期刊文献+
共找到66,143篇文章
< 1 2 250 >
每页显示 20 50 100
A dynamic database of solid-state electrolyte(DDSE)picturing all-solid-state batteries 被引量:1
1
作者 Fangling Yang Egon Campos dos Santos +5 位作者 Xue Jia Ryuhei Sato Kazuaki Kisu Yusuke Hashimoto Shin-ichi Orimo Hao Li 《Nano Materials Science》 EI CAS CSCD 2024年第2期256-262,共7页
All-solid-state batteries(ASSBs)are a class of safer and higher-energy-density materials compared to conventional devices,from which solid-state electrolytes(SSEs)are their essential components.To date,investigations ... All-solid-state batteries(ASSBs)are a class of safer and higher-energy-density materials compared to conventional devices,from which solid-state electrolytes(SSEs)are their essential components.To date,investigations to search for high ion-conducting solid-state electrolytes have attracted broad concern.However,obtaining SSEs with high ionic conductivity is challenging due to the complex structural information and the less-explored structure-performance relationship.To provide a solution to these challenges,developing a database containing typical SSEs from available experimental reports would be a new avenue to understand the structureperformance relationships and find out new design guidelines for reasonable SSEs.Herein,a dynamic experimental database containing>600 materials was developed in a wide range of temperatures(132.40–1261.60 K),including mono-and divalent cations(e.g.,Li^(+),Na^(+),K^(+),Ag^(+),Ca^(2+),Mg^(2+),and Zn^(2+))and various types of anions(e.g.,halide,hydride,sulfide,and oxide).Data-mining was conducted to explore the relationships among different variates(e.g.,transport ion,composition,activation energy,and conductivity).Overall,we expect that this database can provide essential guidelines for the design and development of high-performance SSEs in ASSB applications.This database is dynamically updated,which can be accessed via our open-source online system. 展开更多
关键词 Solid-state electrolyte(SSE) All-solid-state battery(ASSB) Ionic conductivity Dynamic database Machine learning
下载PDF
Discrimination of polysorbate 20 by high-performance liquid chromatography-charged aerosol detection and characterization for components by expanding compound database and library
2
作者 Shi-Qi Wang Xun Zhao +10 位作者 Li-Jun Zhang Yue-Mei Zhao Lei Chen Jin-Lin Zhang Bao-Cheng Wang Sheng Tang Tom Yuan Yaozuo Yuan Mei Zhang Hian Kee Lee Hai-Wei Shi 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2024年第5期722-732,共11页
Analyzing polysorbate 20(PS20)composition and the impact of each component on stability and safety is crucial due to formulation variations and individual tolerance.The similar structures and polarities of PS20 compon... Analyzing polysorbate 20(PS20)composition and the impact of each component on stability and safety is crucial due to formulation variations and individual tolerance.The similar structures and polarities of PS20 components make accurate separation,identification,and quantification challenging.In this work,a high-resolution quantitative method was developed using single-dimensional high-performance liquid chromatography(HPLC)with charged aerosol detection(CAD)to separate 18 key components with multiple esters.The separated components were characterized by ultra-high-performance liquid chromatography-quadrupole time-of-flight mass spectrometry(UHPLC-Q-TOF-MS)with an identical gradient as the HPLC-CAD analysis.The polysorbate compound database and library were expanded over 7-time compared to the commercial database.The method investigated differences in PS20 samples from various origins and grades for different dosage forms to evaluate the composition-process relationship.UHPLC-Q-TOF-MS identified 1329 to 1511 compounds in 4 batches of PS20 from different sources.The method observed the impact of 4 degradation conditions on peak components,identifying stable components and their tendencies to change.HPLC-CAD and UHPLC-Q-TOF-MS results provided insights into fingerprint differences,distinguishing quasi products. 展开更多
关键词 Polysorbate 20 Component database DISCRIMINATION Degradation
下载PDF
Enhancing AI System Privacy:An Automatic Tool for Achieving GDPR Compliance in NoSQL Databases
3
作者 Yifei Zhao Zhaohui Li Siyi Lv 《Computers, Materials & Continua》 SCIE EI 2024年第7期217-234,共18页
The EU’s Artificial Intelligence Act(AI Act)imposes requirements for the privacy compliance of AI systems.AI systems must comply with privacy laws such as the GDPR when providing services.These laws provide users wit... The EU’s Artificial Intelligence Act(AI Act)imposes requirements for the privacy compliance of AI systems.AI systems must comply with privacy laws such as the GDPR when providing services.These laws provide users with the right to issue a Data Subject Access Request(DSAR).Responding to such requests requires database administrators to identify information related to an individual accurately.However,manual compliance poses significant challenges and is error-prone.Database administrators need to write queries through time-consuming labor.The demand for large amounts of data by AI systems has driven the development of NoSQL databases.Due to the flexible schema of NoSQL databases,identifying personal information becomes even more challenging.This paper develops an automated tool to identify personal information that can help organizations respond to DSAR.Our tool employs a combination of various technologies,including schema extraction of NoSQL databases and relationship identification from query logs.We describe the algorithm used by our tool,detailing how it discovers and extracts implicit relationships from NoSQL databases and generates relationship graphs to help developers accurately identify personal data.We evaluate our tool on three datasets,covering different database designs,achieving an F1 score of 0.77 to 1.Experimental results demonstrate that our tool successfully identifies information relevant to the data subject.Our tool reduces manual effort and simplifies GDPR compliance,showing practical application value in enhancing the privacy performance of NOSQL databases and AI systems. 展开更多
关键词 GDPR compliance NoSQL databases AI system PRIVACY
下载PDF
Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
4
作者 Mohammed Amin Almaiah Leen Mohammad Saqr +3 位作者 Leen Ahmad Al-Rawwash Layan Ahmed Altellawi Romel Al-Ali Omar Almomani 《Computers, Materials & Continua》 SCIE EI 2024年第11期3189-3220,共32页
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues... Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks. 展开更多
关键词 Cyber threats database systems cyber risk assessment VULNERABILITIES COUNTERMEASURES
下载PDF
Database Search Behaviors: Insight from a Survey of Information Retrieval Practices
5
作者 Babita Trivedi Brijender Dahiya +2 位作者 Anjali Maan Rajesh Giri Vinod Prasad 《Intelligent Information Management》 2024年第5期195-218,共24页
This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, catego... This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns. 展开更多
关键词 Information Retrieval database Search User Behavior Patterns
下载PDF
Comprehensive analysis of advanced glycation end-products in commonly consumed foods:presenting a database for dietary AGEs and associated exposure assessment
6
作者 Qiaozhi Zhang Huatao Li +7 位作者 Ruixing Zheng Lili Cao Shufen Zhang Shuifeng Zhang Huadong Sheng Yuhao Jiang Yanbo Wang Linglin Fu 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第4期1917-1928,共12页
Advanced glycation end-products(AGEs)are a group of heterogeneous compounds formed in heatprocessed foods and are proven to be detrimental to human health.Currently,there is no comprehensive database for AGEs in foods... Advanced glycation end-products(AGEs)are a group of heterogeneous compounds formed in heatprocessed foods and are proven to be detrimental to human health.Currently,there is no comprehensive database for AGEs in foods that covers the entire range of food categories,which limits the accurate risk assessment of dietary AGEs in human diseases.In this study,we first established an isotope dilution UHPLCQq Q-MS/MS-based method for simultaneous quantification of 10 major AGEs in foods.The contents of these AGEs were detected in 334 foods covering all main groups consumed in Western and Chinese populations.Nε-Carboxymethyllysine,methylglyoxal-derived hydroimidazolone isomers,and glyoxal-derived hydroimidazolone-1 are predominant AGEs found in most foodstuffs.Total amounts of AGEs were high in processed nuts,bakery products,and certain types of cereals and meats(>150 mg/kg),while low in dairy products,vegetables,fruits,and beverages(<40 mg/kg).Assessment of estimated daily intake implied that the contribution of food groups to daily AGE intake varied a lot under different eating patterns,and selection of high-AGE foods leads to up to a 2.7-fold higher intake of AGEs through daily meals.The presented AGE database allows accurate assessment of dietary exposure to these glycotoxins to explore their physiological impacts on human health. 展开更多
关键词 Advanced glycation end-products Maillard reaction Processed foods Dietary database Exposure assessment
下载PDF
A Systematic Review of Automated Classification for Simple and Complex Query SQL on NoSQL Database
7
作者 Nurhadi Rabiah Abdul Kadir +1 位作者 Ely Salwana Mat Surin Mahidur R.Sarker 《Computer Systems Science & Engineering》 2024年第6期1405-1435,共31页
A data lake(DL),abbreviated as DL,denotes a vast reservoir or repository of data.It accumulates substantial volumes of data and employs advanced analytics to correlate data from diverse origins containing various form... A data lake(DL),abbreviated as DL,denotes a vast reservoir or repository of data.It accumulates substantial volumes of data and employs advanced analytics to correlate data from diverse origins containing various forms of semi-structured,structured,and unstructured information.These systems use a flat architecture and run different types of data analytics.NoSQL databases are nontabular and store data in a different manner than the relational table.NoSQL databases come in various forms,including key-value pairs,documents,wide columns,and graphs,each based on its data model.They offer simpler scalability and generally outperform traditional relational databases.While NoSQL databases can store diverse data types,they lack full support for atomicity,consistency,isolation,and durability features found in relational databases.Consequently,employing machine learning approaches becomes necessary to categorize complex structured query language(SQL)queries.Results indicate that the most frequently used automatic classification technique in processing SQL queries on NoSQL databases is machine learning-based classification.Overall,this study provides an overview of the automatic classification techniques used in processing SQL queries on NoSQL databases.Understanding these techniques can aid in the development of effective and efficient NoSQL database applications. 展开更多
关键词 NoSQL database data lake machine learning ACID complex query smart city
下载PDF
Databases of 2D material-substrate interfaces and 2D charged building blocks
8
作者 邓俊 潘金波 杜世萱 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期34-38,共5页
Discovery of materials using“bottom-up”or“top-down”approach is of great interest in materials science.Layered materials consisting of two-dimensional(2D)building blocks provide a good platform to explore new mater... Discovery of materials using“bottom-up”or“top-down”approach is of great interest in materials science.Layered materials consisting of two-dimensional(2D)building blocks provide a good platform to explore new materials in this respect.In van der Waals(vdW)layered materials,these building blocks are charge neutral and can be isolated from their bulk phase(top-down),but usually grow on substrate.In ionic layered materials,they are charged and usually cannot exist independently but can serve as motifs to construct new materials(bottom-up).In this paper,we introduce our recently constructed databases for 2D material-substrate interface(2DMSI),and 2D charged building blocks.For 2DMSI database,we systematically build a workflow to predict appropriate substrates and their geometries at substrates,and construct the 2DMSI database.For the 2D charged building block database,1208 entries from bulk material database are identified.Information of crystal structure,valence state,source,dimension and so on is provided for each entry with a json format.We also show its application in designing and searching for new functional layered materials.The 2DMSI database,building block database,and designed layered materials are available in Science Data Bank at https://doi.org/10.57760/sciencedb.j00113.00188. 展开更多
关键词 2D material-substrate interfaces charged building block database functional-oriented materials design layered materials density functional theory
下载PDF
Application of Thermodynamic Database to Corrosion of ZrO_(2) Containing Submerged Entry Nozzle in Steel Continuous Casting Process
9
作者 In-Ho JUNG 《China's Refractories》 CAS 2024年第2期10-15,共6页
The CALPHAD thermodynamic databases are very useful to analyze the complex chemical reactions happening in high temperature material process.The FactSage thermodynamic database can be used to calculate complex phase d... The CALPHAD thermodynamic databases are very useful to analyze the complex chemical reactions happening in high temperature material process.The FactSage thermodynamic database can be used to calculate complex phase diagrams and equilibrium phases involving refractories in industrial process.In this study,the FactSage thermodynamic database relevant to ZrO_(2)-based refractories was reviewed and the application of the database to understanding the corrosion of continuous casting nozzle refractories in steelmaking was presented. 展开更多
关键词 thermodynamic database ZrO_(2)containing submerged entry nozzle continous casting
下载PDF
Impact of index admission cholecystectomy vs interval cholecystectomy on readmission rate in acute cholangitis: National Readmission Database survey
10
作者 Abdullah Sohail Ahmed Shehadah +4 位作者 Ammad Chaudhary Khadija Naseem Amna Iqbal Ahmad Khan Shailendra Singh 《World Journal of Gastrointestinal Endoscopy》 2024年第6期350-360,共11页
BACKGROUND Elective cholecystectomy(CCY)is recommended for patients with gallstone-related acute cholangitis(AC)following endoscopic decompression to prevent recurrent biliary events.However,the optimal timing and imp... BACKGROUND Elective cholecystectomy(CCY)is recommended for patients with gallstone-related acute cholangitis(AC)following endoscopic decompression to prevent recurrent biliary events.However,the optimal timing and implications of CCY remain unclear.AIM To examine the impact of same-admission CCY compared to interval CCY on patients with gallstone-related AC using the National Readmission Database(NRD).METHODS We queried the NRD to identify all gallstone-related AC hospitalizations in adult patients with and without the same admission CCY between 2016 and 2020.Our primary outcome was all-cause 30-d readmission rates,and secondary outcomes included in-hospital mortality,length of stay(LOS),and hospitalization cost.RESULTS Among the 124964 gallstone-related AC hospitalizations,only 14.67%underwent the same admission CCY.The all-cause 30-d readmissions in the same admission CCY group were almost half that of the non-CCY group(5.56%vs 11.50%).Patients in the same admission CCY group had a longer mean LOS and higher hospitalization costs attrib-utable to surgery.Although the most common reason for readmission was sepsis in both groups,the second most common reason was AC in the interval CCY group.CONCLUSION Our study suggests that patients with gallstone-related AC who do not undergo the same admission CCY have twice the risk of readmission compared to those who undergo CCY during the same admission.These readmis-sions can potentially be prevented by performing same-admission CCY in appropriate patients,which may reduce subsequent hospitalization costs secondary to readmissions. 展开更多
关键词 Acute cholangitis Gallstone-related complications National Readmission database 30-d readmission rates Resource utilization In-hospital mortality
下载PDF
Large Language Model Based Semantic Parsing for Intelligent Database Query Engine
11
作者 Zhizhong Wu 《Journal of Computer and Communications》 2024年第10期1-13,共13页
With the rapid development of artificial intelligence, large language models (LLMs) have demonstrated remarkable capabilities in natural language understanding and generation. These models have great potential to enha... With the rapid development of artificial intelligence, large language models (LLMs) have demonstrated remarkable capabilities in natural language understanding and generation. These models have great potential to enhance database query systems, enabling more intuitive and semantic query mechanisms. Our model leverages LLM’s deep learning architecture to interpret and process natural language queries and translate them into accurate database queries. The system integrates an LLM-powered semantic parser that translates user input into structured queries that can be understood by the database management system. First, the user query is pre-processed, the text is normalized, and the ambiguity is removed. This is followed by semantic parsing, where the LLM interprets the pre-processed text and identifies key entities and relationships. This is followed by query generation, which converts the parsed information into a structured query format and tailors it to the target database schema. Finally, there is query execution and feedback, where the resulting query is executed on the database and the results are returned to the user. The system also provides feedback mechanisms to improve and optimize future query interpretations. By using advanced LLMs for model implementation and fine-tuning on diverse datasets, the experimental results show that the proposed method significantly improves the accuracy and usability of database queries, making data retrieval easy for users without specialized knowledge. 展开更多
关键词 Semantic Query Large Language Models Intelligent database Natural Language Processing
下载PDF
Power Information System Database Cache Model Based on Deep Machine Learning
12
作者 Manjiang Xing 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期1081-1090,共10页
At present,the database cache model of power information system has problems such as slow running speed and low database hit rate.To this end,this paper proposes a database cache model for power information systems ba... At present,the database cache model of power information system has problems such as slow running speed and low database hit rate.To this end,this paper proposes a database cache model for power information systems based on deep machine learning.The caching model includes program caching,Structured Query Language(SQL)preprocessing,and core caching modules.Among them,the method to improve the efficiency of the statement is to adjust operations such as multi-table joins and replacement keywords in the SQL optimizer.Build predictive models using boosted regression trees in the core caching module.Generate a series of regression tree models using machine learning algorithms.Analyze the resource occupancy rate in the power information system to dynamically adjust the voting selection of the regression tree.At the same time,the voting threshold of the prediction model is dynamically adjusted.By analogy,the cache model is re-initialized.The experimental results show that the model has a good cache hit rate and cache efficiency,and can improve the data cache performance of the power information system.It has a high hit rate and short delay time,and always maintains a good hit rate even under different computer memory;at the same time,it only occupies less space and less CPU during actual operation,which is beneficial to power The information system operates efficiently and quickly. 展开更多
关键词 Deep machine learning power information system database cache model
下载PDF
Exploration of the Maturity Evaluation of College Students’Innovation and Entrepreneurship Projects Based on Computer Database Technology
13
作者 Shuai Yuan 《Journal of Electronic Research and Application》 2024年第6期89-95,共7页
The college innovation and entrepreneurship program is a powerful means to enhance students’innovation and entrepreneurship skills.Evaluating the maturity of innovation and entrepreneurship projects can stimulate stu... The college innovation and entrepreneurship program is a powerful means to enhance students’innovation and entrepreneurship skills.Evaluating the maturity of innovation and entrepreneurship projects can stimulate students’enthusiasm and initiative to participate.Utilizing computer database technology for maturity evaluation can make the process more efficient,accurate,and convenient,aligning with the needs of the information age.Exploring strategies for applying computer database technology in the maturity evaluation of innovation and entrepreneurship projects offers valuable insights and directions for developing these projects,while also providing strong support for enhancing students’innovation and entrepreneurship abilities. 展开更多
关键词 database Innovation and entrepreneurship projects Maturity evaluation
下载PDF
Computer Network and Database Security Technology Optimization
14
作者 Kachen Zhang 《Journal of Electronic Research and Application》 2024年第6期188-193,共6页
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens... With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel. 展开更多
关键词 Computer network and database Security technology Optimized path
下载PDF
Divide and recombine approach for warranty database: estimating the reliability of an automobile component
15
作者 Md Rezaul Karim 《Data Science and Management》 2024年第2期119-128,共10页
The continuously updated database of failures and censored data of numerous products has become large, and on some covariates, information regarding the failure times is missing in the database. As the dataset is larg... The continuously updated database of failures and censored data of numerous products has become large, and on some covariates, information regarding the failure times is missing in the database. As the dataset is large and has missing information, the analysis tasks become complicated and a long time is required to execute the programming codes. In such situations, the divide and recombine (D&R) approach, which has a practical computational performance for big data analysis, can be applied. In this study, the D&R approach was applied to analyze the real field data of an automobile component with incomplete information on covariates using the Weibull regression model. Model parameters were estimated using the expectation maximization algorithm. The results of the data analysis and simulation demonstrated that the D&R approach is applicable for analyzing such datasets. Further, the percentiles and reliability functions of the distribution under different covariate conditions were estimated to evaluate the component performance of these covariates. The findings of this study have managerial implications regarding design decisions, safety, and reliability of automobile components. 展开更多
关键词 Weibull regression model Warranty database RELIABILITY EM algorithm Divide and recombine approach Managerial implications
下载PDF
Caché数据库中数据的存储及其查询优化
16
作者 牛彩云 王建林 +1 位作者 光奇 樊睿 《信息技术与信息化》 2024年第1期17-21,共5页
Caché数据库的多维数据模型可以存储丰富的数据,在处理复杂的医疗数据时减少了表连接等处理过程,从而使多维数组能更快地存取数据。与主流的Oracle和SQL server等关系型数库相比,Caché主要在其存储结构上有很大的不同,Cach... Caché数据库的多维数据模型可以存储丰富的数据,在处理复杂的医疗数据时减少了表连接等处理过程,从而使多维数组能更快地存取数据。与主流的Oracle和SQL server等关系型数库相比,Caché主要在其存储结构上有很大的不同,Caché主要是以Global的形式存储数据,依据M语言开发应用程序。首先,介绍了Caché数据库中数据的存储形式;然后,展示了在医院HIS系统应用过程中Caché数据库中数据查询的几种方式及应用场合;最后,总结Caché数据库中SQL优化的几种办法。结果表明,Caché数据库具有更高的灵活性,适用于多种应用场合,而且在采用优化的查询方案后查询效率提高了很多倍。 展开更多
关键词 caché数据库 多维数据模型 查询优化 SQL语句 数据存储
下载PDF
ARGs-OAP v3.0:Antibiotic-Resistance Gene Database Curation and Analysis Pipeline Optimization 被引量:2
17
作者 Xiaole Yin Xiawan Zheng +3 位作者 Liguan Li An-Ni Zhang Xiao-Tao Jiang Tong Zhang 《Engineering》 SCIE EI CAS CSCD 2023年第8期234-241,共8页
Antibiotic resistance,which is encoded by antibiotic-resistance genes(ARGs),has proliferated to become a growing threat to public health around the world.With technical advances,especially in the popularization of met... Antibiotic resistance,which is encoded by antibiotic-resistance genes(ARGs),has proliferated to become a growing threat to public health around the world.With technical advances,especially in the popularization of metagenomic sequencing,scientists have gained the ability to decipher the profiles of ARGs in diverse samples with high accuracy at an accelerated speed.To analyze thousands of ARGs in a highthroughput way,standardized and integrated pipelines are needed.The new version(v3.0)of the widely used ARGs online analysis pipeline(ARGs-OAP)has made significant improvements to both the reference database-the structured ARG(SARG)database-and the integrated analysis pipeline.SARG has been enhanced with sequence curation to improve annotation reliability,incorporate emerging resistance genotypes,and determine rigorous mechanism classification.The database has been further organized and visualized online in the format of a tree-like structure with a dictionary.It has also been divided into sub-databases for different application scenarios.In addition,the ARGs-OAP has been improved with adjusted quantification methods,simplified tool implementation,and multiple functions with userdefined reference databases.Moreover,the online platform now provides a diverse biostatistical analysis workflow with visualization packages for the efficient interpretation of ARG profiles.The ARGs-OAP v3.0 with an improved database and analysis pipeline will benefit academia,governmental management,and consultation regarding risk assessment of the environmental prevalence of ARGs. 展开更多
关键词 SARG database ARGs-OAP Antibiotic-resistance genes Environmental metagenome Quantification
下载PDF
Phylobone: a comprehensive database of bone extracellular matrix proteins in human and model organisms 被引量:1
18
作者 Margalida Fontcuberta-Rigo Miho Nakamura Pere Puigbò 《Bone Research》 SCIE CAS CSCD 2023年第3期617-624,共8页
The bone extracellular matrix(ECM) contains minerals deposited on highly crosslinked collagen fibrils and hundreds of noncollagenous proteins. Some of these proteins are key to the regulation of bone formation and reg... The bone extracellular matrix(ECM) contains minerals deposited on highly crosslinked collagen fibrils and hundreds of noncollagenous proteins. Some of these proteins are key to the regulation of bone formation and regeneration via signaling pathways,and play important regulatory and structural roles. However, the complete list of bone extracellular matrix proteins, their roles, and the extent of individual and cross-species variations have not been fully captured in both humans and model organisms. Here, we introduce the most comprehensive resource of bone extracellular matrix(ECM) proteins that can be used in research fields such as bone regeneration, osteoporosis, and mechanobiology. The Phylobone database(available at https://phylobone.com) includes 255proteins potentially expressed in the bone extracellular matrix(ECM) of humans and 30 species of vertebrates. A bioinformatics pipeline was used to identify the evolutionary relationships of bone ECM proteins. The analysis facilitated the identification of potential model organisms to study the molecular mechanisms of bone regeneration. A network analysis showed high connectivity of bone ECM proteins. A total of 214 functional protein domains were identified, including collagen and the domains involved in bone formation and resorption. Information from public drug repositories was used to identify potential repurposing of existing drugs. The Phylobone database provides a platform to study bone regeneration and osteoporosis in light of(biological) evolution,and will substantially contribute to the identification of molecular mechanisms and drug targets. 展开更多
关键词 DRUGS MATRIX database
下载PDF
内存高效的持久性分布式文件系统客户端缓存DFS-Cache 被引量:1
19
作者 倪瑞轩 蔡淼 叶保留 《计算机应用》 CSCD 北大核心 2024年第4期1172-1179,共8页
为了在数据密集型工作流下有效降低缓存碎片整理开销并提高缓存命中率,提出一种持久性分布式文件系统客户端缓存DFS-Cache(Distributed File System Cache)。DFS-Cache基于非易失性内存(NVM)设计实现,能够保证数据的持久性和崩溃一致性... 为了在数据密集型工作流下有效降低缓存碎片整理开销并提高缓存命中率,提出一种持久性分布式文件系统客户端缓存DFS-Cache(Distributed File System Cache)。DFS-Cache基于非易失性内存(NVM)设计实现,能够保证数据的持久性和崩溃一致性,并大幅减少冷启动时间。DFS-Cache包括基于虚拟内存重映射的缓存碎片整理机制和基于生存时间(TTL)的缓存空间管理策略。前者基于NVM可被内存控制器直接寻址的特性,动态修改虚拟地址和物理地址之间的映射关系,实现零拷贝的内存碎片整理;后者是一种冷热分离的分组管理策略,借助重映射的缓存碎片整理机制,提升缓存空间的管理效率。实验采用真实的Intel傲腾持久性内存设备,对比商用的分布式文件系统MooseFS和GlusterFS,采用Fio和Filebench等标准测试程序,DFS-Cache最高能提升5.73倍和1.89倍的系统吞吐量。 展开更多
关键词 非易失性内存 分布式文件系统 客户端缓存 缓存碎片整理 冷热数据分组 缓存设计
下载PDF
Analysis of the expression profile of miRNAs related to skin photoaging in the GEO database 被引量:1
20
作者 KaHo LUI Haibo Zhao +2 位作者 Jiaqi Sun Zeren Shen Jinghong Xu 《Chinese Journal of Plastic and Reconstructive Surgery》 2023年第2期53-59,共7页
Background:Skin aging has recently gained significant attention in both society and skin care research.Understanding the biological processes of photoaging caused by long-term skin exposure to ultraviolet radiation is... Background:Skin aging has recently gained significant attention in both society and skin care research.Understanding the biological processes of photoaging caused by long-term skin exposure to ultraviolet radiation is critical for preventing and treating skin aging.Therefore,it is important to identify genes related to skin photoaging and shed light on their functions.Methods:We used data from the Gene Expression Omnibus(GEO)database and conducted bioinformatics analyses to screen and extract microRNAs(miRNAs)and their downstream target genes related to skin photoaging,and to determine possible biological mechanisms of skin photoaging.Results:A total of 34 differentially expressed miRNAs and their downstream target genes potentially related to the biological process of skin photoaging were identified.Gene Ontology enrichment analysis and Kyoto Encyclopedia of Genes and Genomes pathway enrichment analysis showed that these target genes were enriched in pathways related to human papillomavirus infection,extracellular matrix(ECM)-receptor signaling,estrogen receptor,skin development,epidermal development,epidermal cell differentiation,keratinocyte differentiation,structural components of the ECM,structural components of the skin epidermis,and others.Conclusion:Based on the GEO database-derived findings,we determined that target genes of two miRNAs,namely miR-4667-5P-KRT79 and miR-139-5P-FOS,play an important role in skin photoaging.These observations could provide theoretical support and guidance for further research on skin aging-related biological processes. 展开更多
关键词 Skin photoaging MIRNAS GEO database
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部