期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Comparison between cannabidiol and sertra⁃line in modulation of post-traumatic stress dis⁃order-like behaviors and fear memory in mice
1
作者 HAN Xiao SONG Xian-kui +4 位作者 SONG Da-ke XIE Guan-bo GUO Hong-yan WU Ning LI Jin 《中国药理学与毒理学杂志》 CAS 北大核心 2021年第9期680-681,共2页
OBJECTIVE Post-traumatic stress disorder(PTSD)is characterized by poor adapta⁃tion to a traumatic experience and disturbances in fear memory regulation,and currently lacks effective medication.Cannabidiol(CBD)is the p... OBJECTIVE Post-traumatic stress disorder(PTSD)is characterized by poor adapta⁃tion to a traumatic experience and disturbances in fear memory regulation,and currently lacks effective medication.Cannabidiol(CBD)is the primary component of the Cannabis sativa plant;it does not have any psychoactive effects and has been implicated in modulating fear learning in mammals.The present study investigated the effect of CBD on PTSD-like behaviors in a mouse pre-shock model,the effect of CBD in the modulation of trauma-related fear memory,a crucial process leading to core symptoms of PTSD.METHODS Pre-shock model was applied in which mice were submitted to training with two days of 0.8 mA×12 times of foot-shock,and PTSD-like behaviors was evaluated during 3 and 26 d,including freezing time to the conditioned context,open field test,elevated plus maze test and social interaction test.RESULTS CBD(10 mg·kg^(-1))administration alleviated main PTSD-like symptoms in the mouse pre-shock model by attenuating trauma-related fear memory,decreasing anxiety-like behavior,and increasing social interaction behavior.However,sertraline(15 mg·kg^(-1))was only effective when adminis⁃tered throughout the test period.Furthermore,CBD reduced the formation,retrieval,and recon⁃solidation of trauma-related fear memory,whereas sertraline only reduced fear-memory retrieval.Neither CBD nor sertraline influenced the acquisi⁃tion of trauma-related fear memory.CONCLU⁃SION CBD produced anti-PTSD-like actions in mice,and could disrupt trauma-related fear mem⁃ory by interfering with multiple aspects of fear memory processing in mice.These findings indi⁃cate that CBD may be a promising candidate for treating PTSD. 展开更多
关键词 post-traumatic stress disorder can⁃nabidiol SERTRALINE trauma-related fear memory processing endocannabinoid system
下载PDF
Development of Ubiquitous Simulation Service Structure Based on High Performance Computing Technologies 被引量:2
2
作者 Sang-Hyun CHO Jeong-Kil CHOI 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2008年第3期374-378,共5页
The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that ... The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that developers can make ideal casting designs. To take the prior occupation at commercial simulation market, so many development groups in the world are doing their every effort. They already reported successful stories in manufacturing fields by developing and providing the high performance simulation technologies for multipurpose. But they all run at powerful desk-side computers by well-trained experts mainly, so that it is hard to diffuse the scientific designing concept to newcomers in casting field. To overcome upcoming problems in scientific casting designs, we utilized information technologies and full-matured hardware backbones to spread out the effective and scientific casting design mind, and they all were integrated into Simulation Portal on the web. It professes scientific casting design on the NET including ubiquitous access way represented by "Anyone, Anytime, Anywhere" concept for casting designs. 展开更多
关键词 Parallel computation Message passing interface (MPI) Shared memory processing (SMP) CLUSTERING UBIQUITOUS
下载PDF
STRONG APPROXIMATION FOR MOVING AVERAGE PROCESSES UNDER DEPENDENCE ASSUMPTIONS 被引量:2
3
作者 林正炎 李德柜 《Acta Mathematica Scientia》 SCIE CSCD 2008年第1期217-224,共8页
Let {Xt,t ≥ 1} be a moving average process defined by Xt = ∑^∞ k=0 αkξt-k, where {αk,k ≥ 0} is a sequence of real numbers and {ξt,-∞ 〈 t 〈 ∞} is a doubly infinite sequence of strictly stationary dependen... Let {Xt,t ≥ 1} be a moving average process defined by Xt = ∑^∞ k=0 αkξt-k, where {αk,k ≥ 0} is a sequence of real numbers and {ξt,-∞ 〈 t 〈 ∞} is a doubly infinite sequence of strictly stationary dependent random variables. Under the conditions of {αk, k ≥ 0} which entail that {Xt, t ≥ 1} is either a long memory process or a linear process, the strong approximation of {Xt, t ≥ 1} to a Gaussian process is studied. Finally, the results are applied to obtain the strong approximation of a long memory process to a fractional Brownian motion and the laws of the iterated logarithm for moving average processes. 展开更多
关键词 Strong approximation long memory process linear process fractional Brownian motion the law of the iterated logarithm
下载PDF
Hidden Process Offline Forensic Based on Memory Analysis in Windows 被引量:1
4
作者 CUI Jingsong ZHANG Heng +2 位作者 QI Jing PENG Rong ZHANG Manli 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期346-354,共9页
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat... Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system. 展开更多
关键词 virtual machine introspection hidden process detection process linked list memory forensics
原文传递
XB-SIM*:A Simulation Framework for Modeling and Exploration of ReRAM-Based CNN Acceleration Design 被引量:4
5
作者 Xiang Fei Youhui Zhang Weimin Zheng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第3期322-334,共13页
Resistive Random Access Memory(ReRAM)-based neural network accelerators have potential to surpass their digital counterparts in computational efficiency and performance.However,design of these accelerators faces a num... Resistive Random Access Memory(ReRAM)-based neural network accelerators have potential to surpass their digital counterparts in computational efficiency and performance.However,design of these accelerators faces a number of challenges including imperfections of the Re RAM device and a large amount of calculations required to accurately simulate the former.We present XB-SIM,a simulation framework for Re RAM-crossbar-based Convolutional Neural Network(CNN)accelerators.XB-SIM can be flexibly configured to simulate the accelerator’s structure and clock-driven behaviors at the architecture level.This framework also includes an Re RAM-aware Neural Network(NN)training algorithm and a CNN-oriented mapper to train an NN and map it onto the simulated design efficiently.Behavior of the simulator has been verified by the corresponding circuit simulation of a real chip.Furthermore,a batch processing mode of the massive calculations that are required to mimic the behavior of Re RAM-crossbar circuits is proposed to fully apply the computational concurrency of the mapping strategy.On CPU/GPGPU,this batch processing mode can improve the simulation speed by up to 5.02 or 34.29.Within this framework,comprehensive architectural exploration and end-to-end evaluation have been achieved,which provide some insights for systemic optimization. 展开更多
关键词 deep neural network Resistive Random Access memory(Re RAM) simulation ACCELERATOR processing in memory
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部