期刊文献+
共找到341,367篇文章
< 1 2 250 >
每页显示 20 50 100
Power supply arm protection scheme of high-speed railway based on wide-area current differential
1
作者 Guosong Lin Bin Hong +1 位作者 Zefang Wu Xuguo Fu 《Railway Engineering Science》 2023年第3期281-292,共12页
When fault occurs on cross-coupling autotransformer(AT)power supply traction network,the up-line and down-line feeder circuit breakers in the traction substation trip at the same time without selectivity,which leads t... When fault occurs on cross-coupling autotransformer(AT)power supply traction network,the up-line and down-line feeder circuit breakers in the traction substation trip at the same time without selectivity,which leads to an extended power failure.Based on equivalent circuit and Kirchhoff’s current law,the feeder current characteristic in the substation,AT station and sectioning post when T-R fault,F-R fault,and T-F fault occur are analyzed and their expressions are obtained.When the traction power supply system is equipped with wide-area protection measurement and control system,the feeder protection device in each station collects the feeder currents in other two stations through the wide-area protection channel and a wide-area current differential protection scheme based on the feeder current characteristic is proposed.When a short-circuit fault occurs in the power supply arm,all the feeder protection devices in each station receive the feeder currents with time stamp in other two stations.After data synchronous processing and logic judgment,the fault line of the power supply arm can be identified and isolated quickly.The simulation result based on MATLAB/Simulink shows that the power supply arm protection scheme based on wide-area current differential has good fault discrimination ability under different fault positions,transition resistances,and fault types.The verification of measured data shows that the novel protection scheme will not be affected by the special working conditions of the electrical multiple unit(EMU),and reliability,selectivity,and rapidity of relay protection are all improved. 展开更多
关键词 Cross-coupling AT power supply Wide-area current differential Power supply arm protection Equivalent circuit High-Speed railway
下载PDF
The future of artificial hibernation medicine:protection of nerves and organs after spinal cord injury 被引量:1
2
作者 Caiyun Liu Haixin Yu +4 位作者 Zhengchao Li Shulian Chen Xiaoyin Li Xuyi Chen Bo Chen 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第1期22-28,共7页
Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hi... Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hibernation techniques,mild hypothermia has preliminarily confirmed its clinical effect on spinal cord injury.However,its technical defects and barriers,along with serious clinical side effects,restrict its clinical application for spinal cord injury.Artificial hibernation is a futureoriented disruptive technology for human life support.It involves endogenous hibernation inducers and hibernation-related central neuromodulation that activate particular neurons,reduce the central constant temperature setting point,disrupt the normal constant body temperature,make the body adapt"to the external cold environment,and reduce the physiological resistance to cold stimulation.Thus,studying the artificial hibernation mechanism may help develop new treatment strategies more suitable for clinical use than the cooling method of mild hypothermia technology.This review introduces artificial hibernation technologies,including mild hypothermia technology,hibernation inducers,and hibernation-related central neuromodulation technology.It summarizes the relevant research on hypothermia and hibernation for organ and nerve protection.These studies show that artificial hibernation technologies have therapeutic significance on nerve injury after spinal co rd injury through inflammatory inhibition,immunosuppression,oxidative defense,and possible central protection.It also promotes the repair and protection of res pirato ry and digestive,cardiovascular,locomoto r,urinary,and endocrine systems.This review provides new insights for the clinical treatment of nerve and multiple organ protection after spinal cord injury thanks to artificial hibernation.At present,artificial hibernation technology is not mature,and research fa ces various challenges.Neve rtheless,the effort is wo rthwhile for the future development of medicine. 展开更多
关键词 artificial hibernation central thermostatic-resista nt regulation hypothermia multi-system protection neuroprotection organ protection spinal cord injury synthetic torpor
下载PDF
Remote sensing of air pollution incorporating integrated-path differential-absorption and coherent-Doppler lidar 被引量:1
3
作者 Ze-hou Yang Yong Chen +5 位作者 Chun-li Chen Yong-ke Zhang Ji-hui Dong Tao Peng Xiao-feng Li Ding-fu Zhou 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期594-601,共8页
An innovative complex lidar system deployed on an airborne rotorcraft platform for remote sensing of atmospheric pollution is proposed and demonstrated.The system incorporates integrated-path differential absorption l... An innovative complex lidar system deployed on an airborne rotorcraft platform for remote sensing of atmospheric pollution is proposed and demonstrated.The system incorporates integrated-path differential absorption lidar(DIAL) and coherent-doppler lidar(CDL) techniques using a dual tunable TEA CO_(2)laser in the 9—11 μm band and a 1.55 μm fiber laser.By combining the principles of differential absorption detection and pulsed coherent detection,the system enables agile and remote sensing of atmospheric pollution.Extensive static tests validate the system’s real-time detection capabilities,including the measurement of concentration-path-length product(CL),front distance,and path wind speed of air pollution plumes over long distances exceeding 4 km.Flight experiments is conducted with the helicopter.Scanning of the pollutant concentration and the wind field is carried out in an approximately 1 km slant range over scanning angle ranges from 45°to 65°,with a radial resolution of 30 m and10 s.The test results demonstrate the system’s ability to spatially map atmospheric pollution plumes and predict their motion and dispersion patterns,thereby ensuring the protection of public safety. 展开更多
关键词 differential absorption LIDAR COHERENT Doppler lidar Remoting sensing Atmospheric pollution
下载PDF
Efficient unequal error protection for online fountain codes 被引量:1
4
作者 SHI Pengcheng WANG Zhenyong +1 位作者 LI Dezhi LYU Haibo 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期286-293,共8页
In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in... In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in the completion phase,the weighted-selection strategy is applied to provide low overhead.The performance of the proposed scheme is analyzed and compared with the existing UEP online fountain scheme.Simulation results show that in terms of MIS and the least important symbols(LIS),when the bit error ratio is 10-4,the proposed scheme can achieve 85%and 31.58%overhead reduction,respectively. 展开更多
关键词 online fountain code random graph unequal error protection(UEP) rateless code
下载PDF
Network pharmacology and subsequent experimental validation reveal the synergistic myocardial protection mechanism of Salvia miltiorrhiza Bge.and Carthamus tinctorius L. 被引量:1
5
作者 Linying Zhong Ling Dong +7 位作者 Jing Sun Jie Yang Zhiying Yu Ping He Bo Zhu Yuxin Zhu Siyuan Li Wenjuan Xu 《Journal of Traditional Chinese Medical Sciences》 CAS 2024年第1期44-54,共11页
Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and su... Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and subsequent experimental validation.Methods:Network pharmacology was applied to construct an active ingredient-efficacy target-disease protein network to reveal the unique regulation pattern of s.miltiorrhiza and C.tinctorius as herb pair.Molecular docking was used to verify the binding of the components of these herbs and their potential targets.An H9c2 glucose hypoxia model was used to evaluate the efficacy of the components and their synergistic effects,which were evaluated using the combination index.Western blot was performed to detect the protein expression of these targets.Results:Network pharmacology analysis revealed 5 pathways and 8 core targets of s.miltiorrhiza and C.tinctorius in myocardial protection.Five of the core targets were enriched in the hypoxia-inducible factor-1(HIF-1)signaling pathway.S.miltiorrhiza-C.tinctorius achieved vascular tone mainly by regulating the target genes of the HIF-1 pathway.As an upstream gene of the HIF-1 pathway,STAT3 can be activated by the active ingredients cryptotanshinone(Ctan),salvianolic acid B(Sal.B),and myricetin(Myric).Cell experiments revealed that Myric,Sal.B,and Ctan also exhibited synergistic myocardial protective activity.Molecular docking verified the strong binding of Myric,Sal.B,and Ctan to STAT3.Western blot further showed that the active ingredients synergistically upregulated the protein expressionof STAT3.Conclusion:The pharmacodynamic transmission analysis revealed that the active ingredients of S.miltiorrhiza and C.tinctorius can synergistically resist ischemia through various targets and pathways.This study provides a methodological reference for interpreting traditional Chinese medicine compatibility. 展开更多
关键词 S.miltiorrhiza-C.tinctorius herb pair Compatibilitymechanism Networkpharmacology Multipletargeteffect Myocardial protection
下载PDF
Novel Investigation of Stochastic Fractional Differential Equations Measles Model via the White Noise and Global Derivative Operator Depending on Mittag-Leffler Kernel 被引量:1
6
作者 Saima Rashid Fahd Jarad 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期2289-2327,共39页
Because of the features involved with their varied kernels,differential operators relying on convolution formulations have been acknowledged as effective mathematical resources for modeling real-world issues.In this p... Because of the features involved with their varied kernels,differential operators relying on convolution formulations have been acknowledged as effective mathematical resources for modeling real-world issues.In this paper,we constructed a stochastic fractional framework of measles spreading mechanisms with dual medication immunization considering the exponential decay and Mittag-Leffler kernels.In this approach,the overall population was separated into five cohorts.Furthermore,the descriptive behavior of the system was investigated,including prerequisites for the positivity of solutions,invariant domain of the solution,presence and stability of equilibrium points,and sensitivity analysis.We included a stochastic element in every cohort and employed linear growth and Lipschitz criteria to show the existence and uniqueness of solutions.Several numerical simulations for various fractional orders and randomization intensities are illustrated. 展开更多
关键词 Measles epidemic model Atangana-Baleanu Caputo-Fabrizio differential operators existence and uniqueness qualitative analysis Newton interpolating polynomial
下载PDF
Composite armor philosophy(CAP):Holistic design methodology of multi-layered composite protection systems for armored vehicles
7
作者 Evangelos Ch.Tsirogiannis Foivos Psarommatis +1 位作者 Alexandros Prospathopoulos Georgios Savaidis 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第11期181-197,共17页
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i... A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare. 展开更多
关键词 Passive armor protection Composite armor Ballistic performance protection systems Vehicle protection Armor design
下载PDF
Self-actuating protection mechanisms for safer lithium-ion batteries
8
作者 Yang Luo Chunchun Sang +3 位作者 Kehan Le Hao Chen Hui Li Xinping Ai 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第7期181-198,共18页
Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,whic... Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,which is intrinsically triggered by the overcharging and overheating.To improve the safety of LIBs,various protection strategies based on self-actuating reaction control mechanisms(SRCMs)have been proposed,including redox shuttle,polymerizable monomer additive,potential-sensitive separator,thermal shutdown separator,positive-temperature-coefficient electrode,thermally polymerizable addi-tive,and reversible thermal phase transition electrolyte.As build-in protection mechanisms,these meth-ods can sensitively detect either the temperature change inside battery or the potential change of the electrode,and spontaneously shut down the electrode reaction at risky conditions,thus preventing the battery from going into thermal runaway.Given their advantages in enhancing the intrinsic safety of LIBs,this paper overviews the research progresses of SRCMs after a brief introduction of thermal runaway mechanism and limitations of conventional thermal runaway mitigating measures.More importantly,the current states and issues,key challenges,and future developing trends of SRCTs are also discussed and outlined from the viewpoint of practical application,aiming at providing insights and guidance for developing more effective SRCMs for LIBs. 展开更多
关键词 Li-ion battery SAFETY Thermal runaway Thermal protection Overcharge protection
下载PDF
A spotlight on dosage and subject selection for effective neuroprotection: exploring the central role of mitochondria
9
作者 John Mitrofanis Jonathan Stone +3 位作者 Michael R.Hamblin Pierre Magistretti Alim-Louis Benabid Glen Jeffery 《Neural Regeneration Research》 SCIE CAS 2025年第4期1081-1082,共2页
Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological cond... Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological conditions,including stroke,head trauma,and neurodegenerative disease,can generate stress in neurons,affecting their survival and proper function.In most neural pathologies,mitochondria become dysfunctional and this plays a pivotal role in the process of cell death.The challenge over the last few decades has been to develop effective interventions that improve neuronal homeostasis under pathological conditions.Such interventions,often referred to as disease-modifying or neuroprotective,have,however,proved frustratingly elusive,at both preclinical and,in particular,clinical levels.In this perspective,we highlight two factors that we feel are key to the development of effective neuroprotective treatments.These are:firstly,the choice of dose of intervention and method of application,and secondly,the selection of subjects,whether they be patients or the animal model. 展开更多
关键词 protective DOSAGE DISTRESS
下载PDF
Correction to:Theoretical analysis of the double-differential cross-sections of neutron,proton,deuteron,3He,and˛for the p+6 Li reaction
10
作者 Fang-Lei Zou Xiao-Jun Sun +10 位作者 Jing-Shang Zhang Hai-Rui Guo Yin-Lu Han Rui-Rui Xu Xi Tao Ji-Min Wang Xiao-Dong Sun Yuan Tian Tao Ye Yong-Li Xu Chun-Tian Liang 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第11期139-139,共1页
Correction to:Nuclear Science and Techniques(2024)35:61 https://doi.org/10.1007/s41365-024-01421-5 In this article,the figures were wrongly numbered.The Fig.7 and 8 should have been Fig.11 and 12.The Fig.9,10,11,and 1... Correction to:Nuclear Science and Techniques(2024)35:61 https://doi.org/10.1007/s41365-024-01421-5 In this article,the figures were wrongly numbered.The Fig.7 and 8 should have been Fig.11 and 12.The Fig.9,10,11,and 12 should have been 7,8,9 and 10.The original article has been corrected. 展开更多
关键词 corrected double differential
下载PDF
Enhancing Identity Protection in Metaverse-Based Psychological Counseling System
11
作者 Jun Lee Hanna Lee +1 位作者 Seong Chan Lee Hyun Kwon 《Computers, Materials & Continua》 SCIE EI 2024年第1期617-632,共16页
Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the subopt... Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse. 展开更多
关键词 Metaverse counseling system face tracking identity protection
下载PDF
VKFQ:A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain
12
作者 Youlin Ji Bo Yin Ke Gu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4205-4223,共19页
With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issue... With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing.In this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in blockchain.Both the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy protection.However,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries.We propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF queries.The framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy protection.The data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy budget.We propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query time.The VB-cm tree uses the vector commitment to verify the query results.The fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing operations.We conduct an extensive evaluation of the proposed framework.The experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude. 展开更多
关键词 SECURITY data sharing blockchain data query privacy protection
下载PDF
What If the Protection against Oxidation of Chromia-Forming Alloys Was Not Always Due to the Chromia Layer?
13
作者 Boris Contri Stéphane Valette +1 位作者 Marina Soustre Pierre Lefort 《American Journal of Analytical Chemistry》 CAS 2024年第9期286-302,共17页
Chromia-forming alloys have good resistance to oxidizing agents such as O2, CO2, … It is accepted that the protection of these alloys is always due to the chromia layer formed at the surface of the alloys, which acts... Chromia-forming alloys have good resistance to oxidizing agents such as O2, CO2, … It is accepted that the protection of these alloys is always due to the chromia layer formed at the surface of the alloys, which acts as a barrier between the oxidizing gases and the alloy substrates, forming a diffusion zone that limits the overall reaction rate and leads to parabolic kinetics. But this was not verified in the study devoted to Inconel®625 the oxidation in CO2 that was followed by TGA, with characterizations by XRD, EDS and FIB microscopy. Contrary to what was expected and accepted in similar studies on other chromia-forming alloys, it was shown that the diffusion step that governs the overall reaction rate is not located inside the chromia layer but inside the alloy, precisely inside a zone just beneath the interface alloy/chromia, this zone being depleted in chromium. The chromia layer, therefore, plays no kinetic role and does not directly protect the underlying alloy. This result was demonstrated using a simple test that consisted in removing the chromia layer from the surface of samples partially oxidized and then to continue the thermal treatment: insofar as the kinetics continued without any change in rate, this proved that this surface layer of oxide did not protect the substrate. Based on previous work on many chromia-forming alloys, the possibility of a similar reaction mechanism is discussed. If the chromia layer is not the source of protection for a number of chromia-forming alloys, as is suspected, this might have major consequences in terms of industrial applications. 展开更多
关键词 Chromia-Forming Alloys Chromia Layer Oxidation protection Inconel®625 Kinetics
下载PDF
Formation and ecological response of sand patches in the protection system of Shapotou section of the Baotou-Lanzhou railway,China
14
作者 DUN Yaoquan QU Jianjun +4 位作者 KANG Wenyan LI Minlan LIU Bin WANG Tao SHAO Mei 《Journal of Arid Land》 SCIE CSCD 2024年第2期298-313,共16页
The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses ... The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses a threat to both stability and sustainability.However,there is limited knowledge regarding the morphology,dynamic changes,and ecological responses associated with these sand patches.Therefore,we analyzed the formation and development process of sand patches within the protection system and its effects on herbaceous vegetation growth and soil nutrients through field observation,survey,and indoor analysis methods.The results showed that sand patch development can be divided into three stages,i.e.,formation,expansion,and stabilization,which correspond to the initial,actively developing,and semi-fixed sand patches,respectively.The average dimensions of all sand patch erosional areas were found to be 7.72 m in length,3.91 m in width,and 0.32 m in depth.The actively developing sand patches were the largest,and the initial sand patches were the smallest.Throughout the stage of formation and expansion,the herbaceous community composition changed,and the plant density decreased by more than 50.95%.Moreover,the coverage and height of herbaceous plants decreased in the erosional area and slightly increased in the depositional lobe;and the fine particles and nutrients of soils in the erosional area and depositional lobe showed a decreasing trend.In the stabilization phases of sand patches,the area from the inlet to the bottom of sand patches becomes initially covered with crusts.Vegetation and 0-2 cm surface soil condition improved in the erosional area,but this improvement was not yet evident in the depositional lobe.Factors such as disturbance,climate change,and surface resistance to erosion exert notable influences on the formation and dynamics of sand patches.The results can provide evidence for the future treatment of sand patches and the management of the protection system of Shapotou section of the Baotou-Lanzhou railway. 展开更多
关键词 railway protection system sand patch MORPHOLOGY vegetation characteristic soil property
下载PDF
Wood By-Products as UV Protection:A Consequence Review
15
作者 Naglaa Salem El‑Sayed Mohamed Hasanin Samir Kamel 《Journal of Renewable Materials》 EI CAS 2024年第4期699-720,共22页
In recent decades,the ozone layer has suffered considerable damage,increasing the entry of ultraviolet(UV)light into the atmosphere and reaching the earth’s surface,negatively affecting life.Accordingly,researchers a... In recent decades,the ozone layer has suffered considerable damage,increasing the entry of ultraviolet(UV)light into the atmosphere and reaching the earth’s surface,negatively affecting life.Accordingly,researchers aimed to solve this problem by synthesizing advanced UV-shielding materials.On the other hand,developing an easy and green strategy to prepare functional materials with outstanding properties based on naturally abundant and environmentally friendly raw materials is highly desirable for sustainable development.Because biomass-derived materials are sustainable and biodegradable,they present a promising substitute for petroleum-based polymers.The three main structural constituents of the plant biomass-based materials that are naturally available are cellulose,hemicellulose,and lignin.This review details current developments using wood-based products such as cellulose,hemicellulose,and lignin in UV-shielding applications.It will start with assembling the structure and chemistry of cellulose,hemicellulose,and lignin,followed by their contributions to preparing UV-shielding materials.Finally,it will briefly discuss the different processing methods for the design of UV-shielding materials.The wood by-products offer additional opportunities to use the whole tree harvest. 展开更多
关键词 UV-SHIELDING WOOD cellulose LIGNIN HEMICELLULOSE sunlight protection
下载PDF
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
16
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
下载PDF
Recent Advances in Bronchopulmonary Dysplasia Protection and Therapy
17
作者 Pingfan Xia Hongyi Li +1 位作者 Zhe Xu Yongping Lu 《Health》 2024年第5期470-489,共20页
For preterm infants, bronchopulmonary dysplasia (BPD) is usually caused by abnormal lung development due to various factors during prenatal and postnatal process. One of the reasons for death and bad prognosis of pret... For preterm infants, bronchopulmonary dysplasia (BPD) is usually caused by abnormal lung development due to various factors during prenatal and postnatal process. One of the reasons for death and bad prognosis of preterm infants is to have BPD. Up to now, there are no unified strategies or drugs to treat BPD. In clinical, many intervention treatments have been applied to achieve BPD therapy, mainly including preterm protection, protective ventilation strategies, and delivery of corticosteroids, pulmonary vasodilators, and antioxidants. This review summarizes the current advances in BPD protection and treatment, and notes that gut microbiota and mesenchymal stem cells (MSCs) can be the promising strategy for protecting and treating BPD in the future. 展开更多
关键词 Bronchopulmonary Dysplasia Preterm Infants protection and Therapy Mesenchymal Stem Cells Gut Microbiota
下载PDF
Research on IPFS Image Copyright Protection Method Based on Blockchain
18
作者 Xin Cong Lanjin Feng Lingling Zi 《Computers, Materials & Continua》 SCIE EI 2024年第10期663-684,共22页
In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advanta... In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advantages of decentralized storage,the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership.The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files.To this end,an innovative approach is proposed that integrates blockchain,digital signature,and blind watermarking.Blockchain technology functions as a decentralized and tamper-resistant ledger,recording and verifying the source information of files,thereby establishing credible evidence of file origin.A digital signature serves to authenticate the identity and integrity of the individual responsible for uploading the file,ensuring data security.Furthermore,blind watermarking is employed to embed invisible information within images,thereby safeguarding digital copyrights and enabling file traceability.To further optimize the efficiency of file retrieval within IPFS,a dual-layer Distributed Hash Table(DHT)indexing structure is proposed.This structure divides file index information into a global index layer and a local index layer,significantly reducing retrieval time and network overhead.The feasibility of the proposed approach is demonstrated through practical examples,providing an effective solution to the copyright protection issues associated with IPFS image files. 展开更多
关键词 Blockchain copyright protection IPFS distributed hash table digital sig
下载PDF
A continuous and long-term in-situ stress measuring method based on fiber optic. Part I: Theory of inverse differential strain analysis
19
作者 Kun-Peng Zhang Mian Chen +2 位作者 Chang-Jun Zhao Su Wang Yong-Dong Fan 《Petroleum Science》 SCIE EI CAS CSCD 2024年第2期1171-1189,共19页
A method for in-situ stress measurement via fiber optics was proposed. The method utilizes the relationship between rock mass elastic parameters and in-situ stress. The approach offers the advantage of long-term stres... A method for in-situ stress measurement via fiber optics was proposed. The method utilizes the relationship between rock mass elastic parameters and in-situ stress. The approach offers the advantage of long-term stress measurements with high spatial resolution and frequency, significantly enhancing the ability to measure in-situ stress. The sensing casing, spirally wrapped with fiber optic, is cemented into the formation to establish a formation sensing nerve. Injecting fluid into the casing generates strain disturbance, establishing the relationship between rock mass properties and treatment pressure.Moreover, an optimization algorithm is established to invert the elastic parameters of formation via fiber optic strains. In the first part of this paper series, we established the theoretical basis for the inverse differential strain analysis method for in-situ stress measurement, which was subsequently verified using an analytical model. This paper is the fundamental basis for the inverse differential strain analysis method. 展开更多
关键词 In-situ stress Fiber optic Orthotropic elastic differential evolution ABAQUS
下载PDF
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing
20
作者 Xu Li Gwanggil Jeon +1 位作者 Wenshuo Wang Jindong Zhao 《Digital Communications and Networks》 SCIE CSCD 2024年第3期645-654,共10页
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ... The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data. 展开更多
关键词 5G network Crowd-sensing Privacy protection Ring signature Batch verification
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部