期刊文献+
共找到184,490篇文章
< 1 2 250 >
每页显示 20 50 100
Jamming Assisted Covert Wireless Communication in Multi-Channel Systems
1
作者 Che Bohan Sha Nan +2 位作者 Yang Weiwei Lu Xingbo Gao Chang 《China Communications》 SCIE CSCD 2024年第9期211-224,共14页
This paper investigates the jammerassisted multi-channel covert wireless communication(CWC)by exploiting the randomness of sub-channel selection to confuse the warden.In particular,we propose two sub-channel selection... This paper investigates the jammerassisted multi-channel covert wireless communication(CWC)by exploiting the randomness of sub-channel selection to confuse the warden.In particular,we propose two sub-channel selection transmission schemes,named random sub-channel selection(RSS)scheme and maximum sub-channel selection(MSS)scheme,to enhance communication covertness.For each proposed scheme,we first derive closed-form expressions of the transmission outage probability(TOP),the average effective rate,and the minimum average detection error probability(DEP).Then,the average effective covert rate(ECR)is maximized by jointly optimizing the transmit power at the transmitter and the number of sub-channels.Numerical results show that there is an optimal value of the number of sub-channels that maximizes the average ECR.We also find that to achieve the maximum average ECR,a larger number of subchannels are needed facing a stricter covertness constraint. 展开更多
关键词 covert wireless communication jamming multi-channel system
下载PDF
Cognitive Jammers Assisted Covert Communication in Cognitive Radio Networks
2
作者 Liu Changjun Shi Jia +1 位作者 Tie Zhuangzhuang Wang Yongchao 《China Communications》 SCIE CSCD 2024年第9期75-89,共15页
In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to r... In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance. 展开更多
关键词 cognitive jammer cognitive radio covert communication performance analysis
下载PDF
Cooperative Covert Communication in Multi-Antenna Broadcast Channels
3
作者 Qiao Sen Liu Guangjie +1 位作者 Ji Xiaopeng Liu Weiwei 《China Communications》 SCIE CSCD 2024年第6期246-260,共15页
With the gradual popularization of 5G communications,the application of multi-antenna broadcasting technology has become widespread.Therefore,this study aims to investigate the wireless covert communication in the two... With the gradual popularization of 5G communications,the application of multi-antenna broadcasting technology has become widespread.Therefore,this study aims to investigate the wireless covert communication in the two-user cooperative multi-antenna broadcast channel.We focus on the issue that the deteriorated reliability and undetectability are mainly affected by the transmission power.To tackle this issue,we design a scheme based on beamforming to increase the reliability and undetectability of wireless covert communication in the multi-antenna broadcast channel.We first modeled and analyzed the cooperative multi-antenna broadcasting system,and put forward the target question.Then we use the SCA(successive convex approximation)algorithm to transform the target problem into a series of convex subproblems.Then the convex problems are solved and the covert channel capacity is calculated.In order to verify the effectiveness of the scheme,we conducted simulation verification.The simulation results show that the proposed beamforming scheme can effectively improve the reliability and undetectability of covert communication in multi-antenna broadcast channels. 展开更多
关键词 BEAMFORMING covert communication multi-antenna broadcast channels OFdM
下载PDF
CCM-FL:Covert communication mechanisms for federated learning in crowd sensing IoT
4
作者 Hongruo Zhang Yifei Zou +2 位作者 Haofei Yin Dongxiao Yu Xiuzhen Cheng 《Digital Communications and Networks》 SCIE CSCD 2024年第3期597-608,共12页
The past decades have witnessed a wide application of federated learning in crowd sensing,to handle the numerous data collected by the sensors and provide the users with precise and customized services.Meanwhile,how t... The past decades have witnessed a wide application of federated learning in crowd sensing,to handle the numerous data collected by the sensors and provide the users with precise and customized services.Meanwhile,how to protect the private information of users in federated learning has become an important research topic.Compared with the differential privacy(DP)technique and secure multiparty computation(SMC)strategy,the covert communication mechanism in federated learning is more efficient and energy-saving in training the ma-chine learning models.In this paper,we study the covert communication problem for federated learning in crowd sensing Internet-of-Things networks.Different from the previous works about covert communication in federated learning,most of which are considered in a centralized framework and experimental-based,we firstly proposes a centralized covert communication mechanism for federated learning among n learning agents,the time complexity of which is O(log n),approximating to the optimal solution.Secondly,for the federated learning without parameter server,which is a harder case,we show that solving such a problem is NP-hard and prove the existence of a distributed covert communication mechanism with O(log logΔlog n)times,approximating to the optimal solution.Δis the maximum distance between any pair of learning agents.Theoretical analysis and nu-merical simulations are presented to show the performance of our covert communication mechanisms.We hope that our covert communication work can shed some light on how to protect the privacy of federated learning in crowd sensing from the view of communications. 展开更多
关键词 covert communications Federated learning Crowd sensing SINR model
下载PDF
Joint Active and Passive Beamforming Design in Intelligent Reflecting Surface(IRS)-Assisted Covert Communications:A Multi-Agent DRL Approach
5
作者 Gao Ang Ren Xiaoyu +2 位作者 Deng Bin Sun Xinshun Zhang Jiankang 《China Communications》 SCIE CSCD 2024年第9期11-26,共16页
Intelligent Reflecting Surface(IRS),with the potential capability to reconstruct the electromagnetic propagation environment,evolves a new IRSassisted covert communications paradigm to eliminate the negligible detecti... Intelligent Reflecting Surface(IRS),with the potential capability to reconstruct the electromagnetic propagation environment,evolves a new IRSassisted covert communications paradigm to eliminate the negligible detection of malicious eavesdroppers by coherently beaming the scattered signals and suppressing the signals leakage.However,when multiple IRSs are involved,accurate channel estimation is still a challenge due to the extra hardware complexity and communication overhead.Besides the crossinterference caused by massive reflecting paths,it is hard to obtain the close-formed solution for the optimization of covert communications.On this basis,the paper improves a heterogeneous multi-agent deep deterministic policy gradient(MADDPG)approach for the joint active and passive beamforming(Joint A&P BF)optimization without the channel estimation,where the base station(BS)and multiple IRSs are taken as different types of agents and learn to enhance the covert spectrum efficiency(CSE)cooperatively.Thanks to the‘centralized training and distributed execution’feature of MADDPG,each agent can execute the active or passive beamforming independently based on its partial observation without referring to others.Numeral results demonstrate that the proposed deep reinforcement learning(DRL)approach could not only obtain a preferable CSE of legitimate users and a low detection of probability(LPD)of warden,but also alleviate the communication overhead and simplify the IRSs deployment. 展开更多
关键词 covert communications deep reinforcement learning intelligent reflecting surface
下载PDF
Age of Information for Short-Packet Covert Communication with Time Modulated Retrodirective Array
6
作者 Ma Yue Ma Ruiqian +4 位作者 Lin Zhi Yang Weiwei Cai Yueming Miao Chen Wu Wen 《China Communications》 SCIE CSCD 2024年第4期23-37,共15页
In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retro... In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retrodirective array(TMRDA).Specifically,the TMRDA is designed to maximize the antenna gain in the target direction while the side lobe is sufficiently suppressed.On this basis,the covertness constraint and CAoI are derived in closed form.To facilitate the covert transmission design,the transmit power and block-length are jointly optimized to minimize the CAoI,which demonstrates the trade-off between covertness and timelessness.Our results illustrate that there exists an optimal block-length that yields the minimum CAoI,and the presented optimization results can achieve enhanced performance compared with the fixed block-length case.Additionally,we observe that smaller beam pointing error at Bob leads to improvements in CAoI. 展开更多
关键词 age of information covert communication retrodirective array time modulation
下载PDF
Deep Learning for Covert Communication
7
作者 Shen Weiguo Chen Jiepeng +4 位作者 Zheng Shilian Zhang Luxin Pei Zhangbin Lu Weidang Yang Xiaoniu 《China Communications》 SCIE CSCD 2024年第9期40-59,共20页
In recent years,deep learning has been gradually used in communication physical layer receivers and has achieved excellent performance.In this paper,we employ deep learning to establish covert communication systems,en... In recent years,deep learning has been gradually used in communication physical layer receivers and has achieved excellent performance.In this paper,we employ deep learning to establish covert communication systems,enabling the transmission of signals through high-power signals present in the prevailing environment while maintaining covertness,and propose a convolutional neural network(CNN)based model for covert communication receivers,namely Deep CCR.This model leverages CNN to execute the signal separation and recovery tasks commonly performed by traditional receivers.It enables the direct recovery of covert information from the received signal.The simulation results show that the proposed Deep CCR exhibits significant advantages in bit error rate(BER)compared to traditional receivers in the face of noise and multipath fading.We verify the covert performance of the covert method proposed in this paper using the maximum-minimum eigenvalue ratio-based method and the frequency domain entropy-based method.The results indicate that this method has excellent covert performance.We also evaluate the mutual influence between covert signals and opportunity signals,indicating that using opportunity signals as cover can cause certain performance losses to covert signals.When the interference-tosignal power ratio(ISR)is large,the impact of covert signals on opportunity signals is minimal. 展开更多
关键词 convolutional neural network covert communication deep learning
下载PDF
Covert LEO Satellite Communication Aided by Generative Adversarial Network Based Cooperative UAV Jamming
8
作者 Shi Jia Li Xiaomeng +2 位作者 Liao Xiaomin Tie Zhuangzhuang Hu Junfan 《China Communications》 SCIE CSCD 2024年第9期27-39,共13页
In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LE... In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained. 展开更多
关键词 covert communication generative adversarial network LEO satellite UAV jammer
下载PDF
Gamma Approximation Based Multi-Antenna Covert Communication Detection
9
作者 Wan Pengwu Chen Dongrui +2 位作者 Wang Danyang Hui Xi Peng Kang 《China Communications》 SCIE CSCD 2024年第9期90-97,共8页
Covert communication technology makes wireless communication more secure,but it also provides more opportunities for illegal users to transmit harmful information.In order to detect the illegal covert communication of... Covert communication technology makes wireless communication more secure,but it also provides more opportunities for illegal users to transmit harmful information.In order to detect the illegal covert communication of the lawbreakers in real time for subsequent processing,this paper proposes a Gamma approximation-based detection method for multi-antenna covert communication systems.Specifically,the Gamma approximation property is used to calculate the miss detection rate and false alarm rate of the monitor firstly.Then the optimization problem to minimize the sum of the missed detection rate and the false alarm rate is proposed.The optimal detection threshold and the minimum error detection probability are solved according to the properties of the Lambert W function.Finally,simulation results are given to demonstrate the effectiveness of the proposed method. 展开更多
关键词 covert communication dETECTION Gamma approximation Lambert W function multi-antenna technique
下载PDF
Intelligent Reflecting Surface-Aided Secure and Covert Communications
10
作者 Zhou Xiaobo Jiang Yong +2 位作者 Xia Tingting Xia Guiyang Shen Tong 《China Communications》 SCIE CSCD 2024年第9期1-10,共10页
This work employs intelligent reflecting surface(IRS)to enhance secure and covert communication performance.We formulate an optimization problem to jointly design both the reflection beamformer at IRS and transmit pow... This work employs intelligent reflecting surface(IRS)to enhance secure and covert communication performance.We formulate an optimization problem to jointly design both the reflection beamformer at IRS and transmit power at transmitter Alice in order to optimize the achievable secrecy rate at Bob subject to a covertness constraint.We first develop a Dinkelbach-based algorithm to achieve an upper bound performance and a high-quality solution.For reducing the overhead and computational complexity of the Dinkelbach-based scheme,we further conceive a low-complexity algorithm in which analytical expression for the IRS reflection beamforming is derived at each iteration.Examination result shows that the devised low-complexity algorithm is able to achieve similar secrecy rate performance as the Dinkelbach-based algorithm.Our examination also shows that introducing an IRS into the considered system can significantly improve the secure and covert communication performance relative to the scheme without IRS. 展开更多
关键词 covert communications intelligent reflecting surface physical layer security reflection beamforming
下载PDF
Delta Compression Correction Method for Covert Communication in IoT
11
作者 Hu Zhijuan Liu Shuangyu +2 位作者 Xu Fei Liu Liqiang Li Guiping 《China Communications》 SCIE CSCD 2024年第9期60-74,共15页
Covert communication can conceal the existence of wireless transmission and thus has the ability to address information security transfer issue in many applications of the booming Internet of Things(IoT).However,the p... Covert communication can conceal the existence of wireless transmission and thus has the ability to address information security transfer issue in many applications of the booming Internet of Things(IoT).However,the proliferation of sensing devices has generated massive amounts of data,which has increased the burden of covert communication.Considering the spatiotemporal correlation of data collection causing redundancy between data,eliminating duplicate data before transmission is beneficial for shortening transmission time,reducing the average received signal power of warden,and ultimately realizing covert communication.In this paper,we propose to apply delta compression technology in the gateway to reduce the amount of data generated by IoT devices,and then sent it to the cloud server.To this end,a cost model and evaluation method that is closer to the actual storage mode of computer systems is been constructed.Based on which,the delta version sequence obtained by existing delta compression algorithms is no longer compact,manifested by the still high cost.In this situation,we designed the correction scheme based on instructions merging(CSIM)correction to save costs by merging instructions.Firstly,the delta version sequence is divided into five categories and corresponding merge rules were derived.Then,for any COPY/ADD class delta compression algorithm,merge according to strict to relaxed to selection rules while generating instructions.Finally,a more cost-effective delta version sequence can be gained.The experimental results on random data show that the delta version sequences output by the CSIM corrected 1.5-pass and greedy algorithms have better performance in cost reducing. 展开更多
关键词 correction method covert communica-tion delta compression Internet of Things(IoT)
下载PDF
Space/Air Covert Communications:Potentials,Scenarios,and Key Technologies
12
作者 Mao Haobin Liu Yanming +5 位作者 Zhu Lipeng Mao Tianqi Xiao Zhenyu Zhang Rui Han Zhu Xia Xianggen 《China Communications》 SCIE CSCD 2024年第3期1-18,共18页
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel... Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation. 展开更多
关键词 artificial intelligence(AI) sixth generation(6G) space-air-ground integrated networks(SAGINs) space/air covert communications
下载PDF
良性阵发性位置性眩晕患者维生素D状态及影响因素研究 被引量:2
13
作者 任媛媛 李金兰 +2 位作者 王彦君 刘茉 夏菲 《中国耳鼻咽喉颅底外科杂志》 CAS CSCD 2024年第1期60-64,共5页
目的 了解北京地区良性阵发性位置性眩晕(BPPV)患者维生素D水平状况,探讨性别、年龄、季节对维生素D水平的影响。方法 将2018年10月—2021年9月就诊于首都医科大学附属北京朝阳医院耳鼻咽喉头颈外科的208例BPPV患者作为研究对象进行回... 目的 了解北京地区良性阵发性位置性眩晕(BPPV)患者维生素D水平状况,探讨性别、年龄、季节对维生素D水平的影响。方法 将2018年10月—2021年9月就诊于首都医科大学附属北京朝阳医院耳鼻咽喉头颈外科的208例BPPV患者作为研究对象进行回顾性研究。结果 所有BPPV患者血清25-羟维生素D[25(OH)D]水平为15.31(10.68, 21.03)ng/mL。比较不同性别、年龄和各个季节血清25(OH)D水平,男性高于女性,61~70岁年龄组高于其他年龄组;夏季血清25(OH)D水平最高,夏秋季明显高于冬春季。所有纳入研究的BPPV患者维生素D缺乏146例(70.19%);维生素D不足41例(19.71%);维生素D充足21例(10.10%)。回归分析显示性别、年龄和季节均能影响维生素D水平。结论 北京地区BPPV患者维生素D缺乏较为普遍,性别、年龄和季节对维生素D水平有影响。 展开更多
关键词 良性阵发性位置性眩晕 维生素d 性别 年龄 季节
下载PDF
糖调节受损患者血清25(OH)D和免疫相关因子对亚临床动脉粥样硬化影响的研究 被引量:1
14
作者 王晓梅 金涛 +2 位作者 王霞 俞淑静 费大东 《中国免疫学杂志》 CAS CSCD 北大核心 2024年第3期604-609,共6页
目的:研究糖调节受损患者血清25(OH)D和免疫相关因子对亚临床动脉粥样硬化(AS)的影响。方法:选取2019年12月至2021年4月枣庄市立医院收治的142例糖调节受损患者,根据经颈动脉超声检查和臂踝脉搏波传导速度分组,仅糖调节受损患者为对照组... 目的:研究糖调节受损患者血清25(OH)D和免疫相关因子对亚临床动脉粥样硬化(AS)的影响。方法:选取2019年12月至2021年4月枣庄市立医院收治的142例糖调节受损患者,根据经颈动脉超声检查和臂踝脉搏波传导速度分组,仅糖调节受损患者为对照组(n=86),并发亚临床AS为观察组(n=56)。比较两组患者血清25(OH)D和免疫因子,应用颈动脉超声检测测定颈动脉内中膜厚度,Pearson法测定血清颈动脉内中膜厚度与血清25(OH)D和免疫因子的相关性。采集基线资料和血液学指标,单因素和多因素Logistic回归分析确定亚临床AS的影响因素,应用ROC曲线评估血清25(OH)D和免疫因子对亚临床AS的诊断效能。结果:观察组患者血清25(OH)D[(24.01±4.87)mmol/L vs 3(0.74±5.01)mmol/L,t=7.909,P=0.000)明显低于对照组,观察组患者TNF-α[(48.32±8.02)ng/L vs(33.21±9.00)ng/L,t=10.199,P=0.000)和IL-6[(41.22±9.43)ng/L vs(30.21±7.01)ng/L,t=7.492,P=0.000)明显高于对照组。颈动脉内中膜厚度与血清25(OH)D呈负相关(r=-0.428,P<0.001),颈动脉内中膜厚度与血清TNF-α和IL-6呈正相关(r=0.574,0.577,P<0.001)。Logistic回归分析结果表明,血清25(OH)D(OR=0.520,95%CI:0.401~0.675)、血清TNF-α(OR=1.667,95%CI:1.131~2.457)和血清IL-6(OR=1.478,95%CI:1.213~1.802)等是亚临床AS发生的影响因素。ROC曲线结果显示,血清25(OH)D最佳截断值为28.32 mmol/L,其对应的敏感度为69.64%,特异度为70.93%,AUC为0.803(95%CI:0.749~0.855);血清TNF-α临界值为40.56 ng/L,其对应的敏感度为71.43%,特异度为72.09%,AUC为0.761(95%CI:0.717~0.823);血清IL-6截断值为36.13 ng/L,其对应的敏感度为60.71%,特异度为60.47%,AUC为0.627(95%CI:0.566~0.702);回归分析对应的敏感度为85.71%,特异度为81.40%,AUC为0.889(95%CI:0.830~0.915)。结论:血清25(OH)D与免疫相关因子单独和联合回归检测可有效预测亚临床AS的发生,上述指标与颈动脉内中膜厚度相关,且血清25(OH)D和免疫相关因子是亚临床AS发生的预测指标,临床宜根据指标进行针对性干预,值得进一步研究。 展开更多
关键词 糖调节受损 25-羟基维生素d 免疫因子 动脉粥样硬化
下载PDF
老年血液透析病人衰弱与血清瘦素及25-羟维生素D的相关性研究 被引量:1
15
作者 朱蓓 杭乐佳 +2 位作者 高飞 袁海川 赵卫红 《实用老年医学》 CAS 2024年第6期603-606,共4页
目的探究老年血液透析病人血清瘦素及25-羟维生素D[25(OH)D]水平,并分析其与透析病人衰弱的相关性。方法选取2021年4月至2023年4月我院收治的150例老年血液透析病人,依据Fried表型评价病人的衰弱情况,分为非衰弱组(51例),衰弱前期组(74... 目的探究老年血液透析病人血清瘦素及25-羟维生素D[25(OH)D]水平,并分析其与透析病人衰弱的相关性。方法选取2021年4月至2023年4月我院收治的150例老年血液透析病人,依据Fried表型评价病人的衰弱情况,分为非衰弱组(51例),衰弱前期组(74例)和衰弱组(25例)。比较3组一般资料、血清瘦素、25(OH)D及心功能。采用多因素Logistic回归分析老年血液透析病人衰弱的影响因素。结果3组年龄、糖尿病比例、透析龄、左室舒张末期内径,以及白蛋白、镁、IL-6、瘦素、25(OH)D水平比较,差异均有统计学意义(P<0.01)。多因素有序Logistic回归分析显示,年龄、透析龄、糖尿病、镁、IL-6、白蛋白、瘦素、25(OH)D、左室舒张末期内径是老年血液透析病人衰弱的独立影响因素(P<0.05)。结论针对白蛋白水平低、瘦素水平高、25(OH)D水平低的老年血液透析病人采取积极干预措施,有利于延缓衰弱的进展。 展开更多
关键词 瘦素 25-羟维生素d 血液透析 衰弱 心功能
下载PDF
桂东北D/C界线沉积特征及对台盆相间演化的启示 被引量:1
16
作者 吴亮君 王璞珺 +11 位作者 吴继文 韦盛亮 户景松 吕勇 潘明 周嘉铭 林宇 廖家飞 韦伟 韦艾辰 李喜林 苏光样 《地质学报》 EI CAS CSCD 北大核心 2024年第4期1244-1262,共19页
台盆相间是桂东北泥盆纪和石炭纪沉积的重要特色,而D/C界线又是台盆相间沉积最突出的一个时段之一。文章回顾并评述了桂东北D/C界线的研究历程、相序划分、主要代表剖面,认为桂东北D/C界线可划分为碎屑岩相序和碳酸盐岩相序以及它们的... 台盆相间是桂东北泥盆纪和石炭纪沉积的重要特色,而D/C界线又是台盆相间沉积最突出的一个时段之一。文章回顾并评述了桂东北D/C界线的研究历程、相序划分、主要代表剖面,认为桂东北D/C界线可划分为碎屑岩相序和碳酸盐岩相序以及它们的过渡类型。通过对20条典型剖面的岩性组合特征对比,恢复了桂东北D/C界线海平面相对下降期的岩相古地理,结果显示桂东北在该时期主要存在柳州、桂林两大台地以及多个小型台地,台地间普遍发育快速相变的台沟、盆地沉积,石炭纪初期海水变浅,台地分布范围显著扩大,江南古陆供给增强,台盆相间格局迅速发展。为了进一步探讨桂东北D/C界线的演化过程和背后的控制因素,文章分析了广西整体的台盆相间演化的阶段性、同沉积构造作用以及海平面变化的影响,梳理了台盆相间演化过程中沉积环境分异与构造运动-海平面的关系,认为在滇黔桂裂谷盆地在持续断陷发展的前提下,桂东北D/C界线沉积分异的主要原因可能是受冈瓦纳大陆冰川形成与消融导致的海平面异常波动,以及柳江运动引发的局部同沉积断陷强度差异变动影响,且构造和沉积要素在D/C界线的耦合作用达到最强,最终促进桂东北台盆相间格局在D/C界线达到鼎盛。在此模式下,可以将台盆相间的演化划分为4个阶段,早泥盆世中期—晚期为台盆相间格局的孕育期,早泥盆世晚期—中泥盆世晚期沉积开始分异,为台盆相间格局的发展期,晩泥盆世—早石炭世台-盆出现强烈分割,海平面异常下降和柳江运动同时作用于沉积,为台盆相间格局的鼎盛期,早石炭世之后,台盆相间沉积维持了一定时期的强度,晚石炭世开始海水逐步恢复正常后台盆相间逐渐减弱,为台盆相间格局的衰退期。 展开更多
关键词 台盆相间 d/C界线 桂东北 广西 泥盆纪 石炭纪 古地理 柳江运动
下载PDF
二甲双胍联合维生素D对糖尿病合并骨质疏松症患者血清胰岛素样生长因子1及骨代谢标志物水平的影响 被引量:2
17
作者 董娟 李悦芃 +2 位作者 张任飞 赵籥陶 邱蕾 《中国医药》 2024年第2期226-230,共5页
目的 探讨二甲双胍联合维生素D对糖尿病合并骨质疏松症患者血清胰岛素样生长因子1(IGF-1)及骨代谢标志物水平的影响。方法 选取北京医院2020年3月至2023年3月收治的160例2型糖尿病(T_(2)DM)合并骨质疏松症患者作为研究对象,按照随机数... 目的 探讨二甲双胍联合维生素D对糖尿病合并骨质疏松症患者血清胰岛素样生长因子1(IGF-1)及骨代谢标志物水平的影响。方法 选取北京医院2020年3月至2023年3月收治的160例2型糖尿病(T_(2)DM)合并骨质疏松症患者作为研究对象,按照随机数字表法分为对照组和观察组,各80例。对照组给予维生素D联合运动干预和控制饮食等常规血糖控制方法治疗,观察组在上述治疗的基础上外加二甲双胍治疗,2组均治疗6个月。比较2组患者治疗前后空腹血糖、餐后2 h血糖(2 hPG)、糖化血红蛋白(HbA1c)、血钙、血磷、骨钙素、总Ⅰ型胶原氨基端延长肽(T-PⅠNP)、IGF-1、高敏C反应蛋白(hs-CRP)、维生素D_(3)水平以及总有效率。结果 治疗后,2组空腹血糖、2 hPG、HbA1c、血磷、hs-CRP水平均低于治疗前,且观察组均低于对照组(均P<0.05);2组血钙、骨钙素、T-PⅠNP、骨密度、IGF-1、维生素D_(3)水平均高于治疗前、且观察组均高于对照组[(2.82±0.20)mmol/L比(2.40±0.15)mmol/L、(19.9±2.4)ng/L比(13.6±2.1)ng/L、(48±4)μg/L比(37±4)μg/L、(0.98±0.16)g/cm^(2)比(0.78±0.15)g/cm^(2)、(206±35)μg/L比(137±25)μg/L、(37±3)μg/L比(29±3)μg/L](均P<0.05)。观察组总有效率高于对照组(P<0.001)。结论 二甲双胍联合维生素D治疗T_(2)DM合并骨质疏松症效果较好,可更好地控制血糖水平,上调血清IGF-1水平,改善机体骨代谢。 展开更多
关键词 糖尿病 二甲双胍 维生素d 骨质疏松症 胰岛素样生长因子1
下载PDF
维生素D与肥胖相互作用的网络药理学研究 被引量:1
18
作者 孙娟 陈洁文 +3 位作者 张海峰 唐雯 刘希鹏 赵安达 《中国食物与营养》 2024年第4期65-67,共3页
目的:通过网络药理学探讨维生素D与肥胖的相关性,并探索影响维生素D与肥胖共同作用靶点的核心蛋白。方法:通过进入西药数据库(DrugBank数据库)检索Vitamin D的相关靶点;通过DisGeNET数据库检索Obesity的相关靶点;利用Venny平台对成分靶... 目的:通过网络药理学探讨维生素D与肥胖的相关性,并探索影响维生素D与肥胖共同作用靶点的核心蛋白。方法:通过进入西药数据库(DrugBank数据库)检索Vitamin D的相关靶点;通过DisGeNET数据库检索Obesity的相关靶点;利用Venny平台对成分靶点和疾病靶点取交集;将共有靶点导入String构建蛋白-蛋白相互作用(PPI)网络;对药物疾病靶点做蛋白-蛋白互作网络图,并筛选蛋白与蛋白之间互相作用的核心蛋白。结果:共得Vitamin D药物靶点2个;得到肥胖疾病靶点共2821个,取交集得到Vitamin D药物靶点及肥胖疾病靶点1个(VDR);对药物疾病靶点做蛋白-蛋白互作网络图,影响VDR作用的主要蛋白有GC、CYP27B1、MED1、EP300、RXRA、NCOA3、SMAD3、CTNNB1。结论:维生素D可能通过作用于VDR靶点发挥抗肥胖的作用。GC、CYP27B1、MED1、EP300、RXRA、NCOA3、SMAD3、CTNNB1蛋白可以与VDR相互作用,从而影响维生素D与肥胖共同作用靶点的核心蛋白。 展开更多
关键词 维生素d 肥胖 作用机制 网络药理学
下载PDF
维生素D联合右佐匹克隆治疗老年慢阻肺合并睡眠障碍疗效及对认知功能的保护作用研究 被引量:3
19
作者 古力巴克然木·阿布拉 阿布都萨拉木·阿布拉 马瑞 《临床肺科杂志》 2024年第2期216-221,共6页
目的探讨维生素D联合右佐匹克隆治疗老年慢阻肺合并睡眠障碍疗效及对认知功能的保护作用。方法收集140例老年慢阻肺合并睡眠障碍患者作为研究对象,随机分为对照组和研究组,每组70例。对照组给予右佐匹克隆治疗,研究组给予维生素D联合右... 目的探讨维生素D联合右佐匹克隆治疗老年慢阻肺合并睡眠障碍疗效及对认知功能的保护作用。方法收集140例老年慢阻肺合并睡眠障碍患者作为研究对象,随机分为对照组和研究组,每组70例。对照组给予右佐匹克隆治疗,研究组给予维生素D联合右佐匹克隆治疗。采用匹茨堡睡眠质量指数(PSQI)评估睡眠质量。采用简易精神状态量表(MMSE)和蒙特利尔认知评估量表(MoCA)评估认知功能。比较两组睡眠障碍临床疗效、睡眠监测指标、PSQI评分、认知功能和神经营养因子水平。结果研究组睡眠障碍治疗总有效率高于对照组(92.8%vs 80.0%,P<0.05)。睡眠监测指标显示,研究组治疗后总睡眠时间长于对照组[(371.77±27.22)min vs(334.71±28.80 min)],觉醒时间和觉醒次数少于对照组[(32.51±3.89)min vs(46.88±7.32)min,(1.36±0.51)次vs(3.11±0.77)次,P<0.05]。治疗前、治疗后1月和治疗后3月时,不同时间点PSQI评分差异有统计学意义(P<0.05),研究组与对照组PSQI评分变化趋势差异有统计学意义,研究组降低更明显[(15.78±2.02)分vs(15.67±2.05)分,(9.31±2.01)分vs(11.60±2.04)分,(7.60±0.95)分vs(9.40±1.21)分,P<0.05]。研究组治疗后MMSE评分和MoCA评分高于对照组[(28.24±0.92)分vs(26.24±1.53)分,(27.88±1.23)分vs(25.21±1.02)分],脑源性神经生长因子(BDNF)和神经生长因子(NGF)水平高于对照组[(672.29±66.60)pg/mL vs(626.89±55.46)pg/mL,(31.49±5.62)pg/mL vs(23.75±5.18)pg/mL,P<0.05]。结论维生素D联合右佐匹克隆治疗老年慢阻肺合并睡眠障碍疗效良好,而且对认知功能具有一定程度的保护作用。 展开更多
关键词 维生素d 右佐匹克隆 老年 慢阻肺 睡眠障碍 认知功能
下载PDF
社区H型高血压患者药物基因作用靶点多态性分布及叶酸联合维生素D干预效果研究 被引量:1
20
作者 庞爱梅 高伟 +5 位作者 张恒 蒲双双 郭莉莉 范子荣 刘海霞 刘瑞霞 《中国全科医学》 北大核心 2024年第6期704-710,共7页
背景H型高血压严重影响着人们的健康及生活质量,目前临床上治疗高血压主要根据患者症状和临床经验选择药物,降压效果不理想,急需探寻降压药物基因分布的多态性,为高血压患者进行个体化用药指导。目的探讨济南市社区H型高血压药物作用靶... 背景H型高血压严重影响着人们的健康及生活质量,目前临床上治疗高血压主要根据患者症状和临床经验选择药物,降压效果不理想,急需探寻降压药物基因分布的多态性,为高血压患者进行个体化用药指导。目的探讨济南市社区H型高血压药物作用靶点基因多态性分布及叶酸联合维生素D的干预作用,为该地区开展高血压医防融合精准医疗提供参考依据。方法2020年6月—2022年6月随机抽取山东省济南市槐荫区20家街道办事处社区卫生服务中心200例血压控制不佳的高血压患者为研究对象,治疗前首先进行5类常用抗高血压药物[利尿剂、β受体阻滞剂、血管紧张素转化酶抑制剂(ACEI)、钙离子通道抑制剂(CCB)、血管紧张素Ⅱ受体拮抗剂(ARB)]相关高血压个体化用药基因位点的基因多态性检测。将患者随机分为基因导向治疗组(基因组)与基因导向协同叶酸、维生素D治疗组(基因导向组),每组100例。基因组根据检测的高血压基因作用位点的特点调整用药;基因导向组在基因组治疗方案的基础上同时服用叶酸、维生素D。干预初始(M0)、干预3个月(M3)、干预6个月(M6)时采集患者晨间未服用降压药物情况下坐位收缩压和舒张压。记录患者患病情况、不良反应发生情况、脑卒中发生情况,进行基因测序,检测血清同型半胱氨酸(Hcy)浓度。采用Pearson相关性分析或Spearman秩相关分析探究性别、年龄、收缩压、舒张压与Hcy的相关性。结果研究对象性别(r_(s)=-0.463)、收缩压(r=0.181)、舒张压(r=0.188)与Hcy水平有相关性(P<0.05)。5类抗高血压药物基因作用靶点中,与药物代谢酶基因多态性位点相关的分别是CYP3A5(A6986G)、CYP2C9(c.1075A>C)、CYP2D6(c.100C>T),与药物作用靶点敏感性基因多态性位点相关的是ADRB1、ACEI(I/D)、AGTR1、NPPA。基因组A6986G:CYP3A5*1/*1(AA)、ACEI(I/D):D/D、c.100 C>T:CYP2D6*1/*1(CC)患者M3、M6舒张压低于M0,A6986G:CYP3A5a1/a3(AG)、ADRB1 c.1165 G>C:GG、c.1075 A>C:CYP2C9*1/*3(AC)、c.1075 A>C:CYP2C9*3/*3(CC)患者M6舒张压低于M0,A6986G:CYP3A5*3/*3(GG)、ADRB1 c.1165 G>C:CC、ACEI(I/D):I/I、c.1075 A>C:CYP2C9*1/*1(AA)、AGTR1 c.1166 A>C:AA、NPPA T2238C:TT、c.100 C>T:CYP2D6*10/*10(TT)患者M3、M6收缩压、舒张压低于M0,ADRB1 c.1165 G>C:GC、ACEI(I/D):I/D、c.100 C>T:CYP2D6*1/*10(CT)患者M6收缩压低于M0,M3、M6舒张压低于M0,差异有统计学意义(P<0.05)。Hcy水平组间比较结果显示,M3、M6基因导向组Hcy水平低于基因组,差异有统计学意义(P<0.05)。组内比较结果显示,基因组M6 Hcy水平低于M0,基因导向组M3、M6 Hcy水平低于M0,M6 Hcy水平低于M3,差异有统计学意义(P<0.05)。收缩压、舒张压组间比较结果显示,M3、M6基因导向组收缩压、舒张压低于基因组,差异有统计学意义(P<0.05)。组内比较结果显示,基因组、基因导向组M6收缩压、舒张压低于M0,M6收缩压低于M3,差异有统计学意义(P<0.05)。结论社区H型高血压患者中存在高血压药物相关基因多态性的表达差异,个体化用药效果显著;叶酸联合维生素D协同治疗更能显著降低H型高血压水平。 展开更多
关键词 高血压 高同型半胱氨酸血症 H型高血压 基因多态性 叶酸 维生素d
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部