5,005 research outputs found

    Comorbidities of Migraine

    Get PDF
    Migraine is a common neurological disorder and can be severely disabling during attacks. The highest prevalence occurs between the ages of 25 and 55ā€‰years, potentially the most productive period of life. Migraine leads to a burden not only for the individual, but also for the family and society in general. Prior studies have found that migraine occurs together with other illnesses at a greater coincidental rate than is seen in the general population. These occurrences are called ā€œcomorbidities,ā€ which means that these disorders are interrelated with migraine. To delineate the comorbidities of migraine is important, because it can help improve treatment strategies and the understanding of the possible pathophysiology of migraine. The comorbid illnesses in patients with migraine include stroke, sub-clinical vascular brain lesions, coronary heart disease, hypertension, patent foramen ovale, psychiatric diseases (depression, anxiety, bipolar disorder, panic disorder, and suicide), restless legs syndrome, epilepsy and asthma. In this paper, we review the existing epidemiological and hospital-based studies, and illustrate the connections between these illnesses and migraine

    Improving Visual Quality and Transferability of Adversarial Attacks on Face Recognition Simultaneously with Adversarial Restoration

    Full text link
    Adversarial face examples possess two critical properties: Visual Quality and Transferability. However, existing approaches rarely address these properties simultaneously, leading to subpar results. To address this issue, we propose a novel adversarial attack technique known as Adversarial Restoration (AdvRestore), which enhances both visual quality and transferability of adversarial face examples by leveraging a face restoration prior. In our approach, we initially train a Restoration Latent Diffusion Model (RLDM) designed for face restoration. Subsequently, we employ the inference process of RLDM to generate adversarial face examples. The adversarial perturbations are applied to the intermediate features of RLDM. Additionally, by treating RLDM face restoration as a sibling task, the transferability of the generated adversarial face examples is further improved. Our experimental results validate the effectiveness of the proposed attack method.Comment: \copyright 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other work

    Is hyperuricemia an independent risk factor for new-onset chronic kidney disease?: a systematic review and meta-analysis based on observational cohort studies

    Get PDF
    This article discusses the role of interrogation in intelligence during the Second World War, and it focuses on the importance of culture in the collection of Human Intelligence in the European theatre of operation. It argues that cultural issues, including but not limited to language knowledge, provided an added value to interrogation, interviewing and questioning during and after the Second World War, for example through the employment of native speakers, in particular former refugees and enemy aliens. The article also highlights some of the flaws involved in this process, which led to bad prisoner handling and therefore bad intelligence collection. It also tries to complement archival sources with personal accounts and oral histories in order to achieve a deeper understanding of the role of the human being in the collection of intelligence through interrogation and questioning

    The Design and Implementation of Collaborative Filtering in Data Mining

    Get PDF
    Data mining is the process of discovering explicit knowledge from large amounts of data stored in database, data warehouse or other repositories. There have been many studies about models of data mining such as association rule, sequential pattern and so on. Collaborative filtering is one of data mining models. In this paper, we propose two approaches to solving the mining process of collaborative filtering. Finally, collaborative filtering mining is applied to Knowledge Management system

    Improving the Transferability of Adversarial Attacks on Face Recognition with Beneficial Perturbation Feature Augmentation

    Full text link
    Face recognition (FR) models can be easily fooled by adversarial examples, which are crafted by adding imperceptible perturbations on benign face images. To improve the transferability of adversarial face examples, we propose a novel attack method called Beneficial Perturbation Feature Augmentation Attack (BPFA), which reduces the overfitting of adversarial examples to surrogate FR models by constantly generating new models that have the similar effect of hard samples to craft the adversarial examples. Specifically, in the backpropagation, BPFA records the gradients on pre-selected features and uses the gradient on the input image to craft the adversarial example. In the next forward propagation, BPFA leverages the recorded gradients to add perturbations (i.e., beneficial perturbations) that can be pitted against the adversarial example on their corresponding features. The optimization process of the adversarial example and the optimization process of the beneficial perturbations added on the features correspond to a minimax two-player game. Extensive experiments demonstrate that BPFA can significantly boost the transferability of adversarial attacks on FR

    Moho Depth Variations From Receiver Function Imaging in the Northeastern North China Craton and Its Tectonic Implications

    Get PDF
    A detailed knowledge of the crustal thickness in the northeastern North China Craton (NCC) is important for understanding the unusual Phanerozoic destruction of the craton. We achieve this goal by employing a 2ā€D wave equationā€based migration method to P receiver functions from 198 broadband seismic stations, using Ps conversions and surfaceā€reflected multiples. By combining receiver function images along 19 profiles, we constructed a highā€resolution Moho depth model for the northeastern NCC. The results present dominant Eā€W Moho depth variations similar to previous observations and new regional Nā€S variations beneath both sides of the Northā€South Gravity Lineament. To the west, while a deeper Moho (āˆ¼42 km) appears in the interior of the Transā€North China Orogen, a relatively shallow Moho (āˆ¼38 km) exists in the northern margin of the Transā€North China Orogen to western NCC. To the east, the crust beneath the Yan Mountains in the marginal area is thicker (āˆ¼32ā€“40 km) than that (āˆ¼26ā€“32 km) beneath the Bohai Bay Basin in the craton interior, and the Moho further shallows from NE (āˆ¼32 km) to SW (āˆ¼26 km) within the basin. Along with other observations, we conclude that the dominant Eā€W difference may have been associated with the Paleoā€Pacific plate subduction under eastern Asia since the Mesozoic. The newly observed complex Nā€S variations may have reflected the structural heterogeneity of the cratonic lithosphere inherited since the formation of the NCC in the Paleoproterozoic, or spatially uneven effects on the cratonic lithosphere of subsequent thermotectonic events during the longā€term evolution of the craton, or both.This research is funded by the National Natural Science Foundation of China (grant 41574034, 41688103, 91414301). Figures are made with GMT (http://gmt.soest.hawaii.edu) and MATLAB softwares (https://www.mathworks.com)

    Association of the shuffling of Streptococcus pyogenes clones and the fluctuation of scarlet fever cases between 2000 and 2006 in central Taiwan

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The number of scarlet fever occurrences reported between 2000 and 2006 fluctuated considerably in central Taiwan and throughout the nation. Isolates of <it>Streptococcus pyogenes </it>were collected from scarlet fever patients in central Taiwan and were characterized by <it>emm </it>sequencing and a standardized pulsed-field gel electrophoresis (PFGE) method. National weekly report data were collected for investigating epidemiological trends.</p> <p>Results</p> <p>A total of 23 <it>emm </it>types were identified in 1,218 <it>S. pyogenes </it>isolates. The five most prevalent <it>emm </it>types were <it>emm</it>12 (50.4%), <it>emm</it>4 (23.2%), <it>emm</it>1 (16.4%), <it>emm</it>6 (3.8%) and <it>emm</it>22 (3.0%). PFGE analysis with <it>Sma</it>I suggested that, with a few exceptions, strains with a common <it>emm </it>type belonged to the same clone. There were two large <it>emm</it>12 clones, one with DNA resistant to cleavage by <it>Sma</it>I. Each prevalent <it>emm </it>clone had major PFGE strain(s) and many minor strains. Most of the minor strains emerged in the population and disappeared soon after. Even some major strains remained prevalent for only 2ā€“3 years before declining. The large fluctuation of scarlet fever cases between 2000 and 2006 was associated with the shuffling of six prevalent <it>emm </it>clones. In 2003, the dramatic drop in scarlet fever cases in central Taiwan and throughout the whole country was associated with the occurrence of a severe acute respiratory syndrome (SARS) outbreak that occurred between late-February and mid-June in Taiwan.</p> <p>Conclusion</p> <p>The occurrences of scarlet fever in central Taiwan in 2000ā€“2006 were primarily caused by five <it>emm </it>types, which accounted for 96.8% of the isolates collected. Most of the <it>S. pyogenes </it>strains (as defined by PFGE genotypes) emerged and lasted for only a few years. The fluctuation in the number of scarlet fever cases during the seven years can be primarily attributed to the shuffling of six prevalent <it>emm </it>clones and to the SARS outbreak in 2003.</p
    • ā€¦
    corecore