期刊文献+
共找到345,199篇文章
< 1 2 250 >
每页显示 20 50 100
Pathway and Countermeasure of Farmers' Livelihood Transformation in the Ecological Development Area of Northern Guangdong Province from the Perspective of Ecological Protection
1
作者 Jinguo HUANG Xi HUANG +1 位作者 Faming ZENG Xizhi WANG 《Asian Agricultural Research》 2024年第9期7-10,共4页
[Objectives]To explore pathways and countermeasures for transforming farmers livelihoods in the way of reducing their dependence on land while promoting sustainable development and alleviating ecological degradation.[... [Objectives]To explore pathways and countermeasures for transforming farmers livelihoods in the way of reducing their dependence on land while promoting sustainable development and alleviating ecological degradation.[Methods]A combination of field research,literature review,and policy analysis was employed to identify key factors affecting farmers livelihoods and potential strategies for transformation.[Results]The study found that developing ecological agriculture and modern agriculture,promoting agricultural transformation and upgrading,cultivating alternative industries,strengthening ecological engineering construction,and establishing diversified ecological compensation methods and supporting policies are effective strategies for transforming farmers livelihoods.[Conclusions]Implementing these strategies can help alleviate the contradiction between ecological protection and farmers livelihood development,promoting coordinated development of both.This approach not only benefits farmers but also contributes to sustainable environmental management and biodiversity conservation. 展开更多
关键词 Ecological protection Farmers'livelihood transformation Pathways and countermeasures Ecological development area
下载PDF
Countermeasures for the Protection and Sustainable Development of Forestry Resources
2
作者 Chunhua TANG Jialin GU 《Meteorological and Environmental Research》 CAS 2023年第4期67-69,共3页
Firstly,the problems of the protection and sustainable development of forestry resources were analyzed,such as lack of overall planning for the protection of forestry resources,insufficient investment in the protectio... Firstly,the problems of the protection and sustainable development of forestry resources were analyzed,such as lack of overall planning for the protection of forestry resources,insufficient investment in the protection of forestry resources,etc.Afterwards,the corresponding countermeasures were proposed,such as making overall planning for sustainable forestry development,increasing the investment in the protection of forestry resources,improving the forestry management system,etc. 展开更多
关键词 protection of forestry resources Sustainable development PROBLEMS countermeasures
下载PDF
Problems and Countermeasures for the Protection of Agricultural Heritage in China
3
作者 YANG Yonggan 《Journal of Landscape Research》 2023年第4期65-68,共4页
With the rapid development of modern agriculture,China has increasingly attached importance to the protection and development of agricultural cultural heritage,but it has encountered severe challenges in reality.By an... With the rapid development of modern agriculture,China has increasingly attached importance to the protection and development of agricultural cultural heritage,but it has encountered severe challenges in reality.By analyzing the connotation and current situation of agricultural cultural heritage,to address the issues faced by China,such as imbalanced theoretical and practical development,difficulty in grasping the boundaries of protection and development,inadequate research and management mechanisms,large funding gaps,lack of talent,and insufficient international influence,targeted solutions are proposed based on relevant information and literature.This aims to strengthen the protection,activation,and inheritance of agricultural cultural heritage. 展开更多
关键词 Agricultural cultural heritage Ecological protection Sustainable development Rural revitalization
下载PDF
The future of artificial hibernation medicine:protection of nerves and organs after spinal cord injury 被引量:1
4
作者 Caiyun Liu Haixin Yu +4 位作者 Zhengchao Li Shulian Chen Xiaoyin Li Xuyi Chen Bo Chen 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第1期22-28,共7页
Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hi... Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hibernation techniques,mild hypothermia has preliminarily confirmed its clinical effect on spinal cord injury.However,its technical defects and barriers,along with serious clinical side effects,restrict its clinical application for spinal cord injury.Artificial hibernation is a futureoriented disruptive technology for human life support.It involves endogenous hibernation inducers and hibernation-related central neuromodulation that activate particular neurons,reduce the central constant temperature setting point,disrupt the normal constant body temperature,make the body adapt"to the external cold environment,and reduce the physiological resistance to cold stimulation.Thus,studying the artificial hibernation mechanism may help develop new treatment strategies more suitable for clinical use than the cooling method of mild hypothermia technology.This review introduces artificial hibernation technologies,including mild hypothermia technology,hibernation inducers,and hibernation-related central neuromodulation technology.It summarizes the relevant research on hypothermia and hibernation for organ and nerve protection.These studies show that artificial hibernation technologies have therapeutic significance on nerve injury after spinal co rd injury through inflammatory inhibition,immunosuppression,oxidative defense,and possible central protection.It also promotes the repair and protection of res pirato ry and digestive,cardiovascular,locomoto r,urinary,and endocrine systems.This review provides new insights for the clinical treatment of nerve and multiple organ protection after spinal cord injury thanks to artificial hibernation.At present,artificial hibernation technology is not mature,and research fa ces various challenges.Neve rtheless,the effort is wo rthwhile for the future development of medicine. 展开更多
关键词 artificial hibernation central thermostatic-resista nt regulation hypothermia multi-system protection neuroprotection organ protection spinal cord injury synthetic torpor
下载PDF
Efficient unequal error protection for online fountain codes 被引量:1
5
作者 SHI Pengcheng WANG Zhenyong +1 位作者 LI Dezhi LYU Haibo 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期286-293,共8页
In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in... In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in the completion phase,the weighted-selection strategy is applied to provide low overhead.The performance of the proposed scheme is analyzed and compared with the existing UEP online fountain scheme.Simulation results show that in terms of MIS and the least important symbols(LIS),when the bit error ratio is 10-4,the proposed scheme can achieve 85%and 31.58%overhead reduction,respectively. 展开更多
关键词 online fountain code random graph unequal error protection(UEP) rateless code
下载PDF
Network pharmacology and subsequent experimental validation reveal the synergistic myocardial protection mechanism of Salvia miltiorrhiza Bge.and Carthamus tinctorius L. 被引量:1
6
作者 Linying Zhong Ling Dong +7 位作者 Jing Sun Jie Yang Zhiying Yu Ping He Bo Zhu Yuxin Zhu Siyuan Li Wenjuan Xu 《Journal of Traditional Chinese Medical Sciences》 CAS 2024年第1期44-54,共11页
Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and su... Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and subsequent experimental validation.Methods:Network pharmacology was applied to construct an active ingredient-efficacy target-disease protein network to reveal the unique regulation pattern of s.miltiorrhiza and C.tinctorius as herb pair.Molecular docking was used to verify the binding of the components of these herbs and their potential targets.An H9c2 glucose hypoxia model was used to evaluate the efficacy of the components and their synergistic effects,which were evaluated using the combination index.Western blot was performed to detect the protein expression of these targets.Results:Network pharmacology analysis revealed 5 pathways and 8 core targets of s.miltiorrhiza and C.tinctorius in myocardial protection.Five of the core targets were enriched in the hypoxia-inducible factor-1(HIF-1)signaling pathway.S.miltiorrhiza-C.tinctorius achieved vascular tone mainly by regulating the target genes of the HIF-1 pathway.As an upstream gene of the HIF-1 pathway,STAT3 can be activated by the active ingredients cryptotanshinone(Ctan),salvianolic acid B(Sal.B),and myricetin(Myric).Cell experiments revealed that Myric,Sal.B,and Ctan also exhibited synergistic myocardial protective activity.Molecular docking verified the strong binding of Myric,Sal.B,and Ctan to STAT3.Western blot further showed that the active ingredients synergistically upregulated the protein expressionof STAT3.Conclusion:The pharmacodynamic transmission analysis revealed that the active ingredients of S.miltiorrhiza and C.tinctorius can synergistically resist ischemia through various targets and pathways.This study provides a methodological reference for interpreting traditional Chinese medicine compatibility. 展开更多
关键词 S.miltiorrhiza-C.tinctorius herb pair Compatibilitymechanism Networkpharmacology Multipletargeteffect Myocardial protection
下载PDF
Research on Types of Regional Eco-protection Space and Its Protection Countermeasures——A Case Study of Chongzuo City of Guangxi Province in China
7
作者 周兴 陈务开 《Journal of Landscape Research》 2012年第2期41-44,共4页
Reasonable division of eco-protection space is a vital measure to coordinate the relationship between regional economic development and ecological protection,and to realize regional sustainable development.The paper h... Reasonable division of eco-protection space is a vital measure to coordinate the relationship between regional economic development and ecological protection,and to realize regional sustainable development.The paper has concluded the concept of regional eco-protection space which has been divided into ecological space of forbidding development and restricted development.It has discussed methods to divide regional eco-protection space and proposed protection countermeasures for regional eco-protection space.GIS has been adopted to divide eco-protection space of Chongzuo City.The eco-protection space of Chongzuo City covers an overall area of 5,833.94 km2,taking up 34.04% of the total area of Chongzuo City;ecological space of forbidding development covers an area of 1,555.35 km2,taking up 8.97%;the ecological space of restricted development covers an area of 4,344.59 km2,taking up 25.07%.Finally,the protection countermeasures for regional eco-protection space have been proposed. 展开更多
关键词 Regional eco-protection SPACE Type protection countermeasures
下载PDF
Actuality Assessment and Protection Countermeasures for the Yintan Wetland Park in Lanzhou City
8
作者 唐铭 郭浩磊 《Journal of Landscape Research》 2009年第9期34-38,54,共6页
Yintan Wetland Park in Lanzhou City was assessed in this study from the perspective of landscape ecology,and the characteristic indexes of wetland landscape units were calculated.Landscape types of the study area can ... Yintan Wetland Park in Lanzhou City was assessed in this study from the perspective of landscape ecology,and the characteristic indexes of wetland landscape units were calculated.Landscape types of the study area can be classified into water area,wood land,grassland,marsh and beach whose patch shape index(S) is respectively 1.36,1.13,1.21,1.08 and 1.29;the overall regional landscape diversity index(H) is 1.03;and the overall regional landscape fragmentation index is 0.19. 展开更多
关键词 WETLAND PARK ASSESSMENT protection countermeasures
下载PDF
Composite armor philosophy(CAP):Holistic design methodology of multi-layered composite protection systems for armored vehicles
9
作者 Evangelos Ch.Tsirogiannis Foivos Psarommatis +1 位作者 Alexandros Prospathopoulos Georgios Savaidis 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第11期181-197,共17页
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i... A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare. 展开更多
关键词 Passive armor protection Composite armor Ballistic performance protection systems Vehicle protection Armor design
下载PDF
Self-actuating protection mechanisms for safer lithium-ion batteries
10
作者 Yang Luo Chunchun Sang +3 位作者 Kehan Le Hao Chen Hui Li Xinping Ai 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第7期181-198,共18页
Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,whic... Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,which is intrinsically triggered by the overcharging and overheating.To improve the safety of LIBs,various protection strategies based on self-actuating reaction control mechanisms(SRCMs)have been proposed,including redox shuttle,polymerizable monomer additive,potential-sensitive separator,thermal shutdown separator,positive-temperature-coefficient electrode,thermally polymerizable addi-tive,and reversible thermal phase transition electrolyte.As build-in protection mechanisms,these meth-ods can sensitively detect either the temperature change inside battery or the potential change of the electrode,and spontaneously shut down the electrode reaction at risky conditions,thus preventing the battery from going into thermal runaway.Given their advantages in enhancing the intrinsic safety of LIBs,this paper overviews the research progresses of SRCMs after a brief introduction of thermal runaway mechanism and limitations of conventional thermal runaway mitigating measures.More importantly,the current states and issues,key challenges,and future developing trends of SRCTs are also discussed and outlined from the viewpoint of practical application,aiming at providing insights and guidance for developing more effective SRCMs for LIBs. 展开更多
关键词 Li-ion battery SAFETY Thermal runaway Thermal protection Overcharge protection
下载PDF
A spotlight on dosage and subject selection for effective neuroprotection: exploring the central role of mitochondria
11
作者 John Mitrofanis Jonathan Stone +3 位作者 Michael R.Hamblin Pierre Magistretti Alim-Louis Benabid Glen Jeffery 《Neural Regeneration Research》 SCIE CAS 2025年第4期1081-1082,共2页
Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological cond... Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological conditions,including stroke,head trauma,and neurodegenerative disease,can generate stress in neurons,affecting their survival and proper function.In most neural pathologies,mitochondria become dysfunctional and this plays a pivotal role in the process of cell death.The challenge over the last few decades has been to develop effective interventions that improve neuronal homeostasis under pathological conditions.Such interventions,often referred to as disease-modifying or neuroprotective,have,however,proved frustratingly elusive,at both preclinical and,in particular,clinical levels.In this perspective,we highlight two factors that we feel are key to the development of effective neuroprotective treatments.These are:firstly,the choice of dose of intervention and method of application,and secondly,the selection of subjects,whether they be patients or the animal model. 展开更多
关键词 protective DOSAGE DISTRESS
下载PDF
Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
12
作者 Mohammed Amin Almaiah Leen Mohammad Saqr +3 位作者 Leen Ahmad Al-Rawwash Layan Ahmed Altellawi Romel Al-Ali Omar Almomani 《Computers, Materials & Continua》 SCIE EI 2024年第11期3189-3220,共32页
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues... Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks. 展开更多
关键词 Cyber threats database systems cyber risk assessment VULNERABILITIES countermeasures
下载PDF
Revision of Water Function Division and Countermeasures for Water Resources Protection in Jiangjin District of Chongqing City in China
13
作者 侯新 《Journal of Landscape Research》 2011年第12期54-57,70,共5页
According to the current situation and development planning of water resources in Jiangjin District of Three Gorge Reservoir Area at the upper reaches of Yangtze River,by combining with social needs,through the survey... According to the current situation and development planning of water resources in Jiangjin District of Three Gorge Reservoir Area at the upper reaches of Yangtze River,by combining with social needs,through the survey on pollution source and analysis of water quality,based on the Report of Water Function Division of Jiangjin District(2005) ,the adjustment and revision have been conducted on water function divisions,and corresponding protection targets and countermeasures for water resources have been proposed,so that the water function division can comply with the development situation of Jiangjin District,providing a reliable reference for the protection and reasonable utilization of water resources,enhancing the unified and effective supervision of water resources,promoting the sustainable use of water resources in Jiangjin District,and ensuring the sustainable development of regional society and environment. 展开更多
关键词 Three Gorges Reservoir Area Jiangjin DISTRICT WATER FUNCTION DIVISION WATER resources protection countermeasures
下载PDF
Enhancing Identity Protection in Metaverse-Based Psychological Counseling System
14
作者 Jun Lee Hanna Lee +1 位作者 Seong Chan Lee Hyun Kwon 《Computers, Materials & Continua》 SCIE EI 2024年第1期617-632,共16页
Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the subopt... Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse. 展开更多
关键词 Metaverse counseling system face tracking identity protection
下载PDF
What If the Protection against Oxidation of Chromia-Forming Alloys Was Not Always Due to the Chromia Layer?
15
作者 Boris Contri Stéphane Valette +1 位作者 Marina Soustre Pierre Lefort 《American Journal of Analytical Chemistry》 CAS 2024年第9期286-302,共17页
Chromia-forming alloys have good resistance to oxidizing agents such as O2, CO2, … It is accepted that the protection of these alloys is always due to the chromia layer formed at the surface of the alloys, which acts... Chromia-forming alloys have good resistance to oxidizing agents such as O2, CO2, … It is accepted that the protection of these alloys is always due to the chromia layer formed at the surface of the alloys, which acts as a barrier between the oxidizing gases and the alloy substrates, forming a diffusion zone that limits the overall reaction rate and leads to parabolic kinetics. But this was not verified in the study devoted to Inconel®625 the oxidation in CO2 that was followed by TGA, with characterizations by XRD, EDS and FIB microscopy. Contrary to what was expected and accepted in similar studies on other chromia-forming alloys, it was shown that the diffusion step that governs the overall reaction rate is not located inside the chromia layer but inside the alloy, precisely inside a zone just beneath the interface alloy/chromia, this zone being depleted in chromium. The chromia layer, therefore, plays no kinetic role and does not directly protect the underlying alloy. This result was demonstrated using a simple test that consisted in removing the chromia layer from the surface of samples partially oxidized and then to continue the thermal treatment: insofar as the kinetics continued without any change in rate, this proved that this surface layer of oxide did not protect the substrate. Based on previous work on many chromia-forming alloys, the possibility of a similar reaction mechanism is discussed. If the chromia layer is not the source of protection for a number of chromia-forming alloys, as is suspected, this might have major consequences in terms of industrial applications. 展开更多
关键词 Chromia-Forming Alloys Chromia Layer Oxidation protection Inconel®625 Kinetics
下载PDF
Formation and ecological response of sand patches in the protection system of Shapotou section of the Baotou-Lanzhou railway,China
16
作者 DUN Yaoquan QU Jianjun +4 位作者 KANG Wenyan LI Minlan LIU Bin WANG Tao SHAO Mei 《Journal of Arid Land》 SCIE CSCD 2024年第2期298-313,共16页
The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses ... The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses a threat to both stability and sustainability.However,there is limited knowledge regarding the morphology,dynamic changes,and ecological responses associated with these sand patches.Therefore,we analyzed the formation and development process of sand patches within the protection system and its effects on herbaceous vegetation growth and soil nutrients through field observation,survey,and indoor analysis methods.The results showed that sand patch development can be divided into three stages,i.e.,formation,expansion,and stabilization,which correspond to the initial,actively developing,and semi-fixed sand patches,respectively.The average dimensions of all sand patch erosional areas were found to be 7.72 m in length,3.91 m in width,and 0.32 m in depth.The actively developing sand patches were the largest,and the initial sand patches were the smallest.Throughout the stage of formation and expansion,the herbaceous community composition changed,and the plant density decreased by more than 50.95%.Moreover,the coverage and height of herbaceous plants decreased in the erosional area and slightly increased in the depositional lobe;and the fine particles and nutrients of soils in the erosional area and depositional lobe showed a decreasing trend.In the stabilization phases of sand patches,the area from the inlet to the bottom of sand patches becomes initially covered with crusts.Vegetation and 0-2 cm surface soil condition improved in the erosional area,but this improvement was not yet evident in the depositional lobe.Factors such as disturbance,climate change,and surface resistance to erosion exert notable influences on the formation and dynamics of sand patches.The results can provide evidence for the future treatment of sand patches and the management of the protection system of Shapotou section of the Baotou-Lanzhou railway. 展开更多
关键词 railway protection system sand patch MORPHOLOGY vegetation characteristic soil property
下载PDF
Wood By-Products as UV Protection:A Consequence Review
17
作者 Naglaa Salem El‑Sayed Mohamed Hasanin Samir Kamel 《Journal of Renewable Materials》 EI CAS 2024年第4期699-720,共22页
In recent decades,the ozone layer has suffered considerable damage,increasing the entry of ultraviolet(UV)light into the atmosphere and reaching the earth’s surface,negatively affecting life.Accordingly,researchers a... In recent decades,the ozone layer has suffered considerable damage,increasing the entry of ultraviolet(UV)light into the atmosphere and reaching the earth’s surface,negatively affecting life.Accordingly,researchers aimed to solve this problem by synthesizing advanced UV-shielding materials.On the other hand,developing an easy and green strategy to prepare functional materials with outstanding properties based on naturally abundant and environmentally friendly raw materials is highly desirable for sustainable development.Because biomass-derived materials are sustainable and biodegradable,they present a promising substitute for petroleum-based polymers.The three main structural constituents of the plant biomass-based materials that are naturally available are cellulose,hemicellulose,and lignin.This review details current developments using wood-based products such as cellulose,hemicellulose,and lignin in UV-shielding applications.It will start with assembling the structure and chemistry of cellulose,hemicellulose,and lignin,followed by their contributions to preparing UV-shielding materials.Finally,it will briefly discuss the different processing methods for the design of UV-shielding materials.The wood by-products offer additional opportunities to use the whole tree harvest. 展开更多
关键词 UV-SHIELDING WOOD cellulose LIGNIN HEMICELLULOSE sunlight protection
下载PDF
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
18
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
下载PDF
Recent Advances in Bronchopulmonary Dysplasia Protection and Therapy
19
作者 Pingfan Xia Hongyi Li +1 位作者 Zhe Xu Yongping Lu 《Health》 2024年第5期470-489,共20页
For preterm infants, bronchopulmonary dysplasia (BPD) is usually caused by abnormal lung development due to various factors during prenatal and postnatal process. One of the reasons for death and bad prognosis of pret... For preterm infants, bronchopulmonary dysplasia (BPD) is usually caused by abnormal lung development due to various factors during prenatal and postnatal process. One of the reasons for death and bad prognosis of preterm infants is to have BPD. Up to now, there are no unified strategies or drugs to treat BPD. In clinical, many intervention treatments have been applied to achieve BPD therapy, mainly including preterm protection, protective ventilation strategies, and delivery of corticosteroids, pulmonary vasodilators, and antioxidants. This review summarizes the current advances in BPD protection and treatment, and notes that gut microbiota and mesenchymal stem cells (MSCs) can be the promising strategy for protecting and treating BPD in the future. 展开更多
关键词 Bronchopulmonary Dysplasia Preterm Infants protection and Therapy Mesenchymal Stem Cells Gut Microbiota
下载PDF
Research on IPFS Image Copyright Protection Method Based on Blockchain
20
作者 Xin Cong Lanjin Feng Lingling Zi 《Computers, Materials & Continua》 SCIE EI 2024年第10期663-684,共22页
In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advanta... In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advantages of decentralized storage,the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership.The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files.To this end,an innovative approach is proposed that integrates blockchain,digital signature,and blind watermarking.Blockchain technology functions as a decentralized and tamper-resistant ledger,recording and verifying the source information of files,thereby establishing credible evidence of file origin.A digital signature serves to authenticate the identity and integrity of the individual responsible for uploading the file,ensuring data security.Furthermore,blind watermarking is employed to embed invisible information within images,thereby safeguarding digital copyrights and enabling file traceability.To further optimize the efficiency of file retrieval within IPFS,a dual-layer Distributed Hash Table(DHT)indexing structure is proposed.This structure divides file index information into a global index layer and a local index layer,significantly reducing retrieval time and network overhead.The feasibility of the proposed approach is demonstrated through practical examples,providing an effective solution to the copyright protection issues associated with IPFS image files. 展开更多
关键词 Blockchain copyright protection IPFS distributed hash table digital sig
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部