期刊文献+
共找到915,050篇文章
< 1 2 250 >
每页显示 20 50 100
A cloud model target damage effectiveness assessment algorithm based on spatio-temporal sequence finite multilayer fragments dispersion
1
作者 Hanshan Li Xiaoqian Zhang Junchai Gao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第10期48-64,共17页
To solve the problem of target damage assessment when fragments attack target under uncertain projectile and target intersection in an air defense intercept,this paper proposes a method for calculating target damage p... To solve the problem of target damage assessment when fragments attack target under uncertain projectile and target intersection in an air defense intercept,this paper proposes a method for calculating target damage probability leveraging spatio-temporal finite multilayer fragments distribution and the target damage assessment algorithm based on cloud model theory.Drawing on the spatial dispersion characteristics of fragments of projectile proximity explosion,we divide into a finite number of fragments distribution planes based on the time series in space,set up a fragment layer dispersion model grounded in the time series and intersection criterion for determining the effective penetration of each layer of fragments into the target.Building on the precondition that the multilayer fragments of the time series effectively assail the target,we also establish the damage criterion of the perforation and penetration damage and deduce the damage probability calculation model.Taking the damage probability of the fragment layer in the spatio-temporal sequence to the target as the input state variable,we introduce cloud model theory to research the target damage assessment method.Combining the equivalent simulation experiment,the scientific and rational nature of the proposed method were validated through quantitative calculations and comparative analysis. 展开更多
关键词 Target damage cloud model Fragments dispersion Effectiveness assessment Spatio-temporal sequence
下载PDF
Risk assessment of high-speed railway CTC system based on improved game theory and cloud model
2
作者 Yanhao Sun Tao Zhang +2 位作者 Shuxin Ding Zhiming Yuan Shengliang Yang 《Railway Sciences》 2024年第3期388-410,共23页
Purpose-In order to solve the problem of inaccurate calculation of index weights,subjectivity and uncertainty of index assessment in the risk assessment process,this study aims to propose a scientific and reasonable c... Purpose-In order to solve the problem of inaccurate calculation of index weights,subjectivity and uncertainty of index assessment in the risk assessment process,this study aims to propose a scientific and reasonable centralized traffic control(CTC)system risk assessment method.Design/methodologylapproach-First,system-theoretic process analysis(STPA)is used to conduct risk analysis on the CTC system and constructs risk assessment indexes based on this analysis.Then,to enhance the accuracy of weight calculation,the fuzzy analytical hierarchy process(FAHP),fuzzy decision-making trial and evaluation laboratory(FDEMATEL)and entropy weight method are employed to calculate the subjective weight,relative weight and objective weight of each index.These three types of weights are combined using game theory to obtain the combined weight for each index.To reduce subjectivity and uncertainty in the assessment process,the backward cloud generator method is utilized to obtain the numerical character(NC)of the cloud model for each index.The NCs of the indexes are then weighted to derive the comprehensive cloud for risk assessment of the CTC system.This cloud model is used to obtain the CTC system's comprehensive risk assessment.The model's similarity measurement method gauges the likeness between the comprehensive risk assessment cloud and the risk standard cloud.Finally,this process yields the risk assessment results for the CTC system.Findings-The cloud model can handle the subjectivity and fuzziness in the risk assessment process well.The cloud model-based risk assessment method was applied to the CTC system risk assessment of a railway group and achieved good results.Originality/value-This study provides a cloud model-based method for risk assessment of CTC systems,which accurately calculates the weight of risk indexes and uses cloud models to reduce uncertainty and subjectivity in the assessment,achieving effective risk assessment of CTC systems.It can provide a reference and theoretical basis for risk management of the CTC system. 展开更多
关键词 High-speed railway Centralized traffic control Risk assessment Game theory cloud model Paper type Research paper
下载PDF
The Cloud Model for Climate Change
3
作者 Michael Nelson David B. Nelson 《International Journal of Geosciences》 CAS 2024年第5期366-395,共30页
In 1995, the Intergovernmental Panel on Climate Change (IPCC) released a thermodynamic model based on the Greenhouse Effect, aiming to forecast global temperatures. This study delves into the intricacies of that model... In 1995, the Intergovernmental Panel on Climate Change (IPCC) released a thermodynamic model based on the Greenhouse Effect, aiming to forecast global temperatures. This study delves into the intricacies of that model. Some interesting observations are revealed. The IPCC model equated average temperatures with average energy fluxes, which can cause significant errors. The model assumed that all energy fluxes remained constant, and the Earth emitted infrared radiation as if it were a blackbody. Neither of those conditions exists. The IPCC’s definition of Climate Change only includes events caused by human actions, excluding most causes. Satellite data aimed at the tops of clouds may have inferred a high Greenhouse Gas absorption flux. The model showed more energy coming from the atmosphere than absorbed from the sun, which may have caused a violation of the First and Second Laws of Thermodynamics. There were unexpectedly large gaps in the satellite data that aligned with various absorption bands of Greenhouse Gases, possibly caused by photon scattering associated with re-emissions. Based on science, we developed a cloud-based climate model that complied with the Radiation Laws and the First and Second Laws of Thermodynamics. The Cloud Model showed that 81.3% of the outgoing reflected and infrared radiation was applicable to the clouds and water vapor. In comparison, the involvement of CO<sub>2</sub> was only 0.04%, making it too minuscule to measure reliably. 展开更多
关键词 Climate Change Greenhouse Gas CO2 cloudS model THERMODYNAMICS
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
4
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 cloud DATA Information model Data Storage cloud Computing Security System Data Encryption
下载PDF
Research on BIM Model Reshaping Method Based on 3D Point Cloud Recognition
5
作者 SHI Jin-yu YU Xian-feng +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第4期125-135,共11页
In view of the limitations of traditional measurement methods in the field of building information,such as complex operation,low timeliness and poor accuracy,a new way of combining three-dimensional scanning technolog... In view of the limitations of traditional measurement methods in the field of building information,such as complex operation,low timeliness and poor accuracy,a new way of combining three-dimensional scanning technology and BIM(Building Information Modeling)model was discussed.Focused on the efficient acquisition of building geometric information using the fast-developing 3D point cloud technology,an improved deep learning-based 3D point cloud recognition method was proposed.The method optimised the network structure based on RandLA-Net to adapt to the large-scale point cloud processing requirements,while the semantic and instance features of the point cloud were integrated to significantly improve the recognition accuracy and provide a precise basis for BIM model remodeling.In addition,a visual BIM model generation system was developed,which systematically transformed the point cloud recognition results into BIM component parameters,automatically constructed BIM models,and promoted the open sharing and secondary development of models.The research results not only effectively promote the automation process of converting 3D point cloud data to refined BIM models,but also provide important technical support for promoting building informatisation and accelerating the construction of smart cities,showing a wide range of application potential and practical value. 展开更多
关键词 3D point cloud RandLA-Net network BIM model OSG engine
下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
6
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security ALGORITHMS HEURISTICS
下载PDF
A Model of Cloud-Based Enterprise Resource Planning (ERP) for Small and Medium Enterprise
7
作者 Mohammad Jahangir Alam Shoman Das Sharma Tanjia Chowdhury 《Journal of Computer and Communications》 2024年第10期37-50,共14页
Cloud Computing is an uprising technology in the rapid growing IT world. The adaptation of cloud computing is increasing in very large scale business organizations to small institutions rapidly due to many advanced fe... Cloud Computing is an uprising technology in the rapid growing IT world. The adaptation of cloud computing is increasing in very large scale business organizations to small institutions rapidly due to many advanced features of cloud computing, such as SaaS, PaaS and IaaS service models. So, nowadays, many organizations are trying to implement Cloud Computing based ERP system to enjoy the benefits of cloud computing. To implement any ERP system, an organization usually faces many challenges. As a result, this research has introduced how easily this cloud system can be implemented in an organization. By using this ERP system, an organization can be benefited in many ways;especially Small and Medium Enterprises (SMEs) can enjoy the highest possible benefits from this system. 展开更多
关键词 cloud Computing cloud Comparison cloud models Enterprise Resource planning (ERP) Small and Medium Enterprise (SME)
下载PDF
Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance
8
作者 Linghong Kuang Wenlong Shi Jing Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第8期3193-3219,共27页
The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers.Howe... The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers.However,with the advancement of information and communication technology,new security and privacy challenges have emerged for AMI.To address these challenges and enhance the security and privacy of user data in the smart grid,a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance(HPPM-AMICFA)is proposed in this paper.The proposed model integrates cloud and fog computing with hierarchical threshold encryption,offering a flexible and efficient privacy protection solution that significantly enhances data security in the smart grid.The methodology involves setting user protection levels by processing missing data and utilizing fuzzy comprehensive analysis to evaluate user importance,thereby assigning appropriate protection levels.Furthermore,a hierarchical threshold encryption algorithm is developed to provide differentiated protection strategies for fog nodes based on user IDs,ensuring secure aggregation and encryption of user data.Experimental results demonstrate that HPPM-AMICFA effectively resists various attack strategies while minimizing time costs,thereby safeguarding user data in the smart grid. 展开更多
关键词 AMI cloud and fog assistance fuzzy comprehensive analysis hierarchical threshold encryption
下载PDF
An Agent Based Model for Ransomware Detection and Mitigation in a Cloud System
9
作者 N’golo Konate Tenan Yeo 《Journal of Information Security》 2024年第4期419-432,共14页
The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud se... The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets. 展开更多
关键词 cloud Computing Information Security Multi-Agent System IAAS Malware Propagation
下载PDF
Nucleation of Supercooled Water by Neutrons: Latitude Dependence and Implications for Cloud Modelling
10
作者 Peter W. Wilson Elizabeth Wilson-Park Abraham G. Wilson 《Atmospheric and Climate Sciences》 2024年第2期221-232,共12页
It has recently been shown that incident particles, neutrons, can initiate the freezing in a supercooled water volume. This new finding may have ramifications for the interpretation of both experimental data on the nu... It has recently been shown that incident particles, neutrons, can initiate the freezing in a supercooled water volume. This new finding may have ramifications for the interpretation of both experimental data on the nucleation of laboratory samples of supercooled water and perhaps more importantly on the interpretation of ice nucleation involved in cloud physics. For example, if some fraction of the cloud nucleation previously attributed to dust, soot, or aerosols has been caused by cosmogenic neutrons, fresh consideration is required in the context of climate models. Moreover, as cosmogenic neutrons, most being muon-induced, have much greater flux at high latitudes, estimates of ice nucleates in these regions may be larger than required to accurately model cloud and condensation properties. This discrepancy has been pointed out in IPCC reports. Our paper discusses the connection between the new concept of neutrons nucleating supercooled water and the need for a new source of nucleation in high latitude clouds, ideally causing others to review current data, or to analyse future data with this idea in mind. . 展开更多
关键词 Climate models Ice Nucleation Neutrons SUPERCOOLING
下载PDF
A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment
11
作者 Chanhyeong Cho Byeori Kim +1 位作者 Haehyun Cho Taek-Young Youn 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期813-834,共22页
With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly increased.However,traditional collaboration tools primarily rely on access control,leaving data stored on cloud... With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly increased.However,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulnerable due to insufficient encryption.This paper introduces a novel mechanism that encrypts data in‘bundle’units,designed to meet the dual requirements of efficiency and security for frequently updated collaborative data.Each bundle includes updated information,allowing only the updated portions to be reencrypted when changes occur.The encryption method proposed in this paper addresses the inefficiencies of traditional encryption modes,such as Cipher Block Chaining(CBC)and Counter(CTR),which require decrypting and re-encrypting the entire dataset whenever updates occur.The proposed method leverages update-specific information embedded within data bundles and metadata that maps the relationship between these bundles and the plaintext data.By utilizing this information,the method accurately identifies the modified portions and applies algorithms to selectively re-encrypt only those sections.This approach significantly enhances the efficiency of data updates while maintaining high performance,particularly in large-scale data environments.To validate this approach,we conducted experiments measuring execution time as both the size of the modified data and the total dataset size varied.Results show that the proposed method significantly outperforms CBC and CTR modes in execution speed,with greater performance gains as data size increases.Additionally,our security evaluation confirms that this method provides robust protection against both passive and active attacks. 展开更多
关键词 cloud collaboration mode of operation data update efficiency
下载PDF
Comparative analysis of empirical and deep learning models for ionospheric sporadic E layer prediction
12
作者 BingKun Yu PengHao Tian +6 位作者 XiangHui Xue Christopher JScott HaiLun Ye JianFei Wu Wen Yi TingDi Chen XianKang Dou 《Earth and Planetary Physics》 EI CAS 2025年第1期10-19,共10页
Sporadic E(Es)layers in the ionosphere are characterized by intense plasma irregularities in the E region at altitudes of 90-130 km.Because they can significantly influence radio communications and navigation systems,... Sporadic E(Es)layers in the ionosphere are characterized by intense plasma irregularities in the E region at altitudes of 90-130 km.Because they can significantly influence radio communications and navigation systems,accurate forecasting of Es layers is crucial for ensuring the precision and dependability of navigation satellite systems.In this study,we present Es predictions made by an empirical model and by a deep learning model,and analyze their differences comprehensively by comparing the model predictions to satellite RO measurements and ground-based ionosonde observations.The deep learning model exhibited significantly better performance,as indicated by its high coefficient of correlation(r=0.87)with RO observations and predictions,than did the empirical model(r=0.53).This study highlights the importance of integrating artificial intelligence technology into ionosphere modelling generally,and into predicting Es layer occurrences and characteristics,in particular. 展开更多
关键词 ionospheric sporadic E layer radio occultation ionosondes numerical model deep learning model artificial intelligence
下载PDF
Aquaporin-4-IgG-seropositive neuromyelitis optica spectrum disorders:progress of experimental models based on disease pathogenesis
13
作者 Li Xu Huiming Xu Changyong Tang 《Neural Regeneration Research》 SCIE CAS 2025年第2期354-365,共12页
Neuromyelitis optica spectrum disorders are neuroinflammatory demyelinating disorders that lead to permanent visual loss and motor dysfunction.To date,no effective treatment exists as the exact causative mechanism rem... Neuromyelitis optica spectrum disorders are neuroinflammatory demyelinating disorders that lead to permanent visual loss and motor dysfunction.To date,no effective treatment exists as the exact causative mechanism remains unknown.Therefore,experimental models of neuromyelitis optica spectrum disorders are essential for exploring its pathogenesis and in screening for therapeutic targets.Since most patients with neuromyelitis optica spectrum disorders are seropositive for IgG autoantibodies against aquaporin-4,which is highly expressed on the membrane of astrocyte endfeet,most current experimental models are based on aquaporin-4-IgG that initially targets astrocytes.These experimental models have successfully simulated many pathological features of neuromyelitis optica spectrum disorders,such as aquaporin-4 loss,astrocytopathy,granulocyte and macrophage infiltration,complement activation,demyelination,and neuronal loss;however,they do not fully capture the pathological process of human neuromyelitis optica spectrum disorders.In this review,we summarize the currently known pathogenic mechanisms and the development of associated experimental models in vitro,ex vivo,and in vivo for neuromyelitis optica spectrum disorders,suggest potential pathogenic mechanisms for further investigation,and provide guidance on experimental model choices.In addition,this review summarizes the latest information on pathologies and therapies for neuromyelitis optica spectrum disorders based on experimental models of aquaporin-4-IgG-seropositive neuromyelitis optica spectrum disorders,offering further therapeutic targets and a theoretical basis for clinical trials. 展开更多
关键词 AQUAPORIN-4 experimental model neuromyelitis optica spectrum disorder PATHOGENESIS
下载PDF
Solar flare forecasting based on a Fusion Model
14
作者 YiYang Li ShiYong Huang +4 位作者 SiBo Xu ZhiGang Yuan Kui Jiang QiYang Xiong RenTong Lin 《Earth and Planetary Physics》 EI CAS 2025年第1期171-181,共11页
Solar flare prediction is an important subject in the field of space weather.Deep learning technology has greatly promoted the development of this subject.In this study,we propose a novel solar flare forecasting model... Solar flare prediction is an important subject in the field of space weather.Deep learning technology has greatly promoted the development of this subject.In this study,we propose a novel solar flare forecasting model integrating Deep Residual Network(ResNet)and Support Vector Machine(SVM)for both≥C-class(C,M,and X classes)and≥M-class(M and X classes)flares.We collected samples of magnetograms from May 1,2010 to September 13,2018 from Space-weather Helioseismic and Magnetic Imager(HMI)Active Region Patches and then used a cross-validation method to obtain seven independent data sets.We then utilized five metrics to evaluate our fusion model,based on intermediate-output extracted by ResNet and SVM using the Gaussian kernel function.Our results show that the primary metric true skill statistics(TSS)achieves a value of 0.708±0.027 for≥C-class prediction,and of 0.758±0.042 for≥M-class prediction;these values indicate that our approach performs significantly better than those of previous studies.The metrics of our fusion model’s performance on the seven datasets indicate that the model is quite stable and robust,suggesting that fusion models that integrate an excellent baseline network with SVM can achieve improved performance in solar flare prediction.Besides,we also discuss the performance impact of architectural innovation in our fusion model. 展开更多
关键词 solar flare pace weather deep learning Fusion model
下载PDF
Landslide Susceptibility Mapping Using RBFN-Based Ensemble Machine Learning Models
15
作者 Landslide Susceptibility Mapping Using RBFN-Based Ensemble Machine Learning Models Duc-Dam Nguyen Nguyen Viet Tiep +5 位作者 Quynh-Anh Thi Bui Hiep Van Le Indra Prakash Romulus Costache Manish Pandey Binh Thai Pham 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期467-500,共34页
This study was aimed to prepare landslide susceptibility maps for the Pithoragarh district in Uttarakhand,India,using advanced ensemble models that combined Radial Basis Function Networks(RBFN)with three ensemble lear... This study was aimed to prepare landslide susceptibility maps for the Pithoragarh district in Uttarakhand,India,using advanced ensemble models that combined Radial Basis Function Networks(RBFN)with three ensemble learning techniques:DAGGING(DG),MULTIBOOST(MB),and ADABOOST(AB).This combination resulted in three distinct ensemble models:DG-RBFN,MB-RBFN,and AB-RBFN.Additionally,a traditional weighted method,Information Value(IV),and a benchmark machine learning(ML)model,Multilayer Perceptron Neural Network(MLP),were employed for comparison and validation.The models were developed using ten landslide conditioning factors,which included slope,aspect,elevation,curvature,land cover,geomorphology,overburden depth,lithology,distance to rivers and distance to roads.These factors were instrumental in predicting the output variable,which was the probability of landslide occurrence.Statistical analysis of the models’performance indicated that the DG-RBFN model,with an Area Under ROC Curve(AUC)of 0.931,outperformed the other models.The AB-RBFN model achieved an AUC of 0.929,the MB-RBFN model had an AUC of 0.913,and the MLP model recorded an AUC of 0.926.These results suggest that the advanced ensemble ML model DG-RBFN was more accurate than traditional statistical model,single MLP model,and other ensemble models in preparing trustworthy landslide susceptibility maps,thereby enhancing land use planning and decision-making. 展开更多
关键词 Landslide susceptibility map spatial analysis ensemble modelling information values(IV)
下载PDF
Global Piecewise Analysis of HIV Model with Bi-Infectious Categories under Ordinary Derivative and Non-Singular Operator with Neural Network Approach
16
作者 Ghaliah Alhamzi Badr Saad TAlkahtani +1 位作者 Ravi Shanker Dubey Mati ur Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期609-633,共25页
This study directs the discussion of HIV disease with a novel kind of complex dynamical generalized and piecewise operator in the sense of classical and Atangana Baleanu(AB)derivatives having arbitrary order.The HIV i... This study directs the discussion of HIV disease with a novel kind of complex dynamical generalized and piecewise operator in the sense of classical and Atangana Baleanu(AB)derivatives having arbitrary order.The HIV infection model has a susceptible class,a recovered class,along with a case of infection divided into three sub-different levels or categories and the recovered class.The total time interval is converted into two,which are further investigated for ordinary and fractional order operators of the AB derivative,respectively.The proposed model is tested separately for unique solutions and existence on bi intervals.The numerical solution of the proposed model is treated by the piece-wise numerical iterative scheme of Newtons Polynomial.The proposed method is established for piece-wise derivatives under natural order and non-singular Mittag-Leffler Law.The cross-over or bending characteristics in the dynamical system of HIV are easily examined by the aspect of this research having a memory effect for controlling the said disease.This study uses the neural network(NN)technique to obtain a better set of weights with low residual errors,and the epochs number is considered 1000.The obtained figures represent the approximate solution and absolute error which are tested with NN to train the data accurately. 展开更多
关键词 HIV infection model qualitative scheme approximate solution piecewise global operator neural network
下载PDF
Prognostic model for esophagogastric variceal rebleeding after endoscopic treatment in liver cirrhosis: A Chinese multicenter study
17
作者 Jun-Yi Zhan Jie Chen +7 位作者 Jin-Zhong Yu Fei-Peng Xu Fei-Fei Xing De-Xin Wang Ming-Yan Yang Feng Xing Jian Wang Yong-Ping Mu 《World Journal of Gastroenterology》 SCIE CAS 2025年第2期85-101,共17页
BACKGROUND Rebleeding after recovery from esophagogastric variceal bleeding(EGVB)is a severe complication that is associated with high rates of both incidence and mortality.Despite its clinical importance,recognized p... BACKGROUND Rebleeding after recovery from esophagogastric variceal bleeding(EGVB)is a severe complication that is associated with high rates of both incidence and mortality.Despite its clinical importance,recognized prognostic models that can effectively predict esophagogastric variceal rebleeding in patients with liver cirrhosis are lacking.AIM To construct and externally validate a reliable prognostic model for predicting the occurrence of esophagogastric variceal rebleeding.METHODS This study included 477 EGVB patients across 2 cohorts:The derivation cohort(n=322)and the validation cohort(n=155).The primary outcome was rebleeding events within 1 year.The least absolute shrinkage and selection operator was applied for predictor selection,and multivariate Cox regression analysis was used to construct the prognostic model.Internal validation was performed with bootstrap resampling.We assessed the discrimination,calibration and accuracy of the model,and performed patient risk stratification.RESULTS Six predictors,including albumin and aspartate aminotransferase concentrations,white blood cell count,and the presence of ascites,portal vein thrombosis,and bleeding signs,were selected for the rebleeding event prediction following endoscopic treatment(REPET)model.In predicting rebleeding within 1 year,the REPET model ex-hibited a concordance index of 0.775 and a Brier score of 0.143 in the derivation cohort,alongside 0.862 and 0.127 in the validation cohort.Furthermore,the REPET model revealed a significant difference in rebleeding rates(P<0.01)between low-risk patients and intermediate-to high-risk patients in both cohorts.CONCLUSION We constructed and validated a new prognostic model for variceal rebleeding with excellent predictive per-formance,which will improve the clinical management of rebleeding in EGVB patients. 展开更多
关键词 Esophagogastric variceal bleeding Variceal rebleeding Liver cirrhosis Prognostic model Risk stratification Secondary prophylaxis
下载PDF
Exploiting fly models to investigate rare human neurological disorders
18
作者 Tomomi Tanaka Hyung-Lok Chung 《Neural Regeneration Research》 SCIE CAS 2025年第1期21-28,共8页
Rare neurological diseases,while individually are rare,collectively impact millions globally,leading to diverse and often severe neurological symptoms.Often attributed to genetic mutations that disrupt protein functio... Rare neurological diseases,while individually are rare,collectively impact millions globally,leading to diverse and often severe neurological symptoms.Often attributed to genetic mutations that disrupt protein function or structure,understanding their genetic basis is crucial for accurate diagnosis and targeted therapies.To investigate the underlying pathogenesis of these conditions,researchers often use non-mammalian model organisms,such as Drosophila(fruit flies),which is valued for their genetic manipulability,cost-efficiency,and preservation of genes and biological functions across evolutionary time.Genetic tools available in Drosophila,including CRISPR-Cas9,offer a means to manipulate gene expression,allowing for a deep exploration of the genetic underpinnings of rare neurological diseases.Drosophila boasts a versatile genetic toolkit,rapid generation turnover,and ease of large-scale experimentation,making it an invaluable resource for identifying potential drug candidates.Researchers can expose flies carrying disease-associated mutations to various compounds,rapidly pinpointing promising therapeutic agents for further investigation in mammalian models and,ultimately,clinical trials.In this comprehensive review,we explore rare neurological diseases where fly research has significantly contributed to our understanding of their genetic basis,pathophysiology,and potential therapeutic implications.We discuss rare diseases associated with both neuron-expressed and glial-expressed genes.Specific cases include mutations in CDK19 resulting in epilepsy and developmental delay,mutations in TIAM1 leading to a neurodevelopmental disorder with seizures and language delay,and mutations in IRF2BPL causing seizures,a neurodevelopmental disorder with regression,loss of speech,and abnormal movements.And we explore mutations in EMC1 related to cerebellar atrophy,visual impairment,psychomotor retardation,and gain-of-function mutations in ACOX1 causing Mitchell syndrome.Loss-of-function mutations in ACOX1 result in ACOX1 deficiency,characterized by very-long-chain fatty acid accumulation and glial degeneration.Notably,this review highlights how modeling these diseases in Drosophila has provided valuable insights into their pathophysiology,offering a platform for the rapid identification of potential therapeutic interventions.Rare neurological diseases involve a wide range of expression systems,and sometimes common phenotypes can be found among different genes that cause abnormalities in neurons or glia.Furthermore,mutations within the same gene may result in varying functional outcomes,such as complete loss of function,partial loss of function,or gain-of-function mutations.The phenotypes observed in patients can differ significantly,underscoring the complexity of these conditions.In conclusion,Drosophila represents an indispensable and cost-effective tool for investigating rare neurological diseases.By facilitating the modeling of these conditions,Drosophila contributes to a deeper understanding of their genetic basis,pathophysiology,and potential therapies.This approach accelerates the discovery of promising drug candidates,ultimately benefiting patients affected by these complex and understudied diseases. 展开更多
关键词 ACOX1 Drosophila melanogaster GLIA lipid metabolism model organisms NEUROINFLAMMATION neurologic disorders NEURON rare disease VLCFA
下载PDF
A promising approach for quantifying focal stroke modeling and assessing stroke progression:optical resolution photoacoustic microscopy photothrombosis
19
作者 Xiao Liang Xingping Quan +6 位作者 Xiaorui Geng Yujing Huang Yonghua Zhao Lei Xi Zhen Yuan Ping Wang Bin Liu 《Neural Regeneration Research》 SCIE CAS 2025年第7期2029-2037,共9页
To investigate the mechanisms underlying the onset and progression of ischemic stroke,some methods have been proposed that can simultaneously monitor and create embolisms in the animal cerebral cortex.However,these me... To investigate the mechanisms underlying the onset and progression of ischemic stroke,some methods have been proposed that can simultaneously monitor and create embolisms in the animal cerebral cortex.However,these methods often require complex systems and the effect of age on cerebral embolism has not been adequately studied,although ischemic stroke is strongly age-related.In this study,we propose an optical-resolution photoacoustic microscopy-based visualized photothrombosis methodology to create and monitor ischemic stroke in mice simultaneously using a 532 nm pulsed laser.We observed the molding process in mice of different ages and presented age-dependent vascular embolism differentiation.Moreover,we integrated optical coherence tomography angiography to investigate age-associated trends in cerebrovascular variability following a stroke.Our imaging data and quantitative analyses underscore the differential cerebrovascular responses to stroke in mice of different ages,thereby highlighting the technique's potential for evaluating cerebrovascular health and unraveling age-related mechanisms involved in ischemic strokes. 展开更多
关键词 AGE-DEPENDENT cerebral cortex ischemic stroke mouse model optical coherence tomography angiography photoacoustic microscopy PHOTOTHROMBOSIS vascular imaging
下载PDF
Vertical gradients of neutral winds observed by ICON and estimated by the Horizontal Wind Model during the geomagnetic storm on August 26−28,2021
20
作者 JiaWei Wu Chao Xiong +1 位作者 YuYang Huang YunLiang Zhou 《Earth and Planetary Physics》 EI CAS 2025年第1期69-80,共12页
The Michelson Interferometer for Global High-resolution Thermospheric Imaging(MIGHTI)onboard the Ionospheric Connection Explorer(ICON)satellite offers the opportunity to investigate the altitude profile of thermospher... The Michelson Interferometer for Global High-resolution Thermospheric Imaging(MIGHTI)onboard the Ionospheric Connection Explorer(ICON)satellite offers the opportunity to investigate the altitude profile of thermospheric winds.In this study,we used the red-line measurements of MIGHTI to compare with the results estimated by Horizontal Wind Model 14(HWM14).The data selected included both the geomagnetic quiet period(December 2019 to August 2022)and the geomagnetic storm on August 26-28,2021.During the geomagnetic quiet period,the estimations of neutral winds from HWM14 showed relatively good agreement with the observations from ICON.According to the ICON observations,near the equator,zonal winds reverse from westward to eastward at around 06:00 local time(LT)at higher altitudes,and the stronger westward winds appear at later LTs at lower altitudes.At around 16:00 LT,eastward winds at 300 km reverse to westward,and vertical gradients of zonal winds similar to those at sunrise hours can be observed.In the middle latitudes,zonal winds reverse about 2-4 h earlier.Meridional winds vary more significantly than zonal winds with seasonal and latitudinal variations.According to the ICON observations,in the northern low latitudes,vertical reversals of meridional winds are found at 08:00-13:00 LT from 300 to 160 km and at around 18:00 LT from 300 to 200 km during the June solstice.Similar reversals of meridional winds are found at 04:00-07:00 LT from 300 to 160 km and at 22:00-02:00 LT from 270 to 200 km during the December solstice.In the southern low latitudes,meridional wind reversals occur at 08:00-11:00 LT from 200 to 160 km and at 21:00-02:00 LT from 300 to 200 km during the June solstice.During the December solstice,reversals of the meridional wind appear at 20:00-01:00 LT below 200 km and at 06:00-11:00 LT from 300 to 160 km.In the northern middle latitudes,the northward winds are dominant at 08:00-14:00 LT at 230 km during the June solstice.Northward winds persist until 16:00 LT at 160 and 300 km.During the December solstice,the northward winds are dominant from 06:00 to 21:00 LT.The vertical variations in neutral winds during the geomagnetic storm on August 26-28 were analyzed in detail.Both meridional and zonal winds during the active geomagnetic period observed by ICON show distinguishable vertical shear structures at different stages of the storm.On the dayside,during the main phase,the peak velocities of westward winds extend from a higher altitude to a lower altitude,whereas during the recovery phase,the peak velocities of the westward winds extend from lower altitudes to higher altitudes.The velocities of the southward winds are stronger at lower altitudes during the storm.These vertical structures of horizontal winds during the storm could not be reproduced by the HWM14 wind estimations,and the overall response to the storm of the horizontal winds in the low and middle latitudes is underestimated by HWM14.The ICON observations provide a good dataset for improving the HWM wind estimations in the middle and upper atmosphere,especially the vertical variations. 展开更多
关键词 horizontal neutral winds vertical gradients Ionospheric Connection Explorer satellite Horizontal Wind model 14 geomagnetic storm
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部