期刊文献+
共找到544篇文章
< 1 2 28 >
每页显示 20 50 100
Kinase domain insert containing receptor promoter controlled suicide gene system selectively kills human umbilical vein endothelial cells 被引量:5
1
作者 Wen-Yu Yang Zong-Hai Huang +5 位作者 Li-Jun Lin Zhou Li Jing-Long Yu Hui-Juan Song Yong Qian Xiao-Yan Che 《World Journal of Gastroenterology》 SCIE CAS CSCD 2006年第33期5331-5335,共5页
AIM: To study the selective killing of human umbilical vein endothelial cells (HUVECs) by a double suicide gene under the regulation of a kinase domain insert containing receptor (KDR) promoter and mediated by an... AIM: To study the selective killing of human umbilical vein endothelial cells (HUVECs) by a double suicide gene under the regulation of a kinase domain insert containing receptor (KDR) promoter and mediated by an adenoviral gene vector. METHODS: Human KDR promoter was cloned by polymerase chain reaction (PCR), and two recombinant adenoviral plasmids pAdKDR-CdgIyTK, pAdCMV-CDglyTK were constructed according to a two-step transformation protocol. These two newly constructed plasmids were then transfected into 293 packaging cells to grow adenovirus, which were further multiplied and purified. HUVECs and LoVo cells were infected with either of the two resultant recombinant adenoviruses (AdKDR-CDglyTK and AdCMV-CDglyTK) respectively, and the infection rates were estimated by detection of green fluorescent protein (GFP) expression. Infected cells were cultured in culture media containing different concentrations of 5-fiuoroo/tosine (5-FC) and ganciclovir (GCV), and the killing effects were measured. RESULTS: The two recombinant adenoviral plasmids pAdKDR-CdglyTK, pAdCMV-CDglyTK were successfully constructed and transfected into 293 cells. The resultant recombinant adenoviruses infected cells caused similar infection rates; and the infected cells exhibited different sensitivity to the prodrugs: HUVECs infected with AdCMV-CDglyTK and LoVo cells infected with AdCMVo CDglyTK were highly sensitive to the prodrugs, and HUVECs infected with AdKDR-CDglyTK were similarly sensitive but significantly more sensitive than the LoVo cells infected with AdKDR-CdglyTK (P 〈 0.001). CONCLUSION: Selective killing of HUVECs may be achieved by gene transfer of double suicide gene under the regulation of the KDR promoter. This finding may provide an optional way to target gene therapy of malignant tumors by abrogation of tumor blood vessels. 展开更多
关键词 Human umbilical vein endothelial cells Double suicide gene system Targeted killing
下载PDF
Heat Wave Ends In Eastern U.S.,Kills 49
2
作者 Grant McCool 韩仑山 《当代外语研究》 1999年第8期23-25,共3页
1999年初夏的我国的江南地区的梅雨季节竟然大雨倾盆不止,以上海地区为例,其总的降水量为百年以来的历史之最。而在大洋彼岸,美国的东海岸的几个城市,却出现了创记录的持续的高温气候!美国的老百姓享受着世界一流的生活水准,“赤日炎... 1999年初夏的我国的江南地区的梅雨季节竟然大雨倾盆不止,以上海地区为例,其总的降水量为百年以来的历史之最。而在大洋彼岸,美国的东海岸的几个城市,却出现了创记录的持续的高温气候!美国的老百姓享受着世界一流的生活水准,“赤日炎炎似火烧”的时节,人们一定都能躲入空调房里安然领略“秋凉”吧。朋友,你读完本文后就一定会承认,这种设想错了! 本文告诉你:49名美国人因高温丧生。 本文还告诉你:费城有22位老人死于高温天气!他们家中也许有空调,但因付不起高昂的电费而不敢使用空调;他们家中也许不乏宽轩亮商,但因担心盗贼破“窗”而入,而宁可热死家中也不敢洞开窗户。悲哉! “火上浇油”的是,不少发电厂因超负荷而停电。停电时间之长,甚至引起了政府官员的不满,纽约市的政府官员就准备“告”电力公司。 本文行文自然,措辞简单。许多描写炎热天气的词汇同时出现于本文。本文还告诉我们一个非常重要的常识: 100 degrees Fahrenheit=38 degrees Celsius。(我国使用后者计量温度) 本文还有一个常用重要词汇:outage(自来水、电力、燃用气等的断供期)。 展开更多
关键词 kills 49 Heat Wave Ends In Eastern U.S 发电厂
原文传递
Bad Bug Does Good A benign bacteria that kills human pathogens could become the first in a new line of weapons—living antibiotics
3
作者 Temma Ehrenfeld 陈放 《当代外语研究》 2004年第8期17-18,共2页
“以毒攻毒”,中国的传统医学一直在实践着这一体现着“对立统一”的辩证理论。今天,德国科学家Stephan Schuster对Bdellovibrio这一蛭弧菌的基因组的研究再次印证了这一点,而且似乎给许多细菌感染患者带来了福音。
关键词 Bad Bug Does Good A benign bacteria that kills human pathogens could become the first in a new line of weapons living antibiotics
原文传递
Vulnerability assessment of UAV engine to laser based on improved shotline method
4
作者 Le Liu Chengyang Xu +3 位作者 Changbin Zheng Sheng Cai Chunrui Wang Jin Guo 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期588-600,共13页
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v... Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser. 展开更多
关键词 Laser weapon Laser damage VULNERABILITY UAV ENGINE Killing probability
下载PDF
具有射影向量场的近Ricci-Bourguignon孤立子
5
作者 张晓丽 刘建成 《吉林大学学报(理学版)》 CAS 北大核心 2024年第6期1359-1362,共4页
用几何分析的方法,研究具有射影向量场的近Ricci-Bourguignon孤立子.首先,证明势向量场是射影向量场的近Ricci-Bourguignon孤立子的Cot ton张量场为零,Bach张量场散度自由,Ricci张量场是共形Killing张量场;其次,证明势向量场为射影向量... 用几何分析的方法,研究具有射影向量场的近Ricci-Bourguignon孤立子.首先,证明势向量场是射影向量场的近Ricci-Bourguignon孤立子的Cot ton张量场为零,Bach张量场散度自由,Ricci张量场是共形Killing张量场;其次,证明势向量场为射影向量场的K-切触近Ricci-Bourguignon孤立子是Einstein流形. 展开更多
关键词 近Ricci-Bourguignon孤立子 射影向量场 共形Killing K-切触
下载PDF
A framework of force of information influence and application for C4KISR system
6
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
下载PDF
From Control Theory to Gravitational Waves
7
作者 Jean-Francois Pommaret 《Advances in Pure Mathematics》 2024年第2期49-100,共52页
When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</su... When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages. 展开更多
关键词 Differential Operator Differential Sequence Killing Operator Riemann Operator Bianchi Operator Cauchy Operator Control Theory Controllability Elasticity General Relativity
下载PDF
时代广场的蟋蟀(三)
8
作者 George Selden 《疯狂英语(初中天地)》 2024年第9期52-54,共3页
老鼠和猫在现实生活中是冤家,可在这本书中却成了好朋友,一起看看老鼠、蟋蟀、猫之间的友谊吧。Chester buried his head in the Kleenex.He didn’t want to see his new friend,Tucker Mouse,get killed.
关键词 BURIED 现实生活 killed
下载PDF
汉英“杀/kill”隐喻投射异同及成因分析
9
作者 张秋霞 《今古文创》 2024年第22期128-130,共3页
对于汉英民族而言“,杀/kill”是一个普遍古老的用词,但通过与社会的互动,人们的认知不断深入,“杀/kill”的词义不再拘于本义。本文基于认知隐喻跨域投射理论对比分析了“杀/kill”认知隐喻的异同。比较结果发现:汉英“杀”都可以投射... 对于汉英民族而言“,杀/kill”是一个普遍古老的用词,但通过与社会的互动,人们的认知不断深入,“杀/kill”的词义不再拘于本义。本文基于认知隐喻跨域投射理论对比分析了“杀/kill”认知隐喻的异同。比较结果发现:汉英“杀”都可以投射至结果域、数量域、程度域和感知域;“杀”还可以投射至战争域、心理域、空间域等目标域,而“kill”在这些投射领域出现了空白,出现这种情形的主要原因在于民族思维的特异性、民族文化的特异性以及语言类型的制约性。 展开更多
关键词 杀/kill 认知隐喻 对比分析
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
10
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered Defense Lockheed Martin Kill Chain Proactive Defense Redundancy Risk Management Threat Intelligence
下载PDF
Effect of Curcumin on Influenza Virus HIN1 and H3N2 in Vitro 被引量:15
11
作者 刘妮 孟以蓉 +2 位作者 张俊丽 朱宇同 黄正昌 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2008年第9期534-535,共2页
Objective:To investigate the inhibitory effect of curcumin on influenza virus HIN1 and H3N2 in vitro, Methods:The directly killing role of cureumin extract in vitro to influenza virus type A subtype H1N1 and H3N2 wa... Objective:To investigate the inhibitory effect of curcumin on influenza virus HIN1 and H3N2 in vitro, Methods:The directly killing role of cureumin extract in vitro to influenza virus type A subtype H1N1 and H3N2 was evaluated by the canine kidney cells (MDCK), Results:The largest non toxic concentration of curcumin extract was 12, 5g/L and the effective inhibitory concentration to H1N1 and H3N2 was 6, 25G/1 AND 1,56g/L respectively, Conclusion: Curcumin extract have directly killing effect on H1N1 and H3N2 infections. 展开更多
关键词 CURCUMIN influenza virus directly killing effect
下载PDF
第一类李拟代数的基本性质 被引量:6
12
作者 苏美 马瑶 陈良云 《东北师大学报(自然科学版)》 CAS CSCD 北大核心 2011年第1期1-5,共5页
给出了第一类李拟代数的理想、子代数和商代数等基本性质,得到了第一类李拟代数的可解、幂零和Killing型等重要性质.并且给出了导子的一些重要性质.
关键词 第一类李拟代数 李代数 可解性 幂零性 KILLING型
下载PDF
具有非退化Killing型的余分裂李超代数 被引量:8
13
作者 夏利猛 沈彩霞 《东北师大学报(自然科学版)》 CAS CSCD 北大核心 2009年第4期9-12,共4页
借助于Killing型和Casimir算子的性质,证明了对于复数域上具有非退化Killing型的典型单李超代数的伴随作用.其具有李超余代数结构,从而使李超代数是余分裂的.
关键词 余分裂 李超代数 伴随表示 KILLING型
下载PDF
Birkhoff系统的积分因子与守恒定理 被引量:11
14
作者 张毅 薛纭 《力学季刊》 CSCD 北大核心 2003年第2期280-285,共6页
本文提出了构造Birkhoff系统守恒律的积分因子方法。首先,给出了Birkkoff方程的积分因子的定义,研究了Birkhoff系统的守恒量存在必要条件;其次,建立了系统的积分因子与守恒律的对应关系,并给出了用于确定积分因子的广义Killing方程;最后... 本文提出了构造Birkhoff系统守恒律的积分因子方法。首先,给出了Birkkoff方程的积分因子的定义,研究了Birkhoff系统的守恒量存在必要条件;其次,建立了系统的积分因子与守恒律的对应关系,并给出了用于确定积分因子的广义Killing方程;最后,建立了守恒定理的逆定理。文末,举例说明结果的应用。 展开更多
关键词 BIRKHOFF系统 积分因子 守恒定理 Killing方程
下载PDF
Study of Multi-directional Derivation of Cord Blood Mononuclear Cells and Observation of Killing Activity to MGC-803 Gastric Cancer Cell Strain In Vitro 被引量:3
15
作者 任宏 胡恒通 +4 位作者 刘刚 杜宁 田伟 邓智平 石景森 《The Chinese-German Journal of Clinical Oncology》 CAS 2006年第4期245-248,278,共5页
Objective: To study multi-directional derivation of cord blood mononuclear cells to CD3AK, LAK and CIK cells as well as changes of killing activity to gastric cancer cell strain in vitro. Methods: CD3mAb and IL-2 we... Objective: To study multi-directional derivation of cord blood mononuclear cells to CD3AK, LAK and CIK cells as well as changes of killing activity to gastric cancer cell strain in vitro. Methods: CD3mAb and IL-2 were used to induce CD3AK cells, and IL-2 was used to induce LAK cells; IFN-γ was used in the beginning, then IL-1, CD3mAb and IL-2 were used to induce CIK cells after 24 h for observing amplification and analyzing their relationship. The phenotypes of the cultured CIK cells were analyzed by flow cytometry. Subsequently, by using MGC-803 gastric cancer cell strain as target cells, the killing activity of CD3AK, LAK and CIK cells was evaluated by using MTT method. Results: The amplification activity of CD3AK and CIK cells was all far higher than LAK cells (P〈0.05). The amplification activity had no obvious difference between CIK cells and CD3AK cells at prophase, but that was far higher in CIK cells than CD3AK cells at about 20^th day (P〈0.05). The flow cytometry revealed that the amount of CD3^+ CD56^+ cells, major effector cells after CIK cells being cultured was significantly increased (P〈0.05), moreover, the amount of CD8^+ cells was significantly increased as well (P〈0.05). The killing activities of CD3AK and CIK cells to the MGC-803 gastric cancer cell strain were all significantly higher than LAK cells, while the killing activity of CIK cells was stronger than CD3AK cells (P〈0.05). Conclusion: CIK cells have stronger amplification activity and killing activity, and can be taken as more effective killing cells applied to the tumor adoptive immunotherapy. 展开更多
关键词 CD3AK cells LAK cells CIK cells amplification activity killing activity
下载PDF
A(m,n)型余分裂李超代数 被引量:5
16
作者 夏利猛 胡乃红 《数学年刊(A辑)》 CSCD 北大核心 2009年第1期127-130,共4页
详细讨论了A(m,n)型余分裂李超代数的结构及其李超代数伴随表示,Killing型和李余超代数结构之间的关系.
关键词 余分裂 李超代数 伴随表示 KILLING型
下载PDF
Hopf代数的Killing型 被引量:5
17
作者 王志华 李立斌 《扬州大学学报(自然科学版)》 CAS CSCD 2006年第3期9-12,共4页
在有限维Hop f代数上引入K illing型的定义并探讨其基本性质,指出K illing型的非退化性与Hop f代数的半单性不是等价的.对于有限维半单Hop f代数,得到Hop f代数H的伴随作用分解式H=Z(H)ker adt,并讨论了Z(H)与ker adt在K illing型框架... 在有限维Hop f代数上引入K illing型的定义并探讨其基本性质,指出K illing型的非退化性与Hop f代数的半单性不是等价的.对于有限维半单Hop f代数,得到Hop f代数H的伴随作用分解式H=Z(H)ker adt,并讨论了Z(H)与ker adt在K illing型框架下的关系.最后,给出了一些Hop f代数的K illing型的例子. 展开更多
关键词 HOPF代数 KILLING型 伴随作用
下载PDF
n-Lie代数的半单准则(英文) 被引量:2
18
作者 张知学 李华君 阎满富 《河北大学学报(自然科学版)》 CAS 2001年第1期3-6,共4页
给出了n Lie代数的Killing型的非退化的定义 ,并证明了n Lie代数半单的的充要条件是它的Killing型是非退化的 .例证了一个半单的n Lie代数不一定分解为单理想的直和 .
关键词 可解 非退化 N-LIE代数 半单准则 KILLING型 半理想 直和
下载PDF
具有非退化亦型的Z-阶化李超代数 被引量:3
19
作者 王颖 孙大烈 《数学杂志》 CSCD 1999年第4期397-400,共4页
本文给出了Z-阶化有限维单李超代数具有非退化亦型的一个必要条件.应用这一结果,我们可以得到Cartan 型李超代数X(n)与X(m ,n,t)的Killing 型是退化的.
关键词 Z-阶化李超代数 KILLING型 非退化亦型 李超代数
下载PDF
一类Hopf代数的Killing根 被引量:2
20
作者 唐帅 王志华 《河北师范大学学报(自然科学版)》 CAS 北大核心 2012年第1期21-23,共3页
主要考虑了一类Hopf代数的Killing根.作为特例,得到了Taft代数与广义Taft代数的Killing根.这些Killing根均为包含Jacobson根的Hopf理想,特别地Taft代数的Killing根为Jacobson根.
关键词 HOPF代数 Killing根 Taft代数 广义Taft代数
下载PDF
上一页 1 2 28 下一页 到第
使用帮助 返回顶部