期刊文献+
共找到507,777篇文章
< 1 2 250 >
每页显示 20 50 100
Insights into microbiota community dynamics and flavor development mechanism during golden pomfret(Trachinotus ovatus)fermentation based on single-molecule real-time sequencing and molecular networking analysis 被引量:1
1
作者 Yueqi Wang Qian Chen +5 位作者 Huan Xiang Dongxiao Sun-Waterhouse Shengjun Chen Yongqiang Zhao Laihao Li Yanyan Wu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期101-114,共14页
Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the ... Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the complex microbiota and the dynamic changes in microbial community and flavor compounds during fish fermentation.Single-molecule real-time sequencing and molecular networking analysis revealed the correlations among different microbial genera and the relationships between microbial taxa and volatile compounds.Mechanisms underlying flavor development were also elucidated via KEGG based functional annotations.Clostridium,Shewanella,and Staphylococcus were the dominant microbial genera.Forty-nine volatile compounds were detected in the fermented fish samples,with thirteen identified as characteristic volatile compounds(ROAV>1).Volatile profiles resulted from the interactions among the microorganisms and derived enzymes,with the main metabolic pathways being amino acid biosynthesis/metabolism,carbon metabolism,and glycolysis/gluconeogenesis.This study demonstrated the approaches for distinguishing key microbiota associated with volatile compounds and monitoring the industrial production of high-quality fermented fish products. 展开更多
关键词 Fermented golden pomfret Microbiota community Volatile compound Co-occurrence network Metabolic pathway
下载PDF
Influencer identification of dynamical networks based on an information entropy dimension reduction method
2
作者 段东立 纪思源 袁紫薇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期375-384,共10页
Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks,... Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks, defense, repair and control.Traditional methods usually begin from the centrality, node location or the impact on the largest connected component after node destruction, mainly based on the network structure.However, these algorithms do not consider network state changes.We applied a model that combines a random connectivity matrix and minimal low-dimensional structures to represent network connectivity.By using mean field theory and information entropy to calculate node activity,we calculated the overlap between the random parts and fixed low-dimensional parts to quantify the influence of node impact on network state changes and ranked them by importance.We applied this algorithm and the proposed importance algorithm to the overall analysis and stratified analysis of the C.elegans neural network.We observed a change in the critical entropy of the network state and by utilizing the proposed method we can calculate the nodes that indirectly affect muscle cells through neural layers. 展开更多
关键词 dynamical networks network influencer low-dimensional dynamics network disintegration
下载PDF
A multilayer network diffusion-based model for reviewer recommendation
3
作者 黄羿炜 徐舒琪 +1 位作者 蔡世民 吕琳媛 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期700-717,共18页
With the rapid growth of manuscript submissions,finding eligible reviewers for every submission has become a heavy task.Recommender systems are powerful tools developed in computer science and information science to d... With the rapid growth of manuscript submissions,finding eligible reviewers for every submission has become a heavy task.Recommender systems are powerful tools developed in computer science and information science to deal with this problem.However,most existing approaches resort to text mining techniques to match manuscripts with potential reviewers,which require high-quality textual information to perform well.In this paper,we propose a reviewer recommendation algorithm based on a network diffusion process on a scholar-paper multilayer network,with no requirement for textual information.The network incorporates the relationship of scholar-paper pairs,the collaboration among scholars,and the bibliographic coupling among papers.Experimental results show that our proposed algorithm outperforms other state-of-the-art recommendation methods that use graph random walk and matrix factorization and methods that use machine learning and natural language processing,with improvements of over 7.62%in recall,5.66%in hit rate,and 47.53%in ranking score.Our work sheds light on the effectiveness of multilayer network diffusion-based methods in the reviewer recommendation problem,which will help to facilitate the peer-review process and promote information retrieval research in other practical scenes. 展开更多
关键词 reviewer recommendation multilayer network network diffusion model recommender systems complex networks
下载PDF
Reliability Assessment of a New General Matching Composed Network
4
作者 Zhengyuan Liang Junbin Liang Guoxuan Zhong 《China Communications》 SCIE CSCD 2024年第2期245-257,共13页
The reliability of a network is an important indicator for maintaining communication and ensuring its stable operation. Therefore, the assessment of reliability in underlying interconnection networks has become an inc... The reliability of a network is an important indicator for maintaining communication and ensuring its stable operation. Therefore, the assessment of reliability in underlying interconnection networks has become an increasingly important research issue. However, at present, the reliability assessment of many interconnected networks is not yet accurate,which inevitably weakens their fault tolerance and diagnostic capabilities. To improve network reliability,researchers have proposed various methods and strategies for precise assessment. This paper introduces a novel family of interconnection networks called general matching composed networks(gMCNs), which is based on the common characteristics of network topology structure. After analyzing the topological properties of gMCNs, we establish a relationship between super connectivity and conditional diagnosability of gMCNs. Furthermore, we assess the reliability of g MCNs, and determine the conditional diagnosability of many interconnection networks. 展开更多
关键词 conditional diagnosability interconnection networks network reliability super connectivity
下载PDF
Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems
5
作者 Sang-min Lee Namgi Kim 《Computers, Materials & Continua》 SCIE EI 2024年第2期1897-1914,共18页
Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ... Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets. 展开更多
关键词 Deep learning graph neural network graph convolution network graph convolution network model learning method recommender information systems
下载PDF
Multi-Level Parallel Network for Brain Tumor Segmentation
6
作者 Juhong Tie Hui Peng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期741-757,共17页
Accurate automatic segmentation of gliomas in various sub-regions,including peritumoral edema,necrotic core,and enhancing and non-enhancing tumor core from 3D multimodal MRI images,is challenging because of its highly... Accurate automatic segmentation of gliomas in various sub-regions,including peritumoral edema,necrotic core,and enhancing and non-enhancing tumor core from 3D multimodal MRI images,is challenging because of its highly heterogeneous appearance and shape.Deep convolution neural networks(CNNs)have recently improved glioma segmentation performance.However,extensive down-sampling such as pooling or stridden convolution in CNNs significantly decreases the initial image resolution,resulting in the loss of accurate spatial and object parts information,especially information on the small sub-region tumors,affecting segmentation performance.Hence,this paper proposes a novel multi-level parallel network comprising three different level parallel subnetworks to fully use low-level,mid-level,and high-level information and improve the performance of brain tumor segmentation.We also introduce the Combo loss function to address input class imbalance and false positives and negatives imbalance in deep learning.The proposed method is trained and validated on the BraTS 2020 training and validation dataset.On the validation dataset,ourmethod achieved a mean Dice score of 0.907,0.830,and 0.787 for the whole tumor,tumor core,and enhancing tumor core,respectively.Compared with state-of-the-art methods,the multi-level parallel network has achieved competitive results on the validation dataset. 展开更多
关键词 Convolution neural network brain tumor segmentation parallel network
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
7
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Exploring reservoir computing:Implementation via double stochastic nanowire networks
8
作者 唐健峰 夏磊 +3 位作者 李广隶 付军 段书凯 王丽丹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期572-582,共11页
Neuromorphic computing,inspired by the human brain,uses memristor devices for complex tasks.Recent studies show that self-organizing random nanowires can implement neuromorphic information processing,enabling data ana... Neuromorphic computing,inspired by the human brain,uses memristor devices for complex tasks.Recent studies show that self-organizing random nanowires can implement neuromorphic information processing,enabling data analysis.This paper presents a model based on these nanowire networks,with an improved conductance variation profile.We suggest using these networks for temporal information processing via a reservoir computing scheme and propose an efficient data encoding method using voltage pulses.The nanowire network layer generates dynamic behaviors for pulse voltages,allowing time series prediction analysis.Our experiment uses a double stochastic nanowire network architecture for processing multiple input signals,outperforming traditional reservoir computing in terms of fewer nodes,enriched dynamics and improved prediction accuracy.Experimental results confirm the high accuracy of this architecture on multiple real-time series datasets,making neuromorphic nanowire networks promising for physical implementation of reservoir computing. 展开更多
关键词 double-layer stochastic(DS)nanowire network architecture neuromorphic computation nanowire network reservoir computing time series prediction
下载PDF
Singular optical propagation properties of two types of one-dimensional anti-PT-symmetric periodic ring optical waveguide networks
9
作者 樊阳龙 杨湘波 +5 位作者 练华达 陈润楷 朱蓬勃 邓冬梅 刘宏展 韦中超 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期355-362,共8页
Two types of one-dimensional(1D)anti-PT-symmetric periodic ring optical waveguide networks,consisting of gain and loss materials,are constructed.The singular optical propagation properties of these networks are invest... Two types of one-dimensional(1D)anti-PT-symmetric periodic ring optical waveguide networks,consisting of gain and loss materials,are constructed.The singular optical propagation properties of these networks are investigated.The results show that the system composed of gain materials exhibits characteristics of ultra-strong transmission and bidirectional reflection.Conversely,the system composed of loss materials demonstrates equal transmittance and reflectance at some frequencies.In both the systems,a new type of total reflection phenomenon is observed.When the imaginary part of the refractive indices of waveguide segments is smaller than 10-5,the system shows bidirectional transparency with the transmittance tending to be 1 and reflectivity to be smaller than 10-8 at some bands.When the refractive indices of the waveguide segments are real,the system will be bidirectional transparent at the full band.These findings may deepen the understanding of anti-PT-symmetric optical systems and optical waveguide networks,and possess potential applications in efficient optical energy storage,ultra-sensitive optical filters,ultra-sensitive all-optical switches,integrated optical chips,stealth physics,and so on. 展开更多
关键词 anti-PT-symmetric waveguide networks bidirectional transparent
下载PDF
Edge computing oriented virtual optical network mapping scheme based on fragmentation prediction
10
作者 何烁 BAI Huifeng +1 位作者 HUO Chao ZHANG Ganghong 《High Technology Letters》 EI CAS 2024年第2期158-163,共6页
As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model... As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved. 展开更多
关键词 elastic optical networks virtual optical network fragmentation self-awareness edge computing
下载PDF
The Effect and Mechanism of Fructus lycii on Improvement of Exercise Fatigue Using a Network Pharmacological Approach with in vitro Experimental Verification
11
作者 JI Xiao Ning LIU Zhao Ping +4 位作者 ZHANG Chao Zheng CHEN Min LIANG Jiang LU Jiang ZHANG Lei 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2024年第1期42-53,共12页
Objective This study aimed to investigate the effect and underlying mechanism of Fructus lycii in improving exercise fatigue.Methods A network pharmacological approach was used to explore potential mechanisms of actio... Objective This study aimed to investigate the effect and underlying mechanism of Fructus lycii in improving exercise fatigue.Methods A network pharmacological approach was used to explore potential mechanisms of action of Fructus lycii.Skeletal muscle C2C12 cells and immunofluorescence were employed to verify the effect and mechanism of the representative components in Fructus lycii predicted by network pharmacological analysis.Results Six potential active components,namely quercetin,β-sitosterol,stigmasterol,7-Omethylluteolin-6-C-beta-glucoside_qt,atropine,and glycitein,were identified to have potency in improving exercise fatigue via multiple pathways,such as the PI3K-Akt,neuroactive ligand-receptor interaction,IL-17,TNF,and MAPK signaling pathways.The immunofluorescence results indicated that quercetin,a significant active component in Fructus lycii,increased the mean staining area of 2-NBDG,TMRM,and MitoTracker,and decreased the area of CellRox compared to the control.Furthermore,the protein expression levels of p-38 MAPK,p-MAPK,p-JNK,p-PI3K,and p-AKT markedly increased after quercetin treatment.Conclusion Fructus lycii might alleviate exercise fatigue through multiple components and pathways.Among these,quercetin appears to improve exercise fatigue by enhancing energy metabolism and reducing oxidative stress.The PI3K-AKT and MAPK signaling pathways also appear to play a role in this process. 展开更多
关键词 Fructus lycii Exercise fatigue network pharmacology
下载PDF
Scenario Modeling-Aided AP Placement Optimization Method for Indoor Localization and Network Access
12
作者 Pan Hao Chen Yu +1 位作者 Qi Xiaogang Liu Meili 《China Communications》 SCIE CSCD 2024年第3期37-50,共14页
Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)sig... Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)significantly influences localization accuracy and network access.However,the indoor scenario and network access are not fully considered in previous AP placement optimization methods.This study proposes a practical scenario modelingaided AP placement optimization method for improving localization accuracy and network access.In order to reduce the gap between simulation-based and field measurement-based AP placement optimization methods,we introduce an indoor scenario modeling and Gaussian process-based RSS prediction method.After that,the localization and network access metrics are implemented in the multiple objective particle swarm optimization(MOPSO)solution,Pareto front criterion and virtual repulsion force are applied to determine the optimal AP placement.Finally,field experiments demonstrate the effectiveness of the proposed indoor scenario modeling method and RSS prediction model.A thorough comparison confirms the localization and network access improvement attributed to the proposed anchor placement method. 展开更多
关键词 indoor localization MOPSO network access RSS prediction
下载PDF
A Fuzzy Trust Management Mechanism with Dynamic Behavior Monitoring for Wireless Sensor Networks
13
作者 Fu Shiming Zhang Ping Shi Xuehong 《China Communications》 SCIE CSCD 2024年第5期177-189,共13页
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul... Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring. 展开更多
关键词 behavior monitoring CLOUD FUZZY TRUST wireless sensor networks
下载PDF
Beam based alignment using a neural network
14
作者 Guan-Liang Wang Ke-Min Chen +5 位作者 Si-Wei Wang Zhe Wang Tao He Masahito Hosaka Guang-Yao Feng Wei Xu 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第4期108-118,共11页
Beams typically do not travel through the magnet centers because of errors in storage rings.The beam deviating from the quadrupole centers is affected by additional dipole fields due to magnetic field feed-down.Beam-b... Beams typically do not travel through the magnet centers because of errors in storage rings.The beam deviating from the quadrupole centers is affected by additional dipole fields due to magnetic field feed-down.Beam-based alignment(BBA)is often performed to determine a golden orbit where the beam circulates around the quadrupole center axes.For storage rings with many quadrupoles,the conventional BBA procedure is time-consuming,particularly in the commissioning phase,because of the necessary iterative process.In addition,the conventional BBA method can be affected by strong coupling and the nonlinearity of the storage ring optics.In this study,a novel method based on a neural network was proposed to determine the golden orbit in a much shorter time with reasonable accuracy.This golden orbit can be used directly for operation or adopted as a starting point for conventional BBA.The method was demonstrated in the HLS-II storage ring for the first time through simulations and online experiments.The results of the experiments showed that the golden orbit obtained using this new method was consistent with that obtained using the conventional BBA.The development of this new method and the corresponding experiments are reported in this paper. 展开更多
关键词 Golden orbit Beam-based alignment Neural network Storage ring
下载PDF
A Self-Attention Based Dynamic Resource Management for Satellite-Terrestrial Networks
15
作者 Lin Tianhao Luo Zhiyong 《China Communications》 SCIE CSCD 2024年第4期136-150,共15页
The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power suppor... The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks. 展开更多
关键词 mobile edge computing resource management satellite-terrestrial networks self-attention
下载PDF
Assessment of International GNSS Service Global Ionosphere Map products over China region based on measurements from the Crustal Movement Observation Network of China 被引量:1
16
作者 Jin Hu HaiBing Ruan +2 位作者 FuQing Huang ShengYang Gu XianKang Dou 《Earth and Planetary Physics》 EI CAS CSCD 2024年第2期400-407,共8页
The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of G... The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of GIM products in data-sparse regions is of paramount importance.In this study,measurements from the Crustal Movement Observation Network of China(CMONOC)are leveraged to evaluate the suitability of IGS-GIM products over China region in 2013-2014.The indices of mean error(ME),root mean square error(RMSE),and normalized RMSE(NRMSE)are then utilized to quantify the accuracy of IGS-GIM products.Results revealed distinct local time and latitudinal dependencies in IGS-GIM errors,with substantially high errors at nighttime(NRMSE:39%)and above 40°latitude(NRMSE:49%).Seasonal differences also emerged,with larger equinoctial deviations(NRMSE:33.5%)compared with summer(20%).A preliminary analysis implied that the irregular assimilation of sparse IGS observations,compounded by China’s distinct geomagnetic topology,may manifest as error variations.These results suggest that modeling based solely on IGS-GIM observations engenders inadequate representations across China and that a thorough examination would proffer the necessary foundation for advancing regional total electron content(TEC)constructions. 展开更多
关键词 International GNSS Service(IGS)Global Ionosphere Maps(GIM) Crustal Movement Observation network of China(CMONOC) total electron content(TEC) data assessment
下载PDF
Protective mechanism of quercetin in alleviating sepsis-related acute respiratory distress syndrome based on network pharmacology and in vitro experiments
17
作者 Weichao Ding Wei Zhang +7 位作者 Juan Chen Mengmeng Wang Yi Ren Jing Feng Xiaoqin Han Xiaohang Ji Shinan Nie Zhaorui Sun 《World Journal of Emergency Medicine》 SCIE CAS CSCD 2024年第2期111-120,共10页
BACKGROUND:Sepsis-related acute respiratory distress syndrome(ARDS)has a high mortality rate,and no effective treatment is available currently.Quercetin is a natural plant product with many pharmacological activities,... BACKGROUND:Sepsis-related acute respiratory distress syndrome(ARDS)has a high mortality rate,and no effective treatment is available currently.Quercetin is a natural plant product with many pharmacological activities,such as antioxidative,anti-apoptotic,and anti-inflammatory effects.This study aimed to elucidate the protective mechanism of quercetin against sepsis-related ARDS.METHODS:In this study,network pharmacology and in vitro experiments were used to investigate the underlying mechanisms of quercetin against sepsis-related ARDS.Core targets and signaling pathways of quercetin against sepsis-related ARDS were screened and were verified by in vitro experiments.RESULTS:A total of 4,230 targets of quercetin,360 disease targets of sepsis-related ARDS,and 211 intersection targets were obtained via database screening.Among the 211 intersection targets,interleukin-6(IL-6),tumor necrosis factor(TNF),albumin(ALB),AKT serine/threonine kinase 1(AKT1),and interleukin-1β(IL-1β)were identified as the core targets.A Gene Ontology(GO)enrichment analysis revealed 894 genes involved in the inflammatory response,apoptosis regulation,and response to hypoxia.Kyoto Encyclopedia of Genes and Genomes(KEGG)enrichment analysis identified 106 pathways.After eliminating and generalizing,the hypoxia-inducible factor-1(HIF-1),TNF,nuclear factor-κB(NF-κB),and nucleotide-binding and oligomerization domain(NOD)-like receptor signaling pathways were identified.Molecular docking revealed that quercetin had good binding activity with the core targets.Moreover,quercetin blocked the HIF-1,TNF,NF-κB,and NODlike receptor signaling pathways in lipopolysaccharide(LPS)-induced murine alveolar macrophage(MH-S)cells.It also suppressed the inflammatory response,oxidative reactions,and cell apoptosis.CONCLUSION:Quercetin ameliorates sepsis-related ARDS by binding to its core targets and blocking the HIF-1,TNF,NF-κB,and NOD-like receptor signaling pathways to reduce inflammation,cell apoptosis,and oxidative stress. 展开更多
关键词 QUERCETIN Sepsis-related acute respiratory distress syndrome network pharmacology
下载PDF
Image segmentation of exfoliated two-dimensional materials by generative adversarial network-based data augmentation
18
作者 程晓昱 解晨雪 +6 位作者 刘宇伦 白瑞雪 肖南海 任琰博 张喜林 马惠 蒋崇云 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期112-117,共6页
Mechanically cleaved two-dimensional materials are random in size and thickness.Recognizing atomically thin flakes by human experts is inefficient and unsuitable for scalable production.Deep learning algorithms have b... Mechanically cleaved two-dimensional materials are random in size and thickness.Recognizing atomically thin flakes by human experts is inefficient and unsuitable for scalable production.Deep learning algorithms have been adopted as an alternative,nevertheless a major challenge is a lack of sufficient actual training images.Here we report the generation of synthetic two-dimensional materials images using StyleGAN3 to complement the dataset.DeepLabv3Plus network is trained with the synthetic images which reduces overfitting and improves recognition accuracy to over 90%.A semi-supervisory technique for labeling images is introduced to reduce manual efforts.The sharper edges recognized by this method facilitate material stacking with precise edge alignment,which benefits exploring novel properties of layered-material devices that crucially depend on the interlayer twist-angle.This feasible and efficient method allows for the rapid and high-quality manufacturing of atomically thin materials and devices. 展开更多
关键词 two-dimensional materials deep learning data augmentation generating adversarial networks
下载PDF
Improved Convolutional Neural Network for Traffic Scene Segmentation
19
作者 Fuliang Xu Yong Luo +1 位作者 Chuanlong Sun Hong Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2691-2708,共18页
In actual traffic scenarios,precise recognition of traffic participants,such as vehicles and pedestrians,is crucial for intelligent transportation.This study proposes an improved algorithm built on Mask-RCNN to enhanc... In actual traffic scenarios,precise recognition of traffic participants,such as vehicles and pedestrians,is crucial for intelligent transportation.This study proposes an improved algorithm built on Mask-RCNN to enhance the ability of autonomous driving systems to recognize traffic participants.The algorithmincorporates long and shortterm memory networks and the fused attention module(GSAM,GCT,and Spatial Attention Module)to enhance the algorithm’s capability to process both global and local information.Additionally,to increase the network’s initial operation stability,the original network activation function was replaced with Gaussian error linear unit.Experiments were conducted using the publicly available Cityscapes dataset.Comparing the test results,it was observed that the revised algorithmoutperformed the original algorithmin terms of AP_(50),AP_(75),and othermetrics by 8.7%and 9.6%for target detection and 12.5%and 13.3%for segmentation. 展开更多
关键词 Instance segmentation deep learning convolutional neural network attention mechanism
下载PDF
Robot-Oriented 6G Satellite-UAV Networks: Requirements, Paradigm Shifts, and Case Studies
20
作者 Peng Wei Wei Feng +2 位作者 Yunfei Chen Ning Ge Wei Xiang 《China Communications》 SCIE CSCD 2024年第2期74-84,共11页
Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) net... Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) networks can support such robots by providing on-demand communication services. However, under traditional open-loop communication paradigm, the network resources are usually divided into user-wise mostly-independent links,via ignoring the task-level dependency of robot collaboration. Thus, it is imperative to develop a new communication paradigm, taking into account the highlevel content and values behind, to facilitate multirobot operation. Inspired by Wiener’s Cybernetics theory, this article explores a closed-loop communication paradigm for the robot-oriented satellite-UAV network. This paradigm turns to handle group-wise structured links, so as to allocate resources in a taskoriented manner. It could also exploit the mobility of robots to liberate the network from full coverage,enabling new orchestration between network serving and positive mobility control of robots. Moreover,the integration of sensing, communications, computing and control would enlarge the benefit of this new paradigm. We present a case study for joint mobile edge computing(MEC) offloading and mobility control of robots, and finally outline potential challenges and open issues. 展开更多
关键词 closed-loop communication mobility control satellite-UAV network structured resource allocation
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部