期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Safety,immunogenicity,and cross-species protection of a plasmid DNA encoding Plasmodium falciparum SERA5 polypeptide,microbial epitopes and chemokine genes in mice and olive baboons
1
作者 Nyamongo Onkoba Ruth M.Mumo +3 位作者 Horace Ochanda Charles Omwandho Hastings S.Ozwara Thomas G.Egwang 《The Journal of Biomedical Research》 CAS CSCD 2017年第4期321-332,共12页
Incorporation of biomolecular epitopes to malarial antigens should be explored in the development of straintranscending malarial vaccines.The present study sought to determine safety,immunogenicity and cross-species e... Incorporation of biomolecular epitopes to malarial antigens should be explored in the development of straintranscending malarial vaccines.The present study sought to determine safety,immunogenicity and cross-species efficacy of Plasmodium falciparum serine repeat antigen 5 polypeptide co-expressed with epitopes of BacilleCalmette Guerin(BCG),tetanus toxoid(TT) and a chemokine gene.Olive baboons and BALB/c mice were randomly assigned into vaccine and control groups.The vaccine group animals were primed and boosted twice with pIRES plasmids encoding the SERA5 + BCG + TT alone,or with either CCL5 or CCL20 and the control group with pIRES plasmid vector backbone.Mice and baboons were challenged with P.berghei ANKA and P.knowlesi H strain parasites,respectively.Safety was determined by observing for injection sites reactogenicities,hematology and clinical chemistry.Parasitaemia and survivorship profiles were used to determine cross-species efficacy,and T cell phenotypes,Th1-,Th2-type,T-regulatory immune responses and antibody responses were assessed to determine vaccine immunogenicity.The pSeBCGTT plasmid DNA vaccines were safe and induced Thl-,Th2-type,and Tregulatory responses vaccinated animals showed enhanced CD4~+(P〈0.01),CD 8~+ T cells(P〈 0.001) activation and IgG anti-SE36 antibodies responses(P〈 0.001) at week 4 and 8 post vaccination compared to the control group.Vaccinated mice had a 31.45-68.69%cumulative parasite load reduction and 60%suppression in baboons(P〈0.05)and enhanced survivorship(P〈 0.001) with no clinical signs of malaria compared to the control group.The results showed that the vaccines were safe,immunogenic and conferred partial cross-species protection. 展开更多
关键词 malaria DNA vaccines serine repeat antigen chemokines cross-species protection immunogenicity safety
下载PDF
Technical Analysis and Improvement of the Pedestrian Safety Protection of a Car Hood
2
作者 SONG Xin-ping HUANG Hu SHI Run-wei 《International Journal of Plant Engineering and Management》 2010年第1期54-59,共6页
The pedestrian protection technology must be used in automotive design if China-made automotives want to compete and grow strong in the world in the future. In this paper, a CAE simulation analysis is made for a domes... The pedestrian protection technology must be used in automotive design if China-made automotives want to compete and grow strong in the world in the future. In this paper, a CAE simulation analysis is made for a domestic sedan car hood to check whether it meet the pedestrian safety protection laws and regulations. Results show that the original car cannot meet the demands of the rules. In order to meet the standards of the pedustrian protection rules, the car hood should undergo structural improvements. Tested again by CAE simulation analysis, the car after a series of improved design can reached the 3-star class EuroNCAP( Euro New Car Assessment Program)standard of the car pedestrian safety protection laws and regulations. 展开更多
关键词 sedan car engine hood pedestrian safety protection improved design
下载PDF
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks 被引量:2
3
作者 Fei Li Jiayan Zhang +3 位作者 Edward Szczerbicki Jiaqi Song Ruxiang Li Renhong Diao 《Computers, Materials & Continua》 SCIE EI 2020年第10期653-681,共29页
The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these... The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these security issues,the safety protection technology of the in-vehicle system has become a focus of research.Using the advanced autoencoder network and recurrent neural network in deep learning,we investigated the intrusion detection system based on the in-vehicle system.We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior.In order to verify the accuracy and efficiency of the proposed model,it was evaluated using real vehicle data.The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior.The parameters of the model are self-iteratively updated using the time-based back propagation algorithm.We verified that the model proposed in this study can reach a nearly 96%accurate detection rate. 展开更多
关键词 Internet of vehicles safety protection technology intrusion detection system advanced auto-encoder recurrent neural network time-based back propagation algorithm
下载PDF
Analysis and Research on China′s Industrial Internet Security Development
4
作者 WANG Fangyuan 《International Journal of Plant Engineering and Management》 2022年第4期244-252,共9页
Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and ... Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and complex business relationships of industrial Internet.The main contents of the platform include industrial data collection,industrial protocol identification,industrial asset detection and industrial threat monitoring.Among them,risk prevention and detection,key data protection,cloud platform and identification resolution node protection are all important issues.On the one hand,escorting the industrial Internet business needs to summarize the industrial Internet network security data and master the network security situation from the overall perspective.On the other hand,it is also necessary to establish an industrial Internet platform security early warning and emergency response process system,promote the security rectification of industrial platform enterprises,find the security threats and risks that have been hidden in the industrial Internet platform for a long time,and provide perception and decision⁃making support for enterprises. 展开更多
关键词 industrial internet security situation awareness safety protection
下载PDF
Disturbance Observer-Based Safe Tracking Control for Unmanned Helicopters With Partial State Constraints and Disturbances
5
作者 Haoxiang Ma Mou Chen Qingxian Wu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第11期2056-2069,共14页
In this paper, a disturbance observer-based safe tracking control scheme is proposed for a medium-scale unmanned helicopter with rotor flapping dynamics in the presence of partial state constraints and unknown externa... In this paper, a disturbance observer-based safe tracking control scheme is proposed for a medium-scale unmanned helicopter with rotor flapping dynamics in the presence of partial state constraints and unknown external disturbances. A safety protection algorithm is proposed to keep the constrained states within the given safe-set. A second-order disturbance observer technique is utilized to estimate the external disturbances. It is shown that the desired tracking performance of the controlled unmanned helicopter can be achieved with the application of the backstepping approach, dynamic surface control technique, and Lyapunov method. Finally, the availability of the proposed control scheme has been shown by simulation results. 展开更多
关键词 Disturbance observer dynamic surface control safe tracking control safety protection algorithm unmanned autonomous helicopter
下载PDF
Safety Protection Method of Rehabilitation Robot Based on fNIRS and RGB-D Information Fusion 被引量:1
6
作者 李栋 樊钰琳 +3 位作者 吕娜 陈国栋 王正 迟文政 《Journal of Shanghai Jiaotong university(Science)》 EI 2022年第1期45-54,共10页
In order to improve the safety protection performance of the rehabilitation robot,an active safety protection method is proposed in the rehabilitation scene.The oxyhemoglobin concentration information and RGB-D inform... In order to improve the safety protection performance of the rehabilitation robot,an active safety protection method is proposed in the rehabilitation scene.The oxyhemoglobin concentration information and RGB-D information are combined in this method,which aims to realize the comprehensive monitoring of the invasion target,the patient’s brain function movement state,and the joint angle in the rehabilitation scene.The main focus is to study the fusion method of the oxyhemoglobin concentration information and RGB-D information in the rehabilitation scene.Frequency analysis of brain functional connectivity coefficient was used to distinguish the basic motion states.The human skeleton recognition algorithm was used to realize the angle monitoring of the upper limb joint combined with the depth information.Compared with speed and separation monitoring,the protection method of multi-information fusion is safer and more comprehensive for stroke patients.By building the active safety protection platform of the upper limb rehabilitation robot,the performance of the system in different safety states is tested,and the safety protection performance of the method in the upper limb rehabilitation scene is verified. 展开更多
关键词 upper limb rehabilitation robot safety protection functional near-infrared spectroscopy(fNIRS) multi-information fusion
原文传递
Secondary and activated X(γ)radiation of SPHIC particle therapy facility 被引量:1
7
作者 Wei-Ming Sun Ning Du +1 位作者 Wen-Dong Tian Lan Wang 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2021年第4期84-91,共8页
We report the secondary X(γ)radiation from the accelerator in a normal operating state and activated X(γ)radiation from the accelerator devices when the accelerator stops operating in the cancer treatment facility o... We report the secondary X(γ)radiation from the accelerator in a normal operating state and activated X(γ)radiation from the accelerator devices when the accelerator stops operating in the cancer treatment facility of the Shanghai Proton and Heavy Ion Center(SPHIC).These radiation measurements show us the structural radiation distribution along the beam lines and devices inside the accelerator room when the beam is on and off and can support the radiation protection design of the accelerator facility used for cancer treatment and help evaluate the accumulated radiation dose in the case of an emergency,such as a personal safety system failure or a radiation accident.The radiation dose rate measured in this facility shows that the facility is safe from the radiation protection point.After shooting the quality assurance(QA)beam,the radiation dose rate in the treatment room was also measured to investigate the radiation dose space distribution and decay time dependence.In addition,the time period before safely entering the treatment room after determining the shooting of the QA beam is recommended to be approximately 5 min. 展开更多
关键词 Secondary radiation Activated radiation Nuclear safety and radiation protection Dose rate ACCELERATOR
下载PDF
Review of PLC Security Issues in Industrial Control System 被引量:1
8
作者 Xiaojun Pan Zhuoran Wang Yanbin Sun 《Journal of Cyber Security》 2020年第2期69-83,共15页
Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number ... Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods. 展开更多
关键词 Industrial control system PLC security issues PLC safety protection
下载PDF
Attach Importance To Safety,Environmental Protection AndEnergy Conservation In DevelopmentOf China's Auto Industry
9
作者 Wang Binggang, Director General of CATARC 《中国汽车(英文版)》 1996年第4期9-13,共5页
In 1995, the total output of motor vehicles in China was around 1.45 million units, ranking the 11th in the world; the total motorcycle output 7.83 million, ranking the first in the world. As for the vehicle populatio... In 1995, the total output of motor vehicles in China was around 1.45 million units, ranking the 11th in the world; the total motorcycle output 7.83 million, ranking the first in the world. As for the vehicle population in China, there are about 10.50 million automobiles, 18 million motorcycles, and nearly 10 million 展开更多
关键词 Auto Attach Importance To safety Environmental protection AndEnergy Conservation In DevelopmentOf China’s Auto Industry ECE
原文传递
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
10
作者 WANG Xiaorui WANG Qingxian +1 位作者 GUO Yudong LU Jianping 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期377-384,共8页
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between Guest and virtual machine monitor to pass data directly. The Guest machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode. 展开更多
关键词 VIRTUALIZATION safety protection information extraction of virtual machine covert channel process control structure
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部