期刊文献+
共找到64,958篇文章
< 1 2 250 >
每页显示 20 50 100
基于TrustZone硬件隔离技术的CLKScrew攻击防护研究
1
作者 王建新 郑玉崝 许弘可 《北京电子科技学院学报》 2024年第2期14-22,共9页
随着信息技术的迅猛发展,嵌入式系统中的安全性问题日益受到关注。本文针对嵌入式平台中动态电压频率调整技术存在的安全漏洞,基于高级精简指令集机器的TrustZone硬件隔离技术设计并实现了一种可信执行环境(TEE),利用TrustZone技术实现... 随着信息技术的迅猛发展,嵌入式系统中的安全性问题日益受到关注。本文针对嵌入式平台中动态电压频率调整技术存在的安全漏洞,基于高级精简指令集机器的TrustZone硬件隔离技术设计并实现了一种可信执行环境(TEE),利用TrustZone技术实现了TEE与普通执行环境操作系统间的切换。该环境能够有效抵御CLKScrew攻击,即通过多次调整中央处理器(CPU)线程工作频率来触发嵌入式平台的运行错误。实验结果表明,在该可信执行环境中,即使面临CLK⁃Screw攻击,CPU线程仍能正常工作,确保了系统的安全性。 展开更多
关键词 可信执行环境 CLKScrew攻击 动态电压频率调整
下载PDF
High quality repair of osteochondral defects in rats using the extracellular matrix of antler stem cells 被引量:1
2
作者 Yu-Su Wang Wen-Hui Chu +4 位作者 Jing-Jie Zhai Wen-Ying Wang Zhong-Mei He Quan-Min Zhao Chun-Yi Li 《World Journal of Stem Cells》 SCIE 2024年第2期176-190,共15页
BACKGROUND Cartilage defects are some of the most common causes of arthritis.Cartilage lesions caused by inflammation,trauma or degenerative disease normally result in osteochondral defects.Previous studies have shown... BACKGROUND Cartilage defects are some of the most common causes of arthritis.Cartilage lesions caused by inflammation,trauma or degenerative disease normally result in osteochondral defects.Previous studies have shown that decellularized extracellular matrix(ECM)derived from autologous,allogenic,or xenogeneic mesenchymal stromal cells(MSCs)can effectively restore osteochondral integrity.AIM To determine whether the decellularized ECM of antler reserve mesenchymal cells(RMCs),a xenogeneic material from antler stem cells,is superior to the currently available treatments for osteochondral defects.METHODS We isolated the RMCs from a 60-d-old sika deer antler and cultured them in vitro to 70%confluence;50 mg/mL L-ascorbic acid was then added to the medium to stimulate ECM deposition.Decellularized sheets of adipocyte-derived MSCs(aMSCs)and antlerogenic periosteal cells(another type of antler stem cells)were used as the controls.Three weeks after ascorbic acid stimulation,the ECM sheets were harvested and applied to the osteochondral defects in rat knee joints.RESULTS The defects were successfully repaired by applying the ECM-sheets.The highest quality of repair was achieved in the RMC-ECM group both in vitro(including cell attachment and proliferation),and in vivo(including the simultaneous regeneration of well-vascularized subchondral bone and avascular articular hyaline cartilage integrated with surrounding native tissues).Notably,the antler-stem-cell-derived ECM(xenogeneic)performed better than the aMSC-ECM(allogenic),while the ECM of the active antler stem cells was superior to that of the quiescent antler stem cells.CONCLUSION Decellularized xenogeneic ECM derived from the antler stem cell,particularly the active form(RMC-ECM),can achieve high quality repair/reconstruction of osteochondral defects,suggesting that selection of decellularized ECM for such repair should be focused more on bioactivity rather than kinship. 展开更多
关键词 Osteochondral defect repair Mesenchymal stem cells Extracellular matrix DECELLULARIZATION Antler stem cells Reserve mesenchymal cells Xenogeneic
下载PDF
A dynamic algorithm for trust inference based on double DQN in the internet of things
3
作者 Xiaodong Zhuang Xiangrong Tong 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1024-1034,共11页
The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge t... The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability. 展开更多
关键词 Internet of things Information security Reinforcement learning trust propagation trust inference
下载PDF
Neural membrane repair at the core of regeneration
4
作者 Catarina Dias Jesper Nylandsted 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第7期1399-1400,共2页
Loss of plasma membrane integrity can compromise cell functioning and viability.To countera ct this eminent threat,euka ryotic cells have developed efficient repair mechanisms,which seem to have co-evolved with the em... Loss of plasma membrane integrity can compromise cell functioning and viability.To countera ct this eminent threat,euka ryotic cells have developed efficient repair mechanisms,which seem to have co-evolved with the emergence of vital membrane processes(Cooper and McNeil,2015).This relationship between basic cellular functioning and membrane repair highlights the fundamental significance of preserving membrane integrity for cellular life. 展开更多
关键词 repair PRESERVING INTEGRITY
下载PDF
DTAIS:Distributed trusted active identity resolution systems for the Industrial Internet
5
作者 Tao Huang Renchao Xie +7 位作者 Yuzheng Ren F.Richard Yu Zhuang Zou Lu Han Yunjie Liu Demin Cheng Yinan Li Tian Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期853-862,共10页
In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are... In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness. 展开更多
关键词 Industrial Internet NFT IPFS trust Identity resolution system
下载PDF
A live birth resulting from a fourth cesarean scar pregnancy after combined hysteroscopic and laparoscopic uterine repair: A case report and literature review
6
作者 Jie Yang Jianmin Chen Dong Huang 《Laparoscopic, Endoscopic and Robotic Surgery》 2024年第3期136-139,共4页
Cesarean scar pregnancy(CSP)is a rare form of ectopic pregnancy that is defined as a pregnancy sac located within the scar of a previous cesarean section.Recurrent cesarean scar pregnancy(RCSP)is even more uncommon,1 ... Cesarean scar pregnancy(CSP)is a rare form of ectopic pregnancy that is defined as a pregnancy sac located within the scar of a previous cesarean section.Recurrent cesarean scar pregnancy(RCSP)is even more uncommon,1 with Hasegawa et al reporting the first RCSP in 2005.2 RCSP is a high-risk pregnancy condition with potential complications that include heavy bleeding,uterine rupture,and maternal shock.The exact incidence rates for CSP and RCSP are unknown,although the incidence of CSP is 1/2656–1/1800 of the total number of cesarean sections,and the incidence of RCSP can reach 6.9%–34.3%.3,4,5 With the promulgation of the second and third child policies in China,an increasing number of patients now manifest fertility needs after cesarean section.With improvements in examination methods and awareness of CSP,we also suspect that the rates of CSP and RCSP may be even higher.Unfortunately,there is no standard treatment for CSP.We herein report a case in which the patient was treated by combined hysteroscopic and laparoscopic uterine repair without scar resection during the third RCSP,and the fourth RCSP occurred 6 months later;the patient then selected expectant management.The outcome was a successful cesarean section delivery of a live baby at 34 weeks of gestation,and the uterus was successfully preserved.Placental pathology was examined after delivery and revealed that the chorionic villi penetrated deeply into the myometrium. 展开更多
关键词 pregnancy CESAREAN repair
下载PDF
Modeling Expected Failure Considering Repair Time and Degradation: A Rail System Case Study
7
作者 Maryam Hamidi Atefe Sedaghat +1 位作者 Amir Gharehgozli Ferenc Szidarovszky 《Journal of Transportation Technologies》 2024年第2期236-254,共19页
The repeated failures of any equipment or systems are modeled as a renewal process. The management needs an assessment of the number of future failures to allocate the resources needed for fast repairs. Based on the i... The repeated failures of any equipment or systems are modeled as a renewal process. The management needs an assessment of the number of future failures to allocate the resources needed for fast repairs. Based on the idea of expectation by conditioning, special Volterra-type integral equations are derived for general types of repairs, considering the length of repair and reduced degradation of the idle object. In addition to minimal repair and failure replacement, partial repairs are also discussed when the repair results in reduction of the number of future failures or decreases the effective age of the object. Numerical integration-based algorithm and simulation study are performed to solve the resulting integral equation. Since the geometry degradation in different dimensions of a rail track and controlling and maintaining defects are of importance, a numerical example using the rail industry data is conducted. Expected number of failures of different failure type modes in rail track is calculated within a two-year interval. Results show that within a two-year period, anticipated occurrences of cross level failures, surface failures, and DPI failures are 2.4, 3.8, and 5.8, respectively. 展开更多
关键词 Renewal Theory Expected Number of Failures Partial repair Minimal repair
下载PDF
Enhancing Energy Efficiency with a Dynamic Trust Measurement Scheme in Power Distribution Network
8
作者 Yilei Wang Xin Sun +4 位作者 Guiping Zheng Ahmar Rashid Sami Ullah Hisham Alasmary Muhammad Waqas 《Computers, Materials & Continua》 SCIE EI 2024年第3期3909-3927,共19页
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the e... The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field. 展开更多
关键词 IIoT trusted measure energy efficient
下载PDF
Nucleotide excision repair gene polymorphisms and hepatoblastoma susceptibility in Eastern Chinese children:A five-center case-control study
9
作者 Huimin Yin Xianqiang Wang +6 位作者 Shouhua Zhang Shaohua He Wenli Zhang Hongting Lu Yizhen Wang Jing He Chunlei Zhou 《Chinese Journal of Cancer Research》 SCIE CAS CSCD 2024年第3期298-305,共8页
Objective:Nucleotide excision repair(NER)plays a vital role in maintaining genome stability,and the effect of NER gene polymorphisms on hepatoblastoma susceptibility is still under investigation.This study aimed to ev... Objective:Nucleotide excision repair(NER)plays a vital role in maintaining genome stability,and the effect of NER gene polymorphisms on hepatoblastoma susceptibility is still under investigation.This study aimed to evaluate the relationship between NER gene polymorphisms and the risk of hepatoblastoma in Eastern Chinese Han children.Methods:In this five-center case-control study,we enrolled 966 subjects from East China(193 hepatoblastoma patients and 773 healthy controls).The TaqMan method was used to genotype 19 single nucleotide polymorphisms(SNPs)in NER pathway genes,including ERCC1,XPA,XPC,XPD,XPF,and XPG.Then,multivariate logistic regression analysis was performed,and odds ratios(ORs)and 95%confidence intervals(95%CIs)were utilized to assess the strength of associations.Results:Three SNPs were related to hepatoblastoma risk.XPC rs2229090 and XPD rs3810366 significantly contributed to hepatoblastoma risk according to the dominant model(adjusted OR=1.49,95%CI=1.07−2.08,P=0.019;adjusted OR=1.66,95%CI=1.12−2.45,P=0.012,respectively).However,XPD rs238406 conferred a significantly decreased risk of hepatoblastoma under the dominant model(adjusted OR=0.68,95%CI=0.49−0.95;P=0.024).Stratified analysis demonstrated that these significant associations were more prominent in certain subgroups.Moreover,there was evidence of functional implications of these significant SNPs suggested by online expression quantitative trait loci(eQTLs)and splicing quantitative trait loci(sQTLs)analysis.Conclusions:In summary,NER pathway gene polymorphisms(XPC rs2229090,XPD rs3810366,and XPD rs238406)are significantly associated with hepatoblastoma risk,and further research is required to verify these findings. 展开更多
关键词 Nucleotide excision repair POLYMORPHISMS HEPATOBLASTOMA SUSCEPTIBILITY
下载PDF
A Fuzzy Trust Management Mechanism with Dynamic Behavior Monitoring for Wireless Sensor Networks
10
作者 Fu Shiming Zhang Ping Shi Xuehong 《China Communications》 SCIE CSCD 2024年第5期177-189,共13页
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul... Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring. 展开更多
关键词 behavior monitoring CLOUD FUZZY trust wireless sensor networks
下载PDF
Spent graphite regeneration:Exploring diverse repairing manners with impurities-catalyzing effect towards high performance and low energy consumption
11
作者 Yu Dong Zihao Zeng +7 位作者 Zhengqiao Yuan Bing Wang Hai Lei Wenqing Zhao Wuyun Ai Lingchao Kong Yue Yang Peng Ge 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第4期656-669,共14页
Spent battery recycling has received considerable attention because of its economic and environmental potential.A large amount of retired graphite has been produced as the main electrode material,accompanied by a deta... Spent battery recycling has received considerable attention because of its economic and environmental potential.A large amount of retired graphite has been produced as the main electrode material,accompanied by a detailed exploration of the repair mechanism.However,they still suffer from unclear repair mechanisms and physicochemical evolution.In this study,spent graphite was repaired employing three methodologies:pickling-sintering,pyrogenic-recovery,and high-temperature sintering.Owing to the catalytic effect of the metal-based impurities and temperature control,the as-obtained samples displayed an ordered transformation,including the interlayer distance,crystalline degree,and grain size.As anodes of lithium ions batteries,the capacity of repaired samples reached up to 310 mA h g^(-1)above after 300loops at 1.0 C,similar to that of commercial graphite.Meanwhile,benefitting from the effective assembly of carbon atoms in internal structure of graphite at>1400℃,their initial coulombic efficiency were>87%.Even at 2.0 C,the capacity of samples remained approximately 244 mA h g^(-1)after 500 cycles.Detailed electrochemical and kinetic analyses revealed that a low temperature enhanced the isotropy,thereby enhancing the rate properties.Further,economic and environmental analyses revealed that the revenue obtained through suitable pyrogenic-recovering manners was approximately the largest value(5500$t^(-1)).Thus,this study is expected to clarify the in-depth effect of different repair methods on the traits of graphite,while offering all-round evaluations of repaired graphite. 展开更多
关键词 Spent graphite regeneration repair Temperature treatment
下载PDF
Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments
12
作者 Wenming Wang Zhiquan Liu +1 位作者 Shumin Zhang Guijiang Liu 《Computers, Materials & Continua》 SCIE EI 2024年第11期2517-2545,共29页
Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among vehicles.However,malicious vehicles providing illegal and incorrect information ... Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among vehicles.However,malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users.Trust mechanisms serve as an effective solution to this issue.In recent years,many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes,incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area.In this paper,we propose a distributed vehicular network scheme based on trust scores.Specifically,the designed architecture partitions multiple vehicle regions into clusters.Then,cloud supervision systems(CSSs)verify the accuracy of the information transmitted by vehicles.Additionally,the trust scores for vehicles are calculated to reward or penalize them based on the trust evaluation model.Our proposed scheme demonstrates good scalability and effectively addresses the main cause of malicious information distribution among vehicles.Both theoretical and experimental analysis show that our scheme outperforms the compared schemes. 展开更多
关键词 DISTRIBUTED trust mechanism vehicular network privacy protection
下载PDF
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
13
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 Cross-domain authentication trust evaluation autoencoder
下载PDF
Research advances on encapsulation of probiotics with nanomaterials and their repair mechanisms on intestinal barriers
14
作者 Xiaochen Wang Mengxi Yu +7 位作者 Jianming Ye Ting Liu Lijuan Jian Xiaoyan Zheng Yuan Wang Wei Song Yane Luo Tianli Yue 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第6期3095-3109,共15页
Probiotics participate in various physiological activities and contribute to body health.However,their viability and bioefficacy are adversely affected by gastrointestinal harsh conditions,such as gastric acid,bile sa... Probiotics participate in various physiological activities and contribute to body health.However,their viability and bioefficacy are adversely affected by gastrointestinal harsh conditions,such as gastric acid,bile salts and various enzymes.Fortunately,encapsulation based on various nanomaterials shows tremendous potential to protect probiotics.In this review,we introduced some novel encapsulation technologies involving nanomaterials in view of predesigned stability and viability,selective adhesion,smart release and colonization,and efficacy exertion of encapsulated probiotics.Furthermore,the interactions between encapsulated probiotics and the gastrointestinal tract were summarized and analyzed,with highlighting the regulatory mechanisms of encapsulated probiotics on intestinal mechanical barrier,chemical barrier,biological barrier and immune barrier.This review would benefit the food and pharmaceutical industries in preparation and utilization of multifunctional encapsulated probiotics. 展开更多
关键词 PROBIOTICS ENCAPSULATION Environment-responsive release repair mechanisms Selective colonization
下载PDF
Machine learning and human‐machine trust in healthcare:A systematic survey
15
作者 Han Lin Jiatong Han +4 位作者 Pingping Wu Jiangyan Wang Juan Tu Hao Tang Liuning Zhu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期286-302,共17页
As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have pro... As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have proper trust in medical machines.Intelligent machines that have applied machine learning(ML)technologies continue to penetrate deeper into the medical environment,which also places higher demands on intelligent healthcare.In order to make machines play a role in HMI in healthcare more effectively and make human‐machine cooperation more harmonious,the authors need to build good humanmachine trust(HMT)in healthcare.This article provides a systematic overview of the prominent research on ML and HMT in healthcare.In addition,this study explores and analyses ML and three important factors that influence HMT in healthcare,and then proposes a HMT model in healthcare.Finally,general trends are summarised and issues to consider addressing in future research on HMT in healthcare are identified. 展开更多
关键词 human-machine interaction machine learning trust
下载PDF
LncRNA HOTAIR promotes DNA damage repair and radioresistance by targeting ATR in colorectal cancer
16
作者 HAIQING HU HAO YANG +3 位作者 SHUAISHUAI FAN XUE JIA YING ZHAO HONGRUI LI 《Oncology Research》 SCIE 2024年第8期1335-1346,共12页
Long non-coding RNAs(lncRNAs)have been implicated in cancer progression and drug resistance development.Moreover,there is evidence that lncRNA HOX transcript antisense intergenic RNA(HOTAIR)is involved in colorectal c... Long non-coding RNAs(lncRNAs)have been implicated in cancer progression and drug resistance development.Moreover,there is evidence that lncRNA HOX transcript antisense intergenic RNA(HOTAIR)is involved in colorectal cancer(CRC)progression.The present study aimed to examine the functional role of lncRNA HOTAIR in conferring radiotherapy resistance in CRC cells,as well as the underlying mechanism.The relative expression levels of HOTAIR were examined in 70 pairs of CRC tumor and para-cancerous tissues,as well as in radiosensitive and radioresistant samples.The correlations between HOTAIR expression levels and clinical features of patients with CRC were assessed using the Chi-square test.Functional assays such as cell proliferation,colony formation and apoptosis assays were conducted to determine the radiosensitivity in CRC cells with HOTAIR silencing after treatment with different doses of radiation.RNA pull-down assay andfluorescence in situ hybridization(FISH)were used to determine the interaction between HOTAIR and DNA damage response mediator ataxia-telangiectasia mutated-and Rad3-related(ATR).HOTAIR was significantly upregulated in CRC tumor tissues,especially in radioresistant tumor samples.The elevated expression of HOTAIR was correlated with more advanced histological grades,distance metastasis and the poor prognosis in patients with CRC.Silencing HOTAIR suppressed the proliferation and promoted apoptosis and radiosensitivity in CRC cells.HOTAIR knockdown also inhibited the tumorigenesis of CRC cells and enhanced the sensitivity to radiotherapy in a mouse xenograft model.Moreover,the data showed that HOTAIR could interact with ATR to regulate the DNA damage repair signaling pathway.Silencing HOTAIR impaired the ATR-ATR interacting protein(ATRIP)complex and signaling in cell cycle progression.Collectively,the present results indicate that lncRNA HOTAIR facilitates the DNA damage response pathway and promotes radioresistance in CRC cells by targeting ATR. 展开更多
关键词 LncRNA HOTAIR CRC RADIORESISTANCE DNA damage repair ATR
下载PDF
Experimental and Finite Element Analysis of Corroded High-Pressure Pipeline Repaired by Laminated Composite
17
作者 Seyed Mohammad Reza Abtahi Saeid Ansari Sadrabadi +4 位作者 Gholam Hosein Rahimi Gaurav Singh Hamid Abyar Daniele Amato Luigi Federico 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1783-1806,共24页
Repairs of corroded high-pressure pipelines are essential for fluids transportation under high pressure.One of the methods used in their repairs is the use of layered composites.The composite used must have the necess... Repairs of corroded high-pressure pipelines are essential for fluids transportation under high pressure.One of the methods used in their repairs is the use of layered composites.The composite used must have the necessary strength.Therefore,the experiments and analytical solutions presented in this paper are performed according to the relevant standards and codes,including ASME PCC-2,ASME B31.8S,ASME B31.4,ISO 24817 and ASME B31.G.In addition,the experimental tests are replicated numerically using the finite element method.Setting the strain gauges at different distances from the defect location,can reduce the nonlinear effects,deformation,and fluctuations due to the high pressure.The direct relationship between the depth of an axial defect and the stress concentration is observed at the inner side edges of the defect.Composite reparation reduces the non-linearities related to the sharp variation of the geometry and a more reliable numerical simulation could be performed. 展开更多
关键词 High-pressure pipeline composite repair ASME PCC-2 ISO 24817
下载PDF
Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach
18
作者 Mingxing Zhou Peng Xiao +3 位作者 Qixu Wang Shuhua Ruan Xingshu Chen Menglong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期957-979,共23页
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra... Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss. 展开更多
关键词 6G multi-cloud trusted Infrastructure remote attestation commercial cipher
下载PDF
The DNA damage repair complex MoMMS21-MoSMC5 is required for infection-related development and pathogenicity of Magnaporthe oryzae
19
作者 Yue Jiang Rong Wang +8 位作者 Lili Du Xueyu Wang Xi Zhang Pengfei Qi Qianfei Wu Baoyi Peng Zonghua Wang Mo Wang Ya Li 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第6期1956-1966,共11页
The conserved DNA damage repair complex,MMS21-SMC5/6(Methyl methane sulfonate 21-Structural maintenance of chromosomes 5/6),has been extensively studied in yeast,animals,and plants.However,its role in phytopathogenic ... The conserved DNA damage repair complex,MMS21-SMC5/6(Methyl methane sulfonate 21-Structural maintenance of chromosomes 5/6),has been extensively studied in yeast,animals,and plants.However,its role in phytopathogenic fungi,particularly in the highly destructive rice blast fungus Magnaporthe oryzae,remains unknown.In this study,we functionally characterized the homologues of this complex,MoMMS21 and MoSMC5,in M.oryzae.We first demonstrated the importance of DNA damage repair in M.oryzae by showing that the DNA damage inducer phleomycin inhibited vegetative growth,infection-related development and pathogenicity in this fungus.Additionally,we discovered that MoMMS21 and MoSMC5 interacted in the nuclei,suggesting that they also function as a complex in M.oryzae.Gene deletion experiments revealed that both MoMMS21 and MoSMC5 are required for infection-related development and pathogenicity in M.oryzae,while only MoMMS21 deletion affected growth and sensitivity to phleomycin,indicating its specific involvement in DNA damage repair.Overall,our results provide insights into the roles of MoMMS21 and MoSMC5 in M.oryzae,highlighting their functions beyond DNA damage repair. 展开更多
关键词 Magnaporthe oryzae MMS21 SMC5 DNA damage repair PATHOGENICITY
下载PDF
Experimental Study on Engineering Behavior of Solidified Soil for Scour Repair and Protection
20
作者 WU Xiao-ni LI Ru-yu +5 位作者 SHU Jian TANG Chao CHEN Jin-jian WANG Hui-li JIANG Hai-li WANG Xiao 《China Ocean Engineering》 SCIE EI CSCD 2024年第4期625-635,共11页
A new scour countermeasure using solidified slurry for offshore foundation has been proposed recently.Fluidized solidified slurry is pumped to seabed area around foundation for scour protection or pumped into the deve... A new scour countermeasure using solidified slurry for offshore foundation has been proposed recently.Fluidized solidified slurry is pumped to seabed area around foundation for scour protection or pumped into the developed scour holes for scour repair as the fluidized material solidifies gradually.In the pumping operation and solidification,the engineering behaviors of solidified slurry require to be considered synthetically for the reliable application in scour repair and protection of ocean engineering such as the pumpability related flow value,flow diffusion behavior related rheological property,anti-scour performance related retention rate in solidification and bearing capacity related strength property after solidification.In this study,a series of laboratory tests are conducted to investigate the effects of mix proportion(initial water content and binder content)on the flow value,rheological properties,density,retention rate of solidified slurry and unconfined compressive strength(UCS).The results reveal that the flow value increases with the water content and decreases with the binder amount.All the solidified slurry exhibits Bingham plastic behavior when the shear rate is larger than 5 s^(-1).The Bingham model has been employed to fit the rheology test results,and empirical formulas for obtaining the density,yield stress and viscosity are established,providing scientific support for the numerical assessment of flow and diffusion of solidified slurry.Retention rate of solidified slurry decreases with the water flow velocity and flow value,which means the pumpability of solidified slurry is contrary to anti-scour performance.The unconfined compressive strength after solidification reduces as the water content increases and binder content decreases.A design and application procedure of solidified soil for scour repair and protection is also proposed for engineering reference. 展开更多
关键词 scour repair and protection solidified soil PUMPABILITY STRENGTH flow properties anti-scour performance
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部