not antithetical.
文摘In the United States, approximately one in eight (13 percent, or 30 million)individuals aged 12 years or older has bilateral hearing loss. Whenunaddressed and untreated, hearing loss is associated with and contributesto other significant health issues;specifically, social isolation, depression,stress, and anxiety, incidental falls, dementia and impaired cognition, andreduced quality of life. This is a public health concern. Health and primarycare providers are in a unique position to have a positive impact by probingthe hearing of the patients they see, providing information, and makingappropriate referrals to reduce deleterious effects when this impairmentoccurs.Abbreviations: Hertz (Hz);High frequency hearing loss (HFHL);Personallistening devices (PLDs);Sensorineural hearing loss (SNHL)Format: Small group discussion, classroom and clinical practicum settings.Target audience: The student and practicing health professions (e.g.occupational and physical therapy, psychologists, physician assistants,nursing, and medical) involved and the relevant point in their training andpractice.
文摘The continued evolution of bacterial and fungal species poses a significant difficulty for the treatment of disease of microbial origin. Given this situation, the prevention of transmission of such microbial diseases becomes of increasing importance. Efforts of this laboratory have been directed toward the destruction of microbial species on environmental surfaces as a prophylaxis toward infection, and we herein report on the efficacy of a system that demonstrates activity against both Gram-positive and Gram-negative bacteria, as well as fungi. We report specifically herein on the use of fabric materials so activated for the destruction of these microbial species, useful for a variety of surfaces within hospital and related settings wherein transmission of microbial disease is a major problem, while these approaches are also applicable for a variety of other types of surfaces.
文摘Quick Quantum Circuit Simulation(QQCS)is a software system for computing the result of a quantum circuit using a notation that derives directly from the circuit,expressed in a single input line.Quantum circuits begin with an initial quantum state of one or more qubits,which are the quantum analog to classical bits.The initial state is modified by a sequence of quantum gates,quantum machine language instructions,to get the final state.Measurements are made of the final state and displayed as a classical binary result.Measurements are postponed to the end of the circuit because a quantum state collapses when measured and produces probabilistic results,a consequence of quantum uncertainty.A circuit may be run many times on a quantum computer to refine the probabilistic result.Mathematically,quantum states are 2n-dimensional vectors over the complex number field,where n is the number of qubits.A gate is a 2n×2n unitary matrix of complex values.Matrix multiplication models the application of a gate to a quantum state.QQCS is a mathematical rendering of each step of a quantum algorithm represented as a circuit,and as such,can present a trace of the quantum state of the circuit after each gate,compute gate equivalents for each circuit step,and perform measurements at any point in the circuit without state collapse.Output displays are in vector coefficients or Dirac bra-ket notation.It is an easy-to-use educational tool for students new to quantum computing.
文摘Mobile devices are being deployed rapidly for both private and professional reasons.One area of that has been growing is in releasing healthcare applications into the mobile marketplaces for health management.These applications help individuals track their own biorhythms and contain sensitive information.This case study examines the source code of mobile applications released to GitHub for the Risk of Insufficient Cryptography in the Top Ten Mobile Open Web Application Security Project risks.We first develop and justify a mobile OWASP Cryptographic knowledge-graph for detecting security weaknesses specific to mobile applications which can be extended to other domains involving cryptography.We then analyze the source code of 203 open source healthcare mobile applications and report on their usage of cryptography in the applications.Our findings show that none of the open source healthcare applications correctly applied cryptography in all elements of their applications.As humans adopt healthcare applications for managing their health routines,it is essential that they consider the privacy and security risks they are accepting when sharing their data.Furthermore,many open source applications and developers have certain environmental parameters which do not mandate adherence to regulations.In addition to creating new free tools for security risk identifications during software development such as standalone or compiler-embedded,the article suggests awareness and training modules for developers prior to marketplace software release.
文摘This article reflects on the need for psychosomatic medicine research in the field of surgery by complementing psychological/psychiatrist approaches with a physician’s(particularly surgeon’s)point of view.Focusing on esthetic/cosmetic surgery,a broader notion of“psychosomatic surgery”is also used regarding plastic surgery as well as examples of vascular and general surgery.Relevant literature reviews are utilized to gain a more comprehensive bio-psycho-social perspective.By providing a deeper understanding in the specialty areas,it makes a case for evidence-based practice by shedding light on psychosomatic medicine research on surgery in the United States with cross-cultural implications.
文摘Hurricanes cause significant damage to tropical forests;however,little is known of their effects on decomposition and decomposer communities.This study demonstrated that canopy debris deposited during Hurricane Otto stimulated sequential changes in soil carbon(C)and nitrogen(N)components,and decomposer microbial communities over 5 years.The initial response phase occurred within 2 years post-hurricane and appeared associated with decomposition of the labile canopy debris,suggested by:increased DNA sequences(MPS)of the Acidobacterial community(as common decomposers of labile plant material),decreases in total organic C(TOC),increased biomass C,respiration,and NH_(4)^(+),conversion of organic C in biomass,and decreased MPS of complex organic C decomposing(CCD_(ec))Fungal community.After 3 years post-hurricane,the later response phase appeared associated with decomposition of the more stable components of the canopy debris,suggested by:increased MPS of the Fungal CCDec community,TOC,stabilized Respiration,decreased Biomass C,the return to pre-hurricane levels of the conversion of organic C to biomass,and decreased MPS of Acidobacterial community.These changes in the microbial community compositions resulted in progressive decomposition of the hurricane-deposited canopy material within 5 years,resulting several potential indicators of different stages of decomposition and soil recovery post-disturbance.