期刊文献+
共找到1,211,562篇文章
< 1 2 250 >
每页显示 20 50 100
Learning the parameters of a class of stochastic Lotka-Volterra systems with neural networks
1
作者 WANG Zhanpeng WANG Lijin 《中国科学院大学学报(中英文)》 北大核心 2025年第1期20-25,共6页
In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained f... In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained from the Euler-Maruyama discretization of the underlying stochastic differential equations(SDEs),based on which the loss function is built.The stochastic gradient descent method is applied in the neural network training.Numerical experiments demonstrate the effectiveness of our method. 展开更多
关键词 stochastic Lotka-Volterra systems neural networks Euler-Maruyama scheme parameter estimation
在线阅读 下载PDF
Dynamic Interaction Analysis of Coupled Axial-Torsional-Lateral Mechanical Vibrations in Rotary Drilling Systems
2
作者 Sabrina Meddah Sid Ahmed Tadjer +3 位作者 Abdelhakim Idir Kong Fah Tee Mohamed Zinelabidine Doghmane Madjid Kidouche 《Structural Durability & Health Monitoring》 EI 2025年第1期77-103,共27页
Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emp... Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emphasis on structural durability and monitoring is required.This study focuses on the mechanical vibrations that occur in rotary drilling systems,which have a substantial impact on the structural integrity of drilling equipment.The study specifically investigates axial,torsional,and lateral vibrations,which might lead to negative consequences such as bit-bounce,chaotic whirling,and high-frequency stick-slip.These events not only hinder the efficiency of drilling but also lead to exhaustion and harm to the system’s components since they are difficult to be detected and controlled in real time.The study investigates the dynamic interactions of these vibrations,specifically in their high-frequency modes,usingfield data obtained from measurement while drilling.Thefindings have demonstrated the effect of strong coupling between the high-frequency modes of these vibrations on drilling sys-tem performance.The obtained results highlight the importance of considering the interconnected impacts of these vibrations when designing and implementing robust control systems.Therefore,integrating these compo-nents can increase the durability of drill bits and drill strings,as well as improve the ability to monitor and detect damage.Moreover,by exploiting thesefindings,the assessment of structural resilience in rotary drilling systems can be enhanced.Furthermore,the study demonstrates the capacity of structural health monitoring to improve the quality,dependability,and efficiency of rotary drilling systems in the petroleum industry. 展开更多
关键词 Rotary drilling systems mechanical vibrations structural durability dynamic interaction analysis field data analysis
在线阅读 下载PDF
再论国家标准《功能、残疾、健康分类的康复组合评定》(ICF-RS)的临床践行
3
作者 燕铁斌 章马兰 于佳妮 《中国康复》 2025年第3期131-134,共4页
本文系统阐述了国家标准《功能、残疾、健康分类的康复组合评定》(ICF-RS)的临床实践路径及研究成果。通过多中心研究验证,项目组开发了单人版和多人版ICF-RS评估工具,其中多人版由医生、护士、治疗师协作完成,显著缩短单次评估时间。同... 本文系统阐述了国家标准《功能、残疾、健康分类的康复组合评定》(ICF-RS)的临床实践路径及研究成果。通过多中心研究验证,项目组开发了单人版和多人版ICF-RS评估工具,其中多人版由医生、护士、治疗师协作完成,显著缩短单次评估时间。同时,基于Android系统研发的移动数据平台实现了ICF-RS评估的数字化管理,并通过神经网络算法构建功能维度预测模型,支持临床快速生成三类定制化报告(患者版、临床医生版、康复专业版)。规范化培训可提升评估一致性。ICF-RS已成功应用于重症康复、神经外科等多学科,部分省市正探索将其纳入医保支付体系作为医疗质控指标。作为ICD-11升级的重要配套工具,ICF-RS的全面推广将加速我国临床-康复一体化进程。 展开更多
关键词 ICF ICF-rs 功能残疾健康分类 康复组合评定 临床践行
在线阅读 下载PDF
基于JPS和变半径RS曲线的Hybrid A^(*)路径规划算法
4
作者 张博强 张成龙 +1 位作者 冯天培 高向川 《郑州大学学报(工学版)》 北大核心 2025年第2期19-25,共7页
为解决混合A^(*)(Hybrid A^(*))算法在高分辨率地图和复杂场景下搜索效率低、耗费时间长的问题,通过对影响传统Hybrid A^(*)算法搜索效率的因素进行分析,提出了J-Hybrid A^(*)算法。首先,在Hybrid A^(*)算法扩展节点前,使用跳点搜索(JPS... 为解决混合A^(*)(Hybrid A^(*))算法在高分辨率地图和复杂场景下搜索效率低、耗费时间长的问题,通过对影响传统Hybrid A^(*)算法搜索效率的因素进行分析,提出了J-Hybrid A^(*)算法。首先,在Hybrid A^(*)算法扩展节点前,使用跳点搜索(JPS)算法进行起点到终点的路径搜索,将该路径进行拉直处理后作为计算节点启发值的基础;其次,设计了新的启发函数,在Hybrid A^(*)算法扩展前就能完成所有节点启发值的计算,减少了Hybrid A^(*)扩展节点时计算启发值所需的时间;最后,将RS曲线由最小转弯半径搜索改为变半径RS曲线搜索,使RS曲线能够更早搜索到一条无碰撞路径,进一步提升了Hybrid A^(*)算法的搜索效率。仿真结果表明:所提J-Hybrid A^(*)算法在简单环境中比传统Hybrid A^(*)算法和反向Hybrid A^(*)算法用时分别缩短68%、21%,在复杂环境中缩短59%、27%。在不同分辨率地图场景中,随着地图分辨率的提高,规划效率显著提升。实车实验表明:所提J-Hybrid A^(*)算法相较于传统Hybrid A^(*)算法和反向Hybrid A^(*)算法的搜索用时分别减少88%、82%,有效提升了Hybrid A^(*)算法的搜索效率、缩短了路径规划所需时间。 展开更多
关键词 Hybrid A^(*)算法 启发函数 JPS算法 rs曲线 路径规划
在线阅读 下载PDF
Anomalous time-reversal symmetric non-Hermitian systems
5
作者 易益妃 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期162-166,共5页
The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical res... The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical responses of nonHermitian systems with anomalous time-reversal symmetry, in both one dimension and two dimensions. Specifically, we focus on whether the systems will exhibit a non-Hermitian skin effect. We employ the theory of generalized Brillouin zone and also numerical methods to show that the anomalous time-reversal symmetry can prevent the skin effect in onedimensional non-Hermitian systems, but is unable to exert the same effectiveness in two-dimensional cases. 展开更多
关键词 skin effect SYMMETRY non-Hermitian systems
在线阅读 下载PDF
Numerical simulation for the initial state of avalanche in polydisperse particle systems
6
作者 韩韧 李亭 +2 位作者 迟志鹏 杨晖 李然 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期405-412,共8页
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,... Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,respectively.In these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse system.By examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse systems.We also consider the distribution characteristics of the average coordination number and average velocity for the moving particles.The results support that the polydisperse particle systems are more stable in the T2 stage. 展开更多
关键词 AVALANCHE initial state polydisperse particle systems PROPAGATION
在线阅读 下载PDF
Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
7
作者 Mohammed Amin Almaiah Leen Mohammad Saqr +3 位作者 Leen Ahmad Al-Rawwash Layan Ahmed Altellawi Romel Al-Ali Omar Almomani 《Computers, Materials & Continua》 SCIE EI 2024年第11期3189-3220,共32页
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues... Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks. 展开更多
关键词 Cyber threats database systems cyber risk assessment VULNERABILITIES COUNTERMEASURES
在线阅读 下载PDF
Computing large deviation prefactors of stochastic dynamical systems based on machine learning
8
作者 李扬 袁胜兰 +1 位作者 陆凌宏志 刘先斌 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期364-373,共10页
We present a large deviation theory that characterizes the exponential estimate for rare events in stochastic dynamical systems in the limit of weak noise.We aim to consider a next-to-leading-order approximation for m... We present a large deviation theory that characterizes the exponential estimate for rare events in stochastic dynamical systems in the limit of weak noise.We aim to consider a next-to-leading-order approximation for more accurate calculation of the mean exit time by computing large deviation prefactors with the aid of machine learning.More specifically,we design a neural network framework to compute quasipotential,most probable paths and prefactors based on the orthogonal decomposition of a vector field.We corroborate the higher effectiveness and accuracy of our algorithm with two toy models.Numerical experiments demonstrate its powerful functionality in exploring the internal mechanism of rare events triggered by weak random fluctuations. 展开更多
关键词 machine learning large deviation prefactors stochastic dynamical systems rare events
在线阅读 下载PDF
A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions
9
作者 Monirah Al-Ajlan Mourad Ykhlef 《Computers, Materials & Continua》 SCIE EI 2024年第11期2053-2076,共24页
The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Gener... The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps. 展开更多
关键词 Intrusion detection systems network security generative networks deep learning DATASET
在线阅读 下载PDF
Maximum Power Point Tracking Technology for PV Systems: Current Status and Perspectives
10
作者 Bo Yang Rui Xie Zhengxun Guo 《Energy Engineering》 EI 2024年第8期2009-2022,共14页
Maximum power point tracking(MPPT)technology plays a key role in improving the energy conversion efficiency of photovoltaic(PV)systems,especially when multiple local maximum power points(LMPPs)occur under partial shad... Maximum power point tracking(MPPT)technology plays a key role in improving the energy conversion efficiency of photovoltaic(PV)systems,especially when multiple local maximum power points(LMPPs)occur under partial shading conditions(PSC).It is necessary to modify the operating point efficiently and accurately with the help of MPPT technology to maximize the collected power.Even though a lot of research has been carried out and impressive progress achieved for MPPT technology,it still faces some challenges and dilemmas.Firstly,the mathematical model established for PV cells is not precise enough.Second,the existing algorithms are often optimized for specific conditions and lack comprehensive adaptability to the actual operating environment.Besides,a single algorithm may not be able to give full play to its advantages.In the end,the selection criteria for choosing the suitable MPPT algorithm/converter combination to achieve better performance in a given scenario is very limited.Therefore,this paper systematically discusses the current research status and challenges faced by PV MPPT technology around the three aspects of MPPT models,algorithms,and hardware implementation.Through in-depth thinking and discussion,it also puts forward positive perspectives on future development,and five forward-looking solutions to improve the performance of PV systems MPPT are suggested. 展开更多
关键词 PV systems MPPT partial shading condition DC-DC converter
在线阅读 下载PDF
Physical Layer Security of 6G Vehicular Networks with UAV Systems:First Order Secrecy Metrics,Optimization,and Bounds
11
作者 Sagar Kavaiya Hiren Mewada +3 位作者 Sagarkumar Patel Dharmendra Chauhan Faris A.Almalki Hana Mohammed Mujlid 《Computers, Materials & Continua》 SCIE EI 2024年第9期3685-3711,共27页
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes... The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers. 展开更多
关键词 Physical layer security 3D positioning 6G communications UAV systems
在线阅读 下载PDF
Rural labor migration and farmers’arrangements of rice production systems in Central China:Insight from the intergenerational division of labor
12
作者 Xue Shen Quanyu Yang +1 位作者 Rongjun Ao Shengsheng Gong 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第9期3200-3214,共15页
Rice production is crucial for food security in China,and its relationship with rural labor migration has been studied extensively.Labor migration in rural China has taken new forms in recent years.There has been a di... Rice production is crucial for food security in China,and its relationship with rural labor migration has been studied extensively.Labor migration in rural China has taken new forms in recent years.There has been a discernible trend wherein adult children have started migrating to cities while their elderly parents return to villages to re-engage in on-farm work.The phenomenon has notably shaped the intergenerational division of labor(IDL)within households.However,it remains to be seen how farmers adjust their rice production systems in response to the IDL.The age of 60 years for employment injury insurance is the eligibility threshold for off-farm employment and is used to obtain a source of exogenous variation in the IDL.Based on a representative household survey of 1,752 rice farmers in the Hubei Province of Central China,our fuzzy regression discontinuity analysis reveals that farmers in IDL households are more likely to adopt ratoon rice(RR)than single cropping rice(SR)or double cropping rice(DR).The effect of the IDL varies under different levels of operational scales and specialized agricultural service availability.Further analysis suggests that farmers’arrangements are associated with two potential mechanisms of downward intergenerational transfer.Monetary transfer for urban housing purchases increases RR in IDL households,and time transfer for intergenerational childcare significantly promotes SR in IDL households.This study enhances the understanding of the relationship between rural labor migration and rice production in China,providing a reference for adjusting rice production systems to ensure food security. 展开更多
关键词 labor migration intergenerational division of labor rice production systems fuzzy regression discontinuity Central China
在线阅读 下载PDF
The First Five Years of a Phase Theory for Complex Systems and Networks
13
作者 Dan Wang Wei Chen Li Qiu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1728-1743,共16页
In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical in... In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical interpretations,the small phase theorem,and the sectored real lemma;The synchronization of a multi-agent network using phase alignment.Towards the end,we also summarize a list of ongoing research on the phase theory and speculate what will happen in the next five years. 展开更多
关键词 Consensus and synchronization matrix phases multi-agent systems phase theory sectored real lemma small phase theorem.
在线阅读 下载PDF
催产素受体rs2254298基因多态性与广泛性焦虑障碍治疗疗效之间的相关性研究
14
作者 薛亮 倪红芬 +3 位作者 戴红 陈萍 王露 沈鑫华 《临床精神医学杂志》 2025年第1期16-20,共5页
目的:探讨催产素浓度及rs2254298受体基因型与广泛性焦虑障碍(general anxiety disorder,GAD)患者临床疗效间的相关性。方法:纳入2021年8月至2023年6月湖州市第三人民医院就诊的88例GAD患者为病例组,应用汉密尔顿焦虑量表(Hamilton anxi... 目的:探讨催产素浓度及rs2254298受体基因型与广泛性焦虑障碍(general anxiety disorder,GAD)患者临床疗效间的相关性。方法:纳入2021年8月至2023年6月湖州市第三人民医院就诊的88例GAD患者为病例组,应用汉密尔顿焦虑量表(Hamilton anxiety scale,HAMA)在基线及治疗第2、4、8周末进行疗效评价;按照HAMA减分率分为有效组和无效组;92名健康人为对照组在基线水平用HAMA进行评估;所有参与者在基线水平检测催产素浓度及rs2254298基因型。对催产素浓度和rs2254298受体基因型与GAD疗效之间进行相关性分析。结果:病例组催产素水平高于对照组,差异有统计学意义(P=0.006);病例组治疗第8周有效组和无效组基因型分布差异有统计学意义(P=0.049),2、4周差异均无统计学意义;回归分析显示催产素浓度及rs2254298基因型不是预测GAD疗效的重要因素。结论:GAD患者存在血清催产素浓度异常,rs2254298基因型与GAD的治疗疗效存在相关关系。 展开更多
关键词 广泛性焦虑障碍 催产素 rs2254298受体基因型
在线阅读 下载PDF
基于软件实现的RS485总线电气层故障注入仪设计
15
作者 姚雪美 洪应平 +1 位作者 党立志 高晨程 《电子器件》 2025年第1期55-59,共5页
为了满足工业控制系统通信时的测试验证要求,结合RS485总线通信特征,设计了一种基于软件注入电气层故障的故障注入系统。系统满足设备通信的故障测试,通过软件模拟电气层信号故障,采用FPGA主控芯片、高速A/D、D/A辅助差分信号输入输出... 为了满足工业控制系统通信时的测试验证要求,结合RS485总线通信特征,设计了一种基于软件注入电气层故障的故障注入系统。系统满足设备通信的故障测试,通过软件模拟电气层信号故障,采用FPGA主控芯片、高速A/D、D/A辅助差分信号输入输出和指令解析,最终实现了对RS485总线信号的故障注入。实践表明,基于软件的故障注入仪灵活性高,适用性强,且精度更高。 展开更多
关键词 故障注入 嵌入式 测试系统 rs485
在线阅读 下载PDF
Personalized Health Monitoring Systems: Integrating Wearable and AI
16
作者 Ion-Alexandru Secara Dariia Hordiiuk 《Journal of Intelligent Learning Systems and Applications》 2024年第2期44-52,共9页
The integration of wearable technologies and artificial intelligence (AI) has revolutionized healthcare, enabling advanced personal health monitoring systems. This article explores the transformative impact of wearabl... The integration of wearable technologies and artificial intelligence (AI) has revolutionized healthcare, enabling advanced personal health monitoring systems. This article explores the transformative impact of wearable technologies and AI on healthcare, highlighting the development and theoretical application of the Integrated Personal Health Monitoring System (IPHMS). By integrating data from various wearable devices, such as smartphones, Apple Watches, and Oura Rings, the IPHMS framework aims to revolutionize personal health monitoring through real-time alerts, comprehensive tracking, and personalized insights. Despite its potential, the practical implementation faces challenges, including data privacy, system interoperability, and scalability. The evolution of healthcare technology from traditional methods to AI-enhanced wearables underscores a significant advancement towards personalized care, necessitating further research and innovation to address existing limitations and fully realize the benefits of such integrated health monitoring systems. 展开更多
关键词 Wearables AI Personalized Healthcare Health Monitoring systems
在线阅读 下载PDF
Immune cells:potential carriers or agents for drug delivery to the central nervous system 被引量:2
17
作者 Shan-Shan Zhang Ruo-Qi Li +3 位作者 Zhong Chen Xiao-Ying Wang Aaron S.Dumont Xiang Fan 《Military Medical Research》 2025年第1期121-153,共33页
Drug delivery systems(DDS)have recently emerged as a promising approach for the unique advantages of drug protection and targeted delivery.However,the access of nanoparticles/drugs to the central nervous system(CNS)re... Drug delivery systems(DDS)have recently emerged as a promising approach for the unique advantages of drug protection and targeted delivery.However,the access of nanoparticles/drugs to the central nervous system(CNS)remains a challenge mainly due to the obstruction from brain barriers.Immune cells infiltrating the CNS in the pathological state have inspired the development of strategies for CNS foundation drug delivery.Herein,we outline the three major brain barriers in the CNS and the mechanisms by which immune cells migrate across the blood–brain barrier.We subsequently review biomimetic strategies utilizing immune cell-based nanoparticles for the delivery of nanoparticles/drugs to the CNS,as well as recent progress in rationally engineering immune cell-based DDS for CNS diseases.Finally,we discuss the challenges and opportunities of immune cell-based DDS in CNS diseases to promote their clinical development. 展开更多
关键词 Drug delivery systems Immune cells Blood-brain barrier Central nervous system
在线阅读 下载PDF
Adoption of Solar Pumping Systems by Vegetable Farmers in Niayes Agro-Ecological Zone of Senegal: Adoption as a Sequential Process
18
作者 Abou Abdoulaye Sow Papa Yona Boubacar Mane +1 位作者 Mamma Sawaneh Halidou Kafando 《Journal of Power and Energy Engineering》 2024年第9期19-36,共18页
This article examines the determinants of the adoption of solar pumping systems (PV) by vegetable farmers in the Niayes area of Senegal. To measure the determinants, we used a sequential logit model to translate the a... This article examines the determinants of the adoption of solar pumping systems (PV) by vegetable farmers in the Niayes area of Senegal. To measure the determinants, we used a sequential logit model to translate the adoption process from becoming aware of solar pumping systems to testing them, i.e. using them at least once, and then continuing to use them over time. The results show that the main variables affecting awareness of the use of solar pumping systems (PV) are age, marital status, experience, access to credit, the farmer’s knowledge of climate change, the farmer’s origin in the Thiès region and length of time in the Niayes area. The first use of PVs is influenced by factors such as the size of the plot, the distance of the plot from the main road or from the market. Finally, the decision to adopt or continue use is influenced by gender, experience, household size and access to credit. Surprisingly, access to credit does not affect the first use of solar pumping systems, but plays a key role in their continued use. 展开更多
关键词 Solar Pumping systems ADOPTION Vegetable Cultivation Niayes (Senegal)
在线阅读 下载PDF
以胜任力为导向的浙大一院i-FIRST“一心五化”拔尖创新医学人才培养模式
19
作者 俞鸿雁 陈俊春 +7 位作者 王权 徐莹 杨晓龙 胡春燕 胡奇达 陈韶华 郑敏 梁廷波 《中国高等医学教育》 2025年第1期1-3,15,共4页
新时代背景下医学人才培养面临新的挑战。本文总结了浙江大学医学院附属第一医院在教育教学改革、师资队伍建设及教学生态环境构建等方面的探索与实践,构建了以胜任力为导向i-FIRST“一心五化”拔尖创新医学人才培养模式。该模式依托医... 新时代背景下医学人才培养面临新的挑战。本文总结了浙江大学医学院附属第一医院在教育教学改革、师资队伍建设及教学生态环境构建等方面的探索与实践,构建了以胜任力为导向i-FIRST“一心五化”拔尖创新医学人才培养模式。该模式依托医院全方位的教学保障策略,以学生成长为中心,通过实施规范化、生态化、个性化、质控化、全球化的培养策略,聚焦培养具有职业素养、国际化能力、科学研究能力、专业知识技能、教学能力、沟通能力、领导力、数智化能力、临床实践病人照护、终身学习能力的十大岗位胜任力的医学人才,以期为医学教育改革和人才培养提供借鉴和参考。 展开更多
关键词 胜任力 i-FIrsT培养体系 医学教育 人才培养
在线阅读 下载PDF
A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems
20
作者 Jiyu Zhang Kehe Wu +4 位作者 Ruomeng Yan Zheng Tian Yizhen Sun Yuxi Wu Yaogong Guo 《Computers, Materials & Continua》 SCIE EI 2025年第1期1211-1232,共22页
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig... Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions. 展开更多
关键词 Access control renewable energy systems(RES) ciphertext-policy attribute-based encryption(CP-ABE) security
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部