期刊文献+
共找到111,382篇文章
< 1 2 250 >
每页显示 20 50 100
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
1
作者 Mingliang Sun Jie Yuan +1 位作者 Xiaoyong Li Dongxiao Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期2625-2646,共22页
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors. 展开更多
关键词 Image encryption chaotic system compressive sensing arnold transform
下载PDF
Double quantum images encryption scheme based on chaotic system
2
作者 蒋社想 李杨 +1 位作者 石锦 张茹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期305-320,共16页
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti... This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities. 展开更多
关键词 double quantum images encryption chaotic system pixel scrambling XOR operation
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
3
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
CNN-LSTM based incremental attention mechanism enabled phase-space reconstruction for chaotic time series prediction
4
作者 Xiao-Qian Lu Jun Tian +2 位作者 Qiang Liao Zheng-Wu Xu Lu Gan 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第2期77-90,共14页
To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)pre... To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)prediction model based on the incremental attention mechanism.Firstly,a traversal search is conducted through the traversal layer for finite parameters in the phase space.Then,an incremental attention layer is utilized for parameter judgment based on the dimension weight criteria(DWC).The phase space parameters that best meet DWC are selected and fed into the input layer.Finally,the constructed CNN-LSTM network extracts spatio-temporal features and provides the final prediction results.The model is verified using Logistic,Lorenz,and sunspot chaotic time series,and the performance is compared from the two dimensions of prediction accuracy and network phase space structure.Additionally,the CNN-LSTM network based on incremental attention is compared with long short-term memory(LSTM),convolutional neural network(CNN),recurrent neural network(RNN),and support vector regression(SVR)for prediction accuracy.The experiment results indicate that the proposed composite network model possesses enhanced capability in extracting temporal features and achieves higher prediction accuracy.Also,the algorithm to estimate the phase space parameter is compared with the traditional CAO,false nearest neighbor,and C-C,three typical methods for determining the chaotic phase space parameters.The experiments reveal that the phase space parameter estimation algorithm based on the incremental attention mechanism is superior in prediction accuracy compared with the traditional phase space reconstruction method in five networks,including CNN-LSTM,LSTM,CNN,RNN,and SVR. 展开更多
关键词 chaotic time series Incremental attention mechanism Phase-space reconstruction
下载PDF
Theoretical and experimental investigation of the resonance responses and chaotic dynamics of a bistable laminated composite shell in the dynamic snap-through mode
5
作者 Meiqi WU Pengyu LV +3 位作者 Hongyuan LI Jiale YAN Huiling DUAN Wei ZHANG 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2024年第4期581-602,共22页
The dynamic model of a bistable laminated composite shell simply supported by four corners is further developed to investigate the resonance responses and chaotic behaviors.The existence of the 1:1 resonance relations... The dynamic model of a bistable laminated composite shell simply supported by four corners is further developed to investigate the resonance responses and chaotic behaviors.The existence of the 1:1 resonance relationship between two order vibration modes of the system is verified.The resonance response of this class of bistable structures in the dynamic snap-through mode is investigated,and the four-dimensional(4D)nonlinear modulation equations are derived based on the 1:1 internal resonance relationship by means of the multiple scales method.The Hopf bifurcation and instability interval of the amplitude frequency and force amplitude curves are analyzed.The discussion focuses on investigating the effects of key parameters,e.g.,excitation amplitude,damping coefficient,and detuning parameters,on the resonance responses.The numerical simulations show that the foundation excitation and the degree of coupling between the vibration modes exert a substantial effect on the chaotic dynamics of the system.Furthermore,the significant motions under particular excitation conditions are visualized by bifurcation diagrams,time histories,phase portraits,three-dimensional(3D)phase portraits,and Poincare maps.Finally,the vibration experiment is carried out to study the amplitude frequency responses and bifurcation characteristics for the bistable laminated composite shell,yielding results that are qualitatively consistent with the theoretical results. 展开更多
关键词 bistable laminated composite shell dynamic snap-through mode Hopf bifurcation chaotic dynamics vibration experiment
下载PDF
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
6
作者 苏静明 方士辉 +1 位作者 洪炎 温言 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期233-243,共11页
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc. 展开更多
关键词 color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling
下载PDF
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row-column confusion and closed-loop bi-directional diffusion
7
作者 张哲祎 牟俊 +1 位作者 Santo Banerjee 曹颖鸿 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期228-237,共10页
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi... Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works. 展开更多
关键词 chaotic hierarchical encryption multi-medical image encryption differentiated visual effects row-column confusion closed-loop bi-directional diffusion transform domain watermark embedding
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
8
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
Distributional Chaoticity of the Minimal Subshift of Shift Operators
9
作者 Yuanlin Chen Tianxiu Lu Jiazheng Zhao 《Journal of Applied Mathematics and Physics》 2024年第5期1647-1660,共14页
This paper focus on the chaotic properties of minimal subshift of shift operators. It is proved that the minimal subshift of shift operators is uniformly distributional chaotic, distributional chaotic in a sequence, d... This paper focus on the chaotic properties of minimal subshift of shift operators. It is proved that the minimal subshift of shift operators is uniformly distributional chaotic, distributional chaotic in a sequence, distributional chaotic of type k ( k∈{ 1,2,2 1 2 ,3 } ), and ( 0,1 ) -distribution. 展开更多
关键词 Shift Operators SUBSHIFT Distributional chaoticity
下载PDF
苦瓜皂苷L调控PI3K/AKT通路促进内皮祖细胞增殖能力和内皮功能的实验研究
10
作者 黄建明 刘滴 +1 位作者 金道群 朱定君 《中西医结合心脑血管病杂志》 2024年第10期1768-1772,共5页
目的:探讨苦瓜皂苷L对内皮祖细胞(EPC)增殖能力和内皮功能的作用及机制。方法:体外分离、培养、鉴定外周血EPC。使用不同浓度苦瓜皂苷L处理EPC 24 h后,应用细胞计数试剂盒(CCK-8)法检测各组细胞活力。使用AutoDock Tools 5.6软件,分别... 目的:探讨苦瓜皂苷L对内皮祖细胞(EPC)增殖能力和内皮功能的作用及机制。方法:体外分离、培养、鉴定外周血EPC。使用不同浓度苦瓜皂苷L处理EPC 24 h后,应用细胞计数试剂盒(CCK-8)法检测各组细胞活力。使用AutoDock Tools 5.6软件,分别以磷脂酰肌醇3-激酶(PI3K)和蛋白激酶B(AKT)为受体,以药物分子苦瓜皂苷L为配体采用盲对接法进行分子对接。使用PI3K/AKT抑制剂LY294002和最佳使用浓度的苦瓜皂苷L单独或同时处理EPC 24 h后检测各组细胞活力和磷酸化PI3K(p-PI3K)、磷酸化AKT(p-AKT)及磷酸化内皮型一氧化氮合酶(p-eNOS)表达水平。结果:与对照组比较,苦瓜皂苷L呈剂量依赖性地促进EPC增殖,且40μmol/L的苦瓜皂苷L是最佳药物浓度。与对照组比较,LY294002可下调EPC细胞活力,苦瓜皂苷L可上调细胞活力。与苦瓜皂苷L组比较,共同使用苦瓜皂苷L和LY294002可降低细胞活力。分子对接结果显示,苦瓜皂苷L与PI3K和AKT均存在直接作用,形成稳定的锁钥结构。与对照组比较,LY294002可显著下调p-PI3K、p-AKT和p-eNOS蛋白水平;苦瓜皂苷L可上调p-PI3K、p-AKT和p-eNOS蛋白水平。与苦瓜皂苷L组比较,使用苦瓜皂苷L和LY294002可降低p-PI3K、p-AKT和p-eNOS蛋白水平。结论:苦瓜皂苷L通过PI3K/AKT信号通路靶向调节EPC的增殖能力,进而上调内皮型一氧化氮合酶(eNOS)活化水平以促进EPC内皮功能。 展开更多
关键词 内皮祖细胞 苦瓜皂苷l 细胞增殖 内皮功能 实验研究
下载PDF
跗骨窦小切口与经外侧“L”形切口术对跟骨骨折患者的疗效
11
作者 张磊 王宏 +2 位作者 张小伟 孟位明 赵志江 《河北医药》 CAS 2024年第15期2295-2299,共5页
目的 比较跗骨窦小切口与经外侧“L”形切口术治疗跟骨骨折的疗效及对足功能恢复情况的影响。方法 研究对象选取2020年10月至2022年10月收治的跟骨骨折患者88例,按照手术方法分为对照组43例,研究组45例,对照组采用经外侧“L”形切口术,... 目的 比较跗骨窦小切口与经外侧“L”形切口术治疗跟骨骨折的疗效及对足功能恢复情况的影响。方法 研究对象选取2020年10月至2022年10月收治的跟骨骨折患者88例,按照手术方法分为对照组43例,研究组45例,对照组采用经外侧“L”形切口术,研究组采用跗骨窦小切口手术。检测比较2组手术情况及并发症发生情况、足功能、跟骨解剖结构、骨代谢、炎性因子、应激反应指标水平。结果 与对照组比较,研究组术后引流量、术中出血量较少,手术、住院及骨折愈合时间较短,并发症发生率较低(P<0.05)。与术前比较,术后3个月2组AOFAS评分、Bohler角、Gissane角、跟骨长度、跟骨高度、P1NP、骨特异性碱性磷酸酶(BALP)水平升高,且研究组高于对照组,抗酒石酸酸性磷酸酶(TRAP)、环磷酰胺(CTX)水平降低,且研究组低于对照组(P<0.05)。与术前比较,术后3 d 2组CRP、IL-6、MDA水平升高,但研究组低于对照组,SOD水平降低,但研究组高于对照组(P<0.05)。结论 跗骨窦小切口术治疗跟骨骨折效果理想,可减少手术创伤,减轻炎症及应激反应,且可促进术后足功能、骨代谢恢复,并发症少。 展开更多
关键词 跟骨骨折 足功能 跗骨窦小切口 经外侧“l”形切口术
下载PDF
一种L波段300W GaN脉冲功率模块
12
作者 董四华 刘英坤 +1 位作者 高永辉 秦龙 《半导体技术》 CAS 北大核心 2024年第6期555-560,共6页
随着第三代半导体GaN器件技术的不断发展,GaN高电子迁移率晶体管(HEMT)在电子系统中逐步得到了广泛应用。研制了一款小型化L波段300 W GaN脉冲功率模块。研发了满足高压脉冲工作条件的GaN HEMT芯片,采用负载牵引技术进行了器件大信号阻... 随着第三代半导体GaN器件技术的不断发展,GaN高电子迁移率晶体管(HEMT)在电子系统中逐步得到了广泛应用。研制了一款小型化L波段300 W GaN脉冲功率模块。研发了满足高压脉冲工作条件的GaN HEMT芯片,采用负载牵引技术进行了器件大信号阻抗参数提取,并以此为基础设计了小型化匹配网络进行阻抗变换。基于高压驱动芯片和开关器件芯片设计了小型化高压脉冲调制电路。测试结果表明,在工作频率990~1130 MHz、工作电压50 V、脉冲宽度100μs、占空比10%下,功率模块脉冲输出功率大于300 W,功率附加效率大于53%,功率增益大于38 dB。功率模块尺寸为30 mm×30 mm×8 mm。 展开更多
关键词 GaN高电子迁移率晶体管(HEMT) 负载牵引技术 高压脉冲调制 l波段 功率模块
下载PDF
可用于WLAN的双频MIMO天线设计
13
作者 李国金 朱佳辉 《电子元件与材料》 CAS 北大核心 2024年第1期115-120,共6页
设计了一款可用于WLAN的双频MIMO天线。天线的正面为L型单极子,背面为金属接地板。通过在接地板上加载耦合枝节使天线具有双频特性。同时,为了天线的小型化,对耦合枝节进行了弯折处理,减小天线尺寸。在两个天线单元之间加载T型寄生枝节... 设计了一款可用于WLAN的双频MIMO天线。天线的正面为L型单极子,背面为金属接地板。通过在接地板上加载耦合枝节使天线具有双频特性。同时,为了天线的小型化,对耦合枝节进行了弯折处理,减小天线尺寸。在两个天线单元之间加载T型寄生枝节和刻蚀矩形缝隙来提高天线的隔离度。使用电磁仿真软件和矢量网络分析仪对天线进行仿真和实测,结果表明:天线的工作频段为2.4~2.55 GHz和5.1~6.3 GHz,覆盖了WLAN的频段,同时在低频段内隔离度高于19 dB,高频段内隔离度高于25 dB。此外,天线的包络相关系数小于0.01且具有全向辐射特性。天线整体性能较好,可以满足WLAN的需求。 展开更多
关键词 MIMO天线 双频段 无线局域网 l型单极子
下载PDF
基于高阶幂的单快拍LDACS系统波达方向估计
14
作者 王磊 高翔 +1 位作者 胡潇潇 刘海涛 《西北工业大学学报》 EI CAS CSCD 北大核心 2024年第2期362-367,共6页
L波段数字航空通信系统(L band digital aeronautical communication system,LDACS)是未来航空宽带通信重要的基础设施之一,针对LDACS信号容易受到相邻波道大功率测距仪(distance measuring equipment,DME)信号干扰的问题,提出了联合正... L波段数字航空通信系统(L band digital aeronautical communication system,LDACS)是未来航空宽带通信重要的基础设施之一,针对LDACS信号容易受到相邻波道大功率测距仪(distance measuring equipment,DME)信号干扰的问题,提出了联合正交投影干扰抑制与单快拍稀疏分解的波达方向(direction of arrival,DOA)估计方法。通过子空间投影抑制DME干扰,然后使用单快拍数据构建伪协方差矩阵,对伪协方差矩阵求高阶幂,之后进行奇异值分解,并利用约束条件求解稀疏解得到期望信号来向的估计值。所提方法使用高阶伪协方差矩阵降低了噪声影响,仅用单快拍就可以准确估计LDACS信号的入射方向。仿真结果表明,改进单快拍高级幂(improved single snapshot high order power,ISS-HOP)L1-SVD算法的估计精度优于ISS-HOP-MUSIC算法。该方法可以有效抑制DME干扰,提高OFDM接收机性能。 展开更多
关键词 l波段数字航空通信系统 测距仪 波达方向估计 改进单快拍高阶幂算法
下载PDF
2020年呼和浩特市和林格尔M_(L)4.5地震破裂方向性测定及发震构造分析
15
作者 杨彦明 苏淑娟 王磊 《地震》 CSCD 北大核心 2024年第2期63-85,共23页
本文基于区域数字地震台网波形数据,在三维空间内利用gCAP反演方法获得2020年3月30日和林格尔M_(L)4.5地震矩心的空间精细位置为40.131°N, 111.922°E,深度为13 km。最佳震源机制解节面Ⅰ为走向279°,倾角41°,滑动角-... 本文基于区域数字地震台网波形数据,在三维空间内利用gCAP反演方法获得2020年3月30日和林格尔M_(L)4.5地震矩心的空间精细位置为40.131°N, 111.922°E,深度为13 km。最佳震源机制解节面Ⅰ为走向279°,倾角41°,滑动角-27°;节面Ⅱ为走向30°,倾角72°,滑动角-127°;矩震级MW3.98。采用双差定位法对主震和余震序列进行重定位,获得19个地震事件的重定位结果。研究表明,主震震源参数为40.136°N, 111.858°E,震源深度为11.718 km;余震序列沿NW—SE方向双向扩展,地下破裂长度约为4.6 km;深度剖面显示,主震位于余震区中部,主破裂同时向上和向下扩展,深度分布范围为4~17 km。利用Hypocenter-Centroid方法对地震发震断层进行快速判断,20组测定结果均显示NW走向的节面Ⅰ为发震断层面。综合震源区地质构造、余震序列分布、区域构造应力场及三维地壳结构等研究结果,推断和林格尔M_(L)4.5地震的发震断层是一条沿NW向延伸的隐伏断裂。本次地震是一次左旋走滑、带正断分量的事件。地震发生于地壳内波速高低转换的过渡区,位于偏高速体一侧。综合分析认为,流体物质的涌入是引发2020年和林格尔M_(L)4.5地震的关键因素,而复杂的断层结构不仅为流体运移提供了通道,且控制着地震的发生及地震序列的空间展布。 展开更多
关键词 2020年和林格尔M_(l)4.5地震 Hypocenter-Centroid方法 震源机制解 发震构造 鄂尔多斯北缘
下载PDF
L型阵水下目标方位和距离联合最大似然估计
16
作者 宋海岩 迟凤阳 唐弢 《黑龙江工程学院学报》 CAS 2024年第2期1-6,共6页
空间目标定位是阵列信号处理领域中的研究热点,广泛应用于雷达、声纳、通信、射电天文、医学诊断、地震遥感等众多领域。传统的水下声源定位仅获取目标声源的深度和距离信息,却无法估计目标的方位信息。针对这一问题,在充分考虑水下声... 空间目标定位是阵列信号处理领域中的研究热点,广泛应用于雷达、声纳、通信、射电天文、医学诊断、地震遥感等众多领域。传统的水下声源定位仅获取目标声源的深度和距离信息,却无法估计目标的方位信息。针对这一问题,在充分考虑水下声传播模型的基础上,利用L型阵列固有的结构特征,将最大似然估计技术应用到水下目标定位,提出一种基于L型水听器阵列的水下目标方位与距离联合最大似然估计算法。研究表明:最大似然估计法可有效突破传统波束形成分辨力“瑞利限”的限制,提高水下目标定位的分辨能力和精度。计算机仿真分析显示,在单目标和相干双目标的场景中,文中所提出的方法均具有更为尖锐的谱峰及更低的旁瓣水平,可对水下目标进行有效的方位角和距离联合估计。 展开更多
关键词 l型阵列 水下声传播 方位角及距离联合估计 最大似然估计法
下载PDF
SLC6A8通过BNIP3L调控线粒体自噬促进肝癌细胞增殖
17
作者 路远 唐俊 +4 位作者 李文川 许佐明 罗宗将 马嘉盛 浦涧 《海南医学院学报》 CAS 北大核心 2024年第2期88-93,99,共7页
目的:探讨SLC6A8通过BNIP3L调控线粒体自噬对肝癌细胞增殖的影响。方法:通过TCGA数据库分析SLC6A8基因在肝癌组织中的表达情况,并与BNIP3L表达进行相关性分析。使用RT-PCR和Western blot技术检测SLC6A8过表达人肝癌Huh-7及Hep3B细胞中SL... 目的:探讨SLC6A8通过BNIP3L调控线粒体自噬对肝癌细胞增殖的影响。方法:通过TCGA数据库分析SLC6A8基因在肝癌组织中的表达情况,并与BNIP3L表达进行相关性分析。使用RT-PCR和Western blot技术检测SLC6A8过表达人肝癌Huh-7及Hep3B细胞中SLC6A8和BNIP3L的表达。免疫荧光标记和CCK-8检测法用于观察SLC6A8过表达人肝癌Huh-7及Hep3B细胞线粒体自噬和细胞增殖率。使用CCK-8检测法评估在沉默BNIP3L后SLC6A8过表达人肝癌Huh-7及Hep3B细胞增殖率。结果:SLC6A8在肝癌组织中显著高表达,并与BNIP3L表达呈正相关。SLC6A8过表达可显著促进线粒体自噬和人肝癌Huh-7及Hep3B细胞的增殖。此外,SLC6A8过表达显著促进BNIP3L mRNA和蛋白的表达。沉默BNIP3L后,SLC6A8过表达对肝癌细胞增殖的促进作用被逆转。结论:SLC6A8在肝癌组织中的高表达与BNIP3L有正相关性,且SLC6A8的过表达能促进线粒体自噬和肝癌细胞的增殖,沉默BNIP3L可逆转SLC6A8过表达对肝癌细胞增殖促进作用。这为肝癌的治疗提供了新的靶点和策略。 展开更多
关键词 线粒体自噬 SlC6A8 BNIP3l 肝细胞癌
下载PDF
UCHL1通过调控肿瘤微环境糖酵解代谢促进肺腺癌细胞增殖和转移
18
作者 李爱科 林萍萍 +5 位作者 赵继伟 郭研 张立广 李富博 董怡 杜新生 《现代肿瘤医学》 CAS 2024年第16期2975-2981,共7页
目的:探讨泛素羧基末端水解酶L1(ubiquitin C-terminal hydrolase-L1,UCHL1)通过调控缺氧诱导因子1(hypoxia-inducible factor 1,HIF-1)介导的代谢重编程促进肺腺癌细胞的增殖和转移。方法:免疫组化和实时定量聚合酶链反应检测肺腺癌组... 目的:探讨泛素羧基末端水解酶L1(ubiquitin C-terminal hydrolase-L1,UCHL1)通过调控缺氧诱导因子1(hypoxia-inducible factor 1,HIF-1)介导的代谢重编程促进肺腺癌细胞的增殖和转移。方法:免疫组化和实时定量聚合酶链反应检测肺腺癌组织和细胞中UCHL1和HIF-1的表达;Kaplan-Meier Plotter和UALCAN数据库分析了UCHL1和HIF-1的表达量与患者生存期的关联,并进一步分析了二者在不同临床病理等级以及淋巴转移患者肿瘤组织中的表达;克隆形成、迁移和侵袭评估肺腺癌HCC4006细胞转染UCHL1 siRNA后恶性生物学行为变化;Western Blot检测沉默UCHL1后肿瘤细胞糖酵解信号通路IL-6/STAT3标志分子的表达。结果:免疫组化、实时定量聚合酶链反应以及相关性分析,结果显示肺腺癌组织和细胞中UCHL1和HIF-1的表达较癌旁组织和正常人支气管上皮细胞中显著增加,且二者表达水平呈正相关(P<0.01),与Oncomine数据库中UCHL1和HIF-1的表达趋势相一致。生信分析结果显示,UCHL1和HIF-1异常高表达与肺腺癌患者的生存期呈负相关、而与患者的病理等级和淋巴结转移呈正相关(P<0.01)。转染UCHL1 siRNA的肺腺癌HCC4006细胞的克隆形成、迁移和侵袭能力较对照组细胞显著降低,同时细胞的耗氧量显著增加,并抑制细胞中LDH活性和LD分泌(P<0.01)。Western Blot结果显示,沉默UCHL1可抑制HIF-1表达,并降低缺氧介导的肿瘤细胞糖酵解信号通路IL-6/STAT3标志分子的表达(P<0.01)。结论:肺腺癌细胞通过UCHL1-HIF-1轴介导的代谢重编程获得较强的增殖和转移表型,为靶向该基因网络的治疗提供了理论依据。 展开更多
关键词 肺腺癌 泛素羧基末端水解酶l1 糖酵解 增殖 转移
下载PDF
CDR132L改善高血压合并高脂血症小鼠血管重构和功能
19
作者 林俊敏 梁风金 +3 位作者 吴莹 许开祖 吴梅芳 林丽明 《中国动脉硬化杂志》 CAS 2024年第4期303-309,共7页
[目的]观察CDR132L(miR-132反义核苷酸)对高血压合并高脂血症小鼠血管重构和功能的影响,并探究其可能的作用机制。[方法]随机选择30只8周龄雄性C57BL/6小鼠,分为三组:对照组、模型组和CDR132L组,每组10只。对照组接受标准饲料喂养,模型... [目的]观察CDR132L(miR-132反义核苷酸)对高血压合并高脂血症小鼠血管重构和功能的影响,并探究其可能的作用机制。[方法]随机选择30只8周龄雄性C57BL/6小鼠,分为三组:对照组、模型组和CDR132L组,每组10只。对照组接受标准饲料喂养,模型组和CDR132L组给予N-硝基-L-精氨酸甲酯(L-NAME)和高脂食物联合喂养来诱导高血压和高脂血症。CDR132L组给予20 mg/kg CDR132L腹腔注射,1次/周,连续6周,对照组和模型组腹腔注射相同剂量的生理盐水溶液。尾套法测量小鼠尾动脉收缩压和舒张压,血脂、血糖检测由全自动生化分析仪完成,HE染色观察胸主动脉结构,血管环试验观察小鼠胸主动脉内皮依赖性舒张反应,定量基因扩增检测胸主动脉miR-132表达水平,Western blot检测胸主动脉Gab1和内皮型一氧化氮合酶(eNOS)蛋白表达水平。[结果]与对照组相比,模型组小鼠收缩压、舒张压、血清甘油三酯、血清总胆固醇和体质量均明显升高(P<0.05),胸主动脉内膜凹凸不平,血管壁厚度不均,中膜平滑肌细胞的排列呈现不规则状态,血管壁上存在大量脂肪积聚,胸主动脉内皮依赖性舒张反应减低(P<0.05),胸主动脉miR-132表达水平明显增加(P<0.05),Gab1和eNOS蛋白表达水平明显降低(P<0.05)。与模型组相比,CDR132L组小鼠收缩压、舒张压、血清甘油三酯、血清总胆固醇和体质量均无统计学差异(P>0.05),胸主动脉管腔内膜较完整光滑,血管壁厚度较均一,中膜平滑肌细胞的排列较为有序,血管壁仅存在少量脂肪积聚,胸主动脉内皮依赖性舒张反应增强(P<0.05),胸主动脉miR-132表达水平明显降低(P<0.05),Gab1和eNOS蛋白表达水平明显增加(P<0.05)。[结论]CDR132L能改善高血压合并高脂血症小鼠血管重构及内皮依赖性舒张功能,这一作用可能与其降低胸主动脉miR-132表达水平,进而上调胸主动脉Gab1和eNOS蛋白表达水平有关。 展开更多
关键词 CDR132l miR-132 高血压 高脂血症 血管重构 内皮舒张功能
下载PDF
甲状腺癌“低位领”式与“L”型切口淋巴结清扫术的比较
20
作者 李旭 张建辉 +1 位作者 买文洁 叶晓红 《实用癌症杂志》 2024年第4期554-557,共4页
目的比较“低位领”式与“L”型切口淋巴结清扫术治疗甲状腺癌的临床效果。方法选取80例甲状腺癌患者,按随机数字表法分为2组,各40例。对照组采取“L”型切口淋巴结清扫术,观察组施行“低位领”式淋巴结清扫术,观察至术后3个月。对比2... 目的比较“低位领”式与“L”型切口淋巴结清扫术治疗甲状腺癌的临床效果。方法选取80例甲状腺癌患者,按随机数字表法分为2组,各40例。对照组采取“L”型切口淋巴结清扫术,观察组施行“低位领”式淋巴结清扫术,观察至术后3个月。对比2组手术相关指标、切口满意度、颈肩部疼痛程度与心理状态、生活质量、并发症。结果观察组术中出血量[(40.53±4.26)ml]少于对照组[(58.75±6.31)ml],手术时间[(118.79±10.53)min]与住院时间[(6.35±1.03)d]短于对照组[(146.35±12.69)min、(9.42±1.69)d],切口满意度[95.00%(38/40)]高于对照组[80.00%(32/40)],视觉模拟疼痛评估量表(VAS)评分[(3.56±0.48)分]与焦虑自评量表(SAS)评分[(39.46±4.33)分]、抑郁自评量表(SDS)评分[(40.63±5.20)分]低于对照组[(5.23±0.79)分、(47.53±6.36)分、(48.56±6.48)分],有统计学差异(P<0.05)。术后3个月,观察组生活质量综合评定问卷(GQOLI-74)内各维度评分[(80.38±3.75)分、(79.28±3.86)分、(80.63±4.01)分、(81.43±4.10)分]均高于对照组[(71.26±3.29)分、(70.56±3.49)分、(72.31±3.59)分、(71.31±3.50)分],有统计学差异(P<0.05)。2组并发症相比,差异无统计学意义(P>0.05)。结论与“L”型切口相比,“低位领”式淋巴结清扫术治疗甲状腺癌效果更佳,术中出血量更少,手术及术后住院时间更短,并能够减轻患者颈肩部疼痛,改善心理状态及生活质量,且无严重并发症。 展开更多
关键词 淋巴结清扫术 甲状腺癌 “低位领”式切口 l”型切口 疼痛程度 并发症
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部