期刊文献+
共找到517,274篇文章
< 1 2 250 >
每页显示 20 50 100
Dynamical distribution of continuous service time model involving non-Maxwellian collision kernel and value functions
1
作者 Minfang Zhao Lingting Kong +1 位作者 Miao Liu Shaoyong Lai 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第9期340-348,共9页
The distribution of continuous service time in call centers is investigated.A non-Maxwellian collision kernel combining two different value functions in the interaction rule are used to describe the evolution of conti... The distribution of continuous service time in call centers is investigated.A non-Maxwellian collision kernel combining two different value functions in the interaction rule are used to describe the evolution of continuous service time,respectively.Using the statistical mechanical and asymptotic limit methods,Fokker–Planck equations are derived from the corresponding Boltzmann-type equations with non-Maxwellian collision kernels.The steady-state solutions of the Fokker–Planck equation are obtained in exact form.Numerical experiments are provided to support our results under different parameters. 展开更多
关键词 kinetic theory service time Fokker-Planck equation value function
下载PDF
Spatial Distribution Characteristics and Coverage Rate of Commercial Facilities in 15-minute Radius Livelihood Service Circles of Chunshu Street
2
作者 HAN Qiqi YANG Kaitai 《Journal of Landscape Research》 2024年第1期17-21,共5页
Building a 15-minute radius livelihood service circle from the needs of residents is a topdown process of optimizing urban layout and promoting high-quality development implemented by the government.In September 2022,... Building a 15-minute radius livelihood service circle from the needs of residents is a topdown process of optimizing urban layout and promoting high-quality development implemented by the government.In September 2022,Xicheng District of Beijing served as a national pilot of the 15-minute radius livelihood service circle.Based on the data of POI,urban walking network and building outline,this paper studies the coverage of commercial service facilities in the 15-minute radius livelihood service circle of Chunshu Street by using kernel density analysis and urban network analysis tools.The research shows that the commercial facilities are concentrated in Zhuangsheng Square and Dazhalan commercial district.There are large gaps in housekeeping and couriers logistics facilities,which need to be further improved. 展开更多
关键词 Chunshu Street 15-minute radius livelihood service circle POI Historic urban areas Community business
下载PDF
Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms
3
作者 Zaed Mahdi Nada Abdalhussien +1 位作者 Naba Mahmood Rana Zaki 《Computers, Materials & Continua》 SCIE EI 2024年第8期2139-2159,共21页
The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks... The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things(IoT)networks,as devices can be monitored or service isolated from them and affect users in one way or another.Securing Internet of Things networks is an important matter,as it requires the use of modern technologies and methods,and real and up-to-date data to design and train systems to keep pace with the modernity that attackers use to confront these attacks.One of the most common types of attacks against IoT devices is Distributed Denial-of-Service(DDoS)attacks.Our paper makes a unique contribution that differs from existing studies,in that we use recent data that contains real traffic and real attacks on IoT networks.And a hybrid method for selecting relevant features,And also how to choose highly efficient algorithms.What gives the model a high ability to detect distributed denial-of-service attacks.the model proposed is based on a two-stage process:selecting essential features and constructing a detection model using the K-neighbors algorithm with two classifier algorithms logistic regression and Stochastic Gradient Descent classifier(SGD),combining these classifiers through ensemble machine learning(stacking),and optimizing parameters through Grid Search-CV to enhance system accuracy.Experiments were conducted to evaluate the effectiveness of the proposed model using the CIC-IoT2023 and CIC-DDoS2019 datasets.Performance evaluation demonstrated the potential of our model in robust intrusion detection in IoT networks,achieving an accuracy of 99.965%and a detection time of 0.20 s for the CIC-IoT2023 dataset,and 99.968%accuracy with a detection time of 0.23 s for the CIC-DDoS 2019 dataset.Furthermore,a comparative analysis with recent related works highlighted the superiority of our methodology in intrusion detection,showing improvements in accuracy,recall,and detection time. 展开更多
关键词 DDOS service NETWORKS
下载PDF
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
4
作者 Emmanuel S. Kolawole Penrose S. Cofie +4 位作者 John H. Fuller Cajetan M. Akujuobi Emmanuel A. Dada Justin F. Foreman Pamela H. Obiomon 《Communications and Network》 2024年第3期108-134,共27页
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati... The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene. 展开更多
关键词 Smart Grid System distributed Denial of service (DDoS) Attack Intrusion Detection and Prevention Systems DETECTION Mitigation and Stealthwatch
下载PDF
Current Trends in the Management of Distributed Transactions in Micro-Services Architectures: A Systematic Literature Review
5
作者 Samuel Lungu Mayumbo Nyirenda 《Open Journal of Applied Sciences》 2024年第9期2519-2543,共25页
In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systema... In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers. 展开更多
关键词 Microservice Architecture distributed Transactions Two-Phase Commit (2PC)
下载PDF
Responsibility Distribution Between the Government and Society in Guaranteeing Basic Senior Care Services
6
作者 张演锋 QIAN Chuijun 《The Journal of Human Rights》 2023年第2期347-372,共26页
The 20th National Congress of the Communist Party of China put forward the task to ensure all elderly people enjoy basic senior care services.In an aging society,basic senior care services are key to protecting the ba... The 20th National Congress of the Communist Party of China put forward the task to ensure all elderly people enjoy basic senior care services.In an aging society,basic senior care services are key to protecting the basic human rights of the elderly.The government-society partnership is an ideal model to guarantee basic senior care services.In terms of responsibility distribution,the government and social organizations should follow the principle of subsidiarity.On the one hand,social organizations undertake the responsibility to provide basic senior care services under public constraints with regard to service prices,service content,and service targets;On the other hand,the government is the responsible guarantor for minimum senior care services and the prevention of risks.The government’s responsibility of guaranteeing minimum senior care services lies in the government taking over relevant projects after the occurrence of risks.Constrained by the principle of subsidiarity,the government’s responsibility for risk prevention shifts from ex-ante prevention to interim and ex-post prevention.Emphasis should be placed on the principle of the government and society assuming shared responsibilities for risk prevention and achieving risk prevention through government spending. 展开更多
关键词 basic senior care services principle of subsidiarity government-society partnership risk prevention
下载PDF
FPGA-based position reconstruction method for neutron beam flux spatial distribution measurement in BNCT 被引量:1
7
作者 Wei Jiang Ping Cao +5 位作者 Yi-Ming Wu Xian-Ke Liu Zhu-Jun Fang Zhi-Yong Zhang Bin Shi Jun Chen 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第3期96-108,共13页
A new measurement method for the spatial distribution of neutron beam flux in boron neutron capture therapy(BNCT)is being developed based on the two-dimensional Micromegas detector.To address the issue of long process... A new measurement method for the spatial distribution of neutron beam flux in boron neutron capture therapy(BNCT)is being developed based on the two-dimensional Micromegas detector.To address the issue of long processing times in traditional offline position reconstruction methods,this paper proposes a field programmable gate array based online position reconstruction method utilizing the micro-time projection chamber principle.This method encapsulates key technical aspects:a self-adaptive serial link technique built upon the dynamical adjustment of the delay chain length,fast sorting,a coordinate-matching technique based on the mapping between signal timestamps and random access memory(RAM)addresses,and a precise start point-merging technique utilizing a circular combined RAM.The performance test of the selfadaptive serial link shows that the bit error rate of the link is better than 10-12 at a confidence level of 99%,ensuring reliable data transmission.The experiment utilizing the readout electronics and Micromegas detector shows a spatial resolution of approximately 1.4 mm,surpassing the current method’s resolution level of 5 mm.The beam experiment confirms that the readout electronics system can obtain the flux spatial distribution of neutron beams online,thus validating the feasibility of the position reconstruction method.The online position reconstruction method avoids traditional methods,such as bubble sorting and traversal searching,simplifies the design of the logic firmware,and reduces the time complexity from O(n2)to O(n).This study contributes to the advancement in measuring neutron beam flux for BNCT. 展开更多
关键词 Position reconstruction FPGA Readout electronics Neutron flux spatial distribution
下载PDF
Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution 被引量:1
8
作者 Tao Yin Changgen Peng +2 位作者 Weijie Tan Dequan Xu Hanlin Tang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期827-843,共17页
In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie distribution.The traditional approach to obtaining ... In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie distribution.The traditional approach to obtaining the Tweedie regression model involves training on a centralized dataset,when the data is provided by multiple parties,training a privacy-preserving Tweedie regression model without exchanging raw data becomes a challenge.To address this issue,this study introduces a novel vertical federated learning-based Tweedie regression algorithm for multi-party auto insurance rate setting in data silos.The algorithm can keep sensitive data locally and uses privacy-preserving techniques to achieve intersection operations between the two parties holding the data.After determining which entities are shared,the participants train the model locally using the shared entity data to obtain the local generalized linear model intermediate parameters.The homomorphic encryption algorithms are introduced to interact with and update the model intermediate parameters to collaboratively complete the joint training of the car insurance rate-setting model.Performance tests on two publicly available datasets show that the proposed federated Tweedie regression algorithm can effectively generate Tweedie regression models that leverage the value of data fromboth partieswithout exchanging data.The assessment results of the scheme approach those of the Tweedie regressionmodel learned fromcentralized data,and outperformthe Tweedie regressionmodel learned independently by a single party. 展开更多
关键词 Rate setting Tweedie distribution generalized linear models federated learning homomorphic encryption
下载PDF
Synergetic optimization operation method for distribution network based on SOP and PV 被引量:1
9
作者 Lei Chen Ning Zhang +4 位作者 Xingfang Yang Wei Pei Zhenxing Zhao Yinan Zhu Hao Xiao 《Global Energy Interconnection》 EI CSCD 2024年第2期130-141,共12页
The integration of distributed generation brings in new challenges for the operation of distribution networks,including out-of-limit voltage and power flow control.Soft open points(SOP)are new power electronic devices... The integration of distributed generation brings in new challenges for the operation of distribution networks,including out-of-limit voltage and power flow control.Soft open points(SOP)are new power electronic devices that can flexibly control active and reactive power flows.With the exception of active power output,photovoltaic(PV)devices can provide reactive power compensation through an inverter.Thus,a synergetic optimization operation method for SOP and PV in a distribution network is proposed.A synergetic optimization model was developed.The voltage deviation,network loss,and ratio of photovoltaic abandonment were selected as the objective functions.The PV model was improved by considering the three reactive power output modes of the PV inverter.Both the load fluctuation and loss of the SOP were considered.Three multi-objective optimization algorithms were used,and a compromise optimal solution was calculated.Case studies were conducted using an IEEE 33-node system.The simulation results indicated that the SOP and PVs complemented each other in terms of active power transmission and reactive power compensation.Synergetic optimization improves power control capability and flexibility,providing better power quality and PV consumption rate. 展开更多
关键词 Synergetic optimization Soft open point(SOP) Photovoltaic(PV) distribution network
下载PDF
Coseismic deformation and fault slip distribution of the 2023 M_(W)7.8 and M_(W)7.6 earthquakes in Türkiye 被引量:1
10
作者 Weikang Li Lijiang Zhao +4 位作者 Kai Tan Xiaofei Lu Caihong Zhang Chengtao Li Shuaishuai Han 《Earthquake Science》 2024年第3期263-276,共14页
On February 6,2023,a devastating earthquake with a moment magnitude of M_(W)7.8 struck the town of Pazarcik in south-central Türkiye,followed by another powerful earthquake with a moment magnitude of M_(W)7.6 tha... On February 6,2023,a devastating earthquake with a moment magnitude of M_(W)7.8 struck the town of Pazarcik in south-central Türkiye,followed by another powerful earthquake with a moment magnitude of M_(W)7.6 that struck the nearby city of Elbistan 9 h later.To study the characteristics of surface deformation caused by this event and the influence of fault rupture,this study calculated the static coseismic deformation of 56 stations and dynamic displacement waveforms of 15 stations using data from the Turkish national fixed global navigation satellite system(GNSS)network.A maximum static coseismic displacement of 0.38 m for the M_(W)7.8 Kahramanmaras earthquake was observed at station ANTE,36 km from the epicenter,and a maximum dynamic coseismic displacement of 4.4 m for the M_(W)7.6 Elbistan earthquake was observed at station EKZ1,5 km from the epicenter.The rupture-slip distributions of the two earthquakes were inverted using GNSS coseismic deformation as a constraint.The results showed that the Kahramanmaras earthquake rupture segment was distinct and exposed on the ground,resulting in significant rupture slip along the Amanos and Pazarcik fault segments of the East Anatolian Fault.The maximum slip in the Pazarcik fault segment was 10.7 m,and rupture occurred at depths of 0–15 km.In the Cardak fault region,the Elbistan earthquake caused significant ruptures at depths of 0–12 km,with the largest amount of slip reaching 11.6 m.The Coulomb stress change caused by the Kahramanmaras earthquake rupture along the Cardak fault segment was approximately 2 bars,and the area of increased Coulomb stress corresponded to the subsequent rupture region of the M_(W)7.6 earthquake.Thus,it is likely that the M_(W)7.8 earthquake triggered or promoted the M_(W)7.6 earthquake.Based on the cumulative stress impact of the M_(W)7.8 and M_(W)7.6 events,the southwestern segment of the East Anatolian Fault,specifically the Amanos fault segment,experienced a Coulomb rupture stress change exceeding 2 bars,warranting further attention to assess its future seismic hazard risk. 展开更多
关键词 2023 Türkiye earthquake GNSS observation coseismic deformation field slip distribution
下载PDF
Integrative biogeography: Validating hypotheses of species distribution 被引量:1
11
作者 Zhong-E Hou Shu-Qiang Li 《Zoological Research(Diversity and Conservation)》 2024年第1期86-88,共3页
DEAR EDITOR,Biogeography is a scientific field dedicated to the investigation of the origins and distribution patterns of organisms,as well as predicting future alterations in their geographical distributions(Cox&... DEAR EDITOR,Biogeography is a scientific field dedicated to the investigation of the origins and distribution patterns of organisms,as well as predicting future alterations in their geographical distributions(Cox&Moore,2005).However,the majority of conclusions drawn within the field of biogeography are hypothetical.Rigorous testing of these biogeographic hypotheses remains a considerable challenge.This paper presents the concept of“integrative biogeography”,which emphasizes the experimental testing of biogeographic hypotheses through studies on geological history,as well as biotic and abiotic factors(Figure 1). 展开更多
关键词 BIOGEOGRAPHY distribution DATING
下载PDF
Extended wet sieving method for determination of complete particle size distribution of general soils 被引量:1
12
作者 Shengnan Ma Yi Song +2 位作者 Jiawei Liu Xingyu Kang Zhongqi Quentin Yue 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第1期242-257,共16页
The traditional standard wet sieving method uses steel sieves with aperture?0.063 mm and can only determine the particle size distribution(PSD)of gravel and sand in general soil.This paper extends the traditional meth... The traditional standard wet sieving method uses steel sieves with aperture?0.063 mm and can only determine the particle size distribution(PSD)of gravel and sand in general soil.This paper extends the traditional method and presents an extended wet sieving method.The extended method uses both the steel sieves and the nylon filter cloth sieves.The apertures of the cloth sieves are smaller than 0.063 mm and equal 0.048 mm,0.038 mm,0.014 mm,0.012 mm,0.0063 mm,0.004 mm,0.003 mm,0.002 mm,and 0.001 mm,respectively.The extended method uses five steps to separate the general soil into many material sub-groups of gravel,sand,silt and clay with known particle size ranges.The complete PSD of the general soil is then calculated from the dry masses of the individual material sub-groups.The extended method is demonstrated with a general soil of completely decomposed granite(CDG)in Hong Kong,China.The silt and clay materials with different particle size ranges are further examined,checked and verified using stereomicroscopic observation,physical and chemical property tests.The results further confirm the correctness of the extended wet sieving method. 展开更多
关键词 Particle size distribution(PSD) General soil SILT CLAY Wet sieving Physical and chemical properties
下载PDF
Hydrocarbon accumulation and orderly distribution of whole petroleum system in marine carbonate rocks of Sichuan Basin,SW China 被引量:1
13
作者 GUO Xusheng HUANG Renchun +3 位作者 ZHANG Dianwei LI Shuangjian SHEN Baojian LIU Tianjia 《Petroleum Exploration and Development》 SCIE 2024年第4期852-869,共18页
Based on the situation and progress of marine oil/gas exploration in the Sichuan Basin,SW China,the whole petroleum system is divided for marine carbonate rocks of the basin according to the combinations of hydrocarbo... Based on the situation and progress of marine oil/gas exploration in the Sichuan Basin,SW China,the whole petroleum system is divided for marine carbonate rocks of the basin according to the combinations of hydrocarbon accumulation elements,especially the source rock.The hydrocarbon accumulation characteristics of each whole petroleum system are analyzed,the patterns of integrated conventional and unconventional hydrocarbon accumulation are summarized,and the favorable exploration targets are proposed.Under the control of multiple extensional-convergent tectonic cycles,the marine carbonate rocks of the Sichuan Basin contain three sets of regional source rocks and three sets of regional cap rocks,and can be divided into the Cambrian,Silurian and Permian whole petroleum systems.These whole petroleum systems present mainly independent hydrocarbon accumulation,containing natural gas of affinity individually.Locally,large fault zones run through multiple whole petroleum systems,forming a fault-controlled complex whole petroleum system.The hydrocarbon accumulation sequence of continental shelf facies shale gas accumulation,marginal platform facies-controlled gas reservoirs,and intra-platform fault-and facies-controlled gas reservoirs is common in the whole petroleum system,with a stereoscopic accumulation and orderly distribution pattern.High-quality source rock is fundamental to the formation of large gas fields,and natural gas in a whole petroleum system is generally enriched near and within the source rocks.The development and maintenance of large-scale reservoirs are essential for natural gas enrichment,multiple sources,oil and gas transformation,and dynamic adjustment are the characteristics of marine petroleum accumulation,and good preservation conditions are critical to natural gas accumulation.Large-scale marginal-platform reef-bank facies zones,deep shale gas,and large-scale lithological complexes related to source-connected faults are future marine hydrocarbon exploration targets in the Sichuan Basin. 展开更多
关键词 Sichuan Basin margin oil/gas whole petroleum system carbonate hydrocarbon accumulation hydrocarbon distribution law hydrocarbon exploration target
下载PDF
Influence of Topography on the Distribution and Structure of Woody Plants in the Senegalese Sahel (Sandy Ferlo)
14
作者 Moustapha Bassimbe Sagna Aïssatou Ndong Thiam +5 位作者 Khoudia Niang Oumar Sarr Aly Diallo Sekouna Diatta Daouda Ngom Aliou Guissé 《American Journal of Plant Sciences》 CAS 2024年第1期14-28,共15页
This study describes the floristic composition and structure of a woody stand in the Senegalese Sahel, paying particular attention to the edaphic factors of its floristic composition. A stratified inventory considerin... This study describes the floristic composition and structure of a woody stand in the Senegalese Sahel, paying particular attention to the edaphic factors of its floristic composition. A stratified inventory considering the different relief units was adopted. Woody vegetation was surveyed using a dendrometric approach. The results obtained show that the flora is dominated by a few species adapted to drought, such as Balanites aegyptiaca (L.) Del., Calotropis procera Ait. and Boscia senegalensis (Pers.). The distribution of this flora and the structure of the ligneous plants are linked to the topography. In the lowlands, the flora is more diversified and the ligneous plants reach their optimum level of development compared with the higher relief areas. In the lowlands, there are a few woody species which, in the past, were indicative of better climatic conditions. These are Anogeissus leiocarpus (DC.), Commiphora africana (A. Rich.), Feretia apodanthera Del., Loeseneriella africana (A. Smith), Mitragyna inermis (Willd.) and Sclerocarya birrea (A. Rich). It is important that their reintroduction into reforestation projects takes account of their edaphic preference. 展开更多
关键词 Woody Plants distribution TOPOGRAPHY Ferlo Senegal
下载PDF
Neural stem cell-derived exosomes promote mitochondrial biogenesis and restore abnormal protein distribution in a mouse model of Alzheimer's disease 被引量:1
15
作者 Bo Li Yujie Chen +10 位作者 Yan Zhou Xuanran Feng Guojun Gu Shuang Han Nianhao Cheng Yawen Sun Yiming Zhang Jiahui Cheng Qi Zhang Wei Zhang Jianhui Liu 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第7期1593-1601,共9页
Mitochondrial dysfunction is a hallmark of Alzheimer’s disease.We previously showed that neural stem cell-derived extracellular vesicles improved mitochondrial function in the cortex of AP P/PS1 mice.Because Alzheime... Mitochondrial dysfunction is a hallmark of Alzheimer’s disease.We previously showed that neural stem cell-derived extracellular vesicles improved mitochondrial function in the cortex of AP P/PS1 mice.Because Alzheimer’s disease affects the entire brain,further research is needed to elucidate alterations in mitochondrial metabolism in the brain as a whole.Here,we investigated the expression of several important mitochondrial biogenesis-related cytokines in multiple brain regions after treatment with neural stem cell-derived exosomes and used a combination of whole brain clearing,immunostaining,and lightsheet imaging to clarify their spatial distribution.Additionally,to clarify whether the sirtuin 1(SIRT1)-related pathway plays a regulatory role in neural stem cell-de rived exosomes interfering with mitochondrial functional changes,we generated a novel nervous system-SIRT1 conditional knoc kout AP P/PS1mouse model.Our findings demonstrate that neural stem cell-de rived exosomes significantly increase SIRT1 levels,enhance the production of mitochondrial biogenesis-related fa ctors,and inhibit astrocyte activation,but do not suppress amyloid-βproduction.Thus,neural stem cell-derived exosomes may be a useful therapeutic strategy for Alzheimer’s disease that activates the SIRT1-PGC1αsignaling pathway and increases NRF1 and COXIV synthesis to improve mitochondrial biogenesis.In addition,we showed that the spatial distribution of mitochondrial biogenesis-related factors is disrupted in Alzheimer’s disease,and that neural stem cell-derived exosome treatment can reverse this effect,indicating that neural stem cell-derived exosomes promote mitochondrial biogenesis. 展开更多
关键词 Alzheimer’s disease mitochondrial biogenesis neural stem cell-derived exosome SIRT1-PGC1α regional brain distribution whole brain clearing and imaging
下载PDF
Neural Network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
16
作者 Xueli Wang Shangwei Zhao +2 位作者 Ming Yang Xin Wang Xiaoming Wu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2182-2184,共3页
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)protocol.More specifically,to reduce the communicat... Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)protocol.More specifically,to reduce the communication burden,a TOD protocol with novel update rules on protocol weights is designed for scheduling measurement outputs.In addition,unknown nonlinear functions vulnerable to DoS attacks are considered due to the openness and vulnerability of the network. 展开更多
关键词 service DOS service
下载PDF
Diversity of Orchids in Terms of Their Distribution, Uses and Conservation in Annapurna Conservation Area of Nepal
17
作者 Babu Lal Tiruwa Basu Dev Neupane +2 位作者 Rabin Kadariya Chiranjibi Prasad Pokheral Bijaya Pant 《American Journal of Plant Sciences》 CAS 2024年第6期422-440,共19页
The Annapurna Conservation Area (ACA), the first conservation area and the largest protected area (PA) in Nepal, is incredibly rich in biodiversity. Notwithstanding this, orchids in the ACA have not been explored enou... The Annapurna Conservation Area (ACA), the first conservation area and the largest protected area (PA) in Nepal, is incredibly rich in biodiversity. Notwithstanding this, orchids in the ACA have not been explored enough yet thus making the need for ambitious research to be carried out. Previous study only included 81 species of orchids within ACA. This study aims to update the record of species and genera richness in the ACA. In total 198 species of orchids, belonging to 67 genera (40% and 62% of the total recorded orchid species and genera in Nepal) has been recorded in ACA. This represents an increase of 144% in species and 56% in genera over the previous data. Out of the 198 species, 99 were epiphytes, 6 were holomycotrophic and 93 were terrestrial. Among the 67 genera, Bulbophyllum (17) species were dominant, followed by Dendrobium (16), Herminium (10), Coelogyne, Plantanthera (9 each), Eria, Habenaria, Oberonia (8 each), Calanthe (7), and Liparis (6). Fifty-six species were found to be ornamentally significant and 85 species medicinally significant. 展开更多
关键词 ORCHIDS Annapurna Conservation Area DIVERSITY distribution USES
下载PDF
Boosting Adversarial Training with Learnable Distribution
18
作者 Kai Chen Jinwei Wang +2 位作者 James Msughter Adeke Guangjie Liu Yuewei Dai 《Computers, Materials & Continua》 SCIE EI 2024年第3期3247-3265,共19页
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural networks.Adversarial training is one of the most potent methods to defend against adversarial attacks.How... In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural networks.Adversarial training is one of the most potent methods to defend against adversarial attacks.However,the difference in the feature space between natural and adversarial examples hinders the accuracy and robustness of the model in adversarial training.This paper proposes a learnable distribution adversarial training method,aiming to construct the same distribution for training data utilizing the Gaussian mixture model.The distribution centroid is built to classify samples and constrain the distribution of the sample features.The natural and adversarial examples are pushed to the same distribution centroid to improve the accuracy and robustness of the model.The proposed method generates adversarial examples to close the distribution gap between the natural and adversarial examples through an attack algorithm explicitly designed for adversarial training.This algorithm gradually increases the accuracy and robustness of the model by scaling perturbation.Finally,the proposed method outputs the predicted labels and the distance between the sample and the distribution centroid.The distribution characteristics of the samples can be utilized to detect adversarial cases that can potentially evade the model defense.The effectiveness of the proposed method is demonstrated through comprehensive experiments. 展开更多
关键词 Adversarial training feature space learnable distribution distribution centroid
下载PDF
Deep Reinforcement Learning-Based Task Offloading and Service Migrating Policies in Service Caching-Assisted Mobile Edge Computing
19
作者 Ke Hongchang Wang Hui +1 位作者 Sun Hongbin Halvin Yang 《China Communications》 SCIE CSCD 2024年第4期88-103,共16页
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.... Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms. 展开更多
关键词 deep reinforcement learning mobile edge computing service caching service migrating
下载PDF
Adaptive Update Distribution Estimation under Probability Byzantine Attack
20
作者 Gang Long Zhaoxin Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第10期1667-1685,共19页
The secure and normal operation of distributed networks is crucial for accurate parameter estimation.However,distributed networks are frequently susceptible to Byzantine attacks.Considering real-life scenarios,this pa... The secure and normal operation of distributed networks is crucial for accurate parameter estimation.However,distributed networks are frequently susceptible to Byzantine attacks.Considering real-life scenarios,this paper investigates a probability Byzantine(PB)attack,utilizing a Bernoulli distribution to simulate the attack probability.Historically,additional detection mechanisms are used to mitigate such attacks,leading to increased energy consumption and burdens on distributed nodes,consequently diminishing operational efficiency.Differing from these approaches,an adaptive updating distributed estimation algorithm is proposed to mitigate the impact of PB attacks.In the proposed algorithm,a penalty strategy is initially incorporated during data updates to weaken the influence of the attack.Subsequently,an adaptive fusion weight is employed during data fusion to merge the estimations.Additionally,the reason why this penalty term weakens the attack has been analyzed,and the performance of the proposed algorithm is validated through simulation experiments. 展开更多
关键词 distribution estimation network security least-mean-square binomial distribution probability Byzantine attack
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部