Proactive Health has become a new service model to improve human health.Although the concept of Proactive Health has been proposed by the Outline of the Healthy China 2030 Plan and the Healthy China Initiative,the lac...Proactive Health has become a new service model to improve human health.Although the concept of Proactive Health has been proposed by the Outline of the Healthy China 2030 Plan and the Healthy China Initiative,the lack of a unified definition of Proactive Health in China’s academic community is still the most fundamental and critical deficiency.Therefore,based on the concepts of Proactive Health,this study analyzed and described the natural characteristics and implications of Proactive Health to establish an exact definition.展开更多
Recently, the phenomenon of "software aging", one in which the state of a software system gradually de-grades with time and eventually leads to performance degradation or crash/hang failure, has been reporte...Recently, the phenomenon of "software aging", one in which the state of a software system gradually de-grades with time and eventually leads to performance degradation or crash/hang failure, has been reported. The agingphenomenon is ubiquitous in all kinds of software systems and hard to eliminate thoroughly. A proactive techniquecalled "software rejuvenation" has been proposed[13] to counter the aging problem and increase the software availabili-ty. In this paper, we systematically investigate the basic motivation, concept and development of software rejuvena-tion, and then, detailedly analyze the main research work on it. At last, a prospect about the future research direc-tions is outlined.展开更多
In this paper,an Unmanned Aerial Vehicle(UAV)-assisted relay communication system is studied,where a UAV is served as a flying relay to maintain a communication link between a mobile source node and a remote destinati...In this paper,an Unmanned Aerial Vehicle(UAV)-assisted relay communication system is studied,where a UAV is served as a flying relay to maintain a communication link between a mobile source node and a remote destination node.Specifically,an average outage probability minimization problem is formulated firstly,with the constraints on the transmission power of the source node,the maximum energy consumption budget,the transmission power,the speed and acceleration of the flying UAV relay.Next,the closed-form of outage probability is derived,under the hybrid line-of-sight and non-line-of-sight probability channel model.To deal with the formulated nonconvex optimization,a long-term proactive optimization mechanism is developed.In particular,firstly,an approximation for line-of-sight probability and a reformulation of the primal problem are given,respectively.Then,the reformulated problem is transformed into two subproblems:one is the transmission power optimization with given UAV’s trajectory and the other is the trajectory optimization with given transmission power allocation.Next,two subproblems are tackled via tailoring primal–dual subgradient method and successive convex approximation,respectively.Furthermore,a proactive optimization algorithm is proposed to jointly optimize the transmission power allocation and the three-dimensional trajectory.Finally,simulation results demonstrate the performance of the proposed algorithm under various parameter configurations.展开更多
This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anoma...This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats.展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) a...Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) and preclinical AD determined by Aβ load using PET. The goal of this study was to compare a new computerized version of the LASSI-L (LASSI-Brief Computerized) to the standard paper-and-pencil version of the test. In this study, we examined 110 cognitively unimpaired (CU) older adults and 79 with amnestic MCI (aMCI) who were administered the paper-and-pencil form of the LASSI-L. Their performance was compared with 62 CU older adults and 52 aMCI participants examined using the LASSI-BC. After adjustment for covariates (degree of initial learning, sex, education, and language of evaluation) both the standard and computerized versions distinguished between aMCI and CU participants. The performance of CU and aMCI groups using either form was relatively commensurate. Importantly, an optimal combination of Cued B2 recall and Cued B1 intrusions on the LASSI-BC yielded an area under the ROC curve of .927, a sensitivity of 92.3% and specificity of 88.1%, relative to an area under the ROC curve of .815, a sensitivity of 72.5%, and a specificity of 79.1% obtained for the paper-and-pencil LASSI-L. Overall, the LASSI-BC was comparable, and in some ways, superior to the paper-and-pencil LASSI-L. Advantages of the LASSI-BC include a more standardized administration, suitability for remote assessment, and an automated scoring mechanism that can be verified by a built-in audio recording of responses.展开更多
The prevention of a disease process has always been superior to the treatment of the same disease throughout the history of medicine and surgery. Local recurrence and peritoneal metastases occur in approximately 8% of...The prevention of a disease process has always been superior to the treatment of the same disease throughout the history of medicine and surgery. Local recurrence and peritoneal metastases occur in approximately 8% of colon cancer patients and 25% of rectal cancer patients and should be prevented. Strategies to prevent colon or rectal cancer local recurrence and peritoneal metastases include cytoreductive surgery and hyperthermic perioperative chemotherapy (HIPEC). These strategies can be used at the time of primary colon or rectal cancer resection if the HIPEC is available. At institutions where HIPEC is not available with the treatment of primary malignancy, a proactive second-look surgery is recommended. Several phase II studies strongly support the proactive approach. If peritoneal metastases were treated along with the primary colon resection, 5-year survival was seen and these results were superior to the results of treatment after peritoneal metastases had developed as recurrence. Also, prophylactic HIPEC improved survival with T3/T4 mucinous or signet ring colon cancers. A second-look has been shown to be effective in two published manuscripts. Unpublished data from MedStar Washington Cancer Institute also produced favorable date. Rectal cancer with peritoneal metastases may not be so effectively treated. There are both credits and debits of this proactive approach. Selection factors should be reviewed by the multidisciplinary team for individualized management of patients with or at high risk for peritoneal metastases.展开更多
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
基金National Natural Science Foundation of China(72122001)National Key Research and Development Program of China(2021ZD0114101).
文摘Proactive Health has become a new service model to improve human health.Although the concept of Proactive Health has been proposed by the Outline of the Healthy China 2030 Plan and the Healthy China Initiative,the lack of a unified definition of Proactive Health in China’s academic community is still the most fundamental and critical deficiency.Therefore,based on the concepts of Proactive Health,this study analyzed and described the natural characteristics and implications of Proactive Health to establish an exact definition.
文摘Recently, the phenomenon of "software aging", one in which the state of a software system gradually de-grades with time and eventually leads to performance degradation or crash/hang failure, has been reported. The agingphenomenon is ubiquitous in all kinds of software systems and hard to eliminate thoroughly. A proactive techniquecalled "software rejuvenation" has been proposed[13] to counter the aging problem and increase the software availabili-ty. In this paper, we systematically investigate the basic motivation, concept and development of software rejuvena-tion, and then, detailedly analyze the main research work on it. At last, a prospect about the future research direc-tions is outlined.
基金co-supported by the Natural Science Foundation for Distinguished Young Scholars of Jiangsu Province(No.BK20190030)the National Natural Science Foundation of China(Nos.61871398 and 61931011)the National Key R&D Program of China(No.2018YFB1801103)。
文摘In this paper,an Unmanned Aerial Vehicle(UAV)-assisted relay communication system is studied,where a UAV is served as a flying relay to maintain a communication link between a mobile source node and a remote destination node.Specifically,an average outage probability minimization problem is formulated firstly,with the constraints on the transmission power of the source node,the maximum energy consumption budget,the transmission power,the speed and acceleration of the flying UAV relay.Next,the closed-form of outage probability is derived,under the hybrid line-of-sight and non-line-of-sight probability channel model.To deal with the formulated nonconvex optimization,a long-term proactive optimization mechanism is developed.In particular,firstly,an approximation for line-of-sight probability and a reformulation of the primal problem are given,respectively.Then,the reformulated problem is transformed into two subproblems:one is the transmission power optimization with given UAV’s trajectory and the other is the trajectory optimization with given transmission power allocation.Next,two subproblems are tackled via tailoring primal–dual subgradient method and successive convex approximation,respectively.Furthermore,a proactive optimization algorithm is proposed to jointly optimize the transmission power allocation and the three-dimensional trajectory.Finally,simulation results demonstrate the performance of the proposed algorithm under various parameter configurations.
文摘This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats.
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
文摘Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) and preclinical AD determined by Aβ load using PET. The goal of this study was to compare a new computerized version of the LASSI-L (LASSI-Brief Computerized) to the standard paper-and-pencil version of the test. In this study, we examined 110 cognitively unimpaired (CU) older adults and 79 with amnestic MCI (aMCI) who were administered the paper-and-pencil form of the LASSI-L. Their performance was compared with 62 CU older adults and 52 aMCI participants examined using the LASSI-BC. After adjustment for covariates (degree of initial learning, sex, education, and language of evaluation) both the standard and computerized versions distinguished between aMCI and CU participants. The performance of CU and aMCI groups using either form was relatively commensurate. Importantly, an optimal combination of Cued B2 recall and Cued B1 intrusions on the LASSI-BC yielded an area under the ROC curve of .927, a sensitivity of 92.3% and specificity of 88.1%, relative to an area under the ROC curve of .815, a sensitivity of 72.5%, and a specificity of 79.1% obtained for the paper-and-pencil LASSI-L. Overall, the LASSI-BC was comparable, and in some ways, superior to the paper-and-pencil LASSI-L. Advantages of the LASSI-BC include a more standardized administration, suitability for remote assessment, and an automated scoring mechanism that can be verified by a built-in audio recording of responses.
文摘The prevention of a disease process has always been superior to the treatment of the same disease throughout the history of medicine and surgery. Local recurrence and peritoneal metastases occur in approximately 8% of colon cancer patients and 25% of rectal cancer patients and should be prevented. Strategies to prevent colon or rectal cancer local recurrence and peritoneal metastases include cytoreductive surgery and hyperthermic perioperative chemotherapy (HIPEC). These strategies can be used at the time of primary colon or rectal cancer resection if the HIPEC is available. At institutions where HIPEC is not available with the treatment of primary malignancy, a proactive second-look surgery is recommended. Several phase II studies strongly support the proactive approach. If peritoneal metastases were treated along with the primary colon resection, 5-year survival was seen and these results were superior to the results of treatment after peritoneal metastases had developed as recurrence. Also, prophylactic HIPEC improved survival with T3/T4 mucinous or signet ring colon cancers. A second-look has been shown to be effective in two published manuscripts. Unpublished data from MedStar Washington Cancer Institute also produced favorable date. Rectal cancer with peritoneal metastases may not be so effectively treated. There are both credits and debits of this proactive approach. Selection factors should be reviewed by the multidisciplinary team for individualized management of patients with or at high risk for peritoneal metastases.
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.