期刊文献+
共找到18,380篇文章
< 1 2 250 >
每页显示 20 50 100
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms
1
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
下载PDF
Analysis of GC×GC fingerprints from medicinal materials using a novel contour detection algorithm:A case of Curcuma wenyujin
2
作者 Xinyue Yang Yingyu Sima +2 位作者 Xuhuai Luo Yaping Li Min He 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2024年第4期542-551,共10页
This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC).... This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC).This method innovatively combines contour edge tracking with affinity propagation(AP)clustering for peak detection in GC×GC fingerprints,the first in this field.Contour edge tracking signif-icantly reduces false positives caused by“burr”signals,while AP clustering enhances detection accuracy in the face of false negatives.The efficacy of this approach is demonstrated using three medicinal products derived from Curcuma wenyujin.PeakCET not only performs contour detection but also employs inter-group peak matching and peak-volume percentage calculations to assess the compositional similarities and differences among various samples.Furthermore,this algorithm compares the GC×GC fingerprints of Radix/Rhizoma Curcumae Wenyujin with those of products from different botanical origins.The findings reveal that genetic and geographical factors influence the accumulation of secondary metabolites in various plant tissues.Each sample exhibits unique characteristic components alongside common ones,and vari-ations in content may influence their therapeutic effectiveness.This research establishes a foundational data-set for the quality assessment of Curcuma products and paves the way for the application of computer vision techniques in two-dimensional(2D)fingerprint analysis of GC×GC data. 展开更多
关键词 GC×GC Image fingerprints Contour detection Clustering of mass spectra Curcuma products
下载PDF
UV,five wavelengths fusion and electrochemical fingerprints combined with antioxidant activity for quality control of antiviral mixture
3
作者 Kaining Zhou Zini Tang +2 位作者 Guoxiang Sun Ping Guo Lili Lan 《Asian Journal of Traditional Medicines》 2024年第3期119-136,151,共19页
Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this ... Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this study to comprehensively evaluate the quality of Antiviral Mixture(AM),and Comprehensive Linear Quantification Fingerprint Method(CLQFM)was used to process the data.Quantitative analysis of three active substances in TCM was conducted.A fivewavelength fusion fingerprint(FWFF)was developed,using second-order derivatives of UV spectral data to differentiate sample levels effectively.The combination of HPLC and UV spectrophotometry,along with electrochemical fingerprinting(ECFP),successfully evaluated total active substances.Ultimately,a multidimensional profiling analytical system for TCM was developed. 展开更多
关键词 TCM antiviral mixture five-wavelength fusion fingerprint(FWFF) Comprehensive Linear Quantification fingerprint Method(CLQFM) quantization fingerprint antioxidant activity profilling
下载PDF
Envelope Method and More General New Global Structures of Solutions for Multi-dimensional Conservation Law
4
作者 Gui-Qin Qiu Gao-Wei Cao +1 位作者 Xiao-Zhou Yang Yuan-An Zhao 《Communications on Applied Mathematics and Computation》 2023年第3期1180-1234,共55页
For the two-dimensional(2D)scalar conservation law,when the initial data contain two different constant states and the initial discontinuous curve is a general curve,then complex structures of wave interactions will b... For the two-dimensional(2D)scalar conservation law,when the initial data contain two different constant states and the initial discontinuous curve is a general curve,then complex structures of wave interactions will be generated.In this paper,by proposing and investigating the plus envelope,the minus envelope,and the mixed envelope of 2D non-selfsimilar rarefaction wave surfaces,we obtain and the prove the new structures and classifications of interactions between the 2D non-selfsimilar shock wave and the rarefaction wave.For the cases of the plus envelope and the minus envelope,we get and prove the necessary and sufficient criterion to judge these two envelopes and correspondingly get more general new structures of 2D solutions. 展开更多
关键词 Riemann problem Non-selfsimilar shock wave Non-selfsimilar rarefaction wave ENVELOPE multi-dimensional conservation law
下载PDF
Volatile Compounds Fingerprints for White Duck down and White Goose down Determined by Gas Chromatography-Ion Mobility Spectrometry
5
作者 Fei Wang Qihui Zhang +6 位作者 Yiwen Lin Wenjian Chen Hui Wang Kuntai Li Jihua Li Yuliang Chen Leiyu Wang 《Agricultural Sciences》 CAS 2023年第3期432-445,共14页
This work first describes a simple approach for the untargeted profiling of volatile compounds for distinguishing between white duck down (WDD) and white goose down (WGD) based on resolution-optimized GC-IMS combined ... This work first describes a simple approach for the untargeted profiling of volatile compounds for distinguishing between white duck down (WDD) and white goose down (WGD) based on resolution-optimized GC-IMS combined with optimized chemometric techniques, namely PCA. The detection method for down samples was established by using GC-IMS. Meanwhile, the reason of unpleasant odors caused by WDD was explained on the basis of the characteristic volatile compounds identification. GC-IMS fingerprinting can be considered a revolutionary approach for a truly fully automatable, cost-efficient, and in particular highly sensitive method. A total of 22 compounds were successfully separated and identified through GC-IMS method, and the significant differences in volatile compounds were observed in three parts of WDD and WGD samples. The most characteristic volatile compounds of WGD belong to aldehydes, whereas carboxylic acids from WDD were detected generated by autoxidation reaction. Meanwhile, the main reason of unpleasant odor generation was possibly attributed to the high concentration of volatile carboxylic acids of WDD. Therefore, the constructed model presents a simple and efficient method of analysis and serves as a basis for down processing and quality control. 展开更多
关键词 Gas Chromatography-Ion Mobility Spectrometry (GC-IMS) Principal Components Analysis (PCA) DOWN Characteristic Volatiles fingerprints Carboxylic Acids
下载PDF
Research and Practice on the Multi-dimensional Course Goal Achievement Evaluation of Software Engineering
6
作者 Ying Jiang Hongbin Wang Jiaman Ding 《计算机教育》 2023年第12期265-271,共7页
According to the standards of engineering education accreditation,the achievement paths and evaluation criteria of course goals are presented,aimed at the objectives of software engineering courses and the characteris... According to the standards of engineering education accreditation,the achievement paths and evaluation criteria of course goals are presented,aimed at the objectives of software engineering courses and the characteristics of hybrid teaching in Kunming University of Science and Technology.Then a multi-dimensional evaluation system for course goal achievement of software engineering is proposed.The practice’s results show that the multi-dimensional course goal achievement evaluation is helpful to the continuous improvement of course teaching,which can effectively support the evaluation of graduation outcomes. 展开更多
关键词 Software engineering Course goal achievement evaluation multi-dimensional
下载PDF
An Ordinal Multi-Dimensional Classification(OMDC)for Predictive Maintenance
7
作者 Pelin Yildirim Taser 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1499-1516,共18页
Predictive Maintenance is a type of condition-based maintenance that assesses the equipment's states and estimates its failure probability and when maintenance should be performed.Although machine learning techniq... Predictive Maintenance is a type of condition-based maintenance that assesses the equipment's states and estimates its failure probability and when maintenance should be performed.Although machine learning techniques have been frequently implemented in this area,the existing studies disregard to the nat-ural order between the target attribute values of the historical sensor data.Thus,these methods cause losing the inherent order of the data that positively affects the prediction performances.To deal with this problem,a novel approach,named Ordinal Multi-dimensional Classification(OMDC),is proposed for estimating the conditions of a hydraulic system's four components by taking into the natural order of class values.To demonstrate the prediction ability of the proposed approach,eleven different multi-dimensional classification algorithms(traditional Binary Relevance(BR),Classifier Chain(CC),Bayesian Classifier Chain(BCC),Monte Carlo Classifier Chain(MCC),Probabilistic Classifier Chain(PCC),Clas-sifier Dependency Network(CDN),Classifier Trellis(CT),Classifier Dependency Trellis(CDT),Label Powerset(LP),Pruned Sets(PS),and Random k-Labelsets(RAKEL))were implemented using the Ordinal Class Classifier(OCC)algorithm.Besides,seven different classification algorithms(Multilayer Perceptron(MLP),Support Vector Machine(SVM),k-Nearest Neighbour(kNN),Decision Tree(C4.5),Bagging,Random Forest(RF),and Adaptive Boosting(AdaBoost))were chosen as base learners for the OCC algorithm.The experimental results present that the proposed OMDC approach using binary relevance multi-dimensional classification methods predicts the conditions of a hydraulic system's multiple components with high accuracy.Also,it is clearly seen from the results that the OMDC models that utilize ensemble-based classification algorithms give more reliable prediction performances with an average Hamming score of 0.853 than the others that use traditional algorithms as base learners. 展开更多
关键词 Machine learning multi-dimensional classification ordinal classification predictive maintenance
下载PDF
Data inversion of multi-dimensional magnetic resonance in porous media
8
作者 Fangrong Zong Huabing Liu +1 位作者 Ruiliang Bai Petrik Galvosas 《Magnetic Resonance Letters》 2023年第2期127-139,I0004,共14页
Since its inception in the 1970s,multi-dimensional magnetic resonance(MR)has emerged as a powerful tool for non-invasive investigations of structures and molecular interactions.MR spectroscopy beyond one dimension all... Since its inception in the 1970s,multi-dimensional magnetic resonance(MR)has emerged as a powerful tool for non-invasive investigations of structures and molecular interactions.MR spectroscopy beyond one dimension allows the study of the correlation,exchange processes,and separation of overlapping spectral information.The multi-dimensional concept has been re-implemented over the last two decades to explore molecular motion and spin dynamics in porous media.Apart from Fourier transform,methods have been developed for processing the multi-dimensional time-domain data,identifying the fluid components,and estimating pore surface permeability via joint relaxation and diffusion spectra.Through the resolution of spectroscopic signals with spatial encoding gradients,multi-dimensional MR imaging has been widely used to investigate the microscopic environment of living tissues and distinguish diseases.Signals in each voxel are usually expressed as multi-exponential decay,representing microstructures or environments along multiple pore scales.The separation of contributions from different environments is a common ill-posed problem,which can be resolved numerically.Moreover,the inversion methods and experimental parameters determine the resolution of multi-dimensional spectra.This paper reviews the algorithms that have been proposed to process multidimensional MR datasets in different scenarios.Detailed information at the microscopic level,such as tissue components,fluid types and food structures in multi-disciplinary sciences,could be revealed through multi-dimensional MR. 展开更多
关键词 multi-dimensional MR Data inversion Porous media Inverse Laplace transform FOURIERTRANSFORM
下载PDF
Intelligent 6G Wireless Network with Multi-Dimensional Information Perception
9
作者 YANG Bei LIANG Xin +3 位作者 LIU Shengnan JIANG Zheng ZHU Jianchi SHE Xiaoming 《ZTE Communications》 2023年第2期3-10,共8页
Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in... Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research. 展开更多
关键词 6G wireless network artificial intelligence multi-dimensional information perception full spectrum fusion
下载PDF
Geographical origin identification of winter jujube(Ziziphus jujuba Dongzao')by using multi-element fingerprinting with chemometrics
10
作者 Xiabing Kong Qiusheng Chen +8 位作者 Min Xu Yihui Liu Xiaoming Li Lingxi Han Qiang Zhang Haoliang Wan Lu Liu Xubo Zhao Jiyun Nie 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第5期1749-1762,共14页
Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 16... Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits. 展开更多
关键词 winter jujube multi-element fingerprint analysis CHEMOMETRICS origin traceability
下载PDF
An Image Fingerprint and Attention Mechanism Based Load Estimation Algorithm for Electric Power System
11
作者 Qing Zhu Linlin Gu Huijie Lin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期577-591,共15页
With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-base... With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-based,and machine learning-based estimation.Since the machine learning-based method can lead to better performance,in this paper,a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed.First,an image fingerprint construction is proposed for training data.After the data preprocessing,the training data matrix is constructed by the cyclic shift and cubic spline interpolation.Then,the linear mapping and the gray-color transformation method are proposed to form the color image fingerprint.Second,a convolutional neural network(CNN)combined with an attentionmechanism is proposed for training performance improvement.At last,an experiment is carried out to evaluate the estimation performance.Compared with the support vector machine method,CNN method and long short-term memory method,the proposed algorithm has the best load estimation performance. 展开更多
关键词 Load estimation deep learning attention mechanism image fingerprint construction
下载PDF
A UWB/IMU-Assisted Fingerprinting Localization Framework with Low Human Efforts
12
作者 Pan Hao Chen Yu +1 位作者 Qi Xiaogang Liu Meili 《China Communications》 SCIE CSCD 2024年第6期40-52,共13页
With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication... With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication(RSSI)fingerprintbased localization method has obtained much development in both academia and industries.In this work,we introduce an efficient way to reduce the labor-intensive site survey process,which uses an UWB/IMU-assisted fingerprint construction(UAFC)and localization framework based on the principle of Automatic radio map generation scheme(ARMGS)is proposed to replace the traditional manual measurement.To be specific,UWB devices are employed to estimate the coordinates when the collector is moved in a reference point(RP).An anchor self-localization method is investigated to further reduce manual measurement work in a wide and complex environment,which is also a grueling,time-consuming process that is lead to artificial errors.Moreover,the measurements of IMU are incorporated into the UWB localization algorithm and improve the label accuracy in fingerprint.In addition,the weighted k-nearest neighbor(WKNN)algorithm is applied to online localization phase.Finally,filed experiments are carried out and the results confirm the effectiveness of the proposed approach. 展开更多
关键词 indoor localization machine learning ultra wideband WiFi fingerprint
下载PDF
CMAES-WFD:Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy
13
作者 Di Wang Yuefei Zhu +1 位作者 Jinlong Fei Maohua Guo 《Computers, Materials & Continua》 SCIE EI 2024年第5期2253-2276,共24页
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de... Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent. 展开更多
关键词 Traffic analysis deep neural network adversarial sample TOR website fingerprinting
下载PDF
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
14
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
下载PDF
Certis: Cloud Asset Management & Threat Evaluation Using Behavioral Fingerprinting at Application Layer
15
作者 Kumardwij Bhatnagar Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第6期474-486,共13页
This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anoma... This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats. 展开更多
关键词 Certis SSL Certificate Parsing JARM fingerprinting Anomaly Detection Proactive Defense
下载PDF
AWeb Application Fingerprint Recognition Method Based on Machine Learning
16
作者 Yanmei Shi Wei Yu +1 位作者 Yanxia Zhao Yungang Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期887-906,共20页
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r... Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition. 展开更多
关键词 Web application fingerprint recognition unsupervised learning clustering algorithm feature extraction automated testing network security
下载PDF
Fingerprint Study of Polygonati Rhizoma with Steaming and Exposing to the Sun Alternatively for Different Times
17
作者 Min WANG Chenying YE +3 位作者 Qian WANG Ting HE Shenggao YIN Gailian ZHOU 《Medicinal Plant》 2024年第2期18-20,共3页
[Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with diffe... [Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with different times of steaming and exposing to the sun,and to provide a basis for the determination of the best processing technology of Polygonati Rhizoma.[Methods]SETSAIL II AQ-C 18(5μm×250 mm×4.6 mm)was used as the column,the column temperature was 30℃,pure water(A)and acetonitrile(B)were eluted gradually,0-10 min,B(5%-10%),10-30 min,B(10%-35%),30-40 min,B(35%-60%),40-45 min,B(60%-100%),flow rate 1 mL/min,absorption wavelength 200 nm.[Results]The relative retained peak area RSDs of the common peaks in the precision,reproducibility and stability tests were all less than 5%.There were 17 common peaks in the fingerprint of nine batches of samples,and the retention time of Peak 2 was basically the same as that of the reference peak of 5-HMF.Peak 4 mainly existed in the chromatogram of Sample 3 to Sample 5,peaks 5 and 11 mainly existed after Sample 3,peaks 9,14 and 16 mainly existed after Sample 6,and peaks 12 and 17 mainly existed after Sample 4.[Conclusions]A total of 17 common peaks were obtained,and the Peak 2 was the designated peak,and the chemical components of each processed product were different. 展开更多
关键词 Polygonati Rhizoma PROCESSING HPLC fingerprint
下载PDF
Rational and Continuous Measurement of Emotional-Fingerprint, Emotional-Quotient and Categorical vs Proportional Recognition of Facial Emotions with M.A.R.I.E., Second Half
18
作者 Philippe Granato Shreekumar Vinekar +1 位作者 Jean-Pierre Van Gansberghe Raymond Bruyer 《Open Journal of Psychiatry》 2024年第4期400-450,共51页
Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the i... Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the interfaces of verbal and emotional communications. The progress of AI is significant on the verbal level but modest in terms of the recognition of facial emotions even if this functionality is one of the oldest in humans and is omnipresent in our daily lives. Dysfunction in the ability for facial emotional expressions is present in many brain pathologies encountered by psychiatrists, neurologists, psychotherapists, mental health professionals including social workers. It cannot be objectively verified and measured due to a lack of reliable tools that are valid and consistently sensitive. Indeed, the articles in the scientific literature dealing with Visual-Facial-Emotions-Recognition (ViFaEmRe), suffer from the absence of 1) consensual and rational tools for continuous quantified measurement, 2) operational concepts. We have invented a software that can use computer-morphing attempting to respond to these two obstacles. It is identified as the Method of Analysis and Research of the Integration of Emotions (M.A.R.I.E.). Our primary goal is to use M.A.R.I.E. to understand the physiology of ViFaEmRe in normal healthy subjects by standardizing the measurements. Then, it will allow us to focus on subjects manifesting abnormalities in this ability. Our second goal is to make our contribution to the progress of AI hoping to add the dimension of recognition of facial emotional expressions. Objective: To study: 1) categorical vs dimensional aspects of recognition of ViFaEmRe, 2) universality vs idiosyncrasy, 3) immediate vs ambivalent Emotional-Decision-Making, 4) the Emotional-Fingerprint of a face and 5) creation of population references data. Methods: M.A.R.I.E. enables the rational, quantified measurement of Emotional Visual Acuity (EVA) in an individual observer and a population aged 20 to 70 years. Meanwhile, it can measure the range and intensity of expressed emotions through three Face- Tests, quantify the performance of a sample of 204 observers with hypernormal measures of cognition, “thymia” (defined elsewhere), and low levels of anxiety, and perform analysis of the six primary emotions. Results: We have individualized the following continuous parameters: 1) “Emotional-Visual- Acuity”, 2) “Visual-Emotional-Feeling”, 3) “Emotional-Quotient”, 4) “Emotional-Decision-Making”, 5) “Emotional-Decision-Making Graph” or “Individual-Gun-Trigger”, 6) “Emotional-Fingerprint” or “Key-graph”, 7) “Emotional-Fingerprint-Graph”, 8) detecting “misunderstanding” and 9) detecting “error”. This allowed us a taxonomy with coding of the face-emotion pair. Each face has specific measurements and graphics. The EVA improves from ages of 20 to 55 years, then decreases. It does not depend on the sex of the observer, nor the face studied. In addition, 1% of people endowed with normal intelligence do not recognize emotions. The categorical dimension is a variable for everyone. The range and intensity of ViFaEmRe is idiosyncratic and not universally uniform. The recognition of emotions is purely categorical for a single individual. It is dimensional for a population sample. Conclusions: Firstly, M.A.R.I.E. has made possible to bring out new concepts and new continuous measurements variables. The comparison between healthy and abnormal individuals makes it possible to take into consideration the significance of this line of study. From now on, these new functional parameters will allow us to identify and name “emotional” disorders or illnesses which can give additional dimension to behavioral disorders in all pathologies that affect the brain. Secondly, the ViFaEmRe is idiosyncratic, categorical, and a function of the identity of the observer and of the observed face. These findings stack up against Artificial Intelligence, which cannot have a globalist or regionalist algorithm that can be programmed into a robot, nor can AI compete with human abilities and judgment in this domain. *Here “Emotional disorders” refers to disorders of emotional expressions and recognition. 展开更多
关键词 M.A.R.I.E. Universality Idiosyncrasy Measurement of Emotional Quotient Emotional fingerprint Emotional Decision-Making Limbic Lobe
下载PDF
The significance of metabolic fingerprinting in carcinogenesis
19
作者 Ayodele Ademola Adelakun Princess Adekunbi Owokalade 《Cancer Advances》 2024年第1期1-6,共6页
Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)w... Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)worldwide in 2020:8.8 million(48%)in females and 9.3 million(52%)in males,giving a male:female ratio of 10:9.5.It may be initiated by the action of biological,physical,or chemical agents that cause a non-lethal,permanent,DNA error on the cell with a consequence of altered cell metabolism.This altered cell metabolism include the Warburg effect,altered lipid and amino acid metabolism and production of various metabolites.It also results in unique metabolic dependencies that,in some cases,can be targeted with precision medicine and nutrition,including drugs that selectively target metabolic enzymes.Metabolic fingerprinting has been applied to the study of carcinogenesis and is particularly helpful in early diagnosis,staging and choice of treatment,thus improving health outcomes.This technology could therefore be harnessed effectively while combining with other omics technologies. 展开更多
关键词 CANCER metabolomics PROGNOSIS DIAGNOSIS fingerprint
下载PDF
The Study on College English Writing Based on Multi-dimensional Feed-back Mode
20
作者 骆敏 徐敏娜 《海外英语》 2020年第12期273-274,共2页
The study constructed a multi-dimensional feedback mode integrating teacher feedback, peer feedback and network feedback, and applied it in the teaching of College English Writing. After 16 weeks of teaching, the stud... The study constructed a multi-dimensional feedback mode integrating teacher feedback, peer feedback and network feedback, and applied it in the teaching of College English Writing. After 16 weeks of teaching, the students in the multi-dimen-sional feedback class had significantly better overall writing scores than those in the teacher-feedback class. In terms of individual scores, multi-dimensional feedback played a better role in improving vocabulary and grammar than the class using teacher feed-back. However, there were no significant differences in the responses of writing tasks, coherence and cohesion. The study showed that most students were satisfied with the mode, believing that it was helpful to relieve writing anxiety, stimulate writing interest and improve their writing level. 展开更多
关键词 College English Writing multi-dimensional feedback MODE
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部