期刊文献+
共找到97,367篇文章
< 1 2 250 >
每页显示 20 50 100
ASME Code Case 3029高温许用压应力计算方法的介绍及工程应用
1
作者 马忠明 《化工设备与管道》 北大核心 2026年第1期24-30,共7页
介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及... 介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。 展开更多
关键词 code Case 3029 蠕变屈曲 失稳 压力容器 许用应力
在线阅读 下载PDF
ChatGPT+VS Code在高中地理地图开发中的应用——以“国内人口迁移”为例
2
作者 王凌宇 白絮飞 《中国信息技术教育》 2026年第1期81-84,共4页
人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为... 人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为“助教者”,若教师生成教学设计的指令过于宽泛,结果易出现“张冠李戴”或“似是而非”等问题,需教师二次加工。相反,若教师能针对教学设计中的特定模块提供详细准确的指令,人工智能技术输出的结果将更具准确性和实用性,展现出更高研究价值。因此,本文从人工智能技术“助教者”身份出发,摒弃传统完整的教学过程设计,聚焦备课中的“地图开发”模块,采用由人工智能技术生成地图代码并通过第三方软件运行的方式,实现快速辅助教师生成所需地图的目标,提升备课效率与教学质量。 展开更多
关键词 ChatGPT VS code 人工智能技术 中学地理 地图开发
在线阅读 下载PDF
Rateless Polar Codes with Unequal Error Protection Property
3
作者 Cui Chen Xiang Wei +1 位作者 Ma Siwei Guo Qing 《China Communications》 2026年第1期10-23,共14页
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom... Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency. 展开更多
关键词 matrix extension polar codes rateless coding unequal error protection
在线阅读 下载PDF
Impact of flex power on inter-and intra-differential code bias variation
4
作者 Jiayu Li Yan Xiang +1 位作者 Chengeng Su Xiaolin Ji 《Geodesy and Geodynamics》 2026年第2期154-167,共14页
Differential Code Bias(DCB)is the time delays between two different GNSS signals,which is crucial for GNSS positioning.Previous studies have shown that it can be significantly affected by the flex power operations in ... Differential Code Bias(DCB)is the time delays between two different GNSS signals,which is crucial for GNSS positioning.Previous studies have shown that it can be significantly affected by the flex power operations in satellites.This study proposes a 15-min short-term DCB estimation method to analyze flex power's impact on DCB variations.The method jointly estimates satellite DCB,receiver DCB,and ionospheric parameters using over 300 MGEX stations.We examined three representative flex power events in 2024,achieving average internal RMS values of 0.042 ns and 0.0068 ns for inter-frequency and intra-frequency scenarios respectively.Results show that intra-frequency DCB exhibits clear shift biases synchronized with flex power state transitions while maintaining stability within 0.20 ns during nontransition periods.No definitive impact on inter-frequency DCB was observed at current estimation precision levels. 展开更多
关键词 Differential code bias Flex power GNSS
原文传递
Efficient Polar Codes with Low Complexity for Correcting Insertions/Deletions in DPPM
5
作者 Li Leran Liu Yuan +2 位作者 Yuan Ye Xiahou Wenqian Chen Maonan 《China Communications》 2026年第1期24-33,共10页
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv... Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance. 展开更多
关键词 DPPM insertions/deletions polar codes SC decoding
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
6
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 aI+SaST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
7
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Improving MCUCN code to simulate ultracold neutron storage and transportation in superfluid^(4)He
8
作者 Xue-Fen Han Fei Shen +6 位作者 Bin Zhou Xiao-Xiao Cai Tian-Cheng Yi Zhi-Liang Hu Song-Lin Wang Tian-Jiao Liang Robert Golub 《Nuclear Science and Techniques》 2026年第3期235-246,共12页
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ... The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ. 展开更多
关键词 Ultracold neutron Storage TRaNSPORTaTION Improved MCUCN code Upscattering effect absorption by^(3)He
在线阅读 下载PDF
TLS Blind Recognition Algorithm of LDPC Codes
9
作者 Ning Xiaoyan Sun Jingjing +1 位作者 Wang Zhenduo Sun Zhiguo 《China Communications》 2026年第2期112-121,共10页
Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively ... Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively high row weights,the existing blind recognition algorithms based on a candidate set generally perform worse.In this paper,we propose a blind recognition method for LDPC codes,called as tangent function assisted least square(TLS)method,which improves recognition performances by constructing a new cost function.To characterize the constraint degree among received vectors and paritycheck vectors,a feature function based on tangent function is constructed in the proposed algorithm.A cost function based on least square method is also established according to the feature function values satisfying the parity-check relationship.Moreover,the minimum average value in TLS is obtained on the candidate set.Numerical analysis and simulation results show that recognition performances of TLS algorithm are consistent with theoretical results.Compared with existing algorithms,the proposed method possesses better recognition performances. 展开更多
关键词 blind recognition cost function least square low-density parity-check(LDPC)codes
在线阅读 下载PDF
Beyond Accuracy:Evaluating and Explaining the Capability Boundaries of Large Language Models in Syntax-Preserving Code Translation
10
作者 Yaxin Zhao Qi Han +1 位作者 Hui Shu Yan Guang 《Computers, Materials & Continua》 2026年第2期1371-1394,共24页
LargeLanguageModels(LLMs)are increasingly appliedinthe fieldof code translation.However,existing evaluation methodologies suffer from two major limitations:(1)the high overlap between test data and pretraining corpora... LargeLanguageModels(LLMs)are increasingly appliedinthe fieldof code translation.However,existing evaluation methodologies suffer from two major limitations:(1)the high overlap between test data and pretraining corpora,which introduces significant bias in performance evaluation;and(2)mainstream metrics focus primarily on surface-level accuracy,failing to uncover the underlying factors that constrain model capabilities.To address these issues,this paper presents TCode(Translation-Oriented Code Evaluation benchmark)—a complexity-controllable,contamination-free benchmark dataset for code translation—alongside a dedicated static feature sensitivity evaluation framework.The dataset is carefully designed to control complexity along multiple dimensions—including syntactic nesting and expression intricacy—enabling both broad coverage and fine-grained differentiation of sample difficulty.This design supports precise evaluation of model capabilities across a wide spectrum of translation challenges.The proposed evaluation framework introduces a correlation-driven analysis mechanism based on static program features,enabling predictive modeling of translation success from two perspectives:Code Form Complexity(e.g.,code length and character density)and Semantic Modeling Complexity(e.g.,syntactic depth,control-flow nesting,and type system complexity).Empirical evaluations across representative LLMs—including Qwen2.5-72B and Llama3.3-70B—demonstrate that even state-of-the-art models achieve over 80% compilation success on simple samples,but their accuracy drops sharply below 40% on complex cases.Further correlation analysis indicates that Semantic Modeling Complexity alone is correlated with up to 60% of the variance in translation success,with static program features exhibiting nonlinear threshold effects that highlight clear capability boundaries.This study departs fromthe traditional accuracy-centric evaluation paradigm and,for the first time,systematically characterizes the capabilities of large languagemodels in translation tasks through the lens of programstatic features.The findings provide actionable insights for model refinement and training strategy development. 展开更多
关键词 Large language models(LLMs) code translation compiler testing program analysis complexity-based evaluation
在线阅读 下载PDF
DAYU3D:a modern code for HTGR thermal-hydraulic design and accident analysis
11
作者 Hao-Jie Zhang Yu-Tong Wen +2 位作者 Ding She Yan-Hua Zheng Lei Shi 《Nuclear Science and Techniques》 2026年第5期345-360,共16页
DAYU3D is a modern three-dimensional(3D)computer code for thermal-hydraulic design and accident analysis in hightemperature gas-cooled reactors(HTGRs),developed by the Institute of Nuclear and New Energy Technology(IN... DAYU3D is a modern three-dimensional(3D)computer code for thermal-hydraulic design and accident analysis in hightemperature gas-cooled reactors(HTGRs),developed by the Institute of Nuclear and New Energy Technology(INET)at Tsinghua University.Compared to the traditional codes like TINTE,the DAYU3D code has advantages due to its refined framework,improved models,and more efficient algorithms.It is able to simulate the continuous movement of control rods and is more rigorous in treating radiation heat transfer and the break mass flow.Advanced computational methods significantly improve the computational efficiency of DAYU3D,achieving a time reduction of over 60%compared to TINTE.Extensive verification and validation with more than 100 cases demonstrate that DAYU3D is promising for HTGR 3D thermal-hydraulic design and accident analyses. 展开更多
关键词 High-temperature gas-cooled reactor Thermal-hydraulic design and accident analysis code THREE-DIMENSIONaL DaYU3D
在线阅读 下载PDF
Integrating Attention Mechanism with Code Structural Affinity and Execution Context Correlation for Automated Bug Repair
12
作者 Jinfeng Ji Geunseok Yang 《Computers, Materials & Continua》 2026年第3期1708-1725,共18页
Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite cons... Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness. 展开更多
关键词 automated bug repair autoencoder algorithm buggy code analysis stack trace similarity machine learning for debugging
在线阅读 下载PDF
Cognitive Erasure-Coded Data Update and Repair for Mitigating I/O Overhead
13
作者 Bing Wei Ming Zhong +2 位作者 Qian Chen Yi Wu Yubin Li 《Computers, Materials & Continua》 2026年第2期1706-1725,共20页
In erasure-coded storage systems,updating data requires parity maintenance,which often leads to significant I/O amplification due to“write-after-read”operations.Furthermore,scattered parity placement increases disk ... In erasure-coded storage systems,updating data requires parity maintenance,which often leads to significant I/O amplification due to“write-after-read”operations.Furthermore,scattered parity placement increases disk seek overhead during repair,resulting in degraded system performance.To address these challenges,this paper proposes a Cognitive Update and Repair Method(CURM)that leverages machine learning to classify files into writeonly,read-only,and read-write categories,enabling tailored update and repair strategies.For write-only and read-write files,CURM employs a data-differencemechanism combined with fine-grained I/O scheduling to minimize redundant read operations and mitigate I/O amplification.For read-write files,CURM further reserves adjacent disk space near parity blocks,supporting parallel reads and reducing disk seek overhead during repair.We implement CURM in a prototype system,Cognitive Update and Repair File System(CURFS),and conduct extensive experiments using realworld Network File System(NFS)and Microsoft Research(MSR)workloads on a 25-node cluster.Experimental results demonstrate that CURMimproves data update throughput by up to 82.52%,reduces recovery time by up to 47.47%,and decreases long-term storage overhead by more than 15% compared to state-of-the-art methods including Full Logging(FL),ParityLogging(PL),ParityLoggingwithReservedspace(PLR),andPARIX.These results validate the effectiveness of CURM in enhancing both update and repair performance,providing a scalable and efficient solution for large-scale erasure-coded storage systems. 展开更多
关键词 Erasure coding machine learning cognitive update and repair I/O amplification mitigation seekefficient recovery
在线阅读 下载PDF
基于外码分块编码的BATS码度优化
14
作者 杨柳 阴慧颖 +2 位作者 马征 刘恒 王士恒 《西南交通大学学报》 北大核心 2026年第1期156-166,共11页
为解决分批稀疏码(BATS码)在现有外码分块编码方案下,外码随机分批导致的数据重复译码及资源浪费问题,系统地研究基于外码分块编码方案的BATS码理论批次数优化与动态适应性问题.首先,在已知丢包率的条件下,构建BATS码批次数消耗分析模型... 为解决分批稀疏码(BATS码)在现有外码分块编码方案下,外码随机分批导致的数据重复译码及资源浪费问题,系统地研究基于外码分块编码方案的BATS码理论批次数优化与动态适应性问题.首先,在已知丢包率的条件下,构建BATS码批次数消耗分析模型,并推导得出最优度值的计算方法,以此应对现有方案在计算理论批次数以及确定最小化批次数消耗的最优度值方面所面临的挑战;其次,针对信道丢包率未知的场景,提出一种基于强化学习的BATS码动态度优化方法,借助智能学习机制,在丢包率未知的情况下实时获取度值;最后,通过仿真实验对所构建的理论模型和提出的动态优化方法进行评估.理论分析结果显示,所构建的基于外码分块的传输模型及其理论批次数计算公式能够精准计算批次数消耗并确定最优度值.仿真结果进一步证明,在丢包率未知的场景下,所提出的强化学习优化方案的平均批次数消耗低于固定度值方案,且在动态信道环境中能够保持良好的性能表现. 展开更多
关键词 分批稀疏码 分块码 传输次数 强化学习
在线阅读 下载PDF
非编码sRNA对细菌适应不同环境压力的调控作用
15
作者 刘欢 寇家豪 +4 位作者 刘青 赵洁 王江威 刘俊杰 赵燕妮 《微生物学通报》 北大核心 2026年第3期1176-1187,共12页
细菌在复杂多变的环境中生存,需要快速响应温度、p H、渗透压、金属离子浓度等不同环境压力。近年来,非编码小RNA(small RNA,sRNA)被广泛认为是细菌环境适应性调控的关键因子。sRNA的长度通常为40-500 nt,在细菌中普遍存在。它们通常通... 细菌在复杂多变的环境中生存,需要快速响应温度、p H、渗透压、金属离子浓度等不同环境压力。近年来,非编码小RNA(small RNA,sRNA)被广泛认为是细菌环境适应性调控的关键因子。sRNA的长度通常为40-500 nt,在细菌中普遍存在。它们通常通过碱基互补配对与靶标mRNA相互作用,调控其稳定性或翻译效率,在转录后水平快速实现对外界环境变化的适应。本文综述了sRNA在细菌适应不同环境条件变化中的调控作用的研究进展,对于揭示细菌如何在多变环境中维持生存和致病性机理具有重要意义。 展开更多
关键词 非编码sRNa 环境压力 细菌
原文传递
血清lncRNA THRIL、lncRNA NEAT1与新生儿肺炎病情程度及预后的相关性
16
作者 刘鑫 张宏蕊 +2 位作者 沈颖 刁玉巧 樊涛 《实用医学杂志》 北大核心 2026年第2期327-333,共7页
目的探究血清长链非编码RNA肿瘤坏死因子相关异种核糖核蛋白L(lncRNA THRIL)、长链非编码RNA核富集转录本1(lncRNA NEAT1)与新生儿肺炎病情程度、预后的关系。方法选取2022年8月至2024年8月河北医科大学第四医院收治的120例新生儿肺炎... 目的探究血清长链非编码RNA肿瘤坏死因子相关异种核糖核蛋白L(lncRNA THRIL)、长链非编码RNA核富集转录本1(lncRNA NEAT1)与新生儿肺炎病情程度、预后的关系。方法选取2022年8月至2024年8月河北医科大学第四医院收治的120例新生儿肺炎患儿为观察组,根据病情程度分为轻症组(42例)、中症组(40例)和重症组(38例);根据治疗2周后预后情况分为预后良好组(86例)和预后不良组(34例)。同时,选取同期在医院进行健康体检的120例健康新生儿,将其设为对照组。采用实时荧光定量PCR法测定受试新生儿血清lncRNA THRIL、lncRNA NEAT1水平;收集新生儿肺炎患儿临床资料,并检测免疫炎症指标[血清可溶性髓样细胞触发受体-1(sTREM-1)、可溶性白细胞介素2受体(sIL-2R)]。对于新生儿肺炎患儿预后不良的影响因素,采用logistic回归分析进行识别与验证;针对血清lncRNA THRIL和lncRNA NEAT1对患儿不良预后的预测作用,通过受试者工作特征(ROC)曲线分析予以评价,明确两者单独及联合预测的临床价值。结果观察组血清lncRNA THRIL、lncRNA NEAT1水平与对照组相比显著升高(P<0.05);血清lncRNA THRIL、lncRNA NEAT1水平随着新生儿肺炎病情的加重而逐渐升高(P<0.05);与预后良好组相比,预后不良组剖腹产占比、血清sTREM-1、sIL-2R、lncRNA THRIL、lncRNA NEAT1水平均显著升高(P<0.05);血清sIL-2R、lncRNA THRIL、lncRNA NEAT1为新生儿肺炎患儿预后不良的独立危险因素(P<0.05);血清lncRNA THRIL、lncRNA NEAT1、二者联合预测新生儿肺炎患儿发生预后不良的曲线下面积(AUC)分别为0.772、0.808、0.930,二者联合预测的AUC显著高于各指标单独预测的AUC(Z二者联合-lncRNA THRIL=2.347、Z二者联合-lncRNA NEAT1=2.217,P=0.019、0.027)。结论新生儿肺炎患儿血清lncRNA THRIL、lncRNA NEAT1水平均明显升高,二者均是新生儿肺炎预后不良的危险因素,二者联合对新生儿肺炎患儿的预后有较好的预测效果。 展开更多
关键词 新生儿肺炎 长链非编码RNa肿瘤坏死因子相关异种核糖核蛋白L 长链非编码RNa核富集转录本1 病情程度 预后
暂未订购
lncRNA尿路上皮癌胚抗原1对人胃肠道间质瘤细胞失巢凋亡的调控作用及其机制
17
作者 赵宇 何小双 +2 位作者 董晓寅 高丰毅 何家赓 《吉林大学学报(医学版)》 北大核心 2026年第2期429-439,共11页
目的:探讨长链非编码RNA(lncRNA)尿路上皮癌胚抗原1(UCA1)对人胃肠道间质瘤(GIST)细胞失巢凋亡的影响,并阐明其作用机制。方法:分别于贴壁和失巢状态下培养G1ST细胞株GIST-T1并诱导失巢凋亡抵抗的GIST-T1细胞,采用实时荧光定量PCR(RT-qP... 目的:探讨长链非编码RNA(lncRNA)尿路上皮癌胚抗原1(UCA1)对人胃肠道间质瘤(GIST)细胞失巢凋亡的影响,并阐明其作用机制。方法:分别于贴壁和失巢状态下培养G1ST细胞株GIST-T1并诱导失巢凋亡抵抗的GIST-T1细胞,采用实时荧光定量PCR(RT-qPCR)法检测2种细胞中lncRNA UCA1表达,Western blotting法检测细胞中自噬标志物微管相关蛋白轻链3(LC3)-Ⅰ、LC3-Ⅱ和p62表达水平,并计算LC3-Ⅱ/LC3-Ⅰ比值。采用敲减lncRNA UCA1或阴性对照慢病毒感染GIST-T1细胞并给予自噬激活剂雷帕霉素(RAPA)干预,将GIST-T1细胞分为对照组、sh-NC组、sh-UCA1组、sh-NC+RAPA组和sh-UCA1+RAPA组,并对细胞进行失巢诱导。采用流式细胞术检测各组细胞失巢凋亡率,Western blotting法检测各组细胞中LC3-Ⅰ、LC3-Ⅱ和p62蛋白表达水平,细胞计数试剂盒8(CCK-8)法检测各组细胞增殖活性,细胞划痕实验检测各组细胞划痕愈合率,Transwell小室实验检测各组细胞的侵袭细胞数。收集sh-NC组和sh-UCA1组GIST-T1细胞,分别通过尾静脉注射建立2组裸鼠移植瘤模型,4周后采用荧光活体成像仪检测2组裸鼠体内肿瘤生长和肝脏转移情况,测量2组裸鼠肿瘤组织质量。采用TUNEL染色法观察2组裸鼠肿瘤组织中细胞凋亡情况,免疫组织化学染色法检测2组裸鼠肿瘤组织中LC3B和p62蛋白表达水平。结果:与贴壁培养的GIST-T1细胞比较,失巢凋亡抵抗的GIST-T1细胞中lncRNA UCA1表达水平明显升高(P<0.05),LC3-Ⅱ/LC3-Ⅰ比值明显升高(P<0.05),p62蛋白表达水平明显降低(P<0.05)。与sh-NC组比较,sh-UCA1组GIST-T1细胞失巢凋亡率明显升高(P<0.05),LC3-Ⅱ/LC3-Ⅰ比值明显降低(P<0.05),p62蛋白表达水平明显升高(P<0.05),细胞增殖活性和划痕愈合率明显降低(P<0.05),侵袭细胞数明显减少(P<0.05);与sh-UCA1组比较,sh-UCA1+RAPA组GIST-T1细胞失巢凋亡率明显降低(P<0.05),LC3-Ⅱ/LC3-Ⅰ比值明显升高(P<0.05),p62蛋白表达水平明显降低(P<0.05),细胞增殖活性和划痕愈合率明显升高(P<0.05),侵袭细胞数明显增加(P<0.05)。与sh-NC组比较,sh-UCA1组裸鼠肝组织荧光强度减弱,肿瘤质量明显降低(P<0.05),肿瘤组织中细胞凋亡率明显升高(P<0.05),LC3B蛋白表达水平明显降低(P<0.05),p62蛋白表达水平明显升高(P<0.05)。结论:lncRNA UCA1在失巢凋亡抵抗的GIST-T1细胞中高表达,下调其表达可通过降低自噬水平来促进GIST-T1细胞失巢凋亡,从而抑制细胞生长、迁移和侵袭。 展开更多
关键词 胃肠道间质瘤 长链非编码RNa 尿路上皮癌胚抗原1 失巢凋亡 自噬
暂未订购
长链非编码RNA MEG3对视网膜母细胞瘤增殖、迁移和侵袭能力的影响作用
18
作者 严肖啸 孙敏 尹双慧 《眼科新进展》 北大核心 2026年第4期275-280,共6页
目的 探讨长链非编码RNA MEG3(LncRNA-MEG3)对视网膜母细胞瘤(RB)增殖、迁移和侵袭能力的影响作用。方法 采用qRT-PCR检测RB细胞系(Weri-Rb1、Y79、HXO-Rb44)及人视网膜色素上皮细胞(hRPEC)中MEG3、miR-145-5p与促凋亡蛋白Bax mRNA的表... 目的 探讨长链非编码RNA MEG3(LncRNA-MEG3)对视网膜母细胞瘤(RB)增殖、迁移和侵袭能力的影响作用。方法 采用qRT-PCR检测RB细胞系(Weri-Rb1、Y79、HXO-Rb44)及人视网膜色素上皮细胞(hRPEC)中MEG3、miR-145-5p与促凋亡蛋白Bax mRNA的表达;通过双荧光素酶报告实验验证miR-145-5p与MEG3和Bax的靶向关系。将Y79细胞分为Control组、oe-NC组、oe-MEG3组及其分别联合miR-NC、miR-145-5p mimics、sh-NC、sh-Bax的回复实验组,采用脂质体转染进行干预。利用CCK-8法、Transwell实验、流式细胞术及Western blot分别检测细胞增殖、迁移、侵袭、凋亡及相关蛋白(兔抗人核增殖抗原Ki67、基质金属蛋白酶9、裂解型胱天蛋白酶-3、Bax、B细胞淋巴瘤-2)的表达变化。结果 与hRPEC相比,三种RB细胞系(Weri-Rb1、Y79及HXO-Rb44)中MEG3与Bax mRNA表达均显著降低,miR-145-5p表达显著升高(均为P<0.05),其中Y79变化最为显著,故选用其进行后续实验。双荧光素酶实验证实miR-145-5p可直接靶向结合MEG3与Bax的3’-UTR,并抑制其报告基因活性。过表达MEG3能显著抑制Y79细胞的增殖、迁移与侵袭,促进细胞凋亡,并下调Ki67、基质金属蛋白酶9、B细胞淋巴瘤-2蛋白表达,上调裂解型胱天蛋白酶-3与Bax蛋白表达(均为P<0.05)。回复实验中,共转染miR-145-5p mimics或敲低Bax均可部分逆转MEG3的上述效应。结论 过表达LncRNA-MEG3可通过靶向抑制miR-145-5p,进而上调Bax的表达,最终抑制RB Y79细胞的增殖、迁移和侵袭能力,并促进细胞凋亡。 展开更多
关键词 长链非编码RNa miR-145-5p 促凋亡蛋白Bax 视网膜母细胞瘤
暂未订购
Construction of a Maritime Knowledge Graph Using GraphRAG for Entity and Relationship Extraction from Maritime Documents 被引量:4
19
作者 Yi Han Tao Yang +2 位作者 Meng Yuan Pinghua Hu Chen Li 《Journal of Computer and Communications》 2025年第2期68-93,共26页
In the international shipping industry, digital intelligence transformation has become essential, with both governments and enterprises actively working to integrate diverse datasets. The domain of maritime and shippi... In the international shipping industry, digital intelligence transformation has become essential, with both governments and enterprises actively working to integrate diverse datasets. The domain of maritime and shipping is characterized by a vast array of document types, filled with complex, large-scale, and often chaotic knowledge and relationships. Effectively managing these documents is crucial for developing a Large Language Model (LLM) in the maritime domain, enabling practitioners to access and leverage valuable information. A Knowledge Graph (KG) offers a state-of-the-art solution for enhancing knowledge retrieval, providing more accurate responses and enabling context-aware reasoning. This paper presents a framework for utilizing maritime and shipping documents to construct a knowledge graph using GraphRAG, a hybrid tool combining graph-based retrieval and generation capabilities. The extraction of entities and relationships from these documents and the KG construction process are detailed. Furthermore, the KG is integrated with an LLM to develop a Q&A system, demonstrating that the system significantly improves answer accuracy compared to traditional LLMs. Additionally, the KG construction process is up to 50% faster than conventional LLM-based approaches, underscoring the efficiency of our method. This study provides a promising approach to digital intelligence in shipping, advancing knowledge accessibility and decision-making. 展开更多
关键词 Maritime Knowledge Graph GraphRaG Entity and Relationship Extraction document Management
在线阅读 下载PDF
LINC02086通过调控Wnt/β-catenin通路介导巨噬细胞M2极化对胃癌细胞增殖、迁移及侵袭的影响
20
作者 李军 卜亚飞 +2 位作者 陈杰 丁波 王磊 《安徽医科大学学报》 北大核心 2026年第2期192-200,共9页
目的探讨长链间隔非编码RNA02086(LINC02086)过表达介导的巨噬细胞极化对胃癌细胞增殖、迁移和侵袭的影响及机制。方法采用qRT-PCR检测人胃黏膜上皮细胞GES-1及人胃癌细胞系HCG-27、NCI-N87、AGS中的LINC02086表达水平。使用佛波酯(PMA... 目的探讨长链间隔非编码RNA02086(LINC02086)过表达介导的巨噬细胞极化对胃癌细胞增殖、迁移和侵袭的影响及机制。方法采用qRT-PCR检测人胃黏膜上皮细胞GES-1及人胃癌细胞系HCG-27、NCI-N87、AGS中的LINC02086表达水平。使用佛波酯(PMA)将人急性单核细胞白血病细胞(THP-1)诱导分化为M0型巨噬细胞,分别用LINC02086过表达慢病毒(OE-LINC02086)及其阴性对照慢病毒(Vector)感染HGC-27细胞,收集培养上清液作为条件培养基1(CM1);将M0型巨噬细胞与感染后的HGC-27细胞共培养,收集培养上清液得到CM2。使用CM1单独或联合Wnt/β-catenin通路抑制剂(IWR-1)处理M0型巨噬细胞,分别设为Vector+CM1组、OE-LINC02086+CM1组和OE-LINC02086+CM1+IWR-1组;通过流式细胞术检测细胞中甘露糖受体(CD206)水平;qRT-PCR检测细胞中白细胞介素-10(IL⁃10)、转化生长因子-β(TGF⁃β)、血管内皮生长因子(VEGF)和趋化因子配体22(CCL22)mRNA表达水平;Western blot检测细胞中CD206、VEGF蛋白和Wnt/β-catenin通路相关蛋白Wnt家族成员3a(Wnt3a)、糖原合成酶激酶-3β(GSK-3β)、β-连环蛋白(β-catenin)表达水平。使用CM2单独或联合IWR-1处理HGC-27细胞,分别设为Vector+CM2组、OE-LINC02086+CM2组和OE-LINC02086+CM2+IWR-1组;CCK-8法检测细胞增殖活性;Transwell检测细胞迁移、侵袭能力。结果与GES-1细胞比较,HCG-27、NCI-N87及AGS细胞中LINC02086表达水平均升高(P<0.05),其中HCG-27细胞升高幅度最小。与Vector+CM1组比较,OE-LINC02086+CM1刺激后,巨噬细胞中CD206水平以及IL⁃10、TGF⁃β、VEGF和CCL22 mRNA表达水平升高(P<0.05),同时,细胞中Wnt3a和β-catenin蛋白表达水平升高(P<0.05),GSK-3β蛋白表达水平降低(P<0.05);然而,IWR-1联合干预可明显逆转LINC02086过表达对巨噬细胞CD206和IL⁃10、TGF⁃βmRNA等M2型极化标志物表达的促进作用(P<0.05)以及对Wnt/β-catenin通路的激活作用(P<0.05)。与Vector+CM2组比较,OELINC02086+CM2处理后,HGC-27细胞增殖活性及迁移、侵袭细胞数量升高(P<0.05);然而,IWR-1联合干预可明显逆转LINC02086过表达对HGC-27细胞增殖、迁移和侵袭的促进作用(P<0.05)。结论LINC02086过表达可通过激活Wnt/β-catenin通路介导巨噬细胞M2极化并促进胃癌细胞增殖、迁移和侵袭。 展开更多
关键词 长链间隔非编码RNa02086 过表达 胃癌 巨噬细胞 极化 增殖 WNT/Β-CaTENIN通路
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部