期刊文献+
共找到4,626篇文章
< 1 2 232 >
每页显示 20 50 100
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology 被引量:1
1
作者 Chengjie Li Lidong Zhu Zhen Zhang 《China Communications》 SCIE CSCD 2024年第2期85-95,共11页
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system. 展开更多
关键词 blind source separation greedy optimization algorithm interference sensing LEO satellite communication networks signal reconstruction
在线阅读 下载PDF
For Mega-Constellations: Edge Computing and Safety Management Based on Blockchain Technology 被引量:1
2
作者 Zhen Zhang Bing Guo Chengjie Li 《China Communications》 SCIE CSCD 2024年第2期59-73,共15页
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate... In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed. 展开更多
关键词 blockchain consensus mechanism edge computing mega-constellation reputation management
在线阅读 下载PDF
Device design principles and bioelectronic applications for flexible organic electrochemical transistors
3
作者 Lin Gao Mengge Wu +1 位作者 Xinge Yu Junsheng Yu 《International Journal of Extreme Manufacturing》 SCIE EI CAS CSCD 2024年第1期126-153,共28页
Organic electrochemical transistors(OECTs) exhibit significant potential for applications in healthcare and human-machine interfaces, due to their tunable synthesis, facile deposition, and excellent biocompatibility. ... Organic electrochemical transistors(OECTs) exhibit significant potential for applications in healthcare and human-machine interfaces, due to their tunable synthesis, facile deposition, and excellent biocompatibility. Expanding OECTs to the fexible devices will significantly facilitate stable contact with the skin and enable more possible bioelectronic applications. In this work,we summarize the device physics of fexible OECTs, aiming to offer a foundational understanding and guidelines for material selection and device architecture. Particular attention is paid to the advanced manufacturing approaches, including photolithography and printing techniques, which establish a robust foundation for the commercialization and large-scale fabrication. And abundantly demonstrated examples ranging from biosensors, artificial synapses/neurons, to bioinspired nervous systems are summarized to highlight the considerable prospects of smart healthcare. In the end, the challenges and opportunities are proposed for fexible OECTs. The purpose of this review is not only to elaborate on the basic design principles of fexible OECTs, but also to act as a roadmap for further exploration of wearable OECTs in advanced bio-applications. 展开更多
关键词 flexible organic electrochemical transistors wearable bioelectronics manufacturing approaches device physics neuromorphic applications
在线阅读 下载PDF
Electromagnetic scattering and imaging simulation of extremely large-scale sea-ship scene based on GPU parallel technology
4
作者 Cheng-Wei Zhang Zhi-Qin Zhao +2 位作者 Wei Yang Li-Lai Zhou Hai-Yu Zhu 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第2期16-23,共8页
Aiming to solve the bottleneck problem of electromagnetic scattering simulation in the scenes of extremely large-scale seas and ships,a high-frequency method by using graphics processing unit(GPU)parallel acceleration... Aiming to solve the bottleneck problem of electromagnetic scattering simulation in the scenes of extremely large-scale seas and ships,a high-frequency method by using graphics processing unit(GPU)parallel acceleration technique is proposed.For the implementation of different electromagnetic methods of physical optics(PO),shooting and bouncing ray(SBR),and physical theory of diffraction(PTD),a parallel computing scheme based on the CPU-GPU parallel computing scheme is realized to balance computing tasks.Finally,a multi-GPU framework is further proposed to solve the computational difficulty caused by the massive number of ray tubes in the ray tracing process.By using the established simulation platform,signals of ships at different seas are simulated and their images are achieved as well.It is shown that the higher sea states degrade the averaged peak signal-to-noise ratio(PSNR)of radar image. 展开更多
关键词 Multi graphics processing unit Radar imaging Sea-ship Shooting and bouncing rays
在线阅读 下载PDF
Passive IoT Localization Technology Based on SD-PDOA in NLOS and Multi-Path Environments
5
作者 Junyang Liu Yuan Li +10 位作者 Yulu Zhang Shuai Ma Gui Li Yi He Haiwen Yi Yue Liu Xiaotao Xu Xu Zhang Jinyao He Guangjun Wen Jian Li 《Computers, Materials & Continua》 SCIE EI 2024年第7期913-930,共18页
Addressing the challenges of passive Radio Frequency Identification(RFID)indoor localization technology in Non-Line-of-Sight(NLoS)and multipath environments,this paper presents an innovative approach by introducing a ... Addressing the challenges of passive Radio Frequency Identification(RFID)indoor localization technology in Non-Line-of-Sight(NLoS)and multipath environments,this paper presents an innovative approach by introducing a combined technology integrating an improved Kalman Filter with Space Domain Phase Difference of Arrival(SD-PDOA)and Received Signal Strength Indicator(RSSI).This methodology utilizes the distinct channel characteristics in multipath and NLoS contexts to effectively filter out interference and accurately extract localization information,thereby facilitating high precision and stability in passive RFID localization.The efficacy of this approach is demonstrated through detailed simulations and empirical tests conducted on a custom-built experimental platform consisting of passive RFID tags and an R420 reader.The findings are significant:in NLoS conditions,the four-antenna localization system achieved a notable localization accuracy of 0.25 m at a distance of 5 m.In complex multipath environments,this system achieved a localization accuracy of approximately 0.5 m at a distance of 5 m.When compared to conventional passive localization methods,our proposed solution exhibits a substantial improvement in indoor localization accuracy under NLoS and multipath conditions.This research provides a robust and effective technical solution for high-precision passive indoor localization in the Internet of Things(IoT)system,marking a significant advancement in the field. 展开更多
关键词 Indoor localization multipath and NLoS environments combined SD-PDOA and RSSI technology
在线阅读 下载PDF
Induced neural stem cells regulate microglial activation through Akt-mediated upregulation of CXCR4 and Crry in a mouse model of closed head injury
6
作者 Mou Gao Qin Dong +3 位作者 Dan Zou Zhijun Yang Lili Guo Ruxiang Xu 《Neural Regeneration Research》 SCIE CAS 2025年第5期1416-1430,共15页
Microglial activation that occurs rapidly after closed head injury may play important and complex roles in neuroinflammation-associated neuronal damage and repair.We previously reported that induced neural stem cells ... Microglial activation that occurs rapidly after closed head injury may play important and complex roles in neuroinflammation-associated neuronal damage and repair.We previously reported that induced neural stem cells can modulate the behavior of activated microglia via CXCL12/CXCR4 signaling,influencing their activation such that they can promote neurological recovery.However,the mechanism of CXCR4 upregulation in induced neural stem cells remains unclear.In this study,we found that nuclear factor-κB activation induced by closed head injury mouse serum in microglia promoted CXCL12 and tumor necrosis factor-αexpression but suppressed insulin-like growth factor-1 expression.However,recombinant complement receptor 2-conjugated Crry(CR2-Crry)reduced the effects of closed head injury mouse serum-induced nuclear factor-κB activation in microglia and the levels of activated microglia,CXCL12,and tumor necrosis factor-α.Additionally,we observed that,in response to stimulation(including stimulation by CXCL12 secreted by activated microglia),CXCR4 and Crry levels can be upregulated in induced neural stem cells via the interplay among CXCL12/CXCR4,Crry,and Akt signaling to modulate microglial activation.In agreement with these in vitro experimental results,we found that Akt activation enhanced the immunoregulatory effects of induced neural stem cell grafts on microglial activation,leading to the promotion of neurological recovery via insulin-like growth factor-1 secretion and the neuroprotective effects of induced neural stem cell grafts through CXCR4 and Crry upregulation in the injured cortices of closed head injury mice.Notably,these beneficial effects of Akt activation in induced neural stem cells were positively correlated with the therapeutic effects of induced neural stem cells on neuronal injury,cerebral edema,and neurological disorders post–closed head injury.In conclusion,our findings reveal that Akt activation may enhance the immunoregulatory effects of induced neural stem cells on microglial activation via upregulation of CXCR4 and Crry,thereby promoting induced neural stem cell–mediated improvement of neuronal injury,cerebral edema,and neurological disorders following closed head injury. 展开更多
关键词 Akt signaling cerebral edema closed head injury Crry CXCR4 induced neural stem cell MICROGLIA NEUROINFLAMMATION
在线阅读 下载PDF
Efficient OpenMP Based Z-curve Encoding and Decoding Algorithms
7
作者 Zicheng Zhou Shaowen Sun +2 位作者 Teng Liang Mengjuan Li Fengling Xia 《Computers, Materials & Continua》 SCIE EI 2025年第1期1313-1327,共15页
Z-curve’s encoding and decoding algorithms are primely important in many Z-curve-based applications.The bit interleaving algorithm is the current state-of-the-art algorithm for encoding and decoding Z-curve.Although ... Z-curve’s encoding and decoding algorithms are primely important in many Z-curve-based applications.The bit interleaving algorithm is the current state-of-the-art algorithm for encoding and decoding Z-curve.Although simple,its efficiency is hindered by the step-by-step coordinate shifting and bitwise operations.To tackle this problem,we first propose the efficient encoding algorithm LTFe and the corresponding decoding algorithm LTFd,which adopt two optimization methods to boost the algorithm’s efficiency:1)we design efficient lookup tables(LT)that convert encoding and decoding operations into table-lookup operations;2)we design a bit detection mechanism that skips partial order of a coordinate or a Z-value with consecutive 0s in the front,avoiding unnecessary iterative computations.We propose order-parallel and point-parallel OpenMP-based algorithms to exploit the modern multi-core hardware.Experimental results on discrete,skewed,and real datasets indicate that our point-parallel algorithms can be up to 12.6×faster than the existing algorithms. 展开更多
关键词 Z-curve lookup table OPENMP bit detection mechanism
在线阅读 下载PDF
Compensation for topographic effect on P-band PolSAR data with a polarimetric decomposition technique
8
作者 Yin Zhang Ding-Feng Duan 《Journal of Electronic Science and Technology》 2025年第1期98-111,共14页
A P-band polarimetric synthetic aperture radar(PolSAR)sensor has deep penetration ability into and through the vegetation canopies in forested environments.Thus,the sensor is of great potential to accurately assess fo... A P-band polarimetric synthetic aperture radar(PolSAR)sensor has deep penetration ability into and through the vegetation canopies in forested environments.Thus,the sensor is of great potential to accurately assess forest parameters such as coverage,stand density,and tree height.Unfortunately,the radar backscatter from complex terrain can adversely impact the backscatter from trees or forests,and forest parameters assessed can be erroneous.Thus,reducing the topographic impact is an urgent must.In this study,a topographic compensation algorithm has been studied.To assess the algorithm’s validity and effectiveness,we applied it to P-band PolSAR datasets in four forested areas in the US.Trees in the forest stands have diverse species,and the topographic conditions of the terrain differ.Significant topographic impact on the P-band PolSAR data exists before the topographic compensation algorithm.After the algorithm,the impact decreases noticeably qualitatively and quantitatively.The algorithm is valid and effective in reducing the topographic influence on the PolSAR data and,consequently,provides a better chance of retrieving accurate forest parameters. 展开更多
关键词 Azimuthal symmetry or asymmetry Flat/non-flat terrain P-band PolSAR PolSAR decomposition Radar backscatter from forests Topographic compensation
在线阅读 下载PDF
PLAP-PCPE:Physical-Layer Authentication Protocol Based on PUF and Channel Pre-Equalization for the Internet of Things
9
作者 Guo Dengke Gao Yuwei +2 位作者 Cao Kuo Xiong Jun Ma Dongtang 《China Communications》 2025年第3期234-253,共20页
How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with ... How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with constrained resources,this paper proposes a lightweight physical-layer authentication protocol based on Physical Unclonable Function(PUF)and channel pre-equalization.PUF is employed as a secret carrier to provide authentication credentials for devices due to its hardware-based uniqueness and unclonable property.Meanwhile,the short-term reciprocity and spatio-temporal uniqueness of wireless channels are utilized to attach an authentication factor related to the spatio-temporal position of devices and to secure the transmission of authentication messages.The proposed protocol is analyzed formally and informally to prove its correctness and security against typical attacks.Simulation results show its robustness in various radio environments.Moreover,we illustrate the advantages of our protocol in terms of security features and complexity through performance comparison with existing authentication schemes. 展开更多
关键词 IoT physical-layer authentication preequalization PUF wireless channel
在线阅读 下载PDF
MYH7 mutation in a pedigree with familial dilated hypertrophic cardiomyopathy:A case report and review of literature
10
作者 Ying Hong Zhen Fan +7 位作者 Yi Guo Hui-Hui Ma Sheng-Zhi Zeng Hu-Tao Xi Jing Yang Kai Luo Rong Luo Xiao-Ping Li 《World Journal of Clinical Cases》 2025年第15期22-31,共10页
BACKGROUND Hypertrophic cardiomyopathy(HCM)is one of the most prevalent inherited myocardial disorders and is charac-terized by considerable genetic and phenotypic heterogeneity.A subset of patients with HCM progress ... BACKGROUND Hypertrophic cardiomyopathy(HCM)is one of the most prevalent inherited myocardial disorders and is charac-terized by considerable genetic and phenotypic heterogeneity.A subset of patients with HCM progress to a dilated phase of HCM(DPHCM),which is associated with a poor prognosis;however,the underlying pathogenesis remains inadequately understood.CASE SUMMARY In this study,we present a case involving a pedigree with familial DPHCM and conduct a retrospective review of patients with DPHCM with identified gene mutations.Through panel sequencing targeting the coding regions of 312 genes associated with inherited cardiomyopathy,a heterozygous missense mutation(c.746G>A,p.Arg249Glu)in the MYH7 gene was identified in the proband(III-5).Sanger sequencing subsequently confirmed this pathogenic mutation in three additional family members(II-4,III-4,and IV-3).A total of 26 well-documented patients with DPHCM were identified in the literature.Patients with DPHCM are commonly middle-aged and male.The mean age of patients with DPHCM was 53.43±12.79 years.Heart failure,dyspnoea,and atrial fibrillation were the most prevalent symptoms observed,accompanied by an average left ventricular end-diastolic size of 58.62 mm.CONCLUSION Our findings corroborate the pathogenicity of the MYH7(c.746G>A,p.Arg249Glu)mutation for DPHCM and suggest that the Arg249Gln mutation may be responsible for high mortality. 展开更多
关键词 Dilated phase of hypertrophic cardiomyopathy PEDIGREE MYH7 gene Missense mutation Literature review Case report
在线阅读 下载PDF
On large language models safety,security,and privacy:A survey
11
作者 Ran Zhang Hong-Wei Li +2 位作者 Xin-Yuan Qian Wen-Bo Jiang Han-Xiao Chen 《Journal of Electronic Science and Technology》 2025年第1期1-21,共21页
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.De... The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.Despite their transformative impact in fields such as machine translation and intelligent dialogue systems,LLMs face significant challenges.These challenges include safety,security,and privacy concerns that undermine their trustworthiness and effectiveness,such as hallucinations,backdoor attacks,and privacy leakage.Previous works often conflated safety issues with security concerns.In contrast,our study provides clearer and more reasonable definitions for safety,security,and privacy within the context of LLMs.Building on these definitions,we provide a comprehensive overview of the vulnerabilities and defense mechanisms related to safety,security,and privacy in LLMs.Additionally,we explore the unique research challenges posed by LLMs and suggest potential avenues for future research,aiming to enhance the robustness and reliability of LLMs in the face of emerging threats. 展开更多
关键词 Large language models Privacy issues Safety issues Security issues
在线阅读 下载PDF
Performance Evaluation and Transmitter Optimization for AN-Aided FH Communication Against Time Misalignment
12
作者 Song Changqing Lin Lang +3 位作者 Qin Lizhi Xiao Fei Zhao Hongzhi Shao Shihai 《China Communications》 2025年第3期86-103,共18页
To guarantee secure communication against eavesdropping and malicious attack,an artificial noise(AN)-aided frequency-hopping(FH)architecture is adopted in this article.But the inevitable time misalignment between the ... To guarantee secure communication against eavesdropping and malicious attack,an artificial noise(AN)-aided frequency-hopping(FH)architecture is adopted in this article.But the inevitable time misalignment between the received signal and locally reconstructed AN will deteriorate the AN cancellation performance,yielding significant secrecy degradation at the FH receiver.In view of this,first,the AN cancellation performance under time misalignment is evaluated via signal to AN-plus-noise ratio,and the system secrecy is analyzed via secrecy rate.Then,to mitigate the performance degradation raised by time misalignment,the transmitting power allocation scheme for AN and confidential signal(CS)is optimized,and the optimal hopping period is designed.Notably,the obtained conclusions in both the performance evaluation and transmitter optimization sections hold no matter whether the eavesdropper can realize FH synchronization or not.Simulations verify that time misalignment will raise non-negligible performance degradation.Besides,the power ratio of AN to CS should decrease as time misalignment increases,and for perfect time synchronization,the transmitting power of AN and CS should be equivalent.In addition,a longer hopping period is preferred for secrecy enhancement when time misalignment gets exacerbated. 展开更多
关键词 artificial noise(AN)cancellation hopping period design power allocation time misalignment
在线阅读 下载PDF
Boron shielding design for neutron and gamma detectors of a pulsed neutron tool
13
作者 Xin-Yang Wang Jun-Yan Chen Qiong Zhang 《Nuclear Science and Techniques》 2025年第1期115-126,共12页
Shielding materials are critical for downhole pulsed neutron tool design because they directly influence the accuracy of formation measurements.A well-designed shield configuration ensures that the response of the too... Shielding materials are critical for downhole pulsed neutron tool design because they directly influence the accuracy of formation measurements.A well-designed shield configuration ensures that the response of the tool is maximally representative of the formation without being affected by the tool and borehole environment.This study investigated the effects of boron-containing materials on neutron and gamma detectors based on a newly designed logging-while-drilling tool that is currently undergoing manufacturing.As the boron content increased,the ability to absorb thermal neutrons increased significantly.Through simulation,it was proven that boron carbide(B_(4)C)can be used as an effective boron shielding material for thermal neutrons,and is therefore employed in this work.To shield against thermal neutrons migrating from the mud pipes,the optimal shielding thicknesses for the near-and far-neutron detectors were determined to be 5 and 4 mm.At a porosity of 25 p.u.,near-neutron sensitivity exhibited a 5.6%increase.Furthermore,to shield the capture gamma generated by thermal neutrons once they enter the tool from the mud pipe and formation,internal and external shields for the gamma detector were evaluated.The results show that the internal shield requires a boron content of 75%,whereas the external shield has a thickness of 14.2 mm thickness and a boron content of 25%to minimize the tool effect. 展开更多
关键词 Nuclear well logging Pulsed neutron tool Boron shielding
在线阅读 下载PDF
Information Disclosure on Operational Risks and Mitigation Strategies in Crowdfunding Projects: From the Supply Chain Perspective
14
作者 Gladys Tuo Yi Feng +4 位作者 Stephen Okyere James Yaw Osei-Owusu Charles Mensah Dennis Amoako Elizabeth Serwaa Koomson 《Journal of Data Analysis and Information Processing》 2025年第1期25-45,共21页
In reward-based crowdfunding, projects are to disclose the operational risks and mitigation strategies for delivering the physical rewards during the funding phase. However, limited knowledge exists regarding projects... In reward-based crowdfunding, projects are to disclose the operational risks and mitigation strategies for delivering the physical rewards during the funding phase. However, limited knowledge exists regarding projects’ operational risks and mitigation strategies during the funding phase. In contributing to the literature, the study uses data on Kickstarter.com and conducts a content analysis to explore themes and their relationships. The results reveal various operational risks and associated mitigation strategies. Among the identified themes, product-related, contract manufacturers, and supply markets are the most expected risks, while outsourced production and proactive sourcing are the popular mitigation strategies. Also, the finding reveals that proactive sourcing and outsourced production, in-house production and post-campaign sourcing, contract manufacturer risk, and project internal risk are themes forming clusters. The results extend crowdfunding risk disclosure literature and set the tone for future research in crowdfunding operational risk management. Finally, other business implications are drawn for crowdfunding practitioners. 展开更多
关键词 CROWDFUNDING Information RISKS Mitigation Strategies Supply Chain
在线阅读 下载PDF
Combined two-step vascular exclusion and modified in situ hypothermic perfusion for advanced hepatic alveolar echinococcosis with cavernous transformation of portal vein(with video)
15
作者 Peng Li Dong-Hui Cheng +4 位作者 Xin-Yu You Ji-Peng Jiang Bang-You Zuo Chong Yang Yu Zhang 《Hepatobiliary & Pancreatic Diseases International》 2025年第2期206-210,共5页
Hepatectomy is a curative treatment for hepatic alveolar echinococcosis(HAE)[1,2].The prognosis of HAE is similar to that of liver tumors with a mortality of over 90%in untreated cases within 10–15 years after diagno... Hepatectomy is a curative treatment for hepatic alveolar echinococcosis(HAE)[1,2].The prognosis of HAE is similar to that of liver tumors with a mortality of over 90%in untreated cases within 10–15 years after diagnosis[3,4].Advanced stages are characterized by extensive intrahepatic lesions,invasion of the inferior vena cava or hepatic hilum,extended invasion of the diaphragm and retroperitoneal space,and distant metastasis[5],all of which make hepatectomy challenging. 展开更多
关键词 INVASION HEPATIC ALVEOLAR
在线阅读 下载PDF
Relationship between peripheral blood endotoxin, toll-like receptor 4 expression, and postoperative infection following surgery for acute appendicitis
16
作者 Wei Su Tao Yang +6 位作者 Xiao-Jun Hu Juan Song Jing-Jing He Dan Huang Bo Zhang Xiao-Ji Zhao Fang Tang 《World Journal of Gastrointestinal Surgery》 2025年第4期283-289,共7页
BACKGROUND Acute appendicitis,a common condition with a higher prevalence among men,has shown an increasing incidence in recent years owing to lifestyle changes.It is characterized by right lower quadrant abdominal pa... BACKGROUND Acute appendicitis,a common condition with a higher prevalence among men,has shown an increasing incidence in recent years owing to lifestyle changes.It is characterized by right lower quadrant abdominal pain,rebound tenderness,and rapid onset.Its pathogenesis is complex and potentially linked to infection,environment,and genetics.Timely intervention is crucial to prevent complications.While surgery is the primary treatment,it carries risks,including postoperative infections that may necessitate re-operation.Gram-negative bacteria release endotoxin(ETX),which induces inflammation and is recognized by toll-like receptor 4(TLR4).This study evaluated ETX and TLR4 levels in patients with acute appendicitis to assess the risk of postoperative incision infections,aiding in prevention and treatment.AIM To explore ETX and TLR4 expression in the blood of patients with acute appendicitis and its association with in postoperative incision infection.METHODS A total of 153 patients with acute appendicitis treated at our hospital between April 2022 and March 2024(n=153)were included in the study.Patients were categorized into infected(n=36)and uninfected(n=117)groups according to the development of postoperative incision infections.General characteristics and blood levels of ETX and TLR4 were compared,and the factors influencing postoperative infection were identified using multivariate logistic regression.ETX and TLR4 predictive values were analyzed using receiver operating characteristic curves.RESULTS No statistically significant differences were observed between the two groups in terms of sex,age,or other general characteristics(P>0.05).Compared to the uninfected group,the infected group had a higher proportion of patients with suppurative or gangrenous appendicitis,longer surgical times,longer incision lengths,and elevated ETX and TLR4 levels(P<0.05).Multivariate logistic regression analysis identified pathological type,surgical method,surgical time,and incision length as factors influencing postoperative incision infection in acute appendicitis.Receiver operating characteristic curve analysis revealed that both ETX and TLR4 levels were predictive factors for postoperative incision infection,with higher prediction efficiency when combined.CONCLUSION Pathological type,surgical method,surgical time,and incision length significantly influence postoperative incision infection risk in patients with acute appendicitis.Elevated ETX and TLR4 levels serve as valuable predictors of post-appendectomy infections. 展开更多
关键词 Acute appendicitis ENDOTOXIN Toll-like receptor 4 Risk factors Wound infection
在线阅读 下载PDF
Symptom Experiences and Coping Patterns in Pancreatic Cancer Patients During Chemotherapy:A Qualitative Study
17
作者 Xin Tian Ping Chen +12 位作者 Wen Zhou Peiyang Mao Jian Li Cheng Lei Xiaojing Xue Changlin Li Yuxian Nie Feng Gao Jie Li Gang Feng Xiaobo Du Qiuling Shi Jingyu Zhang 《Proceedings of Anticancer Research》 2025年第1期82-96,共15页
Objective:To explore symptom experiences and self-coping patterns during the early and late stages of chemotherapy in these patients to provide a basis for developing targeted symptom management strategies.Methods:A t... Objective:To explore symptom experiences and self-coping patterns during the early and late stages of chemotherapy in these patients to provide a basis for developing targeted symptom management strategies.Methods:A total of 27 patients with pancreatic cancer undergoing chemotherapy at two medical institutions were recruited between November 2023 and August 2024.Semi-structured interviews were conducted in person or over the phone.Data were analyzed using traditional content and thematic analyses.Results:Three themes were identified:symptom experience,self-coping patterns,and existing obstacles.During the early stages of chemotherapy,patients reported a higher frequency of unpleasant symptoms and recognized these symptoms earlier in the treatment course.Patients in the early stages primarily relied on external support to cope with symptoms,while those in the later stages adopted self-care strategies.Several challenges related to unpleasant symptoms were observed,which appeared to correlate with the self-coping patterns employed.Conclusion:Patients with pancreatic cancer undergoing chemotherapy experience a complex and diverse range of symptoms,with varying coping patterns at different stages of treatment.Symptom management during chemotherapy presents significant challenges.Healthcare providers should improve the ongoing monitoring of symptoms post-chemotherapy.By linking patients’symptom experiences and self-coping patterns at different stages of chemotherapy to their specific challenges,personalized symptom management strategies can be developed to enhance care quality. 展开更多
关键词 Pancreatic cancer CHEMOTHERAPY Symptom experience Self-coping Existing obstacles
在线阅读 下载PDF
O-linked β-N-acetylglucosamine transferase regulates macrophage polarization in diabetic periodontitis: In vivo and in vitro study
18
作者 Ye-Ke Wu Min Liu +6 位作者 Hong-Ling Zhou Xiang He Jing Wei Wei-Han Hua Hui-Jing Li Qiang-Hua Yuan Yun-Fei Xie 《World Journal of Diabetes》 2025年第3期167-186,共20页
BACKGROUND Periodontitis,when exacerbated by diabetes,is characterized by increased M1 macrophage polarization and decreased M2 polarization.O-linkedβ-N-acetylglucosamine(O-GlcNAcylation),catalyzed by O-GlcNAc transf... BACKGROUND Periodontitis,when exacerbated by diabetes,is characterized by increased M1 macrophage polarization and decreased M2 polarization.O-linkedβ-N-acetylglucosamine(O-GlcNAcylation),catalyzed by O-GlcNAc transferase(OGT),promotes inflammatory responses in diabetic periodontitis(DP).Additionally,p38 mitogen-activated protein kinase regulates macrophage polarization.However,the interplay between OGT,macrophage polarization,and p38 signaling in the progression of DP remains unexplored.AIM To investigate the effect of OGT on macrophage polarization in DP and its role in mediating O-GlcNAcylation of p38.METHODS For in vivo experiments,mice were divided into four groups:Control,DP model,model+short hairpin(sh)RNAnegative control,and model+sh-OGT.Diabetes was induced by streptozotocin,followed by ligation and lipopolysaccharide(LPS)administration to induce periodontitis.The impact of OGT was assessed by injecting sh-OGT lentivirus.Maxillary bone destruction was evaluated using micro-computed tomography analysis and tartrateresistant acid phosphatase staining,while macrophage polarization was determined through quantitative real-time polymerase chain reaction(qPCR)and immunohistochemistry.For in vitro experiments,RAW264.7 cells were treated with LPS and high glucose(HG)(25 mmol/L D-glucose)to establish a cell model of DP.OGT was inhibited by OGT inhibitor(OSMI4)treatment and knocked down by sh-OGT transfection.M1/M2 polarization was analyzed using qPCR,immunofluorescence,and flow cytometry.Levels of O-GlcNAcylation were measured using immunoprecipitation and western blotting.RESULTS Our results demonstrated that M1 macrophage polarization led to maxillary bone loss in DP mice,associated with elevated O-GlcNAcylation and OGT levels.Knockdown of OGT promoted the shift from M1 to M2 macrophage polarization in both mouse periodontal tissues and LPS+HG-induced RAW264.7 cells.Furthermore,LPS+HG enhanced the O-GlcNAcylation of p38 in RAW264.7 cells.OGT interacted with p38 to promote its O-GlcNAcylation at residues A28,T241,and T347,as well as its phosphorylation at residue Y221.CONCLUSION Inhibition of OGT-mediated p38 O-GlcNAcylation deactivates the p38 pathway by suppressing its self-phosphorylation,thereby promoting M1 to M2 macrophage polarization and mitigating DP.These findings suggested that modulating macrophage polarization through regulation of O-GlcNAcylation may represent a novel therapeutic strategy for treating DP. 展开更多
关键词 Diabetic periodontitis Macrophage polarization O-linkedβ-N-acetylglucosamine O-linkedβ-N-acetylglucosamine transferase P38
在线阅读 下载PDF
Mobile Edge Communications, Computing, and Caching(MEC3) Technology in the Maritime Communication Network 被引量:18
19
作者 Jie Zeng Jiaying Sun +1 位作者 Binwei Wu Xin Su 《China Communications》 SCIE CSCD 2020年第5期223-234,共12页
With the increasing maritime activities and the rapidly developing maritime economy, the fifth-generation(5G) mobile communication system is expected to be deployed at the ocean. New technologies need to be explored t... With the increasing maritime activities and the rapidly developing maritime economy, the fifth-generation(5G) mobile communication system is expected to be deployed at the ocean. New technologies need to be explored to meet the requirements of ultra-reliable and low latency communications(URLLC) in the maritime communication network(MCN). Mobile edge computing(MEC) can achieve high energy efficiency in MCN at the cost of suffering from high control plane latency and low reliability. In terms of this issue, the mobile edge communications, computing, and caching(MEC3) technology is proposed to sink mobile computing, network control, and storage to the edge of the network. New methods that enable resource-efficient configurations and reduce redundant data transmissions can enable the reliable implementation of computing-intension and latency-sensitive applications. The key technologies of MEC3 to enable URLLC are analyzed and optimized in MCN. The best response-based offloading algorithm(BROA) is adopted to optimize task offloading. The simulation results show that the task latency can be decreased by 26.5’ ms, and the energy consumption in terminal users can be reduced to 66.6%. 展开更多
关键词 best response-based offloading algorithm(BROA) energy consumption mobile edge computing(MEC) mobile edge communications computing and caching(MEC3) task offloading
在线阅读 下载PDF
Zn‐doping mediated formation of oxygen vacancies in SnO2 with unique electronic structure for efficient and stable photocatalytic toluene degradation 被引量:5
20
作者 Huizhong Wu Jiadong Wang +5 位作者 Ruimin Chen Chaowei Yuan Jin Zhang Yuxin Zhang Jianping Sheng Fan Dong 《Chinese Journal of Catalysis》 SCIE EI CAS CSCD 2021年第7期1195-1204,共10页
To optimize the electronic structure of photocatalyst,a facile one‐step approach is developed for the simultaneous realization of Zn‐doping and surface oxygen vacancies(SOVs)formation on SnO_(2).The Zn‐doped SnO_(2... To optimize the electronic structure of photocatalyst,a facile one‐step approach is developed for the simultaneous realization of Zn‐doping and surface oxygen vacancies(SOVs)formation on SnO_(2).The Zn‐doped SnO_(2)with abundant SOVs exhibits efficient and stable performance for photocatalytic degradation of toluene under both low and high relative humidity.Experimental and theoretical calculations results show that the synergistic effects of Zn‐doping and SOVs on SnO_(2)can considerably boost the charge transfer and separation efficiency.Utilizing the in situ DRIFTS and theoretical calculations methods,it is revealed that the benzene ring of toluene is opened at benzoic acid on the SnO_(2)surface and selectively at benzaldehyde on the Zn‐doped SnO_(2)surface.This implies that Zn‐doped SnO_(2)photocatalysts shorten the pathway of toluene degradation,and toxic intermediates can be significantly inhibited.This work could provide a promising and sustainable route for safe and efficient removal of aromatic VOCs with photocatalytic technology. 展开更多
关键词 Photocatalysis Zn‐doping Surface oxygen vacancies TOLUENE In situ FT‐IR
在线阅读 下载PDF
上一页 1 2 232 下一页 到第
使用帮助 返回顶部