Busy Boards in a Two-Tier System: Old-Boys Network or Efficient Monitoring Technology?

Author(s):  
Jana Oehmichen ◽  
Marc Steffen Rapp ◽  
Michael Wolff
2020 ◽  
Vol 17 ◽  
Author(s):  
Min Wang ◽  
Daozhen Chen ◽  
Yankai Xia ◽  
Tao Zhou ◽  
Shi-Wen Jiang

: Most clinical related proteomic studies were aimed to screen potential biomarkers for clinical usage. However, it is known that only a few candidates could be validated in later stages. Besides clinical biomarkers, it also necessary to identify key proteins to better understand the molecular mechanism of human diseases. Here, we updated the connotations of precision and translational proteomics and proposed a refined research framework for clinical proteomics. We abstracted the framework as a three-tier system: to determine research objective and approach for achieving a certain purpose, to choose the appropriate methods for optimal results, and to apply standardized experimental procedure for reliable and reproducible results. Started from the initial discovery stage, we divided the following proteomics-driven translational studies into two directions: biomarker screening and mechanism investigation. We also discussed possible causes that may lead to high rates of experimental variation and low rates of follow-up validation. Moreover, we pointed out that the main bottlenecks for the identification of effective targets are data interpretation and statistical inference. Finally, we emphasized that the transparency of experimental design and results can help to ensure data quality. Conclusively, the refined framework provides constructive recommendations and comprehensive guides for designing and performing clinical related proteomic studies with the aim of obtaining reliable and reproducible results. It can also help to further promote the standardization and integration of proteomic studies.


Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


Author(s):  
Holly M. Smith

Chapter 9 turns to further epistemic barriers for decision makers: the problems of (nonmoral) ignorance and (nonmoral) uncertainty. The concepts of “ignorance” and “uncertainty” are elucidated, the problem of uncertainty is defined, and it is argued that the problem of ignorance should be treated as a special case of the problem of uncertainty. The three salient attempts to solve the problem are the Pragmatic, Austere, and Hybrid approaches. Combined solutions to the problem of error and the problem of uncertainty are explored, and it is argued that the only feasible approaches marry the Austere Response to the problem of error with the Hybrid Response to the problem of uncertainty in a two-tier system. The top-tier code provides the correct theoretical account of right and wrong, while the lower-tier rules provide associated decision-guides. Consistency requires that different normative terms be used by the top-tier rules and by the lower-tier rules.


2019 ◽  
Vol 102 (4) ◽  
pp. 413-418 ◽  
Author(s):  
C. Tarantini ◽  
P. Brouqui ◽  
R. Wilson ◽  
K. Griffiths ◽  
P. Patouraux ◽  
...  

2014 ◽  
Vol 575 ◽  
pp. 805-808
Author(s):  
Jin Hong Zhu ◽  
Ze Guo Wei

In this paper, remote monitoring technology and its application to control of industrial power supply are discussed in detail, including its composition, function and classification. The two approaches of wired and wireless communication are analyzed, and four cases of typical systems are introduced as well. Practice has proved that the presented several control schemes are feasible and effective.


Sign in / Sign up

Export Citation Format

Share Document