期刊文献+
共找到3,009篇文章
< 1 2 151 >
每页显示 20 50 100
Regulator of G protein signaling 6 mediates exercise-induced recovery of hippocampal neurogenesis,learning,and memory in a mouse model of Alzheimer’s disease
1
作者 Mackenzie M.Spicer Jianqi Yang +5 位作者 Daniel Fu Alison N.DeVore Marisol Lauffer Nilufer S.Atasoy Deniz Atasoy Rory A.Fisher 《Neural Regeneration Research》 SCIE CAS 2025年第10期2969-2981,共13页
Hippocampal neuronal loss causes cognitive dysfunction in Alzheimer’s disease.Adult hippocampal neurogenesis is reduced in patients with Alzheimer’s disease.Exercise stimulates adult hippocampal neurogenesis in rode... Hippocampal neuronal loss causes cognitive dysfunction in Alzheimer’s disease.Adult hippocampal neurogenesis is reduced in patients with Alzheimer’s disease.Exercise stimulates adult hippocampal neurogenesis in rodents and improves memory and slows cognitive decline in patients with Alzheimer’s disease.However,the molecular pathways for exercise-induced adult hippocampal neurogenesis and improved cognition in Alzheimer’s disease are poorly understood.Recently,regulator of G protein signaling 6(RGS6)was identified as the mediator of voluntary running-induced adult hippocampal neurogenesis in mice.Here,we generated novel RGS6fl/fl;APP_(SWE) mice and used retroviral approaches to examine the impact of RGS6 deletion from dentate gyrus neuronal progenitor cells on voluntary running-induced adult hippocampal neurogenesis and cognition in an amyloid-based Alzheimer’s disease mouse model.We found that voluntary running in APP_(SWE) mice restored their hippocampal cognitive impairments to that of control mice.This cognitive rescue was abolished by RGS6 deletion in dentate gyrus neuronal progenitor cells,which also abolished running-mediated increases in adult hippocampal neurogenesis.Adult hippocampal neurogenesis was reduced in sedentary APP_(SWE) mice versus control mice,with basal adult hippocampal neurogenesis reduced by RGS6 deletion in dentate gyrus neural precursor cells.RGS6 was expressed in neurons within the dentate gyrus of patients with Alzheimer’s disease with significant loss of these RGS6-expressing neurons.Thus,RGS6 mediated voluntary running-induced rescue of impaired cognition and adult hippocampal neurogenesis in APP_(SWE) mice,identifying RGS6 in dentate gyrus neural precursor cells as a possible therapeutic target in Alzheimer’s disease. 展开更多
关键词 adult hippocampal neurogenesis Alzheimer’s disease dentate gyrus EXErCISE learning/memory neural precursor cells regulator of g protein signaling 6(rgS6)
下载PDF
LncRNA LBX2-AS1调节miR-873-5p/G6PD轴对胃癌细胞增殖迁移和侵袭的影响
2
作者 王甜甜 温媛 +3 位作者 郭影 叶美红 李振 师振 《河北医学》 CAS 2024年第9期1488-1495,共8页
目的:探讨长链非编码RNA(LncRNA)瓢虫同源盒2反义RNA1(LBX2-AS1)调节微小RNA-873-5p(miR-873-5p)/葡萄糖-6-磷酸脱氢酶(G6PD)轴对胃癌(GC)细胞增殖、迁移和侵袭的影响。方法:以SGC7901细胞为研究对象,将其随机分为Control组、sh-NC组、s... 目的:探讨长链非编码RNA(LncRNA)瓢虫同源盒2反义RNA1(LBX2-AS1)调节微小RNA-873-5p(miR-873-5p)/葡萄糖-6-磷酸脱氢酶(G6PD)轴对胃癌(GC)细胞增殖、迁移和侵袭的影响。方法:以SGC7901细胞为研究对象,将其随机分为Control组、sh-NC组、sh-LBX2-AS1组、sh-LBX2-AS1+inhibitor-NC组、sh-LBX2-AS1+miR-873-5p inhibitor组;qRT-PCR法检测LncRNA LBX2-AS1、miR-873-5p、G6PD的表达;MTT法和平板克隆实验检测SGC7901细胞增殖;划痕实验检测SGC7901细胞迁移;Transwell实验检测SGC7901细胞的侵袭;Western blot检测SGC7901细胞中MMP-2、PCNA、MMP-9、G6PD蛋白表达;荧光素酶报告基因实验检测LncRNA LBX2-AS1与miR-873-5p,miR-873-5p与G6PD之间的相互作用;小鼠荷瘤实验验证敲除LncRNALBX2-AS1对CC肿瘤生长及G6PD表达的影响。结果:sh-LBX2-AS1组SGC7901细胞中A490值、克隆数、划痕愈合率、侵袭数、LncRNA LBX2-AS1、G6PD mRNA和PCNA、MMP-2、MMP-9蛋白表达低于sh-NC组、Control组,miR-873-5p表达高于sh-NC组、Control组(P<0.05);与sh-LBX2-AS1组、sh-LBX2-AS1+inhibitor-NC组相比,sh-LBX2-AS+miR-873-5p inhibitor组miR-873-5p表达降低,A490值、克隆数、划痕愈合率、侵袭数、G6PD mRNA和PCNA、MMP-2、MMP-9蛋白表达升高(P<0.05)。LncRNA LBX2-AS1靶向负调控miR-873-5p,miR-873-5p靶向负调控G6PD。实验组移植瘤质量、体积、Ki-67阳性率、G6PD阳性率低于对照组(P<0.05)。结论:敲除LncRNA LBX2-AS1可能抑制GC细胞的增殖、迁移和侵袭,其机制可能是调节miR-873-5p/G6PD轴实现的。 展开更多
关键词 长链非编码rNA 瓢虫同源盒2反义rNA1 微小rNA-873-5p 葡萄糖-6-磷酸脱氢酶(g6PD) 胃癌 增殖 迁移 侵袭
下载PDF
光致电子转移对Rhodamine 6G基态分子结构影响的非共振Raman光谱研究(英文)
3
作者 蒋礼林 《物理化学学报》 SCIE CAS CSCD 北大核心 2014年第11期1987-1992,共6页
基于非共振Raman光谱和量子化学计算,研究了在纯电子给体N,N-二乙基苯胺(DEA)溶剂中Rhodamine 6G(Rh6G+)基态分子结构的变化,这有利于理解该体系中的光致分子间电子转移(PIET).与PIET相耦合的所有振动模式已被确定和指认.结果表明:对应... 基于非共振Raman光谱和量子化学计算,研究了在纯电子给体N,N-二乙基苯胺(DEA)溶剂中Rhodamine 6G(Rh6G+)基态分子结构的变化,这有利于理解该体系中的光致分子间电子转移(PIET).与PIET相耦合的所有振动模式已被确定和指认.结果表明:对应于氧杂蒽环且位于675 cm-1处最主要的振动模式对PIET有着至关重要的贡献;通过与电荷转移复合物(Rh6G/DEA+)的发色团芳香族环的C―C伸展振动模式作比较,C=C伸展振动对PIET的影响更敏感.本文的研究工作能为具有合适电子转移特性的光伏器件中分子结构或溶剂环境的设计提供新颖的观点. 展开更多
关键词 基态分子结构 rhodamine 6g 非共振raman光谱 量子化学计算 光致分子间电子转移
下载PDF
How Graphene Oxide Quenches Fluorescence of Rhodamine 6G 被引量:1
4
作者 樊凯利 郭镇坤 +4 位作者 耿志刚 葛晶 江申龙 胡嘉华 张群 《Chinese Journal of Chemical Physics》 SCIE CAS CSCD 2013年第3期252-258,I0003,共8页
We investigate the fluorescence quenching of Rhodamine 6G (R6G), a well known laser dye with a high fluorescence quantum yield, by as-synthesized graphene oxide (GO) in aqueous solution, which is found to be rathe... We investigate the fluorescence quenching of Rhodamine 6G (R6G), a well known laser dye with a high fluorescence quantum yield, by as-synthesized graphene oxide (GO) in aqueous solution, which is found to be rather efficient. By means of steady-state and time-resolved fluorescence spectroscopy combined with detailed analysis about the linear absorption vari- ation for this R6G-GO system, the pertinent quenching mechanism has been elucidated to be a combination of dynamic and static quenching. Possible ground-state complexes be- tween R6G and GO during the static quenching have also been suggested. Furthermore, the direction of photoindueed electron transfer between R6G and GO has been discussed. 展开更多
关键词 graphene oxide rhodamine 6g Fluorescence quenching INTErACTION Mech-anism
下载PDF
掺杂Rhodamine 6G的平面波导型PMMA聚光器研制
5
作者 李醒 张春梅 +5 位作者 吴魏霞 张翱 罗云鹏 邓锐江 邹成 孟涛 《光谱学与光谱分析》 SCIE EI CAS CSCD 北大核心 2017年第12期3920-3923,共4页
通过聚光波导提高光的转换和收集效率,是提高太阳能电池效率、减少电池用量、降低光伏发电系统成本的重要途径。利用PMMA作为波导基质材料,Rhodamine 6G(罗丹明6G)作为荧光染料,通过涂覆方法,在表面积为50mm×50mm、厚度为5mm的洁净... 通过聚光波导提高光的转换和收集效率,是提高太阳能电池效率、减少电池用量、降低光伏发电系统成本的重要途径。利用PMMA作为波导基质材料,Rhodamine 6G(罗丹明6G)作为荧光染料,通过涂覆方法,在表面积为50mm×50mm、厚度为5mm的洁净PMMA衬底上制备出了荧光层厚度约为32μm的平面波导型聚光器,并研究了荧光染料的掺杂浓度对其聚光比和光伏性能的影响。结果表明,当掺杂浓度为0.250%时,聚光器的聚光比和器件的光伏性能达到了最优,分别为0.45%和0.49%。 展开更多
关键词 rhodamine 6g 聚光器 平面波导
下载PDF
面向6G的RIS辅助通信系统的信道估计技术 被引量:1
6
作者 张力康 杜清河 +1 位作者 卢忱 唐辉 《移动通信》 2024年第6期75-80,共6页
随着对未来6G技术的持续探索,RIS作为潜在的革命性技术之一,已展现出在提高通信系统容量、扩大覆盖范围和降低能耗等多个方面的巨大潜力。在RIS辅助的通信系统中,信道估计是实现RIS技术优势的关键环节之一。首先系统地概述了RIS的技术... 随着对未来6G技术的持续探索,RIS作为潜在的革命性技术之一,已展现出在提高通信系统容量、扩大覆盖范围和降低能耗等多个方面的巨大潜力。在RIS辅助的通信系统中,信道估计是实现RIS技术优势的关键环节之一。首先系统地概述了RIS的技术特点和在现代通信中的应用前景。然后,针对不同应用场景的特点,梳理并归纳了现有的RIS辅助通信场景中的信道估计关键技术,阐明了各研究热点的目标和方法。最后,探讨了RIS辅助通信场景中的信道估计技术在实际应用中所面临的技术挑战。 展开更多
关键词 可重构智能表面 信道估计 6g 无线通信
下载PDF
Simultaneous Determination of Fluorescein, Rhodamine 6G and Rhodamine B in Turbid Solution by Polarization Variable-Angle Synchronous Fluorescence Spectrometry 被引量:2
7
作者 Yao Qun LI Fang QIAN Xian Zhi HUANG(Department of Chemistry and Key Laboratory of Analytical Sciences of the Ministry of Education,Xiamen University, Xiamen 361005) 《Chinese Chemical Letters》 SCIE CAS CSCD 2000年第7期613-614,共2页
Polarization variable-angle synchronous fluorescence spectrometry was proposed to determine samples in turbid solution. A mixture of fluorescein, rhodamine 6G and rhodamine B was used to evaluate the technique. The ba... Polarization variable-angle synchronous fluorescence spectrometry was proposed to determine samples in turbid solution. A mixture of fluorescein, rhodamine 6G and rhodamine B was used to evaluate the technique. The background caused by scattering light was decreased remarkably. The limits of detection were 0.6 ng/ml for fluorescein, 2.3 ng/ml for rhodamine 6G and 4.1 ng/ml for rhodamine B, respectively. 展开更多
关键词 variable-angle synchronous fluorescence POLArIZATION FLUOrESCEIN rhodamine 6g rhodamine B
下载PDF
血清miR-133a、sCD44v6、胃泌素-17在胃癌和癌前病变筛查中的应用及与Hp-IgG表达的关系 被引量:1
8
作者 陈群 陈希 《临床和实验医学杂志》 2024年第4期361-366,共6页
目的 探究血清微小RNA-133a(miR-133a)、可溶性CD44变体6(sCD44v6)和胃泌素-17在胃癌和癌前病变筛查中的应用,并研究其与幽门螺杆菌-免疫球蛋白G(Hp-IgG)表达的关系。方法 回顾性选取2020年1月至2023年1月在重庆市开州区人民医院就诊的... 目的 探究血清微小RNA-133a(miR-133a)、可溶性CD44变体6(sCD44v6)和胃泌素-17在胃癌和癌前病变筛查中的应用,并研究其与幽门螺杆菌-免疫球蛋白G(Hp-IgG)表达的关系。方法 回顾性选取2020年1月至2023年1月在重庆市开州区人民医院就诊的胃癌患者103例(胃癌组)、癌前病变患者112例(癌前病变组)及同期在本院进行体检的健康志愿者100名(对照组)作为本次研究对象。收集各组对象的血清miR-133a、sCD44v6、胃泌素-17水平,并探究其对胃癌及癌前病变筛查的诊断价值。比较癌前病变组及胃癌组患者Hp-IgG检测结果,并分析胃癌组及癌前病变组Hp-IgG阳性率与血清miR-133a、sCD44v6、胃泌素-17水平的相关性。结果 癌前病变组、胃癌组患者血清miR-133a相对表达水平低于对照组,sCD44v6、胃泌素-17水平高于对照组,且胃癌组血清miR-133a相对表达水平低于癌前病变组,sCD44v6、胃泌素-17水平高于癌前病变组,差异均有统计学意义(P<0.05)。血清miR-133a相对表达水平、sCD44v6、胃泌素-17水平诊断癌前病变的曲线下面积(AUC)值分别为0.621、0.932、0.945(P<0.05)。血清miR-133a相对表达水平、sCD44v6、胃泌素-17水平诊断胃癌的AUC值分别为0.864、0.876、0.845(P<0.05)。胃癌组患者的Hp-IgG阳性率为79.61%,高于癌前病变组(41.07%),差异有统计学意义(P<0.05)。癌前病变组患者的Hp-IgG阳性率与血清miR-133a相对表达水平无明显相关性(r=-0.065,P>0.05),与sCD44v6、胃泌素-17水平呈正相关(r=0.404、0.344,P<0.05)。胃癌组患者的Hp-IgG阳性率与血清miR-133a相对表达水平呈负相关(r=-0.693,P<0.05),与sCD44v6、胃泌素-17水平呈正相关(r=0.765、0.766,P<0.05)。结论 在胃癌和癌前病变中,血清miR-133a的相对表达水平较低,而sCD44v6和胃泌素-17的水平较高,且具有一定诊断价值,可用于胃癌和癌前病变的筛查。胃癌患者的Hp-IgG阳性率较高,并且与血清miR-133a呈负相关,与sCD44v6和胃泌素-17呈正相关。在癌前病变患者中,Hp-IgG阳性率与血清miR-133a相对表达水平无明显相关性,但与sCD44v6和胃泌素-17的水平呈正相关,应密切关注Hp-IgG在患者中的表达情况。 展开更多
关键词 微小rNA-133a 可溶性CD44变体6 胃泌素-17 胃癌 癌前病变 幽门螺杆菌-免疫球蛋白g
下载PDF
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments 被引量:1
9
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6g networks noise injection attacks gaussian mixture model Bessel function traffic filter Volterra filter
下载PDF
Satellite Communications with 5G, B5G, and 6G: Challenges and Prospects 被引量:1
10
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2024年第3期31-49,共19页
Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity comm... Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity communication, yet it is not without its challenges. Paramount concerns encompass spectrum allocation, the harmonization of network architectures, and inherent latency issues in satellite transmissions. Potential mitigations, such as dynamic spectrum sharing and the deployment of edge computing, are explored as viable solutions. Looking ahead, the advent of quantum communications within satellite frameworks and the integration of AI spotlight promising research trajectories. These advancements aim to foster a seamless and synergistic coexistence between satellite communications and next-gen mobile networks. 展开更多
关键词 Satellite Communications Spectrum Allocation Edge Computing AI Integration 5g B5g 6g
下载PDF
A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
11
作者 Qusay M.Salih Md.Arafatur Rahman +4 位作者 Ahmad Firdaus Mohammed Rajih Jassim Hasan Kahtan Jasni Mohamad Zain Ahmed Hussein Ali 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2165-2206,共42页
The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubt... The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones.However,the studies about 6G are mainly limited and scattered,whereas no bibliometric study covers the 6G field.Thus,this study aims to review,examine,and summarize existing studies and research activities in 6G.This study has examined the Scopus database through a bibliometric analysis of more than 1,000 papers published between 2017 and 2021.Then,we applied the bibliometric analysis methods by including(1)document type,(2)subject area,(3)author,and(4)country of publication.The study’s results reflect the research 6G community’s trends,highlight important research challenges,and elucidate potential directions for future research in this interesting area. 展开更多
关键词 6g BIBLIOMETrIC wireless networks rEVIEW
下载PDF
Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach
12
作者 Mingxing Zhou Peng Xiao +3 位作者 Qixu Wang Shuhua Ruan Xingshu Chen Menglong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期957-979,共23页
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra... Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss. 展开更多
关键词 6g multi-cloud trusted Infrastructure remote attestation commercial cipher
下载PDF
Digital twin-and extended reality-based telepresence for collaborative robot programming in the 6G perspective
13
作者 Davide Calandra F.Gabriele Pratticò +2 位作者 Alberto Cannavò Claudio Casetti Fabrizio Lamberti 《Digital Communications and Networks》 SCIE CSCD 2024年第2期315-327,共13页
In the context of Industry 4.0,a paradigm shift from traditional industrial manipulators to Collaborative Robots(CRs)is ongoing,with the latter serving ever more closely humans as auxiliary tools in many production pr... In the context of Industry 4.0,a paradigm shift from traditional industrial manipulators to Collaborative Robots(CRs)is ongoing,with the latter serving ever more closely humans as auxiliary tools in many production processes.In this scenario,continuous technological advancements offer new opportunities for further innovating robotics and other areas of next-generation industry.For example,6G could play a prominent role due to its human-centric view of the industrial domains.In particular,its expected dependability features will pave the way for new applications exploiting highly effective Digital Twin(DT)-and eXtended Reality(XR)-based telepresence.In this work,a novel application for the above technologies allowing two distant users to collaborate in the programming of a CR is proposed.The approach encompasses demanding data flows(e.g.,point cloud-based streaming of collaborating users and robotic environment),with network latency and bandwidth constraints.Results obtained by analyzing this approach from the viewpoint of network requirements in a setup designed to emulate 6G connectivity indicate that the expected performance of forthcoming mobile networks will make it fully feasible in principle. 展开更多
关键词 6g Digital twin TELEPrESENCE Collaborative robots Industry 4.0 Augmented reality Virtual reality Point cloud streaming
下载PDF
Intelligent UAV Based Energy Supply for 6G Wireless Powered IoT Networks
14
作者 Miao Jiansong Chen Haoqiang +4 位作者 Wang Pengjie Li Hairui Zhao Yan Mu Junsheng Yan Shi 《China Communications》 SCIE CSCD 2024年第9期321-337,共17页
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with... In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems. 展开更多
关键词 6g wireless powered network energy efficiency IoT intelligent network UAV communication
下载PDF
Physical Layer Security of 6G Vehicular Networks with UAV Systems:First Order Secrecy Metrics,Optimization,and Bounds
15
作者 Sagar Kavaiya Hiren Mewada +3 位作者 Sagarkumar Patel Dharmendra Chauhan Faris A.Almalki Hana Mohammed Mujlid 《Computers, Materials & Continua》 SCIE EI 2024年第9期3685-3711,共27页
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes... The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers. 展开更多
关键词 Physical layer security 3D positioning 6g communications UAV systems
下载PDF
A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images
16
作者 Yuejie Li Shijun Li 《Computers, Materials & Continua》 SCIE EI 2024年第3期3041-3070,共30页
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is... 6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques. 展开更多
关键词 6g technology blockchain end-to-end recognition Chinese characters natural scene computer vision algorithms convolutional neural network
下载PDF
Distributed Application Addressing in 6G Network
17
作者 Liu Jie Chen Sibo +4 位作者 Liu Yuqin Mo Zhiwei Lin Yilin Zhu Hongmei He Yufeng 《China Communications》 SCIE CSCD 2024年第4期193-207,共15页
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development... To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification. 展开更多
关键词 application addressing CNC(Computing&Network Convergence) DNS(Domain Name System) ICN(Information-Centric Network) 6g
下载PDF
米花型银-氮化钛薄膜SERS基底的制备及罗丹明6G的检测研究
18
作者 邸志刚 高建鑫 +4 位作者 贾春荣 周昊 李金鑫 刘花菊 魏恒勇 《红外与激光工程》 EI CSCD 北大核心 2024年第2期159-167,共9页
罗丹明6G的痕量检测需要具有较高的灵敏度,为提高SERS基底的增强因子从而提高检测灵敏度,设计了米花型SERS基底,采用有限元法对其拉曼增强效果进行仿真,模拟不同中心球半径r、米花花瓣轴a、b、c以及中心球与花瓣间距d条件下电场强度的变... 罗丹明6G的痕量检测需要具有较高的灵敏度,为提高SERS基底的增强因子从而提高检测灵敏度,设计了米花型SERS基底,采用有限元法对其拉曼增强效果进行仿真,模拟不同中心球半径r、米花花瓣轴a、b、c以及中心球与花瓣间距d条件下电场强度的变化,得出最佳结构参数,并计算其SERS增强因子。随后利用电化学沉积法制备该基底,并探究电压值以及柠檬酸三钠和AgNO_(3)的浓度配比对基底结构和性能的影响,从而制备出与理想物理模型形态最接近的米花型银/氮化钛薄膜基底。然后用其对罗丹明6G(R6G)进行痕量检测,探究该基底的拉曼增强效果以及稳定性。实验结果表明,当沉积电压为2V,柠檬酸三钠与AgNO_(3)浓度配比为1∶1 (2 mmol/L∶2 mmol/L)时,得到的米花型TiN-Ag复合SERS基底与理想化模型仿真形态最接近。经过计算得到该基底的增强因子可达10^(15),对罗丹明6G的检测限可达10^(-13)mol/L。实验结果证明设计的基底灵敏度高、稳定性强,可对食品非法添加剂的痕量检测提供技术支撑。 展开更多
关键词 表面增强拉曼光谱 米花型结构 氮化钛薄膜 痕量检测 罗丹明6g
下载PDF
SENEX-mediated CDK4/6 inhibition promotes senescence and confers apoptosis resistance in B-cell non-Hodgkin lymphoma
19
作者 JIYU WANG LIUYING YI +3 位作者 KEKE HUANG YANGYANG WANG HUIPING WANG ZHIMIN ZHAI 《BIOCELL》 SCIE 2024年第3期453-462,共10页
Background:The primary cause of treatment failure in patients with refractory or relapsed B-cell non-Hodgkin lymphoma(r/r B-NHL)is resistance to current therapies,and therapy-induced senescence(TIS)stands out as a cru... Background:The primary cause of treatment failure in patients with refractory or relapsed B-cell non-Hodgkin lymphoma(r/r B-NHL)is resistance to current therapies,and therapy-induced senescence(TIS)stands out as a crucial mechanism contributing to tumor drug resistance.Here,we analyzed SENEX/Rho GTPase Activating Protein 18(ARHGAP18)expression and prognostic significance in doxorubicin-induced B-NHL-TIS model and r/r B-NHL patients,investigating its target in B-NHL cell senescence and the effect of combining specific inhibitors on apoptosis resistance in B-NHL-TIS cells.Methods:Raji cells were transfected with the human SENEX shRNA recombinant lentiviral vector(Sh-SENEX)and the empty vector negative(NC)to construct a stable transfection cell line with knockdown of SENEX.Effect of SENEX-silencing on B-NHL-TIS formation,cell function and cell cycle-related pathways was analyzed.Using doxorubicin(DOX)-inducible senescent B-NHL cells combined with the specific cyclin dependent kinase 4/6(CDK4/6)inhibitor Palbociclib to observe that blocking CDK4/6 effects on TIS formation.SENEX expression of 21 B-NHL patients and 8 healthy controls were analyzed by qRT-PCR,and the correlation between its expression and clinical indicators were evaluated.Results:The downregulation of SENEX expression promotes G1-S phase transition and apoptosis while inhibiting cell proliferation,collectively suppressing the formation of TIS in B-NHL.Blockade of CDK4/6 promotes the DOX-induced G1 phase arrest to enhance TIS formation in B-NHL cells which can reverse the regulatory effect of silencing SENEX on B-NHL cell cycle regulation and senescence.The expression levels of SENEX were notably elevated in B-NHL patients compared to healthy controls,and Elevated expression levels of SENEX were associated with poor prognosis of B-NHL patients.Conclusions:SENEX enhances apoptosis resistance in B-NHL by inhibiting CDK4/6,thereby preventing G1-S phase transition and promoting TIS formation. 展开更多
关键词 SENEX B-cell non-Hodgkin lymphoma CDK4/6 g1-S phase transition Therapy-induced senescence Apoptosis resistance
下载PDF
Design Framework of Unsourced Multiple Access for 6G Massive IoT
20
作者 Chunlin Yan Siying Lyu +2 位作者 Sen Wang Yuhong Huang Xiaodong Xu 《China Communications》 SCIE CSCD 2024年第1期1-12,共12页
In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical s... In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access(SIDMA)module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing. 展开更多
关键词 channel coding compressed sensing massive Internet-of-Things(IoT) sparse interleaverdivision multiple access(SIDMA) the sixth generation(6g)mobile communications unsourced multiple access
下载PDF
上一页 1 2 151 下一页 到第
使用帮助 返回顶部