期刊文献+
共找到781,308篇文章
< 1 2 250 >
每页显示 20 50 100
Control of highly pathogenic avian influenza through vaccination 被引量:1
1
作者 Xianying Zeng Jianzhong Shi Hualan Chen 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第5期1447-1453,共7页
The stamping-out strategy has been used to control highly pathogenic avian influenza viruses in many countries,driven by the belief that vaccination would not be successful against such viruses and fears that avian in... The stamping-out strategy has been used to control highly pathogenic avian influenza viruses in many countries,driven by the belief that vaccination would not be successful against such viruses and fears that avian influenza virus in vaccinated birds would evolve more rapidly and pose a greater risk to humans.In this review,we summarize the successes in controlling highly pathogenic avian influenza in China and make suggestions regarding the requirements for vaccine selection and effectiveness.In addition,we present evidence that vaccination of poultry not only eliminates human infection with avian influenza virus,but also significantly reduces and abolishes some harmful characteristics of avian influenza virus. 展开更多
关键词 avian influenza control highly pathogenic VAccINATION
下载PDF
A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things 被引量:1
2
作者 Hongliang Tian Junyuan Tian 《Computers, Materials & Continua》 SCIE EI 2024年第1期1297-1310,共14页
The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access cont... The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices. 展开更多
关键词 Blockchain IOT access control Hyperledger Fabric
下载PDF
Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management
3
作者 Duan Pengfei Ma Zhaofeng +2 位作者 Zhang Yuqing Wang Jingyu Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期224-236,共13页
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve... With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability. 展开更多
关键词 access control data trading MAABE multi-channel privacy preserving
下载PDF
Matrix Riccati Equations in Optimal Control
4
作者 Malick Ndiaye 《Applied Mathematics》 2024年第3期199-213,共15页
In this paper, the matrix Riccati equation is considered. There is no general way for solving the matrix Riccati equation despite the many fields to which it applies. While scalar Riccati equation has been studied tho... In this paper, the matrix Riccati equation is considered. There is no general way for solving the matrix Riccati equation despite the many fields to which it applies. While scalar Riccati equation has been studied thoroughly, matrix Riccati equation of which scalar Riccati equations is a particular case, is much less investigated. This article proposes a change of variable that allows to find explicit solution of the Matrix Riccati equation. We then apply this solution to Optimal Control. 展开更多
关键词 Optimal control Matrix Riccati Equation Change of Variable
下载PDF
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
5
作者 Aodi Liu Na Wang +3 位作者 Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期1705-1726,共22页
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources. 展开更多
关键词 Big data access control data security BiLSTM
下载PDF
Not in Control,but Liable?Attributing Human Responsibility for Fully Automated Vehicle Accidents
6
作者 Siming Zhai Lin Wang Peng Liu 《Engineering》 SCIE EI CAS CSCD 2024年第2期121-132,共12页
Human agency has become increasingly limited in complex systems with increasingly automated decision-making capabilities.For instance,human occupants are passengers and do not have direct vehicle control in fully auto... Human agency has become increasingly limited in complex systems with increasingly automated decision-making capabilities.For instance,human occupants are passengers and do not have direct vehicle control in fully automated cars(i.e.,driverless cars).An interesting question is whether users are responsible for the accidents of these cars.Normative ethical and legal analyses frequently argue that individuals should not bear responsibility for harm beyond their control.Here,we consider human judgment of responsibility for accidents involving fully automated cars through three studies with seven experiments(N=2668).We compared the responsibility attributed to the occupants in three conditions:an owner in his private fully automated car,a passenger in a driverless robotaxi,and a passenger in a conventional taxi,where none of these three occupants have direct vehicle control over the involved vehicles that cause identical pedestrian injury.In contrast to normative analyses,we show that the occupants of driverless cars(private cars and robotaxis)are attributed more responsibility than conventional taxi passengers.This dilemma is robust across different contexts(e.g.,participants from China vs the Republic of Korea,participants with first-vs third-person perspectives,and occupant presence vs absence).Furthermore,we observe that this is not due to the perception that these occupants have greater control over driving but because they are more expected to foresee the potential consequences of using driverless cars.Our findings suggest that when driverless vehicles(private cars and taxis)cause harm,their users may face more social pressure,which public discourse and legal regulations should manage appropriately. 展开更多
关键词 Fully automated vehicle accidents Responsibility attribution controlLABILITY Foreseeability
下载PDF
Structural Controls Analysis and Its Correlation with Geothermal Occurrence at Barrier Volcanic Complex (BVC), Turkana, Kenya
7
作者 Philip Lomorukai Emekwi Nicholas O. Mariita Patrick Chege Kariuki 《International Journal of Geosciences》 CAS 2024年第3期231-245,共15页
Geothermal is a clean energy source that is freely available in the subsurface. The exploitation of this vital resource needs intensive exploration in order to identify and quantify its occurrence. The three parameter... Geothermal is a clean energy source that is freely available in the subsurface. The exploitation of this vital resource needs intensive exploration in order to identify and quantify its occurrence. The three parameters considered when assessing the viability of a geothermal system include;heat source, fractures and fluids. Geological structures are important in transportation of fluids to and from the heat source aiding in recharge of the geothermal system and enhancing productivity. Remote sensing method was applied in mapping the structures at Barrier Volcanic Complex (BVC) by using hill shading technique which utilized four illumination angles of the sun (azimuth) i.e. 45°, 90°, 150°, and 315°, constant elevation of 45° and exaggeration of 10. The data used was Shuttle Radar Topographic Mission (SRTM) Satellite Imagery. ArcGIS Software was used for lineaments delineation and density mapping, PCI Geomatica was used to generate major faults, while Georose and Rockworks 17 were used to generate the rose diagrams. Geological structural analysis was done by delineating lineaments, determining the density distribution of lineaments and finally determining the structural trends of lineaments. The generated major faults in the area and the location of the occurrence of surface manifestations were compared with the generated lineaments. A total of 260 lineaments were generated whereby at 45° there was a total of 60 lineaments, at 90° 95 lineaments, at 150° 61 lineaments, and at 315° 44 lineaments. The results of structural analysis in the area as shown by the rose diagrams indicate an NNE-SSW and N-S trending of structures. In conclusion, the study area is highly fractured as indicated by the presence of numerous lineaments. These lineaments provide good recharge to the geothermal system and enhance the geothermal reservoir in the area. 展开更多
关键词 Geothermal Resource LINEAMENTS Lineaments Density Structural controls
下载PDF
A Dual-Cluster-Head Based Medium Access Control for Large-Scale UAV Ad-Hoc Networks
8
作者 Zhao Xinru Wei Zhiqing +3 位作者 Zou Yingying Ma Hao Cui Yanpeng Feng Zhiyong 《China Communications》 SCIE CSCD 2024年第5期123-136,共14页
Unmanned Aerial Vehicle(UAV)ad hoc network has achieved significant growth for its flexibility,extensibility,and high deployability in recent years.The application of clustering scheme for UAV ad hoc network is impera... Unmanned Aerial Vehicle(UAV)ad hoc network has achieved significant growth for its flexibility,extensibility,and high deployability in recent years.The application of clustering scheme for UAV ad hoc network is imperative to enhance the performance of throughput and energy efficiency.In conventional clustering scheme,a single cluster head(CH)is always assigned in each cluster.However,this method has some weaknesses such as overload and premature death of CH when the number of UAVs increased.In order to solve this problem,we propose a dual-cluster-head based medium access control(DCHMAC)scheme for large-scale UAV networks.In DCHMAC,two CHs are elected to manage resource allocation and data forwarding cooperatively.Specifically,two CHs work on different channels.One of CH is used for intra-cluster communication and the other one is for inter-cluster communication.A Markov chain model is developed to analyse the throughput of the network.Simulation result shows that compared with FM-MAC(flying ad hoc networks multi-channel MAC,FM-MAC),DCHMAC improves the throughput by approximately 20%~50%and prolongs the network lifetime by approximately 40%. 展开更多
关键词 dual cluster head medium access control UAV swarm
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
9
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
Effects of Lycium barbarum polysaccharide on cytokines in adolescents with subthreshold depression:a randomized controlled study
10
作者 Xiaoyue Li Tao Liu +6 位作者 Xuan Mo Runhua Wang Xueyan Kong Robin Shao Roger S.Mclntyre Kwok-Fai So Kangguang Lin 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第9期2036-2040,共5页
Strong evidence has accumulated to show a correlation between depression symptoms and inflammatory responses.Moreover,anti-inflammatory treatment has shown partial effectiveness in alleviating depression symptoms.Lyci... Strong evidence has accumulated to show a correlation between depression symptoms and inflammatory responses.Moreover,anti-inflammatory treatment has shown partial effectiveness in alleviating depression symptoms.Lycium barbarum polysaccharide(LBP),derived from Goji berries,exhibits notable antioxidative and anti-inflammatory properties.In our recent double-blinded randomized placebo-controlled trial,we found that LBP significantly reduced depressive symptoms in adolescents with subthreshold depression.It is presumed that the antidepressant effect of LBP may be associated with its influence on inflammatory cytokines.In the double-blinded randomized controlled trial,we enrolled 29 adolescents with subthreshold depression and randomly divided them into an LBP group and a placebo group.In the LBP group,adolescents were given 300 mg/d LBP.A 6-week follow up was completed by 24 adolescents,comprising 14 adolescents from the LBP group(15.36±2.06 years,3 men and 11 women)and 10 adolescents from the placebo group(14.9±1.6 years,2 men and 8 women).Our results showed that after 6 weeks of treatment,the interleukin-17A level in the LBP group was lower than that in the placebo group.Network analysis showed that LBP reduced the correlations and connectivity between inflammatory factors,which were associated with the improvement in depressive symptoms.These findings suggest that 6-week administration of LBP suppresses the immune response by reducing interleukin-17A level,thereby exerting an antidepressant effect. 展开更多
关键词 adolescents CYTOKINES EFFICACY Goji berry inflammatory responses INTERLEUKIN-17A Lycium barbarum polysaccharide randomized controlled study subthreshold depression
下载PDF
Transmission Dynamics and Optimal Control Strategies of a Hand-Foot-Mouth Disease Model with Treatment and Vaccination Interventions
11
作者 Jianping Wang Shenghua Zou Zhicai Guo 《Journal of Applied Mathematics and Physics》 2024年第6期2007-2019,共13页
In this article, the transmission dynamics of a Hand-Foot-Mouth disease model with treatment and vaccination interventions are studied. We calculated the basic reproduction number and proved the global stability of di... In this article, the transmission dynamics of a Hand-Foot-Mouth disease model with treatment and vaccination interventions are studied. We calculated the basic reproduction number and proved the global stability of disease-free equilibrium when R0 R0 > 1. Meanwhile, we obtained the optimal control strategies minimizing the cost of intervention and minimizing the infected person. We also give some numerical simulations to verify our theoretical results. 展开更多
关键词 Hand-Foot-Mouth Disease Optimal control Transmission Dynamic Vaccination Interventions
下载PDF
Analysis of Internal Control Management Problems in Hospital Finance and Accounting
12
作者 Yan Wang 《Proceedings of Business and Economic Studies》 2024年第3期133-139,共7页
This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hos... This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment. 展开更多
关键词 Hospital accounting Internal control management Medical system reform Financial security Operational efficiency
下载PDF
血清HMGB1、CCL20、HSP27水平与慢性牙周炎患者牙周病变程度的相关性分析 被引量:1
13
作者 王伟新 张丽娜 《河南医学研究》 CAS 2024年第2期252-255,共4页
目的探讨血清高迁移率族蛋白1(HMGB1)、CC趋化因子配体20(CCL20)、热休克蛋白27(HSP27)水平与慢性牙周炎(CP)患者牙周病变程度的相关性。方法选取2021年9月至2023年8月在新乡医学院第一附属医院诊治的60例CP患者纳入观察组,根据1∶1原则... 目的探讨血清高迁移率族蛋白1(HMGB1)、CC趋化因子配体20(CCL20)、热休克蛋白27(HSP27)水平与慢性牙周炎(CP)患者牙周病变程度的相关性。方法选取2021年9月至2023年8月在新乡医学院第一附属医院诊治的60例CP患者纳入观察组,根据1∶1原则,另选取同期牙周健康者60例纳入对照组。比较两组及不同牙周病变程度CP患者血清HMGB1、CCL20、HSP27水平,分析各指标水平与CP牙周病变程度的相关性及联合诊断价值,并分析不同血清水平患者发生CP的危险度。结果观察组血清HMGB1、CCL20、HSP27水平高于对照组(P<0.05);不同牙周病变程度CP患者血清HMGB1、CCL20、HSP27水平比较:轻度<中度<重度,且各指标水平与牙周病变程度均呈正相关(P<0.05);入院时HMGB1、CCL20、HSP27水平联合诊断CP的曲线下面积(AUC)为0.905,最佳诊断敏感度为91.67%,特异度为88.33%,约登指数0.800,且各指标高水平患者发生CP的危险度是低水平的1.105倍、1.034倍、1.105倍(P<0.05)。结论HMGB1、CCL20、HSP27在CP患者血清中呈异常高表达,各指标水平与牙周病变程度均呈正相关,且联合检测对CP具有较高诊断价值,可作为临床诊断CP、评估牙周病变程度的有效指标。 展开更多
关键词 高迁移率族蛋白1 cc趋化因子配体20 热休克蛋白27 慢性牙周炎
下载PDF
拮抗CC趋化因子受体5信号诱导肿瘤细胞凋亡并调节肿瘤微环境抑制肿瘤生长
14
作者 何伟 刘丽萍 +3 位作者 卓静薇 张小冬 杨通 冯巨滨 《实用医学杂志》 CAS 北大核心 2024年第9期1204-1210,共7页
目的探索拮抗CC趋化因子受体5(CCR5)信号通路对肿瘤生长和肿瘤微环境的影响。方法采用CCK8细胞毒试验研究CCR5选择性拮抗剂Maraviroc体外对小鼠Lewis肺腺癌细胞增殖的影响,并运用流式细胞术和RT-PCR检测肿瘤细胞凋亡和Caspase 8基因的... 目的探索拮抗CC趋化因子受体5(CCR5)信号通路对肿瘤生长和肿瘤微环境的影响。方法采用CCK8细胞毒试验研究CCR5选择性拮抗剂Maraviroc体外对小鼠Lewis肺腺癌细胞增殖的影响,并运用流式细胞术和RT-PCR检测肿瘤细胞凋亡和Caspase 8基因的表达。然后采用免疫荧光组织化学染色法研究了Maraviroc对小鼠体内肿瘤生长和肿瘤微环境中CD4^(+)和CD8^(+)以及Foxp3^(+)细胞比例的影响。结果拮抗CCR5信号在体内外均能够抑制癌细胞的生长。体外研究发现:CCR5拮抗剂可通过增强凋亡基因Caspase 8表达而诱导肿瘤细胞凋亡。在小鼠体内,CCR5拮抗剂可明显增加肿瘤微环境中CD4^(+)和CD8^(+)细胞的浸润而减少Foxp3^(+)细胞的浸润。结论拮抗CCR5信号可能通过诱导肿瘤细胞凋亡,逆转免疫抑制性肿瘤微环境而抑制肿瘤生长。 展开更多
关键词 cc趋化因子受体5 肿瘤微环境 凋亡 调节性T细胞
下载PDF
miR-124通过抑制TLR4/NF-κB/CCL2对脑梗死大鼠神经元凋亡的影响 被引量:1
15
作者 陈笛 温昌明 +5 位作者 李祥欣 孙军 高军 张在行 张东焕 张保朝 《中国老年学杂志》 CAS 北大核心 2024年第1期122-127,共6页
目的探讨微小RNA(miR)-124通过抑制Toll样受体(TLR)4/核因子(NF)-κB/CC类趋化因子配体(CCL)2对脑梗死(CI)大鼠神经元凋亡的影响。方法通过线栓闭塞大脑中动脉法建立CI大鼠模型60只,以随机数表法平均分为5组:模型组、miR-124激活剂(miR-... 目的探讨微小RNA(miR)-124通过抑制Toll样受体(TLR)4/核因子(NF)-κB/CC类趋化因子配体(CCL)2对脑梗死(CI)大鼠神经元凋亡的影响。方法通过线栓闭塞大脑中动脉法建立CI大鼠模型60只,以随机数表法平均分为5组:模型组、miR-124激活剂(miR-124 agomir)组、TLR4过表达质粒组、miR-124 agomir阴性对照+空载质粒组、miR-124 agomir+TLR4过表达质粒组,另取12只大鼠只分离颈动脉,作为假手术组。分组干预后,评测大鼠神经功能缺损情况,比较各组神经功能缺损评分;采用三苯基氯化四氮唑(TTC)染色检测大鼠CI情况,比较各组CI面积;采用TUNEL染色检测海马神经元凋亡情况,比较各组海马神经元凋亡率;采用试剂盒测量各组血清活性氧(ROS)及炎症因子环氧合酶(COX)-2、白细胞介素(IL)-17水平;采用实时荧光定量聚合酶链反应(PCR)实验检测各组脑组织miR-124表达;采用Western印迹实验检测各组脑组织凋亡及TLR4/NF-κB/CCL2通路蛋白表达。结果与假手术组比较,模型组、miR-124 agomir阴性对照+空载质粒组、miR-124 agomir+TLR4过表达质粒组脑组织miR-124与B淋巴细胞瘤-2蛋白(Bcl-2)蛋白表达水平显著降低(P<0.05),神经功能缺损评分、CI面积、海马神经元凋亡率、血清ROS及炎症因子COX-2、IL-17水平、脑组织Bcl-2相关X蛋白(Bax)、TLR4、核内NF-κB p65、CCL2蛋白表达水平显著升高(P<0.05)。与模型组、miR-124 agomir+TLR4过表达质粒组分别比较,miR-124 agomir组脑组织miR-124与Bcl-2蛋白表达水平均显著升高(P<0.05),神经功能缺损评分、CI面积、海马神经元凋亡率、血清ROS及炎症因子COX-2、IL-17水平、脑组织Bax、TLR4、核内NF-κB p65、CCL2蛋白表达水平均显著降低(P<0.05),而TLR4过表达质粒组脑组织miR-124与Bcl-2蛋白表达水平均显著降低(P<0.05),神经功能缺损评分、CI面积、海马神经元凋亡率、血清ROS及炎症因子COX-2、IL-17水平、脑组织Bax、TLR4、核内NF-κB p65、CCL2蛋白表达水平均显著升高(P<0.05)。与模型组相比,miR-124 agomir阴性对照+空载质粒组各指标水平无显著变化(P>0.05)。结论miR-124可通过下调TLR4/NF-κB/CCL2通路蛋白表达,抑制炎症,减轻脑组织梗死及海马神经元凋亡,修复CI大鼠神经功能。 展开更多
关键词 miR-124 Toll样受体4/核因子κB/cc类趋化因子配体2 脑梗死 神经元凋亡
下载PDF
急性胰腺炎患者血清CXC趋化因子配体10和CC类趋化因子22水平与疾病严重程度关系及临床诊断价值研究
16
作者 朱芳丽 马厉英 +1 位作者 马晓莹 韩俊岭 《陕西医学杂志》 CAS 2024年第6期788-792,共5页
目的:分析急性胰腺炎患者血清CXC趋化因子配体10(CXCL10)和CC类趋化因子22(CCL22)水平与疾病严重程度的关系及临床诊断价值。方法:选取急性胰腺炎患者102例,分为轻症组(轻症急性胰腺炎患者,47例)、中度重症组(中度重症急性胰腺炎患者,31... 目的:分析急性胰腺炎患者血清CXC趋化因子配体10(CXCL10)和CC类趋化因子22(CCL22)水平与疾病严重程度的关系及临床诊断价值。方法:选取急性胰腺炎患者102例,分为轻症组(轻症急性胰腺炎患者,47例)、中度重症组(中度重症急性胰腺炎患者,31例)和重症组(重症急性胰腺炎患者,24例)。选择52例体检健康者为健康组。采用全自动生化分析仪检测受试者肝功能指标[丙氨酸氨基转移酶(ALT)、天冬氨酸氨基转移酶(AST)]、肾功能指标[肌酐(Scr)、血尿素氮(BUN)]以及淀粉酶(AMY)水平。采用酶联免疫吸附法检测血清中CXCL10、CCL22水平。采用急性胰腺炎严重程度床边指数(BISAP)评分评估急性胰腺炎患者疾病严重程度。采用Logistic回归分析中度重症和重症急性胰腺炎发生的影响因素。采用Pearson法分析急性胰腺炎患者血清CXCL10、CCL22水平及BISAP评分间的相关性。采用受试者工作特征(ROC)曲线评价血清CXCL10、CCL22水平诊断中度重症和重症急性胰腺炎的价值。结果:与健康组比较,轻症组ALT、Scr、BUN、AMY水平升高,中度重症组和重症组ALT、AST、Scr、BUN、AMY水平升高(均P<0.05)。与轻症组比较,中度重症组BUN水平升高,重症组ALT、AST、Scr、BUN水平升高(均P<0.05)。与中度重症组比较,重症组BUN水平升高(P<0.05)。四组血清CXCL10、CCL22水平及BISAP评分依次升高(均P<0.05)。急性胰腺炎患者血清CXCL10和CCL22水平呈正相关(P<0.05);血清CXCL10、CCL22水平与BISAP评分呈正相关(均P<0.05)。血清CXCL10、CCL22、BISAP评分是中度重症和重症急性胰腺炎发生的独立危险因素(均P<0.05)。血清CXCL10、CCL22对中度重症和重症急性胰腺炎均有一定诊断价值,且两项联合诊断价值更高(均P<0.05)。结论:急性胰腺炎患者血清CXCL10、CCL22水平呈高表达,且随疾病严重程度的加重而升高,两者联合诊断中度重症和重症急性胰腺炎的价值较高。 展开更多
关键词 急性胰腺炎 CXC趋化因子配体10 cc类趋化因子22 疾病严重程度 肝功能指标 肾功能指标 诊断价值
下载PDF
西南油气田CCUS/CCS发展现状、优势与挑战
17
作者 雍锐 《天然气工业》 EI CAS CSCD 北大核心 2024年第4期11-24,I0001,共15页
中国石油西南油气田公司(以下简称西南油气田)是中国西南地区首个天然气年产量超400×10^(8) m^(3)的油气生产企业,其天然气新建产能、产量的增量分别占到全国增量的1/4和1/3,预计2030年天然气开发的碳排放量将突破500×10^(4) ... 中国石油西南油气田公司(以下简称西南油气田)是中国西南地区首个天然气年产量超400×10^(8) m^(3)的油气生产企业,其天然气新建产能、产量的增量分别占到全国增量的1/4和1/3,预计2030年天然气开发的碳排放量将突破500×10^(4) t。为解决天然气高质量上产过程中碳排放量刚性增长的问题,西南油气田主动围绕“天然气+CCUS”的战略规划,积极部署CCUS/CCS工作,以期打造“绿色能源西南模式”,助力实现“双碳”目标。为此,系统阐述了西南油气田在CCUS/CCS业务规划、标准体系、技术系列等方面的发展现状,梳理了其CCUS/CCS业务在资源、技术方面的优势,并分析了面临的技术成熟度不高、经济效益缺乏、社会接受度不高等挑战,最后作出了展望并有针对性地提出了下一步建议:①攻关形成具有气田特色的CCUS/CCS技术体系,打造气田CCUS/CCS原创技术策源地;②建立气田CCUS/CCS标准体系,推广应用气田CO_(2)驱气提高采收率(CCUS-EGR)和CO_(2)埋存技术;③依托西南油气田自有碳捕集、输送、驱气、封存等技术,进一步延伸拓展传统油气主营业务产业链,建立西南片区CCUS/CCS产业集群和碳库,助力中国石油成为CCUS/CCS产业链链长;④探索页岩气注CO_(2)及混合气体提高采收率技术,支撑在页岩气领域开辟新的CCUS方向。 展开更多
关键词 西南油气田 ccUS/ccS ccUS-EGR 封存技术 发展战略 天然气 “双碳”目标
下载PDF
鄂尔多斯盆地CCS-EOR项目CO_(2)泄漏环境风险评估
18
作者 薛璐 马俊杰 +2 位作者 王浩璠 李琳 马劲风 《环境监测管理与技术》 CSCD 北大核心 2024年第2期64-68,共5页
以鄂尔多斯盆地乔家洼CCS-EOR项目为例,通过工程活动指标分解及选项设计,形成涵盖油区特征、储盖层特征、工程设计、工程监管4大类20个指标的环境风险可能性判定指标体系,利用问卷调查和专家打分法,界定驱油工程环境风险可能性。结合国... 以鄂尔多斯盆地乔家洼CCS-EOR项目为例,通过工程活动指标分解及选项设计,形成涵盖油区特征、储盖层特征、工程设计、工程监管4大类20个指标的环境风险可能性判定指标体系,利用问卷调查和专家打分法,界定驱油工程环境风险可能性。结合国内外文献分析,开展项目对空气、土壤和微生物、作物、动物及人群等环境风险受体的影响程度界定,基于界定结果,按照风险评估矩阵,对该工程CO_(2)泄漏环境风险水平的评估结论为低风险,在后期运行过程中应强化风险防范与监测。 展开更多
关键词 CO_(2)泄漏 风险评估 环境影响 ccS-EOR项目 鄂尔多斯盆地
下载PDF
重组CC16蛋白质抑制香烟烟雾提取物诱导人支气管上皮细胞衰老的初步研究
19
作者 李婷 杨晓雪 +3 位作者 高睿 栗馨洋 王海龙 庞敏 《陆军军医大学学报》 CAS CSCD 北大核心 2024年第12期1410-1416,共7页
目的探讨重组人CC16蛋白质(rhCC16)对香烟烟雾提取物(cigarette smoke extract,CSE)诱导的人支气管上皮细胞(human bronchial epithelial cells,HBECs)衰老的抑制作用及机制。方法CCK-8法检测CSE(0%、1%、2.5%、5%、7.5%和10%)及rhCC16(... 目的探讨重组人CC16蛋白质(rhCC16)对香烟烟雾提取物(cigarette smoke extract,CSE)诱导的人支气管上皮细胞(human bronchial epithelial cells,HBECs)衰老的抑制作用及机制。方法CCK-8法检测CSE(0%、1%、2.5%、5%、7.5%和10%)及rhCC16(0、10、100、250和500 ng/mL)对HBECs细胞活力的影响;β-半乳糖苷酶染色试剂盒检测对照组、CSE组以及CSE+rhCC16组细胞β-半乳糖苷酶活性;实时荧光定量PCR(qPCR)检测各组细胞P16、P21 mRNA表达水平;Western blot检测各组细胞P16、P21、p-P53、P38、p-P38、ERK1/2、p-ERK1/2蛋白表达水平。结果与对照组相比,5%CSE刺激细胞72 h对HBECs细胞活力无显著影响;500 ng/mL及以下浓度rhCC16对HBECs细胞活力无显著影响;与对照组相比,5%CSE刺激HBECs细胞72 h致β-半乳糖苷酶染色阳性细胞率明显升高(P<0.05),且P16和P21蛋白和mRNA表达水平明显升高(P<0.05),p-P53、p-P38与p-ERK1/2蛋白表达量显著增加(P<0.05);与CSE组相比,250 ng/mL rhCC16干预下,HBECs细胞β-半乳糖苷酶染色阳性细胞率显著下降(P<0.05),P16和P21蛋白和mRNA表达水平显著下降(P<0.05),p-P53、p-p38和p-ERK1/2的表达量降低(P<0.05)。结论rhCC16蛋白质抑制香烟烟雾诱导的HBECs衰老,抑制P38 MAPK和ERK1/2信号通路可能是其作用机制。 展开更多
关键词 细胞衰老 香烟烟雾提取物 cc16蛋白质 P38 MAPK/ERK1/2
下载PDF
脊髓背根神经节ZXDC介导CCL2对慢性压迫性 神经损伤小鼠神经性疼痛的作用
20
作者 李文媛 王晓宇 +4 位作者 吕忠孝 刘东明 李艺 王淑影 王莹 《医学研究杂志》 2024年第1期56-62,共7页
目的探讨脊髓背根神经节(dorsal root ganglion,DRG)中转录因子锌指X连锁复制C(zinc finger X-linked duplicated C,ZXDC)介导CCL2/CCR2信号通路对慢性压迫性神经损伤(chronic construction injury model,CCI)诱导神经性疼痛的作用及机... 目的探讨脊髓背根神经节(dorsal root ganglion,DRG)中转录因子锌指X连锁复制C(zinc finger X-linked duplicated C,ZXDC)介导CCL2/CCR2信号通路对慢性压迫性神经损伤(chronic construction injury model,CCI)诱导神经性疼痛的作用及机制。方法构建小鼠坐骨神经慢性压迫性损伤模型,免疫荧光染色、Western blot法和实时荧光定量PCR(RT-qPCR)检测正常情况和CCI造模后DRG中ZXDC及CCL2表达变化;将实验动物分为假手术(Sham)组、CCI+AAV-NC组和CCI+AAV-ZXDC siRNA组;Western blot法和免疫荧光染色检测各组小鼠CCI造模后各时间点DRG中ZXDC、CCL2和CCR2表达,RT-qPCR检测DRG中促炎性细胞因子TNF-α和IL-1βmRNA表达,机械性缩足反射测试检测神经性疼痛行为改变。结果ZXDC表达定位在DRG大、中、小神经元。CCI损伤后1~3天DRG中ZXDC和CCL2蛋白和mRNA表达显著增高,CCI后7天二者表达显著降低,ZXDC和CCL2mRNA表达量呈正相关(P均<0.05)。CCI后3天,与Sham组比较,CCI+AAV-NC组和CCI+AAV-ZXDC siRNA组ZXDC、CCL2、CCR2蛋白表达、TNF-α和IL-1βmRNA表达显著增高,其中CCI+AAV-ZXDC siRNA组较CCI+AAV-NC组ZXDC、CCL2、CCR2蛋白表达、TNF-α和IL-1βmRNA显著降低(P均<0.05)。与Sham组比较,CCI+AAV-ZXDC siRNA组和CCI+AAV-NC组CCI后各时间点机械缩足阈值均显著降低,其中CCI后7天,CCI+AAV-ZXDC siRNA组机械缩足阈值显著高于CCI+AAV-NC组(P均<0.05)。结论脊髓背根神经节ZXDC基因敲减通过抑制CCL2/CCR2信号通路介导CCI诱导的神经性疼痛。 展开更多
关键词 脊髓背根神经节 锌指X连锁复制C cc趋化因子2 神经损伤 慢性神经疼痛
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部