期刊文献+
共找到347,164篇文章
< 1 2 250 >
每页显示 20 50 100
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
1
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Influence of initial check, information exchange, final accuracy check, reaction information nursing on the psychology of elderly with lung cancer 被引量:2
2
作者 Cui Jiang Jing Ma +1 位作者 Wen He Hai-Ying Zhang 《World Journal of Clinical Cases》 SCIE 2024年第4期737-745,共9页
BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychologi... BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities. 展开更多
关键词 Initial check information exchange final accuracy check reaction information care model Lung cancer Mental health
下载PDF
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence 被引量:1
3
作者 Xiong Zhang Minqing Zhang +3 位作者 Xu AnWang Wen Jiang Chao Jiang Pan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期1925-1938,共14页
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe... This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information. 展开更多
关键词 information hiding neural style transfer ROBUSTNESS
下载PDF
Silent information regulator sirtuin 1 ameliorates acute liver failure via the p53/glutathione peroxidase 4/gasdermin D axis 被引量:6
4
作者 Xing-Nian Zhou Quan Zhang +6 位作者 Hong Peng Yu-Jie Qin Yu-Hong Liu Lu Wang Ming-Liang Cheng Xin-Hua Luo Hong Li 《World Journal of Gastroenterology》 SCIE CAS 2024年第11期1588-1608,共21页
BACKGROUND Acute liver failure(ALF)has a high mortality with widespread hepatocyte death involving ferroptosis and pyroptosis.The silent information regulator sirtuin 1(SIRT1)-mediated deacetylation affects multiple b... BACKGROUND Acute liver failure(ALF)has a high mortality with widespread hepatocyte death involving ferroptosis and pyroptosis.The silent information regulator sirtuin 1(SIRT1)-mediated deacetylation affects multiple biological processes,including cellular senescence,apoptosis,sugar and lipid metabolism,oxidative stress,and inflammation.AIM To investigate the association between ferroptosis and pyroptosis and the upstream regulatory mechanisms.METHODS This study included 30 patients with ALF and 30 healthy individuals who underwent serum alanine aminotransferase(ALT)and aspartate aminotransferase(AST)testing.C57BL/6 mice were also intraperitoneally pretreated with SIRT1,p53,or glutathione peroxidase 4(GPX4)inducers and inhibitors and injected with lipopolysaccharide(LPS)/D-galactosamine(D-GalN)to induce ALF.Gasdermin D(GSDMD)^(-/-)mice were used as an experimental group.Histological changes in liver tissue were monitored by hematoxylin and eosin staining.ALT,AST,glutathione,reactive oxygen species,and iron levels were measured using commercial kits.Ferroptosis-and pyroptosis-related protein and mRNA expression was detected by western blot and quantitative real-time polymerase chain reaction.SIRT1,p53,and GSDMD were assessed by immunofluorescence analysis.RESULTS Serum AST and ALT levels were elevated in patients with ALF.SIRT1,solute carrier family 7a member 11(SLC7A11),and GPX4 protein expression was decreased and acetylated p5,p53,GSDMD,and acyl-CoA synthetase long-chain family member 4(ACSL4)protein levels were elevated in human ALF liver tissue.In the p53 and ferroptosis inhibitor-treated and GSDMD^(-/-)groups,serum interleukin(IL)-1β,tumour necrosis factor alpha,IL-6,IL-2 and C-C motif ligand 2 levels were decreased and hepatic impairment was mitigated.In mice with GSDMD knockout,p53 was reduced,GPX4 was increased,and ferroptotic events(depletion of SLC7A11,elevation of ACSL4,and iron accumulation)were detected.In vitro,knockdown of p53 and overexpression of GPX4 reduced AST and ALT levels,the cytostatic rate,and GSDMD expression,restoring SLC7A11 depletion.Moreover,SIRT1 agonist and overexpression of SIRT1 alleviated acute liver injury and decreased iron deposition compared with results in the model group,accompanied by reduced p53,GSDMD,and ACSL4,and increased SLC7A11 and GPX4.Inactivation of SIRT1 exacerbated ferroptotic and pyroptotic cell death and aggravated liver injury in LPS/D-GalNinduced in vitro and in vivo models.CONCLUSION SIRT1 activation attenuates LPS/D-GalN-induced ferroptosis and pyroptosis by inhibiting the p53/GPX4/GSDMD signaling pathway in ALF. 展开更多
关键词 Silent information regulator sirtuin 1 Ferroptosis PYROPTOSIS p53/glutathione peroxidase 4/gasdermin D Acute liver failure
下载PDF
A framework of force of information influence and application for C4KISR system
5
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
下载PDF
Tuning the diffusion constant to optimize the readout of positional information of spatial concentration patterns
6
作者 江嘉杰 罗春雄 刘峰 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期579-586,共8页
Positional information encoded in spatial concentration patterns is crucial for the development of multicellular organisms.However,it is still unclear how such information is affected by the physically dissipative dif... Positional information encoded in spatial concentration patterns is crucial for the development of multicellular organisms.However,it is still unclear how such information is affected by the physically dissipative diffusion process.Here we study one-dimensional patterning systems with analytical derivation and numerical simulations.We find that the diffusion constant of the patterning molecules exhibits a nonmonotonic effect on the readout of the positional information from the concentration patterns.Specifically,there exists an optimal diffusion constant that maximizes the positional information.Moreover,we find that the energy dissipation due to the physical diffusion imposes a fundamental upper limit on the positional information. 展开更多
关键词 pattern formation positional information mutual information DIFFUSION
下载PDF
Implementation of a New Solution for the Preservation of Anatomical Specimens Made of Non-Toxic Substances
7
作者 Ma Reyes Pichardo-Molinero Samantha Jardon-Xicotencatl +1 位作者 Misael R. Oliver-González Carlos G. García-Tovar 《Open Journal of Veterinary Medicine》 CAS 2024年第3期56-67,共12页
The preservation of anatomical pieces in Veterinary Anatomy is essential since it is not possible to dissect all domestic species. Most techniques use reagents with high levels of toxicity such as formaldehyde. The ob... The preservation of anatomical pieces in Veterinary Anatomy is essential since it is not possible to dissect all domestic species. Most techniques use reagents with high levels of toxicity such as formaldehyde. The objective of this work was to develop a new preservation technique that uses reagents with zero toxicity and that allows obtaining preserved pieces suitable for anatomical studies. The alcohol propylene glycol technique was developed, the method of which uses a fixation step with alcohol, sodium chloride, commercial vinegar and subsequently the impregnation of the preservation solution made from propylene glycol and commercial vinegar, which are non-toxic. As a result of this work, adequately preserved sheep hearts were obtained that preserved their morphology with slight changes in size and weight, which did not affect their external and internal anatomical structure. Its coloration was not substantially affected, remaining a little lighter. The pieces obtained showed flexibility which allowed dissections to be carried out. The time to develop the technique was 20 days. A comparative study was carried out with the phenolated glycerin technique that uses toxic reagents (formaldehyde and phenol) and the pieces obtained with the alcohol propylene glycol technique were of better quality, observing that the pieces with phenolated glycerin tend to darken and are more rigid. And the time to develop the technique is 24 days. In conclusion, a preservation technique for anatomical pieces was developed that allowed the preservation of the organs under study, which allow their use for anatomical studies, and which have been preserved without changes until the time of this publication (8 months) and there are pieces preserved with this technique for 2 years. 展开更多
关键词 Veterinary Anatomy Heart preservation Techniques Alcohol Propylene Glycol Technique FIXATION NECROPSY Toxic Chemicals
下载PDF
Information Conductivity:Universal Performance Measure for Semantic Communications
8
作者 Liang Zijian Niu Kai Zhang Ping 《China Communications》 SCIE CSCD 2024年第7期17-36,共20页
As a novel paradigm,semantic communication provides an effective solution for breaking through the future development dilemma of classical communication systems.However,it remains an unsolved problem of how to measure... As a novel paradigm,semantic communication provides an effective solution for breaking through the future development dilemma of classical communication systems.However,it remains an unsolved problem of how to measure the information transmission capability for a given semantic communication method and subsequently compare it with the classical communication method.In this paper,we first present a review of the semantic communication system,including its system model and the two typical coding and transmission methods for its implementations.To address the unsolved issue of the information transmission capability measure for semantic communication methods,we propose a new universal performance measure called Information Conductivity.We provide the definition and the physical significance to state its effectiveness in representing the information transmission capabilities of the semantic communication systems and present elaborations including its measure methods,degrees of freedom,and progressive analysis.Experimental results in image transmission scenarios validate its practical applicability. 展开更多
关键词 information conductivity information transmission capability semantic communications system model universal performance measure
下载PDF
Dynamic Update Scheme of Spectrum Information Based on Spectrum Opportunity Incentive in the Database-Assisted Dynamic Spectrum Management
9
作者 Zhang Yu Chen Yong +1 位作者 He Panfeng Cai Yueming 《China Communications》 SCIE CSCD 2024年第3期75-90,共16页
To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic upd... To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update. 展开更多
关键词 database-assisted dynamic spectrum management HOTELLING information updating contribution spectrum information updating STACKELBERG
下载PDF
Characterization of Small-Scale Farmers and Assessment of Their Access to Crop Production Information in Selected Counties of Kenya
10
作者 Anastasia Mumbi Wahome John B. K. Kiema +1 位作者 Galcano C. Mulaku Isaac Mukoko 《Agricultural Sciences》 2024年第5期565-589,共25页
Small-scale farming accounts for 78% of total agricultural production in Kenya and contributes to 23.5% of the country’s GDP. Their crop production activities are mostly rainfed subsistence with any surplus being sol... Small-scale farming accounts for 78% of total agricultural production in Kenya and contributes to 23.5% of the country’s GDP. Their crop production activities are mostly rainfed subsistence with any surplus being sold to bring in some income. Timely decisions on farm practices such as farm preparation and planting are critical determinants of the seasonal outcomes. In Kenya, most small-scale farmers have no reliable source of information that would help them make timely and accurate decisions. County governments have extension officers who are mandated with giving farmers advisory services to farmers but they are not able to reach most farmers due to facilitation constraints. The mode and format of sharing information is also critical since it’s important to ensure that it’s timely, well-understood and usable. This study sought to assess access to geospatial derived and other crop production information by farmers in four selected counties of Kenya. Specific objectives were to determine the profile of small-scale farmers in terms of age, education and farm size;to determine the type of information that is made available to them by County and Sub-County extension officers including the format and mode of provision;and to determine if the information provided was useful in terms of accuracy, timeliness and adequacy. The results indicated that over 80% of the farmers were over 35 years of age and over 56% were male. Majority had attained primary education (34%) or secondary education (29%) and most farmers in all the counties grew maize (71%). Notably, fellow farmers were a source of information (71%) with the frequency of sharing information being mostly seasonal (37%) and when information was available (43%). Over 66% of interviewed farmers indicating that they faced challenges while using provided information. The results from the study are insightful and helpful in determining effective ways of providing farmers with useful information to ensure maximum benefits. 展开更多
关键词 Small Scale Farmers FARMERS Crop Production information Services Geospatial information information Access
下载PDF
Extracellular Vesicles from Mesenchymal Stromal Cells (imEVs) Improve Cold Preservation of Isolated Mitochondria
11
作者 Xianpeng Jiang Sergey Rodin +3 位作者 Ken Braesch-Andersen Catherine C. Baucom Karl-Henrik Grinnemo Brent Segal 《Journal of Biosciences and Medicines》 2024年第1期52-63,共12页
Mitochondrial organelle transplantation (MOT) is an innovative strategy for the treatment of mitochondrial dysfunction such as cardiac ischemic reperfusion injuries, Parkinson’s diseases, brain and spinal cord injuri... Mitochondrial organelle transplantation (MOT) is an innovative strategy for the treatment of mitochondrial dysfunction such as cardiac ischemic reperfusion injuries, Parkinson’s diseases, brain and spinal cord injuries, and amyotrophic lateral sclerosis (ALS). However, one of the major challenges for widespread usage is a methodology for preservation of isolated mitochondria. Extracellular vesicles (EVs) are phospholipid bilayer-enclosed vesicles released from cells. EVs carry a cargo of proteins, nucleic acids, lipids, metabolites, and even organelles such as mitochondria. Purpose: To test if EVs enhance the stability of isolated mitochondria. Methods: We mixed isolated mitochondria of fibroblasts with EVs of mesenchymal stromal cells (imEVs) (9:1 in volume) and stored the mixture at 2°C - 6°C for different time periods. We measured morphology, mitochondrial membrane potential (MMP) and mitochondrial ATP content at 0, 2, 5 days. Key findings: After 2 days of storage, the mito-chondria without imEVs lost approximate 70% MMP (RFU: 1822 ± 68), compared to the fresh mitochondria (RFU: 5458 ± 52) (p 0.05). In agreement with MMP, mitochondria without imEVs lost significant mitochondrial ATP content (p 0.05), after 2 days of cold storage, compared to fresh mitochondria. Microscopy showed that imEVs promoted aggregation of isolated mitochondria. Summary: The preliminary data showed that imEVs enhanced the stability of isolated mitochondria in cold storage. 展开更多
关键词 MITOCHONDRIA Extracellular Vesicles Mitochondrial preservation MOT imEVs
下载PDF
The Emergence of Time from Quantum Information Dynamics
12
作者 Logan Nye 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1981-2006,共26页
This paper presents a novel framework for understanding time as an emergent phenomenon arising from quantum information dynamics. We propose that the flow of time and its directional arrow are intrinsically linked to ... This paper presents a novel framework for understanding time as an emergent phenomenon arising from quantum information dynamics. We propose that the flow of time and its directional arrow are intrinsically linked to the growth of quantum complexity and the evolution of entanglement entropy in physical systems. By integrating principles from quantum mechanics, information theory, and holography, we develop a comprehensive theory that explains how time can emerge from timeless quantum processes. Our approach unifies concepts from quantum mechanics, general relativity, and thermodynamics, providing new perspectives on longstanding puzzles such as the black hole information paradox and the arrow of time. We derive modified Friedmann equations that incorporate quantum information measures, offering novel insights into cosmic evolution and the nature of dark energy. The paper presents a series of experimental proposals to test key aspects of this theory, ranging from quantum simulations to cosmological observations. Our framework suggests a deeply information-theoretic view of the universe, challenging our understanding of the nature of reality and opening new avenues for technological applications in quantum computing and sensing. This work contributes to the ongoing quest for a unified theory of quantum gravity and information, potentially with far-reaching implications for our understanding of space, time, and the fundamental structure of the cosmos. 展开更多
关键词 TIME ENTROPY EMERGENCE Black Hole information Paradox Complexity ENTANGLEMENT Quantum information
下载PDF
Influence of tectonic preservation conditions on the nanopore structure of shale reservoir:A case study of Wufeng-Longmaxi Formation shale in western Hubei area,south China
13
作者 Meng Xiang Shang Xu +2 位作者 Ya-Ru Wen Qi-Yang Gou Bing-Chang Liu 《Petroleum Science》 SCIE EI CAS CSCD 2024年第4期2203-2217,共15页
Tectonism is one of the dominant factors affecting the shale pore structure.However,the control of shale pore structure by tectonic movements is still controversial,which limits the research progress of shale gas accu... Tectonism is one of the dominant factors affecting the shale pore structure.However,the control of shale pore structure by tectonic movements is still controversial,which limits the research progress of shale gas accumulation mechanism in the complex tectonic region of southern China.In this study,34 samples were collected from two exploratory wells located in different tectonic locations.Diverse experiments,e.g.,organic geochemistry,XRD analysis,FE-SEM,low-pressure gas adsorption,and high-pressure mercury intrusion,were conducted to fully characterize the shale reservoir.The TOC,Ro,and mineral composition of the shale samples between the two wells are similar,which reflects that the shale samples of the two wells have proximate pores-generating capacity and pores-supporting capacity.However,the pore characteristics of shale samples from two wells are significantly different.Compared with the stabilized zone shale,the porosity,pore volume,and specific surface area of the deformed zone shale were reduced by 60.61%,64.85%,and 27.81%,respectively.Moreover,the macroscopic and fine pores were reduced by 54.01%and 84.95%,respectively.Fault activity and uplift denudation are not conducive to pore preservation,and the rigid basement of Huangling uplift can promote pore preservation.These three factors are important reasons for controlling the difference in pore structure between two wells shales.We established a conceptual model of shale pores evolution under different tectonic preservation conditions.This study is significant to clarify the scale of shale gas formation and enrichment in complex tectonic regions,and helps in the selection of shale sweet spots. 展开更多
关键词 Shale gas Pore structure Tectonic preservation conditions Shale gas enrichment mechanism
下载PDF
Properties of Self-recoverable Mechanoluminescence Phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) and Its Information Encryption Application
14
作者 ZHANG Ting WANG Zhijun +3 位作者 WANG Dawei ZHAO Jinxin YANG Zhiping LI Panlai 《发光学报》 EI CAS CSCD 北大核心 2024年第9期1445-1455,共11页
A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)... A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)∶Eu^(3+)can produce red mechanoluminescence,and importantly,it shows good repeatability.The mechanoluminescence of Ca_(5)Ga_(6)O_(14)∶Eu^(3+) results from the piezoelectric field generated inside the material under stress,rather than the charge carriers stored in the traps,which can be confirmed by the multiple cycles of mechanoluminescence tests and heat treatment tests.The mechanoluminescence color can be turned from red to green by co-doping varied concentrations of Tb^(3+),which may be meaningful for encrypted letter writing.The encryption scheme for secure communication was devised by harnessing mechanoluminescence patterns in diverse shapes and ASCII codes,which shows good encryption performance.The results suggest that the mechanoluminescence phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+),Tb^(3+)may be applied to the optical information encryption. 展开更多
关键词 PHOSPHOR MECHANOLUMINESCENCE self-recoverable information encryption
下载PDF
Apatite Fission Track Thermochronology of Granite from the Xiazhuang Uranium Ore Field,South China:Implications for Exhumation History and Ore Preservation
15
作者 SUN Yue CHEN Zhengle +4 位作者 PAN Jiayong HUO Hailong LI Haidong SUN Junjie XU Guangchun 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2024年第2期430-440,共11页
Xiazhuang uranium ore field,located in the southern part of the Nanling Metallogenic Belt,is considered one of the largest granite-related U regions in South China.In this paper,we contribute new apatite fission track... Xiazhuang uranium ore field,located in the southern part of the Nanling Metallogenic Belt,is considered one of the largest granite-related U regions in South China.In this paper,we contribute new apatite fission track data and thermal history modeling to constrain the exhumation history and evaluate preservation potential of the Xiazhuang Uranium ore field.Nine Triassic outcrop granite samples collected from different locations of Xiazhuang Uranium ore field yield AFT ages ranging from 43 to 24 Ma with similar mean confined fission track lengths ranging from 11.8±2.0 to 12.9±1.9μm and Dpar values between 1.01 and 1.51μm.The robustness time-temperature reconstructions of samples from the hanging wall of Huangpi fault show that the Xiazhuang Uranium ore field experienced a time of monotonous and slow cooling starting from middle Paleocene to middle Miocene(~60-10 Ma),followed by relatively rapid exhumation in the late Miocene(~10-5 Ma)and nearly thermal stability in the Pliocene-Quaternary(~5-0 Ma).The amount of exhumation after U mineralization since the Middle Paleogene was estimated as~4.3±1.8 km according to the integrated thermal history model.Previous studies indicate that the ore-forming ages of U deposits in the Xiazhuang ore field are mainly before Middle Paleocene and the mineralization depths are more than 4.4±1.2 km.Therefore,the exhumation history since middle Paleocene plays important roles in the preservation of the Xiazhuang Uranium ore field. 展开更多
关键词 apatite fission track exhumation history ore preservation Xiazhuang Uranium ore field South China
下载PDF
Exploring the combination of biochar‐amended soil and automated irrigation technology for water regulation and preservation in green infrastructure
16
作者 Honghu Zhu Yuanxu Huang +4 位作者 Haihong Song Jian Chen Songlei Han Tanwee Mazumder Ankit Garg 《Deep Underground Science and Engineering》 2024年第1期39-52,共14页
Biochar is a carbon sink material with the potential to improve water retention in various soils.However,for the long‐term maintenance of green infrastructure,there is an additional need to regulate the water content... Biochar is a carbon sink material with the potential to improve water retention in various soils.However,for the long‐term maintenance of green infrastructure,there is an additional need to regulate the water contents in the covers to maintain vegetation growth in semiarid conditions.In this study,biochar‐amended soil was combined with subsurface drip irrigation,and the water preservation characteristics of this treatment were investigated through a series of one‐dimensional soil column tests.To ascertain the best treatment method specific to semiarid climatic conditions,the test soil was amended with 0%,1%,3%,and 5%biochar.Automatic irrigation devices equipped with soil moisture sensors were used to control the subsurface water content with the aim of enhancing vegetation growth.Each soil column test lasted 150 h,during which the volumetric water contents and soil suction data were recorded.The experimental results reveal that the soil specimen amended with 3%biochar is the most water‐saving regardless of the time cost.Soil with a higher biochar content(e.g.,5%)consumes a more significant amount of water due to the enhancement of the water‐holding capacity.Based on the experimental results,it can be concluded that the appropriate ratio can be determined within 1%–3%,which can reduce not only the amount of irrigated/used water but also the time cost.Such technology can be explored for water content regulation in green infrastructure and the development of barriers for protecting the environment around deep underground waste containment. 展开更多
关键词 BIOCHAR drip irrigation UNDERGROUND water preservation water regulation
下载PDF
Attribute Reduction of Hybrid Decision Information Systems Based on Fuzzy Conditional Information Entropy
17
作者 Xiaoqin Ma Jun Wang +1 位作者 Wenchang Yu Qinli Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2063-2083,共21页
The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr... The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data. 展开更多
关键词 Hybrid decision information systems fuzzy conditional information entropy attribute reduction fuzzy relationship rough set theory(RST)
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
18
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
A Multi-Constraint Path Optimization Scheme Based on Information Fusion in Software Defined Network
19
作者 Jinlin Xu Wansu Pan +3 位作者 Longle Cheng Haibo Tan Munan Yuan Xiaofeng Li 《Computers, Materials & Continua》 SCIE EI 2024年第4期1399-1418,共20页
The existingmultipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is alack of cooperation between the terminal and network sides, making it difficult to achieve dynamic ada... The existingmultipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is alack of cooperation between the terminal and network sides, making it difficult to achieve dynamic adaptationof service requirements and network resources. To address these issues, we propose a multi-constraint pathoptimization scheme based on information fusion in SDN. The proposed scheme collects network topology andnetwork state information on the network side and computes disjoint paths between end hosts. It uses the FuzzyAnalytic Hierarchy Process (FAHP) to calculate the weight coefficients of multiple constrained parameters andconstructs a composite quality evaluation function for the paths to determine the priority of the disjoint paths. TheSDN controller extracts the service attributes by analyzing the packet header and selects the optimal path for flowrule forwarding. Furthermore, the service attributes are fed back to the path composite quality evaluation function,and the path priority is dynamically adjusted to achieve dynamic adaptation between service requirements andnetwork status. By continuously monitoring and analyzing the service attributes, the scheme can ensure optimalrouting decisions in response to varying network conditions and evolving service demands. The experimentalresults demonstrated that the proposed scheme can effectively improve average throughput and link utilizationwhile meeting the Quality of Service (QoS) requirements of various applications. 展开更多
关键词 SDN multi-constraint path information fusion FAHP
下载PDF
The Impact of Health Information Technology on Hospital Performance: A Systematic Integrative Literature Review
20
作者 Alisa Westerhof Cokky Hilhorst Willem Jan Bos 《Health》 2024年第4期257-279,共23页
Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We condu... Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. . 展开更多
关键词 Health information Technology HIT Functionalities Hospital Performance Indicators
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部